<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1151 to 1165.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/hacking-modding-making"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/guest-blog-retd-col-ashwin-baindur-on-strategy-wikimedia-strategy-salon-vijayawada"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/guerrilla-glam-an-alternate-way-of-doing-glam-in-indie-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/govt-legalising-parallel-import"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/government-of-indias-response-to-wgec-questionnaire-1"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/hacking-modding-making">
    <title>Hacking, Modding &amp; Making</title>
    <link>https://cis-india.org/news/hacking-modding-making</link>
    <description>
        &lt;b&gt;Seeber's electronics laboratory is a room in a unit he shares with his mother. Every available space is taken up with teetering towers of electronic parts, writes Brendan Shanahan for GQ.&lt;/b&gt;
        
&lt;p&gt;Like subprime lending or the line at the motor registry, patent and copyright laws control all our lives but no one really understands them. In the world of DIY Tech, however, it is not a subject that can be ignored.&lt;/p&gt;
&lt;p&gt;" If they are infringing on patents then it's a question you have to ask within the individual jurisdiction," says Abraham. "In many jurisdictions design many not have protection. Whether it's legal or illegal is an open question."&lt;/p&gt;
&lt;p&gt;At its heart Abraham's argument is pragmatic: the developing world, especially China, is too big to stop. Companies can fight patent wars in every world territory, hire private detectives, pressure governments and prosecute consumers who buy rip-off products, but, ultimately, they won't win. The genie is out of the bottle.&lt;/p&gt;
&lt;p&gt;"If something has been made technologically possible, we cannot make it illegal and hope that everyone will now pretend that this is no longer technologically possible," says Abraham. "We can't have the government checking everyone's iPod and laptop. The better move is to change the model."&lt;/p&gt;
&lt;p&gt;Abraham has many suggestions for making copyright law more flexible to benefit manufacturers and consumers. One thing is certain: in a world in which Amazon, not even five years after the launch of the Kindle, is now selling more e-books than all hard copy books combined, and technology such as 3D printing will soon be standard, it would be unwise to cling to old certainities. The music industry may come to be regarded as merely the canary in a digital coalmine of failed industries.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.brendanshanahan.net/wp-content/uploads/2012/04/modding-31.jpg"&gt;Read the full post here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hacking-modding-making'&gt;https://cis-india.org/news/hacking-modding-making&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-04-09T09:51:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance">
    <title>Hacking without borders: The future of artificial intelligence and surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="Normal1"&gt;Robots or computer systems controlling our thoughts is way beyond anything I have seen in science fiction; yet something of the kind may be a reality in the future. The US Defence Advanced Research Projects Agency (DARPA) is currently funding several artificial intelligence projects which could potentially equip governments with the most powerful weapon possible: mind control.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Combat Zones That See (CTS)&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm5.staticflickr.com/4137/4749564682_9ab88cb4d1.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/swanksalot/"&gt;swanksalot&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;Ten years ago DARPA started funding the&lt;a href="http://www.freerepublic.com/focus/f-news/939608/posts"&gt; Combat Zones That See (CTS)&lt;/a&gt; project, which aims to ´track everything that moves´ within a city through a massive network of surveillance cameras linked to a centralized computer system. Groundbreaking artificial intelligence software is being used in the project to identify and track all movement within cities, which constitutes Big Brother as a reality. The computer software supporting the CTS is capable of automatically identifying vehicles and provides instant alerts after detecting a vehicle with a license plate on a watch list. The software is also able to analyze the video footage and to distinguish ´normal´ from ´abnormal´ behavior, as well as to discover links between ´places, subjects and times of activity´ and to identify patterns. With the use of this software, the CTS constitute the world´s first multi-camera surveillance system which is capable of automatically analyzing video footage.&lt;/p&gt;
&lt;p class="Normal1"&gt;Although the CTS project was initially intended to be used for solely military purposes, its use for civil purposes, such as combating crime, remains a possibility. In 2003 DARPA stated that&lt;span&gt; &lt;a class="external-link" href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;40 million surveillance cameras were already in use around the &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;world &lt;/a&gt;by law enforcement agencies to combat crime and terrorism, with 300 million expected by 2005. &lt;a href="http://www.wired.com/politics/law/news/2003/07/59471"&gt;Police&lt;/a&gt; in the U.S. have stated that buying new technology which may potentially aid their work is an integral part of the 9/11 mentality. Considering the fact that literally millions of CCTV cameras are installed by law enforcement agencies around the world and that DARPA has developed the software that has the capability of automatically analyzing data gathered by CCTV cameras, it is very possible that law enforcement agencies are participating in the CTS network.&lt;/p&gt;
