Home

Results 91 - 100 of 432,009 for correctly promote. Search took 5.206 seconds.  
Sort by date/Sort by relevance
There are wide variations between provinces when it comes to the percentage of households with correctly managed sanitation : from 29 per cent ( Ryanggang ) to 85 per cent ( Pyongyang ) . Figure 4 shows the strong correla- tion between piped sewer systems and correctly managed sanitation, while also showing the wide disparities in correctly managed sanitation between various stratifiers . Figure 4 : Correctly managed sanitation and piped sewer systems by stratifiers, 2017 MICS ( per cent ) 24 83 2 89 10 67 44 29 85 4 91 11 71 48 0 20 40 60 80 100 Worst province Best Province Bottom 20% Top 40% Rural Urban Total Correctly managed Piped sewer The disparities by WI groups are also compiled in table 5, including the ratio for best performance / worst perfor- mance .
Language:English
Score: 790588.2 - https://www.unicef.org/dprk/si....%20Data%20Mining%20Report.pdf
Data Source: un
Microsoft PowerPoint - SGH_Sofia.ppt Culture of cybersecurity : from policies to practice ITU Regional Cybersecurity Forum for Europe and CIS Sofia, Bulgaria 07-09 October 2008 Professor Solange Ghernaouti- Hélie - University of Lausanne 2 Cybersecurity for information economy Cybersecurity culture deals with key economic, legal, and social issues related to information security in order to contribute to helping countries get prepared • to face issues and challenges linked to information and communication technologies (ICT) deployment, uses and misuses 3 A large range of issues … At the crossroads of technological, legal, sociological, economic, and political fields Cybersecurity is an interdisciplinary domain by nature Depending on the country it must reflect the vision, the culture and the civilization of a nation as well as meeting the specific security needs of the local context in which it is introduced 4 A large range of issues … Educational efforts and investments need to be made to educate and train all the members of the information society from decision makers to citizens including children and older people Specific actions should be taken at a national level to raise or build cybersecurity capacities of various members in order to be able to deal with national and international cybersecurity issues 5 Awareness is not enough Awareness is not enough to empower the end-user in a way that he or she would be able to adopt a safe and responsible behaviour when dealing with ICT technologies Specific educational programmes should be effective and available for each kind of stakeholder • policy makers, justice and police professionals, managers, information technology professionals, end-users 6 Building blocks Cybersecurity culture Effective cooperation Tr ai ni ng A w ar en es s A cc ep ta bl e pr ac tic es End-users Policy makers Justice Police Professionals Managers ICTprofessionals 7 Answering a global challenge by a local answer Any global strategy to develop a cybersecurity culture has to be adapted to local needs When developing cybersecurity culture, one of the main challenges is to identify correctly what are the global & international issues the local specific needs for a cybersecurity culture 8 Strategic answer and political will Promoting a culture of cybersecurity that will touch the entire population needs to rely upon an appropriate political vision and will and efficient private and public partnerships There are no real theories or methodologies related to: How to design, to communicate, to validate or to control the adequacy of a cybersecurity culture • Evaluating the effectiveness of cybersecurity culture, from policies and guidelines to practice, is very difficult 9 A need for private and public partnerships If the public and private sectors do not support such initiatives together as soon as possible there will be a long term negative effect on economic development and the ability to ensure the security of goods and people 10 A question of responsibility “Awareness: Participants should be aware of the need for securing information systems and networks and what can be done to enhance security” “Responsibility: All participants are responsible for the security of information systems and networks” It will also contribute to avoiding building security based on fear • Fear is a selling argument when dealing with security issues but is not always rational and does not lead to the best investments and efficiency in security 11 Basic recommendations Educate the end-user Increase public awareness to enhance users’ behaviour in respect of security Give to the end-user the tools and means required to be responsible Design an end-user-centric security model within a given technical and legal framework whereby the user can decide what is judicious based on his own resources 12 Defense in deep Education contributes to developing a layer of defence in deep security approach and is the cornerstone of the information society Education constitutes a real human capacity challenge that governments have to face 13 Human capacity building Capacity building includes Human resource development • The process of equipping individuals with the understanding, skills and access to information, knowledge and training that enable them to perform effectively Every citizen should: Understand the cyberthreats for the end-user • viruses, spam, identity theft, fraud, swindle, privacy offence, … • and their impacts Understand how to adopt a security behaviour for a safe use of ICT resources Be able to promote a cybersecurity culture based on well recognized good practices; 14 Concluding words … With the Global Cybersecurity Agenda, ITU proposes a unique framework to consider cybersecurity issues in a holistic and systemic approach, a unique model to deal with the global challenges of building confidence and security into the use of ICT that takes into consideration awareness and education issues 15 Concluding words Promoting a culture of cybersecurity contributes to building a safe and inclusive information society Considering cybersecurity education is a long term approach which is efficient for a sustainable information society Thank you for your attention Illustration : Jean-Sébastien Monzani / jsmonzani.com
Language:English
Score: 790260.9 - https://www.itu.int/ITU-D/cyb/...lie-education-sofia-oct-08.pdf
Data Source: un
For more than twenty years Sachs has been in the forefront of the challenges of economic development, poverty alleviation and enlightened globalization, promoting policies to help all parts of the world to benefit from expanding economic opportunities and wellbeing. He is also one of the leading voices for combining economic development with environmental sustainability, and as Director of the Earth Institute leads large-scale efforts to promote the mitigation of human-induced climate change. (...) He joined the Harvard faculty as an Assistant Professor in 1980, and was promoted to Associate Professor in 1982 and Full Professor in 1983.
