Home

Results 1 - 10 of 256 for swindled. Search took 0.594 seconds.  
Sort by date/Sort by relevance
Telecommunication Development Sector Study Groups Second Meeting of ITU-D Study Group 1 Geneva, 5-9 September 2011 Document 1/75-E 5 July 2011 Original: French For action Question 20-1/1: Access to telecommunication services and information and communication technologies (ICTs) by persons with disabilities Question 22-1/1: Securing information and communication networks: best practices for developing a culture of cybersecurity SOURCE: Viable France, France TITLE: Overview of cybercrime targeting persons with disabilities and other vulnerable persons Action required: The meeting is requested to take note of this document and to bear it in mind when elaborating the guidelines Abstract Use of the Internet has enabled widespread access to new technologies which, while improving lives, has also made swindles and fraud in general an everyday issue. It is, moreover, to be noted that some segments of society are much more vulnerable to these threats, namely: · children · persons with disabilities · senior citizens · women. Focal Point: Name/organization/entity: Mr Michel René Lemaitre, Viable France, France Phone number: +33 6 68 54 93 67 Email: michel.lemaitre@ties.itu.int 1 Introduction Use of the Internet has enabled widespread access to new technologies which, while improving lives, has also made swindles and fraud in general an everyday issue. It is, moreover, to be noted that some segments of society are much more vulnerable to these threats, namely: · children · persons with disabilities · senior citizens · women. 2 European Union standpoint In response to the development of cybercrime in recent years, the European Commission has, in close cooperation with the Member States and other EU institutions, elaborated a policy on the fight against cybercrime. (...) Cybercrime and fraud/swindles The rapid evolution and changing nature of information technologies, coupled with the rapid expansion of the web over the last ten years, plus the exponential growth in the speed of data exchanges, have considerably raised the hopes of organizations/associations of paralyzed or sight-impaired/blind people.
Language:English
Score: 1519452.1 - https://www.itu.int/dms_pub/it...2E/02/T2E0200013C0001MSWE.docx
Data Source: un
Actions to combat the digital divide have enabled widespread access to new technologies, which, while improving lives, has also made swindles and fraud in general an everyday issue. However, it should be noted that some segments of society are much more vulnerable to these threats, namely: · children · persons with disabilities · senior citizens · Focal Point: Name/organization/entity: Mr Abdoulaye Dembele, Mali Telecommunication Company · Phone number: +223 6 670 2312 · Email: dembelea@yahoo.fr · women. (...) Cybercrime and fraud ("swindles") The rapid evolution and changing nature of information technologies, coupled with the rapid expansion of the web over the last 10 years, plus the exponential growth in the speed of data exchanges, have considerably raised the hopes of organizations/associations of paralysed or sight-impaired/blind people.
Language:English
Score: 1434899.7 - https://www.itu.int/dms_pub/it...2E/02/T2E020001330001MSWE.docx
Data Source: un
TWO PETITIONS FROM THE BUREAU OF THE EXECUTIVE COMMITTEE OF THE UNION DES POPULATIONS DU CAMEROUN CONCERNING THE CAMEROONS UNDER BRITISH AND THE CAMEROONS UNDER FRENCH ADMINISTRATION
We say lawfully and of right because, but for the swindles, UPC candidates would have been elected in these three constituencies. (...) The man responsible for the swindles (Dr. Endeley), who was found with a very large number of voter's cards in his possession, was not arrested. (...) It should also be emphasized that following these large-scale swindles the UPq lodged a complaint but n0 judgement in respect thereof has yet been given.
Language:English
Score: 1401038 - https://daccess-ods.un.org/acc...et?open&DS=T/PET/4&5/21&Lang=E
Data Source: ods
COMMUNICATION NO. 3313/2019 : DECISION/VIEWS
The author claims that the prison 1 The claims appear in the order presented by the author. 2 Author provides the text of the two articles: Article 274. Swindling. (Valid until 5 July 2004): Acquiring other’s property or property rights by deceit (swindling) shall be punished by a custodial sentence for a term of up to three years with or without a fine. Swindling committed […] in a group of persons who had agreed to do so in advance shall be punished by a custodial sentence for a term of up to five years with or without a fine. Article 182. Swindling. (Valid from 5 July 2004): 2. A person who, by deceit and for own benefit or for the benefit of other persons, acquires another’s property of a high value or a property right or the valuables of a considerable scientific, historical or cultural significance or avoids a property obligation of a high value or annuls it or swindles by participating in an organized group shall be punished by a custodial sentence for a term of up to eight years.
