<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1341 to 1355.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ground-zero-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-summit-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data">
    <title>Benefits and Harms of "Big Data"</title>
    <link>https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data</link>
    <description>
        &lt;b&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was 	estimated that the quantity of data produced globally would surpass 1.8 zettabyte&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. By 2013 that had grown 	to 4 zettabytes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;, and with the nascent development of the so-called 'Internet of Things' gathering pace, 	these trends are likely to continue. This expansion in the volume, velocity, and variety of data available&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; , together with the development of innovative forms of statistical analytics, is generally referred to as "Big Data"; though there is no single agreed upon 	definition of the term. Although still in its initial stages, Big Data promises to provide new insights and solutions across a wide range of sectors, many 	of which would have been unimaginable even 10 years ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite enormous optimism about the scope and variety of Big Data's potential applications however, many remain concerned about its widespread adoption, 	with some scholars suggesting it could generate as many harms as benefits&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. Most notably these have included concerns about the inevitable threats to privacy associated with the generation, collection and use of large quantities of data	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;. However, concerns have also been raised regarding, for example, the lack of transparency around the 	design of algorithms used to process the data, over-reliance on Big Data analytics as opposed to traditional forms of analysis and the creation of new 	digital divides to just name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The existing literature on Big Data is vast, however many of the benefits and harms identified by researchers tend to relate to sector specific 	applications of Big Data analytics, such as predictive policing, or targeted marketing. Whilst these examples can be useful in demonstrating the diversity 	of Big Data's possible applications, it can nevertheless be difficult to gain an overall perspective of the broader impacts of Big Data as a whole. As such 	this article will seek to disaggregate the potential benefits and harms of Big Data, organising them into several broad categories, which are reflective of 	the existing scholarly literature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential benefits of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;From politicians to business leaders, recent years have seen Big Data confidently proclaimed as a potential solution to a diverse range of problems from, 	world hunger and diseases, to government budget deficits and corruption. But if we look beyond the hyperbole and headlines, what do we really know about 	the advantages of Big Data? Given the current buzz surrounding it, the existing literature on Big Data is perhaps unsurprisingly vast, providing 	innumerable examples of the potential applications of Big Data from agriculture to policing. However, rather than try (and fail) to list the many possible 	applications of Big Data analytics across all sectors and industries, for the purposes of this article we have instead attempted to distil the various 	advantages of Big Data discussed within literature into the following five broad categories; Decision-Making, Efficiency &amp;amp; Productivity, Research &amp;amp; 	Development, Personalisation and Transparency, each of which will be discussed separately below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Decision-Making &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst data analytics have always been used to improve the quality and efficiency of decision-making processes, the advent of Big Data means that the areas 	of our lives in which data driven decision- making plays a role is expanding dramatically; as businesses and governments become better able to exploit new 	data flows. Furthermore, the real-time and predictive nature of decision-making made possible by Big Data, are increasingly allowing these decisions to be 	automated. As a result, Big Data is providing governments and business with unprecedented opportunities to create new insights and solutions; becoming more 	responsive to new opportunities and better able to act quickly - and in some cases preemptively - to deal with emerging threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This ability of Big Data to speed up and improve decision-making processes can be applied across all sectors from transport to healthcare and is often 	cited within the literature as one of the key advantages of Big Data. Joh, for example, highlights the increased use of data driven predictive analysis by 	police forces to help them to forecast the times and geographical locations in which crimes are most likely to occur. This allows the force to redistribute their officers and resources according to anticipated need, and in certain cities has been highly effective in reducing crime rates	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Raghupathi meanwhile cites the case of healthcare, where predictive modelling driven by big data is 	being used to proactively identify patients who could benefit from preventative care or lifestyle changes&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One area in particular where the decision-making capabilities of Big Data are having a significant impact is in the field of risk management	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;. For instance, Big Data can allow companies to map their entire data landscape to help detect sensitive 	information, such as 16 digit numbers - potentially credit card data - which are not being stored according to regulatory requirements and intervene 	accordingly. Similarly, detailed analysis of data held about suppliers and customers can help companies to identify those in financial trouble, allowing 	them to act quickly to minimize their exposure to any potential default&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Efficiency and Productivity &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an era when many governments and businesses are facing enormous pressures on their budgets, the desire to reduce waste and inefficiency has never been 	greater. By providing the information and analysis needed for organisations to better manage and coordinate their operations, Big Data can help to alleviate such problems, leading to the better utilization of scarce resources and a more productive workforce	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within the literature such efficiency savings are most commonly discussed in relation to reductions in energy consumption	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;. For example, a report published by Cisco notes how the city of Olso has managed to reduce the energy 	consumption of street-lighting by 62 percent through the use of smart solutions driven by Big Data&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;. 	Increasingly, however, statistical models generated by Big Data analytics are also being utilized to identify potential efficiencies in sourcing, 	scheduling and routing in a wide range of sectors from agriculture to transport. For example, Newell observes how many local governments are generating 	large databases of scanned license plates through the use of automated license plate recognition systems (ALPR), which government agencies can then use to 	help improve local traffic management and ease congestion&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commonly these efficiency savings are only made possible by the often counter-intuitive insights generated by the Big Data models. For example, whilst a 	human analyst planning a truck route would always tend to avoid 'drive-bys' - bypassing one stop to reach a third before doubling back - Big Data insights 	can sometimes show such routes to be more efficient. In such cases efficiency saving of this kind would in all likelihood have gone unrecognised by a human 	analyst, not trained to look for such patterns&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Research, Development, and Innovation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps one of the most intriguing benefits of Big Data is its potential use in the research and development of new products and services. As is 	highlighted throughout the literature, Big Data can help businesses to gain an understanding of how others perceive their products or identify customer 	demand and adapt their marketing or indeed the design of their products accordingly&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. Analysis of social 	media data, for instance, can provide valuable insights into customers' sentiments towards existing products as well as discover demands for new products 	and services, allowing businesses to respond more quickly to changes in customer behaviour&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to market research, Big Data can also be used during the design and development stage of new products; for example by helping to test thousands 	of different variations of computer-aided designs in an expedient and cost-effective manner. In doing so, business and designers are able to better assess 	how minor changes to a products design may affect its cost and performance, thereby improving the cost-effectiveness of the production process and 	increasing profitability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Personalisation&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many consumers, perhaps the most familiar application of Big Data is its ability to help tailor products and services to meet their individual 	preferences. This phenomena is most immediately noticeable on many online services such as Netflix; where data about users activities and preferences is 	collated and analysed to provide a personalised service, for example by suggesting films or television shows the user may enjoy based upon their previous 	viewing history&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;. By enabling companies to generate in-depth profiles of their customers, Big Data 	allows businesses to move past the 'one size fits all' approach to product and services design and instead quickly and cost-effectively adapt their 	services to better meet customer demand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to service personalisation, similar profiling techniques are increasingly being utilized in sectors such as healthcare. Here data about a 	patient's medical history, lifestyle, and even their gene expression patterns are collated, generating a detailed medical profile which can then be used to 	tailor treatments to meet their specific needs&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. Targeted care of this sort can not only help to reduce 	costs for example by helping to avoid over-prescriptions, but may also help to improve the effectiveness of treatments and so ultimately their outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Transparency &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If 'knowledge is power', then, - so say Big Data enthusiasts - advances in data analytics and the quantity of data available can give consumers and 	citizens the knowledge to hold governments and businesses to account, as well as make more informed choices about the products and services they use. 	Nevertheless, data (even lots of it) does not necessarily equal knowledge. In order for citizens and consumers to be able to fully utilize the vast 	quantities of data available to them, they must first have some way to make sense of it. For some, Big Data analytics provides just such a solution, 	allowing users to easily search, compare and analyze available data, thereby helping to challenge existing information asymmetries and make business and 	government more transparent&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the private sector, Big Data enthusiasts have claimed that Big Data holds the potential to ensure complete transparency of supply chains, enabling concerned consumers to trace the source of their products, for example to ensure that they have been sourced ethically	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. Furthermore, Big Data is now making accessible information which was previously unavailable to 	average consumers and challenging companies whose business models rely on the maintenance of information asymmetries.The real-estate industry, for example, 	relies heavily upon its ability to acquire and control proprietary information, such as transaction data as a competitive asset. In recent years, however, 	many online services have allowed consumers to effectively bypass agents, by providing alternative sources of real-estate data and enabling prospective 	buyers and sellers to communicate directly with each other&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;. Therefore, providing consumers with access 	to large quantities of actionable data . Big Data can help to eliminate established information asymmetries, allowing them to make better and more informed 	decisions about the products they buy and the services they enlist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This potential to harness the power of Big Data to improve transparency and accountability can also be seen in the public sector, with many scholars 	suggesting that greater access to government data could help to stem corruption and make politics more accountable. This view was recently endorsed by the 	UN who highlighted the potential uses of Big Data to improve policymaking and accountability in a report published by the Independent Expert Advisory Group 	on the "Data Revolution for Sustainable Development". In the report experts emphasize the potential of what they term the 'data revolution', to help 	achieve sustainable development goals by for example helping civil society groups and individuals to 'develop data literacy and help communities and individuals to generate and use data, to ensure accountability and make better decisions for themselves'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What are the potential harms of Big Data?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Whilst it is often easy to be seduced by the utopian visions of Big Data evangelists, in order to ensure that Big Data can deliver the types of 	far-reaching benefits its proponents promise, it is vital that we are also sensitive to its potential harms. Within the existing literature, discussions 	about the potential harms of Big Data are perhaps understandably dominated by concerns about privacy. Yet as Big Data has begun to play an increasingly 	central role in our daily lives, a broad range of new threats have begun to emerge including issues related to security and scientific epistemology, as 	well as problems of marginalisation, discrimination and transparency; each of which will be discussed separately below.