<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 481 to 495.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-behind-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/improving-telugu-village-articles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/indian-television-november-21-2016-net-subs-grow-significantly-but-public-wifi-idea-delayed"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-behind-big-data">
    <title>The Technology behind Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/technology-behind-big-data</link>
    <description>
        &lt;b&gt;The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/technology-behind-big-data.pdf/view"&gt;Download the Paper&lt;/a&gt; (PDF, 277 kb)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Defining big data is a disputed area in the field of computer science&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, there is some consensus on a basic structure to its definition&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Big data is data that is collected in the form of datasets that has three main criteria: size, variety &amp;amp; velocity, all of which operate at an immense scale&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is ‘big’ in size, often running into petabytes of information, has vast variety within its components, and is created, captured and analysed at an incredibly rapid velocity. All of this also makes big data difficult to handle using traditional technological tools and techniques.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper will attempt to perform a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. The big data life cycle consists of four components, which will also be the key structural points of the paper, namely: Data Acquisition, Data Awareness, Data Analytics &amp;amp; Data Governance.&lt;strong&gt;&lt;sup&gt;4&lt;/sup&gt; &lt;/strong&gt;The paper will focus on the aspects that the author believes are relevant for analysing the technological impact of big data on both technology itself and society at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope: &lt;/strong&gt;The scope of the paper is to study the technology used in big data using the "Life Cycle of Big Data" as model structure to categorise &amp;amp; study the vast range of technologies that are involved in big data. However, the paper will be limited to the study of technology related directly to the big data life cycle. It shall specifically exclude the use/utilisation of big data from its scope since big data is most often being fed into other, unrelated technologies for consumption leading to rather limitless possibilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Goal of the paper is twofold: a.) to use the available literature on the technological aspects of big data, to perform a brief overview of the technology in the field and b.) to frame the relevant research questions for studying the technology of big data and its possible impact on society.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Acquisition&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Acquiring big data has two main sub components to it, the first being sensing the existence of the data’ itself and the second, the stage of collecting and storing this data. Both of these subcomponents are incredibly diverse fields, with lots of rapid change occurring in the technology utilised to carry out these tasks. The section will provide a brief overview of the subcomponents and then discuss the technology used to fulfil the tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Sensing&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data does not exist in a vacuum and is always created as a part of a larger process, especially in the aspect of modern technology. Therefore, the source of the data itself plays a vital role in determining how it can be captured and analysed in the larger scheme of things. Entities constantly emit information into the environment that can be utilised for the purposes of big data, leading to two main kinds of data: data that is “born digital” or “born analogue.”&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Born Digital Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information that is “born digital,” is created, by a user or by a digital system, specifically for use by a computer or data‐processing system. This is a vast range of information and newer fields are being added to this category on a daily basis. It includes, as a short, indicative list: email and text messaging, any form of digital input, including keyboards, mouse interactions and touch screens, GPS location data, data from daily home appliances (Internet of Things), etc. All of this data can be tracked and tagged to users as well as be aggregated to form a larger picture, massively increasing the scope of what may constitute the ‘data’ in big data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some indicative uses of how such born digital data is catalogued by technological solutions on the user side, prior to being sent for collection/storage are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Cookies - There are small, often just text, files that are left on user devices by websites in order to that visit, task or action (for example, logging into an email account) with a subsequent event.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (for example, revisiting the website)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Website Analytics&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - Various services, such as Google Analytics, Piwik, etc., can use JavaScript and other web development languages to record a very detailed, intimate track of a user's actions on a website, including how long a user hovers above a link, the time spent on the website/application and in some cases, even the time spent specific aspects of the page.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) GPS&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - With the almost pervasive usage of smartphones with basic location capabilities, GPS sensors on these devices are used to provide regular, minute driven updates to applications, operating systems and even third parties about the user's location. Modern variations such as A-GPS can be used to provide basic positioning information even without satellite coverage, vastly expanding the indoor capabilities of location collection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All of these instances of sensing born digital data are common terms, used in daily parlance by billions of people from all over the world, which is a symbolic of just how deeply they have pervaded into our daily lifestyle. Apart from privacy &amp;amp; security concerns this in turn also leads to an exponential increase in the data available to collect for any interested party.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Sensor Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information is said to be&amp;nbsp; “analogue” when it contains characteristics of the physical world, such as images, video, heartbeats, etc.&amp;nbsp; Such information becomes electronic when processed by a “sensor,” a device that can record physical phenomena and convert it into digital information. Some examples to better illustrate information that is born analogue but collected via digital means are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Voice and/or video content on devices - Apart from phone calls and other forms communication, video and voice based interactions have started to regularly be captured to provide enhanced services. These include Google Now&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Cortana&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and other digital assistants as well as voice guided navigation systems in cars, etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Personal health data such as heartbeats, blood pressure, respiration, velocity, etc. - This personal, potentially very powerful information is collected by dedicated sensors on devices such as Fitbit&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Mi Band&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. as well as by increasingly sophisticated smartphone applications such as Google Fit that can do so without any special device.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) Camera on Home Appliances - Cameras and sensors on devices such as video game consoles (Kinect&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; being a relevant example) can record detailed human interactions, which can be mined for vast amounts of information apart from carrying out the basic interactions with the devices itself.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While not as vast a category as born digital data, the increasingly lower costs of technology and ubiquitous usage of digital, networked devices is leading to information that was traditionally analogue in nature to be captured for use at a rapidly increasing rate.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Collection &amp;amp; Storage&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Traditional data was normally processed using the Extract, Transform, Load (ETL) methodology, which was used to collect the data from outside sources, modify the data to fit needs, and then upload the data into the data storage system for future use.&lt;a name="_ftnref13" href="#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Technology such as spreadsheets, RDBMS databases, Structured Query Languages (SQL), etc. were all initially used to carry out these tasks, more often than not manually. &lt;a name="_ftnref14" href="#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, for big data, the methodology traditionally followed is both inefficient and insufficient to meet the demands of modern use. Therefore, the Magnetic, Agile, Deep (MAD) process is used to collect and store data&lt;a name="_ftnref15" href="#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref16" href="#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The needs and benefits of such a system are: attracting all the data sources regardless of their quality (magnetic), logical and physical contents of storage systems adapting to the rapid data evolution in big data (agile) and complex algorithmic statistical analysis required of big data on a very short notice&lt;a name="_ftnref17" href="#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. (deep)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The technology used to perform data storage using the MAD process requires vast amount of processing power, which is very difficult to create in a single, physical space/unit for nonstate or research entities, who cannot afford supercomputers. Therefore, most solutions used in big data rely on two major components to store data: distributed systems and Massive Parallel Processing&lt;a name="_ftnref18" href="#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (MPP) that run on non-relational (in-memory) database systems. Database performance and reliability is traditionally gauged using pure performance metrics (FLOPS per second, etc.) as well as the Atomicity, consistency, isolation, durability (ACID) criteria.&lt;a name="_ftnref19" href="#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most commonly used database systems for big data applications are given below. The specific operational qualities and performance of each of these databases is beyond the scope of this review but the common criteria that makes them well suited for big data storage have been delineated below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Non-relational databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Databases traditionally used to be structured entities that operated solely on the ability to correlate information stored in them using explicitly defined relationships. Even prior to the advent of big data, this outlook was turning out to be a limiting factor in how large amounts of stored information could be leveraged, this led to the evolution of non relational database systems. Before going into them in detail, a basic primer on their data transfer protocols will be helpful in understanding their operation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A protocol is a model that structures instructions in a particular manner so that it can be reproduced from one system to another&lt;a name="_ftnref20" href="#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref21" href="#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The protocols which govern technology in the case of big data have gone through many stages of evolution, starting off with simple HTML based systems&lt;a name="_ftnref22" href="#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which then evolved to XML driven SOAP systems&lt;a name="_ftnref23" href="#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which led to JavaScript Object Notation, or JSON&lt;a name="_ftnref24" href="#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the currently used form for in most big database systems. JSON is an open format used to transfer data objects, using human-readable text and is the basis for most of the commonly used non-relational database management systems. Examples of Non-relational databases also known as NoSQL databases, include MongoDB&lt;a name="_ftnref25" href="#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Couchbase&lt;a name="_ftnref26" href="#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. They were developed for both managing as well as storing unstructured data. They aim for scaling, flexibility, and simplified development. Such databases rather focus on the high-performance scalable data storage, and allow tasks to be written in the application layer instead of databases specific languages, allowing for greater interoperability.&lt;a name="_ftnref27" href="#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;In-Memory Databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In order to overcome performance limitation of traditional database systems, some modern databases now use in-memory databases. These systems manage the data in the RAM memory of the server, thus eliminating storage disk input/output. This allows for almost realtime responses from the database, in comparisons to minutes or hours required on traditional database systems. This improvement in the performance is so massive that, entirely new applications are being developed for using IMDB systems.&lt;a name="_ftnref28" href="#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These IMDB systems are also being used for advanced analytics on big data, especially to increase the access speed to data and increase the scoring rate of analytic models for analysis.&lt;a name="_ftnref29" href="#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Examples of IMDB include VoltDB&lt;a name="_ftnref30" href="#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, NuoDB&lt;a name="_ftnref31" href="#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, SolidDB&lt;a name="_ftnref32" href="#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Apache Spark&lt;a name="_ftnref33" href="#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Hybrid Systems&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;These are the two major systems used to store data prior to it being processed or analysed in a big data application. However, the divide between data storage and data management is a slim one and most database systems also contain various unique attributes that cater them to specific kinds of analysis. (as can be seen from the IMDB example above) One example of a very commonly used Hybrid system that deals with storage as well as awareness of the data is Apache Hadoop&lt;sup&gt;33&lt;/sup&gt;, which is detailed below.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Apache Hadoop&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Hadoop consists of two main components: the HDFS for the big data storage, and MapReduce for big data analytics, each of which will be detailed in their respective section.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;The HDFS&lt;a name="_ftnref34" href="#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref35" href="#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; storage function in Hadoop provides a reliable distributed file system, stored across multiple systems for processing &amp;amp; redundancy reasons. The file system is optimized for large files, as single files are split into blocks and spread across systems known as cluster nodes.&lt;a name="_ftnref36" href="#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, the data is protected among the nodes by a replication mechanism, which ensures availability even if any node fails. Further, there are two types of nodes: Data Nodes and Name Nodes.&lt;a name="_ftnref37" href="#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data is stored in the form of file blocks across the multiple Data Nodes while the Name Node acts as an intermediary between the client and the Data Node, where it directs the requesting client to the particular Data Node which contains the requested data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This operating structure for storing data also has various variations within Hadoop such as HBase for key/value pair type queries (a NoSQL based system), Hive for relational type queries, etc. Hadoop’s redundancy, speed, ability to run on commodity hardware, industry support and rapid pace of development have led to it being almost co-equivalently associated with big data.&lt;a name="_ftnref38" href="#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Awareness&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Awareness, in the context of big data, is the task of creating a scheme of relationships within a set of data, to allow different users of the data to determine a fluid yet valid context and utilise it for their desired tasks.&lt;a name="_ftnref39" href="#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is a relatively new field, in which most of the work is currently being done on semantic structures to allow data to gain context in an interoperable format, in contrast to the current system where data is given context using unique, model specific constructs.&lt;a name="_ftnref40" href="#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (such as XML Schemes, etc.)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some of the original work on this field was carried out in the form of utilising the Resource Description Framework (RDF), which was built primarily to allow describing of data in a portable manner, especially being agnostic towards platforms and systems for Semantic Web at the W3C. SPARQL is the language used to implement RDF based designs but both largely remain underutilised in both the public domain as well as big data. Authors such as Kurt&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Cagle&lt;a name="_ftnref41" href="#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Bob DuCharme&lt;a name="_ftnref42" href="#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; predict its explosion in the next couple of years. Companies have also started realising the value of interoperable context, with Oracle Spatial&lt;a name="_ftnref43" href="#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and IBM’s DB2&lt;a name="_ftnref44" href="#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; already including RDF and SPARQL support in the past 3 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While underutilised, the rapid developments taking place in the field will make the impact that data awareness may have on big data as big as Hadoop and maybe even SQL. Some aspects of it are already beginning to be used in Artificial Intelligence, Natural Language Processing, etc. with tremendous scope for development.&lt;a name="_ftnref45" href="#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Processing &amp;amp; Analytics&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Processing largely has three primary goals: a. determines if the data collected is internally consistent; b. make the data meaningful to other systems or users using either metaphors or analogy they can understand; and (what many consider most importantly) provide predictions about future events and behaviours based upon past data and trends.&lt;a name="_ftnref46" href="#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Being a very vast field with rapidly changing technologies governing its operation, this section will largely concentrate on the most commonly used technologies in data analytics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data analytics requires four primary conditions to be met in order to carry out effective processing: fast, data loading, fast query processing, efficient utilisation of storage and adaptivity to dynamic workload patterns. The analytical model most commonly associated with meeting this criteria and with big data in general is MapReduce, detailed below. There are other, more niche models and algorithms (such as Project Voldemort&lt;a name="_ftnref47" href="#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; used by LinkedIn), which are used in big data but they are beyond the scope of the review, and more information about them can be read at article linked in the previous citation. (Reference architecture and classification of technologies, products and services for big data system)&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;MapReduce&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;MapReduce is a generic parallel programming concept, derived from the “Map” and “Reduce” of functional programming languages, which makes it particularly suited for big data operations. It is at the core of Hadoop&lt;a name="_ftnref48" href="#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and performs the data processing and analytics functions in other big data systems as well.&lt;a name="_ftnref49" href="#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The fundamental premise of MapReduce is scaling out rather than scaling up, i.e., (adding more numerical resources, rather than increasing the power of a single system)&lt;a name="_ftnref50" href="#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MapReduce operates by breaking a task down into steps and executing the steps in parallel, across many systems. This comes with two advantages, a reduction in the time needed to finish the task and also a decrease in the amount of resources one has to expend to perform the task, in both power and energy. This model makes it ideally suited for the large data sets and quick response times required of big data operations generally.