Cambios
En el instante 30 de mayo de 2024, 14:49:26 UTC,

-
Añadido recurso ciberseguridad.csv a Base de datos de expertos/as en ciberseguridad en España / Dataset of cybersecurity experts in Spain
f | 1 | { | f | 1 | { |
2 | "author": null, | 2 | "author": null, | ||
3 | "author_email": null, | 3 | "author_email": null, | ||
4 | "conforms_to": [], | 4 | "conforms_to": [], | ||
5 | "coverage_new": {}, | 5 | "coverage_new": {}, | ||
6 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | 6 | "creator_user_id": "196556b3-e0c4-4c51-a9e6-f51cc752bc37", | ||
7 | "description": { | 7 | "description": { | ||
8 | "en": "Here we publish the database of cybersecurity experts whose | 8 | "en": "Here we publish the database of cybersecurity experts whose | ||
9 | scientific results are discussed in the chapter \"Cybersecurity | 9 | scientific results are discussed in the chapter \"Cybersecurity | ||
10 | research in Spain\" part of the Report on Science and Technology in | 10 | research in Spain\" part of the Report on Science and Technology in | ||
11 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | 11 | Spain 2023 published by Fundaci\u00f3n Alternativa on the 1st of June | ||
12 | 2023. URL: | 12 | 2023. URL: | ||
13 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | 13 | rg/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/", | ||
14 | "es": "Se publica en este repositorio de acceso abierto la base de | 14 | "es": "Se publica en este repositorio de acceso abierto la base de | ||
15 | datos de expertas y expertos en ciberseguridad cuyos resultados | 15 | datos de expertas y expertos en ciberseguridad cuyos resultados | ||
16 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | 16 | cient\u00edficos se utilizan en los an\u00e1lisis que se discuten en | ||
17 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | 17 | el cap\u00edtulo \u201cLa investigaci\u00f3n en ciberseguridad en | ||
18 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | 18 | Espa\u00f1a\u201d parte del Informe sobre la Ciencia y la | ||
19 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | 19 | Tecnolog\u00eda en Espa\u00f1a 2023 publicado por la Fundaci\u00f3n | ||
20 | Alternativa el 1 de junio de 2023. URL: | 20 | Alternativa el 1 de junio de 2023. URL: | ||
21 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 21 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
22 | }, | 22 | }, | ||
23 | "groups": [], | 23 | "groups": [], | ||
24 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | 24 | "id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||
25 | "identifier": "https://doi.org/10.20350/digitalCSIC/15254", | 25 | "identifier": "https://doi.org/10.20350/digitalCSIC/15254", | ||
26 | "isopen": false, | 26 | "isopen": false, | ||
27 | "issued_date": "2023-04-27T00:00:00", | 27 | "issued_date": "2023-04-27T00:00:00", | ||
28 | "language": [ | 28 | "language": [ | ||
29 | "es", | 29 | "es", | ||
30 | "en" | 30 | "en" | ||
31 | ], | 31 | ], | ||
32 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 32 | "license_id": "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
33 | "license_title": | 33 | "license_title": | ||
34 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | 34 | "https://creativecommons.org/licenses/by-nc-sa/4.0/", | ||
35 | "maintainer": null, | 35 | "maintainer": null, | ||
36 | "maintainer_email": null, | 36 | "maintainer_email": null, | ||
37 | "metadata_created": "2024-05-30T14:49:10.062340", | 37 | "metadata_created": "2024-05-30T14:49:10.062340", | ||
n | 38 | "metadata_modified": "2024-05-30T14:49:10.062343", | n | 38 | "metadata_modified": "2024-05-30T14:49:26.347137", |
39 | "multilingual_tags": { | 39 | "multilingual_tags": { | ||
40 | "en": [ | 40 | "en": [ | ||
41 | "Cybersecurity", | 41 | "Cybersecurity", | ||
42 | "Privacy", | 42 | "Privacy", | ||
43 | "Cryptography", | 43 | "Cryptography", | ||
44 | "Spain" | 44 | "Spain" | ||
