<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/online-anonymity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/government-enter-homes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/facebook-privacy-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wiki-worth-different-turf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/whistle-blowers-unite"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/newspapers-should-empower-citizen-journalism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/financial-speculation-as-urban-planning"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-access-day-celebrated-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>https://cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity">
    <title>We are anonymous, we are legion</title>
    <link>https://cis-india.org/internet-governance/blog/online-anonymity</link>
    <description>
        &lt;b&gt;Online anonymity is vital for creativity and entrepreneurship on the Web, writes Sunil Abraham. The article was published in the Hindu on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;During his keynote at the International World Wide Web Conference recently, Sir Tim Berners-Lee argued for the preservation of online anonymity as a safeguard against oppression. This resonated with his audience in Hyderabad, given the recent uproar in the Indian blogosphere and twitterverse around the IT Act (Amendment 2008) and the recently published associated rules for intermediaries and cyber cafes.&lt;/p&gt;
&lt;p&gt;Over time, there has been a dilution of standards for blanket surveillance. The Telegraph Act allowed for blanket surveillance of phone traffic only as the rarest of exceptions. The IT Act and the ISP licence on the other hand, authorise and require ISPs and cyber cafes to undertake blanket surveillance as the norm in the form of data retention. The transaction database of the UID (Unique Identification Number) project will log of all our interactions with the government, private sector and other citizens; all these are frightening developments for freedom of expression in general and anonymous speech in particular.&lt;/p&gt;
&lt;p&gt;Anonymous speech is a necessary pre-condition for democratic and open governance, free media, protection of whistle-blowers and artistic freedom. On many controversial areas of policy formulation, it is usually anonymous officials from various ministries making statements to the press. Would mapping UIDs to IP address compromise the very business of government? A traditional newspaper may solicit anonymous tips regarding an ongoing investigative journalism campaign through their website.&lt;/p&gt;
&lt;p&gt;Would data retention by ISPs expose their anonymous sources? Whistle-blowers usually use public Wi-Fi or cyber cafes because they don't want their communications traced back to residential or official IP addresses. Won't the ban on open public Wi-Fi networks and the mandatory requirement for ID documents at cyber cafes jeopardise their safety significantly? Throughout history, great art has been produced anonymously or under a nom de plume. Will the draft Intermediary Due Diligence Rules, which prohibits impersonation even if it is without any criminal intent, result in artists sanitising their art into banality?&lt;/p&gt;
&lt;p&gt;Anonymous speech online is facilitated by three forms of sharing — shared standards, shared software and shared identities. Shared or open standards such as asymmetric encryption and digital signatures allow for anonymous, private and yet authenticated communications. Shared software or Free/Open Source Software reassures all parties involved that there is no spy-ware or back door built into tools and technologies built around these standards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Shared identities, unlike shared software and standards, is a cultural hack and, therefore, almost impossible to protect against. V for Vendetta, the graphic novel by Alan Moore gives us an insight into how this is could be done. The hero, V, hides his identity behind a Guy Fawkes mask. Towards the end of the novel, he couriers thousands of similar masks to the homes of ordinary citizens.&lt;/p&gt;
&lt;p&gt;In the final showdown between V and the oppressive regime, these citizens use these masks to form an anonymous mob that confuses the security forces into paralysis. Shared identities online therefore, is the perfect counterfoil to digital surveillance.&lt;/p&gt;
&lt;p&gt;As Dr. Berners-Lee spoke in Hyderabad, the Internet Rights and Principles Dynamic Coalition of the Internet Governance Forum released a list of 10 principles for online governance at the meeting convened by the UN Special Rapporteur on Freedom of Expression in Stockholm.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The fifth principle includes “freedom from surveillance, the right to use encryption, and the right to online anonymity”. One hopes that Gulshan Rai of CERT-IN will heed the advice provided by his international peers and amend the IT Act rules before they have a chilling effect on online creativity and entrepreneurship.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the article originally published in the Hindu&lt;/em&gt;, &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/article1705308.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/online-anonymity'&gt;https://cis-india.org/internet-governance/blog/online-anonymity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:38:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do">
    <title>Wherever you are, whatever you do</title>
    <link>https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do</link>
    <description>
        &lt;b&gt;Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010.&lt;/b&gt;
        
&lt;p&gt;Privacy activists are up in arms again, at Facebook’s recent launch of a new location-based service called Places. But what’s the new issue here? For years, telecom operators have been able to roughly locate you by triangulating the signal strength between the three nearest cell towers. In India, geo-location is part of the call logs maintained by the operator. That is how the police was able to determine that Bangalore resident Sathish Gupta killed his wife Priyanka. He took her mobile with him during a jog with his friend and then faked a phone call as an alibi. He knew that the time-stamps on the call logs would corroborate his lies. But the location-data nailed him. So, in short, the state and telecom operators know where you are even if you don’t have a smartphone with GPS support.&lt;/p&gt;
