<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/rewiringdoc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/dnbook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/reconceptualizing-privacy-on-social-network-s-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/one-avatar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/watson-knows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/change-has-come"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake">
    <title>CIS Cybersecurity Series (Part 4) - Marietje Schaake</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake</link>
    <description>
        &lt;b&gt;CIS interviews  Marietje Schaake, member of the European parliament, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;div&gt;&lt;em&gt;"It is important that we don't confine solutions in military head quarters or in government meeting rooms but that consumers, internet users, NGOs, as well as businesses, together take responsibility to build a resilient society where we also don't forget what it is we are defending, and that is our freedoms... and we have learned hopefully from the war on terror, that there is a great risk to compromise freedom for alleged security and that is a mistake we should not make again." - Marietje Schaake, member of European parliament.&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourth installment of the CIS Cybersecurity Series.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In this installment, CIS interviews Marietje Schaake, member of the European Parliament for the Dutch Democratic Party (D66) with the Alliance of Liberals and Democrats for Europe (ALDE) political group. She serves on the Committee on Foreign Affairs, where she focuses on neighbourhood policy, Turkey in particular; human rights, with a specific focus on freedom of expression, Internet freedom, press freedom; and Iran. In the Committee on Culture, Media, Education, Youth and Sports, Marietje works on Europe’s Digital Agenda and the role of culture and new media in the EU´s external actions. In the Committee on International Trade, she focuses on intellectual property rights, the free flow of information and the relation between trade and foreign affairs.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Marietje's website is: http://www.marietjeschaake.eu/&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/F7IIHCu2D4g" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:24:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin">
    <title>CIS Cybersecurity Series (Part 3) - Eva Galperin</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</link>
    <description>
        &lt;b&gt;CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.&lt;/p&gt;
&lt;p&gt;EFF homepage: &lt;a href="https://www.eff.org/"&gt;https://www.eff.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:55:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan">
    <title>CIS Cybersecurity Series (Part 2) - Ram Mohan</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan</link>
    <description>
        &lt;b&gt;CIS interviews Ram Mohan, a pioneer in the field of Internet security and internationalization, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"In the Indian context, I think the government does have&amp;nbsp;a significant&amp;nbsp;responsibility&amp;nbsp;to protect its citizenry&amp;nbsp;from cybercrime. There is a greater need for the&amp;nbsp;government to work with private industries as well as academic institutions to ensure a strong understanding of the threats unique to India. After all there are many&amp;nbsp;threats that either originate in the context of the Indian sub-continent and are specific to India." - Ram&amp;nbsp;Mohan, Executive Vice President, &amp;amp; Chief Technology &lt;/em&gt;&lt;em&gt;Officer of Afilias Limited.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its second&amp;nbsp;installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly&amp;nbsp;debated aspects of cybersecurity and hopes to encourage&amp;nbsp;wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Ram Mohan, a pioneer&amp;nbsp;in the field of Internet security and&amp;nbsp;internationalization. Ram Mohan is Executive Vice&amp;nbsp;President, &amp;amp; Chief Technology Officer of Afilias&amp;nbsp;Limited. He also serves on the Board of Directors of the&amp;nbsp;Internet Corporation for Assigned Names and Numbers&amp;nbsp;(ICANN).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/Riub6EIwCgk" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:27:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop">
    <title>My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad</title>
    <link>https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop</link>
    <description>
        &lt;b&gt;On March 8, 2013, a day-long Telugu Wikipedia training workshop was organized by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team at the Golden Threshold, Nampally, Hyderabad in collaboration with Theatre Outreach Unit, University of Hyderabad. This blog post gives a concise account of the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;CIS-A2K&lt;/a&gt;&lt;/b&gt; had planned a day long &lt;a class="external-link" href="http://te.wikipedia.org"&gt;Telugu Wikipedia&lt;/a&gt; training workshop in collaboration with Telugu Wikipedians at the &lt;a class="external-link" href="http://www.efluniversity.ac.in/"&gt;English and Foreign Languages University (EFLU)&lt;/a&gt;, Hyderabad on March 8, 2013. The intention was to target research students at EFLU who are using Telugu material or working on topics related to Telugu and Andhra Pradesh. This event was also to be part of the Wiki Women’s month events across India. However, this event had to be cancelled in the last minute as a Research Student of EFLU committed suicide on the campus and there was major unrest. The faculty from EFLU though had informed of the possible cancellation of the event earlier, had only confirmed it on March 7, 2013. &lt;b&gt;&lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B0%E0%B0%B9%E0%B1%8D%E0%B0%AE%E0%B0%BE%E0%B0%A8%E0%B1%81%E0%B0%A6%E0%B1%8D%E0%B0%A6%E0%B1%80%E0%B0%A8%E0%B1%8D"&gt;Rahmanuddin Shaik&lt;/a&gt;&lt;/b&gt; (Telugu SIG, &lt;a class="external-link" href="http://meta.wikimedia.org/wiki/Wikimedia_India_chapter"&gt;Wikimedia India Chapter&lt;/a&gt;) and &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Rajasekhar1961"&gt;&lt;b&gt;Dr. Rajasekhar&lt;/b&gt; &lt;/a&gt;(Telugu Wikipedia Administrator) had already blocked an entire day for this training workshop. In fact a lot of background work was already done for the EFLU event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When I got the news of cancellation of the workshop, initially I was very dejected at the thought of informing the two active Telugu Wikipedians about it, which I had to do.  As my tickets were anyhow booked to Hyderabad and there was no point cancelling them, as I was already on my way to catch the flight, I decided to go ahead with my journey. I made some couple of quick calls and with some effort managed to organize a Wikipedia Training Workshop in collaboration with the &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%A5%E0%B0%BF%E0%B0%AF%E0%B1%87%E0%B0%9F%E0%B0%B0%E0%B1%8D_%E0%B0%94%E0%B0%9F%E0%B1%8D%E0%B0%B0%E0%B1%80%E0%B0%9A%E0%B1%8D_%E0%B0%AF%E0%B1%82%E0%B0%A8%E0%B0%BF%E0%B0%9F%E0%B1%8D_%28%E0%B0%9F%E0%B0%BF.%E0%B0%93.%E0%B0%AF%E0%B1%81%29"&gt;Theatre Outreach Unit (TOU)&lt;/a&gt;, &lt;a class="external-link" href="http://www.uohyd.ac.in/"&gt;University of Hyderabad (UoH)&lt;/a&gt;. I was anyhow planning on visiting them to explore an institutional collaboration. The Project Director of TOU Dr. Peddi Ramarao, though agreed to spread the word about the workshop, yet was not sure how many would turn up at such a short notice of one night.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/TOUphoto2forCIS.png" title="TOU Training photo 2" height="364" width="486" alt="null" class="image-inline" /&gt;&lt;/th&gt; &lt;th&gt;
&lt;p&gt;Rahmanuddin and Dr. Rajasekhar giving hands-on training to edit Telugu Wikipedia at Golden Threshold, Hyderabad&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So on March 8, 2013 Rahmanuddin, Dr. Rajasekhar and I landed at the &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%97%E0%B1%8B%E0%B0%B2%E0%B1%8D%E0%B0%A1%E0%B1%86%E0%B0%A8%E0%B1%8D_%E0%B0%A4%E0%B1%8D%E0%B0%B0%E0%B1%86%E0%B0%B7%E0%B1%8B%E0%B0%B2%E0%B1%8D%E0%B0%A1%E0%B1%8D"&gt;Golden Threshold&lt;/a&gt; hoping against hope to see at least 3 or 4 participants. But alas there were only 2 people when we reached the venue by 10 a.m.. By 10.25 a.m. we had 9 participants, which excited us all. The training workshop began with an introduction of all the participants. Following this a presentation was made on the significance of Wikipedia in the digital era and how Indian language-Wikipedias are pivotal in preserving the vernacular language and culture.  This session was interactive with participants asking many questions. Dr. Peddi Ramarao, later, spoke about his experience of using Wikipedia as a reference tool and how he got introduced to contributing Wikipedia. Further, the discussion went on to the poor quality of articles on Telugu Wikipedia and how the participants can take part in improving the existing articles and contribute new articles. Rahmanuddin and Rajasekhar practically demonstrated the process of editing on &lt;a class="external-link" href="http://te.wikipedia.org"&gt;Telugu Wikipedia&lt;/a&gt;. This was followed by a hands-on session where the participants actively participated in creating their Wikipedia User name on Telugu Wikipedia and did editing of few articles. The training programme was to officially end at Lunch time but even post lunch some of the participants were enthusiastic about learning more nuances of contributing on Telugu Wikipedia. The hands-on session thus continued until 4 p.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Post the Wikipedia training programme, I have had interactions with the Project Director of TOU to explore possible future collaborations. TOU, UoH agreed to offer space to host all Telugu Wikipedia meet-ups. As the Golden Threshold space was in the central part of the city, having this infrastructure accessible was a major boost for the Telugu Wikipedia community in Hyderabad. Further, in the discussions we have agreed to collaborate with TOU, UoH in hosting the first mega Telugu Wikipedia community event &lt;i&gt;Telugu Wiki Mahotsavam 2013&lt;/i&gt;.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/TOUphoto3forCIS.png" title="TOU Training photo 3" height="261" width="348" alt="null" class="image-inline" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Telugu Wikipedia Orientation in progress&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;b&gt;Outcomes and Impact:&lt;/b&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Out of the 9 new Users, who were trained during this workshop, 5 people have done more than 5 edits.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One person has become a very active editor on Telugu Wikipedia with more than 1000 edits in 3 months. A detailed account of this event was put up by this user on Telugu Wikipedia here &lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Because of CIS-A2K’s efforts, Telugu Wikipedians in Hyderabad now have a good meeting space.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The availability of this space has also encouraged the Telugu Wikipedians to meet more often than before. Since March 8, 2013 Telugu Wikipedians had a total of 6 meet-ups, and all these were held at Golden Threshold.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Golden Threshold also became a venue for hosting &lt;i&gt;Telugu Wiki Mahotsavam 2013&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This visit to Hyderabad triggered a discussion about organizing &lt;i&gt;Telugu Wiki Mahotsavam&lt;/i&gt;, which was successfully organized in a month’s time.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Looking back, though this event was done as a last minute measure without many expectations, yet it turned out to be a lucky break! Especially, because this was my first ever event as the CIS-A2K Programme Director. It will remain a very memorable one. More so because it was done in collaboration with two of the active Telugu Wikipedians. Even more so because it has created some positive energy for the Telugu Wikipedia community, which has since then become a home turf.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/17WYq7X"&gt;http://bit.ly/17WYq7X&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop'&gt;https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vishnu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Communities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-08-19T06:51:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian">
