<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 121 to 135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/beyond-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/digitally-analogue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/private-eye"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/we-are-cyborgs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/non-human-intelligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/idea-of-the-book"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust">
    <title>How Facebook is Blatantly Abusing our Trust</title>
    <link>https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust</link>
    <description>
        &lt;b&gt;‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook is just re-emerging from the controversies around how it conducted the voting on its new privacy policies, when it goes and digs itself deeper by trying to push down its email services down the throats of its users. If you have recently logged-in to Facebook, you will have received a notification that says that you have been ‘gifted’ with a free Facebook email account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, that is a later phenomenon. A couple of days ago, the whole community of Facebook users went about their usual way, without knowing that something substantial had changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, who launched their email service as a part of their social networking empire, with or without your consent, has given us a ‘yourname@facebook.com’ email account. I know free things are considered good, but not an email account that I did not sign up for!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And to make things worse, this email account was, without our consent, added to our time-line and displayed as the primary email address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In itself, it is a small move – with the redesign of the Timeline, Facebook had already introduced many such forced disclosures and changes that most of just had to accept, even if it might have had us fuming. However, with this change, Facebook has now started showing exactly what it can do in building your public profile and creating information about you, without your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their lame PR spiel, the company tried to pass it off as a freebie that they were gifting their users. But anybody who was not born yesterday realises that this is a desperate attempt to make a floundering service work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook messaging may work despite the clunky user interface, but its email services remain terribly underused. One of the paradoxes for this lies in the fact that you cannot open a Facebook account without a primary email account with another service, which is used as your authentication as well as the system through which Facebook notifications work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, many times, when introducing Facebook to first-time users of the web, we have to first train them in creating and using an email account before they can get on to the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, when Facebook did offer users the option of using a Facebook email service, most of them politely declined because nobody in their right mind is going to migrate to new a email services unless there was a substantial range of benefits being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how did Facebook respond? It just forced the email service upon its millions of users. While this is no different from the other kind of restrictions that are imposed upon us within the Facebook universe – the advertisements we see, the design and layout, the insipid white-and-blue background, the kind of information we can and cannot share and display – etc. this is the first time that Facebook actually added to our information profile and displayed it to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which means, that the next time somebody looks you up on Facebook – and let’s face it, one of the things we all use Facebook for, is to find people we know and get connected with them – they will see your Facebook email id listed as your contact address. And while you might get a notification in your primary email about any mails that you receive in your Facebook account, the fact is that, all those emails will become a part of Facebook’s huge data farms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a move that is almost a pale imitation of Google’s growing monopoly over our private information, Facebook seems to be now looking to expand its data empires. However, while Google did it through strategic design and marketing, offering innovations and incentives for its users to use their services, Facebook seems to have decided to build a Trojan horse and sneak these services in through the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this might not seem a big deal right now, it has deeper repercussions for what this corporate behemoth can do, not only with our data, but also to our data that we think is actually our own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If your alarm bells aren’t already ringing, they should be, as Facebook demonstrates a blatant abuse of the trust that we have put in its system, to keep our private data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The million dollar question – or maybe a slightly reduced price, given its public listing status on the stock-exchange right now – is that while Facebook might keep us safe from other people using our data, will it also be able to keep us safe from itself?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/how-facebook-is-blatantly-abusing-our-trust-359263.html"&gt;&lt;span class="visualHighlight"&gt;Read the original here&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust'&gt;https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-28T12:42:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy">
    <title>Beyond Anonymous: Shit people say on Internet piracy</title>
    <link>https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy</link>
    <description>
        &lt;b&gt;This post is a series of provocations around piracy, censorship and the state of Internet in India. Like all good tasting things, these observations need to be taken with a pinch of salt. But it is the hope of the author that this serves as a response to otherwise very persistent voices that have been demonizing file-sharing online.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/beyond-anonymous-shit-people-say-on-internet-piracy-335588.html"&gt;Firstpost published Nishant Shah's column along with the video that CIS and ALF had made on 'shit people say about piracy' as a lead story on June 7, 2012&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;9 June is going to be a big day in India, for all concerned with internet regulation, censorship and the current attacks on file-sharing.&lt;/p&gt;
&lt;p&gt;The International Hacker group Anonymous – a group that has become iconic with its members wearing Guy Fawkes mask as they mobilise protest and hacker attacks on what they see as tyrannical regimes – has called for marched protests in 16 Indian cities, to demand a free and open Internet.&lt;/p&gt;
&lt;p&gt;They have already started launching Denial of Service attacks and taking down websites owned by the Indian government to express their displeasure about the recent regulation of the internet. Whether or not their guerrilla tactics are efficient and effective, in the right or not, is something that has been discussed quite popularly.&lt;/p&gt;
&lt;p&gt;There are hordes of people who think of them as the NewAge Mutant Ninja Hackers, who are protecting our digital worlds from being clamped down. There are others who paint them as the Big Bad Wolf who huffed and puffed and will blow our houses away.&lt;/p&gt;
&lt;p&gt;You might be sympathetic, suspicious or scared of the emergence of such a ‘crowd vigilante’, sporting the slogan that has spawned Internet memes galore – Y U No Wake up? – But there is no doubt that the rise of such a collective signals how discourse around piracy, rights, and openness is no longer in the domain of the uber-geek and the academic researcher.&lt;/p&gt;
&lt;p&gt;These are concepts with very material realities that affect our everyday functioning and require not only better policies but also a more nuanced public discourse. Today, I look at some of the most ludicrous things that have been said about file-sharing, around the world, wondering why this idea of sharing has evoked such startling responses from different quarters.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and depression&lt;/strong&gt;: There has always been a concern about the physical well-being of internet users. From Internet addiction rehabilitation clinics in China to online support groups for internet addicts (I swear I am not making this up!), from doctors worried about posture and eye-sight to mothers concerned about violent video games, we thought we had heard it all.&lt;/p&gt;
&lt;p&gt;And then came the extraordinary study that suggested that file sharing might lead to depression. Or rather, if you are an avid file-sharer on the internet, you are prone to attacks of depression. This had the twitter world abuzz, where people were trying to make sense of this ‘scientific’ study that connected spending long hours on the interwebz with mental illness. A trending tweet just about summed up the situation, when it said, “File sharers are depressed only because of what is done to them when they share”.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and jobs&lt;/strong&gt;: There was a time when the Music and Film Industry Associations (MAFIA) around the world used to protest file sharing by painting a romanticised picture of the independent starving artists, from whose mouths, we stole morsels, as we shared their work without paying for it. But that argument collapsed in the days of Napster (remember that?) and it has been proven over and over again, that the artist almost always benefits from their work being shared.&lt;/p&gt;
&lt;p&gt;However, lately, research from respectable universities (expensively funded by respectable interested parties) have started hitting the real you, rather than the imagined artist. Every torrent being downloaded on the web is correlated with a lost job, because these companies can no longer afford to hire as many people as they used to, because of the growing losses. And then it goes into complicated mumbo-jumbo about how that one torrent that sits merrily on your computer, actually affects all the jobs to kingdom come and will be responsible for your children’s unemployment.&lt;/p&gt;
&lt;p&gt;They remain silent about the jobs lost because of the funding that went into buying supporting this research.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I am not a Pirate&lt;/strong&gt;: And lest you go away with the idea that the rest of the junta does not gaff, here are some of the gems that have come our way while working with people in the field. It is common, for instance, for people to take a moral stance on piracy, radiating a holier-than-thou ethical persona, without realising that recording that last IPL match to watch later on your tablet is also an act of piracy.&lt;/p&gt;
&lt;p&gt;Then there are those who only consume material pirated by others, happily ignoring the fact that the ring-tone that they copied from their friend is also an act of piracy. Ditto, people who claim “I am not a pirate”, meaning that they haven’t yet figured out the bittorrent system and hence go to the local corner shop to buy pirated DVDs of the latest releases. In their heads, they have paid somebody for the material and hence it must be alright.&lt;/p&gt;
&lt;p&gt;Piracy is not a one-point source process. It is a networked ecosystem, and I am still to find that one person who has never shared anything and make a video of them saying “I am not a pirate”. But that is probably just wishful thinking.&lt;/p&gt;
&lt;p&gt;There are many more such instances which make your mind boggle and your eyes goggle and you wonder if you heard it right for the first time. Do share your favourite ones if you can. In the meantime you might also want to look at the &lt;a class="external-link" href="http://youtu.be/xYjqe_n3sv8"&gt;new meme video ‘Sh!t People say about Piracy’&lt;/a&gt; that captures some of these responses in their absurdity.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;iframe src="http://www.youtube.com/embed/xYjqe_n3sv8" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;