&lt;p&gt;For those who can afford it? GPS support provides greater accuracy and reliability, independent of telecom signal strength. The immediate and future benefits are huge. For parents, MyKidIsSafe.com, allows them to create a geo-fence and receive automatic notification when the child leaves the safety zone. In combination with RFID, businesses are able to provide their customers with accurate updates regarding status of deliveries. The Karnataka police is able to verify that the police inspector issuing the challan using a Blackberry for a traffic violation is not doing it from home. Seven hundred and fifty thousand gay men from 162 countries use a geo-social network called Grindr to find love. In the future, most car-pooling services will be GPS-enabled. Geo-location-based crowd-sourcing will be used to predict and avoid traffic jams by measuring the density and velocity of mobile phones on various routes.&lt;/p&gt;
&lt;p&gt;Privacy advocates worry that after helping the police solve crimes and fight terrrorism, telecom companies retain the logs instead of deleting, anonymising or obfuscating them. Especially so in India, given the lack of privacy laws, telecom operators, web and mobile service providers could retain the logs for customer profiling or worse still, sell the raw data or analysis to third parties. Cyber-stalkers, child molesters and rapists benefit. Cat burglars will know when you are away and be able to clean out your house in a more relaxed fashion. Geo-surveillance by a state, obsessed with terrorism, will have negligible benefits while extracting a huge social cost and significantly undermining national security.&lt;/p&gt;
&lt;p&gt;So why this particular outcry against the world’s most successful social networking website? There are three reasons that come immediately to mind. First, Facebook has a terrible record with privacy. In the last five years, the default settings have moved from one where no personal data was available for anonymous access to one with anonymous access to everything except birthday and contact information. And these are settings that affect the majority of the half a billion people who don’t bother changing default settings. So there is no guarantee that Facebook will not get more intrusive with its default geo-location privacy settings.&lt;/p&gt;
&lt;p&gt;Second, a friend can geo-tag you without requiring you to approve or confirm this. Once you are geo-tagged, all your common friends will be notified through the friend-feed system. This is similar to the current system of photo sharing. A friend can upload a inappropriate photograph and tag you almost instantly all your work-mates who also happen to be your Facebook friends get a notification via the feed. Of course, you can always untag the photo, change the settings and defriend the culprit but by then the damage is usually done.&lt;/p&gt;
&lt;p&gt;Third, the Facebook user-interface for privacy settings is notoriously complex and cumbersome. Many users will think that they have managed to bolt down the security settings when in fact their personal data will remain all up for grabs. The half a million third-party products available today on the Facebook platform only compounds this problem.&lt;/p&gt;
&lt;p&gt;Read the original in the&lt;a class="external-link" href="http://www.indianexpress.com/news/Wherever-you-are--whatever-you-do/663810"&gt; Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do'&gt;https://cis-india.org/internet-governance/blog/wherever-you-are-whatever-you-do&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/government-enter-homes">
    <title>Does the Government want to enter our homes?</title>
    <link>https://cis-india.org/internet-governance/blog/government-enter-homes</link>
    <description>
        &lt;b&gt;When rogue politicians and bureaucrats are granted unrestricted access to information then the very future of democracy and free media will be in jeopardy. In an article published in the Pune Mirror on 10 August, 2010, Sunil Abraham examines this in light of the BlackBerry-to-BlackBerry messenger service that the Government of India plans to block if its makers do not allow the monitoring of messages. He says that civil society should rather resist and insist on suitable checks and balances like governmental transparency and a fair judicial oversight instead of allowing the government to intrude into the privacy and civil liberties of its citizens.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What? Me worry about the blackberry imbroglio?&lt;/strong&gt;&lt;br /&gt;If Pierre Trudeau were alive today, he would feel similarly about the Canadian innovation that is making news these days. But, given the Indian media's objective take on the ongoing BlackBerry tussle, one would assume that the media is unaffected.&lt;/p&gt;
&lt;p&gt;Many internet observers say that&amp;nbsp; the very future of democracy and free media is at stake. If rogue politicians and bureaucrats are able to eavesdrop on the communications of media houses, wouldn't that sound the death knell for sting operations, anonymous informants and whistle-blowers?&lt;/p&gt;
&lt;p&gt;And, consequently, free press and democracy? How can the media keep its calm when one of the last bastions of electronic privacy in India is being stormed?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Isn’t this a lost cause already?&lt;/strong&gt;&lt;br /&gt;Perhaps, our reporters and editors have remained complacent, because they do not want to swim against the tide. After all, governments across the world have used excuses like cyber-terrorism, organised crime, pornography, piracy etc. to justify censorship and surveillance regimes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The priveleged access that the governments of India, Saudi Arabia and UAE are demanding has already been provided to the governments of USA, Canada and Russia, for example.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We don't know how much they know about us!&lt;/strong&gt;&lt;br /&gt;The average reader might not be aware of the access that the Indian government has to his/her personal information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To be clear, the Indian government, like most other governments, is able to intercept, decrypt, monitor and record sms and voice call traffic by working in partnership with ISP and Telecom operators.&lt;/p&gt;