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;By far the biggest concern raised by researchers in relation to Big Data is its risk to privacy. Given that by its very nature Big Data requires extensive 	and unprecedented access to large quantities of data; it is hardly surprising that many of the benefits outlined above in one way or another exist in tension with considerations of privacy. Although many scholars have called for a broader debate on the effects of Big Data on ethical best practice	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a comprehensive exploration into the complex debates surrounding the ethical 	implications of Big Data go far beyond the scope of this article. Instead we will simply attempt to highlight some of the major areas of concern expressed 	in the literature, including its effects on established principles of privacy and the implication of Big Data on the suitability of existing regulatory 	frameworks governing privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Re-identification&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally many Big Data enthusiasts have used de-identification - the process of anonymising data by removing personally identifiable information (PII) 	- as a way of justifying mass collection and use of personal data. By claiming that such measures are sufficient to ensure the privacy of users, data 	brokers, companies and governments have sought to deflect concerns about the privacy implications of Big Data, and suggest that it can be compliant with 	existing regulatory and legal frameworks on data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many scholars remain concerned about the limits of anonymisation. As Tene and Polonetsky observe 'Once data-such as a clickstream or a cookie 	number-are linked to an identified individual, they become difficult to disentangle'&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. They cite the 	example of University of Texas researchers Narayanan and Shmatikov, who were able to successfully re-identify anonymised Netflix user data by cross 	referencing it with data stored in a publicly accessible online database. As Narayanan and Shmatikov themselves explained, 'once any piece of data has been linked to a person's real identity, any association between this data and a virtual identity breaks anonymity of the latter'	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. The quantity and variety of datasets which Big Data analytics has made associable with individuals is 	therefore expanding the scope of the types of data that can be considered PII, as well as undermining claims that de-identification alone is sufficient to 	ensure privacy for users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Privacy Frameworks Obsolete?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent decades privacy and data protection frameworks based upon a number of so-called 'privacy principles' have formed the basis of most attempts to 	encourage greater consideration of privacy issues online&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;. For many however, the emergence of Big Data 	has raised question about the extent to which these 'principles of privacy' are workable in an era of ubiquitous data collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Collection Limitation and Data Minimization&lt;/i&gt; : Big Data by its very nature requires the collection and processing of very large and very diverse data sets. Unlike other forms scientific research and 	analysis which utilize various sampling techniques to identify and target the types of data most useful to the research questions, Big Data instead seeks 	to gather as much data as possible, in order to achieve full resolution of the phenomenon being studied, a task made much easier in recent years as a 	result of the proliferation of internet enabled devices and the growth of the Internet of Things. This goal of attaining comprehensive coverage exists in 	tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data 	collected about an individual to the absolute minimum&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Purpose Limitation:&lt;/i&gt; Since the utility of a given dataset is often not easily identifiable at the time of collection, datasets are increasingly being processed several times 	for a variety of different purposes. Such practices have significant implications for the principle of purpose limitation, which aims to ensure that organizations are open about their reasons for collecting data, and that they use and process the data for no other purpose than those initially specified	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Notice and Consent: &lt;/i&gt; The principles of notice and consent have formed the cornerstones of attempts to protect privacy for decades. Nevertheless in an era of ubiquitous data 	collection, the notion that an individual must be required to provide their explicit consent to allow for the collection and processing of their data seems 	increasingly antiquated, a relic of an age when it was possible to keep track of your personal data relationships and transactions. Today as data streams 	become more complex, some have begun to question suitability of consent as a mechanism to protect privacy. In particular commentators have noted how given 	the complexity of data flows in the digital ecosystem most individuals are not well placed to make truly informed decisions about the management of their 	data&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. In one study, researchers demonstrated how by creating the perceptions of control, users were more likely to share their personal information, regardless of whether or not the users had actually gained control	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. As such, for many, the garnering of consent is increasingly becoming a symbolic box-ticking exercise which achieves little more than to irritate and inconvenience customers whilst providing a burden for companies and a hindrance to growth and innovation	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access and Correction:&lt;/i&gt; The principle of 'access and correction' refers to the rights of individuals to obtain personal information being held about them as well as the right to 	erase, rectify, complete or otherwise amend that data. Aside from the well documented problems with privacy self-management, for many the real-time nature 	of data generation and analysis in an era of Big Data poses a number of structural challenges to this principle of privacy. As x comments, 'a good amount 	of data is not pre-processed in a similar fashion as traditional data warehouses. This creates a number of potential compliance problems such as difficulty 	erasing, retrieving or correcting data. A typical big data system is not built for interactivity, but for batch processing. This also makes the application 	of changes on a (presumably) static data set difficult'&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opt In-Out:&lt;/i&gt; The notion that the provision of data should be a matter of personal choice on the part of the individual and that the individual can, if they chose decide 	to 'opt-out' of data collection, for example by ceasing use of a particular service, is an important component of privacy and data protection frameworks. 	The proliferation of internet-enabled devices, their integration into the built environment and the real-time nature of data collection and analysis 	however are beginning to undermine this concept. For many critics of Big Data the ubiquity of data collection points as well as the compulsory provision of 	data as a prerequisite for the access and use of many key online services is making opting-out of data collection not only impractical but in some cases 	impossible. &lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Chilling Effects"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many scholars the normalization of large scale data collection is steadily producing a widespread perception of ubiquitous surveillance amongst users. 	Drawing upon Foucault's analysis of Jeremy Bentham's panopticon and the disciplinary effects of surveillance, they argue that this perception of permanent visibility can cause users to sub-consciously 'discipline' and self- regulate of their own behavior, fearful of being targeted or identified as 'abnormal'	&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. As a result, the pervasive nature of Big Data risks generating a 'chilling effect' on user behavior 	and free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the notion of "chilling effects" is quite prevalent throughout the academic literature on surveillance and security, the difficulty of quantifying 	the perception and effects of surveillance on online behavior and practices means that there have only been a limited number of empirical studies of this 	phenomena, and none directly related to the chilling effects of Big Data. One study, conducted by researchers at MIT however, sought to assess the impact 	of Edward Snowden's revelations about NSA surveillance programs on Google search trends. Nearly 6,000 participants were asked to individually rate certain 	keywords for their perceived degree of privacy sensitivity along multiple dimensions. Using Google's own publicly available search data, the researchers 	then analyzed search patterns for these terms before and after the Snowden revelations. In doing so they were able to demonstrate a reduction of around 	2.2% in searchers for those terms deemed to be most sensitive in nature. According to the researchers themselves, the results 'suggest that there is a 	chilling effect on search behaviour from government surveillance on the Internet'&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. Although this study focussed on the effects on government surveillance, for many privacy advocates the growing pervasiveness of Big Data risks generating similar results.	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Dignitary Harms of Predictive Decision-Making&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to its potentially chilling effects on free speech, the automated nature of Big Data analytics also possess the potential to inflict so-called 'dignitary harms' on individuals, by revealing insights about themselves that they would have preferred to keep private	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an infamous example, following a shopping trip to the retail chain Target, a young girl began to receive mail at her father's house advertising products 	for babies including, diapers, clothing, and cribs. In response, her father complained to the management of the company, incensed by what he perceived to 	be the company's attempts to "encourage" pregnancy in teens. A few days later however, the father was forced to contact the store again to apologies, after 	his daughter had confessed to him that she was indeed pregnant. It was later revealed that Target regularly analyzed the sale of key products such as 	supplements or unscented lotions in order to generate "pregnancy prediction" scores, which could be used to assess the likelihood that a customer was 	pregnant and to therefore target them with relevant offers&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;. Such cases, though anecdotal illustrate how 	Big Data if not adopted sensitively can lead to potential embarrassing information about users being made public.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Security&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In relation to cybersecurity Big Data can be viewed to a certain extent as a double-edged sword. On the one hand, the unique capabilities of Big Data 	analytics can provide organizations with new and innovative methods of enhancing their cybersecurity systems. On the other however, the sheer quantity and 	diversity of data emanating from a variety of sources creates its own security risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. "Honey-Pot"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger the quantities of confidential information stored by companies on their databases the more attractive those databases may appear to potential 	hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Redundancy and Dispersion&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inherent to Big Data systems is the duplication of data to many locations in order to optimize query processing. Data is dispersed across a wide range of 	data repositories in different servers, in different parts of the world. As a result it may be difficult for organizations to accurately locate and secure 	all items of personal information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Epistemological and Methodological Implications&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2008 Chris Anderson infamously proclaimed the 'end of theory'. Writing for Wired Magazine, Anderson predicted that the coming age of Big Data would create a 'deluge of data' so large that the scientific methods of hypothesis, sampling and testing would be rendered 'obsolete'	&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;. 'There is now a better way' Anderson insisted, 'Petabytes allow us to say: "Correlation is enough." 	We can stop looking for models. We can analyze the data without hypotheses about what it might show. We can throw the numbers into the biggest computing 	clusters the world has ever seen and let statistical algorithms find patterns where science cannot'&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of these bold claims however, many theorists remain skeptical of Big Data's methodological benefits and have expressed concern about its potential 	implications for conventional scientific epistemologies. For them the increased prominence of Big Data analytics in science does not signal a paradigmatic 	transition to a more enlightened data-driven age, but a hollowing out of the scientific method and an abandonment of casual knowledge in favor of shallow 	correlative analysis&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;7. &lt;/i&gt; Obfuscation &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Big Data analytics can be utilized to study almost any phenomena where enough data exists, many theorists have warned that simply because Big Data 	analytics &lt;i&gt;can&lt;/i&gt; be used does not necessarily mean that they &lt;i&gt;should&lt;/i&gt; be used&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;. Bigger is 	not always better and indeed the sheer quantity of data made available to users may in fact act to obscure certain insights. Whereas traditional scientific 	methods use sampling techniques to identify the most important and relevant data, Big Data by contrast encourages the collection and use of as much data as 	possible, in an attempt to attain full resolution of the phenomena being studied. However, not all data is equally useful and simply inputting as much data 	as possible into an algorithm is unlikely to produce accurate results and may instead obscure key insights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, whilst the promise of automation is central to a large part of Big Data's appeal, researchers observe that most Big Data analysis still requires an 	element of human judgement to filter out the 'good' data from the 'bad', and to decide what aspects of the data are relevant to the research objectives. As 	Boyd and Crawford observe, 'in the case of social media data, there is a 'data cleaning' process: making decisions about what attributes and variables will 	be counted, and which will be ignored. This process is inherently subjective"&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google's Flu Trend project provides an illustrative example of how Big Data's tendency to try to maximise data inputs can produce misleading results. 	Designed to accurately track flu outbreaks based upon data collected from Google searches, the project was initially proclaimed to be a great success. 	