    <title>CIS Cybersecurity Series (Part 1) - Christopher Soghoian</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</link>
    <description>
        &lt;b&gt;CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Christopher is based in Washington, D.C. His website is http://www.dubfire.net/&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:26:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice">
    <title> It’s Common Practice</title>
    <link>https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice</link>
    <description>
        &lt;b&gt;Technologies are no longer abstract. They're habits. What constitutes a habit? The gestures that you make as you read this, the way your eyes flick when you encounter somebody you like, the way you stroke your chin in a moment of reflection, or the split second decisions that you make in times of crises — these are all habits. They are pre-thought, visceral, depending upon biological, social and collective memories that do not need rational thinking. Habits are the customised programming of human life. &lt;/b&gt;
        
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;p&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/it-s-common-practice/1113490/0"&gt;published in the Indian Express&lt;/a&gt; on May 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;However,  habits are not natural. They are, in fact, man-made nature. They appear  as natural, matter-of-fact, instinctive and intuitive, but they are  built over years of shared experiences, learning and empathy. And more  often than we realise, habits are formed because of the different  technologies that surround us.&lt;/p&gt;
&lt;p&gt;If you are reading this column on paper, look at the way you are  holding the magazine, folding the paper and note how you can read this  easily because the text has been arranged from left to right, top to  bottom. If you are browsing through this piece on a digital device, look  at how your fingers move on your scroll button, or on your touchscreen,  helping you make sense of complex devices without a second thought.&lt;/p&gt;
&lt;p&gt;Habits that are formed through technologies work so seamlessly  because they make technologies transparent. They make us forget that  there is a complex network of machines, devices, grids and information  that shape our lives. Do you remember the time when you came across  something online and didn't look for the 'Like' button that is now a  part of everyday internet practice? Do you remember the last time you  struggled to manage the cursor on your screen using a mouse? Do you  realise how the mouse has already become obsolete and is now being  replaced by other touch-and-flick devices for a new generation?&lt;/p&gt;
&lt;p&gt;I recently encountered this habit when my  three-going-on-90-year-old Kindle — the Amazon device I use to read  books — fell in the hands of a six-year-old. Like many digital natives  of her time, she is unfazed by technology and, as her parents confess,  is much better at operating most things digital in the house than them.  She thinks nothing of streaming her favourite cartoon show from a  website. She is adept at customising the many screens on her father's  smartphone and has accepted that specific movements of her fingers will  produce information on brightly-lit touchscreens.&lt;/p&gt;
&lt;p&gt;However, when she used my non-backlit, non-touch Kindle that  requires buttons to be pushed, she faced acute frustration. After trying  to scroll, flick, activate, zoom and pinch on the screen she flung it  at me, bewildered and angry that her habits were suddenly redundant and  challenged. I want to use this moment of reflection to understand how  technologies are integral to our ways of living. Technologies are  habits. You don't need to be online 24x7, constantly upgrading yourself  to the latest version of Android to interact with technology. Instead,  we need to think about technologies as outlets that allow us to think  about who we are and how we relate to the world around us.&lt;/p&gt;
&lt;p&gt;One way of looking at technology as habits is to see how we have  started thinking of ourselves through metaphors of the machines that we  use. For example, it's quite common to hear people complain about "lack  of bandwidth" to describe busy schedules. We now think of ourselves as  systems that need upgrading. Life has long been lived on windows through  which we recycle ourselves.&lt;/p&gt;
&lt;p&gt;If technologies are such an inseparable part of ourselves, maybe  it is time to stop making a distinction between the human and the  technological. It is time to stop thinking about technologies only in  terms of gadgets that can be removed from our biological assemblage. And  indeed, if we are ready to recognise these technologies as a part of  being human, then we need to think of technology politics in a new way.  The questions around piracy, privacy, intellectual property, proprietary  technologies, openness, etc. which are relegated to the digital world  are also questions of us. They are not external problems but are  centrally shaping how we construct ourselves as humans. Through habits.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice'&gt;https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-24T11:41:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change Is It Anyway? | DML2013 </title>
    <link>https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;As a preparation for the DML conference, Nishant Shah had an interview with Howard Rheingold, a cyberculture pioneer, social media innovator, and author of "Smart Mobs. Nishant Shah is chair of 'Whose Change Is It Anyway? Futures, Youth, Technology And Citizen Action In The Global South (And The Rest Of The World)' track at DML2013. Here, he talks about shifts in citizen engagement in Indian politics and civics, and the underlying significance of these changes.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;"More and more, you have young people who are trying to come together, not merely to express discontent, but actually take action so that they can build the kinds of futures they want to occupy."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The 2013 DML conference will be held in March 14-16, 2013 in Chicago, Illinois. The conference is supported by the MacArthur Foundation and organized by the Digital Media and Learning Research Hub located at the University of California's systemwide Humanities Research Institute at UC Irvine.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More details about the DML2013 Conference and the Call For Workshop/Panel/Paper Proposals can be found at the conference website: &lt;a class="external-link" href="http://dml2013.dmlhub.net"&gt;dml2013.dmlhub.net&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/Q1ueRSm1TTw" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:47:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/rewiringdoc">
    <title>Re:wiring Bodies - Dr. Asha Achuthan</title>
    <link>https://cis-india.org/raw/rewiringdoc</link>
    <description>
        &lt;b&gt;First draft of the monograph on "Rewiring Bodies" by Dr. Asha Achutan; format for Microsoft Office users&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/rewiringdoc'&gt;https://cis-india.org/raw/rewiringdoc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights>Published under a Creative Commons License</dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Archives</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Resources</dc:subject>
    
    
        <dc:subject>History</dc:subject>
    

   <dc:date>2011-09-21T07:23:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/dnbook">
    <title>Digital AlterNatives with a Cause?</title>
    <link>https://cis-india.org/digital-natives/blog/dnbook</link>
    <description>
        &lt;b&gt;Hivos and the Centre for Internet and Society have consolidated their three year knowledge inquiry into the field of youth, technology and change in a four book collective “Digital AlterNatives with a cause?”. This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around 'digital revolutions' in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I&lt;/strong&gt;&lt;strong&gt;ntroduction&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the 21&lt;sup&gt;st&lt;/sup&gt;
Century, we have witnessed the simultaneous growth of internet and digital
technologies on the one hand, and political protests and mobilisation on the
other. Processes of interpersonal relationships, social communication, economic
expansion, political protocols and governmental mediation are undergoing a
significant transition, across in the world, in developed and emerging
Information and Knowledge societies.&lt;/p&gt;
&lt;p&gt;The young
are often seen as forerunners of these changes because of the pervasive and
persistent presence of digital and online technologies in their lives. The “
Digital Natives with a Cause?” is a research inquiry that uncovers the ways in
which young people in emerging ICT contexts make strategic use of technologies
to bring about change in their immediate environments. Ranging from personal
stories of transformation to efforts at collective change, it aims to identify
knowledge gaps that existing scholarship, practice and popular discourse around
an increasing usage, adoption and integration of digital technologies in
processes of social and political change.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Methodology&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 2010-11,
three workshops in Taiwan, South Africa and Chile, brought together around 80
people who identified themselves as Digital Natives from Asia, Africa and Latin
America, to explore certain key questions that could provide new insight into
Digital Natives research, policy and practice. The workshops were accompanied
by a ‘Thinkathon’ – a multi-stakeholder summit that initiated conversations
between Digital Natives, academic researchers, scholars, practitioners,
educators, policy makers and corporate representatives to share learnings on