&lt;p&gt;This is legalised through ISP licence agreements, which requires ISPs to provide monitoring equipment that can be used to by various law enforcement and intelligence agencies. There is no clear policy on data-retention policies.&lt;/p&gt;
&lt;p&gt;Industry insiders say that SMS messages, telephone call logs, email headers, and web requests are archived from anywhere between three months and a year.&lt;/p&gt;
&lt;p&gt;Do these ISPs and telecom operators then delete, anonymise or obfuscate this data? Or do they they retain it for posterity for market research?&lt;/p&gt;
&lt;p&gt;In the absence of a privacy law — the Indian citizen can only make intelligent guesses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Encryption is our friend&lt;/strong&gt;&lt;br /&gt;As a student, when I passed a love note to my lady-love in class, I would use a symmetric key encryption scheme.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;She would use the same key as I did to unencrypt the machine, ie, substituting the alphabet with the next/previous one.&lt;/p&gt;
&lt;p&gt;If someone was able to intercept the key, then all communication between us in both directions would be compromised.&lt;/p&gt;
&lt;p&gt;Asymmetric key encryption solves this problem by giving both parties two keys — a public key and a private key. I would use my lady-love’s public key to encrypt a message meant for her.&lt;/p&gt;
&lt;p&gt;Only she would be able to unencrypt the message by using her private key. The size of the key — 40bit, 128bit, 256bit etc. determines the strength of the encryption.&lt;/p&gt;
&lt;p&gt;The more bits you have, the longer it will take for someone to break through using a brute force method. The brute force method or dictionary method is when you try every single combination —just as you would with an old suitcase.&lt;/p&gt;
&lt;p&gt;The time taken also depends on computing resources — whether you are a jealous boyfriend, or the FBI, or a corporation like Google. These days, governments depend on corporations for hardware and network muscle.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How does Blackberry encrypt differently?&lt;/strong&gt;&lt;br /&gt;Other smart phone providers like IPhone and Nokia make email and Internet traffic transparent to the ISP and telecom operator, making it easy for governments are able to keep track of Internet users on mobile phones just as they monitor dial-up or broadband users.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most mobile services come with a basic encryption. Blackberry is different because it introduces an additional level of encryption, and then routes traffic either through corporate servers or through its own servers in Canada and other parts of the world.&lt;/p&gt;
&lt;p&gt;The fact that information is routed thus can pose a threat to the Indian government, if officials are using Blackberries to exchange highly classified information.&lt;/p&gt;
&lt;p&gt;Then, GoI could be worried if western intelligence agencies are eavesdropping.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How will this end? Will Blackberry leave?&lt;/strong&gt;&lt;br /&gt;Blackberry has never exited a country, because in the end it has prioritised consumer privacy over commercial compulsions. For example Blackberry has now ‘resolved’ security probwith Saudi Arabia.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I don’t think we should worry about deals or compromises. However, this is not to say that Blackberry should not be applauded.&lt;/p&gt;
&lt;p&gt;They have taken a public stand against unrestricted governmental access to their clients’ information; one should always applaud corporates who fight hard for privacy and civil liberties.&lt;/p&gt;
&lt;p&gt;What the Blackberry dilemma is showing us is the social cost of the electronic Big Brother will be steep, as it should be.&lt;/p&gt;
&lt;p&gt;To protect citizens’ rights, civil society must resist and insist on suitable checks and balances like governmental transparency and fair judicial oversight.&lt;/p&gt;
&lt;p&gt;Read the article in &lt;a class="external-link" href="http://www.punemirror.in/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=2010081020100810224737834e2c8a329&amp;amp;sectxslt="&gt;Pune Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/government-enter-homes'&gt;https://cis-india.org/internet-governance/blog/government-enter-homes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:12:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/facebook-privacy-india">
    <title>Facebook, privacy and India</title>
    <link>https://cis-india.org/news/facebook-privacy-india</link>
    <description>
        &lt;b&gt;Does Facebook's decision to open out user information and data to third party websites amount to an invasion of privacy and should users' seriously consider getting out of the site? Sunil Abraham doesn't think so.&lt;/b&gt;
        &lt;p&gt;Even if you aren’t a Facebook user (and most likely than not you are), chances are that you’ve at least heard that there are problems related to privacy settings on the site. The net has been abuzz with indignation over a decision by Facebook to open out user information and data to third party websites. A number of high profile Facebook users (and many more low profile ones) completely deactivated their accounts after the changes were announced by Founder and Chief executive Mark Zuckerberg and critics immediately pointed out that users were losing control of their personal information.&lt;/p&gt;
&lt;p&gt;There have been a slew of articles condemning the move, and highlighting “dramatic” changes to the sites privacy policy. Most alarming perhaps being &lt;a class="external-link" href="http://mattmckeon.com/facebook-privacy/"&gt;this slideshow&lt;/a&gt; compiled by Matt McKeon.&lt;/p&gt;
&lt;p&gt;All these are legitimate concerns, but how worried should we be really? Should you be seriously considering getting off the site? “As long as you are a little smart about what you upload on Facebook, there is no need to do anything as drastic as deleting your account”, says Sunil Abraham the executive director of the Centre for Internet &amp;amp; society, based out of Bangalore. Abraham said that the issue has shown people the risk of uploading certain types of photographs and content on to the net, but most importantly highlights the need for a privacy commission in India.&lt;/p&gt;