Gradually however it became apparent that the results being produced were not reflective of the reality on the ground. Later it was discovered that the 	algorithms used by the project to interpret search terms were insufficiently accurate to filter out anomalies in searches, such as those related to the 	2009 H1N1 flu pandemic. As such, despite the great promise of Big Data, scholars insist it remains critical to be mindful of its limitations, remain selective about the types of data included in the analysis and exercise caution and intuition whenever interpreting its results	&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. "Apophenia"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In complete contrast to the problem of obfuscation, Boyd and Crawford observe how Big Data may also lead to the practice of 'apophenia', a phenomena whereby analysts interpret patterns where none exist, 'simply because enormous quantities of data can offer connections that radiate in all directions"	&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. David Leinweber for example demonstrated that data mining techniques could show strong but ultimately spurious correlations between changes in the S&amp;amp;P 500 stock index and butter production in Bangladesh	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;. Such spurious correlation between disparate and unconnected phenomena are a common feature of Big 	Data analytics and risks leading to unfounded conclusions being draw from the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although Leinweber's primary focus of analysis was the use of Data-Mining technologies, his observations are equally applicable to Big Data. Indeed the 	tendency amongst Big Data analysts to marginalise the types of domain specific expertise capable of differentiating between relevant and irrelevant 	correlations in favour of algorithmic automation can in many ways be seen to exacerbate many of the problems Leinweber identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;9. &lt;/i&gt; From Causation to Correlation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Closely related to the problem of Aphonenia is the concern that Big Data's emphasis on correlative analysis risks leading to an abandonment of the pursuit 	of causal knowledge in favour of shallow descriptive accounts of scientific phenomena&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many, Big Data enthusiasts 'correlation is enough', producing inherently meaningful results interpretable by anyone without the need for pre-existing 	theory or hypothesis. Whilst proponents of Big Data claim that such an approach allows them to produce objective knowledge, by cleansing the data of any 	kind of philosophical or ideological commitment, for others by neglecting the knowledge of domain experts, Big Data risks generating a shallow type of 	analysis, since it fails to adequately embed observations within a pre-existing body of knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to an empiricist epistemology and methodological monism is particularly problematic in the context of studies of human behaviour, where 	actions cannot be calculated and anticipated using quantifiable data alone. In such instances, a certain degree of qualitative analysis of social, 	historical and cultural variables may be required in order to make the data meaningful by embedding it within a broader body of knowledge. The abstract and 	intangible nature of these variables requires a great deal of expert knowledge and interpretive skill to comprehend. It is therefore vital that the 	knowledge of domain specific experts is properly utilized to help 'evaluate the inputs, guide the process, and evaluate the end products within the context 	of value and validity'&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, although Big Data can provide unrivalled accounts of "what" people do, it fundamentally fails to deliver robust explanations of "why" people do 	it. This problem is especially critical in the case of public policy-making since without any indication of the motivations of individuals, policy-makers 	can have no basis upon which to intervene to incentivise more positive outcomes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Digital Divides and Marginalisation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today data is a highly valuable commodity. The market for data in and of itself has been steadily growing in recent years with the business models of many 	online services now formulated around the strategy of harvesting data from users&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	As with the commodification of anything however, inequalities can easily emerge between the haves and have not's. Whilst the quantity of data currently 	generated on a daily basis is many times greater than at any other point in human history, the vast majority of this data is owned and tightly controlled 	by a very small number of technology companies and data brokers. Although in some instances limited access to data may be granted to university researchers 	or to those willing and able to pay a fee, in many cases data remains jealously guarded by data brokers, who view it as an important competitive asset. As 	a result these data brokers and companies risk becoming the gatekeepers of the Big Data revolution, adjudicating not only over who can benefit from Big 	Data, but also in what context and under what terms. For many such inconsistencies and inequalities in access to data raises serious doubts about just how 	widely distributed the benefits of Big Data will be. Others go even further claiming that far from helping to alleviate inequalities, the advent of Big Data risks exacerbating already significant digital divides that exist as well as creating new ones	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. Anti-Competitive Practices&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result of the reluctance of large companies to share their data, there increasingly exists a divide in access between small start-ups companies and 	their larger and more established competitors. Thus, new entrants to the marketplace may be at a competitive disadvantage in relation to large and well 	established enterprises, being as they are unable to harness the analytical power of the vast quantities of data available to large companies by virtue of 	their privileged market position. Since the performance of many online services are today often intimately connected with the collation and use of users 	data, some researchers have suggested that this inequity in access to data could lead to a reduction in competition in the online marketplace, and 	ultimately therefore to less innovation and choice for consumers&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result researchers including Nathan Newman of New York University have called for a reassessment and reorientation of anti-trust investigations and 	regulatory approaches more generally to 'to focus on how control of personal data by corporations can entrench monopoly power and harm consumer welfare in 	an economy shaped increasingly by the power of "big data"'&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;. Similarly a report produced by the European 	Data Protection Supervisor concluded that, 'The scope for abuse of market dominance and harm to the consumer through refusal of access to personal information and opaque or misleading privacy policies may justify a new concept of consumer harm for competition enforcement in digital economy'	&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Research&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a research perspective barriers to access to data caused by proprietary control of datasets are problematic, since certain types of research could 	become restricted to those privileged enough to be granted access to data. Meanwhile those denied access are left not only incapable of conducting similar 	research projects, but also unable to test, verify or reproduce the findings of those who do. The existence of such gatekeepers may also lead to reluctance 	on the part of researchers to undertake research critical of the companies, upon whom they rely for access, leading to a chilling effect on the types of 	research conducted&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Inequality&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst bold claims are regularly made about the potential of Big Data to deliver economic development and generate new innovations, some critics of remain concerned about how equally the benefits of Big Data will be distributed and the effects this could have on already established digital divides	&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, whilst the power of Big Data is already being utilized effectively by most economically developed nations, the same cannot necessarily be said for 	many developing countries. A combination of lower levels of connectivity, poor information infrastructure, underinvestment in information technologies and 	a lack of skills and trained personnel make it far more difficult for the developing world to fully reap the rewards of Big Data. As a consequence the Big 	Data revolution risks deepening global economic inequality as developing countries find themselves unable to compete with data rich nations whose 	governments can more easily exploit the vast quantities of information generated by their technically literate and connected citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, to the extent that the Big Data analytics is playing a greater role in public policy-making, the capacity of individuals to generate large 	quantities of data, could potentially impact upon the extent to which they can provide inputs into the policy-making process. In a country such as India 	for example, where there exist high levels of inequality in access to information and communication technologies and the internet, there remain large 	discrepancies in the quantities of data produced by individuals. As a result there is a risk that those who lack access to the means of producing data will be disenfranchised, as policy-making processes become configured to accommodate the needs and interests of a privilege minority	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Discrimination&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;13. Injudicious or Discriminatory Outcomes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big Data presents the opportunity for governments, businesses and individuals to make better, more informed decisions at a much faster pace. Whilst this 	can evidently provide innumerable opportunities to increase efficiency and mitigate risk, by removing human intervention and oversight from the 	decision-making process Big Data analysts run the risk of becoming blind to unfair or injudicious results generated by skewed or discriminatory programming 	of the algorithms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There currently exists a large number of automated decision-making algorithms in operation across a broad range of sectors including most notably perhaps 	those used to asses an individual's suitability for insurance or credit. In either of these cases faults in the programming or discriminatory assessment 	criteria can have potentially damaging implications for the individual, who may as a result be unable to attain credit or insurance. This concern with the 	potentially discriminatory aspects of Big Data is prevalent throughout the literature and real life examples have been identified by researchers in a large 	number of major sectors in which Big Data is currently being used&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yu for instance, cites the case of the insurance company Progressive, which required its customers to install 'Snapsnot' - a small monitoring device - into 	their cars in order to receive their best rates. The device tracked and reported the customers driving habits, and offered discounts to those drivers who 	drove infrequently, broke smoothly, and avoided driving at night - behaviors that correlate with a lower risk of future accidents. Although this form of 	price differentiation provided incentives for customers to drive more carefully, it also had the unintended consequence of unfairly penalizing late-night 	shift workers. As Yu observes, 'for late night shift-workers, who are disproportionately poorer and from minority groups, this differential pricing 	provides no benefit at all. It categorizes them as similar to late-night party-goers, forcing them to carry more of the cost of the intoxicated and other 	irresponsible driving that happens disproportionately at night'&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another example, it is noted how Big Data is increasingly being used to evaluate applicants for entry-level service jobs. One method of evaluating 	applicants is by the length of their commute - the rationale being that employees with shorter commutes are statistically more likely to remain in the job 	longer. However, since most service jobs are typically located in town centers and since poorer neighborhoods tend to be those on the outskirts of town, 	such criteria can have the effect of unfairly disadvantaging those living in economically deprived areas. Consequently such metrics of evaluation can 	therefore also unintentionally act to reinforce existing social inequalities by making it more difficult for economically disadvantaged communities to work 	their way out of poverty&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. Lack of Algorithmic Transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If data is indeed the 'oil of the 21&lt;sup&gt;st&lt;/sup&gt; century'&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt; then algorithms are very much the engines 	which are driving innovation and economic development. For many companies the quality of their algorithms is often a crucial factor in providing them with 	a market advantage over their competitor. Given their importance, the secrets behind the programming of algorithms are often closely guarded by companies, 	and are typically classified as trade secrets and as such are protected by intellectual property rights. Whilst companies may claim that such secrecy is 	necessary to encourage market competition and innovation, many scholars are becoming increasingly concerned about the lack of transparency surrounding the 	design of these most crucial tools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular there is a growing sentiment common amongst many researchers that there currently exists a chronic lack of accountability and transparency in terms of how Big Data algorithms are programmed and what criteria are used to determine outcomes	&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. As Frank Pasquale observed,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;'&lt;/i&gt; &lt;i&gt; hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and 		complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal 		disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by 		legal and real secrecy'&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;b&gt;[62]&lt;/b&gt;&lt;/a&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As such, without increased transparency in algorithmic design, instances of Big Data discrimination may go unnoticed as analyst are unable to access the 	information necessary to identify them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Today Big Data presents us with as many challenges as it does benefits. Whilst Big Data analytics can offer incredible opportunities to reduce 	inefficiency, improve decision-making, and increase transparency, concerns remain about the effects of these new technologies on issues such as privacy, 	equality and discrimination. Although the tensions between the competing demands of Big Data advocates and their critics may appear irreconcilable; only by 	highlighting these points of contestation can we hope to begin to ask the types of important and difficult questions necessary to do so, including; how can 	we reconcile Big Data's need for massive inputs of personal information with core principles of privacy such as data minimization and collection 	limitation? What processes and procedures need to be put in place during the design and implementation of Big Data models and algorithms to provide 	sufficient transparency and accountability so as to avoid instances of discrimination? What measures can be used to help close digital divides and ensure 	that the benefits of Big Data are shared equitably? Questions such as these are today only just beginning to be addressed; each however, will require 	careful consideration and reasoned debate, if Big Data is to deliver on its promises and truly fulfil its 'revolutionary' potential.