new questions: Is one born digital or does one become a Digital Native? How do
we understand our relationship with the idea of a Digital Native? How do
Digital Natives redefine ‘change’ and how do they see themselves implementing
it? What is the role that technologies play in defining civic action and social
movements? &amp;nbsp;What are the relationships
that these technology based identities and practices have with existing social
movements and political legacies? How do we build new frameworks of sustainable
citizen action outside of institutionalisation?&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Rationale&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the
knowledge gaps that this book tries to address is the lack of digital natives’
voices in the discourse around them. In the occasions that they are a part of
the discourse, they are generally represented by other actors who define the
frameworks and decide the issues which are important. Hence, more often than
not, most books around digital natives concentrate on similar sounding areas
and topics, which might not always resonate with the concerns that digital
natives and other stake-holders might be engaged with in their material and
discursive practice. The methodology of the workshops was designed keeping this
in mind. Instead of asking the digital natives to give their opinion or recount
a story about what we felt was important, we began by listening to their
articulations about what was at stake for them as e-agents of change. As a
result, the usual topics like piracy, privacy, cyber-bullying, sexting etc.
which automatically map digital natives discourse, are conspicuously absent
from this book. Their absence is not deliberate, but more symptomatic of how
these themes that we presumed as important were not of immediate concerns to
most of the participants in the workshop who are contributing to the book&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Structure&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The
conversations, research inquiries, reflections, discussions, interviews, and
art practices are consolidated in this four part book which deviates from the
mainstream imagination of the young people involved in processes of change. The
alternative positions, defined by geo-politics, gender, sexuality, class,
education, language, etc. find articulations from people who have been engaged
in the practice and discourse of technology mediated change. Each part
concentrates on one particular theme that helps bring coherence to a wide
spectrum of style and content.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Book 1: To Be: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook1/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;The first
part, &lt;em&gt;To Be&lt;/em&gt;, looks at the questions
of digital native identities. Are digital natives the same everywhere? What
does it mean to call a certain population ‘Digital Natives”? Can we also look
at people who are on the fringes – Digital Outcasts, for example? Is it
possible to imagine technology-change relationships not only through questions
of access and usage but also through personal investments and transformations?
The contributions help chart the history, explain the contemporary and give ideas
about what the future of technology mediated identities is going to be.&lt;/p&gt;
&lt;strong&gt;Book 2: To Think: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook2/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;In the
second section, &lt;em&gt;To Think,&lt;/em&gt; the
contributors engage with new frameworks of understanding the processes,
logistics, politics and mechanics of digital natives and causes. Giving fresh
perspectives which draw from digital aesthetics, digital natives’ everyday
practices, and their own research into the design and mechanics of technology
mediated change, the contributors help us re-think the concepts, processes and
structures that we have taken for granted. They also nuance the ways in which
new frameworks to think about youth, technology and change can be evolved and
how they provide new ways of sustaining digital natives and their causes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Book 3: To Act: Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook3/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;To Act&lt;/em&gt; is the third part that concentrates on stories
from the ground. While it is important to conceptually engage with digital
natives, it is also, necessary to connect it with the real life practices that
are reshaping the world. Case-studies, reflections and experiences of people
engaged in processes of change, provide a rich empirical data set which is
further analysed to look at what it means to be a digital native in emerging
information and technology contexts.&lt;/p&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;Book 4: To Connect : Digital AlterNatives with a Cause? Download &lt;a href="https://cis-india.org/digital-natives/dnbook4/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The last
section, &lt;em&gt;To Connect&lt;/em&gt;, recognises the
fact that digital natives do not operate in vacuum. It might be valuable to
maintain the distinction between digital natives and immigrants, but this
distinction does not mean that there are no relationships between them as
actors of change. The section focuses on the digital native ecosystem to look
at the complex assemblage of relationships that support and are amplified by
these new processes of technologised change.&lt;/p&gt;
&lt;p&gt;We see this
book as entering into a dialogue with the growing discourse and practice in the
field of youth, technology and change. The ambition is to look at the digital
(alter)natives as located in the Global South and the potentials for social
change and political participation that is embedded in their interactions
through and with digital and internet technologies. We hope that the book
furthers the idea of a context-based digital native identity and practice,
which challenges the otherwise universalist understanding that seems to be the
popular operative right now. We see this as the beginning of a knowledge
inquiry, rather than an end, and hope that the contributions in the book will
incite new discussions, invoke cross-sectorial and disciplinary debates, and
consolidate knowledges about digital (alter)natives and how they work in the
present to change our futures&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a class="external-link" href="https://www.surveymonkey.com/MyAccount_Login.aspx"&gt;Click here&lt;/a&gt; to order your copy. We invite readers to contribute reviews of an essay they found particularly interesting. Contact us: nishant@cis-india.org and fjansen@hivos.nl if you want more information, resources, or dialogues&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Nishant
Shah&lt;/p&gt;
&lt;p&gt;Fieke
Jansen&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;For media coverage and book reviews,&lt;/strong&gt; &lt;a href="https://cis-india.org/digital-natives/media-coverage" class="external-link"&gt;read here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/dnbook'&gt;https://cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Campaign</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Blank Noise Project</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Beyond the Digital</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-10T09:22:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/reconceptualizing-privacy-on-social-network-s-sites">
    <title>Reconceptualizing Privacy on Social Network(s) Sites</title>
    <link>https://cis-india.org/openness/blog-old/reconceptualizing-privacy-on-social-network-s-sites</link>
    <description>
        &lt;b&gt;While “privacy” on social network sites remains a highly ambiguous notion, much debate surrounding the issue to date has focused on privacy as the nonpublic-ness of personal information.  However, as these social platforms become sites for diverse forms of “networking”, privacy must also be popularly conceptualized as control over personal data flows.   &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;The perils of information exposure and the loss of privacy
on social network sites (SNS) has become a talked about issue. Information once
considered has private has in many instances become viewable by unintended
audiences of parents, colleagues, college admission officers, employers, even the courts.&amp;nbsp; The recent Facebook
&lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
scandal&lt;/a&gt;, which left sensitive personal information for millions of users
open and searchable via Google, heightened privacy
consciousness amongst users, public interest groups, and Facebook itself&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; As the free flowing nature of information on the
internet has redefined practices surrounding the disclosure of information, new and multidimensional privacy challenges have arose as a result.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The much-celebrated ethos of “openness” continues to attract
numerous and diverse users to SNS, and without a doubt, these platforms have
enabled users to stay connected and share information with the people around
them -- for better or worse. However, it is within this inherently open context
that notions of privacy are continuously being challenged and redefined.&amp;nbsp;&amp;nbsp; While a particular user may prefer to keep
certain information widely available to attract “potential friends” within a
certain network or social circle, it may go without saying that the same user
may not be comfortable with a family member viewing that same information, or
having personal information &lt;a href="http://www.facebook.com/apps/application.php?id=114232425072"&gt;open access
to third parties&lt;/a&gt;.&amp;nbsp; It is this iterative
tension between “openness” and privacy which beckons the need to balance the
openness of SNS with the privacy of its members.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Privacy as a
Semi-Public Personal Space&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Most commonly, privacy has been interpreted by users as a
“lack of access”, or the degree to which they are able to protect their
information from the public gaze.&amp;nbsp; Various
research examining the privacy (mal)practices of users have also, by in large,
conceptualized privacy within this public/private binary.&amp;nbsp; The most popular SNS today do allow users to
careful define their privacy level.&amp;nbsp;
However, whether or not the information of a user remains open, restricted,
or private will depend on the privacy preferences unique to the user, and to
some degree, the architecture of a particular SNS.&amp;nbsp; Inferring from privacy in practice,
researchers have generally labeled users as privacy fundamentalists, pragmatics,
or the marginally concerned &lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; While making
this distinction has been useful, is important to note that the diversity and
complexity of relationships within a single networked space obscures the
inherent simplicity of such typology.&amp;nbsp;
With many online social networks becoming representative of offline
affiliation&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;,
the challenges inherent to maintaining a diverse number of social relations online may lead researchers to interpret uncertain privacy practices as paradoxical&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; Such a notion also calls into question the
