<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 691 to 705.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/the-hindu-s-anandan-january-26-2016-gi-tagged-products-to-get-wiki-pages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/transparency-in-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/kannada-wikipedia-edit-a-thon-for-mechanical-engineering-students-of-sagara"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/litt-review.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/b13b21b3cb3fb06-b2db3eb37b3e-b2ab3eb07b01-b15b3fb1bb3f-b05b28b4db24b30b4db1cb3eb24b40b5f-b07b23b4db1fb30b28b47b1f-b2ab4db30b15b33b4db2a"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-selected-sessions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/approaching-open-research-via-open-data-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/news/the-hindu-s-anandan-january-26-2016-gi-tagged-products-to-get-wiki-pages">
    <title>GI-tagged products to get Wiki pages</title>
    <link>https://cis-india.org/a2k/news/the-hindu-s-anandan-january-26-2016-gi-tagged-products-to-get-wiki-pages</link>
    <description>
        &lt;b&gt;Ever realised that the famous, red hot Naga Mirchi (a special variety of chilli from Nagaland) doesn’t have a Wikipedia page?&lt;/b&gt;
        &lt;p&gt;The article by S. Anandan was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/Kochi/gitagged-products-to-get-wiki-pages/article8153825.ece"&gt;published in the Hindu&lt;/a&gt; on January 26, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;And that Cannanore Home Furnishings — textile home furnishings from  Kannur — is a brand with geographical indication (GI) registration?  Wiki, which is an open and free repository of knowledge on the Internet,  does not have pages, in English and other recognised Indian languages,  on most GI-tagged Indian products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society-Access to Knowledge — popular as  CIS-A2K— which is a not-for-profit movement to promote the fundamental  principles of justice, freedom, and economic development, launched an  India Edit-a-thon for seven days from January 25 to generate Wikimedia  pages in English and Indian languages on Indian products recognised by  the GI Registry of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Kerala alone boasts 23 products, mostly agricultural, with the GI tag.  But Malayalam Wiki doesn’t have information on all of them. Besides the  Aranmula Kannadi, none of the other GI-tagged products from Kerala have  Wiki pages in English. Nationally, there are about 213 GI-tagged  products and we know nothing of most of them. There isn’t a single  article on many of them even in English. It’s in this context that the  Edit-a-thon becomes extremely relevant. It’s being held to celebrate the  Republic Day,” says Wiki activist Manoj Karingamadathil.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;13 pages already&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The campaign, launched on Monday, has evoked enthusiastic response from Wiki activists who have begun to create pages on most of these products. At the time of going to press, 13 GI-tagged Kerala products have got Wiki pages and editors are at work to generate content for these products in English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from existing Wiki editors, freshers may also be part of the campaign. “All they have to do is to create a Wiki account before sending in researched content,” points out Mr. Manoj. The campaign will be on till January 31.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Seven-day India Edit-a-thon begins; Wiki activists begin creating pages.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/the-hindu-s-anandan-january-26-2016-gi-tagged-products-to-get-wiki-pages'&gt;https://cis-india.org/a2k/news/the-hindu-s-anandan-january-26-2016-gi-tagged-products-to-get-wiki-pages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-01-27T16:33:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias">
    <title>Why It's Essential To Grow Indian-Language Wikipedias</title>
    <link>https://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias</link>
    <description>
        &lt;b&gt;On 15 January, Wikipedia, the free online encyclopaedia celebrated its 15th birthday, meeting this milestone with 36 million articles in more than 290 languages (the English-language Wikipedia alone has crossed the 5-million article mark). But here I want to address some major questions that we need to ask as Indians. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="http://www.huffingtonpost.in/subhashish-panigrahi-/when-wikipedia-is-turning_b_9025690.html"&gt;Huffington Post&lt;/a&gt; on January 25, 2016. Also mirrored on &lt;a class="external-link" href="https://globalvoices.org/2016/02/26/why-its-essential-to-grow-indian-language-wikipedias/"&gt;Global Voices&lt;/a&gt; on February 26, 2016. The post was translated &lt;a class="external-link" href="https://el.globalvoices.org/2016/05/33834"&gt;into Greek&lt;/a&gt; by Maria Souli. It was translated &lt;a class="external-link" href="https://es.globalvoices.org/2016/03/26/la-importancia-de-cultivar-las-wikipedias-sobre-los-idiomas-de-la-india/"&gt;into Spanish&lt;/a&gt; by Daniela Diaz and &lt;a class="external-link" href="https://ru.globalvoices.org/2016/04/20/47945/"&gt;into Russian&lt;/a&gt; by GV Russian&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;First, what is the state of Indian-language Wikipedia projects? What does India have to take from and give to Wikipedia?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the growth of free and open source software in India, &lt;a href="http://www.gndec.ac.in/%7Elibrarian/sveri/dbit2306009.pdf" target="_hplink"&gt;people are equipped with more freedom than ever.&lt;/a&gt; Especially with the recent &lt;a href="https://opensource.com/government/15/6/indian-government-includes-open-source-rfps" target="_hplink"&gt;federal policy-level changes&lt;/a&gt;, the nation is enjoying better collaboration with people of different cultures speaking different languages.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;According to UNESCO, 197 of the total of 1652 Indian languages are dying despite having a long literary and linguistic heritage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there is a huge gap in the access to knowledge on the internet domain. Of a population of about 1.26 billion only about 15-18% people are connected online, largely from mobile devices. A tiny fraction of this population comprises the technical community. It would be useful to have a metric on the percentage of this community's contribution to grow the languages of this country and its cultural heritage.&lt;/p&gt;
&lt;h3&gt;Wikipedia as a family&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Wikipedia is not just an encyclopaedia. It is also a "family" of several other Open Knowledge members. Wikipedia itself is available in over 290 languages, but it also has other multilingual sister projects such as Wikisource (an online library of many public domain and other important texts), Wikimedia Commons (the world's largest repository of media files and documents), Wikibooks (a free library of educational textbooks), Wikivoyage (a free and open travel guide) and Wiktionary (a database of various languages).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These projects don't just house millions of images, videos, documents  and texts, but allow anyone to contribute their knowledge to this ever  deepening pool of information. Four Indian languages made an early entry  to the Wiki-world back in 2002 -- &lt;a href="http://as.wikipedia.org/" target="_hplink"&gt;Assamese&lt;/a&gt;, &lt;a href="http://ml.wikipedia.org/" target="_hplink"&gt;Malayalam&lt;/a&gt;, &lt;a href="http://or.wikipedia.org/" target="_hplink"&gt;Odia&lt;/a&gt; and &lt;a href="http://pa.wikipedia.org/" target="_hplink"&gt;Punjabi&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/UNESCO.png" alt="UNESCO" class="image-inline" title="UNESCO" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Language neutrality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to UNESCO, 197 of the total of 1652 Indian languages are dying despite having a long literary and linguistic heritage. It's quite shocking. In a blog post on content localisation, social entrepreneur Rajesh Ranjan asks if free and open source software can help save these dying languages. In the context of Wikipedia, there are already 23 South Asian-language projects. Out of these 20 are languages listed in the 8th schedule of the Constitution of India. Many might not have noticed that the "en" in the URL of Wikipedia that denotes the language code of English could be altered with "or" for Odia Wikipedia or "pa" for Punjabi Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most Wikipedia projects in Indian language projects are relatively small compared to their counterparts. But the Wikimedia communities are thriving.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There are a fairly large number of native speakers waiting out there to access knowledge in their own languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When only parts of government websites are available in Hindi, the Hindi  Wikipedia has crossed 10 million articles already. The Tamil and  Malayalam Wikipedia communities have played a central part in  implementing Wikipedia basics learning in the state-run school syllabus.  Needless to say that these communities have played a significant role  in implementing several free and open source software by pushing for  policy-level change. Many Indian languages are in the pipeline to become  active Wikipedia projects under the scope of the  &lt;a href="https://incubator.wikimedia.org/wiki/Category:Incubator:Test_wikis/code/valid" target="_hplink"&gt;Wikimedia Incubator&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://blog.wikimedia.org/2014/09/08/a-focused-approach-for-maithili-wikipedia/" target="_hplink"&gt;Maithili Wikipedia&lt;/a&gt; and &lt;a href="http://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/" target="_hplink"&gt;Goan Konkani Wikipedia&lt;/a&gt; are the two Indian-language Wikipedias that have gone live in recent  years. The world has seen how digital activism has brought a new life to  the Hebrew language. There are a fairly large number of native speakers  waiting out there to access knowledge in their own languages. Wikipedia  could be a great tool for digital activism with openness and sharing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/WikipediaEditors.png" alt="Wikipedia Editors" class="image-inline" title="Wikipedia Editors" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Addressing gender bias in Wikipedia: Implications for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India &lt;a href="http://indianexpress.com/article/explained/gender-inequality-index-in-south-asia-india-leads-in-poor-condition-of-women/" target="_hplink"&gt;tops South Asia in the gender inequality index&lt;/a&gt; in the entire South Asia. The &lt;a href="http://www.unfpa.org/swp/2009/en/pdf/EN_SOWP09_ICPD.pdf" target="_hplink"&gt;female literacy rate is an alarmingly low 65.46%&lt;/a&gt; as compared to 82.14% for men. This disparity is evident in many other sectors as well as in politics.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Digital India aims at digital literacy and availability of digital resources/services in Indian languages. This is closely aligned with the Wikimedia movement's goal....&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But gender bias is not just a problem in India. The global free and open  source software (FOSS) community has always been worried about the &lt;a href="https://books.google.co.in/books?id=AJpACwAAQBAJ&amp;amp;pg=PT49&amp;amp;lpg=PT49&amp;amp;dq=gender+bias+in+foss+community&amp;amp;source=bl&amp;amp;ots=HqLdhzKwcD&amp;amp;sig=bewvZdJG3wGtbqWXxSIS9qLIxSM&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwjkwfznvqTKAhVKH44KHZFVBMQQ6AEIJzAB#v=onepage&amp;amp;q=gender%20bias%20in%20foss%20community&amp;amp;f=false" target="_hplink"&gt;low presence of women&lt;/a&gt; contributors -- in the &lt;a href="https://people.cs.umass.edu/%7Ewallach/talks/2011-04-05_JHU.pdf" target="_hplink"&gt;range of 2-5% range.&lt;/a&gt; Wikimedia Foundation's former executive director admitted that  Wikipedia, like many other collaborative and open projects, does not  have a conducive environment for women. But the Wikimedia community and  Wikimedia Foundation are both working on improving this state of  affairs. Indian-language Wikipedia projects are directly impacted by  this global drive, be it the Women's History Month edit-a-thon where  Wikipedia content largely related to women are improved every year or  the &lt;a href="https://meta.wikimedia.org/wiki/Lilavati%27s_Daughters_Edit-a-thon" target="_hplink"&gt;Lilavati's Daughters project &lt;/a&gt;where biographies of Indian women scientists were created and enriched in Wikipedia projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Complementing Digital India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With a population of over &lt;a href="http://dazeinfo.com/2015/09/05/internet-users-in-india-number-mobile-iamai/" target="_hplink"&gt;354 million&lt;/a&gt; netizens India still has a long way to go in  &lt;a href="http://tdil.mit.gov.in/wsi/papers/Issues_&amp;amp;_Challenges_for_Enabling_Mobile_web_in_Indian_Languages.pdf" target="_hplink"&gt;increasing Indian language content on the web&lt;/a&gt;. The Government of India's new campaign &lt;a href="http://www.digitalindia.gov.in/content/vision-and-vision-areas" target="_hplink"&gt;Digital India&lt;/a&gt; aims at &lt;a href="http://www.cmai.asia/digitalindia/" target="_hplink"&gt;digital literacy and availability of digital resources/services in Indian languages&lt;/a&gt;.  This is closely aligned with the Wikimedia movement's goal to provide  free access to the sum of all human knowledge. In addition to Wikipedia,  many other open educational resources and free knowledge projects that  are not already a part of the Digital India campaign signal the need for  the federal-run campaign to be more collaborative and open.  Community-government collaborations like the &lt;a href="https://blog.creativecommons.org/2013/08/14/india-launches-national-repository-of-open-educational-resources/" target="_hplink"&gt;NROER project&lt;/a&gt; to make NCERT books under Creative Commons licenses and &lt;a href="https://www.itschool.gov.in/glance.php" target="_hplink"&gt;IT@School project&lt;/a&gt; in the state of Kerala to provide education using free and open tools  have gained massive traction and helped more Indian language content  come online.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias'&gt;https://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-05-28T06:52:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/news/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house">
    <title>Trai promises final call on differential pricing by month-end after 'lively' open house</title>
    <link>https://cis-india.org/telecom/news/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house</link>
    <description>
        &lt;b&gt;The Telecom Regulatory Authority of India (Trai) will take a final call on differential pricing by the end of January , its chairman said, describing the open house discussions on the regulator's contentious consultation paper as "lively".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/telecom/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house/articleshow/50675121.cms"&gt;article by Economic Times&lt;/a&gt; was published on January 22, 2016. CIS gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"It was a very lively consultation, the hall was full. We will take all these into account and hope that by the end of the month, we should be able to come out with our position," Trai chairman Ram Sewak Sharma said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Companies.png" alt="Companies" class="image-inline" title="Companies" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He, however, refused to link this consultation paper to the broader topic of net neutrality . "Net neutrality is a different subject. First we will decide differential pricing, then we will look at other issues. I cannot say at this time what Trai will do on the larger issue of net neutrality , but we will certainly take a call," Sharma said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The open house saw a near packed house, with representatives from Trai, several telecom companies, civil society organisations, industry bodies, and individuals, but the debate did not turn out to be as explosive as the acrimonious lead-up to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook India's policy head Ankhi Das, whose presence was hugely anticipated after a recent round of high octave communication between Trai and Facebook was made public, did not turn up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A representative of Facebook, whose zero-rated programme called Free Basics has been at the cent re of the controversy surrounding the differential pricing paper, said: "As a company we have commented. With Free Basics we hope to bring people online in a non-discriminatory manner... We hope Trai will encourage Free Basics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Telcos  including  Bharti AirtelBSE -0.37 %,  Idea CellularBSE 0.05 %,   Reliance CommunicationsBSE -1.58 %, Sistema Shyam, Tata Communications,   VideoconBSE -0.54 % Telecom, and Vodafone made a case for allowing  differential pricing, and most cited extending the practice from voice  to data services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Differential pricing should be incorporated as were done in voice telephony. Data should be encouraged while the content part can be taken up in another consultation paper," a Vodafone representative said.&lt;br /&gt;&lt;br /&gt;The volunteer-led savetheinternet.in coalition said: "Internet is not a marketplace. Though telcos advocate differential pricing in the name of different customer classes, but when they charge for third party content, it becomes a problem."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Civil society organisations also made detailed submissions, explaining their positions. While most, including industry body Internet and Mobile Association of India, said they were against differential pricing, some took a slightly cautious view. "What hasn't been discussed is that there is already differential pricing and this is undocumented," said a representative of Centre for Internet and Society. "Free Basics isn't following certain protocol standards, and this is a concern. We don't have enough data on internet usage, costs, user experience, to take a decision now," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  representative of  Tata CommunicationsBSE 0.58 % said "sponsored data  services" exist around the world and argued citing an example that  providing free voice service does not confer competitive advantage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If there are two pizza vendors: one with a toll-free service for taking orders and the other where you pay money to order without a toll-free service. The uptake in the pizza depends on the quality and the price of the pizzas. It is not because it is a toll free call," he said.&lt;br /&gt;&lt;br /&gt;This comparison drew laughter in the open house, and became the butt of jokes on Twitter from internet freedom advocates. "Btw, I think a new analogy from the telco guys today, comparing the internet with pizza. How creative," tweeted Nikhil Pahwa, who under the banner of savetheinternet.in has been campaigning for net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IAMAI  president Subho Ray's candid  commentary on submissions, calling some  of them "badly done homework", did not go down well with some members of  the audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Individual entrepreneurs made a case for not having differential pricing, as that would mean the telcos would get to decide the access for their business. Some people suggested alternatives. Digital Empowerment Foundation founder Osama Manzar said unlicensed spectrum or Wi-Fi could be used to provide access in the rural areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trai launched the differential pricing consultation paper on December 9, which was followed by Facebook starting a mass campaign, asking its users to support Free Basics, urging them to email Trai in support of "digital equality" and supporting Free Basics.&lt;/p&gt;
&lt;table class="mceLayout" id="mce_fullscreen_tbl" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td class="mceIframeContainer mceFirst mceLast"&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house'&gt;https://cis-india.org/telecom/news/trai-promises-final-call-on-differential-pricing-by-month-end-after-lively-open-house&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    

   <dc:date>2016-01-26T02:41:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/transparency-in-surveillance">
    <title>Transparency in Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/transparency-in-surveillance</link>
    <description>
        &lt;b&gt;Transparency is an essential need for any democracy to function effectively. It may not be the only requirement for the effective functioning of a democracy, but it is one of the most important principles which need to be adhered to in a democratic state.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A democracy involves the state machinery being 	accountable to the citizens that it is supposed to serve, and for the citizens to be able to hold their state machinery accountable, they need accurate and 	adequate information regarding the activities of those that seek to govern them. However, in modern democracies it is often seen that those in governance 	often try to circumvent legal requirements of transparency and only pay lip service to this principle, while keeping their own functioning as opaque as 	possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This tendency to not give adequate information is very evident in the departments of the government which are concerned with surveillance, and merit can be 	found in the argument that all of the government's clandestine surveillance activities cannot be transparent otherwise they will cease to be "clandestine" 	and hence will be rendered ineffective. However, this argument is often misused as a shield by the government agencies to block the disclosure of all types 	of information about their activities, some of which may be essential to determine whether the current surveillance regime is working in an effective, 	ethical, and legal manner or not. It is this exploitation of the argument, which is often couched in the language of or coupled with concerns of national 	security, that this paper seeks to address while voicing the need for greater transparency in surveillance activities and structures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first section the paper examines the need for transparency, and specifically deals with the requirement for transparency in surveillance. In the 	next part, the paper discusses the regulations governing telecom surveillance in India. The final part of the paper discusses possible steps that may be 	taken by the government in order to increase transparency in telecom surveillance while keeping in mind that the disclosure of such information should not 	make future surveillance ineffective.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In today's age where technology is all pervasive, the term "surveillance" has developed slightly sinister overtones, especially in the backdrop of the 	Edward Snowden fiasco. Indeed, there have been several independent scandals involving mass surveillance of people in general as well as illegal 	surveillance of specific individuals. The fear that the term surveillance now invokes, especially amongst those social and political activists who seek to 	challenge the status quo, is in part due to the secrecy surrounding the entire surveillance regime. Leaving aside what surveillance is carried out, upon 	whom, and when - the state actors are seldom willing and open to talk about how surveillance is carried out, how decisions regarding who and how to target, 	are reached, how agency budgets are allocated and spent, how effective surveillance actions were, etc. While there may be justified security based 	arguments to not disclose the full extent of the state's surveillance activities, however this cloak of secrecy may be used illegally and in an 	unauthorized manner to achieve ends more harmful to citizen rights than the maintenance of security and order in the society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance and interception/collection of communications data can take place under different legal processes in different countries, ranging from 	court-ordered requests of specified data from telecommunications companies to broad executive requests sent under regimes or regulatory frameworks 	requiring the disclosure of information by telecom companies on a pro-active basis. However, it is an open secret that data collection often takes place 	without due process or under non-legal circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is widely believed that transparency is a critical step towards the creation of mechanisms for increased accountability through which law enforcement 	and government agencies access communications data. It is the first step in the process of starting discussions and an informed public debate regarding how 	the state undertakes activities of surveillance, monitoring and interception of communications and data. Since 2010, a large number of ICT companies have 	begun to publish transparency reports on the extent that governments request their user data as well as requirements to remove content. However, 	governments themselves have not been very forthcoming in providing such detailed information on surveillance programs which is necessary for an informed 	debate on this issue.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Although some countries currently report limited information on their surveillance 	activities, e.g. the U.S. Department of Justice publishes an annual Wiretap Report (U.S. Courts, 2013a), and the United Kingdom publishes the Interception 	of Communications Commissioner Annual Report (May, 2013), which themselves do not present a complete picture, however even such limited measures are 	unheard of in a country such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is obvious that Governments can provide a greater level of transparency regarding the limits in place on the freedom of expression and privacy than 	transparency reports by individual companies. Company transparency reports can only illuminate the extent to which any one company receives requests and 	how that company responds to them. By contrast, government transparency reports can provide a much greater perspective on laws that can potentially restrict the freedom of expression or impact privacy by illustrating the full extent to which requests are made across the ICT industry.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the courts and the laws have traditionally recognized the need for transparency and derive it from the fundamental right to freedom of speech and 	expression guaranteed in our Constitution. This need coupled with a sustained campaign by various organizations finally fructified into the passage of the 	Right to Information Act, 2005, (RTI Act) which amongst other things also places an obligation on the sate to place its documents and records online so 	that the same may be freely available to the public. In light of this law guaranteeing the right to information, the citizens of India have the fundamental 	right to know what the Government is doing in their name. The free flow of information and ideas informs political growth and the freedom of speech and 	expression is the lifeblood of a healthy democracy, it acts as a safety valve. People are more ready to accept the decisions that go against them if they 	can in principle seem to influence them. The Supreme Court of India is of the view that the imparting of information about the working of the government on 	the one hand and its decision affecting the domestic and international trade and other activities on the other is necessary, and has imposed an obligation 	upon the authorities to disclose information.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court, in &lt;i&gt;Namit Sharma&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; while discussing the importance of 	transparency and the right to information has held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Information was harnessed as a tool for promoting development; strengthening the democratic governance and effective delivery of 	socio-economic services. 	&lt;i&gt; Acquisition of information and knowledge and its application have intense and pervasive impact on the process of taking informed decision, resulting in 		overall productivity gains &lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;……..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government procedures and regulations shrouded in the veil of secrecy do not allow the litigants to know how their cases are being handled. They shy away 	from questioning the officers handling their cases because of the latters snobbish attitude. Right to information should be guaranteed and needs to be given real substance. In this regard, the Government must assume a major responsibility and mobilize skills to ensure flow of information to citizens.	&lt;i&gt;The traditional insistence on secrecy should be discarded.&lt;/i&gt;"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these statements were made in the context of the RTI Act the principle which they try to illustrate can be understood as equally applicable to the 	field of state sponsored surveillance. Though Indian intelligence agencies are exempt from the RTI Act, it can be used to provide limited insight into the 	scope of governmental surveillance. This was demonstrated by the Software Freedom Law Centre, who discovered via RTI requests that approximately 7,500 - 	9,000 interception orders are sent on a monthly basis.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that transparency alone will not be able to eliminate the barriers to freedom of expression or harm to privacy resulting from overly broad 	surveillance,, transparency provides a window into the scope of current practices and additional measures are needed such as oversight and mechanisms for 	redress in cases of unlawful surveillance. Transparency offers a necessary first step, a foundation on which to examine current practices and contribute to 	a debate on human security and freedom.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is no secret that the current framework of surveillance in India is rife with malpractices of mass surveillance and instances of illegal surveillance. 	There have been a number of instances of illegal and/or unathorised surveillance in the past, the most scandalous and thus most well known is the incident 	where a woman IAS officer was placed under surveillance at the behest of Mr. Amit Shah who is currently the president of the ruling party in India 	purportedly on the instructions of the current prime minister Mr. Narendra Modi.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; There are also a number 	of instances of private individuals indulging in illegal interception and surveillance; in the year 2005, it was reported that Anurag Singh, a private 	detective, along with some associates, intercepted the telephonic conversations of former Samajwadi Party leader Amar Singh. They allegedly contacted 	political leaders and media houses for selling the tapped telephonic conversation records. The interception was allegedly carried out by stealing the genuine government letters and forging and fabricating them to obtain permission to tap Amar Singh's telephonic conversations.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The same individual was also implicated for tapping the telephone of the current finance minister Mr. 	Arun Jaitely.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore obvious that the status quo with regard to the surveillance mechanism in India needs to change, but this change has to be brought about in 	a manner so as to make state surveillance more accountable without compromising its effectiveness and addressing legitimate security concerns. Such changes 	cannot be brought about without an informed debate involving all stakeholders and actors associated with surveillance, however the basic minimum 	requirement for an "informed" debate is accurate and sufficient information about the subject matter of the debate. This information is severely lacking in 	the public domain when it comes to state surveillance activities - with most data points about state surveillance coming from news items or leaked 	information. Unless the state becomes more transparent and gives information about its surveillance activities and processes, an informed debate to 	challenge and strengthen the status quo for the betterment of all parties cannot be started.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current State of Affairs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Surveillance laws in India are extremely varied and have been in existence since the colonial times, remnants of which are still being utilized by the 	various State Police forces. However in this age of technology the most important tools for surveillance exist in the digital space and it is for this 	reason that this paper shall focus on an analysis of surveillance through interception of telecommunications traffic, whether by tracking voice calls or 	data. The interception of telecommunications actually takes place under two different statutes, the Telegraph Act, 1885 (which deals with interception of 	calls) as well as the Information Technology Act, 2000 (which deals with interception of data).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the telecom surveillance is done as per the procedure prescribed in the Rules under the relevant sections of the two statutes mentioned above,	&lt;i&gt;viz. &lt;/i&gt;Rule 419A of the Telegraph Rules, 1951 for surveillance under the Telegraph Act, 1885 and the Information Technology (Procedure and 	Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 for surveillance under the Information Technology Act, 2000. These Rules put in place various checks and balances and try to ensure that there is a paper trail for every interception request.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The assumption is that the generation of a paper trail would reduce the number of unauthorized 	interception orders thus ensuring that the powers of interception are not misused. However, even though these checks and balances exist on paper as 	provided in the laws, there is not enough information in the public domain regarding the entire mechanism of interception for anyone to make a judgment on 	whether the system is working or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned earlier, currently the only sources of information on interception that are available in the public domain are through news reports and a 	handful of RTI requests which have been filed by various activists.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The only other institutionalized 	source of information on surveillance in India is the various transparency reports brought out by companies such as Google, Yahoo, Facebook, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, Google was the first major corporation to publish a transparency report in 2010 and has been updating its report ever since. The latest data that 	is available for Google is for the period between January, 2015 to June, 2015 and in that period Google and Youtube together received 3,087 requests for 	data which asked for information on 4,829 user accounts from the Indian Government. Out of these requests Google only supplied information for 44% of the 	requests.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Although Google claims that they "review each request to make sure that it complies with both 	the spirit and the letter of the law, and we may refuse to produce information or try to narrow the request in some cases", it is not clear why Google 	rejected 56% of the requests. It may also be noted that the number of requests for information that Google received from India were the fifth highest 	amongst all the other countries on which information was given in the Transparency Report, after USA, Germany, France and the U.K.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook's transparency report for the period between January, 2015 to June, 2015 reveals that Facebook received 5,115 requests from the Indian Government 	for 6,268 user accounts, out of which Facebook produced data in 45.32% of the cases.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Facebook's 	transparency report claims that they respond to requests relating to criminal cases and "Each and every request we receive is checked for legal sufficiency 	and we reject or require greater specificity on requests that are overly broad or vague." However, even in Facebook's transparency report it is unclear why 	55.68% of the requests were rejected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Yahoo transparency report also gives data from the period between January 1, 2015 to June 30, 2015 and reveals that Yahoo received 831 requests for 	data, which related to 1,184 user accounts from the Indian Government. The Yahoo report is a little more detailed and also reveals that 360 of the 831 	requests were rejected by Yahoo, however no details are given as to why the requests were rejected. The report also specifies that in 63 cases, no data was found by Yahoo, in 249 cases only non content data&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; was disclosed while in 159 cases content	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; was disclosed. The Yahoo report also claims that "We carefully scrutinize each request to make sure 	that it complies with the law, and we push back on those requests that don't satisfy our rigorous standards."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Vodafone Transparency Report gives information regarding government requests for data in other jurisdictions,	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; it does not give any information on government requests in India. This is because Vodafone interprets 	the provisions contained in Rule 25(4) of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 	(Interception Rules) and Rule 11 of the IT (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 as well as Rule 	419A(19) of the Indian Telegraph Rules, 1954 which require service providers to maintain confidentiality/secrecy in matters relating to interception, as 	being a legal prohibition on Vodafone to reveal such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the four major companies discussed above, there are a large number of private corporations which have published transparency reports in order to 	acquire a sense of trustworthiness amongst their customers. Infact, the Ranking Digital Rights Project has been involved in ranking some of the biggest 	companies in the world on their commitment to accountability and has brought out the Ranking Digital Rights 2015 Corporate Accountability Index that has 	analysed a representative group of 16 companies "that collectively hold the power to shape the digital lives of billions of people across the globe".&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Suggestions on Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussions above, as well as a general overview of various news reports on the subject, that telecom surveillance in India is 	shrouded in secrecy and it appears that a large amount of illegal and unauthorized surveillance is taking place behind the protection of this veil of 	secrecy. If the status quo continues, then it is unlikely that any meaningful reforms would take place to bring about greater accountability in the area of 	telecom surveillance. It is imperative, for any sort of changes towards greater accountability to take place, that we have enough information about what 	exactly is happening and for that we need greater transparency since transparency is the first step towards greater accountability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transparency Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In very simplistic terms transparency, in anything, can best be achieved by providing as much information about that thing as possible so that there are no 	secrets left. However, it would be naïve to say that all information about interception activities can be made public on the altar of the principle of 	transparency, but that does not mean that there should be no information at all on interception. One of the internationally accepted methods of bringing 	about transparency in interception mechanisms, which is increasingly being adopted by both the private sector as well as governments, is to publish 	Transparency Reports giving various details of interception while keeping security concerns in mind. The two types of transparency reports that we require 	in India and what that would entail is briefly discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Government&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem with India's current regime for interception is that the entire mechanism appears more or less adequate on paper with enough checks and 	balances involved in it to prevent misuse of the allotted powers. However, because the entire process is veiled in secrecy, nobody knows exactly how good 	or how rotten the system has become and whether it is working to achieve its intended purposes. It is clear that the current system of interception and 	surveillance being followed by the government has some flaws, as can be gathered from the frequent news articles which talk about incidents of illegal 	surveillance. However, without any other official or more reliable sources of information regarding surveillance activities these anecdotal pieces of 	evidence are all we have to shape the debate regarding surveillance in India. It is only logical then that the debate around surveillance, which is 	informed by such sketchy and unreliable news reports will automatically be biased against the current mechanism since the newspapers would also only be 	interested in reporting the scandalous and the extraordinary incidents. For example, some argue that the government undertakes mass surveillance, while 	others argue that India only carries out targeted surveillance, but there is not enough information publicly available for a third party to support or 	argue against either claim. It is therefore necessary and highly recommended that the government start releasing a transparency report such as the one's 	brought out by the United States and the UK as mentioned above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no need for a separate department or authority just to make the transparency report and this task could probably be performed in-house by any 	department, but considering the sector involved, it would perhaps be best if the Department of Telecommunications is given the responsibility to bring out 	a transparency report. These transparency reports should contain certain minimum amount of data for them to be an effective tool in informing the public 	discourse and debate regarding surveillance and interception. The report needs to strike a balance between providing enough information so that an informed 	analysis can be made of the effectiveness of the surveillance regime without providing so much information so as to make the surveillance activities 	ineffective. Below is a list of suggestions as to what kind of data/information such reports should contain:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports should contain data regarding the number of interception orders that have been passed. This statistic would be extremely useful in 	determining how elaborate and how frequently the state indulges in interception activities. This information would be easily available since all 	interception orders have to be sent to the Review Committee set up under Rule 419A of the Telegraph Rules, 1954.&lt;/li&gt;
&lt;li&gt;The Report should contain information on the procedural aspects of surveillance including the delegation of powers to different authorities and 	individuals, information on new surveillance schemes, etc. This information would also be available with the Ministry of Home Affairs since it is a 	Secretary or Joint Secretary level officer in the said Ministry which is supposed to authorize every order for interception.&lt;/li&gt;
&lt;li&gt;The report should contain an aggregated list of reasons given by the authorities for ordering interception. This information would reveal whether 	the authorities are actually ensuring legal justification before issuing interception or are they just paying lip service to the rules to ensure a proper 	paper trail. Since every order of interception has to be in writing, the main reasons for interception can easily be gleaned from a perusal of the orders.&lt;/li&gt;
&lt;li&gt;It should also reveal the percentage of cases where interception has actually found evidence of culpability or been successful in prevention of 	criminal activities. This one statistic would itself give a very good review of the effectiveness of the interception regime. Granted that this information 	may not be very easily obtainable, but it can be obtained with proper coordination with the police and other law enforcement agencies.&lt;/li&gt;
&lt;li&gt;The report should also reveal the percentage of order that have been struck down by the Review Committee as not following the process envisaged 	under the various Rules. This would give a sense of how often the Rules are being flouted while issuing interception orders. This information can easily be 	obtained from the papers and minutes of the meetings of the Review Committee.&lt;/li&gt;
&lt;li&gt;The report should also state the number of times the Review Committee has met in the period being reported upon. The Review Committee is an 	important check on the misuse of powers by the authorities and therefore it is important that the Review Committee carries out its activities in a diligent 	manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It may be noted here that some provisions of the Telegraph Rules, 1954 especially sub-Rules 17 and 18 of Rule 419A as well as Rules 22, 23(1) and 25 of the 	Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 may need to be amended so as to 	make them compliant with the reporting mechanism proposed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Private Sector&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have already discussed above the transparency reports published by certain private companies. Suffice it to say that reports from private companies 	should give as much of the information discussed under government reports as possible and/or applicable, since they may not have a large amount of the 	information that is sought to be published in the government reports such as whether the interception was successful, the reasons for interception, etc. It 	is important to have ISPs provide such transparency reports as this will provide two different data points for information on interception and the very 	existence of these private reports may act as a check to ensure the veracity of the government transparency reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in the case of government reports, for the transparency reports of the private sector to be effective, certain provisions of the Telegraph Rules, 1954 	and the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, viz. sub-Rules 14, 15 and 	19 of Rule 419A of the Telegraph Rules, 1954 and Rules 20, 21, 23(1) and 25 of the Information Technology (Procedure and Safeguards for Monitoring and 	Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overhaul of the Review Committee&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Review Committee which acts as a check on the misuse of powers by the competent authorities is a very important cog in the entire process. However, it 	is staffed entirely by the executive and does not have any members of any other background. Whilst it is probably impractical to have civilian members in 	the Review Committee which has access to potentially sensitive information, it is extremely essential that the Committee has wider representation from 	other sectors specially the judiciary. One or two members from the judiciary on the Review Committee would provide a greater check on the workings of the 	Committee as this would bring in representation from the judicial arm of the State so that the Review Committee does not remain a body manned purely by the 	executive branch. This could go some ways to ensure that the Committee does not just "rubber stamp" the orders of interception issued by the various 	competent authorities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is not in dispute that there is a need for greater transparency in the government's surveillance activities in order to address the problems associated 	with illegal and unauthorised interceptions. This paper is not making the case that greater transparency in and by itself will be able to solve the 	problems that may be associated with the government's currency interception and surveillance regime, however it is not possible to address any problem 	unless we know the real extent of it. It is essential for an informed debate and discussion that the people participating in the discussion are "informed", 	i.e. they should have accurate and adequate information regarding the issues which are being discussed. The current state of the debate on interception is 	rife with individuals using illustrative and anecdotal evidence which, in the absence of any other evidence, they assume to be the norm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more transparent and forthcoming state machinery which regularly keeps its citizens abreast of the state of its surveillance regime would be likely to 	get better suggestions and perhaps less criticisms if it does come out that the checks and balances imposed in the regulations are actually making a 	difference to check unauthorized interceptions, and if not, then it is the right of the citizens to know about this and ask for reforms.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9(2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Namit Sharma v. Union of India,			&lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt; . Although the judgment was overturned on review, however this observation quoted above would still hold as it has not been specifically 			overturned.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt; http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9 (2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://gulail.com/the-stalkers/"&gt;http://gulail.com/the-stalkers/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms"&gt; http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html"&gt; http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; For a detailed discussion of the Rules of interception please see Policy Paper on Surveillance in India, by Vipul Kharbanda, 			&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; As an example please see 			&lt;a href="http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"&gt; http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt; https://www.google.com/transparencyreport/userdatarequests/countries/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;a href="https://govtrequests.facebook.com/country/India/2015-H1/"&gt;https://govtrequests.facebook.com/country/India/2015-H1/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Non-content data (NCD) such as basic subscriber information including the information captured at the time of registration such as an alternate 			e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., "to," "from," and 			"date" fields from email headers).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Data that users create, communicate, and store on or through Yahoo. This could include words in a communication (e.g., Mail or Messenger), photos 			on Flickr, files uploaded, Yahoo Address Book entries, Yahoo Calendar event details, thoughts recorded in Yahoo Notepad or comments or posts on 			Yahoo Answers or any other Yahoo property.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;a href="https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html"&gt; https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/transparency-in-surveillance'&gt;https://cis-india.org/internet-governance/blog/transparency-in-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2016-01-23T15:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/kannada-wikipedia-edit-a-thon-for-mechanical-engineering-students-of-sagara">
    <title>Kannada Wikipedia edit-a-thon for Mechanical Engineering students of Sagara</title>
    <link>https://cis-india.org/openness/kannada-wikipedia-edit-a-thon-for-mechanical-engineering-students-of-sagara</link>
    <description>
        &lt;b&gt;In Sagara, Karnataka, a Kannada Wikipedia edit-a-thon is being planned to be organised during January 26-27.&lt;/b&gt;
        
&lt;p&gt;Kannada Wikipedia has turned 13 this year. Started in June 2003, the 
free Kannada-language online encyclopedia is one of the major resources 
in the language on the Internet. With over 19700 and even with many 
broader topics like art, literature, politics, science and culture 
covered in Kannada Wikipedia, there is significantly low content about 
Mechanical Engineering. Mechanical Engineering enthusiasts of the city 
are coming together to bridge this gap by creating and enhancing content
 in Kannada on the internet. Out of the three days, the whole day of the
 25th is dedicated for clicking pictures of historical places of the 
city which will additionally contribute to articles related to the city.