Language:English
Score: 1321906.1 - https://daccess-ods.un.org/acc...=CCPR/C/132/D/3313/2019&Lang=E
Data Source: ods
LETTER DATED 17 NOVEMBER 1980 FROM THE PERMANENT REPRESENTATIVE OF DEMOCRATIC KAMPUCHEA TO THE UNITED NATIONS ADDRESSED TO THE SECRETARY-GENERAL
III - YIFTNAMFSF IMPOSTW: In order to get financial and material aids from interna- tional humanitarian organizations, the Hanoi authorities do not hesitate to indulge in charlatanism and international swindle. The Government of Democratic Kampuchea has already denounced such a fraud as the attempt by the Vietnamese expansionists to get 15 million $ dollars in order to settle in Kampuchea the so-called "300,000 Kampuchean refugees" while the latter are in fact former Vietnamese residents in Kampuchea who left willingly Kampuchea in 1973 on the instigation of Hanoi (UN document A/35/457). Another example of swindle of the Vietnamese aggressors in Kampuchea is their request for international aids for the so- called "more than 5,500 primary schools with more than 900,000 children".
Language:English
Score: 1245187.3 - daccess-ods.un.org/acce...sf/get?open&DS=A/35/644&Lang=E
Data Source: ods
Indeed, as it witnessed the sorrow and anger of millions of brothers and sisters in the United States who had been swindled by the ruling class, Venezuela was sympathetic, having itself suffered under the untrammelled application by the International Monetary Fund (IMF) of capitalist remedies. 
Language:English
Score: 1229626 - https://www.un.org/en/ga/63/generaldebate/venezuela.shtml
Data Source: un
Microsoft PowerPoint - SGH_Sofia.ppt Culture of cybersecurity : from policies to practice ITU Regional Cybersecurity Forum for Europe and CIS Sofia, Bulgaria 07-09 October 2008 Professor Solange Ghernaouti- Hélie - University of Lausanne 2 Cybersecurity for information economy Cybersecurity culture deals with key economic, legal, and social issues related to information security in order to contribute to helping countries get prepared • to face issues and challenges linked to information and communication technologies (ICT) deployment, uses and misuses 3 A large range of issues … At the crossroads of technological, legal, sociological, economic, and political fields Cybersecurity is an interdisciplinary domain by nature Depending on the country it must reflect the vision, the culture and the civilization of a nation as well as meeting the specific security needs of the local context in which it is introduced 4 A large range of issues … Educational efforts and investments need to be made to educate and train all the members of the information society from decision makers to citizens including children and older people Specific actions should be taken at a national level to raise or build cybersecurity capacities of various members in order to be able to deal with national and international cybersecurity issues 5 Awareness is not enough Awareness is not enough to empower the end-user in a way that he or she would be able to adopt a safe and responsible behaviour when dealing with ICT technologies Specific educational programmes should be effective and available for each kind of stakeholder • policy makers, justice and police professionals, managers, information technology professionals, end-users 6 Building blocks Cybersecurity culture Effective cooperation Tr ai ni ng A w ar en es s A cc ep ta bl e pr ac tic es End-users Policy makers Justice Police Professionals Managers ICTprofessionals 7 Answering a global challenge by a local answer Any global strategy to develop a cybersecurity culture has to be adapted to local needs When developing cybersecurity culture, one of the main challenges is to identify correctly what are the global & international issues the local specific needs for a cybersecurity culture 8 Strategic answer and political will Promoting a culture of cybersecurity that will touch the entire population needs to rely upon an appropriate political vision and will and efficient private and public partnerships There are no real theories or methodologies related to: How to design, to communicate, to validate or to control the adequacy of a cybersecurity culture • Evaluating the effectiveness of cybersecurity culture, from policies and guidelines to practice, is very difficult 9 A need for private and public partnerships If the public and private sectors do not support such initiatives together as soon as possible there will be a long term negative effect on economic development and the ability to ensure the security of goods and people 10 A question of responsibility “Awareness: Participants should be aware of the need for securing information systems and networks and what can be done to enhance security” “Responsibility: All participants are responsible for the security of information systems and networks” It will also contribute to avoiding building security based on fear • Fear is a selling argument when dealing with security issues but is not always rational and does not lead to the best investments and efficiency in security 11 Basic recommendations Educate the end-user Increase public awareness to enhance users’ behaviour in respect of security Give to the end-user the tools and means required to be responsible Design an end-user-centric security model within a given technical and legal framework whereby the user can decide what is judicious based on his own resources 12 Defense in deep Education contributes to developing a layer of defence in deep security approach and is the cornerstone of the information society Education constitutes a real human capacity challenge that governments have to face 13 Human capacity building Capacity building includes Human resource development • The process of equipping individuals with the understanding, skills and access to information, knowledge and training that enable them to perform effectively Every citizen should: Understand the cyberthreats for the end-user • viruses, spam, identity theft, fraud, swindle, privacy offence, … • and their impacts Understand how to adopt a security behaviour for a safe use of ICT resources Be able to promote a cybersecurity culture based on well recognized good practices; 14 Concluding words … With the Global Cybersecurity Agenda, ITU proposes a unique framework to consider cybersecurity issues in a holistic and systemic approach, a unique model to deal with the global challenges of building confidence and security into the use of ICT that takes into consideration awareness and education issues 15 Concluding words Promoting a culture of cybersecurity contributes to building a safe and inclusive information society Considering cybersecurity education is a long term approach which is efficient for a sustainable information society Thank you for your attention Illustration : Jean-Sébastien Monzani / jsmonzani.com
Language:English
Score: 1190251.6 - https://www.itu.int/ITU-D/cyb/...lie-education-sofia-oct-08.pdf
Data Source: un
PETITION FROM LEADING COMMITTEE OF THE UNION DES POPULATIONS DU KAMERUN CONCERNING TOGOLAND UNDER FRENCH ADMINISTRATION
T/PET. 7 /L.27 8 November 1956 ORIGINAL: ENGLISH PE'l'ITION FROU LEADING COMMI'l"TEE OE' THE "UNION DJ;S POPULATIONS DU KA:MERUN11 CONCERNING TOGOLAND UNDER FRENCH .ADMINISTRATION ( Circulated in accordance with rule 85, paragraph 2 of the ~ rules of :procedure of the Trusteeship Council) KUMBA 6 NOVEMBER 1956 UNA'rIONS NEWYORK ENI.J\.RGED SESSION LEADING COMMITTE]E UNIKEMEB.UN l\.lt~TER HAVING DISCUSSED SITUATION cr;EATED TOGOLAND BY FRENCH GOVT GODJG AGAINST FREELY EXPRESSED ASPIRATION POPULATIONS CONCEBNED DISAPPROVES F.ACT THAT UNATIONS HAS FAVOURED SUCH SWINDLE CON':l.1RARY DISPOSITIONS CHARTER BY NO'J.1 CARRYING REF'ERENDlJ"M BOTH PARTS TOGOLA..J\ID SIMULT.A:NEOUSLY STOP SINCE 1955 F.ASTERN K.twJERUN POPULATIONS LIVE INSECURITY lR.ATERIALIZED BY ABSOLUTE ARBITRARY DESPITE ALL INTERVENTIONS NEAR UNATIONS ON /llID RECOJ:.iMEND.ATION LATTER STOP DRAW ACCORDINGLY AT'l~TION UNATIONS ON FRENCH MANOUVRES DESTINED CREAT TOGO SITUATION AND ASKING NEXT UNATIONS GENERAL ASSEMBLY FIND SOLUTION KAME.HUN PROBLEM CONFORM!
Language:English
Score: 1149364.4 - https://daccess-ods.un.org/acc...et?open&DS=T/PET.7/L.27&Lang=E
Data Source: ods
ILLEGAL ACTIVITIES IN THE 1993 SNA / SUBMITTED BY UNITED NATIONS STATISTICS DIVISION
Recommendation 9: The difference between the value of the illegal cash and the value of the legalized (laundered) cash should be looked upon as a provision of services. Fraud and swindle 18. Fraud often relates to false claims for social benefits or subsidies. (...) ECE/CES/GE.20/2006/9 page 12 Fraud and swindle 9.27. Fraud and swindle are quite different from the other activities mentioned above.
Language:English
Score: 1143732.1 - daccess-ods.un.org/acce...DS=ECE/CES/GE.20/2006/9&Lang=E
Data Source: ods
PETITION FROM MR. NANTON METEBE CONCERNING THE CAMEROONS UNDER FRENCH ADMINISTRATION
The supplementary orders provide for legal action to be taken against anyone disturbing the peace by swindling or defrauding another person of his property.
Language:English
Score: 1130008.7 - https://daccess-ods.un.org/acc...get?open&DS=T/PET.5/148&Lang=E
Data Source: ods