<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 61 to 66.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011">
    <title>Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011</link>
    <description>
        &lt;b&gt;Experts and regulators across jurisdictions are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.This blog provides an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/b&gt;
        &lt;p&gt;Experts and regulators across the globe are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.&lt;/p&gt;
&lt;p&gt;Below is an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India currently does not have comprehensive privacy legislation - but the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011 formed under section 43A of the Information Technology Act 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; define a data protection framework for the processing of digital data by Body Corporate. Big Data practices will impact a number of the provisions found in the Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Rules: &lt;/b&gt;Currently the Rules apply to Body Corporate and digital data. As per the IT Act, Body Corporate is defined as &lt;i&gt;"Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present scope of the Rules excludes from its purview a number of actors that do or could have access to Big Data or use Big Data practices. The Rules would not apply to government bodies or individuals collecting and using Big Data. Yet, with technologies such as IoT and the rise of Smart Cities across India – a range of government, public, and private organizations and actors could have access to Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Definition of personal and sensitive personal data: &lt;/b&gt;Rule 2(i) defines personal information as &lt;i&gt;"information that relates to a natural person which either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Rule 3 defines sensitive personal information as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password,&lt;/li&gt;
&lt;li&gt;Financial information,&lt;/li&gt;
&lt;li&gt;Physical/physiological/mental health condition,&lt;/li&gt;
&lt;li&gt;Sexual orientation,&lt;/li&gt;
&lt;li&gt;Medical records and history,&lt;/li&gt;
&lt;li&gt;Biometric information&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The present definition of personal data hinges on the factor of identification (data that is capable of identifying a person). Yet this definition does not encompass information that is associated to an already identified individual - such as habits, location, or activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of personal data also addresses only the identification of 'such person' and does not address data that is related to a particular person but that also reveals identifying information about another person - either directly - or when combined with other data points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By listing specific categories of sensitive personal information, the Rules do not account for additional types of sensitive personal information that might be generated or correlated through the use of Big Data analytics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the definitions of sensitive personal information or personal information do not address how personal or sensitive personal information - when anonymized or aggregated – should be treated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent&lt;/b&gt;: Rule 5(1) requires that Body Corporate must, prior to collection, obtain consent in writing through letter or fax or email from the provider of sensitive personal data regarding the use of that data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a context where services are delivered with little or no human interaction, data is collected through sensors, data is collected on a real time and regular basis, and data is used and re-used for multiple and differing purposes - it is not practical, and often not possible, for consent to be obtained through writing, letter, fax, or email for each instance of data collection and for each use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice of Collection: &lt;/b&gt;Rule 5(3) requires Body Corporate to provide the individual with a notice during collection of information that details the fact that information is being collected, the purpose for which the information is being collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information. Furthermore body corporate should not retain information for longer than is required to meet lawful purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision acts as an important element of transparency, in the context of Big Data, communicating the purpose for which data is collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information could prove to be difficult to communicate as they are likely to encompass numerous agencies and change depending upon the analysis being done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and correction&lt;/b&gt;: Rule 5(6) provides individuals with the ability to access sensitive personal information held by the body corporate and correct any inaccurate information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision would be difficult to implement effectively in the context of Big Data as vast amounts of data are being generated and collected on an ongoing and real time basis and often without the knowledge of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Purpose Limitation:&lt;/b&gt; Rule 5(5) requires that body corporate should use information only of the purpose which it has been collected.&lt;/p&gt;
&lt;p&gt;In the context of Big Data this provision would overlook the re-use of data that is inherent in such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; Rule 8 states that any Body Corporate or person on its behalf will be understood to have complied with reasonable security practices and procedures if they have implemented such practices and have in place codes that address managerial, technical, operational and physical security control measures. These codes could follow the IS/ISO/IEC 27001 standard or another government approved and audited standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision importantly requires that data controllers collecting and processing data have in place strong security practices. In the context of Big Data – the security of devices that might be generating or collecting data and algorithms processing and analysing data is critical. Once generated, it might be challenging to ensure the data is being transferred to or being analysed by organisations that comply with such security practices as listed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Breach&lt;/b&gt; : Rule 8 requires that if a data breach occurs, Body Corporate would have to be able to demonstrate that they have implemented their documented information security codes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision holds a company accountable for the implementation of security practices, it does not address how a company should be held accountable for a large scale data breach as in the context of Big Data the scope and impact of a data breach is on a much larger scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Opt in and out and ability to withdraw consent&lt;/b&gt; : Rule 5(7) requires Body Corporate or any person on its behalf, prior to the collection of information - including sensitive personal information - must give the individual the option of not providing information and must give the individual the option of withdrawing consent. Such withdrawal must be sent in writing to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The feasibility of such a provision in the context of Big Data is unclear, especially in light of the fact that Big Data practices draw upon large amounts of data, generated often in real time, and from a variety of sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information&lt;/b&gt;: Rule 6 maintains that disclosure of sensitive personal data can only take place with permission from the provider of such information or as agreed to through a lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision addresses disclosure and does not take into account the “sharing” of information that is enabled through networked devices, as well as the increasing practice of companies to share anonymized or aggregated data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Policy&lt;/b&gt; : Rule 4 requires that body corporate have in place a privacy policy on their website that provides clear and accessible statements of its practices and policies, type of personal or sensitive personal information that is being collected, purpose of the collection, usage of the information, disclosure of the information, and the reasonable security practices and procedures that have been put in place to secure the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of Big Data where data from a variety of sources is being collected, used, and re-used it is important for policies to 'follow data' and appear in a contextualized manner. The current requirement of having Body Corporate post a single overarching privacy policy on its website could prove to be inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remedy&lt;/b&gt; : Section 43A of the Act holds that if a body corporate is negligent in implementing and maintain reasonable security practices and procedures which results in wrongful loss or wrongful gain to any person, the body corporate can be held liable to pay compensation to the affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision will provide limited remedy for an affected individual in the context of Big Data. Though important to help prevent data breaches resulting from negligent data practices, implementation of reasonable security practices and procedures cannot be the only hinging point for determining liability of a Body Corporate for violations and many of the harms possible through Big Data are not in the form of wrongful loss or wrongful gain to another person. Indeed many harms possible through Big Data are non-economic in nature – including physical invasion of privacy, and discriminatory practices that can arise from decisions based on Big Data analytics. Nor does the provision address the potential for future damage that can result from a 'Big Data data breach'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards noted in the above section are not the only legal provisions that speak to privacy in India. There are over fifty sectoral legislation that have provisions addressing privacy - for example provisions addressing confidentiality of health and banking information. The government of India is also in the process of drafting a privacy legislation. In 2012 the Report of the Group of Experts on Privacy provided recommendations for a privacy framework in India. The Report envisioned a framework of co-regulation - with sector level self regulatory organization developing privacy codes (that are not lower than the defined national privacy principles) and that are enforced by a privacy commissioner.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Perhaps this method would be optimal for the regulation of Big Data- allowing for the needed flexibility and specificity in standards and device development. Though the Report notes that individuals can seek remedy from the court and the Privacy Commissioner can issue fines for a violation, the development of privacy legislation in India has yet to clearly integrate the importance of due process and remedy. With the onset of Big Data - this will become more important than ever.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use and generation of Big Data in India is growing. Plans such as free wifi zones in cities&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;, city wide CCTV networks with facial recognition capabilities&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;, and the implementation of an identity/authentication platform for public and private services&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;, are indicators towards a move of data generation that is networked and centralized, and where the line between public and private is blurred through the vast amount of data that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such developments and innovations what is privacy and what role does privacy play? Is it the archaic inhibitor - limiting the sharing and use of data for new and innovative purposes? Will it be defined purely by legislative norms or through device/platform design as well? Is it a notion that makes consumers think twice about using a product or service or is it a practice that enables consumer and citizen uptake and trust and allows for the growth and adoption of these services?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How privacy will be regulated and how it will be perceived is still evolving across jurisdictions, technologies, and cultures - but it is clear that privacy is not being and cannot be overlooked. Governments across the world are reforming and considering current and future privacy regulation targeted towards life in a quantified society. As the Indian government begins to roll out initiatives that create a "Digital India" indeed a "quantified India", taking privacy into consideration could facilitate the uptake, expansion, and success of these practices and services. As the Indian government pursues the opportunities possible through Big Data it will be useful to review existing privacy protections and deliberate on if, and in what form, future protections for privacy and other rights will be needed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Group of Experts on Privacy. (2012). &lt;i&gt;Report of the Group of Experts on Privacy.&lt;/i&gt; New Delhi: Planning Commission, Government of India. Retrieved May 20, 2015, from http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; NDTV. “Free Public Wi-Fi Facility in Delhi to Have Daily Data Limit. NDTV, May 25&lt;sup&gt;th&lt;/sup&gt; 2015, Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857"&gt;http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;FindBiometrics Global Identity Management. “Surat Police Get NEC Facial Recognition CCTV System”. July 21&lt;sup&gt;st&lt;/sup&gt; 2015. Available at: http://findbiometrics.com/surat-police-nec-facial-recognition-27214/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;UIDAI Official Website. Available at: https://uidai.gov.in/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011'&gt;https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-11T07:01:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme">
    <title>CPRsouth 2016 – Young Scholars Programme</title>
    <link>https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</link>
    <description>
