Cambios
En el instante 30 de mayo de 2024, 14:49:42 UTC, Administrador CKAN:
-
Ningún campo fue actualizado. Compruebe la comparativa de metadatos para más detalles.
f | 1 | { | f | 1 | { |
2 | "author": null, | 2 | "author": null, | ||
3 | "author_email": null, | 3 | "author_email": null, | ||
4 | "conforms_to": [], | 4 | "conforms_to": [], | ||
5 | "coverage_new": {}, | 5 | "coverage_new": {}, | ||
6 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | 6 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | ||
7 | "description": { | 7 | "description": { | ||
8 | "en": "Here we publish the database of cybersecurity experts whose | 8 | "en": "Here we publish the database of cybersecurity experts whose | ||
9 | scientific results are discussed in the chapter \"Cybersecurity | 9 | scientific results are discussed in the chapter \"Cybersecurity | ||
10 | research in Spain\" part of the Report on Science and Technology in | 10 | research in Spain\" part of the Report on Science and Technology in | ||
11 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | 11 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | ||
12 | 2023. URL: | 12 | 2023. URL: | ||
13 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | 13 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | ||
14 | "es": "Se publica en este repositorio de acceso abierto la base de | 14 | "es": "Se publica en este repositorio de acceso abierto la base de | ||
15 | datos de expertas y expertos en ciberseguridad cuyos resultados | 15 | datos de expertas y expertos en ciberseguridad cuyos resultados | ||
16 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | 16 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | ||
17 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | 17 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | ||
18 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | 18 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | ||
19 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | 19 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | ||
20 | Alternativa el 1 de junio de 2023. URL: | 20 | Alternativa el 1 de junio de 2023. URL: | ||
21 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 21 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
22 | }, | 22 | }, | ||
23 | "groups": [], | 23 | "groups": [], | ||
24 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 24 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
25 | "identifier": "https://doi.org/10.20350/digitalCSIC/15254", | 25 | "identifier": "https://doi.org/10.20350/digitalCSIC/15254", | ||
26 | "isopen": false, | 26 | "isopen": false, | ||
27 | "issued_date": "2023-04-27T00:00:00", | 27 | "issued_date": "2023-04-27T00:00:00", | ||
28 | "language": [ | 28 | "language": [ | ||
29 | "es", | 29 | "es", | ||
30 | "en" | 30 | "en" | ||
31 | ], | 31 | ], | ||
32 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 32 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
33 | "license_title": | 33 | "license_title": | ||
34 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 34 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
35 | "maintainer": null, | 35 | "maintainer": null, | ||
36 | "maintainer_email": null, | 36 | "maintainer_email": null, | ||
37 | "metadata_created": "2024-05-30T14:49:10.062340", | 37 | "metadata_created": "2024-05-30T14:49:10.062340", | ||
n | 38 | "metadata_modified": "2024-05-30T14:49:42.355859", | n | 38 | "metadata_modified": "2024-05-30T14:49:42.462276", |
39 | "multilingual_tags": { | 39 | "multilingual_tags": { | ||
40 | "en": [ | 40 | "en": [ | ||
41 | "Cybersecurity", | 41 | "Cybersecurity", | ||
42 | "Privacy", | 42 | "Privacy", | ||
43 | "Cryptography", | 43 | "Cryptography", | ||
44 | "Spain" | 44 | "Spain" | ||
45 | ], | 45 | ], | ||
46 | "es": [ | 46 | "es": [ | ||
47 | "Ciberseguridad", | 47 | "Ciberseguridad", | ||
48 | "Privacidad", | 48 | "Privacidad", | ||
49 | "Criptograf\u00eda", | 49 | "Criptograf\u00eda", | ||
50 | "Espa\u00f1a" | 50 | "Espa\u00f1a" | ||
51 | ] | 51 | ] | ||
52 | }, | 52 | }, | ||
53 | "name": | 53 | "name": | ||
54 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | 54 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | ||
55 | "notes": null, | 55 | "notes": null, | ||
56 | "num_resources": 2, | 56 | "num_resources": 2, | ||
57 | "num_tags": 0, | 57 | "num_tags": 0, | ||
58 | "organization": { | 58 | "organization": { | ||
59 | "approval_status": "approved", | 59 | "approval_status": "approved", | ||
60 | "created": "2023-09-21T07:20:55.247107", | 60 | "created": "2023-09-21T07:20:55.247107", | ||
61 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | 61 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | ||
62 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | 62 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | ||