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first step of a MapReduce job is to correlate the input values to a set of keys/value pairs as output. The “Map” function then partitions the processing tasks into smaller tasks, and assigns them to the appropriate key/value pairs.&lt;a name="_ftnref51" href="#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This allows unstructured data, such as plain text, to be mapped to a structured key/value pair. As an example, the key could be the punctuation in a sentence and the value of the pair could be the number of occurrences of the punctuation overall. This output of the Map function is then passed on “Reduce” function.&lt;a name="_ftnref52" href="#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Reduce then collects and combines this output, using identical key/value pairs, to provide the final result of the task.&lt;a name="_ftnref53" href="#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These steps are carried using the Job Tracker &amp;amp; Task Tracker in Hadoop but different systems have different methodologies to carry out similar tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Governance&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Governance is the act of managing raw big data as well as the processed information that arises from big data in order to meet legal, regulatory and business imposed requirements. While there is no standardized format for data governance, there have been increasing call with various sectors (especially healthcare) to create such a format to ensure reliable, secure and consistent big data utilisation across the board. The following tactics and techniques have been utilised or suggested for data governance, with varying degrees of success:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Zero-knowledge systems&lt;/strong&gt;: This technological proposal maintains secrecy with respect to the low-level data while allowing encrypted data to be examined for certain higherlevel abstractions.&lt;a name="_ftnref54" href="#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For the system to be zero-knowledge, the client’s system will have to encrypt the data and send it to the storage provider. Due to this, the provider stores the data in the encrypted format and cannot decipher the same unless he/she is in possession of the key which will decrypt the data into plaintext. This allows the individual to store his data with a storage provider while also maintaining anonymity of the details contained in such information. However, these are currently just beginning to be used in simple situations. As of now, they are not expandable to unstructured and complex cases and have to be developed marginally before they can be used for research and data mining purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homomorphic encryption&lt;/strong&gt;: Homomorphic encryption is a privacy preserving technique which performs searches and other computations over data that is encrypted while also protecting the individual’s privacy.&lt;a name="_ftnref55" href="#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This technique has however been considered to be impractical and is deemed to be an unlikely policy alternative for near future purposes in the context of preserving privacy in the age of big data.&lt;a name="_ftnref56" href="#_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-party computation&lt;/strong&gt;: In this technique, computation is done on encrypted distributed data stores.&lt;a name="_ftnref57" href="#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This mechanism is closely related to homomorphic encryption where individual data is kept private using encryption algorithms called “collusion-robust” while the same is used to calculate statistics.&lt;a name="_ftnref58" href="#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The parties involved are aware of some private data and each of them use a protocol which produces results based on the information they are aware of and the information they are not aware of, without revealing the data they are not already aware of.&lt;a name="_ftnref59" href="#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Multi-party computations thus help in generating useful data for statistical and research purposes without compromising the privacy of the individuals.&lt;/li&gt;&lt;/ol&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Differential Privacy&lt;/strong&gt;: Although this technological development is related to encryption, it follows a different technique. Differential privacy aims at maximizing the precision of computations and database queries while reducing the identifiability of the data owners who have records in the database, usually through obfuscation of query results.&lt;a name="_ftnref60" href="#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is widely applied today in the existence of big data in order to ensure preservation of privacy while trying to reap the benefits of large scale data collection.&lt;a name="_ftnref61" href="#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Searchable encryption&lt;/strong&gt;: Through this mechanism, the data subject can make certain data searchable while minimizing exposure and maximizing privacy.&lt;a name="_ftnref62" href="#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The data owner can make his information available through search engines by providing the data in an encrypted format but by adding tags consisting of certain keywords which can be deciphered by the search engine. This encrypted data shows up in the search results when searched with these particular keywords but can only be read when the person is in possession of the key which is required for decrypting the information.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This technique of encryption provides maximum security to the individual’s data and preserves privacy to the greatest possible extent.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;K-anonymity&lt;/strong&gt;: The property of k-anonymity is being applied in the present day in order to preserve privacy and avoid re-identification.&lt;a name="_ftnref63" href="#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A certain data set is said to possess the property of k-anonymity if individual specific data can be released and used for various purposes without re-identification. The analysis of the data should be carried out without attributing the data to the individual to whom it belongs and should give scientific guarantees for the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity Management Systems&lt;/strong&gt;: These systems enable the individuals to establish and safeguard their identities, explain those identities with the help of attributes, follow the activity of their identities and also delete their identities if they wish to.&lt;a name="_ftnref64" href="#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It uses cryptographic schemes and protocols to make anonymous or pseudonymous the identities and credentials of the individuals before analysing the data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Publishing&lt;/strong&gt;: This is a method in which the analysts are provided with the individual’s personal information with the ability to decipher particular information from the database while preventing the inference of certain other information which might lead to a breach of privacy.&lt;a name="_ftnref65" href="#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data which is essential for the analysis will be provided for processing while sensitive data will not be disclosed. This tool primarily focuses on microdata.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Mining&lt;/strong&gt;: This mechanism uses perturbation methods and randomization along with cryptography in order to permit data mining on a filtered version of the data which does not contain any form of sensitive information. PPDM focuses on data mining results unlike PPDP.&lt;a name="_ftnref66" href="#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Studying the technology surrounding big data has led to two major observations: the rapid pace of development in the industry and the stark lack of industry standards or government regulations directed towards big data technologies. These observations have been the primary motivating factor for framing further research in the field. Understanding how to deal with big data technologically, rather than just the potential regulation of possible harms after the technological processes have been performed might be critical for the human rights dialogue as these processes become even more extensive, opaque and technologically complicated.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; EMC: Data Science and Big Data Analytics. In: EMC Education Services, pp. 1–508 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; Bakshi, K.: Considerations for Big Data: Architecture and Approaches. In: Proceedings of the IEEE Aerospace Conference, pp. 1–7 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; Adams, M.N.: Perspectives on Data Mining. International Journal of Market Research 52(1), 11–19 (2010) &lt;sup&gt;4&lt;/sup&gt; Elgendy, N.: Big Data Analytics in Support of the Decision Making Process. MSc Thesis, German University in Cairo, p. 164 (2013)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Big Data and Privacy: A Technological Perspective - President’s &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Council of Advisors on Science and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technology (May 2014)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4 (2012): 1165-1188.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; Chandramouli, Badrish, Jonathan Goldstein, and Songyun Duan. "Temporal analytics on big data for web advertising." 2012 IEEE 28th international conference on data engineering. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; Laurila, Juha K., et al. "The mobile data challenge: Big data for mobile computing research." Pervasive Computing. No. EPFL-CONF-192489. 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; Lazer, David, et al. "The parable of Google flu: traps in big data analysis." &lt;em&gt;Science&lt;/em&gt; 343.6176 (2014): 12031205.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; Banaee, Hadi, Mobyen Uddin Ahmed, and Amy Loutfi. "Data mining for wearable sensors in health monitoring systems: a review of recent trends and challenges." &lt;em&gt;Sensors&lt;/em&gt; 13.12 (2013): 17472-17500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; Chung, Eric S., John D. Davis, and Jaewon Lee. "Linqits: Big data on little clients." &lt;em&gt;ACM SIGARCH Computer Architecture News&lt;/em&gt;. Vol. 41. No. 3. ACM, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; Kornelson, Kevin Paul, et al. "Method and system for developing extract transform load systems for data warehouses." U.S. Patent No. 7,139,779. 21 Nov. 2006.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; Henry, Scott, et al. "Engineering trade study: extract, transform, load tools for data migration." &lt;em&gt;2005 IEEE Design Symposium, Systems and Information Engineering&lt;/em&gt;. IEEE, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; Cohen, Jeffrey, et al. "MAD skills: new analysis practices for big data." &lt;em&gt;Proceedings of the VLDB Endowment&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; .2 (2009): 1481-1492.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; Elgendy, Nada, and Ahmed Elragal. "Big data analytics: a literature review paper." &lt;em&gt;Industrial Conference on Data Mining&lt;/em&gt;. Springer International Publishing, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; Wu, Xindong, et al. "Data mining with big data." &lt;em&gt;IEEE transactions on knowledge and data engineering&lt;/em&gt; 26.1 (2014): 97-107.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; Supra Note 17&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; Hu, Han, et al. "Toward scalable systems for big data analytics: A technology tutorial." &lt;em&gt;IEEE Access&lt;/em&gt; 2 (2014):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; -687.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; Kurt Cagle, Understanding the Big Data Lifecycle - LinkedIn Pulse (2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; Coyle, Frank P. &lt;em&gt;XML, Web services, and the data revolution&lt;/em&gt;. Addison-Wesley Longman Publishing Co., Inc., 2002.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; Pautasso, Cesare, Olaf Zimmermann, and Frank Leymann. "Restful web services vs. big'web services: making the right architectural decision." &lt;em&gt;Proceedings of the 17th international conference on World Wide Web&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; Banker, Kyle. &lt;em&gt;MongoDB in action&lt;/em&gt;. Manning Publications Co., 2011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; McCreary, Dan, and Ann Kelly. "Making sense of NoSQL." &lt;em&gt;Shelter Island: Manning&lt;/em&gt; (2014): 19-20.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; Zhang, Hao, et al. "In-memory big data management and processing: A survey." &lt;em&gt;IEEE Transactions on Knowledge and Data Engineering&lt;/em&gt; 27.7 (2015): 1920-1948.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Supra Note 20&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Ballard, Chuck, et al. &lt;em&gt;IBM solidDB: Delivering Data with Extreme Speed&lt;/em&gt;. IBM Redbooks, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Shanahan, James G., and Laing Dai. "Large scale distributed data science using apache spark." &lt;em&gt;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining&lt;/em&gt;. ACM, 2015. &lt;sup&gt;33&lt;/sup&gt; Shvachko, Konstantin, et al. "The hadoop distributed file system." &lt;em&gt;2010 IEEE 26th symposium on mass storage systems and technologies (MSST)&lt;/em&gt;. IEEE, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; Borthakur, Dhruba. "The hadoop distributed file system: Architecture and design." &lt;em&gt;Hadoop Project Website&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn35" href="#_ftnref35"&gt;[35]&lt;/a&gt; .2007 (2007): 21.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn36" href="#_ftnref36"&gt;[36]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn37" href="#_ftnref37"&gt;[37]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn38" href="#_ftnref38"&gt;[38]&lt;/a&gt; Zikopoulos, Paul, and Chris Eaton. &lt;em&gt;Understanding big data: Analytics for enterprise class hadoop and streaming data&lt;/em&gt;. McGraw-Hill Osborne Media, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn39" href="#_ftnref39"&gt;[39]&lt;/a&gt; Bizer, Christian, et al. "The meaningful use of big data: four perspectives--four challenges." &lt;em&gt;ACM SIGMOD Record&lt;/em&gt; 40.4 (2012): 56-60.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn40" href="#_ftnref40"&gt;[40]&lt;/a&gt; Kaisler, Stephen, et al. "Big data: issues and challenges moving forward." &lt;em&gt;System Sciences (HICSS), 2013 46th Hawaii International Conference on&lt;/em&gt;. IEEE, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn41" href="#_ftnref41"&gt;[41]&lt;/a&gt; Supra Note 21&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn42" href="#_ftnref42"&gt;[42]&lt;/a&gt; DuCharme, Bob. "What Do RDF and SPARQL bring to Big Data Projects?." &lt;em&gt;Big Data&lt;/em&gt; 1.1 (2013): 38-41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn43" href="#_ftnref43"&gt;[43]&lt;/a&gt; Zhong, Yunqin, et al. "Towards parallel spatial query processing for big spatial data." &lt;em&gt;Parallel and &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Distributed Processing Symposium Workshops &amp;amp; PhD Forum (IPDPSW), 2012 IEEE 26th International&lt;/em&gt;. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn44" href="#_ftnref44"&gt;[44]&lt;/a&gt; Ma, Li, et al. "Effective and efficient semantic web data management over DB2." &lt;em&gt;Proceedings of the 2008 ACM SIGMOD international conference on Management of data&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn45" href="#_ftnref45"&gt;[45]&lt;/a&gt; Lohr, Steve. "The age of big data." &lt;em&gt;New York Times&lt;/em&gt; 11 (2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn46" href="#_ftnref46"&gt;[46]&lt;/a&gt; Pääkkönen, Pekka, and Daniel Pakkala. "Reference architecture and classification of technologies, products and services for big data systems." &lt;em&gt;Big Data Research&lt;/em&gt; 2.4 (2015): 166-186.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn47" href="#_ftnref47"&gt;[47]&lt;/a&gt; Sumbaly, Roshan, et al. "Serving large-scale batch computed data with project voldemort." &lt;em&gt;Proceedings of the 10th USENIX conference on File and Storage Technologies&lt;/em&gt;. USENIX Association, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn48" href="#_ftnref48"&gt;[48]&lt;/a&gt; Bar-Sinai, Michael. "Big Data Technology Literature Review." &lt;em&gt;arXiv preprint arXiv:1506.08978&lt;/em&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn49" href="#_ftnref49"&gt;[49]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn50" href="#_ftnref50"&gt;[50]&lt;/a&gt; Condie, Tyson, et al. "MapReduce Online." &lt;em&gt;Nsdi&lt;/em&gt;. Vol. 10. No. 4. 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn51" href="#_ftnref51"&gt;[51]&lt;/a&gt; Supra Note 47&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn52" href="#_ftnref52"&gt;[52]&lt;/a&gt; Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce: a flexible data processing tool." &lt;em&gt;Communications of the ACM&lt;/em&gt; 53.1 (2010): 72-77.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn53" href="#_ftnref53"&gt;[53]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn54" href="#_ftnref54"&gt;[54]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn55" href="#_ftnref55"&gt;[55]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big data for all: Privacy and user control in the age of analytics." &lt;em&gt;Nw. J. Tech. &amp;amp; Intell. Prop.&lt;/em&gt; 11 (2012): xxvii.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn56" href="#_ftnref56"&gt;[56]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn57" href="#_ftnref57"&gt;[57]&lt;/a&gt; Privacy by design in big data, ENISA&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn58" href="#_ftnref58"&gt;[58]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn59" href="#_ftnref59"&gt;[59]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn60" href="#_ftnref60"&gt;[60]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn61" href="#_ftnref61"&gt;[61]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Privacy in the age of big data: a time for big decisions." &lt;em&gt;Stanford Law Review Online&lt;/em&gt; 64 (2012): 63.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn62" href="#_ftnref62"&gt;[62]&lt;/a&gt; Lane, Julia, et al., eds. &lt;em&gt;Privacy, big data, and the public good: Frameworks for engagement&lt;/em&gt;. Cambridge University Press, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn63" href="#_ftnref63"&gt;[63]&lt;/a&gt; Crawford, Kate, and Jason Schultz. "Big data and due process: Toward a framework to redress predictive privacy harms." &lt;em&gt;BCL Rev.&lt;/em&gt; 55 (2014): 93.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn64" href="#_ftnref64"&gt;[64]&lt;/a&gt; http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn65" href="#_ftnref65"&gt;[65]&lt;/a&gt; Seda Gurses and George Danezis, A critical review of 10 years of privacy technology, August 12th 2010, http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn66" href="#_ftnref66"&gt;[66]&lt;/a&gt; Id&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-behind-big-data'&gt;https://cis-india.org/internet-governance/blog/technology-behind-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geethanjali Jujjavarapu and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-04T09:53:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf">
    <title>BIS on Smart Cities Indicators</title>
    <link>https://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf'&gt;https://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-30T15:56:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged">
    <title>The Quest for Education – Persons with Disabilities, Severely Challenged </title>
    <link>https://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged</link>
    <description>