        &lt;b&gt;Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original announcement published by CPRSouth &lt;a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s conference is co-hosted by&lt;em&gt; COSTECH &lt;/em&gt;and&lt;em&gt; TCRA &lt;/em&gt;in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tutorials are scheduled to be held on the 6&lt;sup&gt;th&lt;/sup&gt; and 7&lt;sup&gt;th&lt;/sup&gt; of September 2016, prior to the main CPR&lt;em&gt;south&lt;/em&gt; conference.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; Who will qualify?&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Masters/PhD students in Economics, Public policy, Communications and Journalism&lt;/li&gt;
&lt;li&gt;Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)&lt;/li&gt;
&lt;li&gt;Staff of private companies in the communication industries working in regulatory affairs&lt;/li&gt;
&lt;li&gt;Officers in NGOs/INGOs working in policy and regulation&lt;/li&gt;
&lt;li&gt;Researchers from think tanks, university research centres&lt;/li&gt;
&lt;li&gt;Journalists covering communication public policy and regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Seminar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar will cover a number of topics of the two days, such as:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;policy analysis using supply-side or demand-side data;&lt;/li&gt;
&lt;li&gt;ICT impact analysis;&lt;/li&gt;
&lt;li&gt;convergence, net neutrality;&lt;/li&gt;
&lt;li&gt;funding broadband network extension, open access networks, spectrum;&lt;/li&gt;
&lt;li&gt;sector and competition regulation;&lt;/li&gt;
&lt;li&gt;research to policy interventions;&lt;/li&gt;
&lt;li&gt;Internet governance – privacy, surveillance, human rights online; and&lt;/li&gt;
&lt;li&gt;introduction to big data, open data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(2016 tutorial programme still to be confirmed)&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous tutorial presentations can be accessed at &lt;a href="http://www.cprsouth.org/"&gt;&lt;span style="text-decoration: underline;"&gt;http://www.cprsouth.org/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application deadline: 22 April 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://form.myjotform.com/60813291616555" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Applications should be submitted via this link&lt;/span&gt;&lt;/a&gt; by 22 April 2016, and must contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;one-page curriculum vitae; and&lt;/li&gt;
&lt;li&gt;one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Applicants’ &lt;strong&gt;write-ups and biographies should be in a single word document&lt;/strong&gt;, and named: CPRsouth2016_YoungScholar_ApplicantLastName.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Kindly note:&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt; Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Review Criteria&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will be reviewed according to the following criteria:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;content of application;&lt;/li&gt;
&lt;li&gt;evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;&lt;/li&gt;
&lt;li&gt;quality of writing; and&lt;/li&gt;
&lt;li&gt;gender and country representation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The selection committee may contact your supervisor or mentor before making the final selections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Candidates selected to participate in the tutorial programme must:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;provide a one-page research proposal &lt;em&gt;upon acceptance onto the tutorial programme&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;participate in all tutorial sessions&lt;/li&gt;
&lt;li&gt;participate in the entire CPR&lt;em&gt;south&lt;/em&gt; 2016 conference&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Funding&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;lowest-cost economy airfare to conference destination (less USD 150 registration fee);&lt;/li&gt;
&lt;li&gt;ground transfers between the conference venue and airport; and&lt;/li&gt;
&lt;li&gt;twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). &lt;em&gt;Not all meals are covered.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee.  Participants will be required to cover:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;transport to and from airports in their home countries;&lt;/li&gt;
&lt;li&gt;visa fees (if any);&lt;/li&gt;
&lt;li&gt;meals not provided; and&lt;/li&gt;
&lt;li&gt;any other incidental costs&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Visas&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net  orinfo@CPRsouth.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'&gt;https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-05-30T02:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities">
    <title>Smart City Policies and Standards: Overview of Projects, Data Policies, and Standards across Five International Smart Cities </title>
    <link>https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities</link>
    <description>
        &lt;b&gt;This blog post aims to review five Smart Cities across the globe, namely Singapore, Dubai, New York City, London and Seoul, the Data Policies and Standards adopted. Also, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the brief: &lt;a href="http://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Smart City as a concept is evolutionary in nature, and the key elements like Information and Communication Technology (ICT), digitization of services, Internet of Things (IoT), open data, big data, social innovation, knowledge, etc., would be intrinsic to defining a Smart City &lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Smart City, as a “system of systems”, can potentially generate vast amounts of data, especially as cities install more sensors, gain access to data from sources such as mobile devices, and government and other agencies make more data accessible. Consequently, Big Data techniques and concepts are highly relevant to the future of Smart Cities. It was noted by Kenneth Cukier, Senior Editor of Digital Products at The Economist, that Big Data techniques can be used to enhance a number of processes essential to cities - for example, big data can be used to spot business trends, determine quality of research, prevent diseases, tack legal citations, combat crime, and determine real-time roadway traffic conditions &lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;. Having said this, data is deemed to be the lifeblood of a Smart City and its availability, use, cost, quality, analysis, associated business models and governance are all areas of interest for a range of actors within a smart city &lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog reviews five Smart Cities namely Singapore, Dubai, New York City, London and Seoul. In doing so, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions. To achieve this, the research reviews:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The definition of a Smart City in a given context or project (if any).&lt;/li&gt;
&lt;li&gt;Existing policy/regulations around data or notes the lack thereof.&lt;/li&gt;
&lt;li&gt;The cities adherence to the International standards and providing an update on the current status of the Smart City programme.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Singapore&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation programme in Singapore was launched on 24th November, 2014. The programme is being driven by the Infocomm Development Authority of Singapore, through which Singapore seeks to harness ICT, networks and data to support improved livelihoods, stronger communities and creation of new opportunities for its residents &lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; According to the IDA, a Smart Nation is a city where &lt;em&gt;“people and businesses are empowered through increased access to data, more participatory through the contribution of innovative ideas and solutions, and a more anticipatory government that utilises technology to better serve citizens’ needs”&lt;/em&gt; &lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;. The Smart Nation programme is driven by a designated Office in the Prime Minister’s Office &lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;. As a core component to the Smart Nation Programme, the Smart Nation Platform has been developed as the technical architecture to support the Programme. This Platform enables greater pervasive connectivity, better situational awareness through data collection, and efficient sharing and access to collected sensor data, allowing public bodies to use such data to develop policy and practical interventions &lt;a href="#_ftn7"&gt;[7]&lt;/a&gt; Such access would allow for anticipatory governance - a goal of the Smart Nation Programme as noted by Dr. Yaacob Ibrahim, Minister for Communications and Information stating “Insights gained from this data would enable us to better anticipate citizens’ needs and help in better delivery of services” &lt;a href="#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation Programme is an ongoing initiative, being built on the past programme Intelligent Nation 2015 (iN2015 masterplan). The plan involves putting in place the infrastructure, policies, ecosystem and capabilities to enable a Smart Nation, by adopting a people-centric approach &lt;a href="#_ftn9"&gt;[9]&lt;/a&gt;. A number of co-creating solutions adopted by the Government include:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Development of Mobile Apps to facilitate communication between the public and the providers of public services.&lt;/li&gt;
&lt;li&gt;Organization of Hackathons by government agencies or corporations in collaboration with schools and industry partners to ideate and develop solutions to tackle real-world challenges.&lt;/li&gt;
&lt;li&gt;Adopt measure for smart mobility to create a more seamless transport experience and providing greater access to real-time transport information so that citizens can better plan their journeys.&lt;/li&gt;
&lt;li&gt;Smart technologies are also being introduced to the housing estates &lt;a href="#_ftn10"&gt;[10]&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation plan derives its legitimacy from the constitution of Singapore, holding the Prime Minister responsible to take charge of the subject ‘Smart Nation’ blueprint under the Statutory body of ‘Smart Nation’ Programme Office &lt;a href="#_ftn11"&gt;[11]&lt;/a&gt;. Singapore has a comprehensive data protection law – the Personal Data Protection Act 2012, rules governing the collection, use, disclosure and care of personal data. The Personal Data Protection Commission of Singapore has committed to work closely with the private sector, and also to support the Smart Nation vision on data privacy and cyber security ecosystem &lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Towards achieving the Smart Nation vision the government has also promoted the use of open data. In 2015 the Department of Statistics has made a vast amount of data available (across multiple themes say transport, infocomm, population, etc.) for free to the public in order to encourage innovation and facilitate the Smart Nation &lt;a href="#_ftn14"&gt;[14]&lt;/a&gt;. Prior to this initiative, the government had adopted the Open Data Policy in 2011, enabling public data for analysis, research and application development &lt;a href="#_ftn15"&gt;[15]&lt;/a&gt;. The concept of Virtual Singapore, which is a part of the Smart Nation Initiative, has been developed to adopt and simulate solutions on a virtual platform using big data analytics &lt;a href="#_ftn16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC). It specifies three types of Internet of Things (IoT) Standards – sensor network standards (TR38 - for public areas &amp;amp; TR40 - for homes), IoT foundational standards (common set of guidelines for IoT requirements and architecture, information and service interoperability, security and data integrity) and domain-specific standards (healthcare, mobility, urban living, etc.) &lt;a href="#_ftn17"&gt;[17]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Singapore is part of ISO/IEC JTC 1/WG7 Sensor Networks and ISO/IEC JTC 1/WG10 Internet of Things (IoT) &lt;a href="#_ftn18"&gt;[18]&lt;/a&gt;. &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc.Singapore is a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9 - Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Dubai, United Arab Emirates&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Dubai Smart City strategy was launched as part of the Dubai Plan 2021 vision, in the year 2015 &lt;a href="#_ftn19"&gt;[19]&lt;/a&gt;. Dubai Plan 2021 describes the future of Dubai evolving through holistic and complementary perspectives, starting with the people and the society and places the government as the custodian of the city’s development. Within the Plan, the smart city theme envisions a platform that is fully connected and integrated infrastructure that enables easy mobility for all residents and tourists, and provides easy access to all economic centers and social services, in line with the world’s best cities &lt;a href="#_ftn20"&gt;[20]&lt;/a&gt;. Center to the smart city platform is data and data analytics, particularly cross functional data and big data techniques to give a complete view of the city &lt;a href="#_ftn21"&gt;[21]&lt;/a&gt; As envisioned, the Dubai Data portal would provide a gateway to empower relevant stakeholders to understand the nuances of the city and pursue questions that will result in the greatest impact from the city’s data &lt;a href="#_ftn22"&gt;[22]&lt;/a&gt;. The platform will be based on current data and existing services, initiatives, and networks to identify opportunities for a smart city &lt;a href="#_ftn23"&gt;[23]&lt;/a&gt;. The Smart City Plan also includes a framework for aligning districts of Dubai with the Smart City vision and dimensions &lt;a href="#_ftn24"&gt;[24]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Smart Dubai roadmap 2015 provides a consolidated report and planned smart city services, its status and the stage of its implementation, for e.g. Smart Grid, Mobile Payment, Smart Water, Health applications, Public Wi-Fi, Municipality, E-Traffic solutions, etc &lt;a href="#_ftn25"&gt;[25]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Dubai strategy is envisioned to be completed by the year 2020, and currently it’s ongoing. The first phase of Smart Dubai masterplan is expected to end by 2016. Between 2017 and 2019, the plan aims to deliver new initiatives and services. The second phase of the masterplan is expected to be completed by the year 2020 &lt;a href="#_ftn26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart City Plan is being driven by the &lt;strong&gt;Dubai Smart City Office&lt;/strong&gt; – which has been established under Law No. (29) of 2015 on the establishment of Dubai Smart City Office; Law No. (30) of 2015 on the establishment of Dubai Smart City Establishment; Decree No. (37) of 2015 on the formation of the Board of the Dubai Smart City Office; and Decree No (38) of 2015- appointing a Director General for the Office, which will develop overall policies and strategic plans, supervise the smart transformation process and approve joint initiatives, projects and services &lt;a href="#_ftn27"&gt;[27]&lt;/a&gt;. Also, an open data law called &lt;strong&gt;Dubai Open Data Law&lt;/strong&gt; was issued to complete the legislative framework for transforming Dubai into a Smart City &lt;a href="#_ftn28"&gt;[28]&lt;/a&gt;. This law will enable the sharing of non-confidential data between public entities and other stakeholders.