 The event is being organised by the Kannada Wikimedia community that 
voluntarily contributes to grow Kannada Wikipedia and several other 
Kannada Wikimedia projects, and the Centre for Internet and Society's Access to Knowledge programme. The edit-a-thon will
 include demonstration and practice sessions of input in Kannada script,
 basics of Wikipedia editing and its policies and guidelines, searching 
for references from various journals and notable books, and translation 
of technical content, and is open to all. Anant Subray, Programme 
Associate who is the organiser of the event could be contacted at 
9739811664 for more information.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/kannada-wikipedia-edit-a-thon-for-mechanical-engineering-students-of-sagara'&gt;https://cis-india.org/openness/kannada-wikipedia-edit-a-thon-for-mechanical-engineering-students-of-sagara&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ananth Subray</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    

   <dc:date>2016-03-01T13:56:54Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/litt-review.pdf">
    <title>Litt Review</title>
    <link>https://cis-india.org/a2k/blogs/litt-review.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/litt-review.pdf'&gt;https://cis-india.org/a2k/blogs/litt-review.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-01-22T02:50:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes">
    <title>NASSCOM-DSCI Annual Information Security Summit 2015 - Notes</title>
    <link>https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes</link>
    <description>
        &lt;b&gt;NASSCOM-DSCI organised the 10th Annual Information Security Summit (AISS) 2015 in Delhi during December 16-17. Sumandro Chattapadhyay participated in this engaging Summit. He shares a collection of his notes and various tweets from the event.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Details about the Summit&lt;/h2&gt;
&lt;p&gt;Event page: &lt;a href="https://www.dsci.in/events/about/2261"&gt;https://www.dsci.in/events/about/2261&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Agenda: &lt;a href="https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf"&gt;https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes from the Summit&lt;/h2&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr.G.K.Pillai ,Chairman DSCI addressing the audience @ 10th Annual Information Security Summit '15 &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/JVcwct3HSF"&gt;pic.twitter.com/JVcwct3HSF&lt;/a&gt;&lt;/p&gt;
— DSCI (@DSCI_Connect) &lt;a href="https://twitter.com/DSCI_Connect/status/676979952277987328"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. G. K. Pillai, Chairman of Data Security Council of India (DSCI), set the tone of the Summit at the very first hour by noting that 1) state and private industries in India are working in silos when it comes to preventing cybercrimes, 2) there is a lot of skill among young technologists and entrepreneurs, and the state and the private sectors are often unaware of this, and 3) there is serious lack of (cyber-)capacity among law enforcement agencies.&lt;/p&gt;
&lt;p&gt;In his Inaugural Address, Dr. Arvind Gupta (Deputy National Security Advisor and Secretary, NSCS), provided a detailed overview of the emerging challenges and framework of cybersecurity in India. He focused on the following points:&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; Dy NSA Dr Arvind Gupta calls 4 &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; by &lt;a href="https://twitter.com/hashtag/design?src=hash"&gt;#design&lt;/a&gt; in &lt;a href="https://twitter.com/hashtag/ICT?src=hash"&gt;#ICT&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/79kq9lWGtk"&gt;pic.twitter.com/79kq9lWGtk&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/676980799347023872"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Security is a key problem in the present era of ICTs as it is not in-built. In the upcoming IoT era, security must be built into ICT systems.&lt;/li&gt;
&lt;li&gt;In the next billion addition to internet population, 50% will be from India. Hence cybersecurity is a big concern for India.&lt;/li&gt;
&lt;li&gt;ICTs will play a catalytic role in achieving SDGs. Growth of internet is part of the sustainable development agenda.&lt;/li&gt;
&lt;li&gt;We need a broad range of critical security services - big data analytics, identity management, etc.&lt;/li&gt;
&lt;li&gt;The e-governance initiatives launched by the Indian government are critically dependent on a safe and secure internet.&lt;/li&gt;
&lt;li&gt;Darkweb is a key facilitator of cybercrime. Globally there is a growing concern regarding the security of cyberspace.
&lt;/li&gt;&lt;li&gt;On the other hand, there exists deep divide in access to ICTs, and also in availability of content in local languages.&lt;/li&gt;
&lt;li&gt;The Indian government has initiated bilateral cybersecurity dialogues with various countries.&lt;/li&gt;
&lt;li&gt;Indian government is contemplating setting up of centres of excellence in cryptography. It has already partnered with NASSCOM to develop cybersecurity guidelines for smart cities.&lt;/li&gt;
&lt;li&gt;While India is a large global market for security technology, it also needs to be self-reliant. Indian private sector should make use of government policies and bilateral trust enjoyed by India with various developing countries in Africa and south America to develop security technology solutions, create meaningful jobs in India, and export services and software to other developing countries.&lt;/li&gt;
&lt;li&gt;Strong research and development, and manufacturing base are absolutely necessary for India to be self-reliant in cybersecurity. DSCI should work with private sector, academia, and government to coordinate and realise this agenda.&lt;/li&gt;
&lt;li&gt;In the line of the Climate Change Fund, we should create a cybersecurity fund, since it is a global problem.&lt;/li&gt;
&lt;li&gt;Silos are our bane in general. Bringing government agencies together is crucial. Trust issues (between government, private sector, and users) remain, and can only be resolved over time.&lt;/li&gt;
&lt;li&gt;The demand for cybersecurity solutions in India is so large, that there is space for everyone.&lt;/li&gt;
&lt;li&gt;The national cybersecurity centre is being set up.&lt;/li&gt;
&lt;li&gt;Thinktanks can play a crucial role in helping the government to develop strategies for global cybersecurity negotiations. Indian negotiators are often capacity constrained.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Rajendra Pawar, Chair of the NASSCOM Cyber Security Task Force,  NASSCOM Cybersecurity Initiative, provided glimpses of the emerging business opportunity around cybersecurity in India:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In next 10 years, the IT economy in India will be USD 350 bn, and &lt;a href="https://blogs.dsci.in/building-usd-35-billion-cyber-security-industry-how-do-we-do-it/"&gt;10% of that will be the cybersecurity pie&lt;/a&gt;. This means a million job only in the cybersecurity space.&lt;/li&gt;
&lt;li&gt;Academic institutes are key to creation of new ideas and hence entrepreneurs. Government and private sectors should work closely with academic institutes.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Companies+Govt+Academia= High growth of the cybersecurity industry' - Rajendra Pawar at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/676995090955530246"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Globally, cybersecurity innovation and industries happen in clusters. Cities and states must come forward to create such clusters.&lt;/li&gt;
&lt;li&gt;2/3rd of the cybersecurity market is provision of services. This is where India has a great advantage, and should build on that to become a global brand in cybersecurity services.&lt;/li&gt;
&lt;li&gt;Everyday digital security literacy and cultures need to be created.&lt;/li&gt;
&lt;li&gt;Publication of cybersecurity best practices among private companies is a necessity.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Corporate disclosures of breaches being considered with Nasscom under cybersec task force: Rajendra Pawar &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/ETtech"&gt;@ETtech&lt;/a&gt;&lt;/p&gt;
— Neha Alawadhi (@NehaAlawadhiET) &lt;a href="https://twitter.com/NehaAlawadhiET/status/676994553799417856"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Dedicated cybersecurity spending should be made part of the e-governance budget of central and state governments.&lt;/li&gt;
&lt;li&gt;DSCI should function as a clearing house of cybersecurity case studies. At present, thought leadership in cybersecurity comes from the criminals. By serving as a use case clearing house, DSCI will inform interested researchers about potential challenges for which solution needs to be created.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Manish Tiwary of Microsoft informed the audience that India is in the top 3 positions globally in terms of malware proliferation, and this ensures that India is a big focus for Microsoft in its global war against malware. Microsoft India looks forward to work closely with CERT-In and other government agencies.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;RSA's Kartik Shahani &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; Adopt a Deep &amp;amp; Pervasive Level of True Visibility Everywhere &lt;a href="https://t.co/2U8J8WkWsI"&gt;pic.twitter.com/2U8J8WkWsI&lt;/a&gt;&lt;/p&gt;
— Debjani Gupta (@DebjaniGupta1) &lt;a href="https://twitter.com/DebjaniGupta1/status/676999786722156544"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Data localization; one of the stumbling blocks that undermine investments in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/vrff3Amcv0"&gt;pic.twitter.com/vrff3Amcv0&lt;/a&gt;&lt;/p&gt;
— Appvigil (@appvigil_co) &lt;a href="https://twitter.com/appvigil_co/status/677043180731301888"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Trust verification 4 embedded devices isnt complex bt much desired as people lives r dependent on that-cld cause physical damage &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677057992831860736"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;"Most compromised OS in 2k15: iOS"-Riyaz Tambe, Palo Alto Networks &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677015382356533249"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Security by default in IOS architecture  tho' can't verify code as noṭ open - is it security by obscurity? &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/kbPZgH8oA0"&gt;pic.twitter.com/kbPZgH8oA0&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677055086611173376"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Catching Fraudsters&lt;/strong&gt; had two insightful presentations from Dr. Triveni Singh, Additional SP of Special Task Force of UP Police, and Mr. Manoj Kaushik, IAS, Additional Director of FIU.&lt;/p&gt;
&lt;p&gt;Dr. Singh noted that a key challenge faced by police today is that nobody comes to them with a case of online fraud. Most fraud businesses are run by young groups operating BPOs that steal details from individuals. There exists a huge black market of financial and personal data - often collected from financial institutions and job search sites. Almost any personal data can be bought in such markets. Further, SIM cards under fake names are very easy to buy. The fraudsters are effective using all fake identity, and is using operational infrastructures outsourced from legitimate vendors under fake names. Without a central database of all bank customers, it is very difficult for the police to track people across the financial sector. It becomes even more difficult for Indian police to get access to personal data of potential fraudsters when it is stored in a foreign server. which is often the case with usual web services and apps. Many Indian ISPs do not keep IP history data systematically, or do not have the technical expertise to share it in a structured and time-sensitive way.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr. Triveni Singh talks about raiding fake call centres in Delhi NCR that scam millions every year &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/EmE4y3jux2"&gt;pic.twitter.com/EmE4y3jux2&lt;/a&gt;&lt;/p&gt;
— pradyumn nand (@PradyumnNand) &lt;a href="https://twitter.com/PradyumnNand/status/677063276442738689"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. Kaushik explained that no financial fraud is uniquely committed via internet. Many fraud begin with internet but eventually involve physical fraudulent money transaction. Credit/debit card frauds all involve card data theft via various internet-based and physical methods. However, cybercrime is continued to be mistakenly seen as frauds undertaken completely online. Further, mobile-based frauds are yet another category. Almost all apps we use are compromised, or store transaction history in an insecure way, which reveals such data to hackers. FIU is targeting bank accounts to which fraud money is going, and closing them down. Catching the people behind these bank accounts is much more difficult, as account loaning has become a common practice - where valid accounts are loaned out for a small amount of money to fraudsters who return the account after taking out the fraudulent money. Better information sharing between private sector and government will make catching fraudsters easier.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/AkhileshTuteja"&gt;@AkhileshTuteja&lt;/a&gt;  With data overload and big data being prevalent are we considering privacy elements &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/KpmgIndiaCyber?src=hash"&gt;#KpmgIndiaCyber&lt;/a&gt;&lt;/p&gt;
— Atul Gupta (@AtulGup15843145) &lt;a href="https://twitter.com/AtulGup15843145/status/677082045701488640"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Tech solns today designed to protect security - solns for privacy need to evolve'- &lt;a href="https://twitter.com/Mayurakshi_Ray"&gt;@Mayurakshi_Ray&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066470325534721"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In-house tools important but community collaboration critical to fight security threats &lt;a href="https://twitter.com/tata_comm"&gt;@tata_comm&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/ZjbCnaROXC"&gt;pic.twitter.com/ZjbCnaROXC&lt;/a&gt;&lt;/p&gt;
— aparna  (@aparnag14) &lt;a href="https://twitter.com/aparnag14/status/677067260268187648"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Orgns in India have a long way to go b4 they internalise privacy principles' Subhash S, CISO ICICI &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066928880410624"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Prof PK giving an interesting brief on Academia role in Cyber Security. &lt;a href="https://twitter.com/ponguru"&gt;@ponguru&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/MEiO6sCJwu"&gt;pic.twitter.com/MEiO6sCJwu&lt;/a&gt;&lt;/p&gt;
— Vikas Yadav (@VikasSYadav) &lt;a href="https://twitter.com/VikasSYadav/status/677088566871101440"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Potential for interaction between Academia, Government and Industry but not an established reality yet. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/MappingCyberEducation?src=hash"&gt;#MappingCyberEducation&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677089590717517824"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;I have figured out why information security is not in any boardroom discussions. Cause there are no good speakers / orators . &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Virag Thakkar (@viragthakkar) &lt;a href="https://twitter.com/viragthakkar/status/677078491699871745"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Smart Cities&lt;/strong&gt; focused on discussing the actual cities coming up India, and the security challenges highlighted by them. There was a presentation on Mahindra World City being built near Jaipur. Presenters talked about the need to stabilise, standardise, and securitise the unique identities of machines and sensors in a smart city context, so as to enable secured machine-to-machine communication. Since 'smartness' comes from connecting various applications and data silos together, the governance of proprietary technology and ensuring inter-operable data standards are crucial in the smart city.&lt;/p&gt;
&lt;p&gt;As Special Purposed Vehicles are being planned to realise the smart cities, the presenters warned that finding the right CEOs for these entities will be critical for their success. Legacy processes and infrastructures (and labour unions) are a big challenge when realising smart cities. Hence, the first step towards the smart cities must be taken through connected enforcement of law, order, and social norms.&lt;/p&gt;
&lt;p&gt;Privacy-by-design and security-by-design are necessary criteria for smart cities technologies. Along with that regular and automatic software/middleware updating of distributed systems and devices should be ensured, as well as the physical security of the actual devices and cables.&lt;/p&gt;
&lt;p&gt;In terms of standards, security service compliance standards and those for protocols need to be established for the internet-of-things sector in India. On the other hand, there is significant interest of international vendors to serve the Indian market. All global data and cloud storage players, including Microsoft Azure cloud, are moving into India, and are working on substantial and complete data localisation efforts.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Session - Why should you hire Women Security Professionals?... Balancing gender diversity 
&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/DSCI_Connect?src=hash"&gt;#DSCI_Connect&lt;/a&gt; &lt;a href="https://t.co/uIMfG9PvAb"&gt;pic.twitter.com/uIMfG9PvAb&lt;/a&gt;&lt;/p&gt;
— Jagan Suri (@jsuri90) &lt;a href="https://twitter.com/jsuri90/status/677109792679157760"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;gender Diversity in cybersecurity critical 4 India's future. &lt;a href="https://twitter.com/symantec"&gt;@symantec&lt;/a&gt; partnered with &lt;a href="https://twitter.com/nasscom"&gt;@nasscom&lt;/a&gt; via 1000 women scholarships &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677118674197602304"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Dialogue with CERT-In 
.. Starting 2nd Day of &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;
.. B J Srinath, DG, CERT 
&lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/security?src=hash"&gt;#security&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/privacy?src=hash"&gt;#privacy&lt;/a&gt; &lt;a href="https://t.co/cvDcrgkein"&gt;pic.twitter.com/cvDcrgkein&lt;/a&gt;&lt;/p&gt;
— Vinayak Godse (@godvinayak) &lt;a href="https://twitter.com/godvinayak/status/677342972170493952"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;New &lt;a href="https://twitter.com/hashtag/problems?src=hash"&gt;#problems&lt;/a&gt; can't b solved w old &lt;a href="https://twitter.com/hashtag/solutions?src=hash"&gt;#solutions&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG BJ Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341246281539585"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;17 entities within &lt;a href="https://twitter.com/hashtag/Indian?src=hash"&gt;#Indian&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/government?src=hash"&gt;#government&lt;/a&gt; engaged in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT head &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341728282533888"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Scope of activities by CERT in &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; way more than its counterparts elsewhere &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677342193854451712"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT looks 8 prediction &amp;amp; &lt;a href="https://twitter.com/hashtag/prevention?src=hash"&gt;#prevention&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/emergency?src=hash"&gt;#emergency&lt;/a&gt; not just &lt;a href="https://twitter.com/hashtag/response?src=hash"&gt;#response&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343140630540288"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT willing to &lt;a href="https://twitter.com/hashtag/share?src=hash"&gt;#share&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/information?src=hash"&gt;#information&lt;/a&gt; rather than just receiving &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343512833101824"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Savita CERTin outlines drill initiatives taken 4 preparedness-detect (protect), defend attacks wth response &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/wXrkgoLzr2"&gt;pic.twitter.com/wXrkgoLzr2&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677346822449303553"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;CERTin also offers incident predicatibility,Crisis mgmt plans, &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; assurance ladder (7 levels) besides 24 x 7 prevention &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677348506869239809"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; has 7.2 million bot infected &lt;a href="https://twitter.com/hashtag/machines?src=hash"&gt;#machines&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677355051308871680"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Seizure &amp;amp; protection of electronic devices as admissible evidence (certificate u Sec 65B) imperative under Forensics investigation &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677364713005576192"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Law enforcement agency&amp;amp;corporate world must collaborate to fight cybercrime'-Atul Gupta,Partner-Risk Adv. @ &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/GwAQWhYMmK"&gt;pic.twitter.com/GwAQWhYMmK&lt;/a&gt;&lt;/p&gt;
— KPMG India (@KPMGIndia) &lt;a href="https://twitter.com/KPMGIndia/status/677373217711919104"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. R. Chandrasekhar, President of NASSCOM, foregrounded the recommendations made by the Cybersecurity Special Task Force of NASSCOM, in his Special Address on the second day. He noted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a great opportunity to brand India as a global security R&amp;amp;D and services hub. Other countries are also quite interested in India becoming such a hub.&lt;/li&gt;
&lt;li&gt;The government should set up a cybersecurity startup and innovation fund, in coordination with and working in parallel with the centres of excellence in internet-of-things (being led by DeitY) and the data science/analytics initiative (being led by DST).&lt;/li&gt;
&lt;li&gt;There is an immediate need to create a capable workforce for the cybersecurity industry.&lt;/li&gt;
&lt;li&gt;Cybersecurity affects everyone but there is almost no public disclosure. This leads to low public awareness and valuation of costs of cybersecurity failures. The government should instruct the Ministry of Corporate Affairs to get corporates to disclose (publicly or directly to the Ministry) security breeches.&lt;/li&gt;
&lt;li&gt;With digital India and everyone going online, cyberspace will increasingly be prone to attacks of various kinds, and increasing scale of potential loss. Cybersecurity, hence, must be part of the core national development agenda.&lt;/li&gt;
&lt;li&gt;The cybersecurity market in India is big enough and under-served enough for everyone to come and contribute to it.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Keynote Address by Mr. Rajiv Singh, MD – South Asia of Entrust Datacard, and Mr. Saurabh Airi, Technical Sales Consultant of Entrust Datacard, focused on trustworthiness and security of online identities for financial transactions. They argued that all kinds of transactions require a common form factor, which can be a card or a mobile phone. The key challenge is to make the form factor unique, verified, and secure. While no programme is completely secure, it is necessary to build security into the form factor - security of both the physical and digital kind, from the substrates of the card to the encryption algorithms. Entrust and Datacard have merged in recent past to align their identity management and security transaction workflows, from physical cards to software systems for transactions. The advantages of this joint expertise have allowed them to successfully develop the National Population Register cards of India. Now, with the mobile phone emerging as a key financial transaction form factor, the challenge across the cybersecurity industry is to offer the same level of physical, digital, and network security for the mobile phone, as are provided for ATM cards and cash machines.&lt;/p&gt;
&lt;p&gt;The following Keynote Address by Dr. Jared Ragland, Director - Policy of BSA, focused on the cybersecurity investment landscape in India and the neighbouring region. BSA, he explained, is a global trade body of software companies. All major global software companies are members of BSA. Recently, BSA has produced a study on the cybersecurity industry across 10 markets in the Asia Pacific region, titled &lt;a href="http://cybersecurity.bsa.org/2015/apac/"&gt;Asia Pacific Cybersecurity Dashboard&lt;/a&gt;. The study provides an overview of cybersecurity policy developments in these countries, and sector-specific opportunities in the region. Dr. Ragland mentioned the following as the key building blocks of cybersecurity policy: legal foundation, establishment of operational entities, building trust and partnerships (PPP), addressing sector-specific requirements, and education and awareness. As for India, he argued that while steady steps have been taken in the cybersecurity policy space by the government, a lot remains to be done. Operationalisation of the policy is especially lacking. PPPs are happening but there is a general lack of persistent formal engagement with the private sector, especially with global software companies. There is almost no sector-specific strategy. Further, the requirement for India-specific testing of technologies, according to domestic and not global standards, is leading to entry barrier for global companies and export barrier for Indian companies. Having said that, Dr. Ragland pointed out that India's cybersecurity experience is quite representative of that of the Asia Pacific region. He noted the following as major stumbling blocks from an international industry perspective: unnecessary and unreasonable testing requirements, setting of domestic standards, and data localisations rules.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;The Policy Makers' panel in &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; in progress. Arvind Gupta, Head, BJP IT cell (&lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt;) speaks. &lt;a href="https://t.co/9yWR0gMwf5"&gt;pic.twitter.com/9yWR0gMwf5&lt;/a&gt;&lt;/p&gt;
— Nandkumar Saravadé (@saravade) &lt;a href="https://twitter.com/saravade/status/677437443356798977"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;One of the final sessions of the Summit was the Public Policy Dialogue between &lt;a href="https://twitter.com/rajeevgowda"&gt;Prof. M.V. Rajeev Gowda&lt;/a&gt;, Member of Parliament, Rajya Sabha, and &lt;a href="https://twitter.com/buzzindelhi"&gt;Mr. Arvind Gupta&lt;/a&gt;, Head of IT Cell, BJP.&lt;/p&gt;
&lt;p&gt;Prof. Gowda focused on the following concerns:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We often freely give up our information and rights over to owners of websites and applications on the web. We need to ask questions regarding the ownership, storage, and usage of such data.&lt;/li&gt;
&lt;li&gt;While Section 66A of Information Technology Act started as a anti-spam rule, it has actually been used to harass people, instead of protecting them from online harassment.&lt;/li&gt;
&lt;li&gt;The bill on DNA profiling has raised crucial privacy concerns related to this most personal data. The complexity around the issue is created by the possibility of data leakage and usage for various commercial interests.&lt;/li&gt;
&lt;li&gt;We need to ask if western notions of privacy will work in the Indian context.&lt;/li&gt;
&lt;li&gt;We need to move towards a cashless economy, which will not only formalise the existing informal economy but also speed up transactions nationally. We need to keep in mind that this will put a substantial demand burden on the communication infrastructure, as all transactions will happen through these.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt; Mr. Gupta shared his keen insights about the key public policy issues in &lt;em&gt;digital India&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The journey to establish &lt;em&gt;the digital&lt;/em&gt; as a key political agenda and strategy within BJP took him more than 6 years. He has been an entrepreneur, and will always remain one. His approached his political journey as an entrepreneur.
