Contributions
�[�AI/Question:�Q22-1/1�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 300 ]
�
� |
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T JCA-COP on activities related to child online protection
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, LS
� |
2013-09-13 |
|
[ 299 ]
�
� |
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 on Q22-1/1 contact points
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, LS
� |
2013-09-13 |
|
[ 298 ]
�
� |
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 5 on activities related to spam
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, LS
� |
2013-09-13 |
|
[ 297 ]
�
� |
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 2 on Information from Rwanda
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, LS
� |
2013-09-13 |
|
[ 288 ]
�
� |
Gathering experiences on Child Online Protection (COP)
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2013-08-29 |
|
[ 282 ]
�
� |
UK view on developing a national strategy for cybersecurity
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q22-1/1
� |
2013-08-12 |
|
[ 280 ]
�
� |
Cyber Clean Center (CCC) project in Japan
�
� |
Japan
� |
Q22-1/1
� |
2013-08-09 |
|
[ 279 ]
�
+Ann.1� |
Updated overview of 2013 ITU survey on measures taken to raise awareness on cybersecurity
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2013-08-08 |
|
[ 265 ]
�
� |
Online-courses for children, parents and teachers on the Internet safety
�
� |
Odessa National Academy of Telecommunications n.a. A.S. Popov
� |
Q22-1/1
� |
2013-07-04 |
|
[ 262 ]
�
� |
Compendium update and new structure
�
� |
Brazil (Federative Republic of)
� |
Q22-1/1
� |
2013-06-27 |
|
[ 252 ]
�
+Ann.X (Rev.1)� |
Draft Report on Question 22-1/1 (Securing information and communication networks: best practices for developing a culture of cybersecurity)
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, OR
� |
2013-07-16 |
|
[ 244 ]
�
� |
Liaison Statement from ITU-T JCA-COP to ITU-D SG 1 Q22-1/1 on presentations made at the 18 April 2013 meeting of JCA-COP
�
� |
ITU-T JCA-COP
� |
Q22-1/1, LS
� |
2013-06-10 |
|
[ 239 ]
�
� |
Report of the Rapporteur Group Meeting on Question 22-1/1, Geneva, 19 April 2013
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2013-09-11 |
|
[ 227 ]
�
� |
Liaison Statement from ITU-T SG17 to ITU-D SG1 Q22-1/1 on cybersecurity
�
� |
ITU-T Study Group 17
� |
Q22-1/1, LS
� |
2013-05-08 |
|
[ 223 ]
�
� |
Liaison Statement from ITU-T SG17 to ITU-D SG1 on providing security in the use of ICT within Critical Infrastructures
�
� |
ITU-T Study Group 17
� |
Q22-1/1, LS
� |
2013-05-03 |
|
[ 222 ]
�
� |
Liaison Statement from ITU-T SG17 to ITU-D SG1 about a request to provide security contacts
�
� |
ITU-T Study Group 17
� |
Q22-1/1, LS
� |
2013-05-03 |
|
[ 221 ]
�
� |
Liaison Statement from ITU-T SG17 to ITU-D SG1 Question 22-1/1 on draft practices to reduce spam (reply to ITU-D Q22/1 - LS 3)
�
� |
ITU-T Study Group 17
� |
Q22-1/1, LS
� |
2013-05-03 |
|
[ 210 ]
�
� |
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 (ITU-T SG17), Q5/17
�
� |
Co-Rapporteur for Question 22-1/1
� |
Q22-1/1, LS
� |
2012-09-17 |
|
[ 204 ]
�
� |
List of information documents
�
� |
Telecommunication Development Bureau
� |
QALL, Q22-1/1, Q19-2/1, Q12-3/1
� |
2012-09-06 |
|
[ 203 ]
�
� |
Prevention of cyber crime in Bangladesh
�
� |
Bangladesh (People's Republic of)
� |
Q22-1/1
� |
2012-09-06 |
|
[ 201 ]
�
+Ann.1-3� |
Regulation of Internet Service Provision
�
� |
Oman (Sultanate of)
� |
Q22-1/1
� |
2012-09-05 |
|
[ 199 ]
�
� |
Compendium Draft
�
� |
Brazil (Federative Republic of)
� |
Q22-1/1
� |
2012-09-04 |
|
[ 196 ]
�
� |
A research on web privacy policies in China
�
� |
China Unicom
� |
Q22-1/1
� |
2012-09-01 |
|
[ 195 ]
�
+Ann.1� |
Draft practices to reduce spam
�
� |
AT&T Corp.
