Home

Results 1 - 10 of 499,808 for cultural connection. Search took 10.226 seconds.  
Sort by date/Sort by relevance
Microsoft PowerPoint - sund-promoting-a-culture-of-cybersecurity-sofia-oct-08-SLIDES.ppt International Telecommunication Union Promoting a Culture of Promoting a Culture of CybersecurityCybersecurity ITU Regional Cybersecurity Forum for Europe and the Commonwealth of Independent States (CIS) 7-9 October 2008 Sofia, Bulgaria Christine Sund ICT Applications and Cybersecurity Division Telecommunication Development Bureau International Telecommunication Union 27 October 2008 Committed to Connecting the World Introduction to Promoting a Culture of Cybersecurity Societies are increasingly dependent on information and communication networks that span the globe Continuing changes in the use of ICT, systems networks, and the entire IT environment: Increasingly powerful PCs Converging technologies Widespread use of the Internet have replaced what were modest, stand-alone systems in predominantly closed networks Change in the way information is exchanged Increasing interconnectivity To address these threats, protect infrastructures and promote a culture of security, each country needs a comprehensive national action plan that addresses the related technical, legal and policy issues, combined with regional and international cooperation. 37 October 2008 Committed to Connecting the World Nature and Scope of Cybersecurity Around the World Countries see cybersecurity as: a technical, network or information technology issue, or a developmental issue because ICT services need secure and reliable networks, or an economic issue relating to maintaining business continuity or economic advantage, or a law and enforcement issue to deal with cybercrime and criminalizing the misuse of ICTs, or a national security issue relating to critical information infrastructure protection (CIIP). (...) All stakeholder groups have a role to play in promoting a global culture of cybersecurity. 47 October 2008 Committed to Connecting the World Promoting a Culture of Cybersecurity Resolution 57/239, Creation of a global culture of cybersecurity Resolution 58/199, Creation of a global culture of cybersecurity and the protection of critical information infrastructures Promote a culture of cybersecurity consistent with UNGA Resolutions: 57 October 2008 Committed to Connecting the World UN Resolutions (57/239 & 58/199) Related to a “Culture of Security” UN Resolution 57/239 (2002) on the “Creation of a global culture of cybersecurity” Identifies nine elements for creating a global culture of cybersecurity: a) Awareness b) Responsibility c) Response d) Ethics e) Democracy f) Risk Assessment g) Security Design and Implementation h) Security Management i) Reassessment 67 October 2008 Committed to Connecting the World a) Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security; b) Responsibility: Participants are responsible for the security of information systems and networks in a manner appropriate to their individual roles. (...) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 187 October 2008 Committed to Connecting the World Focus Areas in OECD Countries Areas of high attention: Combating cybercrime Creating National CERTs/CSIRTs (Computer Emergency Response Teams/Computer Security Incident Response Teams) Engaging in cyber- security awareness raising activities Fostering education Areas with less attention: Research and development Evaluation and assessment Outreach to small and medium sized enterprises (SMEs) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 197 October 2008 Committed to Connecting the World We Need a Paradigm Shift The application and use of ICTs in business and societal interactions requires a change in culture: Privacy, protection of personal data, information, protection of children, etc. other drivers to help in the effort.
Language:English
Score: 750331.45 - https://www.itu.int/ITU-D/cyb/...cybersecurity-sofia-oct-08.pdf
Data Source: un
Microsoft PowerPoint - SLIDES-sund-promoting-a-culture-of-cybersecurity-brisbane-july-08.ppt International Telecommunication Union Promoting a Culture of Promoting a Culture of CybersecurityCybersecurity ITU Regional Cybersecurity Forum for Asia-Pacific 15-18 July 2008 Brisbane, Australia Christine Sund ICT Applications and Cybersecurity Division Telecommunication Development Bureau International Telecommunication Union 216 July 2008 Committed to Connecting the World Introduction to Promoting a Culture of Cybersecurity Societies are increasingly dependent on information and communication networks that span the globe Continuing changes in the use of ICT, systems networks, and the entire IT environment: Increasingly powerful PCs Converging technologies Widespread use of the Internet have replaced what were modest, stand-alone systems in predominantly closed networks Change in the way information is exchanged Increasing interconnectivity To address these threats, protect infrastructures and promote a culture of security, each country needs a comprehensive national action plan that addresses the related technical, legal and policy issues, combined with regional and international cooperation. 