        &lt;b&gt;Education is the fundamental building block of development; it leads to an improved quality of life, employment, social acceptance and inclusion, national development and intellectual growth.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="https://yourstory.com/2016/11/education-persons-with-disabilities-severely-challenged/"&gt;Your Story&lt;/a&gt; on November 24, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;The right to education and the current census figures&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past decade, multiple efforts and initiatives associated with policy and programme towards achieving the goal of education have taken place. However, there are still millions of children with disabilities and students who are struggling to access basic and higher education and for whom economic independence appears to be an elusive dream.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2011 census figures show that the literacy rates for persons with disabilities are much lower than that of the non-disabled population of the country and even within that, certain disabilities and women across disabilities have a lower percentage. The overall literacy rate for persons with disabilities is 59 percent compared to 74 percent for the general population. The literacy level of women with disabilities in urban areas is 61 percent, which is 9 percent lower than their male counterparts. While women with disabilities in rural areas are worse with a literacy rate of 38 percent, 20 percent lower than disabled males.  And people with multiple disabilities fare the worst, with a 35.8 percent literacy rate. Their education needs in terms of content, technology, training and support remain unfulfilled.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Challenges faced by the disabled&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The issues faced by children with different disabilities vary. For instance, in the case of children with print impairment, there is need for aggressive implementation of schemes to provide assistive technology since most disabled students do not have access to technologies in most states. Students who are blind are dependent upon Braille materials, which often do not reach them before half the school term is over. And this only supports the bare minimum need in terms of reading and not any extra knowledge building requirements. In some states, laptops are being distributed; however, these are unaccompanied by any training requirements, so it is unclear how many students are really able to use their devices. In places where these devices are available, they are mostly provided to students from the ninth standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in some states, laptops are being distributed; however, these are unaccompanied by any training requirements, so it is unclear how many students are really able to use their devices. In places where these devices are available, they are mostly provided to students from the ninth standard. Thus, transition becomes difficult and they find it hard to write their own exams. So while their sighted counterparts are experimenting with technology from a much earlier age, they are introduced to it at a much later stage, by which time their colleagues are far ahead of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Children with hearing impairments also face many challenges. They are isolated from mainstream communication as well; there are only around 250 sign language interpreters in India and sometimes one person has to cater to the requirements of an entire state. Hence, they grow and are educated in isolation without proper means of integration in inclusive schools. The physical environments in most schools also tend to be inaccessible for those with mobility impairments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a rather dismal scenario content wise too. The course content put out by different boards is not in accessible formats, so organisations serving the blind have to convert them into an accessible format. There is a strain on resources. In the case of regional language content, the expense of typing out Telugu or Tamil is high and often increases the cost of the book 10-fold. Just converting the basic course syllabus for any one subject for a BA course can run into lakhs. Hence, there is very limited access to books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third challenge is the lack of trained manpower and resources to provide an enriching reading experience for a child with a disability. Children not only have to deal with restrictive resource conditions, but also difficult social conditions and stigma at school. Attitudinal changes need to occur and a lot of this begins at home and school. Consider this, in a rural setting; students in a class have access to a teacher full time during school hours. But there may be only one special needs teacher catering to students with multiple disabilities across several schools. So instead of having more support, a student with disability has to actually deal with severely limited support.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Often these teachers are ironically paid much lesser than other teachers, considering that they actually need more skills and patience to teach children with disabilities. Only in the field of disability does one encounter a situation where a specialisation is undervalued and under paid, whereas in all other genre of professions like medicines, one has to do a generalisation before a specialisation. What sort of prospects then do we offer children with disabilities? What we need is resource centres at each college and school, or if that is not possible, then at least resource centres at district level coordinating support in an appropriate manner with adequately paid and skilled teachers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Promoting technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Promoting use of technology and open source software and imparting training at an early age will go a long way in making students with disabilities self-sufficient and independent. And of course, the issue of content is of primary importance. All boards must embrace accessible standards such as EPUB 3.0 for publications and WCAG 2.0 for their websites and make course content available in accessible formats. Exemption of certain topics should be replaced by facilitating learning using innovative methods and tools. Importantly, there also needs to be focus on providing education targeted towards profession and gainful employment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, there is a long way to go before we can talk of inclusive education for children with disabilities; there is a severe shortage of even exclusive or special education. To improve the situation, individual piecemeal efforts alone will not make a difference. It is essential to have a systemic approach to inclusive education, with sufficient implementation and infrastructural support, if we are to progress to a point where every child with disability is encouraged to learn and be prepared for a world of employment, independence and dignity.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged'&gt;https://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2016-11-30T15:38:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators">
    <title>Comments to the BIS on Smart Cities Indicators</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators</link>
    <description>
        &lt;b&gt;The Bureau of Indian Standards released the Smart Cities - Indicator on 30 September 2016. The Centre for Internet &amp; Society (CIS) presented its views. &lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/bis-on-smart-cities-indicators.pdf"&gt;&lt;b&gt;View the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Name of the Commentator/ Organisation: The Centre for Internet and Society, India&lt;/b&gt;&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;b&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p&gt;PRELIMINARY&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the ​Smart Cities - Indicators (dated 30 September 2016), released by the Bureau of Indian Standards (“BIS”).&lt;/li&gt;
&lt;li&gt;CIS is thankful for the opportunity to put forth its views.&lt;/li&gt;
&lt;li&gt;This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the ‘Comments’.&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
&lt;p&gt;ABOUT CIS&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;CIS is a non-​profit organisation&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cybersecurity.​&lt;/li&gt;
&lt;li&gt;CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;III. Comments&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clause/ Para/ Table/ Figure No. commented &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Comments/Modified Wordings &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Justification of Proposed Change &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;General Comment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The indicators could generally utilize more of smart data, from both&lt;/p&gt;
&lt;p&gt;analog and digital sources, to better reflect the performance of various&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Using technology to gather information rather than limiting its scope to existing mostly non-digital sources of data. There is a lot of potential information,&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;already collected, that simply goes unused or underutilized. Principled use of such information to make informed decisions on key aspects of urban development will lead to ‘truly’ smart cities. Further, the indicators should include actionable aspects and include avenues to leverage research to better their performance. Moreover, indicators that allow for audits for rights and transparency should be focused on as core indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;General Comment&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators are limited in scope to basic sustainability.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The indicators in their current form restrict themselves to sustainability, focused on basic sustenance, which seems to limit the scope of the Smart Cities project. Having a core set of indicators that is more relevant to India but also have an optional, more ambitious set of indicators for cities to become truly advanced and for the standard to be more dynamic. Encourage them by leveraging technology in a sustainable, human welfare and development-oriented approach, which the indicators can inculcate.&lt;/p&gt;
&lt;p&gt;Further, policy pivots being driven by these indicators could be given to make the decision making in smart cities more transparent and accountable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Economy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Granularity of information pertaining to macro-level economic indicators&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;All the indicators in the Economic section pertain to macro-level standards/ indicators. Their limitation is that they provide very little  information about the diversity of the economy of a city, the factors  responsible for positive or negative effects and offer no real way to  encourage microeconomic changes that can lead to the improvement of the  economic condition of a city, aided by modern technology. Example  indicators could be: average GDP of districts within a city, and total  number of operating businesses and merchants in sub-localities in the  city. ​ All of this data can also be used to drive micro policies to  enable localized development.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Education&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include data at city-level and indicators for higher education.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The indicators measured in the Education section only look at city level information about schools, ignoring district and even school level information already recorded and present in the system. Teacher and student attendance rates, level of basic infrastructure present in schools, presence of toilets for both genders, provisions for meals, etc. are some of the parameters that can be included in the indicator list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the list completely excludes college  education (both degree and diploma level) as a relevant indicator, nor does it include indicators for the average education of the population of the city, both of which can be easily measured using census data.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Further, d​ata that allows for a holistic decision making process - poverty levels, distance to schools, transportation levels, access to higher learning, etc. can also be used as supporting indicators. These could come from studies already done that call out the factors.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5. Education 5.1, 5.2, 5.3, 5.5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include gender-specific indicators for students completing primary education, secondary education, and higher education, and enrolled in education institutions.&lt;/p&gt;
&lt;p&gt;Change the term “survival rate” to “retention rate”.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for the “survival rate” (may be better represented as retention rate) of students who identify as female or transgender in schools and universities, and enrollment of school-aged and college-aged girls, women and transgender students would help work towards an inclusive smart city.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Energy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Better utilisation of data from digital electricity meters.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The advent of digital meters allows for home/business level capturing of energy usage. This information can be leveraged to better target energy leaks, theft, repair work, pricing and even renewable energy incentives.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Finance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for digital and cashless payment and transaction systems.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The strong push by the government towards digital payments could also be reflected on the list of indicators, such as the “number of establishments accepting (and not accepting) digital payment systems” being a supporting indicator. Similar standards can be extended to include microfinance (number of avenues available for lending, successful payback of loans, et cetera.)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Governance&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Recommended inclusion of indicators pertaining to the Right to Information Act, 2005&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The number of requests made under the Right to Information Act, 2005, and the time taken by the responding office to reply to them (in terms of the number of days) by the government offices in the city as a relevant factor to gauge transparency and accountability of the governance structures. The same can also be extended to map the parliamentary performance of the elected officials from the city at the state and national level, especially for the interests of the city. Parliamentary performance here would mean attendance records, number of question raised, resources spent on constituency development, et cetera.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10. Governance&lt;/p&gt;
&lt;p&gt;10.2, 10.3, 10.6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indicators for the number of women and  transgenders elected to public office in the city, employed in the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;government workforce in the city in reserved positions. Indicators for women and transgendered voters registered as a percentage of the voting-age population.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;In the interest of inclusive smart cities, this indicator would help fathom if positions reserved for women and transgenders are filled out and the possible reasons, if any, for some of them going vacant.The number of women and transgender voters would help track the participation of women and transgendered voters in democracy. Further, inclusion of indicators that check voter fraud, political participation levels and technologies that enable secure voter participation and involvement would also be beneficial.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Health&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Cost of basic health services” and number of​ healthcare facilities as a​ supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The cost, quality and access of public primary healthcare services, which can be easily measured using digital systems, should also be included in the overall scheme as a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Recreation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Utilisation of public spaces” as a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information about the utilisation of public spaces, such as parks  and grounds. can be included as a supporting indicator. Relevant information could footfalls per month or year, number of public events held at these locations, et cetera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of this information is already present via figures for ticket sales while the rest could be collected using digital attendance systems. Other supporting indicators could include green space per resident, play area/park space per child, quality of the public space - (lack of garbage, sewage, etc).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;“Overall crime reporting statistics”as a core indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The overall incidence rates of various crimes reported, crimes solved, and data regarding investigations (such as mapping of the crime to a map, number of FIR's filed, not filed, outcomes of investigations, etc.) should all be included as core indicators to better gauge the safety record of the city.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety 13.3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include “crimes carried out using technology or the Internet, as per the Criminal Procedure Code and Information Technology Act, 2008 (Amended)”.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This indicator will expand the scope of crimes against women to include acts of crime carried out using the Internet as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Safety 13.4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Include “Response time of the police department from the initial call in instances of crimes against women”&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This would include crimes against women as defined in 13.3. This indicator gives more granular information about safety in general and women’s safety in particular, and of the perception of certain kinds of crimes not being serious enough for the police to respond to.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Shelter&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Expansion of indicators to include per capita living space, basic amenities within the houses.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The scope of shelter should be expanded to include per capita living space in housing units as well as availability of basic home amenities to provide a more wholesome view of the living situation in a city. Some basic amenities that could be included are electricity uptime, water distribution (in liters/ per household), number of residents in the household, kind of house roofing, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Telecommunication and Innovation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Inclusion of indicators on mobile phone usage, mobile network connectivity and computer literacy.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;There are no indicators for mobile phone usage and computer literacy, both of which are essential for the healthy functioning of any city. Indicators to gauge this could include number of mobile phone users, number of (active) mobile connections, number of computer literate people, etc. Similar indicators should also be included for cellphone network coverage, public WiFi connectivity and digital public service provisions as well. Indicators for the same could be number of neighbourhoods/ localities/ suburbs covered by 2G/3G/4G/ 5G out of the total number in city, total number of Public WiFi spots per unit area, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Transportation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Inclusion of indicators for efficiency, sustainability and planning of city-level transportation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The current set of indicators do not include indicators to measure the efficiency, fuel consumption, sustainability and reach of public transport, especially in the outskirts or suburban areas. These can be included as supporting indicators: the number of GPS-connected public transport vehicles to the total number, number of vehicles equipped with panic buttons, quantum of vehicles in the city using renewable energy sources as fuel, automation of toll booths, automation of points where traffic offences can be logged (e.g illegal honking) or overspeeding.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Urban Planning&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Digital information, such as geospatial data, remote sensing and digital mapping can be used to provide better and more sustainable core indicators.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Geo-spatial information (from surveys and satellites) can be utilised to provide macro-level data that can then be utilised to factor city expansions, illegal structures, suburban development, etc. Digital mapping and remote sensing capabilities can be leveraged to provide this information and the utilisation of such information in city development can be made a supporting indicator.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Sewerage and Sanitation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Indicators governing community hygiene and sanitation.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information about covered toilets per capita of the population, sewage treatment plants, etc. are either absent or too vaguely detailed in the current set of indicators, despite the push from the government towards the Swachh Bharat programme. They should be included as Core Indicators to encourage sanitation at a citizen level.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Water Supply&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Indicators for digital measurement of water&lt;/p&gt;
&lt;p&gt;consumption per capita and at the city-level.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Digital water meters are starting to become pervasive and can provide detailed information about water consumption at a household level that was previously unavailable in city planning. A supporting indicator at a minimum can be included to further bolster information aware governance in the field.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; This submission is authored, in alphabetical order, by Elonnai Hickok (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;elonnai@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;), Rohini Lakshané (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;rohini@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;) and Udbhav Tiwari (&lt;span&gt;​&lt;/span&gt;&lt;span&gt;udbhav@cis-india.org&lt;/span&gt;&lt;span&gt;​&lt;/span&gt;) on behalf of the Centre for Internet and Society, India.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; See The Centre for Internet and Society,available at http://cis​india.org for details of the organization, and our work.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators'&gt;https://cis-india.org/internet-governance/blog/comments-to-bis-on-smart-cities-indicators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Rohini Lakshané and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-12-11T07:56:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion">
    <title>Navigating the 'Reconsideration' Quagmire (A Personal Journey of Acute Confusion)</title>