&lt;p&gt;(Video by The Centre for Internet and Society , and the Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Follow the video on &lt;a class="external-link" href="http://www.youtube.com/watch?v=xYjqe_n3sv8&amp;amp;feature=youtu.be"&gt;YouTube&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy'&gt;https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T14:01:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change">
    <title>IPv6: Embrace The Change</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-embrace-the-change</link>
    <description>
        &lt;b&gt;A moment of transition is always filled with anxiety. There is concern over the unknown and there is a reluctance to move out of the familiar. However, a transition does not necessarily mean migration; or in other words, as we transition to  IPv6 as the new protocol for digital and electronic communication, it does not mean that we are going to abandon the internet as we know it.&lt;/b&gt;
        
&lt;p&gt;In fact, for most of the users, it is going to be a transparent transition, where their devices are going to be able to harness the powers of IPv4 and 6. While there are huge benefits at the back-end, leading to better security protocols and low maintenance, there are a few advantages that the user should also celebrate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Faster Internet&lt;/strong&gt;: Because IPv6 will open up a huge range of IP addresses, direct routing of data becomes a possibility. As data does not have to be routed through many servers or nodes within a network, it can reach its destination faster. With the way our digital access and sharing is going right now, this is not to be taken lightly. In many ways this is the same transition we had from the dial-up connections, where the transfer of picture and video files within minutes was totally unheard of, while now we’re in an age where we stream high density video on all our computing devices with ease.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More collaborative and shared Internet&lt;/strong&gt;: With the abundance of IP addresses coming our way, there is going to be more scope for multiple devices to be connected online. New platforms of collaborative knowledge production and sharing can be designed to become infinite and inclusive in their scale and architecture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More connected devices&lt;/strong&gt;: The inter-operability features of IPv6 ensure that more devices are able to communicate with each other with ease. The science-fiction futuristic dream of a completely connected environment where human and artificial intelligence can work together, using a range of devices, is actually a material possibility with large scale IPv6 implementation. This can also trigger new innovation that helps reconstruct some of our existing devices in new forms and shapes.&lt;/p&gt;
&lt;p&gt;While affordability and the migration to new network infrastructure are the gating factors to this transition, these are diminishing costs and we are looking at more interesting internet architecture as we move towards IPv6. Perhaps, one of the most reassuring points of this transition is that we do not need to abandon the familiar internet we are already working with; the transition is not a moving on, but a moving to, and in it are the promises of a safe, secure and speedy internet. Global technology organisations like Tata Communications &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;have embraced this change&lt;/a&gt;; it’s only a matter of time before others too recognise the need for IPv6 and the huge difference it will make to our lives.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by Tata Communications and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-embrace-the-change'&gt;https://cis-india.org/internet-governance/ip-v-6-embrace-the-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T06:09:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge">
    <title>IPv6: The Transition Challenge</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge</link>
    <description>
        &lt;b&gt;The future of our connected networks is Internet Protocol version 6 (IPv6). Not only is it more efficient and faster than IPv4 which we are currently working with, it is also more reliable and secure. &lt;/b&gt;
        
&lt;p&gt;The IPv6, for instance, has an in-built security protocol called 
IPSec, which authenticates and secures all IP data. The data carrying 
capacity of IPv6 networks is also going to be higher. This means that 
more devices with more features will be able to work seamlessly through 
these networks. Despite the larger load of information, IPv6 packets are
 easier to handle and route, just like postcards with pincodes in their 
addresses are easier to deliver than those without.&lt;/p&gt;
&lt;p&gt;We have already seen great examples of successful implementation 
during the 2008 Beijing Olympics.&amp;nbsp; Every aspect from the security 
surveillance to managing vehicles and the coverage of the Olympic events
 was done over IPv6, including live streaming of the events over the 
Internet. The Chinese government, in fact, has already launched a ‘China
 Next Generation Internet’ (CNGI) project to build IPv6 networks which 
are going to radically change the face of high-speed internet in the 
country. With all these benefits available to us in this next generation
 protocol, the question that remains is why only a meagre 2% of the 
world’s internet traffic is conducted through it? Why haven’t more ISPs 
shifted to IPv6?&lt;/p&gt;
&lt;p&gt;There are two very clear reasons. The first one is that of costs and 
infrastructure. The IPv6 platforms do not communicate easily with the 
IPv4 networks. We have the choice of a mammoth transition of all IPv4 
websites and networks to new IPv6 protocols. This idea of abandoning 
IPv4 and moving to a new protocol is not only redundant; it is also 
futile, because IPv4 is already running the largest network in human 
history quite efficiently. &lt;strong&gt;What we need is translators which will be 
able to speak to both the different versions and help our devices work 
through them seamlessly&lt;/strong&gt;. Older, more successful technologies have 
been able to do this. So, television, for instance, whether it receives 
terrestrial data, satellite images or data transferred via cable, is 
able to translate and render them into images and sounds which we can 
consume with ease. However, the translators for the IPv4 – IPv6 still 
expensive and we need more resources diverted towards making them 
affordable.&lt;/p&gt;
&lt;p&gt;The second reason is linked to the first. In order for IPv6 to become
 popular, it needs a minimum threshold of service providers and users 
riding that network. As long as the deployment remains nascent, there 
will be no concentrated energy to actually try and make the bridges 
between versions 4 and 6. While global technology organisations like 
Tata Communications are ready for the transition, we are going to need a
 systemic change among all stakeholders to make IPv6 a reality, towards a
 faster, safer and more robust Internet.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by &lt;a class="external-link" href="http://www.tatacommunications.com/"&gt;Tata Communications&lt;/a&gt; and the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The above blog post was reproduced in &lt;a class="external-link" href="http://mis-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;MIS Asia&lt;/a&gt;, &lt;a class="external-link" href="http://www.cio-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;CIO Asia&lt;/a&gt;, &lt;a class="external-link" href="http://computerworld.com.sg/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Singapore&lt;/a&gt;, and &lt;a class="external-link" href="http://www.computerworld.com.my/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Malaysia&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge'&gt;https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6">
    <title>IPv6:  The First Steps</title>
    <link>https://cis-india.org/internet-governance/ip-v-6</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society has entered into a small collaboration with Tata Telecommunications in India to celebrate the IPv6 day on June 6th. We will write 5500 word vignettes, which will be sent to their global database consisting of more than 900,000 users in the Asia-Pacific. &lt;/b&gt;
        
&lt;p&gt;It is commonplace to interchange the words Internet and Cyberspace. However, we should make a distinction between the two.&amp;nbsp; Cyberspace is an experiential phenomenon, supported by the Internet but smaller. It refers to the actions, transactions, negotiations performed within the digital network.&lt;/p&gt;
&lt;p&gt;The Internet is a protocol – a set of rules that allows for a digitally connected network of databases to interact with each other. This happens through a standard set of commonly accepted rules, Internet Protocol version 4 – IPv4. IPv4 allows differently configured networks, working on different platforms, and designed through different technologies to communicate effectively by agreeing on a bare minimum of universally accepted codes for data to navigate cyberspace with the least bit of effort.&lt;/p&gt;
&lt;p&gt;IPv4 was defined in 1981, when there were few computers in the world with even fewer connected to networks. It was the protocol that assigned a computer on the Internet, with an IP address, the unique name of a connected device which can be recognised by digital networks. Packets of data transmitted over the Internet need an unique IP address associated to their origin and destination, so that information can travel smoothly.&amp;nbsp; IPv4 was developed so that 4,294,967,296 (2^32) unique IP addresses could be accommodated within the network. When it was designed, it looked like an almost infinite system. No one had ever imagined that the World Wide Web would emerge so quickly! We have reached a point now, where the last free IP addresses have been allotted in February of 2012, and we are now reaching a ‘real-estate’ crisis on the Internet.&lt;/p&gt;
&lt;p&gt;Since every device with Internet connectivity has a unique IP address – computers, servers, tablets, smart-phones, e-book readers and even alarm clocks – we need a lot more IP addresses.&amp;nbsp; IPv6 – or Internet Protocol version 6 – is a new standard by which we are now going to expand the ‘land’ upon which the Internet can grow. IPv6 is an overhaul of the existing system which will be able to handle 340 undecillion (2^128) unique addresses. Leading global Internet Service Providers and technology companies like Tata Communications have recognised &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;this as the need of the hour&lt;/a&gt; since increasingly we are living in digital information societies. However, IPv6 is going to have a range of serious implications for our hardware and software needs as well as our usage patterns and how the Internet is going to expand in the future.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by &lt;a class="external-link" href="http://www.tatacommunications.com/"&gt;Tata Communications&lt;/a&gt; and the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt; or write to &lt;a class="external-link" href="mailto:nishant@cis-india.org"&gt;Nishant Shah&lt;/a&gt;, Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6'&gt;https://cis-india.org/internet-governance/ip-v-6&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-05T07:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/beyond-sharing">
    <title>Beyond Sharing: Towards our Digital Futures</title>
    <link>https://cis-india.org/internet-governance/beyond-sharing</link>
    <description>
        &lt;b&gt;The battle is not about file sharing and a petty film producer wanting to rake in the box office earnings. It is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.downtoearth.org.in/content/beyond-sharing-towards-our-digital-futures"&gt;Down to Earth published Nishant Shah's Op-ed on May 31, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Unless you have been hiding under an analogue rock, wearing a tin-foil hat and staying away from electricity, chances are you have heard about the recent court order that bans access to a massive number of file-sharing websites from India. A John Doe order by the Madras High Court, following a complaint by the producers of the movie 3, has meant Internet Service Providers across the country have had to deny access to a number of websites that have been listed as providing free access to copyrighted material. In an attempt to ensure box-office collections for their movie, whose claim to fame, ironically, is the viral ‘Kolaveri Di’ song that had captured the country’s pulse last year, the producers have now denied access to something that is the basic function of anybody immersed in Web 2.0 environments–sharing of information.&lt;/p&gt;
