Contributions
�[�AI/Question:�Q3/2�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 339 ]
�
� |
Online communication and transactions via new and emerging telecommunications/ICTs, such as the Internet of Things (IoT)
�
� |
Congo (Rep. of the)
� |
Q3/2
� |
2024-11-07 |
|
[ 337 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (third meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2024-11-06 |
|
[ 329 ]
�
� |
Egypt capacity building centre for African countries (EG-ATRC)
�
� |
Egypt
� |
Q5/2, Q4/2, Q3/2, Q1/2
� |
2024-10-29 |
|
[ 322 ]
�
� |
Strengthening cyber resilience: the role of Lithuania's national CIRT in critical infrastructure protection
�
� |
NRD Cyber Security, Lithuania
� |
Q3/2
� |
2024-10-29 |
|
[ 320 ]
�
� |
Mandating a minimum standard for consumer-grade smart devices
�
� |
Australia
� |
Q3/2
� |
2024-10-29 |
|
[ 312 ]
�
� |
Challenges and approaches to addressing smishing and SMS incidents in South Korea
�
� |
Korea (Rep. of)
� |
Q3/2
� |
2024-10-28 |
|
[ 309 ]
�
� |
Creation of a safer cyber ecosystem in a country: the case of Albania
�
� |
Albania
� |
Q3/2
� |
2024-10-25 |
|
[ 301 ]
�
� |
Mobile anonymous subscription service based on data security protection
�
� |
China (People's Republic of)
� |
Q3/2
� |
2024-10-22 |
|
[ 300 ]
�
� |
Based on anonymous data exchange network, release the value of telecommunications data
�
� |
China (People's Republic of)
� |
Q6/1, Q3/2
� |
2024-10-22 |
|
[ 299 ]
�
� |
Building security capabilities to alert phishing websites
�
� |
China Telecommunications Corporation
� |
Q3/2
� |
2024-10-22 |
|
[ 279 ]
�
� |
Draft Output Report on ITU-D Question 3/2
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OR
� |
2024-10-11 |
|
[ 276 ]
�
� |
Cybersecurity in action: strategies and challenges in a connected world - experience of Cote d'Ivoire
�
� |
Cote d'Ivoire
� |
Q3/2
� |
2024-09-30 |
|
[ 273 ]
�
� |
Machine learning-based CVE and CWE analysis
�
� |
RIFEN
� |
Q3/2
� |
2024-09-29 |
|
[ 271 ]
�
� |
Cybersecurity and cyberspace protection in developing countries
�
� |
RIFEN
� |
Q3/2
� |
2024-09-29 |
|
[ 268 ]
�
� |
Cybersecurity awareness for rural youth through online training organized by RIFEN-SADA
�
� |
RIFEN
� |
Q5/1, Q3/2
� |
2024-09-24 |
|
[ 254 ]
�
� |
Report of the workshop on Increasing Consumer Awareness Mechanisms to Promote Informed Consumer Decision: A joint workshop for Question 6/1 and Question 3/2 held in Brasilia from 18-20 June 2024
�
� |
Co-Rapporteur for Question 6/1
,
Co-Rapporteur for Question 3/2
� |
Q6/1, Q3/2
� |
2024-09-19 |
|
[ 246 ]
�
� |
Securing the contracting procedure and the production of deeds of purchase in the real estate sale process using blockchain technology and machine learning
�
� |
RIFEN
� |
Q3/2
� |
2024-09-16 |
|
[ 244 ]
�
(Rev.1-2)� |
Question 3/2 interim deliverable for the period 2023-2024: 5G cybersecurity
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, IR
� |
2024-09-12 |
|
[ 242 ]
�
� |
Operationalization of CSIRT/SOC/PKI platforms and training
�
� |
Central African Rep.
