Contributions
[ AI/Question: Q3/2 ]  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 416 ]
|
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on security
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2025-05-12 |
|
[ 415 ]
+Ann.1 |
Liaison statement from ITU-D Study Group 2 Question 2/2 to ITU-T study groups, ITU-R working parties and related organizations on Final Report of Question 2/2
|
Co-Rapporteurs for Question 2/2
|
Q3/2, OLS
|
2025-05-12 |
|
[ 410 ]
+Ann.1 |
Liaison statement form ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 LS on update on the work of the Correspondence Group on Child online protection (CG-COP)
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2025-04-30 |
|
[ 409 ]
|
Liaison statement form ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 on request to update security contacts and to provide information on security-related Recommendations or other texts under development
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2025-04-30 |
|
[ 408 ]
|
Securing contractualization and deed production during the real estate sales process via blockchain technology and machine learning: practices and use cases
|
RIFEN
|
Q3/2
|
2025-04-29 |
|
[ 405 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2025-04-28 |
|
[ 404 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (fourth meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2025-05-02 |
|
[ 396 ]
|
Proposed draft Terms of Reference for Question 3/2
|
Co-Rapporteurs for Question 3/2
|
Q3/2
|
2025-04-22 |
|
[ 393 ]
|
Scam reporting within the UK
|
United Kingdom
|
Q3/2
|
2025-04-23 |
|
[ 392 ]
|
Developing countries: strengthening cybersecurity
|
RIFEN
|
Q3/2
|
2025-04-22 |
|
[ 370 ]
|
Jointly building cybersecurity: typical practices of safeguarding cyberspace security
|
China (People's Republic of)
|
Q3/2
|
2025-04-14 |
|
[ 360 ]
(Rev.1-2) |
Draft Output Report on Question 3/2
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, OR
|
2025-03-20 |
|
[ 350 ]
|
Artificial intelligence for the detection and reporting of online cyberbullying
|
RIFEN
|
Q3/2
|
2025-02-27 |
|
[ 346 ]
|
Best practices for coordinating efforts and developing cybersecurity culture
|
Tanzania
|
Q3/2
|
2025-03-03 |
|
[ 339 ]
|
Online communication and transactions via new and emerging telecommunications/ICTs, such as the Internet of Things (IoT)
|
Congo (Rep. of the)
|
Q3/2
|
2024-11-07 |
|
[ 337 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (third meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2024-11-06 |
|
[ 329 ]
|
Egypt capacity building centre for African countries (EG-ATRC)
|
Egypt
|
Q5/2, Q4/2, Q3/2, Q1/2
|
2024-10-29 |
|
[ 322 ]
|
Strengthening cyber resilience: the role of Lithuania's national CIRT in critical infrastructure protection
|
NRD Cyber Security, Lithuania
|
Q3/2
|
2024-10-29 |
|
[ 320 ]
|
Mandating a minimum standard for consumer-grade smart devices
|
Australia
|
Q3/2
|
2024-10-29 |
|
[ 312 ]
|
Challenges and approaches to addressing smishing and SMS incidents in South Korea
|
Korea (Rep. of)
|
Q3/2
|
2024-10-28 |
|
[ 309 ]
|
Creation of a safer cyber ecosystem in a country: the case of Albania
|
Albania
|
Q3/2
|
2024-10-25 |
|
[ 301 ]
|
Mobile anonymous subscription service based on data security protection
|
China (People's Republic of)
|
Q3/2
|
2024-10-22 |
|
[ 300 ]
|
Based on anonymous data exchange network, release the value of telecommunications data
|
China (People's Republic of)
|
Q6/1, Q3/2
|
2024-10-22 |
|
[ 299 ]
|
Building security capabilities to alert phishing websites
|
China Telecommunications Corporation
|
Q3/2
|
2024-10-22 |
|
[ 279 ]
|
Draft Output Report on ITU-D Question 3/2
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OR
|
2024-10-11 |
|
[ 276 ]
|
Cybersecurity in action: strategies and challenges in a connected world - experience of Cote d'Ivoire
|
Cote d'Ivoire
|
Q3/2
|
2024-09-30 |
|
[ 273 ]
|
Machine learning-based CVE and CWE analysis
|
RIFEN
|
Q3/2
|
2024-09-29 |
|
[ 271 ]
|
Cybersecurity and cyberspace protection in developing countries
|
RIFEN
|
Q3/2
|
2024-09-29 |
|
[ 268 ]
|
Cybersecurity awareness for rural youth through online training organized by RIFEN-SADA
|
RIFEN
|
Q5/1, Q3/2
|
2024-09-24 |
|
[ 254 ]
|
Report of the workshop on Increasing Consumer Awareness Mechanisms to Promote Informed Consumer Decision: A joint workshop for Question 6/1 and Question 3/2 held in Brasilia from 18-20 June 2024
|
Co-Rapporteur for Question 6/1
,
Co-Rapporteur for Question 3/2
|
Q6/1, Q3/2
|
2024-09-19 |
|
[ 246 ]
|
Securing the contracting procedure and the production of deeds of purchase in the real estate sale process using blockchain technology and machine learning
|
RIFEN
|
Q3/2
|
2024-09-16 |
|
[ 244 ]
(Rev.1-2) |
Question 3/2 interim deliverable for the period 2023-2024: 5G cybersecurity
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, IR
|
2024-09-12 |
|
[ 242 ]
|
Operationalization of CSIRT/SOC/PKI platforms and training
|
Central African Rep.