316 July 2008 Committed to Connecting the World Nature and Scope of Cybersecurity Around the World Countries see cybersecurity as: a technical, network or information technology issue, or a developmental issue because ICT services need secure and reliable networks, or an economic issue relating to maintaining business continuity or economic advantage, or a law and enforcement issue to deal with cybercrime and criminalizing the misuse of ICTs, or a national security issue relating to critical information infrastructure protection (CIIP). (...) All stakeholder groups have a role to play in promoting a global culture of cybersecurity. 416 July 2008 Committed to Connecting the World Promoting a Culture of Cybersecurity Resolution 57/239, Creation of a global culture of cybersecurity Resolution 58/199, Creation of a global culture of cybersecurity and the protection of critical information infrastructures Promote a culture of cybersecurity consistent with UNGA Resolutions: 516 July 2008 Committed to Connecting the World UN Resolutions (57/239 & 58/199) Related to a “Culture of Security” UN Resolution 57/239 (2002) on the “Creation of a global culture of cybersecurity” Identifies nine elements for creating a global culture of cybersecurity: a) Awareness b) Responsibility c) Response d) Ethics e) Democracy f) Risk Assessment g) Security Design and Implementation h) Security Management i) Reassessment 616 July 2008 Committed to Connecting the World a) Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security; b) Responsibility: Participants are responsible for the security of information systems and networks in a manner appropriate to their individual roles. (...) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 1816 July 2008 Committed to Connecting the World Focus Areas in OECD Countries Areas of high attention: Combating cybercrime Creating National CERTs/CSIRTs (Computer Emergency Response Teams/Computer Security Incident Response Teams) Engaging in cyber- security awareness raising activities Fostering education Areas with less attention: Research and development Evaluation and assessment Outreach to small and medium sized enterprises (SMEs) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 1916 July 2008 Committed to Connecting the World We Need a Paradigm Shift The application and use of ICTs in business and societal interactions requires a change in culture: Privacy, protection of personal data, information, etc. other drivers to help in the effort.
Language:English
Score: 749941.3 - https://www.itu.int/ITU-D/cyb/...rsecurity-brisbane-july-08.pdf
Data Source: un
All stakeholder groups have a role to play in promoting a global culture of cybersecurity. 425 August 2008 Committed to Connecting the World Promoting a Culture of Cybersecurity Resolution 57/239, Creation of a global culture of cybersecurity Resolution 58/199, Creation of a global culture of cybersecurity and the protection of critical information infrastructures Promote a culture of cybersecurity consistent with UNGA Resolutions: 525 August 2008 Committed to Connecting the World UN Resolutions (57/239 & 58/199) Related to a “Culture of Security” UN Resolution 57/239 (2002) on the “Creation of a global culture of cybersecurity” Identifies nine elements for creating a global culture of cybersecurity: a) Awareness b) Responsibility c) Response d) Ethics e) Democracy f) Risk Assessment g) Security Design and Implementation h) Security Management i) Reassessment 625 August 2008 Committed to Connecting the World a) Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security; b) Responsibility: Participants are responsible for the security of information systems and networks in a manner appropriate to their individual roles. (...) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 1825 August 2008 Committed to Connecting the World Focus Areas in OECD Countries Areas of high attention: Combating cybercrime Creating National CERTs/CSIRTs (Computer Emergency Response Teams/Computer Security Incident Response Teams) Engaging in cyber- security awareness raising activities Fostering education Areas with less attention: Research and development Evaluation and assessment Outreach to small and medium sized enterprises (SMEs) Source: OECD 2005 Survey on Practical Initiatives to Promote a Culture of Security 1925 August 2008 Committed to Connecting the World We Need a Paradigm Shift The application and use of ICTs in business and societal interactions requires a change in culture: Privacy, protection of personal data, information, etc. other drivers to help in the effort. (...) For additional information do not hesitate to contact me at: christine.sund(at)itu.int Promoting a Culture of Cybersecurity Introduction to Promoting a Culture of Cybersecurity Nature and Scope of Cybersecurity Around the World Slide Number 4 UN Resolutions (57/239 & 58/199) Related to a “Culture of Security” UN Resolution (57/239) Elements for Creating a Culture of Security UN Resolution (57/239) Elements for Creating a Culture of Security UN Resolution (57/239) Elements for Creating a Culture of Security UN Resolutions (57/239 & 58/199) Related to a Culture of Security WSIS and Promoting a Global Culture of Cybersecurity Slide Number 11 The Role of Government The Role of the Private Sectorand Industry The Role of Individuals, Civil Society and Academia Slide Number 15 Slide Number 16 Commonalities in Cybersecurity Approaches Taken by Countries Focus Areas in OECD Countries We Need a Paradigm Shift Role of Education and Training No matter what steps individual countries might take to safeguard their own critical information infrastructures and foster a culture of cybersecurity, None of us will be secure until the least secure among us has addressed the issue.