    <link>https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion</link>
    <description>
        &lt;b&gt;An ​earlier analysis of ICANN’s Documentary Information Disclosure Policy already brought to light our concerns about the lack of transparency in ICANN’s internal mechanisms. Carrying my research forward, I sought to arrive at an understanding of the mechanisms used to appeal a denial of DIDP requests. In this post, I aim to provide a brief account of my experiences with the Reconsideration Request process that ICANN provides for as a tool for appeal.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Backdrop: What is the Reconsideration Request Process?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Reconsideration Request process has been laid down in Article IV, Section 2 of the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN Bylaws. Some of the key aspects of this provision have been outlined below&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ICANN is obligated to institute a process by which a person ​&lt;i&gt;materially affected &lt;/i&gt;​by ICANN action/inaction can request review or reconsideration.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;To file this request, one must have been adversely affected by actions of the staff or the board that contradict ICANN’s policies, or actions of the Board taken up without the Board considering material information, or actions of the Board taken up by relying on false information.&lt;/li&gt;
&lt;li&gt;A separate Board Governance Committee was created with the specific mandate of reviewing Reconsideration requests, and conducting all the tasks related to the same.&lt;/li&gt;
&lt;li&gt;The Reconsideration Request must be made within 15 days of:  
&lt;ul&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD ACTION: the date on which information about the challenged Board action is first published in a resolution, unless the posting of the resolution is not accompanied by a rationale, in which case the request must be submitted within 15 days from the initial posting of the rationale;&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO STAFF ACTION: the date on which the party submitting the request became aware of, or reasonably should have become aware of, the challenged staff action, and&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD OR STAFF INACTION: the date on which the affected person reasonably concluded, or reasonably should have concluded, that action would not be taken in a timely manner&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;.The Board Governance Committee is given the power to summarily dismiss a reconsideration request if:  
&lt;ul&gt;
&lt;li&gt;the requestor fails to meet the requirements for bringing a Reconsideration Request;&lt;/li&gt;
&lt;li&gt;it is frivolous, querulous or vexatious; or &lt;/li&gt;
&lt;li&gt;the requestor had notice and opportunity to, but did not, participate in the public comment period relating to the contested action, if applicable&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If not summarily dismissed, the Board Governance Committee proceeds to review and reconsider.&lt;/li&gt;
&lt;li&gt;A requester may ask for an opportunity to be heard, and the decision of the Board Governance Committee in this regard is final.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The basis of the Board Governance Committee’s action is public written record ­ information submitted by the requester, by third parties, and so on.&lt;/li&gt;
&lt;li&gt;The Board Governance Committee is to take a decision on the matter and make a final determination or recommendation to the Board within 30 days of the receipt of the Reconsideration request, unless it is impractical to do so, and it is accountable to the Board to make an explanation of the circumstances that caused the delay.&lt;/li&gt;
&lt;li&gt;The determination is to be made public and posted on the ICANN website.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN has provided a neat infographic to explain this process in a simple fashion, and I am reproducing it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Reconsideration.jpg" alt="Reconsideration" class="image-inline" title="Reconsideration" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Image taken from &lt;span&gt;​&lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/pages/accountability/reconsideration­en&lt;/span&gt;​)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Our Tryst with the Reconsideration Process&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Grievance&lt;/b&gt;&lt;br /&gt;Our engagement with the Reconsideration process began with the rejection of two of our requests (made on September 1, 2015) under ICANN’s Documentary Information Disclosure Policy. The requests sought information about the registry and registrar compliance audit process that ICANN maintains, and asked for various documents pertaining to the same&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Copies of the registry/registrar contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014­2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries to whom such notices were served in the last year.&lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries that did not respond to the notice within a reasonable period of time.&lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identify the registries/registrars who had committed material discrepancies in the terms of the contract.&lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non­compliance.&lt;/li&gt;
&lt;li&gt;A copy of the registrar self­assessment form which is to be submitted to ICANN.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN integrated both the requests and addressed them via one response on 1 October, 2015 (which can be found &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​). In their response, ICANN inundated us with already available links on their website explaining the compliance audit process, and the processes ancillary to it, as well as the broad goals of the programme ­ none of which was sought for by us in our request. ICANN then went on to provide us with information on their Three­Year Audit programme, and gave us access to some of the documents that we had sought, such as the pre­audit notification template, list of registries/registrars that received an audit notification, the expenditure incurred to some extent, and so on .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Individual contracted party reports were denied to us on the basis of their grounds for non­disclosure. Further, and more disturbingly, ICANN refused to provide us with the names of the contracted parties who had been found under the audit process to have committed discrepancies. Therefore, a large part of our understanding of the way in which the compliance audit process works remains unfinished.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What we did&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dissatisfied with this response, I went on to file a Reconsideration request (number 15­22) as per their standard format on November 2, 2015. (The request filed can be accessed &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​).As grounds for reconsideration, I stated that “​&lt;i&gt;As a part of my research I was tracking the ICANN compliance audit process, and therefore required access to audit reports in cases where discrepancies where formally found in their actions. This is in the public interest and therefore requires to be disclosed...While providing us with an array of detailed links explaining the compliance audit process, the ICANN staff has not been able to satisfy our actual requests with respect to gaining an understanding of how the compliance audits help in regulating actions of the registrars, and how they are effective in preventing breaches and discrepancies.&lt;/i&gt;​” Therefore, I requested them to make the records in question publicly available ­ “​&lt;i&gt;We request ICANN to make the records in question, namely the audit reports for individual contracted parties that reflect discrepancies in contractual compliance, which have been formally recognised as a part of your enforcement process. We further request access to all documents that relate to the expenditure incurred by ICANN in the process, as we believe financial transparency is absolutely integral to the values that ICANN stands by.&lt;/i&gt;​”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Board Governance Committee’s response&lt;/b&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The determination of the Board Governance Committee was that our claims did not merit reconsideration, as I was unable to identify any “​&lt;i&gt;misapplication of policy or procedure by the ICANN Staff&lt;/i&gt;​”, and my only issue was with the substance of the DIDP Response itself, and &lt;i&gt;substantial disagreements with a DIDP response are not proper bases for reconsideration &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The response of the Board Governance Committee was educative of the ways in which they determine Reconsideration Requests. Analysing the DIDP process, it held that ICANN was well within its powers to deny information under its defined Conditions for Non­Disclosure, and denial of substantive information did not amount to a procedural violation. Therefore, since the staff adhered to established procedure under the DIDP, there was no basis for our grievance, and our request was dismissed..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, as a post­script, it is interesting to note that the Board Governance Committee delayed its response time by over a month, by its own admission ­ “​&lt;i&gt;In terms of the timing of the BGC’s recommendation, it notes that Section 2.16 of Article IV of the Bylaws provides that the BGC shall make a final determination or recommendation with respect to a reconsideration request within thirty days, unless impractical. To satisfy the thirty­day deadline, the BGC would have to have acted by 2 December 2015. However, due to the timing of the BGC’s meetings in November and December, the first practical opportunity for the BGC to consider Request 15­22 was 13 January 2016.&lt;/i&gt;​”&lt;sup&gt;4&lt;/sup&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Whither do I wander now?&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To me, this entire process reflected the absurdity of the Reconsideration request structure as an appeal mechanism under the Documentary Information Disclosure Policy. As our experience indicated, there does not seem to be any way out if there is an issue with the substance of ICANN’s response. ICANN, commendably, is particular about following procedure with respect to the DIDP. However, what is the way forward for a party aggrieved by the flaws in the existing policy? As I had &lt;span&gt;​&lt;/span&gt;&lt;span&gt;analysed&lt;/span&gt; &lt;span&gt;earlier&lt;/span&gt;​, the grounds for ICANN to not disclose information are vast, and used to deny a large chunk of the  information requests that they receive. How is the hapless requester to  file a meaningful appeal against the outcome of a bad policy, if the  only ground for appeal is non­compliance with the procedure of said bad  policy? This is a serious challenge to transparency as there is no other  way for a requester to acquire information that ICANN may choose to  withold under one of its myriad clauses. It cannot be denied that a good  information disclosure law ought to balance the free  disclosure of  information with the holding back of information that truly needs to be  kept private.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is this writer’s firm opinion that even instances where  information is witheld, there has to be a stronger explanation for the  same, and moreover, an appeals process that does not take into account  substantive issues which might adversely affect the appellant falls  short of the desirable levels of transparency. Global standards dictate  that grounds for appeal need to be broad, so that all failures to apply  the information disclosure law/policy may be remedied.&lt;sup&gt;6&lt;/sup&gt; Various laws across the world relating to information disclosure often  have the following as grounds for appeal: an inability to lodge a  request, failure to respond to a request within the set time frame, a  refusal to disclose information, in whole or in part, excessive fees and  not providing information in the form sought, as well as a catch­all  clause for other failures.&lt;sup&gt;7&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, independent oversight is the heart of a proper appeal mechanism in such situations&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;;  the power to decide the appeal must not rest with those who also have  the discretion to disclose the information, as is clearly the case with  ICANN, where the Board Governance Committee is constituted and appointed  by the ICANN Board itself [one of the bodies against whom a grievance  may be raised].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Suggestions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe ICANN, in keeping with its global, multistakeholder, accountable spirit, should adopt these standards as well, especially now that the transition looms around the corner. Only then will the standards of open, transparent and accountable governance of the Internet ­ upheld by ICANN itself as the ideal ­ be truly, meaningfully realised. Accordingly, the following standards ought to be met with:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Establishment of an independent appeals authority for information disclosure cases&lt;/li&gt;
&lt;li&gt;Broader grounds for appeal of DIDP requests&lt;/li&gt;
&lt;li&gt;Inclusion of disagreement with the substantive content of a DIDP response as a ground for appeal.&lt;/li&gt;
&lt;li&gt;Provision of proper reasoning for any justification of the witholding of information that is necessary in the public interest.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr style="text-align: justify; " /&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Article IV, Section 2, ICANN Bylaws, 2014 ​&lt;i&gt;available at &lt;/i&gt;https://www.icann.org/resources/pages/governance/bylaws­en/#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Copies of the request can be found ​ &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​ and &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Katherine Chekouras, ​&lt;i&gt;Balancing National Security with a Community's Right­to­Know: Maintaining &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Access to Environmental Information Through EPCRA 's Non­Preemption Clause&lt;/i&gt;​, 34 B.C. Envtl. Aff. L. Rev 107, (2007).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Toby Mendel, &lt;i&gt;Freedom of Information: A Comparative Legal Study&lt;/i&gt;​ ​ 151 (2nd edn, 2008).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;​&lt;i&gt;Id&lt;/i&gt;​, at 152&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;3&lt;/sup&gt;4 Available &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​. https://www.icann.org/en/system/files/files/reconsideration­15­22­cis­final­determination­13jan16­en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Mendel, ​&lt;i&gt;supra &lt;/i&gt;​note 6.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion'&gt;https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Geetha Hariharan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-30T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2016-newsletter">
    <title>November 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/november-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the November 2016 newsletter of the Centre for Internet and Society (CIS). &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As we bring in the new year here at CIS, we thank you for your continued interest and support.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Over the course of the previous year, government services and functions became more dependent on information technologies, concerns over cybersecurity and the vulnerability of electronic infrastructure grew, and new developments and challenges arose in the fields of Internet governance and free speech and expression.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the wake of this major year of developments, the work that CIS does is even more important. We look forward to engaging with these and other emerging issues, in 2017 and beyond.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Geethanjali Jujjavarapu and Udbhav Tiwari undertook a high-level literature review&amp;nbsp; of the most commonly used technological tools and processes in the big data life cycle. &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/technology-behind-big-data"&gt;In the research paper&lt;/a&gt; the authors have argued that big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Nirmita Narasimhan in a &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged"&gt;blog post published by Your Story&lt;/a&gt; has thrown light on the various challenges which persons with disabilities have to overcome. She has stressed that promoting use of technology and open source software and imparting training at an early age will go a long way in making students with disabilities self-sufficient and independent.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Government of India's work is not available under free and open licenses as is the case in various other nations. Tito Dutta &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work"&gt;has called upon the Indian government to make its work freely licensed, wherever possible and applicable&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The 33rd WIPO-SCCR was held in Geneva from November 14 - 18, 2016. Anubha Sinha attended the meeting. CIS made its statements on the &lt;a class="external-link" href="http://cis-india.org/a2k/33rd-sccr-cis-statement-on-the-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;GRULAC Proposal for Analysis of Copyright in the Digital Environment&lt;/a&gt; and the &lt;a class="external-link" href="http://cis-india.org/a2k/33rd-sccr-cis-statement-on-the-proposed-treaty-for-the-protection-of-broadcasting-organizations"&gt;Proposed Treaty for the Protection of Broadcasting Organizations&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What if our phones were to go silent? Would you be able to deal with the silence? Nishant Shah has &lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-november-20-2016-digital-native-the-voices-in-our-heads"&gt;explored this in an article&lt;/a&gt; published in the Indian Express.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In a consolidated compilation titled Privacy after Big Data we have put together a series of articles that we have developed as we explore the impacts – positive and negative – of big data. This is a growing body of research that we are exploring and is relevant to multiple areas of our work including privacy and surveillance. CIS has &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/privacy-after-big-data-compilation-of-early-research"&gt;called for comments&lt;/a&gt; for this compilation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The &lt;a class="external-link" href="http://cis-india.org/raw/irc17-selection"&gt;second Internet Researchers' Conference&lt;/a&gt; (IRC17) is scheduled to take place in Bengaluru between March 3 - 5, 2017. From the 23 submitted session proposals CIS will select 10 to be part of the final Conference agenda. The selection will be done through votes casted by the teams that have proposed the sessions. This will take place in December 2016. &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS in the news:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/new-indian-express-november-1-2016-using-kannada-in-technology-made-easier-with-smartphones"&gt;Using Kannada in technology made easier with smartphones&lt;/a&gt; (New Indian Express; November 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/deccan-herald-november-12-2016-delink-icann-from-us-jurisdiction"&gt;'Delink ICANN from US jurisdiction'&lt;/a&gt; (Deccan Herald; November 12, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/cio-november-14-2016-john-riberio-google-facebook-will-not-place-ads-on-sites-distributing-fake-news"&gt;Google, Facebook will not place ads on sites distributing fake news&lt;/a&gt; (John Riberio; IDG News Service and CIO; November 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did"&gt;How The U.K. Got A Better Deal From Facebook Than India Did&lt;/a&gt; (Payaswini Upadhyay; Bloomberg Quint; November 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-peerzada-abrar-november-20-2016-the-thrill-of-saving-india-from-cybercrime"&gt;The thrill of saving India from cybercrime&lt;/a&gt; (Peerzada Abrar; Hindu; November 20, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper"&gt;Free Net advocates flay Trai's public Wi-Fi paper&lt;/a&gt; (Anita Babu; Business Standard; November 20, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/economic-times-arpita-raj-november-21-2016-popular-apps-are-inaccessible-to-millions-of-disabled"&gt;Popular apps are inaccessible to millions of disabled: Study&lt;/a&gt; (Arpita Raj; The Times of India and ET Brand Equity; November 21, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/deccan-herald-november-22-2016-chetana-divya-vasudev-caught-in-a-filter-bubble"&gt;Caught in a filter bubble&lt;/a&gt; (Chethana Divya Vasudev; November 22, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/hindu-businessline-november-27-2016-meera-siva-a-world-apart"&gt;A world apart&lt;/a&gt; (Meera Siva; Hindu Businessline; November 27, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/new-indian-express-november-28-2016-akhila-damodaran-disabled-kid"&gt;Disabled kid? sorry, no admission!&lt;/a&gt; (New Indian Express; November 28, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish"&gt;Guru Gomke is a Stylish Ol Chiki Typeface for India’s Santali Speakers&lt;/a&gt; (AIGA.org; November 29, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;CIS members wrote the following articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired"&gt;Where Are There So Few Books For The Print-Impaired?&lt;/a&gt; (Nirmita Narasimhan; Huffington Post; November 3, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/opensource-november-18-2016-subhashish-panigrahi-4-tips-for-diy-makers"&gt;4 tips for DIY makers&lt;/a&gt; (Subhashish Panigrahi; November 18, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-november-20-2016-digital-native-the-voices-in-our-heads"&gt;Digital native: The Voices in Our Heads&lt;/a&gt; (Nishant Shah; November 20, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/your-story-nirmita-narasimhan-november-24-2016-quest-for-education-persons-with-disabilities-severely-challenged"&gt;The Quest for Education – Persons with Disabilities, Severely Challenged&lt;/a&gt; (Nirmita Narasimhan; Your Story; November 24, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user"&gt;Demonetisation Survey Limits the Range of Feedback that can be Provided by the User&lt;/a&gt; (Udbhav Tiwari; November 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Jobs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS is presently seeking applications for the following positions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/policy-officer-cyber-security"&gt;Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/senior-policy-officer-cyber-security"&gt;Senior Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="internal-link" href="http://cis-india.org/jobs/intern-for-pervasive-technologies-project"&gt;Intern (Pervasive Technologies Project)&lt;/a&gt; - Application accepted throughout the year&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/internship"&gt;Internship&lt;/a&gt; - Application accepted throughout the year&lt;/li&gt;
