<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/digital-natives/pathways/learning-in-higher-education/search_rss">
  <title>Pathways to Higher Education</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sameet-panda-jam-trinity-pension-pds-odisha-covid-19"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/india-gig-work-economy-roundtable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/revisiting-techno-euphoria"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/revealing-protesters-on-the-fringe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/lila-inter-actions-october-14-2014-rethinking-conditions-of-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/reclaiming-the-right-to-privacy-researching-the-intersection-of-privacy-and-gender"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/making-change/reaping-the-benefits-of-gamification"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/reading-from-a-distance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/reading-from-a-distance-data-as-text"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi">
    <title>Sarah Zia - Not knowing as pedagogy: Ride-hailing drivers in Delhi</title>
    <link>https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi</link>
    <description>
        &lt;b&gt;Working in the gig-economy has been associated with economic vulnerabilities. However, there are also moral and affective vulnerabilities as workers find their worth measured everyday by their performance of—and at—work and in every interaction and movement. This essay by Sarah Zia is the second among a series of writings by researchers associated with the 'Mapping Digital Labour in India' project at the CIS, supported by the Azim Premji University, that were published on the Platypus blog of the Committee on the Anthropology of Science, Technology, and Computing (CASTAC). The essay is edited by Noopur Raval, who co-led the project.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by the &lt;a href="http://blog.castac.org/category/series/indias-gig-work-economy/" target="_blank"&gt;Platypus blog&lt;/a&gt; of CASTAC on July 18, 2019.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;Summary of the essay in Hindi: &lt;a href="https://youtu.be/KSYcT8XD0H4" target="_blank"&gt;Audio&lt;/a&gt; (YouTube) and &lt;a href="http://blog.castac.org/wp-content/uploads/sites/2/2019/07/CASTAC_Sarah_audiotranscript.docx" target="_blank"&gt;Transcript&lt;/a&gt; (text)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;Ride-hailing [1] platforms such as Olacabs and Uber have “disrupted” public transport in India since their arrival. It has been almost seven years since app-based ride-hailing became a permanent feature of urban and peri-urban India with these aggregators operating in over a 100 Indian cities now. Akin to the global story, much has happened – there was a period of boom and novelty for passengers and drivers, then incentives fell. Ride-hailing work has become increasingly demanding with reduced payouts. But what hasn’t received enough attention (especially outside the US) is how these platforms create a deliberate regime of information invisibility and control to keep the drivers constantly on their toes which works to the companies’ advantage. What then are the implications of this uncertainty, which is fueled by app design as well as by the companies’ decision that drivers need little or no information about users? How does service delivery operate in a context where those actually delivering it have little or no idea about the workings of the system?&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;When algorithms make us not know&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Algorithmic interactions form the core of the technology in ride-hailing apps through which service seekers and providers interact. As Lee et al. (2015) describe, “Algorithmic management allows companies to oversee myriads of workers in an optimized manner at a large scale, but its impact on human workers and work practices has been largely unexplored… Algorithmic management is one of the core innovations that enables these (cab-riding) services.”&lt;/p&gt;
&lt;p&gt;Algorithms are procedural logics that produce different effects depending on the data they receive and the outputs they are optimized for (Wilson, 2016). Moreover, platform companies are not transparent about how their business logics contribute to these “optimizations”, which makes it difficult for all the stakeholders (passengers, drivers, police personnel, etc.) to make an accurate assessment of their functioning. This essay, then, explores how the lack of transparency around algorithmic structures not only prohibits drivers from knowing completely and surely about their work (“why did I get this ride?”, “why did my ratings drop?”) but also how they build tactics of coping and earning from a place of unknowing. Algorithms act as a regulator of work and their inherent structure constrains drivers from knowing fully about their work. Unknowing thus has two aspects: first, drivers do not have access or means to gather information; second, it is difficult to be sure of the existence of the said information in the first place.&lt;/p&gt;
&lt;p&gt;In my research on ridehailing in the Delhi-National Capital Region (NCR), there were three things that I asked drivers about which led to ambiguous and inconsistent replies: how rides were allocated, how fares were determined and how ratings worked. While some drivers told me upfront they did not know how these systems worked, others offered explanations that they had devised or heard from somewhere else. For instance, not knowing what they will make per trip means that drivers plan their day in terms of target earnings instead of number of trips. Nearly all drivers I spoke to said they aimed to make Rs 1500-2000 (approx USD 20-25) per day in order to break even, irrespective of whether that goal requires 10 or 15 trips in a day. Yet not knowing what the next trip will earn them means they can’t refuse rides easily. Many drivers expressed discomfort about this fact, especially when compared to other means such as auto-rickshaws and traditional cabs where drop destination is known beforehand and fares can also be pre-negotiated, Unlike ride-hailing drivers, auto rickshaw drivers have the right to refuse passengers.&lt;/p&gt;
&lt;p&gt;Many drivers now call passengers after accepting their booking to find out the destination. According to some drivers, this call also helped them understand the kind of passengers they were about to get and sometimes even allowed re-negotiation of the drop location to a mutually convenient spot if it was originally in a congested area. They also felt that assessing passengers before a trip was important so that they could act as mediators in the information gatekeeping process, because the passengers would have seen the fare already. For a driver, the lack of information added many layers of constant negotiation in a single trip—starting from the call to find out the destination to conversations during the trip to gauge potential earnings to finally suggesting alternative drop locations if there are any constraints in accessing the original destination—before they can claim their rightful earnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://cis-india.org/CIS_APU_DigitalLabour_PlatypusEssays_SZ_01.jpeg/image_preview" alt="CIS_APU_DigitalLabour_PlatypusEssays_SZ_01" class="image-left image-inline" title="CIS_APU_DigitalLabour_PlatypusEssays_SZ_01" /&gt;
&lt;h5&gt;Ridehailing drivers only get the user’s name and pickup location as details about an upcoming trip. &lt;em&gt;Photo by Noopur Raval&lt;/em&gt;.&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Knowing the terms of work—such as when work ends and begins, how the good jobs are being allocated and to whom, and an explanation of one’s income—is a foundation of formal and informal work. Such information is crucial because it allows us to separate our work and personal lives. Knowledge of these obviously quantifiable parameters can help drivers plan their earnings and investments and, crucially, when they can take a break based on much more or less work they have to do in order to meet their income targets.&lt;/p&gt;
&lt;p&gt;Furthermore, as drivers showed me, ride-hailing companies spontaneously change the revenue model for “driver-partners” (as they are called) by sending them an SMS right before the change happens, thereby altering trip and mileage targets frequently to keep a degree of unknowability in drivers’ work. This unknowability disincentivizes drivers from going off the road as per their will and helps maintain a steady supply of cabs on the road. As Alex Rosenblat has demonstrated in her study of US Uber and Lyft drivers, they are compelled to accept rides without knowing their profitability. While the app design gives them an option to “choose” to accept or reject a ride, drivers are constrained by lack of adequate information pertaining to the trip as well as the rider in making this choice. The ‘information asymmetry’, as Rosenblat calls it, also feeds into drivers’ mistrust of the companies and their policies (Rosenblat, 2018). Moreover, these feelings and the uncertainty fed by unknowing were not limited to drivers. Passengers also noticed that a ride between two points could cost different prices at different times of day and they were not sure why or how this cost was calculated.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Unknowability as a form of knowing: A pedagogy of coping&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;As I observed in my interactions with drivers online and offline, new drivers often struggled with the degree of uncertainty and unknowability while more experienced drivers had accepted ‘not knowing’ and the opacity of the system as features of their work.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://cis-india.org/CIS_APU_DigitalLabour_PlatypusEssays_SZ_02.jpg/image_preview" alt="CIS_APU_DigitalLabour_PlatypusEssays_SZ_02" class="image-left image-inline" title="CIS_APU_DigitalLabour_PlatypusEssays_SZ_02" /&gt;
&lt;h5&gt;Not knowing enough about how much will a ride earn them means drivers are forced to be on the roads, often without a break. &lt;em&gt;Photo by author&lt;/em&gt;.&lt;/h5&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Similar to what Rosenblat, Gray et al. and others have observed in the US, in India drivers were constantly engaged in meaning-making through communicative labor, i.e., sharing their experiences with other local drivers online and offline. Agreeing, reassuring, and repeating that drivers actually do not know enough through these discussions also gave them shared confidence in their own abilities and how they were approaching work despite being firmly rooted in unknowing. For instance, when I asked one Uber driver about how ratings worked, they said that all 5-star drivers were matched with 5-star passengers. Another Uber driver said that the higher a passenger’s ratings, the less time they would have to wait for pick-up.&lt;/p&gt;
&lt;p&gt;Other forms in which this kind of unknowing manifested was the lack of a fare chart or any minimum or uniform rating system, leaving drivers to offer their own interpretations and coping strategies. For instance, a driver pointed out how very few rides are likely to be available in a specific suburb during hot afternoons and therefore he avoided dropping passengers to that location after 2PM.&lt;/p&gt;
&lt;p&gt;How, then, does one learn to cope with such unknowable systems as a worker? And what values does such a pedagogy of coping with algorithmic opacity imbibe? In my fieldwork, apart from answering my questions, drivers were extremely interested in talking about the companies, including news about companies’ stock value, their futures, profits, etc. A persistent rumour in the field was that Reliance, the country’s largest telecom provider, was soon coming up with a competitor ride-hailing app, suggesting that there could be an incentive boom again. In online Facebook groups, drivers often discussed company CEOs’ salaries, comparing them to their own. On the flipside, when videos of ride-hailing and food-delivery drivers getting beaten up or arrested or cheated surfaced, drivers would comment with advice on how to safeguard oneself, how to deal with errant customers and so on. I interpret these practices of making sense of long and short-term work, framed as responses to constant ambiguity and uncertainty, as the development of an “algorithmic gut”.&lt;/p&gt;
&lt;p&gt;This gut responds to the anxieties produced by platform infrastructure through a keen awareness of the shifts, the tweaks, the changes and the errors. And it orients how drivers approach and cope with their work by acknowledging that there is a lot unknown (and unknowable) in this kind of daily work. It also guides how drivers focus on the short-term (daily) goal of making profit, such as by tuning into peer groups both online and offline where grievances are discussed, collective action planned, and floating rumours assessed. This gut is an affective, sensorial attunement to how platforms are allocating and shifting power among drivers and plays a generative role in guiding drivers’ work decisions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Uncertainty is an embedded part of a ride-hailing cab’s model of service delivery. For ride-hailing drivers, this ambiguity translates into less control over everyday negotiation of work as well as planning of financial assets for the future.&lt;/p&gt;
&lt;p&gt;In my interactions, I discovered that drivers are certain that they will never know more than the company. What this has led to is a driver who is cynical but not entirely pessimistic. Drivers acknowledge that while companies and their structures may be problematic, what will keep them employed is passengers’ appetite for a service like this. They would like to imagine the future of their work but are cognizant of the dual challenge of the present: making money while struggling for self-preservation in order to perform immediate activities. Drivers are cognizant of an ambiguous future and even hesitant to engage in long-term planning. For now, they would prefer better earnings and greater control over how they perform labour. Hence, their focus is on devising specific strategies for known, short-term challenges instead of running after an unknown future.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;[1] Uber and homegrown Ola both started operations in India as ride-hailing services with the sharing options being added in 2015. Hence, the term ride-hailing has been used to describe these services which also includes ride sharing.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Davis, Jenny L. 2014. “Triangulating the Self: Identity Processes in a Connected Era.” Symbolic Interaction 37 (4): 500-523.&lt;/p&gt;
&lt;p&gt;Dodge, Martin and Kitchin, Rob. 2005. “Codes of life: identification codes and the machine-readable world.” Environment and Planning D: Society and Space 2005 (23): 851-881&lt;/p&gt;
&lt;p&gt;Gray, Mary L., et al. 2016. “The Crowd is a Collaborative Network.” Proceedings of the 19th ACM conference on computer-supported cooperative work &amp;amp; social computing. ACM, 2016.&lt;/p&gt;
&lt;p&gt;Kitchin, Rob. 2017. “Thinking critically about and researching algorithms.” Information, Communication &amp;amp; Society 20 (1): 14-29.&lt;/p&gt;
&lt;p&gt;Lee, Min Kyung, et al. 2015. “Working with Machines: The Impact of Algorithmic and Data-Driven Management on Human Workers.” Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems.&lt;/p&gt;
&lt;p&gt;Rosenblat, Alex &amp;amp; Stark, Luke. 2016. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10: 3758–3784.&lt;/p&gt;
&lt;p&gt;Ruckenstein, Minna and Mika Pantzar. 2017. “Beyond the Quantified Self: Thematic exploration of a dataistic paradigm.” New Media &amp;amp; Society 19(3): 401-418.&lt;/p&gt;
&lt;p&gt;Willson, Michele. 2016. “Algorithms (and the) everyday”. Information, Communication &amp;amp; Society 10.1080/1369118X.2016.1200645&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi'&gt;https://cis-india.org/raw/sarah-zia-not-knowing-as-pedagogy-ride-hailing-drivers-in-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sarah Zia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Mapping Digital Labour in India</dc:subject>
    

   <dc:date>2020-05-19T06:35:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/sameet-panda-jam-trinity-pension-pds-odisha-covid-19">
    <title>Sameet Panda - Data Systems in Welfare: Impact of the JAM Trinity on Pension &amp; PDS in Odisha during COVID-19</title>
    <link>https://cis-india.org/raw/sameet-panda-jam-trinity-pension-pds-odisha-covid-19</link>
    <description>
        &lt;b&gt;This study by Sameet Panda tries to understand the integration of data and digital systems in welfare delivery in Odisha. It brings out the impact of welfare digitalisation on beneficiaries through primary data collected in November 2020. The researcher is thankful to community members for sharing their lived experiences during course of the study. Fieldwork was undertaken in three panchayats of Bhawanipatna block of Kalahandi district, Odisha. Additional research support was provided by Apurv Vivek and Vipul Kumar, and editorial contributions were made by Ambika Tandon (Senior Researcher, CIS). This study was conducted as part of a project on gender, welfare, and surveillance, supported by Privacy International, UK.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Extract from the Report&lt;/h3&gt;
&lt;p&gt;The COVID-19 pandemic has accelerated flaws in social institutions as never before - threatening food security, public health systems, and livelihood in the informal sector. At the time of writing this report,
India is the second-worst affected country in the world with over 9.8 million confirmed cases and more than 1.4 hundred thousand deaths. Unemployment has been increasing at an alarming rate, from 6.67 to 7 percent in October...&lt;/p&gt;
&lt;p&gt;Following the national lockdown, many families belonging to low-income groups and daily wage earners found themselves stranded without money, food or credit from their employers. During the strict lockdown of the economy between March to June 2020 lakhs of migrants faced starvation in cities and walked back home. The government responded with some urgent measures, although inadequate. To cope with the food and economic crisis the Government of India and state governments initiated several social protection schemes. In Odisha, The central government provided two kinds of support, cash transfer through Direct Benefit Transfer (DBT) MGNREGS, Pradhan Mantri Jan Dhan Yojana (PMJDY) and Pradhan Mantri Ujjwala Yojana (PMUJ), advance release of pension in cash to existing beneficiaries and cash support of Rs. 1000. The Odisha government provided cash support of Rs. 1000
to ration card holding families. Beneficiaries of the Public Distribution System also received free-of-cost food grain under the Pradhan Mantri Garib Kalyan Anna Yojana...&lt;/p&gt;
&lt;p&gt;Over the last couple of years, along with making the Aadhaar mandatory, the government has also been working towards linking mobile numbers and bank accounts of beneficiaries. An increasing number of schemes are shifting to Direct Benefit Transfer from in-kind or cash benefits - 324 schemes under 51 ministries of the Government of India. Such schemes are relying on the linkage of Jan Dhan accounts, the Aadhaar, and mobile numbers (the “JAM trinity”) to facilitate access to Direct Benefit Transfers. The Economic Survey 2015-16 has pointed out that without improving mobile penetration and rural banking infrastructure making the JAM trinity mandatory would continue to lead to exclusions. The issues with each of the components of the JAM trinity worsened during the COVID-19 crisis with restrictions on physical movement, difficulties in topping up mobile phone accounts, and enrolling for the Aadhaar or addressing other technical issues.&lt;/p&gt;
&lt;p&gt;This report assesses the role of the data system in welfare delivery. It focuses on the impact of the three components of the JAM trinity - Jan Dhan Account, mobile numbers and the Aadhaar on Direct Benefit Transfer, social security pension and the Public Distribution System. The objective of this study is to understand the challenges faced by beneficiaries in accessing PDS and pension as a result of digitisation processes. This includes failures in Direct Benefit Transfers and exclusions from databases, particularly during the COVID-19 pandemic. The study focuses on gender as a key component shaping the impact of digitisation on beneficiaries. The sample includes both men and women beneficiaries in order to identify such gendered differences. It will also identify infrastructural constraints in Odisha that impact the implementation of digital systems in welfare. Also, it will analyse policy frameworks at central and state levels, to compare their discourse with the impact on the ground.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sameet-panda-jam-trinity-pension-pds-odisha-covid-19'&gt;https://cis-india.org/raw/sameet-panda-jam-trinity-pension-pds-odisha-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sameet Panda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2021-02-26T07:36:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/india-gig-work-economy-roundtable">
    <title>Roundtable on India’s Gig-work Economy</title>
    <link>https://cis-india.org/raw/india-gig-work-economy-roundtable</link>
    <description>
        &lt;b&gt;Working in the gig-economy has been associated with economic vulnerabilities. However, there are also moral and affective vulnerabilities as workers find their worth measured everyday by their performance of—and at—work and in every interaction and movement. This roundtable discussion marks the end of our series on 'India’s Gig-work Economy' published by the Platypus blog of the Committee on the Anthropology of Science, Technology, and Computing (CASTAC). In this discussion, the researchers reflect on methods, challenges, inter-subjectivities and possible future directions for research on the topic. Listen to the audio track below or read the transcript for the full discussion.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by the &lt;a href="http://blog.castac.org/category/series/indias-gig-work-economy/" target="_blank"&gt;Platypus blog&lt;/a&gt; of CASTAC on September 5, 2019.&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;Full &lt;a href="http://blog.castac.org/wp-content/uploads/sites/2/2019/09/CASTAC-roundtable-transcript.docx" target="_blank"&gt;transcript&lt;/a&gt; of the roundtable in English.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://www.youtube-nocookie.com/embed/q4G4v46ZlOU" frameborder="0" height="315" width="100%"&gt;&lt;/iframe&gt;
&lt;h3&gt;&lt;strong&gt;Excerpts from the roundtable&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;Part 1: On continuities between traditional and newer forms of work in cab-driving&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Anushree (researcher, taxi-driving in Mumbai):&lt;/strong&gt; “Something that came out during field work was the flow of workers from traditional services to app-based services which kind of happened in phases and all these platforms have played a different function in the history of this. While the radio taxis were more important in teaching workers to become professionals in the service economy the new platforms have given them a larger customer base and hired access to audience.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sarah (researcher, taxi-driving in Delhi):&lt;/strong&gt; “Prior to Ola and Uber there were radio cabs, but they were not the same phenomenon obviously. They used to work in specific pockets better, such as the airport route.”&lt;/p&gt;
&lt;h4&gt;Part 2: Regulation of platform companies and platform-work&lt;/h4&gt;
&lt;p&gt;The State’s response to disruptive technologies in India has always accounted for worker groups as electoral constituents as well. This means that there are no neat divisions between older black and yellow cabs and the newer ride-hailing app-based cabs. To pacify the threatened black and yellow cab drivers, they were accorded a special category on hailing apps as well:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Anushree:&lt;/strong&gt; So there were a lot of issues around the emergence of the app-based platforms and services and how they were disrupting the existing arrangements so in a bid to pacify the yellow and black cab drivers who are already operating in the city, these platform companies decided to go ahead and provide access to traditional taxi services as well. But also the related development that happened there is at the Maharashtra state government also provided another app to the black and yellow Cab drivers and as far as I found out during my fieldwork there hasn’t been any resolution on that front and most black and yellow cab drivers also use the State government made app but they also log into apps and every time I tried to book a black and yellow cab using Ola and Uber I could not get one.&lt;/p&gt;
&lt;h4&gt;Part 3: On motivations and perceptions of gig-work&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Simiran (researcher, food-delivery work in Mumbai):&lt;/strong&gt; “So, I felt that these non app-based workers had difficulty joining apps because they lack domicile proof to prove they live in the city. There is also a perception that one needs to be English speaking. I am not implying that app-based workers have no rural roots or are all English speaking or educated but this is the perception that was held by non-app workers that was interesting.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Rajendra (researcher, food-delivery work in Delhi):&lt;/strong&gt; “In case of the food-delivery workers in Delhi, they push them to deliver orders on time. This pressure makes them violate traffic rules, they ride on pavements, they break traffic signals. This also disrupts the social understanding of how to move in the city.”&lt;/p&gt;
&lt;h4&gt;Part 4: On studying the gig-economy in India: how did you recruit, why?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Noopur:&lt;/strong&gt; Why not order and recruit because so many people seem to be taking this pathway to approach gig-economy workers?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Simiran:&lt;/strong&gt; “…One thing is that I have never ordered food online so I wanted to keep it a bit blind that way but also the other thing is that I did not want my first interaction with the worker to be as a consumer or in a consumer-provider relationship. So, I was searching on Youtube, looking for city names and looking for search terms such as strikes or protests. Looking for videos about these things and their views on the companies…This was very interesting because there were also people from non-metro cities, from small towns doing this work who were also very eager to speak to me. They were expressive already and wanting to speak…”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Anushree:&lt;/strong&gt; “Apart from them fleet owners and union members were very eager to talk to us. They saw the study as a way to put their voice out. I had to establish my identity as well as a researcher. I used Telegram and facebook groups extensively…I think I relied on Telegram the most. It was also surprising that such a diverse set of people were on that platform. I had never used Telegram before this project but the comfort levels of all the people using it was really surprising. Drivers in the union members group was sort of surprising to me, they were posting images from the road, they were posting audio notes, they were moderating conversations in the group. Telegram was my major source of responses and I also got to know what was happening on the ground.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sarah:&lt;/strong&gt; “So, when you identify as a researcher and ask them these questions there is a certain expectation of allyship. So, I started asking them what they think is a good customer. That was a good entry point to assuring them that I was on their side. Some of them were still very cautious. We were talking about things like drunk women and they would be quick to tell me that not all women are bad. Or not all customers are bad. But discussing customers and their behavior was generally a good way to connect with them…”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/india-gig-work-economy-roundtable'&gt;https://cis-india.org/raw/india-gig-work-economy-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Noopur Raval, Anushree Gupta, Rajendra Jadhav, Sarah Zia, and Simiran Lalvani</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Platform-Work</dc:subject>
    
    
        <dc:subject>Future of Work</dc:subject>
    
    
        <dc:subject>Network Economies</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Mapping Digital Labour in India</dc:subject>
    