&lt;p class="Normal1"&gt;However if such a project was used for non-military level purposes, it could raise concerns in regards to data protection, privacy and human rights. As a massive network of surveillance cameras, the CTS ultimately could enable the sharing of footage between private parties and law enforcement agencies without individuals´ knowledge or consent. Databases around the world could be potentially linked to each other and it remains unclear what laws would regulate the access, use and retention of such databases by law enforcement agencies of multiple countries. Furthermore, there is no universal definition for ´normal´ and ´abnormal´ behaviour, thus if the software is used for its original purpose, to distinguish between “abnormal” and “normal” behaviour, and used beyond military purposes, then there is a potential for abuse, as the criteria for being monitored, and possibly arrested, would not be clearly set out.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Mind´s Eye&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm9.staticflickr.com/8425/7775805386_8260b7836c.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/58687716@N05/"&gt;watchingfrogsboil&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;A camera today which is only capable of recording visual footage appears futile in comparison to what DARPA´s creating: a &lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;thinking camera&lt;/a&gt;. The Mind´s Eye project was launched in the U.S. in early 2011 and is currently developing smart cameras endowed with &lt;a href="http://www.darpa.mil/Our_Work/I2O/Programs/Minds_Eye.aspx"&gt;´visual intelligence´&lt;/a&gt;. This ultimately means that artificial intelligence surveillance cameras can not only record visual footage, but also automatically detect ´abnormal´ behavior, alert officials and analyze data in such a way that they are able to &lt;a href="http://phys.org/news/2012-10-surveillance-tech-carnegie-mellon.html"&gt;predict future human activities and situations&lt;/a&gt;.&lt;/p&gt;
&lt;p class="Normal1"&gt;Mainstream surveillance cameras already have visual-intelligence algorithms, but none of them are able to automatically analyze the data they collect. Data analysts are usually hired for analyzing the footage on a per instance basis, and only if a policeman detects ´something suspicious´ in the footage. Those days are over. &lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;General&lt;/a&gt;&lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt; &lt;/a&gt;&lt;a href="http://www.wired.com/dangerroom/2011/01/beyond-surveillance-darpa-wants-a-thinking-camera/"&gt;James Cartwright&lt;/a&gt;, the vice chairman of the Joint Chiefs of Staff, stated in an intelligence conference that “Star[ing] at Death TV for hours on end trying to find the single target or see something move is just a waste of manpower.” Today, the Mind´s Eye project is developing smart cameras equipped with artificial intelligence software capable of identifying &lt;a href="http://www.darpa.mil/Our_Work/I2O/Programs/Minds_Eye.aspx"&gt;operationally significant activity&lt;/a&gt; and predicting outcomes.&lt;/p&gt;
&lt;p class="Normal1"&gt;Mounting these &lt;a href="http://www.dailygalaxy.com/my_weblog/2011/01/minds-eye-darpas-new-thinking-camera-will-transform-the-world-of-surveillance.html"&gt;smart cameras on drones&lt;/a&gt; is the initial plan; and while that would enable military operations, many ethical concerns have arisen in regards to whether such technologies should be used for ´civil purposes.´ Will law enforcement agencies in India be equipped with such cameras over the next years? If so, how will their use be regulated?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SyNAPSE&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;img src="http://farm9.staticflickr.com/8230/8384110298_da510e0347.jpg" /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/healthblog/"&gt;A Health Blog&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="Normal1"&gt;The &lt;i&gt;Terminator &lt;/i&gt;could be more than just science fiction if current robots had artificial brains with similar form, function and architecture to the mammalian brain. DARPA is attempting this by funding HRL Laboratories, Hewlett-Packard and IBM Research to carry out this task through the &lt;a href="http://www.artificialbrains.com/darpa-synapse-program"&gt;Systems of Neuromorphic Adaptive Plastic Scalable Electronics (SyNAPSE)&lt;/a&gt; programme.  Is DARPA funding the creation of the &lt;i&gt;Terminator&lt;/i&gt;? No. Such artificial brains would be used to build robots whose intelligence matches that of mice and cats...for now.&lt;/p&gt;