45 | ], | 45 | ], | ||
46 | "es": [ | 46 | "es": [ | ||
47 | "Ciberseguridad", | 47 | "Ciberseguridad", | ||
48 | "Privacidad", | 48 | "Privacidad", | ||
49 | "Criptograf\u00eda", | 49 | "Criptograf\u00eda", | ||
50 | "Espa\u00f1a" | 50 | "Espa\u00f1a" | ||
51 | ] | 51 | ] | ||
52 | }, | 52 | }, | ||
53 | "name": | 53 | "name": | ||
54 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | 54 | s-en-ciberseguridad-en-espana-dataset-of-cybersecurity-experts-in-sp", | ||
55 | "notes": null, | 55 | "notes": null, | ||
n | 56 | "num_resources": 0, | n | 56 | "num_resources": 1, |
57 | "num_tags": 0, | 57 | "num_tags": 0, | ||
58 | "organization": { | 58 | "organization": { | ||
59 | "approval_status": "approved", | 59 | "approval_status": "approved", | ||
60 | "created": "2023-09-21T07:20:55.247107", | 60 | "created": "2023-09-21T07:20:55.247107", | ||
61 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | 61 | "description": "El Instituto de Filosof\u00eda del CSIC (IFS-CSIC) | ||
62 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | 62 | se cre\u00f3 en 1986 con una clara vocaci\u00f3n multidisciplinar, al | ||
63 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | 63 | no serle ajeno nada de cuanto tenga que ver con la teor\u00eda y la | ||
64 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | 64 | pr\u00e1ctica, las cuestiones \u00e9ticas o cualquier | ||
65 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | 65 | problem\u00e1tica de \u00edndole social o cient\u00edfica. Resulta | ||
66 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | 66 | dif\u00edcil enumerar los n\u00facleos tem\u00e1ticos atendidos por la | ||
67 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | 67 | interdisciplinariedad propia del abordaje filos\u00f3fico. Junto a los | ||
68 | \u00e1mbitos cubiertos por la historia del pensamiento, la | 68 | \u00e1mbitos cubiertos por la historia del pensamiento, la | ||
69 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | 69 | filosof\u00eda de la ciencia, la \u00e9tica, la filosof\u00eda social | ||
70 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | 70 | y pol\u00edtica, la filosof\u00eda de la cultura, la teor\u00eda del | ||
71 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | 71 | conocimiento, la filosof\u00eda del derecho, la filosof\u00eda de la | ||
72 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | 72 | historia, la filosof\u00eda del lenguaje, la filosof\u00eda de la | ||
73 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | 73 | literatura o la filosof\u00eda de la religi\u00f3n, tendr\u00edamos | ||
74 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | 74 | tambi\u00e9n cuanto ata\u00f1e a las \u00e9ticas aplicadas, la | ||
75 | teor\u00eda feminista y los estudios de g\u00e9nero, la | 75 | teor\u00eda feminista y los estudios de g\u00e9nero, la | ||
76 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | 76 | fenomenolog\u00eda, los estudios de ciencia, tecnolog\u00eda y | ||
77 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | 77 | sociedad o el an\u00e1lisis, evaluaci\u00f3n, prospectiva y | ||
78 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | 78 | transferencia cient\u00edficas.\r\nIFS (https://ifs.csic.es/es)", | ||
79 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | 79 | "id": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
80 | "image_url": "2023-09-21-052055.241808ifs1.png", | 80 | "image_url": "2023-09-21-052055.241808ifs1.png", | ||
81 | "is_organization": true, | 81 | "is_organization": true, | ||
82 | "name": "instituto-de-filosofia-ifs-csic", | 82 | "name": "instituto-de-filosofia-ifs-csic", | ||
83 | "state": "active", | 83 | "state": "active", | ||
84 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | 84 | "title": "Instituto de Filosof\u00eda (IFS), CSIC", | ||
85 | "type": "organization" | 85 | "type": "organization" | ||
86 | }, | 86 | }, | ||