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Gantz, J., &amp;amp;Reinsel, D. Extracting Value from Chaos, &lt;i&gt;IDC, &lt;/i&gt;(2011), available at: 			&lt;a href="http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf"&gt; http://www.emc.com/collateral/analyst-reports/idc-extracting-value-from-chaos-ar.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, &lt;i&gt;Kleiner Perkins Caulfield Byers,&lt;/i&gt; (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Douglas, L&lt;i&gt;. &lt;/i&gt; &lt;a href="http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf"&gt; &lt;i&gt;"3D Data Management: Controlling Data Volume, Velocity and Variety"&lt;/i&gt; &lt;/a&gt; &lt;i&gt; . Gartner, &lt;/i&gt; (2001)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;, 			Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Joh. E, 'Policing by Numbers: Big Data and the Fourth Amendment', &lt;i&gt;Washington Law Review, Vol. 85: 35, &lt;/i&gt;(2014) 			&lt;a href="https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1"&gt; https://digital.law.washington.edu/dspace-law/bitstream/handle/1773.1/1319/89WLR0035.pdf?sequence=1 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Anderson, R., &amp;amp; Roberts, D. 'Big Data: Strategic Risks and Opportunities, &lt;i&gt;Crowe Horwarth Global Risk Consulting Limited&lt;/i&gt;, (2012) 			&lt;a href="https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf"&gt; https://www.crowehorwath.net/uploadedfiles/crowe-horwath-global/tabbed_content/big%20data%20strategic%20risks%20and%20opportunities%20white%20paper_risk13905.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt; (2014)&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics&lt;i&gt;, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239&lt;/i&gt; (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Cisco, 'IoE-Driven Smart Street Lighting Project Allows Oslo to Reduce Costs, Save Energy, Provide Better Service', Cisco, (2014) Available at: 			&lt;a href="http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf"&gt; http://www.cisco.com/c/dam/m/en_us/ioe/public_sector/pdfs/jurisdictions/Oslo_Jurisdiction_Profile_051214REV.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Newell, B, C. Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information. &lt;i&gt;University of Washington - the Information School&lt;/i&gt;, (2013)			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2341182&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Morris, D. Big data could improve supply chain efficiency-if companies would let it&lt;i&gt;, Fortune, August 5 &lt;/i&gt;2015, 			http://fortune.com/2015/08/05/big-data-supply-chain/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Davenport, T., Barth., Bean, R. How is Big Data Different, &lt;i&gt;MITSloan Management Review, Fall &lt;/i&gt;(2012), Available at,			&lt;a href="http://sloanreview.mit.edu/article/how-big-data-is-different/"&gt;http://sloanreview.mit.edu/article/how-big-data-is-different/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Tucker, Darren S., &amp;amp; Wellford, Hill B., Big Mistakes Regarding Big Data, Antitrust Source, American Bar Association, (2014). Available at SSRN: 			http://ssrn.com/abstract=2549044&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Raghupathi, W., &amp;amp;Raghupathi, V. &lt;a href="http://www.hissjournal.com/content/2/1/3"&gt;Big data analytics in healthcare: promise and potential&lt;/a&gt;.			&lt;i&gt;Health Information Science and Systems&lt;/i&gt;, (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Brown, B., Chui, M., Manyika, J. 'Are you Ready for the Era of Big Data?', &lt;i&gt;McKinsey Quarterly,&lt;/i&gt; (2011), Available at, 			&lt;a href="http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf"&gt; http://www.t-systems.com/solutions/download-mckinsey-quarterly-/1148544_1/blobBinary/Study-McKinsey-Big-data.pdf &lt;/a&gt; ; Benady, D., 'Radical transparency will be unlocked by technology and big data', &lt;i&gt;Guardian &lt;/i&gt;(2014) Available at: 			&lt;a href="http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data"&gt; http://www.theguardian.com/sustainable-business/radical-transparency-unlocked-technology-big-data &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; United Nations, A World That Counts: Mobilising the Data Revolution for Sustainable Development, 			&lt;i&gt; Report prepared at the request of the United Nations Secretary-General,by the Independent Expert Advisory Group on a Data Revolutionfor 				Sustainable Development. &lt;/i&gt; (2014), pg. 18, see also, Hilbert, M. Big Data for Development: From Information- to Knowledge Societies (2013). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2205145"&gt;http://ssrn.com/abstract=2205145&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Greenleaf, G. Abandon All Hope? &lt;i&gt;Foreword for Issue 37(2) of the UNSW Law Journal on 'Communications Surveillance, Big Data, and the Law'&lt;/i&gt; ,(2014) &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2490425##&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt; Vol. 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Tene, O., &amp;amp;Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics, 11 Nw. J. Tech. &amp;amp;Intell. Prop. 239 (2013)			&lt;a href="http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1"&gt;http://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Narayanan and Shmatikov quoted in Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, The Organization for Economic Co-Operation and Development, 			(1999); The European Parliament and the Council of the European Union, EU Data Protection Directive, "Directive 95/46/EC of the European Parliament 			and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of 			such data," (1995)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Article 29 Working Group., Opinion 03/2013 on purpose limitation, &lt;i&gt;Article 29 Data Protection Working Party, &lt;/i&gt;(2013) available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Solove, D, J. Privacy Self-Management and the Consent Dilemma, 126 Harv. L. Rev. 1880 (2013), Available at: 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Brandimarte, L., Acquisti, A., &amp;amp; Loewenstein, G., Misplaced Confidences:&lt;/p&gt;
&lt;p&gt;Privacy and the Control Paradox,			&lt;i&gt;Ninth Annual Workshop on the Economics of Information Security (WEIS) June 7-8 2010, Harvard University, Cambridge, MA, &lt;/i&gt;(2010), available 			at: 			&lt;a href="https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf"&gt; https://fpf.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Solove, D, J., Privacy Self-Management and the Consent Dilemma, &lt;i&gt;126 Harv. L. Rev. 1880&lt;/i&gt; (2013), Available at: 			http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Yu, W, E., Data., Privacy and Big Data-Compliance Issues and Considerations, &lt;i&gt;ISACA Journal, Vol. 3 2014 &lt;/i&gt;(2014), available at: 			&lt;a href="http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx"&gt; http://www.isaca.org/Journal/archives/2014/Volume-3/Pages/Data-Privacy-and-Big-Data-Compliance-Issues-and-Considerations.aspx &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ramirez, E., Brill, J., Ohlhausen, M., Wright, J., &amp;amp; McSweeny, T., Data Brokers: A Call for Transparency and Accountability,			&lt;i&gt;Federal Trade Commission&lt;/i&gt; (2014) 			https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Michel Foucault, Discipline and Punish: The Birth of the Prison. Translated by Alan Sheridan, &lt;i&gt;London: Allen Lane, Penguin,&lt;/i&gt; (1977)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Marthews, A., &amp;amp; Tucker, C., Government Surveillance and Internet Search Behavior (2015), available at SSRN: http://ssrn.com/abstract=2412564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon', Information, 			Communication &amp;amp; Society, Vol. 15, Issue 5, (2012)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Hirsch, D., That's Unfair! Or is it? Big Data, Discrimination and the FTC's Unfairness Authority, &lt;i&gt;Kentucky Law Journal, Vol. 103&lt;/i&gt;, 			available at: 			&lt;a href="http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf"&gt; http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Hill, K., How Target Figured Out A Teen Girl Was Pregnant Before Her Father 			Didhttp://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Anderson, C (2008) "The End of Theory: The Data Deluge Makes the Scientific Method Obsolete", WIRED, June 23 2008, www.wired.com/2008/06/pb-theory/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Kitchen, R (2014) Big Data, new epistemologies and paradigm shifts, Big Data &amp;amp; Society, April-June 2014: 1-12&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Lazer, D., Kennedy, R., King, G., &amp;amp;Vespignani, A. " 			&lt;a href="http://gking.harvard.edu/publications/parable-Google-Flu%c2%a0Traps-Big-Data-Analysis"&gt; The Parable of Google Flu: Traps in Big Data Analysis &lt;/a&gt; ." &lt;i&gt;Science 343&lt;/i&gt; (2014): 1203-1205. Copy at &lt;a href="http://j.mp/1ii4ETo"&gt;http://j.mp/1ii4ETo&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Leinweber, D. (2007) 'Stupid data miner tricks: overfitting the S&amp;amp;P 500', The Journal of Investing, vol. 16, no. 1, pp. 15-22.			&lt;a href="http://m.shookrun.com/documents/stupidmining.pdf"&gt;http://m.shookrun.com/documents/stupidmining.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for big data. Information, Communication and Society 15(5): 662-679&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; McCue, C., Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, &lt;i&gt;Butterworth-Heinemann,&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; De Zwart, M. J., Humphreys, S., &amp;amp; Van Dissel, B. Surveillance, big data and democracy: lessons for Australia from the US and UK.			&lt;i&gt;Http://www.unswlawjournal.unsw.edu.au/issue/volume-37-No-2&lt;/i&gt;. (2014) Retrieved from 			https://digital.library.adelaide.edu.au/dspace/handle/2440/90048&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;; 			Newman, N., Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401 &lt;/i&gt;(2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Newman, N., The Cost of Lost Privacy: Search, Antitrust and the Economics of the Control of User Data (2013). Available at SSRN: 			http://ssrn.com/abstract=2265026, Newman, N. ,Search, Antitrust and the Economics of the Control of User Data, &lt;i&gt;31 YALE J. ON REG. 401&lt;/i&gt; (2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Ibid.,&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; European Data Protection Supervisor, Privacy and competitiveness in the age of big data:&lt;/p&gt;
&lt;p&gt;The interplay between data protection, competition law and consumer protection in the Digital Economy, (2014), available at: 			&lt;a href="https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf"&gt; https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Boyd, D., and Crawford, K. 'Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon'&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Information, Communication &amp;amp; Society,&lt;/i&gt;Vol 15, Issue 5, (2012)			&lt;a href="http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878"&gt;http://www.tandfonline.com/doi/abs/10.1080/1369118X.2012.678878&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Schradie, J., Big Data Not Big Enough? How the Digital Divide Leaves People Out, MediaShift, 31 July 2013, (2013), available at: 			&lt;a href="http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/"&gt; http://mediashift.org/2013/07/big-data-not-big-enough-how-digital-divide-leaves-people-out/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Crawford, K., The Hidden Biases in Big Data, &lt;i&gt;Harvard Business Review, 1 April 2013 &lt;/i&gt;(2013), available at:			&lt;a href="https://hbr.org/2013/04/the-hidden-biases-in-big-data"&gt;https://hbr.org/2013/04/the-hidden-biases-in-big-data&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Robinson, D., Yu, H., Civil Rights, Big Data, and Our Algorithmic Future, (2014)			&lt;a href="http://bigdata.fairness.io/introduction/"&gt;http://bigdata.fairness.io/introduction/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Rotellla, P., Is Data The New Oil? Forbes, 2 April 2012, (2012), available at: 			&lt;a href="http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/"&gt; http://www.forbes.com/sites/perryrotella/2012/04/02/is-data-the-new-oil/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Barocas, S., &amp;amp;Selbst, A, D., Big Data's Disparate Impact,&lt;i&gt;California Law Review, Vol. 104, &lt;/i&gt;(2015). Available at SSRN:			&lt;a href="http://ssrn.com/abstract=2477899" target="_blank"&gt;http://ssrn.com/abstract=2477899&lt;/a&gt;; Kshetri. N, 'The Emerging role of Big Data in Key development issues: Opportunities, challenges, and concerns'. &lt;i&gt;Big Data &amp;amp; Society&lt;/i&gt;(2014)			&lt;a href="http://bds.sagepub.com/content/1/2/2053951714564227.abstract"&gt;http://bds.sagepub.com/content/1/2/2053951714564227.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Pasquale, F., The Black Box Society: The Secret Algorithms That Control Money and Information, Harvard University Press , (2015)&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data'&gt;https://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2015-12-30T02:48:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics">
    <title>Start-up India turns the heat on Facebook Free Basics</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics</link>
    <description>