&lt;p class="Normal1"&gt;SyNAPSE is a programme which aims to develop &lt;a href="http://celest.bu.edu/outreach-and-impacts/the-synapse-project"&gt;electronic neuromorphic machine technology&lt;/a&gt; which scales to biological levels. It started in the U.S. in 2008 and is scheduled to run until around 2016, while having received&lt;a href="http://www.artificialbrains.com/darpa-synapse-program"&gt; $102.6 million&lt;/a&gt; in funding as of January 2013. The ultimate aim is to build an electronic microprocessor system that matches a mammalian brain in power consumption, function and size. As current programmable machines are limited by their computational capacity, which requires human-derived algorithms to describe and process information, SyNAPSE´s objective is to create &lt;a href="http://www.darpa.mil/Our_Work/DSO/Programs/Systems_of_Neuromorphic_Adaptive_Plastic_Scalable_Electronics_(SYNAPSE).aspx"&gt;biological neural systems &lt;/a&gt;which can autonomously process information in complex environments. Like the mammalian brain, SyNAPSE´s &lt;a href="http://www.ibm.com/smarterplanet/us/en/business_analytics/article/cognitive_computing.html"&gt;cognitive computers&lt;/a&gt; would be capable of automatically learning relevant and probabilistically stable features and associations, as well as of finding correlations, creating hypotheses and generally remembering and learning through experiences.&lt;/p&gt;
&lt;p class="Normal1"&gt;Although this original type of computational device could be beneficial to &lt;a href="http://www.ibm.com/smarterplanet/us/en/business_analytics/article/cognitive_computing.html"&gt;predict natural disasters&lt;/a&gt; and other threats to security based on its cognitive abilities, human rights questions arise if it were to be used in general for surveillance purposes. Imagine surveillance technologies with the capacity of a human brain. Imagine surveillance technologies capable of remembering your activity, analyzing it, correlating it to other facts and/or activities, and of predicting outcomes; and now imagine such technology used to spy on us. That might be a possibility in the future.&lt;/p&gt;
&lt;p class="Normal1"&gt;Such cognitive technology is still in an experimental phase and although it could be used to tackle threats to security, it could also potentially be used to monitor populations more efficiently. No such technology currently exists in India, but it could only be a matter of time before Indian law enforcement agencies start using such artificial intelligence surveillance technology to supposedly enhance our security and protect us.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Brain-Computer Interface (BCI)&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="360" src="http://www.youtube.com/embed/qCSSBEXBCbY?feature=player_embedded" width="640"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p class="Normal1"&gt;Remember Orwell's ´&lt;i&gt;Thought Police&lt;/i&gt;´? Was Orwell exaggerating just to get his point across? Well, the future appears to be much scarier than Orwell's vision depicted in &lt;i&gt;1984&lt;/i&gt;. Unlike the ´&lt;i&gt;Thought Police&lt;/i&gt;´ which merely arrested individuals who openly expressed ideas or thoughts which contradicted the Party´s dogma, today, technologies are being developed which can &lt;i&gt;literally &lt;/i&gt;read our thoughts.&lt;/p&gt;
&lt;p class="Normal1"&gt;Once again, DARPA appears to be funding one of the world´s most innovative projects: the &lt;a href="http://www.wired.com/opinion/2012/12/the-next-warfare-domain-is-your-brain/"&gt;Brain-Computer Interface (BCI)&lt;/a&gt;. The human brain is far better at pattern matching than any computer, whilst computers have greater analytical speed than human brains. The BCI is an attempt to merge the two together, and to enable the human brain to control robotic devices and other machines. In particular, the BCI is comprised of a headset (an electroencephalograph -&lt;a href="http://www.extremetech.com/wp-content/uploads/2012/08/brain-hacking-accuracy-chart.jpg"&gt; an EEG&lt;/a&gt;) with sensors that rest on the human scalp, as well as of software which processes brain activity. This enables the human brain to be linked to a computer and for an individual to control technologies without moving a finger, but by merely &lt;i&gt;thinking &lt;/i&gt;of the action.&lt;/p&gt;
&lt;p class="Normal1"&gt;Ten years ago it was reported that the brains of &lt;a href="http://www.newscientist.com/article/dn2237"&gt;rats&lt;/a&gt; and &lt;a href="http://news.bbc.co.uk/2/hi/health/3186850.stm"&gt;monkeys&lt;/a&gt; could control robot arms through the use of such technologies. A few years later&lt;a href="http://www.newscientist.com/article/dn4540"&gt; brainstem implants&lt;/a&gt; were developed to tackle deafness. Today, brain-computer interface technologies are able to directly link the human brain to computers, thus enabling paralyzed people to conduct computer activity by merely thinking of the actions, as well as&lt;a href="http://www.cyborgdb.org/mckeever.htm"&gt; to control robotic limbs with their thoughts&lt;/a&gt;. BCIs appear to open up a new gateway for disabled persons, as all previously unthinkable actions, such as typing on a computer or browsing through websites, can now be undertaken by literally &lt;i&gt;thinking &lt;/i&gt;about them, while using a BCI.&lt;/p&gt;