87 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | 87 | "owner_org": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
88 | "private": false, | 88 | "private": false, | ||
89 | "publisher": "bcfdcf9e-5535-449f-b619-4a370337492e", | 89 | "publisher": "bcfdcf9e-5535-449f-b619-4a370337492e", | ||
90 | "reference": [ | 90 | "reference": [ | ||
91 | 91 | ||||
92 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | 92 | org/publicaciones/informe-sobre-la-ciencia-y-la-tecnologia-en-espana/" | ||
93 | ], | 93 | ], | ||
94 | "relationships_as_object": [], | 94 | "relationships_as_object": [], | ||
95 | "relationships_as_subject": [], | 95 | "relationships_as_subject": [], | ||
t | 96 | "resources": [], | t | 96 | "resources": [ |
97 | { | ||||
98 | "byte_size": "171,82 kB", | ||||
99 | "cache_last_updated": null, | ||||
100 | "cache_url": null, | ||||
101 | "created": "2024-05-30T14:49:26.351102", | ||||
102 | "datastore_active": false, | ||||
103 | "description": null, | ||||
104 | "format": "csv", | ||||
105 | "hash": "", | ||||
106 | "id": "7ad3f407-f921-49be-bd54-483497dc5cce", | ||||
107 | "last_modified": null, | ||||
108 | "metadata_modified": "2024-05-30T14:49:26.349213", | ||||
109 | "mimetype": "text/csv", | ||||
110 | "mimetype_inner": null, | ||||
111 | "name": "ciberseguridad.csv", | ||||
112 | "name_translated": { | ||||
113 | "en": "ciberseguridad.csv", | ||||
114 | "es": "ciberseguridad.csv" | ||||
115 | }, | ||||
116 | "package_id": "6b1dacd5-4d5b-4e46-b248-a73848dc9915", | ||||
117 | "position": 0, | ||||
118 | "resource_identifier": "", | ||||
119 | "resource_relation": [], | ||||
120 | "resource_relation-1": "", | ||||
121 | "resource_type": null, | ||||
122 | "size": null, | ||||
123 | "state": "active", | ||||
124 | "url": | ||||
125 | "https://digital.csic.es/bitstream/10261/307617/1/ciberseguridad.csv", | ||||
126 | "url_type": null | ||||
127 | } | ||||
128 | ], | ||||
97 | "spatial": [ | 129 | "spatial": [ | ||
98 | 130 | ||||
99 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | 131 | ttp://datos.gob.es/recurso/sector-publico/territorio/Pais/Espa\u00f1a" | ||
100 | ], | 132 | ], | ||
101 | "state": "draft", | 133 | "state": "draft", | ||
102 | "tags": [], | 134 | "tags": [], | ||
103 | "theme": [ | 135 | "theme": [ | ||
104 | 136 | ||||
105 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | 137 | "http://datos.gob.es/kos/sector-publico/sector/ciencia-tecnologia", | ||
106 | "http://datos.gob.es/kos/sector-publico/sector/cultura-ocio", | 138 | "http://datos.gob.es/kos/sector-publico/sector/cultura-ocio", | ||
107 | "http://datos.gob.es/kos/sector-publico/sector/demografia", | 139 | "http://datos.gob.es/kos/sector-publico/sector/demografia", | ||
108 | "http://datos.gob.es/kos/sector-publico/sector/educacion", | 140 | "http://datos.gob.es/kos/sector-publico/sector/educacion", | ||
109 | "http://datos.gob.es/kos/sector-publico/sector/sector-publico" | 141 | "http://datos.gob.es/kos/sector-publico/sector/sector-publico" | ||
110 | ], | 142 | ], | ||
111 | "title": "Base de datos de expertos/as en ciberseguridad en | 143 | "title": "Base de datos de expertos/as en ciberseguridad en | ||
112 | Espa\u00f1a / Dataset of cybersecurity experts in Spain", | 144 | Espa\u00f1a / Dataset of cybersecurity experts in Spain", | ||
113 | "title_translated": { | 145 | "title_translated": { | ||
114 | "en": "Dataset of cybersecurity experts in Spain", | 146 | "en": "Dataset of cybersecurity experts in Spain", | ||
115 | "es": "Base de datos de expertos/as en ciberseguridad en | 147 | "es": "Base de datos de expertos/as en ciberseguridad en | ||
116 | Espa\u00f1a / Dataset of cybersecurity experts in Spain" | 148 | Espa\u00f1a / Dataset of cybersecurity experts in Spain" | ||
117 | }, | 149 | }, | ||
118 | "type": "dataset", | 150 | "type": "dataset", | ||
119 | "url": null, | 151 | "url": null, | ||
120 | "version": null | 152 | "version": null | ||
121 | } | 153 | } |