<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 120 to 134.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/posts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/papers/ebola-a-big-data-disaster"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-selected-sessions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/approaching-open-research-via-open-data-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/raw-lectures-02-anil-menon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/teri-seminar-on-open-access-in-research"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02">
    <title>Monitoring Sustainable Development Goals in India: Availability and Openness of Data (Part II)</title>
    <link>https://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02</link>
    <description>
        &lt;b&gt;The Sustainable Development Goals (SDGs) are an internationally agreed upon set of developmental targets to be achieved by 2030. There are 17 SDGs with 169 targets, and each target is mapped to one or more indicators as a measure of evaluation. In this and the next blog post, Kiran AB is documenting the availability and openness of data sets in India that are relevant for monitoring the targets under the SDGs. This post offers the findings for the last 10 Goals. The first 7 has already been discussed in the earlier post.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The first part of the post can be accessed &lt;a href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-01/"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal #08: &lt;em&gt;Promote sustained, inclusive and sustainable economic growth, full and productive employment and decent work for all&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;There are fourteen indicators to monitor the goal 8 and the data is available for all the indicators mapped to their respective targets. For most of the indicators, the data availability is not what the indicator demands, but has to be derived from the available dataset.&lt;/p&gt;
&lt;p&gt;The data can be accessed freely in the public domain for all the indicators. However, for the subparts in some of the indicators, the data is not accessible freely. There is a cross agency dependency over the data, to arrive at the required indicator.&lt;/p&gt;
&lt;p&gt;Data is collected annually for most of the indicators, while the indicators, viz., Indicator 8.3.1.: Share of informal employment in non-agriculture employment by sex; Indicator 8.5.2: Unemployment rate by sex, age-group and persons with disabilities, which are measured by the Census or the planning commission the frequency of data collection becomes decennial or quinquennial. And the Indicator 8.8.2 : Number of ILO conventions ratified by type of convention, which lists the number of conventions the frequency cannot be determined as it's just a list updated whenever there is a ratification of any ILO conventions. Some of the available data are restricted to particular years and most of them are not till date.&lt;/p&gt;
&lt;p&gt;Two indicators, i.e., Indicator 8.5.2 and Indicator 8.10.1: Number of commercial bank branches and ATMs per 100,000 adults, which are measured at the level of districts, whereas Indicator 8.7.1: Percentage and number of children aged 5-17 years engaged in child labour, per sex and age group; Indicator 8.8.1: Frequency rates of fatal and non-fatal occupational injuries by sex and migrant status, are measured at the state level. The remaining are measured only at the national level.&lt;/p&gt;
&lt;p&gt;Most of the data are collected from the international organisations like ILO, UNEP, UNWTO, etc., from whose source the data are not updated regularly. There is also a need to disaggregate according to the indicator.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #09: &lt;em&gt;Build resilient infrastructure, promote inclusive and sustainable industrialization and foster innovation&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;When development is through industrialization, sustainable and inclusiveness should be the necessary conditions to attain it. Having said this, the data is available for all the indicators, i.e., twelve indicators,  corresponding to the targets as defined for the goal 9. For most of the indicators, the data have to be derived for the required measure to monitor the goal.&lt;/p&gt;
&lt;p&gt;From among these indicators, the data is collected annually for most of the indicators, while for the two indicators, Indicator 9.3.1: Percentage share of small scale industries in total industry value added; Indicator 9.3.2: Percentage of small scale industries with a loan or line of credit, the frequency of data collection is once in five years.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Excluding two indicators, i.e., Indicator 9.2.2: Manufacturing employment as a percentage of total employment; Indicator 9.1.1: Share of the rural population who live within 2km of an all season road, for which the data is available at the state level and district level respectively, for the remaining indicators the data is available only at the national level.&lt;/p&gt;
&lt;p&gt;The data pertaining to eleven indicators are freely accessible in the public domain, however, for the Indicator 9.b.1: Percentage share of medium and high-tech (MHT) industry value added in total value added, the data is not freely accessible. Most of the freely available data are obtained from the international organisations, along with the official data from the government in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #10: &lt;em&gt;Reduce inequality within and among countries&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;Bridging the gap between the global north-south divide through co-operation – social, economical, political, etc., would promote equality. There are twelve indicators for measuring this goal, of which the data is not available for one of the indicators and are available for the remaining indicators.&lt;/p&gt;
&lt;p&gt;From the data available, for six of the indicators the data is accessible freely in the public domain, whereas for the five of the indicators – Indicator 10.2.1; Indicator 10.3.1; Indicator 10.4.1; Indicator 10.7.3; Indicator 10.a.1, the data is closed.&lt;/p&gt;
&lt;p&gt;Most of the data available are of the national level and for the Indicator 10.7.3:  Number of detected and non-detected victims of human trafficking per 100,000, the data includes from the states as well. However, since the goal refers to inequalities within the country as well, the granularity of the data should have been from the state/district level as well.&lt;/p&gt;
&lt;p&gt;And, the frequency of data collected are annually for some of the indicators and for some the details cannot be determined or not valid. For most of the indicators the data has to be derived from the available dataset and disaggregated as needed. Also, for some indicators the data is partially available.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 10.7.1:  Recruitment cost borne by employee as percentage of yearly income earned in country of destination&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #11: &lt;em&gt;Make cities and human settlements inclusive, safe, resilient and sustainable&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;Housing and the type of settlements determines the human development and the progress of development of a nation. Therefore for monitoring the goal 11 is implicit to human development. There are thirteen indicators to monitor this goal and out of which the data is available for ten indicators and for the three indicators  the data is not available.&lt;/p&gt;
&lt;p&gt;For three of the indicators the available data is not freely accessible, while for the remaining ones the data is accessible. And for most of the indicators the data has to be derived as needed.&lt;/p&gt;
&lt;p&gt;The data is collected annually for most of the indicators and quinquennially for the Indicator 11.5.1, and for some data the data pertains to particular year and there lacks a sequence of data availability.&lt;/p&gt;
&lt;p&gt;For four of the indicators – Indicator 11.2.1; Indicator 11.3.1; Indicator 11.6.1; Indicator 11.a.1, the data is available at the state/city level along with national level. And for the remaining indicators the data is available at the national level alone. Also, some of the data are not up-to-date and refers to data more than 3 or years old.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 11.3.2: Percentage of cities with direct participation structure of civil society in urban planning and management, which operate regularly and democratically&lt;/li&gt;
&lt;li&gt;Indicator 11.7.1: The average share of the built-up areas of cities that is open space in public use for all, disaggregated by age, sex, and persons with disabilities&lt;/li&gt;
&lt;li&gt;Indicator  11.b.1:  Percentage  of  cities  implementing  risk  reduction  and  resilience strategies aligned with accepted international frameworks (such as the successor to the Hyogo Framework for Action on Disaster Risk Reduction) that include vulnerable and marginalised groups in their design, implementation and monitoring&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #12: &lt;em&gt;Ensure sustainable consumption and production patterns&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;Production and consumption should go hand in hand, but over consumption or over production would only lead to destruction of the environment. Therefore goal 12 seeks to ensure a sustainability in both. The data is available for ten indicators out of twelve indicators, and for the two indicators the data is not available, so as to monitor the respective goals. Some of the data are partially available and using the available data the indicators can be derived.&lt;/p&gt;
&lt;p&gt;Moreover, the data for six of the indicators which are available are freely accessible in the public domain whereas for the remaining four indicators – Indicator  12.4.1; Indicator 12.4.2; Indicator 12.5.1; Indicator 12.b.1, the data is not open.&lt;/p&gt;
&lt;p&gt;While for most of the indicators say, Indicator 12.2.1; Indicator 12.3.1; Indicator 12.5.1; Indicator 12.a.1; Indicator  12.c.1, the data is collected annually, whereas for the others, the data which are available are for particular years or cannot be determined. Except for the Indicator 12.5.1, for which the data is available at the city level, the data for the remaining are of the national order. The data is collected from both the national institutions, ministries and also from the international organisations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 12.1.1: Number of countries with SCP National Actions Plans or SCP mainstreamed as a priority or target into national policies.&lt;/li&gt;
&lt;li&gt;Indicator 12.8.1: Percentage of educational institutions with formal and informal education curricula on sustainable development and lifestyle topics&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #13: &lt;em&gt;Take urgent action to combat climate change and its impacts&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;The impact of climate change is severe, therefore taking an urgent action ensures could reduce the impact. The data is available for four of the indicators out of five, and for one of indicators the data is not available.&lt;/p&gt;
&lt;p&gt;The data for three indicators are freely accessible in the public domain, whereas for the Indicator 13.3.1: Number of countries that have integrated mitigation, adaptation, impact reduction and early warning into primary, secondary and tertiary curricula, the data is not open and also not specific to the indicator. The data for some of the indicators are partially available and have to be derived.&lt;/p&gt;
&lt;p&gt;The frequency of the data is not uniform and cannot be determined, by the virtue of the indicator itself. For example, the occurrence of a disaster event is random. However, for some of the indicators the reporting is either annual or quadrennial.&lt;/p&gt;
&lt;p&gt;The data availability is at the national level and in case of the Indicator 13.3.1., the data is available for two states – Orissa and Tamil Nadu. Data for almost all the indicators are obtained from international organizations and very less data availability from the national databases.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 13.2.1.: Number of countries that have formally communicated the establishment of integrated  low-carbon, climate-resilient, disaster  risk reduction development strategies&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #14: &lt;em&gt;Conserve and sustainably use the oceans, seas and marine resources for sustainable development&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Oceans are the torchbearers for all the countries. Therefore everything related to oceans, seas and marine resources have an impact on the human life. There are ten indicators corresponding to the targets, of which the data is available for nine indicators and for one indicator the data is not available. The data for some of the indicators are not direct, but need to be derived, while for some indicators the data is partially available. To derive some indicators we need to rely on cross agency data.&lt;/p&gt;
&lt;p&gt;For the Indicator 14.a.1: Budget allocation to research in the field of marine technology as a percentage of total budget to research, the data on budgetary allocation doesn't specify to marine technology.&lt;/p&gt;
&lt;p&gt;The frequency of data collected for most of the indicators are not available or cannot be determined or not applicable, whereas for some the data is collected annually. And for most of the indicators the data is available at the national level and for the Indicator 14.5.1: Coverage of protected areas in relation to marine areas, the data is available for the states also.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 14.6.1: Dollar value of negative fishery subsidies against 2015 baseline&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #15: &lt;em&gt;Protect, restore and promote sustainable use of terrestrial ecosystems, sustainably manage forests, combat desertification, and halt and reverse land degradation and halt biodiversity loss&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This goal on restoring, promoting ecosystem and stopping biodiversity loss, etc., has fifteen indicators mapped to twelve corresponding targets. Of which, the data is available for fourteen of the indicators and the data is not available for the one of the indicators. Data for some of the indicators exist partially and for some the data has to be derived to match the indicators. To arrive at the indicators, the data has to be derived from different datasets available.&lt;/p&gt;
&lt;p&gt;Most of the data which are available are closed and only five are accessible in the public platform – Indicator 15.1.1 : Forest area as a percentage of total land area; Indicator 15.4.2: Mountain Green Cover Index; Indicator 15.8.1: Adoption of national legislation relevant to the prevention or control of invasive alien species; Indicator 15.9.1: Number of national development plans and processes integrating biodiversity and ecosystem services values; Indicator 15.a.1: Official development assistance and public expenditure on conservation and sustainable use of biodiversity and ecosystems.&lt;/p&gt;
&lt;p&gt;The frequency of data collected is not available or cannot be determined for majority of the indicators, while the data is annually collected for the ones which can be determined. Furthermore, the data is available at the national level for all the indicators, except the Indicator 15.b.1: Forestry official development assistance and forestry FDI, for which the data is available at the level of states as well.&lt;/p&gt;