|
Q3/2
|
2024-09-12 |
|
[ 241 ]
|
Liaison statement from ITU-T Study Group 17 to ITU-D Study Groups 1 and 2 on SG17 update on the work of the Correspondence Group on Child online protection (CG-COP)
|
ITU-T Study Group 17
|
Q6/1, Q3/2, ILS
|
2024-09-11 |
|
[ 229 ]
|
Annual progress report for Question 3/2 for November 2024 meeting
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, PR
|
2024-07-26 |
|
[ 212 ]
|
Misuse of Personally Identifiable Information
|
Korea (Republic of)
|
Q3/2
|
2023-10-31 |
|
[ 202 ]
|
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (second meeting of ITU-D Study Group 2)
|
Telecommunication Development Bureau
|
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2023-10-29 |
|
[ 201 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2023-10-17 |
|
[ 199 ]
|
Building local capacity to adopt secure connected place technology: the UK's Secure Connected Places Playbook
|
United Kingdom of Great Britain and Northern Ireland
|
Q3/2, Q1/2
|
2023-10-17 |
|
[ 196 ]
|
U.S. proposed Cyber Trust Mark Program: certifying that IoT products meet U.S. cyber standards
|
United States of America
|
Q3/2
|
2023-10-17 |
|
[ 187 ]
|
Privacy by Design certification in South Korea
|
Korea (Republic of)
|
Q3/2
|
2023-10-16 |
|
[ 167 ]
|
eSafety Youth Council
|
Australia
|
Q3/2
|
2023-10-11 |
|
[ 158 ]
|
Challenges and approaches to addressing smishing and SMS incidents. Combating illegal use of virtual mobile numbers
|
Russian Federation
|
Q3/2
|
2023-10-09 |
|
[ 154 ]
|
Combating telecommunications scams
|
Australia
|
Q6/1, Q3/2
|
2023-10-05 |
|
[ 150 ]
+Ann.1 |
Promoting cybersecurity in Argentina: challenges, strategies and advances in the digital era
|
Argentine Republic
|
Q5/2, Q3/2
|
2023-09-29 |
|
[ 141 ]
|
Criminal aspects of physical protection of information and communication network infrastructures
|
Central African Republic
|
Q3/2
|
2023-09-28 |
|
[ 137 ]
|
Cybercrime: Continuing campaign on child online protection
|
Côte d'Ivoire (Republic of)
|
Q3/2
|
2023-09-14 |
|
[ 134 ]
|
Question 3/2 interim deliverable for the period 2022-2023: Cybersecurity assurance practices
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, IR
|
2023-09-14 |
|
[ 123 ]
|
Annual progress report for Question 3/2 for October-November 2023 meeting
|
Co-Rapporteurs for Question 3/2
|
QALL/2, Q3/2, PR
|
2023-09-14 |
|
[ 120 ]
|
Advancing cybersecurity for Timor-Leste's digital transformation
|
Timor-Leste (Democratic Republic of)
|
Q3/2
|
2023-09-07 |
Results:66 total items. Result page:
1 -
2
- Next

|
Multiple Document Download: Formats and Languages to be included (when available):