   <dc:date>2020-05-19T06:36:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/revisiting-techno-euphoria">
    <title>Revisiting Techno-euphoria</title>
    <link>https://cis-india.org/digital-natives/revisiting-techno-euphoria</link>
    <description>
        &lt;b&gt;In my last post, I talked about techno-euphoria as a condition that seems to mark much of our discourse around digital technologies and the promise of the future. The euphoria, as I had suggested, manifests itself either as a utopian view of how digital technologies are going to change the future that we inhabit, or woes of despair about how the overdetermination of the digital is killing the very fibre of our social fabric. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/revisiting-techno-euphoria"&gt;Published&lt;/a&gt; in DML Central on July 5, 2012&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A way out of it, for some of us working with young people and their relationships with (as opposed to usage of) technologies, is to think of digital technologies as a paradigm through which everyday life is reconfigured, or as contexts within which we evolve new relationships of power and negotiation. Or to put it plainly, it has forced us to think of digital technologies not in terms of tools and gadgets, infrastructure and logistics (though those are also important) but as embodied experiences that reshape the very ways in which we conceptualize our everyday life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When we talk of digital natives in India, the immediate spaces that they inhabit conjure up images of big crowded IT cities that are transforming into hubs of international outsourcing industries and IT development. We presume that digital natives would be found in the 12% of the Indian sub-continent where broadband access is available. We often narrow our focus to look at urban, middle class, affluent, English speaking, educated youth who occupy extremely privileged positions in their social, cultural and economic practice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the story* I want to share with you today comes from an unusual location in India – from the village of Banni in the desert region of Kutch, located at the North-Western borders of India and Pakistan. In this small village that is about 80 kilometers from the biggest town with amenities like hospitals and schools, almost every household has a smart phone with access to the internet. In the absence of more popular forms like radio, which are disallowed because of the proximity to the turbulent India-Pakistan borders, the Chinese-made smart phones become the de facto interface of communication and cultural production. The phones become not only the life-line in times of crises, but also everyday objects through which the villages stay connected with the world of cultural production and entertainment. The internet services on the phones allow them to access Bollywood songs and movies, images and games, popular television programming and other popular cultural products in the country. In many ways, Banni is probably more digitally connected than many parts of the larger cities in the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the strong influence of Islam in this fairly homogenized community means differential access for the people who live in it. Women, according to the village doctrines, are not allowed access to technologies for fear of corruption. Hence the smart phones are all exclusively owned by men who have complete access to the information highway whereas the women do not have immediate ownership of such interfaces. And yet, the women in the village are quite updated about the latest news, gossip, politics, information about the weather, and cultural productions like TV soaps and Bollywood movies. This discrepancy between lack of access to digital technologies on the one hand, and a fairly comprehensive access to information of their choice is perplexing at first. Till you turn your attention to the children, who, in their pre-pubertal space, are not segregated so clearly into the technology publics and privates, and hence can navigate the spaces which are otherwise so gender exclusive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These children would not usually be recognized as digital natives because they are not particularly tech savvy and they do not have direct and unlimited access to the digital devices or connectivity. However, they become interfaces through which the information consumed by the male population permeates and travels to the female population in the village. The children become embodied interfaces, who imbibe the information from these digital devices and re-enact it for the women in their own private spaces. The village now has its own child-stars who not only pass on the local news and information, but also re-enact, on a daily basis, scenes, songs, and story-lines from the soaps and movies that are popular with the women in the village.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the gendered politics of technology access and the creative ways in which children are able to work as embodied interfaces is interesting – and perhaps needs more space than is afforded here – what remains interesting to me is how this story disrupts the regular narratives of techno-euphoria. It cannot be explained away merely in terms of usage. It cannot be used to claim radical social change in community and gendered relationships. It is difficult to make a technology-empowerment argument though this. What is perhaps most interesting is that it shows how we need to start thinking about digital technologies as producing new ecosystems that reconfigure our understanding of who we are and the roles we play in developing social relationality. The digital natives in these stories are not merely the children – though their embodied interface produces startling insights into how personal relationships with technologies are produced. The men who have access to the phones and have mastered digital literacy in navigating through these phones, the women who become the last-mile consumers who have found creative ways of staying connected despite their lack of access, and the children who become the nodes in this technology-information infrastructure, are all digital natives of a certain kind. They might not have claimed that identity and indeed might never want to. And yet, the very conditions of everyday life, as they are mediated by the presence of digital technologies in Banni, help us understand the social structures and information relationships in ways which are more complex than theorized by our techno-euphoric attention to network visualizations which are heavily determined by usage and action.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This story from Banni is layered and needs unpacking at many different levels. However, it shall always remain, for me, a catalyst to re-think the focus and framework of our technology discourse, and talk about digitally mediated identities (digital natives or otherwise) in a vocabulary that moves beyond usage, infrastructure and access. It emphasizes, for me, the idea that the gadgets and tools we use are, actually, only material manifestations of the digital -- which operates at the level of a paradigm or a context, through which we are slowly reshaping the material, social, and cultural notions of who we are and how we connect to the world around us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Read Nishant's last post &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/techno-euphoria"&gt;here&lt;/a&gt;&lt;br /&gt;Link to the picture &lt;a class="external-link" href="http://www.flickr.com/photos/pranavsingh/1311922613/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;* &lt;em&gt;I am greatly thankful to my friend Rita Kothari at the Indian Institute of Technologies, Gandhinagar, for first introducing me to this context and its peculiar technology ecosystem&lt;/em&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/revisiting-techno-euphoria'&gt;https://cis-india.org/digital-natives/revisiting-techno-euphoria&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:53:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/revealing-protesters-on-the-fringe">
    <title>Revealing Protesters on the Fringe: Crucifixion  Protest in Paraguay</title>
    <link>https://cis-india.org/digital-natives/blog/revealing-protesters-on-the-fringe</link>
    <description>
        &lt;b&gt;An analysis of the crucifix protest in Paraguay in the light of Nishant Shah’s piece: Whose Change is it Anyway? The blog post looks at the physical and symbolic spaces in which narratives of change were conceived and the extent to which information circulating within activates citizen action. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;“What constitutes change? What are the intentions that make change possible? Who are the actors involved?” These are the questions with which Nishant Shah opens the thought piece ‘Whose Change is it Anyway’, a series of reflections and provocations exploring the future of citizen action and digital technologies in emerging information societies. The project, in collaboration with the HIVOS Knowledge Program, begins a process of unlearning conventional understandings of ‘change’ and redefining it in the light of less visible narratives of political, social and cultural transformation. Three pivots of analysis are at the backbone of this piece. First, it locates change by looking at the historicity and stressing the role of invisible crises that lead to digital activism. Second, it moves on to unpack our definition of change and the language framing activism as system-overhaul practices rather reformative experiments. Third, it looks at the outcomes of change proposing a redefinition of failure that enables us to recognize instances of change outside of what is dubbed ‘successful’ citizen action. All in all, the piece is reflective rather than conclusive and when paired up with contemporary events of political and social change, it serves as a framework to challenge existing paradigms and overlooked narratives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This was precisely my experience when at the end of August I came across the Paraguayan crucifix protest in the BBC News website: the story of eight bus drivers who led by union leader Juan Villalba, crucified themselves onto wooden crosses to protest against labour exploitation in Asuncion.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; In spite of its international media coverage, the protest has to this day failed to mobilize digitally fluent Paraguayan and global netizens into joining the ranks&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; of their plea, keeping protesters at the fringes of the online sphere. This is surprising compared to other publicized Paraguayan protests, such as Pro-Ache Tribe campaigns back in 2011&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; and the anti-corruption protests earlier this year,&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; which featured politically active students mobilizing through technology to influence public policy in Paraguay.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;iframe src="http://www.youtube.com/embed/XF_KKXSGXKM" frameborder="0" height="300" width="360"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;th style="text-align: center;"&gt;Video of crucifixion protest&lt;/th&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Before jumping into deeming the crucifix protest a success or a failure, I would like to refer back to the first axis of analysis in Shah’s work and discuss the history, context and structures in which the intent for change was crafted. I will follow Anat-Ben David´s framework based on her research on the geopolitics of digital spaces, and look at how “hybrid geographical and digital spaces” intertwine with “situated knowledges and practices” in order to localize change (2011). I will first focus on the political and social context of Paraguay and how it framed two online campaigns:&amp;nbsp; the Aché Tribe campaign in 2011 and the anti-corruption campaign in June 2013. Then, I will move on to the symbolic and knowledge context in Paraguay and how it determined the outcome of the offline crucifix protest in August 2013. The objective is to identify the factors that drove the first two issues into the online sphere vis-a-vis those that impeded the latter from making that transition. This will be instrumental to understand what —and what not— activates youth mobilization and citizen action in Paraguay and how their vision of change aligns with their experience in crises.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Political and social context of Paraguay&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Landlocked, Catholic and &lt;em&gt;mestizo&lt;/em&gt;, Paraguay was under a 30 year oppressive dictatorship that finally came to an end in 1989. Since then, the succeeding thirteen years of democracy have been characterized by citizen upheavals, as younger generations are breaking the silence and conformity of older times (Zavala, 2011). Among the most pressing issues addressed by coup attempts, strikes and protests,&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; corruption remains the standing evil in the Paraguayan political system. Seventy-eight per cent of its citizens perceive the government as ineffective at fighting corruption,&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; and with good reason. Paraguay is ranked as the second most corrupt country in Latin America and 24th in the world, according to Transparency International.&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; The Paraguayan head of Seeds for Democracy, Marta Ferrara commented on corruption being absolute in the public sector due to the legacy of dictatorship, and hence called civil society groups to exert more pressure on the government to fight it.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; This sentiment is consistent with the loss of faith in democracy in Latin America to which research has attributed the rise of the left and a growing desire for social change (Barret et al, 2008).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another important contextual question to consider on a par is how relevant are digital technologies in Paraguay to mobilize change. The country has one of the lowest rates of internet penetration in the continent at 27.1 per cent, &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; suggesting that the remaining 70 per cent is comprised of disconnected Guarani voices whose stories remain untold. This is in a country with a 52.4 Gini coefficient, where 40 per cent of citizens live below the poverty line and 56 per cent of the income is controlled by the upper 20 per cent.&lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Delving deeper into this divide, we can infer that the success behind the digitally enabled protests comes as a result of socioeconomic inequality and an alignment of the interests of this privileged class and the issues behind their actions. Based on this profile, my follow up questions are a) what is the common thread joining the online campaigns that is absent from the crucifix protest and b) how this digital class is defining these priorities.&lt;br /&gt; &lt;br /&gt;&lt;strong&gt;The anti-corruption discourse&lt;br /&gt;&lt;/strong&gt;The legacy of the dictatorship and the anti-corruption discourse is a strong response to the first question. While the concept of corruption is severely stigmatized in society, it is also very loosely defined (Harrison, 2006), making it a versatile stimuli for change. Harrison states that in developing countries, the focus remains on the perception of the relationship between the state and those they are meant to be serving (2006), while for Haller and Shore it also refers to money transactions within power relationships that stratify and exclude in any structure (2005). In this way, the concept remains all-encompassing, perception-based and relevant to the democracy crisis in Paraguay. Hence, protesting against it is locally appropriate, and fits in the moral project Sampson dubbed the global anti-corruption industry (2010). He argues that condemning corruption is now a global trend grounded on uncontested ‘good governance´ and integrity values. Its rhetoric has been mainstreamed and infused with a “feel good character” that turns it into an appealing campaign, easy to identify with, simple to embark on and consistently present in the human-rights discourse both in the online and offline sphere.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The anti-corruption protest in June and the Pro-Aché mobilization in 2011 fit this criterion. In the first case, 3000 Paraguayans took to the streets inspired by neighbouring Brazil´s anti-corruption protests&lt;a name="fr11" href="#fn11"&gt;[11] &lt;/a&gt;to condemn a new retirement law project for parliamentarians that allowed them to retire after only ten years of public service. Framed as an indicator of state inefficiency, the online campaign &lt;em&gt;PorUnParaguayMejor&lt;/em&gt; [For a better Paraguay] went viral compelling students to mobilize against the project in Asuncion.&lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; The event was reported immediately by international media publicizing Paraguayan youth as revolutionary agents of change.&lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/SeJubilan.png" alt="" class="image-inline" title="Se Jubilan" /&gt;&lt;/th&gt;
&lt;th&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Above: "[Parlamentarians] are retiring in 10 years and demanding full pension  (100% of their salaries). Paraguay, take the streets and denounce them", (pictured by Global Voices online: &lt;a class="external-link" href="http://bit.ly/1aXGzA7"&gt;http://bit.ly/1aXGzA7&lt;/a&gt;)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The second case was also based on state inefficiency experienced by a specific community: the Aché indigenous tribe. The dispute was a consequence of the Ministry of Environment dishonouring an agreement and not granting property titles of the land &lt;em&gt;Finca 470&lt;/em&gt; to the tribe. As a result, a group of young Paraguayans created social media accounts to organize food and clothes drives, mobilize protests, attract further attention from the press and communicate horizontally with government authorities. Due to their extensive lobbying, the authorities acceded to declare the land an indigenous reserve for the Aché, making it another hailed example of successful technology usage by youth (Zavala, 2011).&lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/paraguayprotests.png" title="Paraguay Protests" height="280" width="422" alt="" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Above: Members of the Aché tribe take to the streets in Paraguay (photo courtesy Sulekha: &lt;a class="external-link" href="http://bit.ly/1aPxeXv"&gt;http://bit.ly/1aPxeXv&lt;/a&gt;).&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;In both cases, the vaguely defined corruption was at the core of  citizens’ claims. In the first one, the general outrage and dutifulness  drove citizens into the anti-corruption discourse both on the online and  offline spheres. Based on Shah’s conceptualization of the technologies of the state  (2013), the issue of corruption was perceived as a threat to the  survival of the citizen and its rights, and created a generalized sense  of precariousness among the populace. Ergo, they intervened to secure  their future and as put by Sampson, to&amp;nbsp; convey the message that they  ‘were doing something’ about it regardless   of whether that ‘something’  would have a long-term structural impact.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;On the other hand, the second  online protest had a more altruistic  tone. The members of the digitally privileged 30 per cent, in spite of not being directly implicated in the conflict, took the disconnected group’s plea and mobilized support networks on their behalf. Although the Aché did not request this intervention, nor intend to utilize technology during their camped protests, the digital group’s strategy was largely more effective at bringing the issues to the attention of media and the government. The successful mainstreaming of the Aché’s story upon being digitalized questions the extent to which staged protests will remain appropriate in information societies vis-à-vis online campaigning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These developments show how the anti-corruption discourse not only mobilizes citizens in Paraguay but also their power and resources. Therefore, if corruption is the common thread we are looking for, to what extent is it applicable to other social conflicts? Will good governance values always trump individual pursuits of assurance? In the following section I will return to the crucifix protests in the light of the aforementioned and address non-geographical spaces of knowledge and practices, as recommended by Ben-Davis. This will shed light on this question and on the spectrum of citizen motivations framing how digital actors articulate change.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Knowledge, Symbolisms and Visibility&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Yochai Benkler describes our networked society as an economy centered on information, cultural production and the manipulation of symbols (2006). These contain and pertain to different ways of understanding the world. In the optimistic view of Benkler, digital technologies enable these views to circulate freely in our network; amplifying all voices, however, as seen in the case of Paraguay, information is being produced by one sector of society that determines and constrains the visibility of other worldviews; reproducing socioeconomic inequalities in the digital sphere. In this section I will look at how different articulations of the present and the conflict between spaces of knowledge and symbolisms derive into different ways of telling the same story, in the light of the extremely visual crucifix protest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The protest had a very different impact in the national scene, as opposed to its portrayal in international media. This is because crucifixes had already been staged in the past by people of indigenous descent&lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; or union workers&lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; to call for the attention of the Paraguayan state. Being a predominantly Catholic country, utilizing the charged image of the crucifixion of Jesus is the equivalent of cultural &lt;em&gt;bandwagoning&lt;/em&gt; on its symbols of self-sacrifice and martyrdom. Eric Tyler reflecting on activism martyrs in the light of the role Khalid Saed in the Arab Spring, called them “catalysts with a profound amplifying impact when combined with the viral force of technology”.&lt;a name="fr17" href="#fn17"&gt;[17] &lt;/a&gt;Amy Sample Ward added another lesson from Egypt, noting that you do not need a high penetration rate in order for massive impact to occur, “as long as the community is connected”.&lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; If the digital class had taken on the bus drivers case in the same way they supported the Aché, mobilization would have been likely. However, the cause did not resonate with the Paraguayan digital public. This lack of connection did not derive from the digital divide, but instead from the long-standing conflict between the transport sector and the citizens.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are several points to be made about this case of citizen inaction. First, the citizen-market crisis played a large role in creating apathy around the crucifix protest. Shah states that technologies of the market must “assure us of the future in terms of material resources and infrastructures upon which happiness depend” (2013), which was not being delivered by the CETRAPAM (Transport Companies of the Metropolitan Area) in the eyes of the citizen. The CETRAPAM director is perceived as corrupt and inefficient&lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt; and earlier that month a transportation strike left 700,000 immobilized.&lt;a name="fr20" href="#fn20"&gt;[20] &lt;/a&gt;These incidents resulted in a citizen online campaign demanding a reliable and transparent service from the companies&lt;a name="fr21" href="#fn21"&gt;[21] &lt;/a&gt;having anti-corruption, once again, at the core of their claims.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This background determined how national media reproduced the crucifix protest story. ABC, one of the largest news corporations in the country, covered the story portraying drivers as ‘aichinjaranga’s” (‘poor little thing’ in Guaraní), who were appealing to &lt;em&gt;“wake people up through pity and pressure, not resources.&lt;/em&gt;&lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; On the other hand, the most popular entry on the topic in Crónicas Ciudadanas (ABC’s citizen journalism forum) reads: &lt;em&gt;“We [Luque citizens] are tired. These drivers waste our time and we are sick of it.”&lt;/em&gt;&lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; The digital class, having the power and resources to mobilize, chose to remain idle in order to disempower a group that has been causing precariousness in their present and future establishing a hierarchy of citizen priorities. By withdrawing their support, the drivers are now left with offline strategies and conventional protest tools to address their demands with only the support of their immediate community.&lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; It is unclear whether this will represent a disadvantage for their ability to create structural change, but it does show that internal citizen crises leads to inequality of strategies and resources for mobilization.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Second, this case also highlights the dark side of Benkler’s argument in favour of citizen information production. He claims that citizen journalism curbs the power away from mass media and hands it over to autonomous citizens who can now exchange information, making them less susceptible to manipulation by the owners of communications infrastructure and media (2006). In the case of Paraguay, this power has been handed over to the digitally fluent who are only putting forward causes aligned with their interests and value scheme.Issues of access and digital inclusion come afloat, as the disconnected status of the crucifix protesters keeps them out of social spaces of debate and political conversation. This deems social status a determining factor between “statements that are heard and those that wallow in obscurity” (Benkler, 2006) and a serious constraint for the fulfillment of the drivers’ capabilities and freedoms.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Third, the use of symbols is effective depending on the audience, as shown by the narrative of international news corporations. The use of crucifixes came across as an ancient and peculiar tool protest for western media — especially in the digital era— earning them a space in the global public’s interest eighteen days into the protest. As commented by Al Jazeera’s opinion columnist Courtney Martin, in the light of the Tibetan self-immolations in February,&lt;a name="fr25" href="#fn25"&gt;[25]&lt;/a&gt;“in a world that tends to shine new power [on] online activism only”, other people need to resort to “attention-getting schemes on the hopes of calling attention to issues that remain unresolved”.&lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The highly visual crucifixes caught the attention of the international media, yet the focus remained on the props instead of the underlying issues around union workers’ rights. This was evident on the picture included by the CNN, showing the workers lined up on their crosses lying next to a coffin claiming that this will become their "final resting place" if their demands were not met;&lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; adding to the thriller effect of what is in fact a social justice crisis.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/cnninternational.png" alt="" class="image-inline" title="cnn" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;"&gt;Crucified bus drivers in Paraguay (pictured by CNN International), http://bit.ly/1fpxKvs&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;In regards to the audience’s response, I would dare to speculate that the absence of the “language of revolution” that surrounds hyped narratives around digital activism (such as the June anti-corruption campaign accounts) played a role in the inactivity from international human-rights activism communities. Being a global audience “engaged with a spectacle of the rise of the citizen” (Shah, 2013), information circulating through mass media is either discarding or othering the less attractive, under-the-radar citizen struggles that do not fit this sale pitch. If a show must be staged in order to attain global attention, it is only natural to wonder if this plot will require a dramatic twist to become viral, one of the key ingredients for effective information dissemination according to Mary Joyce (2010). Having the protesters reach “the end” in order to achieve attention and support, is evidence of some of the morbid criterion steering our motivations for change.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This analysis localized some of the invisible conflicts underpinning action for change in Paraguay. Rather than focusing on a specific cause, such as workers’ rights; through a particular method, say crucifixions; I have looked at the structures framing the understandings around citizen action. It attempted to go beyond the spectacle of digital mobilization and instead look at two spaces: the geopolitical context of Paraguay and the symbolic knowledge framing the development of the crucifix protest in Asuncion, and how the bus drivers envisioned their future before and after the protest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Paraguayan political and social imaginary and their understanding of change are infused with the historicity of corruption. As explored in the first section, campaigning against corruption in Paraguay has risen as a convenient check-and-balance, citizen-led strategy to demand transparency and accountability from state and market actors. It fosters values of responsible citizenship and is endorsed by the national and international community. The prevalence of this discourse, even if it worked against the crucifix protest, is an indicator that ‘making change’ is not necessarily understood as a practice of material transformation in Paraguay, but that is has been legitimized at the stage of awareness and political engagement without tying citizens into long-term advocacy efforts.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The actions and reactions around the crucifix protest varied in the online and the offline sphere. In the online realm, the story was orchestrated by the group with access to information and communication technologies. The bus drivers, having remained at the fringes of digital production, had no control whatsoever of how their narrative was shaped by citizen journalists, national or international media. This was reflected in the offline sphere, where the lack of support to the protesters was a result of market-citizen conflicts and the inability of the crucifix symbolisms to speak to an urban population. These factors also show how socioeconomic divides at the political and knowledge levels were digitalized, determining information production, dissemination and reproduction as well as responses to the protesters’ narratives in the long-run.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In conclusion, this analysis has offered a broader view of how change is understood, in terms of the socioeconomic and information constraints in the making of change in Paraguay. Altruistic activism is only possible when the cause being fought for does not jeopardize the interests and assurances of a powerful class who is in control of the resources for online mobilization, in spite of the social justice nature of the claim. Some questions remain unresolved, particularly in regards to how digital activity is overshadowing offline initiatives in a spectacle driven environment. An interesting research avenue relevant to the larger project of &lt;em&gt;‘Whose Change is it Anyway?’&lt;/em&gt; would be to collect narratives and stories of change that gauge the relevance of offline protests, to understand if they can remain relevant and appropriate in information societies and whether we, as an audience and potential supporters, are only defining change and citizen action in light of its digital possibilities.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. “Sacked Paraguay bus drivers stage crucifixion protest” BBC News Latin America &amp;amp; Caribbean. August 28, 2013, accessed August 30, 2013, &lt;a class="external-link" href="http://bbc.in/17n5NSm"&gt;http://bbc.in/17n5NSm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. “Choferes de la linea 30 en huelga” ABC Color, September 4, 2013. Accessed September 6&lt;sup&gt;th&lt;/sup&gt;, 2013, &lt;a class="external-link" href="http://bit.ly/1ffyGp3"&gt;http://bit.ly/1ffyGp3&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. “Indígenas Ache Acampan frente a SEAM y piden transferencia tierras ancestrales” Ultima Hora. March 14th, 2011. Accessed September 18th, &lt;a class="external-link" href="http://bit.ly/15aszv5"&gt;http://bit.ly/15aszv5&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Agencia EFE, “Protestas contra presunta corrupción en Paraguay”, &lt;em&gt;Caracol Radio Colombia&lt;/em&gt;. June 22, 2013, accessed August 30,2013, &lt;a class="external-link" href="http://bit.ly/1aPHfEn"&gt;http://bit.ly/1aPHfEn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. BBC Timeline: Paraguay. Last modified July 3&lt;sup&gt;rd&lt;/sup&gt;, 2012, &lt;a class="external-link" href="http://bbc.in/B6UFV"&gt;http://bbc.in/B6UFV&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Alexander E.M. Hess and Michael Sauter. “The Most Corrupt Countries in the World”, 24/7: Wall Street: &lt;em&gt;Insightful Analysis and Commentary for U.S. &amp;amp; Global Equity Investors.&lt;/em&gt; July 11, 2013. Accessed August 30, 2013, &lt;a class="external-link" href="http://bit.ly/16jVxrE"&gt;http://bit.ly/16jVxrE&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. Corruption Perceptions Index 2012”, &lt;a class="external-link" href="http://bit.ly/TBjshd"&gt;http://bit.ly/TBjshd&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Paraguay’s Cartes: The man to lead anti-corruption efforts?” Thomson Reuters Foundation, May 3&lt;sup&gt;rd&lt;/sup&gt;, 2013. Accessed: September 10, 2013, &lt;a class="external-link" href="http://bit.ly/1aXTd28"&gt;http://bit.ly/1aXTd28&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. "Percentage of Individuals using the Internet 2000-2012", International Telecommunications Union (Geneva), June 2013, accessed August 30, 2013&lt;strong&gt;, &lt;/strong&gt;&lt;a class="external-link" href="http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Individuals_Internet_2000-2012.xls"&gt;http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/Individuals_Internet_2000-2012.xls&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;].The World Bank “Poverty Gap at the Poverty Line” &lt;em&gt;Catalogue Sources: World Development Indicators&lt;/em&gt;. Accessed September 10, 2013 &lt;a class="external-link" href="http://bit.ly/14oMRDI"&gt;http://bit.ly/14oMRDI&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. RT Actualidad, “La ola de protestas de Brasil ‘rompe fronteras’ y ya salpica a Paraguay” &lt;em&gt;RT Noticias, &lt;/em&gt;June 22, 2013, accessed August 30,2013, &lt;a class="external-link" href="http://bit.ly/1aBAqqj"&gt;http://bit.ly/1aBAqqj&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. Agencia EFE, “Protestas contra presunta corrupción en Paraguay”, &lt;em&gt;Caracol Radio Colombia&lt;/em&gt;. June 22, 2013, accessed August 30, 2013, &lt;a class="external-link" href="http://bit.ly/1aPHfEn"&gt;http://bit.ly/1aPHfEn&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. Gabriela Galilea “The Brazil Effect: Thousands Protest for a Better Change” &lt;em&gt;Global Voices English &lt;/em&gt;June 26, 2013. Accessed August 30, 2013, &lt;a class="external-link" href="http://bit.ly/15FKwAW"&gt;http://bit.ly/15FKwAW&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. For further information on the Pro-Aché online campaign, refer to Maria del Mar Zavala’s essay: Youth and Technology: An Unstoppable Force.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. Protesters in Paraguay staged a public crucifixion in the past calling for a jailed former army general General Lino Oviedo to be set free. “Paraguay man crucified in public” BBC News November 30, 2006. Accessed on September 10, 2013, &lt;a class="external-link" href="http://bbc.in/1aPI7Zq"&gt;http://bbc.in/1aPI7Zq&lt;/a&gt;. Also see "Homeless in Paraguay protest with Crucifixion” Cleveland News. August 6&lt;sup&gt;th&lt;/sup&gt;, 2009. Accessed September 20, 2013, &lt;a class="external-link" href="http://bit.ly/1gGyZHk"&gt;http://bit.ly/1gGyZHk&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. A bus driver crucified himself for more than 10 hours demanding the recognition of his labor union. “Se crucifico para lograr el reconocimiento sindical” ABC Color, July 6, 2013. Accessed on September 10, 2013, &lt;a class="external-link" href="http://bit.ly/1buNKiL"&gt;http://bit.ly/1buNKiL&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Mary Joyce, January 27, 2012 comment on Arab Spring: “The Meta-Activism Community Reflects” &lt;em&gt;Meta-Activism Blog&lt;/em&gt;, &lt;a class="external-link" href="http://bit.ly/wfXhiW"&gt;http://bit.ly/wfXhiW&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. Mary Joyce, comment on Arab Spring.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. 40 companies went on strike demanding further subsidies from the   government, paralyzing public transport in Asuncion and leaving almost   700,000 immobilized. As a result, citizens organized a mobilization   through Facebook to denounce corruption in the CETRPAM and demand an   efficient transportation system, &lt;a class="external-link" href="http://bit.ly/15I7Mnl"&gt;http://bit.ly/15I7Mnl&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Gabriela Galilea, “Public Transit Strike Paralyzes Paraguay” &lt;em&gt;Global Voices English. &lt;/em&gt;Translated by Victoria Robertson. August 8, 2013. Accessed on September 10, 2013, &lt;a class="external-link" href="http://bit.ly/1bdllum"&gt;http://bit.ly/1bdllum&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. Gabriela Galilea, “Public Transit Strike Paralyzes Paraguay”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Huelguistas quieren despertar lástima según gerente de Línea 30” &amp;nbsp;ABC   Color, September 4, 2013. Accessed on September 10, 2013, &lt;a class="external-link" href="http://bit.ly/1ffyGp3"&gt;http://bit.ly/1ffyGp3&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. ABC Color “Choferes de la linea 30 en Huelga”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. “Sindicalistas de Paraguay fueron recibidos por el presidente tras   jornadas de protestas” Telesur, September 4, 2013. Accessed on September   10, 2013. &lt;a class="external-link" href="http://bit.ly/14kntkF"&gt;http://bit.ly/14kntkF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “The 100&lt;sup&gt;th&lt;/sup&gt; Self-Immolation in Tibet – A case for the world to answer” Central Tibetan Administration, February 14, 2013. Accessed on September 10, 2013, &lt;a class="external-link" href="http://bit.ly/X65jvA"&gt;http://bit.ly/X65jvA&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. Courtney E Martin “Building a slower, longer fire among the digital flares” &lt;em&gt;Al Jazeera English, &lt;/em&gt;February 4, 2013. Accessed on August 30, 2013, &lt;a class="external-link" href="http://aje.me/X9YNDj"&gt;http://aje.me/X9YNDj&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Rafael Romo “Fired Paraguayan bus drivers crucify themselves in protest”   CNN International. August 31, 2013. Accessed August 31, 2013, &lt;a class="external-link" href="http://bit.ly/1fpxKvs"&gt;http://bit.ly/1fpxKvs&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Sources&lt;/strong&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ben-David, Anat “Digital Natives and the return of the local cause” &lt;em&gt;Digital AlterNatives with a Cause – Book One: To Be.&lt;/em&gt; (2011) 10 -22.&lt;/li&gt;
&lt;li&gt;Barrett, P. S., Chavez, D., &amp;amp; Garavito, C. A. R. &lt;em&gt;The new Latin American left: utopia reborn&lt;/em&gt;. Pluto Press, 2008.&lt;br /&gt;Benkler, Yochai.&amp;nbsp;&lt;em&gt;The wealth of networks: How social production transforms markets and freedom&lt;/em&gt;. Yale University Press, 2006.&lt;/li&gt;
&lt;li&gt;Harrison, Elizabeth. "Unpacking the anti-corruption agenda: dilemmas for anthropologists."&amp;nbsp;&lt;em&gt;Oxford Development Studies&lt;/em&gt; 34, no. 1 (2006): 15-29.&lt;/li&gt;
&lt;li&gt;Haller, C. &amp;amp; Shore, C. (Eds) Corruption: Anthropological Perspectives London: Pluto Press&amp;nbsp; (2005).&lt;/li&gt;
&lt;li&gt;Joyce, Mary C., ed.&amp;nbsp;&lt;em&gt;Digital activism decoded: the new mechanics of change&lt;/em&gt;. IDEA, 2010.&lt;/li&gt;
&lt;li&gt;Sampson, Steven. "The anti-corruption industry: from movement to institution."&lt;em&gt;Global Crime&lt;/em&gt; 11, no. 2 (2010): 261-278.&lt;/li&gt;
&lt;li&gt;Shah, Nishant “Whose Change is it Anyways? &lt;em&gt;Hivos Knowledge Program. &lt;/em&gt;April 30, 2013.&lt;/li&gt;
&lt;li&gt;Zavala, Maria del Mar “Youth and Technology: An Unstoppable Force” &lt;em&gt;Digital AlterNatives with a Cause- Book Three: To Act &lt;/em&gt;(2011) 46-53.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/revealing-protesters-on-the-fringe'&gt;https://cis-india.org/digital-natives/blog/revealing-protesters-on-the-fringe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>denisse</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Web Politics</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-17T10:51:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1">
    <title>Rethinking the last mile Problem: A cultural argument</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1</link>
    <description>
        &lt;b&gt;This research project, by Ashish Rajadhyaksha from the Centre for the Study of Culture and Society, is mainly a conceptual-archival investigation into India’s history for what has in recent years come to be known as the ‘last mile’ problem. The term itself comes from communication theory, with in turn an ancestry in social anthropology, and concerns itself with (1) identifying the eventual recipient/beneficiary of any communication message, (2) discovering new ways by which messages can be delivered intact, i.e. without either distortion of decay. Exploring the intersection of government policy, technology intervention and the users' expectations, with a specific focus on Internet Technologies and their space in the good governance protocols in India, the project aims at revisiting the last mile problem as one of cultural practices and political contexts in India.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;THE CULTURAL
LAST MILE&lt;/p&gt;
&lt;p&gt;Ashish
Rajadhyaksha&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Argument&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Mapped onto
developmental-democratic language since at least Independence, this concept,
further mapping concrete benefits with the delivery of the message, has come to
define the classic model by which the Indian state attempts to ensure that &lt;em&gt;policy&lt;/em&gt; designed for &lt;em&gt;local implementation&lt;/em&gt; actually reaches its &lt;em&gt;intended beneficiaries&lt;/em&gt; without &lt;em&gt;distortion&lt;/em&gt;.
The immense link between communication theory and democracy thereby defines not
only the Indian state’s historic dependence on &lt;em&gt;technologies&lt;/em&gt; of communication – radio, terrestrial and satellite.
It goes further, as the technological apparatus – and its variants of the
classic ‘broadcast’ model of single sender-multiple receiver – comes to
underpin the very definition of democratic development.&lt;/p&gt;
&lt;p&gt;One consequence
is an &lt;em&gt;evolutionary&lt;/em&gt; definition of
technology, with the last mile defined as a means of eternal purification of
the message, combining content ‘corruption’ with socio-economic corruption, as
newer generations of technology tirelessly eliminate distortion in both. This
could well be the history of Indian state policy, from radio broadcasts
representing the ‘voice of the State’ to the era of e-Governance. &amp;nbsp;Such an authority is somewhat graphically in evidence in
recent years in the deployment of ‘neutral’ technology such as computers within
e-governance initiatives, which have, when successful , seen
computer-illiterate farmers make wide use of ICT services where they ‘do not
feel that there is a barrier to their obtaining information’, a ‘tribute to the
grassroots staff and their training’, but also to ‘faith in the technology’
(Shaik, Jhamtani and Rao 2004: 9). The attribution of such ‘neutrality’ to
modern ‘scientific’ technology has been in evidence from late
nineteenth-century still photography to the use of technologies such as ‘First
In–First Out (FIFO)’, a way that prevents queue-jumping, biometrics and double
screens for users to view typed in matter, including touch screens
(Parthasarathy 2005, VIII: 9).&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Research
Project&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;This project
assumes that, given the chronic historic failure in bridging the last mile,
whether in communication theory or in the standard functioning of development
projects (a key component of the relatively new discipline of disaster
management) – a failure stemming from difficulties in both naming and accessing
intended beneficiaries – it becomes necessary to reinvestigate the model
itself, along with its historic failures.&lt;/p&gt;
&lt;p&gt;The project is
split into three parts: &lt;br /&gt;
(1) The conceptual argument: a historical trace of the theoretical origins of
the concept ‘Last mile’ (even if not named as such), and key technical
locations of its deployment: the telegraph, the ‘film trains’ in the 1920s, the
radio (extended to transistorization in the 1960s), and the first experiments
with terrestrial and satellite technology. &lt;br /&gt;
(2) It will then take three specific examples (perhaps but may be
changed),(a)&amp;nbsp; the SITE experiment of the
1970s with specific new field work on the well known Kheda experiment; (b) the
Cable Television movements in India in the 1980s, and (c) Experiments with WLL
in IIT Chennai in the 1990s. &lt;br /&gt;
(3) The concluding section will address locations where the last mile has in
fact been bridged successfully, in the review’s estimation, and will inquire
into how it came to be functional. It is at this point speculated that it
worked mainly because (a) the original model was either tampered with or used
contrary to stated intentions, and (b) when it worked, this happened with the
connivance of the state. The project will therefore perhaps conclude with the
following investigations: that historically significant occasions when
alternative definitions were thrown up for the last mile worked mainly because
they were dependent on error and accident (rather than seeing these as
interruptions or distortions to the signal), and that they functioned more on
both peer-to-peer and reverse broadcasting than on the
single-sender-multiple-recipients model.&lt;/p&gt;
&lt;p&gt;&lt;u&gt;References&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1990), ‘Beaming Messages to the Nation’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, No. 19 (May): 33–52.&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1999), ‘The Judgement: Re-Forming the Public’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, Nos. 32–33 (April)&lt;/p&gt;
&lt;p&gt;N. Meera Shaik, Anita
Jhamtani and D.U.M. Rao, ‘Information and Communication Technology in
Agricultural Development: A Comparative Analysis of Three Projects from India’,
Agricultural Research and Extension Network (AGREN), 2004.&lt;/p&gt;
&lt;p&gt;Balaji Parthasarathy et
al (ed), ‘Information and Communications Technologies for Development: A
Comparative Analysis of Impacts and Costs from India’, Bangalore: International
Institute of Information Technology, 2005.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2015-04-03T10:54:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/lila-inter-actions-october-14-2014-rethinking-conditions-of-access">
    <title>Rethinking Conditions of Access</title>
    <link>https://cis-india.org/raw/lila-inter-actions-october-14-2014-rethinking-conditions-of-access</link>
    <description>
        &lt;b&gt;P. P. Sneha explores the possibilities of redefining the idea of access through the channels of education and learning. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The advent and pervasive growth of the internet and digital technologies in the last couple of decades have&amp;nbsp;caused several changes in the way we now imagine education and processes of learning, both within and outside the classroom. The increasing use of digital tools, platforms and methods in classroom pedagogy, and the access for students to resources through online and collaborative repositories such as Wikipedia have&amp;nbsp;led to a change in not just teaching practices, but also in the learning environment, which has now become more open, iterative and participatory in nature. While increased access to the internet may be one factor contributing to this change, the conditions of such access – how it is made available, to whom and for what purpose – still remain contentious. As per recent statistics, India has more than 200 million internet users, but as several studies on online users have illustrated, the numbers are hardly indicative of the nature of online engagement. The problem of the ‘digital divide’, though much debated and addressed, still persists in India, as in several other countries, with lack of infrastructure and low broadband speed being two among several reasons for the slow move in bridging this gap.&lt;/p&gt;