&lt;p&gt;The data available are collected by international organisations like OECD, FAO, Convention on Biological Diversity, etc., as well as by the national institutions and ministries like Planning Commission, Ministry of Environment, Forest and Climate Change, etc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 15.2.2: Net permanent forest loss&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #16: &lt;em&gt;Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions at all levels&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A society which is inclusive, peaceful, provides justice and accountable in all its forms would ensure sustainable development, therefore to promote the aforementioned parameters one has to monitor them through an established measure. There are twenty-one indicators for this goal mapped to the respective targets and out of which the data is not available for five indicators to monitor the goal. From the available dataset, the values need to be derived for some of the indicators and for some indicators the data is directly/partially available.&lt;/p&gt;
&lt;p&gt;From among the data which are available, for nine indicators the data is not freely accessible in the public platform, while the remaining six data set are open to access. They are available both from national and international agencies and most of the data are not up to the date.&lt;/p&gt;
&lt;p&gt;The data which are available are collected/reported annually. And, excluding four indicators. i.e.; Indicator 16.1.3, Indicator 16.3.1, Indicator 16.4.2, Indicator 16.b.1, the data is available at the state level, while for the remaining indicators the data is available only at the national level. Most of the indicators require data from past 12 months, but the available dataset does not cater the needs, as they are not updated regularly. Finally, the indicators seeks disaggregated data for monitoring the goal.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 16.1.4: Proportion of people that feel safe walking alone around the area they live&lt;/li&gt;
&lt;li&gt;Indicator  16.2.3.  Percentage  of  young  women  and  men  aged  18-24  years  who experienced sexual violence by age 18&lt;/li&gt;
&lt;li&gt;Indicator 16.6.2: Percentage of population satisfied with their last experience of public services&lt;/li&gt;
&lt;li&gt;Indicator 16.7.2: Proportion of countries that address young people's multisectoral needs with their national development plans and poverty reduction strategies&lt;/li&gt;
&lt;li&gt;Indicator 16.a.1: Percentage of victims who report physical and/or sexual crime to law enforcement  agencies  during  past  12  months  disaggregated  by  age,  sex,  region  and population group&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Goal #17: &lt;em&gt;Strengthen the means of implementation and revitalize the global partnership for sustainable development&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Moving towards achieving SDGs in the global scenario requires support – financial, technological, etc. This support can be strengthened the relationship between the developing and the developed countries. There are twenty-four indicators to monitor the goal 17, out of which the data is available for twenty-three of the indicators and for one of the indicators the data does not exist.&lt;/p&gt;
&lt;p&gt;The data which are available are direct as per the indicators, whereas for most of the indicators the data need to be derived. Data is partially available for the Indicator  17.16.1: Indicator 7 from Global Partnership Monitoring  Exercise: Mutual accountability among development co-operation actors is strengthened through inclusive reviews.&lt;/p&gt;
&lt;p&gt;From the data available for twenty-three indicators, fourteen of the data set are freely accessible and the nine are not open. Also, some of the data which are open are not up to date or the latest data is not open.&lt;/p&gt;
&lt;p&gt;The data is collected annually for most of the indicators and for some the data is available for particular year. Also for some of the indicators like Indicator 17.5.1: Number of national &amp;amp; investment policy reforms adopted that incorporate sustainable development objectives or safeguards x country; Indicator 17.6.1: Access to patent information and use of the international intellectual property (IP) system; Indicator  17.18.2:  Number  of  countries  that  have  national  statistical  legislation  that complies with the Fundamental Principles of Official statistics, the frequency cannot be determined or not valid.&lt;/p&gt;
&lt;p&gt;Since this indicator speaks at the national level, the granularity of the data pertains to the nation. Most of the data are obtained from the international organisations say UN, World Bank, IMF, OECD, etc., and some are from the national institutions/ministries like Planning Commission, Finance Ministry, etc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Data Not Available:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Indicator 17.17.1: Amount of US$ committed to public-private partnerships and civil society partnerships&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Decision making depends on data, a data should be representative, with high quality and has to be timely collected, which ensures precise assessment of the decision being made. From the analysis it was found that, most of the data which are available are either not freely accessible, outdated and not precise to the need. Most of the SDG indicators are based on disaggregation. The disaggregation is a key to measure to the precision, especially incidences like poverty, food security, health, etc. Therefore, to monitor different parameters we need to identify the different levels prevailing in the parameter to ensure inclusivity.&lt;/p&gt;
&lt;p&gt;Said above, the frequency of data collection is either annual, quinquennial and decennial. To enable real time evaluation, the data should be up-to-date. Moreover, for most of the indicators the data availability is at the national level or at the state level and sometimes at the district level. The granularity of data ensures geographic inclusiveness.&lt;/p&gt;
&lt;p&gt;In a country like India for close monitoring of progress/development of any sort the data availability should be;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;at a granular level of district/block,&lt;/li&gt;
&lt;li&gt;collected and updated regularly,&lt;/li&gt;
&lt;li&gt;disaggregated by age, sex, and also by social group, and&lt;/li&gt;
&lt;li&gt;the data should be open to be able to access in the public domain freely.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Open data will be a crucial tool for governments to meet the transparency and efficiency challenges. For this reason, government data should be open – freely accessible, presented in a format that is comparable and reusable and, ideally, released in a timely manner.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Author&lt;/h3&gt;
&lt;p&gt;Kiran A B, is a student of Master of Public Policy (MPP) at the National Law School of India University, Bengaluru. Kiran has an undergraduate degree in electronics and communications engineering, and he has three years full-time work experience as a software engineer, working in different technological platforms. His research interest includes interdisciplinary linkages between policy, law and technology.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02'&gt;https://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Sustainable Development Goals</dc:subject>
    

   <dc:date>2016-04-12T04:14:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/posts">
    <title>Posts</title>
    <link>https://cis-india.org/internet-governance/posts</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/posts'&gt;https://cis-india.org/internet-governance/posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-30T11:09:35Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services">
    <title>TRAI Consultation on Differential Pricing for Data Services - Post-Open House Discussion Submission</title>
    <link>https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent this submission to the Telecom Regulatory Authority of India (TRAI)  following the Open House Discussion on Differential Pricing of Data Services, held in Delhi on February 21, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the submission document: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_TRAI-Differential-Pricing_Submission_2015.01.25.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Post-Open House Discussion Submission to TRAI&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Ms. Kotwal,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is to heartily congratulate TRAI once again for taking several steps, including the Open House Discussion, to ensure that various opinions about the topic of ‘differential pricing for data services’ are presented and are responded to - and are all in full public view.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This brief note is to &lt;strong&gt;a)&lt;/strong&gt; add to the positions and arguments submitted previously by the Centre for Internet and Society (CIS), India, &lt;strong&gt;b)&lt;/strong&gt; put in writing our comments during the Open House Discussion (January 21, 2016), and &lt;strong&gt;c)&lt;/strong&gt; respond to other comments shared at the same event. We have six points to share in this note:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Forbearance is not an option&lt;/strong&gt;: We are of the opinion that though the data services market has thus far been kept un-monitored and unregulated, and there are several reasons why this situation should not continue any more. Although the reality of differential pricing (that is data packets originating from different sources being priced differently by ISPs) was highlighted with the recent offering of zero rated packs, it is a general practice in the sector, as illustrated by widely available special/curated content packs for the user to consume data from a specified web-based source. It is not surprising that most such special/curated content packs involve an arrangement between the ISP and a prominent leader in the web-content/platform sector, such as Facebook and Twitter. Serious market distorting impacts of such arrangements are imminent if they are allowed to continue without any monitoring, enforced public disclosure, and regulatory actions by a public authority.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Address differential treatment of data, and not only differential pricing&lt;/strong&gt;: Pricing is only of the three ways in which data services can be treated differently by the ISPs depending upon the source of the data packets concerned. The other two ways are: a) differential speed, or throttling of some data packets and prioritisation of the others, and b) differential treatment of data protocols, for example, the blocking of peer-to-peer or voice-over-IP traffic by an ISP. If the public authority decides to only regulate differential pricing of data service, it is highly probable that ISPs may shift to other forms of discrimination between data packets - either in terms of prioritising some data packets over others based upon their origin, or blocking of specific protocols such as voice-over-IP to prevent the functioning of certain web-based services - and continue the market distorting impacts through these other means.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Allow and define reasonable network management practices&lt;/strong&gt;: Reasonable network management has to be allowed to enable the ISPs to manage performance on their network. However, ISPs may not indulge in acts that are harmful to users in the name of reasonable network management. Below is a set of potential guidelines to identify cases when discrimination against classes of data traffic in the name of reasonable network management can be considered justified and permissible:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;there is an intelligible differentia between the classes which are to be treated differently,&lt;/li&gt;
&lt;li&gt;there is a rational nexus between the differential treatment and the aim of such differentiation,&lt;/li&gt;
&lt;li&gt;the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical limitation outside the control of the ISP, and&lt;/li&gt;
&lt;li&gt;the network management practice is the least harmful technical means that is reasonably available to achieve the aim.&lt;/li&gt;&lt;br /&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish an effective enforcement mechanism&lt;/strong&gt;: TRAI must establish an enforcement mechanism that is open to users [and groups of users] and private sector actors as current forums are insufficient. Clear and simple rules must be established ex-ante, if they are violated - ex-post regulation must be undertaken on the basis of principles listed in the TRAI consultation paper, that is “non-discrimination, transparency, affordable internet access, competition and market entry, and innovation” &lt;a name="fr1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Take regulatory decisions now, but also conduct and commission further research to review and refine the decisions over a defined period of time&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Need for better collection and proactive disclosure of statistics&lt;/strong&gt;: TRAI publishes quarterly performance indicators statistics collected from the telecom companies about telephone, mobile, and internet sectors in India &lt;a name="fr2"&gt;[2]&lt;/a&gt;. It will be very useful for researchers and analysts, and allow for a much more informed public debate on the matter, if the content and form of such data are improved in the following ways:&lt;br /&gt;
&lt;br /&gt;&lt;strong&gt;Content:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please start collection (unless already done) and publication of not only data of average incoming and outgoing MOUs, average of total outgoing SMSs, Average Revenue Per User, and average data usage per GSM and CDMA subscriber, but distributions of the same in terms of user deciles (that is in terms of representative figures for each 10% section of users in ascending order of usage),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data about data usage across service areas and service providers (the numbers on ‘average data usage’ and total ‘revenue from data usage’ provided at present are very insufficient for the state of public debate),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about internet subscriber base according to network technologies (for both wired and wireless) and the service providers concerned,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data about IP-based telephony across service areas and service providers,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide data separately for the North Eastern states, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Provide granular data (separated from the corresponding state data) for all tier-1 cities.&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Form:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please do not publish the data only as part of the quarterly reports available in PDF format, but also as independent machine-readable spreadsheet file (preferably in CSV format),&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Do not only publish quarterly data in separate files, but also provide a combined (all quarters together) dataset that would make it much easier for researchers and analysts to use the data,&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In some exceptional cases, the data is not provided in the report directly but a diagram containing the data is published &lt;a name="fr3"&gt;[3]&lt;/a&gt;, which should be kindly avoided, and&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Please publish these statistics as open data, that is in open standards and under open licenses.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Further, we request TRAI to explore possibilities of distributed sourcing of data, perhaps from the users themselves, about the actual network usage experiences, including but not limited to signal strength, data transfer speed (incoming and outgoing), frequency of switches between mobile (GSM and CDMA) and wi-fi connectivity, etc.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1"&gt;1&lt;/a&gt;]. http://trai.gov.in/WriteReaddata/ConsultationPaper/Document/CP-Differential-Pricing-09122015.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2"&gt;2&lt;/a&gt;]. http://www.trai.gov.in/Content/PerformanceIndicatorsReports/1_1_PerformanceIndicatorsReports.aspx.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3"&gt;3&lt;/a&gt;]. http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Performance_Indicator_Report_Jun_2015.pdf , sections 1.43 and 1.44 (pp. 31-32).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services'&gt;https://cis-india.org/telecom/blog/trai-consultation-on-differential-pricing-for-data-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI, OTT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-03-30T13:13:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy">