&lt;li&gt;&lt;a class="internal-link" href="http://cis-india.org/jobs/seeking-survey-participants-for-research-on-musician-livelihood"&gt;Survey Participants for Research on Musician Livelihood&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Copyright &amp;amp; Patent&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/33rd-sccr-opening-statement-by-india-on-behalf-of-the-asia-and-the-pacific-group"&gt;33rd SCCR: Opening Statement by India on behalf of the Asia and the Pacific Group&lt;/a&gt; (Anubha Sinha; November 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/33rd-sccr-cis-statement-on-the-proposed-treaty-for-the-protection-of-broadcasting-organizations"&gt;33rd SCCR: CIS Statement on the Proposed Treaty for the Protection of Broadcasting Organizations&lt;/a&gt; (Anubha Sinha; November 16, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/33rd-sccr-cis-statement-on-the-grulac-proposal-for-analysis-of-copyright-in-the-digital-environment"&gt;33rd SCCR: CIS Statement on the GRULAC Proposal for Analysis of Copyright in the Digital Environment&lt;/a&gt; (Anubha Sinha; November 18, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sambalpur-university-workshop"&gt;Sambalpur University Workshop&lt;/a&gt; (Sambalpur; November 27, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources"&gt;CIIPC-NLUD Workshop on Wikipedia Editing and Open Source Knowledge Sources&lt;/a&gt; (Organized by Centre for Innovation, Intellectual Property, and Competition (CIIPC), National Law university, Delhi; November 11 - 12, 2016). Rohini Lakshané and Tanveer Hasan conducted and facilitated this workshop.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/wikipedia-asian-month-2014-2016-iteration-starts-on-1-november"&gt;Wikipedia Asian Month — 2016 iteration starts on 1 November&lt;/a&gt; (Tito Dutta; November 1, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/100wikidays"&gt;100 Wikidays: The Journey so Far&lt;/a&gt; (Tito Dutta; November 23, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work"&gt;Free Knowledge and Indian Government Work&lt;/a&gt; (Tito Dutta; November 26, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/improving-telugu-village-articles"&gt;Improving Telugu Village Articles&lt;/a&gt; (Pavan Santhosh; November 26, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;&lt;br /&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system"&gt;Conference on the Digitalization of the Indian Legal System&lt;/a&gt; (Leilah Elmokadem; November 16, 2016)&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;Participation in Event&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/industry-consultation-panel-on-data-retention-dsci"&gt;Industry Consultation Panel on Data Retention - DSCI&lt;/a&gt; (Organized by the Data Security Council of India; New Delhi; November 23, 2016). Udbhav Tiwari was a panelist.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;►Big Data&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/privacy-after-big-data-compilation-of-early-research"&gt;Privacy after Big Data: Compilation of Early Research&lt;/a&gt; (Saumyaa Naidu; November 12, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report"&gt;Big Data in India: Benefits, Harms, and Human Rights - Workshop Report&lt;/a&gt; (Vidushi Marda, Akash Deep Singh and Geethanjali Jujjavarapu; November 14, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/cert-ins-proactive-mandate-a-report-on-indian-computer-emergency-response-teams-proactive-mandate-in-indian-cyber-security-ecosystem"&gt;CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem&lt;/a&gt; (Udbhav Tiwari; November 19, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;►Free Speech and Expression&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/if-the-didp-did-its-job"&gt;If the DIDP Did Its Job&lt;/a&gt; (Asvatha Babu; November 3, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/internets-core-resources-are-a-global-public-good"&gt;Internet's Core Resources are a Global Public Good - They Cannot Remain Subject to One Country's Jurisdiction&lt;/a&gt; (Vidushi Marda; November 9, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/how-workstream-2-plans-to-improve-icanns-transparency"&gt;How Workstream 2 Plans to Improve ICANN's Transparency&lt;/a&gt; (Asvatha Babu; November 10, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/icann-begins-its-sojourn-into-open-data"&gt;ICANN Begins its Sojourn into Open Data&lt;/a&gt; (Padmini Baruah and Sumandro Chattapadhyay; November 11, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion"&gt;Navigating the 'Reconsideration' Quagmire&lt;/a&gt; (A Personal Journey of Acute Confusion).&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/icann-57-hyderabad"&gt;ICANN 57&lt;/a&gt; (Organized by Ministry of Electronics &amp;amp; Information Technology, Government of India; Hyderabad International Convention Centre; November 3 - 9, 2016). Vidushi Marda was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/10th-nlsir-symposium-regulating-e-commerce-in-india"&gt;10th NLSIR Symposium - Regulating E-Commerce in India&lt;/a&gt; (Organized by National Law School of India University, Bengaluru; November 27, 2016). Vidushi Marda was a panelist.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/irc17-selection"&gt;Internet Researchers' Conference 2017&lt;/a&gt; (IRC17) - Selection of Sessions (Sumandro Chattapadhyay; November 16, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/cisxscholars-delhi-william-f-stafford-thursday-nov-03"&gt;CISxScholars Delhi - William F. Stafford&lt;/a&gt; (CIS; New Delhi; November 3, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;strong&gt;----------------------------------- &lt;/strong&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2016-newsletter'&gt;https://cis-india.org/about/newsletters/november-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Newsletter</dc:subject>
    

   <dc:date>2017-02-06T12:52:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work">
    <title>Free Knowledge and Indian Government Work</title>
    <link>https://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work</link>
    <description>
        &lt;b&gt;Indian Government works are not available under free and open licenses. On the other hand a large number countries such as Argentina, Australia, Austria, Brazil, Bulgaria, Canada, Chile, Czech Republic,  France, Germany, Greece, Guatemala, Israel, Macedonia, Mexico, New Zealand, Poland, Serbia, Spain, Taiwan, Ukraine, United Kingdom, Venezuela etc. have adopted the Creative Commons and other free licenses. The works by the US Federal Government automatically go into public domain. This article promotes the idea that the Government works should be freely licensed, wherever possible and applicable.&lt;/b&gt;
        
&lt;h2 align="center"&gt;Part 1: Free Knowledge&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Free knowledge movement is a worldwide movement that creates and tries to get works under free and open licenses. It claims that knowledge is a common human property, and must be easily,&amp;nbsp; freely accessible.&lt;/p&gt;
&lt;p&gt;While discussing the topic "Access to knowledge: a basic human right", American scientist and researcher Jack Andraka &lt;a class="external-link" href="https://creativecommons.org/2014/01/07/access-to-knowledge-a-basic-human-right/"&gt;feels&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;Access to knowledge is, you know, a basic human right. Knowledge should not be commoditized; it wants to be free.&lt;/blockquote&gt;
&lt;p&gt;The &lt;em&gt;Open Definition&lt;/em&gt; defines the term “Open Knowledge” in &lt;em&gt;Open Definition 2.0&lt;/em&gt; as:&lt;/p&gt;
&lt;blockquote&gt;"Knowledge is open if anyone is free to access, use, modify, and share it — subject, at most, to measures that preserve provenance and openness."&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;All open content must be a) available under free licenses, b) accessible as a whole, and c) should be in open format (see &lt;a class="external-link" href="http://opendefinition.org/od/2.0/en/"&gt;more details&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A big name in the world of free content is (of course) &lt;a class="external-link" href="https://www.wikipedia.org/"&gt;Wikipedia&lt;/a&gt;, where you can use, share, remix content from the site under the &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Text_of_Creative_Commons_Attribution-ShareAlike_3.0_Unported_License"&gt;Creative Commons licenses&lt;/a&gt;. There are many organizations, networks and groups working to get more and more content under free and open licenses such as Creative Commons (text, audio, video, image), Free and Open Source Software or FOSS (software), Open design principle (machine, engineering), Open Access (academic works) etc.&lt;/p&gt;
&lt;p&gt;Article 26 of the &lt;a class="external-link" href="http://www.un.org/en/universal-declaration-human-rights/"&gt;Universal Declaration of Human Rights&lt;/a&gt; suggests that education should be free. Right to information is also a human right and Article 27 of the declaration states:&lt;/p&gt;
&lt;blockquote&gt;(1) Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits.&lt;br /&gt;(2) Everyone has the right to the protection of the moral and material interests resulting from any scientific, literary or artistic production of which he is the author.&lt;/blockquote&gt;
&lt;p&gt;These are just not possible unless knowledge /information is easily and preferably freely accessible to everyone without restrictions. If the first barrier is accessibility, i.e, not having enough digital content or information or content behind paywall, then the second barrier is its openness. Just having access to some web pages is not enough, it also requires rights like free using, sharing, remixing, Unrestricted content can be utilized in the best way.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 align="center"&gt;Part 2: Indian Government Work&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Indian Government websites are not freely licensed. In section 2(k) of Indian Copyright Act, 1957 the meaning of “Government work” is explained:&lt;/p&gt;
&lt;blockquote&gt;"Government work" means a work which is made or published by or under the direction or control of—&lt;br /&gt;(i) the Government or any department of the Government;&lt;br /&gt;(ii) any Legislature in India;&lt;br /&gt;&amp;nbsp;. . .&lt;br /&gt;
&lt;div align="right"&gt;Read Indian Copyright Act, section 2(c) &lt;a class="external-link" href="https://indiankanoon.org/doc/1273687/"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;Indian Copyright Act section 17(d) informs about the “First owner of copyright” of a Government work:&lt;/p&gt;
&lt;blockquote&gt;in the case of a Government work, Government shall, in the absence of any agreement to the contrary, be the first owner of the copyright therein;&lt;br /&gt;
&lt;div align="right"&gt;Read section 17(d) &lt;a class="external-link" href="https://indiankanoon.org/doc/1684400/"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;Section 28 is about “Term of copyright in Government works”. It states:&lt;/p&gt;
&lt;blockquote&gt;In the case of Government work, where Government is the first owner of the copyright therein, copyright shall subsist until [sixty years] from the beginning of the calendar year next following the year in which the record is first published.—In the case of Government work, where Government is the first owner of the copyright therein, copyright shall subsist until [sixty years] from the beginning of the calendar year next following the year in which the record is first published."&lt;br /&gt;
&lt;div align="right"&gt;Read section 28 &lt;a class="external-link" href="https://indiankanoon.org/doc/176237/"&gt;here&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;
Section 52 of the act allows some “fair use” and informs how content can be used for research, education, review, criticism and some other purpose. The lengthy copyright section may be read &lt;a class="external-link" href="https://indiankanoon.org/doc/1013176/"&gt;here&lt;/a&gt;. However, it does not make the content free. You are not allowed to remix the work or use for commercial purpose. You can not freely use, modify, distribute it.&lt;/p&gt;
&lt;p&gt;Now let’s have a look at a few Government websites and their license details pages.&lt;/p&gt;
&lt;h3 align="center"&gt;Indian Prime Minister’s official website&lt;/h3&gt;
&lt;div align="center"&gt;(&lt;a class="external-link" href="http://www.pmindia.gov.in/en/website-policies"&gt;http://www.pmindia.gov.in/en/website-policies&lt;/a&gt;)&lt;/div&gt;
&lt;p&gt;In this website the copyright policy page informs:&lt;/p&gt;
&lt;blockquote&gt;Material featured on this website may be reproduced free of charge. However, the material has to be reproduced accurately and not to be used in a derogatory manner or in a misleading context. Wherever the material is being published or issued to others, the source must be prominently acknowledged. However, the permission to reproduce this material shall not extend to any material which is identified as being copyright of a third party. Authorisation to reproduce such material must be obtained from the department/copyright holder concerned.&lt;/blockquote&gt;
&lt;p align="left"&gt;&amp;nbsp;A screenshot may be seen below:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/a2k/blogs/PMIndia.jpg/image_large" alt="PMIndia website copyright policy" class="image-inline" title="PMIndia website copyright policy" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Here-&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;“Wherever the material is being published or issued to others, the source must be prominently acknowledged.” -- this part of the policy is similar to the Creative Commons licenses, where the owner or author of a work must be given attribution.&lt;/li&gt;&lt;/ul&gt;
but,
&lt;ul&gt;&lt;li&gt;“has to be reproduced accurately” -- it prohibits remix or modification works, &lt;/li&gt;&lt;li&gt;“not to be used in a derogatory manner” -- it is unclear that what is “derogatory manner”! Can it be used for criticism? &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;strong&gt;Indian Vice President’s official website&lt;/strong&gt;&lt;br /&gt;(&lt;a class="external-link" href="http://vicepresidentofindia.nic.in/website-policies"&gt;http://vicepresidentofindia.nic.in/website-policies&lt;/a&gt;)&lt;/p&gt;
&lt;p align="left"&gt;This is similar to the Prime Minister’s website policy and does not allow remix, commercial use etc. See screenshot:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/a2k/blogs/VicePresident.jpg/image_large" alt="Indian Vice President website copyright policy" class="image-inline" title="Indian Vice President website copyright policy" /&gt;&lt;/p&gt;
&lt;div align="center"&gt;&lt;strong&gt;Indian President’s official website&lt;/strong&gt;&lt;br /&gt;(&lt;a class="external-link" href="http://presidentofindia.gov.in/copyright-policy.htm"&gt;http://presidentofindia.gov.in/copyright-policy.htm&lt;/a&gt;)&lt;/div&gt;
&lt;p&gt;Although the Vice President’s website allows some fair use, the Indian President’s official web portal’s license is different and does not allow to reproduce the work “partially or fully”. The copyright policy states:&lt;/p&gt;
&lt;blockquote&gt;This contents of this website may not be reproduced partially or fully, without due permission from The President of India, If referred to as a part of another publication, the source must be appropriately acknowledged. The contents of this website can not be used in any misleading or objectionable context.&lt;/blockquote&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/a2k/blogs/President.jpg/image_preview" alt="Indian President website copyright policy" class="image-inline" title="Indian President website copyright policy" /&gt;&lt;/p&gt;
&lt;p&gt;We have shown 3 example above, but it is more or less similar in all government web portals.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 align="center"&gt;Part 3: Government works &lt;span class="st"&gt;— Worldwide&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;It might be interesting to note that unlike India, a large number of countries publish their Government works under open licenses or public domain. We’ll discuss only a few here:&lt;/p&gt;
&lt;h3 align="center"&gt;United States&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;The works by the US Federal Government automatically go into public domain. &lt;/li&gt;&lt;li&gt;The &lt;a class="external-link" href="https://www.whitehouse.gov/copyright"&gt;White House website&lt;/a&gt; and third party content such as text or speeches by the first lady are licensed under CC SA 3.0 US license. U.S. &lt;/li&gt;&lt;li&gt;On 18 June, 2013, Barack Obama and other G7 leaders endorsed the Open Data Charter. Open Data Action plan is licensed under CC0.&lt;/li&gt;&lt;li&gt;Several other works such as works created by New York State Senate, works created by the State of Virginia are also under different creative commons licenses. Details may be seen &lt;a class="external-link" href="https://wiki.creativecommons.org/wiki/Government_use_of_Creative_Commons#United_States"&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 align="center"&gt;United Kingdom&lt;/h3&gt;
&lt;p&gt; In the United Kingdom, Open Government License (OGL) is used for Crown Copyright works published by the UK government. Since 2001, some works by the UK government were available under the Click-Use license. This license was replaced by OGL in 2010. The first version of OGL was released on 30 September 2010. OGL is compatible with the CC licenses. OGL allows to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;copy, publish, distribute and transmit the Information, &lt;/li&gt;&lt;li&gt;adapt the Information, &lt;/li&gt;&lt;li&gt;exploit the Information commercially and non-commercially for example, by combining it with other Information, or by including it in your own product or application.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;However,&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Attribution must be given to with source link, which is similar to the creative commons licenses.&lt;/li&gt;&lt;li&gt;Some documents such as the British passport, military insignia, property rights, including patents, trademarks, and design rights, personal information in data don’t come under OGL.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;More about the Open Government License may be seen &lt;a class="external-link" href="http://www.nationalarchives.gov.uk/doc/open-government-licence/version/2/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 align="center"&gt;France&lt;br /&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;France government’s website&lt;a class="external-link" href="http://www.gouvernement.fr/"&gt; http://www.gouvernement.fr/&lt;/a&gt; is licensed under the CC BY-NC-ND 3.0 FR license. The English version of the policy page may be seen &lt;a class="external-link" href="http://www.gouvernement.fr/en/terms-and-conditions"&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;France government’s cultural department’s website &lt;a class="external-link" href="http://www.culture.fr/"&gt;http://www.culture.fr/&lt;/a&gt; is licensed under CC BY-SA 3.0 FR.&lt;/li&gt;&lt;li&gt;The Culture Communication website &lt;a class="external-link" href="http://www.culturecommunication.gouv.fr/"&gt;http://www.culturecommunication.gouv.fr/&lt;/a&gt; is also licensed under CC BY-SA 3.0 FR.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 align="center"&gt;Russian Federation&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Content of the website &lt;a class="external-link" href="http://kremlin.ru"&gt;http://kremlin.ru&lt;/a&gt; are under the Creative Commons Attribution 4.0 International. License policy page may be seen &lt;a class="external-link" href="http://en.kremlin.ru/about/copyrights"&gt;here&lt;/a&gt;. Many other Russian government works are under different open licenses, details may be seen &lt;a class="external-link" href="https://wiki.creativecommons.org/wiki/Government_use_of_Creative_Commons#Russian_Federation"&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 align="center"&gt;Netherlands&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;The Dutch government official website&lt;a class="external-link" href="http://www.rijksoverheid.nl/"&gt; http://www.rijksoverheid.nl/&lt;/a&gt;&amp;nbsp; is licensed under CC 0. All content of this website is under public domain, unless any other license is specified.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 align="center"&gt;Bulgaria&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
The President of Bulgaria’s official website &lt;a class="external-link" href="https://www.president.bg/"&gt;https://www.president.bg/&lt;/a&gt; is licensed under CC BY ND 2.5 Bulgaria.
&lt;/li&gt;&lt;/ul&gt;
&lt;h3 align="center"&gt;Croatia&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;
Croatian Government website &lt;a class="external-link" href="http://otvorenikod.nsk.hr/"&gt;http://otvorenikod.nsk.hr/&lt;/a&gt; is licensed under CC BY SA 3.0 Croatia.