&lt;div&gt;&lt;a class="hasimg" href="http://www.lilainteractions.in/wp-content/uploads/2014/10/digital_inclusion_index_map_thumb.jpg"&gt;&lt;img src="http://www.lilainteractions.in/wp-content/uploads/2014/10/digital_inclusion_index_map_thumb.jpg" alt="null" height="199" width="335" /&gt;&lt;img class="himage" src="http://www.lilainteractions.in/wp-content/uploads/2014/10/digital_inclusion_index_map_thumb-bw.jpg" alt="null" height="199" width="335" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Last year, the Digital Inclusion Index map indicated India as only BRICS country ‘at extreme risk’ on the ‘digital divide’&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;The problem of the digital divide itself has largely been understood as one of access to the internet and/or broadly digital technologies, but the conditions of this access, in terms of the nature of its use and adaptability to a dynamic and ever-changing technological landscape is something that needs to be looked at critically, in order to provide a more nuanced understanding of the problem itself, and its inherent conflicts. The technological landscape we inhabit today is quite diverse, and rather multi-layered, as a result of which conditions of access also differ across spaces and in degrees. The problematisation, therefore, will need to be more qualitative and nuanced, to take into account several variables spread over social, cultural and economic categories.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignleft size-full wp-image-4133" src="http://www.lilainteractions.in/wp-content/uploads/2014/10/quote-internet-speed-ps-1.png" alt="quote internet speed ps 1" height="580" width="195" /&gt;&lt;/p&gt;
&lt;div class="hyphenate"&gt;
&lt;p style="text-align: justify;"&gt;The assumption of the internet, as an open and accessible, therefore neutral space, has also been questioned time and again, with the latest debates around net neutrality being illustrative of this conflict. Though there is a growing interest in exploring and using the democratic potential that the internet offers, as demonstrated by several forms of online social activism and the growth of open access digital knowledge repositories and public archival spaces, there are also pertinent concerns about privacy, accessibility and the quality of online interaction and content. A large part of this uncertainty and the conflicts we see around access and regulation may be attributed to the fact that the nature of the internet, or the digital itself as concept, method or space has not been adequately explored or theorised. As a public sphere, it often reprises certain systemic forms of injustice and marginalisation seen offline, and conflates them with notions pertaining to the personal. As such, social, economic and linguistic barriers mediate the access we have to certain kinds and forms of discourse online, thereby making physical access the first step towards being part of the labyrinthian world that is the internet.&lt;/p&gt;

&lt;div&gt;&lt;a class="hasimg" href="http://www.lilainteractions.in/wp-content/uploads/2014/10/maharashtra_farmers_computers_20060821.jpg"&gt;&lt;img src="http://www.lilainteractions.in/wp-content/uploads/2014/10/maharashtra_farmers_computers_20060821.jpg" alt="null" height="231" width="335" /&gt;&lt;img class="himage" src="http://www.lilainteractions.in/wp-content/uploads/2014/10/maharashtra_farmers_computers_20060821-bw.jpg" alt="null" height="231" width="335" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;How can e-learning start, when the general access is very fragmented?&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;These conflicts are present in the classroom and other spaces and processes of learning as well, where traditionally there has been resistance to the use of technology, and particularly the internet as it is seen as a disturbance or a deterrent to learning. But technology has always been a part of the classroom, and now with the mobile phone becoming ubiquitous, it is indeed difficult to imagine that a student who has access to such a device would be disconnected from the internet, or not look toward other digital tools and methods to engage with, for educational or recreational purposes. However, indeed, how much of this engagement is effectively connected to learning is still a bone of contention, and is yet to be explored adequately.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;img class="alignright size-full wp-image-4134" src="http://www.lilainteractions.in/wp-content/uploads/2014/10/quote-internet-speed-ps-2.png" alt="quote internet speed ps 2" height="430" width="195" /&gt;&lt;/p&gt;
&lt;div class="hyphenate"&gt;
&lt;p style="text-align: justify;"&gt;What are the changes in the learning environment that the advent of digital technologies has produced? What challenges do they pose for both teachers and students? And what are the possible solutions that these areas of research are opening up? A more integrated and inclusive approach in designing methods and tools for use in the classroom could be one way of making issues and conflicts in this space more transparent. Several efforts in education technology and experiments in digital learning have focused precisely on this aspect. The sheer visibility and vastness of the internet offers several possibilities in terms of access to materials, tools and resources online. Several large-scale efforts in digitisation made by both the state and public organisations are attempts to utilise this potential, and they speak of the growing interest in making material available online for both classroom teaching and research.&lt;/p&gt;

&lt;div&gt;&lt;a class="hasimg" href="http://www.lilainteractions.in/wp-content/uploads/2014/10/Mooc-vs-University-in-2013-584x1024.jpg"&gt;&lt;img src="http://www.lilainteractions.in/wp-content/uploads/2014/10/Mooc-vs-University-in-2013-584x1024.jpg" alt="null" height="587" width="335" /&gt;&lt;img class="himage" src="http://www.lilainteractions.in/wp-content/uploads/2014/10/Mooc-vs-University-in-2013-584x1024-bw.jpg" alt="null" height="587" width="335" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;The MOOCs are slowly challenging the universities&lt;a title="MOOCs vs. Universities" href="http://www.lilainteractions.in/wp-content/uploads/2014/10/Mooc-vs-University-in-2013-584x1024.jpg" target="_blank"&gt;. See the image full screen&lt;/a&gt;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;The growth of Massive Open Online Courses (MOOCs) is an example of the&amp;nbsp;fervour of&amp;nbsp;online platforms of learning, which provide students across the world with an access to teaching and course material from some of the best institutions. However, there have been, at least in their earlier versions, several critiques of these platforms, as well, precisely because they replicate a certain classroom teaching model that is not accessible to students everywhere. This urges us to revisit the premise of such structures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ‘digital turn’ in the last couple of decades has engendered several changes in the way knowledge is now produced, disseminated and consumed by people located in different areas. It has also created a need to constantly rethink existing systems of learning we have in place, to plug the gaps that develop between people, skills and resources. It is only through more attempts to problematise the notion of access qualitatively, and to better understand the role of digital technologies and the internet in terms of changes in learning environments, that we may be able to understand and utilise its potential to the best.&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;div style="text-align: justify;" class="hyphenate"&gt;&lt;strong&gt;P.P. Sneha&lt;/strong&gt; works with the Researchers at Work (RAW) programme at the Centre for Internet and Society, Bangalore. She has a Master’s degree in English, and has previously worked in the area of higher education. This essay is a reflection on some of the learnings from projects on the quality of access to higher education and a mapping of the digital landscape and the growth of Digital Humanities in India, conducted by the Higher Education Innovation and Research Applications (HEIRA) programme at the Centre for the Study of Culture and Society (with support from the Ford Foundation),  and the CIS. The original post can be &lt;a class="external-link" href="http://www.lilainteractions.in/internet-slowdown-day/"&gt;read here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/lila-inter-actions-october-14-2014-rethinking-conditions-of-access'&gt;https://cis-india.org/raw/lila-inter-actions-october-14-2014-rethinking-conditions-of-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Mapping Digital Humanities in India</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-13T05:35:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018">
    <title>Research Symposium on Digital Transitions in Cultural and Creative Industries in India, New Delhi, Feb 27-28</title>
    <link>https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018</link>
    <description>
        &lt;b&gt;It is our privilege to collaborate with LabEx ICCA (Université Paris 13), UNESCO New Delhi, Centre for Social Sciences and Humanities (CSH), and Centre d'études de l'Inde et de l'Asie du Sud (CEIAS), to organise a Research Symposium on Digital Transitions in Cultural and Creative Industries in India. The symposium gathers researchers and practitioners engaging with the changing landscape of cultural and creative industries in India in the context of the rapid expansion of digital technologies and social media. We invite you to join us for a critical exploration of the prevalent discourse around cultural and creative industries, to identify what could be the different forms of digital creative and cultural industries developing in India, and how they problematise the questions of cultural expression, knowledge production, creativity, and labour.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Venue: &lt;a href="https://www.google.com/maps/place/UNESCO+NEW+DELHI/@28.5962104,77.1766346,17z/data=!4m12!1m6!3m5!1s0x390d1d69e65aea35:0x95c8f02076400bf2!2sUNESCO+NEW+DELHI!8m2!3d28.5962104!4d77.1788233!3m4!1s0x390d1d69e65aea35:0x95c8f02076400bf2!8m2!3d28.5962104!4d77.1788233?hl=en" target="_blank"&gt;Conference Room, UNESCO New Delhi, 1 San Martin Marg, Chanakyapuri, New Delhi, 110021&lt;/a&gt; (&lt;em&gt;Note: Please bring your identity document to enter the UNESCO premises&lt;/em&gt;)&lt;/h4&gt;
&lt;h4&gt;RSVP: Registration is closed&lt;/h4&gt;
&lt;h4&gt;Booklet: &lt;a href="https://github.com/cis-india/website/raw/master/docs/labex-icca-cis-unesco_symposium-2018_booklet.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Programme: &lt;a href="https://cis-india.org/raw/files/research-symposium-on-transitions-in-cultural-and-creative-industries-in-india-programme-2018/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Poster: &lt;a href="https://raw.githubusercontent.com/cis-india/website/master/img/labex-icca-cis-unesco_symposium-2018_poster.png"&gt;Download&lt;/a&gt; (PNG)&lt;/h4&gt;
&lt;h4&gt;Organisers: &lt;a href="https://icca.univ-paris13.fr/" target="_blank"&gt;LabEx ICCA, Université Paris 13&lt;/a&gt;, &lt;a href="http://www.unesco.org/new/en/newdelhi" target="_blank"&gt;UNESCO New Delhi&lt;/a&gt;, &lt;a href="http://csh-delhi.com/" target="_blank"&gt;Centre for Social Sciences and Humanities (CSH)&lt;/a&gt;, &lt;a href="http://ceias.ehess.fr/" target="_blank"&gt;Centre d'études de l'Inde et de l'Asie du Sud (CEIAS)&lt;/a&gt;, and the Centre for Internet and Society (CIS), India&lt;/h4&gt;
&lt;hr /&gt;
&lt;img src="digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018/leadImage" alt="Research Symposium on Digital Transitions in Cultural and Creative Industries in India, New Delhi, Feb 27-28" width="50%" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Concept Note&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Digital technologies involve, accompany and provoke changes in the structuring of industrial sectors. How are they more particularly transforming the creation, production, distribution processes in cultural and creative industries? What are reconfigurations and challenges associated with the rise in power of actors from the industries of communication and information? What are the new stakeholder strategies, economic models and power relationships involved? Does digital have the effect of empowering the smallest actors / self-employed / freelancers or on the contrary does it allow large players to relieve themselves of the promotion, production costs on individual creator?&lt;/p&gt;
&lt;p&gt;A growing interest in fields such as digital humanities, new media, digital cultures and the Galleries, Libraries, Archives and Museums (GLAM) sector is another important development here. The rise of a number of digital initiatives in arts and humanities practice, research and teaching has also brought up significantly the question of new skills or expertise required in these fields. The need for digital literacy and ‘re-skilling’ to adapt to new forms of arts and humanities practice in a digital environment has often come with much criticism, as it is viewed as an effort towards vocationalisation and professionalization of these disciplines, a result of the changing mandates of the university and higher education in general. How do we then productively engage with these questions of skill, expertise and labour that goes into the building of new digital industries, which are often located within and at the periphery of academia and creative practices? Importantly, how can concerns about a perceived conflict of creativity and industry be addressed as these transformations take place rapidly with the advent of the digital is an important point of focus.&lt;/p&gt;
&lt;p&gt;A critical exploration of the prevalent discourse around creative industries would offer ways of identifying what could be the different forms of digital creative and cultural industries developing in India, and how they problematize for us questions of cultural expression, knowledge production, creativity and labour. The conflation and overlap of both ‘cultural’ and  ‘creative industries’ and the location of these terms within a larger discourse around policy, economic development, livelihoods and rights, takes on different dimensions post the digital turn. In the context of initiatives like Digital India, and efforts to consolidate an IPR regime, the implications of policy reforms for creative work, especially that performed within informal/underground economies and in the cultural heritage sector are many. These discussions would inform and draw from the ongoing efforts in fostering of a digital economy in India, and the many ways in which it determines cultural production in the rest of the world.&lt;/p&gt;
&lt;p&gt;Topics that will be addressed at the symposium include, but are not restricted to:&lt;/p&gt;
&lt;p&gt;- Digital turns and transformations in cultural and creative industries&lt;/p&gt;
&lt;p&gt;- Media infrastructure, digital platforms, and changing landscape of actors&lt;/p&gt;
&lt;p&gt;- Digital transitions in the Indian news industry&lt;/p&gt;
&lt;p&gt;- Online/offline lives of creative industries and media consumption&lt;/p&gt;
&lt;p&gt;Presented by the Labex ICCA and the Center for Internet and Society (CIS), the symposium will gather Indian, French, and international specialists in the cultural industries, new media and technology, information and communication sciences, and social sciences but also professionals and industrial actors in the cultural and artistic sectors. The event is driven an ambition to promote the creation of an interdisciplinary and inter-institutional Franco-Indian research network to initiate, develop and share research on cultural industries in India and more widely in South Asia.&lt;/p&gt;
&lt;h4&gt;Organising Committee&lt;/h4&gt;
&lt;p&gt;- Christine Ithurbide (LabEx ICCA, Université Paris 13 / CSH)&lt;/p&gt;
&lt;p&gt;- Philippe Bouquillion (LabEx ICCA, Université Paris 13)&lt;/p&gt;
&lt;p&gt;- Vibodh Parthasarathi (Jamia Millia Islamia)&lt;/p&gt;
&lt;p&gt;- Sumandro Chattapadhyay (The Centre for Internet and Society)&lt;/p&gt;
&lt;p&gt;- Puthiya Purayil Sneha (The Centre for Internet and Society)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Symposium Programme (Draft)&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;First Day – Tuesday, February 27, 2018&lt;/h4&gt;
&lt;p&gt;10:00-10:30&lt;br /&gt;
&lt;strong&gt;Tea and Coffee&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;10:30-11:00&lt;br /&gt;
&lt;strong&gt;Welcoming Address&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Snigdha Bisht (UNESCO Cultural Department)&lt;/em&gt;&lt;br /&gt;
&lt;strong&gt;Introductions&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;Shailendra Sigdel (UNESCO Institute for Statistics), Christine Ithurbide (LabEx ICCA / CSH), and Vibodh Parthasarathi (Jamia Millia Islamia)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;11:00-12:30&lt;br /&gt;
&lt;strong&gt;Session 1: Digital Opportunities and Challenges in the Cultural Industries&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Tanishka Kachru (National Institute of Design, Ahmedabad), Akshaya Kumar (IIT Indore), and Vivan Sharan (KOAN Advisory)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Christine Ithurbide (LabEx ICCA / CSH)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;12:30-13:30&lt;br /&gt;
&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;13:30-15:00&lt;br /&gt;
&lt;strong&gt;Session 2: Digital Transitions in the News Landscape&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Zeenab Aneez (Freelance Journalist), Ravichandran Bathran (Dalit Camera), and Franck Rebillard (University of Paris 3 – Sorbonne Nouvelle and Labex ICCA)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Vibodh Parthasarathi (Jamia Millia Islamia)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;15:00-15:30&lt;br /&gt;
&lt;strong&gt;Tea and Coffee&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;15:30-17:00&lt;br /&gt;
&lt;strong&gt;Session 3: Technology, Creativity, and (Re)Skilling&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Padmini Ray Murray (Srishti School of Art Design and Technology), Sneha Raghavan (Asia Art Archive), and Xenia Zeiler (University of Helsinki)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Puthiya Purayil Sneha (The Centre for Internet and Society)&lt;/em&gt;&lt;/p&gt;
&lt;h4&gt;Second Day – Wednesday, February 28, 2018&lt;/h4&gt;
&lt;p&gt;10:00-10:30&lt;br /&gt;
&lt;strong&gt;Tea and Coffee&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;10:30-12:30&lt;br /&gt;
&lt;strong&gt;Session 4: Digital Platforms and Media Distribution&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Narendra Ganesh (KPMG), Mae Thomas (Maed in India), Philippe Bouquillion (Université Paris 13 / LabEx ICCA), and Nikhil Pahwa (Medianama)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Sumandro Chattapadhyay (The Centre for Internet and Society)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;12:30-13:30&lt;br /&gt;
&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;13:30-15:00&lt;br /&gt;
&lt;strong&gt;Session 5: Copyright, Creative Content, and Rights of Performers&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Nandita Saikia (Lawyer), Anubha Sinha (The Centre for Internet and Society), and Manojna Yeluri (Artistik License)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Neha Paliwal (Sahapedia)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;15:00-15:30&lt;br /&gt;
&lt;strong&gt;Tea and Coffee&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;15:30-17:00&lt;br /&gt;
&lt;strong&gt;Session 6: Technologies of Aesthetic Imagi/nation&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Farrah Miranda (Artists), Rashmi Munikempanna (Artist), Swati Janu (Architect), and Tara Atluri (Writer, Researcher, Artist)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt; Tara Atluri (Writer, Researcher, Artist)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;17:00-18:00&lt;br /&gt;
&lt;strong&gt;Concluding Remarks&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Speakers:&lt;/strong&gt; Christine Ithurbide (LabEx ICCA / CSH), Neha Paliwal (Sahapedia), Philippe Bouquillion (Université Paris 13 / LabEx ICCA), Puthiya Purayil Sneha (The Centre for Internet and Society), Tara Atluri (Writer, Researcher, Artist), and Vibodh Parthasarathi (Jamia Millia Islamia)&lt;br /&gt;
&lt;strong&gt;Chair:&lt;/strong&gt;  Sumandro Chattapadhyay (The Centre for Internet and Society)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Location of Venue&lt;/strong&gt;&lt;/h3&gt;
&lt;iframe src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3503.1188754990826!2d77.17663461441647!3d28.596210382432034!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x390d1d69e65aea35%3A0x95c8f02076400bf2!2sUNESCO+NEW+DELHI!5e0!3m2!1sen!2sin!4v1518344368273" frameborder="0" height="450" width="600"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018'&gt;https://cis-india.org/raw/digital-transitions-in-cultural-and-creative-industries-in-india-symposium-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital News</dc:subject>
    