&lt;p&gt;Much has been written about this ban. The battlelines are clearly drawn and from both sides we have strong arguments being made for and against piracy. Various media and culture industry people are supporting this ban, recounting losses that they have made because of people accessing pirated material online. Hacker and civil liberties groups are decrying this heavy censorship, providing numerous instances of how piracy has actually helped cultural productions gain more fame and money than they would have otherwise. There are yet others, who, while they respect the rights of the right-holders to protect themselves against copyright infringement, are furious that this blanket ban also disallows them to access material which was under a public license and material that they had produced and shared through these networks. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;International Hacker groups like Anonymous are mobilising people in large numbers to come to the streets as a sign of protest against such draconian measures.&lt;/p&gt;
&lt;p&gt;Most of these debates eventually are at loggerheads, with each side becoming louder and shriller, their positions attaining cult-like devotion and faith. In this cacophony there are some other points which get missed out. This issuance of the John Doe order has betrayed some startling flaws in how the Internet is governed in India and the alarming implications it has to the future of free, open and inclusive information societies.&lt;/p&gt;
&lt;p&gt;One thing that this court order has made excruciatingly clear is how the Internet is not the utopian space of exchange, collaboration, crowd sourcing and sharing it was meant to be. Despite the government’s own investments in building digital infrastructure, and its rhetoric of becoming more accountable, transparent and accessible by granting digital access to the citizens, it is obvious that this is still a space that is looked at with great suspicion.&lt;/p&gt;
&lt;p&gt;It comes as a shock to many of us that a high court issued an order which does not only impinge on freedom of speech and expression, but also fails to understand the nature of the Internet. In all reality, this ban is a farce. Everybody who has been used to the shared cultures of the online world, has found proxy servers and Internet anonymisers which allow them to hide their identity and continue with their everyday practice online. The cool kids are already doing this anyway. All we have is a stark realisation that the state might be investing heavily in digital technologies but it still has not been able to get out of the centralised broadcast ways of thinking about it.&lt;/p&gt;
&lt;p&gt;All sharing is not piracy. Some of it is just actually sharing. All debates seem to centre only around the copyrighted material being accessed through the file sharing websites. It is a concern which is legitimate. What about all the material that is in the public domain, in the commons and available for free? The user generated content, content which might not have direct economic value but is valuable to the people who created and shared it, is also now inaccessible. In order to protect some people from piracy we have also violated the rights of many more to share. And that is a distinction that is worth preserving, as we increasingly move into becoming an information society.&lt;/p&gt;
&lt;p&gt;In the Web 2.0 world, we are all producers of data. We not only leave traces but also put out material of cultural significance–from videos of dancing babies to knowledge that we want to share–through these peer-2-peer networks. A sudden collapse of this infrastructure almost seems to show how it is only the money-making material that is important to the state and not the other.&lt;/p&gt;
&lt;p&gt;There is not going to be a clear, correct position in this case against file-sharing. The legal technicalities will always be hollow in the face of ideologies of openness and inclusion. The moral indignation will always be countered by facts and numbers. But in the middle of all the fights and discussions, it is also good to pay attention to what is at stake. This battle is not merely about file sharing, though there is nothing “mere” about file sharing. This battle is not about a petty film producer wanting to rake in the box office earnings. This battle is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/p&gt;
&lt;p&gt;The way we resolve these differences is going to determine the future of what it means to be public, open, free, and inclusive. Those of us who are fighting to get the word out, are not doing it only because the access to our favourite cultural products has become cumbersome, but because scared that this might well be the beginning of the end of all that we had dreamt of our digital futures.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/beyond-sharing'&gt;https://cis-india.org/internet-governance/beyond-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-01T04:39:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/digitally-analogue">
    <title>Digitally Analogue</title>
    <link>https://cis-india.org/digital-natives/digitally-analogue</link>
    <description>
        &lt;b&gt;Why there is nothing strictly analogue anymore, examines Nishant Shah in this column that he wrote for the Indian Express.&lt;/b&gt;
        
&lt;p&gt;It is a given, that in the fight between the digital and the analogue, you have a certain perspective or an opinion. If you are a bibliophile and crave for the smell of second-hand books and the feel of freshly uncut pages, you probably object to e-readers and tablets which give you a book-like experience that is not quite the same. If you enjoy photography, you still value old film rolls, techniques of complex editing, and the sepia-coloured flatness that the film has to offer. If you are a cinegoer, you cherish a secret fondness for those days when the camera attempted to capture a realism which was stark and more believable than reality. You might miss receiving and writing letters, might get annoyed by the lightning fast expectations of communication, and are horror struck at the idea of buying clothes online, foregoing the pleasures of window shopping.&lt;/p&gt;
&lt;p&gt;For each argument that is made in favour of the analogue, there will be an equally strong and strident voice that elucidates the joys and possibilities that the digital has to offer. The techno-savant will point out that the easy availability of digital technologies has democratised the realms of cultural production, granting more access and diversity to expressions from different cultures. It should be mentioned that the huge possibilities of manipulating, reproducing and transferring digital data, without any loss to the original has resulted in new forms of intricate and subversive cultural production. The speed of access and communication has mobilised resources and people in unprecedented ways, to make changes in their environments, empowering the citizen as an agent of change rather than a beneficiary of change.&lt;/p&gt;
&lt;p&gt;In all these debates, there will be valid and contradictory arguments that will coexist, each extolling the virtues of their analogue or digital positions. While there is no correct position to take in this debate, there is something else that I want to draw our attention to. In both these debates, which seem to be about technologies, there is a presumed focus only on consumption of technology products. Or, in other words, in this over-emphasis about whether the final product should be consumed using digital or other technologies, there is a complete and total neglect of technologies of production that shape these cultural objects. This betrays two things for us to ponder over.&lt;/p&gt;
&lt;p&gt;The first is about our relationship with the technologies that we use. As technologies, especially digital technologies become ubiquitous, easily affordable and available to us on mobile interfaces, and emphasises ease of access, there also seems to be an alienation of the user from conditions and modes of production. We seem to position ourselves only as consumers of tech products — often reducing our interaction with these technologies as spectators, or audiences or users. This is ironical because, it seems to perpetuate the schism between the digital and the analogue, while actually hiding the fact that most of our so-called analogue products have undergone dramatic change in their modes of production, which are facilitated and shaped almost entirely by digital technologies. You might enjoy the tactical experience of picking up a print book, but it might be good to realise that the entire book was put together by using digital interfaces. And while the book might seem to be a non-digital object, even the way it reaches the last mile — through e-commerce websites like Flipkart, or even your local stores, where it gets stored, sorted, and indexed — is also through a digital environment.&lt;/p&gt;
&lt;p&gt;The second thing that this faux debate exposes to us is the futuristic dream of convergence. Convergence as a concept has been bandied around for about a decade now, where all our existing modes of living, facilitated by different technologies, are to be translated into the digital, thus seamlessly available through a single device which can perform everything. Convergence is the Holy Grail that marks our aspirations of the future. And debates of the analogue versus the technological sustain that illusion that it hasn’t really been achieved yet. However, as you look around you, you quickly realise that the analogue networks that we fantasise about very rarely exist. The analogue-digital divide is often reduced to the physical-virtual dichotomy and this is a false one. Analogue referred to certain kinds of technological practices where the human agent, by using the technological network could perform certain functions. So the older telephone networks, for instance, were electronic but analogue. However, our telecommunication went digital way before the phone became smart.&lt;/p&gt;
&lt;p&gt;While those of us who were not born digital natives — we still remember what an audio cassette looks like and the smell of screen printing — will negotiate with the form of our access to cultural objects, it is also time to realise that being non-digital is no longer an option. And that what we think of as analogue, is often only a form, because the mode of production, design and distribution has gone digital when we were not looking. So it is good that you are reading this in print, as a part of a newspaper, but this column (like all other items in this publication) was conceived, written, delivered and printed entirely using digital interfaces. These are objects which now need to be thought of as digitally analogue.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/digitally-analogue/953982/0"&gt;Read the original published by the Indian Express on May 27, 2012&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/digitally-analogue'&gt;https://cis-india.org/digital-natives/digitally-analogue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>cyberspaces</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T12:00:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/private-eye">
    <title>The Private Eye</title>
    <link>https://cis-india.org/internet-governance/private-eye</link>
    <description>