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In 2015 the Smart Dubai Executive Committee has collaborated through an agreement with the International Telecommunications Union (ITU) adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators &lt;a href="#_ftn29"&gt;[29]&lt;/a&gt;. The Focus Group is working towards identifying global best practices for the development of smart cities &lt;a href="#_ftn30"&gt;[30]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;New York City, United States of America&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ‘One New York Plan’ announced in the year 2015 is a comprehensive plan for a sustainable and resilient city. It includes the adoption of digital technology and considers the importance of the role of data in transforming every aspect of the economy, communications, politics, and individual and family life &lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;. Furthermore, through a publication on '&lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;Building a Smart+Equitable City&lt;/a&gt;', the Mayor’s Office of Technology and Innovation (MOTI) describes efforts to leverage new technologies to build Smart city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Accordingly, the plan seeks to establish better lives through establishing principles and strategic frameworks to guide connected device and Internet of Things (IoT) implementation; MOTI serving as the coordinating entity for new technology and IoT deployments across all City agencies; collaborating with academia and the private sector on innovative pilot projects, and partnering with municipal governments and organizations around the world to share best practices and leverage the impact of technological advancements &lt;a href="#_ftn32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;OneNYC represents a unified vision for a sustainable, resilient, and equitable city developed with cross-cutting interagency collaboration, public engagement, and consultation with leading experts in their respective fields. The Mayor’s Office of Sustainability oversees the development of OneNYC and now shares responsibility with the Mayor’s Office of Recovery and Resiliency for ensuring its implementation &lt;a href="#_ftn33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As per the Local Law 11 of 2012, each City entity must identify and ultimately publish all of its digital public data for citywide aggregation and publication by 2018. In adherence to this law, there exists a NYC Open Data Plan which requires annual data updation &lt;a href="#_ftn34"&gt;[34]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The LinkNYC initiative, one of the key projects to make New York a ‘smart’ city, aims to connect everyone through a city wide wi-fi network. The LinkNYC initiative will retrofit payphones with kiosks to provide high-speed WiFi hotspots and charging stations for increased connectivity &lt;a href="#_ftn35"&gt;[35]&lt;/a&gt;. Data Privacy in the initiative is addressed through the customer first privacy policy, which considers user’s privacy on priority and will not sell any personal information or share with third parties for their own use. LinkNYC will use anonymized, aggregate data to make the system more efficient and to develop insights to improve your Link experience &lt;a href="#_ftn36"&gt;[36]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ANSI Network on Smart and Sustainable Cities (ANSSC) is a forum for information sharing and coordination on voluntary standards, conformity assessment and related activities for smart and sustainable cities in the US &lt;a href="#_ftn37"&gt;[37]&lt;/a&gt;. The US is a signatory of the ISO/ITU defined standards on smart cities &lt;a href="#_ftn38"&gt;[38]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;London, United Kingdom&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan was unveiled in the year 2013 by the Mayor of London. The plan is being driven through the Greater London Authority, with the advice of the Smart London Board. The Smart London Plan envisions &lt;em&gt;‘Using the creative power of new technologies to serve London and improve Londoner’s lives&lt;/em&gt;’ &lt;a href="#_ftn39"&gt;[39]&lt;/a&gt;. ‘Smart London’ is about harnessing new technology and data so that businesses, Londoners and visitors experience the city in a better way, and do not face bureaucratic hassle and congestion. Smart London seeks to improve the city as a whole and focuses on city macro functions that result from the interplay between city subsystems - such as local labour markets to financial markets, from local government to education, healthcare, transportation and utilities. According to strategy documents, a smarter London recognises and employs data as a service and will leverage data to enable informed decision making and the design of new activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This project is currently ongoing. Since its formation in March 2013, the Smart London Board has been advising the Greater London Authority.The Plan sits within the overarching framework of the Mayor’s Vision 2020 &lt;a href="#_ftn40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan incorporates the existing open data platform called ‘London DataStore’. The rules and guidelines for this platform are defined by the Greater London Authority, which includes working with public and private sector organisations to create, maintain and utilise it, enabling common data standards, identify and prioritise which data are needed to address London’s growth challenges, establish a Smart London Borough Partnership to encourage boroughs to free up London’s local level data. Also, privacy is protected and there is transparent use of data - to ensure data use is managed in the best interests of the public rather than private enterprise.&lt;sup&gt;42&lt;/sup&gt; The Smart London Plan aims to build on this existing datastore to identify and publish data that addresses specific growth challenges, with an emphasis on working with companies and communities to create, maintain, and use this data &lt;a href="#_ftn41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Open Data White Paper, issued by the Office of Paymaster General, seeks to build a transparent society by releasing public data through open data platforms and leveraging the potential of emerging technologies &lt;a href="#_ftn42"&gt;[42]&lt;/a&gt;. The Greater London Authority processes personal data in accordance with the Data Protection Act 1998 &lt;a href="#_ftn43"&gt;[43]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same &lt;a href="#_ftn44"&gt;[44]&lt;/a&gt;. The following standards and publications help address various issues for a city to become a smart city:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The development of a standard on &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;Smart city terminology (PAS 180)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;Smart city framework standard (PAS 181)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;Data concept model for smart cities (PAS 182)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8100-smart-cities-overview/"&gt;Smart city overview document (PD 8100)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;Smart city planning guidelines document (PD 8101)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BS 8904 Guidance for community sustainable development provides a decision-making framework that will help setting objectives in response to the needs and aspirations of city stakeholders&lt;/li&gt;
&lt;li&gt;BS 11000 Collaborative relationship management&lt;/li&gt;
&lt;li&gt;BSI BIP 2228:2013 Inclusive urban design - A guide to creating accessible public spaces.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further, the Smart London Plan incorporates open data standards in accordance with London DataStore &lt;a href="#_ftn45"&gt;[45]&lt;/a&gt;. Various government reports – Smart Cities background paper, Open Data White Paper, etc., have suggested the use of standards related to Internet of Things (IoT), open data standards, etc &lt;a href="#_ftn46"&gt;[46]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Seoul, Korea&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Smart Seoul 2015 was announced in June 2011 by the Seoul Metropolitan Government, which envisions integrating IT services into every field, including administration, welfare, industry and living. Through this, the Seoul Metropolitan Government plans to create a Seoul that uses smart technologies by 2015 &lt;a href="#_ftn47"&gt;[47]&lt;/a&gt;. Towards this, the Seoul Metropolitan Government plans to make use of Big Data in policy development, and through scientific analytics, will provide customized administrative services and reduce wasteful spending. Also, the government is utilising Big Data to analyse trends emerging from existing services &lt;a href="#_ftn48"&gt;[48]&lt;/a&gt;. Examples of projects that leverage big data that the government has undertaken include the Taxi Matchmaking Project – analyzes the data related to taxi stands and passengers, the Owl Bus &lt;a href="#_ftn49"&gt;[49]&lt;/a&gt; - maps the bus routes, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Building on the Smart Seoul 2015, the Seoul Metropolitan Government plans to establish 'Global Digital Seoul 2020 – New Connections, Different Experiences' vision in next five-years. In this multi-objective plan, it aims to establish a ’Big Data campus’ providing win-win cooperation among public, private, industry and university &lt;a href="#_ftn50"&gt;[50]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The Smart Seoul 2015 aims to create a ‘Seoul Data Mart’, which will be an open platform that makes public information available for data processing &lt;a href="#_ftn51"&gt;[51]&lt;/a&gt;. Furthermore, Seoul has opened the Seoul Open Data Plaza &lt;a href="#_ftn52"&gt;[52]&lt;/a&gt;, an online channel to share and provide citizens with all of Seoul’s public data, such as real-time bus operation schedules, subway schedules, non-smoking areas, locations of public Wi-Fi services, shoeshine shops, and facilities for disabled people, and the information registered in Seoul Open Data Plaza is provided in the open API format.&lt;sup&gt;45&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;South Korea has a comprehensive law governing data privacy – Personal Information Protection Act, 2011. The law includes data protection rules and principles, including obligations on the data controller and the consent of data subjects, rights to access personal data or object to its collection, and security requirements. It also covers cookies and spam, data processing by third parties and the international transfer of data &lt;a href="#_ftn53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The smart city standards are adopted in the development of smart cities in Korea &lt;a href="#_ftn54"&gt;[54]&lt;/a&gt;. Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities. Korea also has one working group developing city indicators and another working group developing metrics for smart community infrastructures &lt;a href="#_ftn55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The smart city projects studied are at different levels of implementation and have both similarities and differences. Below is an analysis of some of the key similarities and differences between smart city projects, a comparison of these points to India’s 100 Smart City Mission, and a summary of best practices around the development of smart city frameworks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Nodal Agency&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;All cities studied have nodal agencies driving the smart city initiatives and many have policies in place backing these initiatives. For example, while the Smart Nation programme in Singapore is being driven by the Infocomm Development Authority, in London the smart city project is governed by the Great London Authority. The Smart Seoul Project in Korea is governed by the Seoul Metropolitan Government and New York has the Mayor’s Office of Technology and Innovation serving as the coordinating entity for new technology and IoT deployments across all City agencies. In India, the nodal agency driving the 100 Smart Cities Project is the Ministry of Urban Development under the Indian Government. In India, the implementation of the Mission at the City level will be done by a Special Purpose Vehicle (SPV), which will be a limited company and will plan, appraise, approve, release funds, implement, manage, operate, monitor and evaluate the Smart City development projects.