Contributions
�[�AI/Question:�Q3/2�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 443 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 16 Question 26/16 on Output Report of ITU-D Question 3/2
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2021-04-12 |
|
[ 442 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on Output Report of ITU-D Question 3/2
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2021-04-12 |
|
[ 413 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (fourth meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2021-03-12 |
|
[ 407 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2021-03-03 |
|
[ 400 ]
�
� |
Update on Cyber Awareness Campaigns
�
� |
United States of America
� |
Q3/2
� |
2021-03-01 |
|
[ 385 ]
�
� |
Survey findings on National Child Online Safety and Protection
�
� |
Bhutan (Kingdom of)
� |
Q3/2
� |
2021-01-28 |
|
[ 377 ]
�
(Rev.1-2)� |
Draft Output Report on Question 3/2
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, OR
� |
2021-02-12 |
|
[ 370 ]
�
� |
Annual progress report for Question 3/2 for March 2021 meeting
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2021-02-02 |
|
[ 347 ]
�
(Rev.1)� |
All documents received for the third meeting of ITU-D Study Group 2
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2020-02-18 |
|
[ 346 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (Third meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2020-02-18 |
|
[ 344 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2020-02-11 |
|
[ 342 ]
�
� |
Korea's major amendment to data protection law and its implication
�
� |
Korea (Republic of)
� |
Q3/2
� |
2020-02-11 |
|
[ 341 ]
�
� |
Implementation plan for strengthening national cybersecurity of Korea
�
� |
Korea (Republic of)
� |
Q3/2
� |
2020-02-11 |
|
[ 338 ]
�
� |
Draft table of contents (V1) for the Final Report of Q3/2
�
� |
Co-Rapporteur for Question 3/2
� |
Q3/2
� |
2020-02-11 |
|
[ 336 ]
�
� |
Case study of best practices for securing customer Internet of Things in the UK
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q3/2
� |
2020-02-11 |
|
[ 331 ]
�
� |
Proposed text for consideration of security issues for ICT accessibility
�
� |
Keio University
� |
Q3/2
� |
2020-02-11 |
|
[ 328 ]
�
� |
People with disabilities and the Internet of Things
�
� |
Deloitte, United States
� |
Q3/2
� |
2020-02-08 |
|
[ 325 ]
�
� |
La s�curit� num�rique en R�publique D�mocratique du Congo
�
� |
DR Congo
� |
Q3/2
� |
2020-02-08 |
|
[ 322 ]
�
� |
Enhancing capacity and capability for critical national infrastructure in the Pacific Island Nations
�
� |
Welchman Keen, Singapore
� |
Q3/2
� |
2020-02-07 |
|
[ 321 ]
�
� |
WSIS project for consideration by Question 3/2
�
� |
Sudan (Republic of the)
� |
Q3/2
� |
2020-01-08 |
|
[ 305 ]
�
� |
Perception on security and trust from Mexican users on fixed and/or mobile Internet
�
� |
Mexico
� |
Q3/2
� |
2020-01-15 |
|
[ 297 ]
�
� |
Annual progress report for Question 3/2 for February 2020 meeting
�
� |
Co-Rapporteur for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2020-01-09 |
|
[ 287 ]
�
� |
Forum on network security technology development and international cooperation
�
� |
China (People's Republic of)
� |
Q3/2
� |
2020-01-07 |
|
[ 286 ]
�
� |
National Network Security Publicity Week and network security industrial park
�
� |
China (People's Republic of)
� |
Q3/2
� |
2020-01-07 |
|
[ 272 ]
�
� |
Cybersecurity best practices: case study and recommendation
�
� |
Niger (Republic of the)
� |
Q3/2
� |
2020-01-02 |
|
[ 264 ]
�
� |
Protecting children from information harmful to their health and development. Experience of the Russian Federation
�
� |
Russian Federation
� |
Q3/2
� |
2019-12-27 |
|
[ 225 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on collaboration and vulnerability of connected TVs
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2019-04-05 |
|
[ 218 ]
�
� |
All documents received for the second meeting of ITU-D Study Group 2
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2019-03-22 |
|
[ 217 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (Second meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2019-03-22 |
|
[ 201 ]
�
� |
Survey of online activities and Internet use by children in C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-03-08 |
|
[ 199 ]
�
+Ann.1-2� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2019-03-06 |
|
[ 182 ]
�
+Ann.1� |
Liaison statement from ITU-T SG17 to ITU-D Study Group 2 Question 3/2 on Cybersecurity in Africa (overview and outlook), from Democratic Republic of Congo
�
� |
ITU-T Study Group 17
� |
Q3/2, ILS
� |
2019-02-11 |
|
[ 179 ]
�
� |
Annual progress report for Question 3/2 for March 2019 meeting
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2019-02-07 |
|
[ 174 ]
�
� |
Mapping of cybercrime threats in C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 173 ]
�
� |
Presentation of Platform for Combatting Cybercrime (PLCC)
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 172 ]
�
� |
National and sectorial CSIRT developments as means to strengthen cybersecurity environments, 2019 update
�
� |
NRD Cyber Security (CS)
� |
Q3/2
� |
2019-02-07 |
|
[ 168 ]
�
� |
2019 Comprehensive Cybersecurity Plan for the private sector
�
� |
Korea (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 167 ]
�
� |
The importance of cyber threat intelligence in the definition of national cybersecurity strategies
�
� |
Symantec Corporation
� |
Q3/2
� |
2019-02-07 |
|
[ 165 ]
�
� |
Percepci�n de la ciberseguridad de los usuarios de Internet fijo y/o m�vil
�
� |
Mexico
� |
Q6/1, Q3/2
� |
2019-02-06 |
|
[ 156 ]
�
� |
Work experiences in personal information protection
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 155 ]
�
� |
Design of evaluation index for network security capability
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 154 ]
�
� |
Experience of Internet governance with the coordinated participation of the whole of society
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 152 ]
�
� |
Cybersecurity in the era of the digital economy in Benin
�
� |
Benin (Republic of)
� |
Q3/2
� |
2019-02-01 |
|
[ 141 ]
�
� |
Dividende num�rique
�
� |
Chad (Republic of)
� |
Q3/2, Q2/1
� |
2019-01-15 |
|
[ 140 ]
�
� |
Vulnerability of connected TVs
�
� |
Chad (Republic of)
� |
Q3/2, Q2/1
� |
2019-01-15 |
|
[ 136 ]
�
� |
Status of cybersecurity in the Republic of Chad
�
� |
Chad (Republic of)
� |
Q3/2
� |
2019-01-15 |
|
[ 104 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T JCA-IMT2020 on IMT2020 roadmap
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2018-05-22 |
|
[ 103 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on collaboration
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2018-05-22 |
|
[ 97 ]
�
(Rev.1)� |
List of proposed Rapporteurs and Vice-Rapporteurs of ITU-D Study Group 2 study Questions for the 2018-2021 period
�
� |
Chairman, ITU-D Study Group 2
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2018-05-06 |
|
[ 91 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2018-04-24 |
Results:66 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):