    
        <dc:subject>RAW Events</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Creative Industries</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-02-26T11:04:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges">
    <title>Report on Understanding Aadhaar and its New Challenges</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges</link>
    <description>
        &lt;b&gt;The Trans-disciplinary Research Cluster on Sustainability Studies at Jawaharlal Nehru University collaborated with the Centre for Internet and Society, and other individuals and organisations to organise a two day workshop on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26 and 27, 2016. The objective of the workshop was to bring together experts from various fields, who have been rigorously following the developments in the Unique Identification (UID) Project and align their perspectives and develop a shared understanding of the status of the UID Project and its impact. Through this exercise, it was also sought to develop a plan of action to address the welfare exclusion issues that have arisen due to implementation of the UID Project.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Report: &lt;a href="https://cis-india.org/internet-governance/files/report-on-understanding-aadhaar-and-its-new-challenges/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;This Report is a compilation of the observations made by participants at the workshop relating to myriad issues under the UID Project and various strategies that could be pursued to address these issues. In this Report we have classified the observations and discussions into following themes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;Brief Background of the UID Project&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;Legal Status of the UIDAI Project&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#21"&gt;Procedural issues with passage of the Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#22"&gt;Status of related litigation&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;National Identity Projects in Other Jurisdictions&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#31"&gt;Pakistan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#32"&gt;United Kingdom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#33"&gt;Estonia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#34"&gt;France&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#35"&gt;Argentina&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Technologies of Identification and Authentication&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#41"&gt;Use of Biometric Information for Identification and Authentication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#42"&gt;Architectures of Identification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#43"&gt;Security Infrastructure of CIDR&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Aadhaar for Welfare?&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#51"&gt;Social Welfare: Modes of Access and Exclusion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#52"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Surveillance and UIDAI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Strategies for Future Action&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure A&lt;/strong&gt; &lt;a href="#AA"&gt;Workshop Agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Annexure B&lt;/strong&gt; &lt;a href="#AB"&gt;Workshop Participants&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1" style="text-align: justify;"&gt;&lt;strong&gt;1. Brief Background of the UID Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In the year 2009, the UIDAI was established and the UID project was conceived by the Planning Commission under the UPA government to provide unique identification for each resident in India and to be used for delivery of welfare government services in an efficient and transparent manner, along with using it as a tool to monitor government schemes.&amp;nbsp; The objective of the scheme has been to issue a unique identification number by the Unique Identification Authority of India, which can be authenticated and verified online. It was conceptualized and implemented as a platform to facilitate identification and avoid fake identity issues and delivery of government benefits based on the demographic and biometric data available with the Authority.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “&lt;strong&gt;Act&lt;/strong&gt;”) was passed as a money bill on March 16, 2016 and was notified in the gazette March 25, 2016 upon receiving the assent of the President. However, the enforceability date has not been mentioned due to which the bill has not come into force.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Act provides that the Aadhaar number can be used to validate a person’s identity, but it cannot be used as a proof of citizenship. Also, the government can make it mandatory for a person to authenticate her/his identity using Aadhaar number before receiving any government subsidy, benefit, or service. At the time of enrolment, the enrolling agency is required to provide notice to the individual regarding how the information will be used, the type of entities the information will be shared with and their right to access their information. Consent of an individual would be obtained for using his/her identity information during enrolment as well as authentication, and would be informed of the nature of information that may be shared. The Act clearly lays that the identity information of a resident shall not be sued for any purpose other than specified at the time of authentication and disclosure of information can be made only pursuant to an order of a court not inferior to that of a District Judge and/or disclosure made in the interest of national security.&lt;/p&gt;
&lt;h3 id="2" style="text-align: justify;"&gt;&lt;strong&gt;2. Legal Status of the UIDAI Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In this section, we have summarised the discussions on the procedural issues with the passage of the Act. The participants had criticised the passage of the Act as a money bill in the Parliament. The participants also assessed the litigation pending in the Supreme Court of India that would be affected by this law. These discussions took place in the session titled, ‘Current Status of Aadhaar’ and have been summarised below.&lt;/p&gt;
&lt;h3 id="21" style="text-align: justify;"&gt;Procedural Issues with Passage of the Act&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants contested the introduction of the Act in the form of a money bill. The rationale behind this was explained at the session and is briefly explained here. Article 110 (1) of the Constitution of India defines a money bill as one containing provisions only regarding the matters enumerated or any matters incidental to the following: a) imposition, regulation and abolition of any tax, b) borrowing or other financial obligations of the Government of India, c) custody, withdrawal from or payment into the Consolidated Fund of India (CFI) or Contingent Fund of India, d) appropriation of money out of CFI, e) expenditure charged on the CFI or f) receipt or custody or audit of money into CFI or public account of India. The Act makes references to benefits, subsidies and services which are funded by the Consolidated Fund of India (CFI), however the main objectives of the Act is to create a right to obtain a unique identification number and provide for a statutory mechanism to regulate this process. The Act only establishes an identification mechanism which facilitates distribution of benefits and subsidies funded by the CFI and this identification mechanism (Aadhaar number) does not give it the character of a money bill. Further, money bills can be introduced only in the Lok Sabha, and the Rajya Sabha cannot make amendments to such bills passed by the Lok Sabha. The Rajya Sabha can suggest amendments, but it is the Lok Sabha’s choice to accept or reject them. This leaves the Rajya Sabha with no effective role to play in the passage of the bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also briefly examined the writ petition that has been filed by former Union minister Jairam Ramesh challenging the constitutionality and legality of the treatment of this Act as a money bill which has raised the question of judiciary’s power to review the decisions of the speaker. Article 122 of the Constitution of India provides that this power of judicial review can be exercised to look into procedural irregularities. The question remains whether the Supreme Court will rule that it can determine the constitutionality of the decision made by the speaker relating to the manner in which the Act was introduced in the Lok Sabha. A few participants mentioned that similar circumstances had arisen in the case of Mohd. Saeed Siddiqui v. State of U.P. &lt;a href="#ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;where the Supreme Court refused to interfere with the decision of the Uttar Pradesh legislative assembly speaker certifying an amendment bill to increase the tenure of the Lokayukta as a money bill, despite the fact that the bill amended the Uttar Pradesh Lokayukta and Up-Lokayuktas Act, 1975, which was passed as an ordinary bill by both houses. The Court in this case held that the decision of the speaker was final and that the proceedings of the legislature being important legislative privilege could not be inquired into by courts. The Court added, “the question whether a bill is a money bill or not can be raised only in the state legislative assembly by a member thereof when the bill is pending in the state legislature and before it becomes an Act.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it is necessary to carve a distinction between Rajya Sabha and State Legislature. Unlike the State Legislature, constitution of Rajya Sabha is not optional therefore significance of the two bodies in the parliamentary process cannot be considered the same. Participants also made another significant observation about a similar bill on the UID project (National Identification Authority of India (NIDAI) Bill) that was introduced before by the UPA government in 2010 and was deemed unacceptable by the standing committee on finance, headed by Yashwant Sinha. This bill was subsequently withdrawn.&lt;/p&gt;
&lt;h3 id="22" style="text-align: justify;"&gt;Status of Related Litigation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist in this session briefly summarised all the litigation that was related to or would be affected by the Act. The panellist also highlighted several Supreme Court orders in the case of &lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; &lt;a href="#ftn2"&gt;[2]&lt;/a&gt; which limited the use of Aadhaar. We have reproduced the presentation below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;KS Puttuswamy v. Union of India&lt;/em&gt; - This petition was filed in 2012 with primary concern about providing Aadhaar numbers to illegal immigrants in India. It was contended that this could not be done without a law establishing the UIDAI and amendment to the Citizenship laws. The petitioner raised concerns about privacy and fallibility of biometrics.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Sudhir Vombatkere &amp;amp; Bezwada Wilson &lt;a href="#ftn3"&gt;[3]&lt;/a&gt; - This petition was filed in 2013 on grounds of infringement of right to privacy guaranteed under Article 21 of the Constitution of India and the security threat on account of data convergence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Aruna Roy &amp;amp; Nikhil Dey &lt;a href="#ftn4"&gt;[4]&lt;/a&gt; - This petition was filed in 2013 on the grounds of large scale exclusion of people from access to basic welfare services caused by UID. After their petition, no. of intervention applications were filed. These were the following:&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Col. Mathew Thomas &lt;a href="#ftn5"&gt;[5]&lt;/a&gt; - This petition was filed on the grounds of threat to national security posed by the UID project particularly in relation to arrangements for data sharing with foreign companies (with links to foreign intelligence agencies).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Nagrik Chetna Manch &lt;a href="#ftn6"&gt;[6]&lt;/a&gt; - This petition was filed in 2013 and led by Dr. Anupam Saraph on the grounds that the UID project was detrimental to financial service regulation and financial &lt;em&gt;inclusion.&lt;/em&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;S. Raju &lt;a href="#ftn7"&gt;[7] &lt;/a&gt; - This petition was filed on the grounds that the UID project had implications on the federal structure of the State and was detrimental to financial inclusion.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Beghar Foundation&lt;/em&gt; - This petition was filed in 2013 in the Delhi High Court on the grounds invasion of privacy and exclusion specifically in relation to the homeless. It subsequently joined the petition filed by Aruna Roy and Nikhil Dey as an intervener.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vickram Crishna – This petition was originally filed in the Bombay High Court in 2013 on the grounds of surveillance and invasion of privacy. It was later transferred to the Supreme Court.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Somasekhar – This petition was filed on the grounds of procedural unreasonableness of the UID project and also exclusion &amp;amp; privacy. The petitioner later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajeev Chandrashekhar– This petition was filed on the ground of lack of legal sanction for the UID project. He later intervened in the petition filed by Aruna Roy and Nikhil Dey in 2013. His position has changed now.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Further, a petition was filed by Mr. Jairam Ramesh initially challenging the passage of the Act as a money bill but subsequently, it has been amended to include issues of violation of right to privacy and exclusion of the poor and has advocated for five amendments that were suggested to the Aadhaar Bill by the Rajya Sabha.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="23" style="text-align: justify;"&gt;Relevant Orders of the Supreme Court&lt;/h3&gt;
&lt;p&gt;There are six orders of the Supreme Court which are noteworthy.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Order of Sept. 23, 2013 - The Supreme court directed that: 1) no person shall suffer for not having an aadhaar number despite the fact that a circular by an authority makes it mandatory; 2) it should be checked if a person applying for aadhaar number voluntarily is entitled to it under the law; and 3) precaution should be taken that it is not be issued to illegal immigrants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 26th November, 2013 – Applications were filed by UIDAI, Ministry of Petroleum &amp;amp; Natural Gas, Govt of India, Indian Oil Corporation, BPCL and HPCL for modifying the September 23rd order and sought permission from the Supreme Court to make aadhaar number mandatory. The Supreme Court held that the order of September 23rd would continue to be effective.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 24th March, 2014 – This order was passed by the Supreme Court in a special leave petition filed in the case of &lt;em&gt;UIDAI v CBI&lt;/em&gt; &lt;a href="#ftn8"&gt;[8] &lt;/a&gt; wherein UIDAI was asked to UIDAI to share biometric information of all residents of a particular place in Goa to facilitate a criminal investigation involving charges of rape and sexual assault. The Supreme Court restrained UIDAI from transferring any biometric information of an individual without to any other agency without his consent in writing. The Supreme Court also directed all the authorities to modify their forms/circulars/likes so as to not make aadhaar number mandatory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Order of 16th March, 2015 - The SC took notice of widespread violations of the order passed on September 23rd, 2013 and directed the Centre and the states to adhere to these orders to not make aadhaar compulsory.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of August 11, 2015 – In the first order, the Central Government was directed to publicise the fact that aadhaar was voluntary. The Supreme Court further held that provision of benefits due to a citizen of India would not be made conditional upon obtaining an aadhaar number and restricted the use of aadhaar to the PDS Scheme and in particular for the purpose of distribution of foodgrains, etc. and cooking fuel, such as kerosene and&amp;nbsp; the LPG Distribution Scheme. The Supreme Court also held that information of an individual that was collected in order to issue an aadhaar number would not be used for any purpose except when directed by the Court for criminal investigations. Separately, the status of fundamental right to privacy was contested and accordingly the Supreme Court directed that the issue be taken up before the Chief Justice of India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orders of October 16, 2015 – The Union of India, the states of Gujarat, Maharashtra, Himachal Pradesh and Rajasthan, and authorities including SEBI, TRAI,&amp;nbsp; CBDT, IRDA , RBI applied for a hearing before the Constitution Bench for modification of&amp;nbsp; the order passed by the Supreme Court on August 11 and allow use of aadhaar number schemes like The Mahatma Gandhi National Rural Employment Guarantee Scheme MGNREGS), National Social Assistance Programme (Old Age Pensions, Widow Pensions, Disability Pensions) Prime Minister's Jan Dhan Yojana (PMJDY) and Employees' Providend Fund Organisation (EPFO). The Bench allowed the use of aadhaar number for these schemes but stressed upon the need to keep aadhaar scheme voluntary until the matter was finally decided.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Status of these orders&lt;br /&gt;The participants discussed the possible impact of the law on the operation of these orders. A participant pointed out that matters in the Supreme Court had not become infructuous because fundamental issues that were being heard in the Supreme Court had not been resolved by the passage of the Act. Several participants believed that the aforementioned orders were effective because the law had not come into force. Therefore, aadhaar number could only be used for purposes specified by the Supreme Court and it could not be made mandatory.&amp;nbsp; Participants also highlighted that when the Act was implemented, it would not nullify the orders of the Supreme Court unless Union of India asked the Supreme Court for it specifically and the Supreme Court sanctioned that.&lt;/p&gt;
&lt;h3 id="3" style="text-align: justify;"&gt;&lt;strong&gt;3. National Identity Projects in Other Jurisdictions&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A panellist had provided a brief overview of similar programs on identification that have been launched in other jurisdictions including Pakistan, United Kingdom, France, Estonia and Argentina in the recent past in the session titled ‘Aadhaar - International Dimensions’. This presentation mainly sought to assess the incentives that drove the governments in these jurisdictions to formulate these projects, mandatory nature of their adoption and their popularity. The Report has reproduced the presentation here.&lt;/p&gt;
&lt;h3 id="31" style="text-align: justify;"&gt;Pakistan&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Second Amendment to the Constitution of Pakistan in 2000 established the National Database and Regulation Authority in the country, which regulates government databases and statistically manages the sensitive registration database of the citizens of Pakistan. It is also responsible for issuing national identity cards to the citizens of Pakistan. Although the card is not legally compulsory for a Pakistani citizen, it is mandatory for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Voting&lt;/li&gt;
&lt;li&gt;Obtaining a passport&lt;/li&gt;
&lt;li&gt;Purchasing vehicles and land&lt;/li&gt;
&lt;li&gt;Obtaining a driver licence&lt;/li&gt;
&lt;li&gt;Purchasing a plane or train ticket&lt;/li&gt;
&lt;li&gt;Obtaining a mobile phone SIM card&lt;/li&gt;
&lt;li&gt;Obtaining electricity, gas, and water&lt;/li&gt;
&lt;li&gt;Securing admission to college and other post-graduate institutes&lt;/li&gt;
&lt;li&gt;Conducting major financial transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it is pretty much necessary for basic civic life in the country. In 2012, NADRA introduced the Smart National Identity Card, an electronic identity card, which implements 36 security features. The following information can be found on the card and subsequently the central database: Legal Name, Gender (male, female, or transgender), Father's name (Husband's name for married females), Identification Mark, Date of Birth, National Identity Card Number, Family Tree ID Number, Current Address, Permanent Address, Date of Issue, Date of Expiry, Signature, Photo, and Fingerprint (Thumbprint). NADRA also records the applicant's religion, but this is not noted on the card itself. (This system has not been removed yet and is still operational in Pakistan.)&lt;/p&gt;
&lt;h3 id="32" style="text-align: justify;"&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Identity Cards Act was introduced in the wake of the terrorist attacks on 11th September, 2001, amidst rising concerns about identity theft and the misuse of public services. The card was to be used to obtain social security services, but the ability to properly identify a person to their true identity was central to the proposal, with wider implications for prevention of crime and terrorism. The cards were linked to a central database (the National Identity Register), which would store information about all of the holders of the cards. The concerns raised by human rights lawyers, activists, security professionals and IT experts, as well as politicians were not to do with the cards as much as with the NIR. The Act specified 50 categories of information that the NIR could hold, including up to 10 fingerprints, digitised facial scan and iris scan, current and past UK and overseas places of residence of all residents of the UK throughout their lives. The central database was purported to be a prime target for cyber attacks, and was also said to be a violation of the right to privacy of UK citizens. The Act was passed by the Labour Government in 2006, and repealed by the Conservative-Liberal Democrat Coalition Government as part of their measures to “reverse the substantial erosion of civil liberties under the Labour Government and roll back state intrusion.”&lt;/p&gt;
&lt;h3 id="33" style="text-align: justify;"&gt;Estonia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Estonian i-card is a smart card issued to Estonian citizens by the Police and Border Guard Board. All Estonian citizens and permanent residents are legally obliged to possess this card from the age of 15. The card stores data such as the user's full name, gender, national identification number, and cryptographic keys and public key certificates. The cryptographic signature in the card is legally equivalent to a manual signature, since 15 December 2000. The following are a few examples of what the card is used for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As a national ID card for legal travel within the EU for Estonian citizens&lt;/li&gt;
&lt;li&gt;As the national health insurance card&lt;/li&gt;
&lt;li&gt;As proof of identification when logging into bank accounts from a home computer&lt;/li&gt;
&lt;li&gt;For digital signatures&lt;/li&gt;
&lt;li&gt;For i-voting&lt;/li&gt;
&lt;li&gt;For accessing government databases to check one’s medical records, file taxes, etc.&lt;/li&gt;
&lt;li&gt;For picking up e-Prescriptions&lt;/li&gt;
&lt;li&gt;(This system is also operational in the country and has not been removed)&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="34" style="text-align: justify;"&gt;France&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The biometric ID card was to include a compulsory chip containing personal information, such as fingerprints, a photograph, home address, height, and eye colour. A second, optional chip was to be implemented for online authentication and electronic signatures, to be used for e-government services and e-commerce. The law was passed with the purpose of combating “identity fraud”. It was referred to the Constitutional Council by more than 200 members of the French Parliament, who challenged the compatibility of the bill with the citizens’ fundamental rights, including the right to privacy and the presumption of innocence. The Council struck down the law, citing the issue of proportionality. “Regarding the nature of the recorded data, the range of the treatment, the technical characteristics and conditions of the consultation, the provisions of article 5 touch the right to privacy in a way that cannot be considered as proportional to the meant purpose”.&lt;/p&gt;
&lt;h3 id="35" style="text-align: justify;"&gt;Argentina&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Documento Nacional de Identidad or DNI (which means National Identity Document) is the main identity document for Argentine citizens, as well as temporary or permanent resident aliens. It is issued at a person's birth, and updated at 8 and 14 years of age simultaneously in one format: a card (DNI tarjeta); it's valid if identification is required, and is required for voting. The front side of the card states the name, sex, nationality, specimen issue, date of birth, date of issue, date of expiry, and transaction number along with the DNI number and portrait and signature of the card's bearer. The back side of the card shows the address of the card's bearer along with their right thumb fingerprint. The front side of the DNI also shows a barcode while the back shows machine-readable information. The DNI is a valid travel document for entering Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay, and Venezuela. (System still operational in the country)&lt;/p&gt;
&lt;h3 id="4" style="text-align: justify;"&gt;&lt;strong&gt;4. Technologies of Identification and Authentication&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panel in the session titled ‘Aadhaar: Science, Technology, and Security’ explained the technical aspects of use of biometrics and privacy concerns, technology architecture for identification and inadequacy of infrastructure for information security. In this section, we have summarised the presentation and the ensuing discussions on these issues.&lt;/p&gt;
&lt;h3 id="41" style="text-align: justify;"&gt;Use of Biometric Information for Identification and Authentication&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained with examples that identification and authentication were different things. Identity provides an answer to the question “who are you?” while authentication is a challenge-response process that provides a proof of the claim of identity. Common examples of identity are User ID (Login ID), cryptographic public keys and ATM or Smart cards while common authenticators are passwords (including OTPs), PINs and cryptographic private keys. Identity is public information but an authenticator must be private and known only to the user. Authentication must necessarily be a conscious process and active participation by the user is a must. It should also always be possible to revoke an authenticator. After providing this understanding of the two processes the panellist then explained if biometric information could be used for identification or authentication under the UID Project. Biometric information is clearly public information and it is questionable if it can be revoked. Therefore it should never be used for authentication, but only for identity verification. There is a possibility of authentication by fingerprints under the UID Project, without conscious participation of the user. One could trace the fingerprints of an individual from any place the individual has been in contact with. Therefore, authentication must certainly be done by other means. The panellist pointed out that there were five kinds of authentication under the UID Project, out of which two-factor authentication and one time password were considered suitable but use of biometric information and demographic information was extremely threatening and must be withdrawn.&lt;/p&gt;
&lt;h3 id="42" style="text-align: justify;"&gt;Architectures of Identification&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists explained the architecture of the UID Project that has been designed for identification purposes, highlighted its limitations and suggested alternatives. His explanations are reproduced below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, there is a centralised means of identification i.e. the aadhaar number and biometric information stored in one place, Central Identification Data Repository (CIDR). It is better to have multiple means of identification than one (as contemplated under the UID Project) for preservation of our civil liberties. The question is what the available alternatives are. Web of trust is a way for operationalizing distributed identification but the challenge is how one brings people from all social levels to participate in it. There is a need for registrars who will sign keys and public databases for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number functions as a common index and facilitates correlation of data across Government databases. While this is tremendously attractive it raises several privacy concerns as more and more information relating to an individual is available to others and is likely to be abused.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The aadhaar number is available in human readable form. This raises the risk of identification without consent and unauthorised profiling. It cannot be revoked. Potential for damage in case of identity theft increases manifold.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Under the UID Project, for the purpose of information security, Authentication User Agencies (“&lt;strong&gt;AUA&lt;/strong&gt;”) are required to use local identifiers instead of aadhaar numbers but they are also required to map these local identifiers to the aadhaar numbers. Aadhaar numbers are not cryptographically secured; in fact they are publicly available. Hence this exercise for securing information is useless. An alternative would be to issue different identifiers for different domains and cryptographically embed a “master identifier” (in this case, equivalent of aadhaar number) into each local identifier.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All field devices (for example POS machines) should be registered and must communicate directly with UIDAI. In fact, UIDAI must verify the authenticity (tamper proof) of the field device during run time and a UIDAI approved authenticity certificate must be issued for field devices. This certificate must be made available to users on demand. Further, the security and privacy frameworks within which AUAs work must be appropriately defined by legal and technical means.&lt;/p&gt;
&lt;h3 id="43" style="text-align: justify;"&gt;Security Infrastructure of CIDR&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The panelists also enumerated the security features of the UID Project and highlighted the flaws in these features. These have been summarised below.&lt;/p&gt;
&lt;p&gt;The security and privacy infrastructure of UIDAI has the following main features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2048 bit PKI encryption of biometric data in transit&lt;/li&gt;
&lt;li&gt;End-to-end encryption from enrolment/POS to CIDR&lt;/li&gt;
&lt;li&gt;HMAC based tamper detection of PID blocks&lt;/li&gt;
&lt;li&gt;Registration and authentication of AUAs&lt;/li&gt;
&lt;li&gt;Within CIDR only a SHA 1 Hash of Aadhaar number is stored&lt;/li&gt;
&lt;li&gt;Audit trails are stored SHA 1 encrypted. Tamper detection?&lt;/li&gt;
&lt;li&gt;Only hashes of passwords and PINs are stored. (biometric data stored in original form though!)&lt;/li&gt;
&lt;li&gt;Authentication requests have unique session keys and HMAC&lt;/li&gt;
&lt;li&gt;Resident data stored using 100 way sharding (vertical partitioning). First two digits of Aadhaar number as shard keys&lt;/li&gt;
&lt;li&gt;All enrolment and update requests link to partitioned databases using Ref IDs (coded indices)&lt;/li&gt;
&lt;li&gt;All accesses through a hardware security module&lt;/li&gt;
&lt;li&gt;All analytics carried out on anonymised data&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The panellists pointed out the concerns about information security on account of design flaws, lack of procedural safeguards, openness of the system and too much trust imposed on multiple players. All symmetric and private keys and hashes are stored somewhere within UIDAI.&amp;nbsp; This indicates that trust is implicitly assumed which is a glaring design flaw.&amp;nbsp; There is no well-defined approval procedure for data inspection, whether it is for the purpose of investigation or for data analytics. There is a likelihood of system hacks, insider leaks, and tampering of authentication records and audit trails. The ensuing discussions highlighted that the UIDAI had admitted to these security risks. The enrolment agencies and the enrolment devices cannot be trusted. AUAs cannot be trusted with biometric and demographic data; neither can they be trusted with sensitive user data of private nature. There is a need for an independent third party auditor for distributed key management, auditing and approving UIDAI programs, including those for data inspection and analytics, whitebox cryptographic compilation of critical parts of the UIDAI programs, issue of cryptographic keys to UIDAI programs for functional encryption, challenge-response for run-time authentication and certification of UIDAI programs. The panellist recommended that there was a need to to put a suitable legal framework to execute this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants also discussed that information infrastructure must not be made of proprietary software (possibility for backdoors for US) and there must be a third party audit with a non-negotiable clause for public audit.&lt;/p&gt;
&lt;h3 id="5" style="text-align: justify;"&gt;&lt;strong&gt;5. Aadhaar for Welfare?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Report has summarised the discussions that took place in the sessions on ‘Direct Benefits Transfers’ and ‘Aadhaar: Broad Issues - II’ where the panellists critically analysed the claims of benefits and inclusion of Aadhaar made by the government in light of the ground realities in states where Aadhaar has been adopted for social welfare schemes.&lt;/p&gt;
&lt;h3 id="51" style="text-align: justify;"&gt;Social Welfare: Modes of Access and Exclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Under the Act, a person may be required to authenticate or give proof of the aadhaar number in order to receive subsidy from the government (Section 7). A person is required to punch their fingerprints on POS machines in order to receive their entitlement under the social welfare schemes such as LPG and PDS. It was pointed out in the discussions that various states including Rajasthan and Delhi had witnessed fingerprint errors while doling out benefits at ration shops under the PDS scheme. People have failed to receive their entitled benefits because of these fingerprint errors thus resulting in exclusion of beneficiaries &lt;a href="#ftn9"&gt;[9]&lt;/a&gt;. A panellist pointed out that in Rajasthan, dysfunctional biometrics had led to further corruption in ration shops. Ration shop owners often lied to the beneficiaries about functioning of the biometric machines (POS Machines) and kept the ration for sale in the market therefore making a lot of money at the expense of uninformed beneficiaries and depriving them of their entitlements.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another participant organisation also pointed out similar circumstances in the ration shops in Patparganj and New Delhi constituencies. Here, the dealers had maintained the records of beneficiaries who had been categorized as follows: beneficiaries whose biometrics did not match, beneficiaries whose biometrics matched and entitlements were provided, beneficiaries who never visited the ration shop. It had been observed that there were no entries in the category of beneficiaries whose biometrics did not match however, the beneficiaries had a different story to tell. They complained that their biometrics did not match despite trying several times and there was no mechanism for a manual override. Consequently, they had not been able to receive any entitlements for months. The discussions also pointed out that the food authorities had placed complete reliance on authenticity of the POS machines and claim that this system would weed out families who were not entitled to the benefits. The MIS was also running technical glitches as a result there was a problem with registering information about these transactions hence, no records had been created with the State authority about these problems. A participant also discussed the plight of 30,000 widows in Delhi, who were entitled to pension and used to collect their entitlement from post offices, faced exclusion due to transition problems under the Jan Dhan Yojana (after the Jandhan was launched the money was transferred to their bank accounts in order to resolve the problem of misappropriation of money at the hands of post office officials). These widows were asked to open bank accounts to receive their entitlements and those who did not open these accounts and did not inform the post office were considered bogus.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the discussions, the participants also noted that this unreliability of fingerprints as a means of authentication of an individual’s identity was highlighted at the meeting of Empowered Group of Ministers in 2011 by J Dsouza, a biometrics scientist. He used his wife’s fingerprints to demonstrate that fingerprints may change overtime and in such an event, one would not be able to use the POS machine anymore as the machine would continue to identify the impressions collected initially.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants who had been working in the field had contributed to the discussions by busting the myth that the UID Project helped to identify who was poor and resolve the problem of exclusion due to leakages in the social welfare programs. These discussions have been summarised below.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;It is important to understand that the UID Project is merely an identification and authentication system. It only helps in verifying if an individual is entitled to benefits under a social security scheme. It does not ensure plugging of leakages and reducing corruption in social security schemes as has been claimed by the Government. The reduction in leakage of PDS, for instance, should be attributed to digitization and not UID. The Government claims, that it has saved INR 15000 crore in provision of LPG on identification of 3.34 crore inactive accounts on account of the UID Project. This is untrue because the accounts were weeded by using mechanisms completely unrelated to the UID Project. Consequently, the savings on account of UID are only of INR 120 crore and not 15000 crore.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The UID Project has resulted in exclusion of people either because they do not have an aadhaar number, or they have a wrong identification, or there are errors of classification or wilful misclassification. About 99.7% people who were given aadhaar numbers already had an identification document. In fact, during enrolment a person is required to produce one of 14 identification documents listed under the law in order to get an aadhaar number which makes it very difficult for a person with no identity to become entitled to a social welfare scheme.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;A participant condemned the Government’s claim that the UID Project had helped in removing fake, bogus and duplicate cards and said that these terms could not be used synonymously and the authorities had no clarity about the difference between the meanings of these terms. The UID Project had only helped in removal of duplicate cards but had not helped in combating the use of fake and bogus cards.&lt;/p&gt;
&lt;h3 id="52" style="text-align: justify;"&gt;Financial Inclusion and Direct Benefits Transfer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants also engaged in the discussions about the impact of the UID project on financial inclusion in India in the sessions titled ‘Aadhaar: Broad Issues - I &amp;amp; II’. We have summarised these discussions below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UID Project seeks to directly transfer money to a bank account in order to combat corruption. The discussions highlighted that this was nothing but introducing a neo liberal thrust in social policy and that it was not feasible for various reasons. First, 95% of rural India did not have functioning banks and banks are quite far away. Second, in order to combat this dearth of banks the idea of business correspondents, who handled banking transactions and helped in opening of bank accounts, had been introduced which had created various problems. The Reserve Bank of India reported that there was dearth of business correspondents as there was very little incentive to become one; their salary is merely INR 4000. Third, there were concerns about how an aadhaar number was considered a valid document for Know Your Customer (KYC) checks. There was a requirement for scrutiny and auditing of documents submitted during the time of enrolment which, in the present scheme of things, could not be verified. Fourth, there were no restrictions on number of bank accounts that could be opened with a single aadhaar number which gave rise to a possibility of opening multiple and shell accounts on a single aadhaar number. Therefore, records only showed transactions when money was transferred from an aadhaar number to another aadhaar number as opposed to an account-to-account transfer. The discussion relied on NPCI data which shows which bank an aadhaar number is associated with but does not show if a transaction by an aadhaar number is overwritten by another bank account belonging to the same aadhaar number.&lt;/p&gt;
&lt;h3 id="6" style="text-align: justify;"&gt;&lt;strong&gt;6. Surveillance and UIDAI&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The participants had discussed the possibility of an alternative purpose for enrolling Aadhaar in the session titled ‘Privacy, Surveillance, and Ethical Dimensions of Aadhaar’. The discussion traced the history of this project to gain insight on this issue. We have summarised below the key take aways from this discussion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are claims that the main objective of launching the UID Project is not to facilitate implementation of social security schemes but to collect personal (financial and non-financial) information of the citizens and residents of the country to build a data monopoly. For this purpose, PDS was chosen as a suitable social security scheme as it has the largest coverage. Several participants suggested that numerous reports authored by FICCI, KPMG and ASSOCHAM contained proposals for establishing a national identity authority which threw some light on the commercial intentions behind information collection under the UID Project.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was also pointed out that there was documented proof that information collected under the UID Project might have been shared with foreign companies. There are suggestions about links established between proponents of the UID Project and companies backed by CIA or the French Government which run security projects and deal in data sharing in several jurisdictions.&lt;/p&gt;
&lt;h3 id="7" style="text-align: justify;"&gt;&lt;strong&gt;7. Strategies for Future Action&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The participants laid down a list of measures that must be taken to take the discussions forward. We have enumerated these recommendations below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prepare and compile an anthology of articles as an output of this workshop. &lt;/li&gt;
&lt;li&gt;Prepare position papers on specific issues related to the UID Project &lt;/li&gt;
&lt;li&gt;Prepare pamphlets/brochures on issues with the UID Project for public consumption &lt;/li&gt;
&lt;li&gt;Prepare counter-advertisements for Aadhaar&lt;/li&gt;
&lt;li&gt;Publish existing empirical evidence on the flaws in Aadhaar.&lt;/li&gt;
&lt;li&gt;Set up an online portal dedicated to providing updates on the UID Project and allows discussions on specific issues related to Aadhaar.&lt;/li&gt;
&lt;li&gt;Use Social Media to reach out to the public. Regularly track and comment on social media pages of relevant departments of the government.&lt;/li&gt;
&lt;li&gt;Create groups dedicated to research and advocacy of specific aspects of the UID Project. &lt;/li&gt;
&lt;li&gt;Create a Coordination Committee preferably based in Delhi which would be responsible for regularly holding meetings and for preparing a coordinated plan of action. Employ permanent to staff to run the Committee.&lt;/li&gt;
&lt;li&gt;Organise an advocacy campaign against use of Aadhaar in collaboration with other organisations and build public domain acceptance. &lt;/li&gt;
&lt;li&gt;The campaign must specifically focus on the unfettered scope of UID and expanse, misrepresentation of the success of Aadhaar by highlighting real savings, technological flaws, status of pilot programs and increasing corruption on account of the UID Project&lt;/li&gt;
&lt;li&gt;Prepare a statement of public concern regarding the UID Project and collect signatures from eminent persons including academics, technical experts, civil society groups and members of parliament.&lt;/li&gt;
&lt;li&gt;Organise events and discussions on issues relating to Aadhaar and invite members og government departments to speak and discuss the issues. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Write to Members of Parliament and Members of Legislative Assemblies raising questions on their or their parties’ support for Aadhaar and silence on the problems created by the UID Project. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Organise public hearings in states like Rajasthan to observe and document ground realities of the UID Project and share these outcomes with the state government and media. &lt;/li&gt;
&lt;li&gt;Plan a national social audit and public hearing on the working of UID Project in the country. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;File Contempt Petitions in the Supreme Court and High Courts against mandatory use of Aadhaar number for services not allowed by the Supreme Court. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach out to and engage with various foreign citizens and organisations that have been fighting on similar issues. The organisations and individuals who could be approached would include EPIC, Electronic Frontier foundation, David Moss, UK, Roger Clarke, Australia, Prof. Ian Angel, Snowden, Assange and Chomsky.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Work towards increasing awareness about the UID Project and gaining support from the student and research community, student organisations, trade unions, and other associations and networks in the unorganised sector.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="AA" style="text-align: justify;"&gt;&lt;strong&gt;Annexure A – Workshop Agenda&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;May 26, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:00-9:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-10:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt; 
&lt;em&gt;Self-introduction and expectations of participants&lt;/em&gt;&lt;br /&gt;
Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10:00-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 1: Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;
S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt; &lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:30-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 2: Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;
Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a   Bicycle&lt;/em&gt;&lt;br /&gt;
Prof. R. Ramakumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical   analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;
Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:30-14:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 3: Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;
Prof. Subashis Banerjee, Dept of Computer Science &amp;amp; Engineering, IIT,   Delhi - &lt;em&gt;Privacy and Security   Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;
Pukhraj Singh, Former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and   Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-16:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:30-17:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 4: Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt; 
Joshita Pai, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in Other Parts of the World&lt;/em&gt;&lt;br /&gt;
Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;17:30-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4&gt;May 27, 2016&lt;/h4&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9:30-11:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 5: Privacy, Surveillance and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;
Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;
Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;
Col Mathew Thomas, Bengaluru - &lt;em&gt;The Deceit of Aadhaar&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00-11:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;em&gt;11:30-13:00&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 6: Aadhaar - Broad Issues I&lt;/strong&gt;&lt;br /&gt;
Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;
Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13:00-14:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14:00-15:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 7: Aadhaar - Broad Issues II&lt;/strong&gt;&lt;br /&gt;
Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;
Nikhil Dey, MKSS, Rajasthan - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;
Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;Discussion&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Session 8: Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16:00-18:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Informal Meetings&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="AB" style="text-align: justify;"&gt;&lt;strong&gt;Annexure B – Workshop Participants&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Anjali Bhardwaj, Satark Nagrik Sangathan&lt;/p&gt;
&lt;p&gt;Dr. Anupam Saraph&lt;/p&gt;
&lt;p&gt;Arjun Jayakumar, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Ashok Rao, Delhi Science Forum&lt;/p&gt;
&lt;p&gt;Prof. Chinmayi Arun, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Prof. Dinesh Abrol, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties&lt;/p&gt;
&lt;p&gt;Prof. Himanshu, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Japreet Grewal, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Joshita Pai, National Law University, Delhi&lt;/p&gt;
&lt;p&gt;Malini Chakravarty, Centre for Budget and Governance Accountability&lt;/p&gt;
&lt;p&gt;Col. Mathew Thomas&lt;/p&gt;
&lt;p&gt;Prof. MS Sriram, Indian Institute of Management, Bangalore&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Knowledge Commons and Free Software Movement of India&lt;/p&gt;
&lt;p&gt;Pukhraj Singh, Bhujang&lt;/p&gt;
&lt;p&gt;Rajiv Mishra, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. R Ramakumar, Tata Institute of Social Sciences, Mumbai&lt;/p&gt;
&lt;p&gt;Dr. Reetika Khera, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Dr. Ritajyoti Bandyopadhyay, Indian Institute of Science Education and Research, Mohali&lt;/p&gt;
&lt;p&gt;S. Prasanna, Advocate&lt;/p&gt;
&lt;p&gt;Sanjay Kumar, Science Journalist&lt;/p&gt;
&lt;p&gt;Sharath, Software Freedom Law Centre&lt;/p&gt;
&lt;p&gt;Shivangi Narayan, Jawaharlal Nehru University&lt;/p&gt;
&lt;p&gt;Prof. Subhashis Banerjee, Indian Institute of Technology, Delhi&lt;/p&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Dr. Usha Ramanathan, Legal Researcher&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: This list is only indicative, and not exhaustive.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="ftn1"&gt;&lt;strong&gt;[1]&lt;/strong&gt;&lt;/a&gt; Civil Appeal No. 4853 of 2014&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn2"&gt;&lt;strong&gt;[2]&lt;/strong&gt;&lt;/a&gt; WP(C) 494/2012&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn3"&gt;&lt;strong&gt;[3]&lt;/strong&gt; &lt;/a&gt;. WP(C) 829/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn4"&gt;&lt;strong&gt;[4]&lt;/strong&gt;&lt;/a&gt; WP(C) 833/2013&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn5"&gt;&lt;strong&gt;[5]&lt;/strong&gt;&lt;/a&gt; WP (C) 37/2015; (Earlier intervened in the Aruna Roy petition in 2013)&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn6"&gt;&lt;strong&gt;[6]&lt;/strong&gt;&lt;/a&gt; WP (C) 932/2015&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn7"&gt;&lt;strong&gt;[7]&lt;/strong&gt;&lt;/a&gt; Transferred from Madras HC 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="ftn8"&gt;&lt;strong&gt;[8]&lt;/strong&gt;&lt;/a&gt; SLP (Crl) 2524/2014 filed against the order of the Goa Bench of the Bombay HC in CRLWP 10/2014 wherein the High Court had directed UIDAI to share biometric information held by them of all residents of a particular place in Goa to help with a criminal investigation in a case involving charges of rape and sexual assault.&lt;/p&gt;
&lt;p&gt;&lt;a name="ftn9"&gt;&lt;strong&gt;[9]&lt;/strong&gt;&lt;/a&gt; See :http://scroll.in/article/806243/rajasthan-presses-on-with-aadhaar-after-fingerprint-readers-fail-well-buy-iris-scanners&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges'&gt;https://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal, Vanya Rakesh, Sumandro Chattapadhyay, and Elonnai Hickock</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:42:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond">
    <title>Reflecting from the Beyond</title>
    <link>https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond</link>
    <description>
        &lt;b&gt;After going ‘beyond the digital’ with Blank Noise through the last nine posts, the final post in the series reflects on the understanding gained so far about youth digital activism and questions one needs to carry in moving forward on researching, working with, and understanding digital natives. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p class="Normalfirstparagraph"&gt;Throughout
the series, I have argued the following points. &lt;a href="https://cis-india.org/digital-natives/blog/beyond-the-digital-understanding-digital-natives-with-a-cause" class="external-link"&gt;Firstly&lt;/a&gt;, the 21&lt;sup&gt;st&lt;/sup&gt;
century society is changing into a network society and that youth movements are
changing accordingly. I have outlined the gaps in the current perspectives used
in understanding the current form and proposed to approach the topic by going
beyond the digital: from a youth standpoint, exploring all the elements of
social movement, and based on a case study in the Global South – the uber cool
Blank Noise community who have embraced the research with open arms. The
methodology has allowed me to identify the newness in &lt;a href="https://cis-india.org/digital-natives/blog/talking-back-without-talking-back" class="external-link"&gt;youth’s approach to
social change&lt;/a&gt; and &lt;a href="https://cis-india.org/digital-natives/blog/the-many-faces-within" class="external-link"&gt;ways of organizing&lt;/a&gt;. Although I do not mean to generalize,
there are some points where the case study resonates with the broader youth
movement of today. In this concluding post, I will reflect on how the research
journey has led me to rethink several points about youth, social change, and
activism.&lt;/p&gt;
&lt;p&gt;While
social movements are commonly imagined to aim for concrete structural change,
many youth movements today aim for social and cultural change at the intangible
attitudinal level. Consequently, they articulate the issue with an intangible
opponent (the mindset) and less-measurable goals. Their objective is to raise
public awareness, but their approach to social change is through creating
personal change at the individual level through engagement with the movement.
Hence, ‘success’ is materialized in having as many people as possible involved
in the movement. This is enabled by several factors.&lt;/p&gt;
&lt;p&gt;The
first is the Internet and new media/social technologies, which is used as a
site for community building, support group, campaigns, and a basis to allow
people spread all over the globe to remain involved in the collective in the
absence of a physical office. However, the cyber is not just a tool; it is also
a public space that is equally important with the physical space. Despite acknowledging
the diversity of the public engaged in these spaces, youth today do not
completely regard them as two separate spheres. Engaging in virtual community
has a real impact on everyday lives; the virtual is a part of real life for
many youth (Shirky, 2010). However, it is not a smooth ‘space of flows’
(Castells, 2009) either. Youth actors in the Global South do recognize that
their ease in navigating both spheres is the ability of the elite in their
societies, where the digital divide is paramount. The disconnect stems from
their &lt;a href="https://cis-india.org/digital-natives/blog/the-class-question" class="external-link"&gt;acknowledgement&lt;/a&gt; that social change must be multi-class and an expression
of their reflexivity in facing the challenge.&lt;/p&gt;
&lt;p&gt;The
second enabling factor is its highly individualized approach. The movement
enables people to personalize their involvement, both in terms of frequency and
ways of engagement as well as in meaning-making. It is an echo of the age of
individualism that youth are growing up in, shaped by the liberal economic and
political ideologies in the 1990s India
and elsewhere (France,
2007). Individualism has become a new social structure, in which personal decisions
and meaning-making is deemed as the key to solve structural issues in late
modernity (&lt;em&gt;Ibid).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In this era, young
people’s lives consist of a combination of a range of activities rather than
being focused only in one particular activity (&lt;em&gt;Ibid). &lt;/em&gt;This is also the case in their social and political
engagement. Very few young people worldwide are full-time activists or
completely apathetic, the mainstream are actually involved in ‘everyday
activism’ (Bang, 2004; Harris et al, 2010). These are young people who are
personalizing politics by adopting causes in their daily behaviour and
lifestyle, for instance by purchasing only Fair Trade goods, or being very involved
in a short term concrete project but then stopping and moving on to other activities.
The emergence of these everyday activists are explained by the dwindling authority
of the state in the emergence of major corporations as political powers
(Castells, 2009) and youth’s decreased faith in formal political structures
which also resulted in decreased interest in collectivist, hierarchical social
movements in favour of a more individualized form of activism made easier with
Web 2.0 (Harris et al, 2010).&lt;/p&gt;
&lt;p&gt;A collective of
everyday activists means that there are many forms of participation that one
can fluidly navigate in, but it requires a committed leadership core recognized
through presence and engagement. As Clay Shirky (2010: 90) said, the main
cultural and ethical norm in these groups is to ‘give credit where credit is
due’. Since these youth are used to producing and sharing content rather than
only consuming, the aforementioned success of the movement lies on the leaders’
ability to facilitate this process. The power to direct the movement is not
centralized in the leaders; it is dispersed to members who want to use the
opportunity.&lt;/p&gt;
&lt;p&gt;This form of
movement defies the way social movements have been theorized before, where
individuals commit to a tangible goal and the group engagement directed under a
defined leadership. The contemporary youth movement could only exist by staying
with the intangible articulation and goal to accommodate the variety of
personalized meaning-making and allow both personal satisfaction and still
create a wider impact; it will be severely challenged by a concrete goal like
advocating for a specific regulation. Not all youth there are ‘activist’ in the
common full-time sense, for most everyday activists their engagement might not
be a form of activism at all but a productive and pleasurable way to use their
free time&lt;span class="MsoFootnoteReference"&gt;
&lt;/span&gt;&amp;nbsp;- or, in Clay Shirky’s term, cognitive surplus
(2010).&lt;/p&gt;
&lt;p&gt;Revisiting my
initial intent to put the term activism under scrutiny, I acknowledge this as a
call for scholars to re-examine the concepts of activism and social movements
through a process of de-framing and re-framing to deal with how youth today are
shaping the form of movements. Although the limitations of this paper do not
allow me to directly address the challenge, I offer my own learning from this
process for the quest of future researchers.&lt;/p&gt;
&lt;p&gt;The way young
people today are reimagining social change and movements reiterate that
political and social engagement should be conceived in the plural. Instead of
“Activism” there should be “activisms” in various forms; there is not a new
form replacing the older, but all co-existing and having the potential to
complement each other. Allowing people to cope with street sexual harassment
and create a buzz around the issue should complement, not replace, efforts made
by established movements to propose a legislation or service provision from the
state. This is also a response I offer to the proponents of the aforementioned
“doubt” narrative.&lt;/p&gt;
&lt;p&gt;I share the more
optimistic viewpoint about how these new forms are presenting more avenues to
engage the usually apathetic youth into taking action for a social cause.
However, I also acknowledge that the tools that have facilitated the emergence
of this new form of movement have existed for less than a decade; thus, we
still have to see how it evolves through the years.&lt;/p&gt;
&lt;p&gt;Hence, I also find
the following questions to be relevant for proponents of the “hope” narrative.
Social change needs to cater to the most marginalized in the society, but as
elaborated before, the methods of engagement both on the physical and virtual
spaces are still contextual to the middle class. Therefore, how can the
emerging youth movements evolve to reach other groups in the society? Since
most of these movements are divorced from existing movements, how can they
synergize with existing movements to propel concrete change? These are open questions
that perhaps will be answered with time, but my experience with Blank Noise has
shown that these actors have the reflexivity required to start exploring
solutions to the challenges.&lt;/p&gt;
&lt;p&gt;The research
started from a long-term personal interest and curiosity. In this journey, I
have found some answers but ended up with more questions that will also stay
with me in the long term. As a parting note before, I would like to share a
quote that will accompany my ongoing reflection on these questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;My advice to
other young activists of the world: study and respect history... but ultimately
break the mould. There have never been social media tools like this before. We
are the first generation to test them out: to make the mistakes but also the
breakthrough.&lt;/em&gt;&lt;/p&gt;
&lt;p align="right" style="text-align: right;"&gt;(Tammy
Tibbetts, 2010)&lt;/p&gt;
&lt;p class="Heading1notchapter"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This is the &lt;/em&gt;&lt;strong&gt;&lt;em&gt;tenth and final&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; post in the &lt;a href="https://cis-india.org/digital-natives/blog/the-beyond-the-digital-directory" class="external-link"&gt;&lt;strong&gt;Beyond
the Digital &lt;/strong&gt;series,&lt;/a&gt; a research project that aims to explore
new insights to understand youth digital activism conducted by Maesy Angelina
with Blank Noise under the Hivos-CIS Digital Natives Knowledge Programme.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;References:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Bang, H.P. (2004) ‘Among everyday makers and expert citizens’. Accessed
21 September 2010. &lt;a href="http://www.sam.kau.se/stv/ksspa/papers/bang.pdf"&gt;http://www.sam.kau.se/stv/ksspa/papers/bang.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Castells, M. (2009) &lt;em&gt;Communication
Power. &lt;/em&gt;New York: Oxford University
Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;France, A. (2007) &lt;em&gt;Understanding Youth in Late Modernity&lt;/em&gt;. Berkshire:
Open University Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Harris, A., Wyn, J., and Younes, S. (2010) ‘Beyond apathetic or
activist youth: ‘Ordinary’ young people and contemporary forms of
participaton’, &lt;em&gt;Young &lt;/em&gt;Vol. 18:9, pp.
9-32&lt;/p&gt;
&lt;p&gt;Shirky, C. (2010) &lt;em&gt;Cognitive Surplus:
Creativity and Generosity in a Connected Age. &lt;/em&gt;London: Penguin Press&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Image source:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blog.blanknoise.org/2009/08/street-signs.html"&gt;http://blog.blanknoise.org/2009/08/street-signs.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond'&gt;https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maesy</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Street sexual harassment</dc:subject>
    