        &lt;b&gt;Facebook launched its "Save Free Basics" campaign last week, asking users to support "digital equality" in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anita Babu was published in &lt;a class="external-link" href="http://www.business-standard.com/article/companies/start-up-india-turns-the-heat-on-facebook-free-basics-115122300056_1.html"&gt;Business Standard&lt;/a&gt; on December 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Nearly a week after Facebook launched its  controversial "Save Free Basics" campaign in India, the net neutrality  debate has come to the fore again. This time around, India's star  internet entrepreneurs such as Vijay Shekhar Sharma, founder and chief  executive of Paytm, and Dippak Khurana of Vserv have joined the crusade  for free internet.&lt;br /&gt; &lt;br /&gt; "Oh my fellow Indians, either choose this and do a jihad for independent  internet later or pick net neutrality today," Sharma of Paytm, India's  largest digital wallet, tweeted on Tuesday. "Digital world war heads! We  have to load &lt;a href="http://www.savetheinternet.in%20for%20#NetNeutrality" target="_blank"&gt;http://www.savetheinternet.in for #NetNeutrality&lt;/a&gt;,"  said Sharma in another tweet. Savetheinternet.in, a volunteer group,  has urged people to lend their support for an unfettered internet in  India.&lt;br /&gt; &lt;br /&gt; Facebook launched its "Save Free Basics" campaign last week, asking  users to support "digital equality" in India, in response to a paper by  the telecom regulator which is seeking comments on differential pricing  practices like Airtel Zero of Facebook's Free Basics, which was earlier  called Internet.org.&lt;br /&gt; &lt;br /&gt; Facebook launched a print and digital media campaign for a "connected  India" asking users to give a missed call, automatically sending a  message to the regulator in support of Free Basics.&lt;br /&gt; &lt;br /&gt; Facebook has also been asking its users to send an e-mail to Telecom  Regulatory Authority of India (TRAI) supporting "essential internet for  all". The social network claims to have gained support from 3.2 million  of its 130 million users in India.&lt;br /&gt; &lt;br /&gt; On Tuesday, the social media giant earned flak for soliciting support  from international users for the campaign. Later, Facebook withdrew the  campaign outside India claiming it was an "accident".&lt;br /&gt; &lt;br /&gt; However, some net neutrality volunteers said that many of Facebook's 3.2 million supporters for Free Basics were non-Indians.&lt;br /&gt; &lt;br /&gt; Activists and tech leaders are calling the Facebook campaign "misleading" and "destructive".&lt;br /&gt; &lt;br /&gt; "People are being tricked into supporting Free Basics under the guise of  digital equality," wrote Amol Malviya, former chief technology officer  at Flipkart, India's largest e-commerce firm, on his blog. "Notice the  language on the page? It makes any critic of Free Basics appear to be an  enemy of digital equality. People will listen to the critics' arguments  much lesser when there's a question mark on their intent."&lt;br /&gt; &lt;br /&gt; Nikhil Pahwa, editor and publisher of MediaNama, said India should  question the intent of Facebook and its campaign. "There is  misrepresentation in the language they have used. It makes people assume  that we can't have universal internet access without net-neutrality  violating services such as Free Basics. It is important for a country to  take note of how much power a platform with as much reach as Facebook  has to influence an important government process," said Pahwa, who led a  fight against TRAI's move to allow telecom firms charge for internet  services like WhatsApp and Hike.&lt;br /&gt; &lt;br /&gt; The basic premise of net neutrality is that of freedom - an open  internet that protects and enables free communication. Anything that  takes away this freedom violates the fundamentals of free Internet.  "Facebook's Free Basics is neither free nor basic - it is a cleverly  disguised way of walling a garden, and hardly the philanthropic  initiative that it is marketed to be," said Khurana of Vserv. He urged  internet users to uninstall the Facebook App from their mobile phones in  protest.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash, policy director at the Centre for Internet and Society,  said, "Facebook, a foreign company, is allowed to campaign with  impunity, but NGOs receiving funding from foreign trusts are subject to  all manners of restrictions and may not campaign in India." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics'&gt;https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-29T15:54:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul">
    <title>Facebook goes out all guns blazing in push for Free Basics, Net neutrality advocates cry foul</title>
    <link>https://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul</link>
    <description>
        &lt;b&gt;Facebook's media onslaught to garner support for its controversial Free Basics program is almost inescapable. Multi-page ads in national dailies, outdoor hoardings, television spots and perhaps the most effective of them all - Facebook notifications. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="http://www.ibnlive.com/news/tech/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul-1183046.html?utm_source=IBN%20News"&gt;IBN Live&lt;/a&gt; on December 29, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Facebook co-founder and CEO Mark Zuckerberg, took out time during his paternity leave to pen an op-ed in &lt;i&gt;The Times of India&lt;/i&gt; in which he tried to drum up support for the Free Basics service that  offers people without the Internet free access to a handful of websites  through mobile phones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If we accept that everyone deserves access to the Internet, then we  must surely support free basic Internet services," Zuckerberg wrote,  comparing the Internet to a library, public health care and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg said he was surprised that there is such a big debate around Free Basics in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  debate on Net neutrality stirred across India after Airtel decided to  charge separately for Internet-based calls but withdrew it later after  people protested. Internet activists and experts flayed the operator for  'Airtel Zero' service along with Facebook's Internet.org service, later  renamed as 'Free Basics.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality implies that equal treatment be accorded to all  Internet traffic and no priority be given to an entity or company based  on payment to content or service providers such as telecom companies,  which is seen as discriminatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg's personal appeal  comes amid fierce criticism from Net neutrality activists who say Free  Basics violates the principle that the whole Internet should be  available to all and unrestricted by any one company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an op-ed response in &lt;i&gt;The Times of India&lt;/i&gt; by Medianama's Nikhil Pahwa, who is also a volunteer with  savetheinternet.in that is spearheading the campaign for Net neutrality  and against Free Basics, asked why Facebook didn't opt for an option  that doesn't violate Net neutrality and "why has Facebook chosen the  current model for Free Basics, which gives users a selection of around a  hundred sites (including a personal blog and a real estate company  homepage), while rejecting the option of giving the poor free access to  the open, plural and diverse web?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countries like the US, Chile, Netherlands and Brazil have already  adopted Net Neutrality that doesn't allow discrimination of Internet  content or charge users differently based on the content, site, or  platform they consume, the debate is still raging in India with the last  date for comments on a paper floated by the Telecom Regulatory  Authority of India (TRAI) that is open for comments till December 30 and  counter comments till January 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook is using the might of  its about 140 million user base in India urging them to send messages to  TRAI supporting Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few companies such as Truecaller  is attempting to counter Facebook's push by sending out messages to its  millions of users in India asking them to petition TRAI against  Facebook's Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month the TRAI ordered  Reliance Communications, the sole mobile operator for the Free Basics in  India, to suspend it temporarily.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy  director at Centre for Internet and Society, believes that Free Basics  isn't exactly the evil that opponents picture it as. "In the absence of  free Internet, Free Basics is a great enabler of freedom of speech. We  ought to keep that in mind when asking for a ban," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, Facebook's Internet.org vice president Chris Daniels, in a  Reddit AMA said that Facebook was open to scrutiny of the process by  any third party agency like IAMAI or NASSCOM and "We'd also be happy to  have Twitter, Google+, etc on the platform which many people have asked  for."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier, in July this year the Department of Telecom panel  on net neutrality has opposed projects like Facebook's Internet.org,  which allow access to certain websites without mobile data charges,  while suggesting that similar plans such as Airtel Zero be allowed with  prior clearance from TRAI.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul'&gt;https://cis-india.org/internet-governance/news/facebook-goes-out-all-guns-blazing-in-push-for-free-basics-net-neutrality-advocates-cry-foul&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-29T15:32:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation">
    <title>Second Regional Conference on Connectivity for All: Future Technologies, Markets and Regulation</title>
    <link>https://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation</link>
    <description>
        &lt;b&gt;This conference organized by the International Telecommunications Society, IIMA IDEA Telecom Centre of Excellence and Indian Institute of Management, Ahmedabad was held in New Delhi from December 13 to 15, 2015. Sunil Abraham was a panelist in the session "Going beyond Cybersecurity: Internet Governance Issues".&lt;/b&gt;
        &lt;p align="justify" class="p0"&gt;Click to read the conference details published by International Telecommunications Society &lt;a class="external-link" href="http://www.itsindia2015.com/"&gt;here&lt;/a&gt;. Download the Agenda &lt;a href="https://cis-india.org/telecom/blog/second-regional-conference-on-connectivity-for-all" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="justify" class="p0"&gt;The wide  availability of Internet/broadband has been a significant driver of  economic growth especially in developed countries. On the contrary,  emerging economies lag far behind in Internet/broadband penetration even  in urban areas. Further, as emerging economies have poor infrastructure  as well as physical service deployment platforms, higher penetration of  Internet/broadband could serve as an effective platform for social  programmes' delivery. However, the increasing gap in penetration, speed  and adoption of Internet/broadband between developed and emerging  economies is likely to reduce the ability of the latter to participate  in an equitable way in the global knowledge and service economy. As the  gap increases, the ability of emerging economies to bridge the digital  divide becomes more significantly daunting and is a major cause of  concern for policymakers.&lt;/p&gt;
&lt;p align="justify" class="p0"&gt;The  challenges for connectivity in the developed and emerging economies are  diverse. While developed countries face issues in providing higher  speeds, bandwidth and connectivity among devices to large parts of their  population who have basic Internet/broadband, emerging economies still  struggle for establishing universal access and providing basic  Internet/broadband to their citizens. Even where Internet/broadband is  available, adoption may not be adequate especially in the rural and  remote areas.&lt;/p&gt;
&lt;p&gt;The wired  infrastructure in emerging economies is poor, however, the mobile phones  are ubiquitous. Therefore, mobile Internet/broadband could be an  effective way for increasing Internet/broadband penetration.  Technological and regulatory changes, especially those related to  spectrum, are necessary to leverage these opportunities.&lt;/p&gt;
&lt;p align="justify" class="p0"&gt;A related aspect  of growth in Internet/broadband is the increasing role of Internet  governance frameworks at national, regional and international levels.  The challenge for nations is how to leverage this framework for growth  of Internet/broadband and play a greater role in Internet governance.&lt;/p&gt;
&lt;p align="justify" class="p0"&gt;A multi-pronged  approach is required to address these diverse issues. A supportive  environment for policy, regulatory and technology development is  required. This conference provides a platform for dialogue between  researchers, industry practitioners, government and regulatory bodies to  search for collaborative solutions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation'&gt;https://cis-india.org/telecom/news/second-regional-conference-on-connectivity-for-all-future-technologies-markets-and-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-27T16:16:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa">
    <title>A Scam Masquerading as Santa</title>
    <link>https://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa</link>
    <description>
        &lt;b&gt;Christmas is here and social media is abuzz with celebrations of its spirit. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by &lt;span class="byline"&gt;Apurva Venkat &amp;amp; Vandana Kamath was &lt;a class="external-link" href="http://www.bangaloremirror.com/bangalore/others/A-scam-masquerading-as-Santa/articleshow/50316841.cms"&gt;published in Bangalore Mirror&lt;/a&gt; on December 25, 2015. Sunil Abraham gave inputs.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Lurking in the dark though, is an online scam that has been turning  expectations of those participating in it into heartache. Secret Santa, a  gift exchange programme, has lured many people into its fold. The  exchange programme invites people to join a chain of gift givers (and  hopeful receivers) through social media platforms like Facebook,  Instagram and Twitter. The promised deal is that every person in the  chain stands to get 36 gifts against one that they make.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person interested in being part of the chain, has to post their  agreement on their wall, and invite six more participants. The scheme  encourages the person to send a gift valued below Rs 600 to a person  whose name and address is at the top of a long list of participants that  is sent as a private message. Once they have made the gift, they remove  the name of the person in first place, and replace it with the person  in the second place. The new recruit then puts their name in the second  place of the list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media experts call it as nothing but a pyramid scheme scam. While  this has gone viral in the city only recently, the UK and USA  governments have already warned their citizens against falling prey to  such scams and termed them illegal. While most victims of the scam are  sending books as gifts to strangers, there are others who have been  gifting cosmetics, chocolates or Christmas gift packs. Of course, most  are doing it in the hope of getting back similar gifts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chaitanya KM, Kannada film director, who sent a book as a gift under the  scheme, told Bangalore Mirror, "I sent one book and seven people have  asked me for my address but I have not received anything in return. I  haven't heard about this scam but I do not mind gifting a book anyways  without getting anything in return." Some hope that Secret Santa will  work as an eye opener for city social media users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Centre for Internet and Society,  said, "This seems to be a rumour to which many are falling prey. This  will work like net-user education, and people will get wiser after they  are cheated. Some form of awareness needs to be done because at least  two per cent of people will respond to this."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Facebook bars it&lt;br /&gt;&lt;/b&gt;According to Facebook rules, multi-level marketing on the platform is  prohibited. The Facebook agreement terms state that engaging in things  like pyramid schemes is not allowed. Also posting personal details on  Facebook makes one vulnerable to many more identity fraud that can  follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;IT'S MATHEMATICALLY IMPOSSIBLE&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Not only are pyramid schemes like this one mathematically  impossible, they're also against Facebook's terms of use. The list of  theoretical participants multiplies into millions of people in just a  few steps of Secret Santa.&lt;/i&gt; &lt;i&gt;The idea sounds feasible but it is  not. Going from step one it starts with six people, who each invite six  more, who all send gifts to the person in the number one spot before  they're moved off the list.&lt;/i&gt; &lt;i&gt;However, as it spreads, the number  of people involved increases far more than would ever take part — if the  36 each invite six people then the total number of participants is 216  going on to 1,296 and so on. &lt;/i&gt; &lt;i&gt;Only those who start the schemes  or enter in the second round stand a chance of receiving something in  return and even in that case it is just one gift not 36 as the post  claims. Those who join later never ever reach the top of the list.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa'&gt;https://cis-india.org/internet-governance/news/a-scam-masquerading-as-santa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-26T01:23:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them">