&lt;p&gt;“The EU has a commission which makes certain directives to sites like Facebook from time to time, which are then adhered to. India should also seriously consider setting up a similar commission, he said.&lt;/p&gt;
&lt;p&gt;Facebook has mantained that its privacy settings are prominently displayed and can be easily accessed by users. But critics say that it is much too long and convoluted. The BBC reports that the policy in its current form has 50 different settings, 170 options and runs to 5,830 words, &lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/technology/10125260.stm"&gt;making it longer than the US Constitution&lt;/a&gt;. And the sheer volume of outrage has prompted a rethink of the privacy policy by Facebook, which since held an internal meeting to discuss the affair.&lt;/p&gt;
&lt;p&gt;Abraham agrees that the issue of privacy is a complex one, but noted that the definition of what constituted “privacy” varied from culture to culture. “In India, it is perfectly normal for someone to ask someone else how much they earn, while such a question would be completely outside the boundaries of propriety in most Western countries”, he said. The issue with Facebook, he says, is that its desicion to change its privacy settings was tantamount to a breach of contract. “People who joined Facebook did so because they were comfortable with the settings and regulations available on the site. For Facebook to suddenly change that violates the spirit of that contract”, he said.&lt;/p&gt;
&lt;p&gt;Meanwhile the founder and chief executive of Facebook Mark Zuckerberg has &lt;a class="external-link" href="http://www.washingtonpost.com/wp-dyn/content/article/2010/05/23/AR2010052303828.html"&gt;written an article in the Washington Post today&lt;/a&gt; directly addressing issues relating to privacy controls on the popular  social networking site.&lt;/p&gt;
&lt;p&gt;“The biggest message we have heard recently is that people want easier  control over their information. Simply put, many of you thought our  controls were too complex. Our intention was to give you lots of  granular controls; but that may not have been what many of you wanted.  We just missed the mark,”said Zuckerberg.&lt;/p&gt;
&lt;p&gt;Read the article in &lt;a class="external-link" href="http://blog.livemint.com/play-things/2010/05/24/facebook-privacy-and-india/"&gt;Livemint&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/facebook-privacy-india'&gt;https://cis-india.org/news/facebook-privacy-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T11:40:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sense-and-censorship">
    <title>Sense and censorship</title>
    <link>https://cis-india.org/internet-governance/blog/sense-and-censorship</link>
    <description>
        &lt;b&gt;Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.&lt;/b&gt;
        
&lt;p&gt;Some believe that Google’s co-founder Sergey Brin’s memories as a six-year-old in the former Soviet Union has inspired Google’s crusade against censorship in China. However, as Siva Vaidhyanathan, author of upcoming book The Googlisation of Everything, notes in a recent blog post — this “isn’t a case of Google standing up for free speech....but about Google standing up against the attacks.”&lt;/p&gt;
&lt;p&gt;He was referring to the attacks on Google’s servers that originated from China mid-December last year. Anyone running a multi-billion dollar enterprise online would be well attuned to the security threats posed by anarchists, crackers, spammers and phishers on a daily basis. So what made the recent Google attacks so special? According to Google, intellectual property was stolen and two human-right activists accounts were compromised during the attack. So which was the straw that broke the camel’s back — intellectual property or human rights? Google could have spoken out against censorship years ago — after all it still censors search results in more than 20 countries, including India. Although there is no official channel or protocol guiding censorship practices in India, Google is regularly contacted by government officials and continues to delete web content deemed sensitive according to various ethnic, political and religious groups. Human rights activists note that Google offers some token resistance and then usually complies with the state’s demands. Google’s deputy general counsel, Nicole Wong, justifies her cooperation with the authorities citing the Indian way of torching buses during riots. Therefore it is odd that the US government endorses Google’s selective idealism in China. One week after the attacks, Hillary Clinton decided to lecture the world on Internet freedom. Then, Google and the National Security Agency announced a collaboration to deal with future cyber-attacks. This was followed by Google honouring female bloggers in Iran, forcing cyber-ethnographer, Maximilian Forte to wonder on Twitter, “Is it just me, or is Google consistently joining the causes of the US State Department?” How is Google’s move, and recent White House support for a “free web”, to be understood? How is Google’s move consistent with the Obama administration’s goal of protecting US business interests across the globe? Such questions may tell us why Google is picking a fight with China rather than Saudi Arabia or Burma. The recent privacy disaster incited by the release of Google’s new social networking application Buzz became yet another occasion when many began to doubt Google’s high rhetoric about freedom of expression. When Buzz first made the social connections of Gmail users public without their consent, blogger Evgeny Morozov questioned the company’s logic in protecting the email accounts of Chinese human rights activists (ie, when they are happy to tell the rest of the world who those activists are talking to). According to Morozov, Google has only managed to capture 30 per cent of the Chinese search market, and he believes that Google was willing to sacrifice this market for some much need needed positive PR given after a storm of bad press after projects like Buzz and Wave.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is clear that Google will have to fight such pressures towards greater control of the internet across the globe, China being no great exception. This week, Google and Yahoo have come out strongly in opposition to Australia’s plan to implement a mandatory ISP filter. Sometimes, a particular form of censorship serves a useful and necessary purpose — for example, Google and Microsoft were forced by the Indian Supreme Court in September 2008 to stop serving advertisements for do-it-yourself foetus sex determination kits. Given our daughter deficit, I would not have it any other way. However, in Thailand, such filtering takes the form of overly expansive lèse majesté laws which force ISPs to reveal details of individuals posting content deemed insulting to the monarch, Bhumibol Adulyadej — this practice leading to self-censorship and over-moderation on forums and mailing lists in Thailand.&lt;/p&gt;