utility of categorizing users according to their privacy practices.&lt;/p&gt;
&lt;p&gt;To illustrate such complexity, many users today are
compelled to join sub-networks or groups within these sites, which then cluster
users and relax the privacy settings between them.&amp;nbsp; While a college student may wish to keep
weekend outings hidden from the professors they have connected with, they may
also be tempted to reveal such information with his network of peers-- to which
the professors may belong. The open nature of these sub-networks are
inherently valuable for maintaining offline affiliations, friendships and collegial relationship. However, this also increases the likelihood invisible audiences of unintended users may gain access to potentially
unflattering information to an . &amp;nbsp;By joining a network on Facebook, for example,
the personal information of a users profile page becomes open to all “friends
and networks”, even if the users may previously had their information set
behind a more granular privacy settings.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Within these open spaces, the ability of users to make
appropriate or selective disclosures of information is becoming obscured.&amp;nbsp; While Facebook does allow for users to alter
the settings after joining a network, such “openness by default” may catch many
users off guard or only be brought to their attention once they face its
negative repercussions.&amp;nbsp; Because the maintenance of a wide variety of
such social relationships depends on the disclosure/non-disclosure of certain
types of information&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;,
privacy in praxis has become an act of balancing the utility of social network
with the privacy concerns they present. Users are now faced with the challenge
of classifying certain pieces of information public or non public, or
determining suitable practices of disclosures amongst a diverse social graph. It
is not to be expected that such decisions will become easier within a context
whose architecture is built on openness to make it “easier for friends to find, identify, and learn about you”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Privacy as Control
over the Flow of Information&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While the classification and coding of information vis-à-vis
a diverse set of relationships forms the base of practice for most of the
privacy conscious, this paradigm of privacy remains rather limited within a
defined network of individuals, whether they be “friends”, within an intended
audience, or not.&amp;nbsp; Within this framework, information is understood as being either socially or
institutionally sensitive, &lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;as its exposure may affect certain social or institutional relationships.&amp;nbsp; Given the spatial and temporal context the
“social profile” gives to personal information, it is reasonable to see how
popular understandings of privacy have been within the public/private paradigm.&lt;/p&gt;
&lt;p&gt;While this may be the case, it is important that users
observe how the inherently “networked” nature of these spaces complicates the
common privacy paradigm.&amp;nbsp; When a user
joins a SNS, they enter into a complex and opaque set of networked relationships
beyond those with their “friends” and “friends of friends”.&amp;nbsp; There exists sub-networks of third-party
actors which constitute corporate entities, their partners and
affiliates --may they be advertisers, third party developers, or a broad range
of other service providers.&amp;nbsp; Many of
which are granted access to your information in varying forms and for differing
reasons.&amp;nbsp; With the introduction of the Open Social 
network, fronted by Google and various social advertising and developers
networks, the ability for one to maintain the control and integrity of their
information or “data” has become an increasingly complex endeavor.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the importance of maintaining non-public social spaces
online should not be diminished, in a time when collecting, storing,
aggregating and disseminating information has become increasingly easy and
cost-effective, users of SNS must begin to conceptualize online privacy in a
way which extends past the social context popularly understood to give
“information” meaning.&amp;nbsp;&amp;nbsp; Once information
loses its contextual place of meaning, which may be the profile itself, users&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
seem less apt to consciously consider the collection and dissemination of such
data as a breach of privacy, or even a concern at all.&amp;nbsp; It may be true that the socially sensitive
nature of such data is reduced once it is disassociated with a particular user,
or that the click stream patterns and other information collected by
advertisers through cookies may not always pose a direct and potential threat
to our privacy as we’ve thus far conceived it.&amp;nbsp;
However, a brief glance at the privacy policies, terms of use, and
on-site practices of a few SNS illuminates that privacy must be seen as
the control over the flows of personal information.that&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Privacy vis-à-vis
Third Parties&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As many have illuminated, SNS are commercial enterprises
with a business model based on the harvesting of personal information for
marketing and other purposes&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; Therefore, it may be naive for a users to
believe what happens on these sites stays on these sites, or that privacy
settings, however granular they may be, grants them adequate control over their
information.&amp;nbsp; While SNS such as Bebo
state that they “take your privacy very seriously”, the onus is on the user to
determine whether or not the privacy standards of third party applications are
up to par.&amp;nbsp; The transfer of
responsibility for monitoring the privacy practices of third parties is
characteristic of many popular SNS.&amp;nbsp;
MySpace states in their privacy policy that they do not “control third
parties” and cannot “dictate their actions”, while Facebook similarly states
that they cannot guarantee that such third parties will “follow their
rules”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As third parties are often governed by their own privacy
policies, the unmonitored and unenforced &lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;nature of these networked relationships places further responsibility&lt;a id="_anchor_2" class="msocomanchor" name="_msoanchor_2" href="#_msocom_2"&gt; &lt;/a&gt;on the individual users to ensure that privacy practices
are adequate.&amp;nbsp; This becomes quite
difficult on SNS like Facebook, where third party developers are granted access
to the personal information of all you and all your network
members, including photos, videos, and other biographical information&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The relatively anonymous nature of
these parallel sub-networks also obscures the ability of the user to take
control over the accessibility of their information.&amp;nbsp; Further, the privacy policies of the various
SNS give no indication as to “who” their affiliates, partners, and service
providers are.&amp;nbsp; Most SNS also reserve the
right to transfer personally identifiable information to its partners and
affiliates if they have a “business reason to do so” and in all cases,
advertisers are subject to their own privacy policies with regards to the
information they collect -- some of it personally identifiable.&amp;nbsp; To complicate matters, all of the leading
SNS, including Facebook, Orkut, Myspace, and Bebo, reserve the right to collect
information about you from other companies and publicly available sources.&amp;nbsp; It is unclear as to what information is being
collected or for what purposes, and unfortunately, such information is effectively
kept “private”.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Redefining
Privacy on Social Network Sites&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Social network sites can be seen as open spaces which allow
users to maintain diverse personal relationships.&amp;nbsp; However, the somewhat anonymous parallel
networks of third parties which exist on these sites threatens the “open
nature” of these sites vis-à-vis our privacy.&amp;nbsp;
While users may maintain that the information they have provided is kept
secure and private, these parallel third party networks negates the control an
individual may assert over the flow of their information.&amp;nbsp;&amp;nbsp; It is within this context that privacy needs
to be conceptually redefined in relation to&lt;a id="_anchor_3" class="msocomanchor" name="_msoanchor_3" href="#_msocom_3"&gt;&lt;/a&gt; both user “information” as it appears on a social
profile, and “data” once it is processed by third parties.&amp;nbsp; There is a need for an alternative paradigm
to privacy on SNS which takes into consideration the flow, retention and use of
personal information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While it may be too early to determine whether or not the expected
digital dossiers complete with complex user-specific biographical data
will be developed or come to threaten our privacy in a fundamentally new way,
it is also premature and erroneous to assume that traditional notions of
privacy are fundamentally antithetical to the net&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&amp;nbsp; As communication become increasingly mediated
by digital technologies, so to should our perceptions of privacy and ways of
preserving it.&amp;nbsp; SNS must also become
responsible for ensuring greater transparency in the flows and uses of personal
information, working to standardize the privacy policies in such a way that
makes the user experience one which is seamless with respect to privacy
practices.&amp;nbsp; Initiatives such as the W3C’s
P3P are a promising step towards nurturing a more nuanced understanding of
privacy among internet users.&amp;nbsp; Only through
understanding privacy as the control over the flows of personal information can
be balance the interests of SNS users with the business models of these “open”
networked spaces.&lt;/p&gt;
&lt;div&gt;
&lt;p align="center" style="text-align: center;"&gt;Top of Form&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;span class="FootnoteCharacters"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div id="_com_3" class="msocomtxt"&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/reconceptualizing-privacy-on-social-network-s-sites'&gt;https://cis-india.org/openness/blog-old/reconceptualizing-privacy-on-social-network-s-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybercultures</dc:subject>
    

   <dc:date>2011-08-18T05:07:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/workshop">
    <title>Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop: Call for Participation</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/workshop</link>
    <description>
        &lt;b&gt;Deadline for submission: 26th July 2011-06-08;
When: 19th - 22nd August, 2011;
Where: Centre for Environmental Planning and Technology (CEPT) University, Ahmedabad;
Organised by: Centre for Internet and Society, Bangalore and CEPT University, Ahmedabad.
