Contributions
[ AI/Question: Q22-1/1 ] |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 300 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T JCA-COP on activities related to child online protection
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 299 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 on Q22-1/1 contact points
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 298 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 5 on activities related to spam
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 297 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 Question 2 on Information from Rwanda
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2013-09-13 |
|
[ 288 ]
|
Gathering experiences on Child Online Protection (COP)
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-08-29 |
|
[ 282 ]
|
UK view on developing a national strategy for cybersecurity
|
United Kingdom of Great Britain and Northern Ireland
|
Q22-1/1
|
2013-08-12 |
|
[ 280 ]
|
Cyber Clean Center (CCC) project in Japan
|
Japan
|
Q22-1/1
|
2013-08-09 |
|
[ 279 ]
+Ann.1 |
Updated overview of 2013 ITU survey on measures taken to raise awareness on cybersecurity
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-08-08 |
|
[ 265 ]
|
Online-courses for children, parents and teachers on the Internet safety
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q22-1/1
|
2013-07-04 |
|
[ 262 ]
|
Compendium update and new structure
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2013-06-27 |
|
[ 252 ]
+Ann.X (Rev.1) |
Projet de rapport concernant la question 22-1/1 (Sécurisation des réseaux d'information et de communication: bonnes pratiques pour créer une culture de la cybersécurité)
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, OR
|
2013-07-16 |
|
[ 244 ]
|
Liaison Statement from ITU-T JCA-COP to ITU-D SG 1 Q22-1/1 on presentations made at the 18 April 2013 meeting of JCA-COP
|
ITU-T JCA-COP
|
Q22-1/1, LS
|
2013-06-10 |
|
[ 239 ]
|
Rapport de la réunion du Groupe du Rapporteur pour la Question 22-1/1, Genève, Suisse, 19 avril 2013
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1
|
2013-09-11 |
|
[ 227 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 Q22-1/1 on cybersecurity
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-08 |
|
[ 223 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 on providing security in the use of ICT within Critical Infrastructures
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 222 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 about a request to provide security contacts
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 221 ]
|
Liaison Statement from ITU-T SG17 to ITU-D SG1 Question 22-1/1 on draft practices to reduce spam (reply to ITU-D Q22/1 - LS 3)
|
ITU-T Study Group 17
|
Q22-1/1, LS
|
2013-05-03 |
|
[ 210 ]
|
Liaison Statement from ITU-D Study Group 1 Question 22-1/1 to ITU-T Study Group 17 (ITU-T SG17), Q5/17
|
Co-Rapporteur for Question 22-1/1
|
Q22-1/1, LS
|
2012-09-17 |
|
[ 204 ]
|
Liste des documents d'information
|
Telecommunication Development Bureau
|
QALL, Q22-1/1, Q19-2/1, Q12-3/1
|
2012-09-06 |
|
[ 203 ]
|
Prevention of cyber crime in Bangladesh
|
Bangladesh (People's Republic of)
|
Q22-1/1
|
2012-09-06 |
|
[ 201 ]
+Ann.1-3 |
Regulation of Internet Service Provision
|
Oman (Sultanate of)
|
Q22-1/1
|
2012-09-05 |
|
[ 199 ]
|
Compendium Draft
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2012-09-04 |
|
[ 196 ]
|
A research on web privacy policies in China
|
China Unicom
|
Q22-1/1
|
2012-09-01 |
|
[ 195 ]
+Ann.1 |
Draft practices to reduce spam
|
AT&T Corp.