    <title>Facebook Shares 10 Key Facts about Free Basics. Here's What's Wrong with All 10 of Them.</title>
    <link>https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them</link>
    <description>
        &lt;b&gt;Shweta Sengar of Catch News spoke to Sunil Abraham about the recent advertisement by Facebook titled "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics". Sunil argued against the validity of all the 'top 10 facts'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Facebook has rebranded internet.org as Free Basics. After suffering from several harsh blows from the net neutrality activists in India, the social media behemoth is positioning a movement in order to capture user attention.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from a mammoth two page advertisement on Free Basics on 23 December in a leading English daily, we spotted a numerous hoardings across the capital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Unlike Facebook, Wikipedia has a rather upfront approach for raising funds. You must have noticed a pop-up as you open Wikipedia when they are in need of funds. What Facebook has done is branded Free Basics as 'free' as the basic needs of life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The newspaper advertisement by Facebook was aimed at clearing all the doubts about Free Basics. The 10 facts highlighted a connected India and urging users to take the "first step towards digital equality."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In an interview with &lt;em&gt;Catch&lt;/em&gt;, Sunil Abraham, Executive Director of Bangalore based research organisation, the Centre for Internet and Society, shared his thoughts on the controversial subject. Abraham countered each of Facebook's ten arguments. Take a look:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;01&lt;/strong&gt; Free basics is open to any carriers. Any mobile operator can join us in  connecting India.&lt;/blockquote&gt;
&lt;p&gt;Sunil Abraham: Free Basics was initially exclusive to only one telecom operator in most markets that it was available in.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The non-exclusivity was introduced only after activists in India complained. But now the arrangement is exclusive to Free Basics as a walled garden provider. But discrimination harms remain until other Internet services can also have what Facebook has from telecom operators ie. free access to their destinations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;02&lt;/strong&gt; We do not charge anyone anything for Free Basics. Period.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As Bruce Schneier says "surveillance is the business model of the Internet". Free basics users are subject to an additional layer of surveillance ie. the data retention by the Facebook proxy server. Just as Facebook cannot say that they are ignoring Data Protection law because Facebook is a free product - they cannot say that Free Basics can violate network neutrality law because it is a free service. For ex. Flipkart should get Flipkart Basic on all Indian ISPs and Telcos.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;03&lt;/strong&gt; We do not pay for the data consumed in Free Basics. Operators participate  because the program has proven to bring more people online. Free Basics has brought new people onto mobile networks on average over 50% faster since launching the service.&lt;/blockquote&gt;
&lt;p&gt;SA: Facebook has been quoting statistics as evidence to influence the policy formulation process. But we need the absolute numbers and we also need them to be independently verifiable. At the very least we need the means to cross verify these numbers with numbers that telcos and ISPs routinely submit to TRAI.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Theoretical harms must be addressed through net neutrality regulation. For example, you don't have to build a single, centralised database of all Indian citizens to know that it can be compromised - from a security design perspective centralisation is always a bad idea. Gatekeeping powers given to any powerful entity will be compromised. While evidence is useful, regulation can already begin based on well established regulatory principles. After scientific evidence has been made available - the regulation can be tweaked.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;04&lt;/strong&gt; Any developer or publisher can have their content on Free Basics. There are  clear technical specs openly published here ... and we have never rejected an app or publisher who has me these tech specs.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again this was only done as a retrospective fix after network neutrality activists in India complained about exclusive arrangements. For example, the music streaming service Hungama is not a low-bandwidth destination but since it was included the technical specifications only mentions large images and video files. Many of the other sites are indistinguishable from their web equivalents clearly indicating that this was just an afterthought. At the moment Free Basics has become controversial so most developers and publishers are not approaching them so there is no way for us to verify Facebook's claim.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;05&lt;/strong&gt; Nearly 800 developers in India have signed their support for Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: I guess these are software developers working in the services industry who don't see themselves as potential competition to Facebook or any of the services within Free Basics. Also since Facebook as been completely disingenuous when it comes to soliciting support for their campaigns it is very hard to believe these claims. It has tried to change the meaning of the phrase "net neutrality" and has framed the debate in an inaccurate manner - therefore I could quite confidently say that these developers must have been fooled into supporting Free Basics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;06&lt;/strong&gt; It is not a walled garden: In India, 40% of people who come online through Free  Basics are paying for data and accessing the full internet within the first 30 days. In the same time period, 8 times more people are paying versus staying on just&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again, no absolute numbers and also no granularity in the data that makes it impossible for anyone to verify these numbers. Also there is no way to compare these numbers to access options that are respectful of network neutrality such as equal rating. If the numbers are roughly the same for equal rating and zero-rating then there is no strong case to be made for zero-rating.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;07&lt;/strong&gt; Free Basics is growing and popular in 36 other countries, which have welcomed  the program with open arms and seen the enormous benefits it has brought.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Free Basics was one of the most controversial topics at the last Internet Governance Forum. A gratis service is definitely going to be popular but that does not mean forbearance is the only option for the regulator. In countries with strong civil society and/or a strong regulator, Free Basics has ran into trouble. Facebook has been able to launch Free Basics only in jurisdictions where regulators are still undecided about net neutrality. India and Brazil are the last battle grounds for net neutrality and that is why Facebook is spending  advertising dollar and using it's infrastructure to win the global south.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;08&lt;/strong&gt; In a recent representative poll, 86% of Indians supported Free Basics by  Facebook, and the idea that everyone deserves access to free basic internet services.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: This is the poll which was framed in alarmist language where Indian were asked to choose between perpetuating or bridging the digital divide. This is a false choice that Facebook is perpetuating - with forward-looking positive Network Neutrality rules as advocated by Dr. Chris Marsden it should be possible to bridge digital divide without incurring any free speech, competition, innovation and diversity harms.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;09&lt;/strong&gt; In the past several days, 3.2 million people have petitioned the TRAI in  support of Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Obviously - since Free Basics is better than nothing. But the real choice should have been - are you a) against network neutrality ie. would you like to see Facebook play gatekeeper on the Internet OR b) for network neutrality ie. would you like to see Free Basics forced to comply with network neutrality rules  and expand access without harms to consumers and innovators.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;10&lt;/strong&gt; There are no ads in the version of Facebook on Free Basics. Facebook produces  no revenue. We are doing this to connect India, and the benefits to do are clear.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As someone who has watched the Internet economy since the first dot com boom - it is absolutely clear that consumer acquisition is as important as revenues. They are doing it to connect people to Facebook and as a result some people will also connect to the Internet. But India is the last market on the planet where the walled garden can be bigger than the Internet, and therefore Facebook is manipulating the discourse through it's dominance of the networked public sphere.&lt;/p&gt;
&lt;p&gt;Bravo to TRAI and network neutrality activists for taking Facebook on.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="http://www.catchnews.com/tech-news/should-facebook-become-internet-s-gatekeeper-or-free-basics-must-comply-with-net-neutrality-sunil-abraham-has-some-thoughts-1450954347.html" target="_blank"&gt;Catch News&lt;/a&gt;, on December 24, 2015.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them'&gt;https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-12-25T14:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ground-zero-summit">
    <title>Ground Zero Summit</title>
    <link>https://cis-india.org/internet-governance/blog/ground-zero-summit</link>
    <description>
        &lt;b&gt;The Ground Zero Summit which claims to be the largest collaborative platform in Asia for cyber-security was held in New Delhi from 5th to 8th November. The conference was organised by the Indian Infosec Consortium (IIC), a not for profit organisation backed by the Government of India. Cyber security experts, hackers, senior officials from the government and defence establishments, senior professionals from the industry and policymakers attended the event. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Keynote Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Union Home Minister, Mr. Rajnath Singh, inaugurated the conference. Mr Singh described cyber-barriers that impact the issues that governments face in ensuring cyber-security. Calling the cyberspace as the fifth dimension of security in addition to land, air, water and space, Mr Singh emphasised the need to curb cyber-crimes in India, which have grown by 70% in 2014 since 2013. He highlighted the fact that changes in location, jurisdiction and language made cybercrime particularly difficult to address. Continuing in the same vein, Mr. Rajnath Singh also mentioned cyber-terrorism as one the big dangers in the time to come. With a number of government initiatives like Digital India, Smart Cities and Make in India leveraging technology, the Home Minister said that the success of these projects would be dependent on having robust cyber-security systems in place.&lt;br /&gt;&lt;br /&gt;The Home Minister outlined some initiatives that Government of India is planning to take in order to address concerns around cyber security - such as plans to finalize a new national cyber policy. Significantly, he referred to a committee headed by Dr. Gulshan Rai, the National Cyber Security Coordinator mandated to suggest a roadmap for effectively tackling cybercrime in India. This committee has recommended the setting up of Indian Cyber Crime Coordination Centre (I-4C). This centre is meant to engage in capacity building with key stakeholders to enable them to address cyber crimes, and work with law enforcement agencies. Earlier reports about the recommendation suggest that the I-4C will likely be placed under the National Crime Records Bureau and align with the state police departments through the Crime and Criminal Tracking and Network Systems (CCTNS). I-4C is supposed to be comprised of high quality technical and R&amp;amp;D experts who would be engaged in developing cyber investigation tools. &lt;br /&gt;&lt;br /&gt;Other keynote speakers included Alok Joshi, Chairman, NTRO; Dr Gulshan Rai, National Cyber Security Coordinator; Dr. Arvind Gupta, Head of IT Cell, BJP and Air Marshal S B Dep, Chief of the Western Air Command.