Language:English
Score: 747422.4 - https://www.itu.int/ITU-D/cyb/...ybersecurity-lusaka-aug-08.pdf
Data Source: un
Key Factors for Sustainability in Tourism 24.11.2014 Seite 5 Page 5 Different types of tourism (Eco-/Cultural/ Package/Individual/Beach/ All -Inclusive/MICE/Rural/ Urban etc.) (...) Eco & Climate Footprint Social Footprint Cultural Footprint Investment Economic Benefits (Business Profits & Stakeholder share) Social Benefits Environmental Benefits Cultural Benefits http://de.wikipedia.org/w/index.php? (...) Integrated approach for sustainable tourism: Montenegro 3. Cultural heritage, urban development and tourism: Shibam/Yemen 4.
Language:English
Score: 741874.4 - https://sdgs.un.org/sites/defa.../statements/12094Lengefeld.pdf
Data Source: un
The full text of each action line is available at www.itu.int/wsis/PoA .   1) The role of governments and all stakeholders in the promotion of ICTs for development • Cooperation among stakeholders  •  Millennium Declaration •  Mainstreaming ICTs • Multi Stakeholder Partnership (MSP) • Multi-stakeholder portals for indigenous peoples • National e-strategies  • Public/Private Partnerships (PPP). 2) Information and communication infrastructure: an essential foundation for an inclusive information society • Access  • Accessibility  • Affordability  • Assistive technologies  • Broadband network infrastructure • Digital inclusion  • Enabling and competitive environment  • ICT backbone  • ICT connectivity  • ICT equipment • ICT services  • Infrastructure  • Internet exchange points  • Investment • Satellite  • Traditional media • Remote and marginalized areas  • Ubiquitous computing/communications • Universal access/service • Wireless. 3) Access to information and knowledge • Access to public official information  • Access to scientific knowledge  • Digital public libraries and archives • ICTs for all  • Multi-purpose community public access points  • Open source, proprietary and free software  •  Public access to information  • Public domain information. 4) Capacity building • Basic literacy  • Distance learning  • Education/training  • E-literacy  • Gender  • Combating illiteracy  • Life-long learning  • Research and development (R&D)  • Self-learning  • Teacher training  • Training ICT professionals  • Volunteering • Youth 5) Building confidence and security in the use of ICTs • Authentication  • Building confidence and security • Consumer protection  • Countering misuse of ICTs  • Countering spam • Cyber-crime, •  Cyber-security  • Data protection  • Information security and network security  • Network integrity  • Online transaction security  • Privacy  •  Real-time incident-handling and response • Secure and reliable applications. 6) Enabling environment • Consumer protection  • Dispute settlement  • Domain name management  • E-commerce  • E-government strategy  •  Entrepreneurship  • ICT forums  • Intellectual property  •  Internet governance  •  Legal, regulatory and policy environment  • Privacy  •  Radio frequency spectrum  • Regional root servers  •  Secure storage and archival  • Small and medium sized enterprises (SMEs)  • Standardization  7) ICT applications: benefits in all aspects of life • Disaster recovery  •  E-applications  • E-agriculture  • E-business  •  E-commerce  •  E-employment  • E-environment • E-government  • E-health  • E-publishing  • E-science  •  ICT waste disposal  • Sustainable production and consumption  • Teleworking  • Transparency. 8) Cultural diversity and identity, linguistic diversity and local content • Cultural diversity  • Cultural exchange and information  • Cultural heritage  • Cultural industry  • Cultural policy  • Digital archive  • Disadvantaged and vulnerable groups  • Indigenous peoples  • Internationalized domain names  • Language-related ICT tools  • Linguistic diversity  •  Local languages  •  Traditional knowledge. 9) Media • Combatting illegal and harmful content in the media • Diversity of media ownership  • Gender portrayal in the media  • Media independence and pluralism  • Reducing international imbalances  • Role of media in the Information Society  • Traditional media • Training of media professionals  . 10) Ethical dimensions the Information Society • Common good  • Ethics  • Human rights  • Preventing abusive uses of ICTs  • Values. 11) International and regional cooperation • Financing of ICT networks and services • Infrastructure development projects  •  International mechanisms • Progress evaluation  • Regional action plan  • UN global compact. 12) Achieving the WSIS targets (Plan of Action, Section B) • To connect villages with ICTs and establish community access points; • To connect universities, colleges, secondary schools and primary schools with ICTs; • To connect scientific and research centres with ICTs; • To connect public libraries, cultural centres, museums, post offices and archives with ICTs; • To connect health centres and hospitals with ICTs; • To connect all local and central government departments and establish websites and email addresses; • To adapt all primary and secondary school curricula to meet the challenges of the Information Society, taking into account national circumstances • To ensure that all of the world's population have access to television and radio services; • To encourage the development of content and to put in place technical conditions in order to facilitate the presence and use of all world languages on the Internet; • To ensure that more than half the world’s inhabitants have access to ICTs within their reach. 