|
Q22-1/1
|
2012-08-31 |
|
[ 193 ]
+Ann.1 |
Building a training course on building and managing a CIRT
|
United States of America
|
Q22-1/1
|
2012-08-31 |
|
[ 186 ]
|
Status of Cybersecurity Capacity Building Papers in ITU-D Q22-1/1
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-08-24 |
|
[ 179 ]
|
Amendement de la loi coréenne sur les réseaux TIC visant à renforcer le système de protection des données personnelles sur l'Internet
|
Korea (Republic of)
|
Q22-1/1
|
2012-08-10 |
|
[ 174 ]
|
Questionnaire sur les activités de sensibilisation à la cybersécurité
|
Oman (Sultanate of)
|
Q22-1/1
|
2012-08-05 |
|
[ 169 ]
|
Présentation générale du programme national de sécurité de l'information : situation actuelle
|
Rwanda (Republic of)
|
Q22-1/1
|
2012-08-01 |
|
[ 157 ]
+Ann.1 |
Système destiné à restreindre l'accès aux contenus Internet indésirables dans les établissements d'enseignement
|
Odessa National Academy of Telecommunications n.a. A.S. Popov
|
Q22-1/1
|
2012-07-09 |
|
[ 155 ]
|
Expérience de la Côte d'Ivoire en matière de cybercriminalité
|
Côte d'Ivoire (Republic of)
|
Q22-1/1
|
2012-07-10 |
|
[ 150 ]
|
Cybersécurité, recueil de textes, études de cas de pays
|
Mali (Republic of)
|
Q22-1/1
|
2012-07-06 |
|
[ 149 ]
|
Etat actuel des politiques et des actions menées par la Mongolie en matière de cybersécurité
|
Mongolia
|
Q22-1/1
|
2012-07-09 |
|
[ 148 ]
|
Le cadre juridique sénégalais et la cybersécurité
|
Senegal (Republic of)
|
Q22-1/1
|
2012-03-29 |
|
[ 147 ]
|
Bring your own device (BYOD) : opportunité ou risque ?
|
THALES Communications
|
Q22-1/1
|
2012-07-05 |
|
[ 131 ]
|
Rapport du Groupe de Rapporteur pour la Question 22-1/1, Genève, 20 avril 2012
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2012-06-04 |
|
[ 119 ]
+Ann.1-2 |
Some Key BDT Cybersecurity Activities Relevant to the Work of Q22-1/1
|
BDT Focal Point for Question 22-1/1
|
Q22-1/1
|
2011-08-30 |
|
[ 116 ]
+Ann.1 |
Cloud Computing and Security High Level Overview
|
AT&T, Inc.
|
Q22-1/1
|
2011-08-29 |
|
[ 114 ]
+Ann.1 |
Revised National Cybersecurity Management System Framework - Maturity Model Implementation Guide, further proposed edits
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-08-29 |
|
[ 113 ]
+Ann.1 |
Revised National Cybersecurity Management System: Framework - Maturity Model Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2011-08-29 |
|
[ 107 ]
|
Real Name Registration Introduced in Mobile Communication
|
China (People's Republic of)
|
Q22-1/1, Q18-2/1
|
2011-08-24 |
|
[ 102 ]
|
National Cybersecurity Management System Framework - Maturity Model Implementation Guide
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 101 ]
+Ann.1 |
Outline of a proposed course on Building a National Computer Security Incident Management Capability and Managing a National Computer Security Incident Response Team with Critical Success Factors
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 100 ]
+Ann.1 |
Best Practices for Cybersecurity: Public-Private Partnerships
|
United States of America
|
Q22-1/1
|
2011-08-23 |
|
[ 93 ]
|
Tentacles Project - a New Way to Combat Cybercrimes
|
Brazil (Federative Republic of)
|
Q22-1/1
|
2011-08-19 |
|
[ 75 ]
|
Aperçu sur la cybercriminalité envers des personnes handicapées et autres personnes sensibles
|
VIABLE France (France)
|
Q22-1/1, Q20-1/1
|
2011-07-28 |
|
[ 69 ]
|
Aperçu sur la cybercriminalité envers des personnes handicapées
|
Mali (Republic of)
|
Q22-1/1
|
2011-07-11 |
|
[ 58 ]
|
Rapport de la réunion du Groupe du Rapporteur pour la Question 22-1/1, Genève, 5-6 mai 2011
|
Rapporteur for Question 22-1/1
|
Q22-1/1
|
2011-06-08 |
|
[ 45 ]
+Ann.1 |
National cybersecurity management system: Framework - Maturity Model - Implementation Guide
|
Morocco (Kingdom of)
|
Q22-1/1
|
2010-11-03 |
|
[ 38 ]
|
Programme de travail provisoire pour la Question 22-1/1
|
Rapporteur for Question 22-1/1
|
WP, Q22-1/1
|
2010-09-20 |
Resultats:56 documents Résultats :
1 -
2
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):