    <title>An Urgent Need for the Right to Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy</link>
    <description>
        &lt;b&gt;Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://goo.gl/forms/hw4huFcc4b" target="_blank"&gt;Read and sign the open letter.&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the Open Letter&lt;/h2&gt;
&lt;p&gt;As our everyday lives are conducted increasingly through electronic communications the necessity for privacy protections has also increased. While several countries across the globe have recognised this by furthering the right to privacy of their citizens the Union Government has adopted a regressive attitude towards this core civil liberty. We urge the Union Government to take urgent measures to safeguard the right to privacy in India.&lt;/p&gt;
&lt;p&gt;Our concerns are based on a continuing pattern of disregard for the right to privacy by several governments in the past. This trend has increased as can be plainly viewed from the following developments.&lt;/p&gt;
&lt;p&gt;In 2015, the Attorney General in the case of *K.S. Puttaswamy v. Union of India*, argued before the Hon’ble Supreme Court that there is no right to privacy under the Constitution of India. The Hon'ble Court was persuaded to re-examine the basis of the right to privacy upsetting 45 years of judicial precedent. This has thrown the constitutional right to privacy in doubt and the several judgements that have been given under it. This includes the 1997 PUCL Telephone Tapping judgement as well. We urge the Union Government to take whatever steps are necessary and urge the Supreme Court to hold that a right to privacy exists under the Constitution of India.&lt;/p&gt;
&lt;p&gt;Recently Mr. Arun Jaitley, Minister for Finance introduced the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This bill was passed on March 11, 2016 in the middle of budget discussion on a short notice as a money bill in the Lok Sabha when only 73 of 545 members were present. Its timing and introduction as a money bill prevents necessary scrutiny given the large privacy risks that arise under it. This version of the bill was never put up for public consultation and is being rushed through without adequate discussion. Even substantively it fails to give accountable privacy safeguards while making Aadhaar mandatory for availing any government subsidy, benefit, or service.&lt;/p&gt;
&lt;p&gt;We urge the Union Government to urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations. We encourage the Government to have extensive public discussions on the Aadhaar Bill before notifying it. We further call upon them to constitute a drafting committee with members of civil society to draft a comprehensive statute as suggested by the Justice A.P. Shah Committee Report of 2012.&lt;/p&gt;
&lt;p&gt;Signatories:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Amber Sinha, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Japreet Grewal, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Joshita Pai, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Raman Jit Singh Chima, Access Now&lt;/li&gt;
&lt;li&gt;Sarvjeet Singh, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Sunil Abraham, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, the Centre for Internet and Society&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-17T07:40:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison">
    <title>Aadhaar Bill 2016 &amp; NIAI Bill 2010 - Comparing the Texts</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison</link>
    <description>
        &lt;b&gt;This is a quick comparison of the texts of the Aadhaar Bill 2016 and the National Identification Authority of India Bill 2010. The new sections in the former are highlighed, and the deleted sections (that were part of the latter) are struck out.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="http://cis-india.github.io/aadhaar-bill-2016/" frameborder="0" height="500px" width="100%"&gt; &lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Source: &lt;a href="http://cis-india.github.io/aadhaar-bill-2016/"&gt;http://cis-india.github.io/aadhaar-bill-2016/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison'&gt;https://cis-india.org/internet-governance/blog/aadhaar-bill-2016-niai-bill-2010-text-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-09T11:25:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/papers/ebola-a-big-data-disaster">
    <title>Sean McDonald - Ebola: A Big Data Disaster</title>
    <link>https://cis-india.org/papers/ebola-a-big-data-disaster</link>
    <description>
        &lt;b&gt;We are proud to initiate the CIS Papers series with a fascinating exploration of humanitarian use of big data and its discontents by Sean McDonald, FrontlineSMS, in the context of utilisation of Call Detail Records for public health response during the Ebola crisis in Liberia. The paper highlights the absence of a dialogue around the significant legal risks posed by the collection, use, and international transfer of personally identifiable data and humanitarian information, and the grey areas around assumptions of public good. The paper calls for a critical discussion around the experimental nature of data modeling in emergency response due to mismanagement of information has been largely emphasized to protect the contours of human rights.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Read&lt;/h2&gt;
&lt;h4&gt;Download the paper: &lt;a href="https://github.com/cis-india/papers/raw/master/CIS_Papers_2016.01_Sean-McDonald.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Preface&lt;/h2&gt;
&lt;p&gt;This study titled “Ebola: A Big Data Disaster” by Sean Martin McDonald, undertaken with support from the Open Society Foundation, Ford Foundation, and Media Democracy Fund, explores the use of Big Data in the form of Call Detail Record (CDR) data in humanitarian crisis.&lt;/p&gt;
&lt;p&gt; It discusses the challenges of digital humanitarian coordination in health emergencies like the Ebola outbreak in West Africa, and the marked tension in the debate around experimentation with humanitarian technologies and the impact on privacy. McDonald’s research focuses on the two primary legal and human rights frameworks, privacy and property, to question the impact of unregulated use of CDR’s on human rights. It also highlights how the diffusion of data science to the realm of international development constitutes a genuine opportunity to bring powerful new tools to fight crisis and emergencies.&lt;/p&gt;
&lt;p&gt;Analysing the risks of using CDRs to perform migration analysis and contact tracing without user consent, as well as the application of big data to disease surveillance is an important entry point into the debate around use of Big Data for development and humanitarian aid. The paper also raises crucial questions of legal significance about the access to information, the limitation of data sharing, and the concept of proportionality in privacy invasion in the public good. These issues hold great relevance in today's time where big data and its emerging role for development, involving its actual and potential uses as well as harms is under consideration across the world.&lt;/p&gt;
&lt;p&gt;The paper highlights the absence of a dialogue around the significant legal risks posed by the collection, use, and international transfer of personally identifiable data and humanitarian information, and the grey areas around assumptions of public good. The paper calls for a critical discussion around the experimental nature of data modelling in emergency response due to mismanagement of information has been largely emphasized to protect the contours of human rights.&lt;/p&gt;
&lt;p&gt;This study offers an important perspective for us at the Centre for Internet and Society, and our works on Privacy, Big Data, and Big Data for Development, and very productively articulates the risks of adopting solutions to issues important for development without taking into consideration legal implications and the larger impact on human rights. We look forward to continue to critically engage with issues raised by Big Data in the context of human rights and sustainable development, and bring together diverse perspectives on these issues.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;- Elonnai Hickok, Policy Director, the Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;CIS Papers&lt;/h2&gt;
&lt;p&gt;The CIS Papers series publishes open access monographs and discussion pieces that critically contribute to the debates on digital technologies and society. It includes publication of new findings and observations, of work-in-progress, and of critical review of existing materials. These may be authored by researchers at or affiliated to CIS, by external researchers and practitioners, or by a group of discussants. CIS offers editorial support to the selected monographs and discussion pieces. The views expressed, however, are of the authors' alone.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/papers/ebola-a-big-data-disaster'&gt;https://cis-india.org/papers/ebola-a-big-data-disaster&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Disaster Response</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Humanitarian Response</dc:subject>
    
    
        <dc:subject>CIS Papers</dc:subject>
    

   <dc:date>2016-04-21T09:57:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt">
    <title>The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India (Excerpt)</title>
    <link>https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt</link>
    <description>
        &lt;b&gt;In a recently published paper, Jahnavi Phalkey and Sumandro Chattapadhyay explore public initiatives in technological solutions for educating the poor and the disadvantaged in independent India. Here is an edited excerpt from the paper that traces the recent history of technological solutions for mass education and unpacking the narrative of ‘failure’ that is associated with the Aakash experiment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://github.com/cis-india/website/raw/master/img/2016.02.14_s-campion-aakash.jpg" alt="Students using &amp;lt;p&amp;gt;Aakash tablet, Anupshahr, Uttar Pradesh. Photograph by Sonali Campion." /&gt;&lt;/p&gt;
&lt;h6&gt;Students at Pardada Pardadi Education Society in Anupshahr, Uttar Pradesh, use the Aakash tablet in class as part of a pilot project introducing the low-cost computer into rural schools. Photograph by Sonali Campion, April 09, 2013: &lt;a href="https://www.flickr.com/photos/sonalicampion/9449250639/"&gt;https://www.flickr.com/photos/sonalicampion/9449250639/&lt;/a&gt;.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
In 2010, the Ministry of Human Resource Development (MHRD) of the Government of India launched a set of prototype devices of an affordable tablet computer, the development and production of which were to be supported by the Ministry as part of its larger ICTs for education project. This device later came to be known as the “Aakash” tablet, and the project went through several iterations, between 2010 and 2014, of not only technological re-designs, but also institutional arrangements to design, develop, manufacture, test, and procure the devices.
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Technological Solutions for Mass Education&lt;/h2&gt;
&lt;p&gt;Our exploration of technological solutions for mass education in India has taken us through a not-so-linear history of projects that have informed the imagination and making of the Aakash project. This include the Satellite Instructional Television Experiment, or SITE (1975); University Grants Commission-led Countrywide Classroom project (1984 -); the Simputer, the first hand-held device developed in India (1998); the Hole in the Wall project developed and led by Sugata Mitra (1999); the Government of India-led EDUSAT (2004); National Programme on Technology Enhanced Learning (2003); and finally, a national online education portal named Sakshat (2006). The Satellite Instructional Television Experiment itself terminated rather quickly, but it led to several versions of television based instruction programmes, most notably  aimed at higher secondary and university students. Instruction in the broadcast-format continues to date, even after the arrival of the internet and the fact it has become the preferred medium for the Indian state. The television has not been replaced, but certainly shadowed by a variety of internet access and computing devices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Aakash, a “Low Cost Access-Cum-Computing Device”&lt;/h2&gt;
&lt;p&gt;An early official description of the then-nameless tablet as a “low cost access-cum-computing device” is noteworthy &lt;strong&gt;[1]&lt;/strong&gt;. It is difficult to imagine a contemporary computing device that does not also function as an access device (say, to the internet). Where does the need for calling it an “access-cum-computing” device come from? It comes, perhaps, from the hierarchy of priority – the device is primarily an access device, and secondarily can perform the function of a general-purpose computer. An archaeological reading of the assumptions of learning processes embodied in this device reveals an earlier layer of thinking – that of broadcasting educational programmes to television sets via satellite connection. Labelling it as “access-cum-computing” frames the object as being shaped by the residue of the Indian state’s education technological experiences of the past, including that of the SITE initiative.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;“[The] Aakash tablet was my dream but it was not fulfilled”&lt;/h2&gt;
&lt;p&gt;Throughout the short history of the Aakash device, the verdict of “failed innovation” figures prominently – from the early failure of "Sakshat" &lt;strong&gt;[2]&lt;/strong&gt;, to allegations of the Chinese origin of the Aakash device &lt;strong&gt;[3]&lt;/strong&gt;, to manufacturing troubles and under-production of the device &lt;strong&gt;[4]&lt;/strong&gt;, to criticisms of the tablet’s built quality and computing capacity &lt;strong&gt;[5]&lt;/strong&gt;, to mistrust and failed collaborations between parties involved in its production &lt;strong&gt;[6]&lt;/strong&gt;, and intra-governmental criticisms of the implementation process &lt;strong&gt;[7]&lt;/strong&gt;. Moreover, there remained a continuous tension within the government itself regarding the necessity of the project, especially fuelled by (and fuelling) the image of the project as being driven by the dreams of a specific minister &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To simply describe the Aakash project’s failure as one due to the unbearable heaviness of functions ranging from the technical to the symbolic and political is to fall short of a full explanation. Alongside that narrative of failure, it is critical to foreground the quiet success of the project in establishing the tablet computer as a near-essential and familiarised everyday object for access to educational material. There is an alarming accuracy in the MHRD claim that the Aakash project established a sub $100 tablet market in India – it did, even if it was not for the device they wanted to promote &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Device is the Desire&lt;/h2&gt;
