Changes
On April 16, 2025 at 6:37:25 AM UTC,

-
Moved Base de datos de expertos/as en ciberseguridad en España from organization Instituto de Filosofía (IFS), CSIC to organization Agencia Estatal Consejo Superior de Investigaciones Científicas (CSIC)
f | 1 | { | f | 1 | { |
2 | "Observaciones": { | 2 | "Observaciones": { | ||
3 | "en": "Recommended citation: Degli-Esposti, Sara; 2023; Dataset of | 3 | "en": "Recommended citation: Degli-Esposti, Sara; 2023; Dataset of | ||
4 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | 4 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | ||
5 | DOI: https://doi.org/10.20350/digitalCSIC/15254", | 5 | DOI: https://doi.org/10.20350/digitalCSIC/15254", | ||
6 | "es": "Cita recomendada: Degli-Esposti, Sara; 2023; Dataset of | 6 | "es": "Cita recomendada: Degli-Esposti, Sara; 2023; Dataset of | ||
7 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | 7 | cybersecurity experts in Spain. Version: March 2023; DIGITAL.CSIC; | ||
8 | DOI: https://doi.org/10.20350/digitalCSIC/15254" | 8 | DOI: https://doi.org/10.20350/digitalCSIC/15254" | ||
9 | }, | 9 | }, | ||
10 | "author": null, | 10 | "author": null, | ||
11 | "author_email": null, | 11 | "author_email": null, | ||
12 | "autor": {}, | 12 | "autor": {}, | ||
13 | "conforms_to": [], | 13 | "conforms_to": [], | ||
14 | "coverage_new": { | 14 | "coverage_new": { | ||
15 | "1": { | 15 | "1": { | ||
16 | "from": "2023-03-01T00:00:00", | 16 | "from": "2023-03-01T00:00:00", | ||
17 | "to": "2023-03-31T00:00:00" | 17 | "to": "2023-03-31T00:00:00" | ||
18 | } | 18 | } | ||
19 | }, | 19 | }, | ||
20 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | 20 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | ||
21 | "description": { | 21 | "description": { | ||
22 | "en": "Here we publish the database of cybersecurity experts whose | 22 | "en": "Here we publish the database of cybersecurity experts whose | ||
23 | scientific results are discussed in the chapter \"Cybersecurity | 23 | scientific results are discussed in the chapter \"Cybersecurity | ||
24 | research in Spain\" part of the Report on Science and Technology in | 24 | research in Spain\" part of the Report on Science and Technology in | ||
25 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | 25 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | ||
26 | 2023. URL: | 26 | 2023. URL: | ||
27 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | 27 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | ||
28 | "es": "Se publica en este repositorio de acceso abierto la base de | 28 | "es": "Se publica en este repositorio de acceso abierto la base de | ||
29 | datos de expertas y expertos en ciberseguridad cuyos resultados | 29 | datos de expertas y expertos en ciberseguridad cuyos resultados | ||
30 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | 30 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | ||
31 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | 31 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | ||
32 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | 32 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | ||
33 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | 33 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | ||
34 | Alternativa el 1 de junio de 2023. URL: | 34 | Alternativa el 1 de junio de 2023. URL: | ||
35 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 35 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
36 | }, | 36 | }, | ||
37 | "groups": [ | 37 | "groups": [ | ||
38 | { | 38 | { | ||
39 | "description": "", | 39 | "description": "", | ||
40 | "display_name": "Ciberseguridad", | 40 | "display_name": "Ciberseguridad", | ||
41 | "id": "e5bc10b2-5c46-475a-9f05-4bd296bbb706", | 41 | "id": "e5bc10b2-5c46-475a-9f05-4bd296bbb706", | ||
42 | "image_display_url": | 42 | "image_display_url": | ||
43 | chs.csic.es/uploads/group/2024-06-24-141821.576038Ciberseguridad.png", | 43 | chs.csic.es/uploads/group/2024-06-24-141821.576038Ciberseguridad.png", | ||