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technical Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were a number of technical speakers who presented on an array of subjects. The first session was by Jiten Jain, a cyber security analyst who spoke on cyber espionage conducted by actors in Pakistan to target defence personnel in India. Jiten Jain talked about how the Indian Infosec Consortium had discovered these attacks in 2014. Most of these websites and mobile apps posed as defence news and carried malware and viruses. An investigation conducted by IIC revealed the domains to be registered in Pakistan. In another session Shesh Sarangdhar, the CEO of Seclabs, an application security company, spoke about the Darknet and ways to break anonymity on it. Sarangdhar mentioned that anonymity on Darknet is dependent on all determinants of the equation in the communication maintaining a specific state. He discussed techniques like using audio files, cross domain on tor, siebel attacks as methods of deanonymization. Dr. Triveni Singh. Assistant Superintendent of Police, Special Task Force, UP Police made a presentation on the trends in cyber crime. Dr. Singh emphasised the amount of uncertainty with regard to the purpose of a computer intrusion. He discussed real life case studies such as data theft, credit card fraud, share trading fraud from the perspective of law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Anirudh Anand, CTO of Infosec Labs discussed how web applications are heavily reliant on filters or escaping methods. His talk focused on XSS (cross site scripting) and bypassing regular expression filters. He also announced the release of XSS labs, an XSS test bed for security professionals and developers that includes filter evasion techniques like b-services, weak cryptographic design and cross site request forgery. Jan Siedl, an authority on SCADA presented on TOR tricks which may be used by bots, shells and other tools to better use the TOR network and I2P. His presentation dealt with using obfuscated bridges, Hidden Services based HTTP, multiple C&amp;amp;C addresses and use of OTP. Aneesha, an intern with the Kerala Police spoke about elliptical curve cryptography, its features such as low processing overheads. As this requires elliptic curve paths, efficient Encoding and Decoding techniques need to be developed. Aneesha spoke about an algorithm called Generator-Inverse for encoding and decoding a message using a Single Sign-on mechanism. Other subjects presented included vulnerabilities that remained despite using TLS/SSL, deception technology and cyber kill-chain, credit card frauds, Post-quantum crypto-systems and popular android malware.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panels&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were also two panels organised at the conference. Samir Saran, Vice President of Observer Research Foundation, moderated the first panel on Cyber Arms Control. The panel included participants like Lt. General A K Sahni from the South Western Air Command; Lt. General A S Lamba, Retired Vice Chief Indian Army, Alok Vijayant, Director of Cyber Security Operation of NTRO and Captain Raghuraman from Reliance Industries. The panel debated the virtues of cyber arms control treaties. It was acknowledged by the panel that there was a need to frame rules and create a governance mechanism for wars in cyberspace. However, this would be effective only if the governments are the primary actors with the capability for building cyber-warfare know-how and tools. The reality was that most kinds of cyber weapons involved non state actors from the hacker community. In light of this, the cyber control treaties would lose most of their effectiveness. &lt;br /&gt;&lt;br /&gt;The second panel was on the Make for India’ initiatives. Dinesh Bareja, the CEO of Open Security Alliance and Pyramid Cyber Security was the moderator for this panel which also included Nandakumar Saravade, CEO of Data Security Council of India; Sachin Burman, Director of NCIIPC; Dr. B J Srinath, Director General of ICERT and Amit Sharma, Joint Director of DRDO. The focus of this session was on ‘Make in India’ opportunities in the domain of cyber security. The panelist discussed the role the government and industry could play in creating an ecosystem that supports entrepreneurs in skill development. Among the approaches discussed were: involving actors in knowledge sharing and mentoring chapters which could be backed by organisations like NASSCOM and bringing together industry and government experts in events like the Ground Zero Summit to provide knowledge and training on cyber-security issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exhibitions&lt;/h3&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference was accompanied by a exhibitions showcasing indigenous cybersecurity products. The exhibitors included Smokescreen Technologies, Sempersol Consultancy, Ninja Hackon, Octogence Technologies, Secfence, Amity, Cisco Academy, Robotics Embedded Education Services Pvt. Ltd., Defence Research and Development Organisation (DRDO), Skin Angel, Aksit, Alqimi, Seclabs and Systems, Forensic Guru, Esecforte Technologies, Gade Autonomous Systems, National Critical Information Infrastructure Protection Centre (NCIIPC), Indian Infosec Consortium (IIC), INNEFU, Forensic Guru, Event Social, Esecforte Technologies, National Internet Exchange of India (NIXI) and Robotic Zone.&lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference also witnessed events such Drone Wars, in which selected participants had to navigate a drone, a Hacker Fashion Show and the official launch of the Ground Zero’s Music Album.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ground-zero-summit'&gt;https://cis-india.org/internet-governance/blog/ground-zero-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T06:06:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview">
    <title>Smart Cities in India: An Overview</title>
    <link>https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview</link>
    <description>
        &lt;b&gt;The Government of India is in the process of developing 100 smart cities in India which it sees as the key to the country's economic and social growth. This blog post gives an overview of the Smart Cities project currently underway in India. The smart cities mission in India is at a nascent stage and an evolving area for research. The Centre for Internet and Society will continue work in this area.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Overview of the 100 Smart Cities Mission&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India announced its flagship programme- the 100 Smart Cities mission in the year 2014 and was launched in June 2015 to achieve urban 	transformation, drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology. Initially, 	the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and 	its duration will be five years (FY 2015-16 to FY 2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the 	Ministry of Urban Development (MoUD) and incorporation of the learnings into the Mission. The Mission aims to focus on area-based development in the form 	of redevelopment of existing spaces, or the development of new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all - especially the poor and the disadvantaged.	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On 27th August 2015 the Centre unveiled 98 smart cities across India which were selected for this Project. Across the selected cities, 13 crore population ( 35% of the urban population will be included in the development plans.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The mission has been developed for the purpose of achieving urban transformation. 	The vision is to preserve India's traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use 	resources in a sustainable manner and create an inclusive environment. &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include reduction of carbon footprint, adequate water and electricity supply, proper sanitation, including solid 	waste management, efficient urban mobility and public transport, affordable housing, robust IT connectivity and digitalization, good governance, citizen 	participation, security of citizens, health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why and How was the Smart Cities project conceptualized in India? What was the need for such a project in India?&lt;/li&gt;
&lt;li&gt;What was the role of the public/citizens at the ideation and conceptualization stage of the project?&lt;/li&gt;
&lt;li&gt;Which actors from the Government, Private industry and the civil society are involved in this mission? Though the smart cities mission has been 	initiated by the Government of India under the Ministry of Urban Development, there is no clarity about the involvement of the associated offices and 	departments of the Ministry.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the Smart Cities being selected?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 100 cities were supposed to be selected on the basis of Smart cities challenge&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; involving two stages. Stage I of the challenge involved Intra-State city selection on objective criteria to identify cities to compete in stage-II. In August 2015, The Ministry of Urban Development, Government of India announced 100 smart cities	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; evaluated on parameters such as service levels, financial and institutional 	capacity, past track record, called as the 'shortlisted cities' for this purpose. The selected cities are now competing for selection in the Second stage 	of the challenge, which is an All India competition. For this crucial stage, the potential 100 smart cities are required to prepare a Smart City Proposal 	(SCP) stating the model chosen (retrofitting, redevelopment, Greenfield development or a mix), along with a Pan-City dimension with Smart Solutions. The 	proposal must also include suggestions collected by way of consultations held with city residents and other stakeholders, along with the proposal for 	financing of the smart city plan including the revenue model to attract private participation. The country saw wide participation from the citizens to 	voice their aspirations and concerns regarding the smart city. 15th December 2015 has been declared as the deadline for submission of the SCP, which must be in consonance with evaluation criteria set by The MoUD, set on the basis of professional advice.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On the basis of this, 20 cities will be selected for the first year. According to 	the latest reports, the Centre is planning to fund only 10 cities for the first phase in case the proposals sent by the states do not match the expected quality standards and are unable to submit complete area-development plans by the deadline, i.e. 15th December, 2015.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Who would be undertaking the task of evaluating and selecting the cities for this project?&lt;/li&gt;
&lt;li&gt;What are the criteria for selection of a city to qualify in the first 20 (or 10, depending on the Central Government) for the first phase of 	implementation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the smart cities going to be Funded?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The additional resources will have to be mobilized by the State/ ULBs from 	external/internal sources. According to the scheme, once list of shortlisted Smart Cities is finalized, Rs. 2 crore would have been disbursed to each city 	for proposal preparation.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to estimates of the Central Government, around Rs 4 lakh crore of funds will be infused mainly through private investments and loans from multilateral institutions among other sources, which accounts to 80% of the total spending on the mission.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this purpose, the Government will approach the World Bank and the Asian 	Development Bank (ADB) for a loan costing £500 million and £1 billion each for 2015-20. If ADB approves the loan, it would be it will be the 	bank's highest funding to India's urban sector so far.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.	&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Government notes on Financing of the project mentions PPPs for private funding and leveraging of resources from internal and external 	resources. There is lack of clarity on the external resources the Government has/will approach and the varied PPP agreements the Government is or is 	planning to enter into for the purpose of private investment in the smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How is the scheme being implemented?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under this scheme, each city is required to establish a Special Purpose Vehicle (SPV) having flexibility regarding planning, implementation, management and 	operations. The body will be headed by a full-time CEO, with nominees of Central Government, State Government and ULB on its Board. The SPV will be a 	limited company incorporated under the Companies Act, 2013 at the city-level, in which the State/UT and the Urban Local Body (ULB) will be the promoters 	having equity shareholding in the ratio 50:50. The private sector or financial institutions could be considered for taking equity stake in the SPV, 	provided the shareholding pattern of 50:50 of the State/UT and the ULB is maintained and the State/UT and the ULB together have majority shareholding and 	control of the SPV. Funds provided by the Government of India in the Smart Cities Mission to the SPV will be in the form of tied grant and kept in a 	separate Grant Fund.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of implementation and monitoring of the projects, the MoUD has also established an Apex Committee and National Mission Directorate for 	National Level Monitoring&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a State Level High Powered Steering Committee (HPSC) for State Level Monitoring&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and a Smart City Advisory Forum at the City Level	&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, several consulting firms&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have been assigned to the 100 cities to help them prepare action plans.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of them include CRISIL, KPMG, McKinsey, etc.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What policies and regulations have been put in place to account for the smart cities, apart from policies looking at issues of security, privacy, 	etc.?&lt;/li&gt;
&lt;li&gt;What international/national standards will be adopted while development of the smart cities? Though the Bureau of Indian Standards is in the 	process of formulating standardized guidelines for the smart cities in India&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, yet 	there is lack of clarity on adoption of these national standards, along with the role of international standards like the ones formulated by ISO.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the role of Foreign Governments and bodies in the Smart cities mission?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ever since the government's ambitious project has been announced and cities have been shortlisted, many countries across the globe have shown keen interest 	to help specific shortlisted cities in building the smart cities and are willing to invest financially. Countries like Sweden, Malaysia, UAE, USA, etc. 	have agreed to partner with India for the mission.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, UK has partnered 	with the Government to develop three India cities-Pune, Amravati and Indore.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Israel's start-up city Tel Aviv also entered into an agreement to help with urban transformation in the Indian cities of Pune, Nagpur and Nashik to foster 	innovation and share its technical know-how.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; France has piqued interest for 	Nagpur and Puducherry, while the United States is interested in Ajmer, Vizag and Allahabad. Also, Spain's Barcelona Regional Agency has expressed interest 	in exchanging technology with the Delhi. Apart from foreign government, many organizations and multilateral agencies are also keen to partner with the 	Indian government and have offered financial assistance by way of loans. Some of them include the UK government-owned Department for International 	Development, German government KfW development bank, Japan International Cooperation Agency, the US Trade and Development Agency, United Nations Industrial 	Development Organization and United Nations Human Settlements Programme. &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Do these governments or organization have influence on any other component of the Smart cities?&lt;/li&gt;