        &lt;b&gt;The world’s largest digital social networking system, oh ok, Facebook, to just name names, was ­recently in a lot of buzz.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/the-private-eye/948806/0"&gt;Nishant Shah's article was published in the Indian Express on May 14, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The world’s largest digital social networking system, oh ok, Facebook, to just name names, was ­recently in a lot of buzz. For once, it was not about the laments of how we are downgrading the meaning of friendship, eroding social relationships, and visions of an apocalyptic future where people will lose the knack of face-time to interface intimacies. Instead, the buzz was about Facebook’s collaboration with the American non-profit coalition Donate Life America to encourage more people to sign themselves up as organ donors. The feature that allows the American users to sign up as organ donors, promising their organs, in the event of their death, to others who might live through them, has been an instant hit. More than a lakh people have updated their status to reflect their volunteering as organ donors, and thousands others have signed up for the noteworthy initiative.&lt;br /&gt;&lt;br /&gt;There is no doubt that harnessing the powers of social networks for such causes is laudable, and indeed, follows the trends that we have been witnessing the last few years, where people have mobilised their networks for a range of things — from overthrowing governments to dancing in flash mobs. It is interesting that initiatives which were already working with large-scale networks are now collaborating within the social media space to tap into the immense potential of social networking. It is also noteworthy that Facebook Connect, which is a slowly growing system by which users authenticate themselves to different portals and can use their Facebook credentials instead of creating new profiles with more passwords to remember, was used effectively to facilitate registering for a new system. It is a testimony to Facebook’s growing omnipresence, that initiatives like these can use those credentials in their systems.&lt;br /&gt;&lt;br /&gt;There is a wide range of interests that punctuate this phenomenon and there is a rich discourse that reports, analyses and maps it. However, I want to take this opportunity to make a distinction between data types that is often lost in the presumption that all information on a social network is the same kind of information. With the enabling of this feature, Facebook has started mining a new set of personal data that is at once fiercely private and vulnerable. Till now, Facebook and other such social networking systems were already harvesting a wide range of data — personal data such as name, gender, birth-date, pictures, etc.; social data such as relationships, interactions, communities, groups, likes, etc.; usage data like preferences, navigation, search, frequency of interaction et al. While all this data has been about the personal, it is also data that we share and display in our everyday life. Who we are, what we look like, the politics that we subscribe to, the communities we are a part of, languages we speak, products we consume and people we hang out with is physical data that is available to anybody who cares to watch us.&lt;br /&gt;&lt;br /&gt;While there are serious repercussions on what happens when such data falls into malicious hands, there is still objectivity to this data. This is data which we can understand as personal — as referring to the person, but not necessarily private. Private data is actually the information that we have singular access to. And this distinction between the personal and the private is good to understand, because with the Organ Donor badge, Facebook has entered a new realm of data mining, which is truly private. Till now, privacy arguments around Facebook have not been as fuelled as they might otherwise be, because there is an innate understanding that there is a certain performative aspect to our personal data, because it facilitates different kinds of negotiations, transactions and engagements. However, with private data — health and medical history, gender and sexual orientations, desires and fantasies, moral and ethical choices — we are entering murky waters. This happens because while violation of personal data can be easily rectified by resorting to the law, the private is more in the grey zone, subject to interpretations and often unquantifiable in its intensity.&lt;br /&gt;&lt;br /&gt;The concerns that will emerge are the same kinds that we have seen in other large projects that deal with private data like the Aadhar project that uses biometric identification data to identify citizens in India. While Facebook might not be collecting biometric data, it is important to recognise that this new kind of data disclosure, which puts our private information in the public domain, only mandates better security and privacy control within these social networks. As we move towards a data-driven future, we need to be more aware of the different kinds of data sets that we are making public and educate ourselves about the risks of this disclosure, without being carried away by the sway of meme-like behaviour and viral trends online. The next time you decide to reveal some new kinds of data about yourself, pause for a moment and reflect on whether it is personal or private, and whether it is absolutely necessary to facilitate your interaction within that information system and the ­rewards and dangers it comes with.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/private-eye'&gt;https://cis-india.org/internet-governance/private-eye&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-24T06:25:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/we-are-cyborgs">
    <title>We Are All Cyborgs</title>
    <link>https://cis-india.org/digital-natives/we-are-cyborgs</link>
    <description>
        &lt;b&gt;The cyborg reminds us that who we are as human beings is very closely linked with the technologies we use.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/we-are-all-cyborgs/942874/0"&gt;Nishant Shah's article was published in the Indian Express on April 29, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you look at any illustrated 
history of human civilisation, you will quickly realise that it is also a
 history of technology. From the discovery of fire by Homo sapiens to 
the contemporary homo digitalis, there is no escaping that technologies 
of different kinds have not only changed the way we live but also helped
 us realise what it means to be human. Often, we treat these 
technologies as external to us, thinking of them as tools that we deploy
 to perform a particular task. However, as our technologies become more 
transparent, intimate and customised, we realise that we are developing 
relationships with the technological devices that surround us. So, if 
your laptop crashes, you feel crippled. There are people who proclaim 
that they feel amputated without their cellphone. It is quite reasonable
 to feel lost without the information compass of the internet.&lt;/p&gt;
&lt;p&gt;This
 relationship between human beings and technologies has been very 
concisely defined in the idea of a cyborg. A cyborg is a 
human-technology synthesis which enhances our capacities to live as 
human beings. While it might seem like a slightly new idea, once you 
realise that we constantly live with technologies and often internalise 
them in our bodies, it is not difficult to wrap our head around it. 
Think of people with pacemakers or prosthetic limbs or different 
implants in their bodies, who experience technologies as an integral 
part of their everyday life. Similarly, think of the wide range of 
technology apparatus that you depend on to live a “regular” human life. 
We have also seen iconic cyborg representations in popular movies — from
 the absolutely unforgettable Arnold Schwarzenegger in Terminator 2 to 
our very own dimpled Shah Rukh Khan as Ra.One — there has been a 
persistent imagining of the human being as we know it, evolving to 
become some sort of a super man, enhanced by advancements in digital 
technologies of virtual reality.&lt;/p&gt;
&lt;p&gt;There
 has been a growing anxiety, almost a moral panic, about how 
technologies are alienating us, replacing face-time with inter-face time
 so that we are all growing “alone together”. There is also, across 
generations and users, a growing separation of those who work with 
technologies and those who don’t. There is much concern about the human 
becoming corrupt because of the ubiquitous presence of the pervasive and
 invasive technologies around us. In the face of these anxieties, the 
cyborg stands as a culturally significant and timely reminder that we, 
as human beings, are very closely linked with the technologies that we 
use. And that we need to stop thinking of technologies as merely gadgets
 and tools that surround us. The different objects that remind us of the
 presence of technology are not the same thing as technology itself. 
Technology is a way of thinking about things, a way of relating to the 
world around us. The most intrinsic forms of technologies are the ones 
that we don’t even recognise as a part of our innate mental make up.&lt;/p&gt;
&lt;p&gt;Do
 this simple experiment. Right now, while you are reading this, do not 
look at any clock or time-measuring device and guess what time it is. 
Chances are that you will be, give or take a few minutes, more or less 
accurate. Even if you are temporally challenged, you will at least know 
what part of the day it is, morning, afternoon, evening or night. The 
point is that we are absolutely and completely creatures of time. We 
cannot think of ourselves outside of it and even when we might be 
dramatically wrong about it, there is no escaping the fact that we are 
always thinking of ourselves and the world around us through time.&lt;/p&gt;
&lt;p&gt;We
 experience our lives and our relationships in cyclical notions of the 
clock’s face, thinking of our actions as borrowed from the future, lived
 in the present, and relegated to the archives of the past. It then, 
must come as a bit of a shock (it certainly did to me, the first time I 
was made to realise it) that time is not natural. Time is a human way of
 measuring a passage of actions. Time is a technology which has now 
become such a potent metaphor of life that we have forgotten to make the
 separation of the human and the technological.&lt;/p&gt;
&lt;p&gt;And
 thus, whether you might be a tech-savvy digital native or a 
byte-fearing luddite, there is no denying the idea that when it comes to
 technologies of time, you are already a natural born cyborg. This 
ability of technologies to become transparent and an inalienable part of
 who we are forms cyborgs. The process through which they become 
transparent is not easily accessible, but it does begin by an 
internalisation of the technology’s processes in our everyday 
vocabulary. So the next time you think of yourself as a system that 
needs to be upgraded, or unable to pay attention because you don’t have 
enough bandwidth, remember that you are engaging in a flirtatious 
relationship with the digital. And slowly, but surely, we are all 
turning into cyborgs, as the new technologies rearrange patterns of our 
life and living.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;digitalnative@expressindia.com&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/we-are-cyborgs'&gt;https://cis-india.org/digital-natives/we-are-cyborgs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T12:00:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di">
    <title>Open letter to Kolaveri Di makers: How Dare You!</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-kolaveri-di</link>
    <description>
        &lt;b&gt;When it comes to piracy, you are sure to have an opinion. You might either make a virtue out of it, talking about cultural commons and collaborative conditions of production. Or you might vilify it as the social fault-line that is destroying the very pillars of commerce and cultural negotiations.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/open-letter-to-kolaveri-di-makers-how-dare-you-317703.html#disqus_thread"&gt;This article by Nishant Shah was published in First Post on May 22, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;No matter which part of the fault-line you fall under, this is the time for all good (and otherwise ambiguously identified) people to come to the aid of the party. This is an open call for anybody who has been on the interwebz, to share and distribute one particular object whose rights protector have recently taken your right to access countless platforms which are a part of your everyday life online.&lt;/p&gt;
&lt;p&gt;If you haven’t yet grasped it, I am referring to the recent events where, following a John Doe order from the High Court of Chennai, all kinds of file sharing platforms are suddenly being blocked by Internet Service Providers (ISPs) across India.&lt;/p&gt;