&lt;/li&gt;&lt;li&gt;While we are producing numerous digitally literate citizens, the companies offering services on the internet often unknowingly acquire data about these citizens, store them, and sometimes even expose them. India perhaps produces the greatest volume of digital exhaust globally.&lt;/li&gt;
&lt;li&gt;BJP inherited the Aadhaar national identity management platform from UPA, and has decided to integrate it deeply into its digital India architecture.&lt;/li&gt;
&lt;li&gt;Financial and administrative transactions, especially ones undertake by and with governments, are all becoming digital and mostly Aadhaar-linked. We are not sure where all such data is going, and who all has access to such data.&lt;/li&gt;
&lt;li&gt;Right now there is an ongoing debate about using biometric system for identification. The debate on privacy is much needed, and a privacy policy is essential to strengthen Aadhaar. We must remember that the benefits of Aadhaar clearly outweigh the risks. Greatest privacy threats today come from many other places, including simple mobile torch apps.&lt;/li&gt;
&lt;li&gt;India is rethinking its cybersecurity capacities in a serious manner. After Paris attack it has become obvious that the state should be allowed to look into electronic communication under reasonable guidelines. The challenge is identifying the fine balance between consumers' interest on one hand, and national interest and security concerns on the other. Unfortunately, the concerns of a few is often getting amplified in popular media.&lt;/li&gt;
&lt;li&gt;MyGov platform should be used much more effectively for public policy debates. Social media networks, like Twitter, are not the correct platforms for such debates.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;: &lt;a href="https://twitter.com/rajivgowda"&gt;@rajivgowda&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt; are talking abt proactive disclosure as a key part of &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; strategy &lt;a href="https://twitter.com/hashtag/openData?src=hash"&gt;#openData&lt;/a&gt; &lt;a href="https://twitter.com/DataPortalIndia"&gt;@DataPortalIndia&lt;/a&gt;&lt;/p&gt;
— sumandro (@ajantriks) &lt;a href="https://twitter.com/ajantriks/status/677447609502445568"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes'&gt;https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>NASSCOM</dc:subject>
    
    
        <dc:subject>DSCI</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2016-01-19T07:58:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis">
    <title>Big Data in the Global South - An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;The period that we have embarked upon is unprecedented in history in terms of our ability to learn about human behavior.&lt;/i&gt;"	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world we live in today is facing a slow but deliberate metamorphosis of decisive information; from the erstwhile monopoly of world leaders and the 	captains of industry obtained through regulated means, it has transformed into a relatively undervalued currency of knowledge collected from individual 	digital expressions over a vast network of interconnected electrical impulses.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; This seemingly random 	deluge of binary numbers, when interpreted represents an intricately woven tapestry of the choices that define everyday life, made over virtual platforms. 	The machines we once employed for menial tasks have become sensorial observers of our desires, wants and needs, so much so that they might now predict the 	course of our future choices and decisions.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; The patterns of human behaviour that are reflected within this 	data inform policy makers, in both a public and private context. The collective data obtained from our digital shadows thus forms a rapidly expanding 	storehouse of memory, from which interested parties can draw upon to resolve problems and enable a more efficient functioning of foundational institutions, 	such as the markets, the regulators and the government.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term used to describe a large volume of collected data, in a structured as well as unstructured form is called Big Data. This data requires niche 	technology, outside of traditional software databases, to process; simply because of its exponential increment in a relatively short period of time. Big Data is usually identified using a "three V" characterization - larger volume, greater variety and distinguishably high rates of velocity.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; This is exemplified in the diverse sources from which this data is obtained; mobile phone records, 	climate sensors, social media content, GPS satellite identifications and patterns of employment, to name a few. Big data analytics refers to the tools and 	methodologies that aim to transform large quantities of raw data into "interpretable data", in order to study and discern the same so that causal 	relationships between events can be conclusively established.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Such analysis could allow for the 	encouragement of the positive effects of such data and a concentrated mitigation of negative outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper seeks to map out the practices of different governments, civil society, and the private sector with respect to the collection, interpretation 	and analysis of big data in the global south, illustrated across a background of significant events surrounding the use of big data in relevant contexts. 	This will be combined with an articulation of potential opportunities to use big data analytics within both the public and private spheres and an 	identification of the contextual challenges that may obstruct the efficient use of this data. The objective of this study is to deliberate upon how 	significant obstructions to the achievement of developmental goals within the global south can be overcome through an accurate recognition, interpretation 	and analysis of big data collected from diverse sources.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;II. &lt;/b&gt; &lt;b&gt;Uses of Big Data in the Global Development&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Big Data for development is the process though which raw, unstructured and imperfect data is analyzed, interpreted and transformed into information that 	can be acted upon by governments and policy makers in various capacities. The amount of digital data available in the world today has grown from 150 	exabytes in 2005 to 1200 exabytes in 2010.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; It is predicted that this figure would increase by 40% annually in the next few years&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;, which is close to 40 times growth of the world's population.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The implication of this is essentially that the share of available data in the world today that is less 	than a minute old is increasing at an exponential rate. Moreover, an increasing percentage of this data is produced and created real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data revolution that is incumbent upon us is characterized by a rapidly accumulating and continuously evolving stock of data prevalent` in both 	industrialized as well as developing countries. This data is extracted from technological services that act as sensors and reflect the behaviour of 	individuals in relation to their socio-economic circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many global south countries, this data is generated through mobile phone technology. This trend is evident in Sub Saharan Africa, where mobile phone 	technology has been used as an effective substitute for often weak and unstructured State mechanisms such as faulty infrastructure, underdeveloped systems 	of banking and inferior telecommunication networks.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, a recent study presented at the Data for Development session at the NetMob Conference at MIT used mobile phone data to analyze the impact of opening a new toll highway in Dakar, Senegal on human mobility, particularly how people commute to work in the metropolitan area.	&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A huge investment, the improved infrastructure is expected to result in a 	significant increase of people in and out of Dakar, along with the transport of essential goods. This would initiate rural development in the areas outside 	of Dakar and boost the value of land within the region.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The impact of the newly 	constructed highway can however only be analyzed effectively and accurately through the collection of this mobile phone data from actual commuters, on a 	real time basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile phones technology is no longer used just for personal communication but has been transformed into an effective tool to secure employment 	opportunities, transfer money, determine stock options and assess the prices of various commodities.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; This generates vast amounts of data about individuals and their interactions with the government and private sector companies. Internet Traffic is 	predicted to grow between 25 to 30 % in the next few years in North America, Western Europe and Japan but in Latin America, The Middle East and Africa this 	figure has been expected to touch close to 50%.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; The bulk of this internet traffic can be traced back to 	mobile devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential applicability of Big Data for development at the most general level is the ability to provide an overview of the well being of a given 	population at a particular period of time.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; This overcomes the relatively longer time lag that is 	prevalent with most other traditional forms of data collection. The analysis of this data has helped, to a large extent, uncover "digital smoke signals" - 	or inherent changes in the usage patterns of technological services, by individuals within communities.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This may act as an indicator of the changes in the underlying well-being of the community as a whole. This information about the well-being of a community 	derived from their usage of technology provides significantly relevant feedback to policy makers on the success or failure of particular schemes and can 	pin point changes that need to be made to status quo. &lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;The hope is that this feedback delivered in real-time, would in turn lead to a more flexible and accessible system of international development, thus securing more measurable and sustained outcomes.	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis of big data involves the use of advanced computational technology that can aid in the determination of trends, patterns and correlations 	within unstructured data so as to transform it into actionable information. It is hoped that this in addition to the human perspective and experience 	afforded to the process could enable decision makers to rely upon information that is both reliable and up to date to formulate durable and self-sustaining 	development policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The availability of raw data has to be adequately complemented with intent and a capacity to use it effectively. To this effect, there is an emerging 	volume of literature that seeks to characterize the primary sources of this Big Data as sharing certain easily distinguishable features. Firstly, it is 	digitally generated and can be stored in a binary format, thus making it susceptible to requisite manipulation by computers attempting to engage in its 	interpretation. It is passively produced as a by-product of digital interaction and can be automatically extracted for the purpose of continuous analysis. 	It is also geographically traceable within a predetermined time period. It is however important to note that "real time" does not necessarily refer to 	information occurring instantly but is reflective of the relatively short time in which the information is produced and made available thus making it relevant within the requisite timeframe. This allows efficient responsive action to be taken in a short span of time thus creating a feedback loop.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most cases the granularity of the data is preferably sought to be expanded over a larger spatial context such as a village or a community as opposed to 	an individual simply because this affords an adequate recognition of privacy concerns and the lack of definitive consent of the individuals in the 	extraction of this data. In order to ease the process of determination of this data, the UN Global Pulse has developed taxonomy of sorts to assess the 	types of data sources that are relevant to utilizing this information for development purposes.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; These 	include the following sources;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Data Exhaust&lt;/i&gt; or the digital footprint left behind by individuals' use of technology for service oriented tasks such as web purchases, mobile phone transactions and real 	time information collected by UN agencies to monitor their projects such as levels of food grains in storage units, attendance in schools etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Online Information&lt;/i&gt; which includes user generated content on the internet such as news, blog entries and social media interactions which may be used to identify trends in 	human desires, perceptions and needs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Physical sensors&lt;/i&gt; such as satellite or infrared imagery of infrastructural development, traffic patterns, light emissions and topographical changes, thus enabling the remote 	sensing of changes in human activity over a period of time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Citizen reporting or crowd sourced data&lt;/i&gt; , which includes information produced on hotlines, mobile based surveys, customer generated maps etc. Although a passive source of data collection, this is 	a key instrument in assessing the efficacy of action oriented plans taken by decision makers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The capacity to analyze this big data is hinged upon the reliance placed on technologically advanced processes such as powerful algorithms which can 	synthesize the abundance of raw data and break down the information enabling the identification of patterns and correlations. This process would rely on 	advanced visualization techniques such &lt;i&gt;"sense-making tools"&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;b&gt;[21]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The identification of patterns within this data is carried out through a process of instituting a common framework for the analysis of this data. This 	requires the creation of a specific lexicon that would help tag and sort the collected data. This lexicon would specify &lt;i&gt;what &lt;/i&gt;type of information 	is collected and &lt;i&gt;who &lt;/i&gt;it is interpreted and collected by, the observer or the reporter. It would also aid in the determination of &lt;i&gt;how &lt;/i&gt;the 	data is acquired and the qualitative and quantitative nature of the data. Finally, the spatial context of the data and the time frame within which it was 	collected constituting the aspects of &lt;i&gt;where &lt;/i&gt;and &lt;i&gt;when&lt;/i&gt; would be taken into consideration. The data would then be analyzed through a process 	of &lt;i&gt;Filtering, Summarizing and Categorizing&lt;/i&gt; the data by transforming it into an appropriate collection of relevant indicators of a particular 	population demographic. &lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intensive mining of predominantly socioeconomic data is known as "reality mining" &lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; and this can shed light on the processes and interactions that are reflected within the data. This is carried out via a tested three fold process. Firstly, the "	&lt;i&gt;Continuous Analysis over the streaming of the data", &lt;/i&gt;which involves the monitoring and analyzing high frequency data streams to extract often uncertain raw data. For example, the systematic gathering of the prices of products sold online over a period of time. Secondly,	&lt;i&gt;"The Online digestion of semi structured data and unstructured data", &lt;/i&gt;which includes news articles, reviews of services and products and opinion 	polls on social media that aid in the determination of public perception, trends and contemporary events that are generating interest across the globe. 	Thirdly, a &lt;i&gt;'Real-time Correlation of streaming data with slowly accessible historical data repositories,' &lt;/i&gt;which refers to the "mechanisms used for 	correlating and integrating data in real-time with historical records."&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; The purpose of this stage is to 	derive a contextualized perception of personalized information that seeks to add value to the data by providing a historical context to it. &lt;i&gt; &lt;/i&gt;Big 	Data for development purposes would make use of a combination of these depending on the context and need.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) &lt;/b&gt; &lt;b&gt;Policy Formulation &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The world today has become increasingly volatile in terms of how the decisions of certain countries are beginning to have an impact on vulnerable 	communities within entirely different nations. Our global economy has become infinitely more susceptible to fluctuating conditions primarily because of its 	interconnectivity hinged upon transnational interdependence. The primordial instigators of most of these changes, including the nature of harvests, prices of essential commodities, employment structures and capital flows, have been financial and environmental disruptions.	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; According to the OECD, " 	&lt;i&gt; Disruptive shocks to the global economy are likely to become more frequent and cause greater economic and social hardship. The economic spillover 		effects of events like the financial crisis or a potential pandemic will grow due to the increasing interconnectivity of the global economy and the 		speed with which people, goods and data travel."&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;b&gt;[26]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The local impacts of these fluctuations may not be easily visible or even traceable but could very well be severe and long lasting. A vibrant literature on 	the vulnerability of communities has highlighted the impacts of these shocks on communities often causing children to drop out of school, families to sell 	their productive assets, and communities to place a greater reliance on state rations.&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; These 	vulnerabilities cannot be definitively discerned through traditional systems of monitoring and information collection. The evidence of the effects of these 	shocks often take too long to reach decision makers; who are unable to formulate effective policies without ascertaining the nature and extent of the 	hardships suffered by these in a given context. The existing early warning systems in place do help raise flags and draw attention to the problem but their 	reach is limited and veracity compromised due to the time it takes to extract and collate this information through traditional means. These traditional 	systems of information collection are difficult to implement within rural impoverished areas and the data collected is not always reliable due to the 	significant time gap in its collection and subsequent interpretation. Data collected from surveys does provide an insight into the state of affairs of 	communities across demographics but this requires time to be collected, processed, verified and eventually published. Further, the expenses incurred in 	this process often prove to be difficult to offset.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; The digital revolution therefore provides a significant opportunity to gain a richer and deeper insight into the very nature and evolution of the human 		experience itself thus affording a more legitimate platform upon which policy deliberations can be articulated. This data driven decision making, once the monopoly of private institutions such as The World Economic Forum and The McKinsey Institute		&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;b&gt;[28]&lt;/b&gt;&lt;/a&gt; has now emerged at the forefront of the public policy discourse. Civil society 		has also expressed an eagerness to be more actively involved in the collection of real-time data after having perceived its benefits. This is evidenced by the emergence of 'crowd sourcing'&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;b&gt;[29]&lt;/b&gt;&lt;/a&gt; and other 'participatory sensing'		&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;b&gt;[30]&lt;/b&gt;&lt;/a&gt; efforts that are founded upon the commonalities shared by like minded communities of individuals. This is being done on easily accessible platforms such as mobile phone interfaces, hand-held radio devices and geospatial technologies.		&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The predictive nature of patterns identifiable from big data is extremely relevant for the purpose of developing socio-economic policies that seek to 	bridge problem-solution gaps and create a conducive environment for growth and development. Mobile phone technology has been able to quantify human 	behavior on an unprecedented scale.&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; This includes being able to detect changes in standard commuting 	patterns of individuals based on their employment status&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; and estimating a country's GDP in real-time by 	measuring the nature and extent of light emissions through remote sensing. &lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent research study has concluded that "due to the relative frequency of certain queries being highly correlated with the percentage of physician 	visits in which individuals present influenza symptoms, it has been possible to accurately estimate the levels of influenza activity in each region of the United States, with a reporting lag of just a day." Online data has thus been used as a part of syndromic surveillance efforts also known as infodemiology.	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; The US Centre for Disease Control has concluded that mining vast quantities of data through online 	health related queries can help detect disease outbreaks " 	&lt;i&gt; before they have been confirmed through a diagnosis or a laboratory confirmation."		&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;b&gt;[36]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; Google trends works in a similar way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another public health monitoring system known as the Healthmap project compiles seemingly fragmented data from news articles, social media, eye-witness reports and expert discussions based on validated studies to "&lt;i&gt;achieve a unified and comprehensive view of the current global state of infectious diseases"&lt;/i&gt; that may be visualized on a map.	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big Data used for development purpose can reduce the reliance on human inputs thus narrowing the room for error and ensuring the accuracy of information 	collected upon which policy makers can base their decisions.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(ii) &lt;/b&gt; &lt;b&gt;Advocacy and Social Change&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Due to the ability of Big Data to provide an unprecedented depth of detail on particular issues, it has often been used as a vehicle of advocacy to 	highlight various issues in great detail. This makes it possible to ensure that citizens are provided with a far more participative experience, capturing 	their attention and hence better communicating these problems. Numerous websites have been able to use this method of crowd sourcing to broadcast socially 	relevant issues&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;. Moreover, the massive increase in access to the internet has dramatically improved the 	scope for activism through the use of volunteered data due to which advocates can now collect data from volunteers more effectively and present these issues in various forums. Websites like Ushahidi&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; and the Black Monday Movement	&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; being prime examples of the same. These platforms have championed various causes, consistently 	exposing significant social crises' that would otherwise go unnoticed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ushahidi application used crowd sourcing mechanisms in the aftermath of the Haiti earthquake to set up a centralized messaging system that allowed 	mobile phone users to provide information on injured and trapped people.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; An analysis of the data showed that the concentration of text messages was correlated with the areas where there was an increased concentration of damaged buildings.	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; Patrick Meier of Ushahidi noted "These results were evidence of the system's ability to predict, with surprising accuracy and statistical significance, the location and extent of structural damage post the earthquake."	&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another problem that data advocacy hopes to tackle, however, is that of too much exposure, with advocates providing information to various parties to help 	ensure that there exists no unwarranted digital surveillance and that sensitive advocacy tools and information are not used inappropriately. An interesting 	illustration of the same is The Tactical Technology Collective&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; that hopes to improve the use of 	technology by activists and various other political actors. The organization, through various mediums such as films, events etc. hopes to train activists 	regarding data protection and privacy awareness and skills among human rights activists. Additionally, Tactical Technology also assists in ensuring that 	information is used in an appealing and relevant manner by human rights activists and in the field of capacity building for the purposes of data advocacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Observed data such as mobile phone records generated through network operators as well as through the use of social media are beginning to embody an 	omnipotent role in the development of academia through detailed research. This is due to the ability of this data to provide microcosms of information 	within both contexts of finer granularity and over larger public spaces. In the wake of natural disasters, this can be extremely useful, as reflected by 	the work of Flowminder after the 2010 Haiti earthquake.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; A similar string of interpretive analysis can 	be carried out in instances of conflict and crises over varying spans of time. Flowminder used the geospatial locations of 1.9 million subscriber identity 	modules in Haiti, beginning 42 days before the earthquake and 158 days after it. This information allowed researches to empirically determine the migration 	patterns of population post the earthquake and enabled a subsequent UNFPA household survey.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt; In a 	similar capacity, the UN Global Pulse is seeking to assist in the process of consultation and deliberation on the specific targets of the millennium 	development goals through a framework of visual analytics that represent the big data procured on each of the topics proposed for the post- 2015 agenda 	online.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent announcement of collaboration between RTI International, a non-profit research organization and IBM research lab looks promising in its initiative 	to utilize big data analytics in schools within Mombasa County, Kenya.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; The partnership seeks to develop 	testing systems that would capture data that would assist governments, non-profit organizations and private enterprises in making more informed decisions 	regarding the development of education and human resources within the region. Äs observed by Dr. Kamal Bhattacharya, The Vice President of IBM 	Research, "A significant lack of data on Africa in the past has led to misunderstandings regarding the history, economic performance and potential of the 	government." The project seeks to improve transparency and accountability within the schooling system in more than 100 institutions across the county. The 	teachers would be equipped with tablet devices to collate the data about students, classrooms and resources. This would allow an analysis of the correlation between the three aspects thus enabling better policy formulation and a more focused approach to bettering the school system.	&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; This is a part of the United States Agency for International Development's Education Data for Decision 	Making (EdData II) project. According to Dr Kommy Weldemariam, Research Scientist , IBM Research, "… there has been a significant struggle in making 	informed decisions as to how to invest in and improve the quality and content of education within Sub-Saharan Africa. The Project would create a school 	census hub which would enable the collection of accurate data regarding performance, attendance and resources at schools. This would provide valuable 	insight into the building of childhood development programs that would significantly impact the development of an efficient human capital pool in the near 	future."&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar initiative has been undertaken by Apple and IBM in the development of the "Student Achievement App" which seeks to use this data for "content 	analysis of student learning". The Application as a teaching tool that analyses the data provided to develop actionable intelligence on a per-student 	basis." &lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt; This would give educators a deeper understanding of the outcome of teaching methodologies and 	subsequently enable better leaning. The impact of this would be a significant restructuring of how education is delivered. At a recent IBM sponsored 	workshop on education held in India last year , Katharine Frase, IBM CTO of Public Sector predicted that "classrooms will look significantly different 	within a decade than they have looked over the last 200 years."&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(iii) &lt;/b&gt; &lt;b&gt;Access and the exchange of information &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data used for development serves as an important information intermediary that allows for the creation of a unified space within which unstructured 	heterogeneous data can be efficiently organized to create a collaborative system of information. New interactive platforms enable the process of 	information exchange though an internal vetting and curation that ensures accessibility to reliable and accurate information. This encourages active 	citizen participation in the articulation of demands from the government, thus enabling the actualization of the role of the electorate in determining 	specific policy decisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Grameen Foundation's AppLab in Kampala aids in the development of tools that can use the information from micro financing transactions of clients to 	identify financial plans and instruments that would be be more suitable to their needs.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt; Thus, through 	working within a community, this technology connects its clients in a web of information sharing that they both contribute to and access after the source 	of the information has been made anonymous. This allows the individual members of the community to benefit from this common pool of knowledge. The AppLab 	was able to identify the emergence of a new crop pest from an increase in online searches for an unusual string of search terms within a particular region. 	Using this as an early warning signal, the Grameen bank sent extension officers to the location to check the crops and the pest contamination was dealt 	with effectively before it could spread any further.&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(iv) &lt;/b&gt; &lt;b&gt;Accountability and Transparency&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data enables participatory contributions from the electorate in existing functions such as budgeting and communication thus enabling connections 	between the citizens, the power brokers and elites. The extraction of information and increasing transparency around data networks is also integral to 	building a self-sustaining system of data collection and analysis. However it is important to note that this information collected must be duly analyzed in 	a responsible manner. Checking the veracity of the information collected and facilitating individual accountability would encourage more enthusiastic 	responses from the general populous thus creating a conducive environment to elicit the requisite information. The effectiveness of the policies formulated 	by relying on this information would rest on the accuracy of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is Chequeado, a non-profit Argentinean media outlet that specializes in fact-checking. It works on a model of crowd sourcing information on the basis of which it has fact checked everything from the live presidential speech to congressional debates that have been made open to the public.	&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; It established a user friendly public database, DatoCHQ, in 2014 which allowed its followers to participate in live fact-checks by sending in data, which included references, facts, articles and questions, through twitter.	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; This allowed citizens to corroborate the promises made by their leaders and instilled a sense of trust 	in the government.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. &lt;/b&gt; &lt;b&gt;Big Data and Smart Cities in the Global South &lt;/b&gt;&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Smart cities have become a buzzword in South Asia, especially after the Indian government led by Prime Minister Narendra Modi made a commitment to build 	100 smart cities in India&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;. A smart city is essentially designed as a hub where the information and 	communication technologies (ICT) are used to create feedback loops with an almost minimum time gap. In traditional contexts, surveys carried out through a 	state sponsored census were the only source of systematic data collection. However these surveys are long drawn out processes that often result in a drain 	on State resources. Additionally, the information obtained is not always accurate and policy makers are often hesitant to base their decisions on this 	information. The collection of data can however be extremely useful in improving the functionality of the city in terms of both the 'hard' or physical 	aspects of the infrastructural environment as well as the 'soft' services it provides to citizens. One model of enabling this data collection, to this 	effect, is a centrally structured framework of sensors that may be able to determine movements and behaviors in real-time, from which the data obtained can 	be subsequently analyzed. For example, sensors placed under parking spaces at intersections can relay such information in short spans of time. South Korea 	has managed to implement a similar structure within its smart city, Songdo.&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another approach to this smart city model is using crowd sourced information through apps, either developed by volunteers or private conglomerates. These 	allow for the resolving of specific problems by organizing raw data into sets of information that are attuned to the needs of the public in a cohesive 	manner. However, this system would require a highly structured format of data sets, without which significantly transformational result would be difficult 	to achieve.&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There does however exist a middle ground, which allows the beneficiaries of this network, the citizens, to take on the role of primary sensors of 	information. This method is both cost effective and allows for an experimentation process within which an appropriate measure of the success or failure of 	the model would be discernible in a timely manner. It is especially relevant in fast growing cities that suffer congestion and breakdown of infrastructure 	due to the unprecedented population growth. This population is now afforded with the opportunity to become a part of the solution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle challenge associated with extracting this Big Data is its restricted access. Most organizations that are able to collect this big data 	efficiently are private conglomerates and business enterprises, who use this data to give themselves a competitive edge in the market, by being able to 	efficiently identify the needs and wants of their clientele. These organizations are reluctant to release information and statistics because they fear it 	would result in them losing their competitive edge and they would consequently lose the opportunity to benefit monetarily from the data collected. Data 	leaks would also result in the company getting a bad name and its reputation could be significantly hampered. Despite the individual anonymity, the 	transaction costs incurred in ensuring the data of their individual customers is protected is often an expensive process. In addition to this there is a 	definite human capital gap resulting from the significant lack of scientists and analysts to interpret raw data transmitted across various channels.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) &lt;/b&gt; &lt;b&gt;Big Data in Urban Planning &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Urban planning would require data that is reflective of the land use patterns of communities, combined with their travel descriptions and housing 	preferences. The mobility of individuals is dependent on their economic conditions and can be determined through an analysis of their purchases, either via 	online transactions or from the data accumulated by prominent stores. The primary source of this data is however mobile phones, which seemed to have 	transcend economic barriers. Secondary sources include cards used on public transport such as the Oyster card in London and the similar Octopus card used 	in Hong Kong. However, in most developing countries these cards are not available for public transport systems and therefore mobile network data forms the 	backbone of data analytics. An excessive reliance on the data collected through Smart phones could however be detrimental, especially in developing 	countries, simply because the usage itself would most likely be concentrated amongst more economically stable demographics and the findings from this data 	could potentially marginalize the poor.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile network big data (MNBD) is generated by all phones and includes CDRs, which are obtained from calls or texts that are sent or received, internet 	usage, topping up a prepaid value and VLR or Visitor Location Registry data which is generated whenever the phone is question has power. It essentially 	communicates to the Base Transceiver Stations (BSTs) that the phone is in the coverage area. The CDR includes records of calls made, duration of the call 	and information about the device. It is therefore stored for a longer period of time. The VLR data is however larger in volume and can be written over. Both VLR and CDR data can provide invaluable information that can be used for urban planning strategies.	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; LIRNE&lt;i&gt;asia, &lt;/i&gt;a regional policy and regulation think-tank has carried out an extensive study 	demonstrating the value of MNBD in SriLanka.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt; This has been used to understand and sometimes even 	monitor land use patterns, travel patterns during peak and off seasons and the congregation of communities across regions. This study was however only 	undertaken after the data had been suitably pseudonymised.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; The study revealed that MNBD was incredibly 	valuable in generating important information that could be used by policy formulators and decision makers, because of two primary characteristics. Firstly, 	it comes close to a comprehensive coverage of the demographic within developing countries, thus using mobile phones as sensors to generate useful data. Secondly, people using mobile phones across vast geographic areas reflect important information regarding patterns of their travel and movement.	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MNBD allows for the tracking and mapping of changes in population densities on a daily basis, thus identifying 'home' and 'work' locations, informing 	policy makers of population congestion so that thy may be able to formulate policies with respect to easing this congestion. According to Rohan Samarajiva, 	founding chair of LIRNEasia, "This allows for real-time insights on the geo-spatial distribution of population, which may be used by urban planners to 	create more efficient traffic management systems."&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This can also be used for the 	developmental economic policies. For example, the northern region of Colombo, a region inhabited by the low income families shows a lower population density on weekdays. This is reflective of the large numbers travelling to southern Colombo for employment.	&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Similarly, patterns of land use can be ascertained by analyzing the various 	loading patterns of base stations. Building on the success of the Mobile Data analysis project in SriLanka LIRNEasia plans to collaborate with partners in 	India and Bangladesh to assimilate real time information about the behavioral tendencies of citizens, using which policy makers may be able to make 	informed decisions. When this data is combined with user friendly virtual platforms such as smartphone Apps or web portals, it can also help citizens make informed choices about their day to day activities and potentially beneficial long term decisions.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Challenges of using Mobile Network Data&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile networks invest significant sums of money in obtaining information regarding usage patterns of their services. Consequently, they may use this data 	to develop location based advertizing. In this context, there is a greater reluctance to share data for public purposes. Allowing access to one operator's 	big data by another could result in significant implications on the other with respect to the competitive advantage shared by the operator. A plausible 	solution to this conundrum is the accumulation of data from multiple sources without separating or organizing it according to the source it originates 	from. There is thus a lesser chance of sensitive information of one company being used by another. However, even operators do have concerns about how the 	data would be handled before this "mashing up" occurs and whether it might be leaked by the research organization itself. LIRNE&lt;i&gt;asia &lt;/i&gt;used 	comprehensive non-disclosure agreements to ensure that the researchers who worked with the data were aware of the substantial financial penalties that may 	be imposed on them for data breaches. The access to the data was also restricted. &lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another line of argumentation advocates for the open sharing of data. A recent article in the &lt;i&gt;Economist &lt;/i&gt;has articulated this in the context of the 	Ebola outbreak in West Africa. " 	&lt;i&gt; Releasing the data, though, is not just a matter for firms since people's privacy is involved. It requires governmental action as well. Regulators in 		each affected country would have to order operators to make their records accessible to selected researchers, who through legal agreements would only 		be allowed to use the data in a specific manner. For example, Orange, a major mobile phone network operator has made millions of CDRs from Senegal and 		The Ivory Coast available for researchers for their use under its Data Development Initiative. However the Political will amongst regulators and 		Network operators to do this seems to be lacking."&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;b&gt;[69]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would therefore be beneficial for companies to collaborate with the customers who create the data and the researchers who want to use it to extract important insights. This however would require the creation of and subsequent adherence to self regulatory codes of conduct.	&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt; In addition to this cooperation between network operators will assist in facilitating the transference 	of the data of their customers to research organizations. Sri Lanka is an outstanding example of this model of cooperation which has enabled various 	operators across spectrums to participate in the mobile-money enterprise.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(ii) &lt;/b&gt; &lt;b&gt;Big Data and Government Delivery of Services and Functions &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The analysis of Data procured in real time has proven to be integral to the formulation of policies, plans and executive decisions. Especially in an Asian 	context, Big data can be instrumental in urban development, planning and the allocation of resources in a manner that allows the government to keep up with 	the rapidly growing demands of an empowered population whose numbers are on an exponential rise. Researchers have been able to use data from mobile 	networks to engage in effective planning and management of infrastructure, services and resources. If, for example, a particular road or highway has been 	blocked for a particular period of time an alternative route is established before traffic can begin to build up creating a congestion, simply through an 	analysis of information collected from traffic lights, mobile networks and GPS systems.&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also an emerging trend of using big data for state controlled services such as the military. The South Korean Defense Minister Han Min Koo, in his recent briefing to President Park Geun-hye reflected on the importance of innovative technologies such as Big Data solutions.	