Changes
On March 20, 2025 at 10:01:05 AM UTC,

-
Changed title to Base de datos de expertos/as en ciberseguridad en España (previously Base de datos de expertos/as en ciberseguridad en España / Dataset of cybersecurity experts in Spain)
-
Changed value of field
coverage_new
to{'1': {'from': '2023-03-01T00:00:00', 'to': '2023-03-31T00:00:00'}}
in Base de datos de expertos/as en ciberseguridad en España -
Changed value of field
title_translated
to{'en': 'Dataset of cybersecurity experts in Spain', 'es': 'Base de datos de expertos/as en ciberseguridad en España'}
in Base de datos de expertos/as en ciberseguridad en España -
Changed value of field
identifier
tohttp://hdl.handle.net/10261/307617
in Base de datos de expertos/as en ciberseguridad en España -
Changed value of field
publisher
tob627d71d-2315-4e75-afc9-897da84459f0
in Base de datos de expertos/as en ciberseguridad en España -
Changed value of field
theme
to['http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia', 'http://datos.gob.es/kos/sector-publico/sector/seguridad']
in Base de datos de expertos/as en ciberseguridad en España
f | 1 | { | f | 1 | { |
n | n | 2 | "Observaciones": { | ||
3 | "en": "Recommended citation: Degli-Esposti, Sara; 2023; Dataset of | ||||
4 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | ||||
5 | DOI: https://doi.org/10.20350/digitalCSIC/15254", | ||||
6 | "es": "Cita recomendada: Degli-Esposti, Sara; 2023; Dataset of | ||||
7 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | ||||
8 | DOI: https://doi.org/10.20350/digitalCSIC/15254" | ||||
9 | }, | ||||
2 | "author": null, | 10 | "author": null, | ||
3 | "author_email": null, | 11 | "author_email": null, | ||
n | n | 12 | "autor": {}, | ||
4 | "conforms_to": [], | 13 | "conforms_to": [], | ||
n | 5 | "coverage_new": {}, | n | 14 | "coverage_new": { |
15 | "1": { | ||||
16 | "from": "2023-03-01T00:00:00", | ||||
17 | "to": "2023-03-31T00:00:00" | ||||
18 | } | ||||
19 | }, | ||||
6 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | 20 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | ||
7 | "description": { | 21 | "description": { | ||
8 | "en": "Here we publish the database of cybersecurity experts whose | 22 | "en": "Here we publish the database of cybersecurity experts whose | ||
9 | scientific results are discussed in the chapter \"Cybersecurity | 23 | scientific results are discussed in the chapter \"Cybersecurity | ||
10 | research in Spain\" part of the Report on Science and Technology in | 24 | research in Spain\" part of the Report on Science and Technology in | ||
11 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | 25 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | ||
12 | 2023. URL: | 26 | 2023. URL: | ||
13 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | 27 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | ||
14 | "es": "Se publica en este repositorio de acceso abierto la base de | 28 | "es": "Se publica en este repositorio de acceso abierto la base de | ||
15 | datos de expertas y expertos en ciberseguridad cuyos resultados | 29 | datos de expertas y expertos en ciberseguridad cuyos resultados | ||
16 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | 30 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | ||
17 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | 31 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | ||
18 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | 32 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | ||
19 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | 33 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | ||
20 | Alternativa el 1 de junio de 2023. URL: | 34 | Alternativa el 1 de junio de 2023. URL: | ||
21 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 35 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
22 | }, | 36 | }, | ||
n | 23 | "groups": [], | n | 37 | "groups": [ |
38 | { | ||||
39 | "description": "", | ||||
40 | "display_name": "Ciberseguridad", | ||||
41 | "id": "e5bc10b2-5c46-475a-9f05-4bd296bbb706", | ||||
42 | "image_display_url": | ||||
43 | chs.csic.es/uploads/group/2024-06-24-141821.576038Ciberseguridad.png", | ||||