    
        <dc:subject>Blank Noise Project</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Beyond the Digital</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-05-14T12:21:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/reclaiming-the-right-to-privacy-researching-the-intersection-of-privacy-and-gender">
    <title>Reclaiming the right to privacy: Researching the intersection of privacy and gender</title>
    <link>https://cis-india.org/raw/reclaiming-the-right-to-privacy-researching-the-intersection-of-privacy-and-gender</link>
    <description>
        &lt;b&gt;It was our privilege to be supported by Privacy International, UK, during 2019-2020, to undertake a research project focusing on reproductive health and data surveillance, and to engage on related topics with national civil society groups. Our partner organisations who led some of the research as part of this project are grassroots actors - Domestic Workers Rights Union, Migrant Workers Solidarity Network, Parichiti, Samabhabona, Rainbow Manipur, and Right to Food Campaign. Here we are compiling the various works supported by this project co-led by Ambika Tandon, Aayush Rathi, and Sumandro Chattapadhyay at the Centre for Internet and Society, India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Previous research conducted by CIS on the subject of sexual and reproductive health (SRH) services in India observes that there is a complex web of surveillance, or ‘dataveillance’, around each patient as they avail of SRH services from the state. &lt;strong&gt;[1]&lt;/strong&gt; In this project on ‘researching the intersection of privacy and gender’, we aimed to map the ecosystem of surveillance around SRH services as their provision becomes increasingly ‘data-driven’, and explore its implications for patients and beneficiaries.&lt;/p&gt;
&lt;p&gt;Through this project, we were interested in documenting the roles played by both the public and the private sector actors in this ecosystem of health surveillance. We understand the role of private sector actors as central to state provision of sexual and reproductive health services, especially through the institutionalisation of data-driven health insurance models, as well as through extensive privatisation of public health services.&lt;/p&gt;
&lt;p&gt;We supported studies on a range of topics that constitute the experience of sexual and gender minorities and women when accessing public health and welfare systems, including the treatment of trans persons by law and welfare systems in India, access to abortion and maternity benefits for low income women, access to ART treatments by PLHIV, and so on.&lt;/p&gt;
&lt;p&gt;We found that many respondents had no information about welfare schemes despite being eligible, while many others were excluded from them because they did not have Aadhaar cards and other ID documents, or because of errors and inconsistencies in the same. Direct benefit transfer schemes also required mobile phone linkage and active Aadhaar-seeded bank accounts, which added another layer of requirements and excluded vulnerable populations. We also found that respondents had very little information about the storage and sharing of their data, which raises questions about the possibility of implementing complex consent architectures for digitised health data as imagined by the Indian government through policies such as the Non Personal Data Governance Framework. We found that populations that carry stigma are most likely to be excluded from health and welfare access as a result of data collection, including trans groups, PLHIV, and single women or adolescent girls seeking abortion.&lt;/p&gt;
&lt;p&gt;Please find below the various works undertaken as part of this project. We hope these works will be useful for civil society organisations, grassroots organisations, and reproductive rights organisations.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Article&lt;/h3&gt;
&lt;p&gt;Raina Roy. (July 18, 2020). Coronavirus: Kolkata’s trans community has been locked out of healthcare and livelihood. Scroll.in. &lt;a href="https://scroll.in/article/968182/coronavirus-kolkatas-trans-community-has-been-locked-out-of-healthcare-and-livelihood" target="_blank"&gt;https://scroll.in/article/968182/coronavirus-kolkatas-trans-community-has-been-locked-out-of-healthcare-and-livelihood&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rosamma Thomas. (November 02, 2020). Citizen data and freedom: The fears of people living with HIV in India. GenderIT. &lt;a href="https://www.genderit.org/articles/citizen-data-and-freedom-fears-people-living-hiv-india" target="_blank"&gt;https://www.genderit.org/articles/citizen-data-and-freedom-fears-people-living-hiv-india&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Sameet Panda. (November 25, 2020). One ration card, many left behind. Indian Express. &lt;a href="https://indianexpress.com/article/opinion/one-ration-card-many-left-behind/" target="_blank"&gt;https://indianexpress.com/article/opinion/one-ration-card-many-left-behind/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Sameet Panda (January 11, 2020). One Nation One Ration Card in Odisha - Only Pain, No Gain. Sanchar, page 6. &lt;a href="https://sancharodisha.com/" target="_blank"&gt;https://sancharodisha.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Santa Khurai. (June 18, 2020). 'I feel the pain of having nowhere to go': A Manipuri trans woman recounts her ongoing lockdown ordeal. Firstpost. &lt;a href="https://www.firstpost.com/india/i-feel-the-pain-of-having-nowhere-to-go-a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-8494321.html" target="_blank"&gt;https://www.firstpost.com/india/i-feel-the-pain-of-having-nowhere-to-go-a-manipuri-trans-woman-recounts-her-ongoing-lockdown-ordeal-8494321.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Shreya Ila Anasuya. (December 21, 2020). How India’s Healthcare System Lets Down Trans Men. Go Mag. &lt;a href="http://gomag.com/article/heres-what-its-like-to-be-a-trans-man-in-india/" target="_blank"&gt;http://gomag.com/article/heres-what-its-like-to-be-a-trans-man-in-india/&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Policy Response&lt;/h3&gt;
&lt;p&gt;Aayush Rathi, Aman Nair, Ambika Tandon, Pallavi Bedi, Sapni Krishna, and Shweta Mohandas. (September 13, 2020). Inputs to the Report on the Non-Personal Data Governance Framework. The Centre for Internet and Society. &lt;a href="https://cis-india.org/raw/inputs-to-report-on-non-personal-data-governance-framework/" target="_blank"&gt;https://cis-india.org/raw/inputs-to-report-on-non-personal-data-governance-framework/&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Report&lt;/h3&gt;
&lt;p&gt;Anchita Ghatak. (December 30, 2020). Domestic Workers’ Access to Secure Livelihoods in West Bengal. Parichiti. &lt;a href="https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal" target="_blank"&gt;https://cis-india.org/raw/parichiti-domestic-workers-access-to-secure-livelihoods-west-bengal&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Aayush Rathi, &lt;a href="https://www.epw.in/engage/article/indias-digital-health-paradigm-foolproof" target="_blank"&gt;Is India's Digital Health System Foolproof?&lt;/a&gt; (2019)&lt;br /&gt;
Aayush Rathi and Ambika Tandon, &lt;a href="https://www.epw.in/engage/article/data-infrastructures-inequities-why-does-reproductive-health-surveillance-india-need-urgent-attention" target="_blank"&gt;Data Infrastructures and Inequities: Why Does Reproductive Health Surveillance in India Need Our Urgent Attention?&lt;/a&gt; (2019)&lt;br /&gt;
Ambika Tandon, &lt;a href="https://cis-india.org/internet-governance/blog/ambika-tandon-december-23-2018-feminist-methodology-in-technology-research" target="_blank"&gt;Feminist Methodology in Technology Research: A Literature Review&lt;/a&gt; (2018)&lt;br /&gt;
Ambika Tandon, &lt;a href="https://cis-india.org/raw/big-data-reproductive-health-india-mcts" target="_blank"&gt;Big Data and Reproductive Health in India: A Case Study of the Mother and Child Tracking System&lt;/a&gt; (2019)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/reclaiming-the-right-to-privacy-researching-the-intersection-of-privacy-and-gender'&gt;https://cis-india.org/raw/reclaiming-the-right-to-privacy-researching-the-intersection-of-privacy-and-gender&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Reproductive and Child Health</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2021-01-25T10:42:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/making-change/reaping-the-benefits-of-gamification">
    <title>Reaping the Benefits of Gamification</title>
    <link>https://cis-india.org/digital-natives/making-change/reaping-the-benefits-of-gamification</link>
    <description>
        &lt;b&gt;As a part of the Making Change blog-post series, in this post we will identify a new technique: gamification. This technique is being used for sustainable environment conservation by modern day change-makers. We interview two out of three co-founders of Reap benefit- Kamal Raj and Gautam Prakash who believe in the adoption of more sustained environmental practices that induce social change towards conserving the environment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;