&lt;p&gt;We observe that the Aakash project, as well as the ones preceding it, have been driven primarily by a desire to scale up the provision of education. The initiatives towards building delivery infrastructures for such mass-scale provision of education has almost always been accompanied by a larger desire for developing capabilities in space exploration, communication, and computing – the key technologies of twentieth century geopolitics. Our study of the manufacturing of the Aakash tablet, and its surrounding discourses, foreground the technological imagination of the state after liberalisation in India (1991), and its unique arrangements and efforts to create domestic capability of technological innovation in a context of globalised production and communication networks. We see our role as one of recovering the work of technology in the history of education as understood through the interactions between the state, academia, and industry.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Archival Research in (Increasingly) Digital India&lt;/h2&gt;
&lt;p&gt;Documenting the project has been an interesting historical exercise. We have been attentive to documents disappearing from their online locations. One remarkable possibility for archival research opened up by the internet is the (limited, and often uncertain) ability to access materials that are not presently available on a website, but were part of it in the past. This possibility allowed us to access a few crucial government documents that are not directly available on the official websites any more. We have also been attentive to the reiterations and revisions that do not merely overtake or shadow earlier documents. They sometimes erase earlier documents altogether as digital revisions. We do not have access to personal correspondence or internal institutional correspondence relating to the project. We are, however, skeptical of that happening as no protocols for the archiving of digital correspondence is yet in place with the Government of India. Doing recent history of India is becoming an ever more difficult exercise that historians must urgently attend to, if we are to make the present ready to have its own past in the future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Ministry of Human Resource Development, Government of India. “The History of Aakash Low Cost Access cum Computing Device.” Sakshat. October 05, 2011. &lt;a href="http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf"&gt;http://archive.sakshat.ac.in/pdf/Final_Note_Aakash.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; Mukherjee, Arindam. “Bonsai Netbooks.” Outlook. February 16, 2009. &lt;a href="http://www.outlookindia.com/article/Bonsai-Netbooks/239719"&gt;http://www.outlookindia.com/article/Bonsai-Netbooks/239719&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Raina, Pamposh, and Mia Li. “India’s ‘Aakash,’ Now Made in China.” The New York Times. November 26, 2012. &lt;a href="http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/"&gt;http://india.blogs.nytimes.com/2012/11/26/india%E2%80%99s-super-cheap-tablet-now-made-in-china/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Nanda, Prashant K., and Surabhi Agarwal. “Government Close to Giving Up on Aakash Project.” Mint. March 22, 2013. &lt;a href="http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html"&gt;http://www.livemint.com/Politics/fmEi8gsOSFgOzSTFfLsw6J/Govt-almost-gives-up-on-Aakash-says-no-point-in-hardware-ob.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Chopra, Ritika. “Kapil Sibal's Cheap Aakash Proves to be a Dud.” Mail Today. January 08, 2012. &lt;a href="http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html"&gt;http://indiatoday.intoday.in/story/kapil-sibal-cheapest-tablet-of-world-aakash-failure/1/167730.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Julka, Harsimran. “14 Lakh Aakash Tablets Booked in 14 Days.” The Economic Times. January 03, 2012. &lt;a href="http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms"&gt;http://economictimes.indiatimes.com/tech/hardware/14-lakh-aakash-tablets-booked-in-14-days/articleshow/11345695.cms&lt;/a&gt;. Parthasarathi, Ashok. “Cloudy Outlook for Aakash.” The Hindu. May 21, 2012 (Updated: May 22, 2012). &lt;a href="http://www.thehindu.com/opinion/op-ed/article3439629.ece
"&gt;http://www.thehindu.com/opinion/op-ed/article3439629.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Comptroller and Auditor General of India, Government of India. Report No. 19 of 2013 - Union Government (Civil) - Report of the Comptroller and Auditor General of India on Compliance Audit Observations. Government of India. 2013. &lt;a href="http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil"&gt;http://www.cag.gov.in/content/report-no-19-2013-compliance-audit-observations-union-governmentcivil&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; At an event in late 2013, Kapil Sibal admitted, “[the] Aakash tablet was my dream but it was not fulfilled, I tried hard...” Quoted in Press Trust of India. “Kapil Sibal: Aakash Tablet is My Unfulfilled Dream.” Financial Express. December 24, 2013. &lt;a href="http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 "&gt;http://www.financialexpress.com/news/kapil-sibal-aakash-tablet-is-my-unfulfilled-dream/1211284/0 &lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See &lt;strong&gt;[1]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This is an edited excerpt from a paper titled ‘The Aakash Tablet and Technological Imaginaries of Mass Education in Contemporary India’ recently published in History and Technology, on 5 February, 2016. The paper can be accessed here: &lt;a href="http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142" target="_blank"&gt;http://www.tandfonline.com/doi/full/10.1080/07341512.2015.1136142&lt;/a&gt; (the first 50 downloads are free).&lt;/p&gt;
&lt;p&gt;Cross-posted from &lt;a href="http://blogs.lse.ac.uk/southasia/2016/02/12/the-aakash-tablet-and-technological-imaginaries-of-mass-education-in-contemporary-india/" target="_blank"&gt;South Asia @ LSE Blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt'&gt;https://cis-india.org/raw/aakash-tablet-and-technological-imaginaries-of-education-in-india-excerpt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Education Technology</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2016-02-14T10:11:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16">
    <title>Internet Researchers' Conference 2016 (IRC16)</title>
    <link>https://cis-india.org/raw/irc16</link>
    <description>
        &lt;b&gt;The first Internet Researchers' Conference (IRC16) will be organised at the Jawaharlal Nehru University (JNU), Delhi, on February 26-28, 2016. The focus of the Conference is on the experiences, adventures, and methods of 'studying internet in India.' We are deeply grateful to the Centre for Political Studies (CPS), JNU, for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for the generous support.  It is a free and open conference. Please use the form to register.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;It is our great pleasure to announce the beginning of the Internet Researchers' Conference (IRC), an annual conference series initiated by the Researchers at Work (RAW) programme at CIS to gather researchers, academic or otherwise, studying internet in/from India to congregate, share insights and tensions, and chart the ways forward.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This conference series is specifically driven by the following interests: 1) creating discussion spaces for researchers studying internet in India and in other comparable regions, 2) foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India, 3) accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India, and 4) exploring and practicing new modes of research and documentation necessitated by new (digital) forms of objects of power/knowledge.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The first edition of the Conference, IRC16, is engaging with the theme of 'studying internet in India.' The word &lt;em&gt;study&lt;/em&gt; here is a shorthand for a range of tasks, from documentation and theory-building, to measurement and representation.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the Convention Centre of the &lt;a href="http://jnu.ac.in/"&gt;Jawaharlal Nehru University (JNU)&lt;/a&gt;, Delhi. We are grateful to &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;Centre for Political Studies (CPS)&lt;/a&gt; at JNU for hosting the Conference, and to the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt; for its generous support.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="https://www.google.com/maps/embed?pb=!1m14!1m12!1m3!1d1752.512135244194!2d77.16642650602853!3d28.53899019877363!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!5e0!3m2!1sen!2s!4v1455124383423" frameborder="0" height="300" width="600"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Registration and Programme&lt;/h2&gt;
&lt;p&gt;Conference programme: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.2.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;Programme booklet: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-Booklet.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Important]&lt;/strong&gt; Invitation letter to help you enter JNU campus: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Invitation-Letter.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;Please register for the Conference here: &lt;a href="http://goo.gl/forms/uu0HjXWbxK" target="_blank"&gt;Form&lt;/a&gt; (Google).&lt;/p&gt;
&lt;p&gt;We apologise for not being able to provide travel or accommodation support.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Etherpads&lt;/h2&gt;
&lt;p&gt;#Methods&amp;amp;ToolsForInternetResearch : &lt;a class="external-link" href="https://public.etherpad-mozilla.org/p/IRC16-InternetResearch"&gt;https://public.etherpad-mozilla.org/p/IRC16-InternetResearch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;#DigitalDesires: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-DigitalDesires"&gt;https://public.etherpad-mozilla.org/p/IRC16-DigitalDesires&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#InternetMovements: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-InternetMovements"&gt;https://public.etherpad-mozilla.org/p/IRC16-InternetMovements&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#WebOfGenealogies: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-WebOfGenealogies"&gt;https://public.etherpad-mozilla.org/p/IRC16-WebOfGenealogies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#MinimalComputing: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-MinimalComputing"&gt;https://public.etherpad-mozilla.org/p/IRC16-MinimalComputing&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#STSDebates: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-STSDebates"&gt;https://public.etherpad-mozilla.org/p/IRC16-STSDebates&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#ArchiveAnarchy: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-ArchiveAnarchy"&gt;https://public.etherpad-mozilla.org/p/IRC16-ArchiveAnarchy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#ManyPublicsOfInternet: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-ManyPublicsOfInternet"&gt;https://public.etherpad-mozilla.org/p/IRC16-ManyPublicsOfInternet&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#DigitalLiteraciesAtTheMargins: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-DigitalLiteraciesAtTheMargins"&gt;https://public.etherpad-mozilla.org/p/IRC16-DigitalLiteraciesAtTheMargins&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#FutureBazaars: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-FutureBazaars"&gt;https://public.etherpad-mozilla.org/p/IRC16-FutureBazaars&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#PoliticsOnSocialMedia: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-PoliticsOnSocialMedia"&gt;https://public.etherpad-mozilla.org/p/IRC16-PoliticsOnSocialMedia&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#SpottingData: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-SpottingData"&gt;https://public.etherpad-mozilla.org/p/IRC16-SpottingData&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#WikiShadows: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-WikiShadows"&gt;https://public.etherpad-mozilla.org/p/IRC16-WikiShadows&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#FollowTheMedium: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-FollowTheMedium"&gt;https://public.etherpad-mozilla.org/p/IRC16-FollowTheMedium&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#AFCinema2.0: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-AFCinema2.0"&gt;https://public.etherpad-mozilla.org/p/IRC16-AFCinema2.0&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#LiterarySpaces: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-LiterarySpaces"&gt;https://public.etherpad-mozilla.org/p/IRC16-LiterarySpaces&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Resources&lt;/h2&gt;
&lt;p&gt;Call for sessions: &lt;a href="http://cis-india.org/raw/irc16-call" target="_blank"&gt;http://cis-india.org/raw/irc16-call&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Proposed sessions: &lt;a href="http://cis-india.org/raw/irc16-proposed-sessions" target="_blank"&gt;http://cis-india.org/raw/irc16-proposed-sessions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Selected sessions: &lt;a href="http://cis-india.org/raw/irc16-selected-sessions" target="_blank"&gt;http://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Please join the &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;researchers@cis-india&lt;/a&gt; mailing list to take part in pre- and post-conference conversations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16'&gt;https://cis-india.org/raw/irc16&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>CDIF</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-02-27T06:19:33Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns">
    <title>Open Data Hackathons are Great, but Address Privacy and License Concerns</title>
    <link>https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns</link>
    <description>
        &lt;b&gt;This is to cross-publish a blog post from DataMeet website regarding a letter shared with the organisers of Urban Hack 2015, Bangalore, in response to a set of privacy and license concerns identified and voiced during the hackathon by DataMeet members. Sumandro Chattapadhyay co-authored and co-signed the letter. The blog post is written by Nisha Thompson.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Hackathons are a source of confusion and frustration for us. DataMeet actively does not do them unless there is a very specific outcome the community wants like&lt;a href="https://github.com/datameet/maps/tree/master/parliamentary-constituencies"&gt; freeing a whole dataset &lt;/a&gt;or introducing &lt;a href="http://datameet.org/2015/05/13/mumbai-meet-6-data-science-hackathon/"&gt;open data to a new audience&lt;/a&gt;. We feel that they cause burn out, are not productive, and in general don't help create a healthy community of civic tech and open data enthusiasts.&lt;/p&gt;