44 | "name": "ciberseguridad", | ||||
45 | "title": "Ciberseguridad" | ||||
46 | }, | ||||
47 | { | ||||
48 | "description": "", | ||||
49 | "display_name": "Documentaci\u00f3n", | ||||
50 | "id": "3b6f7671-8a98-4ce9-931a-bc059c28a4c3", | ||||
51 | "image_display_url": | ||||
52 | cchs.csic.es/uploads/group/2024-06-24-150638.476492Documentacion.png", | ||||
53 | "name": "documentacion", | ||||
54 | "title": "Documentaci\u00f3n" | ||||
55 | } | ||||
56 | ], | ||||
24 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 57 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
n | 25 | "identifier": "https://doi.org/10.20350/digitalCSIC/15254", | n | 58 | "identifier": "http://hdl.handle.net/10261/307617", |
59 | "international_spatial_translated": { | ||||
60 | "en": "", | ||||
61 | "es": "" | ||||
62 | }, | ||||
26 | "isopen": false, | 63 | "isopen": false, | ||
27 | "issued_date": "2023-04-27T00:00:00", | 64 | "issued_date": "2023-04-27T00:00:00", | ||
28 | "language": [ | 65 | "language": [ | ||
29 | "es", | 66 | "es", | ||
30 | "en" | 67 | "en" | ||
31 | ], | 68 | ], | ||
32 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 69 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
33 | "license_title": | 70 | "license_title": | ||
34 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 71 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
35 | "maintainer": null, | 72 | "maintainer": null, | ||
36 | "maintainer_email": null, | 73 | "maintainer_email": null, | ||
37 | "metadata_created": "2024-05-30T14:49:10.062340", | 74 | "metadata_created": "2024-05-30T14:49:10.062340", | ||
n | 38 | "metadata_modified": "2024-05-30T14:49:42.462276", | n | 75 | "metadata_modified": "2025-03-20T10:01:05.954957", |
39 | "multilingual_tags": { | 76 | "multilingual_tags": { | ||
40 | "en": [ | 77 | "en": [ | ||
41 | "Cybersecurity", | 78 | "Cybersecurity", | ||
42 | "Privacy", | 79 | "Privacy", | ||
43 | "Cryptography", | 80 | "Cryptography", | ||
44 | "Spain" | 81 | "Spain" | ||
45 | ], | 82 | ], | ||
46 | "es": [ | 83 | "es": [ | ||
47 | "Ciberseguridad", | 84 | "Ciberseguridad", | ||
48 | "Privacidad", | 85 | "Privacidad", | ||
49 | "Criptograf\u00eda", | 86 | "Criptograf\u00eda", | ||
50 | "Espa\u00f1a" | 87 | "Espa\u00f1a" | ||
51 | ] | 88 | ] | ||
52 | }, | 89 | }, | ||
53 | "name": | 90 | "name": | ||
54 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | 91 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | ||
55 | "notes": null, | 92 | "notes": null, | ||
56 | "num_resources": 2, | 93 | "num_resources": 2, | ||
57 | "num_tags": 0, | 94 | "num_tags": 0, | ||
58 | "organization": { | 95 | "organization": { | ||
59 | "approval_status": "approved", | 96 | "approval_status": "approved", | ||
60 | "created": "2023-09-21T07:20:55.247107", | 97 | "created": "2023-09-21T07:20:55.247107", | ||
61 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | 98 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | ||
62 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | 99 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | ||
63 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | 100 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | ||
64 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | 101 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | ||
65 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | 102 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | ||
66 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | 103 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | ||
67 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | 104 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | ||
68 | \u00e1mbitos cubiertos por la historia del pensamiento, la | 105 | \u00e1mbitos cubiertos por la historia del pensamiento, la | ||
69 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | 106 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | ||
70 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | 107 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | ||
71 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | 108 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | ||