63 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | 63 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | ||
64 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | 64 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | ||
65 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | 65 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | ||
66 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | 66 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | ||
67 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | 67 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | ||
68 | \u00e1mbitos cubiertos por la historia del pensamiento, la | 68 | \u00e1mbitos cubiertos por la historia del pensamiento, la | ||
69 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | 69 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | ||
70 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | 70 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | ||
71 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | 71 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | ||
72 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | 72 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | ||
73 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | 73 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | ||
74 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | 74 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | ||
75 | teor\u00eda feminista y los estudios de g\u00e9nero, la | 75 | teor\u00eda feminista y los estudios de g\u00e9nero, la | ||
76 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | 76 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | ||
77 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | 77 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | ||
78 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | 78 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | ||
79 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | 79 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
80 | "image_url": "2023-09-21-052055.241808ifs1.png", | 80 | "image_url": "2023-09-21-052055.241808ifs1.png", | ||
81 | "is_organization": true, | 81 | "is_organization": true, | ||
82 | "name": "instituto-de-filosofia-ifs-csic", | 82 | "name": "instituto-de-filosofia-ifs-csic", | ||
83 | "state": "active", | 83 | "state": "active", | ||
84 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | 84 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | ||
85 | "type": "organization" | 85 | "type": "organization" | ||
86 | }, | 86 | }, | ||
87 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | 87 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
88 | "private": false, | 88 | "private": false, | ||
89 | "publisher": "bcfdcf9e-5535-449f-b619-4a370337492e", | 89 | "publisher": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
90 | "reference": [ | 90 | "reference": [ | ||
91 | 91 | ||||
92 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 92 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
93 | ], | 93 | ], | ||
94 | "relationships_as_object": [], | 94 | "relationships_as_object": [], | ||
95 | "relationships_as_subject": [], | 95 | "relationships_as_subject": [], | ||
96 | "resources": [ | 96 | "resources": [ | ||
97 | { | 97 | { | ||
98 | "byte_size": "171,82 kB", | 98 | "byte_size": "171,82 kB", | ||
99 | "cache_last_updated": null, | 99 | "cache_last_updated": null, | ||
100 | "cache_url": null, | 100 | "cache_url": null, | ||
101 | "created": "2024-05-30T14:49:26.351102", | 101 | "created": "2024-05-30T14:49:26.351102", | ||
102 | "datastore_active": false, | 102 | "datastore_active": false, | ||
103 | "description": null, | 103 | "description": null, | ||
104 | "format": "csv", | 104 | "format": "csv", | ||
105 | "hash": "", | 105 | "hash": "", | ||
106 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | 106 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | ||
107 | "last_modified": null, | 107 | "last_modified": null, | ||
108 | "metadata_modified": "2024-05-30T14:49:42.357854", | 108 | "metadata_modified": "2024-05-30T14:49:42.357854", | ||
109 | "mimetype": "text/csv", | 109 | "mimetype": "text/csv", | ||
110 | "mimetype_inner": null, | 110 | "mimetype_inner": null, | ||
111 | "name": "ciberseguridad.csv", | 111 | "name": "ciberseguridad.csv", | ||
112 | "name_translated": { | 112 | "name_translated": { | ||
113 | "en": "ciberseguridad.csv", | 113 | "en": "ciberseguridad.csv", | ||
114 | "es": "ciberseguridad.csv" | 114 | "es": "ciberseguridad.csv" | ||
115 | }, | 115 | }, | ||
116 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 116 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
117 | "position": 0, | 117 | "position": 0, | ||