&lt;p&gt;That is not to say we feel others shouldn't do them, they are very good opportunities to spark discussion and introduce new audiences to problems in the social sector. &lt;a href="http://www.datakind.org/chapters/datakind-blr"&gt;DataKind&lt;/a&gt; and &lt;a href="https://rhokbangalore.wordpress.com/"&gt;RHOK&lt;/a&gt; and numerous others host hackathons or variations of them regularly to stir the pot, bring new people into civic tech and they can be successful starts to long term connections and experiments. A lot of people in the DataMeet community participate and enjoy hackathons.&lt;/p&gt;
&lt;p&gt;However, with great data access comes great responsibility. We always want to make sure that even if no output is achieved when a dataset is opened at least no harm should be done.&lt;/p&gt;
&lt;p&gt;Last October an open data hackathon,&lt;a href="https://www.hackerearth.com/sprints/urban-hack/"&gt; Urban Hack&lt;/a&gt;, run by Hacker Earth, &lt;a href="http://www.nasscom.in/"&gt;NASSCOM&lt;/a&gt;, &lt;a href="http://www.xrci.xerox.com/"&gt;XEROX&lt;/a&gt;, &lt;a href="https://console.ng.bluemix.net/?cm_mmc=EcoDISA-_-Bluemix_day-_-11-15-14::12-31-15-_-UrbanHack"&gt;IBM &lt;/a&gt;and &lt;a href="http://wri-india.org/"&gt;World Resource Institute India&lt;/a&gt; wanted to bring out open data and spark innovation in the transport and crime space by making datasets from &lt;a href="http://mybmtc.com/"&gt;Bangalore Metropolitan Transport Corporation (BMTC)&lt;/a&gt; and the Bangalore City Police available to work with. A DataMeet member (&lt;a href="http://www.lostprogrammer.com/"&gt;Srinivas Kodali&lt;/a&gt;) was participating, he is a huge transport data enthusiast and wanted to take a look at what is being made available.&lt;/p&gt;
&lt;p&gt;In the morning shortly after it started I received a call from him that there is a dataset that was made available that seems to be violating privacy and data security. We contacted the organizers and they took it down, later we realized it was quite a sensitive dataset and a few hundred people had already downloaded it. We were also distressed that they had not clarified ownership of data, license of data, and had linked to sources like &lt;a href="http://openbangalore.org/"&gt;Open Bangalore&lt;/a&gt;  without specifying licensing, which violated the license.&lt;/p&gt;
&lt;p&gt;The organizers were quite noted and had been involved with hackathons before so it was a little distressing to see these mistakes being made. We were concerned that the government partners (who had not participated in these types of events before) were also being exposed to poor practices. As smart cities initiatives take over the Indian urban space, we began to realize that this is a mistake that shouldn't happen again.&lt;/p&gt;
&lt;p&gt;Along with &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; and Random Hacks of Kindness we sent the organizers, Bangalore City Police and BMTC a letter about the breach in protocol. We wanted to make sure everyone was aware of the issues and that measures were taken to not repeat these mistakes.&lt;/p&gt;
&lt;p&gt;You can see the letter here:&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.documentcloud.org/documents/2702333-Appropriate-and-Responsible-Practices-for.html" height="500" width="600"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;We are very proud of the DataMeet community and Srinivas for bringing this violation to the attention of the organizers. As people who participate in hackathons and other data events it is imperative that privacy and security are kept in mind at all times. In a space like India where a lot of these concepts are new to institutions, like the Government, it is essential that we are always using opportunities not only to showcase the power of open data but also good practices for protecting privacy and ensuring security.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally posted on DataMeet website: &lt;a href="http://datameet.org/2016/02/02/to-hack-or-not-to-hack/"&gt;http://datameet.org/2016/02/02/to-hack-or-not-to-hack/&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns'&gt;https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Hackathon</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-02-05T20:37:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes">
    <title>NASSCOM-DSCI Annual Information Security Summit 2015 - Notes</title>
    <link>https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes</link>
    <description>
        &lt;b&gt;NASSCOM-DSCI organised the 10th Annual Information Security Summit (AISS) 2015 in Delhi during December 16-17. Sumandro Chattapadhyay participated in this engaging Summit. He shares a collection of his notes and various tweets from the event.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Details about the Summit&lt;/h2&gt;
&lt;p&gt;Event page: &lt;a href="https://www.dsci.in/events/about/2261"&gt;https://www.dsci.in/events/about/2261&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Agenda: &lt;a href="https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf"&gt;https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes from the Summit&lt;/h2&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr.G.K.Pillai ,Chairman DSCI addressing the audience @ 10th Annual Information Security Summit '15 &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/JVcwct3HSF"&gt;pic.twitter.com/JVcwct3HSF&lt;/a&gt;&lt;/p&gt;
— DSCI (@DSCI_Connect) &lt;a href="https://twitter.com/DSCI_Connect/status/676979952277987328"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. G. K. Pillai, Chairman of Data Security Council of India (DSCI), set the tone of the Summit at the very first hour by noting that 1) state and private industries in India are working in silos when it comes to preventing cybercrimes, 2) there is a lot of skill among young technologists and entrepreneurs, and the state and the private sectors are often unaware of this, and 3) there is serious lack of (cyber-)capacity among law enforcement agencies.&lt;/p&gt;
&lt;p&gt;In his Inaugural Address, Dr. Arvind Gupta (Deputy National Security Advisor and Secretary, NSCS), provided a detailed overview of the emerging challenges and framework of cybersecurity in India. He focused on the following points:&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; Dy NSA Dr Arvind Gupta calls 4 &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; by &lt;a href="https://twitter.com/hashtag/design?src=hash"&gt;#design&lt;/a&gt; in &lt;a href="https://twitter.com/hashtag/ICT?src=hash"&gt;#ICT&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/79kq9lWGtk"&gt;pic.twitter.com/79kq9lWGtk&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/676980799347023872"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Security is a key problem in the present era of ICTs as it is not in-built. In the upcoming IoT era, security must be built into ICT systems.&lt;/li&gt;
&lt;li&gt;In the next billion addition to internet population, 50% will be from India. Hence cybersecurity is a big concern for India.&lt;/li&gt;
&lt;li&gt;ICTs will play a catalytic role in achieving SDGs. Growth of internet is part of the sustainable development agenda.&lt;/li&gt;
&lt;li&gt;We need a broad range of critical security services - big data analytics, identity management, etc.&lt;/li&gt;
&lt;li&gt;The e-governance initiatives launched by the Indian government are critically dependent on a safe and secure internet.&lt;/li&gt;
&lt;li&gt;Darkweb is a key facilitator of cybercrime. Globally there is a growing concern regarding the security of cyberspace.
&lt;/li&gt;&lt;li&gt;On the other hand, there exists deep divide in access to ICTs, and also in availability of content in local languages.&lt;/li&gt;
&lt;li&gt;The Indian government has initiated bilateral cybersecurity dialogues with various countries.&lt;/li&gt;
&lt;li&gt;Indian government is contemplating setting up of centres of excellence in cryptography. It has already partnered with NASSCOM to develop cybersecurity guidelines for smart cities.&lt;/li&gt;
&lt;li&gt;While India is a large global market for security technology, it also needs to be self-reliant. Indian private sector should make use of government policies and bilateral trust enjoyed by India with various developing countries in Africa and south America to develop security technology solutions, create meaningful jobs in India, and export services and software to other developing countries.&lt;/li&gt;
&lt;li&gt;Strong research and development, and manufacturing base are absolutely necessary for India to be self-reliant in cybersecurity. DSCI should work with private sector, academia, and government to coordinate and realise this agenda.&lt;/li&gt;
&lt;li&gt;In the line of the Climate Change Fund, we should create a cybersecurity fund, since it is a global problem.&lt;/li&gt;
&lt;li&gt;Silos are our bane in general. Bringing government agencies together is crucial. Trust issues (between government, private sector, and users) remain, and can only be resolved over time.&lt;/li&gt;
&lt;li&gt;The demand for cybersecurity solutions in India is so large, that there is space for everyone.&lt;/li&gt;
&lt;li&gt;The national cybersecurity centre is being set up.&lt;/li&gt;
&lt;li&gt;Thinktanks can play a crucial role in helping the government to develop strategies for global cybersecurity negotiations. Indian negotiators are often capacity constrained.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Rajendra Pawar, Chair of the NASSCOM Cyber Security Task Force,  NASSCOM Cybersecurity Initiative, provided glimpses of the emerging business opportunity around cybersecurity in India:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In next 10 years, the IT economy in India will be USD 350 bn, and &lt;a href="https://blogs.dsci.in/building-usd-35-billion-cyber-security-industry-how-do-we-do-it/"&gt;10% of that will be the cybersecurity pie&lt;/a&gt;. This means a million job only in the cybersecurity space.&lt;/li&gt;
&lt;li&gt;Academic institutes are key to creation of new ideas and hence entrepreneurs. Government and private sectors should work closely with academic institutes.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Companies+Govt+Academia= High growth of the cybersecurity industry' - Rajendra Pawar at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/676995090955530246"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Globally, cybersecurity innovation and industries happen in clusters. Cities and states must come forward to create such clusters.&lt;/li&gt;
&lt;li&gt;2/3rd of the cybersecurity market is provision of services. This is where India has a great advantage, and should build on that to become a global brand in cybersecurity services.&lt;/li&gt;
&lt;li&gt;Everyday digital security literacy and cultures need to be created.&lt;/li&gt;
&lt;li&gt;Publication of cybersecurity best practices among private companies is a necessity.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Corporate disclosures of breaches being considered with Nasscom under cybersec task force: Rajendra Pawar &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/ETtech"&gt;@ETtech&lt;/a&gt;&lt;/p&gt;
— Neha Alawadhi (@NehaAlawadhiET) &lt;a href="https://twitter.com/NehaAlawadhiET/status/676994553799417856"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Dedicated cybersecurity spending should be made part of the e-governance budget of central and state governments.&lt;/li&gt;
&lt;li&gt;DSCI should function as a clearing house of cybersecurity case studies. At present, thought leadership in cybersecurity comes from the criminals. By serving as a use case clearing house, DSCI will inform interested researchers about potential challenges for which solution needs to be created.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Manish Tiwary of Microsoft informed the audience that India is in the top 3 positions globally in terms of malware proliferation, and this ensures that India is a big focus for Microsoft in its global war against malware. Microsoft India looks forward to work closely with CERT-In and other government agencies.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;RSA's Kartik Shahani &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; Adopt a Deep &amp;amp; Pervasive Level of True Visibility Everywhere &lt;a href="https://t.co/2U8J8WkWsI"&gt;pic.twitter.com/2U8J8WkWsI&lt;/a&gt;&lt;/p&gt;
— Debjani Gupta (@DebjaniGupta1) &lt;a href="https://twitter.com/DebjaniGupta1/status/676999786722156544"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Data localization; one of the stumbling blocks that undermine investments in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/vrff3Amcv0"&gt;pic.twitter.com/vrff3Amcv0&lt;/a&gt;&lt;/p&gt;
— Appvigil (@appvigil_co) &lt;a href="https://twitter.com/appvigil_co/status/677043180731301888"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Trust verification 4 embedded devices isnt complex bt much desired as people lives r dependent on that-cld cause physical damage &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677057992831860736"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;"Most compromised OS in 2k15: iOS"-Riyaz Tambe, Palo Alto Networks &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677015382356533249"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Security by default in IOS architecture  tho' can't verify code as noṭ open - is it security by obscurity? &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/kbPZgH8oA0"&gt;pic.twitter.com/kbPZgH8oA0&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677055086611173376"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Catching Fraudsters&lt;/strong&gt; had two insightful presentations from Dr. Triveni Singh, Additional SP of Special Task Force of UP Police, and Mr. Manoj Kaushik, IAS, Additional Director of FIU.&lt;/p&gt;
&lt;p&gt;Dr. Singh noted that a key challenge faced by police today is that nobody comes to them with a case of online fraud. Most fraud businesses are run by young groups operating BPOs that steal details from individuals. There exists a huge black market of financial and personal data - often collected from financial institutions and job search sites. Almost any personal data can be bought in such markets. Further, SIM cards under fake names are very easy to buy. The fraudsters are effective using all fake identity, and is using operational infrastructures outsourced from legitimate vendors under fake names. Without a central database of all bank customers, it is very difficult for the police to track people across the financial sector. It becomes even more difficult for Indian police to get access to personal data of potential fraudsters when it is stored in a foreign server. which is often the case with usual web services and apps. Many Indian ISPs do not keep IP history data systematically, or do not have the technical expertise to share it in a structured and time-sensitive way.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr. Triveni Singh talks about raiding fake call centres in Delhi NCR that scam millions every year &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/EmE4y3jux2"&gt;pic.twitter.com/EmE4y3jux2&lt;/a&gt;&lt;/p&gt;
— pradyumn nand (@PradyumnNand) &lt;a href="https://twitter.com/PradyumnNand/status/677063276442738689"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. Kaushik explained that no financial fraud is uniquely committed via internet. Many fraud begin with internet but eventually involve physical fraudulent money transaction. Credit/debit card frauds all involve card data theft via various internet-based and physical methods. However, cybercrime is continued to be mistakenly seen as frauds undertaken completely online. Further, mobile-based frauds are yet another category. Almost all apps we use are compromised, or store transaction history in an insecure way, which reveals such data to hackers. FIU is targeting bank accounts to which fraud money is going, and closing them down. Catching the people behind these bank accounts is much more difficult, as account loaning has become a common practice - where valid accounts are loaned out for a small amount of money to fraudsters who return the account after taking out the fraudulent money. Better information sharing between private sector and government will make catching fraudsters easier.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/AkhileshTuteja"&gt;@AkhileshTuteja&lt;/a&gt;  With data overload and big data being prevalent are we considering privacy elements &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/KpmgIndiaCyber?src=hash"&gt;#KpmgIndiaCyber&lt;/a&gt;&lt;/p&gt;