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Policies&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Many of the cities had open data policies and data protection policies that pertain to the Smart City initiatives. In Dubai, an open data law called Dubai Open Data Law has been issued to complete the legislative framework for transforming Dubai into a Smart City and the Smart City Establishment will develop policies for the project. New York also has an Open Data Plan in place and LinkNYC will use anonymized, aggregate data to address data privacy of users. In London, the Smart London Plan incorporates the existing open data platform called ‘London DataStore’, the rules for which are defined by the Greater London Authority, which also ensures privacy and transparent use of data by processing personal data in accordance with the Data Protection Act 1998. For regulation of data in Seoul, a ‘Seoul Data Mart’ will be established to make public information available for data processing and the Seoul Open Data Plaza is an existing online channel to share and provide citizens with all of Seoul’s public data. South Korea has a comprehensive law governing data privacy in place as well. In Singapore, the Personal Data Protection Commission has committed to work and support the Smart Nation vision on data privacy and cyber security ecosystem. To achieve the vision of the project, the government has also promoted the use of open data. It can be said the these countries , with clearly laid out policies to support and guide the project, have well planned ecosystem for regulation and governance of systems, technologies and cities. All cities have incorporated open data into smart cities and many have developed guidelines for its use. All cities have similar goals of enhancing the lives of citizens and developing anticipatory regulation, however, there appears to be little discussion on the need to amend existing law or enable new law around privacy and data protection in light of data collection through smart cities. In India, no enabling legislation or policy has been formulated by the Government, apart from releasing “Mission Statement and Guidelines”, which provides details about the Project and vision, excluding a definition of a ‘smart city’ or the relevant applicable laws and policies. No information is publicly available regarding deployment of open data, use of specific technologies like cloud, big data, etc., the relevant policies and applicability of laws. Unlike India, all cities recognize the importance of big data techniques in enabling smart city visions, technology and policies. On the lines of these cities, India must work towards addressing the need for an open data framework in light of the 100 Smart Cities Mission to enable the sharing of non-confidential data between public entities and other stakeholders. This requires co-ordination to incorporate, enable and draw upon open data architecture in the cities by the Government with the existing open data framework in India, like the National Data Sharing and Accessibility Policy, 2012. Use of technology in the form of IoT and Big Data entails access to open data, bringing another policy area in its ambit which needs consideration. Also, identification and development of open standards for IoT must be looked at. Also, as data in smart cities will be generated, collected, used, and shared by both the public and private sector. It is essential that India’s existing data protection standards and regime must be amended to extend the data regulation beyond a body corporate and oversee the collection and use of data by the Government, and its agencies.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In Singapore, the Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC)and the &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc. The Country is also a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9- Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities. In Dubai, the Smart Dubai Executive Committee with the International Telecommunications Union (ITU) to adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators. For the purpose of standards, the ANSI Network on Smart and Sustainable Cities (ANSSC) in New York is a forum smart and sustainable cities, along with US being a signatory of the ISO/ITU defined standards on smart cities. Also, The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same and the Smart London Plan incorporates open data standards in accordance with London DataStore. For development of smart cities, Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities and also has one working group developing city indicators and another working group developing metrics for smart community infrastructures. However, in India, the Bureau of Indian Standards (BIS) has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area. Also, The Global Cities Institute (GCI) has undertaken a mission in the year 2015 to align with the Bureau of Indian Standards regarding development of standards of smart cities and also to forge relationships with Indian cities in light of ISO 37120. It can be said that India has currently not yet adopted international standards, but is in the process of developing national standards and adopting key international standards. Unlike other cities,which are adopting standards - national, ISO, or ITU, Indian cities are yet to adopt standards for regulation of the future smart cities.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Notes for India&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;India is in the nascent stages of developing smart cities across the country. Drawing from the practices adopted by cities across the world, smart cities in India should adopt strong regulatory and governance frameworks regarding technical standards, open data and data security and data protection policies. These policies will be essential in ensuring the sustainability and efficiency of smart cities while safeguarding individual rights. Some of these policies are already in place - such as India’s Open Data Policy and India’s data protection standards under section 43A of the ITA. It will be important to see how these policies are adopted and applied to the context of smart cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Smart Cities and Transparent Evolution, &lt;a href="http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf"&gt;http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; "Data, Data Everywhere." The Economist, February 25, 2010. Accessed March 17, 2016, &lt;a href="http://www.economist.com/node/15557443"&gt;http://www.economist.com/node/15557443&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; "Smart Cities." ISO. 2015. Accessed March 17, 2016, &lt;a href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november"&gt;http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Smart Nation Vision, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision"&gt;https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Smart Nation Platform, &lt;a href="https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf"&gt;https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/"&gt;https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;[11]&lt;/a&gt; Constitution of the Republic of Singapore (Responsibility of the Prime Minister) Notification 2015, &lt;a href="http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes"&gt;http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;[12]&lt;/a&gt; Personal Data Protection Singapore-Annual Report 2014-15, &lt;a href="https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf"&gt;https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;[13]&lt;/a&gt; Balancing Innovation and Personal Data Protection, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection"&gt;https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;[14]&lt;/a&gt; Department of Statistics Singapore- Free Access to More Data on the SingStat Website from 1 March 2015, &lt;a href="http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf"&gt;http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;[15]&lt;/a&gt; Singapore Marks 50th Birthday With Open Data Contest, &lt;a href="https://blog.hootsuite.com/singapore-open-data/"&gt;https://blog.hootsuite.com/singapore-open-data/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;[16]&lt;/a&gt; Virtual Singapore - a 3D city model platform for knowledge sharing and community collaboration, &lt;a href="http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx"&gt;http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;[17]&lt;/a&gt; Internet of Things (IoT) Standards Outline to Support Smart Nation Initiative Unveiled, &lt;a href="http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx"&gt;http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;[18]&lt;/a&gt; Information Technology Standards Committee, &lt;a href="https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc"&gt;https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc&lt;/a&gt; and &lt;a href="https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf"&gt;https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;[19]&lt;/a&gt; Government of Dubai-2021 Dubai Plan-Purpose, &lt;a href="http://www.dubaiplan2021.ae/the-purpose/"&gt;http://www.dubaiplan2021.ae/the-purpose/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20"&gt;[20]&lt;/a&gt; Government of Dubai-2021 Dubai Plan, &lt;a href="http://www.dubaiplan2021.ae/dubai-plan-2021/"&gt;http://www.dubaiplan2021.ae/dubai-plan-2021/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;[21]&lt;/a&gt; Smart Dubai, &lt;a href="http://www.smartdubai.ae/foundation_layers.php"&gt;http://www.smartdubai.ae/foundation_layers.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;[22]&lt;/a&gt; The Internet of Things: Connections for People’s happiness, &lt;a href="http://www.smartdubai.ae/story021002.php"&gt;http://www.smartdubai.ae/story021002.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;[23]&lt;/a&gt; Smart Dubai - Current State, &lt;a href="http://www.smartdubai.ae/current_state.php"&gt;http://www.smartdubai.ae/current_state.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;[24]&lt;/a&gt; Smart Dubai - District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;[25]&lt;/a&gt; See; &lt;a href="http://roadmap.smartdubai.ae/search-services-public.php"&gt;http://roadmap.smartdubai.ae/search-services-public.php&lt;/a&gt; and &lt;a href="http://roadmap.smartdubai.ae/search-initiatives-public.php"&gt;http://roadmap.smartdubai.ae/search-initiatives-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;[26]&lt;/a&gt; Smart Dubai-Smart District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;[27]&lt;/a&gt; Dubai Ruler issues new laws to further enhance the organisational structure and legal framework of Dubai Smart City, &lt;a href="https://www.wam.ae/en/news/emirates/1395288828473.html"&gt;https://www.wam.ae/en/news/emirates/1395288828473.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;[28]&lt;/a&gt; See: &lt;a href="http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439"&gt;http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439&lt;/a&gt; and &lt;a href="http://www.smartdubai.ae/dubai_data.php"&gt;http://www.smartdubai.ae/dubai_data.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;[29]&lt;/a&gt; Dubai first city to trial ITU key performance indicators for smart sustainable cities, &lt;a href="http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU"&gt;http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;[30]&lt;/a&gt; Smart Dubai Benchmark Report 2015 Executive Summary, &lt;a href="http://smartdubai.ae/bmr2015/methodology-public.php"&gt;http://smartdubai.ae/bmr2015/methodology-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;[31]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf"&gt;http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;[32]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;http://www1.nyc.gov/site/forward/innovations/smartnyc.page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;[33]&lt;/a&gt; One New York: The Plan for a Strong and Just City, &lt;a href="http://www1.nyc.gov/html/onenyc/about.html"&gt;http://www1.nyc.gov/html/onenyc/about.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;[34]&lt;/a&gt; Open Data for All, &lt;a href="http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf"&gt;http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;[35]&lt;/a&gt; 7 public projects that are turning New York into a “smart city”, &lt;a href="http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub"&gt;http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;[36]&lt;/a&gt; LinkNYC, &lt;a href="https://www.link.nyc/faq.html#privacy"&gt;https://www.link.nyc/faq.html#privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;[7]&lt;/a&gt; ANSI Network on Smart and Sustainable Cities, &lt;a href="http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3"&gt;http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;[38]&lt;/a&gt; IoT-Enabled Smart City Framework, &lt;a href="http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf"&gt;http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;[39]&lt;/a&gt; Smart London (UK) Plan: Digital Technologies, London and Londoners, &lt;a href="http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf"&gt;http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;[40]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;[41]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;[42]&lt;/a&gt; Open Data White Paper, &lt;a href="https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf"&gt;https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;[43]&lt;/a&gt; London Datastore-Privacy, &lt;a href="http://data.london.gov.uk/about/privacy/"&gt;http://data.london.gov.uk/about/privacy/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;[44]&lt;/a&gt; Future Cities Standards Centre in London, &lt;a href="https://eu-smartcities.eu/commitment/5937"&gt;https://eu-smartcities.eu/commitment/5937&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;[45]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;[46]&lt;/a&gt; Smart Cities background paper, October 2013, &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf"&gt;https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;[47]&lt;/a&gt; Presentation of 2015 Blueprint of Seoul as ‘State-of-the-art Smart City’, &lt;a href="http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/"&gt;http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;[48]&lt;/a&gt; “Policy Where There is Demand,” Seoul Utilizes Big Data, &lt;a href="http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/"&gt;http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;[49]&lt;/a&gt; Seoul’s “Owl Bus” Based on Big Data Technology, &lt;a href="http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf"&gt;http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;[50]&lt;/a&gt; Seoul Launches “Global Digital Seoul 2020”, &lt;a href="http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/"&gt;http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;[51]&lt;/a&gt; Smart Seoul 2015, &lt;a href="http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf"&gt;http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;[52]&lt;/a&gt; Disclosing public data through the Seoul Open Data Plaza, &lt;a href="http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/"&gt;http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;[53]&lt;/a&gt; Data protection in South Korea: overview, &lt;a href="http://uk.practicallaw.com/2-579-7926"&gt;http://uk.practicallaw.com/2-579-7926&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;[54]&lt;/a&gt;Smart Cities Seoul: a case study, &lt;a href="https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf"&gt;https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;[55]&lt;/a&gt; Smart Cities-ISO, &lt;a href="http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764"&gt;http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities'&gt;https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Kiran A. B., Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-11T13:29:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development">
    <title>Big Data Governance Frameworks for 'Data Revolution for Sustainable Development'</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development</link>
    <description>
