-
One Pokémon to Rule Them All
-
by
Nishant Shah
—
published
Jul 25, 2016
—
filed under:
Internet Governance
America’s head start on the augmented reality game Pokémon Go shows that the interweb is not an egalitarian space.
Located in
Internet Governance
/
Blog
-
IPv6: The Transition Challenge
-
by
Nishant Shah
—
published
Jun 05, 2012
—
last modified
Jun 13, 2012 09:59 AM
—
filed under:
Internet Governance
The future of our connected networks is Internet Protocol version 6 (IPv6). Not only is it more efficient and faster than IPv4 which we are currently working with, it is also more reliable and secure.
Located in
Internet Governance
-
IPv6: Embrace The Change
-
by
Nishant Shah
—
published
Jun 11, 2012
—
last modified
Jun 13, 2012 06:09 AM
—
filed under:
Internet Governance
A moment of transition is always filled with anxiety. There is concern over the unknown and there is a reluctance to move out of the familiar. However, a transition does not necessarily mean migration; or in other words, as we transition to IPv6 as the new protocol for digital and electronic communication, it does not mean that we are going to abandon the internet as we know it.
Located in
Internet Governance
-
Digital Native: The bigger picture
-
by
Nishant Shah
—
published
Jul 01, 2018
—
last modified
Aug 01, 2018 12:11 AM
—
filed under:
Researchers at Work,
Internet Governance,
Digital Natives
For all our sleek machines, we are slaves to the much larger Internet of Things.
Located in
RAW
-
Digital Native: How smart cities can make criminals out of denizens
-
by
Nishant Shah
—
published
Jul 15, 2018
—
last modified
Aug 01, 2018 12:19 AM
—
filed under:
Researchers at Work,
Internet Governance,
Digital Natives
People download information and share it without knowing about the intellectual property rights. On social media bullying, harassment and hate speech find easy avenues.
Located in
RAW
-
We Are All Cyborgs
-
by
Nishant Shah
—
published
May 24, 2012
—
last modified
Apr 24, 2015 12:00 PM
—
filed under:
Cyborgs,
Researchers at Work,
Digital Natives
The cyborg reminds us that who we are as human beings is very closely linked with the technologies we use.
Located in
Digital Natives
-
The Digital Classroom: Social Justice and Pedagogy
-
by
Nishant Shah
—
published
Dec 23, 2011
—
last modified
May 08, 2015 12:36 PM
—
filed under:
Higher Education,
Access to Knowledge,
Digital Natives,
Featured,
New Pedagogies,
Researchers at Work,
Digital Pluralism
What happens when we look at the classroom as a space of social justice? What are the ways in which students can be engaged in learning beyond rote memorisation? What innovative methods can be evolved to make students stakeholders in their learning process? These were some of the questions that were thrown up and discussed at the 2 day Faculty Training workshop for participant from colleges included in the Pathways to Higher Education programme, supported by Ford Foundation and collaboratively executed by the Higher Education Innovation and Research Application and the Centre for Internet and Society, Bangalore.
Located in
Digital Natives
/
Pathways to Higher Education
-
So Much to Lose
-
by
Nishant Shah
—
published
Dec 02, 2012
—
last modified
Dec 07, 2012 04:39 PM
—
filed under:
Social Media,
Freedom of Speech and Expression,
Public Accountability,
Internet Governance,
Censorship
Unless you have been hiding under a rock, you have been a witness to the maelstrom of events that accompanied the death of the political leader Bal Thackeray.
Located in
Internet Governance
/
Blog
-
Staying silent about cyberbullying is no longer an option
-
by
Nishant Shah
—
published
Jun 16, 2019
—
last modified
Jul 02, 2019 03:52 AM
—
filed under:
Researchers at Work
Cyberbullying is the dangerous new normal.
Located in
RAW
-
Digital Native: On mute, the Voice of the People
-
by
Nishant Shah
—
published
Jun 24, 2017
—
last modified
Jul 05, 2017 05:04 PM
—
filed under:
Researchers at Work,
Digital Natives
We are at the mercy of trigger-happy governments and profit-hungry corporations that hold our digital lives ransom. They have the capacity to censor, contain, control and eradicate all our digital data without our consent and without repercussions.
Located in
RAW