["item",{"itemId":"690","public":"1","featured":"1","xmlns:xsi":"http://www.w3.org/2001/XMLSchema-instance","xsi:schemaLocation":"http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd","uri":"https://bvhumanidades.usac.edu.gt/items/show/690?output=omeka-json","accessDate":"2026-04-16T18:05:23-05:00"},["fileContainer",["file",{"fileId":"628"},["src","https://bvhumanidades.usac.edu.gt/files/original/6b9543b5f23ce7df6bd5aa65be1be696.pdf"],["authentication","002440826adc505f0dea1eef7055d76e"]]],["collection",{"collectionId":"3"},["elementSetContainer",["elementSet",{"elementSetId":"1"},["name","Dublin Core"],["description","The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/."],["elementContainer",["element",{"elementId":"50"},["name","Title"],["description","A name given to the resource"],["elementTextContainer",["elementText",{"elementTextId":"883"},["text","BIBLIOTECOLOGÍA"]]]]]]]],["itemType",{"itemTypeId":"1"},["name","Text"],["description","A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text."]],["elementSetContainer",["elementSet",{"elementSetId":"1"},["name","Dublin Core"],["description","The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/."],["elementContainer",["element",{"elementId":"50"},["name","Title"],["description","A name given to the resource"],["elementTextContainer",["elementText",{"elementTextId":"3449"},["text","Calidad y seguridad de la información y Auditoría Informática"]]]],["element",{"elementId":"43"},["name","Identifier"],["description","An unambiguous reference to the resource within a given context"],["elementTextContainer",["elementText",{"elementTextId":"3450"},["text","http://e-archivo.uc3m.es/bitstream/handle/10016/8510/proyectoEsmeralda.pdf?sequence=1 "]]]],["element",{"elementId":"41"},["name","Description"],["description","An account of the resource"],["elementTextContainer",["elementText",{"elementTextId":"3451"},["text","Cada día son más las empresas que perciben su información como el motor del negocio que es, un activo estratégico que diariamente es sometido a nuevos y más graves riesgos imposibilitando que de manera efectiva, la información aporte el valor que tiene, siendo necesario vencer la inseguridad y la desconfianza que esto genera. Virus, hackers, averías, incendios, personal descontento, errores humanos, son miles las amenazas que tienen efectos devastadores. Afrontar estas situaciones, controlando la inseguridad de nuestros sistemas de información dentro de límites aceptables por el negocio sólo es posible mediante la integración de medidas organizativas y técnicas en el marco del desarrollo de una Cultura de la Seguridad y Calidad de la Información en la empresa."]]]],["element",{"elementId":"38"},["name","Coverage"],["description","The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant"],["elementTextContainer",["elementText",{"elementTextId":"3452"},["text","2009-11-23"]]]],["element",{"elementId":"45"},["name","Publisher"],["description","An entity responsible for making the resource available"],["elementTextContainer",["elementText",{"elementTextId":"3453"},["text","Mardid: Universidad Carlos III"]]]]]]],["tagContainer",["tag",{"tagId":"1442"},["name","Antivirus"]],["tag",{"tagId":"1431"},["name","Auditoria informática"]],["tag",{"tagId":"1171"},["name","Calidad"]],["tag",{"tagId":"1432"},["name","Calidad del Software"]],["tag",{"tagId":"1438"},["name","Calidad informática"]],["tag",{"tagId":"1436"},["name","Calidad técnica"]],["tag",{"tagId":"1435"},["name","Conflictos"]],["tag",{"tagId":"1440"},["name","Control de intrusos"]],["tag",{"tagId":"468"},["name","Empresa"]],["tag",{"tagId":"368"},["name","evaluación"]],["tag",{"tagId":"1437"},["name","Evaluación del software"]],["tag",{"tagId":"542"},["name","Información"]],["tag",{"tagId":"1447"},["name","ITIL"]],["tag",{"tagId":"1443"},["name","LOPD"]],["tag",{"tagId":"1444"},["name","Metodología CRMR"]],["tag",{"tagId":"1446"},["name","Norma ISO 20000"]],["tag",{"tagId":"1445"},["name","Norma ISO 27000"]],["tag",{"tagId":"397"},["name","organización"]],["tag",{"tagId":"346"},["name","recursos humanos"]],["tag",{"tagId":"919"},["name","Redes"]],["tag",{"tagId":"1439"},["name","SEG"]],["tag",{"tagId":"1433"},["name","Seguridad de la Información"]],["tag",{"tagId":"1434"},["name","Seguridad informática"]],["tag",{"tagId":"367"},["name","usuarios"]],["tag",{"tagId":"861"},["name","Valor de la información"]],["tag",{"tagId":"1441"},["name","Virus"]]]]