&lt;p&gt;The film producers of ‘3’, the movie whose claim to fame has been the spectacular viral success of the &lt;em&gt;Kolaveri Di &lt;/em&gt;song, have moved the courts to issue a blanket order that has suddenly made it impossible for Indian netizens to access file sharing, user-generated-content hosting websites which allowed for digital cultural texts – from print to music to movies to presentations – to be shared and disseminated freely online.&lt;/p&gt;
&lt;p&gt;The producers and those who support them, are glorying in this legal battle where they have identified nodes in our networks, through which their copyright information was potentially being pirated. They are hoping that by ensuring this lack of digital mobility for their film, they will be able to entice audiences to come into the theatres and spend their money ‘legitimately’ on the film.&lt;/p&gt;
&lt;p&gt;They are revelling in the fact that hundreds of thousands of users have been thwarted in their attempts at copyright infringement. What they haven’t realised is that they have justified their box-office greed by infringing on your and my rights to perform everyday activities online.&lt;/p&gt;
&lt;p&gt;I am sure there is going to be a smart-aleck riding a moral high horse, who will applaud this move and point out to me about the rights of the producers to protect their content. There are many who support this high-censorship which not only betrays the power of the Music And Film Industry Association (MAFIA, to friends) to curb us of our rights, but also the completely depraved technology apparatus of the State which seems to have no understanding of how the internet actually works.&lt;/p&gt;
&lt;p&gt;However, i want to shift the focus from the rights of these victimised producers and right-holders to the right of the individual who is actually the structural unit of cyberspaces. And I want to suggest to you that these right-holders, who incidentally, have such global value only because the &lt;em&gt;Kolaveri Di&lt;/em&gt; song put them on the global meme map, have now infringed upon my right to access my content which I had put out to share.&lt;/p&gt;
&lt;p&gt;There are open content videos on Vimeo that we have produced through years of research and a huge amount of financial investment, which are now no longer available to people who want to view them.&lt;/p&gt;
&lt;p&gt;There are powerpoint presentations and publications on file sharing sites, seeded through torrents, which are now impossible to access for people in India. A large amount of our personal research and lectures, which we have shared for educational purposes, are now not even available for us to download.&lt;/p&gt;
&lt;p&gt;And we are not alone in this. Hundreds of thousands of individuals, who have shared openly licensed material, have now lost the ability to access that information because one private company wanted to make sure it made its profits.&lt;/p&gt;
&lt;p&gt;I am not going to write a manifesto for the digital world, but I do want to put it out there, this new cultural MAFIA, grant to me my rights which their actions have violated. For every site that they have included in their banned list, they have disrespected the open, collaborative licenses that enabled sharing of information whose value, usage and worth is more than their commercial pot boiler, which shall hopefully be forgotten before we realise it was released in the markets.&lt;/p&gt;
&lt;p&gt;Their commercially driven arrogance has suddenly demanded that we pay a price for the shared information, and that price should be to those who hold rights over the movie.&lt;/p&gt;
&lt;p&gt;And so I am writing this open call, for you to come and demand your right. If that movie producer has the right to protect his interests, you and I have the right to protect ours. I demand that for every site that I am not able to access, for public domain information that I am entitled to, they pay us a penalty.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-kolaveri-di'&gt;https://cis-india.org/internet-governance/open-letter-to-kolaveri-di&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-23T07:02:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/non-human-intelligence">
    <title>Non human intelligence is closer than you think!</title>
    <link>https://cis-india.org/internet-governance/non-human-intelligence</link>
    <description>
        &lt;b&gt;In one of the research projects that I have been involved in, I was recently a part of a jury, for a contest which required on-line voting. It sounded like a fun thing, giving the participants a chance to bring in their inherited networks and also expanding the reach of the contest entries.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/non-human-intelligence-is-closer-than-you-think-288019.html"&gt;Nishant Shah's article was published in FirstPost on April 25, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We were just about to close shop and announce the clear winners who had a landslide victory in the contest, when following up on a clue – a simple mismatch between the number of people who had visited the webpage and the number of votes polled – sniffed up by a colleague, we were suddenly faced with the suggestion that a lot of the votes cast in the contest were by non-human actors.&lt;br /&gt;&lt;br /&gt;The first instincts for many of us involved were that an act of deception or fraud had happened. It felt natural, to most of us that when we asked for votes, we were specifically looking for human votes. Our relationship with technologies – digital or otherwise – has been primarily defined through usage. We use technologies so that we can perform an intended task. Especially with transparent and wearable portable technologies, we constantly think of them as disposable extensions which help execute our ideas and actions with efficiency.&lt;/p&gt;
&lt;p&gt;In this one-way functional understanding of technologies, we often forget that these technologies are not merely tools. More often than not, the technologies that we interact with and engage with, shape the ways in which we look at the world. This is true even of the simplest of tools – If you have a hammer in your hand, the whole world appears to be a nail.&lt;br /&gt;&lt;br /&gt;Within large-scale digital networks this becomes so much more complicated because the lines between human and non-human actors within those networks are very blurred. Our engagement with the network is not merely to use it as a conduit for communication. The network is an intelligent entity. It grows, learns, watches and responds to our different actions. There are actors within the network which can perform actions which might resemble, if they are not exactly the same, as the human actions in the same environment.&lt;br /&gt;&lt;br /&gt;In fact, we are often faced with non-human actors – call them bots, scripts, artificial intelligence, or any other name – which are more efficient in performing certain repetitive and recursive actions which are necessary to sustain the network, that the human actor might be unable to cope with.&lt;br /&gt;&lt;br /&gt;Think of your favourite social network and realise that there are so many ways by which the interface and the network, aided by a range of non-human actors, are interacting with you constantly to customise and ease your interactions within the network. Anthropomorphised guides give you tours of new applications. Email based bots notify of activity in your network. Sniffers detect your browser, your ISP, your connectivity speed, your browser, your access device, your preferred language, your customised settings, etc. to render the social network legible on your screen.&lt;br /&gt;&lt;br /&gt;We increasingly depend upon these transparent workers, very much like the magical servants in Beast’s enchanted castle in the fairy tale about Beauty and the Beast. If you do a measure of who you interact with the most within a network you will quickly realise that what you actually interact with, within a network, is these non-human actors who facilitate your peer-2-peer connections in the digital domain.&lt;br /&gt;&lt;br /&gt;And this is not limited to your social networking systems. As we move towards a more intuitive internet that operates through multiple nodes and forms pervasive and persuasive networks of being, we are increasingly living with non-human actors who can mimic life more efficiently in their native environments. The bots that perform edits on Wikipedia entries to clean the language and correct styles are made out of code.&lt;br /&gt;&lt;br /&gt;Scripts that relay information about your usage so that it gets logged, tracked and visually presented in Google Analytics are also bits and bytes. The IVR that you use for your financial transactions or indeed the very systems which authenticate your credit card details, without you worrying about fraud is because it is done without human intervention. It is despite these transactions, or perhaps, because of it, that we refuse to think of technologies as sapient.&lt;br /&gt;&lt;br /&gt;We often think of ourselves in technology terms and sometimes also Disnefy our gadgets by giving them names and talking of them as almost-human. However, when it comes to questions of actions or doing things, there is a false presumption that the human proposes and the technological does it, despite the contrary evidence that we generally have the technological dictating terms and us following them through within digital networks.&lt;br /&gt;&lt;br /&gt;We resolved our small crisis by counting only the human votes. But that resolution is not one that we will be able to live with for long. We are soon going to enter worlds where the non-human actor in the network is going to have equal rights, agency, will and choices, and it will perform actions that will have equal credibility as the human one. If not more.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/non-human-intelligence'&gt;https://cis-india.org/internet-governance/non-human-intelligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-24T06:36:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook">
    <title>Sharing in the time of Facebook, or Why I’m not a Pirate</title>
    <link>https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook</link>
    <description>
        &lt;b&gt;It is now over a month that my favourite network has been dead. Library.nu the rare space for sharing of academic resources to a free and open community has succumbed to the pressures of publishing industry stalwarts who, in their quest for promoting the knowledge industry, are killing sources through which knowledge survives.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/sharing-in-the-time-of-facebook-or-why-im-not-a-pirate-269717.html"&gt;Nishant Shah's article was published in FirstPost on April 9, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;True, Library.nu, that Mecca for those of us who live in countries where public libraries are not well stocked and resources for procurement of books are low, was essentially a file sharing network. It allowed people to offer digital copies of books in their possession to be shared around the world for no commercial gain.&lt;/p&gt;
&lt;p&gt;For scholars and learners around the world, this was the place to find books which would otherwise be unavailable in their local contexts without expending a lot of time and effort. And now it is closed with an R.I.P. sign on their website which once offered such promises of joy.&lt;/p&gt;