Please Note: Travel support is only available for domestic travel within India.&lt;/b&gt;
        
&lt;p&gt;LOCATING INTERNETS is an innovative, multi-disciplinary, workshop that engages with some of the most crucial debates around Internet and Society within academic scholarship, discourse and practice in India. It explores Where, When, How and What has changed with the emergence of Internet and Digital Technologies in the country. The Internet is not a singular monolithic entity but is articulated in various forms – sometimes materially, through accessing the web; at others, through our experiences; and yet others through imaginations of policy and law. Internets have become a part of our everyday practice, from museums and archives, to school and university programmes, living rooms and public spaces, relationships and our bodily lived realities. It becomes necessary to reconfigure our existing concepts, frameworks and ideas to make sense of the rapidly digitising world around us. The Internet is no longer contained in niche disciplines or specialised everyday practices. LOCATING INTERNETS invites scholars, teachers, researchers, advanced research students and educationalists from any discipline to learn and discuss how to ask new questions and design innovative curricula in their discipline by introducing concepts and ideas from path-breaking research in India.&lt;/p&gt;
&lt;p&gt;Comprised of training, public lectures, open discussion spaces, and hands-on curriculum building exercises, this workshop will introduce the participants to contemporary debates, help them articulate concerns and problems from their own research and practice, and build knowledge clusters to develop innovative and open curricula which can be implemented in interdisciplinary undergraduate spaces in the country. It showcases the research outputs produced by the Centre for Internet and Society’s Researchers @ Work Programme, and brings together nine researchers to talk about alternative histories, processes, and bodies of the Internets, and how they can be integrated into mainstream pedagogic practices and teaching environments.&lt;/p&gt;
&lt;h3&gt;Knowledge Clusters for the Workshop&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is designed innovatively to accommodate for various intellectual and practice based needs of the participants. While the aim is to introduce the participants to a wide interdisciplinary range of scholarship, we also hope to address particular disciplinary and scholarly concerns of the participants. The workshop is further divided into three knowledge clusters which help the participants to focus their energies and ideas in the course of the four days.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Bridging the Gap&lt;/strong&gt;: This workshop seeks to break away from the utopian public discourse of the Internets as a-historical and completely dis-attached from existing technology ecologies in the country. This knowledge cluster intends to produce frameworks that help us contextualize the contemporary internet policy, discourse and practice within larger geo-political and socio-historical flows and continuities in Modern India. The first cluster chartsdifferent pre-histories of the Internets, mapping the continuities and ruptures through philosophy of techno-science, archiving practices, and electronifcation of governments,to develop new technology-society perspectives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Paradigms of Practice&lt;/strong&gt;:One of the biggest concerns about Internet studies in India and other similar developed contexts is the object oriented approach that looks largely at specific usages, access, infrastructure, etc. However, it is necessary to understand that the Internet is not merely a tool or a gadget. The growth of Internets produces systemic changes at the level of process and thought. The technologies often get appropriated for governance both by the state and the civil society, producing new processes and dissonances which need to be charted. The second cluster looks at certain contemporary processes that the digital and Internet technologies change drastically in order to recalibrate the relationship between the state, the market and the citizen.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Feet on the Ground&lt;/strong&gt;: The third cluster looks at contemporary practices of the Internet to understand the recent histories of movements, activism and cultural practices online. It offers an innovative way of understanding the physical objects and bodies that undergo dramatic transitions as digital technologies become pervasive, persuasive and ubiquitous. It draws upon historical discourse, everyday practices and cultural performances to form new ways of formulating and articulating the shapes and forms of social and cultural structures.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Workshop Outcomes&lt;/h3&gt;
&lt;p&gt;The participants are expected to engage with issue of Internet and it various systemic processes through their own disciplinary interests. Apart from lectures and orientation sessions, the participants will actively work on their own project ideas during the period in groups and will be guided by experts. The final outcome of the workshops would be curriculum for undergraduate and graduate teaching space of various disciplines in the country.&lt;/p&gt;
&lt;h3&gt;Participation Guidelines&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is now accepting submissions from interested participants in the following format:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Name:&lt;/li&gt;&lt;li&gt;Institutional affiliation and title:&lt;/li&gt;&lt;li&gt;Address:&lt;/li&gt;&lt;li&gt;Email address:&lt;/li&gt;&lt;li&gt;Phone number:&lt;/li&gt;&lt;li&gt;A brief resume of work experience (max. 350 words)&lt;/li&gt;&lt;li&gt;Statement of interest (max. 350 words)&lt;/li&gt;&lt;li&gt;Key concerns you want to address in the Internet and Society field (max. 350 words)&lt;/li&gt;&lt;li&gt;Identification with one Knowledge-cluster of the workshop and a proposal for integrating it in your research/teaching practice (max. 500 words)&lt;/li&gt;&lt;li&gt;Current interface with technologies in your pedagogic practices (max. 350 words)&lt;/li&gt;&lt;li&gt;Additional information or relevant hyperlinks you might want to add (Max. 10 lines)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;pre&gt;Notes:&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Submissions will be accepted only from participants in India, as attachments in .doc, .docx or .odt formats at &lt;a class="external-link" href="mailto:locatinginternets@cis-india.org"&gt;locatingInternets@cis-india.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Submissions made beyond 26th July 2011 may not be considered for participation. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Submissions will be scrutinized by the organisers and selected participants will be informed by the 30th July 2011, about their participation.&lt;/li&gt;&lt;li&gt;Selected participants will be required to make their own travel arrangements to the workshop. A 2nd A.C. train return fare will be reimbursed to the participants.&amp;nbsp; Shared accommodation and selected meals will be provided at the workshop.&lt;/li&gt;&lt;li&gt;A limited number of air-fare reimbursements will be available to participants in extraordinary circumstances. All travel support is only available for domestic travel in the country.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Chairs&lt;/strong&gt;: Nishant Shah, Director-Research, Centre for Internet and Society Bangalore;&lt;/p&gt;
&lt;p&gt;Pratyush Shankar, Associate Professor &amp;amp; Head of Undergraduate Program, Faculty of Architecture, CEPT University&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supported by&lt;/strong&gt;: Kusuma Foundation, Hyderabad&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Experts&lt;/strong&gt;:Anja Kovacs, Arun Menon, Asha Achuthan, Ashish Rajadhykasha, Aparna Balachandran, Namita Malhotra, Nithin Manayath, Nithya Vasudevan, Pratyush Shankar, Rochelle Pinto and Zainab Bawa&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/workshop'&gt;https://cis-india.org/research/conferences/conference-blogs/workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Gaming</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>archives</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2011-07-21T06:00:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/one-avatar">
    <title>One for the avatar</title>
    <link>https://cis-india.org/digital-natives/blog/one-avatar</link>
    <description>
        &lt;b&gt;With increasing instances of online avatars being victimised, users who are part of these identities need to be protected against vicious attacks. A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. This article was published on April 3, 2011. &lt;/b&gt;
        
&lt;p&gt;On March 21 the digital natives I worked with, across three continents, blogged to celebrate Human Rights Day in South Africa. The topic: What should be a right in the digital age? While the blogathon captured the diverse contexts and voices of digital natives around the globe, it got me thinking about the question of rights, technology and identity.&lt;/p&gt;