&lt;p&gt;Also, soon as traffic was redirected from Google.cn to Google.com.hk, Google advised its enterprise customers in China to use VPN (virtual private networking), SSH (secure shell) tunneling, or a proxy server to access Google Apps. These are circumvention technologies of choice for many Chinese cyber-activists, says Rebecca McKinnion, founder of Global Voices Online. In her recent congressional submission, she also points out that in China, online defiance has a very different history, perhaps best illustrated by the Mud Grass Horse Internet meme which was an obscene pun on a government media campaign aimed at national unity and harmony. In China, aesthetics rather than technology is the primary tool for subversive political speech. Also like in Burma and Saudi Arabia, offline piracy and pirated satellite television ensures that most citizens are able to access censored content. And the average Chinese netizen cannot tell the difference between Google censoring its own results and the Great Firewall censoring Google. Google’s recent actions has very little real impact on the state of censorship in China.&lt;/p&gt;
&lt;p&gt;For original article in the &lt;a class="external-link" href="http://www.indianexpress.com/news/senseandcensorship/596260/"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sense-and-censorship'&gt;https://cis-india.org/internet-governance/blog/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:15:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wiki-worth-different-turf">
    <title>Wiki's worth, on a different turf</title>
    <link>https://cis-india.org/news/wiki-worth-different-turf</link>
    <description>
        &lt;b&gt;An Indian duo–a programmer and a mathematician–have developed a tool to expose anonymous writers and cleanse Wikipedia of rogue editors&lt;/b&gt;
        &lt;p&gt;Bangalore-based Kiran Jonnalagadda, a Web programming guru, and Hans Varghese Mathews, a mathematician, are the new entrants to the emerging field of Wikipedia research. The duo is credited with building Wiki Analysis, a tool that helps researchers understand the growing phenomenon of astroturfing, the practice of faking grass-roots support on Wikipedia and other websites. Wikipedia is the first Google result for most searches and this has made it a popular destination for those trying to manipulate public opinion on the Internet. Corporations, governments and even pop artists have been caught astroturfing in the past.&lt;/p&gt;
&lt;p&gt;Jonnalagadda and Mathews are among 34 researchers from 17 countries attending a two-day conference in Bangalore, WikiWars, which is concluding today. WikiWars is taking a fresh look at many different aspects of the world’s biggest encyclopaedia, the sixth most popular website on the Internet.&lt;/p&gt;
&lt;p&gt;The first generation of astroturfing on Wikipedia has been, thus far, largely unsophisticated, with little attention paid to covering up digital evidence. Remember the campaign Avril Lavigne’s fans launched last year that turned her music video Girlfriend into the most viewed clip on YouTube? Wal-Mart Stores Inc. contracted its public relations firm Edelman to maintain a fake website called “Working Families for Wal-Mart”. They pretended to be ordinary citizens who opposed the views of the firm’s labour union.&lt;/p&gt;
&lt;p&gt;It is well known that platforms such as Twitter and Facebook, with opaque management procedures, are susceptible to astroturf campaigns. Supporters of open licensing and peer production have always held that Wikipedia and other community-managed platforms are protected thanks to their transparency in policies and practices. But as far as Wikipedia researchers are concerned, the jury is still out.&lt;/p&gt;
&lt;p&gt;Microsoft tried to pay technology blogger Rick Jelliffe to work on Wikipedia connected to OOXML (Office Open XML) during the ISO (International Organization for Standardization) approval process in an attempt to influence the global vote. OOXML was the new file format for MS Office documents that urgently needed approval to check the growing popularity of Open Office. A user called “Ril_editor”, active between September 2007 and May 2008, who claimed to be working out of Reliance Industries Ltd’s chief Mukesh Ambani’s offices, tried to expunge pages connected to negative publicity about Reliance. Scientologists were blocked by Wikipedia’s arbitration committee when they were found trying to systematically undermine Wikipedia’s NPOV (neutral point of view) policy. NPOV is Wikipedia’s particular spin on non-partisanship, providing equal space to all opinions. However, some Wikipedia researchers such as Geert Lovink, head of the Institute of Network Cultures, Amsterdam, and co-organizer of the WikiWars conference, believes that the dominance of English and textual citation requirements has meant that NPOV is never translated into practice.&lt;/p&gt;
&lt;p&gt;An American team based out of the Santa Fe Institute, US, has developed WikiScanner, a public database of IP addresses that helps reveal the organizations behind anonymous edits on Wikipedia. WikiScanner has been used to expose the US Central Intelligence Agency’s manipulation of pages. WikiScanner doesn’t yet work for edits by authenticated users. The WikiScanner team has also developed another tool called Potential Sock Puppetry, which exposes those who use multiple user accounts from the same IP address. However, both tools could be circumvented by purchasing multiple data cards or getting people to work from public access points such as coffee shops and cyber cafés.&lt;/p&gt;