— Atul Gupta (@AtulGup15843145) &lt;a href="https://twitter.com/AtulGup15843145/status/677082045701488640"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Tech solns today designed to protect security - solns for privacy need to evolve'- &lt;a href="https://twitter.com/Mayurakshi_Ray"&gt;@Mayurakshi_Ray&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066470325534721"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In-house tools important but community collaboration critical to fight security threats &lt;a href="https://twitter.com/tata_comm"&gt;@tata_comm&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/ZjbCnaROXC"&gt;pic.twitter.com/ZjbCnaROXC&lt;/a&gt;&lt;/p&gt;
— aparna  (@aparnag14) &lt;a href="https://twitter.com/aparnag14/status/677067260268187648"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Orgns in India have a long way to go b4 they internalise privacy principles' Subhash S, CISO ICICI &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066928880410624"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Prof PK giving an interesting brief on Academia role in Cyber Security. &lt;a href="https://twitter.com/ponguru"&gt;@ponguru&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/MEiO6sCJwu"&gt;pic.twitter.com/MEiO6sCJwu&lt;/a&gt;&lt;/p&gt;
— Vikas Yadav (@VikasSYadav) &lt;a href="https://twitter.com/VikasSYadav/status/677088566871101440"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Potential for interaction between Academia, Government and Industry but not an established reality yet. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/MappingCyberEducation?src=hash"&gt;#MappingCyberEducation&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677089590717517824"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;I have figured out why information security is not in any boardroom discussions. Cause there are no good speakers / orators . &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Virag Thakkar (@viragthakkar) &lt;a href="https://twitter.com/viragthakkar/status/677078491699871745"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Smart Cities&lt;/strong&gt; focused on discussing the actual cities coming up India, and the security challenges highlighted by them. There was a presentation on Mahindra World City being built near Jaipur. Presenters talked about the need to stabilise, standardise, and securitise the unique identities of machines and sensors in a smart city context, so as to enable secured machine-to-machine communication. Since 'smartness' comes from connecting various applications and data silos together, the governance of proprietary technology and ensuring inter-operable data standards are crucial in the smart city.&lt;/p&gt;
&lt;p&gt;As Special Purposed Vehicles are being planned to realise the smart cities, the presenters warned that finding the right CEOs for these entities will be critical for their success. Legacy processes and infrastructures (and labour unions) are a big challenge when realising smart cities. Hence, the first step towards the smart cities must be taken through connected enforcement of law, order, and social norms.&lt;/p&gt;
&lt;p&gt;Privacy-by-design and security-by-design are necessary criteria for smart cities technologies. Along with that regular and automatic software/middleware updating of distributed systems and devices should be ensured, as well as the physical security of the actual devices and cables.&lt;/p&gt;
&lt;p&gt;In terms of standards, security service compliance standards and those for protocols need to be established for the internet-of-things sector in India. On the other hand, there is significant interest of international vendors to serve the Indian market. All global data and cloud storage players, including Microsoft Azure cloud, are moving into India, and are working on substantial and complete data localisation efforts.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Session - Why should you hire Women Security Professionals?... Balancing gender diversity 
&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/DSCI_Connect?src=hash"&gt;#DSCI_Connect&lt;/a&gt; &lt;a href="https://t.co/uIMfG9PvAb"&gt;pic.twitter.com/uIMfG9PvAb&lt;/a&gt;&lt;/p&gt;
— Jagan Suri (@jsuri90) &lt;a href="https://twitter.com/jsuri90/status/677109792679157760"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;gender Diversity in cybersecurity critical 4 India's future. &lt;a href="https://twitter.com/symantec"&gt;@symantec&lt;/a&gt; partnered with &lt;a href="https://twitter.com/nasscom"&gt;@nasscom&lt;/a&gt; via 1000 women scholarships &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677118674197602304"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Dialogue with CERT-In 
.. Starting 2nd Day of &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;
.. B J Srinath, DG, CERT 
&lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/security?src=hash"&gt;#security&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/privacy?src=hash"&gt;#privacy&lt;/a&gt; &lt;a href="https://t.co/cvDcrgkein"&gt;pic.twitter.com/cvDcrgkein&lt;/a&gt;&lt;/p&gt;
— Vinayak Godse (@godvinayak) &lt;a href="https://twitter.com/godvinayak/status/677342972170493952"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;New &lt;a href="https://twitter.com/hashtag/problems?src=hash"&gt;#problems&lt;/a&gt; can't b solved w old &lt;a href="https://twitter.com/hashtag/solutions?src=hash"&gt;#solutions&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG BJ Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341246281539585"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;17 entities within &lt;a href="https://twitter.com/hashtag/Indian?src=hash"&gt;#Indian&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/government?src=hash"&gt;#government&lt;/a&gt; engaged in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT head &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341728282533888"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Scope of activities by CERT in &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; way more than its counterparts elsewhere &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677342193854451712"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT looks 8 prediction &amp;amp; &lt;a href="https://twitter.com/hashtag/prevention?src=hash"&gt;#prevention&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/emergency?src=hash"&gt;#emergency&lt;/a&gt; not just &lt;a href="https://twitter.com/hashtag/response?src=hash"&gt;#response&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343140630540288"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT willing to &lt;a href="https://twitter.com/hashtag/share?src=hash"&gt;#share&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/information?src=hash"&gt;#information&lt;/a&gt; rather than just receiving &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343512833101824"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Savita CERTin outlines drill initiatives taken 4 preparedness-detect (protect), defend attacks wth response &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/wXrkgoLzr2"&gt;pic.twitter.com/wXrkgoLzr2&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677346822449303553"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;CERTin also offers incident predicatibility,Crisis mgmt plans, &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; assurance ladder (7 levels) besides 24 x 7 prevention &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677348506869239809"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; has 7.2 million bot infected &lt;a href="https://twitter.com/hashtag/machines?src=hash"&gt;#machines&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677355051308871680"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Seizure &amp;amp; protection of electronic devices as admissible evidence (certificate u Sec 65B) imperative under Forensics investigation &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677364713005576192"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Law enforcement agency&amp;amp;corporate world must collaborate to fight cybercrime'-Atul Gupta,Partner-Risk Adv. @ &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/GwAQWhYMmK"&gt;pic.twitter.com/GwAQWhYMmK&lt;/a&gt;&lt;/p&gt;
— KPMG India (@KPMGIndia) &lt;a href="https://twitter.com/KPMGIndia/status/677373217711919104"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. R. Chandrasekhar, President of NASSCOM, foregrounded the recommendations made by the Cybersecurity Special Task Force of NASSCOM, in his Special Address on the second day. He noted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a great opportunity to brand India as a global security R&amp;amp;D and services hub. Other countries are also quite interested in India becoming such a hub.&lt;/li&gt;
&lt;li&gt;The government should set up a cybersecurity startup and innovation fund, in coordination with and working in parallel with the centres of excellence in internet-of-things (being led by DeitY) and the data science/analytics initiative (being led by DST).&lt;/li&gt;
&lt;li&gt;There is an immediate need to create a capable workforce for the cybersecurity industry.&lt;/li&gt;
&lt;li&gt;Cybersecurity affects everyone but there is almost no public disclosure. This leads to low public awareness and valuation of costs of cybersecurity failures. The government should instruct the Ministry of Corporate Affairs to get corporates to disclose (publicly or directly to the Ministry) security breeches.&lt;/li&gt;
&lt;li&gt;With digital India and everyone going online, cyberspace will increasingly be prone to attacks of various kinds, and increasing scale of potential loss. Cybersecurity, hence, must be part of the core national development agenda.&lt;/li&gt;
&lt;li&gt;The cybersecurity market in India is big enough and under-served enough for everyone to come and contribute to it.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Keynote Address by Mr. Rajiv Singh, MD – South Asia of Entrust Datacard, and Mr. Saurabh Airi, Technical Sales Consultant of Entrust Datacard, focused on trustworthiness and security of online identities for financial transactions. They argued that all kinds of transactions require a common form factor, which can be a card or a mobile phone. The key challenge is to make the form factor unique, verified, and secure. While no programme is completely secure, it is necessary to build security into the form factor - security of both the physical and digital kind, from the substrates of the card to the encryption algorithms. Entrust and Datacard have merged in recent past to align their identity management and security transaction workflows, from physical cards to software systems for transactions. The advantages of this joint expertise have allowed them to successfully develop the National Population Register cards of India. Now, with the mobile phone emerging as a key financial transaction form factor, the challenge across the cybersecurity industry is to offer the same level of physical, digital, and network security for the mobile phone, as are provided for ATM cards and cash machines.&lt;/p&gt;
&lt;p&gt;The following Keynote Address by Dr. Jared Ragland, Director - Policy of BSA, focused on the cybersecurity investment landscape in India and the neighbouring region. BSA, he explained, is a global trade body of software companies. All major global software companies are members of BSA. Recently, BSA has produced a study on the cybersecurity industry across 10 markets in the Asia Pacific region, titled &lt;a href="http://cybersecurity.bsa.org/2015/apac/"&gt;Asia Pacific Cybersecurity Dashboard&lt;/a&gt;. The study provides an overview of cybersecurity policy developments in these countries, and sector-specific opportunities in the region. Dr. Ragland mentioned the following as the key building blocks of cybersecurity policy: legal foundation, establishment of operational entities, building trust and partnerships (PPP), addressing sector-specific requirements, and education and awareness. As for India, he argued that while steady steps have been taken in the cybersecurity policy space by the government, a lot remains to be done. Operationalisation of the policy is especially lacking. PPPs are happening but there is a general lack of persistent formal engagement with the private sector, especially with global software companies. There is almost no sector-specific strategy. Further, the requirement for India-specific testing of technologies, according to domestic and not global standards, is leading to entry barrier for global companies and export barrier for Indian companies. Having said that, Dr. Ragland pointed out that India's cybersecurity experience is quite representative of that of the Asia Pacific region. He noted the following as major stumbling blocks from an international industry perspective: unnecessary and unreasonable testing requirements, setting of domestic standards, and data localisations rules.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;The Policy Makers' panel in &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; in progress. Arvind Gupta, Head, BJP IT cell (&lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt;) speaks. &lt;a href="https://t.co/9yWR0gMwf5"&gt;pic.twitter.com/9yWR0gMwf5&lt;/a&gt;&lt;/p&gt;
— Nandkumar Saravadé (@saravade) &lt;a href="https://twitter.com/saravade/status/677437443356798977"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;One of the final sessions of the Summit was the Public Policy Dialogue between &lt;a href="https://twitter.com/rajeevgowda"&gt;Prof. M.V. Rajeev Gowda&lt;/a&gt;, Member of Parliament, Rajya Sabha, and &lt;a href="https://twitter.com/buzzindelhi"&gt;Mr. Arvind Gupta&lt;/a&gt;, Head of IT Cell, BJP.&lt;/p&gt;
&lt;p&gt;Prof. Gowda focused on the following concerns:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We often freely give up our information and rights over to owners of websites and applications on the web. We need to ask questions regarding the ownership, storage, and usage of such data.&lt;/li&gt;
&lt;li&gt;While Section 66A of Information Technology Act started as a anti-spam rule, it has actually been used to harass people, instead of protecting them from online harassment.&lt;/li&gt;
&lt;li&gt;The bill on DNA profiling has raised crucial privacy concerns related to this most personal data. The complexity around the issue is created by the possibility of data leakage and usage for various commercial interests.&lt;/li&gt;
&lt;li&gt;We need to ask if western notions of privacy will work in the Indian context.&lt;/li&gt;
&lt;li&gt;We need to move towards a cashless economy, which will not only formalise the existing informal economy but also speed up transactions nationally. We need to keep in mind that this will put a substantial demand burden on the communication infrastructure, as all transactions will happen through these.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt; Mr. Gupta shared his keen insights about the key public policy issues in &lt;em&gt;digital India&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The journey to establish &lt;em&gt;the digital&lt;/em&gt; as a key political agenda and strategy within BJP took him more than 6 years. He has been an entrepreneur, and will always remain one. His approached his political journey as an entrepreneur.