&lt;li&gt;How much are the foreign governments and multilateral bodies spending on the respective cities?&lt;/li&gt;
&lt;li&gt;What kind of technical know-how is being shared with the Indian government and cities?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the way ahead?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the basis of the SCP, the MoUD will evaluate, assess the credibility and select 20 smart cities out of the short-listed ones for execution of the plan 	in the first phase. The selected city will set up a SPV and receive funding from the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the deadline of submission of the Smart Cities Proposal be pushed back?&lt;/li&gt;
&lt;li&gt;After the SCP is submitted on the basis of consultation with the citizens and public, will they be further involved in the implementation of the 	project and what will be their role?&lt;/li&gt;
&lt;li&gt;How will the MoUD and other associated organizations as well as actors consider the implementation realities of the project, like consideration of 	land displacement, rehabilitation of the slum people, etc.&lt;/li&gt;
&lt;li&gt;How are ICT based systems going to be utilized to make the cities and the infrastructure "smart"?&lt;/li&gt;
&lt;li&gt;How is the MoUD going to respond to the concerns and criticism emerging from various sections of the society, as being reflected in the news items?&lt;/li&gt;
&lt;li&gt;How will the smart cities impact and integrate the existing laws, regulations and policies? Does the Government intend to use the existing legislations in entirety, or update and amend the laws for implementation of the Smart Cities Mission?&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : 			http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-08-27/news/65929187_1_jammu-and-kashmir-12-cities-urban-development-venkaiah-naidu&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Full list : http://www.scribd.com/doc/276467963/Smart-Cities-Full-List&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ibtimes.co.in/modi-govt-select-only-10-cities-under-smart-city-project-this-year-report-658888&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Financing%20of%20Smart%20Cities.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities presentation by MoUD : http://smartcities.gov.in/writereaddata/Presentation%20on%20Smart%20Cities%20Mission.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/funding-for-smart-cities-key-to-coffer-lies-outside-india/#sthash.5lnW9Jsq.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/SPVs.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/National%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/State%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/City%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/List_of_Consulting_Firms.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://pib.nic.in/newsite/PrintRelease.aspx?relid=128457&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt; http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://accommodationtimes.com/foreign-countries-have-keen-interest-in-development-of-smart-cities/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-11-20/news/68440402_1_uk-trade-three-smart-cities-british-deputy-high-commissioner&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.jpost.com/Business-and-Innovation/Tech/Tel-Aviv-to-help-India-build-smart-cities-435161?utm_campaign=shareaholic&amp;amp;utm_medium=twitter&amp;amp;utm_source=socialnetwork&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/#sthash.nCMxEKkc.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview'&gt;https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-11T01:30:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai">
    <title>RTI response regarding the UIDAI</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai</link>
    <description>
        &lt;b&gt;This is a response to the RTI filed regarding UIDAI&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Supreme Curt of India, by virtue of an order dated 11th August 2015, directed the Government to widely publicize in electronic and print media, including radio and television networks that obtaining Aadhar card is not mandatory for the citizens to avail welfare schemes of the Government. (until the matter is resolved). CIS filed an RTI to get information about the steps taken by Government in this regard, the initiatives taken, and details about the expenditure incurred to publicize and inform the public about Aadhar not being mandatory to avail welfare schemes of the Government. &lt;br /&gt;&lt;br /&gt;Response: It has been informed that an advisory was issued by UIDAI headquarters to all regional offices to comply with the order, along with several advertisement campaigns. The total cost incurred so far by UIDAI for this is Rs. 317.30 lakh.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti.pdf" class="internal-link"&gt;Download the Response&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai'&gt;https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-12-22T02:57:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline">
    <title>Consultation on "Understanding the Freedom of Expression Online and Offline"</title>
    <link>https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline</link>
    <description>
        &lt;b&gt;The event organized by Digital Empowerment Foundation and Association for Progressive Communications was held at YMCA, New Delhi on December 10, 2015. Jyoti Panday attended the event as a speaker. She covered imposition of legitimate expression specifically in the context of intermediary liability practices in India.&lt;/b&gt;
        &lt;p&gt;The sessions were divided as under:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Welcome &amp;amp; Overview of the consultation by Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Launch of the Country Research Report &amp;amp; Keynote Address&lt;/li&gt;
&lt;li&gt;Introducing the Country Research Report titled “Limited Access and Restricting Expression by Osama Manzar, Founder and Director, Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Working Session I: Understanding the “Freedom of Expression Online and Offline” in conversation with experts&lt;/li&gt;
&lt;li&gt;Working Session II: “Unboxing the Freedom of Expression Online &amp;amp; Offline”&lt;/li&gt;
&lt;li&gt;Sub-Group Presentations&lt;/li&gt;
&lt;li&gt;Concluding Remarks&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/understanding-the-freedom-of-expression-online-and-offline" class="internal-link"&gt;Download the Agenda here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline'&gt;https://cis-india.org/internet-governance/news/consultation-on-understanding-the-freedom-of-expression-online-and-offline&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T10:27:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion">
    <title>Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion</title>
    <link>https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion</link>
    <description>
        &lt;b&gt;This event was organized by Indicus Foundation and MicroSave on December 10, 2015 at the Metropolitan Hotel and Spa, New Delhi. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the initiative towards financial inclusion has gathered new impetus with the PMJDY and the accelerated roll out of benefits, there is also a parallel narrative of concerns over the legality and fundamental constitutionality of identity verification, which is a centre piece for delivery of financial benefits and services. These divergent narratives have now reached the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one end of the spectrum are the voices that avow the power of biometric technology to irrepudiately establish biological identity; at the other, the alarmism over targeting, concentration and misuse of personal information contained in the world’s biggest personal database. There is also a third extreme position of whether Indian citizens are entitled to the right to privacy constitutionally, and whether the right to privacy includes the right to refuse a national identity number or metric altogether. That India has yet to enact a Privacy Bill and the National Identity Authority Bill on which rests the statutory basis for UIDAI and Aadhaar only adds to the quagmire.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several issues lie intertwined in this miasma: Privacy as an absolute right; Definition and Limits of Personal Information and Sensitive Personal Information; Consent protocols over use of personal information; Data Security; Appropriate and inclusive technology platforms; and Responsibilities and Liabilities governing the use of personal information for bonafide purposes. These straddle multiple domains: data accuracy and irrepudiability; storage, security and encryption; and sharing of information for transaction processing including across national boundaries. Unfortunately, all of these tend to get lumped together in the public debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of this workshop is to unbundle the issues and understand each of them from the perspective of financial inclusion, to be able to answer these questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How essential and critical is a unified Identity metric for digital financial transactions? How essential is that such a metric be biometric?&lt;/li&gt;
&lt;li&gt;To what extent does the centralised storage of biometric data represent risks of personal safety and national security, compared to the information on election voter lists, passport offices, census data, and bank accounts?&lt;/li&gt;
&lt;li&gt;What are the possible sources of transactional risk and security breaches in data sharing, and what are the international best practices?&lt;/li&gt;
&lt;li&gt;Is the present Aadhaar architecture robust enough to: address all the genuine and reasonable concerns over leakage and misuse of sensitive personal information; and to ensure that no genuine identity holder is turned away from a service, entitlement or benefit to which (s)he has a right or claim?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this direction, we have the privilege to interact in this workshop with experts from The Centre for Internet and Society, and Data Security Council of India who have been at the forefront of the discussions on privacy and data security aspects of technology based innovations including for financial inclusion.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/icfi-workshop" class="internal-link"&gt;Download the Workshop Schedule here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion'&gt;https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T10:45:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-summit-2015">
    <title>Cyber Security Summit 2015</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-summit-2015</link>
    <description>
        &lt;b&gt;The Government of Karnataka in association with Biz Wingz Production House organized this Summit on November 27, 2015 at JW Marriott, Bangalore from 10.30 a.m. to 5.30 p.m. Sunil Abraham was a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cloud-based applications are often the darling of the CFO and the  nemesis of the CISO &amp;amp; CIOs. How can an organization migrate to the  cloud, thus relinquishing control, but still maintain &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt;? Are we sacrificing &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt; and robustness in exchange for other priorities? How do ‘Snowden’  disclosures change the legal and risk nature of cloud decision making  and governance? What can proactive cloud providers do to capture the  opportunity in the disruption? The panel explored these topics and more  to provide the cutting edge thinking and perspectives you need to shape  your own cloud strategies in ways that balance multiple priorities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance &amp;amp; Chief Operational Risk Officer India&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Atul kumar, GM IT, Syndicate Bank&lt;/li&gt;
&lt;li&gt;Lopa Mudra Basu, AVP &amp;amp; Head of Enterprise &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; &amp;amp; Risk Governance, SLK Global&lt;/li&gt;
&lt;li&gt;Sagar Karan, Chief Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; Officer, Fullerton India Credit Co. Ltd.&lt;/li&gt;
&lt;li&gt;R Vijay, CISO –Technology, Mahindra &amp;amp; Mahindra Financial Services Limited&lt;/li&gt;
&lt;li&gt;Sanjivan S Shirke, Senior Vice President-Information Technology, Head -Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt;, UTI Asset Management Company Limited.&lt;/li&gt;
&lt;li&gt;Sanjay Sahay, IPS, ADGP, Grievances &amp;amp; Human Rights, Police Dept, Govt of Karnataka (moderator).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="https://www.eventshigh.com/detail/Bangalore/f8cf8b1a68202dca7543ec973f7ae2c0-cyber-security-summit-2015"&gt;More information about this event&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-summit-2015'&gt;https://cis-india.org/internet-governance/news/cyber-security-summit-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-16T02:10:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project">
    <title>Kick Off Meeting for the Politics of Data Project</title>
    <link>https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project</link>
    <description>
        &lt;b&gt;Tactical Technology Collective (TTC) on December 7 and 8, 2015 organized this event in Phnom Penh. Amber Sinha participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The areas TTC is planning to focus on in the Politics of Data project include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Politics of Data: exploring questions about what it means to live in a data society and how it impacts our autonomy and privacy. Me and My Shadow is one of the projects under Politics of Data that looks at the digital traces that we leave behind and how these pieces of information are created, stored and collected. It provides people with resources to learn about how these digital traces can create stories or profiles about you, and how to minimise your digital traces online.&lt;/li&gt;
&lt;li&gt;Digital Security and Privacy: through this programme, they intend to work with rights advocates, journalists, activists and others to build their digital security skills.&lt;/li&gt;
&lt;li&gt;Exposing and Shaping Issues: this part of the programme will explore new forms of finding, creating and representing evidence by advocacy and activist groups and individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The meetings saw participation from a host of organisations in Asia including Bytes for All, Cambodian Center for Human Rights, OpenNet, Community Legal Education Center, Engage Media, iPlural and Mido.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project'&gt;https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T16:42:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