&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="center"&gt;&lt;strong&gt;The Long list&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;span class="visualHighlight"&gt;More than 30 countries have adopted and publishing their works under the Creative Commons and other free licenses. Other the above mentioned countries, the list include countries like Argentina, Australia, Austria, Brazil, Bulgaria, Canada, Chile, Czech Republic, Georgia, Greece, Guatemala, Israel, Macedonia, Mexico, New Zealand, Poland, Serbia, Spain, Taiwan, Ukraine, Venezuela etc. Other than the counties, several international organizations such as the World Bank, Inter-American Development Bank, European Organization for Nuclear Research (CERN) endorsed the free license concept and have adopted the same. See a long list of countries using free licenses &lt;strong&gt;&lt;a class="external-link" href="https://wiki.creativecommons.org/wiki/Government_use_of_Creative_Commons"&gt;here&lt;/a&gt;&lt;/strong&gt;.&lt;/span&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="center"&gt;Last line&lt;/h2&gt;
&lt;p&gt;It is unfortunate that the Indian Government works are not under free licenses, however it would be great if the Government rethinks and relicense their general content under the free licenses. This will help not only the movement, but the content itself can be utilized in a much better and broader way.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work'&gt;https://cis-india.org/a2k/blogs/free-knowledge-and-indian-government-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tito</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>freedominfeb</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-06-28T10:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/improving-telugu-village-articles">
    <title>Improving Telugu Village Articles</title>
    <link>https://cis-india.org/a2k/blogs/improving-telugu-village-articles</link>
    <description>
        &lt;b&gt;Telugu wikipedians on 6 October 2016 held a discussion on improving the quality of Telugu articles. The event was organized by IIIT, Hyderabad, CIS-A2K and OpenGeo.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A possible collaboration between Wikipedia and free and open source enthusiasts and environmental groups was explored at the meeting. Subodh Kulkarni and Pavan Santhosh made a presentation about Wikipedia. The participants were from different groups such as SOUL (Save Our Urban Lakes), OpenGeo.org (organization that works for open source mapping) and Sweccha (organization working to expand free software movement in Telangana and Andhra Pradesh).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Prof. Madhav Gadgil moderated a discussion on how these organizations could collaborate for different Wikimedia projects. The discussion primarily revolved around improving ongoing Telugu village articles.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Prof. Gadgil stressed on compiling articles using reliable and verifiable sources. He also urged the participants to upload geo-tagged photos to Commons especially photos of lakes of which the authorities have denied existence. The discussion also focused on the synergy between OpenGeo and Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Post-lunch, Prof. Gadgil delivered a lecture on “Human Knowledge: An Evolutionary Perspective in IIT”. Prof. Gadgil explained that the next big leap in evolution of human knowledge is free knowledge in which everyone can contribute and utilize which was Wikipedia. He urged the scholars and students to contribute to Wikipedia which is the future for knowledge society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Telugu and English wikipedians including Vinay, Lubna Sarwath, Undavalli Ravikumar, Raju and many more participated in the event.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/improving-telugu-village-articles'&gt;https://cis-india.org/a2k/blogs/improving-telugu-village-articles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pavan Santhosh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-11-26T02:27:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user">
    <title>Demonetisation Survey Limits the Range of Feedback that can be Provided by the User</title>
    <link>https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user</link>
    <description>
        &lt;b&gt;The government has faced increasingly targeted attacks by the Opposition and the public on the merits of the demonetisation move carried out a fortnight ago. In an attempt to placate this ire and to create a feedback loop that directly engages with the public, the government has decided to conduct a mass survey to gauge public perception. The survey is hosted on the Narendra Modi mobile application that can be found on the Android and iOS app stores. This article will attempt to analyse the mobile application by looking at the design principles followed in the survey and the scope given to survey takers to express their true opinion of the demonetisation move.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/india/how-narendra-modis-survey-limits-the-range-of-feedback-that-can-be-provided-by-user-3121948.html"&gt;published by First Post&lt;/a&gt; on November 24, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At the time of writing, &lt;a href="http://www.firstpost.com/india/demonetisation-despite-fortnight-of-hardship-cash-strapped-india-stands-by-modi-3121690.html" target="_blank"&gt;90 percent of respondents&lt;/a&gt; expressed the feeling that the government's move was 'brilliant/nice'.  However, one must look into the merits of the survey and its limitations  to understand the true value and nature of the results of the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first step required in order to take the survey, is  downloading the application itself, which forces the user to  automatically grant access to Contacts, Phone and Storage functions of  their phone. While there are ostensible reasons for these permissions,  (sharing the data from within the application, storing downloaded  information, etc.) unless the user is running Android 6.0 or above, the  user doesn’t have a choice in giving these permissions. This leaves the  application with the potential to collect the entire phone book of the  user as as well as access any files stored on the user’s device. This is  independent of the survey and provides a large scope for massive data  collection from any user just choosing to install the application in the  first place. It is easily possible to create a version of the  application that carries out a vast majority of its current functions  without these permissions and the government (along with the application  developer) should endeavour to do so at the earliest. In the  alternative, they should have a clear and distinct privacy policy that  informs users of the data collection and its possible use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  second major step required to take the survey is the long and tedious  registration process, which requires all sorts of details with massive  privacy implications. This includes the name, email ID, phone number,  residency details, profession and interests, all of which are compulsory  fields. Why all of these details are necessary to take a supposedly  simple survey and what possible use this information can be put to by  the government is both unclear and problematic. It is also possible to  register using Google, Facebook, Twitter and other social networking  sites where there is a varying standard of equally private and  unnecessary information that is being collected by the application from  these websites. There are no privacy notices or consent forms that  govern this information collection nor is their any indication of how  this information will be put to use beyond the scope of the survey. The  generic, standard form privacy policy (less than 10 lines long) on the &lt;a class="auto-link" href="http://www.firstpost.com/topic/person/narendra-modi-profile-20711.html" target="_blank" title="Narendra Modi"&gt;Narendra Modi&lt;/a&gt; website is hidden at the bottom of the application download page (not  in the application itself) and leaves a lot to be desired to safeguard  user interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the registration is complete, the  user is presented with the survey, which has a total of 10 questions of 3  broad categories. 6 of these questions have multiple choice answers, 3  of them have a sliding rating meter and 1 question has general  comments/suggestion page.  The article will now look at these categories  and analyze the design of the questions, the extent of the choice they  give to the users and finally if the survey has a coercive or limiting  effect on the feedback that can be given by the user via the application  regarding the demonetisation move.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122038" style="text-align: justify; "&gt;&lt;a href="http://s4.firstpost.in/wp-content/uploads/2016/11/Choice_Limiting_Namo.jpg"&gt;&lt;img width="825" alt="Choice limiting multiple=" title="Demonetisation Survey Limits the Range of Feedback that can be Provided by the User" src="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Choice limiting multiple choice questions.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The  first category of questions, the multiple choice questions (MCQ), have  varying degree of choices that the user can select from. However,  regardless of the extent of the choices, their exact nature is severely  limiting and makes it almost impossible to express a truly negative  opinion of the survey. This is done in two ways, first the explicit  restriction of choices and second the more subtle negative colouring of  responses by cleverly phrasing questions. An example of the explicit  restriction of choices can be seen in Question No 7. “Demonetisation  will bring  real estate, higher education, healthcare in common man’s  reach” which has three options, “Completely Agree, Partially Agree and  Can’t Say.” There is no option to disagree with the paradigm set by the  question and neither is there an option for the user to further explain  or elucidate upon the answer, if he/she choose Can’t Say as an option.  This also means that there will be no answers that will have “No” as an  answer to the fairly open ended question, which can have a myriad of  responses. The same can be said for Question No. 6 regarding the  demonetisation move’s effectiveness in curbing illegal activities to  which, once again, “No” is not an answer, with “Don’t Know” being the  best a user disagreeing can do with the survey question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  second, more subtle aspect of the MCQ questions are questions that  serve as bait to demand a positive answer, which can be used to later  bolster the survey's results in a positive light. For example, Question  No. 1 reads “Do you think Black Money exists in India” and Question No. 2  reads “Do you think the evil of Corruption &amp;amp; Black Money needs to  be fought and eliminated?” both of which have simple “Yes” and “No” as  the only two possible responses. These rhetorical questions, which  demand a positive answer, provide almost no aspect for the user to  subtly or explicitly disagree with motivating factor behind the  demonetisation move. The placement of these questions and the lack of  choice in responses that can be given to them leaves huge potential to  tilt the survey results in the favour of the government’s move. For  example, you can’t simultaneously agree that black money is a problem  and think the demonetisation move is a bad idea, simply because you  can’t express that view in a single question within the survey.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122056" style="text-align: justify; "&gt;&lt;a href="http://s3.firstpost.in/wp-content/uploads/2016/11/Positive-bias.jpg"&gt;&lt;img width="825" alt="Positive bias driven multiple=" title="Demonetisation Survey Limits the Range of Feedback that can be Provided by the User" src="https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Positive bias driven multiple choice question.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The  other two categories of questions do not suffer from the overt problems  of encouraging positive bias that the MCQ questions do but leave a fair  bit to be desired in their outlook towards individuals who disagree  with the move. In the sliding rating meter questions, there are strong  visual cues that hint that disagreeing with the demonetisation move is a  negative, undesirable idea. They do so by using a large, danger red  frown as the icon for Question No. 5 that asks for the survey takers  opinion on the ban on old 500 and 1000 rupee notes. The same goes for  Question No. 3 that deals with the general moves of the government to  tackle black money. This makes any opinion or answer that disagrees with  the validity of the move an answer that is portrayed in a negative  light. Similarly, the general comments/suggestion section in Question  No. 10 is the only place for anyone to express a negative or  non-concurring opinion, which there is no way to measure statistically  in the overall survey results and will mostly likely not be counted in  the final survey results.&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_3122120" style="text-align: justify; "&gt;&lt;a href="http://s1.firstpost.in/wp-content/uploads/2016/11/Jan_Jan.jpg"&gt;&lt;img alt="Visual cues. " class="wp-image-3122120 size-full" height="500" src="http://s1.firstpost.in/wp-content/uploads/2016/11/Jan_Jan.jpg" width="825" /&gt;&lt;/a&gt;
&lt;p class="wp-caption-text"&gt;Visual cues.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;All  of the above points clearly show that the design of both the Narendra  Modi mobile application and its survey have huge potential for coercing a  biased viewpoint upon any  survey taker and ensure that it is almost  possible to express a stark, negative opinion against the demonetisation  move via the survey. This can and should be remedied by the government  to allow for a more open, conducive and critical discourse to take place  regarding the move among the public. It is only when such opinion is  allowed to exist in the first place, that the government can understand,  engage and respond to the various valid critiques of the move. The  chilling effect that would take place in the current form of the survey  would be counterproductive to the original intent behind its creation,  which was to create a direct constructive feedback loop between the  public and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user'&gt;https://cis-india.org/internet-governance/blog/first-post-udbhav-tiwari-november-24-2016-demonetisation-survey-limits-the-range-of-feedback-that-can-be-provided-by-the-user&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-24T14:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources">
    <title>CIIPC-NLUD Workshop on Wikipedia Editing and Open Source Knowledge Sources</title>
    <link>https://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources</link>
    <description>
        &lt;b&gt;Centre for Innovation, Intellectual Property, and Competition (CIIPC), National Law university, Delhi as part of its Open Science Project, had organised WikiEdit2016 a two day workshop regarding orientation on editing Wikipedia and hands-on-training session. The event was organized on November 11 and 12, 2016 at National Law University in New Delhi.&lt;/b&gt;
        &lt;p&gt;Rohini &lt;span class="st"&gt;Lakshané&lt;i&gt; &lt;/i&gt;&lt;/span&gt;and Tanveer Hasan conducted and facilitated this workshop.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this workshop was to introduce students to diverse aspects of open knowledge resources and to motivate them to move beyond passive consumption of knowledge and become active producers of knowledge. The participants were briefed about the editing activity earlier, because of which they had come prepared with references for the topic that they had earlier selected. We hope that this group (20 students with majority women editors) would continue to edit Wikipedia with thematic (law) focus and contribute further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More details on the workshop can be &lt;a class="external-link" href="http://ciipc.org/events/wikiedit2016"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/CIIPC1.jpg/@@images/732b200b-ad0f-4a68-9ea5-4f50ef8662a6.jpeg" title="CIIPC 1" height="228" width="300" alt="CIIPC 1" class="image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/CIIPC4.JPG/@@images/cf7fbf01-6c85-4a6d-a3b5-f894dc9fb80e.jpeg" title="CIIPC 4" height="221" width="387" alt="CIIPC 4" class="image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CIIPC2.jpg/@@images/de4c81c2-8f60-47b2-b045-315a0dee429c.jpeg" title="CIIPC 2" height="228" width="303" alt="CIIPC 2" class="image-inline" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CIIPC3.JPG/@@images/73a1ba75-421d-4153-84c8-9af62fd70e3c.jpeg" title="CIIPC 3" height="219" width="391" alt="CIIPC 3" class="image-inline" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Photo courtesy: Prof. Arul George Scaria, National Law University, Delhi.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources'&gt;https://cis-india.org/a2k/news/ciipc-nlud-workshop-on-wikipedia-editing-and-open-source-knowledge-sources&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-11-23T08:04:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/news/indian-television-november-21-2016-net-subs-grow-significantly-but-public-wifi-idea-delayed">
    <title>Net subs grow significantly but public Wi-Fi idea flayed</title>
    <link>https://cis-india.org/telecom/news/indian-television-november-21-2016-net-subs-grow-significantly-but-public-wifi-idea-delayed</link>
    <description>
        &lt;b&gt;Even as internet subscribers are growing significantly across Indian states, TRAI's idea of public Wi-Fi has been flayed by stakeholders.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.indiantelevision.com/regulators/trai/net-subs-grow-significantly-but-public-wi-fi-idea-flayed-161121"&gt;published by Indian Television&lt;/a&gt; on November 21, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Maharashtra has recorded the highest number of internet subscribers in  India at 29.47 million, followed by Tamil Nadu, Andhra and Karnataka in  that order, according to government data. At the end of March 2016,  India had a total of 342.65 million subscribers. BharatNet project  meantime plans to connect all 2.5 lakh gram panchayats in the country  through broadband.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Delhi had registered 20.59 million internet users, while Kolkata and  Mumbai recorded 9.26 million and 15.65 million, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tamil Nadu recorded 28.01 million subscribers, while the neighbouring  states of Andhra Pradesh and Karnataka respectively registered 24.87  million and 22.63 million. Himachal Pradesh saw the lowest number of  subscribers at 3.02 million.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the over 342 million subscribers, over 67 per cent are from urban  India. At the end of FY16, the rural internet subscriber base stood at  111.94 million. Tamil Nadu recorder the highest number of urban  subscribers at 21.16 million, while UP (East) telecom circle is ahead in  terms of rural internet customer base at 11.21 million.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public Wi-Fi condemned&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Telecom stakeholders recommending an open and cheap internet have raised  concerns over privacy and regulatory hurdles following the release of  TRAI's consultation paper on public Wi-Fi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet Freedom Foundation co-founder Aravind Ravi Sulekha was  apprehensive that the proposed regulations could lead to invasion of  privacy and interfere with the freedom of hotspot providers to operate  freely. The proposals may turn out to be regressive, Sulekha said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI proposed hotspot providers would have to register with the  government and users could access hotspots only after paying using a  service tied to their Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society policy director Pranesh Prakash said  that TRAI solution was a classic example of over-regulation and  centralism. It turns out that TARI was unclear about the problem to be  solved, he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/indian-television-november-21-2016-net-subs-grow-significantly-but-public-wifi-idea-delayed'&gt;https://cis-india.org/telecom/news/indian-television-november-21-2016-net-subs-grow-significantly-but-public-wifi-idea-delayed&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    

   <dc:date>2016-11-21T13:55:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper">
    <title>Free Net advocates flay Trai's public Wi-Fi paper </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper</link>
    <description>
        &lt;b&gt;Stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article by Anita Babu was &lt;a class="external-link" href="http://www.business-standard.com/article/companies/free-net-advocates-flay-trai-s-public-wi-fi-paper-116111900644_1.html"&gt;published in the Business Standard&lt;/a&gt; on November 20, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Telecom+Regulatory+Authority+Of+India" target="_blank"&gt;Telecom Regulatory Authority of India &lt;/a&gt;releasing its consultation paper on public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;this week, stakeholders vouching for a cheap and open Internet have flagged concerns over privacy and regulatory hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;has  pointed out that the proposed regulations might lead to invasion of  privacy and interfere with the freedom of hotspot providers to operate  freely.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we welcome Trai’s vision that increasing the number of public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots  could be the way to bringing the majority of Indians online, the  proposals turn out to be regressive and poorly thought out,” said  Aravind Ravi Sulekha, co-founder of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulator in its consultation paper issued earlier this week  proposed hotspot providers would have to register with the government  and users could access hotspots only after paying using a service tied  to their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number. It wants to utilise Aadhaar, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Electronic-know+Your+Customer" target="_blank"&gt;electronic-Know Your Customer &lt;/a&gt;(e-KYC) and the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Unified+Payment+Interface" target="_blank"&gt;Unified Payment Interface &lt;/a&gt;(UPI) to build a standard authentication mechanism for access to public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;in India. While the aim of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is to increase the number of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;hotspots in India, proponents of free Internet fear these proposed rules might have a contrary effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hotspot providers will have to incur costs on account of hardware  installations for one-time password verification in addition to the  costs of sending out the passwords. This might discourage  entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This system of verification makes it harder for entrepreneurs to set  up hotspots and for people to access them. It is impossible for  broadband to proliferate in any significant way if &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;insists on applying ineffective and cumbersome regulations on those who wish to set up their own hotspots,” &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Internet+Freedom+Foundation" target="_blank"&gt;Internet Freedom Foundation &lt;/a&gt;said in its comments to Trai’s consultation paper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals have excluded individuals who do not have an &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;account  from accessing public Wi-Fi. “This not only brings concerns of costs  and exclusion but also privacy, given the constitutionality of the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;project, and its government-mandated use, is pending adjudication in the Supreme Court,” the foundation pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposals also come at the cost of anonymity. The foundation,  cofounded by the crusaders of last year’s SaveTheInternet campaign,  trashed the argument that imposing eKYC norms would help in countering  terrorism and other crimes. “This prohibition on anonymous communication  is a violation of Indians’ freedom of expression… making a call at a  PCO, sending a telegram and posting a letter have always been possible  without showing ID — even though criminals and terrorists occasionally  abused these services… KYC measures are ineffective in preventing crime  and terrorism, as tools like VPNs, TOR, and proxies can easily mask the  identity of an Internet user,” it stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The solution proposed by &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is a classic example of centralism and over-regulation. It turns out that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;is  unclear about the problem to be solved,” said Pranesh Prakash, policy  director at the Centre for Internet and Society. He added that the new  proposals had also failed to address the limitations on foreigners or  tourists in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Current regulations prevent foreigners without a local mobile number from accessing public &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Wi-fi" target="_blank"&gt;Wi-Fi &lt;/a&gt;connections. While &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;had identified the problem, it failed to come up with a plausible solution.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper'&gt;https://cis-india.org/internet-governance/news/business-standard-november-20-2016-anita-babu-free-net-advocates-flay-trais-public-wifi-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-20T03:21:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf">