13) Digital solidarity agenda (Plan of Action, Section D) • Debt burden  • Digital divide  • Digital solidarity fund  • Financing mechanisms  • Monterrey Consensus • National e-strategies  • Poverty reduction strategies  • Technology transfer 14) Follow-up and evaluation (Plan of Action, Section E) • Benchmarking  • Community connectivity indicators • Gender-specific indicators  • ICT Development Index • Information Society indicators • International performance evaluation  • Monitoring the digital divide • Statistics • Success stories 15) Towards WSIS Phase 2 (Tunis) (Plan of Action, Section F) • Elaboration of final appropriate documents • Partnerships among stakeholders  • Preparatory process  • Stocktaking • Task Force on Financial Mechanisms  • Working Group on Internet Governance
Language:English
Score: 720655.96 - https://www.itu.int/net/wsis/s...ktaking/help-action-lines.html
Data Source: un
The contributions migrants have made to Australian society, culture and economic development have shaped our nation. The language skills, cultural knowledge, business networks and knowledge about foreign markets migrants bring have been invaluable to our development. (...) Mr President In an increasingly connected world, the global effects of migration need not be considered only in zero-sum national terms.
Language:English
Score: 718762.35 - https://www.un.org/development...2013_cpd46_australia_item4.pdf
Data Source: un
Conflict Zones Risk Information ICAO / Meetings & Events / ICAO Security Culture Webinar / Registration Information ICAO Security Culture Webinar Programme Registration Information Currently selected Registration for Security Culture Webinar ICAO Security Culture Website Speaker Biographies Media Accreditation Other Events Contact us Registration Information   Resume Page Content ​ Please note that Registration for the virtual ICAO Security Culture Webinar is now open.   (...) Registered participants will receive connection details from  Webinar@icao.int   closer to the event date. Once you click on the connection link, you will be requested to log in to your Zoom account, and then use the connection password provided by ICAO to join the event.
Language:English
Score: 717925 - https://www.icao.int/Meetings/.../Registration-Information.aspx
Data Source: un
Cybersecurity and Critical Information Infrastructure Protection (CIIP) is a SHARED responsibility All “participants” must be involved Appropriate to their roles October 2008 Committed to Connecting the World 5 Participants “Participants” responsible for cybersecurity: “Government, business, other organizations, and individual users who develop, own, provide, manage, service and use information systems and networks” – From “UNGA Resolution 57/239 Creation of a global culture of cybersecurity” October 2008 Committed to Connecting the World 66 National Strategy Public- Private Collaboration Deterring Cybercrime Incident Management Capabilities Culture of Cybersecurity Elements of National Approach October 2008 Committed to Connecting the World 7 Action Requirements For each of these five elements: POLICY: to guide national efforts GOALS: to implement the policy SPECIFIC STEPS: to achieve goals October 2008 Committed to Connecting the World 8international telecommunication union October 2008 Committed to Connecting the World 9 Implementing the National Approach Actions required of Government Collaboration among participants October 2008 Committed to Connecting the World 10 Actions for Government Provide leadership, guidance and coordination Identify lead persons and institutions Develop CSIRT with national responsibility Identify cooperative arrangements and mechanisms among all participants Identify international counterparts and relationships Identify experts Establish integrated risk management process Assess and periodically reassess cybersecurity Identify training requirements October 2008 Committed to Connecting the World 11 ITU National Cybersecurity/CIIP Self–Assessment Tool Intended to assist national authorities review their domestic situation in context of policies, goals and actions identified in National Approach http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html October 2008 Committed to Connecting the World 12 National Cybersecurity/CIIP Self–Assessment Focused at national management and policy level Intended to assist national governments: Understand existing national approach Develop “baseline” report on best practices Identify areas for attention Prioritize national efforts October 2008 Committed to Connecting the World 13 Considerations for Using Self-Assessment No nation starting at ZERO No “right” answer or approach Continual review and revision needed All “participants” must be involved appropriate to their roles October 2008 Committed to Connecting the World 14 The Self-Assessment Examines each Element at management and policy level: National Strategy Public-Private Sector Collaboration Deterring Cybercrime National Incident Management Capabilities Culture of Cybersecurity October 2008 Committed to Connecting the World 15 The Self-Assessment Looks at organizational issues for each Element: The people The institutions The relationships The policies The procedures The budget and resources October 2008 Committed to Connecting the World 16 The Self-Assessment Identifies issues and poses questions: What Actions have been taken? (...) October 2008 Committed to Connecting the World 18 National Approach to Cybersecurity What are the next steps for your nation? (...) October 2008 Committed to Connecting the World 19 International Telecommunication Union Committed to connecting the world