&lt;div align="left"&gt;
&lt;pre style="text-align: justify;"&gt;&lt;strong&gt;CHANGE-MAKER:&lt;/strong&gt; Kamal Raj,Gautam Prakash and Kuldeep Dantewadia
&amp;nbsp;
&lt;strong&gt;ORGANISATION:&lt;/strong&gt; Reap Benefit 

&lt;strong&gt;METHOD OF CHANGE: &lt;/strong&gt;Gamification and Human centric systems for consistent behavior change towards better waste-water-energy management. 

&lt;strong&gt;STRATEGY OF CHANGE:&lt;/strong&gt; Building a new era of environmentally conscious youth in India through technology and an interdisciplinary approach to change.&lt;/pre&gt;
&lt;/div&gt;

&lt;p style="text-align: justify;"&gt;We depend on the environment and the resources that it provides us, but surprisingly we are unaware of the effects of its depletion and the need to save these resources. A few of the problems that people now face are with resources like- water,waste and energy because we do not acknowledge the fact that we are wasting them unconsciously. This only triggers the need for more and more solutions which would change the way people perceive the resources and realize the need to conserve. While trying to start an initiative to come up with some solutions to manage these resources, we are approached by the question of the &lt;strong&gt;accessibility, affordability and sustainability&lt;/strong&gt; of those solutions. The solutions and the practice of that solution is a two-way process for any sustainable making-change initiative.&lt;/p&gt;
&lt;p align="left" style="text-align: justify;"&gt;In this post I will be introducing to you Reap Benefit and the technique of Gamification. I will bring out a comparative analysis of the various definitions by renowned gaming authorities across the world who are involved in the process of using games in non-game contexts to bring out change in the offline space. Only after this, will I be acknowledging the importance of the strategies used by Reap Benefit for making these solutions sustainable. The strategies will be- human centric solutions and gamification. Then, I will bring out the connection between these two strategies to provide you an inter-disciplinary understanding of the making change process. Next, these strategies will be coupled with the discussion on the use of technology to speed-up the process. Also, throughout this post we will be referring to the blog-&lt;strong&gt; Methods of Social Change&lt;/strong&gt; written by Denisse Albornoz and we will also make an attempt to answer the questions- 'Who,Where,How' of this making change project in relation to Reap Benefit. The blog post can be accessed &lt;a href="https://cis-india.org/digital-natives/making-change/methods-for-social-change/"&gt;here. &lt;/a&gt;&lt;/p&gt;
&lt;p align="left" style="text-align: justify;"&gt;Before the journey of the post, I would like you to read this little success story narrated by Kamal Raj in the interview that led Reap benefit a step higher in its aim for making change:&lt;/p&gt;
&lt;p class="callout"&gt;Reap benefit went to a school which received only 400 litres of water supply a day resulting in poor health and care conditions. This water would be used for washing their plates after the mid-day meal and also for sanitation systems. This would only make the place a platform for water, food and breeding mosquitoes all together. Since the students usually consumed food with their right hand, while taking the plate to wash it, they would leave the plates at one side; they would open the tap with their left hand, would take their plates again and start washing them. During this time interval, they would waste a lot of water. &lt;br /&gt;&lt;br /&gt;As, a solution to this, Reap Benefit changed the taps which would discharge 60% less of water. They also created a clean water purification system. Now, with the same 400 litres of water, students washed their plates and adopted better sanitation practices. The challenges that they faced actually made them innovate better systems for remarkable change.&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;img src="https://cis-india.org/home-images/tapswithoutaerators.jpg/image_preview" title="taps without aerators" height="157" width="159" alt="taps without aerators" class="image-inline image-inline" /&gt; &lt;img src="https://cis-india.org/home-images/tapswithaerators.jpg/image_preview" title="taps with aerators" height="157" width="160" alt="taps with aerators" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Think about these questions for a minute..&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div align="left"&gt;
&lt;ul&gt;
&lt;li&gt;Does this story relate to &lt;strong&gt;physical needs?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Does this story relate to &lt;strong&gt;creative problem solving?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Is it a story that brings out&lt;strong&gt; better affordable solutions?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;With this solution were the &lt;strong&gt;students benefited&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;Was this a &lt;strong&gt;successful idea?&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;Reap Benefit&lt;/h2&gt;
&lt;p&gt;First of all, take a look at a brief introduction of Reap Benefit given by Kamal Raj:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;

