Contributions
�[�AI/Question:�Q3/2�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 225 ]
�
� |
Liaison statement from ITU-D Study Group 2 Question 3/2 to ITU-T Study Group 17 on collaboration and vulnerability of connected TVs
�
� |
Co-Rapporteurs for Question 3/2
� |
Q3/2, OLS
� |
2019-04-05 |
|
[ 218 ]
�
� |
All documents received for the second meeting of ITU-D Study Group 2
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2019-03-22 |
|
[ 217 ]
�
� |
Extracted lessons learned from contributions to ITU-D Study Group 2 Questions (Second meeting of ITU-D Study Group 2)
�
� |
Telecommunication Development Bureau
� |
QALL/2, Q7/2, Q6/2, Q5/2, Q4/2, Q3/2, Q2/2, Q1/2
� |
2019-03-22 |
|
[ 201 ]
�
� |
Survey of online activities and Internet use by children in C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-03-08 |
|
[ 199 ]
�
+Ann.1-2� |
An update on cybersecurity initiatives for Member States
�
� |
BDT Focal Point for Question 3/2
� |
Q3/2
� |
2019-03-06 |
|
[ 182 ]
�
+Ann.1� |
Liaison statement from ITU-T SG17 to ITU-D Study Group 2 Question 3/2 on Cybersecurity in Africa (overview and outlook), from Democratic Republic of Congo
�
� |
ITU-T Study Group 17
� |
Q3/2, ILS
� |
2019-02-11 |
|
[ 179 ]
�
� |
Annual progress report for Question 3/2 for March 2019 meeting
�
� |
Co-Rapporteurs for Question 3/2
� |
QALL/2, Q3/2, PR
� |
2019-02-07 |
|
[ 174 ]
�
� |
Mapping of cybercrime threats in C�te d'Ivoire
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 173 ]
�
� |
Presentation of Platform for Combatting Cybercrime (PLCC)
�
� |
C�te d'Ivoire (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 172 ]
�
� |
National and sectorial CSIRT developments as means to strengthen cybersecurity environments, 2019 update
�
� |
NRD Cyber Security (CS)
� |
Q3/2
� |
2019-02-07 |
|
[ 168 ]
�
� |
2019 Comprehensive Cybersecurity Plan for the private sector
�
� |
Korea (Republic of)
� |
Q3/2
� |
2019-02-07 |
|
[ 167 ]
�
� |
The importance of cyber threat intelligence in the definition of national cybersecurity strategies
�
� |
Symantec Corporation
� |
Q3/2
� |
2019-02-07 |
|
[ 165 ]
�
� |
Percepci�n de la ciberseguridad de los usuarios de Internet fijo y/o m�vil
�
� |
Mexico
� |
Q6/1, Q3/2
� |
2019-02-06 |
|
[ 156 ]
�
� |
Work experiences in personal information protection
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 155 ]
�
� |
Design of evaluation index for network security capability
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 154 ]
�
� |
Experience of Internet governance with the coordinated participation of the whole of society
�
� |
China (People's Republic of)
� |
Q3/2
� |
2019-02-05 |
|
[ 152 ]
�
� |
Cybersecurity in the era of the digital economy in Benin
�
� |
Benin (Republic of)
� |
Q3/2
� |
2019-02-01 |
|
[ 141 ]
�
� |
Dividende num�rique
�
� |
Chad (Republic of)
� |
Q3/2, Q2/1
� |
2019-01-15 |
|
[ 140 ]
�
� |
Vulnerability of connected TVs
�
� |
Chad (Republic of)
� |
Q3/2, Q2/1
� |
2019-01-15 |
|
[ 136 ]
�
� |
Etat de lieu de la cybers�curit� en R�publique du Tchad
�
� |
Chad (Republic of)
� |
Q3/2
� |
2019-01-15 |
Resultats:20 documents
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):