&lt;p&gt;When it comes to technology-based rights — right to access, right to information, right to dis/connect, right to be online, right to privacy, etc. — there seems to be an understanding that these rights are granted to the person who engages with digital and internet technologies.&lt;/p&gt;
&lt;p&gt;For instance, if somebody steals your identity online, you can ask for legal arbitration. The right of the physical user who is interacting with digital technologies is clearly violated. Similarly, other kinds of economic abuse through phishing or spam are also instances in which the right of the individual is clearly breached and hence justice can be dispensed.&lt;/p&gt;
&lt;p&gt;However, in the wide world of the Web, things often become blurry. For those who simultaneously live their lives in the fused spaces of the physical and the digital, there are instances when violence takes place but there are no arbitrators for justice. One way of thinking about this, is by looking at the digital avatars that we create online. Avatars are generally visual simulations that people create for themselves to mark their presence on the Web. Within the more traditional digital interactions, avatars are straightforward — pictures of people, icons, brands, photographs of pets, cartoons, or even text based signatures . Within role-playing games and virtual immersive environments, avatars can be more adventurous, often taking up the form of fantasy bodies that the users might aspire to have.&lt;/p&gt;
&lt;p&gt;These avatars, for digital natives, are extensions of the self and an integral part of their online presence. A lucrative industry sells digital amenities, luxuries and brands to clothe and accessorise the avatars, so that they resemble the real-life user. The users invest time, money and resources to create unique avatars. However, these avatars, which are a combination of hardware, software and wetware — part machine, part code, part human being, despite their very material presence, do not really have any rights of their own.&lt;/p&gt;
&lt;p&gt;Because they are treated only as cultural products, they are looked at only as objects rather than as animated identities. Popular law and culture treat avatars as external and not related to the users who create them. Within a digital universe, when an avatar gets abused, there are no rights that it can claim in order to find safety or justice. Our understanding of digital rights are so tied to the idea of physical loss and injury that unless a material loss to the physical body can be demonstrated, it becomes difficult to actually invoke the rights of the victim.&lt;/p&gt;
&lt;p&gt;For example, in social networking sites like Facebook, it is common for younger users to bully people from their schools. Instead of a direct physical attack on the person, a series of “Hate pages” crop up, where conversations which were hitherto restricted to the circle of friends, are now openly hosted, attacking one particular person. Even more subtle are the campaigns to “De-friend” people, making them social pariahs by not allowing them access to social cliques. A common practice has also been to spam the person’s account with so many unnecessary emails that they can no longer access their important mails, which get lost in the deluge. These are serious attacks, which have direct impacts on the victim’s social and mental state.&lt;/p&gt;
&lt;p&gt;Because no obvious physical harm is done, because there is no straightforward attack on the person involved or a demonstrable loss to any physical person, these attacks go unnoticed and unresolved. Even when these claims are brought to the notice of authority, the victim is asked to “move on” because it is “merely the internet”.&lt;/p&gt;
&lt;p&gt;It is time to realise that there is nothing “mere” about the internet and the world of digital social interaction. What happens to the online persona has direct and often horrifying consequences to bodies in the physical world. And it is time to think of the right of the avatar, so that the users, who are a part of these identities, can also be protected. If I had to choose, in the digital age, the right to be an avatar, would be the right to vote for.&lt;/p&gt;
&lt;div class="pullquote"&gt;Read the original in the Indian Express &lt;a class="external-link" href="http://www.indianexpress.com/news/one-for-the-avatar/770774/"&gt;here&lt;/a&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/one-avatar'&gt;https://cis-india.org/digital-natives/blog/one-avatar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-14T12:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond">
    <title>Reflecting from the Beyond</title>
    <link>https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond</link>
    <description>
        &lt;b&gt;After going ‘beyond the digital’ with Blank Noise through the last nine posts, the final post in the series reflects on the understanding gained so far about youth digital activism and questions one needs to carry in moving forward on researching, working with, and understanding digital natives. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p class="Normalfirstparagraph"&gt;Throughout
the series, I have argued the following points. &lt;a href="https://cis-india.org/digital-natives/blog/beyond-the-digital-understanding-digital-natives-with-a-cause" class="external-link"&gt;Firstly&lt;/a&gt;, the 21&lt;sup&gt;st&lt;/sup&gt;
century society is changing into a network society and that youth movements are
changing accordingly. I have outlined the gaps in the current perspectives used
in understanding the current form and proposed to approach the topic by going
beyond the digital: from a youth standpoint, exploring all the elements of
social movement, and based on a case study in the Global South – the uber cool
Blank Noise community who have embraced the research with open arms. The
methodology has allowed me to identify the newness in &lt;a href="https://cis-india.org/digital-natives/blog/talking-back-without-talking-back" class="external-link"&gt;youth’s approach to
social change&lt;/a&gt; and &lt;a href="https://cis-india.org/digital-natives/blog/the-many-faces-within" class="external-link"&gt;ways of organizing&lt;/a&gt;. Although I do not mean to generalize,
there are some points where the case study resonates with the broader youth
movement of today. In this concluding post, I will reflect on how the research
journey has led me to rethink several points about youth, social change, and
activism.&lt;/p&gt;
&lt;p&gt;While
social movements are commonly imagined to aim for concrete structural change,
many youth movements today aim for social and cultural change at the intangible
attitudinal level. Consequently, they articulate the issue with an intangible
opponent (the mindset) and less-measurable goals. Their objective is to raise
public awareness, but their approach to social change is through creating
personal change at the individual level through engagement with the movement.
Hence, ‘success’ is materialized in having as many people as possible involved
in the movement. This is enabled by several factors.&lt;/p&gt;
&lt;p&gt;The
first is the Internet and new media/social technologies, which is used as a
site for community building, support group, campaigns, and a basis to allow
people spread all over the globe to remain involved in the collective in the
absence of a physical office. However, the cyber is not just a tool; it is also
a public space that is equally important with the physical space. Despite acknowledging
the diversity of the public engaged in these spaces, youth today do not
completely regard them as two separate spheres. Engaging in virtual community
has a real impact on everyday lives; the virtual is a part of real life for
many youth (Shirky, 2010). However, it is not a smooth ‘space of flows’
(Castells, 2009) either. Youth actors in the Global South do recognize that
their ease in navigating both spheres is the ability of the elite in their
societies, where the digital divide is paramount. The disconnect stems from
their &lt;a href="https://cis-india.org/digital-natives/blog/the-class-question" class="external-link"&gt;acknowledgement&lt;/a&gt; that social change must be multi-class and an expression
of their reflexivity in facing the challenge.&lt;/p&gt;
&lt;p&gt;The
second enabling factor is its highly individualized approach. The movement
enables people to personalize their involvement, both in terms of frequency and
ways of engagement as well as in meaning-making. It is an echo of the age of
individualism that youth are growing up in, shaped by the liberal economic and
political ideologies in the 1990s India
and elsewhere (France,
2007). Individualism has become a new social structure, in which personal decisions
and meaning-making is deemed as the key to solve structural issues in late
modernity (&lt;em&gt;Ibid).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In this era, young
people’s lives consist of a combination of a range of activities rather than
being focused only in one particular activity (&lt;em&gt;Ibid). &lt;/em&gt;This is also the case in their social and political
engagement. Very few young people worldwide are full-time activists or
completely apathetic, the mainstream are actually involved in ‘everyday
activism’ (Bang, 2004; Harris et al, 2010). These are young people who are
personalizing politics by adopting causes in their daily behaviour and
lifestyle, for instance by purchasing only Fair Trade goods, or being very involved
in a short term concrete project but then stopping and moving on to other activities.