44 | "name": "ciberseguridad", | 44 | "name": "ciberseguridad", | ||
45 | "title": "Ciberseguridad" | 45 | "title": "Ciberseguridad" | ||
46 | }, | 46 | }, | ||
47 | { | 47 | { | ||
48 | "description": "", | 48 | "description": "", | ||
49 | "display_name": "Documentaci\u00f3n", | 49 | "display_name": "Documentaci\u00f3n", | ||
50 | "id": "3b6f7671-8a98-4ce9-931a-bc059c28a4c3", | 50 | "id": "3b6f7671-8a98-4ce9-931a-bc059c28a4c3", | ||
51 | "image_display_url": | 51 | "image_display_url": | ||
52 | cchs.csic.es/uploads/group/2024-06-24-150638.476492Documentacion.png", | 52 | cchs.csic.es/uploads/group/2024-06-24-150638.476492Documentacion.png", | ||
53 | "name": "documentacion", | 53 | "name": "documentacion", | ||
54 | "title": "Documentaci\u00f3n" | 54 | "title": "Documentaci\u00f3n" | ||
55 | } | 55 | } | ||
56 | ], | 56 | ], | ||
57 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 57 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
58 | "identifier": "http://hdl.handle.net/10261/307617", | 58 | "identifier": "http://hdl.handle.net/10261/307617", | ||
n | n | 59 | "instituto": [ | ||
60 | "Instituto de Filosof\u00eda (IFS), CSIC" | ||||
61 | ], | ||||
59 | "international_spatial_translated": { | 62 | "international_spatial_translated": { | ||
60 | "en": "", | 63 | "en": "", | ||
61 | "es": "" | 64 | "es": "" | ||
62 | }, | 65 | }, | ||
63 | "isopen": false, | 66 | "isopen": false, | ||
64 | "issued_date": "2023-04-27T00:00:00", | 67 | "issued_date": "2023-04-27T00:00:00", | ||
65 | "language": [ | 68 | "language": [ | ||
66 | "es", | 69 | "es", | ||
67 | "en" | 70 | "en" | ||
68 | ], | 71 | ], | ||
69 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 72 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
70 | "license_title": | 73 | "license_title": | ||
71 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 74 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
72 | "maintainer": null, | 75 | "maintainer": null, | ||
73 | "maintainer_email": null, | 76 | "maintainer_email": null, | ||
74 | "metadata_created": "2024-05-30T14:49:10.062340", | 77 | "metadata_created": "2024-05-30T14:49:10.062340", | ||
n | 75 | "metadata_modified": "2025-03-20T10:01:05.954957", | n | 78 | "metadata_modified": "2025-04-16T06:37:24.979874", |
76 | "multilingual_tags": { | 79 | "multilingual_tags": { | ||
77 | "en": [ | 80 | "en": [ | ||
78 | "Cybersecurity", | 81 | "Cybersecurity", | ||
79 | "Privacy", | 82 | "Privacy", | ||
80 | "Cryptography", | 83 | "Cryptography", | ||
81 | "Spain" | 84 | "Spain" | ||
82 | ], | 85 | ], | ||
83 | "es": [ | 86 | "es": [ | ||
84 | "Ciberseguridad", | 87 | "Ciberseguridad", | ||
85 | "Privacidad", | 88 | "Privacidad", | ||
86 | "Criptograf\u00eda", | 89 | "Criptograf\u00eda", | ||
87 | "Espa\u00f1a" | 90 | "Espa\u00f1a" | ||
88 | ] | 91 | ] | ||
89 | }, | 92 | }, | ||
90 | "name": | 93 | "name": | ||
91 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | 94 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | ||
92 | "notes": null, | 95 | "notes": null, | ||
93 | "num_resources": 2, | 96 | "num_resources": 2, | ||
94 | "num_tags": 0, | 97 | "num_tags": 0, | ||
95 | "organization": { | 98 | "organization": { | ||
96 | "approval_status": "approved", | 99 | "approval_status": "approved", | ||
n | 97 | "created": "2023-09-21T07:20:55.247107", | n | 100 | "created": "2025-04-15T15:18:43.186369", |
98 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | 101 | "description": "", | ||
99 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | 102 | "id": "e0fb512f-fa1e-43d9-ba1e-22b1f834702e", | ||
100 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | 103 | "image_url": "2025-04-15-131843.179987csic.png", | ||
101 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | ||||
102 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | ||||
103 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | ||||