&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chinese government has expressed concerns regarding data breaches and information leakages that would be extremely dangerous given the exceeding 	reliance of governments on big data. A security report undertaken by Qihoo 360, China's largest software security provider established that 2,424 of the 	17,875 Web security loopholes were on government websites. Considering the blurring line between government websites and external networks, it has become 	all the more essential for authorities to boost their cyber security protections.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Japanese government has considered investing resources in training more data scientists who may be able to analyze the raw data obtained from various 	sources and utilize requisite techniques to develop an accurate analysis. The Internal Affairs and Communication Ministry planned to launch a free online 	course on big data, the target of which would be corporate workers as well as government officials.&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data analytics is emerging as an efficient technique of monitoring the public transport management systems within Singapore. A recent collaboration between IBM, StarHub, The Land Transport Authority and SMRT initiated a research study to observe the movement of commuters across regions.	&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This has been instrumental in revamping the data collection systems already in 	place and has allowed for the procurement of additional systems of monitoring.&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The idea is essentially to institute a "black box" of information for every operational unit that allows for the relaying of real-time information from sources as varied as power switches, tunnel sensors and the wheels, through assessing patterns of noise and vibration.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to this there are numerous projects in place that seek to utilize Big Data to improve city life. According to Carlo Ritti, Director of the MIT 	Senseable City Lab, "We are now able to analyze the pulse of a city from moment to moment. Over the past decade, digital technologies have begun to blanket 	our cities, forming the backbone of a large, intelligent infrastructure." &lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The 	professor of Information Architecture and Founding Director of the Singapore ETH Centre, Gerhart Schmitt has observed that "the local weather has a major 	impact on the behavior of a population." In this respect the centre is engaged in developing a range of visual platforms to inform citizens on factors such as air quality which would enable individuals to make everyday choices such as what route to take when planning a walk or predict a traffic jam.	&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Schmitt's team has also been able to arrive at a pattern that connects the 	demand for taxis with the city's climate. The amalgamation of taxi location with rainfall data has been able to help locals hail taxis during a storm. This 	form of data can be used in multiple ways allowing the visualization of temperature hotspots based on a "heat island" effect where buildings, cars and 	cooling units cause a rise in temperature. &lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft has recently entered into a partnership with the Federal University of Minas Gerais, one of the largest universities in Brazil to undertake a research project that could potentially predict traffic jams up to an hour in advance.	&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The project attempts to analyze information from transport departments, road 	traffic cameras and drivers social network profiles to identify patterns that they could use to help predict traffic jams approximately 15 to 60 minutes 	before they actually happen.&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In anticipation of the increasing demand for professionals with requisite training in data sciences, the Malaysian Government has planned to increase the 	number of local data scientists from the present 80 to 1500 by 2020, through the support of the universities within the country.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;IV. &lt;/b&gt; &lt;b&gt;Big Data and the Private Sector in the Global South &lt;/b&gt;&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Essential considerations in the operations of Big Data in the Private sector in the Asia Pacific region have been extracted by a comprehensive survey 	carried out by the Economist Intelligence Unit.&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt; Over 500 executives across the Asia Pacific region were 	surveyed, from across industries representing a diverse range of functions. 69% of these companies had an annual turnover of over US $500m. The respondents 	were senior managers responsible for taking key decisions with regard to investment strategies and the utilization of big data for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The results of the Survey conclusively determined that firms in the Asia Pacific region have had limited success with implementing Big Data Practices. A 	third of the respondents claimed to have an advanced knowledge of the utilization of big data while more than half claim to have made limited progress in 	this regard. Only 9% of the Firms surveyed cited internal barriers to implementing big data practices. This included a significant difficulty in enabling 	the sharing of information across boundaries. Approximately 40% of the respondents surveyed claimed they were unaware of big data strategies, even if they 	had in fact been in place simply because these had been poorly communicated to them. Almost half of the firms however believed that big data plays an 	important role in the success of the firm and that it can contribute to increasing revenue by 25% or more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Numerous obstacles in the adoption of big data were cited by the respondents. These include the lack of suitable software to interpret the data and the 	lack of in-house skills to analyze the data appropriately. In addition to this, the lack of willingness on the part of various departments to share their 	data for the fear of a breach or leak was thought to be a major hindrance. This combined with a lack of communication between the various departments and 	exceedingly complicated reports that cannot be analyzed given the limited resources and lack of human capital qualified enough to carry out such an 	analysis, has resulted in an indefinite postponement of any policy propounding the adoption of big data practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 59% of the firms surveyed agreed that collaboration is integral to innovation and that information silos are a huge hindrance within a knowledge based 	economy. There is also a direct correlation between the size of the company and its progress in adopting big data, with larger firms adopting comprehensive 	strategies more frequently than smaller ones. A major reason for this is that large firms with substantially greater resources are able to actualize the 	benefits of big data analytics more efficiently than firms with smaller revenues. These businesses which have advanced policies in place outlining their 	strategies with respect to their reliance on big data are also more likely to communicate these strategies to their employees to ensure greater clarity in 	the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of big data was recently voted as the "best management practice" of the past year according to a cumulative ranking published by Chief Executive 	China Magazine, a Trade journal published by Global Sources on 13th January, 2015 in Beijing. The major benefit cited was the real-time information sourced from customers, which allows for direct feedback from clients when making decisions regarding changes in products or services.	&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant contributor to the lack of adequate usage of data analytics is the belief that a PhD is a prerequisite for entering the field of data 	science. This misconception was pointed out by Richard Jones, vice president of Cloudera in the Australia, New Zealand and the Asean region. Cloudera 	provides businesses with the requisite professional services that they may need to effectively utilize Big Data. This includes a combination of the 	necessary manpower, technology and consultancy services.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Deepak Ramanathan, the 	chief technology officer, SAS Asia Pacific believes that this skill gap can be addressed by forming data science teams within both governments and private 	enterprises. These teams could comprise of members with statistical, coding and business skills and allow them to work in a collaborative manner to address 	the problem at hand.&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; SAS is an Enterprise Software Giant that creates tools 	tailored to suit business users to help them interpret big data. Eddie Toh, the planning and marketing manager of Intel's data center platform believes 	that businesses do not necessarily need data scientists to be able to use big data analytics to their benefit and can in fact outsource the technical 	aspects of the interpretation of this data as and when required.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analytical team at Dell has forged a partnership with Brazilian Public Universities to facilitate the development of a local talent pool in the field of data analytics. The Instituto of Data Science (IDS) will provide training methodologies for in person or web based classes.	&lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The project is being undertaken by StatSoft, a subsidiary of Dell that was 	acquired by the technology giant last year. &lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;V. &lt;/b&gt; &lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have emerged numerous challenges in the analysis and interpretation of Big Data. While it presents an extremely engaging opportunity, which has the 	potential to transform the lives of millions of individuals, inform the private sector and influence government, the actualization of this potential 	requires the creation of a sustainable foundational framework ; one that is able to mitigate the various challenges that present themselves in this 	context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A colossal increase in the rate of digitization has resulted in an unprecedented increment in the amount of Big Data available, especially through the 	rapid diffusion cellular technology. The importance of mobile phones as a significant source of data, especially in low income demographics cannot be 	overstated. This can be used to understand the needs and behaviors of large populations, providing an in depth insight into the relevant context within 	which valuable assessments as to the competencies, suitability and feasibilities of various policy mechanisms and legal instruments can be made. However, 	this explosion of data does have a lasting impact on how individuals and organizations interact with each other, which might not always be reflected in the 	interpretation of raw data without a contextual understanding of the demographic. It is therefore vital to employ the appropriate expertise in assessing 	and interpreting this data. The significant lack of a human resource to capital to analyze this information in an accurate manner poses a definite 	challenge to its effective utilization in the Global South.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal and technological implications of using Big Data are best conceptualized within the deliberations on protecting the privacy of the contributors 	to this data. The primary producers of this information, from across platforms, are often unaware that they are in fact consenting to the subsequent use of 	the data for purposes other than what was intended. For example people routinely accept terms and conditions of popular applications without understanding 	where or how the data that they inadvertently provide will be used.&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt; This is especially true of media 	generated on social networks that are increasingly being made available on more accessible platforms such as mobile phones and tablets. Privacy has and 	always will remain an integral pillar of democracy. It is therefore essential that policy makers and legislators respond effectively to possible 	compromises of privacy in the collection and interpretation of this data through the institution of adequate safeguards in this respect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another challenge that has emerged is the access and sharing of this data. Private corporations have been reluctant to share this data due to concerns 	about potential competitors being able to access and utilize the same. In addition to this, legal considerations also prevent the sharing of data collected 	from their customers or users of their services. The various technical challenges in storing and interpreting this data adequately also prove to be 	significant impediments in the collection of data. It is therefore important that adequate legal agreements be formulated in order to facilitate a reliable 	access to streams of data as well as access to data storage facilities to accommodate for retrospective analysis and interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order for the use of Big Data to gain traction, it is important that these challenges are addressed in an efficient manner with durable and 	self-sustaining mechanisms of resolving significant obstructions. The debates and deliberations shaping the articulation of privacy concerns and access to 	such data must be supported with adequate tools and mechanisms to ensure a system of &lt;i&gt;"privacy-preserving analysis." The &lt;/i&gt;UN Global Pulse has put 	forth the concept of data philanthropy to attempt to resolve these issues, wherein " &lt;i&gt;corporations &lt;/i&gt;[would] 	&lt;i&gt; take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for 		insights, patterns and trends in realtime or near realtime."&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;b&gt;[92]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concept of data philanthropy highlights particular challenges and avenues that may be considered for future deliberations that may result in specific 	refinements to the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the primary uses of Big Data, especially in developing countries is to address important developmental issues such as the availability of clean 	water, food security, human health and the conservation of natural resources. Effective Disaster management has also emerged as one of the key functions of 	Big Data. It therefore becomes all the more important for organizations to assess the information supply chains pertaining to specific data sources in 	order to identify and prioritize the issues of data management. &lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt; Data emerging from different contexts, 	across different sources may appear in varied compositions and would differ significantly across economic demographics. The Big Data generated from certain 	contexts would be inefficient due to the unavailability of data within certain regions and the resulting studies affecting policy decisions should take into account this discrepancy. This data unavailability has resulted in a digital divide which is especially prevalent in the global south.	&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Appropriate analysis of the Big Data generated would provide a valuable insight into the key areas and inform policy makers with respect to important 	decisions. However, it is necessary to ensure that the quality of this data meets a specific standard and appropriate methodological processes have been 	undertaken to interpret and analyze this data. The government is a key actor that can shape the ecosystem surrounding the generation, analysis and 	interpretation of big data. It is therefore essential that governments of countries across the global south recognize the need to collaborate with civic 	organizations as well technical experts in order to create appropriate legal frameworks for the effective utilization of this data.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Onella, Jukka- Pekka. &lt;i&gt;"&lt;/i&gt;Social Networks and Collective Human Behavior&lt;i&gt;." UN Global Pulse&lt;/i&gt;. 10 Nov.2011. 			&amp;lt;http://www.unglobalpulse.org/node/14539&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; http://www.business2community.com/big-data/evaluating-big-data-predictive-analytics-01277835&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; http://unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid, p.13, pp.5&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Helbing, Dirk , and Stefano Balietti. "From Social Data Mining to Forecasting Socio-Economic Crises." &lt;i&gt;Arxiv &lt;/i&gt;(2011) 1-66. 26 Jul 2011 			http://arxiv.org/pdf/1012.0178v5.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Manyika, James, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh andAngela H. Byers. &lt;i&gt;"&lt;/i&gt;Big data: The next frontier 			for innovation, competition, and productivity.&lt;i&gt;" McKinsey&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Global Institute &lt;/i&gt; (2011): 1-137. May 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; "World Population Prospects, the 2010 Revision." &lt;i&gt;United Nations Development Programme.&lt;/i&gt; &amp;lt;http://esa.un.org/unpd/wpp/unpp/panel_population.htm&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Mobile phone penetration, measured by Google, from the number of mobile phones per 100 habitants, was 96% in Botswana, 63% in Ghana, 66% in 			Mauritania, 49% in Kenya, 47% in Nigeria, 44% in Angola, 40% in Tanzania (Source: Google Fusion Tables)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; http://www.brookings.edu/blogs/africa-in-focus/posts/2015/04/23-big-data-mobile-phone-highway-sy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &amp;lt;http://www.google.com/fusiontables/Home/&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; "Global Internet Usage by 2015 [Infographic]." &lt;i&gt;Alltop. &lt;/i&gt;&amp;lt;http://holykaw.alltop.com/global-internetusage-by-2015-infographic?tu3=1&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Goetz, Thomas. "Harnessing the Power of Feedback Loops." &lt;i&gt;Wired.com. &lt;/i&gt;Conde Nast Digital, 19 June 2011. 			&amp;lt;http://www.wired.com/magazine/2011/06/ff_feedbackloop/all/1&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Bollier, David. &lt;i&gt;The Promise and Peril of Big Data. &lt;/i&gt;The Aspen Institute, 2010. 			&amp;lt;http://www.aspeninstitute.org/publications/promise-peril-big-data&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Eagle, Nathan and Alex (Sandy) Pentland. "Reality Mining: Sensing Complex Social Systems",&lt;i&gt;Personal and Ubiquitous Computing&lt;/i&gt;, 10.4 (2006): 			255-268.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; OECD, Future Global Shocks, Improving Risk Governance, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; "Economy: Global Shocks to Become More Frequent, Says OECD." &lt;i&gt;Organisation for Economic Cooperationand Development. &lt;/i&gt;27 June. 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Friedman, Jed, and Norbert Schady. &lt;i&gt;How Many More Infants Are Likely to Die in Africa as a Result of the Global Financial Crisis? &lt;/i&gt;Rep. The 			World Bank &amp;lt;http://siteresources.worldbank.org/INTAFRICA/Resources/AfricaIMR_FriedmanSchady_060209.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute,June 			2011&amp;lt;http://www.mckinsey.com/mgi/publications/big_data/pdfs/MGI_big_data_full_report.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; The word "crowdsourcing" refers to the use of non-official actors ("the crowd") as (free) sources of information, knowledge and services, in 			reference and opposition to the commercial practice of&lt;/p&gt;
&lt;p&gt;outsourcing. "&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Burke, J., D. Estrin, M. Hansen, A. Parker, N. Ramanthan, S. Reddy and M.B. Srivastava. &lt;i&gt;ParticipatorySensing. &lt;/i&gt;Rep. Escholarship, 			University of California, 2006. &amp;lt;http://escholarship.org/uc/item/19h777qd&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; "Crisis Mappers Net-The international Network of Crisis Mappers." &amp;lt;http://crisismappers.net&amp;gt;, http://haiti.ushahidi.com and Goldman et al., 			2009&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Alex Pentland cited in "When There's No Such Thing As Too Much Information". &lt;i&gt;The New York Times&lt;/i&gt;.23 Apr. 			2011&amp;lt;http://www.nytimes.com/2011/04/24/business/24unboxed.html?_r=1&amp;amp;src=tptw&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Nathan Eagle also cited in "When There's No Such Thing As Too Much Information". &lt;i&gt;The New YorkTimes&lt;/i&gt;. 23 Apr. 2011. 			&amp;lt;http://www.nytimes.com/2011/04/24/business/24unboxed.html?_r=1&amp;amp;src=tptw&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Helbing and Balietti. "From Social Data Mining to Forecasting Socio-Economic Crisis."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Eysenbach G. &lt;i&gt;Infodemiology: tracking flu-related searches on the Web for syndromic surveillance.&lt;/i&gt;AMIA 			(2006)&amp;lt;http://yi.com/home/EysenbachGunther/publications/2006/eysenbach2006cinfodemiologyamia proc.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Syndromic Surveillance (SS)." &lt;i&gt;Centers for Disease Control and Prevention. &lt;/i&gt;06 Mar. 			2012.&amp;lt;http://www.cdc.gov/ehrmeaningfuluse/Syndromic.html&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Health Map &amp;lt;http://healthmap.org/en/&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; see &lt;a href="http://www.detective.io/"&gt;www.detective.io&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; www.ushahidi.com&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;a href="http://www.facebook.com/BlackMondayMovement"&gt;www.facebook.com/BlackMondayMovement&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ushahidi is a nonprofit tech company that was developed to map reports of violence in Kenya followingthe 2007 post-election fallout. Ushahidi 			specializes in developing "&lt;i&gt;free and open source software for&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;information collection, visualization and interactive mapping." &lt;/i&gt; &amp;lt;http://ushahidi.com&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Conducted by the European Commission's Joint Research Center against data on damaged buildingscollected by the World Bank and the UN from satellite 			images through spatial statistical techniques.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; www.ushahidi.com&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; See https://&lt;b&gt;tacticaltech&lt;/b&gt;.org/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; see www. flowminder.org&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;a href="http://post2015.unglobalpulse.net/"&gt;http://post2015.unglobalpulse.net/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; http://allafrica.com/stories/201507151726.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; http://www.computerworld.com/article/2948226/big-data/opinion-apple-and-ibm-have-big-data-plans-for-education.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; http://www.grameenfoundation.org/where-we-work/sub-saharan-africa/uganda&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; http://chequeado.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; http://datochq.chequeado.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Times of India &lt;/i&gt; (2015): "Chandigarh May Become India's First Smart City," 12 January, http://timesofi ndia.indiatimes.com/india/Chandigarh- may-become-Indias-fi 			rst-smart-city/articleshow/ 45857738.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; http://www.cisco.com/web/strategy/docs/scc/ioe_citizen_svcs_white_paper_idc_2013.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Townsend, Anthony M (2013): &lt;i&gt;Smart Cities: Big Data, Civic Hackers and the Quest for a New Utopia&lt;/i&gt;, New York: WW Norton.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; See "Street Bump: Help Improve Your Streets" on Boston's mobile app to collect data on roadconditions,			&lt;a href="http://www.cityofboston.gov/DoIT/"&gt;http://www.cityofboston.gov/DoIT/&lt;/a&gt; apps/streetbump.asp&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Mayer-Schonberger, V and K Cukier (2013): &lt;i&gt;Big Data: A Revolution That Will Transform How We Live, Work, and Think&lt;/i&gt;, London: John Murray.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; http://www.epw.in/review-urban-affairs/big-data-improve-urban-planning.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Newman, M E J and M Girvan (2004): "Finding and Evaluating Community Structure in Networks,"&lt;i&gt;Physical Review E, American Physical Society&lt;/i&gt;, 			Vol 69, No 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; http://www.sundaytimes.lk/150412/sunday-times-2/big-data-can-make-south-asian-cities-smarter-144237.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; http://www.epw.in/review-urban-affairs/big-data-improve-urban-planning.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; GSMA (2014): "GSMA Guidelines on Use of Mobile Data for Responding to Ebola," October, http://			&lt;a href="http://www.gsma.com/mobilefordevelopment/wpcontent/"&gt;www.gsma.com/mobilefordevelopment/wpcontent/&lt;/a&gt; uploads/2014/11/GSMA-Guidelineson-&lt;/p&gt;
&lt;p&gt;protecting-privacy-in-the-use-of-mobilephone- data-for-responding-to-the-Ebola-outbreak-_ October-2014.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; An example of the early-stage development of a self-regulatory code may be found at http:// lirneasia.net/2014/08/what-does-big-data-sayabout- 			sri-lanka/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; See "Sri Lanka's Mobile Money Collaboration Recognized at MWC 2015," &lt;a href="http://lirneasia/"&gt;http://lirneasia&lt;/a&gt;. 			net/2015/03/sri-lankas-mobile-money-colloboration- recognized-at-mwc-2015/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; http://www.thedailystar.net/big-data-for-urban-planning-57593&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; &lt;a href="http://koreaherald.com/"&gt;http://koreaherald.com&lt;/a&gt; , 19/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; http://www.news.cn/, 25/11/2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; &lt;a href="http://the-japan-news.com/"&gt;http://the-japan-news.com&lt;/a&gt; , 20/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; http://www.todayonline.com/singapore/can-big-data-help-tackle-mrt-woes&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; http://edition.cnn.com/2015/06/24/tech/big-data-urban-life-singapore/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; http://venturebeat.com/2015/04/03/how-microsofts-using-big-data-to-predict-traffic-jams-up-to-an-hour-in-advance/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; https://www.hds.com/assets/pdf/the-hype-and-the-hope-summary.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; &lt;a href="http://www.news.cn/"&gt;http://www.news.cn&lt;/a&gt; , 14/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; http://www.techgoondu.com/2015/06/29/plugging-the-big-data-skills-gap/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; http://www.zdnet.com/article/dell-to-create-big-data-skills-in-brazil/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Efrati, Amir. "'Like' Button Follows Web Users." &lt;i&gt;The Wall Street Journal. &lt;/i&gt;18 May 2011.&lt;/p&gt;
&lt;p&gt;&amp;lt;http://online.wsj.com/article/SB10001424052748704281504576329441432995616.html&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Krikpatrick, Robert. "Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience."&lt;/p&gt;
&lt;p&gt;&lt;i&gt;UN Global Pulse. &lt;/i&gt; 16 Sept. 2011. &amp;lt;http://www.unglobalpulse.org/blog/data-philanthropy-public-privatesector-data-sharing-global-resilience&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Laney D (2001) 3D data management: Controlling data volume, velocity and variety. Available at: http://blogs. 			gartner.com/doug-laney/files/2012/01/ad949-3D-DataManagement-Controlling-Data-Volume-Velocity-andVariety.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon. Information, 			Communication, &amp;amp; Society 15(5): 662-679.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis'&gt;https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-01-24T02:54:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts">
    <title>The two-faced FRAND: Licensing and injunctive relief in ICTs </title>
    <link>https://cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts</link>
    <description>
        &lt;b&gt;Important takeaways from the Indo-Europe Conference on Building a Sustainable IPR-ICT Ecosystem for Promoting Innovation, held in Bangalore in November 2015. Ericsson and the Indian Cellular Association presented an interesting set of views on FRAND licensing as well as injunctive relief, from seemingly opposite ends of the spectrum.&lt;/b&gt;
        &lt;p&gt;For the schedule, and more information, visit: &lt;a class="external-link" href="http://www.ict-ipr.in/sipeit/conference"&gt;http://www.ict-ipr.in/sipeit/conference&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on patenting &lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Companies file numerous patent applications every year but 95% of all granted patents are never commercialised. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Ericsson manages to commercialise less than 5 percent of its patents.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- A patent application could be rejected because it is not inventive or novel enough. Sometimes, a competitor manages to file for or obtain a patent for the same or similar technology a few days before Ericsson. Hence, it becomes prior art and Ericsson is unable to apply for a patent. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Monetising patents is a challenge because the technology they pertain to may not be good enough to be implemented. Either that, or nobody in the market wants the technology. There is no business aspect to it.&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;span&gt;Thus, patenting is expensive but but filing patents is a trial-and-error activity, which makes patenting financially cumbersome.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Ericsson feels the need to file a lot of patents, so that some of those patents could be useful from a business perspective. The rest are not commercialised.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- The number of patents filed are rising in certain countries, but the numbers are misleading. Some patents are of poor quality and/ or unusable for commercialisation.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Ericsson gets approximately 5,000 inventions per year but files patent applications for only around 1,500 to 1,600, as the rest of the inventions do not have a business aspect to it. That is, Ericsson does not believe that the invention has good business potential or that there is little way for the market to adapt to it. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- When companies invest heavily on research and development, and when they try to get (what will later become a) standardised technology released into the market, they should get fair returns on investment.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Indian companies need to invest in IPR. They need to do trial-and-error with respect to patenting. Only then, perhaps, some returns will accrue to them from owning patents.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Monetisation is besides selling products. It's a side effect of investment in research and development.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on FRAND licensing&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- No company apart from non-practising entities (NPEs) make all or most of its money from licensing. Ericsson makes most of its money from its products and not patents. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- A large number of companies such as Ericsson have inventors based in India but the patents get registered abroad, [that is, the patents are not filed by the Indian subsidiary of Ericsson].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;/span&gt;&lt;strong&gt;&lt;span&gt;The percentage fee charged for a FRAND license is a low, single-digit number. &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- It's a wrong conception that FRAND licensing is very expensive and will shut down Indian companies. If there were no FRAND agreements, no Indian company would be able to put out a phone in the market.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- It’s a wrong notion that FRAND agreements are prohibiting any company from the market. Indian companies will not be thrown out of the market by FRAND companies or companies that possess a lot of patents. No Indian company would be able to make and sell a phone if FRAND terms didn’t exist.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;strong&gt;Ericsson is called a patent troll because it doesn’t make mobile phones anymore, but Ericsson built the technology it patented [unlike other patent trolls who buy and gather patents].&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Ericsson has entered into more than licensing 100 agreements worldwide. Many of its licensees are repeat licensees.&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-4f920544-b271-1bd0-cde5-919b2b7c321e" dir="ltr"&gt;&lt;span&gt;-- &lt;strong&gt;The average selling price (ASP) of China-made phones sold in India is USD 50. This money goes to China. The ASP of high-end phones elsewhere is USD 250. Thus, a royalty of USD 15, calculated on the sale price of the end product, is not high.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Ericsson’s position on SEP litigation in India and injunctions&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- Nobody starts litigation in order to render an injunction in the end. The idea is to get the other party to the table and negotiate reasonable terms.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Litigation without injunction is a toothless tiger.&lt;/span&gt;&lt;span&gt; The 'licensee' has the financial upper hand of not paying the licensor. So the former can keep prolonging negotiations.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- When hold-out happens during licensing negotiations, litigation is used as a last resort. Injunctions are one of the possible outcomes of litigation.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- India should play the SEP game. 5G development starts in January 2016 and India should try to get a stake in the development. Indian companies should try to get high quality patents.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;[&lt;span id="docs-internal-guid-7d58a686-b1b1-3c63-f6ae-d317a187703b"&gt;This suggestion seems to be for homegrown Indian companies as Ericsson also stated during the conference that, “A large number of companies such as Ericsson have inventors based in India but the patents get registered abroad”, that is, the patents are not filed by the Indian subsidiary of Ericsson.]&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;span&gt;*****&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Indian Cellular Association on injunctive relief,  SEPs and FRAND licensing rates&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt; -- When the standard setting process is  collaborative, it is not logical to apply injunctive relief. It is  against the ethos of the community.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;--Telecommunication was the first industry to create monopolies, that is, standardisation in order to serve the customer better.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- [With reference to SEP infringement litigation happening in  India], the so-called infringer is not in league/ not competing with  anything the patent holder is making and/ or selling.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- The Competition Act in India is a wide-ranging  law. It is not a restrictive trade practices act or a monopolies act.  Patents are out of the purview of competition.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- If a rights holder has acquired dominance as a  part of the standard setting process, it is undoubtedly dominant. But if  the rights holder's market practices are fair, then it is not violating  any provisions of the Competition Act.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- India has a “demographic dividend”. Legacy patent  holders should look at India differently, and consider our purchasing  power. If technology has to proliferate, then consumers in India cannot  be burdened with the same royalties as the developed world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- We are trying to strengthen the TSDSI, India's indigenous standards development body [so that India can have a stake in international standards development].&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- The size of the global smartphone market today  [2015] is USD 500 billion; India's mobile phone market is worth USD 16  billion. The mobile phone market share of China is pegged at USD 110  billion.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-7d58a686-b24c-352b-bfd3-d6b26ac7a9d8" dir="ltr"&gt;&lt;span&gt;--  The mobile phone market in India will be worth USD 100 billion as of  the year 2022 or 2023. For SEP royalties that reward the innovation of  all the SEP holders, what will be the amount of royalty outflow? If the  outflow is USD 500 billion [in the year 2022 or 2023], then the FRAND  percentage be 0.5, which is not a single-digit number, unlike what was  stated by Ericsson's representative.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- In the projected figure of USD 100 billion, &lt;span id="docs-internal-guid-7d58a686-b259-5f5a-3e52-9c4a2f5bf957"&gt;USD  30 billion accounts for display, USD 5 billion accounts for Lithium-ion  battery, USD 5 billion for communication protocol, and the complete  chipset stack for around USD 10 billion. If the FRAND rate were to be  determined as a percentage of the price of the smallest practising  component of the [finished]&lt;/span&gt; device, then it would be, say, 2% of  USD 10 billion. If the FRAND rate were to be determined as a percentage  of the end product, it would be 0.5% of USD 100 billion. But, &lt;strong&gt;if the  FRAND percentage were a single-digit number, which could also be 9, then  all the manufacturers except the rights holders would be snuffed out. &lt;/strong&gt;China's  mobile market is at USD 110 billion now and is projected to be at USD  400 billion in 2022, will be paying around USD 1 billion in total  royalty outflows.&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt; &lt;/span&gt;&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-4f920544-b2a5-a0f4-a732-f19269164fc5" dir="ltr"&gt;&lt;span&gt;&lt;span id="docs-internal-guid-7d58a686-b267-9e65-539f-9bacaa7b48df"&gt;--  We also need to evaluate macro costs of research and development  globally. How many times, how much, and for how many years do we need to  reward innovation? What is the right return amount for inventors? All  this will come up for serious debate with the patent office, the  Competition Commission of India, the companies, and with the ministries.  To ensure equitable growth and a level playing field, all these  entities need to get involved.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- There is deep distrust of rights holders due to opaqueness in their operations. For example, injunctive relief was sought against a small importer in an Indian court. The royalty rate demanded happened to be half of that demanded from another Indian importer in the same court against an interim injunction. The rights holder then claimed that the email sent to the former importer was a mistake and it revised the rates so that it was equal for both importers. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;&lt;span&gt;&lt;i&gt;[This seems to be a reference to Ericsson suing Saral Communications for patent infringement in the Delhi High Court around the same time that Micromax complained to the Competition Commission of India alleging abuse of its dominant positon by Ericsson. The interim royalty rates quoted to Saral were half of the rates that Micromax was ordered to pay, rendering Ericsson's conduct discriminatory and in violation of FRAND. Ericsson subsequently claimed that the rates conveyed to Saral via email were a mistake and asked for the same interim royalty rates as it from Micromax. For more details refer to, &lt;a class="external-link" href="http://www.fosspatents.com/2014/03/court-document-reveals-discriminatory.html"&gt;Court document reveals discriminatory royalty demands by Ericsson for its wireless patents. &lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;&lt;span&gt;&lt;i&gt;This is also an indication that the market practices of certain rights holders are not consistent, which not only results in a trust deficit but prevents the implementation of a harmonised FRAND rate across the world.] &lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;&lt;span&gt;****&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;Injunctive relief and FRAND licensing in Europe&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;-- According to the German Patent Act, there is automatic injunction as a consequence of patent infringement. No injunctive relief is granted for SEPs anymore in Germany, if certain conditions are fulfilled by the willing licensee.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;-- Long-standing provisions exist in Germany for calculating royalties when multiple patents and multiple patent holders exist. FRAND licensing for one patent is useless. There should be FRAND for the whole complex. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;-- As per the Huawei decision of the European Court of Justice, dated 16 July 2015, a willing licensee can make an offer for the price it wishes to pay to use a patent under the condition that it deposits an amount in the bank as a security for the licensor. Then the licensor cannot enforce the injunction anymore.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;****&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Open data in patenting &lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;If the data available with patent offices across the world is made publicly accessible by the respective governments in a way that it is possible to search, understand, and visualise it, then there could be an explosion in innovation.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;The trade-off between access and innovation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Inexpensive phones of sub-standard quality break down or stop working sooner than good quality phones. This also destroys incentives for innovators who want to bring high quality phones into the market. So the inexpensive, low-quality phones is a trade-off between having access to mobile phones today and experiencing the fruits of innovation tomorrow. &lt;strong&gt;The Hatch Waxman Act in the US addresses this issue by allowing imitators to come into the economy through an authorised mechanism, which also restores some incentives for innovation.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;The tradeoff is also addressed better by implementing an evidence-based approach instead of a one-size-fits-all solution. Some regions require an emphasis on access. In other places that do not lack access due to their geographical location and clusters of innovators, IPRs can be implemented more strictly. Such a segmented approach to regions and product-markets can be crafted into policy.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;The challenge of harmonisation&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;Denmark does not have a dedicated intellectual property office. Work on IP is integrated in the government offices for trade, growth, economy, and so on. IPR is strongly interlaced with competition law in the country. &lt;strong&gt;Similarly, the Department of Telecom, Department of Health, the Indian Patent Office and the Competition Commission of India should work in tandem to avoid conflict in the way they address cases and issues.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2 dir="ltr"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Patenting for universities&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Indian university do not carry out patenting as much as their counterparts in other countries. The DieTY has schemes for supporting patent filing by universities and academic institutions. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Number of patents granted annually to:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Xingua University, China: 1,000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;MIT, United States: 4,000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;IIT and IISC, India: Between 100 and 200&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Technology areas and number of SEPs in Europe&lt;/span&gt;&lt;/h2&gt;
&lt;p id="docs-internal-guid-7d58a686-b1b4-a37d-f2ae-7182f21bda20" dir="ltr"&gt;&lt;span&gt;Telecom via public network: 4,284&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;IT and Internet: 534&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Audio/ video systems, coding, et cetera.: 221&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Security, cryptography, biometrics: 182&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span&gt;(Source: &lt;span id="docs-internal-guid-7d58a686-b1b5-2260-14d7-cc444e9011c9"&gt;Competition Policy Brief, June 2014, Issue 8, Standard Essential Patents, European Commission)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: center; "&gt;&lt;span&gt;&lt;span&gt;***&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: left; "&gt;&lt;span&gt;&lt;span&gt;&lt;i&gt;All comments in square brackets and italics by the author.&lt;/i&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts'&gt;https://cis-india.org/a2k/blogs/two-faced-frand-licensing-and-injunctive-relief-in-icts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2016-03-16T02:37:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/b13b21b3cb3fb06-b2db3eb37b3e-b2ab3eb07b01-b15b3fb1bb3f-b05b28b4db24b30b4db1cb3eb24b40b5f-b07b23b4db1fb30b28b47b1f-b2ab4db30b15b33b4db2a">
    <title>ଓଡ଼ିଆ ଭାଷା ପାଇଁ କିଛି ଅନ୍ତର୍ଜାତୀୟ ଇଣ୍ଟରନେଟ ପ୍ରକଳ୍ପ </title>
    <link>https://cis-india.org/a2k/blogs/b13b21b3cb3fb06-b2db3eb37b3e-b2ab3eb07b01-b15b3fb1bb3f-b05b28b4db24b30b4db1cb3eb24b40b5f-b07b23b4db1fb30b28b47b1f-b2ab4db30b15b33b4db2a</link>
    <description>
        &lt;b&gt;With more free and open software coming in, more people are coming together and collaborating. The ownership of various projects are coming from bigger corporations to the hands of people. It is essential to learn about the global, collaborative and multilingual projects in our language so that it come out of the four walls of literature and become the language of economy and knowledge. In this piece, I have discussed about three open knowledge projects Odia Wikipedia, Odia Wikisource and Global Voices Odia, how they work and how anyone can contribute in these projects.