� |
Q22-1/1
� |
2012-08-31 |
|
[ 193 ]
�
+Ann.1� |
Building a training course on building and managing a CIRT
�
� |
United States of America
� |
Q22-1/1
� |
2012-08-31 |
|
[ 186 ]
�
� |
Status of Cybersecurity Capacity Building Papers in ITU-D Q22-1/1
�
� |
Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2012-08-24 |
|
[ 179 ]
�
� |
Amendment of the ICT Network Act of Korea to Reinforce Personal Information Protection System on the Internet
�
� |
Korea (Republic of)
� |
Q22-1/1
� |
2012-08-10 |
|
[ 174 ]
�
� |
Questionnaire on raising awareness on Cybersecurity
�
� |
Oman (Sultanate of)
� |
Q22-1/1
� |
2012-08-05 |
|
[ 169 ]
�
� |
National information security programme overview: Current status
�
� |
Rwanda (Republic of)
� |
Q22-1/1
� |
2012-08-01 |
|
[ 157 ]
�
+Ann.1� |
System for restricting access to inappropriate Internet content for educational establishments
�
� |
Odessa National Academy of Telecommunications n.a. A.S. Popov
� |
Q22-1/1
� |
2012-07-09 |
|
[ 155 ]
�
� |
Experience of C�te d'Ivoire in regard to cybercrime
�
� |
C�te d'Ivoire (Republic of)
� |
Q22-1/1
� |
2012-07-10 |
|
[ 150 ]
�
� |
Compendium on cybersecurity country case studies
�
� |
Mali (Republic of)
� |
Q22-1/1
� |
2012-07-06 |
|
[ 149 ]
�
� |
Current Status of Mongolia's Cyber Security Policies & Efforts
�
� |
Mongolia
� |
Q22-1/1
� |
2012-07-09 |
|
[ 148 ]
�
� |
The Senegalese legal framework and cybersecurity
�
� |
Senegal (Republic of)
� |
Q22-1/1
� |
2012-03-29 |
|
[ 147 ]
�
� |
Bring your own device (BYOD): opportunity or risk?
�
� |
THALES Communications
� |
Q22-1/1
� |
2012-07-05 |
|
[ 131 ]
�
� |
Report of the Rapporteur Group Meeting on Question 22-1/1, Geneva, 20 April 2012
�
� |
Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2012-06-04 |
|
[ 119 ]
�
+Ann.1-2� |
Some Key BDT Cybersecurity Activities Relevant to the Work of Q22-1/1
�
� |
BDT Focal Point for Question 22-1/1
� |
Q22-1/1
� |
2011-08-30 |
|
[ 116 ]
�
+Ann.1� |
Cloud Computing and Security High Level Overview
�
� |
AT&T, Inc.
� |
Q22-1/1
� |
2011-08-29 |
|
[ 114 ]
�
+Ann.1� |
Revised National Cybersecurity Management System Framework - Maturity Model Implementation Guide, further proposed edits
�
� |
Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2011-08-29 |
|
[ 113 ]
�
+Ann.1� |
Revised National Cybersecurity Management System: Framework - Maturity Model Implementation Guide
�
� |
Morocco (Kingdom of)
� |
Q22-1/1
� |
2011-08-29 |
|
[ 107 ]
�
� |
Real Name Registration Introduced in Mobile Communication
�
� |
China (People's Republic of)
� |
Q22-1/1, Q18-2/1
� |
2011-08-24 |
|
[ 102 ]
�
� |
National Cybersecurity Management System Framework - Maturity Model Implementation Guide
�
� |
United States of America
� |
Q22-1/1
� |
2011-08-23 |
|
[ 101 ]
�
+Ann.1� |
Outline of a proposed course on Building a National Computer Security Incident Management Capability and Managing a National Computer Security Incident Response Team with Critical Success Factors
�
� |
United States of America
� |
Q22-1/1
� |
2011-08-23 |
|
[ 100 ]
�
+Ann.1� |
Best Practices for Cybersecurity: Public-Private Partnerships
�
� |
United States of America
� |
Q22-1/1
� |
2011-08-23 |
|
[ 93 ]
�
� |
Tentacles Project - a New Way to Combat Cybercrimes
�
� |
Brazil (Federative Republic of)
� |
Q22-1/1
� |
2011-08-19 |
|
[ 75 ]
�
� |
Overview of cybercrime targeting persons with disabilities and other vulnerable persons
�
� |
VIABLE France (France)
� |
Q22-1/1, Q20-1/1
� |
2011-07-28 |
|
[ 69 ]
�
� |
Overview of cybercrime targeting persons with disabilities
�
� |
Mali (Republic of)
� |
Q22-1/1
� |
2011-07-11 |
|
[ 58 ]
�
� |
Report of the Rapporteur's Group Meeting on Question 22-1/1, Geneva, 5-6 May 2011
�
� |
Rapporteur for Question 22-1/1
� |
Q22-1/1
� |
2011-06-08 |
|
[ 45 ]
�
+Ann.1� |
National cybersecurity management system: Framework - Maturity Model - Implementation Guide
�
� |
Morocco (Kingdom of)
� |
Q22-1/1
� |
2010-11-03 |
|
[ 38 ]
�
� |
Draft Work Programme for Question 22-1/1
�
� |
Rapporteur for Question 22-1/1
� |
WP, Q22-1/1
� |
2010-09-20 |
Results:56 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):