&lt;p style="text-align: justify;" class="callout"&gt;&lt;strong&gt;Kamal: &lt;/strong&gt;&lt;em&gt;"Reap Benefit works to implement affordable solutions, enabling  quantifiable waste-water-energy management systems, as a way to  facilitate behavioural change by engaging the head, hand and heart of  the user. Having worked with many people, we have realized that behaviour  modification  allows for more sustained adoption of environment sustainability  practices. We take them through a 4-stage behavioural change process –  &lt;strong&gt;‘Unconsciously Wrong’, ‘Consciously Wrong’, ‘Consciously Right’ and  ‘Unconsciously Right’ &lt;/strong&gt;(we will understand this process later in the post). A link to the website is here- &lt;a href="http://reapbenefit.org/"&gt;Reap Benefit&lt;/a&gt;."&lt;/em&gt;&lt;/p&gt;
&lt;p align="left" style="text-align: justify;"&gt;Reap Benefit is bound together by the deep concern for the environment  they have and the dead-lock issues that it faces. They aim for  affordable solutions with maximum impact in the least time. Kamal marks that they work only with the students within the age group 10-16, because the use gamification is most effective in this age group. Also, he makes an addition to that by saying the rewards the older age groups demand are not as easy-to-meet as those of the age group they work with. It also aims to co-create experiences by working hands on with the youth: their target audience for creating change.&lt;/p&gt;
&lt;p align="left" style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_reapbenefit.jpg/image_preview" title="Reap benefit" height="175" width="234" alt="Reap benefit" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is said that the more you practice the better you get. By this, I would like to introduce you to the concept of&lt;strong&gt; quotidian activism&lt;/strong&gt;. Reap Benefit deeply believes in this concept. But, what does quotidian activism mean? A working definition is: &lt;em&gt;the form of activism occurring everyday.&lt;/em&gt; This form of activism may lead to people making actions sustainable and&amp;nbsp;  achieve consistent behavioural change, supported by products and  innovations provided by Reap Benefit (later in this post, I will introduce you to some of these innovations).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Finally, Reap Benefit highly focuses on the need to answer the &lt;em&gt;‘&lt;/em&gt;&lt;strong&gt;why’&lt;/strong&gt; behind the problem. This answer would provide a more personal understanding of the problem for creating change. By engaging the participant with the 'why', he will also be able to evaluate the impact and the benefits of his actions, take ownership of the problem and comprehend the need for innovation.&lt;/p&gt;
&lt;h3 align="left"&gt;What is 'change' for Reap Benefit?&lt;/h3&gt;
&lt;p align="left"&gt;Presuming every organization has its own design to making change, Reap Benefit's understands it in the following way:&lt;/p&gt;
&lt;p style="text-align: justify;" class="callout"&gt;&lt;strong&gt;Gautam: &lt;/strong&gt;&lt;em&gt;“Change for us is a very sub-conscious part of your life. (It is also a) two stage process- &lt;strong&gt;knowledge:&lt;/strong&gt; which will tell us we need solution and the&lt;strong&gt; solution.&lt;/strong&gt; The knowledge will tell you that you are &lt;em&gt;unconsciously &lt;/em&gt;doing the wrong thing. Then when you realize it, you go to a stage of consciously wrong. When you keep doing this you reach a stage when you know that you are consciously doing right, and soon, you are doing it every single day and then you unconsciously do it.”&lt;/em&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;I will attempt to understand their process of change by adding that this 'to be good' drive in the individual or the need for public approval is what makes them do &lt;em&gt;unconsciously right &lt;/em&gt;everyday, and then it is only the last stage what makes it a habit. Gautam also mentions that each of these stages has an impact of its own and altogether, they become more powerful. This change process will lead to sustainable change according to him.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;We have seen the change agents that are vital to create change, but how is this change executed? In the next section we will look at two strategies used for making change: &lt;em&gt;gamification&lt;/em&gt; and &lt;em&gt;human-centred design&lt;/em&gt; and later, we will only try to produce a connection between them.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Discovering Gamification&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;In this section, we will unpack the first part of the&lt;strong&gt; 'how' &lt;/strong&gt;question. First of all, we will compare the various definitions of the technique given by people involved in understanding the use of game elements in the non-game contexts, to create&amp;nbsp; change in the emotional and social behaviour of people. The definitions of these three people in the big list of so-called gamification authorities will be used provides us with keywords for a comparative understanding of what the technique means. These three people are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;JANE McGONIGAL: &lt;/strong&gt;She is an American game designer and author who  advocates the use of mobile and digital technology to channel positive  attitudes and collaboration in a real world context.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;GABE ZICHERMANN:&lt;/strong&gt;&lt;em&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/em&gt;He is an author, public  speaker, and self-described "serial entrepreneur." He has worked as a  proponent of leveraging &lt;a title="Game mechanics" href="http://en.wikipedia.org/wiki/Game_mechanics"&gt;game mechanics&lt;/a&gt; in business, education, and other non-entertainment platforms to increase user engagement through gamification.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;&lt;strong&gt;JESSE SCHELL&lt;/strong&gt;:&lt;/em&gt; He is an American video game designer an acclaimed author, CEO of Schell Games and a Distinguished Professor of the Practice of &lt;a title="Entertainment Technology" class="mw-redirect" href="http://en.wikipedia.org/wiki/Entertainment_Technology"&gt;Entertainment Technology&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Definitions&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;JANE McCONIGAL&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;GABE ZICHERMANN&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;JESSE SCHELL&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify;"&gt;
&lt;td&gt;“It is a blissful &lt;strong&gt;productivity&lt;/strong&gt; acquired by the&amp;nbsp; flourishing feeling,&lt;br /&gt;that is, accomplishments in a game but only with a &lt;strong&gt;volunteering&lt;br /&gt;attribute &lt;/strong&gt;of the participant.”  &lt;/td&gt;
&lt;td&gt;“Games are the only&lt;br /&gt;&lt;strong&gt;force&lt;/strong&gt; in the universe&lt;br /&gt;that can get people to take actions &lt;strong&gt;against their self-interest&lt;/strong&gt; in a &lt;br /&gt;&lt;strong&gt;predictable&lt;/strong&gt; way without using force.”  &lt;/td&gt;
&lt;td&gt;“It is a &lt;strong&gt;problem solving situation&lt;/strong&gt;&lt;br /&gt;that you enter into because &lt;strong&gt;you want to&lt;/strong&gt;.”  &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="left"&gt;I would be like to bring points of intersections between these three definitions.&lt;/p&gt;
&lt;div align="left"&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div align="left"&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;VOLUNTEERING ATTRIBUTE VS. USE OF FORCE&lt;/strong&gt;: The volunteering attribute is an efficient way to foster sustainable participation, as opposed to the use of force which makes a campaign less appealing.&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div align="left"&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;PROBLEM SOLVING SKILLS&lt;/strong&gt;: Games are a very responsive way of trying to accomplish problem solving as the person is engaged with the problem and willing to solve it.&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;PRODUCTIVITY&lt;/strong&gt;: There problem solving skills leads the participant to a desired outcome. &lt;/li&gt;&lt;/ol&gt;
These points also give you a clear understanding of Reap Benefit  who works along the same lines with the volunteer or participant to  solve the problem of conservation.&lt;br /&gt;But, does the usage of games actually produce behavioral change? If so,  how do games provide this function? These are some of the questions we  will try and attempt to answer in the next section.&lt;/div&gt;
&lt;h3 align="left"&gt;&lt;/h3&gt;
&lt;h3 align="left"&gt;Games as a Tool to Influence Behaviour&lt;/h3&gt;
&lt;p id="docs-internal-guid-9cb641a5-daab-08be-6d01-b8f612949133" style="text-align: justify;" dir="ltr"&gt;Playing games results in obtaining rewards in some form of the other. These rewards psychologically induce a positive emotional feeling in the participant. When the participant learns something through games and when that emotional feeling arises, he tries and incorporates the same solutions in the games to solving the real life problems. This brings out an improved result and problem solving ability. But what about the affordability of that solution? We need to understand ways to make it affordable because any task once done will not induce consistency in the behavior change. But the task repeated many times will improve or change the behavior over a long period of time. So, when the question of affordability (financial fear) is answered then the emotional feeling primarily can bring out change in the behavior of the individual. (Yongwen Xu, 2011).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There are also some game mechanics that are to be kept in mind to change behavior while designing games apart from just the element of fun and affordability. So, we will now look at another authority involved in gamification in the upcoming section to explore these mechanics. We will also try and understand these mechanics in relation to Reap Benefit.&lt;/p&gt;
&lt;h3&gt;Game Mechanics&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Seth Priebatsch is the creator of &lt;a title="SCVNGR" href="http://en.wikipedia.org/wiki/SCVNGR"&gt;SCVNGR&lt;/a&gt; and &lt;a title="LevelUp" href="http://en.wikipedia.org/wiki/LevelUp"&gt;LevelUp&lt;/a&gt; social gaming sites. He has provided a list of game mechanics which could be necessary to understand games and why they produce particular changes for a better environment. These are:&lt;/p&gt;
&lt;blockquote&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;&lt;strong&gt;Appointment Dynamics&lt;/strong&gt;&lt;/em&gt;: to bring players to do something at a pre-defined time and place.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;Influence and status&lt;/em&gt;&lt;/strong&gt;: any participant or group that is involved in the change-making process, is influenced by the presence of others because of the competition and the envy that leads them to carry forward the task&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;Progression Dynamics:&lt;/em&gt;&lt;/strong&gt; the success of the student is measured through the tasks by giving rewards. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; &lt;strong&gt;&lt;em&gt;Communal Discovery&lt;/em&gt;&lt;/strong&gt;: the entire group or community works towards making change. &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;Seth's model could be applied to the process of creating change that Reap Benefit uses, and this is illustrated through their experience of a student-run energy audit in the field. A set of students were assigned the task of doing an audit for the energy conservation and the energy usage of a Puma store. They were just given the base for the audit but the criteria for the audit was planned by them. The students were encouraged by the thought of &lt;strong&gt;getting rewards &lt;/strong&gt;for the task. Kamal recalls that they had used games to make the children understand it.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Relating this to Seth's Model, the children were given a &lt;strong&gt;pre-defined time and place&lt;/strong&gt; for doing the task and were influenced both, by the element of&lt;strong&gt; competition&lt;/strong&gt; between the students and also the idea of receiving a reward once the task is completed. The task only ends by obtaining a sense of &lt;strong&gt;communal discovery&lt;/strong&gt; that, all together they can make change on a personal and team level. We understood Seth's model but we will try and comprehend deeper, the use of rewards for inducing behavioral change in the next section.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Rewards Mechanism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Kamal commented on Reap Benefit's 2-3 months periodic reward mechanism. He believes that this makes students equal in position before starting every task.&lt;/p&gt;
&lt;p style="text-align: justify;" class="callout"&gt;&lt;strong&gt;Kamal:&lt;/strong&gt; &lt;em&gt;"We use a lot of things like rewards to motivate them to play a game (with us) and we personalize all these rewards based on the questionnaire that we do at the beginning where we subtly understand what they like." &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;This information which gives ideas of how to encourage each student to get the best performance out of them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;a) Extrinsic rewards: &lt;/strong&gt;The extrinsic reward here, for example would be allotting points to various participants/ teams. Michael Wu, a chief scientist in subjects like digital technologies, says extrinsic rewards are like a jump start to intrinsic rewards.Once the student acknowledges them, they acquire a sense of ownership and innovation and are empowered to create new solutions. Hence, awareness is not created before the task but an output from the task.&lt;/p&gt;
&lt;p&gt;Refer to Gabe Zichermann's video for more on the importance of gamification and the rewards mechanism.&lt;/p&gt;
&lt;p&gt;.&lt;iframe src="http://www.youtube.com/embed/SwkbuSjZdXI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b) Intrinsic rewards: Apart from producing behavior change, gamification's can also indicate learning. One of the elements that facilitates learning would be:&lt;/p&gt;
&lt;dl&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Player Control&lt;/strong&gt;&lt;em&gt;: &lt;/em&gt;A participant will have certain amount of control while gaming which would lead to a sense of responsibility and accomplishment. Learning could be intrinsic only if there is responsibility of gaining a reward through a task.&lt;/p&gt;
&lt;/dl&gt;
&lt;p&gt;There are many other elements that produce learning and they could be accessed &lt;a href="http://www.yukaichou.com/"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Human-Centric Model&lt;/h2&gt;
&lt;div class="pullquote"&gt;Human-centred systems aim to preserve or enhance human skills, in both manual and office work, in environments in which technology&amp;nbsp;tends to undermine the skills that people use in their work&lt;em&gt;.&lt;/em&gt;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;We will now answer the second part of the 'how' question and show another strategy for making change. Human centric systems do not use machines to create solutions to the problems but rather design the game with the importance of the 'user-friendly' element. This has been explored in a past post by Denisse. Access it &lt;a href="https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology" class="internal-link"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Reap Benefit's ‘transparent dustbin’ is a great model to illustrate this. The dustbin is transparent for people to see and then throw the waste in according to different types of waste. It is kept at an eye-level so that the waste already thrown inside can help the person perceive and throw his waste in the exact dustbin and to make it easily accessible for the public.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/dustbin.jpg/image_preview" alt="transparent dustbin" class="image-inline image-inline" title="transparent dustbin" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These human-centric approaches provide a consistent change in the behaviour of the individual because the method is user-friendly and make segregation easy. The objectives is to engage in unconscious behavioural change. The transparent dustbin is better explained by this audio byte of Kamal Raj:&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;iframe src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/147205714&amp;amp;color=ff5500&amp;amp;auto_play=false&amp;amp;hide_related=false&amp;amp;show_artwork=true" frameborder="no" scrolling="no" height="166" width="100%"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Another innovation of Reap Benefit, is the compose mixture&lt;/p&gt;
&lt;p class="callout"&gt;Kamal says: &lt;em&gt;&lt;strong&gt;"The idea was to throw something with it, like the degrade compost product we innovated and the waste would compost, without smell, without taking 3 months." &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This mix, by giving visual feedback could be accessible by anyone due to its low cost and easy-to-use method. So, these innovations justify and explain the benefits of human centric models and also produce many new ideas in the minds of the students( James,2010). I would like to explain this by a chain of ideas that arise while segregating plastic and non-plastic waste.&lt;/p&gt;
&lt;p style="text-align: center;"&gt;The participation in the structure (waste segregation model)&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_arrowdown.jpe/image_preview" title="arrow" height="28" width="33" alt="arrow" class="image-inline image-inline" /&gt;&lt;br /&gt; The negatives of the model (harmful effects of mixing plastic in the model)&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_arrowdown.jpe/image_preview" title="arrow" height="28" width="33" alt="arrow" class="image-inline image-inline" /&gt;&lt;br /&gt; Realizing the need for another mechanism (dustbins for different types of waste)&lt;/p&gt;
&lt;p style="text-align: center;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_arrowdown.jpe/image_preview" title="arrow" height="28" width="33" alt="arrow" class="image-inline image-inline" /&gt;&lt;br /&gt; Another idea to support the new mechanism (dustbins should be transparent and named)&lt;br /&gt; &lt;img src="https://cis-india.org/home-images/copy_of_arrowdown.jpe/image_preview" title="arrow" height="35" width="33" alt="arrow" class="image-inline image-inline" /&gt;&lt;br /&gt; The need to spread this (start campaigning for the system)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Explaining this model in brief: the waste segregation model is the segregation of plastic and other waste. During this process the  three ideas that arise are: a) the harmful effects of plastic, b) the need for  a plastic waste dustbin and a non-plastic waste dustbin, and the last  one, b) the transparency of the dustbin. Then the major question of  &lt;strong&gt;spreading the model by using technology&lt;/strong&gt; arises. This would be the model thought by the participant during the discussion of&amp;nbsp; the usage of technology for sustainability.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;But what is &lt;strong&gt;sustainability&lt;/strong&gt; and how is it important? Complementing the technique of gamification and the human- centric approaches with technology to make it a sustainable solution is a challenge. This system may be adopted by all. But the aftermath of implementing this apparatus is a challenging question. In the next section we will comprehend the role of technology adding a more positive result to Reap benefit.&lt;/p&gt;
&lt;h2&gt;The Role of Technology and Media&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;This section will look at how Reap Benefit uses technology and media and then try and understand how the use of technology can make these solutions sustainable.&lt;/p&gt;
&lt;p style="text-align: justify;" class="callout"&gt;&lt;strong&gt;Kamal:&lt;/strong&gt; &lt;em&gt;"There are two aspects that are already existing- knowledge and the products. So, when someone starts the journey, technology enables us to be with them in this journey without us being there. Without the sharing of photos through digital media like facebook, keeping track of the journey would not be possible. We need technology to bridge the gap."&lt;strong&gt; &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Information access is facilitated by the use of technology and digital media or social networking, as they share the systems with their online community. But, when this access is denied the only solution is to be a part of the in-tutor system and realize the positives of the same through experience. Technology takes Reap  Benefit a step higher in its aim to make  sustainable change by targeting youth, the main users of social network platforms.&lt;/p&gt;
&lt;h2&gt;Making Change&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;We started this post with an introduction to a very strong initiative- Reap  Benefit. Techniques such as gamification and human-centric systems are  used effectively by this organization to create maximum benefits. It  focuses highly on the use of these strategies to induce behaviour modification in youth. We attempted to build a relationship between  these techniques to answer whether they are sustainable, intelligible and accessible solutions to making change.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Summing up the 'WHO,WHERE AND HOW' question- We have only understood that, to use the opportunity and take charge before others do so, we need a 3-stage plan. We understood that the WHO means the target, the change agents who will lead the initiative and comprehend the need for change by themselves. The question of WHERE focuses on the idea of making change in the public space rather than in the private sphere which limits the extent of the change. We have summarized this only by bringing out the importance of technology to make change the largest priority of youth. The question of HOW is understood in this post by the use to affordable solutions.&lt;/p&gt;
&lt;p id="docs-internal-guid-9cb641a5-daab-ddf5-183f-233098a5b65d" style="text-align: justify;" dir="ltr"&gt;The problems faced by the environment call for solutions that are affordable and accessible. These two qualities of the solution would only make it sustainable.These solutions are met by various game elements in a game and the human centric approaches that engage the individual in problem solving by disseminating knowledge to them and informing them about the problems. This makes those solutions to problem-solving evaluatable through quantity and the quality of the result of the problem. Behavior change will be only possible by solutions that break the existing schemas in the society and create new innovations. (James,2010). &amp;nbsp;Now, through sustainable, innovative solutions through these techniques we can make the dream of a clear and clean environment a reality.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While this blog may help you gain a positive understanding about gamification it would certainly lead you to many more questions. In this digital age, we would surely have to ‘re-game-think’ the methodologies for change again and agai,n not only in terms of using unique techniques such as gamification but also in terms of accessibility of such techniques for change in the structural divisions in society.&lt;/p&gt;
&lt;h3&gt;Footnotes&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Reward is one of the elements that drives the individual to adopt the gamification technique- the reward/feedback mechanism. You can acquire a profound reading on more of these elements that leads to further making-change here- http://www.yukaichou.com/.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A few more elements like the player control and communal discovery that indicates learning through Gamification could be found here- http://en.wikipedia.org/wiki/Gamification&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;More information on persuasive messages, strategies for changing behavior, rules for effective delivery, and how to manage the participants/audience in the making change initiative can be found-http://sustainability.berkeley.edu/sites/default/files/Promoting_Sustain_Behavior_Primer.pdf&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;To hear a talk show of Yukaichou on TEDx about Gamification- check it here- http://www.youtube.com/watch?v=v5Qjuegtiyc&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;To hear another talk show of Gabe Zichermann on TEDx about Gamification- check here- http://www.youtube.com/watch?v=O2N-5maKZ9Q&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The process of creating sustainability through gamification and technology, according to Rachel James, goes as follows: &lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;Attracting attention by breaking the existing schemas (mental   structures of  preconceived idea, Jean Piaget,1926) This can be done by   creating a  mystery for them and then involving the individual in   complex thought  processing to change the schema. Story-telling could   also induce  emotional reactions to inspire or simulate them.&lt;/li&gt;
&lt;li&gt;Persuade them through gamification &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Make the strategies for change very rigid which cannot be changed often and acknowledge what you deliver to your audience. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;http://en.wikipedia.org/wiki/Gamification&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;James, Rachel. “Promoting Sustainable Behavior- a guide to successful communication”. Web. August 2010. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Xu, Yongwen. ” literature review on web application Gamification and analytics”. Web. August 2011. &lt;/li&gt;
&lt;li&gt;http://www.yukaichou.com&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Albornoz, Denisse. 'Methods for Social Change'. Web. February 2014. The link for the same is here- http://cis-india.org/digital-natives/making-change/methods-for-social-change. &lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;*******************************************&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;About Dipali Sheth:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Studying in my 3rd year at Christ University gave me the opportunity to intern at Centre for Internet and Society. This post has been a result of my internship for a month under the Making Change program at CIS. My interest in Research and New Media started the journey here and has only added to making Research my zeal in the near future.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/making-change/reaping-the-benefits-of-gamification'&gt;https://cis-india.org/digital-natives/making-change/reaping-the-benefits-of-gamification&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>dipali</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Making Change</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2015-10-24T14:24:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/reading-from-a-distance">
    <title>Reading from a Distance — Data as Text</title>
    <link>https://cis-india.org/raw/digital-humanities/reading-from-a-distance</link>
    <description>
        &lt;b&gt;The advent of new digital technologies and the internet has redefined practices of reading and writing, and the notion of textuality which is a fundamental aspect of humanities research and scholarship. This blog post looks at some of the debates around the notion of text as object, method and practice, to understand how it has changed in the digital context. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The concepts of text and textuality have been central to the discourse on language and culture, and therefore by extension to most of the humanities disciplines, which are often referred to as text-based disciplines. The advent of new digital and multimedia technologies and the internet has brought     about definitive changes in the ways in which we see and interpret texts today, particularly as manifested in new practices of reading and writing facilitated by these tools and dynamic interfaces now available in the age of the digital. The ‘text’ as an object of enquiry is also central to much of the discussion and literature on Digital Humanities, given that many scholars, particularly in the West trace its antecedents to practices of textual criticism and scholarship that stem from efforts in humanities computing. Everything from the early attempts in character and text encoding (see &lt;a href="http://www.tei-c.org/index.xml"&gt;TEI&lt;/a&gt;) to new forms and methods of digital literary curation, either on large online archives or in the form of apps such as Storify or Scoop it have been part of the development of this discourse on the text. Significant among these is the emergence of processes     such as text analysis, data mining, distant reading, and not-reading, all of which essentially refer to a process of reading by recognising patterns over a large corpus of texts, often with the help of a clustering algorithm&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;. The implications of this for literary scholarship are manifold, with many scholars seeing this as a point of ‘crisis’ for the traditional practices of reading and meaning-making such     as close reading, or an attempt to introduce objectivity and a certain quantitative aspect, often construed as a form of scientism, into what is essentially a domain of interpretation. But an equal number of advocates of the process also see the use of these tools as enabling newer forms of literary     scholarship by enhancing the ability to work with and across a wide range and number of texts. The simultaneous emergence of new kinds of digital objects,     and a plethora of them, and the supposed obscuring of traditional methods in the process is perhaps the immediate source of this perceived discomfort.     There are different perspectives on the nature of changes this has led to in understanding a concept that is elementary to the humanities. Apart from the fact that digitisation makes a large corpus of texts now accessible, subject to certain conditions of access of course, it also makes texts ‘    &lt;em&gt;massively addressable at different levels of scale&lt;/em&gt;’ as suggested by Micheal Witmore. According to him “Addressable here means that one can query a     position within the text at a certain level of abstraction”. This could be at the level of character, words, lines etc that may then be related to other     texts at the same level of abstraction. The idea that the text itself is an aggregation of such ‘computational objects’ is new, but as Witmore points out     in his essay, it is the nature of this computational object that requires further explanation. In fact, as he concludes in the essay, “textuality is     addressability” and further...this is a condition, rather than a technology, action or event”. What this points towards is the rather flexible and somewhat     ephemeral nature of the text itself, particularly the digital text, and the need to move out of a notion of textuality which has been shaped so far by the     conventions of book culture, which look to ideal manifestations in provisional unities such as the book.&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The notion of the text itself as an object of enquiry has undergone significant change. Various disciplines have for long engaged with the text - as a     concept, method or discursive space - and its definitions have changed over time that have added dimensions to ways of doing the humanities. With every     turn in literary and cultural criticism in particular, the primacy of the written word as text has been challenged, what is understood as ‘textual’ in a     very narrow sense has moved to the visual and other kinds of objects. The digital object presents a new kind of text that is difficult to grasp - the neat     segregations of form, content, process etc seem to blur here, and there is a need to unravel these layers to understand its textuality. As Dr. Madhuja     Mukherjee, with the Department of Film Studies, at Jadavpur University points out, with the opening up of the digital field, there are more possibilities     to record, upload and circulate, as a result of which the very object of study has changed; the text as an object therefore has become very unstable, more     so that it already is. Film is an example, where often DVDs of old films no longer exist, so one approaches the ‘text’ through other objects such as     posters or found footage. Such texts also available through several online archives now offer possibilities of building layers of meaning through     annotations and referencing. Another example she cites is of the Indian Memory project, where objects such as family photographs become available for study     as texts for historiography or ethnographic work. She points out that this is not a new phenomenon, as the disciplines of literary and cultural studies,     critical theory and history have explored and provided a base for these questions, but there is definitely a new found interest now due the increasing     prevalence of digital methods and spaces. One example of such a digital text perhaps is the hypertext&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt;.     George Landow in his book on hypertext draws upon both Barthes and Foucault’s conceptualisation of textuality in terms of nodes, links, networks, web and     path, which has been posited in some sense as the ideal text. Landow’s analysis emphasises the multilinearity of the text, in terms of its lack of a     centre, and therefore the reader being able to organise the text according to his own organising principle - possibilities that hypertext now offers which     the printed book could not. While hypertext illustrates the post-structural notion of what comprises an open text as it were, it may still be linear in     terms of embodying certain ideological notions which shape its ultimate form. Hypertext, while in a pragmatic sense being the text of the digital is still     at the end of a process of signification or meaning-making, often defined within the parameters set by print culture.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;But to return to what has been one of the fundamental notions of textual criticism, the ‘text’ is manifested through practices of reading and writing    &lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;. So what have been the implications of digital technologies for these processes which have now become     technologised, and by extension for our understanding of the text? While processes such as distant reading and not-reading demonstrate precisely the     variability of meaning-making processes and the fluid nature of textuality, they also seem to question the premise of the method and form of criticism     itself. Franco Moretti, his book Graphs, Maps and Trees talks about the possibilities accorded by clustering algorithms and pattern recognition as a means     to wade through corpora, thus attempting to create what he calls an ‘abstract model of literary history’. He describes this approach as ‘within the old     territory of literary history, a new object of study’...He further says, “Distant reading, I have once called this type of approach, where distance is     however not an obstacle, but a &lt;em&gt;specific kind of knowledge: &lt;/em&gt;fewer elements&lt;em&gt;, &lt;/em&gt;hence a sharper sense of their overall interconnection.     Shapes, relations, structures. Forms. Models.” The emphasis for Moretti therefore is on the method of reading or meaning-making. There seem to be two     questions that emerge from this perceived shift - one is the availability of the data and tools that can ‘facilitate’ this kind of reading, and the second     is a change in the nature of the object of enquiry itself, so much so that close reading or textual analysis is not engaging or adequate any longer and calls for other methods. An example much closer home of such new forms of textual criticism is that of ‘    &lt;a href="http://bichitra.jdvu.ac.in/index.php"&gt;Bichitra’&lt;/a&gt;, an online variorum of Rabindranath Tagore’s works developed by the School of Cultural Texts     and Records at Jadavpur University. The traditional variorum in itself is a work of textual criticism, where all the editions of the work of an author are     collated as a corpus to trace the changes and revisions made over a period of time. The Tagore varioum, while making available an exhaustive resource on     the author’s work, also offers a collation tool that helps trace such variations across different editions of works, but with much less effort otherwise     needed in manually reading through these texts. Like paper variorum editions, this online archive too allows for study of a wider number and diversity of     texts on a single author through cross-referencing and collation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As is apparent in the development of new kinds of tools and resources to facilitate reading, there is a problem of abundance that follows once the problem     of access has been addressed to some extent. Clustering algorithms have been used to generate and process data in different contexts, apart from their     usage in statistical data analysis. The role of data is pertinent here; and particularly that of big data. But the understanding of big data is still     shrouded within the conventions of computational practice, so much so that its social aspects are only slowly being explored now, particularly in the     context of reading practices. Big data as understood in the field of computing is data that is so vast or complex that it cannot be processed by existing     database management tools or processing applications&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;. But if one were to treat data as text, as is an     eventual possibility with literary criticism that uses computational methods, what becomes of the critical ability to decode the text - and does this     further change the nature of the text itself as a discursive object, and the practice of reading and textual criticism as a result. Reading data as text     then also presupposes a different kind of reader, one that is no longer the human subject. This would be a significant move in understanding how the     processes of textuality also change to address new modes of content generation, and how much the contours of such textuality reflect the changes in the     discursive practices that construct it. Most of the debate however has been framed within a narrative of loss - of criticality and a particular method of     making meaning of the world. Close reading as a method too came with its own set of problems - which can be seen as part of a larger critique of the     Formalists and later American New Criticism, specifically in terms of its focus on the text. As such, this further contributes to canonising a certain kind     of text and thereby a form of cultural and literary production. &lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; Distant reading as a method, though also     seen as an attempt to address this problem by including corpora, still poses the same issues in terms of its approach, particularly as the text still     serves as the primary and authoritative object of study. The emphasis therefore comes back to reading as a critical and discursive practice. The objects     and tools are new; the skills to use them need to be developed. However, as much of the literature and processes demonstrate, the critical skills     essentially remain the same, but now function at a meta-level of abstraction. Kathleen Fitzpatrick in her book on the rise of electronic publishing and     planned technological obsolescence dwells on the manner in which much of our reading practice is still located in print or specifically book culture; the     conflict arises with the shift to a digital process and interface, in terms of trying to replicate the experience of reading on paper. Add to this problem     of abundance of data, and processes like curation, annotation, referencing, visualisation, abstraction etc acquire increased valence as methods of     creatively reading or making meaning of content. &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Whether as object, method or practice, the notion of textua­­lity and the practice of the reading have undergone significant changes in the digital     context, but whether this is a new domain of enquiry is a question one may ask. Matthew G. Kirschenbaum in his essay on re-making reading suggests that     perhaps the function of these clustering algorithms, apart from serving to supplant or reiterate what we already know is to also ‘provoke’ new ideas or     questions. This is an interesting use of the term, given that the suggestion to use quantitative methods such as clustering and pattern recognition in     fields that are premised on close reading and interpretation is itself a provocative one and has implications for content. The conflict produced between     close and distant reading, the shift from print to digital interfaces would therefore emerge as a space for new questions around the given notion of text     and textuality. But if one were to extend that thought, it may be pertinent to ask if the Digital Humanities can now provide us with a vibrant field that     will help produce a better and more nuanced understanding of the notion of the text itself as an object of enquiry. This would require one to work with and     in some sense against the body of meaning already generated around the text, but in essence the very conflict may be where the epistemological questions     about the field are located.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; References: &lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Fitzpatrick, Kathleen, “Texts”, Planned Obsolescence – Publishing, Technology and Future of the Academy, New York and London: New York University     Press, 2011. pp.89 – 119.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kirschenbaum, M.G, “The Remaking of Reading: Data Mining and the Digital Humanities”, Conference proceedings; National Science Foundation Symposium on     Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, Balitmore, October 10-12, 2007, &lt;a class="external-link" href="http://www. cs. umbc. edu/hillol/NGDM07/abstracts/talks/MKirschenbaum. pdf"&gt;http://www. cs. umbc. edu/hillol/NGDM07/abstracts/talks/MKirschenbaum. pdf&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Landow, George. P, Hypertext: The Convergence of Critical Theory and Technology, Balitmore: John Hopkins University Press, 1992 pp 2-12&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Moretti, Franco, Graphs, Maps and Trees: Abstract Models for a Literary History, Verso: London and New York, 2005. p.1&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Whitmore, Michael , “Text: A Massively Addressable Object”, Debates in the Digital Humanities, ed. Mathew K. Gold, University of Minnesota Press:     2012 pp 324 – 327 &lt;a href="http://dhdebates.gc.cuny.edu/debates/text/24"&gt;http://dhdebates.gc.cuny.edu/debates/text/24&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wilkens, Mathew, “Canons,Close Reading and the Evolution of Method” Debates in the Digital Humanities, ed. Mathew K. Gold, University of     Minnesota Press: 2012 pp 324 – 327 &lt;a href="http://dhdebates.gc.cuny.edu/debates/text/24"&gt;http://dhdebates.gc.cuny.edu/debates/text/24&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; For more on cluster analysis and algorithms see http://en.wikipedia.org/wiki/Cluster_analysis&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; See Witmore, 2012. pp 324 - 327&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; A term coined by Theodor H. Nelson, which he describes as “a series of text chunks connected by links which offer the reader different pathways” (             As quoted in Landow, 1991. pp 2-12)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Barthes, 1977. pp 155 - 164&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; See http://en.wikipedia.org/wiki/Big_data&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; See Wilkens (2012). pp 249-252&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; See Fitzpatrick (2011), pp 89 -119&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/reading-from-a-distance'&gt;https://cis-india.org/raw/digital-humanities/reading-from-a-distance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Mapping Digital Humanities in India</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-13T05:29:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/reading-from-a-distance-data-as-text">
    <title>Reading from a Distance – Data as Text</title>
    <link>https://cis-india.org/raw/reading-from-a-distance-data-as-text</link>
    <description>
        &lt;b&gt;An extended survey of digital initiatives in arts and humanities practices in India was undertaken during the last year. Provocatively called 'mapping digital humanities in India', this enquiry began with the term 'digital humanities' itself, as a 'found' name for which one needs to excavate some meaning, context, and location in India at the present moment. Instead of importing this term to describe practices taking place in this country - especially when the term itself is relatively unstable and undefined even in the Anglo-American context - what I chose to do was to take a few steps back, and outline a few questions/conflicts that the digital practitioners in arts and humanities disciplines are grappling with. The final report of this study will be published serially. This is the third among seven sections.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Sections&lt;/h2&gt;
&lt;p&gt;01. &lt;a href="http://cis-india.org/raw/digital-humanities-in-india"&gt;Digital Humanities in India?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;02. &lt;a href="http://cis-india.org/raw/a-question-of-digital-humanities"&gt;A Question of Digital Humanities&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;03. &lt;strong&gt;Reading from a Distance – Data as Text&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;04. &lt;a href="http://cis-india.org/raw/the-infrastructure-turn-in-the-humanities"&gt;The Infrastructure Turn in the Humanities&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;05. &lt;a href="http://cis-india.org/raw/living-in-the-archival-moment"&gt;Living in the Archival Moment&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;06. &lt;a href="http://cis-india.org/raw/new-modes-and-sites-of-humanities-practice"&gt;New Modes and Sites of Humanities Practice&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;07. &lt;a href="http://cis-india.org/raw/digital-humanities-in-india-concluding-thoughts"&gt;Digital Humanities in India – Concluding Thoughts&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
The concepts of text and textuality have been central to the discourse on language and culture, and therefore by extension to most of the humanities disciplines, which are often referred to as text-based disciplines. The advent of new digital and multimedia technologies and the internet has brought about definitive changes in the ways in which we see and interpret texts today, particularly as manifested in new practices of reading and writing facilitated by these tools and dynamic interfaces now available in the age of the digital. The ‘text’ as an object of enquiry is also central to much of the discussion and literature on DH given that many scholars, particularly in the West trace its antecedents to practices of textual criticism and scholarship that stem from efforts in humanities computing. Everything from the early attempts in character and text encoding &lt;strong&gt;[1]&lt;/strong&gt; to new forms and methods of digital literary curation, either on large online archives or in the form of social media such as Storify &lt;strong&gt;[2]&lt;/strong&gt; or Scoop-it &lt;strong&gt;[3]&lt;/strong&gt; have been part of the development of this discourse on the text. Significant among these is the emergence of processes such as text analysis, data mining, distant reading, and not-reading, all of which essentially refer to a process of reading by recognising patterns over a large corpus of texts, often with the help of a clustering algorithm &lt;strong&gt;[4]&lt;/strong&gt;. The implications of this for literary scholarship are manifold, with many scholars seeing this as a point of ‘crisis’ for the traditional practices of reading and meaning-making such as close reading, or an attempt to introduce objectivity and a certain quantitative aspect, often construed as a form of scientism, into what is essentially a domain of interpretation (Wieseltier 2013). But an equal number of advocates of the process also see the use of these tools as enabling newer forms of literary scholarship by enhancing the ability to work with and across a wide range and number of texts.
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The simultaneous emergence of new kinds of digital objects, and a plethora of them, and the supposed obscuring of traditional methods in the process is perhaps the immediate source of this perceived discomfort. There are different perspectives on the nature of changes this has led to in understanding a concept that is elementary to the humanities. Apart from the fact that digitisation makes a large corpus of texts now accessible, subject to certain conditions of access of course, it also makes texts '&lt;em&gt;massively addressable at different levels of scale&lt;/em&gt;' as suggested by Michael Witmore (Witmore 2012: 324-327, emphasis as in the original). According to him: "[A]ddressable here means that one can query a position within the text at a certain level of abstraction" (Ibid. 325). This could be at the level of character, words, lines etc that may then be related to other texts at the same level of abstraction. The idea that the text itself is an aggregation of such ‘computational objects’ is new, but as Witmore points out in his essay, it is the nature of this computational object that requires further explanation. In fact, as he concludes in the essay, "textuality is addressability and further ... this is a condition, rather than a technology, action or event" (Ibid. 326). What this points towards is the rather flexible and somewhat ephemeral nature of the text itself, particularly the digital text, and the need to move out of a notion of textuality which has been shaped so far by the conventions of book culture, which look to ideal manifestations in provisional unities such as the book (Ibid. 327).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Of Texts and Hypertextuality&lt;/h2&gt;
&lt;p&gt;An example much closer home of such new forms of textual criticism is that of 'Bichitra' &lt;strong&gt;[5]&lt;/strong&gt;, an online variorum of Rabindranath Tagore’s works developed by the School of Cultural Texts and Records at Jadavpur University. The traditional variorum in itself is a work of textual criticism, where all the editions of the work of an author are collated as a corpus to trace the changes and revisions made over a period of time. The Tagore variorum, while making available an exhaustive resource on the author’s work, also offers a collation tool that helps trace such variations across different editions of works, but with much less effort otherwise needed in manually reading through these texts. Like paper variorum editions, this online archive too allows for study of a wider number and diversity of texts on a single author through cross-referencing and collation. Prof. Sukanta Chaudhuri &lt;strong&gt;[6]&lt;/strong&gt;, Professor Emeritus, Department of English and School of Cultural Texts and Records at Jadavpur University, Kolkata has been part of the process of setting up this variorum. According to him the most novel aspects of this platform, or as he calls it - 'integrated knowledge site' - are to do with these functions of cross-referencing and integration. The bibliography is a hyperlinked structure, which connects to all the different digital versions of a particular text (the most being 20 versions of a single poem). The notion of a bibliography has always evoked hypertextuality – the possibility to link and cross - reference texts, but with the advent of the digital, this possibility has been fully realized, as seen in the case of the hypertext &lt;strong&gt;[7]&lt;/strong&gt;. For collation, the project team developed a unique software, titled 'Prabhed,' (meaning difference in Bengali) that helps to assemble text at three levels (a) chapter in novel, act/scene in drama, canto in poem; (b) para in novel or other prose, speech in drama, stanza in poem; (c) individual words.. For instance, you can choose a particular section of a book, poem or play - and compare its occurrences across different editions and versions of the work to note their matches and differences. If two paragraphs have been removed from one chapter, and put into another, that can be traced through the collation software. If a particular word has been omitted in a later edition, or if certain lines have been rearranged in a poem, these changes can be tracked &lt;strong&gt;[8]&lt;/strong&gt;. What makes the search engine 'integrated' is not simply that it can search all Tagore's works in one go, but that it links up with the bibliography and thereby with the actual text of the works. It is interesting to note here the different changes that the text undergoes to become available for study on a digital platform, where it is amenable to intense searching and querying of this kind. It is now possible to search across a large corpus of texts, for minute changes in words or sentences, and ask questions of these in terms of their usage, instances and contexts of their occurrence, thus facilitating a kind of enquiry previously never undertaken in textual studies.&lt;/p&gt;
&lt;p&gt;The project however is not without its challenges, as Prof. Chaudhuri further outlines. Working with Indic scripts is a persistent problem for digital initiatives in India. In Bengali some work has been done in the form of a scientifically designed keyboard software called Avro, which stores all the conjunct letters preserving their separate characteristics &lt;strong&gt;[9]&lt;/strong&gt;. Developing Optical Character Recognition (OCR) for scanned material in Indian languages remains a crucial issue for most digitization and archival initiatives in India. Other issues include the problem of vowel markers appearing before the consonants, even if phonetically they follow and are keyed in afterwards. To get the font and keyboard software to recognize this is a big challenge. The third challenge, especially in the case of works printed from the nineteenth century to the middle of the twentieth century, is that there are vast differences in spelling; the same word can be spelt in different ways, and as there is no lexicon, one may not do any kind of general search. There is also the issue of a high degree of inflection in the language. A word may have a suffix (or, &lt;em&gt;vibhakti&lt;/em&gt;) attached to it to indicate the case: one for the subject of the sentence, another for the object, another for the possessive case and so on. These are multiplied by the different forms of the verbs. The development of a lexicon in Bengali would be one of the ways to resolve many of these issues. However, as most people can only see and interact with the digital interface of Bichitra, and not really understand the process behind it, or the amount of work involved in making the platform work the way it does, funding for research and development, maintenance and sustainability is difficult to obtain. Backroom file management, which includes both paper and digital files remains a big but largely invisible task on such a platform. The total number of files generated from Bichitra is tens of millions or hundreds of millions, and many of these are offline files which would not even go on to the website. Hence while uploading the files, the basic groundwork for a retrieval system for different files serving different functions had already been laid, including the creation of a bibliography, which was a huge exercise in itself. The process of making text available as hypertext is labor that is invisibilized, and is rarely or never available to the end user.&lt;/p&gt;
&lt;p&gt;Prof. Chaudhuri also speaks of ways in which the notion of textuality has been rendered differently through the use of the internet and digital technologies. Digital or electronic text has helped theorize better the notion of a fluid text - the fact that a text is never complete, but only bound between the covers of a book at a given point of several processes that are technological as well as social. The notion of the text itself as an object of enquiry has undergone significant change in the last several decades. Various disciplines have for long engaged with the text - as a concept, method or discursive space -  and its definitions have changed over time that have added dimensions to ways of doing the humanities. With every turn in literary and cultural criticism in particular, the primacy of the written word as text has been challenged, what is understood as ‘textual’ in a very narrow sense has moved to the visual and other kinds of objects. The digital object presents a new kind of text that is difficult to grasp - the neat segregations of form, content and process seem to blur here, and there is a need to unravel these layers to understand its textuality. As Dr. Madhuja Mukherjee, with the Department of Film Studies, at Jadavpur University  points out, with the opening up of the digital field, there are more possibilities to record, upload and circulate, as a result of which the very object of study has changed; the text as an object therefore has become very unstable, more so that it already is. Film is an example, where often DVDs of old films no longer exist, so one approaches the 'text' through other objects such as posters or found footage. Such texts also available through several online archives now offer possibilities of building layers of meaning through annotations and referencing. Another example she cites is of the Indian Memory project, where objects such as family photographs become available for study as texts for historiography or ethnographic work. She points out that this is not a new phenomenon, as the disciplines of literary and cultural studies, critical theory and history have explored and provided a base for these questions, but there is definitely a new found interest now due the increasing prevalence of digital methods and spaces.&lt;/p&gt;
&lt;p&gt;Shaina Anand, artist and filmmaker, further espouses this thought when she talks about the new possibilities of textual analysis of film that are now possible, particularly in terms of temporal control, first with the DVD, then the internet and now with online archival platforms like Indiancine.ma &lt;strong&gt;[10]&lt;/strong&gt; and the Public Access Digital Media Archive, or Pad.ma &lt;strong&gt;[11]&lt;/strong&gt;. The first is an online archive of Indian film from the pre-copyright era (so effectively before 1955), while the second is an archive of found and archival footage, images sound clips and unfinished films &lt;strong&gt;[12]&lt;/strong&gt;. Both platforms allow the user to search through an array of material, view/listen to them download or embed them as links.  They make available to users not just an online database for storage and retrieval but also a space to work with a range of materials in multiple video and audio formats and themes through annotations and referencing. The annotation tool is perhaps the most innovative aspect of these platforms, wherein a user can pause, isolate a section of a sequence and annotate it using a range of options and filters. The annotations are textual, in the form of comments, commentary and marginalia (in the case of Pad.ma) and can also link to other paraphernalia around the film object, such as posters, images, advertisements and other literature. Users can also contextualize material by adding transcripts, descriptions, events, keywords, and even locating the events in the video on a map. These have brought to the fore several questions on relevance, accessibility and ownership, as in the case of raw footage from films, and opened up possibilities for such materials to be re-contextualized by the reader in different ways. This layering of annotations around the film object also creates a new research object, or text that then necessitates new methods of studying it as well. As opposed to the earlier practice of the researcher/critic having to watch the film first and then comment or analyse it, and relying on memory to generate the scholarship, it is now possible to pause, analyse or read and come back to the film and annotate the text in several ways. What does this do to the film text - the process documenting the form is new, not cinema as a form itself – is a question that comes up quite prominently here. The computational aspect also is important here, given the vast amount of footage that is now available, which then requires better lexical indexing to compute and manage large data sets. This has been a constant endeavour with Pad.ma and Indiancine.ma as well.&lt;/p&gt;
&lt;p&gt;As in the case of film, what becomes prominent here is the move to a digital text of some sort. One such example of a digital text perhaps is the hypertext. George Landow in his book on hypertext draws upon both Barthes and Foucault’s conceptualisation of textuality in terms of nodes, links, networks, web and path, which has been posited as the 'ideal text' by Barthes (Landow 2006: 2). Landow’s analysis emphasises the multilinearity of the text, in terms of its lack of a centre, and therefore the reader being able to organise the text according to his own organising principle - possibilities that hypertext now offers which the printed book could not. While hypertext illustrates the possibilities of multilinearity of a text that can be realised in the digital, it may still be linear in terms of embodying certain ideological notions which shape its ultimate form. Hypertext, while in a pragmatic sense being the text of the digital is still at the end of a process of signification or meaning-making, often defined within the parameters set by print culture. As such it is only the narrative, and not the form itself that is multi-linear in hypertext fiction.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Textual Criticism in the Digital&lt;/h2&gt;
&lt;p&gt;But to return to what has been one of the fundamental notions of textual criticism, the 'text' is manifested through practices of reading and writing (Barthes 1977). So what have been the implications of digital technologies for these processes which have now become technologised, and by extension for our understanding of the text? While processes such as distant reading and not-reading demonstrate precisely the variability of meaning-making processes and the fluid nature of textuality, they also seem to question the premise of the method and form of criticism itself. Franco Moretti, in his book &lt;em&gt;Graphs, Maps and Trees&lt;/em&gt; talks about the possibilities accorded by clustering algorithms and pattern recognition as a means to wade through corpora, thus attempting to create what he calls an 'abstract model of literary history' (Moretti 2005: 1). He describes this approach as "within the old territory of literary history, a new object of study." He further says, "Distant reading, I have once called this type of approach, where distance is however not an obstacle, but a &lt;em&gt;specific kind of knowledge&lt;/em&gt;: fewer elements, hence a sharper sense of their overall interconnection. Shapes, relations, structures. Forms. Models" (Moretti 2005: 1, emphasis as in original). The emphasis for Moretti therefore is on the method of reading or meaning-making. There seem to be two questions that emerge from this perceived shift - one is the availability of the data and tools that can 'facilitate' this kind of reading, and the second is a change in the nature of the object of enquiry itself, so much so that close reading or textual analysis is not engaging or adequate any longer and calls for other methods of reading.&lt;/p&gt;
&lt;p&gt;As is apparent in the development of new kinds of tools and resources to facilitate reading, there is a problem of abundance that follows once the problem of access has been addressed to some extent. Clustering algorithms have been used to generate and process data in different contexts, apart from their usage in statistical data analysis. The role of data is pertinent here; and particularly that of big data. But the understanding of big data is still shrouded within the conventions of computational practice, so much so that its social aspects are only slowly being explored now, particularly in the context of reading practices. Big data as not just a reference to volume but also its other aspects of data such as velocity, scope, and granularity among others significantly increases the ambit of what the term covers, with implications for new epistemologies and modes of research (Kitchin 2014). But if one were to treat data as text, as is an eventual possibility with literary criticism that uses computational methods, what becomes of the critical ability to decode the text – and does this further change the nature of the text itself as a discursive object, and the practice of reading and textual criticism as a result. Reading data as text then also presupposes a different kind of reader, one that is no longer the human subject. This would be a significant move in understanding how the processes of textuality also change to address new modes of content generation, and how much the contours of such textuality reflect the changes in the discursive practices that construct it. Most of the debate however has been framed within a narrative of loss - of criticality and a particular method of making meaning of the world. Close reading as a method too came with its own set of problems - which can be seen as part of a larger critique of the Formalists and later New Criticism, specifically in terms of its focus on the text.  As such, this further contributes to canonising a certain kind of text and thereby a certain form of cultural and literary production (Wilkens 2012). Distant reading as a method, though also seen as an attempt to address this problem by working with corpora as opposed to select texts, still poses the same issues in terms of its approach, particularly as the text still serves as the primary and authoritative object of study. The emphasis therefore comes back to reading as a critical and discursive practice. The objects and tools are new; the skills to use them need to be developed. However, as much of the literature and processes demonstrate, the critical skills essentially remain the same, but now function at a meta-level of abstraction. Kathleen Fitzpatrick in her book on the rise of electronic publishing and planned technological obsolescence dwells on the manner in which much of our reading practice is still located in print or specifically book culture; the conflict arises with the shift to a digital process and interface, in terms of trying to replicate the experience of reading on paper (Fitzpatrik 2011). Add to this problem of abundance of data, and processes like curation, annotation, referencing, visualisation, abstraction etc. acquire increased valence as methods of creatively reading or making meaning of content (Ibid.). More importantly, it also points towards a change and diversity in the disciplinary method. Where close reading was once the only method by which a text became completely accessible to the reader, it is now possible to approach it through a set of processes, thus urging us to rethink the method of enquiry itself.&lt;/p&gt;
&lt;p&gt;Whether as object, method or practice, the notion of textuality and the practice of the reading have undergone significant changes in the digital context, but whether this is a new domain of enquiry is a question we may still need to ask. Matthew G. Kirschenbaum in his essay on re-making reading (quoted earlier in this chapter) suggests that perhaps the function of these clustering algorithms, apart from serving to supplant or reiterate what we already know is to also ‘provoke’ new ideas or questions (Kirschenbaum XXXX: 3). The conflict produced between close and distant reading, the shift from print to digital interfaces would therefore emerge as a space for new questions around the given notion of text and textuality. But if one were to extend that thought, it may be pertinent to ask if DH can now provide us with a vibrant field that will help produce a better and more nuanced understanding of the notion of the text itself as an object of enquiry. This would require one to work with and in some sense against the body of meaning already generated around the text, but in essence the very conflict may be where the epistemological questions about the field are located. The digital text, owing to the possibilities of ‘massive addressability,’ mentioned earlier is now more fluid and socialized. The renewed focus on the textual is most apparent in this manner of imagining the text, using the metaphor of a highly interlinked, networked and shared text. It also puts forth important questions then of how we understand technology a certain way, especially in the context of language and representation as an important factor of understanding new textual objects. Is technology a tool for textual analysis, or is it in inherent to our understanding of the nature of the text? Is the development of these methods of enquiry shaped by certain disciplinary requirements, and do they also challenge or create new conflicts for traditional methods of enquiry? The growth in the study of different media objects, such as video and cinema, and the advent of areas such as media studies, oral history, media archaeologies has further prompted concerns regarding the study of the digital object in these disciplines, and a rethinking of how we understand the notion of the text.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; "The Text Encoding Initiative (TEI) is a consortium which collectively develops and maintains a standard for the representation of texts in digital form. Its chief deliverable is a set of Guidelines which specify encoding methods for machine-readable texts, chiefly in the humanities, social sciences and linguistics. Since 1994, the TEI Guidelines have been widely used by libraries, museums, publishers, and individual scholars to present texts for online research, teaching, and preservation." See: &lt;a href="http://www.tei-c.org/"&gt;http://www.tei-c.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://storify.com/"&gt;https://storify.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://www.scoop.it/"&gt;http://www.scoop.it/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; For more on text mining see Lisa Guernsey in 'Digging for Nuggets of Wisdom,' in The New York Times, October 16, 2003&amp;nbsp; &lt;a href="http://www.nytimes.com/2003/10/16/technology/circuits/16mine.html?pagewanted=print"&gt;http://www.nytimes.com/2003/10/16/technology/circuits/16mine.html?pagewanted=print&lt;/a&gt;. For more on data mining, distant reading, and the changing nature of reading practices see Matthew Kirschenbaum in 'The Remaking of Reading,' &lt;a href="http://www.csee.umbc.edu/~hillol/NGDM07/abstracts/talks/MKirschenbaum.pdf"&gt;http://www.csee.umbc.edu/~hillol/NGDM07/abstracts/talks/MKirschenbaum.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://bichitra.jdvu.ac.in/"&gt;http://bichitra.jdvu.ac.in/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Interview with author, July 30, 2015.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; A term coined by Theodor H. Nelson, which he describes as "a series of text chunks connected by links which offer the reader different pathways." As quoted in George Landow, &lt;em&gt;Hypertext: The Convergence of Contemporary Critical Theory and Technology&lt;/em&gt;, Baltimore: John Hopkins University Press, 1992, 2-12.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Bichitra, 'Collation Guide,' accessed on September 17, 2015, &lt;a href="http://bichitra.jdvu.ac.in/bichitra_collation_guide.php"&gt;http://bichitra.jdvu.ac.in/bichitra_collation_guide.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Omicron Lab, accessed September 17, 2015. &lt;a href="https://www.omicronlab.com/avro-keyboard.html"&gt;https://www.omicronlab.com/avro-keyboard.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://pad.ma/"&gt;http://pad.ma/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a href="http://indiancine.ma/"&gt;http://indiancine.ma/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; For more on these platforms see the section on DH institutions in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;Barthes, Roland. "From Work to Text". In &lt;em&gt;Image, Music, Text&lt;/em&gt;. London: Fontana Press, 1977.&lt;/p&gt;
&lt;p&gt;Fitzpatrick, Kathleen. "Texts" in &lt;em&gt;Planned Obsolescence: Publishing, Technology and the Future of the Academy&lt;/em&gt;. New York: New York University Press, 2011.&lt;/p&gt;
&lt;p&gt;Kirschenbaum, Matthew. "The Remaking of Reading". &lt;a href="http://www.csee.umbc.edu/%7Ehillol/NGDM07/abstracts/talks/MKirschenbaum.pdf"&gt;http://www.csee.umbc.edu/~hillol/NGDM07/abstracts/talks/MKirschenbaum.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Kitchin, Rob. 'Big Data, New Epistemologies, and Paradigm Shifts,' &lt;em&gt;Big Data &amp;amp; Society&lt;/em&gt;, 2014, April–June, pp. 1–12, DOI: 10.1177/2053951714528481.&lt;/p&gt;
&lt;p&gt;Landow, George. &lt;em&gt;Hypertext: The Convergence of Contemporary Critical Theory and Technology&lt;/em&gt;. Baltimore: Johns Hopkins University Press, 1992.&lt;/p&gt;
&lt;p&gt;Moretti, Franco. &lt;em&gt;Graphs, Maps, Trees: Abstract Models for a Literary History&lt;/em&gt;, Verso, 2005.&lt;/p&gt;
&lt;p&gt;Wieseltier, Leon, 'Crimes Against Humanities,' The New Republic, September 3, 2013, &lt;a href="http://www.newrepublic.com/article/114548/leon-wieseltier-responds-steven-pinkers-scientism"&gt;http://www.newrepublic.com/article/114548/leon-wieseltier-responds-steven-pinkers-scientism&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Wilkens, Mathew. "Canons, Close Reading and the Evolution of Method". In &lt;em&gt;Debates in the Digital Humanities &lt;/em&gt; Ed. M.K. Gold. Minneapolis: University of Minnesota Press, 2012.&lt;/p&gt;
&lt;p&gt;Witmore, Michael. "Text: A Massively Addressable Object". In &lt;em&gt;Debates in the Digital Humanities&lt;/em&gt;, Ed. M.K. Gold. Minneapolis: University of Minnesota Press, 2012&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/reading-from-a-distance-data-as-text'&gt;https://cis-india.org/raw/reading-from-a-distance-data-as-text&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Mapping Digital Humanities in India</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-06-30T05:06:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review">
    <title>Re:wiring Bodies: Call for Review</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review</link>
    <description>
        &lt;b&gt;Dr. Asha Achuthan's research project on "Rewiring Bodies" is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. From her vantage position, straddling the disciplines of medicine an Cultural Studies, through a gendered perspective. Dr. Achutan historicises the attitudes, imaginations and policies that have shaped the Science-Technology debates in India, to particularly address the ways in which emergence of Internet Technologies have shaped notions of gender and body in India.&lt;/b&gt;
        