        &lt;b&gt;A key component of the process to achieve the Sustainable Development Goals is the call for a global 'data revolution' to better understand, monitor, and implement development interventions. Recently there has been several international proposals to use big data, along with reconfigured national statistical systems, to operationalise this 'data revolution for sustainable development.' This analysis by Meera Manoj highlights the different models of collection, management, sharing, and governance of global development data that are being discussed.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;a href="#1"&gt;What are the Sustainable Development Goals?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; &lt;a href="#2"&gt;The Need for a Data Revolution&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;a href="#3"&gt;Big Data: Characteristics and Use for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; &lt;a href="#3-1"&gt;Characteristics of Big Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; &lt;a href="#3-2"&gt;Using Big Data for Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;a href="#4"&gt;Sustainable Development and Data Rights&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.&lt;/strong&gt; &lt;a href="#5"&gt;Governance Frameworks Proposed&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.1.&lt;/strong&gt; &lt;a href="#5-1"&gt;UN Sustainable Development Solutions Network&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.2.&lt;/strong&gt; &lt;a href="#5-2"&gt;The UN DATA Revolution Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.3.&lt;/strong&gt; &lt;a href="#5-3"&gt;Organization for Economic Co-Operation and Development&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.4.&lt;/strong&gt; &lt;a href="#5-4"&gt;The Global Partnership for Sustainable Development of Data&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.5.&lt;/strong&gt; &lt;a href="#5-5"&gt;The World Economic Forum (WEF)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.6.&lt;/strong&gt; &lt;a href="#5-6"&gt;Dr. Julia Lane - A Quadruple Data Helix&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.7.&lt;/strong&gt; &lt;a href="#5-7"&gt;Data Pop Alliance&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6.&lt;/strong&gt; &lt;a href="#6"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7.&lt;/strong&gt; &lt;a href="#7"&gt;Endnotes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;8.&lt;/strong&gt; &lt;a href="#8"&gt;Author Profile&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Speaking on Big Data, Dan Ariely commented that, "&lt;em&gt;Everyone talks about it, nobody really knows how to do it, and everyone thinks everyone else is doing it, so everyone claims they are doing it&lt;/em&gt;" &lt;strong&gt;[1]&lt;/strong&gt;. This offers a useful insight into the lack of adequate discourse on the kind of governance and accountability frameworks that are needed to facilitate the developmental, sustainable, and responsible uses of big data.&lt;/p&gt;
&lt;p&gt;In light of the recent international proposals to use big data to track the Sustainable Development Goals, this paper highlights the different models of management, sharing, and governance of data that are being discussed, and concurrently, how they conceptualise the various rights around big data and how are they to be protected.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="1"&gt;1. What are the Sustainable Development Goals?&lt;/h2&gt;
&lt;p&gt;The Sustainable Development Goals, otherwise known as the Global Goals, build on the Millennium Development Goals (MDGs). Adopted on 1 January 2016, these universally applicable 17 goals  of the 2030 Agenda for Sustainable Development, seek to end all forms of poverty, fight inequalities, tackle climate change and address a range of social needs like education, health, social protection and job opportunities over the next 15 years &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_un-sdg.png" alt="Sustainable Development Goals" /&gt;
&lt;h6&gt;Source: UN Data Revolution Group, &lt;em&gt;&lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;A World that Counts&lt;/a&gt;&lt;/em&gt;, 2014, p.12.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="2"&gt;2. The Need for a Data Revolution&lt;/h2&gt;
&lt;p&gt;An overwhelming cause of concern regarding the precursor to the SDGs, the MDGs, is the data unavailability to monitor their progress. For instance, the figure below indicates that there is no five-year period when the availability of MDG related data is more than 70% of what is required. Entire groups of people and key issues remain invisible &lt;strong&gt;[3]&lt;/strong&gt;. Lack of data is not only a problem for global statisticians, but also for people whose needs and demands remain invisible due to lack of quantitative representation of the same. For instance, the incidences of gender related crimes when not recorded could lead to a misconception on the achievement of the MDG of gender equality.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_undrg_mdg-data.png" alt="UN Stats - Percentage of MDG data currently available for developing countries by nature of source." /&gt;
&lt;h6&gt;Source: UN, &lt;a href="http://i0.wp.com/www.un.org/sustainabledevelopment/wp-content/uploads/2015/12/english_SDG_17goals_poster_all_languages_with_UN_emblem_1.png"&gt;Sustainable Development Goals&lt;/a&gt;.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;As the new goals (SDGs) cover a wider range of issues it is clear that a far higher level of detail is required. To this effect the High-Level Panel of Eminent Persons on the post-2015 agenda has called for a "data revolution for sustainable development" &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The world is experiencing a Data Revolution and a "data deluge." One estimate has it that 90% of the data in the world has been created in the last 2 years. As Eric Schmidt of Google in 2010 famously said, "&lt;em&gt;There were 5 exabytes of information created between the dawn of civilization through 2003, but that much information is now created every 2 days&lt;/em&gt; &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In its report &lt;em&gt;A World that Counts&lt;/em&gt;, the UN Data Revolution Group defines the data revolution as an explosion in the volume of data, the speed with which data are produced, the number of producers of data, the dissemination of data, and the range of things on which there is data, coming from new technologies such as mobile phones and the “internet of things”, and from other sources, such as qualitative data, citizen-generated data and perceptions data &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This data revolution in the context of sustainable development has been defined by the UN Secretary General’s Independent Expert Advisory Group (IEAG) as follows:&lt;/p&gt;
&lt;blockquote&gt;[T]he integration of data coming from new technologies with traditional data in order to produce relevant high‐quality information with more details and at higher frequencies to foster and monitor sustainable development. This revolution also entails the increase in accessibility to data through much more openness and transparency, and ultimately more empowered people for better policies, better decisions and greater participation and accountability, leading to better outcomes for the people and the planet &lt;strong&gt;[7]&lt;/strong&gt;.&lt;/blockquote&gt;
&lt;p&gt;The majority of such “data coming from new technologies” is what can be called big data. It  is data being generated in real-time, in high velocity and volume, in a variety of forms and formats, and on an increasing range of phenomenon that are being mediated by digital technologies – from governance to human communication. Further, a good part of such big data is not about the content of the phenomenon concerned but about its process – for example, Call Detail Records are generated for each mobile phone call a person makes and it contains data about the process of the call (time, location, duration, recipient, etc.) but not about the content of the call. Big data about various governmental and human processes are becoming a crucial instrument for documenting and monitoring of the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="3"&gt;3. Big Data: Characteristics and Use for Development&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Characteristics of Big Data&lt;/h3&gt;
&lt;p&gt;The simplest definition of big data is that it is a dataset of more than 1 petabyte. The US Bureau of Labour Statistics terms it to be non-sampled data, characterized by the creation of databases from electronic sources whose primary purpose is something other than statistical inference &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The characteristics which broadly distinguish Big Data are sometimes called the “3 V’s”: more volume, more variety and higher rates of velocity &lt;strong&gt;[9]&lt;/strong&gt;. Big data sources generally share some or all of these features &lt;strong&gt;[10]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Digitally generated,&lt;/li&gt;
&lt;li&gt;Passively produced,&lt;/li&gt;
&lt;li&gt;Automatically collected,&lt;/li&gt;
&lt;li&gt;Geographically or temporally trackable, and&lt;/li&gt;
&lt;li&gt;Continuously analysed.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Increasingly, Big Data is recognised as creating "new possibilities for international development" &lt;strong&gt;[11]&lt;/strong&gt;. It could provide faster, cheaper, more granular data and help meet growing and changing demands. It was claimed, for example, that "&lt;em&gt;Google knows or is in a position to know more about France than INSEE&lt;/em&gt;" &lt;strong&gt;[12]&lt;/strong&gt;, its highly resourceful national statistical agency. To illustrate, Global Pulse gives the example of a hypothetical small household facing soaring commodity prices, particularly food and fuel &lt;strong&gt;[13]&lt;/strong&gt;. They have the options of:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Getting part of their food at a nearby World Food Programme distribution centre,&lt;/li&gt;
&lt;li&gt;Reducing mobile usage,&lt;/li&gt;
&lt;li&gt;Temporarily taking their children out of school,&lt;/li&gt;
&lt;li&gt;Calling a health hotline when children show signs of malnutrition related diseases, and&lt;/li&gt;
&lt;li&gt;Venting about their frustration on social media.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Such a systemic shock of food insecurity will prompt thousands of households to react in roughly similar ways. These collective behavioural changes may show up in different digital data sources:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;WFP might record that it serves twice as many meals a day,&lt;/li&gt;
&lt;li&gt;The local mobile operator may see reduced usage,&lt;/li&gt;
&lt;li&gt;UNICEF data may indicate that school attendance has dropped,&lt;/li&gt;
&lt;li&gt;Health hotlines might see increased volumes of calls reporting malnutrition, and&lt;/li&gt;
&lt;li&gt;Tweets mentioning the difficulty to “afford food” might begin to rise.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Thus the power of real-time, digital data to predict paths for development is immense. Amassing such a large volume of data which tracks practically every aspect of social behavious can revolutionize the field of official statistics and policy making.&lt;/p&gt;
&lt;p&gt;Two points to be noted are: 1) all these data sources are not available for comparison in the real-time by default, so one task before using big data in developmental work is to make data from different sources available across agencies and make them comparable, and 2) finding repeating patterns within large data sets, sourced from varied origins, can not only allow for monitoring but also (statistically) predicting future possibilities and implications for development action.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Using Big Data for Development&lt;/h3&gt;
&lt;p&gt;There are several international organizations attempting to use such data.&lt;/p&gt;
&lt;p&gt;Global Pulse, a United Nations initiative, launched by the Secretary-General in 2009, seeks to leverage innovations in digital data, rapid data collection and analysis to help decision-makers gain a real-time understanding of how crises impact vulnerable populations. To this end, Global Pulse is establishing an integrated, global network of Pulse Labs, anchored in Pulse Lab New York, to pilot the approach at country level &lt;strong&gt;[14]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The Global Working Group on Big Data for Official Statistics, created in May 2014, pursuant to Statistical Commission, makes an inventory of ongoing activities and examples regarding the use of big data, addresses concerns related to methodology, human resources, quality and confidentiality, and develops guidelines on classifying various types of big data sources &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There have been applications even on a national and individual level. For instance, in 2013, various sources reported that the CIA had admitted to the “full monitoring of Facebook, Twitter, and other social networks” to identify links between events and sequences or paths leading to national security threats, ultimately leading to forecasting future activities and events &lt;strong&gt;[16]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In the field of conflict prevention is the emerging applications to map and analyse unstructured data generated by politically active Internet use by academics, activists, civil society organizations, and even general citizens. In reference to Iran’s post-election crisis beginning in 2009, it is possible to detect web-based usage of terms that reflect a general shift from awareness towards mobilization, and eventually action within the population &lt;strong&gt;[17]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The "Big Data, Small Credit" report proposes that financial inclusion can be promoted by allowing consumers with mobile phones to access credit formally as customers &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;At a national level, the biggest challenge for most big data projects is the limited or restricted access the government agencies have to potential big data sets owned by the private sector &lt;strong&gt;[19]&lt;/strong&gt;. The overall consensus is that Big Data to track SDGs must complement traditional data sources &lt;strong&gt;[20]&lt;/strong&gt;. This is because big data may not always be available for the entire population, or include a diverse enough sample of the population. Moreover most big data projects measure development indicators through a correlation which may not always be correct unlike official data. For instance big data might help in predicting lowered household income through reducing mobile bills while traditional data directly collects income statistics.&lt;/p&gt;