&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The article was published in &lt;a class="external-link" href="http://odia.yourstory.com/read/9fc7c70a93/-"&gt;Your Story&lt;/a&gt; on January 14, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;ଭାଷାଟି ଆମର ଏ ଦେଶର ମୋଟ ୬୦୦ରୁ ଅଧିକ ଭାଷା ଓ ତହିଁରୁ ୬ଟି ପୁରୁଣା ଭାଷା ଭିତରୁ ଗୋଟିଏ ବୋଲି ମାନ୍ୟତା ପାଇଲା । ଭାଷା ଭିତ୍ତିରେ ରାଜ୍ୟ ହେବାରେ ଓଡ଼ିଆ ହେଉଛି ଏସିଆରେ ପ୍ରଥମ । ଆମ ଭାଷା ମୂଳ ବିଶାଳ କଳିଙ୍ଗ ଭୁଖଣ୍ଡର ସତ୍ତାକୁ ଧରି ରଖିଥିବା ବୋଧେ ଏକୋଇ ଭାଷା । ଏତେ ସବୁ ପରେ ମଧ୍ୟ ଆମ ଭାଷା ଆନ୍ତର୍ଜାତିକ ସ୍ତରରେ କେତେ ପରିଚିତ ତାହା ନ କହିବା ଭଲ ।&lt;/p&gt;
&lt;p style="text-align: justify;" class="callout"&gt;ଓଡ଼ିଆ ଭଳି ଏତେ ପୁରାତନ ଭାଷା ଜଗତରେ ରହିଛି ବୋଲି କେଇ ଶହ ବର୍ଷ ତଳେ ଆମ ନିଜର ଥିବା ଆମ ପଡ଼ିଶା ବଙ୍ଗ, ବିହାରର ଲୋକେ ମଧ୍ୟ ଜାଣିଥିବେ କି ନାଁ ସନ୍ଦେହ । ଯେଉଁଠି ନିଜ ରାଜ୍ୟର ଲୋକେ ଓଡ଼ିଆରେ କଥା ହେବାକୁ ନାରାଜ ସେଠି ଦେଶବିଦେଶରେ ପତିଆରା କଥା କହିବା ତୁଚ୍ଛା ପାଗଳାମି ବୋଲି ପାଠକେ ହୁଏତ ଭାବୁଥିବେ ।&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ତେବେ ଏ ପ୍ରସଙ୍ଗ ଆଲୋଚନା କରିବା ପଛରେ ରହିଛି ଆମ ଓଡ଼ିଆ ଜାତିର ମାନସିକତା । ବିଦେଶରୁ ଆସିଥିବା ଲୋକଟେ ଅଧିକ ଆଦର ପାଏ, ନିଜ ଲୋକେ ବିଦେଶ ଯାଇ ବାହୁଡ଼ିଲେ ଅଧିକ ସମ୍ମାନର ଅଧିକାରୀ ହୁଅନ୍ତି, ଏମିତିକି ଲୋକେ ମଦ ପିଇଲେ ବିଦେଶୀ ଭାଷାରେ ବକନ୍ତି ବୋଲି ଶୁଣାଯାଏ! ଏଣୁ ନିଜ ରାଇଜ ଆଉ ଦେଶରେ ଯେବେ ଆମ ଭାଷାଟି ଗାଁ କନିଆଁ, କାଳେ ବିଦେଶରେ କାଟତି ବଢ଼ିଲେ, ଭାଷାଟି ଏକ ଆନ୍ତର୍ଜାତୀୟ ଭାଷା ବୋଲି ବିଖ୍ୟାତ ହେବ ଆଉ ନିଜ ଲୋକଙ୍କ ତା ପ୍ରତି ଆଦର ବଢ଼ିପାରେ ବୋଲି ବିଚାରିବା । ଏ କଥାଟି ଯେ ଆମ ବିଲାତ ଫେରନ୍ତା ବାବୁ ମାନେ ହେଜିନଥିବେ ତା' ନୁହେଁ, ହେଲେ ଯେଉଁଠି ଖଣ୍ଡି ଇଂରାଜୀ ଓ ହିନ୍ଦିରେ କାମ ଚଳି ଯାଉଛି ସେଠି ସେମାନେ କାହିଁକି କଷଣ ସହି ଯେ ପ୍ରାଞ୍ଜଳ ଇଂରାଜୀ ଶିଖିବେ ଆଉ ପାଞ୍ଚ ଦେଶର ଲୋକଙ୍କ ଆଗରେ ନିଜ କଥା ସଳଖେ ବଖାଣିବେ? କାମ ତ ଚଳିଯାଉଛି!&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;କେଇଦିନ ତଳେ ଇଟାଲିରୁ ଜଣେ ସାଙ୍ଗ ଜଣାଇଲେ "ଓଡ଼ିଆ" ଶବ୍ଦଟି (ସେମାନେ, ପର୍ତ୍ତୁଗୀଜ ଓ ସ୍ପାନିସ ଭାଷୀଏ "ଓଦିଆ" ବୋଲି ଉଚ୍ଚାରଣ କରନ୍ତି) "ଘୃଣା କରିବା" ପାଇଁ ବ୍ୟବହାର ହୁଏ । ମୁହଁରେ କହିଲି ନାହିଁ, ହେଲେ ମନରେ ଭାଜିଲି ଆମ ଲୋକେ ନିଜ ଭାଷାକୁ କଣ କମ ହିନିମାନ ନ କରନ୍ତି । ଯଦି ଆମ ଭାଷା ଜଗତର ଛାମୁଆଁ ଭାଷା ଭିତରୁ ଗୋଟେ ହୋଇପାରନ୍ତା ତାହେଲେ ଏ "ଘୃଣାର ଭାଷା" ହୋଇ ଆଉ ନ ରହନ୍ତା । ତେବେ ଆମମାନଙ୍କ ଭିତରୁ କେତେ ଜଣ ଜଗତର ଆଉ ଭାଷା ଗବେଷାଳିଙ୍କ ସଙ୍ଗେ ନିଜ ଭାଷା କଥା ପକାଉଛୁ? ଆମେ ଯେଡ଼େ ବଡ଼ ଆଁ କରି ଆଉ ଜଳପ୍ରପାତକୁ ଟିଭିରେ ଦେଖୁଛୁ ଆମ ଖଣ୍ଡାଧାର କି ବରେହିପାଣିର ଛିଟିକାଏ ପାଣି ନିଜ ଦେହରେ ବଜେଇ ଚାଖୁଛୁ କି ତା'ର ମଜା?&lt;/p&gt;
&lt;p style="text-align: justify;" class="callout"&gt;ଓଡ଼ିଶା ସୀମା ଡେଇଁଲେ ଓଡ଼ିଆମାନେ ଏତେ ଅନର୍ଗଳ ହିନ୍ଦୀ କହିବେ ଆପଣଙ୍କୁ ବୋଧ ହେବ ବୋଧେ ଏମାନେ ଅଭିମନ୍ୟୁ ହୋଇ ବୋଉ ପେଟରୁ ହିନ୍ଦୀ ଶିଖିଥିଲେ ।&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ଅଧିକ ଭାଷା ଶିଖିଲେ ଭଲ, କାମରେ ଆସେ । ହେଲେ ନିଜ ଭାଷାକୁ ତୁଚ୍ଛ କରି, ତା' ଉପରେ ମଳ ଅଜାଡ଼ି ଦେଇ କିଏ ନୂଆ ଭାଷାରେ ଏତେ ପାରଙ୍ଗମ ହୁଏନା । ଆଜି ଯାଏ ଆମ ଭାଷାର ଏତେ ସାହିତ୍ୟ ଯେ ଗଢ଼ା, ତା ଭିତରୁ କେତେ ଅନ୍ୟ ଭାଷାରେ ଅନୁବାଦ ହୋଇଛି । ଯେଉଁମାନେ ଆମ ସାହିତ୍ୟର ମୁଖିଆ ବୋଲାଇ କାଳ କାଳ ଧରି ଗାଦି ମାଡ଼ି ବସିଛନ୍ତି ସେମାନଙ୍କୁ ପୁଚ୍ଛିବାର ବେଳ ଆସିଛି କାହିଁକି ଆମେ ଖାଲି ଅନ୍ୟ ଭାଷାରୁ ଅନୁବାଦ କରୁଛୁ, କାହିଁକି ଆମର କାଳଜୟୀ ଲେଖାମାନ ଦେଶ ଓ ଦେଶ ବାହାରେ ପଢ଼ାଯାଉନାହିଁ? ଭାରତୀୟ ଭାଷା ଭିତରୁ କେବଳ ତାମିଲ ଭାଷା କଥା ଚର୍ଚ୍ଚା ହୁଏ ଦେଶ ବିଦେଶରେ । କାରଣ କଣ ଜାଣନ୍ତି? ବାକି ସବୁ କାରଣ ବାଦେ ସବୁଠୁ ବଡ଼ କାରଣଟି ହେଲା ସେ ଭାଷାର ପୁରୋଧାମାନେ ରାଜ୍ୟ କି ଦେଶ ଭିତରେ ବାନ୍ଧି ନ ହୋଇ ନିଜ ଭାଷାକୁ ସାରା ଜଗତକୁ ନେଇଛନ୍ତି । ଖାଲି ପଇସାର ଟାଣରେ ଏ କାମ ହୋଇନାହିଁ, ଏଥିରେ ଧନ, ରାଜନୀତି ଆଉ ଡିପ୍ଲୋମାସି ଲାଗିଛି । ଆମ ସାହିତ୍ୟିକମାନେ ଥରୁଟେ ବିଦେଶ ଗଲେ ସେଠି ନିଜ ଭାଷା, ରାଇଜ କଥା କେତେ ଯେ ଗପନ୍ତି ତା' ମା' ଗଙ୍ଗେଇଙ୍କି ଜଣା । ଗପୁଥିଲେ ତାଙ୍କ ପରିଚିତ ମହଲରେ ଓଡ଼ିଆ ଭାଷା ବାବଦରେ ମଞ୍ଜିଟିଏ ପୋତା ହୋଇଥାନ୍ତା, ଅନ୍ତତ କିଛି ଭାଷାରେ ଓଡ଼ିଆ ବହି ଅନୁଦିତ ହୋଇଥାନ୍ତା, ଓଡ଼ିଆ ଭାଷାର ପୁରୁଣାପଣ ବାବଦରେ ବିଦେଶୀ ବ୍ଲଗରେ, ଖବରକାଗଜରେ, ଟେଲିଭିଜନରେ ଚର୍ଚ୍ଚା ହୋଇଥାନ୍ତା । ହୋଇଛି କି ଏଥିରୁ କାଣିଚାଏ? ଆମେ ନିଜ ଭାଷାର ବିଶ୍ୱବିଦ୍ୟାଳୟ କଥା ବିଚାରୁଛୁ, ହେଲେ ଆକାଶ କଇଆଁ ସ୍ୱରୂପ "ଶାସ୍ତ୍ରୀୟ ମାନ୍ୟତା କେନ୍ଦ୍ର ଅନୁଦାନ ରାଶି" ଆସିବାକୁ ନ ଚାହିଁ ବିଦେଶରୁ ରାଶି କେମିତି ଆସି ଏ କାମରେ ଲାଗିବ ତା' ପାଇଁ ବାଟ ତିଆରୁଛୁ କି? ତେବେ ଏ ଦୁଃଖ ବଖାଣିଲେ ନ ସରେ । ଚୋରକୁ ମାନ ମାରି ଖପରାରେ ଖାଇଲେ ଏଠି ଘରବୁଡ଼ି ଆଣ୍ଠୁଏ ହେବ । ତେଣୁ ବେଳ ଥାଉଁ ଥାଉଁ କିଛି ନିଅଁ ପୋତା ଚାଲୁ, ତେଣିକି ଘର ଯେବେ ଗଢ଼ାଯିବ ଏ ସାହା ହେବ ।&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ଓଡ଼ିଆର ପରିଚିତି ଦେଶବିଦେଶରେ ଯେତିକି ଉଣା ଜଗତର ବାକି ଭାଷା ପାଇଁ ତିଆରି ହୋଇଥିବା ବିଭିନ୍ନ ଜ୍ଞାନର ଭଣ୍ଡାରରେ ମଧ୍ୟ ସେତିକି ଅଜଣା । ଇଂରାଜୀ ବାଦ ଅନ୍ୟାନ୍ୟ ଭାଷାର ଲେଖାର ପ୍ରକାଶନ ପାଇଁ ଅନେକ ସ୍ଥାନ ରହିଛି । ତେବେ ଏମିତି କେତୋଟି ଜାଗତିକ ସ୍ଥାନରେ ଓଡ଼ିଆର ଚିହ୍ନଟେ ଯେ ରହିବା ଲୋଡ଼ା ତା' କହିବା ବାହୁଲ୍ୟ । କାନ୍ଦି ବୋବାଳି ରାମମୋହନ ଲାଇବ୍ରେରି ସକାଶେ କେଇ ଶହ ବହି ଛାପି ଯେଉଁମାନେ ନିଜର ବା ଭାଷାର ଉନ୍ନତି କରିବେ ବୋଲି ସାଧି ବସିଥିବେ ତାଙ୍କ ପାଇଁ ନାକରା ଖବର ଆଉ ପିଲେ ଓଡ଼ିଆ ପଢ଼ୁନାହାନ୍ତି । ଓଡ଼ିଆ କଥା ଛାଡ଼ନ୍ତୁ, ପିଲେ ବହି ପଢ଼ୁନାହାନ୍ତି । ତାଙ୍କୁ ଆଜିକାଲି ଲୋଡ଼ା ଭଳିକି ଭଳି ଗେମ, ଆନିମେସନ ଆଉ ଗ୍ରାଫିକ ନଭେଲ (କମିକ୍ସ ଭଳି, ଛବି ସମ୍ବଳିତ ବହି) । ପୁଣି ପିଲାଏ ମୋବାଇଲ ଆଉ କମ୍ପ୍ୟୁଟରରୁ ଇଣ୍ଟରନେଟରେ ଖୋଜି ବସୁଛନ୍ତି ନୂଆ ନୂଆ କଥା । ଆଜିର ପିଢ଼ି ଯାହା ଦେଇ ଶିଖୁଛନ୍ତି ତାଙ୍କୁ ସେଇ ମାଧ୍ୟମରେ ଶିଖାଇପାରିଲେ ସିନା ସେମାନେ ଶିଖିବେ । ଖାଲି ଏବର ପିଢ଼ିଙ୍କୁ ଦୋଷ ଦେଇ ଭାଷା ମରିଯାଉଛି ବୋଲି କୁମ୍ବୀର କାନ୍ଦଣା କାନ୍ଦିଲେ କି ହେବ? ତେବେ ଆସନ୍ତୁ ଓଡ଼ିଆ ଭାଷାକୁ ଅଧିକ ବିଶ୍ୱସ୍ତରୀୟ କରିବା ଲାଗି ତିଆରି କିଛି ଓଡ଼ିଆ ପ୍ରକଳ୍ପ ବାବଦରେ ଆଲୋଚନା କରିବା ।&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆ:&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;ଇଣ୍ଟରନେଟରେ ପହଞ୍ଚିଲେ କୌଣସି ବିଷୟ ଖୋଜିବାକୁ ପ୍ରଥମେ ଖୋଲାହୁଏ ଗୁଗୁଲ କି ୟାହୁ ଭଳି ସର୍ଚ ଇଞ୍ଜିନ । ଖୋଜିଲା ପରେ ଯାହା ପ୍ରଥମ ଲିଙ୍କରେ ଆସେ ସେ ହେଲା ଉଇକିପିଡ଼ିଆ (Wikipedia) । ହାବାଇ ଭାଷାରେ "ଉଇକି"ର ମାନେ ସହଳ । ଆଙ୍ଗୁଳି ଛୁଆଁରେ ଝଅଟ ମିଳିଯାଉଥିବାରୁ ତା' ନାଁ "ଉଇକି" ଦିଆଯାଇଛି । ଏଇଟି ଜଗତର ବିଶାଳତମ ଜ୍ଞାନକୋଷ । ୨୦୦୧ରେ ଇଂରାଜୀ ଉଇକିପିଡ଼ିଆରେ ପରେ ପ୍ରଥମ ଭାରତୀୟ ଭାଷା ଭାବେ ପଞ୍ଜାବୀ ଓ ଅହମିୟା ସହ ଯେ ଓଡ଼ିଆ ଏଥିରେ ସ୍ଥାନ ପାଇଲା ତା' ଅନେକେ ଜାଣି ନଥିବେ । ୨୦୦୨ରେ ତିଆରି ସିନା ହୋଇଗଲା । ହେଲେ ଏଥିରେ ଲେଖିବ କିଏ? ଇଂରାଜୀର ପାଠକ ଓ ଲେଖକ ଅଧିକ । ଆଉ ଉଇକିପିଡ଼ିଆରେ ଲେଖିଲେ କଉଡ଼ିଟିଏ ମିଳେନାହିଁ । ସ୍ୱେଚ୍ଛାରେ ଲେଖିବାକୁ ବିଦେଶରେ ଯେମିତି ଲୋକ ବାହାରନ୍ତି ଆମର ସେ ଅବସ୍ଥା ନାହିଁ । ତଥାପି ୨୦୧୧ ବେଳକୁ ଓଡ଼ିଶା ବାହାରେ ଥିବା କିଛି ଓଡ଼ିଆ ଏ ତିମିରରେ କିଛି ଆଲୁଅ ଜଳାଇଲେ । ଧୀରେ ଧୀରେ ଓଡ଼ିଶାରେ ଥିବା ଓଡ଼ିଆମାନେ ମଧ୍ୟ ସେଥିରେ ଯୋଡ଼ିହେଲେ । ଆଉ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆ ଓଡ଼ିଆ ଭାଷାର ବିଶାଳତମ ଅନଲାଇନ ଜ୍ଞାନକୋଷ । or.wikipedia.org ରେ ଉପଲବ୍ଧ ଏ ଏନସାଇକ୍ଲୋପିଡ଼ିଆ ସୀମିତ ସ୍ୱେଚ୍ଛାସେବୀଙ୍କ ଦେଇ ସମ୍ପାଦିତ ହେଉଥିବାରୁ ସେତେ ବିଶାଳ ନୁହେଁ ସତ, କିନ୍ତୁ ଏହା ଓଡ଼ିଆ ଭାଷାରେ ଉପଲବ୍ଧ ବିଶାଳତମ ୱେବସାଇଟ । ବିଭିନ୍ନ ବହି, ଖବରକାଗଜ ଓ ପତ୍ରପତ୍ରିକାରୁ ଖୋଜି ଲୋଡ଼ି ଏଥିରେ ସ୍ଥାନ, ବ୍ୟକ୍ତିତ୍ୱ, ଐତିହାସିକ ସ୍ଥଳୀ ଓ ଜଣାଶୁଣା ଅନେକ ବିଷୟରେ ପ୍ରସଙ୍ଗ ଗଢ଼ିବା ଏବଂ ଆଗରୁ ଥିବା ପ୍ରସଙ୍ଗରେ ଅଧିକ ତଥ୍ୟ ଯୋଡ଼ି କଳେବର ବଢ଼ାଇବା ଲାଗି ଲୋଡ଼ା ଆହୁରି ଅନେକ ହାତ । ବିଶାଳାକାର ଏନସାଇକ୍ଲୋପିଡ଼ିଆସବୁ ପାଠାଗାର ଭିତରେ ଆଉ ସେଠାକୁ ଯାଉଥିବା ପାଠକଙ୍କ ଭିତରେ ବାନ୍ଧି ହୋଇ ରହିଯାଇଥିଲା । ତାକୁ ଖୋଲିବାର କଞ୍ଚିକାଠି ସାଜିଲା ଉଇକିପିଡ଼ିଆ । ଏକ ସମୟରେ ଲକ୍ଷ ଲକ୍ଷ ପାଠକଙ୍କ କତିରେ ପହଞ୍ଚିବାର ସରଳ ପନ୍ଥା ଆଉ କଣ ହୋଇପାରେ? ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ପ୍ରସଙ୍ଗ ସଂଖ୍ୟା ୧୦ ହଜାରରୁ ଅଧିକ ଓ ମାସିକ ପାଠକ ୫ ଲକ୍ଷରୁ ଅଧିକ । ବହିର ପାଠ ବହି ବାହାରେ ବ୍ୟବହାର ହେବାରେ ପୁଣି ଟାଇପ କରିବାର ଯେଉଁ ବାଧକ ତା' ଏଥିରେ ନାହିଁ । ମଜାର କଥା ଯେ ଅନେକ ସମୟରେ ବିଭିନ୍ନ ଭାଷାଭାଷୀ ଉଇକିଆଳିଗଣ (ଉଇକିପିଡ଼ିଆର ସମ୍ପାଦକ)ବେଳେ ବେଳେ ଆପୋଷରେ ଏକ ଆଉଜଣଙ୍କ ଦେଶ-ଭାଷା-ଚଳଣି-ବ୍ୟକ୍ତିତ୍ୱଙ୍କ ସମ୍ବନ୍ଧରେ ଲେଖିବା ଦେଖାଯାଏ । ୨୯୦ରୁ ଅଧିକ ଭାଷାଭାଷୀ ଏମିତି ଅଗଣିତ ଲୋକ ଯେଉଁଠି ମିଶି ଲେଖନ୍ତି ସେଠି ଭାଷାଟିଏ ଯୋଜନ ଯୋଜନ ଡେଇଁ ଜଗତର କୋଣ ଅନୁକୋଣ କେଡ଼େ ସହଜରେ ପହଞ୍ଚିପାରେ ଏ ତା'ର ଏକ ଉଦାହରଣ ।&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;ଓଡ଼ିଆ ଉଇକିପାଠାଗାର&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;ଆମ ଭାଷାରେ ଏଯାବତ କେଇ ଲକ୍ଷ ବହି ଛପାଯାଇସାରିବଣି । ହେଲେ ଏ ସବୁ ବହି କଣ ସଭିଏଁ ପଢ଼ିବାର ସୁଯୋଗ ପାଆନ୍ତି? କାହାପାଖରେ ପାଠାଗାର ଯିବା ପାଇଁ ବେଳ ନାହିଁ ତ ହାତପାହାନ୍ତାରେ ବହି ନ ଥିବାରୁ କିଏ ଓଡ଼ିଆ ଛାଡ଼ି ବାକି ଭାଷାର ଲେଖା ପଢ଼ା ଆଦରୁଛି । ଆମ ଭାଷାର ପାଠକ କମି କମି ଯାଉଛନ୍ତି । ସମାଧାନର ପନ୍ଥା କଣ ହୋଇପାରେ? ଆମ ଭାଷା ଖାଲି କଣ ସାହିତ୍ୟ ଆଉ ସାହିତ୍ୟିକଙ୍କ ଭାଷା କି ଲୋକମୁଖର କଥିତ ଭାଷା ହୋଇ ରହିଯିବ? ଆଜିର ପିଢ଼ିଙ୍କ ପାଖରେ ପହଞ୍ଚିବା ଲାଗି ତା'କୁ ମନ ପଢ଼ିବାକୁ, ଜିଣିବାକୁ ହେବ । ଏଥି ପାଇଁ ପ୍ରାଥମିକ କାମଟି ହେଲା ବିରଳ ଓ ଛପା ହେଉନଥିବା ଅନେକ ପୁରାତନ ବହି ଇଣ୍ଟରନେଟ ଜରିଆରେ ପାଠକମାନଙ୍କ ନିକଟକୁ ନେବା । ଆମ ଦେଶରେ ଲେଖକଙ୍କ ଦେହାନ୍ତର ୬୦ ବର୍ଷ ପରେ ବହିର କପିରାଇଟ ଚାଲିଯାଏ । ଏଭଳି ପବ୍ଲିକ ଡୋମେନରେ (କପିରାଇଟ ନଥିବା) ବହିସବୁ କେବେ କେବେ ସୀମିତ ସଂଖ୍ୟାରେ ପାଠାଗାରରେ ଥାଏ । ଯଦି ପାଠାଗାରରୁ କୌଣସି କାରଣରୁ ବହିଟି ଚୋରିହୁଏ କି ପୋକ ଖାଇଯାଏ ତାହେଲେ ଲେଖକର ଶ୍ରମର ଦେଉଳ ଭୁସୁଡ଼ିପଡ଼େ । ଯଦି ବହିଟି ଏକରୁ ଅଧିକ ଥର ପ୍ରକାଶ ପାଇଥାଏ ତାହେଲେ ସେକଥା ଭିନ୍ନ । କିନ୍ତୁ ଅନେକ ବହି ଦ୍ୱିତୀୟଥର ଛପାହୁଏନା । ତାକୁ ସାଇତିବାର ସବୁଠୁ ବଡ଼ ବାଟ ହେଉଛି ଇଣ୍ଟରନେଟ । ପୁରୁଣା ଓ ବିରଳ ବହିମାନ ଛପାଇବାରେ ଭୁବନେଶ୍ୱରର ସୃଜନିକା ଅନୁଷ୍ଠାନର କାମ ଏକ ଐତିହାସିକ ପଦକ୍ଷେପ । ୧୮୪୦-୧୯୪୦ ଭିତରେ ପ୍ରକାଶିତ ପତ୍ରିକା, ୨୫ରୁ ଅଧିକ ଅଭିଧାନ ତଥା ପୂର୍ଣ୍ଣଚନ୍ଦ୍ର ଭାଷାକୋଷ ଭଳି ପୋଥିକୁ ମିଶାଇ ୭୪୦ରୁ ଅଧିକ ବହିକୁ ଡିଜିଟାଲ ରୂପ ଦେବାରେ ସେମାନଙ୍କ ଅବଦାନ କାହିଁରେ କେତେ । ହେଲେ ଏ ବହିର ଲେଖାସବୁ ଆଉଥରେ ବ୍ୟବହାର ହେବା, ଇଣ୍ଟରନେଟରେ ଖୋଜିପାଇବା ତଥା ମୋବାଇଲ ଆଦିରେ ପଢ଼ିବା ପାଇଁ ଆଉଥରେ ଟାଇପ ହେବା ଜରୁରୀ । ସବୁଯାକ ବହିକୁ ଟାଇପ କରିବା ସମ୍ବବ ନୁହେଁ, ହେଲେ କିଛି କିଛି ବହି ଧୀରେ ଧୀରେ ଟାଇପ ହୋଇପାରିବ । ସେ କାମଟି ଅଧୁନା ଓଡ଼ିଆ ଉଇକିପାଠାଗାରରେ ଆରମ୍ଭ ହୋଇଛି । ଇଣ୍ଟରନେଟରେ or.wikisource.org ୱେବସାଇଟ ଖୋଲି ପାଠକେ ଏହାକୁ ଖୋଲି ପଢ଼ିପାରିବେ ଓଡ଼ିଆ ଭାଗବତଠୁ ଆରମ୍ଭ କରି ଭଞ୍ଜ ସାହିତ୍ୟ ଏବଂ ଗୋପବନ୍ଧୁଙ୍କ ପରି ଏ ଯୁଗର ମହାନ ସାହିତ୍ୟିକଙ୍କ ରଚନାବଳୀ । ଏହାର ଲେଖା ସଂଖ୍ୟା ଅଧୁନା ୨୮୫ରୁ ଅଧିକ । ଖାଲି ସେତିକି ନୁହେଁ, ଆଗରୁ ସ୍କାନ ହୋଇ ରହିଥିବା ଅନେକ ବହିକୁ ଆଉଥରେ ଟାଇପ କରିବା କାମ ସଭିଙ୍କ ପାଇଁ ଖୋଲା । ତେଣୁ ପୁରାତନ ରଚନାର ବିଦଗ୍ଧ ପାଠକଜଣେ ପୂଜୁଥିବା ଲେଖକଙ୍କ ରଚନା ଏଥିରେ ଟାଇପ କରି ସ୍ଥାନୀତ କରିପାରିବ । ପ୍ରକଳ୍ପଟି ଅଣଲାଭକାରୀ, ଆଉ କପିରାଇଟ ନଥିବାରୁ ବହି ସବୁ ଖୋଲାରେ ପାଠକଙ୍କ ପାଇଁ ଉପଲବ୍ଧ ।&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;ଗ୍ଲୋବାଲ ଭଏସେସ&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;ଉପର ଦୁଇ ପ୍ରକଳ୍ପ ତ ଗଲା ବହିର ରକ୍ଷଣାବେକ୍ଷଣା ଆଉ ଜ୍ଞାନକୋଷ ବା ଏନସାଇକ୍ଲୋପିଡ଼ିଆ ଗଢ଼ିବାର କଥା । ହେଲେ ଘଟୁଥିବା ଘଟଣା ଆଉ ଜନମତର ମହତ ମଧ୍ୟ ଉଣା ନୁହେଁ । ଲେଖିବାକୁ କଷ୍ଟ ହେଉ ପଛେ ଆମ ଲୋକେ ଏବେ ଯାଏ ଇଂରାଜୀକୁ କମ୍ପୁଟରର ଭାଷା ମାନି ମୋବାଇଲ ବା ଇଣ୍ଟରନେଟରେ କେବଳ ଇଂରାଜୀରେ ଲେଖନ୍ତି । ସାଧାରଣ ଲୋକେ କିପରି ଓଡ଼ିଆରେ ଇଣ୍ଟରନେଟରେ ଲେଖିବେ ତା'ର ସଳଖ ବାଟ ଅନେକଙ୍କ ପାଖେ ପହଞ୍ଚି ନଥିବାରୁ ଏ ଅସୁବିଧା । ଘଟୁଥିବା ଘଟଣାବଳୀ ଓ ତହିଁରେ ଜନ-ଅଭିମତକୁ ଭରିବା ଲକ୍ଷରେ ଏକ ବିଶ୍ୱବ୍ୟାପୀ ଆନ୍ଦୋଳନ ହେଉଛି ଗ୍ଲୋବାଲ ଭଏସେସ । ସୌଭାଗ୍ୟର କଥା ଯେ ହିନ୍ଦୀ ଓ ବଙ୍ଗଳା ପରେ ଏଥିରେ ୩ୟ ଭାରତୀୟ ଭାଷା ଭାବେ ଓଡ଼ିଆ ସ୍ଥାନୀତ । ଅନେକ ସମୟରେ ନଜର ଆଢ଼ୁଆଳରୁ ଛପି ଯାଉଥିବା ଘଟଣା ଏଥିରେ ପଦାକୁ ଆସେ । ଜଗତର ଅନେକ ଲୋପ ପାଇଯାଉଥିବା ଭାଷା, ଚଳଣିଠୁ ଯୁଦ୍ଧଭୂଇଁରେ ଯୁଝୁଥିବା ଲୋକଙ୍କ କାହାଣୀ ତଥା ସାଧାରଣ ମଣିଷର ସ୍ୱର ଫୁଟିଉଠେ ଏଥିରେ । ଓଡ଼ିଆ ପାଠକଙ୍କ ପାଇଁ ଖବର ବୋଲି ଯାହା ଖବରକାଗଜରେ ଆସେ ତା ବାହାରେ ଘଟୁଥିବା ଘଟଣା ସହ ପରିଚିତି ଲାଭ ପାଇଁ ଏ ଏକ ବଡ଼ ମାଧ୍ୟମ ହୋଇପାରେ । ଏହା or.globalvoices.org ରେ ଉପଲବ୍ଧ । ଏ ମଧ୍ୟ ଏକ ସ୍ୱେଚ୍ଛାସେବୀ ପରିଚାଳିତ ପ୍ରକଳ୍ପ ଯାହାର ଦୁଆର କିଛି ପରିମାଣରେ ଭାଷା ଦକ୍ଷତା ଥିବା ଲେଖକଙ୍କ ପାଇଁ ଖୋଲା ।&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ଏ ତିନୋଟି ମୁଖ୍ୟ ପ୍ରକଳ୍ପ ବାଦ ଆହୁରି ଅନେକ ଅଣ-ଲାଭକାରୀ ଓ ଖୋଲା ପ୍ରକଳ୍ପ ରହିଛି । ଓଡ଼ିଆକୁ ଇଣ୍ଟରନେଟରେ ଅଧିକ ଜନପ୍ରିୟ କରିବାକୁ ଇଚ୍ଛୁକ ଓଡ଼ିଆଏ &lt;a href="https://or.wiktionary.org"&gt;ଓଡ଼ିଆ ଉଇକିଅଭିଧାନ&lt;/a&gt;ରେ ବିଭିନ୍ନ ଭାଷାର ଶବ୍ଦ ଓଡ଼ିଆରେ ଲେଖିପାରିବେ ଆଉ ନିତିଦିନ ବ୍ୟବହାର କରୁଥିବା ଫାୟାରଫକ୍ସ ବ୍ରାଉଜରର ସମ୍ପୂର୍ଣ୍ଣ ଇଣ୍ଟରଫେସ &lt;a href="https://wiki.mozilla.org/L10n:Teams:or"&gt;ଓଡ଼ିଆରେ ଅନୁବାଦ&lt;/a&gt; କରିପାରିବେ । ଆଉ ନୂଆ ଘଟଣା ବାବଦରେ &lt;a href="http://odia.yourstory.com"&gt;YourStory ଓଡ଼ିଆ&lt;/a&gt;ରେ ମଧ୍ୟ ଲେଖିପାରିବେ ।&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/b13b21b3cb3fb06-b2db3eb37b3e-b2ab3eb07b01-b15b3fb1bb3f-b05b28b4db24b30b4db1cb3eb24b40b5f-b07b23b4db1fb30b28b47b1f-b2ab4db30b15b33b4db2a'&gt;https://cis-india.org/a2k/blogs/b13b21b3cb3fb06-b2db3eb37b3e-b2ab3eb07b01-b15b3fb1bb3f-b05b28b4db24b30b4db1cb3eb24b40b5f-b07b23b4db1fb30b28b47b1f-b2ab4db30b15b33b4db2a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Odia Wikisource</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T16:24:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-selected-sessions">
    <title>Internet Researchers' Conference 2016 (IRC16) - Selected Sessions</title>
    <link>https://cis-india.org/raw/irc16-selected-sessions</link>
    <description>
        &lt;b&gt;We are proud to announce that the first Internet Researchers' Conference (IRC16), organised around the theme of 'studying internet in India,' will be held on February 26-28, 2016, at the Jawaharlal Nehru University (JNU), Delhi. We are deeply grateful to the Centre for Political Studies (CPS) at JNU for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for generously supporting it. Here are the details about the session selection process, the selected sessions, the Conference programme (draft), the pre-Conference discussions, accommodation, and travel grants. The Conference will include a book sprint to produce an open handbook on 'methods and tools for internet research.'&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session Selection Process&lt;/h2&gt;
&lt;p&gt;We received 23 superb session proposals for the IRC16. All the teams that submitted sessions were invited to vote for their eight favourite session in a double-blind manner - the teams did not know the names of the people who proposed other sessions, and we at CIS did not know which team has voted for which particular set of sessions. After receiving all the votes, we could not help but change the format of the Conference (as planned earlier) to accommodate 15 sessions in total. All Discussion and Workshop sessions of the Conference are double track, except for the three Discussion sessions that received most number of votes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Selected Sessions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitaldesires"&gt;&lt;strong&gt;#DigitalDesires&lt;/strong&gt;&lt;/a&gt;: Received 8.15% votes. Proposed by Silpa Mukherjee, Ankita Deb, and Rahul Kumar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-followthemedium"&gt;&lt;strong&gt;#FollowTheMedium&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Zeenab Aneez and Neha Mujumdar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-stsdebates"&gt;&lt;strong&gt;#STSDebates&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Sumandro Chattapadhyay and Jahnavi Phalkey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitalliteraciesatthemargins"&gt;&lt;strong&gt;#DigitalLiteraciesAtTheMargins&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Aakash Solanki, Sandeep Mertia, and Rashmi M.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-internetmovements"&gt;&lt;strong&gt;#InternetMovements&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Becca Savory, Sarah McKeever, and Shaunak Sen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-futurebazaars"&gt;&lt;strong&gt;#FutureBazaars&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Maitrayee Deka, Adam Arvidsson, Rohini Lakshané, and Ravi Sundaram.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-minimalcomputing"&gt;&lt;strong&gt;#MinimalComputing&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Padmini Ray Murray and Sebastian Lütgert.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-webofgenealogies"&gt;&lt;strong&gt;#WebOfGenealogies&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Ishita Tiwary, Sandeep Mertia, and Siddharth Narrain.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-wikishadows"&gt;&lt;strong&gt;#WikiShadows&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Tanveer Hasan and Rahmanuddin Shaik.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-literaryspaces"&gt;&lt;strong&gt;#LiterarySpaces&lt;/strong&gt;&lt;/a&gt;: Received 5.43% votes. Proposed by P.P. Sneha and Arup Chatterjee.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-archiveanarchy"&gt;&lt;strong&gt;#ArchiveAnarchy&lt;/strong&gt;&lt;/a&gt;: Received 4.34% votes. Proposed by Ranjani M Prasad and Farah Yameen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-afcinema2.0"&gt;&lt;strong&gt;#AFCinema2.0&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Akriti Rastogi and Ishani Dey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-manypublicsofinternet"&gt;&lt;strong&gt;#ManyPublicsOfInternet&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Sailen Routray and Khetrimayum Monish.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-politicsonsocialmedia"&gt;&lt;strong&gt;#PoliticsOnSocialMedia&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Rinku Lamba and Rajarshi Dasgupta.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-spottingdata"&gt;&lt;strong&gt;#SpottingData&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Dibyajyoti Ghosh and Purbasha Auddy.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the &lt;a href="http://jnu.ac.in/"&gt;&lt;strong&gt;Jawaharlal Nehru University (JNU)&lt;/strong&gt;&lt;/a&gt;, Delhi. We are delighted to announce that the Conference will be hosted by the &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;&lt;strong&gt;Centre for Political Studies (CPS)&lt;/strong&gt;&lt;/a&gt; at JNU, and will be generously supported by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;&lt;strong&gt;CSCS Digital Innovation Fund (CDIF)&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conference Programme&lt;/h2&gt;
&lt;p&gt;Access the draft programme (v.2.1): &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.1.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Pre-Conference Conversations&lt;/h2&gt;
&lt;p&gt;Please join the researchers@cis-india mailing list to take part in the pre-conference conversations: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Accommodation&lt;/h2&gt;
&lt;p&gt;CPS and CIS will provide accommodation to all non-Delhi-based team members of the selected sessions, during the days of the Conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Travel Grants&lt;/h2&gt;
&lt;p&gt;We will offer 10 travel grants, up to Rs. 10,000 each, for within-India travel. The following non-Delhi-based team members of the selected sessions have been selected for travel grants: Aakash Solanki, Dibyajyoti Ghosh, Neha Mujumdar, Purbasha Auddy, Rahmanuddin Shaik, Rashmi M, Rohini Lakshané, Sailen Routray, P.P. Sneha, and Zeenab Aneez.&lt;/p&gt;
&lt;p&gt;The travel grants are made possible by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-selected-sessions'&gt;https://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-18T09:23:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review">
    <title>The Creation of a Network for the Global South - A Literature Review</title>
    <link>https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The organization of societies and states is predicated on the development of Information Technology and has begun to enable the construction of specialized 	networks. These networks aid in the mobilization of resources on a global platform.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; There is a need for 	governance structures that embody this globalized thinking and adopt superior information technology devices to bridge gaps in the operation and 	participation of not only political functions but also economic processes and operations.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Currently, 	public institutions fall short of an optimum level of functioning simply because they lack the information, know-how and resources to respond effectively 	to this newly globalized and economically liberalized world order. Civil society is beginning to seek a greater participatory voice in both policy making 	and ideating, which require public institutions to institute a method of allowing this participation while at the same time retaining the crux of their 	functions and processes. The network society thus requires, As argued by Castells, a new methodology of social structuring, one amalgamating the analysis 	of social structure and social action within the same overarching framework.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This Network propounds itself 	as a 'dynamic, self-evolving structure, which, powered by information technology and communicating with the same digital language, can grow, and include 	all social expressions, compatible with each network's goals. Networks increase their value exponentially through their contribution to human resources, 	markets, raw materials and other such components of production and distribution.' &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted by Kevin Kelly,' 	&lt;i&gt; The Atom is the past. The symbol of science for the next century is the dynamical Net.…Whereas the Atom represents clean simplicity, the Net 		channels the messy power of complexity. The only organization capable of nonprejudiced growth or unguided learning is a network. All other topologies 		limit what can happen. A network swarm is all edges and therefore open ended any way you come at it. Indeed the network is the least structured 		organization that can be said to have any structure at all. ..In fact a plurality of truly divergent components can only remain coherent in a network. 		No other arrangement - chain, pyramid, tree, circle, hub - can contain true diversity working as a whole &lt;/i&gt; .'&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network therefore is integral to the facilitation, coordination and advocacy of different agenda within a singular framework, which seeks to formulate 	suitable responses to a wide range of problems across regions. An ideal model of a network would therefore be one that is reflective of the 	interconnectivity between relationships, strengthened by effective communication and based on a strong foundation of trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most powerful element of a network is however the idea of a common purpose. The pursuit is towards similar ends and therefore the interconnected web of 	support it offers is in realization of a singular goal,&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;II. Evolution of the Network&lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are certain norms that must be incorporated for a network to be able to work at its best. Robert Chambers, in his book,	&lt;i&gt;Whose Reality Counts? &lt;/i&gt; Identifies these norms and postulates their extension to every form of a network, in order to capture its creative spirit 	and aid in the realization of its goals.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; A network should therefore ideally foster four fundamental 	elements in order to inculcate an environment of trust, encouragement and the overall actualization of its purpose. These elements are; Diversity or the 	encouragement of a multitude of narratives from diverse sources, Dynamism or the ability of participants to retain their individual identities while 	maintaining a facilitative structure, Democracy or an equitable system of decision making to enable an efficient working of the net and finally, 	Decentralization or the feasibility of enjoying local specifics on a global platform.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to attain these ideal elements it is integral to strengthen certain aspects of the practice through performing specific and focused functions, 	these include making sure of a clear broad consensus, which ensures the co-joining of a common purpose. Additionally, centralization, in the form of an 	overarching set of rules must be kept to a minimum, in order to facilitate a greater level of flexibility while still providing the necessary support 	structure. The building of trust and solid relationships between participants is prioritized to enhance creative ideation in a supportive environment. 	Joint activities, more than being output oriented are seen as the knots that tie together the entire web of support. Input and participation are the 	foremost objectives of the network, in keeping with the understanding that "contribution brings gain". &lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significant management issues that plague networks include the practical aspects of bringing the network into function through efficient leadership and the 	consolidation of a common vision. A balanced approach would entail a common consultation on the goals of the network, the sources of funding and an agreed 	upon structure within which the network would operate. It is also important to create alliances outside of the sector of familiarity and ensure an inclusive environment for members across regions, allowing them to retain their localized individuality while affording them with a global platform.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. Structure&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The structural informality of a network is essential to its sustenance. Networks must therefore ensure that they embody a non-hierarchized structure, 	devoid of bureaucratic interferences and insulated from a centralized system of control and supervision. This requires an internal system of checks and 	balances, consisting of periodic reviews and assessments. Networks must therefore limit the powers of supervision of the secretariat. The secretariat must 	allow for the coordination of its activities and allocate appropriate areas of engagement according to the relative strength of the participating members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One form of a network structure, postulated within a particular research study is the threads, knots and Nets model.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; It consists of members within a network bound together by threads of relationship, communication and 	trust. These threads represent the commonality that binds together the participants of the particular network. The threads are established through common 	ideas and a voluntary participation in the process of communication and conflict resolution. &lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The knots represent the combined activities which the participants engage in, with the common goal of realizing a singular purpose. These knots signify an 	optimum level of activity, wherein members of the network are able to support, inspire and confer tangible benefits onto each other. The net represents the entire structure of the network, which is constructed through a confluence of relationships and common activities.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; The structure is autonomous in nature and allows participants to contribute without losing their 	individual identities. It is also dynamic and flexible; incorporating new elements with relative ease. It is therefore a collaboration which affords onto 	its members the opportunity to expand without losing its purpose. The maintenance of such a structure requires constant review and repair, with adequate 	awareness of weak links or "threads" and the capability and willingness to knot them together with new participants, thereby extending the net.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the Global Alliance for Vaccines and Immunization used a system of organizational "milestones" to monitor the progress of the network and keep 	the network concentrated. It requires a sustained institutional effort to fulfill its mandate of "the right of every child to be protected against vaccine-preventable diseases" and brings together international organizations, civil society and private industry.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; As postulated within the &lt;i&gt;Critical Choices &lt;/i&gt;research study of the United Nations, clearly defined milestones are integral to sustaining an effective support mechanism for donors and ensuring that all relevant participants are on board.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; This also allows for donors to be made aware of the tangible outcomes that have been achieved by the 	network. Interim goals that are achievable within a short span of time also afford a sense of legitimacy onto the network, allowing it to deliver on its 	mandate early on. Setting milestones would require an in depth focus and a nuanced understanding of specific aspects of larger problems and delivering 	early results on these problems would allow for a foundational base of trust, on the foundation of which, a possibly long drawn out consultative process 	can be fixed.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Network might often find alliances outside of its sector of operation. For example, Greenpeace was able to make its voice heard in International Climate 	Change negotiations by engaging with private insurance companies and enlisting their support.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; The organization looked towards the private sector for support to mobilize resources and enlist the requisite expertise within their various projects.	&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Funding&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The financial support a network receives is essential for its sustenance. The initial seed money it receives can be obtained from a single source however, 	cross sectoral financing is necessary to build a consensus with regards to issues that may be a part of the network's mandate. The World Commission for 	Dams (WCD), for example, obtains funding from multiple sources in order to retain its credibility. The sources of funding of the WCD include government 	agencies, multilateral organizations, business associations, NGO's and Government Agencies, without a single donor contributing more than 10% of the total 	funding it receives.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; However, the difficulty with this model of funding is the relative complexity in 	assimilating a number of smaller contributions, which may take away from its capacity to expand its reach and enhance the scope of its work. Cross sectoral 	funding is less of a fundamental requirement for networks whose primary mandate is implementation, such as The Global Environment Facility (GEF), whose 	legitimacy is derived from intergovernmental treaties and is therefore only funded by governments.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; The 	GEF has only recently broadened its sources of funding to include external contributions from the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network can also be funded through the objective it seeks to achieve through the course of its activities. For example, Rugmark an international 	initiative which seeks to mitigate the use of child labor in South Asia uses an external on site monitoring system to verify and provide labels certifying 	the production of carpets without the use of child labor.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; The monitors of this system are trained by 	Rugmark and carpet producers have to sign a binding agreement, undertaking not to employ children below the age of 14 in order to receive the 	certification. The funds generated from these carpets, for the import of which American and European importers pay 1% of the import value, are used to provide rehabilitation and education facilities for the children in affected areas. The use of these funds is reported regularly.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The funding must be sustained for a few years, which is a difficult task for networks that require an overall consensus of participants. The greatest 	outcomes of the network are not tangible solutions to the problem but the facilitation of an environment which allows stakeholders to derive a tangible 	solution. Thus, the elements of trust, communication and collaboration are integral to the efficient functioning of the network. However, the lack of 	tangible outcomes exposes the funders to financial risks. The best way to reduce such risks is to institute an uncompromising time limit for the 	initiative, within which it must achieve tangible results or solutions that can be implemented. A less stringent approach would be to incorporate a system 	of periodic review and assessment of the accomplishments of the network, subsequent to which further recommendations may be made for a further course of 	action.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;B. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Relationships&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A three year study conducted by Newell &amp;amp; Swan drew definitive conclusions with respect to the inter-organizational collaboration between participants 	within a network. The study determined that there currently exist three types of trust; Companion trust or the trust that exists within the goodwill and 	friendship between participants, Competence trust, wherein the competence of other participants to carry out the tasks assigned to them is agreed upon and lastly, Commitment trust or the trust which is predicated on contractual or inter-institutional that are agreed upon.	&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; While companion and competence trust are easily identifiable, commitment trust is more subjective as 	it is determined by the agreement surrounding the core values and overall identifiable aims. Sheppard &amp;amp; Tuchinsky refer to an identification based trust which is based on a collective understanding of shared values. Such a trust requires significant investment but they argue, "&lt;i&gt;The rewards are commensurably greater and the he benefits go beyond quantity, efficiency and flexibility&lt;/i&gt;."	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; Powell postulates, 	&lt;i&gt; "Trust and other forms of social capital are moral resources that operate in fundamentally different manner than physical capital. The supply of trust increases, rather than decreases, with use: indeed, trust can be depleted if not used."		&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;b&gt;[25]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Karl Wieck endorses the "&lt;i&gt;maintenance of tight control values and beliefs which allow for local adaptation within centralized systems&lt;/i&gt;."	&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The autonomy that participants within a network enjoy is therefore considered to be close to sacred, 	so as to allow them to engage with each other on an equitable footing, while still maintain their individual identities. Freedman and Reynders believe that 	networks place a so called 'premium' on " 	&lt;i&gt; the autonomy of those linked through the network…..networks provide a structure through which different groups - each with their own 		organizational styles, substantive priorities, and political strategies - can join together for common purposes that fill needs felt by each. &lt;/i&gt; "&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; Consequently, lower the level of centralized control within a network, the greater the requirement of 	trust. Allen Nan resonates with this idea, as is evident from her review of coordinating conflict resolution NGO's. She believes that these NGO's are most 	effective when " 	&lt;i&gt; beginning with a loose voluntary association which grows through relationship building, gradually building more structure and authority as it develops. 		No NGO wants to give away its authority until it trusts a networking body of people that it knows. &lt;/i&gt; " &lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;C. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Communication and Collaboration&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The binding force that ties together any network is the importance of relationships between participants and their interactions with organizations outside 	the network. Research has shown that face to face interaction works best and although email may be practical, a face-to-face meeting at regular intervals 	builds a level of trust amongst participants. &lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; It is however important to prevent network from turning 	into 'self-selecting oligarchies' and to prevent this, there needs to be a balance drawn between goodwill and the trust in others' competence along with a 	common understanding of differently hierarchized values. &lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also an impending need to develop a relationship vocabulary, as suggested by Taylor, which would be of particular use within transnational 	networks and afford a deeper understanding of cross cultural relationships.&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;D. &lt;/b&gt; &lt;b&gt;&lt;i&gt;Participation&lt;/i&gt;&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant issue that networks today have to address is how to inculcate and then subsequently maintain participation in the activities of the network. 	