Contributions
[ AI/Question: Q3/2 ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 443 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 16 Question 26/16 on Output Report of ITU-D Question 3/2
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2021-04-12 |
|
[ 442 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on Output Report of ITU-D Question 3/2
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2021-04-12 |
|
[ 413 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (fourth meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2021-03-12 |
|
[ 407 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2021-03-03 |
|
[ 400 ]
|
Update on Cyber Awareness Campaigns
|
United States of America
|
Q3/2
|
2021-03-01 |
|
[ 385 ]
|
Survey findings on National Child Online Safety and Protection
|
Bhutan (Kingdom of)
|
Q3/2
|
2021-01-28 |
|
[ 377 ]
(Rev.1-2) |
Draft Output Report on Question 3/2
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, OR
|
2021-02-12 |
|
[ 370 ]
|
Annual progress report for Question 3/2 for March 2021 meeting
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, PR
|
2021-02-02 |
|
[ 347 ]
(Rev.1) |
All documents received for the third meeting of ITU-D Study Group 2
|
Telecommunication Development Bureau
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2020-02-18 |
|
[ 346 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (Third meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2020-02-18 |
|
[ 344 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2020-02-11 |
|
[ 342 ]
|
Korea's major amendment to data protection law and its implication
|
Korea (Republic of)
|
Q3/2
|
2020-02-11 |
|
[ 341 ]
|
Implementation plan for strengthening national cybersecurity of Korea
|
Korea (Republic of)
|
Q3/2
|
2020-02-11 |
|
[ 338 ]
|
Draft table of contents (V1) for the Final Report of Q3/2
|
Co-Rapporteur for Question 3/2
|
Q3/2
|
2020-02-11 |
|
[ 336 ]
|
Case study of best practices for securing customer Internet of Things in the UK
|
United Kingdom of Great Britain and Northern Ireland
|
Q3/2
|
2020-02-11 |
|
[ 331 ]
|
Proposed text for consideration of security issues for ICT accessibility
|
Keio University
|
Q3/2
|
2020-02-11 |
|
[ 328 ]
|
People with disabilities and the Internet of Things
|
Deloitte, United States
|
Q3/2
|
2020-02-08 |
|
[ 325 ]
|
La sécurité numérique en République Démocratique du Congo
|
DR Congo
|
Q3/2
|
2020-02-08 |
|
[ 322 ]
|
Enhancing capacity and capability for critical national infrastructure in the Pacific Island Nations
|
Welchman Keen, Singapore
|
Q3/2
|
2020-02-07 |
|
[ 321 ]
|
WSIS project for consideration by Question 3/2
|
Sudan (Republic of the)
|
Q3/2
|
2020-01-08 |
|
[ 305 ]
|
Perception on security and trust from Mexican users on fixed and/or mobile Internet
|
Mexico
|
Q3/2
|
2020-01-15 |
|
[ 297 ]
|
Annual progress report for Question 3/2 for February 2020 meeting
|
Co-Rapporteur for Question 3/2
|
QALL/2, Q3/2, PR
|
2020-01-09 |
|
[ 287 ]
|
Forum on network security technology development and international cooperation
|
China (People's Republic of)
|
Q3/2
|
2020-01-07 |
|
[ 286 ]
|
National Network Security Publicity Week and network security industrial park
|
China (People's Republic of)
|
Q3/2
|
2020-01-07 |
|
[ 272 ]
|
Cybersecurity best practices: case study and recommendation
|
Niger (Republic of the)
|
Q3/2
|
2020-01-02 |
|
[ 264 ]
|
Protecting children from information harmful to their health and development. Experience of the Russian Federation
|
Russian Federation
|
Q3/2
|
2019-12-27 |
|
[ 225 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on collaboration and vulnerability of connected TVs
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2019-04-05 |
|
[ 218 ]
|
All documents received for the second meeting of ITU-D Study Group 2
|
Telecommunication Development Bureau
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2019-03-22 |
|
[ 217 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (Second meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2019-03-22 |
|
[ 201 ]
|
Survey of online activities and Internet use by children in Côte d'Ivoire
|
Côte d'Ivoire (Republic of)
|
Q3/2
|
2019-03-08 |
|
[ 199 ]
+Ann.1-2 |
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2019-03-06 |
|
[ 182 ]
+Ann.1 |
Liaison statement from ITU-T SG17 to ITU-D Study Group 2 Question 3/2 on Cybersecurity in Africa (overview and outlook), from Democratic Republic of Congo
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2019-02-11 |
|
[ 179 ]
|
Annual progress report for Question 3/2 for March 2019 meeting
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, PR
|
2019-02-07 |
|
[ 174 ]
|
Mapping of cybercrime threats in Côte d'Ivoire
|
Côte d'Ivoire (Republic of)
|
Q3/2
|
2019-02-07 |
|
[ 173 ]
|
Presentation of Platform for Combatting Cybercrime (PLCC)
|
Côte d'Ivoire (Republic of)
|
Q3/2
|
2019-02-07 |
|
[ 172 ]
|
National and sectorial CSIRT developments as means to strengthen cybersecurity environments, 2019 update
|
NRD Cyber Security (CS)
|
Q3/2
|
2019-02-07 |
|
[ 168 ]
|
2019 Comprehensive Cybersecurity Plan for the private sector
|
Korea (Republic of)
|
Q3/2
|
2019-02-07 |
|
[ 167 ]
|
The importance of cyber threat intelligence in the definition of national cybersecurity strategies
|
Symantec Corporation
|
Q3/2
|
2019-02-07 |
|
[ 165 ]
|
Percepción de la ciberseguridad de los usuarios de Internet fijo y/o móvil
|
Mexico
|
Q6/1, Q3/2
|
2019-02-06 |
|
[ 156 ]
|
Work experiences in personal information protection
|
China (People's Republic of)
|
Q3/2
|
2019-02-05 |
|
[ 155 ]
|
Design of evaluation index for network security capability
|
China (People's Republic of)
|
Q3/2
|
2019-02-05 |
|
[ 154 ]
|
Experience of Internet governance with the coordinated participation of the whole of society
|
China (People's Republic of)
|
Q3/2
|
2019-02-05 |
|
[ 152 ]
|
Cybersecurity in the era of the digital economy in Benin
|
Benin (Republic of)
|
Q3/2
|
2019-02-01 |
|
[ 141 ]
|
Dividende numérique
|
Chad (Republic of)
|
Q3/2, Q2/1
|
2019-01-15 |
|
[ 140 ]
|
Vulnerability of connected TVs
|
Chad (Republic of)
|
Q3/2, Q2/1
|
2019-01-15 |
|
[ 136 ]
|
Status of cybersecurity in the Republic of Chad
|
Chad (Republic of)
|
Q3/2
|
2019-01-15 |
|
[ 104 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T JCA-IMT2020 on IMT2020 roadmap
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2018-05-22 |
|
[ 103 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on collaboration
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2018-05-22 |
|
[ 97 ]
(Rev.1) |
List of proposed Rapporteurs and Vice-Rapporteurs of ITU-D Study Group 2 study Questions for the 2018-2021 period
|
Chairman, ITU-D Study Group 2
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2018-05-06 |
|
[ 91 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2018-04-24 |
Results:66 total items. Result page:
1 -
2
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):