Contributions
[ AI/Question: Q3/2 ] |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 483 ]
|
Final Report for Question 3/2
|
Rapporteurs for Question 3/2
|
Q3/2, OR
|
2017-04-11 |
|
[ 476 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU CWG-COP on ITU-D Q3/2 Final Report
|
Rapporteur for Question 3/2
|
Q3/2, OLS
|
2017-04-11 |
|
[ 475 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on ITU-D Q3/2 Final Report
|
Rapporteur for Question 3/2
|
Q3/2, OLS
|
2017-04-11 |
|
[ 474 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to WHO on Internet Addiction
|
Rapporteur for Question 3/2
|
Q3/2, OLS
|
2017-04-11 |
|
[ 458 ]
|
Study topics for Question 3/2 for the next study period
|
Korea (Republic of)
|
Q3/2
|
2017-03-21 |
|
[ 440 ]
|
Report of the Rapporteur Group meeting on Question 3/2, Geneva, 27 January 2017
|
Rapporteur for Question 3/2
|
Q3/2
|
2017-02-28 |
|
[ 422 ]
|
Fraudulent SIM box card practices
|
Togolese Republic
|
Q3/2
|
2017-02-17 |
|
[ 415 ]
|
Draft Final Report for Question 3/2
|
Rapporteurs for Question 3/2
|
Q3/2, OR
|
2017-02-20 |
|
[ 402 ]
|
La sécurisation des réseaux d'information, bonne pratique pour créer une bonne culture de la Cybersécurité
|
République démocratique du Congo
|
Q3/2
|
2017-01-31 |
|
[ 369 ]
|
The experience of the CIS countries in the field of experts' professional competences formation on data protection and information security in information and communication systems
|
Russian Federation
|
Q3/2
|
2016-09-13 |
|
[ 365 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG2 Q3/2 on Collaboration on countering and combating spam
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2016-09-13 |
|
[ 364 ]
|
Common criteria as a tool for giving assurance about the security characteristics of IT products
|
United Kingdom of Great Britain and Northern Ireland
|
Q3/2
|
2016-09-13 |
|
[ 362 ]
+Ann.1 |
Proposed text for inclusion in Chapter 6 (Child Online Protection) of the Final Report
|
Korea (Republic of)
|
Q3/2
|
2016-09-13 |
|
[ 361 ]
|
Korea's Information Security Industry Promotion Plan
|
Korea (Republic of)
|
Q3/2
|
2016-09-13 |
|
[ 342 ]
|
Oman Public Key Infrastructure (PKI)
|
Oman Telecommunications Regulatory Authority (TRA)
|
Q3/2, Q1/1
|
2016-08-24 |
|
[ 334 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2016-08-12 |
|
[ 332 ]
|
The Global Forum on Cyber Expertise (GFCE)
|
United States of America
,
Netherlands (Kingdom of the)
|
Q3/2
|
2016-08-12 |
|
[ 322 ]
|
A database with data on existing technical solutions for child online protection (Contentfiltering.info)
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q3/2
|
2016-08-05 |
|
[ 317 ]
|
Expérience de la Côte d'Ivoire en matière de développement de la culture nationale de cybersécurité
|
Côte d'Ivoire (Republic of)
|
Q3/2
|
2016-08-05 |
|
[ 314 ]
|
ACTIVE(Advanced Cyber Threats response InitiatiVE) project in Japan
|
Japan
|
Q3/2
|
2016-08-05 |
|
[ 295 ]
|
Draft Report on Question 3/2
|
Co-Rapporteurs for Question 3/2
|
Q3/2, OR
|
2016-08-12 |
|
[ 289 ]
|
Liaison statement from ITU-T JCA-COP to ITU-D SG2 Question 3/2 on Child Online Protection Initiatives
|
ITU-T JCA-COP
|
Q3/2, ILS
|
2016-08-01 |
|
[ 276 ]
+Ann.1-11 |
Liaison Statement from ISO/IEC JTC 1/SC 27/WG 5 to ITU-D SG2 Q3/2 on Identity Management, Privacy Technology, and Biometrics
|
International Organization for Standardization (IS
|
Q3/2, ILS
|
2016-06-29 |
|
[ 274 ]
(Rev.1) |
Compendium of Draft Outlines for expected outputs to be produced by ITU-D Study Group 2 Questions (September 2016)
|
Chairman, ITU-D Study Group 2
|
QALL/2, Q9/2, Q8/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
|
2016-06-24 |
|
[ 259 ]
|
Report of the Rapporteur Group Meeting on Question 3/2, Geneva, 19 April 2016
|
Rapporteur for Question 3/2
|
Q3/2
|
2016-04-20 |
|
