-
Report on the 5th Privacy Round Table meeting
-
by
Maria Xynou
—
published
Jul 24, 2013
—
last modified
Jul 26, 2013 08:24 AM
—
filed under:
Internet Governance,
Privacy
This report entails an overview of the discussions and recommendations of the fifth Privacy Round Table in Calcutta, on 13th July 2013.
Located in
Internet Governance
/
Blog
-
October 2013 Bulletin
-
by
Prasad Krishna
—
published
Oct 31, 2013
—
last modified
Jan 04, 2014 04:31 AM
—
filed under:
Access to Knowledge,
Digital Natives,
Telecom,
Accessibility,
Internet Governance,
Openness,
Researchers at Work
Our newsletter for the month of October 2013 can be accessed below.
Located in
About Us
/
Newsletters
-
July 2013 Bulletin
-
by
Prasad Krishna
—
published
Jul 31, 2013
—
last modified
Aug 21, 2013 09:30 AM
—
filed under:
Access to Knowledge,
Telecom,
Accessibility,
Internet Governance,
Digital Humanities,
Openness
Our newsletter for the month of July 2013 can be accessed below.
Located in
About Us
/
Newsletters
-
CCTV plays Sherlock
-
by
Prasad Krishna
—
published
Apr 24, 2016
—
filed under:
Internet Governance
Whether it's the Mercedes hit-and-run in Delhi or the antics of the chaddi baniyan gang in Mumbai, police are increasingly relying on CCTV footage to solve crimes. Sunday Times looks at how the small picture is getting bigger.
.
Located in
Internet Governance
/
News & Media
-
Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns
-
by
Arindrajit Basu, Siddharth Sonkar
—
published
Jan 02, 2020
—
last modified
Jan 02, 2020 02:01 PM
—
filed under:
Cybersecurity,
Cyber Security,
internet governance,
Internet Governance
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in
Internet Governance
-
icnl introduction revised
-
by
Pranav M B
—
published
Jan 11, 2021
Located in
Internet Governance
-
Cyber experts suggest using open source software to protect privacy
-
by
Prasad Krishna
—
published
Jun 22, 2013
—
last modified
Jul 03, 2013 04:32 AM
—
filed under:
Internet Governance,
Privacy
Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.
Located in
News & Media
-
Cyber Dialogue Conference 2014
-
by
Prasad Krishna
—
published
Mar 27, 2014
—
last modified
Apr 08, 2014 05:09 AM
—
filed under:
Freedom of Speech and Expression,
Cyber Security,
Internet Governance,
Privacy
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
Located in
News & Media
-
CyFy 2017
-
by
Admin
—
published
Oct 05, 2017
—
last modified
Nov 26, 2017 09:36 AM
—
filed under:
Cyber Security,
Internet Governance
CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.
Located in
Internet Governance
/
News & Media
-
The Geopolitics of Cyberspace: A Compendium of CIS Research
-
by
Arindrajit Basu
—
published
Dec 31, 2020
—
last modified
Nov 15, 2021 02:48 PM
—
filed under:
Cyber Security,
Internet Governance,
Cyberspace
Cyberspace is undoubtedly shaping and disrupting commerce, defence and human relationships all over the world. Opportunities such as improved access to knowledge, connectivity, and innovative business models have been equally met with nefarious risks including cyber-attacks, disinformation campaigns, government driven digital repression, and rabid profit-making by ‘Big Tech.’ Governments have scrambled to create and update global rules that can regulate the fair and equitable uses of technology while preserving their own strategic interests.
Located in
Internet Governance
/
Blog