    <title>CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem</title>
    <link>https://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf'&gt;https://cis-india.org/internet-governance/files/cert-ins-proactive-mandate.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-19T04:03:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report">
    <title>Big Data in India: Benefits, Harms, and Human Rights - Workshop Report</title>
    <link>https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society held a one-day workshop on “Big Data in India: Benefits, Harms and Human Rights” at India Habitat Centre, New Delhi on the 1st of October, 2016.  This report is a compilation of the the issues discussed, ideas exchanged and challenges recognized during the workshop. The objective of the workshop was to discuss aspects of big data technologies in terms of harms, opportunities and human rights. The discussion was designed around an extensive study of current and potential future uses of big data for governance in India, that CIS has undertaken over the last year with support from the MacArthur Foundation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contents&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#1"&gt;&lt;strong&gt;Big Data: Definitions and Global South Perspectives&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#2"&gt;&lt;strong&gt;Aadhaar as Big Data&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#3"&gt;&lt;strong&gt;Seeding&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#4"&gt;&lt;strong&gt;Aadhaar and Data Security&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#5"&gt;&lt;strong&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#6"&gt;&lt;strong&gt;The Myths surrounding Aadhaar&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#7"&gt;&lt;strong&gt;IndiaStack and FinTech Apps&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#8"&gt;&lt;strong&gt;Problems with UID&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;Big Data: Definitions and Global South Perspectives&lt;/h2&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;“Big Data” has been defined by multiple scholars till date. The first consideration at the workshop was to discuss various definitions of big data, and also to understand what could be considered Big Data in terms of governance, especially in the absence of academic consensus. One of the most basic ways to define it, as given by the National Institute of Standards and Technology, USA, is to take it to be the data that is beyond the computational capacity of current systems. This definition has been accepted by the UIDAI of India. Another participant pointed out that Big Data is not only indicative of size, but rather the nature of data which is unstructured, and continuously flowing. The Gartner definition of Big Data relies on the three Vs i.e. Volume (size), Velocity (infinite number of ways in which data is being continuously collected) and Variety (the number of ways in which data can be collected in rows and columns).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The presentation also looked at ways in which Big Data is different from traditional data. It was pointed out that it can accommodate diverse unstructured datasets, and it is ‘relational’ i.e. it needs the presence of common field(s) across datasets which allows these fields to be conjoined. For e.g., the UID in India is being linked to many different datasets, and they don’t constitute Big Data separately, but do so together. An increasingly popular definition is to define data as “Big Data” based on what can be achieved through it. It has been described by authors as the ability to harness new kinds of insight which can inform decision making. It was pointed out that CIS does not subscribe to any particular definition, and is still in the process of coming up with a comprehensive definition of Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Further, discussion touched upon the approach to Big Data in the Global South. It was pointed out that most discussions about Big Data in the Global South are about the kind of value that it can have, the ways in which it can change our society. The Global North, on the other hand, &amp;nbsp;has moved on to discussing the ethics and privacy issues associated with Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;After this, the presentation focussed on case studies surrounding key Central Government initiatives and projects like Aadhaar, Predictive Policing, and Financial Technology (FinTech).&lt;/p&gt;
&lt;h2 id="2"&gt;Aadhaar as Big Data&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In presenting CIS’ case study on Aadhaar, it was pointed out that initially, Aadhaar, with its enrollment dataset was by itself being seen as Big Data. However, upon careful consideration in light of definitions discussed above, it can be seen as something that enables Big Data. The different e-governance projects within Digital India, along with Aadhaar, constitute Big Data. The case study discussed the Big Data implications of Aadhaar, and in particular looked at a ‘cradle to grave’ identity mapping through various e-government projects and the datafication of various transaction generated data.&lt;/p&gt;
&lt;h2 id="3"&gt;Seeding&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Any digital identity like Aadhaar typically has three features: 1. Identification i.e. a number or card used to identify yourself; 2. Authentication, which is based on your number or card and any other digital attributes that you might have; 3. Authorisation: As bearers of the digital identity, we can authorise the service providers to take some steps on our behalf. The case study discussed ‘seeding’ which enables the Big Data aspects of Digital India. In the process of seeding, different government databases can be seeded with the UID number using a platform called Ginger. Due to this, other databases can be connected to UIDAI, and through it, data from other databases can be queried by using your Aadhaar identity itself. This is an example of relationality, where fractured data is being brought together. At the moment, it is not clear whether this access by UIDAI means that an actual physical copy of such data from various sources will be transferred to UIDAI’s servers or if they will &amp;nbsp;just access it through internet, but the data remains on the host government agency’s server. An example of even private parties becoming a part of this infrastructure was raised by a participant when it was pointed out that Reliance Jio is now asking for fingerprints. This can then be connected to the relational infrastructure being created by UIDAI. The discussion then focused on how such a structure will function, where it was mentioned that as of now, it cannot be said with certainty that UIDAI will be the agency managing this relational infrastructure in the long run, even though it is the one building it.&lt;/p&gt;
&lt;h2 id="4"&gt;Aadhaar and Data Security&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This case study also dealt with the sheer lack of data protection legislation in India except for S.43A of the IT Act. The section does not provide adequate protection as the constitutionality of the rules and regulations under S.43A is ambivalent. More importantly, it only refers to private bodies. Hence, any seeding which is being done by the government is outside the scope of data protection legislation. Thus, at the moment, no legal framework covers the processes and the structures being used for datasets. Due to the inapplicability of S.43A to public bodies, questions were raised as to the existence of a comprehensive data protection policy for government institutions. Participants answered the question in the negative. They pointed out that if any government department starts collecting data, they develop their own privacy policy. There are no set guidelines for such policies and they do not address concerns related to consent, data minimisation and purpose limitation at all. Questions were also raised about the access and control over Big Data with government institutions. A tentative answer from a participant was that such data will remain under the control of &amp;nbsp;the domain specific government ministry or department, for e.g. MNREGA data with the Ministry of Rural Development, because the focus is not on data centralisation but rather on data linking. As long as such fractured data is linked and there is an agency that is responsible to link them, this data can be brought together. Such data is primarily for government agencies. But the government is opening up certain aspects of the data present with it for public consumption for research and entrepreneurial purposes.The UIDAI provides you access to your own data after paying a minimal fee. The procedure for such access is still developing.&lt;/p&gt;
&lt;h2 id="5"&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The various Digital India schemes brought in by the government were elucidated during the workshop. It was pointed out that these schemes extend to myriad aspects of a citizen’s daily life and cover all the essential public services like health, education etc. This makes Aadhaar imperative even though the Supreme Court has observed that it is not mandatory for every citizen to have a unique identity number. The benefits of such identity mapping and the ecosystem being generated by it was also enumerated during the discourse. But the complete absence of any data ethics or data confidentiality principles make us unaware of the costs at which these benefits are being conferred on us. Apart from surveillance concerns, the knowledge gap being created between the citizens and the government was also flagged. Three main benefits touted to be provided by Aadhaar were then analysed. The first is the efficient delivery of services. This appears to be an overblown claim as the Aadhaar specific digitisation and automation does not affect the way in which employment will be provided to citizens through MNREGA or how wage payment delays will be overcome. These are administrative problems that Aadhaar and associated technologies cannot solve. The second is convenience to the citizens. The fallacies in this assertion were also brought out and identified. Before the Aadhaar scheme was rolled in, ration cards were issued based on certain exclusion and inclusion criteria.. The exclusion and inclusion criteria remain the same while another hurdle in the form of Aadhaar has been created. As India is still lacking in supporting infrastructure such as electricity, server connectivity among other things, Aadhaar is acting as a barrier rather than making it convenient for citizens to enroll in such schemes.The third benefit is fraud management. Here, a participant pointed out that this benefit was due to digitisation in the form of GPS chips in food delivery trucks and electronic payment and not the relational nature of Aadhaar. Aadhaar is only concerned with the linking up or relational part. About deduplication, it was pointed out how various government agencies have tackled it quite successfully by using technology different from biometrics which is unreliable at the best of times.&lt;/p&gt;
&lt;h2 id="6"&gt;The Myths surrounding Aadhaar&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also reflected on the fact that &amp;nbsp;Aadhaar is often considered to be a panacea that subsumes all kinds of technologies to tackle leakages. However, this does not take into account the fact that leakages happen in many ways. A system should have been built to tackle those specific kinds of leakages, but the focus is solely on Aadhaar as the cure for all. Notably, participants &amp;nbsp;who have been a part of the government pointed out how this myth is misleading and should instead be seen as the first step towards a more digitally enhanced country which is combining different technologies through one medium.&lt;/p&gt;
&lt;h2 id="7"&gt;IndiaStack and FinTech Apps&lt;/h2&gt;
&lt;h3 id="71"&gt;What is India Stack?&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The focus then shifted to another extremely important Big Data project, India Stack, being conceptualised and developed &amp;nbsp;by a team of private developers called iStack, for the NPCI. It builds on the UID project, Jan Dhan Yojana and mobile services trinity to propagate and develop a cashless, presence-less, paperless and granular consent layer based on UID infrastructure to digitise India.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant pointed out that the idea of India Stack is to use UID as a platform and keep stacking things on it, such that more and more applications are developed. This in turn will help us to move from being a ‘data poor’ country to a ‘data rich’ one. The economic benefits of this data though as evidenced from the TAGUP report - a report about the creation of National Information Utilities to manage the data that is present with the government - is for the corporations and not the common man. The TAGUP report openly talks about privatisation of data.&lt;/p&gt;
&lt;h3 id="72"&gt;Problems with India Stack&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The granular consent layer of India Stack hasn’t been developed yet but they have proposed to base it on MIT Media Lab’s OpenPDS system. The idea being that, on the basis of the choices made by the concerned person, access to a person’s personal information may be granted to an agency like a bank. What is more revolutionary is that India Stack might even revoke this access if the concerned person expresses a wish to do so or the surrounding circumstances signal to India Stack that it will be prudent to do so. It should be pointed out that the the technology required for OpenPDS is extremely complex and is not available in India. Moreover, it’s not clear how this system would work. Apart from this, even the paperless layer has its faults and has been criticised by many since its inception, because an actual government signed and stamped paper has been the basis of a claim.. In the paperless system, you are provided a Digilocker in which all your papers are stored electronically, on the basis of your UID number. However, it was brought to light that this doesn’t take into account those who either do not want a Digilocker or UID number or cases where they do not have access to their digital records. How in such cases will people make claims?&lt;/p&gt;
&lt;h3 id="73"&gt;A Digital Post-Dated Cheque: It’s Ramifications&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A key change that FinTech apps and the surrounding ecosystem want to make is to create a digital post-dated cheque so as to allow individuals to get loans from their mobiles especially in remote areas. This will potentially cut out the need to construct new banks, thus reducing the capital expenditure , while at the same time allowing the credit services to grow. The direct transfer of money between UID numbers without the involvement of banks is a step to further help this ecosystem grow. Once an individual consents to such a system, however, automatic transfer of money from one’s bank accounts will be affected, regardless of the reason for payment. This is different from auto debt deductions done by banks presently, as in the present system banks have other forms of collateral as well. The automatic deduction now is only affected if these other forms are defaulted upon. There is no knowledge as to whether this consent will be reversible or irreversible. As Jan Dhan Yojana accounts are zero balance accounts, the account holder will be bled dry. The implication of schemes such as “Loan in under 8 minutes” were also discussed. The advantage of such schemes is that transaction costs are reduced.The financial institution can thus grant loans for the minimum amount without any additional enquiries. It was pointed out that this new system is based on living on future income much like the US housing bubble crash. Interestingly, in Public Distribution Systems, biometrics are insisted upon even though it disrupts the system. This can be seen as a part of the larger infrastructure to ensure that digital post-dated cheques become a success.&lt;/p&gt;
&lt;h3 id="74"&gt;The Role of FinTech Apps&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;FinTech ‘apps’ are being presented with the aim of propagating financial inclusion. The Technology Advisory Group for Unique Projects report stated that as managing such information sources is a big task, just like electricity utilities, a National Information Utilities (NIU) should be set up for data sources. These NIUs as per the report will follow a fee based model where they will be charging for their services for government schemes. The report identified two key NIUs namely the National Payments Corporation of India (NPCI) and the Goods and Services Tax Network (GSTN). The key usage that FinTech applications will serve is credit scoring. The traditional credit scoring data sources only comprised a thin file of records for an individual, but the data that FinTech apps collect - &amp;nbsp;a person’s UID number, mobile number. and bank account number all linked up, allow for a far &amp;nbsp;more comprehensive credit rating. Government departments are willing to share this data with FinTech apps as they are getting analysis in return. Thus, by using UID and the varied data sources that have been linked together by UID, a ‘thick file’ is now being created by FinTech apps. Banking apps have not yet gone down the route of FinTech apps to utilise Big Data for credit scoring purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The two main problems with such apps is that there is no uniform way of credit scoring. This distorts the rate at which a person has to pay interest. The consent layer adds another layer of complication as refusal to share mobile data with a FinTech app may lead to the app declaring one to be a risky investment thus, subjecting that individual to a &amp;nbsp;higher rate of interest .&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 id="75"&gt;Regulation of FinTech Apps and the UID Infrastructure&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; India Stack and the applications that are being built on it, generate a lot of transaction metadata that is very intimate in nature. The privacy aspects of the UID legislation doesn't cover such data. The granular consent layer which has been touted to cover this still has to come into existence. Also, Big Data is based on sharing and linking of data. Here, privacy concerns and Big Data objectives clash. Big Data by its very nature challenges privacy principles like data minimisation and purpose limitation.The need for regulation to cover the various new apps and infrastructure which are being developed was pointed out.&lt;/p&gt;
&lt;h2 id="8"&gt;Problems with UID&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It has been observed that any problem present with Aadhaar is usually labelled as a teething problem, it’s claimed that it will be solved in the next 10 years. But, this begs the question - why is the system online right now?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Aadhaar is essentially a new data condition and a new exclusion or inclusion criteria. Data exclusion modalities as observed in Rajasthan after the introduction of biometric Point of Service (POS) machines at ration shops was found to be 45% of the population availing PDS services. This number also includes those who were excluded from the database by being included in the wrong dataset. There is no information present to tell us how many actual duplicates and how many genuine ration card holders were weeded out/excluded by POS.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also mentioned that any attempt to question Aadhaar is considered to be an attempt to go back to the manual system and this binary thinking needs to change. Big Data has the potential to benefit people, as has been evidenced by the scholarship and pension portals. However, Big Data’s problems arise in systems like PDS, where there is centralised exclusion at the level of the cloud. Moreover, the quantity problem present in the PDS and MNREGA systems persists. There is still the possibility of getting lesser grains and salary even with analysis of biometrics, hence proving that there are better technologies to tackle these problems. Presently, the accountability mechanisms are being weakened as the poor don’t know where to go to for redressal. Moreover, the mechanisms to check whether the people excluded are duplicates or not is not there. At the time of UID enrollment, out of 90 crores, 9 crore were rejected. There was no feedback or follow-up mechanism to figure out why are people being rejected. It was just assumed that they might have been duplicates.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another problem is the rolling out of software without checking for inefficiencies or problems at a beta testing phase. The control of developers over this software, is so massive that it can be changed so easily without any accountability.. The decision making components of the software are all proprietary like in the the de-duplication algorithm being used by the UIDAI. Thus, this leads to a loss of accountability because the system itself is in flux, none of it is present in public domain and there are no means to analyse it in a transparent fashion..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;These schemes are also being pushed through due to database politics. On a field study of NPR of citizens, another Big Data scheme, it was found that you are assumed to be an alien if you did not have the documents to prove that you are a citizen. Hence, unless you fulfill certain conditions of a database, you are excluded and are not eligible for the benefits that being on the database afford you.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why is the private sector pushing for UIDAI and the surrounding ecosystem?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Financial institutions stand to gain from encouraging the UID as it encourages the credit culture and reduces transaction costs.. Another advantage for the private sector is perhaps the more obvious one, that is allows for efficient marketing of products and services..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The above mentioned fears and challenges were actually observed on the ground and the same was shown through the medium of a case study in West Bengal on the smart meters being installed there by the state electricity utility. While the data coming in from these smart meters is being used to ensure that a more efficient system is developed,it is also being used as a surrogate for income mapping on the basis of electricity bills being paid. This helps companies profile neighbourhoods. The technical officer who first receives that data has complete control over it and he can easily misuse the data. This case study again shows that instruments like Aadhaar and India Stack are limited in their application and aren’t the panacea that they are portrayed to be.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant &amp;nbsp;pointed out that in the light of the above discussions, the aim appears to be to get all kinds of data, through any source, and once you have gotten the UID, you link all of this data to the UID number, and then use it in all the corporate schemes that are being started. Most of the problems associated with Big Data are being described as teething problems. The India Stack and FinTech scheme is coming in when we already know about the problems being faced by UID. The same problems will be faced by India Stack as well.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Can you opt out of the Aadhaar system and the surrounding ecosystem?