[ 252 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 Q10/17, ICANN SSAC, AFRINIC, LACNIC, RIPE, ARIN, ISOC on PKIs and RPKIs for developing countries
|
Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2015-09-11 |
|
[ 251 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 regarding request for information sharing regarding D.R. Congo
|
Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2015-09-11 |
|
[ 234 ]
|
Korea's K-ICT Security Development Strategy
|
Korea (Republic of)
|
Q3/2
|
2015-08-27 |
|
[ 228 ]
|
Cybersecurity in government and industry
|
United Kingdom of Great Britain and Northern Ireland
|
Q3/2
|
2015-08-21 |
|
[ 203 ]
|
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
|
China (People's Republic of)
|
Q3/2
|
2015-07-31 |
|
[ 202 ]
(Rev.1) |
Proposed questions on child online protection
|
Australia
,
Papua New Guinea
,
Samoa (Independent State of)
,
United Kingdom of Great Britain and Northern Ireland
,
Vanuatu (Republic of)
|
Q3/2
|
2015-07-29 |
|
[ 198 ]
|
Partnering with the Private Sector to Manage Cyber Risk
|
United States of America
|
Q3/2
|
2015-07-26 |
|
[ 175 ]
|
An update on cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2015-07-23 |
|
[ 174 ]
|
Best practices for developing a culture of cybersecurity: Promoting awareness of cybersecurity and enhancing its management
|
China (People's Republic of)
|
Q3/2
|
2015-07-23 |
|
[ 165 ]
|
Global Cybersecurity Index - Partnership Model
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2015-07-22 |
|
[ 164 ]
|
Global Cybersecurity Index - Reference Model
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2015-07-22 |
|
[ 163 ]
+Ann.1 |
Survey on measures taken to raise awareness on cybersecurity/revised GCI questionnaire
|
Oman Telecommunications Regulatory Authority (TRA)
|
Q3/2
|
2015-07-22 |
|
[ 157 ]
|
Liaison Statement from ITU-T SG15 to ITU-D SGs on ITU-T SG15 OTNT standardization work plan
|
ITU-T Study Group 15
|
QALL/2, QALL/1, Q5/2, Q5/1, Q3/2, Q3/1, Q2/2, Q1/2, Q1/1, ILS
|
2015-07-04 |
|
[ 156 ]
|
Multimedia distance-learning course on the safe use of Internet resources
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q3/2
|
2015-07-08 |
|
[ 155 ]
+Ann.1 |
Cybersecurity Index of Indices
|
ABI Research (United States of America)
|
Q3/2
|
2015-07-10 |
|
[ 154 ]
|
A case to adopt Child Online Protection initiatives across LDCs
|
Gambia (Republic of the)
|
Q6/1, Q3/2
|
2015-07-16 |
|
[ 153 ]
|
Security of electronic transactions
|
Togolese Republic
|
Q3/2
|
2015-07-08 |
|
[ 135 ]
|
Report of the Rapporteur Group Meeting on Question 3/2, Geneva, 29 April 2015
|
Rapporteurs for Question 3/2
|
Q3/2
|
2015-05-08 |
|
[ 123 ]
|
Liaison Statement from ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 on Request for information sharing on cybersecurity
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2015-04-20 |
|
[ 122 ]
|
Liaison Statement from ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 on Cooperation with ITU-D Q3/2
|
ITU-T Study Group 17
|
Q3/2, ILS
|
2015-04-20 |
|
[ 109 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 and GSMA on development of a framework to address mobile botnets
|
Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2014-10-01 |
|
[ 108 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to WHO, UNESCO, UNICEF and ITU CWG-COP on Internet addiction
|
Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2014-10-01 |
|
[ 107 ]
|
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T FG-SSC on input for draft ITU-T FG-SSC report
|
Rapporteurs for Question 3/2
|
Q3/2, OLS
|
2014-10-01 |
|
[ 97 ]
|
Liste des documents d'information
|
Telecommunication Development Bureau
|
QALL/2, Q3/2, Q2/2
|
2014-09-11 |
|
[ 93 ]
+Ann.1 |
Cybersecurity initiatives for Member States
|
BDT Focal Point for Question 3/2
|
Q3/2
|
2014-09-09 |
Resultats:63 documents Résultats :
1 -
2
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):