&lt;p&gt;In a survey by the Global Working Group on Big Data for Official Statistics &lt;strong&gt;[21]&lt;/strong&gt;, it was found that only a few countries have developed a long-term vision for the use of big data, while many are formulating a big data strategy.  Most countries have not yet defined business processes for integrating big data sources and results into their work and do not have a defined structure for managing big data projects.&lt;/p&gt;
&lt;p&gt;Thus there exists a need to identify a governance framework for big data for sustainable development, not only at national level, but also at the international level.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="4"&gt;4. Sustainable Development and Data Rights&lt;/h2&gt;
&lt;p&gt;Any discussion on governance frameworks would be incomplete without defining the kind of data rights they must seek to protect.&lt;/p&gt;
&lt;p&gt;In the famous parable of the six blind men and the elephant they conclude that the elephant is like a wall, snake, spear, tree, fan or rope, depending upon where they touch. Similarly Internet experiences of individual users (what they touch) often contrast drastically with different views (what they conclude) on what would constitute data rights.&lt;/p&gt;
&lt;p&gt;The IEAG in its report has identified the following set of data related rights, but has not defined any actual framework or process for ensuring them (yet) &lt;strong&gt;[22]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Right to be counted,&lt;/li&gt;
&lt;li&gt;Right to an identity,&lt;/li&gt;
&lt;li&gt;Right to privacy and to ownership of personal data,&lt;/li&gt;
&lt;li&gt;Right to due process (for example when data is used as evidence in proceedings, or in administrative decisions),&lt;/li&gt;
&lt;li&gt;Freedom of expression,&lt;/li&gt;
&lt;li&gt;Right to participation,&lt;/li&gt;
&lt;li&gt;Right to non-discrimination and equality, and&lt;/li&gt;
&lt;li&gt;Principles of consent.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Personal data is broadly defined as "&lt;em&gt;any information relating to an identified or identifiable individual&lt;/em&gt;" &lt;strong&gt;[23]&lt;/strong&gt;. Often primary data producers (users of services and devices generating data) are unaware of individual privacy infringements &lt;strong&gt;[24]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A survey by the Global Working Group on Big Data for Official Statistics found that only a few countries have a specific privacy framework for big data, while most apply the privacy framework for traditional statistics to big data as well &lt;strong&gt;[25]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Conventionally, safeguards against the re-use of big data to protect data rights have involved the “anonymization” or “de-identification” of data, to conceal individual identities. Global Pulse, for instance, is putting forth the concept of Data Philanthropy, whereby "&lt;em&gt;corporations take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for insights, patterns and trends in real-time or near real-time&lt;/em&gt;" &lt;strong&gt;[26]&lt;/strong&gt;. There however exists a debate on whether data can actually be anonymized effectively. Several state that data can never be effectively de-anonymized due to technological challenges &lt;strong&gt;[27]&lt;/strong&gt;. For instance, when the New York City government released de-anonymised data sets of New York cab drivers were made re-identifiable by approaching a separate method. Within less than 2 hours work, researchers knew which driver drove every single trip in this entire dataset. It would be even be easy to calculate drivers’ gross income, or infer where they live &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Even the OECD opines that the current model of limiting identifiability of individuals is unsustainable. It recommends moving towards one where the focus is on transparency around how data is being used, rather than preventing specific types of use, stating that - "&lt;em&gt;research funding agencies and data protection authorities should collaborate to develop an internationally recognized framework code of conduct covering the use of new forms of personal data, particularly those generated via network communication. This framework, built on best practice procedures for consent from data subjects, data sharing and re-use, anonymization methods, etc., could be adapted as necessary for specific national circumstances&lt;/em&gt;" &lt;strong&gt;[29]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Thus, there is a push for the arguement that the historical approaches to protecting privacy and confidentiality — namely, &lt;em&gt;informed consent&lt;/em&gt; and &lt;em&gt;anonymity&lt;/em&gt; — no longer hold &lt;strong&gt;[30]&lt;/strong&gt;. Some have even suggested using big data itself to keep track of user permissions for each piece of data to act as a legal contract &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;There is an overall consensus that any legal or regulatory mechanisms set up to mobilise the 'data revolution for sustainable development' should protect the data rights of the people &lt;strong&gt;[32]&lt;/strong&gt;, without any clear agreement on what these rights may be.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="5"&gt;5. Governance Frameworks Proposed&lt;/h2&gt;
&lt;p&gt;A largely unanswered question that is posed in light of the emerging consensus on the use of Big Data for monitoring SDGs is within what sort of governance frameworks these data collection and analysis methods will operate. Methods of collection and the key actors involved in data analysis, management, storage and coordination. The role of NGOs and CSOs, if any, within these systems must be delineated. Certain key global organizations and eminent researchers have suggested the following models.&lt;/p&gt;
&lt;h3 id="5-1"&gt;5.1. UN Sustainable Development Solutions Network&lt;/h3&gt;
&lt;p&gt;In 2012, the UN Secretary-General launched the UN Sustainable Development Solutions Network (SDSN) to mobilize global scientific and technological expertise to promote practical problem solving for sustainable development, including the design and implementation of the Sustainable Development Goals (SDGs) &lt;strong&gt;[33]&lt;/strong&gt;. It has proposed the following.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Inter-Agency and Expert Group on Sustainable Development Goal Indicators (IAEGSDG) and the United Nations Statistical Commission are to establish roadmaps for strengthening specific data collection tools that enable the monitoring of SDG indicators.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Based on discussions with a large number of statistical offices, including Eurostat, BPS Indonesia, the OECD, the Philippines, the UK, and many others, 100 is recommended to be the maximum number of global indicators to analyse data for which NSOs can report and communicate effectively in a harmonized manner. This conclusion was strongly endorsed during the 46th UN Statistical Commission and the Expert Group Meeting on SDG indicators &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Specialist indicators developed by thematic communities must be used for data analysis as they include input and process metrics that are helpful complements to official indicators, which tend to be more outcome-focused. For example, the UN Inter-Agency Group on Child Mortality Estimation has developed a specialist hub responsible for analysing, checking, and improving mortality estimation. This is a leading source for child morality information for both governments and non-governmental actors &lt;strong&gt;[35]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Research arms of private companies such as Microsoft Research, IBM research, SAS, and R&amp;amp;D arms of telecom companies could directly partner with official statistical systems to share sophisticated analysing techniques &lt;strong&gt;[36]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Four levels of monitoring, national, regional, global, and thematic, should be "&lt;em&gt;organized in an integrated architecture&lt;/em&gt;" &lt;strong&gt;[37]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Countries must decide individually whether official data must be complemented with non-official indicators from big data which can add richness to the monitoring of the SDGs.&lt;/p&gt;
&lt;p&gt;Where possible, regional monitoring should build on existing regional mechanisms, such as the Regional Economic Commissions, the Africa Peer Review Mechanism, or the Asia-Pacific Forum on Sustainable Development &lt;strong&gt;[38]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To coordinate thematic monitoring under the SDGs, each thematic initiative may have one or more lead specialist agencies or “custodians” as per the IAEG-MDG monitoring processes. Lead agencies would be responsible for convening multi-stakeholder groups, compiling detailed thematic reports, and encouraging ongoing dialogues on innovation. These thematic groups can become testing grounds in launching a data revolution for the SDGs, trialling new measurements and metrics that in time can feed into the global monitoring process with annual reports &lt;strong&gt;[39]&lt;/strong&gt;.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_unsdsn_monitoring.png" alt="UN Sustainable Development Solutions Network - Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring." /&gt;
&lt;h6&gt;Schematic illustration with explanation of the indicators for national, regional, global, and thematic monitoring.&lt;br /&gt;Source: UN Sustainable Development Solutions Network, &lt;em&gt;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a Data Revolution for the SDGs&lt;/a&gt;&lt;/em&gt;, 2015, p.3.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Monitoring the SDG agenda will require substantive improvements in national statistical capacity. Assessments of existing capacity to fulfil SDG monitoring expectations must be undertaken and needs be integrated into National Strategies for the Development of Statistics (NSDSs) &lt;strong&gt;[40]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A Global Partnership for Sustainable Development Data must be established and a World Forum on Sustainable Development Data be convened in 2016 to create mechanisms for ongoing collaboration and innovation.&lt;/p&gt;
&lt;p&gt;A high-level, powerful group of businesses and states must convene the various data and transparency sustainable development initiatives under one umbrella.&lt;/p&gt;
&lt;p&gt;To ensure comparability, Global Monitoring Indicators must be harmonized across countries by one lead technical or specialist agency which will additionally coordinate data standards and collection and provide technical support.&lt;/p&gt;
&lt;p&gt;The following table indicates the suggested Lead Agencies for individual SDGs &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Number&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sustainable Development Goal&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lead Agencies&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;No Poverty&lt;/td&gt;
&lt;td&gt;World Bank, UNDP, UNSD, UNICEF, ILO, FAO, UN-Habitat, UNISDR, WHO, CRED, UNFPA, and UN Population Division&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;No Hunger&lt;/td&gt;
&lt;td&gt;FAO, WHO, UNICEF, and Internal Fertilizer Industry Associaton (IFA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Good Health&lt;/td&gt;
&lt;td&gt;WHO, UN Population Division, UNICEF, World Bank, GAVI, UN AIDS, and UN-Habitat&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;Quality Education&lt;/td&gt;
&lt;td&gt;UNESCO, UNICEF, and World Bank&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Gender Equality&lt;/td&gt;
&lt;td&gt;UNICEF, UN Women, WHO, UNSD, ILO, UN Population Division, and UNFPA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Clean Water and Sanitation&lt;/td&gt;
&lt;td&gt;WHO/UNICEF Joint Monitoring Programme (JMP), FAO, UN Water, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;Renewable Energy&lt;/td&gt;
&lt;td&gt;Sustainable Energy for All, IEA, WHO, World Bank, and UNFCC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;Good Jobs and Economic Growth&lt;/td&gt;
&lt;td&gt;IMF, World Bank, UNSD, and ILO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;Innovation and Infrastructure&lt;/td&gt;
&lt;td&gt;World Bank, OECD, UNIDO, UNFCC, UNESCO, and ITU&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;Reduced Inequalities&lt;/td&gt;
&lt;td&gt;UNSD, World Bank, and OECD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;Sustainable Cities and Communities&lt;/td&gt;
&lt;td&gt;UN-Habitat, Global City Indicators Facility, WHO, CRED, UNISDR, FAO, and UNEP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.&lt;/td&gt;
&lt;td&gt;Responsible Consumption&lt;/td&gt;
&lt;td&gt;EITI, UNCTAD, UN Global Compact, FAO, UNEP Ozone Secretariat, WBCSD, GRI, IIRC, and Global Compact&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.&lt;/td&gt;
&lt;td&gt;Climate Action&lt;/td&gt;
&lt;td&gt;OECD DAC, UNFCCC, and IEA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.&lt;/td&gt;
&lt;td&gt;Life below Water&lt;/td&gt;
&lt;td&gt;UNEP-WCMC, IUCN, and FMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.&lt;/td&gt;
&lt;td&gt;Life on Land&lt;/td&gt;
&lt;td&gt;FAO, UNEP, IUCN, and UNEP- WCMC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.&lt;/td&gt;
&lt;td&gt;Peace and Justice&lt;/td&gt;
&lt;td&gt;UNODC, WHO, UNOCHA, UNCHR, IOM, OCHA, OECD, UN Global Compact, EITI, UNCTAD, UNICEF, UNESCO, and Transparency International&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.&lt;/td&gt;
&lt;td&gt;Partnership for the Goals&lt;/td&gt;
&lt;td&gt;BIS, IASB, IFRS, IMF, WIPO, WTO, UNSD, OECD, World Bank, OECD DAC, and SDSN&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="5-2"&gt;5.2. The UN DATA Revolution Group&lt;/h3&gt;
&lt;p&gt;The group constituted by the UN Secretary-General Ban Ki-moon in August 2014, is an Independent Expert Advisory Group with the aim of making concrete recommendations on bringing about a 'data revolution for sustainable development' &lt;strong&gt;[42]&lt;/strong&gt;. In its report, &lt;em&gt;A World that Counts&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Clear standards on data collection methods must be developed based on the UN Fundamental Principles of Official Statistics. Periodic audits must be conducted by professional and independent third parties to ensure data quality.&lt;/p&gt;
&lt;p&gt;Governments, civil society, academia and the philanthropic sector must work together strengthening statistical literacy so that all people have capacity to input into and evaluate the quality of data.&lt;/p&gt;
&lt;p&gt;Social entrepreneurs, private sector, academia, media, civil society and other individuals and institutions must be engaged globally with incentives (prizes, data challenges) to encourage data sharing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A SDGs Analysis and Visualisation Platform is to be set up for fostering private-public partnerships and community-led peer-production efforts for data analysis.&lt;/p&gt;