&lt;p&gt;It is this gap the Indian duo’s tool tries to plug. The first version of their Wiki Analysis tool clusters users into potential lobbies based on the pages they edit within a date range. The tool’s next version will cluster users into lobbies based on the words they consistently add and delete across pages. Says Jonnalagadda, “Wikipedia is now close to a decade old and has many articles that have existed since its earliest days and have been edited by thousands of individuals.” It is now the primary encyclopaedic destination for Internet users, and that makes it a ripe target for astroturfing. At no point in the history of human civilization have so many collaborated over so long to produce one canonical document on any article of human knowledge.&lt;/p&gt;
&lt;p&gt;“Wikipedia users rarely bother to check how a page was edited, but that information is all there, available to anyone who cares to look. We’re building the tools to help make sense of it,” Jonnalagadda says. Once Wiki Analysis is ready, you will be able to check if, for example, the editors of the climate change page on Wikipedia are more interested in ecology or energy.&lt;/p&gt;
&lt;p&gt;Original article on &lt;a class="external-link" href="http://www.livemint.com/2010/01/12210114/Wiki8217s-worth-on-a-diffe.html"&gt;Livemint&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wiki-worth-different-turf'&gt;https://cis-india.org/news/wiki-worth-different-turf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-10-23T08:33:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/whistle-blowers-unite">
    <title>When Whistle Blowers Unite</title>
    <link>https://cis-india.org/internet-governance/blog/whistle-blowers-unite</link>
    <description>
        &lt;b&gt;Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.&lt;/b&gt;
        
&lt;p&gt;Leaking corporate or government information in public interest in the age of Satyam has new challenges. You couldn't just upload it to a blog, social networking website or even a document management system like &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt; documents. &lt;a class="external-link" href="http://www.google.co.in/"&gt;Google&lt;/a&gt;, &lt;a class="external-link" href="http://m.in.yahoo.com/?p=us"&gt;Yahoo&lt;/a&gt; and most other Web service providers nearly always comply with the national law and cooperate with enforcement agencies. In India there have been several arrests in connection with alleged illegal email messages and content on social networking websites. It did not take court order – just a request from the local police station. Furthermore, you would have to undertake additional risky activity online to draw media attention to your documents. Also those who stand to lose from the leak can send a couple of copyright take down notices which will lead to deletion. So your only real option is &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, where they boast:&amp;nbsp; Every source protected. No documents censored. All legal attacks defeated.&lt;/p&gt;
&lt;p&gt;Launched in December 2006, &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt; stands alone on the Internet as the last refuge for the truth. Even though the promoters are European and US academic organisations, journalists and NGOs – a near neutral point of view is realised by sparing no one across the political and ideological spectrum. It is the archive of the whistle-blowers of the world and it is ugly: login information and private emails of a holocaust denier, secret documents from the Church of Scientology, Internet block-lists from Thailand and standard operating procedures for US guards at Guantanamo Bay, et cetera. One could safely assume that these guys have very few friends.&amp;nbsp; Unlike Wikipedia.org whose technology it employs,&amp;nbsp;&lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; does not have an open and participatory editorial policy. It accepts documents through a trusted journalist–source system.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Leaking controversial documents can result in loss of job, limb and life, so extreme caution is always advised. Remember that India still does not have laws protecting whistle blowers, in spite of a bill being introduced in 2006. What follows is only a very rough guide to digital whistle blowing, so please get expert advice before you try these at home:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download and install military grade encryption software like Pretty Good Privacy. Generate a pair of keys – a public and a private one. Use your private key in combination to a journalist's public key to send him or her, a 'for your eyes only message' email.&amp;nbsp; Only the journalist will be able to decrypt the message using your public key and his private key.&amp;nbsp; Note however, that an Indian court under the 2008 amendment of the IT Act can ask you to disclose your key-pair.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Step outside. Working from home is a bad idea since DOT mandates that all ISPs retain logs for all users and for all services utilized for an indeterminate time-period. Office is still worse as your network administrator might be also logging your activities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Find an anonymous public access point. Cyber-cafes, especially in New Delhi, Maharashtra, Karnataka and Tamil Nadu are asking users to provide identity cards and record contact details and in some cases web-cam photographs as well. Using your laptop in a coffee shop may work but DOT is considering cracking down on open wifi networks.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Use an anonymizing service so that the chain of digital evidence leading up to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt; is obliterated. TOR is the anonymizing solution of choice. Several TOR servers that provide private tunnels across the Internet work in unison, to form a cloud of anonymity. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;If you were leaking large amounts of data, uploading it may be too risky. Burn the data on DVDs and mail them to &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks&lt;/a&gt;. However, do ensure that all digital files have been purged of personal information. For word files this can be done by converting to PDF.&amp;nbsp; Also you may not want to leave any finger-prints on the package. India will soon have a database of finger prints thanks to the National Unique Identity (NUID) project. We know this thanks to the leaked NUID project document on &lt;a class="external-link" href="http://www.wikileaks.org/"&gt;Wikileaks.org&lt;/a&gt;, days before the consultation.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/whistle-blowers-unite'&gt;https://cis-india.org/internet-governance/blog/whistle-blowers-unite&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:17:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/newspapers-should-empower-citizen-journalism">