&lt;p class="Normal1"&gt;Brain-controlled robotic limbs could change the lives of disabled persons, but&lt;a href="http://www.guardian.co.uk/science/2007/feb/09/neuroscience.ethicsofscience"&gt; ethical concerns&lt;/a&gt; have arisen in regards to the BCI´s mind-reading ability.  If the brain can be used to control computers and other technologies, does that ultimately mean that computers can also be used to control the human brain?  Researchers from the University of Oxford and Geneva, and the University of California, Berkley, have created a custom programme that was specially designed with the sole purpose of finding out &lt;a href="http://www.extremetech.com/extreme/134682-hackers-backdoor-the-human-brain-successfully-extract-sensitive-data"&gt;sensitive data&lt;/a&gt;, such as an individuals´ home location, credit card PIN and date of birth. Volunteers participated in this programme and it had up to 40% success in obtaining useful information. To extract such information, researchers rely on the &lt;i&gt;P300 response&lt;/i&gt;, which is a very specific brainwave pattern that occurs when a human brain recognizes something that is meaningful, whether that is personal information, such as credit card details, or an enemy in a battlefield. According to &lt;a href="http://www.digitaltrends.com/cool-tech/this-is-your-brain-on-silicon/"&gt;DARPA&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´When a human wearing the EEG cap was introduced, the number of false alarms dropped to only five per hour, out of a total of 2,304 target events per hour, and a 91 percent successful target recognition rate was introduced.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p class="Normal1"&gt;This constitutes the human brain as&lt;a class="external-link" href="http://www.wired.com/opinion/2012/12/the-next-warfare-domain-is-your-brain/"&gt; a &lt;span&gt;new warfighting &lt;/span&gt;domain&lt;/a&gt; of the twenty-first century, as experiments have proven that the brain can control and maneuver quadcopter drones and other military technologies. Enhanced threat detection through BCI´s scan for P300 responses and the literal control of military operations through the brain, definitely appear to be changing the future of warfare. Along with this change, the possibility of manipulating a soldier´s BCI during conflict is real and could lead to absolute chaos and destruction.&lt;/p&gt;
&lt;p class="Normal1"&gt;Security expert, Barnaby Jack, of IOActive demonstrated the &lt;a href="http://www.computerworld.com/s/article/9232477/Pacemaker_hack_can_deliver_deadly_830_volt_jolt"&gt;vulnerability of biotechnological systems&lt;/a&gt;, which raises concerns that BCI technologies may also potentially be vulnerable and expose an individual's´ brain to hacking, manipulation and control by third parties. If the brain can control computer systems and computer systems are able to detect and distinguish brain patterns, then this ultimately means that the human brain can potentially be controlled by computer software.&lt;/p&gt;
&lt;p class="Normal1"&gt;Will BCI be used in the future to&lt;a href="http://www.guardian.co.uk/science/2007/feb/09/neuroscience.ethicsofscience"&gt; interrogate terrorists and suspects&lt;/a&gt;? What would that mean for the future of our human rights? Can we have human rights if authorities can literally hack our brain in the name of national security? How can we be protected from abuse by those in power, if the most precious thing we have - our &lt;i&gt;thoughts&lt;/i&gt; - can potentially be hacked? Human rights are essential because they protect us from those in power; but the &lt;i&gt;privacy of our thoughts&lt;/i&gt; is even more important, because without it, we can have no human rights, no individuality.&lt;/p&gt;
&lt;p class="Normal1"&gt;Sure, the BCI is a very impressive technological accomplishment and can potentially improve the lives of millions. But it can also potentially destroy the most unique quality of human beings: their personal thoughts. Mind control is a vicious game to play and may constitute some of the scariest political novels as a comedy of the past. Nuclear weapons, bombs and all other powerful technologies seem childish compared to the BCI which can literally control our mind! Therefore strict regulations should be enacted which would restrict the use of BCI technologies to visually impaired or handicapped individuals.  Though these technologies currently are not being used in India, explicit laws on the use of artificial intelligence surveillance technologies should be enacted in India, to help ensure that they do not infringe upon the right to privacy and other human rights.&lt;/p&gt;
&lt;p class="Normal1"&gt;Apparently, anyone can&lt;a href="http://www.extremetech.com/extreme/134682-hackers-backdoor-the-human-brain-successfully-extract-sensitive-data"&gt; buy Emotiv or Neurosky BCI online&lt;/a&gt; to mind control their computer with only $200-$300. If the use of BCI was imposed in a top-down manner, then maybe there would be some hope that people would oppose its use for surveillance purposes; but if the idea of mind control is being socially integrated...the future of privacy seems bleak.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:30:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace">
    <title>Hackers Take Protest to Indian Streets and Cyberspace</title>
    <link>https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace</link>
    <description>
        &lt;b&gt;First there was self-styled Gandhian activist Anna Hazare who took to the streets to protest corruption. Now a group agitating against censorship on the Internet has arrived in India.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/06/08/hackers-take-protest-to-indian-streets-and-cyberspace/"&gt;This article by Shreya Shah was published in the Wall Street Journal on June 8, 2012&amp;nbsp; &lt;/a&gt;Pranesh Prakash is quoted in this article.&lt;/p&gt;
&lt;p&gt;Only this time, the location is cyberspace and their modus operandi hacking.&lt;/p&gt;
&lt;p&gt;In the last few months, Anonymous –a group of hackers, or hacktivists as they like to call themselves –has gone after Web sites of political parties, government sites and Internet service providers, &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/article3496968.ece"&gt;the latest being MTNL&lt;/a&gt;, to protest censorship on the Internet.&lt;/p&gt;
