Centre for Internet & Society

Search results for surveillance

RSS Subscribe to an always-updated RSS feed.

1080 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry UID Project in India - Some Possible Ramifications
by Liliyan published Aug 11, 2010 last modified Mar 21, 2012 10:13 AM — filed under:
Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.
Located in Internet Governance / Blog
Govt and BlackBerry firm wait for the other to hang up
by Prasad Krishna published Aug 09, 2010 last modified Apr 02, 2011 10:46 AM — filed under:
Sunil Abraham speaks to Archna Shukla on the stand-off between the Government of India and RIM. The news was published in expressindia.com.
Located in News & Media
Blog Entry Civil Liberties and the amended Information Technology Act, 2000
by Malavika Jayaram published Aug 05, 2010 last modified Mar 21, 2012 10:13 AM — filed under: ,
This post examines certain limitations of the Information Technology Act, 2000 (as amended in 2008). Malavika Jayaram points out the fact that when most countries of the world are adopting plain English instead of the conventional legal terminology for better understanding, India seems to be stuck in the old-fashioned method thereby, struggling to maintain a balance between clarity and flexibility in drafting its laws. The present Act, she says, is although an improvement over the old Act and seeks to address and improve on certain areas in the right direction but still comes up short in making necessary changes when it comes to fundamental rights and personal liberties. The new Act retains elements from the previous one making it an abnormal document and this could have been averted if there had been some attention to detail.
Located in Internet Governance / Blog
Blog Entry The power of the next click...
by Nishant Shah published Jun 17, 2010 last modified Mar 13, 2012 10:43 AM — filed under: , , , ,
P2P cameras and microphones hooked up to form a network of people who don't know each other, and probably don't care; a series of people in different states of undress, peering at the each other, hands poised on the 'Next' button to search for something more. Chatroulette, the next big fad on the internet, is here in a grand way, making vouyers out of us all. This post examines the aesthetics, politics and potentials of this wonderful platform beyond the surface hype of penises and pornography that surrounds this platform.
Located in Digital Natives / Blog
Blog Entry Separating the 'Symbiotic Twins'
by Nitya V published Jun 17, 2010 last modified Sep 18, 2019 02:10 PM — filed under: ,
This post tries to undo the comfortable linking that has come to exist in the ‘radical’ figure of the cyber-queer. And this is so not because of a nostalgic sense of the older ways of performing queerness, or the world of the Internet is fake or unreal in comparison to bodily experience, and ‘real’ politics lies elsewhere. This is so as it is a necessary step towards studying the relationship between technology and sexuality.
Located in RAW / / Blogs / Queer Histories of the Internet
Peeping Toms In Your Inbox
by Prasad Krishna published Jun 15, 2010 last modified Apr 02, 2011 11:42 AM — filed under:
Nothing’s safe any more—not your mobile number, nor your e-mail—as they’re put on offer for the benefit of telemarketers, writes Namrata Joshi and Neha Bhatt in an article published in the Outlook.
Located in News & Media
I don't want my fingerprints taken
by Prasad Krishna published Jun 11, 2010 last modified Apr 02, 2011 11:41 AM — filed under:
Through this article published in Down to Earth, Nishant Shah looks at the role of the state as arbiter of our privacy.
Located in News & Media
Rick van Amersfoort to give a public lecture on his work at CIS on May 15
by Prasad Krishna published May 10, 2010 last modified Apr 05, 2011 04:07 AM — filed under:
Rick van Amersfoort, researcher based in Amsterdam will describe his work at Buro Jansen & Janssen, in the Netherlands and Europe.
Located in Events
Blog Entry Technological Protection Measures in the Copyright (Amendment) Bill, 2010
by Pranesh Prakash published Apr 28, 2010 last modified May 17, 2012 04:51 PM — filed under: , , , , ,
In this post Pranesh Prakash conducts a legal exegesis of section 65A of the Copyright (Amendment) Bill, 2010, which deals with the stuff that enables 'Digital Rights/Restrictions Management', i.e., Technological Protection Measures. He notes that while the provision avoids some mistakes of the American law, it still poses grave problems to consumers, and that there are many uncertainties in it still.
Located in Access to Knowledge / Blogs
Blog Entry The (in)Visible Subject: Power, Privacy and Social Networking
by Rebecca Schild published Feb 26, 2010 last modified Aug 18, 2011 05:06 AM — filed under: , , ,
In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity.
Located in Openness / Blog