    <title>Newspapers should empower citizen journalism</title>
    <link>https://cis-india.org/news/newspapers-should-empower-citizen-journalism</link>
    <description>
        &lt;b&gt;A single content-management system can be used to publish highly-targeted and customised content. Sunil Abraham, director, Centre for Internet and Society (CIS India), believes traditional newspapers should expose their primary research databases such as photos, video and audio recordings, and documents to the public using web technologies. &lt;/b&gt;
        &lt;p&gt;With every generation of technology, businesses are affected and have to reinvent themselves along with their business models. Today, this is very true of traditional newspapers and the Internet. To begin with, there is the opportunity and threat presented for traditional media by the rise of citizen journalists. Given the penetration of mobile phones, and the emergence of micro-blogging services like Twitter, it is possible for ordinary citizen to create press-worthy reportage.&lt;br /&gt;Some initial experiments like Scoopt.com, Spy Media and Cell Journalist, which allowed citizen journalists to sell content to traditional media, have, by and large, failed, but I am certain there will be many commercial and non-commercial services emerging in this area, like — Demotix.com.&lt;/p&gt;
&lt;p&gt;Demotix currently has 8,300 reporters from 110 countries. The second opportunity is the plurality of delivery mechanisms available, thanks to digital technologies. A single content-management system can be used to publish highly targeted and customised content across several digital technologies such as SMS, GPRS, Twitter, RSS, Email, HTML, etc. Some of these formats like LATEX and PDF allow readers to print out personalised individual and institutional newspapers.&lt;/p&gt;
&lt;p&gt;Most of these technology options are not exercised because of the conservatism of the marketing departments. Those responsible for collecting advertisement revenues and maintaining sales target keep asking 'how can we monetise that piece of content'. Their traditional business model only allows them to target subscribers and advertisers.&lt;/p&gt;
&lt;p&gt;Once they account for their role in public attention aggregation and bandwidth consumption they could try and generate income from Internet service providers and telecom operators.&lt;/p&gt;
&lt;p&gt;The third opportunity is interactivity. These days, a story no longer ends when the ink hits the paper. That is only considered the beginning, and there is sufficient discussion today about the transformative role played by citizens on mailing lists, discussion forums, blogs and wiki, ensuring that the story continues. I would like to focus on the process before the story hits the press or the content-management system, especially those stories that need sustained investigation or exhaustive time-consuming research. I believe traditional newspapers should expose their primary research databases such as photos, video and audio recordings, and documents to the public using web technologies.&lt;/p&gt;
&lt;p&gt;If this is done in a truly open and transparent manner, online volunteer energy will lend a much-needed shoulder to traditional journalism. As a consequence, the reader will be engaged even before the story.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://epaper.dnaindia.com/dnabangalore/epapermain.aspx?queryed=9&amp;amp;username=Prasad+Nair&amp;amp;useremailid=praskrishna%40hotmail.com&amp;amp;parenteditioncode=9&amp;amp;eddate=12%2f14%2f2009"&gt;Link to the original article&lt;/a&gt; (Page 12)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/newspapers-should-empower-citizen-journalism'&gt;https://cis-india.org/news/newspapers-should-empower-citizen-journalism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-10-23T08:47:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/financial-speculation-as-urban-planning">
    <title>Financial Speculation as Urban Planning</title>
    <link>https://cis-india.org/internet-governance/events/financial-speculation-as-urban-planning</link>
    <description>
        &lt;b&gt;Talk by Prof Michael Goldman&lt;/b&gt;
        
&lt;p&gt;A talk by Michael Goldman followed by an open discussion organised by a group of concerned citizens and the Centre for Internet and Society, about the roots of the US financial crisis and related dynamics in "world city" planning, such as that here in Bangalore.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Speaker Bio&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Michael Goldman&lt;br /&gt;Associate Professor&lt;br /&gt;Dept of Sociology&lt;br /&gt;Univ of Minnesota, Minneapolis, MN&lt;br /&gt;McKnight Presidential Fellow&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Interest Areas&lt;/strong&gt;: Transnational, political, environmental, and development sociology; Sociology of knowledge and power; Transnational institutions (international finance, expert networks).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Current Research:&lt;/strong&gt; Neoliberalism and its discontents; the making of a world city: Bangalore, India; “Water for All”/ water privatization policies; development and environment in North-South relations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recent Publications&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;“How ‘Water for All!’ Became Hegemonic: The Power of the World Bank and its Transnational Policy Networks.” 2007. &lt;em&gt;Geoforum&lt;/em&gt; special issue on global water policy, 38(5): 786-800. &lt;/li&gt;&lt;li&gt;&amp;nbsp;“Under New Management: Historical Context and Current Challenges at the World Bank.” 2007. &lt;em&gt;Brown Journal of World Affairs&lt;/em&gt;, special issue on Wolfowitz’s Bank, Vol. XIII: 2, Summer 2007.&lt;/li&gt;&lt;li&gt;“El neoliberalismo verde.” 2006. Chapter in &lt;em&gt;Las Politicas de la Tierra&lt;/em&gt;, Alfonso Guerra and Jose Felix Tezanos, eds. Madrid: Editorial Sistema.&lt;/li&gt;&lt;li&gt;&lt;em&gt;Imperial Nature: &lt;/em&gt;&lt;em&gt;The World Bank and Struggles for Social Justice in the Age of Globalization&lt;/em&gt;.