&lt;p&gt;The group says they are opposing laws including the 2008 Information Technology (Amendment) Act and the Information Technology (Intermediaries Guidelines) Rules of 2011, which they say unfairly restrict Internet freedom.&lt;/p&gt;
&lt;p&gt;On Saturday, the hackers will take their protest to the streets, with an Occupy Wall Street-style march called ”Operation Occupy India” planned in 17 cities including Mumbai, Delhi, Indore in Madhya Pradesh, Nagpur in Maharashtra and Kundapur in Karnataka. The group has requested all protestors to wear Guy Fawkes masks, the symbol of Anonymous.&lt;/p&gt;
&lt;p&gt;“This time the common man wants to help us,” an “anon,” which is what members of the group call themselves, told India Real Time.&lt;/p&gt;
&lt;p&gt;Anonymous, which has a global presence, catapulted to fame with its &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704457604576011873881591338.html"&gt;attacks on Visa, Mastercard and Paypal&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is how the group attacks Web sites: It overwhelms them with thousands of requests from different computer systems simultaneously. The Web site is unable to handle the load and crashes.&lt;/p&gt;
&lt;p&gt;The group intensified its attacks after Internet Service Providers like Reliance, MTNL and Airtel temporarily &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/05/18/vimeo-ban-more-web-censorship/"&gt;blocked file sharing sites like Vimeo&lt;/a&gt;, Dailymotion, Patebin and Pirate bay, citing a Court order.&lt;/p&gt;
&lt;p&gt;But many question the method used by Anonymous.&lt;/p&gt;
&lt;p&gt;“I don’t believe in defacing or hacking government Web sites to prove a point,” says Ankit Fadia, a cyber security expert. “You can’t hold the government ransom,” he adds.&lt;/p&gt;
&lt;p&gt;In an &lt;a class="external-link" href="http://opindia.posterous.com/open-letter-from-anonymous-to-government-of-i"&gt;open letter&lt;/a&gt; to the government, Anonymous India defended its actions. It wrote that traditional ways of protesting are losing meaning and this is a new method to pressure the politicians.&lt;/p&gt;
&lt;p&gt;Members of the group say that like a regular protest on the street, they too block the infrastructure of their opponents. Except in this case, the infrastructure is located in cyberspace.&lt;/p&gt;
&lt;p&gt;This is a “geek method of attacking,” said the anon who spoke to India Real Time. The group does not plan to attacks sites like that of the Indian railways, for instance, which is used by the masses, he explained.&lt;/p&gt;
&lt;p&gt;But not everyone is convinced.&lt;/p&gt;
&lt;p&gt;The group attacked the Web site of India’s Supreme Court even when it says it does not attack Web sites used by the common man, says Pranesh Prakash, Program Director of the Center for Internet and Society.&lt;/p&gt;
&lt;p&gt;The IT Act is another reason Anonymous is protesting. The Act gives the government the power to remove content it finds offensive. The government can also restrict public access to a Web site.&lt;/p&gt;
&lt;p&gt;Anonymous is also protesting the &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;Intermediary Guidelines of 2011&lt;/a&gt;. According to this Act, a site that hosts offensive content will have to remove it within 36 hours of a complaint against it.&lt;/p&gt;
&lt;p&gt;As a result, Web sites like Google and Facebook are &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304746604577381791461076660.html%20%20%E2%80%9CThis%20government%20does%20not%20stand%20for%20censorship;%20this%20government%20does%20not%20stand%20for%20infringement%20of%20fr"&gt;facing criminal cases&lt;/a&gt; for hosting objectionable content on their site.&lt;/p&gt;
&lt;p&gt;“This government does not stand for censorship; this government does not stand for infringement of free speech. Indeed, this government does not stand for regulation of free speech,” Kapil Sibal, the Communications and Information Technology Minister told the Rajya Sabha, or the upper house of the Indian Parliament, last month.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash, of the Center for Internet and Society told India Real Time that he does not believe that Anonymous will influence policy makers. He says that the main aim of a protest is to get media attention, and in turn get the attention of the people.&lt;/p&gt;
&lt;p&gt;But he agrees that India’s cyber laws are “hopelessly flawed” and create a framework by which not only the government but &lt;a class="external-link" href="http://kafila.org/2012/01/11/invisible-censorship-how-the-government-censors-without-being-seen-pranesh-prakash/"&gt;everyone can censor&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;He adds, “The laws are a greater threat than Anonymous.”&lt;/p&gt;
&lt;p&gt;Photo Source: Joel Saget/Agence France-Presse/Getty Images&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace'&gt;https://cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T04:02:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership">
    <title>Guru-G Learning Labs and CIS A2K Institutional Partnership</title>
    <link>https://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership</link>
    <description>