118 | "resource_identifier": "", | 118 | "resource_identifier": "", | ||
119 | "resource_relation": [], | 119 | "resource_relation": [], | ||
120 | "resource_relation-1": "", | 120 | "resource_relation-1": "", | ||
121 | "resource_type": null, | 121 | "resource_type": null, | ||
122 | "size": null, | 122 | "size": null, | ||
123 | "state": "active", | 123 | "state": "active", | ||
124 | "url": | 124 | "url": | ||
125 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | 125 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | ||
126 | "url_type": null | 126 | "url_type": null | ||
127 | }, | 127 | }, | ||
128 | { | 128 | { | ||
129 | "byte_size": "3,94 kB", | 129 | "byte_size": "3,94 kB", | ||
130 | "cache_last_updated": null, | 130 | "cache_last_updated": null, | ||
131 | "cache_url": null, | 131 | "cache_url": null, | ||
132 | "created": "2024-05-30T14:49:42.359953", | 132 | "created": "2024-05-30T14:49:42.359953", | ||
133 | "datastore_active": false, | 133 | "datastore_active": false, | ||
134 | "description": null, | 134 | "description": null, | ||
135 | "format": "txt", | 135 | "format": "txt", | ||
136 | "hash": "", | 136 | "hash": "", | ||
137 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | 137 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | ||
138 | "last_modified": null, | 138 | "last_modified": null, | ||
n | 139 | "metadata_modified": "2024-05-30T14:49:42.357991", | n | 139 | "metadata_modified": "2024-05-30T14:49:42.464468", |
140 | "mimetype": "text/plain", | 140 | "mimetype": "text/plain", | ||
141 | "mimetype_inner": null, | 141 | "mimetype_inner": null, | ||
142 | "name": "Readme_BDD_ciberseguridad.txt", | 142 | "name": "Readme_BDD_ciberseguridad.txt", | ||
143 | "name_translated": { | 143 | "name_translated": { | ||
144 | "en": "Readme_BDD_ciberseguridad.txt", | 144 | "en": "Readme_BDD_ciberseguridad.txt", | ||
145 | "es": "Readme_BDD_ciberseguridad.txt" | 145 | "es": "Readme_BDD_ciberseguridad.txt" | ||
146 | }, | 146 | }, | ||
147 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 147 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
148 | "position": 1, | 148 | "position": 1, | ||
149 | "resource_identifier": "", | 149 | "resource_identifier": "", | ||
150 | "resource_relation": [], | 150 | "resource_relation": [], | ||
151 | "resource_relation-1": "", | 151 | "resource_relation-1": "", | ||
152 | "resource_type": null, | 152 | "resource_type": null, | ||
153 | "size": null, | 153 | "size": null, | ||
154 | "state": "active", | 154 | "state": "active", | ||
155 | "url": | 155 | "url": | ||
156 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | 156 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | ||
157 | "url_type": null | 157 | "url_type": null | ||
158 | } | 158 | } | ||
159 | ], | 159 | ], | ||
160 | "spatial": [ | 160 | "spatial": [ | ||
161 | 161 | ||||
162 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | 162 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | ||
163 | ], | 163 | ], | ||
t | 164 | "state": "draft", | t | 164 | "state": "active", |
165 | "tags": [], | 165 | "tags": [], | ||
166 | "theme": [ | 166 | "theme": [ | ||
167 | 167 | ||||
168 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | 168 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | ||
169 | "http://datos.gob.es/kos/sector-publico/sector/cultura-ocio", | 169 | "http://datos.gob.es/kos/sector-publico/sector/cultura-ocio", | ||
170 | "http://datos.gob.es/kos/sector-publico/sector/demografia", | 170 | "http://datos.gob.es/kos/sector-publico/sector/demografia", | ||
171 | "http://datos.gob.es/kos/sector-publico/sector/educacion", | 171 | "http://datos.gob.es/kos/sector-publico/sector/educacion", | ||
172 | "http://datos.gob.es/kos/sector-publico/sector/sector-publico" | 172 | "http://datos.gob.es/kos/sector-publico/sector/sector-publico" | ||
173 | ], | 173 | ], | ||
174 | "title": "Base de datos de expertos/as en ciberseguridad en | 174 | "title": "Base de datos de expertos/as en ciberseguridad en | ||
175 | Espa\u00f1a / Dataset of cybersecurity experts in Spain", | 175 | Espa\u00f1a / Dataset of cybersecurity experts in Spain", | ||
176 | "title_translated": { | 176 | "title_translated": { | ||
177 | "en": "Dataset of cybersecurity experts in Spain", | 177 | "en": "Dataset of cybersecurity experts in Spain", | ||
178 | "es": "Base de datos de expertos/as en ciberseguridad en | 178 | "es": "Base de datos de expertos/as en ciberseguridad en | ||
179 | Espa\u00f1a / Dataset of cybersecurity experts in Spain" | 179 | Espa\u00f1a / Dataset of cybersecurity experts in Spain" | ||
180 | }, | 180 | }, | ||
181 | "type": "dataset", | 181 | "type": "dataset", | ||
182 | "url": null, | 182 | "url": null, | ||
183 | "version": null | 183 | "version": null | ||
184 | } | 184 | } |