&lt;p&gt;This shutting down of Library.nu is not new or unexpected. Large scale global networks of sharing information online have been persecuted ever since the emergence of the WWW. From the historic battles that Napster had to fight to allow users to share music which was under copyright to large companies, to the persistent wars that ThePirateBay resolutely fights, networks which counter the logic of the libertarian web dream have always come under huge pressures to shut down.&lt;br /&gt;&lt;br /&gt;This is a part of a much larger debate around intellectual property rights and infringement within the digital world that we live in, and voices on both the sides are always going to be strident in their discussions of free and open knowledge. However, what I want to talk about is how these acts of sharing, which are being condemned as acts of ‘stealing’ or ‘piracy’ are actually endemic conditions of building digital networks.&lt;br /&gt;&lt;br /&gt;The network is not merely a combination of elements. While the infrastructure and logistics of a network are crucial to its sustenance, the mere assemblage of these objects does not make a network.&lt;br /&gt;&lt;br /&gt;It is now known that the networks that we occupy are alive and need different investments of human and non-human efforts and energies to sustain them. Or in other words, just putting together of servers and platforms is not what Facebook is about. Or what is the most important thing on Pinterest is actually what you do with it.&lt;br /&gt;&lt;br /&gt;Similarly, just getting people on to the networks is not enough – Remember Diaspora? You don’t? That’s the point. It is highly possible to have failed networks that have all requisite infrastructures and a wide corpus of people who are a part of it. What really sustains a network is the ability of the members to act within them. Networks are not only places to occupy but also sites where people can perform different activities.&lt;br /&gt;&lt;br /&gt;And it should come as a surprise to nobody that within the digital networks, the primary activity that people perform, is sharing. We share information about our lives, relationships, likes, political causes, and cultural objects that we are fond of. We share data about things that intrigue us, things we are concerned about, things that we need to know about. We share content including books that we like, videos that amuse us, and music that we need to connect through. All these social networks of sharing and collaboration form the basis of innovation and radical change, shaping our futures.&lt;br /&gt;&lt;br /&gt;And yet, these corporate networks which also allow for sharing are never looked at as piracy. Once in a while, a video on YouTube gets revoked because it has a sound track that might be owned by a big Music Industry. There might be an instance where Orkut or Google Plus might take down content which might be objectionable. Facebook alleges that it has bots which check for possible pirated content. But all in all, because these networks are so obviously tied in to both the circulation and production of capital and filling the coffers of wealthy corporate houses, remain unaffected by charges of piracy.&lt;br /&gt;&lt;br /&gt;However, smaller independent networks – networks that are established to realise the true potentials of openness, sharing and collaboration – and do not necessarily run up big balances for private sectors, immediately get vilified as vice houses of piracy. The introduction of piracy as the demon to fight on the Internet has provoked many false advertisements that equate it to stealing a car, or robbing a bank.&lt;br /&gt;&lt;br /&gt;In this, they try to obscure the fact that piracy – sharing of material – is a community activity. It subscribes to the logical flows of information and opens it to new audiences, interpretations and dialogues continually. What is often pathologised as piracy, is the basis of new and innovative knowledge practices, granting access to knowledge for constituencies and demographies which have been excluded from knowledge practice in the past.&lt;br /&gt;&lt;br /&gt;What piracy threatens is not knowledge but the industries that seek to make their wealth out of knowledge economies. And to protect the interests of these limited few, independent file-sharing networks get targeted as promoting piracy whereas activities within corporate social networks are tolerated as benign.&lt;br /&gt;&lt;br /&gt;Piracy, when it affects small scale producers or independent artists does need to be thought about. But at stake in those events is the larger conditions of commoditised cultural production and the alienation of the artist from their own products – forfeiting their rights to large corporate houses. What sharing as a phenomenon offers to us, is the promise of a new knowledge economy where affordability or remoteness do not become discriminatory factors for those keen to consume and share cultural products and knowledge.&lt;br /&gt;&lt;br /&gt;The Pirate Party in Sweden has announced that File Sharing is a religion and is trying to make it into a practice that is sacred to all of us who thrive in these conditions of free and open knowledge. I want to join my voice to theirs, in the memory of that Promised Land – Library.nu – and the lords of free books, and ask for my right to Pirate Share in networks of my choice.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook'&gt;https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-10T10:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/idea-of-the-book">
    <title>The Idea of the Book</title>
    <link>https://cis-india.org/internet-governance/idea-of-the-book</link>
    <description>
        &lt;b&gt;Its future lies in a trans-media format that is ever evolving, writes Nishant Shah in an article which was published in the Indian Express on April 8, 2012.&lt;/b&gt;
        
&lt;p&gt;If you are a true bibliophile, you have long transcended making mortal judgements about books, based on insignificant factors such as plot, narrative, or writing style. A true bibliophile is in love with the form of the book — the joy that comes from the rustle of a turned page, the euphoria of holding a book in your arms, the satisfaction that rises from watching a tottering stack of books. For hardcore bibliomaniacs, the love is at a sub-molecular level, so to speak, finding their happiness and content in shapes of fonts, thickness of paper, methods of binding, imprints and meta-data that tells its own story. For all these true lovers of books, their affection goes beyond the content of the book. They love the book as an artefact, as an object of desire. It is as if there was a “bookness” to the book that they deeply appreciate.&lt;br /&gt;&lt;br /&gt;It is these people, along with many others, who mourn the death of the book in the age of digital mass production. With the advent of the e-book and the ubiquitous presence of reading devices, many have announced the death of the book. The ‘dead-tree book’, as it is often derisively described in many circles, is a thing of the past. As we live in worlds of increasing interface, the surfaces we read on, the way we read, and the forms that we read have undergone a dramatic reconfiguration. Swype-and-touch has replaced turn-and-fold and the book as we know it, is growing extinct.&lt;br /&gt;&lt;br /&gt;Professor Bruno Latour — one of the first theorists and critics of digital technologies, large-scale networks, and new methods of knowledge production — from Sciences Po in Paris, during his recent visit to Bangalore, suggested that instead of accepting the imminent death of the book and mourning its demise, it might be more fruitful to look at its future. The digital, he says, does not question the idea of the book, but merely the form. This, for me, is a fascinating idea. We often recognise the book as a form — something that is written, something that is bound, or something that is found in libraries. If you were to define a book, you would talk about the different kinds, shapes, colours and sizes of books but you won’t necessarily be able to explain it. This is because a book is only a material manifestation of a much larger idea and this is what we need to focus on.&lt;br /&gt;&lt;br /&gt;The book has seen many transitions in its form from the pre-print, hand-written manuscripts by trained scribes to the print-on-demand paperbacks which can be assembled easily. Technologies have not threatened but actually helped it change, evolve and keep up with the times. When we think of the digital book and the possibilities it offers, these are much more exciting than the rather Luddite lament about how the book is dead.&lt;br /&gt;&lt;br /&gt;In the digital medium, the future of multimedia narratives is convergence. An ability to tell stories, record knowledge, share information and make connections through a variety of media forms and styles changes the future of the book. Imagine a book that begins with a text, continues through music, blends into user-generated pictures and ends with a video. Imagine this book being written, not only in different media but also by different people, simultaneously, resulting in a layered palimpsest rather than a static page. Imagine each page and every word on the page not as a fixed thing but one of a series of alternatives. Imagine a book that is written as it is read, and no longer excludes print-challenged or differently-abled people from contributing to the writing, reading and sharing process.&lt;br /&gt;&lt;br /&gt;A trans-media format would stay true to the democratic and inclusive vision of a book and correct the limitations of print. Such a book would also free knowledge and information from businesses — let’s not forget that the publishing and education system is a business — and allow a new audience to participate in knowledge production. This is not a mere fantasy. We already have new models such as mash-ups which give us a new logic to sort and store information. Imagine Facebook as a collaborative platform where different information can come together to supplement the traditional book. Wikipedia is a space of knowledge production, which might simulate the older encyclopaedia form, but it is written by unpaid contributors, collaboratively, even as the Encyclopaedia Britannica announces its last ever print publication.&lt;br /&gt;&lt;br /&gt;The form of the book is going to change as it has over the last 500 years. However, the idea of the book — a receptacle that contains and records collective wisdom, information, ideas, knowledge, experiences and imagination of humankind – is here to stay. The digital book has to be understood not merely as a digitisation of an older book, but has to be imagined as a smorgasbord of possibilities which will revolutionise the form of the book and bring it closer to its intended vision. It is time indeed to announce, ‘The Book is Dead! Long Live the Book!’&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/the-idea-of-the-book/933920/0"&gt;Read the original from the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/idea-of-the-book'&gt;https://cis-india.org/internet-governance/idea-of-the-book&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-04-10T09:53:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia">
    <title>The Digital Classroom in the Time of Wikipedia</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia</link>
    <description>
        &lt;b&gt;The digital turn in education comes across a wide range of initiatives and processes. The Wikipedia which is the largest user generated content website stands as a figurehead of such a digital turn, writes Nishant Shah.&lt;/b&gt;
        
&lt;h2&gt;Context&lt;/h2&gt;
&lt;p&gt;The digital turn in education has been described across a wide range of initiatives and processes. These include the introduction of digital tools and gadgets as a part of the learning environment, building digital archives and repositories of learning and curriculum building, facilitating remote access to education through information and communications technologies&amp;nbsp; infrastructure, improving quality of access to education and learning resources, building diverse and customised syllabi to accommodate for alternative and contesting perspectives, building peer knowledge communities of information and knowledge production, and including non-canonical material and experiences into formal institutions of education. Different locations, contexts, geo-political circumstances, socio-economic factors, and cultural differences influence the spread, rise and integration of digital technologies in mainstream education. Much academic, policy and implementation attention has been given to these processes and several models of new learning environments and infrastructure have been postulated over the last two decades. The democratising promise of internet technologies has been largely if not exclusively about education, learning, literacy and production of knowledge from different parts of the world.&lt;/p&gt;
Wikipedia, one of the first and possibly the largest user generated content websites, that aims to put together the ‘sum total of all human knowledge’ in an open encyclopaedia, stands as the figurehead of such a digital turn. It questions and subverts the traditional analogue forms of knowledge production and relationships. The much discussed experiment conducted by Nature (Giles, 2005 and Orlowski, 2006) that established Wikipedia as an almost equal (if not more) reliable source of information to the fountainhead of print-based knowledge &lt;em&gt;Encyclopaedia Britannica&lt;/em&gt;, has become the touchstone by which digital collaborative knowledge structures&amp;nbsp; seek their validity within mainstream classroom pedagogy and learning.