        &lt;b&gt;Incorporated in 2013, Guru-G is the world’s first gamified platform for teaching and teacher training.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Guru-G converts existing textbooks and teacher resources into adaptive teaching packs (or guided lesson plans), which provide in-class guidance to teachers on different ways in which they can teach a topic. The guidance adapts to the teacher’s past behavior, student moods &amp;amp; the practices that have resulted in best learning outcomes for their students. These packs save preparation time &amp;amp; effort for a teacher before class plus make teaching fun and interesting during and after class. Teachers can also track their progress and train at their own pace if interested.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;&lt;strong&gt;Rationale for Institutional partnership:&lt;/strong&gt;&lt;br /&gt;A2K aimed at developing additional resources that would supplement the learning curve of students at High school and undergraduate levels. The partnership also aimed to build digital research skills into the students so as to equip them for the new modes of knowledge aggregators.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;Both Guru-G labs and CIS work at the intersection of technology, education and social empowerment, it was planned that due to the mutual interests, the partnership will be able to identify a large group of Wikipedia users in Kannada and it was hoped that of these new generation readers some of the students would be trained as Wikipedians. Contribution towards Wikisource was also discussed in the MoU.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;&lt;strong&gt;Plan of Action:&lt;/strong&gt;&lt;br /&gt;Due to the internal team movement and shortage of manpower from at CIS, we were unable to work closely with the Guru-G Lab. However, we have recently restarted our conversations with them.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;&lt;strong&gt;Plans for Future:&lt;/strong&gt;&lt;br /&gt;As Guru-G Learning Labs provide platforms to collaboratively discuss ideas, A2K team, would like to use this partnership in designing our training activities.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;Nature of collboaration and rolling out of resources for better implementation of Wikipedia in Education programme run by CIS-A2K. CIS-A2K will work with educational institutions, developmental organisations and teachers who have already been identified by Guru-G labs and provide to them resources such as Offline Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;" class="Standard"&gt;Training programmes may be designed and customised for Wikipedia in Education programme run by CIS-A2K across different colleges. Creating platforms and activities for A2K's community capacity building activities such as TTT and MWTTT.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership'&gt;https://cis-india.org/a2k/blogs/guru-g-learning-labs-and-cis-a2k-institutional-partnership&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Educational Resources</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    

   <dc:date>2015-12-15T07:52:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish">
    <title>Guru Gomke is a Stylish Ol Chiki Typeface for India’s Santali Speakers</title>
    <link>https://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="https://eyeondesign.aiga.org/guru-gomke-is-a-stylish-ol-chiki-typeface-for-indias-santali-speakers/"&gt;published by AIGA.org &lt;/a&gt;on November 29, 2016. Subhashish Panigrahi was consulted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Back story:&lt;/b&gt; Ever met a teenaged girl yearning to be a typeface  designer? Yes? Then perhaps you know Pooja Saxena, who recognized her  life’s calling when she was still in high school. Saxena went on to  study with type historian and designer &lt;a href="http://eyeondesign.aiga.org/how-to-design-typefaces-in-a-language-you-cant-speak/" target="_blank"&gt;Fiona Ross&lt;/a&gt; at the University of Reading in the UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea for Guru Gomke came from a chat she had with Panigrahi,  whose work with the Access to Knowledge (A2K) Program at the Centre for  Internet and Society in Bangalore underscored the lack of tools and  resources available for India’s minority languages online. For example, &lt;a href="https://en.wikipedia.org/wiki/Ol_Chiki_alphabet" target="_blank"&gt;Ol Chiki&lt;/a&gt; is  the alphabet needed to write the language Santali, used by over 5  million people in India and its neighboring countries. “At the time of  our conversation, we couldn’t find a single Unicode-compliant font in  the script—forget a typeface family with a bold or an italic. [&lt;a href="http://eyeondesign.aiga.org/google-and-montype-unite-to-digitize-all-the-languages-of-humanity/" target="_blank"&gt;Noto Sans Ol Chiki&lt;/a&gt;,  in regular and bold, has since been released]. Subhashish mentioned all  these minority scripts in India that people can’t use because fonts  and keyboards for them don’t exist,” Saxena says. “I was enthusiastic to  help create a free open-source typeface family and input methods in Ol  Chiki, and thanks to Subhashish’s work with A2K, he was able to make  it happen.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why’s it called Guru Gomke? &lt;/b&gt;Guru Gomke is a title of respect for &lt;a href="http://www.worldlibrary.org/articles/eng/pandit_raghunath_murmu" target="_blank"&gt;Pandit Raghunath Murmu&lt;/a&gt;,  creator of the Ol Chiki script in the early 20th century. The  name translates to “great teacher.” It was recommended to Panigrahi by  one of the language experts consulted by the designers, and they  found it a wonderful nod to the history of the script.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are its distinguishing characteristics? &lt;/b&gt;Its very existence, frankly. It’s now one of just two Unicode-compliant fonts with both bold and italic character sets.