Language:English
Score: 790260.9 - https://www.un.org/millenniumg...es/members/jeffrey-sachs.shtml
Data Source: un
We must work with partners to overcome them as good, solid information it the bedrock of our programme, to make sure we are targeting correctly, using resources efficiently and ensuring that no child is left behind.   (...) We use a variety of strategies such as advocacy with policy makers and opinion formers, capacity development, providing technical assistance, sharing good practices and innovations, resource mobilisation, new approaches to data collection and promoting stronger child rights monitoring in national and regional plans.
Language:English
Score: 787814.75 - https://www.unicef.org/eastern...ibbean/child-rights-monitoring
Data Source: un
“Achieving reconciliation through recognition of facts and admission of guilt” | International Criminal Tribunal for the former Yugoslavia Skip to main content United Nations | International Residual Mechanism for Criminal Tribunals IRMCT About the Mechanism Cases English Français bosanski, hrvatski ili srpski Shqip Македонски Legacy website of the ICTY | TPIY | MKSJ United Nations International Criminal Tribunal for the former Yugoslavia Toggle navigation About the ICTY Cases Documents Press Outreach Features × Legacy website of the International Criminal Tribunal for the former Yugoslavia Since the ICTY’s closure on 31 December 2017, the Mechanism maintains this website as part of its mission to preserve and promote the legacy of the UN International Criminal Tribunals.   (...) The importance of facing the past for young generations was also underlined by another student from Srebrenik, who stressed that “ correctly educating young people about the war and lessons from the past ” is of crucial importance.
Language:English
Score: 787814.75 - https://www.icty.org/en/node/10165
Data Source: un
 MDG Advocacy Group Skip to main navigation Skip to content 404 | United Nations Skip to main content Toggle navigation Welcome to the United Nations العربية 中文 English Français हिन्दी Português Русский Español Kiswahili Peace, dignity and equality on a healthy planet Toggle navigation About Us » Member States Main Bodies Secretary-General Secretariat UN System History Emblem and Flag UN Charter UDHR ICJ Statute Nobel Peace Prize Our Work » Peace and Security Human Rights Humanitarian Aid Sustainable Development and Climate Action International Law Global Issues Documents Official Languages Observances Events and News Get Involved Coronavirus (COVID-19)   Please check the URL to make sure you entered it correctly. You can also use our search or visit the  UN Home page . (...) Ambani Stine Bosse Ray Chambers Dho Young-shim Philippe Douste-Blazy Julio Frenk Bob Geldof Wangari Maathai Graça Machel Jeffrey Sachs Marina Silva Ted Turner Wang Yingfan Hiromasa Yonekura Muhammad Yunus Former members Michelle Bachelet Jan Eliasson Bill Gates Julia Gillard José Luis Rodríguez Zapatero Background Thematic clusters Action Plan Events 500 Days of Action on MDGs Humans of New York partnership G7 Open Letter Africa Rising trip, July 2014 Programme Davos Davos 2014 Bulletins MDG Leaders Media Links Contact Dho Young-shim Dho Young-shim, Chairperson of the UN World Tourism Organization’s Sustainable Tourism for Eliminating Poverty (ST-EP) Foundation (Republic of Korea) Ambassador Dho promotes tourism, sports and education to fight poverty in the world’s least developed countries.
Language:English
Score: 787814.75 - https://www.un.org/millenniumg...s/members/dho-young-shim.shtml
Data Source: un
“Achieving reconciliation through recognition of facts and admission of guilt” | International Criminal Tribunal for the former Yugoslavia Skip to main content United Nations | International Residual Mechanism for Criminal Tribunals IRMCT About the Mechanism Cases English Français bosanski, hrvatski ili srpski Shqip Македонски Legacy website of the ICTY | TPIY | MKSJ United Nations International Criminal Tribunal for the former Yugoslavia Toggle navigation About the ICTY Cases Documents Press Outreach Features × Legacy website of the International Criminal Tribunal for the former Yugoslavia Since the ICTY’s closure on 31 December 2017, the Mechanism maintains this website as part of its mission to preserve and promote the legacy of the UN International Criminal Tribunals.   (...) The importance of facing the past for young generations was also underlined by another student from Srebrenik, who stressed that “ correctly educating young people about the war and lessons from the past ” is of crucial importance.
Language:English
Score: 787814.75 - https://www.icty.org/en/outrea...s-and-admission-guilt%E2%80%9D
Data Source: un
Trade-driven growth, without effective policies in place, can lead to environmental degradation, but — harnessed correctly — can be tool for environmental solutions. (...) Their pitches will be promoted on the WTO website and social media channels.
Language:English
Score: 787814.75 - https://www.wto.org/english/tr...e/entrepreneur_challenge_e.htm
Data Source: un
Section 13.4.1 (Capability values to be transmitted) and 13.4.3 (Restricted mode transmitted) of H.242 correctly describe the use of a [restrict_required] capability and a [restrict] command as following: … An endpoint which can only send and receive restricted signals shall include {Restrict_Required} in its capset; … An endpoint already transmitting a restricted mode shall include the command [restrict] in all repetitive transmissions of valid commands in force. (...) The solution is to simply swap the command and with the cap to become: (010)[27] Restrict (100)[22] Restrict_required The text in section A.3 correctly describes the [restrict] command, but the text in section A.7 needs to be changed from [restrict] to [restrict_required].
Language:English
Score: 787274 - https://www.itu.int/wftp3/av-a...-2000/0008_Portland/q11m06.doc
Data Source: un
This means that not all of the functions of this training course will run correctly on your machine. You will not be able to participate in the quiz at the end of each section. (...) Also the “Chapters done” indicator at the bottom of each page will not correctly reflect which sections you have visited.      
Language:English
Score: 787274 - https://www.wto.org/english/th...cc_e/cbt_course_e/signin_e.htm
Data Source: un