Wikipedia itself has emerged as an object of deep scrutiny and contestation, with warring factions going strong about its strengths and weaknesses. The supporters look at how this collaborative peer-to-peer structure has changed knowledge relationships that defined consumers, producers and mediators of knowledge. They see in the rise of Wikipedia, and other such wiki-based structures and user generated content sites that remix, reuse and share knowledge within the digital realm, the potentials and possibilities of changing the futures of knowledge ecologies and economies. The detractors of Wikipedia make a strong case for specialised and expert curatorial practices of knowledge, without which the information explosion of the digital world would collapse all distinctions between speculative writing and rigorous accountable research.
&lt;h2&gt;Concerns&lt;/h2&gt;
&lt;p&gt;In the seemingly unbridgeable differences of these two contesting positions, there is however, a set of common presumptions which remained unquestioned and unchallenged. The example of Wikipedia accordingly serves to throw in sharp relief these more general questions regarding digitally produced knowledge and digitally enabled learning practices.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Design of Trust&lt;/strong&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;p&gt;The first among them is the concern around Authority and Authorship (Liang, 2010). Increasingly, as Wikipedia becomes a de facto global reference site available in different languages, there is a growing dependence on the authority of information available on Wikipedia. Given that the number of users of Wikipedia is exponentially higher than the number of editors on Wikipedia, there are many users who never confront the structures of participation, processes of editing, and questioning the source of information (Harouni, 2009, Broughton, 2002) found on the site. This is not a problem exclusive to Wikipedia. Given the explosion of user generated sites which often gloss over the problems of authority and authorship, misdirected or misguided information, there is a need for digital criticality which can help people sift through different kinds of information and develop the capacity for effective critical judgment regarding both truth or falsity and rhetorical persuasiveness or manipulation.&amp;nbsp; Especially within the context of scholarly and academic research and learning, classroom teaching and pedagogy, there is a need to define new parameters by which information introduced in the classroom or learning environment needs to stand deeper scrutiny regarding reliability (over authority).&lt;/p&gt;
&lt;h3&gt;Flattened Politics&lt;/h3&gt;
&lt;p&gt;The second concern has to do with the depoliticized perception of participation, collaboration and knowledge production on Wikipedia (Graham, 2010). Not only are geographical counters, experiential knowledges and non-standard forms of citation (Prabhala, 2010) ignored on Wikipedia, but they are also rendered redundant under the guise of objectivity. The essentially viral nature of information online and conditions of easy replicability that allow for copy and paste cultures often means that the information gets de-contextualised and de-politicized from its original intentions and circuits of production/distribution.&lt;/p&gt;
&lt;p&gt;In many ways, Wikipedia’s adherence to an encyclopaedic model, promotes the idea that there is universal, objective knowledge which can be produced and understood without engaging with the politics of context, language, translation, evidence, etc. This adoption of an older model of aggregating knowledge becomes problematic in the light of new perspectives and theories of reading and writing, which establish knowledge as a contested terrain rather than the benign site that can be mediated through protocols, bots and procedures (Miller, 2007 and Rosenzweig, 2006). In classrooms, students and teachers are both faced with problems when they encounter the simultaneously authoritative and collaborative, definite and tentative nature of information on Wikipedia. The flattened structure of information further complicates our engagement with the larger contexts it refers to and often hinders the learner’s ability to go beyond the self contained universe of Wikipedia, unable to engage with that which has been omitted or left-out and only concentrating on that what has been written and represented.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Technology as Tool&lt;/h3&gt;
&lt;p&gt;The third concern marks a larger anxiety with the Web 2.0 technologies 
and their integration with formal structures of education and learning. 
It has to do with new configurations of power, recalibrated hierarchies 
of learning and teaching, and distributed communities of learning which 
might not often be cohesive and concurrent. With the unqualified 
emphasis on digital gadgets – OLPC, Smart Boards, iPads – and ubiquitous
 connectivity, there is often a danger to reducing these structures to 
sheer functionality. There have been experiments where pedagogues have 
merely introduced user generated sites as reference material and ways of
 accessing information without actually looking at how they posit 
questions to existing education systems. The larger trend of distrusting
 non-academic spaces continues.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/DC.jpg/image_preview" title="Digital Technology" height="270" width="363" alt="Digital Technology" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;A lecture on the problems of Wikipedia 
is immediately followed by a ban on or “policing” of the use of 
Wikipedia as a reliable resource, trying to create a false and divisive 
distinction between offline and online learning tools (Davidson, 2007). 
With the increased focus on ‘Digital Natives’ within education policy 
and everyday classroom pedagogy, there is a call for changing the 
existing classroom and replacing it with a digital classroom – a classroom that challenges the teacher-student relationships, the 
authority of the prescribed curricula, and the form of learning and 
teaching within college and university structures. The Digital Classroom
 is often mistaken to be a virtualisation of the contemporary classroom,
 where virtual presences and cloud-based resources of learning structure
 the syllabi and the methods of learning. However, the larger anxieties 
are about rendering the physical classroom digital by establishing new 
relationships and structures at the levels of curricula design, 
teaching, learning and evaluation. The need is to look beyond the social
 media as a tool, and start unpacking the transparency of the digital 
interface and the perceived non-hierarchical nature of information 
filtering (Geiger, 2010) on Wikipedia and other such user generated 
content portals.&lt;/p&gt;
&lt;h3&gt;Quality of Access&lt;/h3&gt;
&lt;p&gt;The fourth concern draws from digital internet rhetoric of Do It Yourself. There is a heavy promotion of howthe only thing that stops a student (or anybody who is a learner) from being an intelligent and engaged student is lack of resources. This rhetoric finds bolstering in other political movements like FLOSS and A2K (Willinsky, 2006). There is a presumption that the teacher is merely a proxy for the paucity of resources and that once the students have unlimited access to the ‘sum total of all human knowledge’, they will be able to Learn everything on their own. The DIY University models, the proposition of phasing out teachers and investing in digital infrastructure instead, the idea that the digital native student has instinctive abilities to navigate through knowledge systems (like a fish does to water), all obfuscate not only the traditional learning processes but also reduce all learning to Access.&lt;/p&gt;
&lt;p&gt;There is no debate about the quality of access. Even when factual errors are spotted, it is celebrated as an opportunity to improve so that information on Wikipedia is by definition flawed and always potentially in the process of being improved. There is little theorisation of both the role of a teacher in a classroom and the relationship with information access and learning. The presumption that the only gating factor to better education is lack of resources glosses over questions of social and economic disadvantage, political contexts, age, language, race, gender, sexuality, social support, etc., that come into play when designing inclusive education systems. Instead, there is a promotion of fact-based skill-oriented learning that fits the larger neo-liberal agenda of producing workforces who necessarily should not have to be critical in their everyday labours (Achterman, 2005). Universities and colleges are finding increasing pressure to produce students who work within such flat knowledge horizons towards market expansion and promotion of information capitalism rather than a critical learner who is able to deploy lessons learned from education in order to question and change the reality of the conditions within which s/he lives.&lt;/p&gt;
&lt;h2&gt;Rationale&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Given these dramatic measures and accelerated changes happening in academia and within the university systems across the worlds, it is necessary to dwell on what a digital college classroom and learning environment looks like in the time of Wikipedia. A synthesis of perspectives from different stakeholders in varied disciplines, engaging with knowledge production, consumption, distribution and access is necessary to understand what the futures and contours of the university system and classroom pedagogy are. The ambition is to look at Wikipedia as a symptom of our times rather than a site of analyses.&lt;/p&gt;
&lt;h2&gt;Call for Proposals&lt;/h2&gt;
&lt;p&gt;This is a call for proposals towards a special Reader, from people who are interested in producing historical and contemporary accounts of relationships between education, technology, learning, and pedagogy in order to map existing crises and questions of our present times. We take the classroom as the unit where different processes and flows of the education system meet. In this context, we invite researchers, academic practitioners, students, artists, new media theorists, education policy actors and historians of knowledge to look at the &lt;em&gt;Digital Classroom in the Time of Wikipedia&lt;/em&gt; as an opportunity to question global trends in education and ways by which Wikipedia (and other such structures) can be fruitfully integrated in formal education towards better learning. Proposals can be for producing theoretical accounts, critical analyses, case-studies from one’s practice, review of information and knowledge, narratives of art and activist interventions, regional and local snap-shots, and other innovative forms by which the diverse and complex questions can be elaborated.&lt;/p&gt;