This would include providing incentives to participants, encouraging diversity and enabling greater creative inflow across sectors to generate innovative 	output. Participation involves three fundamental elements; Action, which includes active contribution in the form of talking, listening, commenting, 	responding and sharing information, Process, which aids in an equitable system of decision making and constructing relationships and the underpinned values associated with these two elements, which include spreading equality, inculcating openness and including previously excluded communities or individuals.	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; Participation in itself envisages a three leveled definition; participation as a contribution, where 	people offer a tangible input, participation as an organization process, where people organize themselves to influence certain pre-existing processes and 	participation as a form of empowerment where people seek to gain power and authority from participating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to create an autonomous system of evaluating and monitoring the nature and context of participation, a network would have to attempt to 	systematically incorporate a few fundamental processes, such as; enabling an understanding of the dynamism of a network through an established criteria of 	monitoring the levels of participation of the members, creating an explicit checklist of qualifications of this participation, such as the contributions of 	the participants, the limits of commitment and the available resources that must be shared and distributed, acknowledging the importance of relationships 	as fundamental to the success of any network., building a capacity for facilitative and shared leadership, tracing the changes that occur when the advocacy 	and lobbying activities of individuals are linked and using these individuals as participants who have the power to influence policy and development at 	various levels.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; Finally, the recognition that utilizing the combined faculties of the network would aid 	in the effectuation of further change is vital to sustaining an active participation in the network.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt; It 	is common for networks to stagnate simply because of the lack of clarity on what a network really is or what it entails. There are significant 	misconceptions as to the activities engaged in by the network, such as the idea that a network "works solely as a resource center, to provide information, 	material and papers, rather than as forums for two way exchanges of information and experiences," contribute to the misunderstanding regarding the 	participation requirements within a network.&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; To facilitate an active, participatory function of 	learning, a network needs to be more than a resource center that seeks to meet the needs of beneficiaries. While meeting these needs is essential, development projects tend to obfuscate the benefit/input relationship within a network, thus significantly depleting its dynamism quotient.	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One method of moving away from the needs based model is to create a tripartite functionary, as was created within a particular research study.	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt; This involves A Contributions Assessment, A Weaver's Triangle for Networks and An identification of 	channels of participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contributions Assessment is an analysis of what the participants within a network are willing to contribute. It enables the network to assess what resources it has access to and how those resources may be distributes amongst the participants, multiplied or exchanged.	&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt; This system is predicated on a premise of assessing what participants have to offer as opposed to what 	they need. It challenges the long held notion of requiring an evaluation to identify problems, to address which recommendations are made and in fact seeks to focus on the moments of excellence and enable a discussion on the factors that contributed to these moments.	&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; It thus places a value on the best of "what is" as opposed to trying to find a plausible "what ought 	to be". This approach allows participants to recognize that they are in fact the real "resource Centre" of the network and are encouraged act accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Contributions Assessment may be practically incorporated through a few steps. It must be focused on the contributions, after a discussion on who the 	contributors may be. The aims of the network must be clarified, along with a specification of the contributions required such as perhaps newsletters, a 	conference, policy analysis etc. The members of the network must be clear on what they would like to contribute to the network and how such contribution 	might be delivered. Finally, the secretariat must be able to ideate or innovate on how it can enable more contributions from the networks in a more 	effective manner. &lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Weaver's Triangle has been adapted to be applies within networks and enables participants to understand what the aims and activities of the network 	are. It identifies the overall aim of the network and the change the network seeks to bring about to the status quo. It then lays out the objectives of the 	network in the form of specific statements about the said differences that the network seeks to bring about. Finally, the network would have to explain why 	a particular activity has been chosen. &lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; The base of the triangle reflects the specific activities that 	the network seeks to engage in to achieve the said objectives. The triangle is further divided into two, to ensure that action aims and process aims have equal weightage; this allows for the facilitation of an exchange and a connection between the members of the network.	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Circles of Participation is an idea that has been put forth by the Latin American and Caribbean Women's Health Network. (LACWHN).	&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; This Network has three differentiated categories of membership, which it uses to determine the degree 	of commitment of an organization to the network. R- refers to the members who receive the women's health journal, P refers to members who actively 	participate in events and campaigns and who are advisors for specific topics. PP refers to the permanent participants within the network at national and 	international levels. They also receive a journal. This categorization allows the network to make an assessment of the dynamism and growth of a network, 	with members moving through the categories depending on their levels of participation. &lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important space for contributions to the network is the newsletter. This can be facilitated by allowing contributions from various sources, provided 	they meet the established quality checks, ensuring a balance between regions of origin of the members of the network, ensuring a balance between the policy 	and program activities of the members and keeping the centralized editorial process to a minimum. This is in keeping with the ideal of a decentralized 	system of expression that allows each member to retain its individuality while still contributing to the aims of the network. The Women's Global Network on 	Reproductive Rights (WGNRR) sought to create a similar system of publication to measure the success of their linkages, the levels of empowerment amongst members, in terms of strategizing and enabling localized action and the allocation of space in a fair and equitable manner.	&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; Another Network, Creative Exchange customizes its information flow within the network so that each 	member only receives the information it expresses interest in.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt; This prevents the overburdening of 	members with unnecessary information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The activities of the network which don't directly pass through the secretariat or the coordinator of the network can be monitored efficiently by keeping I 	close contact with new entrants to the network and capturing the essence of the activities that occur on the fringes of the network. This would allow an 	assessment of the diversity of the network. For example, Creative exchange sends out short follow up emails to determine the number and nature of contacts 	that have been made subsequent to a particular item in the newsletter. The UK Conflict Development and Peace Network (CODEP) records the newest subscribers 	to the network after every issue of their newsletter and AB Colombia sends out weekly news summaries electronically which are available for free to recipients who provide details of their professional engagements and why or how they wish to use these summaries.	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; This enables the mapping of the type of recipients the information reaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;E. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Leadership and Coordination&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sarason and Lorentz postulate four distinguishing characteristics that capture the creativity and expertise required by individuals leading and 	coordinating networks.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; Knowledge of the territory or a broad understanding of the type of members, the 	resources available and the needs of the members is extremely important to facilitate an ideal environment of mutual trust and open dialogue between the 	members. Scanning the network for fluidity and assessing openings, making connections and innovating solutions would enable an efficient leadership that 	would contribute to the overall dynamism of the network. In addition to this, perceiving strengths and building on assets of existing resources would allow 	the network to capitalize on its strengths. Finally, the coordinators of a network must be a resource to all members of the network and thus enable them to 	create better and more efficient systems. They must therefore exercise their personal influence over members wherever required for the overall benefit of 	the network. Practically, a beneficial leadership would also require an inventive approach by providing fresh and interesting solutions to immediate 	problems. A sense of clarity, transparency and accountability would also encourage members of the network to participate more and engage with each other. 	It is important for the leadership within a network to deliver on expectations, while building consensus amongst its members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shared objective, a collaborative setting and a constant review of strategies is important to maintain linkages within a network. Responsible 	relationships underpinned by values and supported by flows of relevant information would allow an effective and fruitful analysis by those who are engaged 	within a network to do the relevant work. In addition to this, a respect for the autonomy of the network is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;F. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Inclusion&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public policy networks are more often than not saturated with the economic and social elite from across the developed world. A network across the Global 	South would have to change this norm and extend its ambit of membership to grass root organizations, which might not have otherwise had the resources or 	the opportunity to be a part of a network.&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; Networks can achieve their long term goals only if they are 	driven by the willingness to include organizations from across economic demographics. This would ensure that their output is the result of a collaborative 	process that takes into account cross cultural norms and differentials across economic demographics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participation of diverse actors is reflective of the policy making processing having given due regard to on the ground realities and being sensitive 	towards the concerns of differently placed interest groups. Networks have been accused of catering only to the needs of industrial countries and 	subscribing to values of the global north thus stunting local development and enforcing double standards. This tarnishes the legitimacy of the processes 	inculcated within the network itself. It is therefore all the more essential that a network focused on the global south have a diverse collection of 	members from across backgrounds and economic contexts. Additionally, the accountability of the network to civil society is dependent on the nature of the 	links it maintains with the public. Inclusion thus fosters a sense of legitimacy and accountability. The inclusion of local institutions from the beginning 	would also increase the chances of the solutions provided by the network, being effectively implemented. Local inclusion affords a sense of responsibility 	and ensures that the network would remain sustainable in the long run. Allowing local stakeholders to take ownership of the network and participate in the formulation of policies, engage in planning and facilitate participation would enable an efficient addressing of significant public policy issues.	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt; Thus networks would need to create avenues for participation of local institutions and civil society 	to engage in a democratic form of decision making.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. Evaluation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The process of evaluation of a network is most efficiently effectuated through a checklist that has been formulated within a research study for the purpose 	of evaluating its own network. &lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This checklist enumerates the various elements that have to be taken into consideration while evaluating the success of a network, as follows;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FIG 1.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;What is a network?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;'Networks are energising and depend crucially on the motivation of members'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Networks for Development, 2000:35)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition is one that is broadly shared across the literature, although it is more detailed than some.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network has:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A common purpose  derived from shared perceived need for action&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clear objectives  and focus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A non-hierarchical  structure&lt;/li&gt;
&lt;/ul&gt;
A network encourages  
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Voluntary participation  and commitment&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The input  of resources by members for benefit of all&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;A network provides&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Benefit  derived from participation and linking&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;What does a network do?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Facilitate shared space for exchange, learning, development - the capacity-building aspect&lt;/li&gt;
&lt;li&gt;Act for change in areas where none of members is working in systematic way - the advocacy, lobbying and campaigning aspect&lt;/li&gt;
&lt;li&gt;Include a range of stakeholders - the diversity/ broad-reach aspect&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;What are the guiding principles and values?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Collaborative action&lt;/li&gt;
&lt;li&gt;Respect for diversity&lt;/li&gt;
&lt;li&gt;Enabling marginalised voices to be heard&lt;/li&gt;
&lt;li&gt;Acknowledgement of power differences, and commitment to equality&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;How do we do what we do, in accordance with our principles and values?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Participation&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Knowing the membership, what each can put in, and what each seeks to gain&lt;/li&gt;
&lt;li&gt;Valuing what people can put in&lt;/li&gt;
&lt;li&gt;Making it possible for them to do so&lt;/li&gt;
&lt;li&gt;Seeking commitment to a minimum contribution&lt;/li&gt;
&lt;li&gt;Ensuring membership is appropriate to the purpose and tasks&lt;/li&gt;
&lt;li&gt;Encouraging members to be realistic about what they can give&lt;/li&gt;
&lt;li&gt;Ensuring access to decision-making and opportunities to reflect on achievements&lt;/li&gt;
&lt;li&gt;Keeping internal structural and governance requirements to a necessary minimum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Relationships and Trust&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Spending time on members getting to know each other, especially face-to-face&lt;/li&gt;
&lt;li&gt;Coordination point/secretariat has relationship-building as vital part of work&lt;/li&gt;
&lt;li&gt;Members/secretariat build relations with others outside network - strategic individuals and institutions&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitative Leadership (may be one person, or rotating, or a team)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Emphasis on quality of input rather than control&lt;/li&gt;
&lt;li&gt;Knowledgeable about issues, context and opportunities,&lt;/li&gt;
&lt;li&gt;Enabling members to contribute and participate&lt;/li&gt;
&lt;li&gt;Defining a vision and articulating aims&lt;/li&gt;
&lt;li&gt;Balancing the creation of forward momentum and action, with generating consensus&lt;/li&gt;
&lt;li&gt;Understanding the dynamics of conflict and how to transform relations&lt;/li&gt;
&lt;li&gt;Promoting regular monitoring and participatory evaluation&lt;/li&gt;
&lt;li&gt;Have the minimum structure and rules necessary to do the  work. Ensure governance is light, not strangling.Give members space to  be dynamic&lt;/li&gt;
&lt;li&gt;Encourage all those who can make a contribution to the overall goal to do so, even if it is small.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Working toward decentralised and democratic governance&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;At the centre, make only the decisions that are vital to continued functioning. Push decision-making outwards.&lt;/li&gt;
&lt;li&gt;Ensure that those with least resources and power have the opportunity to participate in a meaningful way.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building Capacity&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Encourage all to share the expertise they have to offer. Seek out additional expertise that is missing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;What are the evaluation questions that we can ask about these generic qualities? How do each contribute to the achievement of your aims and objectives?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the differing levels or layers of participation across the network?&lt;/li&gt;
&lt;li&gt;Are people participating as much as they are able to and would like?&lt;/li&gt;
&lt;li&gt;Is the membership still appropriate to the work of the network? Purpose and membership may have evolved over time&lt;/li&gt;
&lt;li&gt;Are opportunities provided for participation in decision-making and reflection?&lt;/li&gt;
&lt;li&gt;What are the obstacles to participation that the network can do something about?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Trust&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the level of trust between members? Between members and secretariat?&lt;/li&gt;
&lt;li&gt;What is the level of trust between non-governing and governing members?&lt;/li&gt;
&lt;li&gt;How do members perceive levels of trust to have changed over time?&lt;/li&gt;
&lt;li&gt;How does this differ in relation to different issues?&lt;/li&gt;
&lt;li&gt;What mechanisms are in place to enable trust to flourish? How might these be strengthened?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Leadership&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Where is leadership located?&lt;/li&gt;
&lt;li&gt;Is there a good balance between consensus-building and action?&lt;/li&gt;
&lt;li&gt;Is there sufficient knowledge and analytical skill for the task?&lt;/li&gt;
&lt;li&gt;What kind of mechanism is in place to facilitate the resolution of conflicts?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Structure and control&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How is the structure felt and experienced? Too loose, too tight, facilitating, strangling?&lt;/li&gt;
&lt;li&gt;Is the structure appropriate for the work of the network?&lt;/li&gt;
&lt;li&gt;How much decision-making goes on?&lt;/li&gt;
&lt;li&gt;Where are most decisions taken? Locally, centrally, not taken?&lt;/li&gt;
&lt;li&gt;How easy is it for change in the structure to take place?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diversity and dynamism&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How easy is it for members to contribute their ideas and follow-through on them?&lt;/li&gt;
&lt;li&gt;If you map the scope of the network through the membership, how far does it reach? Is this as broad as&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;intended? Is it too broad for the work you are trying to do?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Democracy&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the power relationships within the network? How do the powerful and less powerful interrelate? Who sets the objectives, has access to the resources, participates in the governance?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Factors to bear in mind when assessing sustainability&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Change in key actors, internally or externally; succession planning is vital for those in central roles&lt;/li&gt;
&lt;li&gt;Achievement of lobbying targets or significant change in context leading to natural decline in energy;&lt;/li&gt;
&lt;li&gt;Burn out and declining sense of added value of network over and above every-day work.&lt;/li&gt;
&lt;li&gt;Membership in networks tends to be fluid. A small core  group can be a worry if it does not change and renew itself over time,  but snapshots of 			moments in a network's life can be misleading. In a  flexible, responsive environment members will fade in and out depending  on the 'fit' with their 			own priorities. Such changes may indicate  dynamism rather than lack of focus.&lt;/li&gt;
&lt;li&gt;Decision-making and participation will be affected by  the priorities and decision-making processes of members' own  organisations.&lt;/li&gt;
&lt;li&gt;Over-reaching, or generating unrealistic expectations may drive people away&lt;/li&gt;
&lt;li&gt;Asking same core people to do more may diminish reach, reduce diversity and encourage burn-out&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;b&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;V. Learning and Recommendations&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to facilitate the optimum working of a network several factors need to be taken into consideration and certain specific processes have to be 	incorporated into the regular functioning of the network. These are for example,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Ensuring that the evaluation of the network occurs at periodic intervals with the requisite level of attention to detail and efficiency to enable an 	in depth recalibration of the functions and processes of the network. To this effect, evaluation specialists must be engaged not just at times of crises or 	instability but as accompaniments to the various processes undertaken by the network. This would enable a holistic development of the network.&lt;/li&gt;
&lt;li&gt;It is also important to understand the underlying values that define the unique nature of the network. The coordination of the network, its 	functions and its activities are intrinsically linked to these values and recognition of this element of the network would enable a greater functionality 	in the overall operation of the network.&lt;/li&gt;
&lt;li&gt;A strong relationship between the members of the network, predicated on trust and open dialogue is essential for its efficient functioning. This 	would allow the accumulation of innovative ideas and dynamic thought to direct the future activities of the network.&lt;/li&gt;
&lt;li&gt;The Secretariat or coordinator of the network must be able to engage the member in monitoring and evaluating the progress of the network. One method 	of enabling this coordination is through the institution of 'participant observer' methods at international conferences or meetings, which allow the 	members of the network to report back on the work that they have, which is linked to the work of other members.&lt;/li&gt;
&lt;li&gt;The autonomy of a network and its decentralized mechanism of functioning are integral to retain the individuality of its members, who seek to pursue 	institutional objectives. The members seek to facilitate creative thinking and share ideas and this must be supported by financial resources. A strong bond 	of trust between the members of a network is therefore essential to enable long term commitments and the flourishing of interpersonal communication between 	members.&lt;/li&gt;
&lt;li&gt;It is important that the subject area of operation of the network be comprehensively defined before the network comes into existence.&lt;/li&gt;
&lt;li&gt;As seen with the experience of Canadian Knowledge Networks, it is beneficial to be selective in inviting participant to the network and following a 	rigorous process of review and selection would ensure that only the best candidates are selected so as to facilitate effective partnerships with other 	networks, as a result of demonstrable expertise within a particular field.&lt;/li&gt;
&lt;li&gt;The management of a network must be disciplined, with clearly demarcated project deadlines and an optimum level of transparency and accountability. 	At the helm of leadership of every successful network, there has been intelligent, decisive and facilitative exchange, which is essential in securing a 	durable and potentially expandable space for the network to operate in.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Canadian Perspectives&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study of Canadian experiences was conducted by examining The Centers of Excellence and the Networks of Centers of Excellence (NCEs), which were funded 	through three Federal Granting Councils.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt; An initial observation that was made through the course of 	this study was that each network is intrinsically different and there is no uniform description which would fit all of them. The objectives of the Networks 	of Centers of Excellence Program are broadly, as follows; to encourage fundamental and applied research in fields which are critical to the economic 	development of Canada, to encourage the development and retention of world class scientists and engineers specializing in essential technologies, to manage 	multidisciplinary, cross sectoral national research programs which integrate stakeholder priorities through established partnerships and finally, to accelerate the exchange of research results within networks by accelerating technology transfers, made to users for social and economic development.	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt; Extensive interviews carried out in the course of the research conducted by the ARA Consulting Group 	Inc. drew up particularly relevant conclusions with respect to the NCEs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, they have been able to produce significant "cultural shifts" among the researchers associated with the network. This is attributed to the network 	facilitating a collaborative effort amongst researchers as opposed to their previous working, which was largely in isolation. The benefits of this 	collaboration have been identified as providing innovative ideas and leading the research itself in unprecedented directions. This has the effect of 	equipping Canada with the capability to compete on a global level with respect to its research endeavors. The culture shift has also allowed researchers to 	be more aware of the problems that plague industry and has instigated more in depth research into the development of the industrial sector. Government 	initiatives that have attempted to cohesively apply academic research to industry have had limited success. The NCE's however have managed to successfully 	disintegrate the barriers between these two seemingly disparate fields. This has resulted in a faster and more effective system of knowledge dissemination 	resulting in durable and self-sustaining economic development, which takes place at a faster rate. The NCE's have also been able to contribute to 	healthcare, wellness and overall sustainable development through their cross sectoral research approach, a model that can be used worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another tangible effect has been that the relationship between industry and academic research is evolving into a positive and collaborative exchange, as 	opposed to the previous state which was largely isolationist, bordering on confrontational.&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; A possible 	cause of this is the increased representation of companies in the establishment of networks resulting in them influencing the course of research. This has not been met with any resistance from academic researchers who are driven by the imperative of an open publication.	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; Besides influencing the style of management, industrial representation has also brought about an 	increase in the level of private sector financial contributions made to NCEs. It is believed that these NCEs may even be able to support themselves in the 	next 7-8 years through the funding they receive from the commercialization of their research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A third benefit that has emerged is the faster rate of production of new knowledge and innovative thinking. This is the result of collaborative techniques 	which is made more efficient through the use of modern technology. The increasing number of multi authored cross institutional scholarly publications made 	available by the NCE is evidentiary of this trend. The rate and quantity of technology transfers has also increased exponentially as a result of this. 	Knowledge networks also facilitate the mobilization of human resources and address cross disciplinary problems, resulting in an efficient and synergistic 	solutions. Their low cost, fast pace approach has been instrumental in constructing an understanding of and capacity to engage in sustainable development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The significant contributions to sustainable development include the Canadian Genetic Diseases Network, which has discovered two specific genes that cause 	early onset Alzheimer's disease. The Sustainable Forest Management Network has claimed that its research does have a considerable level of influence on the 	industrial approach to sustainability. The Canadian Bacterial Disease Network conducts research on bacterially caused diseases which are mostly prevalent 	in developing countries, with a view to produce antibiotics and vaccines that may be able to successfully combat these vaccines. TeleLearning, another such network is working on the creation of software environments which will form the basis of technology based education in the future.	&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt; The greatest advantage of these knowledge networks is that they have been able to surpass traditional 	disciplinary barriers and have emerged at the forefront of interdisciplinary articulation, which is emerging as the path to breakthroughs in the fields of 	applied sciences and technology in the future. The NCE's have also been able to provide diverse working environments for graduate students, where they have 	been able to work under scientists associated with different specializations and across different departments. They have also been able to interact with 	government and industry representatives, giving them a far greater exposure of the field and equipping them to avail of a wide range of employment 	opportunities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corporate style of management incorporated within the NCEs encourages a sense of discipline and an enthusiasm for innovation. The Board of Directors at 	NCE's take on a perfunctory role and function as a typical corporate board. Researchers are therefore required to provide regular reports and meet 	deadlines to achieve predetermined goals that have been agreed upon. The new paradigm of sustainable development and the fluid transfer of knowledge 	requires this structure of management, even within a previously strictly academically oriented environment. NCEs have been incorporated as non-profit 	corporation for largely legal reasons such as the ownership of intellectual property.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participation to these networks is restricted and is open only through an invitation, in the form of a submission of project proposals under a 	particular theme, with the final selection being made subject to a rigorous process of evaluation. This encourages the participants of the network to 	embody a degree of discipline and carry out their activities in a constructive, time bound manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B. &lt;/b&gt; &lt;b&gt;&lt;i&gt;Perceived Challenges&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These knowledge networks, although extremely beneficial in the long run, do have certain specific issues that need to be addressed. Firstly, most formal 	knowledge networks do not have a formalized communication strategy. While they do make use of various forms of telecommunication, this communication is is 	no way formally directed or specific. Although some networks have managed to set up a directed communications strategy, supplemented by the involvement of 	specifically communications based networks (such as CANARIE) , there is still a long way to go in this area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As is evident with most academic endeavors in recent years, efficient and sustained development both in terms of economy as well as self-sustenance, 	requires a smooth transitioning to a close collaboration with the industry. Although the NCE's have made progress in this area, a lesson that can be learnt from this is that knowledge networks do require a collaborative arrangement between researchers, the industry and the financial sector.	