&lt;/li&gt;&lt;li&gt;While we are producing numerous digitally literate citizens, the companies offering services on the internet often unknowingly acquire data about these citizens, store them, and sometimes even expose them. India perhaps produces the greatest volume of digital exhaust globally.&lt;/li&gt;
&lt;li&gt;BJP inherited the Aadhaar national identity management platform from UPA, and has decided to integrate it deeply into its digital India architecture.&lt;/li&gt;
&lt;li&gt;Financial and administrative transactions, especially ones undertake by and with governments, are all becoming digital and mostly Aadhaar-linked. We are not sure where all such data is going, and who all has access to such data.&lt;/li&gt;
&lt;li&gt;Right now there is an ongoing debate about using biometric system for identification. The debate on privacy is much needed, and a privacy policy is essential to strengthen Aadhaar. We must remember that the benefits of Aadhaar clearly outweigh the risks. Greatest privacy threats today come from many other places, including simple mobile torch apps.&lt;/li&gt;
&lt;li&gt;India is rethinking its cybersecurity capacities in a serious manner. After Paris attack it has become obvious that the state should be allowed to look into electronic communication under reasonable guidelines. The challenge is identifying the fine balance between consumers' interest on one hand, and national interest and security concerns on the other. Unfortunately, the concerns of a few is often getting amplified in popular media.&lt;/li&gt;
&lt;li&gt;MyGov platform should be used much more effectively for public policy debates. Social media networks, like Twitter, are not the correct platforms for such debates.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;: &lt;a href="https://twitter.com/rajivgowda"&gt;@rajivgowda&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt; are talking abt proactive disclosure as a key part of &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; strategy &lt;a href="https://twitter.com/hashtag/openData?src=hash"&gt;#openData&lt;/a&gt; &lt;a href="https://twitter.com/DataPortalIndia"&gt;@DataPortalIndia&lt;/a&gt;&lt;/p&gt;
— sumandro (@ajantriks) &lt;a href="https://twitter.com/ajantriks/status/677447609502445568"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes'&gt;https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>NASSCOM</dc:subject>
    
    
        <dc:subject>DSCI</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2016-01-19T07:58:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-selected-sessions">
    <title>Internet Researchers' Conference 2016 (IRC16) - Selected Sessions</title>
    <link>https://cis-india.org/raw/irc16-selected-sessions</link>
    <description>
        &lt;b&gt;We are proud to announce that the first Internet Researchers' Conference (IRC16), organised around the theme of 'studying internet in India,' will be held on February 26-28, 2016, at the Jawaharlal Nehru University (JNU), Delhi. We are deeply grateful to the Centre for Political Studies (CPS) at JNU for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for generously supporting it. Here are the details about the session selection process, the selected sessions, the Conference programme (draft), the pre-Conference discussions, accommodation, and travel grants. The Conference will include a book sprint to produce an open handbook on 'methods and tools for internet research.'&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session Selection Process&lt;/h2&gt;
&lt;p&gt;We received 23 superb session proposals for the IRC16. All the teams that submitted sessions were invited to vote for their eight favourite session in a double-blind manner - the teams did not know the names of the people who proposed other sessions, and we at CIS did not know which team has voted for which particular set of sessions. After receiving all the votes, we could not help but change the format of the Conference (as planned earlier) to accommodate 15 sessions in total. All Discussion and Workshop sessions of the Conference are double track, except for the three Discussion sessions that received most number of votes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Selected Sessions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitaldesires"&gt;&lt;strong&gt;#DigitalDesires&lt;/strong&gt;&lt;/a&gt;: Received 8.15% votes. Proposed by Silpa Mukherjee, Ankita Deb, and Rahul Kumar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-followthemedium"&gt;&lt;strong&gt;#FollowTheMedium&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Zeenab Aneez and Neha Mujumdar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-stsdebates"&gt;&lt;strong&gt;#STSDebates&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Sumandro Chattapadhyay and Jahnavi Phalkey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitalliteraciesatthemargins"&gt;&lt;strong&gt;#DigitalLiteraciesAtTheMargins&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Aakash Solanki, Sandeep Mertia, and Rashmi M.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-internetmovements"&gt;&lt;strong&gt;#InternetMovements&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Becca Savory, Sarah McKeever, and Shaunak Sen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-futurebazaars"&gt;&lt;strong&gt;#FutureBazaars&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Maitrayee Deka, Adam Arvidsson, Rohini Lakshané, and Ravi Sundaram.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-minimalcomputing"&gt;&lt;strong&gt;#MinimalComputing&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Padmini Ray Murray and Sebastian Lütgert.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-webofgenealogies"&gt;&lt;strong&gt;#WebOfGenealogies&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Ishita Tiwary, Sandeep Mertia, and Siddharth Narrain.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-wikishadows"&gt;&lt;strong&gt;#WikiShadows&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Tanveer Hasan and Rahmanuddin Shaik.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-literaryspaces"&gt;&lt;strong&gt;#LiterarySpaces&lt;/strong&gt;&lt;/a&gt;: Received 5.43% votes. Proposed by P.P. Sneha and Arup Chatterjee.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-archiveanarchy"&gt;&lt;strong&gt;#ArchiveAnarchy&lt;/strong&gt;&lt;/a&gt;: Received 4.34% votes. Proposed by Ranjani M Prasad and Farah Yameen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-afcinema2.0"&gt;&lt;strong&gt;#AFCinema2.0&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Akriti Rastogi and Ishani Dey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-manypublicsofinternet"&gt;&lt;strong&gt;#ManyPublicsOfInternet&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Sailen Routray and Khetrimayum Monish.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-politicsonsocialmedia"&gt;&lt;strong&gt;#PoliticsOnSocialMedia&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Rinku Lamba and Rajarshi Dasgupta.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-spottingdata"&gt;&lt;strong&gt;#SpottingData&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Dibyajyoti Ghosh and Purbasha Auddy.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the &lt;a href="http://jnu.ac.in/"&gt;&lt;strong&gt;Jawaharlal Nehru University (JNU)&lt;/strong&gt;&lt;/a&gt;, Delhi. We are delighted to announce that the Conference will be hosted by the &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;&lt;strong&gt;Centre for Political Studies (CPS)&lt;/strong&gt;&lt;/a&gt; at JNU, and will be generously supported by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;&lt;strong&gt;CSCS Digital Innovation Fund (CDIF)&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conference Programme&lt;/h2&gt;
&lt;p&gt;Access the draft programme (v.2.1): &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.1.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Pre-Conference Conversations&lt;/h2&gt;
&lt;p&gt;Please join the researchers@cis-india mailing list to take part in the pre-conference conversations: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Accommodation&lt;/h2&gt;
&lt;p&gt;CPS and CIS will provide accommodation to all non-Delhi-based team members of the selected sessions, during the days of the Conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Travel Grants&lt;/h2&gt;
&lt;p&gt;We will offer 10 travel grants, up to Rs. 10,000 each, for within-India travel. The following non-Delhi-based team members of the selected sessions have been selected for travel grants: Aakash Solanki, Dibyajyoti Ghosh, Neha Mujumdar, Purbasha Auddy, Rahmanuddin Shaik, Rashmi M, Rohini Lakshané, Sailen Routray, P.P. Sneha, and Zeenab Aneez.&lt;/p&gt;
&lt;p&gt;The travel grants are made possible by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-selected-sessions'&gt;https://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-18T09:23:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/approaching-open-research-via-open-data-2015">
    <title>Approaching Open Research via Open Data - Presentation at TERI, December 22, 2015</title>
    <link>https://cis-india.org/openness/approaching-open-research-via-open-data-2015</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, organised a seminar on 'Open Access in Research Area: A Strategic Approach' on December 22, 2015. We supported the seminar as a knowledge partner. Sumandro Chattapadhyay was invited to deliver a special address. Here are the notes and slides from the presentation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The brief presentation foregrounded &lt;em&gt;open data&lt;/em&gt; as a crucial part of open research, and also as an instrument of opening up research for public consumption, discussion, and scrutiny.&lt;/p&gt;
&lt;p&gt;The presentation started with reference to the &lt;a href="http://cis-india.org/openness/open-access-dialogues-report"&gt;Open Access Dialogues&lt;/a&gt; organised by The African Commons Project and the Centre for Internet and Society during November 2012 to March 2013 that explored the global open access agenda from a developing world perspective.&lt;/p&gt;
&lt;p&gt;I noted that one of the key findings from the Indian participants of the online consultations organised as part of the Open Access Dialogues was the need for a &lt;em&gt;broader vision of open access&lt;/em&gt;. Open research data is a key component of this broader vision of open access and open research.&lt;/p&gt;
&lt;p&gt;There was a brief discussion of how to start doing and thinking about open data as an approach to open research. I highlighted the need to get started on 1) getting government to open up data relevant to research, 2) opening up academic research data, and 3) sectoral conversations on data standards (technical and semantic); as well as the need to think about 1) open data as bridge across disciplinary communities, 2) quantification of life and the widening sphere of research data, and 3) academic research and public life.&lt;/p&gt;
&lt;p&gt;In next slides, I quickly mentioned the international processes going on in the open data landscape - the conversation on open data and Sustainable Development Data, the possibility of using big (social and telecom) data for purposes of development monitoring, and the International Open Data Charter as a set of global principles for open data.&lt;/p&gt;
&lt;p&gt;More about the seminar: &lt;a href="http://cis-india.org/openness/teri-seminar-on-open-access-in-research"&gt;http://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/la5ulZYBT15DiL" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/approaching-open-research-via-open-data-2015'&gt;https://cis-india.org/openness/approaching-open-research-via-open-data-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-01-12T14:37:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance">
    <title>Pre-Budget Consultation 2016 - Submission to the IT Group of the Ministry of Finance</title>
    <link>https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance</link>
    <description>
        &lt;b&gt;The Ministry of Finance has recently held pre-budget consultations with different stakeholder groups in connection with the Union Budget 2016-17. We were invited to take part in the consultation for the IT (hardware and software) group organised on January 07, 2016, and submit a suggestion note. We are sharing the note below. It was prepared and presented by Sumandro Chattapadhyay, with contributions from Rohini Lakshané, Anubha Sinha, and other members of CIS.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is our distinct honour to be invited to submit this note for consideration by the IT Group of the Ministry of Finance, Government of India, as part of the pre-budget consultation for 2016-17.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. We receive financial support from Kusuma Trust, Wikimedia Foundation, MacArthur Foundation, IDRC, and other donors.&lt;/p&gt;
&lt;p&gt;We have divided our suggestions into the different topics that our organisation has been researching in the recent years.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Free/Libre and Open Source Software (FLOSS) is the Basis for Digital India&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We congratulate the policies introduced by the government to promote use of free/libre and open source software and that of open APIs for all e-governance projects and systems. This is not only crucial for the government to avoid vendor lock-in when it comes to critical software systems for governance, but also to ensure that the source code of such systems is available for public scrutiny and do not contain any security flaws.&lt;/p&gt;
&lt;p&gt;We request the government to empower the implementation of these policies by making open sharing of source code a necessity for all software vendors hired by government agencies a necessary condition for awarding of tenders. The 2016-17 budget should include special support to make all government agencies aware and capable of implementing these policies, as well as to build and operate agency-level software repositories (with version controlling system) to host the source codes. These repositories may function to manage the development and maintenance of software used in e-governance projects, as well as to seek comments from the public regarding the quality of the software.&lt;/p&gt;
&lt;p&gt;Use of FLOSS is not only important from the security or the cost-saving perspectives, it is also crucial to develop a robust industry of software development firms that specialise in FLOSS-based solutions, as opposed to being restricted to doing local implementation of global software vendors. A holistic support for FLOSS, especially with the government functioning as the dominant client, will immensely help creation of domestic jobs in the software industry, as well as encouraging Indian programmers to contribute to development of FLOSS projects.&lt;/p&gt;
&lt;p&gt;An effective compliance monitoring and enforcement system needs to be created to ensure that all government agencies are  Strong enforcement of the 2011 policy to use open source software in governance, including an enforcement task force that checks whether government departments have complied with this or not.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Open Data is a Key Instrument for Transparent Decision Making&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With a wider set of governance activities being carried out using information systems, the government is increasingly acquiring a substantial amount of data about governance processes and status of projects that needs to be effectively fed back into the decision making process for the same projects. Opening up such data not only allows for public transparency, but also for easier sharing of data across government agencies, which reduces process delays and possibilities of duplication of data collection efforts.&lt;/p&gt;
