Contributions
[ AI/Question: Q22-1/1 ]  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 300 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T JCA-COP on activities related to child online protection
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 299 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 on Q22-1/1 contact points
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 298 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 5 on activities related to spam
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 297 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 2 on Information from Rwanda
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 288 ]
|
Gathering experiences on Child Online Protection (COP)
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-08-29 |
|
[ 282 ]
|
UK view on developing a national strategy for cybersecurity
|
United Kingdom of Great Britain and Northern Ireland
|
Q22-1/1
|
2013-08-12 |
|
[ 280 ]
|
Cyber Clean Center (CCC) project in Japan
|
Japan
|
Q22-1/1
|
2013-08-09 |
|
[ 279 ]
+Ann.1 |
Updated overview of 2013 ITU survey on measures taken to raise awareness on cybersecurity
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-08-08 |
|
[ 265 ]
|
Online-courses for children, parents and teachers on the Internet safety
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q22-1/1
|
2013-07-04 |
|
[ 262 ]
|
Compendium update and new structure
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2013-06-27 |
|
[ 252 ]
+Ann.X (Rev.1) |
Draft Report on Question 22-1/1 (Securing information and communication networks: best practices for developing a culture of cybersecurity)
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, OR
|
2013-07-16 |
|
[ 244 ]
|
Liaison Statement from ITU-T JCA-COP to ITU-D SG 1 Q22-1/1 on presentations made at the 18 April 2013 meeting of JCA-COP
|
ITU-T JCA-COP
|
Q22-1/1, LS
|
2013-06-10 |
|
[ 239 ]
|
Report of the Rapporteur Group Meeting on Question 22-1/1, Geneva, 19 April 2013
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-09-11 |
|
[ 227 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 Q22-1/1 on cybersecurity
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-08 |
|
[ 223 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 on providing security in the use of ICT within Critical Infrastructures
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 222 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 about a request to provide security contacts
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 221 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 Question 22-1/1 on draft practices to reduce spam (reply to ITU-D Q22/1 - LS 3)
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 210 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 (ITU-T SG17), Q5/17
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2012-09-17 |
|
[ 204 ]
|
List of information documents
|
Telecommunication Development Bureau
|
QALL, Q22-1/1, Q19-2/1, Q12-3/1
|
2012-09-06 |
|
[ 203 ]
|
Prevention of cyber crime in Bangladesh
|
Bangladesh (People's Republic of)
|
Q22-1/1
|
2012-09-06 |
|
[ 201 ]
+Ann.1-3 |
Regulation of Internet Service Provision
|
Oman (Sultanate of)
|
Q22-1/1
|
2012-09-05 |
|
[ 199 ]
|
Compendium Draft
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2012-09-04 |
|
[ 196 ]
|
A research on web privacy policies in China
|
China Unicom
|
Q22-1/1
|
2012-09-01 |
|
[ 195 ]
+Ann.1 |
Draft practices to reduce spam
|
AT&T Corp.
|
Q22-1/1
|
2012-08-31 |
|
[ 193 ]
+Ann.1 |
Building a training course on building and managing a CIRT
|
United States of America
|
Q22-1/1
|
2012-08-31 |
|
[ 186 ]
|
Status of Cybersecurity Capacity Building Papers in ITU-D Q22-1/1
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-08-24 |
|
[ 179 ]
|
Amendment of the ICT Network Act of Korea to Reinforce Personal Information Protection System on the Internet
|
Korea (Republic of)
|
Q22-1/1
|
2012-08-10 |
|
[ 174 ]
|
Questionnaire on raising awareness on Cybersecurity
|
Oman (Sultanate of)
|
Q22-1/1
|
2012-08-05 |
|
[ 169 ]
|
National information security programme overview: Current status
|
Rwanda (Republic of)
|
Q22-1/1
|
2012-08-01 |
|
[ 157 ]
+Ann.1 |
System for restricting access to inappropriate Internet content for educational establishments
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q22-1/1
|
2012-07-09 |
|
[ 155 ]
|
Experience of Côte d'Ivoire in regard to cybercrime
|
Côte d'Ivoire (Republic of)
|
Q22-1/1
|
2012-07-10 |
|
[ 150 ]
|
Compendium on cybersecurity country case studies
|
Mali (Republic of)
|
Q22-1/1
|
2012-07-06 |
|
[ 149 ]
|
Current Status of Mongolia's Cyber Security Policies & Efforts
|
Mongolia
|
Q22-1/1
|
2012-07-09 |
|
[ 148 ]
|
The Senegalese legal framework and cybersecurity
|
Senegal (Republic of)
|
Q22-1/1
|
2012-03-29 |
|
[ 147 ]
|
Bring your own device (BYOD): opportunity or risk?
|
THALES Communications
|
Q22-1/1
|
2012-07-05 |
|
[ 131 ]
|
Report of the Rapporteur Group Meeting on Question 22-1/1, Geneva, 20 April 2012
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-06-04 |
|
[ 119 ]
+Ann.1-2 |
Some Key BDT Cybersecurity Activities Relevant to the Work of Q22-1/1
|
BDT Focal Point for Question 22-1/1
|
Q22-1/1
|
2011-08-30 |
|
[ 116 ]
+Ann.1 |
Cloud Computing and Security High Level Overview
|
AT&T, Inc.
|
Q22-1/1
|
2011-08-29 |
|
[ 114 ]
+Ann.1 |
Revised National Cybersecurity Management System Framework - Maturity Model Implementation Guide, further proposed edits
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-08-29 |
|
[ 113 ]
+Ann.1 |
Revised National Cybersecurity Management System: Framework - Maturity Model Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2011-08-29 |
|
[ 107 ]
|
Real Name Registration Introduced in Mobile Communication
|
China (People's Republic of)
|
Q22-1/1, Q18-2/1
|
2011-08-24 |
|
[ 102 ]
|
National Cybersecurity Management System Framework - Maturity Model Implementation Guide
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 101 ]
+Ann.1 |
Outline of a proposed course on Building a National Computer Security Incident Management Capability and Managing a National Computer Security Incident Response Team with Critical Success Factors
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 100 ]
+Ann.1 |
Best Practices for Cybersecurity: Public-Private Partnerships
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 93 ]
|
Tentacles Project - a New Way to Combat Cybercrimes
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2011-08-19 |
|
[ 75 ]
|
Overview of cybercrime targeting persons with disabilities and other vulnerable persons
|
VIABLE France (France)
|
Q22-1/1, Q20-1/1
|
2011-07-28 |
|
[ 69 ]
|
Overview of cybercrime targeting persons with disabilities
|
Mali (Republic of)
|
Q22-1/1
|
2011-07-11 |
|
[ 58 ]
|
Report of the Rapporteur's Group Meeting on Question 22-1/1, Geneva, 5-6 May 2011
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-06-08 |
|
[ 45 ]
+Ann.1 |
National cybersecurity management system: Framework - Maturity Model - Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2010-11-03 |
|
[ 38 ]
|
Draft Work Programme for Question 22-1/1
|
Rapporteur for Question 22-1/1
|
WP, Q22-1/1
|
2010-09-20 |
Results:56 total items. Result page:
1 -
2
- Next

|
Multiple Document Download: Formats and Languages to be included (when available):