2005. New Haven, CT and London: Yale University Press. Yale UP
paperback edition, 2006; India edition, Orient Longman Press, 2006;
Japanese edition, Kyoto University Press, 2008.&lt;/li&gt;&lt;li&gt;“World Bank.” 2005. Entry in &lt;em&gt;Encyclopedia of International Development&lt;/em&gt;, Tim Forsyth, ed., London: Routledge.&lt;/li&gt;&lt;li&gt;“Tracing the Routes/Roots of World Bank Power.” 2005. &lt;em&gt;International Journal of Sociology and Social Policy&lt;/em&gt;, special issue on global water policy, 25(1/2): 10-29.&lt;/li&gt;&lt;li&gt;“The Birth of a Discipline: Producing Authoritative Green Knowledge for the World (Bank).” 2005. Chapter in &lt;em&gt;Earthly Politics: Local and Global in Environmental Governance&lt;/em&gt;, Sheila Jasanoff and Marybeth Long, eds. Cambridge, MA: MIT Press. &lt;/li&gt;&lt;li&gt;“La tragedia della recinzione dei beni comuni.” 2005. &lt;em&gt;Beni Comuni: Fra Tradizione e Futuro&lt;/em&gt;, Giovanna Ricoveri, ed., Rome: Editrice Missionaria Italiana. &lt;/li&gt;&lt;li&gt;“Eco-governmentality and Other Transnational Practices of a ‘Green’ World Bank.” 2004. in &lt;em&gt;Liberation Ecologies&lt;/em&gt; 2nd ed. Richard Peet and Michael Watts, eds. London: Routledge. &lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/financial-speculation-as-urban-planning'&gt;https://cis-india.org/internet-governance/events/financial-speculation-as-urban-planning&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-04-05T04:36:21Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg">
    <title>Dr. Anshu Bharadwaj</title>
    <link>https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg</link>
    <description>
        &lt;b&gt;Dr. Anshu Bharadwaj&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg'&gt;https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-31T09:38:40Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg">
    <title>Dr. Andrew Lynn</title>
    <link>https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg</link>
    <description>
        &lt;b&gt;Dr. Andrew Lynn&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg'&gt;https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-31T09:36:55Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg">
    <title>Dr. Zakir Thomas</title>
    <link>https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg'&gt;https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-31T09:33:44Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg">
    <title>Prof. Subbiah Arunachalam</title>
    <link>https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg'&gt;https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-31T09:31:27Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-access-day-celebrated-in-india">
    <title>Open Access Day celebrated in India</title>
    <link>https://cis-india.org/openness/blog-old/open-access-day-celebrated-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore and the Centre for Culture, Media and Governance co-organised joint celebrations of Open Access Day in Jamia Millia Islamia campus on the 14th of October 2008. Around 50 people attended the event from different departments in Jamia there were also some participants from the Indian Linux Users Group. CIS also published an Open Access flyer on this day featuring quotations from Sam Pitroda, MS Swaminathan, Peter Suber, Alma Swan, Frederick Noronha, Barbara Kirsop and Samir Brahmachari.&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/openness/blog-old/uploads/dsc_0395.jpg/image_mini" alt="Prof. Subbiah Arunachalam" class="image-left" title="Prof. Subbiah Arunachalam" /&gt;Speaking at Tagore Hall at Jamia Millia
Islamia, Prof. Subbiah Arunachalam, pointed out that “there are
over 25,000 scientific journals published in the world today but even
the richest university in India cannot afford to subscribe to more
than 1,200 journals. It is as though, Indian scientists and students
are competing in a race with their legs bound.”  Prof. Arunachalam
called upon the student community to lobby for Open Access mandates
for research outputs funded by tax-payers.Open Access is the principle that
publicly funded research should be freely accessible online,
immediately after publication. October 14, 2008 was the world’s
first Open Access Day. The founding partners for this Day are SPARC
(Scholarly Publishing and Academic Resources Coalition), Students for
FreeCulture, and the Public Library of Science, USA. According to the
Directory of Open Access Journals – India publishes 105 Open Access
journals.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/openness/blog-old/uploads/dsc_0388.jpg/image_mini" alt="Dr. Zakir Thomas" class="image-left" title="Dr. Zakir Thomas" /&gt;Speaking at the celebrations at Jamia, Dr. Zakir Thomas of
Council for Scientific and Industrial Research (CSIR) traced the
limited historical role that IPR has played in the development for
drugs for Tuberculosis. Dr. Thomas is the project director of Open
Source Drug Discovery (OSDD),  a project of CSIR. The government of
India has already committed Rs. 150 crores to the OSDD project which
is targeting neglected diseases from developing countries. Dr. Thomas
also introduced the OSDD project and spoke about alternative systems
of incentives that are more appropriate in the academic community
such as attribution, citation and collaboration – all closely
linked career growth in an academic or university context.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/openness/blog-old/uploads/dsc_0384.jpg/image_mini" alt="Dr. Andrew Lynn" class="image-left" title="Dr. Andrew Lynn" /&gt;Dr. Lynn, a professor at the Department
of Bio-informatics at JNU and Dr. Bhardwaj Scientist CSIR introduced
the OSDD web platform and pointed out to various improvements over
existing methods of research. While in peer-reviewed papers readers
are only provided with reference number when experiments are
discussed – on the OSDD platform readers can access the complete
experiment details, including data even for failed experiments. This
is critical in reducing wastage of valuable resources and efforts in
attempting to re-invent the wheel.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/openness/blog-old/uploads/dsc_0393.jpg/image_mini" alt="Dr. Anshu Bharadwaj" class="image-left" title="Dr. Anshu Bharadwaj" /&gt;Dr. Bhardwaj pointed out that she
was already collaborating with students from the Jamia Millia Islamia
campus on her projects hosted on OSDD. She said that the open access
and open source models gives rise to many new collaborations both at
the local and international level. Dr. Bhardwaj also announced that
two CSIR open access journals were being launched by Dr. Samir
Brahmachari - Director General on the occasion of World Open Access
day.&lt;/p&gt;
&lt;p&gt;Prof. Arif Ali, Head Dept. of
Bio-Technology, Jamia Milia Islamia who presided over the meeting
spoke of the challenges faced by faculty and students in the Indian
context. Some international journals demand Rs. 40,000 from the
authors in spite of assigning copyright. He predicted that the open
access movement will lead to more Indian authors being published and
cited. He also hoped that open access would become a norm instead of
a novelty.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/openness/open-access-day/open%20access%20day%20flyer.pdf" class="internal-link" title="Open Access Day Flyer"&gt;Download Open Access Flyer&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-access-day-celebrated-in-india'&gt;https://cis-india.org/openness/blog-old/open-access-day-celebrated-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-08-18T05:06:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