104 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | ||||
105 | \u00e1mbitos cubiertos por la historia del pensamiento, la | ||||
106 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | ||||
107 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | ||||
108 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | ||||
109 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | ||||
110 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | ||||
111 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | ||||
112 | teor\u00eda feminista y los estudios de g\u00e9nero, la | ||||
113 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | ||||
114 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | ||||
115 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | ||||
116 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||||
117 | "image_url": "2023-09-21-052055.241808ifs1.png", | ||||
118 | "is_organization": true, | 104 | "is_organization": true, | ||
n | 119 | "name": "instituto-de-filosofia-ifs-csic", | n | 105 | "name": |
106 | agencia-estatal-consejo-superior-de-investigaciones-cientificas-csic", | ||||
120 | "state": "active", | 107 | "state": "active", | ||
n | 121 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | n | 108 | "title": "Agencia Estatal Consejo Superior de Investigaciones |
109 | Cient\u00edficas (CSIC)", | ||||
122 | "type": "organization" | 110 | "type": "organization" | ||
123 | }, | 111 | }, | ||
t | 124 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | t | 112 | "owner_org": "e0fb512f-fa1e-43d9-ba1e-22b1f834702e", |
125 | "private": false, | 113 | "private": false, | ||
126 | "proyecto": {}, | 114 | "proyecto": {}, | ||
127 | "publisher": "b627d71d-2315-4e75-afc9-897da84459f0", | 115 | "publisher": "b627d71d-2315-4e75-afc9-897da84459f0", | ||
128 | "reference": [ | 116 | "reference": [ | ||
129 | 117 | ||||
130 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 118 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
131 | ], | 119 | ], | ||
132 | "relationships_as_object": [], | 120 | "relationships_as_object": [], | ||
133 | "relationships_as_subject": [], | 121 | "relationships_as_subject": [], | ||
134 | "resources": [ | 122 | "resources": [ | ||
135 | { | 123 | { | ||
136 | "byte_size": "171,82 kB", | 124 | "byte_size": "171,82 kB", | ||
137 | "cache_last_updated": null, | 125 | "cache_last_updated": null, | ||
138 | "cache_url": null, | 126 | "cache_url": null, | ||
139 | "created": "2024-05-30T14:49:26.351102", | 127 | "created": "2024-05-30T14:49:26.351102", | ||
140 | "datastore_active": false, | 128 | "datastore_active": false, | ||
141 | "description": null, | 129 | "description": null, | ||
142 | "format": "csv", | 130 | "format": "csv", | ||
143 | "hash": "", | 131 | "hash": "", | ||
144 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | 132 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | ||
145 | "last_modified": null, | 133 | "last_modified": null, | ||
146 | "metadata_modified": "2024-05-30T14:49:42.357854", | 134 | "metadata_modified": "2024-05-30T14:49:42.357854", | ||
147 | "mimetype": "text/csv", | 135 | "mimetype": "text/csv", | ||
148 | "mimetype_inner": null, | 136 | "mimetype_inner": null, | ||
149 | "name": "ciberseguridad.csv", | 137 | "name": "ciberseguridad.csv", | ||
150 | "name_translated": { | 138 | "name_translated": { | ||
151 | "en": "ciberseguridad.csv", | 139 | "en": "ciberseguridad.csv", | ||
152 | "es": "ciberseguridad.csv" | 140 | "es": "ciberseguridad.csv" | ||
153 | }, | 141 | }, | ||
154 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 142 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
155 | "position": 0, | 143 | "position": 0, | ||
156 | "resource_identifier": "", | 144 | "resource_identifier": "", | ||
157 | "resource_relation": [], | 145 | "resource_relation": [], | ||
158 | "resource_relation-1": "", | 146 | "resource_relation-1": "", | ||
