Contributions
�[�AI/Question:�Q3/2�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 483 ]
�
� |
Final Report for Question 3/2
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OR
� |
2017-04-11 |
|
[ 476 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU CWG-COP on ITU-D Q3/2 Final Report
�
� |
Rapporteur for Question 3/2
� |
Q3/2, OLS
� |
2017-04-11 |
|
[ 475 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on ITU-D Q3/2 Final Report
�
� |
Rapporteur for Question 3/2
� |
Q3/2, OLS
� |
2017-04-11 |
|
[ 474 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to WHO on Internet Addiction
�
� |
Rapporteur for Question 3/2
� |
Q3/2, OLS
� |
2017-04-11 |
|
[ 458 ]
�
� |
Study topics for Question 3/2 for the next study period
�
� |
Korea (Republic of)
� |
Q3/2
� |
2017-03-21 |
|
[ 440 ]
�
� |
Report of the Rapporteur Group meeting on Question 3/2, Geneva, 27 January 2017
�
� |
Rapporteur for Question 3/2
� |
Q3/2
� |
2017-02-28 |
|
[ 422 ]
�
� |
Fraudulent SIM box card practices
�
� |
Togolese Republic
� |
Q3/2
� |
2017-02-17 |
|
[ 415 ]
�
� |
Draft Final Report for Question 3/2
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OR
� |
2017-02-20 |
|
[ 402 ]
�
� |
La s�curisation des r�seaux d'information, bonne pratique pour cr�er une bonne culture de la Cybers�curit�
�
� |
R�publique d�mocratique du Congo
� |
Q3/2
� |
2017-01-31 |
|
[ 369 ]
�
� |
The experience of the CIS countries in the field of experts' professional competences formation on data protection and information security in information and communication systems
�
� |
Russian Federation
� |
Q3/2
� |
2016-09-13 |
|
[ 365 ]
�
� |
Liaison Statement from ITU-T SG17 to ITU-D SG2 Q3/2 on Collaboration on countering and combating spam
�
� |
ITU-T Study Group 17
� |
Q3/2, ILS
� |
2016-09-13 |
|
[ 364 ]
�
� |
Common criteria as a tool for giving assurance about the security characteristics of IT products
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q3/2
� |
2016-09-13 |
|
[ 362 ]
�
+Ann.1� |
Proposed text for inclusion in Chapter 6 (Child Online Protection) of the Final Report
�
� |
Korea (Republic of)
� |
Q3/2
� |
2016-09-13 |
|
[ 361 ]
�
� |
Korea's Information Security Industry Promotion Plan
�
� |
Korea (Republic of)
� |
Q3/2
� |
2016-09-13 |
|
[ 342 ]
�
� |
Oman Public Key Infrastructure (PKI)
�
� |
Oman Telecommunications Regulatory Authority (TRA)
� |
Q3/2, Q1/1
� |
2016-08-24 |
|
[ 334 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2016-08-12 |
|
[ 332 ]
�
� |
The Global Forum on Cyber Expertise (GFCE)
�
� |
United States of America
,
Netherlands (Kingdom of the)
� |
Q3/2
� |
2016-08-12 |
|
[ 322 ]
�
� |
A database with data on existing technical solutions for child online protection (Contentfiltering.info)
�
� |
Odessa National Academy of Telecommunications n.a. A.S. Popov
� |
Q3/2
� |
2016-08-05 |
|
[ 317 ]
�
� |
Exp�rience de la C�te d'Ivoire en mati�re de d�veloppement de la culture nationale de cybers�curit�
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2016-08-05 |
|
[ 314 ]
�
� |
ACTIVE(Advanced Cyber Threats response InitiatiVE) project in Japan
�
� |
Japan
� |
Q3/2
� |
2016-08-05 |
|
[ 295 ]
�
� |
Draft Report on Question 3/2
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OR
� |
2016-08-12 |
|
[ 289 ]
�
� |
Liaison statement from ITU-T JCA-COP to ITU-D SG2 Question 3/2 on Child Online Protection Initiatives
�
� |
ITU-T JCA-COP
� |
Q3/2, ILS
� |
2016-08-01 |
|
[ 276 ]
�
+Ann.1-11� |
Liaison Statement from ISO/IEC JTC 1/SC 27/WG 5 to ITU-D SG2 Q3/2 on Identity Management, Privacy Technology, and Biometrics
�
� |
International Organization for Standardization (IS
� |
Q3/2, ILS
� |
2016-06-29 |
|
[ 274 ]
�
(Rev.1)� |
Compendium of Draft Outlines for expected outputs to be produced by ITU-D Study Group 2 Questions (September 2016)
�
� |
Chairman, ITU-D Study Group 2
� |
QALL/2, Q9/2, Q8/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2016-06-24 |
|
[ 259 ]
�
� |
Report of the Rapporteur Group Meeting on Question 3/2, Geneva, 19 April 2016
�
� |
Rapporteur for Question 3/2
� |
Q3/2
� |
2016-04-20 |
|
