Centre for Internet & Society

Search results for surveillance

RSS Subscribe to an always-updated RSS feed.

1080 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Report on the 5th Privacy Round Table meeting
by Maria Xynou published Jul 24, 2013 last modified Jul 26, 2013 08:24 AM — filed under: ,
This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.
Located in Internet Governance / Blog
October 2013 Bulletin
by Prasad Krishna published Oct 31, 2013 last modified Jan 04, 2014 04:31 AM — filed under: , , , , , ,
Our newsletter for the month of October 2013 can be accessed below.
Located in About Us / Newsletters
July 2013 Bulletin
by Prasad Krishna published Jul 31, 2013 last modified Aug 21, 2013 09:30 AM — filed under: , , , , ,
Our newsletter for the month of July 2013 can be accessed below.
Located in About Us / Newsletters
CCTV plays Sherlock
by Prasad Krishna published Apr 24, 2016 — filed under:
Whether it's the Mercedes hit-and-run in Delhi or the antics of the chaddi baniyan gang in Mumbai, police are increasingly relying on CCTV footage to solve crimes. Sunday Times looks at how the small picture is getting bigger. .
Located in Internet Governance / News & Media
Blog Entry Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 last modified Jan 02, 2020 02:01 PM — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
File icnl introduction revised
by Pranav M B published Jan 11, 2021
Located in Internet Governance
Cyber experts suggest using open source software to protect privacy
by Prasad Krishna published Jun 22, 2013 last modified Jul 03, 2013 04:32 AM — filed under: ,
Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.
Located in News & Media
Cyber Dialogue Conference 2014
by Prasad Krishna published Mar 27, 2014 last modified Apr 08, 2014 05:09 AM — filed under: , , ,
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
Located in News & Media
CyFy 2017
by Admin published Oct 05, 2017 last modified Nov 26, 2017 09:36 AM — filed under: ,
CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.
Located in Internet Governance / News & Media
Blog Entry The Geopolitics of Cyberspace: A Compendium of CIS Research
by Arindrajit Basu published Dec 31, 2020 last modified Nov 15, 2021 02:48 PM — filed under: , ,
Cyberspace is undoubtedly shaping and disrupting commerce, defence and human relationships all over the world. Opportunities such as improved access to knowledge, connectivity, and innovative business models have been equally met with nefarious risks including cyber-attacks, disinformation campaigns, government driven digital repression, and rabid profit-making by ‘Big Tech.’ Governments have scrambled to create and update global rules that can regulate the fair and equitable uses of technology while preserving their own strategic interests.
Located in Internet Governance / Blog