� |
Q3/2
� |
2024-09-12 |
|
[ 241 ]
�
� |
Liaison statement from ITU-T Study Group 17 to ITU-D Study Groups 1 and 2 on SG17 update on the work of the Correspondence Group on Child online protection (CG-COP)
�
� |
ITU-T Study Group 17
� |
Q6/1, Q3/2, ILS
� |
2024-09-11 |
|
[ 229 ]
�
� |
Annual progress report for Question 3/2 for November 2024 meeting
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2024-07-26 |
|
[ 212 ]
�
� |
Misuse of Personally Identifiable Information
�
� |
Korea (Republic of)
� |
Q3/2
� |
2023-10-31 |
|
[ 202 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (second meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2023-10-29 |
|
[ 201 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2023-10-17 |
|
[ 199 ]
�
� |
Building local capacity to adopt secure connected place technology: the UK's Secure Connected Places Playbook
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q3/2, Q1/2
� |
2023-10-17 |
|
[ 196 ]
�
� |
U.S. proposed Cyber Trust Mark Program: certifying that IoT products meet U.S. cyber standards
�
� |
United States of America
� |
Q3/2
� |
2023-10-17 |
|
[ 187 ]
�
� |
Privacy by Design certification in South Korea
�
� |
Korea (Republic of)
� |
Q3/2
� |
2023-10-16 |
|
[ 167 ]
�
� |
eSafety Youth Council
�
� |
Australia
� |
Q3/2
� |
2023-10-11 |
|
[ 158 ]
�
� |
Challenges and approaches to addressing smishing and SMS incidents. Combating illegal use of virtual mobile numbers
�
� |
Russian Federation
� |
Q3/2
� |
2023-10-09 |
|
[ 154 ]
�
� |
Combating telecommunications scams
�
� |
Australia
� |
Q6/1, Q3/2
� |
2023-10-05 |
|
[ 150 ]
�
+Ann.1� |
Promoting cybersecurity in Argentina: challenges, strategies and advances in the digital era
�
� |
Argentine Republic
� |
Q5/2, Q3/2
� |
2023-09-29 |
|
[ 141 ]
�
� |
Criminal aspects of physical protection of information and communication network infrastructures
�
� |
Central African Republic
� |
Q3/2
� |
2023-09-28 |
|
[ 137 ]
�
� |
Cybercrime: Continuing campaign on child online protection
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2023-09-14 |
|
[ 134 ]
�
� |
Question 3/2 interim deliverable for the period 2022-2023: Cybersecurity assurance practices
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, IR
� |
2023-09-14 |
|
[ 123 ]
�
� |
Annual progress report for Question 3/2 for October-November 2023 meeting
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2023-09-14 |
|
[ 120 ]
�
� |
Advancing cybersecurity for Timor-Leste's digital transformation
�
� |
Timor-Leste (Democratic Republic of)
� |
Q3/2
� |
2023-09-07 |
|
[ 119 ]
�
� |
The Authority's Child Online Protection and Safety Programme in Kenya: A case study on the implementation of the ITU's Guidelines on Child Online Protection
�
� |
Kenya (Republic of)
� |
Q6/1, Q3/2
� |
2023-09-06 |
|
[ 115 ]
�
� |
Digitalization of public services in the Democratic Republic of the Congo: key challenges and requirements for information security and cyberdefence
�
� |
DR Congo
� |
Q3/2
� |
2023-09-04 |
|
[ 112 ]
�
� |
CSIRT/CIRT approaches and experiences towards the resilience of critical infrastructure in Kenya
�
� |
Kenya (Republic of)
� |
Q3/2
� |
2023-08-21 |
|
[ 98 ]
�
� |
Australia's national online safety awareness campaign
�
� |
Australia
� |
Q3/2
� |
2023-07-25 |
|
[ 89 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on new Question 3/2 and collaboration
�
� |
Co-Rapporteurs for Question 3/2
,
Vice-Rapporteur for Question 3/2
� |
Q3/2, OLS
� |
2022-12-19 |
|
[ 82 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (first meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2022-12-03 |
|
[ 80 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2022-11-24 |
|
[ 77 ]
�
� |
Sharing experience from the UK on promoting and developing cybersecurity skills
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q3/2
� |
2022-11-22 |
|
[ 74 ]
�
� |
World Bank Study Group 2 Submission: Digital transformation
�
� |
World Bank
� |
Q6/2, Q5/2, Q3/2, Q1/2
� |
2022-11-18 |
|
[ 71 ]
�
(Rev.1)� |
New practices of the Russian Federation in the field of creating a culture of cybersecurity
�
� |
Russian Federation
� |
Q3/2
� |
2022-11-18 |
|
[ 46 ]
�
� |
Mapping of ITU-D Questions to ITU-T Questions and ITU-R Working Parties
�
� |
ISCG
� |
QALL/2, QALL/1, Q7/2, Q7/1, Q6/2, Q6/1, Q5/2, Q5/1, Q4/2, Q4/1, Q3/2, Q3/1, Q2/2, Q2/1, Q1/2, Q1/1
� |
2022-10-17 |
|
[ 35 ]
�
� |
National cybersecurity initiatives: current status
�
� |
Rwanda (Republic of)
� |
Q3/2
� |
2022-10-12 |
|
[ 34 ]
�
� |
Initiatives to support children and young people, national strategy for the protection and empowerment of children and young people online: the experience of C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2022-10-12 |
|
[ 30 ]
�
� |
Proposal for State actions and initiatives to foster a culture of cybersecurity and ensure that information and communication networks are secure: the case of C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2022-10-11 |
Results:52 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):