&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; The nature of this collaboration cannot be predicted before tangible research outputs are developed 	that reflect the relevance of academia in the industrial and financial sectors. A particular network, PENCE has mandated that the boards of directors 	include a representative of the financial sector. This is a step forward in opening the doors to greater collaboration and mutually assured growth and 	sustainable development in both academia as well as the industrial and financial sectors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As with all knowledge networks there is a continuous need for expansion of the focus areas to cover more fields and instigate research in neglected areas. 	The largest number of networks has been in the fields of healthcare and health associated work. However there is an impending need for networks to be established in other fields as well, such as those related to environmental issues, social dynamics and the general quality of life.	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Canadian experience has resulted in a nuanced understanding of specific actions that need to be taken to strengthen knowledge networks across the 	spectrum. Firstly, there is an impending need to build new knowledge networks, which would be required to strengthen institutions upon which the networks 	are based. These include universities and research institutions, which have been weakened both financially and academically over the past few years. The 	NCE Program, on the face of it, seems to be strengthening universities, by attracting funding for research endeavors that would otherwise not be available 	to them. While this may be true, it tends to obfuscate the true nature of a university as an intellectual community, by portraying it as a funding source 	for research and equipment.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt; The deteriorating role of the university in fostering research and laying 	the foundation of an intellectual community can be reversed by the competition posed by the NCEs which tend to threaten its stature in the fields of 	multi-disciplinary and graduate institution. Another aspect that needs to be considered is the role of knowledge networks in fostering sustainable 	development not only on a national or regional scale but on a global level. This can be effectuated by allowing the amalgamation of the academia and 	industry through ample representation, a model that has proven to be effective within the NCEs. This is all the more relevant today where multinational 	corporations hold considerable sway over the global economy, so much so that the role of governments in regulating this economy is gradually decreasing. 	Multilateral investment treaties and agreements are reflective of this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final issue is that of the long standing debate between public good and proprietary knowledge. Canadian knowledge networks are of the opinion that 	knowledge must be freely disseminated. However, certain networks including the NCEs grant the exclusive right of the development and application of this 	knowledge to specific industry affiliates. On one hand this facilitates further investment into the research, which creates better products, new jobs and 	further social development. This is predicated on a fine balance of allowing this development without widening the already disparate socio-economic gaps 	that exist between developed and developing countries. Thus the balance between public good and propriety knowledge must be effectively managed by the regulatory role discharged by the governments and the decision making faculties of these knowledge networks.	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Establishing international linkages across networks based within different regions across the world would also be an effective means of ensuring effective 	partnerships and the creation of a new, self-sustaining structure. This would bring new prospects of funding into sustainable development activities and 	engage industrial affiliates with international development activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;C. &lt;/i&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;Donor Perspectives&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Development Research Centre, based in Canada has also been instrumental in the setting up of support structures for networks. The IDRC 	has remained consistent in its emphasis of networks as mechanisms of linking scientists engaged in similar problems across the globe instead of as 	mechanisms to fund research in countries. This has afforded the IDRC with a greater level of flexibility in responding to the needs of developing countries 	as well as responding to the financial pressures within Canada to deliver superior technical support with a reduction in overheads. The IDRC sees 	networking an indispensable aspect of scientific pursuit and technological adaptation in the most effective manner. It is currently supporting four 	specific types of networks; horizontal networks which link together institutions with similar areas of specialization, vertical networks which work on 	disparate aspects of the same problem of different but interrelated problems, information networks which provide a centralized form of information service 	to members, which enables them to exchange information in the manner necessary and finally training networks which provide supervisory services to 	independent participants within the network.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(I) &lt;/b&gt; &lt;b&gt;Internal Evaluations&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an outstanding need to monitor visits that are undertaken by the coordinator or the specific representatives of the member or donor as applicable. 	This would expedite the process of identifying problems and aid in deriving tangible solutions in an efficient manner. The criteria for the assessment 	would vary depending on the goals of the organization. Donors may pose questions with respect to the cost effectiveness of a particular pattern of research 	and may seek a formal report regarding this aspect. A more extensive model of donor evaluations may even include assessments with respect to the monitoring 	and coordination of specific functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(II) &lt;/b&gt; &lt;b&gt;External Evaluations &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A system of external evaluation would be useful with assessing data with respect to the operations of programs and their objectives. This would engage 	newer participants by injecting newer ideas and insights into the management and scope of the network. The most extensive method of network evaluation was one that was postulated by Valverde &lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; and reviewed by Faris	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;. It aimed to draw an analysis of particular constraints and specific elements that would influence the 	execution of network programs. This method identifies a list of threats, opportunities, strengths and weaknesses which would inform future recommendations. 	The Valverde method makes use of both formal as well as informal data which is varied depending on the type of network and the management structure it 	employs.&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(III) &lt;/b&gt; &lt;b&gt;Financial Viability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A network almost always requires external resources to aid in the setting up and coordination of its activities. Donor agencies must recognize the long 	term commitment that is required in this respect. It is therefore essential that the period for which this funding will be made available be clarified at the outset, to leave agencies with ample time to plan for the possibility of cessation of external financial support.	&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt; As concluded from the findings of the research study, although most networks are offered external 	support, it is primarily technology transfer and information networks that have been able to generate the bulk of funding in this respect. They have been able to obtain this financial assistance from a variety of sources including participating organizations as well as governments.	&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt; The funding for purely research networks however are inconsistent and the networks would have to plan 	in advance for a possible cessation of financial support.&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(IV) &lt;/b&gt; &lt;b&gt;Adaptability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the perspective of donors, the degree of adaptability and level of responsiveness of a particular network is especially relevant in assessing the 	coordination, control and leadership of a particular network. A network that is plagued by ineffective leadership and the lack of coordination is unable to 	adapt to changing circumstances and meet the needs of its participants. A combination of collaborative effort, a localized approach and far-sighted 	leadership instills in the participants of the network a sense of comfort in its processes and in the donors a faith in its ability to address topical 	issues and remain relevant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(V) &lt;/b&gt; &lt;b&gt;The Exchange of Information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted by Akhtar, a network is created to respond to the growing need to improve channels of information exchange and communication.	&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt; Information needs to be tailored to suit its users and must be disseminated accordingly. The study 	conducted has concluded that information networks that are engaged in the transfer of technology are inefficient in disseminating internally derived 	information and recognizing the needs of their users.&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt; Given that these networks are especially user 	oriented this systemic failure is extremely problematic. There is also a need to review the mechanism of transferring strategic research techniques and the 	approaches employed in dealing with developing countries. Special attention must be paid to the beneficiaries of a particular network so that the research 	conducted is directed towards that particular demographic. This is especially relevant for information networks, which from the evaluation; appear to be 	generating data but not considering who would be using these services.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(VI) &lt;/b&gt; &lt;b&gt;Capacity Building&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitating the training of individuals both on a formal and informal level has led to an enhance level of research and reporting, as well as the 	designing of projects. There is however a need to tailor this training to suit the needs of the participants of a particular network. Networks which have been able to provide inputs which are not ordinarily locally provided have instigated the establishment of national and regional institutions.	&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(VII) &lt;/b&gt; &lt;b&gt;Cost Effectiveness&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note however that networks need to employ the most cost effective mechanism of delivering support services to national programs. A 	network must work in a manner that allows for enough individual enterprise but at the same time follows a collaborative model to generate more effective 	and relevant research within a short span of time and through the utilization of minimum resources. The Caribbean Technology Consultation Services (CTCS) for example was found to be far more cost effective and in fact 50% cheaper than the services of the United Nations Industrial Development Organization.	&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt; Similarly, the evaluators of the LAAN found that funding a network was significantly cheaper than 	finding individual research projects.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Castells, Manuel (2000) "Toward a Sociology of the Network Society" &lt;i&gt;Contemporary Sociology&lt;/i&gt;, Vol&lt;/p&gt;
&lt;p&gt;29 (5) p693-699&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Reinicke, Wolfgang H &amp;amp; Francis Deng, &lt;i&gt;et al &lt;/i&gt;(2000) &lt;i&gt;Critical Choices: The United Nations, Networks&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;and the Future of Global Governance &lt;/i&gt; IDRC, Ottawa&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; ., n.1, p.697&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n.1, p.61&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Chambers, Robert (1997) &lt;i&gt;Whose Reality Counts? Putting the First Last &lt;/i&gt;Intermediate Technology&lt;/p&gt;
&lt;p&gt;Publications, London&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Chisholm, Rupert. F (1998) &lt;i&gt;Developing Network Organizations: Learning from Practice and Theory&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Addison Wesley&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Brown, L. David. 1993. "Development Bridging Organizations and Strategic&lt;/p&gt;
&lt;p&gt;Management for Social Change." &lt;i&gt;Advances in Strategic Management &lt;/i&gt;9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Madeline Church et al, Participation, Relationships and Dynamic change: New Thinking On Evaluating The Work Of International Networks Development 			Planning Unit, University College London (2002), p. 16&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Reinicke, Wolfgang H &amp;amp; Francis Deng, &lt;i&gt;et al &lt;/i&gt;(2000) &lt;i&gt;Critical Choices: The United Nations, Networks&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;and the Future of Global Governance &lt;/i&gt; IDRC, Ottawa, p.61&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n.13, p. 65&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 63&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 64&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Newell, Sue &amp;amp; Jacky Swan (2000) "Trust and Inter-organizational Networking" in &lt;i&gt;Human Relations&lt;/i&gt;,&lt;/p&gt;
&lt;p&gt;Vol 53 (10)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Sheppard, Blair H &amp;amp; Marla Tuchinsky (1996) "Micro-OB and the Network Organisation" in Kramer, R.&lt;/p&gt;
&lt;p&gt;And Tyler T. (eds) &lt;i&gt;Trust in Organisations&lt;/i&gt;, Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Powell, Walter W (1996) "Trust-based forms of governance" in Kramer, R. And Tyler T. (eds) &lt;i&gt;Trust in&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Organisations&lt;/i&gt; , Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Stern, Elliot (2001) "Evaluating Partnerships: Developing a Theory Based Framework", Paper for&lt;/p&gt;
&lt;p&gt;European Evaluation Society Conference 2001, Tavistock Institute&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Freedman, Lynn &amp;amp; Jan Reynders (1999) &lt;i&gt;Developing New Criteria for Evaluating Networks &lt;/i&gt;in Karl, M.&lt;/p&gt;
&lt;p&gt;(ed&lt;i&gt;) Measuring the Immeasurable: Planning Monitoring and Evaluation of Networks&lt;/i&gt;, WFS&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Allen Nan, Susan (1999) "Effective Networking for Conflict Transformation&lt;i&gt;" &lt;/i&gt;Draft Paper for&lt;/p&gt;
&lt;p&gt;International Alert./UNHCR Working Group on Conflict Management and Prevention&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 20&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Taylor, James, (2000) "So Now They Are Going To Measure Empowerment!", paper for INTRAC 4th&lt;/p&gt;
&lt;p&gt;International Workshop on the Evaluation of Social Development, Oxford, April&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Karl, Marilee (2000) &lt;i&gt;Monitoring And Evaluating Stakeholder Participation In Agriculture And Rural&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Development Projects: A Literature Review, &lt;/i&gt; FAO&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p.25&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 26&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p.27&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Ludema, James D, David L Cooperrider &amp;amp; Frank J Barrett (2001) "Appreciative Inquiry: the Power of&lt;/p&gt;
&lt;p&gt;the Unconditional Positive Question" in Reason, P. &amp;amp; Bradbury, H. (eds) &lt;i&gt;Handbook of Action&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Research&lt;/i&gt; , Sage&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 29&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Sida (2000) &lt;i&gt;Webs Women Weave, &lt;/i&gt;Sweden, 131-135&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Dutting, Gisela &amp;amp; Martha de la Fuente (1999) "Contextualising our Experiences: Monitoring and&lt;/p&gt;
&lt;p&gt;Evaluation in the Women's Global Network for Reproductive Rights" in Karl, M. (ed&lt;i&gt;) Measuring the&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Immeasurable: Planning Monitoring and Evaluation of Networks&lt;/i&gt; , WFS&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 30&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 10, p. 32&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Allen Nan, Susan (1999) "Effective Networking for Conflict Transformation&lt;i&gt;" &lt;/i&gt;Draft Paper for&lt;/p&gt;
&lt;p&gt;International Alert./UNHCR Working Group on Conflict Management and Prevention&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, p. 67&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 13, 68&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n 10, 36&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; See Madeline Church et al, Participation, Relationships and Dynamic change: New Thinking On Evaluating The Work Of International Networks 			Development Planning Unit, University College London (2002), p. 36-37&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; The three granting councils are: the Natural Sciences and Engineering Research Council (NSERC),&lt;/p&gt;
&lt;p&gt;the Social Sciences and Humanities Research Council (SSHRC), and the Medical Research Council&lt;/p&gt;
&lt;p&gt;(MRC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Howard C. Clark, Formal Knowledge Networks: A Study of Canadian Experiences, International Institute for Sustainable Development 1998, p. 16&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Ibid, p. 18&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Ibid, p. 18&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Ibid, p. 19&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Ibid , p 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Ibid , p. 22&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Ibid, p. 31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Terry Smutylo and Saidou Koala, Research Networks: Evolution and Evaluation from a Donor's Perspective, p. 232&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Valverde, C. 1988, Agricultural research networking : Development and evaluation, International Services for National Agricultural Research, The 			Hague, Netherlands. Staff Notes (18-26 November 1988)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Faris, D.G 1991, Agricultural research networks as development tools: Views of a network coordinator, IDRC, Ottawa, Canada, and International Crops 			Research Institute for the Semi-Arid Tropic, Patancheru, Andhra Pradesh, India&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; n. 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Terry Smutylo and Saidou Koala, Research Networks: Evolution and Evaluation from a Donor's Perspective, p. 233&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; Akhtar, S. 1990. Regional Information Networks : Some Lessons from Latin America. &lt;i&gt;Information Development&lt;/i&gt; 6 (1) : 35-42&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Ibid, p. 242&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Ibid, p. 242&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; Ibid., p. 243&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Stanley, J.L and Elwela, S.S.B 1988, Evaluation report for the Caribbean Technology Consultancy Services (CTCS), CTCS Network Project (1985-1988) 			IDRC Ottawa, Canada&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; Moreau,L. 1991, Evaluation of Latin American Aqualculture Network. IDRC, Ottawa, Canada&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review'&gt;https://cis-india.org/internet-governance/blog/the-creation-of-a-network-for-the-global-south-a-literature-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-04T13:13:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/approaching-open-research-via-open-data-2015">
    <title>Approaching Open Research via Open Data - Presentation at TERI, December 22, 2015</title>
    <link>https://cis-india.org/openness/approaching-open-research-via-open-data-2015</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, organised a seminar on 'Open Access in Research Area: A Strategic Approach' on December 22, 2015. We supported the seminar as a knowledge partner. Sumandro Chattapadhyay was invited to deliver a special address. Here are the notes and slides from the presentation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The brief presentation foregrounded &lt;em&gt;open data&lt;/em&gt; as a crucial part of open research, and also as an instrument of opening up research for public consumption, discussion, and scrutiny.&lt;/p&gt;
&lt;p&gt;The presentation started with reference to the &lt;a href="http://cis-india.org/openness/open-access-dialogues-report"&gt;Open Access Dialogues&lt;/a&gt; organised by The African Commons Project and the Centre for Internet and Society during November 2012 to March 2013 that explored the global open access agenda from a developing world perspective.&lt;/p&gt;
&lt;p&gt;I noted that one of the key findings from the Indian participants of the online consultations organised as part of the Open Access Dialogues was the need for a &lt;em&gt;broader vision of open access&lt;/em&gt;. Open research data is a key component of this broader vision of open access and open research.&lt;/p&gt;
&lt;p&gt;There was a brief discussion of how to start doing and thinking about open data as an approach to open research. I highlighted the need to get started on 1) getting government to open up data relevant to research, 2) opening up academic research data, and 3) sectoral conversations on data standards (technical and semantic); as well as the need to think about 1) open data as bridge across disciplinary communities, 2) quantification of life and the widening sphere of research data, and 3) academic research and public life.&lt;/p&gt;
&lt;p&gt;In next slides, I quickly mentioned the international processes going on in the open data landscape - the conversation on open data and Sustainable Development Data, the possibility of using big (social and telecom) data for purposes of development monitoring, and the International Open Data Charter as a set of global principles for open data.&lt;/p&gt;
&lt;p&gt;More about the seminar: &lt;a href="http://cis-india.org/openness/teri-seminar-on-open-access-in-research"&gt;http://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/la5ulZYBT15DiL" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/approaching-open-research-via-open-data-2015'&gt;https://cis-india.org/openness/approaching-open-research-via-open-data-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-01-12T14:37:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance">
    <title>Pre-Budget Consultation 2016 - Submission to the IT Group of the Ministry of Finance</title>
    <link>https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance</link>
    <description>
        &lt;b&gt;The Ministry of Finance has recently held pre-budget consultations with different stakeholder groups in connection with the Union Budget 2016-17. We were invited to take part in the consultation for the IT (hardware and software) group organised on January 07, 2016, and submit a suggestion note. We are sharing the note below. It was prepared and presented by Sumandro Chattapadhyay, with contributions from Rohini Lakshané, Anubha Sinha, and other members of CIS.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is our distinct honour to be invited to submit this note for consideration by the IT Group of the Ministry of Finance, Government of India, as part of the pre-budget consultation for 2016-17.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. We receive financial support from Kusuma Trust, Wikimedia Foundation, MacArthur Foundation, IDRC, and other donors.&lt;/p&gt;
&lt;p&gt;We have divided our suggestions into the different topics that our organisation has been researching in the recent years.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Free/Libre and Open Source Software (FLOSS) is the Basis for Digital India&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We congratulate the policies introduced by the government to promote use of free/libre and open source software and that of open APIs for all e-governance projects and systems. This is not only crucial for the government to avoid vendor lock-in when it comes to critical software systems for governance, but also to ensure that the source code of such systems is available for public scrutiny and do not contain any security flaws.&lt;/p&gt;
&lt;p&gt;We request the government to empower the implementation of these policies by making open sharing of source code a necessity for all software vendors hired by government agencies a necessary condition for awarding of tenders. The 2016-17 budget should include special support to make all government agencies aware and capable of implementing these policies, as well as to build and operate agency-level software repositories (with version controlling system) to host the source codes. These repositories may function to manage the development and maintenance of software used in e-governance projects, as well as to seek comments from the public regarding the quality of the software.&lt;/p&gt;
&lt;p&gt;Use of FLOSS is not only important from the security or the cost-saving perspectives, it is also crucial to develop a robust industry of software development firms that specialise in FLOSS-based solutions, as opposed to being restricted to doing local implementation of global software vendors. A holistic support for FLOSS, especially with the government functioning as the dominant client, will immensely help creation of domestic jobs in the software industry, as well as encouraging Indian programmers to contribute to development of FLOSS projects.&lt;/p&gt;
&lt;p&gt;An effective compliance monitoring and enforcement system needs to be created to ensure that all government agencies are  Strong enforcement of the 2011 policy to use open source software in governance, including an enforcement task force that checks whether government departments have complied with this or not.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Open Data is a Key Instrument for Transparent Decision Making&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With a wider set of governance activities being carried out using information systems, the government is increasingly acquiring a substantial amount of data about governance processes and status of projects that needs to be effectively fed back into the decision making process for the same projects. Opening up such data not only allows for public transparency, but also for easier sharing of data across government agencies, which reduces process delays and possibilities of duplication of data collection efforts.&lt;/p&gt;
&lt;p&gt;We request the 2016-17 budget to foreground the National Data Sharing and Accessibility Policy and the Open Government Data Platform of India as two key enablers of the Digital India agenda, and accordingly budget for modernisation and reconfiguration of data collection and management processes across government agencies, so that those processes are made automatic and open-by-default. Automatic data management processes minimise the possibility of data loss by directly archiving the collected data, which is increasingly becoming digital in nature. Open-by-default processes of data management means that all data collected by an agency, once pre-recognised as shareable data (that is non-sensitive and anonymised), will be proactively disclosed as a rule.&lt;/p&gt;
&lt;p&gt;Implementation of the National Data Sharing and Accessibility Policy has been hindered, so far, by the lack of preparation of a public inventory of data assets, along  with the information of their collection cycles, modes of collection and storage, etc., by each union government agency. Specific budgetary allocation to develop these inventories will be crucial not only for the implementation of the Policy, but also for the government to get an extensive sense of data collected and maintained currently by various government agencies. Decisions to proactively publish, or otherwise, such data can then be taken based on established rules.&lt;/p&gt;
&lt;p&gt;Availability of such open data, as mentioned above, creates a wider possibility for the public to know, learn, and understand the activities of the government, and is a cornerstone of transparent governance in the digital era. But making this a reality requires a systemic implementation of open government data practices, and various agencies would require targeted budget to undertake the required capacity development and work process re-engineering. Expenditure of such kind should not be seen as producing government data as a product, but as producing data as an infrastructure, which will be of continuous value for the years to come.&lt;/p&gt;
&lt;p&gt;As being discussed globally, open government data has the potential to kickstart a vast market of data derivatives, analytics companies, and data-driven innovation. Encouraging civic innovations, empowered by open government data - from climate data to transport data - can also be one of the unique initiatives of budget 2016-17.&lt;/p&gt;
&lt;p&gt;For maximising impact of opened up government data, we request the government to publish data that either has a high demand already (such as, geospatial data, and transport data), or is related to high-net-worth activities of the government (such as, data related to monitoring of major programmes, and budget and expenditure data for union and state governments).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Promotion of Start-ups and MSMEs in Electronics and IT Hardware Manufacturing&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In line with the Make in India and Digital India initiatives, to enable India to be one of the global hubs of design, manufacturing, and exporting of electronics and IT hardware, we request that the budget 2016-17 focus on increasing flow of fund to start-ups and Medium and Small-Scale Manufacturing Enterprises (MSMEs) in the form of research and development grants (ideally connected to government, especially defense-related, spending on IT hardware innovation), seed capital, and venture capital.&lt;/p&gt;
&lt;p&gt;Generation of awareness and industry-specific strategies to develop intellectual property regimes and practices favourable for manufacturers of electronics and IT hardware in India is an absolutely crucial part of promotion of the same, especially in the current global scenario. Start-ups and MSMEs must be made thoroughly aware of intellectual property concerns and possibilities, including limitations and exceptions, flexibilities, and alternative models such as open innovation.&lt;/p&gt;
&lt;p&gt;We request the budget 2016-17 to give special emphasis to facilitation of technology licensing and transfer, through voluntary mechanisms as well as government intervention, such as compulsory licensing and government enforced patent pools.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Applied Mathematics Research is Fundamental for Cybersecurity&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Recent global reports have revealed that some national governments have been actively involved in sponsoring distortion in applied mathematics research so as to introduce weaknesses in encryption standards used in for online communication. Instead of trying to regulate key-length or mandating pre-registration of devices using encryption, as suggested by the withdrawn National Encryption Policy draft, would not be able to address this core emerging problem of weak cybersecurity standards.&lt;/p&gt;
&lt;p&gt;For effective and sustainable cybersecurity strategy, we must develop significant expertise in applied mathematical research, which is the very basis of cybersecurity standards development. We request the budget 2016-17 to give this topic the much-needed focus, especially in the context of the Digital India initiative and the upcoming National Encryption Policy.&lt;/p&gt;
&lt;p&gt;Along with developing domestic research capacity, a more immediately important step for the government is to ensure high quality Indian participation in global standard setting organisations, and hence to contribute to global standards making processes. We humbly suggest that categorical support for such participation and contribution is provided through the budget 2016-17, perhaps by partially channeling the revenues obtained from spectrum auctions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance'&gt;https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2016-01-12T13:34:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy">
    <title>A Critique of Consent in Information Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy</link>
    <description>
