Centre for Internet & Society

2987 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
The kids are all on Facebook
by Prasad Krishna published Jul 20, 2012 — filed under:
In one photo, Prerna stands in front of the mirror, back slightly arched, a fringe covering her left eye, one hand on her hip, pursing her lips. The other hand holds the camera in a steadfast grip. Below this picture are almost a hundred likes and comments. There is nothing unusual as such about this photo on Facebook. Prerna, however, is just 11.
Located in News & Media
Blog Entry The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System
by Sumandro Chattapadhyay published Apr 19, 2016 last modified Apr 19, 2016 01:18 PM — filed under: , , , , , ,
Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.
Located in Internet Governance / Blog
The Last Word: Is there a need to review Information Technology Act?
by Prasad Krishna published Nov 21, 2012 last modified Nov 21, 2012 12:10 PM — filed under: , , , , ,
Does the high-handed arrest of two young girls mean it's time to review and revise the IT Act?
Located in News & Media
The law tries to catch up with tech
by Admin published May 22, 2018 last modified Sep 06, 2018 02:11 AM — filed under:
At his testimony before the U.S. Congress, Facebook CEO Mark Zuckerberg spoke about the upcoming elections in India.
Located in Internet Governance / News & Media
Blog Entry The Ministry And The Trace: Subverting End-To-End Encryption
by Gurshabad Grover, Tanaya Rajwade and Divyank Katira published Jul 12, 2021 last modified Jul 12, 2021 08:18 AM — filed under: , , , , ,
A legal and technical analysis of the 'traceability' rule and its impact on messaging privacy.
Located in Internet Governance / Blog
The Mirror in the Enigma: How Germany lost World War II to a Mathematical Theorem
by elonnai hickok published Aug 04, 2011 last modified Sep 22, 2011 07:53 AM — filed under: ,
Today we use encryption in pretty much everything — cellphones, Internet, banking, satellites, and spaceships. How far have we come since the days of the Enigma and how does it affect our daily lives? CIS invites you to attend a short lecture by Rohit Gupta on August 12, 2011.
Located in Internet Governance / Events
Blog Entry The Mother and Child Tracking System - understanding data trail in the Indian healthcare systems
by Ambika Tandon published Oct 18, 2019 last modified Dec 30, 2019 05:18 PM — filed under: , , , , , , , ,
Reproductive health programmes in India have been digitising extensive data about pregnant women for over a decade, as part of multiple health information systems. These can be seen as precursors to current conceptions of big data systems within health informatics. In this article, published by Privacy International, Ambika Tandon presents some findings from a recently concluded case study of the MCTS as an example of public data-driven initiatives in reproductive health in India.
Located in Internet Governance / Blog
The mystery of the website which published the ‘scoop’ on BJP’s Ram Madhav
by Admin published Feb 22, 2018 — filed under:
The website has since been taken down, but the identity of its creators may not be very easy to find.
Located in Internet Governance / News & Media
The Narendra Modi app: The secret weapon in BJP’s elections arsenal
by Admin published Mar 29, 2018 — filed under:
Narendra Modi app, BJP's secret weapon.
Located in Internet Governance / News & Media
Blog Entry The National Cyber Security Policy: Not a Real Policy
by Bhairav Acharya published Sep 25, 2013 last modified Sep 25, 2013 09:49 AM — filed under: ,
Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.
Located in Internet Governance / Blog