Language:English
Score: 711422.5 - https://www.itu.int/ITU-D/cyb/...w-of-approach-sofia-oct-08.pdf
Data Source: un
Beyond the Columbian Exchange: Culinary Cultural Connections in the Black Atlantic Between Africa and the Americas Beyond the Columbian Exchange: Culinary Cultural Connections in the Black Atlantic Scott Alves Barton- March 27, 2012 1 Beyond the Columbian Exchange: Culinary Cultural Connections in the Black Atlantic ―Now you’re eating slave food! (...) Evidence is on the plate and in the hands Beyond the Columbian Exchange: Culinary Cultural Connections in the Black Atlantic Scott Alves Barton- March 27, 2012 2 of the cook1. (...) Beyond the Columbian Exchange: Culinary Cultural Connections in the Black Atlantic Scott Alves Barton- March 27, 2012 6 Hess, K., & Stoney, S.
Language:English
Score: 710700.4 - https://www.un.org/en/events/s...df/Scott%20Barton%20speech.pdf
Data Source: un
Cybersecurity/Critical Information Infrastructure Protection (CIIP) is a SHARED responsibility All “participants” must be involved Appropriate to their roles July 2008 Committed to Connecting the World 4 Participants “Participants” responsible for cybersecurity: “Government, business, other organizations, and individual users who develop, own, provide, manage, service and use information systems and networks” – From “UNGA Resolution 57/239 Creation of a global culture of cybersecurity” July 2008 Committed to Connecting the World 55 National Strategy Government Industry Collaboration Deterring Cybercrime Incident Management Capabilities Culture of Cybersecurity ITU Cybersecurity Framework for National Action July 2008 Committed to Connecting the World 6 Framework for Action For each of these five elements, the Framework recommends: POLICY: to guide national efforts GOALS: to implement the policy SPECIFIC STEPS: to achieve goals July 2008 Committed to Connecting the World 7international telecommunication union July 2008 Committed to Connecting the World 8 Implementing the Framework Nationally Actions by Government Collaboration by other participants July 2008 Committed to Connecting the World 9 Government Actions Provide leadership, guidance and coordination Identify lead persons and institutions Develop CSIRT with national responsibility Identify cooperative arrangements and mechanisms among all participants Identify international counterparts and relationships Identify experts Establish integrated risk management process Assess and periodically reassess cybersecurity Identify training requirements July 2008 Committed to Connecting the World 10 ITU National Cybersecurity/CIIP Self–Assessment Toolkit Intended to assist national authorities to review their domestic situation related to goals and actions identified in: UN Resolutions 55/63 (2000) and 56/121 (2001): Combating the Criminal Misuse of Information Technologies Council of Europe’s Convention on Cybercrime (2001) Adapted from work in APEC-TEL http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html July 2008 Committed to Connecting the World 11 ITU Self–Assessment Toolkit Based on Best Practices document Focus: national management and policy level Intended to assist national governments: Understand existing national approach Develop “baseline” re Best Practices Identify areas for attention Prioritize national efforts July 2008 Committed to Connecting the World 12 Considerations No nation starting at ZERO No “right” answer or approach Continual review and revision needed All “participants” must be involved appropriate to their roles July 2008 Committed to Connecting the World 13 The Self-Assessment Toolkit Examines each element of Framework at management and policy level: National Strategy Government - Industry Collaboration Deterring Cybercrime National Incident Management Capabilities Culture of Cybersecurity July 2008 Committed to Connecting the World 14 The Self-Assessment Toolkit Looks at organizational issues for each element of Framework: The people The institutions The relationships The policies The procedures The budget and resources July 2008 Committed to Connecting the World 15 The Self-Assessment Toolkit Identifies issues and poses questions: What Actions have been taken? (...) July 2008 Committed to Connecting the World 17 Next Steps What are the next steps for your nation? (...) July 2008 Committed to Connecting the World 18 International Telecommunication Union Committed to connecting the world
Language:English
Score: 710662.9 - https://www.itu.int/ITU-D/cyb/...t-toolkit-brisbane-july-08.pdf
Data Source: un