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What should I use it for? &lt;/b&gt;Next time you need to set absolutely anything in Ol Chiki.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What other typefaces do you like to pair it with?&lt;/b&gt; Matched to &lt;a href="https://fonts.google.com/specimen/Source+Sans+Pro" target="_blank"&gt;Source Sans Pro&lt;/a&gt; visually and proportionally, these two fonts are visually harmonic used  anywhere Ol Chiki and Latin texts have to work together. In fact, the  Latin glyphs included in Guru Gomke are derived from Source Sans Pro.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish'&gt;https://cis-india.org/a2k/news/eye-on-design-aiga-guru-gomke-is-stylish&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-12-01T14:56:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition">
    <title>Gujarati Wikipedia Article Competition – 10 schools, 200 students, 20 articles on Gujarati Wikipedia	</title>
    <link>https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition</link>
    <description>
        &lt;b&gt;This was a competition to raise Wikipedia awareness and help students discover the joy of writing articles in their native language and an attempt to connect producers having knowledge in Gujarati to a wide audience of more than four lakh readers.  &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;&lt;a href="http://gu.wikipedia.org/wiki/%E0%AA%B5%E0%AA%BF%E0%AA%95%E0%AA%BF%E0%AA%AA%E0%AB%80%E0%AA%A1%E0%AA%BF%E0%AA%AF%E0%AA%BE:%E0%AA%AA%E0%AB%8D%E0%AA%B0%E0%AA%9A%E0%AA%BE%E0%AA%B0-%E0%AA%AA%E0%AB%8D%E0%AA%B0%E0%AA%B8%E0%AA%BE%E0%AA%B0/%E0%AA%B6%E0%AA%BE%E0%AA%B2%E0%AB%87%E0%AA%AF_%E0%AA%A8%E0%AA%BF%E0%AA%AC%E0%AA%82%E0%AA%A7_%E0%AA%B8%E0%AB%8D%E0%AA%AA%E0%AA%B0%E0%AB%8D%E0%AA%A7%E0%AA%BE"&gt;The Gujarati Wikipedia article writing competition&lt;/a&gt; was held among 10 Gujarati medium schools of Ahmedabad city in Gujarat with the support and cooperation of &lt;a href="http://www.theopenpage.co.in/"&gt;The Open Page&lt;/a&gt; publication and &lt;a href="http://www.gujaratilexicon.com/"&gt;Gujarati Lexicon&lt;/a&gt; in two phases over a period of two months.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Initial discussions about doing something to promote  Gujarati language on the internet started when Shiju Alex, Indian  language Wikipedia consultant met Yatrik Patel from &lt;a href="http://www.inflibnet.ac.in/"&gt;Inflibnet&lt;/a&gt;. With Mr Yatrik Patel's intervention we were able to meet Mr Archit Bhatt, the director of &lt;a href="http://www.tripada.com/TET/ContactUs.aspx"&gt;Tripada Education Trust&lt;/a&gt; in Ahmedabad. ﻿&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;After a round of presentations from Wikipedians,  Gujarati Lexicon and interested schools in August, we charted out a  rough sketch of the article competition. Then, this plan was proposed to  Gujarati editors online. Again, without the cooperation and  encouragement of long term members like Mr Dhaval S Vyas, Mr Ashok  Modhvadia, Mr Sushant Savla and Mr Maharshi Mehta, these students would  not have had the freedom to make mistakes and learn as they progressed.  Apart from these online members, constant guidance and support was  provided by Mr Ashok Vaishnav, Mr Harsh Kothari and Mr Konarak Ratnakar.  They coordinated with Ms Hemangini Kanth from The Open Page and Ms  Shruti from Gujarati Lexicon to materialize the competion.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Structure&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Phase I: Over 200 students from the ten schools were invited to write articles with references on Gujarati literary personalities (poets and writers) on paper. These entries were then collected and checked by Mr Yogendra Vyas, a consultant to &lt;a href="http://www.gseb.org/"&gt;GSEB&lt;/a&gt; (Gujarat Education Board) and Mr Ashok Vaishnav.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gujaratityping.png" alt="Gujarati typing" class="image-inline" title="Gujarati typing" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: left; "&gt;&lt;i&gt;The above picture shows a student learning Gujarati typing&lt;/i&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Phase II: 20 students were selected from these  entries and invited for a workshop on Gujarati typing, introduction to  GU WP and were briefed on how to write articles. Once the deadline was  over, these on-wiki articles were checked by Mr Dhaval Vyas and Mr Ashok  Modhvadia and two winner entries were selected. They were subsequently  awarded trophies and certificates in a small ceremony on 21&lt;sup&gt;st&lt;/sup&gt; October.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Here is a &lt;a href="http://gu.wikipedia.org/wiki/%E0%AA%B5%E0%AA%BF%E0%AA%95%E0%AA%BF%E0%AA%AA%E0%AB%80%E0%AA%A1%E0%AA%BF%E0%AA%AF%E0%AA%BE:%E0%AA%AA%E0%AB%8D%E0%AA%B0%E0%AA%9A%E0%AA%BE%E0%AA%B0-%E0%AA%AA%E0%AB%8D%E0%AA%B0%E0%AA%B8%E0%AA%BE%E0%AA%B0/%E0%AA%B6%E0%AA%BE%E0%AA%B2%E0%AB%87%E0%AA%AF_%E0%AA%A8%E0%AA%BF%E0%AA%AC%E0%AA%82%E0%AA%A7_%E0%AA%B8%E0%AB%8D%E0%AA%AA%E0%AA%B0%E0%AB%8D%E0%AA%A7%E0%AA%BE/%E0%AA%B2%E0%AB%87%E0%AA%96%E0%AB%8B%E0%AA%A8%E0%AB%80_%E0%AA%AF%E0%AA%BE%E0%AA%A6%E0%AB%80"&gt;list of articles&lt;/a&gt; written by the students.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Learnings&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Given that this was a pilot program and I have read about only one such prior &lt;a href="http://en.wikipedia.org/wiki/Papat_Limpad"&gt;attempt in Javanese Wikipedia&lt;/a&gt;, we had much to learn:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;It was a wise 	decision to take  primary speakers of Gujarati because their 	proficiency in spelling,  punctuation and vocabulary was good. This 	may not be possible for  students with Indian languages as secondary 	language.