Contributions
[ AI/Question: Q22-1/1 ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 186 ]
|
Status of Cybersecurity Capacity Building Papers in ITU-D Q22-1/1
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-08-24 |
|
[ 179 ]
|
Amendment of the ICT Network Act of Korea to Reinforce Personal Information Protection System on the Internet
|
Korea (Republic of)
|
Q22-1/1
|
2012-08-10 |
|
[ 174 ]
|
Questionnaire on raising awareness on Cybersecurity
|
Oman (Sultanate of)
|
Q22-1/1
|
2012-08-05 |
|
[ 169 ]
|
National information security programme overview: Current status
|
Rwanda (Republic of)
|
Q22-1/1
|
2012-08-01 |
|
[ 157 ]
+Ann.1 |
System for restricting access to inappropriate Internet content for educational establishments
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q22-1/1
|
2012-07-09 |
|
[ 155 ]
|
Experience of Côte d'Ivoire in regard to cybercrime
|
Côte d'Ivoire (Republic of)
|
Q22-1/1
|
2012-07-10 |
|
[ 150 ]
|
Compendium on cybersecurity country case studies
|
Mali (Republic of)
|
Q22-1/1
|
2012-07-06 |
|
[ 149 ]
|
Current Status of Mongolia's Cyber Security Policies & Efforts
|
Mongolia
|
Q22-1/1
|
2012-07-09 |
|
[ 148 ]
|
The Senegalese legal framework and cybersecurity
|
Senegal (Republic of)
|
Q22-1/1
|
2012-03-29 |
|
[ 147 ]
|
Bring your own device (BYOD): opportunity or risk?
|
THALES Communications
|
Q22-1/1
|
2012-07-05 |
|
[ 131 ]
|
Report of the Rapporteur Group Meeting on Question 22-1/1, Geneva, 20 April 2012
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-06-04 |
|
[ 119 ]
+Ann.1-2 |
Some Key BDT Cybersecurity Activities Relevant to the Work of Q22-1/1
|
BDT Focal Point for Question 22-1/1
|
Q22-1/1
|
2011-08-30 |
|
[ 116 ]
+Ann.1 |
Cloud Computing and Security High Level Overview
|
AT&T, Inc.
|
Q22-1/1
|
2011-08-29 |
|
[ 114 ]
+Ann.1 |
Revised National Cybersecurity Management System Framework - Maturity Model Implementation Guide, further proposed edits
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-08-29 |
|
[ 113 ]
+Ann.1 |
Revised National Cybersecurity Management System: Framework - Maturity Model Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2011-08-29 |
|
[ 107 ]
|
Real Name Registration Introduced in Mobile Communication
|
China (People's Republic of)
|
Q22-1/1, Q18-2/1
|
2011-08-24 |
|
[ 102 ]
|
National Cybersecurity Management System Framework - Maturity Model Implementation Guide
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 101 ]
+Ann.1 |
Outline of a proposed course on Building a National Computer Security Incident Management Capability and Managing a National Computer Security Incident Response Team with Critical Success Factors
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 100 ]
+Ann.1 |
Best Practices for Cybersecurity: Public-Private Partnerships
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 93 ]
|
Tentacles Project - a New Way to Combat Cybercrimes
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2011-08-19 |
|
[ 75 ]
|
Overview of cybercrime targeting persons with disabilities and other vulnerable persons
|
VIABLE France (France)
|
Q22-1/1, Q20-1/1
|
2011-07-28 |
|
[ 69 ]
|
Overview of cybercrime targeting persons with disabilities
|
Mali (Republic of)
|
Q22-1/1
|
2011-07-11 |
|
[ 58 ]
|
Report of the Rapporteur's Group Meeting on Question 22-1/1, Geneva, 5-6 May 2011
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-06-08 |
|
[ 45 ]
+Ann.1 |
National cybersecurity management system: Framework - Maturity Model - Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2010-11-03 |
|
[ 38 ]
|
Draft Work Programme for Question 22-1/1
|
Rapporteur for Question 22-1/1
|
WP, Q22-1/1
|
2010-09-20 |
|
[ 26 ]
|
Sharing best-practices and creating a framework against information overload
|
Türk Telekom Group
|
Q22-1/1
|
2010-09-13 |
|
[ 24 ]
+Ann.1 |
Cybersecurity Capacity Building
|
United States of America
|
Q22-1/1
|
2010-09-13 |
|
[ 23 ]
|
Contribution from the Rapporteur for Question 22-1/1 (National Cybersecurity)
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2010-09-13 |
|
[ 21 ]
|
Proposed Draft Outline for a potential survey on best practices for service providers and consumers
|
Rapporteur and Vice-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2010-09-13 |
|
[ 20 ]
|
Liaison Statement from ITU-T Study Group 17 (Geneva, 7-16 April 2010) to ITU-D Study Group 1 Question 22-1/1: Cybersecurity information exchange framework
|
Telecommunication Standardization Bureau
|
Q22-1/1, LS
|
2010-09-13 |
|
[ 19 ]
|
Background document for Question 22-1/1: Securing information and communication networks - Best practices for developing culture of cybersecurity
|
BDT Focal Point for Question 22-1/1
|
Q22-1/1
|
2010-09-13 |
Results:56 total items. Result page:
-
1 -
2
-
|
Multiple Document Download: Formats and Languages to be included (when available):