The emergence of these everyday activists are explained by the dwindling authority
of the state in the emergence of major corporations as political powers
(Castells, 2009) and youth’s decreased faith in formal political structures
which also resulted in decreased interest in collectivist, hierarchical social
movements in favour of a more individualized form of activism made easier with
Web 2.0 (Harris et al, 2010).&lt;/p&gt;
&lt;p&gt;A collective of
everyday activists means that there are many forms of participation that one
can fluidly navigate in, but it requires a committed leadership core recognized
through presence and engagement. As Clay Shirky (2010: 90) said, the main
cultural and ethical norm in these groups is to ‘give credit where credit is
due’. Since these youth are used to producing and sharing content rather than
only consuming, the aforementioned success of the movement lies on the leaders’
ability to facilitate this process. The power to direct the movement is not
centralized in the leaders; it is dispersed to members who want to use the
opportunity.&lt;/p&gt;
&lt;p&gt;This form of
movement defies the way social movements have been theorized before, where
individuals commit to a tangible goal and the group engagement directed under a
defined leadership. The contemporary youth movement could only exist by staying
with the intangible articulation and goal to accommodate the variety of
personalized meaning-making and allow both personal satisfaction and still
create a wider impact; it will be severely challenged by a concrete goal like
advocating for a specific regulation. Not all youth there are ‘activist’ in the
common full-time sense, for most everyday activists their engagement might not
be a form of activism at all but a productive and pleasurable way to use their
free time&lt;span class="MsoFootnoteReference"&gt;
&lt;/span&gt;&amp;nbsp;- or, in Clay Shirky’s term, cognitive surplus
(2010).&lt;/p&gt;
&lt;p&gt;Revisiting my
initial intent to put the term activism under scrutiny, I acknowledge this as a
call for scholars to re-examine the concepts of activism and social movements
through a process of de-framing and re-framing to deal with how youth today are
shaping the form of movements. Although the limitations of this paper do not
allow me to directly address the challenge, I offer my own learning from this
process for the quest of future researchers.&lt;/p&gt;
&lt;p&gt;The way young
people today are reimagining social change and movements reiterate that
political and social engagement should be conceived in the plural. Instead of
“Activism” there should be “activisms” in various forms; there is not a new
form replacing the older, but all co-existing and having the potential to
complement each other. Allowing people to cope with street sexual harassment
and create a buzz around the issue should complement, not replace, efforts made
by established movements to propose a legislation or service provision from the
state. This is also a response I offer to the proponents of the aforementioned
“doubt” narrative.&lt;/p&gt;
&lt;p&gt;I share the more
optimistic viewpoint about how these new forms are presenting more avenues to
engage the usually apathetic youth into taking action for a social cause.
However, I also acknowledge that the tools that have facilitated the emergence
of this new form of movement have existed for less than a decade; thus, we
still have to see how it evolves through the years.&lt;/p&gt;
&lt;p&gt;Hence, I also find
the following questions to be relevant for proponents of the “hope” narrative.
Social change needs to cater to the most marginalized in the society, but as
elaborated before, the methods of engagement both on the physical and virtual
spaces are still contextual to the middle class. Therefore, how can the
emerging youth movements evolve to reach other groups in the society? Since
most of these movements are divorced from existing movements, how can they
synergize with existing movements to propel concrete change? These are open questions
that perhaps will be answered with time, but my experience with Blank Noise has
shown that these actors have the reflexivity required to start exploring
solutions to the challenges.&lt;/p&gt;
&lt;p&gt;The research
started from a long-term personal interest and curiosity. In this journey, I
have found some answers but ended up with more questions that will also stay
with me in the long term. As a parting note before, I would like to share a
quote that will accompany my ongoing reflection on these questions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;My advice to
other young activists of the world: study and respect history... but ultimately
break the mould. There have never been social media tools like this before. We
are the first generation to test them out: to make the mistakes but also the
breakthrough.&lt;/em&gt;&lt;/p&gt;
&lt;p align="right" style="text-align: right;"&gt;(Tammy
Tibbetts, 2010)&lt;/p&gt;
&lt;p class="Heading1notchapter"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This is the &lt;/em&gt;&lt;strong&gt;&lt;em&gt;tenth and final&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; post in the &lt;a href="https://cis-india.org/digital-natives/blog/the-beyond-the-digital-directory" class="external-link"&gt;&lt;strong&gt;Beyond
the Digital &lt;/strong&gt;series,&lt;/a&gt; a research project that aims to explore
new insights to understand youth digital activism conducted by Maesy Angelina
with Blank Noise under the Hivos-CIS Digital Natives Knowledge Programme.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;References:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Bang, H.P. (2004) ‘Among everyday makers and expert citizens’. Accessed
21 September 2010. &lt;a href="http://www.sam.kau.se/stv/ksspa/papers/bang.pdf"&gt;http://www.sam.kau.se/stv/ksspa/papers/bang.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Castells, M. (2009) &lt;em&gt;Communication
Power. &lt;/em&gt;New York: Oxford University
Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;France, A. (2007) &lt;em&gt;Understanding Youth in Late Modernity&lt;/em&gt;. Berkshire:
Open University Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Harris, A., Wyn, J., and Younes, S. (2010) ‘Beyond apathetic or
activist youth: ‘Ordinary’ young people and contemporary forms of
participaton’, &lt;em&gt;Young &lt;/em&gt;Vol. 18:9, pp.