&lt;h2&gt;Key Questions&lt;/h2&gt;
&lt;p&gt;Proposals can be inspired by but not limited to some of the questions listed below that we identify as beginning points for engaging with the area:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;What does a digital classroom look like? If we had to think beyond just integration of digital tools into the classroom, what are the new models and structures of classrooms (physical, pedagogical, or otherwise) that we are looking at?&lt;/li&gt;&lt;li&gt;What are the new relationships that we are mapping in the time of Wikipedia – student-teacher, teacher-curriculum, student-classroom, student-student, technology-education, pedagogy-learning? How do we account for the shifts and map the transitions?&lt;/li&gt;&lt;li&gt;How do we understand the changing nature and function of the university and education with the rise of the internet? What are the policy and practice visions of the University of the Future?&lt;/li&gt;&lt;li&gt;What does the integration of Wikipedia and similar structures in everyday classroom practice lead to? What does it change and for whom?&lt;/li&gt;&lt;li&gt;What is the role of the teacher in the age of ubiquitous information access? How do we restructure our ideas of pedagogy, learning and evaluation?&lt;/li&gt;&lt;li&gt;What are the historical tensions between technology and education that are being replayed with the rise of the digital?&lt;/li&gt;&lt;li&gt;What does the rise of Wikipedia mean for our traditional understandings of data repositories? What are the politics and implications of Wikimedia’s other projects on Alternative Citation, Wikipictures, GLAM, etc. on the larger knowledge ecology and industry?&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Achterman, D. (2005). “Surviving Wikipedia: Improving student search habits through information literacy and teacher collaboration”, &lt;em&gt;Knowledge Quest&lt;/em&gt;, 33(5), 38−40.&lt;/li&gt;&lt;li&gt;Davidson, C. (2007). “We can’t ignore the influence of digital technologies”,&lt;em&gt; Education Digest&lt;/em&gt;, 73(1), 15−18.&lt;/li&gt;&lt;li&gt;Geiger, S. (2011). “The Lives of Bots”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Giles, J. (2005). “Internet encyclopedias go head to head”, &lt;em&gt;Nature&lt;/em&gt;, 438(7070), 900−901.&lt;/li&gt;&lt;li&gt;Graham, M. (2011). “Wiki Space: Palimpsests and the Politics of Exclusion”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Harouni, H. (2009). “High School Research and Critical Literacy: Social Studies with and Despite Wikipedia”, &lt;em&gt;Harvard Educational Review&lt;/em&gt;, 79 (3), 473-494.&lt;/li&gt;&lt;li&gt;Liang, L. (2011). “A brief History of the Internet from the 15th to the 18th Century”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Miller, N. (2007). “Wikipedia revisited” &lt;em&gt;ETC: A Review of General Semantics&lt;/em&gt;, 64(2), 147−150.&lt;/li&gt;&lt;li&gt;Orlowski, A. (2006, March 26). Nature mag cooked Wikipedia study, &lt;em&gt;The Register&lt;/em&gt;. Retrieved December 17, 2011, from &lt;a class="external-link" href="http://www.theregister.co.uk/2005/10/18/wikipedia_quality_problem/"&gt;http://www.theregister.co.uk/2005/10/18/wikipedia_quality_problem/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Prabhala, A. (2011). &lt;em&gt;People Are Knowledge&lt;/em&gt;. Documentary retrieved from December 17, 2011 from &lt;a class="external-link" href="http://vimeo.com/26469276"&gt;http://vimeo.com/26469276&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Rosenzweig, R. (2006). “Can history be open source? Wikipedia and the future of the past” &lt;em&gt;Journal of American History&lt;/em&gt;, 93(1), 117–146.&lt;/li&gt;&lt;li&gt;Willinsky, J. (2006). &lt;em&gt;The Access Principle: The Case for Open Access to Research and Scholarship&lt;/em&gt;. MIT Press :Massachusetts.
&lt;hr /&gt;&lt;strong&gt;Collaborators&lt;/strong&gt;: Dr. David Theo Goldberg, &lt;em&gt;University of California 
Humanities Research Institute&lt;/em&gt; and Claudia Sullivan, &lt;em&gt;Digital Media and 
Learning Initiative, HASTAC&lt;/em&gt;.&lt;br /&gt;&lt;strong&gt;Photo source&lt;/strong&gt;: &lt;a class="external-link" href="http://www.flickr.com/search/?q=digital+classrooms&amp;amp;l=1"&gt;Flickr&lt;/a&gt; (Creative Commons-licensed content for noncommercial use requiring attribution and share alike distribution).&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia'&gt;https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>Digital Classroom in the Time of Wikipedia</dc:subject>
    

   <dc:date>2015-10-05T14:53:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem">
    <title>Why your Facebook Stalker is Not the Real Problem</title>
    <link>https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem</link>
    <description>
        &lt;b&gt;We live in networked conditions. This is a statement that can now be taken at face-value, and immediately explains our highly connected, inter-meshed environments finds Nishant Shah in this article published in FirstPost on March 20, 2012.&lt;/b&gt;
        
&lt;p&gt;Especially within the digital world, the World Wide Web has become synonymous with social networking systems, where increasingly all our access, communication and interaction is located within a series of interconnected networks.&lt;/p&gt;
&lt;p&gt;From the imagination of the web as a complex network, we have evolved to looking at the web as facilitating networks where different relationships, transactions and connections can be mapped and managed. This is why we often have romantic imaginations of networks as free, open, collaborative, shared spaces of interaction and expression.&lt;/p&gt;
&lt;p&gt;However, we have reached a stage where this idea of a network as a liberatory space is under threat. Even as I write this, Internet Service Providers are now planning to set up sophisticated, automated systems that will do a deep-spy on your data transfer to see if you are sharing files (sometimes also called piracy) using the Internet.&lt;/p&gt;
&lt;p&gt;These systems will now keep track of all your digital transactions and will monitor what you consume, who you talk to and determine whether you are a good ethical subject who is only using the Internet in ways that the powers to be want you to.&lt;br /&gt;&lt;br /&gt;For me, this particular networked condition of being constantly monitored and watched is scary. And it surprises me that this invasive process is less in public attention than Google’s recently changed privacy policies or the TOS-in-progress nature of privacy on Facebook.&lt;br /&gt;&lt;br /&gt;This is because the ubiquitous presences of networks in our lives have made them transparent to us – we do not think of the networks themselves as entities but as spaces where interactions with other objects is possible. Hence, if I ask you, right now, to name the top 5 entities that you interact with the most on Facebook, I am sure you will be able to name them. More probably than not, these top 5 entities with people that you have formed strong Facebook Friendships with.&lt;br /&gt;&lt;br /&gt;In fact there are platforms designed to let you know who you are talking with most on your networks. Network influence measurement indices by services like Klout are able to tell you not only who you talk to but also what are your key areas of influence. This is a way by which the network becomes invisible to us. It hides the fact that the thing that talks to you the most on Facebook is Facebook itself.&lt;br /&gt;&lt;br /&gt;The marketing of Facebook might tell you that you are talking to other human beings, but reality is that the network is more than the sum total of all human beings on the system. Just look at the amount of information Facebook produces on your behalf and to you. Notifications for adding friends, for liking people, for people writing to you, for people commenting on your walls and posts, form more than 50% of the information traffic on Facebook or social networking systems.&lt;br /&gt;&lt;br /&gt;This information is produces and shared by scripts, coded bots, algorithmic applications, and non-human entities that not only support and sustain the network but are also significant members of the networks.&lt;br /&gt;&lt;br /&gt;This is the actual networked condition – where the processes and entities that make the networks possible, produce an illusion of seamless communication and interaction, while performing and extraordinary amount of information and for you.&lt;/p&gt;
&lt;p&gt;This blindness to our own ‘networkedness’ has crucial ramifications for our online activities because it makes us oblivious to questions of privacy, control, safety and trust. We have privacy settings to protect us from human entities on Facebook. There is very little concern about the non-human entities who store, distribute and use the data that we produce. If we don’t even know what these watchers are, how do we protect ourselves from being watched? What happens when between you and your ‘friend’, is a series of silent interceptors who are recording and using your data without your knowledge?&lt;br /&gt;&lt;br /&gt;Being in a network is like being in a glass-house. We cannot see the walls and hence, we presume that we need our privacy from the other inhabitants of the same house. However, in that, we forget that the walls are watching, and that there are invisible watchers beyond the walls, who are in control.&lt;br /&gt;&lt;br /&gt;It is time to make our networks visible again. It is time to realise that what we really need to be afraid of, on social networking systems, is the social network itself, and not the mythical stranger who wants to stalk us or that unwanted friend you want to exclude from your information sharing.&lt;br /&gt;&lt;br /&gt;Privacy and safety are not merely compromised at the interface, where information might leak and travel into zones outside of your knowledge and control. The real questions of being safe are actually in the protocols and designs of the network itself.&lt;br /&gt;&lt;br /&gt;We need to start looking at larger invasive policies exercises by the different invisible actors like the ISP, ICT ministries, corporate policies, design choices and architecture of interception that sustain the networks we so gladly embrace.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society and recently edited a 4 volume book on youth, technology and change, titled ‘Digital AlterNatives with a Cause?’&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/why-your-facebook-stalker-is-not-the-real-problem-249872.html"&gt;Read this in FirstPost&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem'&gt;https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T05:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