        &lt;b&gt;The idea of informed consent in privacy law is supposed to ensure the autonomy of an individual in any exercise which involves sharing of the individual's personal information. Consent is usually taken through a document, a privacy notice, signed or otherwise agreed to by the participant.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice and Consent as cornerstone of privacy law&lt;/b&gt;&lt;br /&gt;The privacy notice, which is the primary subject of this article, conveys all pertinent information, including risks and benefits to the participant, and in the possession of such knowledge, they can make an informed choice about whether to participate or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most modern laws and data privacy principles seek to focus on individual control. In this context, the definition by the late Alan Westin, former Professor 	of Public Law &amp;amp; Government Emeritus, Columbia University, which characterises privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other,"	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is most apt. The idea of privacy as control is what finds articulation in data protection policies across jurisdictions beginning from the Fair Information Practice Principles (FIPP) from the United States.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Schwarz, the Jefferson E. Peyser Professor at UC Berkeley School of Law and a Director of the Berkeley Center for Law and Technology, called the FIPP the building blocks of modern information privacy law.	&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles trace their history to a report called 'Records, Computers and 	Rights of Citizens'&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; prepared by an Advisory Committee appointed by the US Department 	of Health, Education and Welfare in 1973 in response to the increasing automation in data systems containing information about individuals. The Committee's 	mandate was to "explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, 	the use of the Social Security number."&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most important legacy of this report was 	the articulation of five principles which would not only play a significant role in the privacy laws in US but also inform data protection law in most 	privacy regimes internationally&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; like the OECD Privacy Guidelines, the EU Data 	Protection Principles, the FTC Privacy Principles, APEC Framework or the nine National Privacy Principles articulated by the Justice A P Shah Committee 	Report which are reflected in the Privacy Bill, 2014 in India. Fred Cate, the C. Ben Dutton Professor of Law at the Indiana University Maurer School of 	Law, effectively summarises the import of all of these privacy regimes as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them 	access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these 	requirements or individuals' expressed preferences"&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This makes the individual empowered and allows them to weigh their own interests in exercising their consent. The allure of this paradigm is that in one 	elegant stroke, it seeks to "ensure that consent is informed and free and thereby also to implement an acceptable tradeoff between privacy and competing 	concerns."&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This system was originally intended to be only one of the multiple ways 	in data processing would be governed, along with other substantive principles such as data quality, however, it soon became the dominant and often the only 	mechanism.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In recent years however, the emergence of Big Data and the nascent development of the Internet of Things has led many commentators to begin questioning the workability of consent as a principle of privacy.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In this article we will look closely at the some of issues with the concept of 	informed consent, and how these notions have become more acute in recent years. Following an analysis of these issues, we will conclude by arguing that 	today consent, as the cornerstone of privacy law, may in fact be thought of as counter-productive and that a rethinking of a principle based approach to 	privacy may be necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problems with Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a certain extent, there are some cognitive problems that have always existed with the issue of informed consent such as long and difficult to understand 	privacy notices,&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; although, in recent past with these problems have become much 	more aggravated. Fred Cate points out that FIPPs at their inception were broad principles which included both substantive and procedural aspects. However, 	as they were translated into national laws, the emphasis remained on the procedural aspect of notice and consent. From the idea of individual or societal 	welfare as the goals of privacy, the focus had shifted to individual control.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With data collection occurring with every use of online services, and complex data sets being created, it is humanly impossible to exercise rational 	decision-making about the choice to allow someone to use our personal data. The thrust of Big Data technologies is that the value of data resides not in its primary purposes but in its numerous secondary purposes where data is re-used many times over.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In that sense, the very idea of Big Data conflicts with the data minimization 	principle.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The idea is to retain as much data as possible for secondary uses. Since, these secondary uses are, by their nature, unanticipated, its runs counter to the the very idea of the purpose limitation principle.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The notice and consent requirement has simply led to a proliferation of long and 	complex privacy notices which are seldom read and even more rarely understood. We will articulate some issues with privacy notices which have always 	existed, and have only become more exacerbated in the context of Big Data and the Internet of Things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Failure to read/access privacy notices &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice and consent principle relies on the ability of the individual to make an informed choice after reading the privacy notice. The purpose of a 	privacy notice is to act as a public announcement of the internal practices on collection, processing, retention and sharing of information and make the 	user aware of the same.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, in order to do so the individual must first be 	able to access the privacy notices in an intelligible format and read them. Privacy notices come in various forms, ranging from documents posted as privacy policies on a website, to click through notices in a mobile app, to signs posted in public spaces informing about the presence of CCTV cameras.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order for the principle of notice and consent to work, the privacy notices need to be made available in a language understood by the user. As per 	estimates, about 840 million people (11% of the world population) can speak or understand English. However, most privacy notices online are not available 	in the local language in different regions.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Further, with the ubiquity of 	smartphones and advent of Internet of Things, constrained interfaces on mobile screens and wearables make the privacy notices extremely difficult to read. 	It must be remembered that privacy notices often run into several pages, and smaller screens effectively ensure that most users do not read through them. Further, connected wearable devices often have "little or no interfaces that readily permit choices."	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As more and more devices are connected, this problem will only get more 	pronounced. Imagine in a world where refrigerators act as the intermediary disclosing information to your doctor or supermarket, at what point does the 	data subject step in and exercise consent.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another aspect that needs to be understood is that unlike earlier when data collectors were far and few in between, the user could theoretically make a 	rational choice taking into account the purpose of data collection. However, in the world of Big Data, consent often needs to be provided while the user is 	trying to access services. In that context click through privacy notices such as those required to access online application, are treated simply as an 	impediment that must be crossed in order to get access to services. The fact that the consent need to be given in real time almost always results in 	disregarding what the privacy notices say.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, some scholars have argued that while individual control over data may be appealing in theory, it merely gives an illusion of enhanced privacy but 	not the reality of meaningful choice.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Research demonstrates that the presence of 	the term 'privacy policy' leads people to the false assumption that if a company has a privacy policy in place, it automatically means presence of 	substantive and responsible limits on how data is handled.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turow, the 	Robert Lewis Shayon Professor of Communication at the Annenberg School for Communication, and his team for example has demonstrated how "[w]hen consumers 	see the term 'privacy policy,' they believe that their personal information will be protected in specific ways; in particular, they assume that a website 	that advertises a privacy policy will not share their personal information."&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 	reality, however, privacy policies are more likely to serve as liability disclaimers for companies than any kind of guarantee of privacy for consumers. 	Most people tend to ignore privacy policies.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Cass Sunstein states that our 	cognitive capacity to make choices and take decisions is limited. When faced with an overwhelming number of choices to make, most of us do not read privacy 	notices and resort to default options.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The requirement to make choices, sometimes several times in a day, imposes significant burden on the consumers as well the business seeking such consent.	&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Failure to understand privacy notices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FTC chairperson Edith Ramirez stated: "In my mind, the question is not whether consumers should be given a say over unexpected uses of their data; rather, 	the question is how to provide simplified notice and choice."&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Privacy notices 	often come in the form of long legal documents much to the detriment of the readers' ability to understand them. These policies are "long, complicated, 	full of jargon and change frequently."&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent walker list five problems that 	privacy notices typically suffer from - a) overkill - long and repetitive text in small print, b) irrelevance - describing situations of little concern to 	most consumers, c) opacity - broad terms the reflect the truth that is impossible to track and control all the information collected and stored, d) 	non-comparability - simplification required to achieve comparability will lead to compromising accuracy, and e) inflexibility - failure to keep pace with 	new business models.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman did a review of twenty three corporate privacy 	notices and mapped them against three indices which give approximate level of education necessary to understand text on a first read. His results show that most of policies can only be understood on the first read by people of a grade level of 15 or above.	&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Chairperson Timothy Muris summed up the problem with long privacy notices when he said, "Acres of trees died to produce a blizzard of barely comprehensible privacy notices."	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Margaret Jane Radin, the former Henry King Ransom Professor of Law Emerita at the University of Michigan, provides a good definition of free consent. It 	"involves a knowing understanding of what one is doing in a context in which it is actually&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;possible for or to do otherwise, and an affirmative action in doing something, rather&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;than a merely passive acquiescence in accepting something."&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; There have been various proposals advocating a more succinct and simpler standard for privacy notices,&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or multi-layered notices&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or representing the information in the form of a table.	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, studies show only an insignificant improvement in the understanding by consumers when privacy policies are represented in graphic formats like tables and labels.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It has also been pointed out that it is impossible to convey complex data 	policies in simple and clear language.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Failure to anticipate/comprehend the consequences of consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today's infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share 	information online, most have no understanding of what happens to their data once they have uploaded it - Where it goes? Whom it is held by? Under what 	conditions? For what purpose? Or how might it be used, aggregated, hacked, or leaked in the future? For the most part, the above operations are "invisible, 	managed at distant centers, from behind the scenes, by unmanned powers."&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The perceived opportunities and benefits of Big Data have led to an acceptance of the indiscriminate collection of as much data as possible as well as the 	retention of that data for unspecified future analysis. For many advocates, such practices are absolutely essential if Big Data is to deliver on its 	promises.. Experts have argued that key privacy principles particularly those of collection limitation, data minimization and purpose limitation should not 	be applied to Big Data processing.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As mentioned above, in the case of Big Data, 	the value of the data collected comes often not from its primary purpose but from its secondary uses. Deriving value from datasets involves amalgamating 	diverse datasets and executing speculative and exploratory kinds of analysis in order to discover hidden insights and correlations that might have 	previously gone unnoticed.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As such organizations are today routinely reprocessing 	data collected from individuals for purposes not directly related to the services they provide to the customer. These secondary uses of data are becoming increasingly valuable sources of revenue for companies as the value of data in and of itself continues to rise.	&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle of purpose limitation has served as a key component of data protection for decades. Purposes given for the processing of users' data should 	be given at the time of collection and consent and should be "specified, explicit and legitimate". In practice however, reasons given typically include phrases such as, 'for marketing purposes' or 'to improve the user experience' that are vague and open to interpretation.	&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators whilst conceding the fact that purpose limitation in the era of Big Data may not be possible have instead attempted to emphasise the 	notion of 'compatible use' requirements. In the view of Working Party on the protection of individuals with regard to the processing of person data, for 	example, use of data for a purpose other than that originally stated at the point of collection should be subject to a case-by-case review of whether not 	further processing for different purpose is justifiable - i.e., compatible with the original purpose. Such a review may take into account for example, the 	context in which the data was originally collected, the nature or sensitivity of the data involved, and the existence of relevant safeguards to insure fair 	processing of the data and prevent undue harm to the data subject.&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, Big Data advocates have argued that an assessment of legitimate interest rather than compatibility with the initial purpose is far 	better suited to Big Data processing.&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; They argue that today the notion of purpose 	limitation has become outdated. Whereas previously data was collected largely as a by-product of the purpose for which it was being collected. If for 	example, we opted to use a service the information we provided was for the most part necessary to enable the provision of that service. Today however, the 	utility of data is no longer restricted to the primary purpose for which it is collected but can be used to provide all kinds of secondary services and 	resources, reduce waste, increase efficiency and improve decision-making.&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These 	kinds of positive externalities, Big Data advocates insist, are only made possible by the reprocessing of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately for the notion of consent the nature of these secondary purposes are rarely evident at the time of collection. Instead the true value of the 	data can often only be revealed when it is amalgamated with other diverse datasets and subjected to various forms of analysis to help reveal hidden and 	non-obvious correlations and insights.&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The uncertain and speculative value of 	data therefore means that it is impossible to provide "specific, explicit, and legitimate" details about how a given data set will be used or how it might 	be aggregated in future. Without this crucial information data subjects have no basis upon which they can make an informed decision about whether or not to 	provide consent. Robert Sloan and Richard Warner argue that it is impossible for a privacy notice to contain enough information to enable free consent. 	They argue that current data collection practices are highly complex and that these practices involve collection of information at one stage for one purpose and then retain, analyze, and distribute it for a variety of other purposes in unpredictable ways.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum points to the ever changing nature of data flow and the 	cognitive challenges it poses. "Even if, for a given moment, a&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;snapshot of the information flows could be grasped, the realm is in constant flux, with new firms entering the picture, new analytics, and new back end contracts forged: in other words, we are dealing with a recursive capacity that is indefinitely extensible."	&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Scale and Aggregation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped 	buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, 'creating countless 	new digital puddles, lakes, tributaries and oceans of information'.&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 2011 it 	was estimated that the quantity of data produced globally would surpass 1.8 zettabytes , by 2013 that had grown to 4 zettabytes , and with the nascent development of the Internet of Things gathering pace, these trends are set to continue.	&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Big Data by its very nature requires the collection and processing of very large 	and very diverse data sets. Unlike other forms scientific research and analysis which utilize various sampling techniques to identify and target the types 	of data most useful to the research questions, Big Data instead seeks to gather as much data as possible, in order to achieve full resolution of the 	phenomenon being studied, a task made much easier in recent years as a result of the proliferation of internet enabled devices and the growth of the 	Internet of Things. This goal of attaining comprehensive coverage exists in tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data collected about an individual to the absolute minimum.	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dilution of the purpose limitation principle entails that even those who understand privacy notices and are capable of making rational choices about 	it, cannot conceptualize how their data will be aggregated and possibly used or re-used. Seemingly innocuous bits of data revealed at different stages 	could be combined to reveal sensitive information about the individual. Daniel Solove, the John Marshall Harlan Research Professor of Law at the George 	Washington University Law School, in his book, "The Digital Person", calls it the aggregation effect. He argues that the ingenuity of the data mining techniques and the insights and predictions that could be made by it render any cost-benefit analysis that an individual could make ineffectual.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Failure to opt-out&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional choice against the collection of personal data that users have had access to, at least in theory, is the option to 'opt-out' of certain 	services. This draws from the free market theory that individuals exercise their free will when they use services and always have the option of opting out, 	thus, arguing against regulation but relying on the collective wisdom of the market to weed out harms. The notion that the provision of data should be a 	matter of personal choice on the part of the individual and that the individual can, if they chose decide to 'opt-out' of data collection, for example by 	ceasing use of a particular service, is an important component of privacy and data protection frameworks. The proliferation of internet-enabled devices, 	their integration into the built environment and the real-time nature of data collection and analysis however are beginning to undermine this concept. For 	many critics of Big Data, the ubiquity of data collection points as well as the compulsory provision of data as a prerequisite for the access and use of many key online services, is making opting-out of data collection not only impractical but in some cases impossible.	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst sceptics may object that individuals are still free to stop using services that require data. As online connectivity becomes increasingly important to participation in modern life, the choice to withdraw completely is becoming less of a genuine choice.	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Information flows not only from the individuals it is about but also from what 	other people say about them. Financial transactions made online or via debit/credit cards can be analysed to derive further information about the 	individual. If opting-out makes you look anti-social, criminal, or unethical, the claims that we are exercising free will seems murky and leads one to 	wonder whether we are dealing with coercive technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue with the consent and opt-out paradigm is the binary nature of the choice. This binary nature of consent makes a mockery of the notion that 	consent can function as an effective tool of personal data management. What it effectively means is that one can either agree with the long privacy 	notices, or choose to abandon the desired service. "This binary choice is not what the privacy architects envisioned four decades ago when they imagined 	empowered individuals making informed decisions about the processing of their personal data. In practice, it certainly is not the optimal mechanism to ensure that either information privacy or the free flow of information is being protected."	&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion: 'Notice and Consent' is counter-productive&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There continues to be an unwillingness amongst many privacy advocates to concede that the concept of consent is fundamentally broken, as Simon Davies, a 	privacy advocate based in London, comments 'to do so could be seen as giving ground to the data vultures', and risks further weakening an already 	dangerously fragile privacy framework.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Nevertheless, as we begin to transition 	into an era of ubiquitous data collection, evidence is becoming stronger that consent is not simply ineffective, but may in some instances might be 	counter-productive to the goals of privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As already noted, the notion that privacy agreements produce anything like truly informed consent has long since been discredited; given this fact, one may 	ask for whose benefit such agreements are created? One may justifiably argue that far from being for the benefit and protection of users, privacy agreement 	may in fact be fundamentally to the benefit of data brokers, who having gained the consent of users can act with near impunity in their use of the data 	collected. Thus, an overly narrow focus on the necessity of consent at the point of collection, risks diverting our attention from the arguably more important issue of how our data is stored, analysed and distributed by data brokers following its collection.	&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, given the often complicated and cumbersome processes involved in gathering consent from users, some have raised concerns that the mechanisms 	put in place to garner consent could themselves morph into surveillance mechanisms. Davies, for example cites the case of the EU Cookie Directive, which 	required websites to gain consent for the collection of cookies. Davies observes how, 'a proper audit and compliance element in the system could require 	the processing of even more data than the original unregulated web traffic. Even if it was possible for consumers to use some kind of gateway intermediary 	to manage the consent requests, the resulting data collection would be overwhelming''. Thus in many instances there exists a fundamental tension between the requirement placed on companies to gather consent and the equally important principle of data minimization.	&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the above issues with notice and informed consent in the context of information privacy, and the fact that it is counterproductive to the larger 	goals of privacy law, it is important to revisit the principle or rights based approach to data protection, and consider a paradigm shift where one moves 	to a risk based approach that takes into account the actual threats of sharing data rather than relying on what has proved to be an ineffectual system of 	individual control. We will be dealing with some of these issues in a follow up to this article.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alan Westin, Privacy and Freedom, Atheneum, New York, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Fair Information Practice Principles (FIPP) available at			&lt;a href="https://www.it.cornell.edu/policies/infoprivacy/principles.cfm"&gt;https://www.it.cornell.edu/policies/infoprivacy/principles.cfm&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul M. Schwartz, "Privacy and Democracy in Cyberspace," 52 Vanderbilt Law Review 1607, 1614 (1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; US Secretary's Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, available at			&lt;a href="http://www.justice.gov/opcl/docs/rec-com-rights.pdf"&gt;http://www.justice.gov/opcl/docs/rec-com-rights.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://epic.org/privacy/ppsc1977report/c13.htm"&gt;https://epic.org/privacy/ppsc1977report/c13.htm&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Marc Rotenberg, "Fair Information Practices and the Architecture of Privacy: What Larry Doesn't Get," available at 			&lt;a href="https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf"&gt; https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, The Failure of Information Practice Principles, available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, Viktor Schoenberger, Notice and Consent in a world of Big Data, available at			&lt;a href="http://idpl.oxfordjournals.org/content/3/2/67.abstract"&gt;http://idpl.oxfordjournals.org/content/3/2/67.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, Privacy self-management and consent dilemma, 2013 available at 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Campbell, Informed consent in developing countries: Myth or Reality, available at 			&lt;a href="https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf"&gt; https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf &lt;/a&gt; ;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013 at 			153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Data Minimization principle requires organizations to limit the collection of personal data to the minimum extent necessary to obtain their 			legitimate purpose and to delete data no longer required.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Omer Tene and Jules Polonetsky, "Big Data for All: Privacy and User Control in the Age of Analytics," SSRN Scholarly Paper, available at			&lt;a href="http://papers.ssrn.com/abstract=2149364"&gt;http://papers.ssrn.com/abstract=2149364&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Florian Schaub, R. Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, The Digital Person: Technology and Privacy in the Information Age, NYU Press, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.ethnologue.com/statistics/size"&gt;http://www.ethnologue.com/statistics/size&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Chris Jay Hoofnagle &amp;amp; Jennifer King, Research Report: What Californians Understand&lt;/p&gt;
&lt;p&gt;About Privacy Online, available at &lt;a href="http://ssrn.com/abstract=1262130"&gt;http://ssrn.com/abstract=1262130&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turrow, Michael Hennesy, Nora Draper, The Tradeoff Fallacy, available at 			&lt;a href="https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf"&gt; https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Saul Hansell, "Compressed Data: The Big Yahoo Privacy Storm That Wasn't," New York Times, May 13, 2002 available at 			&lt;a href="http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0"&gt; http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Cass Sunstein, Choosing not to choose: Understanding the Value of Choice, Oxford University Press, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, Acxiom, processes more than 50 trillion data transactions a year. 			&lt;a href="http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0"&gt; http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; L. F. Cranor. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, 10:273, 2012, available at			&lt;a href="http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF"&gt;http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent Walker, The Costs of Privacy, 2001 available at 			&lt;a href="https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy"&gt; https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman, "Privacy Policies are great - for Phds", CBS News, available at			&lt;a href="http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/"&gt;http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Timothy J. Muris, Protecting Consumers' Privacy: 2002 and Beyond, available at			&lt;a href="http://www.ftc.gov/speeches/muris/privisp1002.htm"&gt;http://www.ftc.gov/speeches/muris/privisp1002.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Margaret Jane Radin, Humans, Computers, and Binding Commitment, 1999 available at			&lt;a href="http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/"&gt;http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Annie I. Anton et al., Financial Privacy Policies and the Need for Standardization, 2004 available at			&lt;a href="https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf"&gt;https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf&lt;/a&gt;; Florian Schaub, R. 			Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Center for Information Policy Leadership, Hunton &amp;amp; Williams LLP, "Ten Steps To Develop A Multi-Layered Privacy Notice" available at 			&lt;a href="https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf"&gt; https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Allen Levy and Manoj Hastak, Consumer Comprehension of Financial Privacy Notices, Interagency Notice Project, available at			&lt;a href="https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf"&gt;https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Patrick Gage Kelly et al., Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach available at 			&lt;a href="https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf"&gt; https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Howard Latin, "Good" Warnings, Bad Products, and Cognitive Limitations, 41 UCLA Law Review available at 			&lt;a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5"&gt; https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Obar, Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management, Big Data and Society, 2015, available at&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt; &lt;/a&gt; &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 29 Working Party, (2013) Opinion 03/2013 on Purpose Limitation, Article 29, available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It remains unclear however whose interest would be accounted, existing EU legislation would allow commercial/data broker/third party interests to 			trump those of the user, effectively allowing re-processing of personal data irrespective of whether that processing would be in the interest of 			the user.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum, A Contextual Approach to Privacy Online, available at			&lt;a href="http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf"&gt;http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; D Bollier, The Promise and Peril of Big Data. The Aspen Institute, 2010, available at: 			&lt;a href="http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf"&gt; http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, Kleiner Perkins Caulfield Byers, (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 17.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Janet Vertasi, My Experiment Opting Out of Big Data Made Me Look Like a Criminal, 2014, available at			&lt;a href="http://time.com/83200/privacy-internet-big-data-opt-out/"&gt;http://time.com/83200/privacy-internet-big-data-opt-out/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx"&gt;http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy'&gt;https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-18T02:20:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