9-32&lt;/p&gt;
&lt;p&gt;Shirky, C. (2010) &lt;em&gt;Cognitive Surplus:
Creativity and Generosity in a Connected Age. &lt;/em&gt;London: Penguin Press&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Image source:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blog.blanknoise.org/2009/08/street-signs.html"&gt;http://blog.blanknoise.org/2009/08/street-signs.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond'&gt;https://cis-india.org/digital-natives/blog/reflecting-from-the-beyond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maesy</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Street sexual harassment</dc:subject>
    
    
        <dc:subject>Blank Noise Project</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Beyond the Digital</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-05-14T12:21:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/watson-knows">
    <title>Watson knows the Question</title>
    <link>https://cis-india.org/digital-natives/blog/watson-knows</link>
    <description>
        &lt;b&gt;Now that an algorithm has given humans a run for their money on a quiz show, it’s time to rethink the idea of a machine. A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. This article was published on March 6, 2011.&lt;/b&gt;
        
&lt;p&gt;Quantum theory suggests that multiple universes exist where every possible alternative can come true. If this were the case, somewhere there must be a world filled with machines that are looking at human evolution and figuring out new and advanced human machine relationships. Or for those who are not very quantum minded, imagine a world where machines are the evolved species and they depend upon human technology — emotional connections, semantic learning, etc. — for their daily transactions and survival. I am not suggesting a futuristic dystopia, like the kind that science fiction specialises in. However, it would be interesting to imagine a world where technology is not only at the periphery of human civilisation but at the centre of it.&lt;/p&gt;
&lt;p&gt;I am proposing this world view to revisit the idea of a digital native. We have, so far, in scholarship and practice, education and policy, only looked at digital natives as young human beings who interact in new and innovative ways with evolving technologies, to form human-machine networks and assemblages. However, as Artificial Intelligence and Intelligence Augmentation develop to produce thinking technologies, it is time to start looking at being sapient as not necessarily a human condition.&lt;/p&gt;
&lt;p&gt;Early last month, an artificially created super computing system called Watson (elementary, surely?) took the world by a storm as it competed against two human contestants on a popular American quiz show called Jeopardy! The trivia-based show provides answers clustered around a particular theme, and contestants have to ask the correct question to the answer, to win prize money. It is not a straightforward question-answer show because it relies on more than human memory and recollection. It gives cryptic clues (like the ones we are used to in a crossword), offers semantic relationships which need more than just a database memory, and relies on the contestants’ abilities to make creative connections between the clues in order to guess the right questions.&lt;/p&gt;
&lt;p&gt;Watson, a product of seven years of research by IBM Research, works on an algorithm which simulates human language and cognitive patterns to make intelligent connections and deductions to understand the context of the clues and then provide answers. Powered by 2,800 super powered computers on a high-speed network, Watson competed against Jeopardy!’s biggest champions and made history as it showed extraordinary human learning and predictive powers. It has been one of the biggest achievements in advanced computing to develop an algorithm that mimics human learning and has changed the way in which we look at the human-machine relationship.&lt;/p&gt;
&lt;p&gt;While much commentary on Watson revolves around what it means to be human, and subsequently, what it is to be a digital native, I have a different proposition to make. Perhaps, Watson’s debut on American television is not only about thinking what is human, but also about what it means to be a machine.&lt;/p&gt;
&lt;p&gt;First, the Watson that appeared on TV was a sleek display screen that stood behind a lectern in the studio along with the human contestants. The original Watson was next door, being cooled by refrigeration units, but it appeared to the human audience (in and outside the studio) in its avatar. This was a radically new idea because we have always thought of the avatar as a technology based representation of human users. We find avatars on Facebook and in online role-playing games. To think of a machine appearing in a human form was radically new.&lt;/p&gt;
&lt;p&gt;Second, Watson was not able to just make predictions by mining information. It was also able to display levels of confidence. If Watson was not confident about an answer, it did not push the buzzer to answer. In fact, once the information was harvested, it displayed its top three guesses to show that, like human contestants, it calculated risks of wrong answers.&lt;/p&gt;
&lt;p&gt;Third, Watson was able to display or at least simulate human emotions. It took guesses even when in doubt. It showed a spirit of adventure and played big. It was disappointed when it lost or was happy when it got the answers. It was able to display its “emotions” through various displays in its form and could get the audience’s attention, applause and support.&lt;/p&gt;
&lt;p&gt;What this experiment suggests to me is that Watson is perhaps a digital native. All our concentration has always been on human subjects, but synthetic life forms and technology-based intelligence, are blurring this distinction between humans and technologies. We should start thinking of a digital native as neither machine nor human being, but a combination of the two, residing simultaneously in both the realms of the physical and the digital. Watson is perhaps a new digital native, a technology that is growing and slowly learning from its interactions with the human world around it. One of these days, we might be living in the midst of computational devices, which, when we are flummoxed, might turn to us and say, “Elementary, my dear Sherlock!”&lt;/p&gt;
&lt;p&gt;Contact: digitalnative@expressindia.com&lt;/p&gt;
&lt;p&gt;Read the original in the Indian Express &lt;a class="external-link" href="http://www.indianexpress.com/news/watson-knows-the-question/757315/1"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/watson-knows'&gt;https://cis-india.org/digital-natives/blog/watson-knows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-05-14T12:24:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/change-has-come">
    <title>Change has come to all of us</title>
    <link>https://cis-india.org/digital-natives/blog/change-has-come</link>
    <description>
        &lt;b&gt;The general focus on a digital generational divide makes us believe that generations are separated by the digital axis, and that the gap is widening. There is a growing anxiety voiced by an older generation that the digital natives they encounter — in their homes, schools and universities and at workplaces — are a new breed with an entirely different set of vocabularies and lifestyles which are unintelligible and inaccessible. It is time we started pushing the boundaries of what it means to be a digital native. &lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;In this connected world, the geek is everyone — from a grandma on Skype to a teen on Second Life.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Two self-proclaimed digital natives, 
on a cold autumn morning in Amsterdam, decided to leave the comforts of 
their familiar virtual worlds and venture into the brave new territories
 of real-life shopping. Though slightly confused by the lack of 
click-and-try options and perplexed by the limitations of the physical 
spaces of shopping, we plodded along, shop after shop, thinking how much
 easier it is to chat on IM while flying through Second Life as opposed 
to face-to-face interactions while walking on crowded streets. After we 
had run out of shops (and patience), we decided that it was time to rely
 on better resources than our own wits. The Dutch girl fished out her 
Android smartphone and with the single press of a button, opened up 
channels of information. She called her mother. She asked for the 
location of the store that was eluding us. And then she looked at me in 
silence before bursting into laughter. Her 64-year-old mother, in 
response to our question, had said, “Why don’t you just Google it?” &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;We spent five minutes in stunned 
laughter when we realised that we should have instinctively done that 
and that we were being asked by somebody from Generation U to “get with 
it”. Funny (and slightly embarrassing) as it is, it brings into focus, 
the question, “Who is a digital native?” For those of you who have been 
reading this column, it has been defined in terms of age and usage. A 
digital native is generally somebody young, somebody who is tech-savvy, 
somebody who can perform complicated calisthenics with digital 
technologies — throwing virtual sheep, having instant relationships, 
writing complex stories and pirating their favourite movies — in one 
nonchalant click of the mouse. However, these kinds of digital natives 
are only stereotypes.
&lt;/p&gt;
&lt;p&gt;If we move away from
 these descriptions of novelty, of excitement and of youth, a different 
kind of digital native emerges for us. A digital native is somebody 
whose way of thinking (about himself and the world around) is 
significantly informed because of the presence of and familiarity with 
the internet and digital technologies. In other words, a digital native 
is a person who has experienced (and is often led to) change because of 
their interactions with new technologies.
&lt;/p&gt;
&lt;p&gt;It can be a 
middle-aged man whose business changed when he started tracking his 
supplies using complex and sophisticated databases. It can be a mother 
of two, finding support and help raising her children on online 
communities like Bing. It can be a senior teacher re-discovering 
pedagogy through distributed knowledge systems on Wikipedia. It can be 
grandparents who interact with their grandchildren over Skype and text 
messaging, across international borders and lifestyles. It can be a 
mother telling her digital native daughter to “just Google it!” over the
 cellphone. 
&lt;/p&gt;
&lt;p&gt;And as things might 
be, Shamini, my 15-year-old bonafide digital native correspondent from 
Ahmedabad, recently wrote that she got off Facebook and deleted her 
account. “It felt like I had retired from a job,” she said. But she was 
away from Facebook only for four months, dissociated from all the “time,
 energy and drama that it caused” and was quite enjoying it. After four 
months of self-imposed exile, she, however, resurfaced on Facebook. And 
it was to stay in touch with her aunt and uncle, who live in faraway 
lands, and cannot keep in touch with her unless she is on Facebook. 
Shamini was surprised at this. After spending much time convincing them 
about trying to use email and phones to keep connected, she finally gave
 in and started a new account that nobody knows of. And she asked me the
 important question: Who is the digital native now?
&lt;/p&gt;
&lt;p&gt;The general focus on
 a digital generational divide makes us believe that generations are 
separated by the digital axis, and that the gap is widening. There is a 
growing anxiety voiced by an older generation that the digital natives 
they encounter — in their homes, schools and universities and at 
workplaces — are a new breed with an entirely different set of 
vocabularies and lifestyles which are unintelligible and inaccessible. 
It is time we started pushing the boundaries of what it means to be a 
digital native. 
&lt;/p&gt;
&lt;p&gt;My grandmother used 
to tell us, “Nobody is born knowing a language.” I think it is time to 
start applying the same logic here. Nobody is born with technologies. 
But there are people — perhaps not yet a generation, but still a 
population — who are changing their lives and significantly transforming
 the world by turning Google and Facebook and Twitter into verbs and a 
way of doing things. So the next time,  somebody asks you if you know a 
digital native, don’t look for somebody out there — it might just be 
you! &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;The original column can be read in &lt;a class="external-link" href="http://http://www.indianexpress.com/news/change-has-come-to-all-of-us/701505/0"&gt;The Indian Express&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;&lt;/strong&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/change-has-come'&gt;https://cis-india.org/digital-natives/blog/change-has-come&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    

   <dc:date>2012-03-13T10:43:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