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion then turned towards whether there can be voluntary opting out from Aadhaar. It was pointed out that the government has stated that you cannot opt out of Aadhaar. Further, the privacy principles in the UIDAI bill are ambiguously worded where individuals &amp;nbsp;only have recourse for basic things like correction of your personal information. The enforcement mechanism present in the UIDAI Act is also severely deficient. There is no notification procedure if a data breach occurs. . The appellate body ‘Cyber Appellate Tribunal’ has not been set up in three years.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CCTNS: Big Data and its Predictive Uses&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is Predictive Policing?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The next big Big Data case study was on the &amp;nbsp;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS). Originally it was supposed to be a digitisation and interconnection scheme where police records would be digitised and police stations across the length and breadth of the country would be interconnected. But, in the last few years some police departments of states like Chandigarh, Delhi and Jharkhand have mooted the idea of moving on to predictive policing techniques. It envisages the use of existing statistical and actuarial techniques along with many other tropes of data to do so. It works in four ways: 1. By predicting the place and time where crimes might occur; 2. To predict potential future offenders; 3. To create profiles of past crimes in order to predict future crimes; 4. Predicting groups of individuals who are likely to be victims of future crimes.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How is Predictive Policing done?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;To achieve this, the following process is followed: 1. Data collection from various sources which includes structured data like FIRs and unstructured data like call detail records, neighbourhood data, crime seasonal patterns etc. 2. Analysis by using theories like the near repeat theory, regression models on the basis of risk factors etc. 3. Intervention&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Flaws in Predictive Policing and questions of bias&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;An obvious weak point in the system is that if the initial data going into the system is wrong or biased, the analysis will also be wrong. Efforts are being made to detect such biases. An important way to do so will be by building data collection practices into the system that protect its accuracy. The historical data being entered into the system is carrying on the prejudices inherited from the British Raj and biases based on religion, caste, socio-economic background etc.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One participant brought about the issue of data digitization in police stations, and the impact of this haphazard, unreliable data on a Big Data system. This coupled with paucity of data is bound to lead to arbitrary results. An effective example was that of black neighbourhoods in the USA. These are considered problematic and thus they are policed more, leading to a higher crime rate as they are arrested for doing things that white people in an affluent neighbourhood get away with. This in turn further perpetuates the crime rate and it becomes a self-fulfilling prophecy. In India, such a phenomenon might easily develop in the case of migrants, de-notified tribes, Muslims etc. &amp;nbsp;A counter-view on bias and discrimination was offered here. One participant pointed out that problems with haphazard or poor quality of data is not a colossal issue as private companies are willing to fill this void and are actually doing so in exchange for access to this raw data. It was also pointed out how bias by itself is being used as an all encompassing term. There are multiplicities of biases and while analysing the data, care should be taken to keep it in mind that one person’s bias and analysis might and usually does differ from another. Even after a computer has analysed the data, the data still falls into human hands for implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The issue of such databases being used to target particular communities on the basis of religion, race, caste, ethnicity among other parameters was raised. Questions about control and analysis of data were also discussed, i.e. whether it will be top-down with data analysis being done in state capitals or will this analysis be done at village and thana levels as well too. It was discussed as topointed out how this could play a major role in the success and possible persecutory treatment of citizens, as the policemen at both these levels will have different perceptions of what the data is saying. . It was further pointed out, that at the moment, there’s no clarity on the mode of implementation of Big Data policing systems. Police in the USA have been seen to rely on Big Data so much that they have been seen to become ‘data myopic’. For those who are on the bad side of Big Data, in the Indian context, laws like preventive detention can be heavily misused.There’s a very high chance that predictive policing due to the inherent biases in the system and the prejudices and inefficiency of the legal system will further suppress the already targeted sections of the society. A counterpoint was raised and it was suggested that contrary to our fears, CCTNS might lead to changes in our understanding and help us to overcome longstanding biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Open Knowledge Architecture as a solution to Big Data biases?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The conference then mulled over the use of ‘Open Knowledge’ architecture to see whether it can provide the solution to rid Big Data of its biases and inaccuracies if enough eyes are there. It was pointed out that Open Knowledge itself can’t provide foolproof protection against these biases as the people who make up the eyes themselves are predominantly male belonging to the affluent sections of the society and they themselves suffer from these biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Who exactly is Big Data supposed to serve?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also looked at questions such as who is this data for? Janata Information System (JIS), is a concept developed by MKSS &amp;nbsp;where the data collected and generated by the government is taken to be for the common citizens. For e.g. MNREGA data should be used to serve the purposes of the labourers. The raw data as is available at the moment, usually cannot be used by the common man as it is so vast and full of information that is not useful for them at all. It was pointed out that while using Big Data for policy planning purposes, the actual string of information that turned out to be needed was very little but the task of unravelling this data for civil society purposes is humongous. By presenting the data in the right manner, the individual can be empowered. The importance of data presentation was also flagged. It was agreed upon that the content of the data should be for the labourer and not a MNC, as the MNC has the capability to utilise the raw data on it’s own regardless.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Concerns about Big Data usage&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Participants pointed out that &amp;nbsp;privacy concerns are usually brushed under the table due to a belief that the law is sufficient or that the privacy battle has already been lost. &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the absence of knowledge of domain and context, Big Data analysis is quite limited. Big Data’s accuracy and potential to solve problems needs to be factually backed.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The narrative of Big Data often rests on the assumption that descriptive statistics take over inferential statistics, thus eliminating the need for domain specific knowledge. It is claimed that the data is so big that it will describe everything that we need to know.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data is creating a shift from a deductive model of scientific rigour to an inductive one. In response to this, a participant offered the idea that troves of good data allow us to make informed questions on the basis of which the deductive model will be formed. A hybrid approach combining both deductive and inductive might serve us best.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The need to collect the right data in the correct format, in the right place was also expressed.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Potential Research Questions &amp;amp; Participants’ Areas of Research&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Following this discussion, participants brainstormed to come up with potential areas of research and research questions. They have been captured below:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data, Aadhaar and India Stack:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Has Aadhaar been able to tackle illegal ways of claiming services or are local negotiations and other methods still prevalent?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Is the consent layer of India Stack being developed in a way that provides an opportunity to the UID user to give informed consent? The OpenPDS and its counterpart in the EU i.e. the My Data Structure were designed for countries with strong privacy laws. Importantly, they were meant for information shared on social media and not for an individual’s health or credit history. India is using it in a completely different sphere without strong data protection laws. What were the granular consent layer structures present in the West designed for and what were they supposed to protect?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The question of ownership of data needs to be studied especially in context of &amp;nbsp;a globalised world where MNCs are collecting copious amounts of data of Indian citizens. What is the interaction of private parties in this regard?&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data and Predictive Policing:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How are inequalities being created through the Big Data systems? Lessons should be taken from the Western experience with the advent of predictive policing and other big data techniques - they tend to lead to perpetuation of the current biases which are already ingrained in the system.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also pointed out how while studying these topics and anything related to technology generally, we become aware of a divide that is present between the computational sciences and social sciences. This divide needs to be erased if Big Data or any kind of data is to be used efficiently. There should be a cross-pollination between different groups of academics. An example of this can be seen to be the ‘computational social sciences departments’ that have been coming up in the last 3-4 years.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why are so many interim promises made by Big Data failing? A study of this phenomenon needs to be done from a social science perspective. This will allow one to look at it from a different angle.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Studying Big Data:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is the historical context of the terms of reference being used for Big Data? The current Big Data debate in India is based on parameters set by the West. For better understanding of Big Data, it was suggested that P.C. Mahalanobis’ experience while conducting the Indian census, (which was the Big Data of that time) can be looked at to get a historical perspective on Big Data. This comparison might allow us to discover questions that are important in the Indian context. It was also suggested that rather than using ‘Big Data’ as a catchphrase &amp;nbsp;to describe these new technological innovations, we need to be more discerning.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What are the ideological aspects that must be considered while studying Big Data? What does the dialectical promise of technology mean? It was contended that every time there is a shift in technology, the zeitgeist of that period is extremely excited and there are claims that it will solve everything. There’s a need to study this dialectical promise and the social promise surrounding it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Apart from the legitimate fears that Big Data might lead to exclusion, what are the possibilities in which it improve inclusion too?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The diminishing barrier between the public and private self, which is a tangent to the larger public-private debate was mentioned.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How does one distinguish between technology failure and process failure while studying Big Data? &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data: A Friend?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the concluding session, the fact that the Big Data moment cannot be wished away was acknowledged. The use of analytics and predictive modelling by the private sector is now commonplace and India has made a move towards a database state through UID and Digital India. The need for a nuanced debate, that does away with the false equivalence of being either a Big Data enthusiast or a luddite is crucial.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant offered two approaches to solving a Big Data problem. The first was the Big Data due process framework which states that if a decision has been taken that impacts the rights of a citizen, it needs to be cross examined. The efficacy and practicality of such an approach is still not clear. The second, slightly paternalistic in nature, was the approach where Big Data problems would be solved at the data science level itself. This is much like the affirmative algorithmic approach which says that if in a particular dataset, the data for the minority community is not available then it should be artificially introduced in the dataset. It was also &amp;nbsp;suggested that carefully calibrated free market competition can be used to regulate Big Data. For e.g. a private personal wallet company that charges higher, but does not share your data at all can be an example of such competition. &amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another important observation was the need to understand Big Data in a Global South context and account for unique challenges that arise. While the convenience of Big Data is promising, its actual manifestation depends on externalities like connectivity, accurate and adequate data etc that must be studied in the Global South.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the promises of Big Data are encouraging, it is also important to examine its impacts and its interaction with people's rights. Regulatory solutions to mitigate the harms of big data while also reaping its benefits need to evolve.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-90fa226f-6157-27d9-30cd-050bdc280875"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report'&gt;https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda, Akash Deep Singh and Geethanjali Jujjavarapu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Machine Learning</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2016-11-18T12:58:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired">
    <title>Where Are There So Few Books For The Print-Impaired?</title>
    <link>https://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired</link>
    <description>
        &lt;b&gt;India publishes approximately 90,000 books each year in 24 different languages. We have over 16,000 publishers, and are one of the top nations for English book publishing in the world. Clearly we are a nation which values and fosters a culture of reading and passing on knowledge in different domains ranging from literature, to yoga, language, education, science, fiction and many others. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://www.huffingtonpost.in/nirmita-narasimhan/where-are-there-so-few-books-for-the-print-impaired/?utm_hp_ref=in-"&gt;published in the Huffington Post&lt;/a&gt; on November 3, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We are also the world's second most populous nation with an extremely large population with disabilities, including persons with print impairments. However, the total number of books accessible to the print impaired in India is only 19,000, a fraction of what is available yearly to the general public. How is it that despite our prowess in publishing and technology, persons with print impairments in India remain deprived of access to books and other forms of information which are key to an inclusive and fulfilling life?&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;There are presently approximately 19,000 books converted till date, a pathetic contrast to the 90,000 books published just in India every year.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Before going further into this question, let us understand the term "print disability". Very broadly, print-impaired persons are those who cannot access printed material due to some form of disability, such as blindness or low vision, dyslexia, autism etc. For these persons to be able to read, the material needs to be converted into some other format such as Braille or accessible electronic formats which can be read using some assistive device like a screen reader or e-book reader, fitted in a laptop, mobile or stand alone device. For assistive technology to be able to read the content, it needs to conform to universal standards such as Unicode for Indic font or EPUB 3.0.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The challenges&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Until 2012, one of the biggest hurdles to access printed content for the  print-disabled was the fact that they had to obtain permission from the  copyright holder of the work, every time they wanted to convert a book  into audio/ Braille/ other formats. This was often unsuccessful, time  consuming and required resources beyond the means of most blindness  organizations, who could convert only a bare minimum of books, mostly  excerpts from school text books for their readers. After over a decade  of sustained advocacy, the Government included section 52 (1)(zb) in the  Indian Copyright Act, a fair use exception which permitted conversion  of copyrighted works into any accessible format for the benefit of a  person with a disability on a non-profit basis. For profit, conversion  is permitted on certain terms. This considerably opened up the world of  books for persons with print impairments in India. In September 2016,  the &lt;a href="http://www.worldblindunion.org/english/news/Pages/The-Treaty-of-Marrakesh.aspx"&gt;Marrakesh Treaty for the Visually Impaired&lt;/a&gt; also came into force, which means that cross-border sharing of  accessible books can happen between countries which have ratified the  Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, despite these measures, the availability of books remains  abysmal. While the legal issues have been sorted out to a large extent,  the practical situation is harder to deal with and there are significant  hurdles in creation and dissemination as well as equipping users to  read accessible books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, organizations serving the print-impaired do not have the  bandwidth to undertake large scale conversions of each and every book  that gets published. At present, organizations have to spend  considerable time and resources converting content into an accessible  electronic format before they can make it available to end users.  Consider this, the cost of typing out one page of a regional language  like Telugu is approximately ₹30 So it would cost ₹3000 to type out a  100-page Telugu book, in addition to the price already paid to purchase  the book. Apart from the unaffordability, the lack of equipment and  personnel necessitates conversion being carried out in a very limited  manner and mostly for books which are critical for studies and in high  demand, since state boards do not provide accessible versions of school  text books.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;The simplest way to address accessible book creation would be for publishers to adopt EPUB 3.0 and ensure that books are "born accessible"...&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;While the Daisy Forum of India, along with the Government of India  recently opened an online accessible digital library called the &lt;a href="https://library.daisyindia.org/NALP/welcomeLink.action"&gt;Sugamya Pustakalaya&lt;/a&gt;,  it needs to be populated with accessible content. There are presently  approximately 19,000 books converted till date, a pathetic contrast to  the 90,000 books published just in India every year. Even international  organizations such as Bookshare which have been expending millions to  convert books in different countries have only succeeded in making  500,000 accessible books available in all, and these too are not equally  available to persons in every country due to copyright issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other challenge is to equip each and every print-impaired person  with a device such as a laptop or mobile phone on which he/ she can read  and work with the book. Of course, merely providing devices is  pointless—appropriate training in how to use them is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also issues of inadequate distribution networks to reach  out to print impaired persons in urban and remote parts of India, which  still need to be addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the challenges specific to creating and disseminating  accessible books, other digitization activities can also add to the  problem. For instance, the &lt;a href="http://www.dli.ernet.in/"&gt;Digital Library of India project&lt;/a&gt;,  a spectacular effort to digitize books of all genres, is said to have a  library of 550,603 books including several really old manuscripts and  historical books. However, all of these are scanned and saved as  inaccessible image files, rendering them of no use to the  print-impaired.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another problem is in the case of Indian language content which is  often created in a nonUnicode font, making it unreadable for persons  using screen readers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How can we improve the situation?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The simplest way to address accessible book creation would be for  publishers to adopt EPUB 3.0 and ensure that books are "born accessible"  since they anyway produce a digital file of a book before bringing it  out in print. This would obviate the entire cost, time and effort spent  on conversion. Also, selling accessible e-versions to the print impaired  could be a huge business opportunity for publishers, considering the  large market for such books in India and globally. More information on  this can be obtained from &lt;a href="http://www.accessiblebooksconsortium.org/portal/en/index.html"&gt;Accessible Book Consortium&lt;/a&gt; or by writing to &lt;a href="mailto:info-india@bookshare.org"&gt;BookShare&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also need to ensure all digitization activities consider accessibility requirements and create resources that conform to accessibility standards.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;We have the law, the technology, the books and the people, but need a concerted effort from multiple stakeholders... to bring all of these together.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;On the technology front, an NGO-driven project over the past four years has now made text to speech available for several Indian languages using the open source text to speech engine e-Speak, which works with both laptops and Android phones. The government, with institutions like the IIT, is also driving initiatives to develop text to speech and optical character recognition (OCR) software for Indian languages. However, there is some way to go before these become available to end users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To sum up, we have the law, we have the technology, the books and the people, but need a concerted effort from multiple stakeholders—the government, publishers, educational institutions and NGOs—to bring all of these together, so that every print-impaired person in India can enjoy the right to read.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired'&gt;https://cis-india.org/accessibility/blog/huffington-post-november-3-2016-nirmita-narasimhan-where-are-there-so-few-books-for-print-impaired&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2016-11-04T01:20:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