&lt;p&gt;A dashboard on ”the state of the world” will engage the UN, think-tanks, academics and NGOs in analysing, and auditing data.&lt;/p&gt;
&lt;p&gt;Academics and scientists are to analyse data to provide long-term perspectives, knowledge and data resources at all levels.&lt;/p&gt;
&lt;p&gt;The “Global Forum of SDG-Data Users” will ensure feedback loops between data producers, processors and users to improve the usefulness of data and information produced.&lt;/p&gt;
&lt;p&gt;A “SDGs data lab” to support the development of a first wave of SDG indicators is to be established mobilizing key public, private and civil society data providers, academics and stakeholders working with the Sustainable Development Solutions Network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Storage&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A “world statistics cloud” will store data and metadata produced by different institutions but according to common standards, rules and specifications.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Civil society organisations must share data and processing methods with private and public counterparts on the basis of agreements. They must hold governments and companies accountable using evidence on the impact of their actions, provide feedback to data producers, develop data literacy and help communities and individuals generate and use data.&lt;/p&gt;
&lt;p&gt;NSOs are the central players of the Data Revolution. Their autonomy must be strengthened to maintain data quality.  They must abandon expensive and cumbersome production processes, incorporate new data sources like big data that is human and machine-readable, compatible with geospatial information systems and available quickly enough to ensure that the data cycle matches the decision cycle. Collaborations with the private sector can boost technical and financial investments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Key stakeholders must create a “Global Consensus on Data”, to adopt principles concerning legal, technical, privacy, geospatial and statistical standards. Best practices related to public data such as the Open Government Partnership (OGP) and the G8 Open Data Charter are recommended foundations for such principles.&lt;/p&gt;
&lt;p&gt;A UN-led “Global Partnership for Sustainable Development Data” is proposed, to coordinate and broker key global public-private partnerships for data sharing &lt;strong&gt;[44]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A “World Forum on Sustainable Development Data” and “Network of Data Innovation Networks” will be a converging point for the data ecosystem to share ideas and experiences for improvements, innovation and technology transfer.&lt;/p&gt;
&lt;h3 id="5-3"&gt;5.3. Organization for Economic Co-Operation and Development (OECD)&lt;/h3&gt;
&lt;p&gt;The Organisation for Economic Co-operation and Development (OECD) is an inter-governmental organization that seeks to promote policies that will improve the economic and social well-being of people globally. It has made the following proposals &lt;strong&gt;[45]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data is to be collected from National statistical agencies, national and international researchers and international organisations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By leveraging the expertise of telecommunications companies and software developers, for instance, national statistical systems could potentially reduce costs and improve the availability of data to monitor development goals &lt;strong&gt;[46]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;National Data Forums for Social Science Data must be created for the development of social science data for  improved coordination between social scientists, data producers (national statistical agencies, government departments, large private sector businesses and sources undertaking academic direction), and data curators.&lt;/p&gt;
&lt;p&gt;Social science research communities must contribute to national plans of action after a needs assessment &lt;strong&gt;[47]&lt;/strong&gt;. Research funding agencies must collaborate at the international level for a common system for referencing datasets in research publications &lt;strong&gt;[48]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="5-4"&gt;5.4. The Global Partnership for Sustainable Development of Data&lt;/h3&gt;
&lt;p&gt;The partnership is a global network of governments, NGOs, and businesses working to strengthen the inclusivity, trust, and innovation in the way that data is used to address the world’s sustainable development efforts &lt;strong&gt;[49]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There must be a common framework for information processing. At minimum, a simple lexicon must tag each datum specifying:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;What:&lt;/strong&gt; i.e. the type of information contained in the data,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Who:&lt;/strong&gt; the observer or reporter,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How:&lt;/strong&gt; the channel through which the data was acquired,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;How much:&lt;/strong&gt; whether the data is quantitative or qualitative, and&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Where and when:&lt;/strong&gt; the spatio-temporal granularity of the data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Analysis of data involves filtering relevant information, summarising keywords and categorising into indicators. This intensive mining of socioeconomic data, known as “reality mining,” can be done by: (1) Continuous analysis of real time streaming data, (2) Digestion of semi-structured and unstructured data to determine perceptions, needs and wants. (3) Real-time correlation of streaming data with slowly accessible historical data repositories.&lt;/p&gt;
&lt;p&gt;Use of big data for developmental goals can draw upon all three techniques to various degrees depending on availability of data and the specific needs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;NSOs have a pivotal part to play in the data revolution. Countries and organizations believe that big data cannot replace traditional official statistical data as it is based more on perception than facts. To quote Winston Churchill, "&lt;em&gt;Do not trust any statistics that you did not fake yourself&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;For instance, a study found that Google Flu Trends, to detect influenza epidemics, predicted nonspecific flu-like respiratory illnesses well but not actual flu. The mismatch was due to popular misconceptions on influenza symptoms. This has important policy implications. Doctors using Google Flu Trends may overstock on flu vaccines or be overly inclined to diagnose normal respiratory illnesses as influenza &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;However Big Data if understood correctly, can inform where further targeted investigation is necessary and give immediate responses to favourably change outcomes.&lt;/p&gt;
&lt;h3 id="5-5"&gt;5.5. The World Economic Forum (WEF)&lt;/h3&gt;
&lt;p&gt;The WEF is an International Organization for Public-Private Cooperation. It engages the foremost political, business and other leaders of society to shape global, regional and industry agendas &lt;strong&gt;[51]&lt;/strong&gt;. In the report titled &lt;em&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/em&gt;, it makes the following recommendations &lt;strong&gt;[52]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data production and development actors include individuals, public sector and the private sector. Each produce different kinds of data that have unique requirements. The private sector maintains vast troves of transactional data, much of which is "data exhaust," or data created as a by-product of other transactions. The public sector maintains enormous datasets in the form of census data, health indicators, and tax and expenditure information. The following figure highlights the different kinds of data that each sector collects and what incentives they have to share the data along with requirements to maintain such data.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_01.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Data Commons.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.4.&lt;br /&gt;&lt;/h6&gt;
&lt;p&gt;Business models must be created to provide the appropriate incentives for private-sector actors to share data. Such models already exist in the Internet environment. For instance companies in search and social networking profit from products they offer at no charge to end users because the usage data these products generate is valuable to other ecosystem actors. Similar models could be created in garnering Big Data for SDGs. The following flowchart illustrates how different sectors must work together to incentivise data collection and sharing.&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/big-data-gov-framework_wef_02.png" alt="" /&gt;
&lt;h6&gt;World Economic Forum - Diagram on Global Coordination.&lt;br /&gt;
Source: World Economic Forum, &lt;em&gt;&lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;Big Data, Big Impact: New Possibilities for International Development&lt;/a&gt;&lt;/em&gt;, 2012, p.7.&lt;br /&gt;&lt;/h6&gt;
&lt;h3 id="5-6"&gt;5.6. Dr. Julia Lane - A Quadruple Data Helix&lt;/h3&gt;
&lt;p&gt;Dr. Julia Lane is a Professor in the Wagner School of Public Policy at New York University; and also a Provostial Fellow in Innovation Analytics and a Professor in the Center for Urban Science and Policy &lt;strong&gt;[53]&lt;/strong&gt;. She has done extensive research on the uses of big data. In her paper titled "Big Data for Public Policy: A Quadruple Data Helix," she makes the following suggestions &lt;strong&gt;[54]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the future there will exist a model of a quadruple data helix for data collection which will have four strands — state and city agencies, universities, private data providers, and federal agencies.i&lt;/p&gt;
&lt;p&gt;A new set of institution, city/university data facilities, must be established. These institutions should form the backbone of the quadruple helix, with direct connections to the private sector and to the federal statistical agencies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is a need for graduate training for non-traditional students, who need to understand how to use data science tools as part of their regular employment. They must identify and capture the appropriate data, understand how data science models and tools can be applied, and determine how associated errors and limitations can be identified from a social science perspective.i&lt;/p&gt;
&lt;p&gt;Universities can act as a trusted independent third party to process, store, analyze, and disseminate data. ii&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Management&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The new infrastructure must ensure that data from disparate sources are collected managed and used in a manner that is informed by end users. There are many technical challenges: disparate data sets must be ingested, their provenance determined, and metadata documented. Researchers must be able to query data sets to know what data are available and how they can be used. And if data sets are to be joined, they must be joined in a scientific manner, which means that workflows need to be traced and managed in such a way that the research can be replicated.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The role of State and City agencies is to address immediate policy issues, rather than to build long-term data infrastructures as their mandate is to work with city data than the full spectrum of available data.&lt;/p&gt;
&lt;h3 id="5-7"&gt;5.7. Data-Pop Alliance&lt;/h3&gt;
&lt;p&gt;Data-Pop Alliance is a global coalition on Big Data and development created by the Harvard Humanitarian Initiative, MIT Media Lab, and Overseas Development Institute that brings together researchers, experts, practitioners, and activists to promote a people-centred big data revolution through collaborative research, capacity building, and community engagement &lt;strong&gt;[55]&lt;/strong&gt;. It makes the following suggestions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The idea of &lt;em&gt;shared responsibility&lt;/em&gt; between the public and private sector is a proposed operational principles to create a deliberative space. Mechanisms and legal frameworks must be devised for private companies to share their big data under formalized and stable arrangements instead of being compelled by ad hoc requests from researchers and policymakers.&lt;/p&gt;
&lt;p&gt;The media too, could avoid publishing statistical data collected by unexplained methodologies by employing "statistical editors" and disseminate verified information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For official statistics, engaging with Big Data is not a technical consideration but a political obligation. In a two tier system of official and non-official statistics, the public and investors tend to distrust official figures. For instance, the results of the 2010 census in the UK are being disputed on the basis of sewage data.&lt;/p&gt;
&lt;p&gt;It is imperative for NSOs to retain, or regain, their primary role as the legitimate custodian of knowledge and creator of a deliberative public space to democratically drive human development &lt;strong&gt;[56]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="6"&gt;6. Conclusion&lt;/h2&gt;
