{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:41:17Z","timestamp":1743025277246,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_40","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"402-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Challenges and Competences in Master Degrees from a Comprehensive Security Perspective"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1126-1068","authenticated-orcid":false,"given":"Javier","family":"Espinosa Garc\u00eda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6980-2683","authenticated-orcid":false,"given":"Luis Hern\u00e1ndez","family":"Encinas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1183-736X","authenticated-orcid":false,"given":"Alberto Peinado","family":"Dom\u00ednguez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"40_CR1","unstructured":"Data Never Sleeps 8.0: https:\/\/www.domo.com\/learn\/data-never-sleeps-8. Accessed 18 May 2021"},{"key":"40_CR2","unstructured":"World Economic Forum: The global risks report 2021. http:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2021.pdf. Accessed 18 May 2021"},{"key":"40_CR3","unstructured":"Kledt, F., Evers, P., Benson, D.: Section II.2 - Organizational Complexity. In: Contemporary Theory and Practice of Organizations. Part I. Understanding the Organization. Ibidem-Verlag, Stuttgart, pp. 95\u2013116 (2016). https:\/\/cup.columbia.edu\/book\/contemporary-theory-and-practice-of-organizations\/9783838267470"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Rahman, S.M., Donahue, S.E.: Convergence of corporate and information security. Int. J. Comput. Sci. Inform. Sec. 7(1), 63\u201368 (2010). https:\/\/arxiv.org\/abs\/1002.1950v1","DOI":"10.2298\/CSIS1001063S"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Cabric, M.: From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics. Butterworth-Heinemann, Boston (2017). https:\/\/www.sciencedirect.com\/book\/9780128051498\/from-corporate-security-to-commercial-force","DOI":"10.1016\/B978-0-12-805149-8.00002-9"},{"key":"40_CR6","doi-asserted-by":"publisher","unstructured":"Cabric, M.: Corporate Security Management. Challenges, Risks, and Strategies. Butterworth-Heinemann, Boston (2015). https:\/\/doi.org\/10.1016\/C2014-0-04011-7","DOI":"10.1016\/C2014-0-04011-7"},{"key":"40_CR7","doi-asserted-by":"publisher","unstructured":"Kinslow, J.: Physical and IT security: the case for convergence. J. Sec. Educ. 75\u201391 (2006). https:\/\/doi.org\/10.1300\/j460v02n01_06","DOI":"10.1300\/j460v02n01_06"},{"key":"40_CR8","unstructured":"Jovanovic, M., Burbiel, J.: The evolving concept of security: a critical evaluation across four dimensions. In: Proceedings of the 9th Security Research Conference Future Security, pp. 502\u2013506 (2014). https:\/\/www.researchgate.net\/publication\/278033393_THE_EVOLVING_CONCEPT_OF_SECURITY_A_CRITICAL_EVALUATION_ACROSS_FOUR_DIMENSIONS"},{"key":"40_CR9","doi-asserted-by":"publisher","unstructured":"Purpura, P.P.: Security: An Introduction. CRC Press, Boca Raton (2016). https:\/\/doi.org\/10.1201\/9781439894569","DOI":"10.1201\/9781439894569"},{"key":"40_CR10","unstructured":"Halibozek, E.P., Kovacich, G.L.: The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, 2nd edn. Butterworth-Heinemann, Boston (2017). https:\/\/www.sciencedirect.com\/book\/9780128046043\/the-managers-handbook-for-corporate-security\\#book-info"},{"key":"40_CR11","doi-asserted-by":"publisher","unstructured":"Stackpole, B., Oksendahl, E.: Security Strategy: From Requirements to Reality. Auerbach Publications, New York (2010). https:\/\/doi.org\/10.1201\/EBK1439827338","DOI":"10.1201\/EBK1439827338"},{"key":"40_CR12","unstructured":"Masters Programs in Cybersecurity: https:\/\/www.masterstudies.com\/Masters-Degree\/Cyber-Security\/. Accessed 18 May 2021"},{"key":"40_CR13","unstructured":"Masters Programs in Security: https:\/\/www.masterstudies.com\/Masters-Degree\/Security\/. Accessed 18 May 2021"},{"key":"40_CR14","unstructured":"Masters Programs in Safety Management: https:\/\/www.masterstudies.com\/Masters-Degree\/Safety-Management\/. Accessed 18 May 2021"},{"key":"40_CR15","unstructured":"ANECA, Listado de titulaciones: https:\/\/srv.aneca.es\/ListadoTitulos\/busqueda-titulaciones. Accessed 7 Jun 2021"},{"key":"40_CR16","unstructured":"ISACA\u2019s Certified Information Security Manager \u2013 CISM. https:\/\/www.isaca.org\/credentialing\/cism. Accessed 18 May 2021"},{"key":"40_CR17","unstructured":"ISC2\u2019s Certified Information Systems Security Professional \u2013 CISSP: https:\/\/www.isc2.org\/Certifications\/CISSP. Accessed 18 May 2021"},{"key":"40_CR18","unstructured":"Gartner\u2019s Top 10 Security Predictions 2016: https:\/\/www.gartner.com\/smarterwithgartner\/top-10-security-predictions-2016\/. Accessed 18 May 2021"},{"key":"40_CR19","unstructured":"Microsoft Corporation, Accenture LLP: Future of physical security whitepaper-Extending converged digital capabilities across logical & physical environments, 2018. https:\/\/www.accenture.com\/_acnmedia\/PDF-100\/Accenture-Future-of-Physical-Security-Whitepaper.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:06:47Z","timestamp":1642835207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}