Centre for Internet & Society

Search results for open access

RSS Subscribe to an always-updated RSS feed.

1882 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
The Role of ICT in Judicial Reform- An Exploration
by Rebecca Schild published Nov 18, 2009 last modified Aug 02, 2011 07:17 AM — filed under:
A seminar held this month by the Communications and Manufacturing Association of India (CMAI) explored the role that information and communication technology can assume in the process of India's judicial reform efforts. The broad consensus among panelists was that “law is not keeping pace with technology”. However, whether technology will be harnessed to actually facilitate much needed transparency and access to the justice system, or be simply used to improve efficiency within the judicial branch still remains unclear.
Located in Internet Governance / Blog
The South African Telecommunications Sector: Poised for Change
by Radha Rao published Oct 14, 2009 last modified Oct 21, 2011 09:59 AM — filed under:
CIS in collaboration with the LINK Centre, Graduate School of Public and Development Management, University of the Witwatersrand, South Africa and in association with different institutions across India is organizing a Lecture Tour by Sagie Chetty from 19th Oct to 30th Oct.
Located in Events
File The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance
by Prasad Krishna published Jul 25, 2012 last modified Jul 31, 2012 04:47 AM
Christopher Soghoian's dissertation was submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree "Doctor of Philosophy" in the School of Informatics, Department of Computer Science, Indiana University
Located in Internet Governance
Blog Entry The State is Snooping: Can You Escape?
by Snehashish Ghosh published Jun 27, 2013 last modified Apr 29, 2019 03:09 PM — filed under: ,
Blanket surveillance of the kind envisaged by India's Centralized Monitoring System achieves little, but blatantly violates the citizen's right to privacy; Snehashish Ghosh explores why it may be dangerous and looks at potential safeguards against such intrusion.
Located in Internet Governance / Blog
Blog Entry The State of Secure Messaging
by Divyank Katira published Jul 15, 2020 last modified Jul 17, 2020 08:12 AM — filed under: , ,
A look at the protections provided by and threats posed to secure communication online.
Located in Internet Governance / Blog
Blog Entry The STI Policy Proposes a Transformative Open Access Approach for India
by Anubha Sinha published Apr 28, 2021 — filed under: ,
Anubha Sinha explains what the draft national Science, Technology and Innovation policy means for open access to scientific literature for Indians. This article was first published in The Wire Science on January 21, 2021.
Located in Access to Knowledge / Blogs
Blog Entry The Supreme Court Delivers
by Shyam Ponappa published Oct 22, 2012 last modified Dec 21, 2012 09:57 AM — filed under: ,
Now, the spectrum and licence issues need resolution. On September 27, 2012, the Supreme Court of India delivered the opinion of a bench comprising five Judges on the Presidential Reference regarding the auction of 2G spectrum.
Located in Telecom / Blog
Blog Entry The Supreme Court Judgment in Shreya Singhal and What It Does for Intermediary Liability in India?
by Jyoti Panday published Apr 11, 2015 last modified Apr 17, 2015 11:59 PM — filed under: , , , , ,
Even as free speech advocates and users celebrate the Supreme Court of India's landmark judgment striking down Section 66A of the Information Technology Act of 2000, news that the Central government has begun work on drafting a new provision to replace the said section of the Act has been trickling in.
Located in Internet Governance / Blog
Blog Entry The Technology behind Big Data
by Geethanjali Jujjavarapu and Udbhav Tiwari published Nov 30, 2016 last modified Dec 04, 2016 09:53 AM — filed under: , , , ,
The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.
Located in Internet Governance / Blog
File The Technology Behind Big Data
by Prasad Krishna published Dec 01, 2016 last modified Dec 02, 2016 01:23 AM
Located in Internet Governance / Files