&lt;p&gt;We request the 2016-17 budget to foreground the National Data Sharing and Accessibility Policy and the Open Government Data Platform of India as two key enablers of the Digital India agenda, and accordingly budget for modernisation and reconfiguration of data collection and management processes across government agencies, so that those processes are made automatic and open-by-default. Automatic data management processes minimise the possibility of data loss by directly archiving the collected data, which is increasingly becoming digital in nature. Open-by-default processes of data management means that all data collected by an agency, once pre-recognised as shareable data (that is non-sensitive and anonymised), will be proactively disclosed as a rule.&lt;/p&gt;
&lt;p&gt;Implementation of the National Data Sharing and Accessibility Policy has been hindered, so far, by the lack of preparation of a public inventory of data assets, along  with the information of their collection cycles, modes of collection and storage, etc., by each union government agency. Specific budgetary allocation to develop these inventories will be crucial not only for the implementation of the Policy, but also for the government to get an extensive sense of data collected and maintained currently by various government agencies. Decisions to proactively publish, or otherwise, such data can then be taken based on established rules.&lt;/p&gt;
&lt;p&gt;Availability of such open data, as mentioned above, creates a wider possibility for the public to know, learn, and understand the activities of the government, and is a cornerstone of transparent governance in the digital era. But making this a reality requires a systemic implementation of open government data practices, and various agencies would require targeted budget to undertake the required capacity development and work process re-engineering. Expenditure of such kind should not be seen as producing government data as a product, but as producing data as an infrastructure, which will be of continuous value for the years to come.&lt;/p&gt;
&lt;p&gt;As being discussed globally, open government data has the potential to kickstart a vast market of data derivatives, analytics companies, and data-driven innovation. Encouraging civic innovations, empowered by open government data - from climate data to transport data - can also be one of the unique initiatives of budget 2016-17.&lt;/p&gt;
&lt;p&gt;For maximising impact of opened up government data, we request the government to publish data that either has a high demand already (such as, geospatial data, and transport data), or is related to high-net-worth activities of the government (such as, data related to monitoring of major programmes, and budget and expenditure data for union and state governments).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Promotion of Start-ups and MSMEs in Electronics and IT Hardware Manufacturing&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In line with the Make in India and Digital India initiatives, to enable India to be one of the global hubs of design, manufacturing, and exporting of electronics and IT hardware, we request that the budget 2016-17 focus on increasing flow of fund to start-ups and Medium and Small-Scale Manufacturing Enterprises (MSMEs) in the form of research and development grants (ideally connected to government, especially defense-related, spending on IT hardware innovation), seed capital, and venture capital.&lt;/p&gt;
&lt;p&gt;Generation of awareness and industry-specific strategies to develop intellectual property regimes and practices favourable for manufacturers of electronics and IT hardware in India is an absolutely crucial part of promotion of the same, especially in the current global scenario. Start-ups and MSMEs must be made thoroughly aware of intellectual property concerns and possibilities, including limitations and exceptions, flexibilities, and alternative models such as open innovation.&lt;/p&gt;
&lt;p&gt;We request the budget 2016-17 to give special emphasis to facilitation of technology licensing and transfer, through voluntary mechanisms as well as government intervention, such as compulsory licensing and government enforced patent pools.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Applied Mathematics Research is Fundamental for Cybersecurity&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Recent global reports have revealed that some national governments have been actively involved in sponsoring distortion in applied mathematics research so as to introduce weaknesses in encryption standards used in for online communication. Instead of trying to regulate key-length or mandating pre-registration of devices using encryption, as suggested by the withdrawn National Encryption Policy draft, would not be able to address this core emerging problem of weak cybersecurity standards.&lt;/p&gt;
&lt;p&gt;For effective and sustainable cybersecurity strategy, we must develop significant expertise in applied mathematical research, which is the very basis of cybersecurity standards development. We request the budget 2016-17 to give this topic the much-needed focus, especially in the context of the Digital India initiative and the upcoming National Encryption Policy.&lt;/p&gt;
&lt;p&gt;Along with developing domestic research capacity, a more immediately important step for the government is to ensure high quality Indian participation in global standard setting organisations, and hence to contribute to global standards making processes. We humbly suggest that categorical support for such participation and contribution is provided through the budget 2016-17, perhaps by partially channeling the revenues obtained from spectrum auctions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance'&gt;https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2016-01-12T13:34:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/raw-lectures-02-anil-menon">
    <title>RAW Lectures #02: Anil Menon on 'Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom' </title>
    <link>https://cis-india.org/raw/raw-lectures-02-anil-menon</link>
    <description>
        &lt;b&gt;Anil Menon will give a talk on 'Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom' at the Centre for Internet and Society's office in Bangalore on Wednesday, January 13, 2016 at 6 pm. Please join us for tea and coffee before the lecture at 5.30 pm.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Update: The video recording of the lecture can be accessed &lt;a href="http://cis-india.org/raw/raw-lectures-02-anil-menon-video"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The RAW Lectures series was initiated by the Researchers at Work (RAW) programme to take stock, reflect, and chart courses into the studies of Internet in/from India. The lectures address the experiences and practices of Internet in India as plural and intertwined with longer-duration processes. The lectures also critically respond to the questions around the methods of studying Internet in/from India, and the opportunities and challenges of studying Indian society on/through the Internet.&lt;/p&gt;
&lt;p&gt;It gives us great pleasure to announce that Anil Menon will present the second lecture of the series on Wednesday, January 13, 2016, at 6 pm.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="raw-lectures-02-anil-menon/leadImage" alt="RAW Lectures #02 - Anil Menon - Poster" height="423" width="300" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom&lt;/h3&gt;
&lt;p&gt;Story-telling, like the internet, depends on the existence of fixed protocols between the sender and the receiver. However,  by manipulating ambiguity and contexts, speculative fiction constantly creates new and ever-changing protocols of reading. This makes it hard to define what exactly speculative fiction is. Spec-fic may be described as a catch-all term to describe genres such as magic-realism, fabulist fiction, slipstream, science-fiction, fantasy and various fusions thereof.  In my talk, I will outline the history of spec-fic on the subcontinent, and show how it was used by authors such as Kylas Chundar Dutt to undermine imperialist narratives. In the last decade, the internet, which may be conceived as a speculative network, has emerged as another such tool. Internet access in India is growing at an extraordinary rate, but less well-known is the fact that Indian spec-fic is also undergoing a rather remarkable renaissance. I will show that these two threads of development are related, mutually reinforcing, and point to an interesting metaphor of speculative sovereignity, perhaps unique to India, and that serves to undermine any would-be tyrant’s protocols.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Anil Menon&lt;/h3&gt;
&lt;p&gt;Anil Menon’s research work has appeared in peer-reviewed journals such as &lt;em&gt;Intl J. of Neural Networks&lt;/em&gt;, &lt;em&gt;Neural Proc. Letters&lt;/em&gt;, &lt;em&gt;IEEE Trans On Evolutionary Computation&lt;/em&gt;, &lt;em&gt;Foundations of Genetic Algorithms&lt;/em&gt;, &lt;em&gt;British J. of the History of Science&lt;/em&gt;, and &lt;em&gt;Small Business Economics&lt;/em&gt;. His short fiction has appeared in a variety of magazines and anthologies including &lt;em&gt;Interzone&lt;/em&gt;, &lt;em&gt;Interfictions&lt;/em&gt;, &lt;em&gt;Strange Horizons&lt;/em&gt;, &lt;em&gt;Jaggery Lit Review&lt;/em&gt;, and &lt;em&gt;Lady Churchill’s Rosebud Wristlet&lt;/em&gt;. His stories have been translated into German, French, Chinese, Romanian and Hebrew. His debut novel &lt;em&gt;The Beast With Nine Billion Feet&lt;/em&gt; (Zubaan Books, 2010) was short-listed for the 2010 Vodafone-Crossword award and the Carl Brandon Society's 2011 Parallax Award. Along with Vandana Singh, he co-edited &lt;em&gt;Breaking the Bow&lt;/em&gt; (Zubaan Books 2012), an international anthology of speculative fiction inspired by the Ramayana epic. His most recent work is the novel &lt;em&gt;Half Of What I Say&lt;/em&gt; (Bloomsbury, 2015).&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="http://anilmenon.com/"&gt;http://anilmenon.com/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/raw-lectures-02-anil-menon'&gt;https://cis-india.org/raw/raw-lectures-02-anil-menon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>RAW Lectures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Protocols</dc:subject>
    

   <dc:date>2016-02-09T08:43:57Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/teri-seminar-on-open-access-in-research">
    <title>Seminar on Open Access in Research Area: A Strategic Approach</title>
    <link>https://cis-india.org/openness/teri-seminar-on-open-access-in-research</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, is organising a seminar on open access in research on Tuesday, December 22, 2015. The seminar will focus on: 1) wider access to scientific publications and research data, 2) access to scientific information, and 3) challenges and opportunities of research data. The Centre for Internet and Society is supporting the event as a Knowledge Partner.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Background&lt;/h2&gt;
&lt;p&gt;Open Access has become central importance to advancing the interests of researchers, scholars, students, business, and the public as well as librarians. Increasingly, research institutions require researchers to publish articles that report research findings openly accessible in open domain.&lt;/p&gt;
&lt;p&gt;Open Access pursues to yield scholarly publishing to spread knowledge and allow that knowledge to be built upon. Price barriers should not stop researchers from getting access to research data. Open Access, and the open availability and search ability of scholarly research that it entails, will have a significant positive impact on everything from education to the research practice in various fields.&lt;/p&gt;
&lt;p&gt;To explore why Open Access is so important to a number of groups, TERI Library along with The Centre for Internet &amp;amp; Society (CIS) as Knowledge Partner is organizing a half day seminar on &lt;em&gt;Open Access in Research Areas: a Strategic Approach&lt;/em&gt; on December 22, 2015 at TERI Seminar Hall, IHC, Lodhi Road, New Delhi.&lt;/p&gt;
&lt;p&gt;The Seminar will focus on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;wider access to scientific publications and research data&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;access to scientific information, and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;challenges and opportunities of research data.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Schedule&lt;/h2&gt;
&lt;p&gt;No registration is required to attend the seminar. Seats are limited, and will be provided on first-come-first-served basis.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;13:45 - 14:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration and Networking&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00 - 14:10&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome Address - &lt;strong&gt;Mr. Prabir Sengupta&lt;/strong&gt;, Distinguished Fellow and Director, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:10 - 14:20&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Special Address - &lt;strong&gt;Sumandro Chattapadhyay&lt;/strong&gt;, Research Director, The Centre for Internet and Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:20 - 14:35&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote Address - &lt;strong&gt;Dr. K.R. Murali Mohan&lt;/strong&gt;, Advisor, Big Data Initiatives Division, Department of Science and Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:35 - 14:50&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inaugural Address - &lt;strong&gt;Dr. Chandrima Shaha&lt;/strong&gt;, Director, National Institute of Immunology, New Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:50 - 15:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Setting the Theme and Vote of Thanks - &lt;strong&gt;Dr. P.K. Bhattacharya&lt;/strong&gt;, Fellow and Area Convenor, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00 - 15:30&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea and Refreshments&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 - 17:15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Plenary Session&lt;/strong&gt;&lt;br /&gt;
Chair: &lt;strong&gt;Dr. Ramesh Sharma&lt;/strong&gt;, Director, CEMCA&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Puneet Kishor&lt;/strong&gt;,  Researcher and Independent Consultant - "Science, Data, and Creative Commons"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Beth Sandore Namachchivaya&lt;/strong&gt;, Associate Dean of Libraries and Professor University of Illinois - "Developing Services, Infrastructure, and Best Practices to Conserve and Provide Access to Research Data: Challenges and Opportunities"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Usha Mujoo Munshi&lt;/strong&gt;, Librarian, Indian institute of Public Administration&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/teri-seminar-on-open-access-in-research'&gt;https://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2015-12-22T05:37:44Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