&lt;p&gt;The Big data frameworks provide some useful insights on monitoring mechanisms though some questions remain unanswered in each model. Key actors that have been proposed include city and state agencies like NSOs, private companies, social scientists, private individuals and international research agencies. Data analysis can be through public-private collaborations, data philanthropy, and using indicators by thematic communities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Collection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There appears consensus across models that collection must be effected through public private partnerships while providing incentives.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Analysis&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While several methods of analysis have been proposed by the Global Partnership it is unclear on who will be conducting the analysis. The UNSDSN has suggested that it be conducted by academics and scientists with Julia Lane stating it must be through public private partnerships which appear more feasible and transparent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role of NSOs&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All frameworks agree on the pivotal role of NSOs and acknowledge them as the key players and coordinators at the national level. They must be strengthened financially, technologically and politically. Most frameworks seek to empower national agencies which will coordinate collaborations with the private sector through incentives while protecting personal data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Coordination&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Several international fora have been proposed to enable coordination while there is consensus that the NSOs. A Global Partnership for Sustainable Development Data, a Global Consensus on Data and a World Forum on Sustainable Development Data have been suggested. UN organizations appear to be suggesting more responsibility for those in the UN framework with UNSDSN giving an extensive list of lead agencies (UNDP, UN Women, Who etc) while the WEF emphasises on the private sector, Data Pop Alliance on NSOs, and Prof. Lane on State and City agencies.&lt;/p&gt;
&lt;p&gt;On an international level countries can opt to join international organization that are being setup for the purpose. It remains to be seen whether all countries globally can achieve such a feat in a coordinated manner without infringing on data rights when unanswerable to any set international organization. The burden appears to fall on civil society and market forces within the private sector to regulate this process. For instance when a private sector company starts providing large un-anonymized data sets for government use, the privacy concerns of civil society that result in them opting for the company’s competitor’s more privacy friendly products will result in a regulation through market forces. However these forces may have disparate strengths in different contexts and countries depending on market practices and information asymmetry resulting in the lack of a uniform accountability mechanism.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="7"&gt;7. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Dan Ariely, Facebook, January 06, 2013, &lt;a href="https://www.facebook.com/dan.ariely/posts/904383595868"&gt;https://www.facebook.com/dan.ariely/posts/904383595868&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; United Nations Organizations,&amp;nbsp;'Sustainable Development Goals'&amp;nbsp;(United Nations Sustainable Development,&amp;nbsp;26 September 2015), &lt;a href="http://www.un.org/sustainabledevelopment/sustainable-development-goals/"&gt;http://www.un.org/sustainabledevelopment/sustainable-development-goals/&lt;/a&gt;,&amp;nbsp;accessed 6 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Data Revolution Group,&amp;nbsp;'A World that Counts: Mobilising the Data Revolution for Sustainable Development'&amp;nbsp;(November 2014), &lt;a href="http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf"&gt;http://www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; High level panel on the post-2015 development agenda ,&amp;nbsp;'A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development'(Post2015hlp,0rg,&amp;nbsp;July 2012),&amp;nbsp;&lt;a href="http://www.post2015hlp.org/"&gt;http://www.post2015hlp.org/&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Gary King,&amp;nbsp;'Ensuring the Data-Rich Future of the Social Sciences' [2011] 3(2) Science,&amp;nbsp;&lt;a href="http://gking.harvard.edu/files/datarich.pdf"&gt;http://gking.harvard.edu/files/datarich.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Michael Horrigan,&amp;nbsp;'Big Data: A Perspective from the BLS'&amp;nbsp;(Amstatorg,&amp;nbsp;1 January 2013) &lt;a href="http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/"&gt;http://magazine.amstat.org/blog/2013/01/01/sci-policy-jan2013/&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; UN Global Pulse,&amp;nbsp;'Big Data for Development: Challenges &amp;amp; Opportunities'&amp;nbsp;(6 May 2012) &lt;a href="http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf"&gt;http://www.unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Emmanuel Letouzé and Johannes Jütting, 'Official Statistics, Big Data and Human Development: Towards a New Conceptual and Operational Approach' (2014) 12(3), Data-Pop Alliance White papers Series, &lt;a href="https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf"&gt;https://www.odi.org/sites/odi.org.uk/files/odi-assets/events-documents/5161.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; See &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; UN Global Pulse, 'About: United Nations Global Pulse' (2016) &lt;a href="http://www.unglobalpulse.org/about-new"&gt;http://www.unglobalpulse.org/about-new&lt;/a&gt;, accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; UN Stats, 'Global Working Group' (2014) &lt;a href="http://unstats.un.org/unsd/bigdata/"&gt;http://unstats.un.org/unsd/bigdata/&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; New York City Press Release, ‘Mayor Bloomberg, Police Commissioner Kelly and Microsoft Unveil New, State-of-the-Art Law Enforcement Technology that Aggregates and Analyzes Existing Public Safety Data in Real Time to Provide a Comprehensive View of Potential Threats and Criminal Activity’ (New York City, 8 August 2012), &lt;a href="http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law"&gt;http://www1.nyc.gov/office-of-the-mayor/news/291-12/mayor-bloomberg-police-commissioner-kelly-microsoft-new-state-of-the-art-law&lt;/a&gt;, accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Francesco Mancini,&amp;nbsp;'New Technology and the Prevention of Violence and Conflict'&amp;nbsp;(Reliefwebint,&amp;nbsp;April 2013),&amp;nbsp;&lt;a href="http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf"&gt;http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Arjuna Costa, Anamitra Deb, and Michael Kubzansky, 'Big Data, Small Credit: The Digital Revolution and Its Impact on Emerging Market Consumers,'&amp;nbsp;(Omidyar,&amp;nbsp;3 March 2013) &lt;a href="https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf"&gt;https://www.omidyar.com/sites/default/files/file_archive/insights/Big%20Data,%20Small%20Credit%20Report%202015/BDSC_Digital%20Final_RV.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; United Nations Economic and Social Council, 'Report of the Global Working Group on Big Data for Official Statistics' (UN Stats, 3 March 2015), &lt;a href="http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf"&gt;http://unstats.un.org/unsd/statcom/doc15/2015-4-BigData-E.pdf&lt;/a&gt;, accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; OECD, 'OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data' (23 September 1980), &lt;a href="http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm"&gt;http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/a&gt;, accessed 29 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Amir Efrati, ''Like' Button Follows Web Users' (WSJ, 18 May 2011) &lt;a href="http://www.wsj.com/articles/SB10001424052748704281504576329441432995616"&gt;http://www.wsj.com/articles/SB10001424052748704281504576329441432995616&lt;/a&gt;, accessed 23 May 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; See &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Robert Kirkpatrick,&amp;nbsp;'Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience' (UN Global Pulse, 16 September 2011), &lt;a href="http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience"&gt;http://www.unglobalpulse.org/blog/data-philanthropy-public-private-sector-data-sharing-global-resilience&lt;/a&gt;,&amp;nbsp;accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; Arvind Narayanan,&amp;nbsp;'No silver bullet: De-identification still doesn't work' (1 April 2016),&amp;nbsp;&lt;a href="http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf"&gt;http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 July 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives,'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; S. Barocas,&amp;nbsp;'The Limits of Anonymity and Consent in the Big Data Age,'&amp;nbsp;in&amp;nbsp;&lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt;&amp;nbsp;(Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; A. Pentland,&amp;nbsp;'Institutional Controls: The New Deal on Data,'&amp;nbsp; in &lt;em&gt;Privacy, Big Data, and the public good: Frameworks for Engagement&lt;/em&gt; (Cambridge University Press, 2014).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'About Us: Vision and Organization'&amp;nbsp;(2012)&amp;nbsp;&lt;a href="http://unsdsn.org/about-us/vision-and-organization/"&gt;http://unsdsn.org/about-us/vision-and-organization/&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Indicators and a Monitoring Framework for the Sustainable Development Goals: Launching a data revolution for the SDGs' (12 June 2015) &lt;a href="http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/05/150612-FINAL-SDSN-Indicator-Report1.pdf&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; UNICEF,&amp;nbsp;'CME Info - Child Mortality Estimates' (2014) &lt;a href="http://www.childmortality.org/"&gt;http://www.childmortality.org/&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; UNESCO,&amp;nbsp;'Technical report by the Bureau of the United Nations Statistical Commission (UNSC) on the process of the development of an indicator framework for the goals and targets of the post-2015 development agenda' (6 March 2015)&amp;nbsp;&lt;a href="http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf"&gt;http://www.uis.unesco.org/ScienceTechnology/Documents/unsc-post-2015-draft-indicators.pdf&lt;/a&gt;, accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; UN, 'The Road to Dignity by 2030: Ending Poverty, Transforming All Lives and Protecting the Planet '&amp;nbsp;(4 December 2014) &lt;a href="http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf"&gt;http://www.un.org/disabilities/documents/reports/SG_Synthesis_Report_Road_to_Dignity_by_2030.pdf&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; UN Sustainable Development Solutions Network,&amp;nbsp;'Data for Development: An Action Plan to Finance the Data Revolution for Sustainable Development'&amp;nbsp;(10 July 2015)&amp;nbsp;&lt;a href="http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf"&gt;http://unsdsn.org/wp-content/uploads/2015/04/Data-For-Development-An-Action-Plan-July-2015.pdf&lt;/a&gt;,&amp;nbsp;accessed 3 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; See &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; UN Data Revolution Group,&amp;nbsp;'About the Independent Expert Advisory Group'&amp;nbsp;(6 November 2014) &lt;a href="http://www.undatarevolution.org/about-ieag/"&gt;http://www.undatarevolution.org/about-ieag/&lt;/a&gt;, accessed 4 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; See &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; The Partnership has already been established, and it is developing a further framework.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[45]&lt;/strong&gt; Organisation for Economic Co-Operation and Development),&amp;nbsp;'The Organisation for Economic Co-operation and Development (OECD): About' (2016) &lt;a href="http://www.oecd.org/about/"&gt;http://www.oecd.org/about/&lt;/a&gt;, accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[46]&lt;/strong&gt; Organisation for Economic Co-Operation and Development,&amp;nbsp;'Strengthening National Statistical Systems to Monitor Global Goals' (2015) &lt;a href="http://www.oecd.org/dac/POST-2015%20P21.pdf"&gt;http://www.oecd.org/dac/POST-2015%20P21.pdf&lt;/a&gt;, accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[47]&lt;/strong&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[48]&lt;/strong&gt; OECD Global Science Forum,&amp;nbsp;'New Data for Understanding the Human Condition: International Perspectives'&amp;nbsp;(February 2013)&amp;nbsp;&lt;a href="http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf"&gt;http://www.oecd.org/sti/sci-tech/new-data-for-understanding-the-human-condition.pdf&lt;/a&gt;,&amp;nbsp;accessed 2 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[49]&lt;/strong&gt; The Global Partnership On Sustainable Development Data,&amp;nbsp;'Who We Are: The Data Ecosystem and the Global Partnership'&amp;nbsp;(2016) &lt;a href="http://www.data4sdgs.org/who-we-are/"&gt;http://www.data4sdgs.org/who-we-are/&lt;/a&gt;,&amp;nbsp;accessed 5 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[50]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Big Data, Big Impact: New Possibilities for International Development'&amp;nbsp;(22 January 2012) &lt;a href="http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf"&gt;http://www3.weforum.org/docs/WEF_TC_MFS_BigDataBigImpact_Briefing_2012.pdf&lt;/a&gt;,&amp;nbsp;accessed 8 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[51]&lt;/strong&gt; World Economic Forum,&amp;nbsp;'Our Mission: The World Economic Forum'&amp;nbsp;(12 January 2016) &lt;a href="https://www.weforum.org/about/world-economic-forum/"&gt;https://www.weforum.org/about/world-economic-forum/&lt;/a&gt;,&amp;nbsp;accessed 7 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[52]&lt;/strong&gt; See &lt;strong&gt;[50]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[53]&lt;/strong&gt; Julia Lane, Homepage, &lt;a href="http://www.julialane.org/"&gt;http://www.julialane.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[54]&lt;/strong&gt; Julia Lane,&amp;nbsp;'Big Data for Public Policy: The Quadruple Helix'&amp;nbsp;(2016)&amp;nbsp;8(1)&amp;nbsp;&lt;em&gt;Journal of Policy Analysis and Management&lt;/em&gt;,&amp;nbsp;&lt;a href="http://onlinelibrary.wiley.com/doi/10.1002/pam.21921/abstract"&gt;DOI:10.1002/pam.21921&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[55]&lt;/strong&gt; Data-Pop Alliance,&amp;nbsp;'Data-Pop Alliance: Our Mission'&amp;nbsp;(May 2014) &lt;a href="http://datapopalliance.org/"&gt;http://datapopalliance.org/&lt;/a&gt;,&amp;nbsp;accessed 1 June 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[56]&lt;/strong&gt; See &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="8"&gt;8. Author Profile&lt;/h2&gt;
&lt;p&gt;Meera Manoj is a law student at the Gujarat National Law University, Gandhinagar and has completed her first year. She is passionate about civil rights, feminism, economics in law and anything involving paneer. She aspires to travel the world and build up a vast library, with unparalleled sections on International Law and Archie comics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development'&gt;https://cis-india.org/internet-governance/blog/big-data-governance-frameworks-for-data-revolution-for-sustainable-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Meera Manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Sustainable Development Goals</dc:subject>
    

   <dc:date>2016-07-05T13:13:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