72 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | 109 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | ||
73 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | 110 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | ||
74 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | 111 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | ||
75 | teor\u00eda feminista y los estudios de g\u00e9nero, la | 112 | teor\u00eda feminista y los estudios de g\u00e9nero, la | ||
76 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | 113 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | ||
77 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | 114 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | ||
78 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | 115 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | ||
79 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | 116 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
80 | "image_url": "2023-09-21-052055.241808ifs1.png", | 117 | "image_url": "2023-09-21-052055.241808ifs1.png", | ||
81 | "is_organization": true, | 118 | "is_organization": true, | ||
82 | "name": "instituto-de-filosofia-ifs-csic", | 119 | "name": "instituto-de-filosofia-ifs-csic", | ||
83 | "state": "active", | 120 | "state": "active", | ||
84 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | 121 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | ||
85 | "type": "organization" | 122 | "type": "organization" | ||
86 | }, | 123 | }, | ||
87 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | 124 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
88 | "private": false, | 125 | "private": false, | ||
n | 89 | "publisher": "bcfdcf9e-5535-449f-b619-4a370337492e", | n | 126 | "proyecto": {}, |
127 | "publisher": "b627d71d-2315-4e75-afc9-897da84459f0", | ||||
90 | "reference": [ | 128 | "reference": [ | ||
91 | 129 | ||||
92 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 130 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
93 | ], | 131 | ], | ||
94 | "relationships_as_object": [], | 132 | "relationships_as_object": [], | ||
95 | "relationships_as_subject": [], | 133 | "relationships_as_subject": [], | ||
96 | "resources": [ | 134 | "resources": [ | ||
97 | { | 135 | { | ||
98 | "byte_size": "171,82 kB", | 136 | "byte_size": "171,82 kB", | ||
99 | "cache_last_updated": null, | 137 | "cache_last_updated": null, | ||
100 | "cache_url": null, | 138 | "cache_url": null, | ||
101 | "created": "2024-05-30T14:49:26.351102", | 139 | "created": "2024-05-30T14:49:26.351102", | ||
102 | "datastore_active": false, | 140 | "datastore_active": false, | ||
103 | "description": null, | 141 | "description": null, | ||
104 | "format": "csv", | 142 | "format": "csv", | ||
105 | "hash": "", | 143 | "hash": "", | ||
106 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | 144 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | ||
107 | "last_modified": null, | 145 | "last_modified": null, | ||
108 | "metadata_modified": "2024-05-30T14:49:42.357854", | 146 | "metadata_modified": "2024-05-30T14:49:42.357854", | ||
109 | "mimetype": "text/csv", | 147 | "mimetype": "text/csv", | ||
110 | "mimetype_inner": null, | 148 | "mimetype_inner": null, | ||
111 | "name": "ciberseguridad.csv", | 149 | "name": "ciberseguridad.csv", | ||
112 | "name_translated": { | 150 | "name_translated": { | ||
113 | "en": "ciberseguridad.csv", | 151 | "en": "ciberseguridad.csv", | ||
114 | "es": "ciberseguridad.csv" | 152 | "es": "ciberseguridad.csv" | ||
115 | }, | 153 | }, | ||
116 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 154 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
117 | "position": 0, | 155 | "position": 0, | ||
118 | "resource_identifier": "", | 156 | "resource_identifier": "", | ||
119 | "resource_relation": [], | 157 | "resource_relation": [], | ||
120 | "resource_relation-1": "", | 158 | "resource_relation-1": "", | ||
121 | "resource_type": null, | 159 | "resource_type": null, | ||
122 | "size": null, | 160 | "size": null, | ||
123 | "state": "active", | 161 | "state": "active", | ||