&lt;p&gt;The Researchers At Work Programme, at the Centre for Internet and Society, advocates an Open and transparent process of knowledge production. We recognise peer review as an essential and an extremely important part of original research, and invite you, with the greatest of pleasures, to participate in our research, and help us in making our arguments and methods stronger.&lt;/p&gt;
&lt;p&gt;Dr. Asha Achuthan's research project on "Rewiring Bodies" is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. From her vantage position, straddling the disciplines of medicine an Cultural Studies, through a gendered perspective. Dr. Achutan historicises the attitudes, imaginations and policies that have shaped the Science-Technology debates in India, to particularly address the ways in which emergence of Internet Technologies have shaped notions of gender and body in India. Her work at the Centre for Contemporary Studies (IISC, Bangalore) gives a further context to unpack Internet Technologies in a larger context of Technology-Society interface. This original monograph draws from Gender studies, STS research, extand policies, empirical data, Cultural Studies and Feminist epistemological of Sciences, to build a new knowledge framework to address the Internet questions which popular cybercultures or mainstream media studies have ignored.&lt;/p&gt;
&lt;p&gt;The monograph by Dr. Asha Achuthan, has emerged out of the "Rewiring Bodies" project which started nine months ago. The project has involved many public entries available at http://www.cis-india.org/research/cis-raw/histories/rewiring. The first draft of the monograph is now available for public review and feedback. Please click on the links below to choose your own format for accessing the document.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/re-wiring-bodies.docx" class="internal-link" title="Re:wiring Bodies Word"&gt;Word&lt;/a&gt;&amp;nbsp; [word file, 339 kb]&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/re-wiring-bodies.pdf" class="internal-link" title="Re:wiring Bodies PDF"&gt;PDF&lt;/a&gt; [PDF, 712 kb]&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We appreciate your time, engagement and feedback that will help us to bring out the monograph in a published form. Please send all comments or feedback to nishant@cis-india.org or you can use your Open ID to login to the website and leave comments to this post.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/rewiring-bodies/rewiring-call-for-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    

   <dc:date>2015-04-03T10:50:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