159 | "resource_type": null, | 147 | "resource_type": null, | ||
160 | "size": null, | 148 | "size": null, | ||
161 | "state": "active", | 149 | "state": "active", | ||
162 | "url": | 150 | "url": | ||
163 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | 151 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | ||
164 | "url_type": null | 152 | "url_type": null | ||
165 | }, | 153 | }, | ||
166 | { | 154 | { | ||
167 | "byte_size": "3,94 kB", | 155 | "byte_size": "3,94 kB", | ||
168 | "cache_last_updated": null, | 156 | "cache_last_updated": null, | ||
169 | "cache_url": null, | 157 | "cache_url": null, | ||
170 | "created": "2024-05-30T14:49:42.359953", | 158 | "created": "2024-05-30T14:49:42.359953", | ||
171 | "datastore_active": false, | 159 | "datastore_active": false, | ||
172 | "description": null, | 160 | "description": null, | ||
173 | "format": "txt", | 161 | "format": "txt", | ||
174 | "hash": "", | 162 | "hash": "", | ||
175 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | 163 | "id": "5d887307-99d3-4d25-a1c0-8f205508a6b3", | ||
176 | "last_modified": null, | 164 | "last_modified": null, | ||
177 | "metadata_modified": "2024-05-30T14:49:42.464468", | 165 | "metadata_modified": "2024-05-30T14:49:42.464468", | ||
178 | "mimetype": "text/plain", | 166 | "mimetype": "text/plain", | ||
179 | "mimetype_inner": null, | 167 | "mimetype_inner": null, | ||
180 | "name": "Readme_BDD_ciberseguridad.txt", | 168 | "name": "Readme_BDD_ciberseguridad.txt", | ||
181 | "name_translated": { | 169 | "name_translated": { | ||
182 | "en": "Readme_BDD_ciberseguridad.txt", | 170 | "en": "Readme_BDD_ciberseguridad.txt", | ||
183 | "es": "Readme_BDD_ciberseguridad.txt" | 171 | "es": "Readme_BDD_ciberseguridad.txt" | ||
184 | }, | 172 | }, | ||
185 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 173 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
186 | "position": 1, | 174 | "position": 1, | ||
187 | "resource_identifier": "", | 175 | "resource_identifier": "", | ||
188 | "resource_relation": [], | 176 | "resource_relation": [], | ||
189 | "resource_relation-1": "", | 177 | "resource_relation-1": "", | ||
190 | "resource_type": null, | 178 | "resource_type": null, | ||
191 | "size": null, | 179 | "size": null, | ||
192 | "state": "active", | 180 | "state": "active", | ||
193 | "url": | 181 | "url": | ||
194 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | 182 | igital.csic.es/bitstream/10261/307617/3/Reame_BDD_ciberseguridad.txt", | ||
195 | "url_type": null | 183 | "url_type": null | ||
196 | } | 184 | } | ||
197 | ], | 185 | ], | ||
198 | "spatial": [ | 186 | "spatial": [ | ||
199 | 187 | ||||
200 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | 188 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | ||
201 | ], | 189 | ], | ||
202 | "state": "active", | 190 | "state": "active", | ||
203 | "tags": [], | 191 | "tags": [], | ||
204 | "theme": [ | 192 | "theme": [ | ||
205 | 193 | ||||
206 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | 194 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | ||
207 | "http://datos.gob.es/kos/sector-publico/sector/seguridad" | 195 | "http://datos.gob.es/kos/sector-publico/sector/seguridad" | ||
208 | ], | 196 | ], | ||
209 | "title": "Base de datos de expertos/as en ciberseguridad en | 197 | "title": "Base de datos de expertos/as en ciberseguridad en | ||
210 | Espa\u00f1a", | 198 | Espa\u00f1a", | ||
211 | "title_translated": { | 199 | "title_translated": { | ||
212 | "en": "Dataset of cybersecurity experts in Spain", | 200 | "en": "Dataset of cybersecurity experts in Spain", | ||
213 | "es": "Base de datos de expertos/as en ciberseguridad en | 201 | "es": "Base de datos de expertos/as en ciberseguridad en | ||
214 | Espa\u00f1a" | 202 | Espa\u00f1a" | ||
215 | }, | 203 | }, | ||
216 | "type": "dataset", | 204 | "type": "dataset", | ||
217 | "url": null, | 205 | "url": null, | ||
218 | "version": null | 206 | "version": null | ||
219 | } | 207 | } |