124 | "url": | 162 | "url": | ||
125 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | 163 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | ||
126 | "url_type": null | 164 | "url_type": null | ||
127 | }, | 165 | }, | ||
128 | { | 166 | { | ||
129 | "byte_size": "3,94 kB", | 167 | "byte_size": "3,94 kB", | ||
130 | "cache_last_updated": null, | 168 | "cache_last_updated": null, | ||
131 | "cache_url": null, | 169 | "cache_url": null, | ||
132 | "created": "2024-05-30T14:49:42.359953", | 170 | "created": "2024-05-30T14:49:42.359953", | ||
133 | "datastore_active": false, | 171 | "datastore_active": false, | ||
134 | "description": null, | 172 | "description": null, | ||
135 | "format": "txt", | 173 | "format": "txt", | ||
136 | "hash": "", | 174 | "hash": "", | ||
137 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | 175 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | ||
138 | "last_modified": null, | 176 | "last_modified": null, | ||
139 | "metadata_modified": "2024-05-30T14:49:42.464468", | 177 | "metadata_modified": "2024-05-30T14:49:42.464468", | ||
140 | "mimetype": "text/plain", | 178 | "mimetype": "text/plain", | ||
141 | "mimetype_inner": null, | 179 | "mimetype_inner": null, | ||
142 | "name": "Readme_BDD_ciberseguridad.txt", | 180 | "name": "Readme_BDD_ciberseguridad.txt", | ||
143 | "name_translated": { | 181 | "name_translated": { | ||
144 | "en": "Readme_BDD_ciberseguridad.txt", | 182 | "en": "Readme_BDD_ciberseguridad.txt", | ||
145 | "es": "Readme_BDD_ciberseguridad.txt" | 183 | "es": "Readme_BDD_ciberseguridad.txt" | ||
146 | }, | 184 | }, | ||
147 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 185 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
148 | "position": 1, | 186 | "position": 1, | ||
149 | "resource_identifier": "", | 187 | "resource_identifier": "", | ||
150 | "resource_relation": [], | 188 | "resource_relation": [], | ||
151 | "resource_relation-1": "", | 189 | "resource_relation-1": "", | ||
152 | "resource_type": null, | 190 | "resource_type": null, | ||
153 | "size": null, | 191 | "size": null, | ||
154 | "state": "active", | 192 | "state": "active", | ||
155 | "url": | 193 | "url": | ||
156 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | 194 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | ||
157 | "url_type": null | 195 | "url_type": null | ||
158 | } | 196 | } | ||
159 | ], | 197 | ], | ||
160 | "spatial": [ | 198 | "spatial": [ | ||
161 | 199 | ||||
162 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | 200 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | ||
163 | ], | 201 | ], | ||
164 | "state": "active", | 202 | "state": "active", | ||
165 | "tags": [], | 203 | "tags": [], | ||
166 | "theme": [ | 204 | "theme": [ | ||
167 | 205 | ||||
168 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | 206 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | ||
n | 169 | "http://datos.gob.es/kos/sector-publico/sector/cultura-ocio", | n | ||
170 | "http://datos.gob.es/kos/sector-publico/sector/demografia", | ||||
171 | "http://datos.gob.es/kos/sector-publico/sector/educacion", | 207 | "http://datos.gob.es/kos/sector-publico/sector/seguridad" | ||
172 | "http://datos.gob.es/kos/sector-publico/sector/sector-publico" | ||||
173 | ], | 208 | ], | ||
174 | "title": "Base de datos de expertos/as en ciberseguridad en | 209 | "title": "Base de datos de expertos/as en ciberseguridad en | ||
n | 175 | Espa\u00f1a / Dataset of cybersecurity experts in Spain", | n | 210 | Espa\u00f1a", |
176 | "title_translated": { | 211 | "title_translated": { | ||
177 | "en": "Dataset of cybersecurity experts in Spain", | 212 | "en": "Dataset of cybersecurity experts in Spain", | ||
178 | "es": "Base de datos de expertos/as en ciberseguridad en | 213 | "es": "Base de datos de expertos/as en ciberseguridad en | ||
t | 179 | Espa\u00f1a / Dataset of cybersecurity experts in Spain" | t | 214 | Espa\u00f1a" |
180 | }, | 215 | }, | ||
181 | "type": "dataset", | 216 | "type": "dataset", | ||
182 | "url": null, | 217 | "url": null, | ||
183 | "version": null | 218 | "version": null | ||
184 | } | 219 | } |