[ 252 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 Q10/17, ICANN SSAC, AFRINIC, LACNIC, RIPE, ARIN, ISOC on PKIs and RPKIs for developing countries
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2015-09-11 |
|
[ 251 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 regarding request for information sharing regarding D.R. Congo
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2015-09-11 |
|
[ 234 ]
�
� |
Korea's K-ICT Security Development Strategy
�
� |
Korea (Republic of)
� |
Q3/2
� |
2015-08-27 |
|
[ 228 ]
�
� |
Cybersecurity in government and industry
�
� |
United Kingdom of Great Britain and Northern Ireland
� |
Q3/2
� |
2015-08-21 |
|
[ 203 ]
�
� |
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
�
� |
China (People's Republic of)
� |
Q3/2
� |
2015-07-31 |
|
[ 202 ]
�
(Rev.1)� |
Proposed questions on child online protection
�
� |
Australia
,
Papua New Guinea
,
Samoa (Independent State of)
,
United Kingdom of Great Britain and Northern Ireland
,
Vanuatu (Republic of)
� |
Q3/2
� |
2015-07-29 |
|
[ 198 ]
�
� |
Partnering with the Private Sector to Manage Cyber Risk
�
� |
United States of America
� |
Q3/2
� |
2015-07-26 |
|
[ 175 ]
�
� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2015-07-23 |
|
[ 174 ]
�
� |
Best practices for developing a culture of cybersecurity: Promoting awareness of cybersecurity and enhancing its management
�
� |
China (People's Republic of)
� |
Q3/2
� |
2015-07-23 |
|
[ 165 ]
�
� |
Global Cybersecurity Index - Partnership Model
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2015-07-22 |
|
[ 164 ]
�
� |
Global Cybersecurity Index - Reference Model
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2015-07-22 |
|
[ 163 ]
�
+Ann.1� |
Survey on measures taken to raise awareness on cybersecurity/revised GCI questionnaire
�
� |
Oman Telecommunications Regulatory Authority (TRA)
� |
Q3/2
� |
2015-07-22 |
|
[ 157 ]
�
� |
Liaison Statement from ITU-T SG15 to ITU-D SGs on ITU-T SG15 OTNT standardization work plan
�
� |
ITU-T Study Group 15
� |
QALL/2, QALL/1, Q5/2, Q5/1, Q3/2, Q3/1, Q2/2, Q1/2, Q1/1, ILS
� |
2015-07-04 |
|
[ 156 ]
�
� |
Multimedia distance-learning course on the safe use of Internet resources
�
� |
Odessa National Academy of Telecommunications n.a. A.S. Popov
� |
Q3/2
� |
2015-07-08 |
|
[ 155 ]
�
+Ann.1� |
Cybersecurity Index of Indices
�
� |
ABI Research (United States of America)
� |
Q3/2
� |
2015-07-10 |
|
[ 154 ]
�
� |
A case to adopt Child Online Protection initiatives across LDCs
�
� |
Gambia (Republic of the)
� |
Q6/1, Q3/2
� |
2015-07-16 |
|
[ 153 ]
�
� |
Security of electronic transactions
�
� |
Togolese Republic
� |
Q3/2
� |
2015-07-08 |
|
[ 135 ]
�
� |
Report of the Rapporteur Group Meeting on Question 3/2, Geneva, 29 April 2015
�
� |
Rapporteurs for Question 3/2
� |
Q3/2
� |
2015-05-08 |
|
[ 123 ]
�
� |
Liaison Statement from ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 on Request for information sharing on cybersecurity
�
� |
ITU-T Study Group 17
� |
Q3/2, ILS
� |
2015-04-20 |
|
[ 122 ]
�
� |
Liaison Statement from ITU-T Study Group 17 to ITU-D Study Group 2 Question 3/2 on Cooperation with ITU-D Q3/2
�
� |
ITU-T Study Group 17
� |
Q3/2, ILS
� |
2015-04-20 |
|
[ 109 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T SG17 and GSMA on development of a framework to address mobile botnets
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2014-10-01 |
|
[ 108 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to WHO, UNESCO, UNICEF and ITU CWG-COP on Internet addiction
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2014-10-01 |
|
[ 107 ]
�
� |
Liaison Statement from ITU-D Study Group 2 Question 3/2 to ITU-T FG-SSC on input for draft ITU-T FG-SSC report
�
� |
Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2014-10-01 |
|
[ 97 ]
�
� |
Liste des documents d'information
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q3/2, Q2/2
� |
2014-09-11 |
|
[ 93 ]
�
+Ann.1� |
Cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2014-09-09 |
Resultats:63 documents R�sultats :�
1 -
2
�-�Suivant
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):