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While we had 	estimated a maximum of  one month's time, it took us nearly two 	months to accomplish it because  of the huge number of entries. 	Perhaps, the work should be distributed  amongst more people.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The biggest 	 challenge that lies ahead is retaining these editors – we are 	working  to get feedback from students to see how this could have 	been better  and what attracted them about Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/G1.png" alt="G1" class="image-inline" title="G1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This competition has given the community a batch of  new editors along  with valuable content and we hope to retain the  momentum by engaging  more Gujarati students further.&lt;/p&gt;
&lt;p&gt;Click below to download the posters&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-article-competition.pdf" class="internal-link"&gt;Wikipedia Article Competition &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/home-images/openpage1low.png" class="internal-link"&gt;The Open Page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition'&gt;https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>noopur</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2012-11-04T02:12:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot">
    <title>Gujarat Wikipedia Education Program: Rajkot</title>
    <link>https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot</link>
    <description>
        &lt;b&gt;This report analyses a series of meetings and workshops held in Rajkot, a city in Gujarat, India during the month of October 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;I visited Gujarat for a few Wikipedia activities – including Wikipedia meets in the cities of Ahmedabad and Rajkot, interacted with students and teachers from various colleges as well as to successfully conclude the &lt;a href="http://gu.wikipedia.org/wiki/વિકિપીડિયા:પ્રચાર-પ્રસાર"&gt;Gujarati Wikipedia article writing competition&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I visited Rajkot on October 17, 2012 with two Wikipedians – Harsh Kothari and Konarak Ratnakar, both from Ahmedabad. We were scheduled to take up a small introductory lecture on contributing to Wikipedia at Christ College, Rajkot in the afternoon and meet up with other Gujarati Wikipedians from Rajkot and Junagadh later in the day. Fortunately, I was able to connect with Rashmikant Makwana, a teacher at TGS (The Galaxy School) in Rajkot. I had first met up with him during the photo walk – Wiki takes Ahmedabad in January 2012. He had shown a great deal of interest in doing something for his school students. Thanks to Mr. Makwana's prompt response and support, we visited three branches of &lt;a href="http://www.tges.org/index.php?option=com_content&amp;amp;task=view&amp;amp;id=49&amp;amp;Itemid=77"&gt;TGES (The Galaxy Education System)&lt;/a&gt; and had the opportunity of interacting with over 100 students from secondary and higher secondary divisions.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Interactions with TGES students&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;I got to read Mr. Makwana's email only after I reached Rajkot. He wrote that he spoke to a couple of teachers about our visit and their students were very eager to meet us as they had many questions about Wikipedia! I was pleasantly surprised because once we met these students (mostly 11&lt;sup&gt;th&lt;/sup&gt; standard, English medium students) we realized they had already tried their hand at editing and even creating articles! So, they had far more advanced queries like how to verify information on Wikipedia, what is the authenticity of information there, questions on notability and so on. Next, we were taken to the &lt;i&gt;vadi branch &lt;/i&gt;of the education group. These were children from fifth and sixth standards and who also had questions and better ones about stories of vandalism they had committed on Wikipedia! We told them how Wikipedia was one of the best ways of telling people about their culture, identities, city and language. Besides students, we also met teachers who taught Gujarati, History and Geography.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Interactions with Christ College students&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/GujaratiWikipedian.png/@@images/6d7409d5-a94e-49f6-9172-6508f80d72ba.png" title="Gujarati Wikipedian" height="208" width="156" alt="Gujarati Wikipedian" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Wikipedians giving lecture&lt;/i&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://www.christcollegerajkot.edu.in/"&gt;Christ College&lt;/a&gt; offers a variety of graduate courses. We were connected with their  faculty, Mr. Rushabh, by Umesh Joshi from the Open Page publication in  Rajkot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I am thankful to both of them for their support in gathering  their MBA students! Harsh Kothari, a Gujarati Wikipedian presented on  how one can contribute to Gujarati Wikipedia while Konarak helped them  in a live editing session. One question that everyone asked us was – WHY  do people edit Wikipedia?&lt;/p&gt;
&lt;p&gt;So, we called upon Jitendrasinh Chauhan, a  long-term Gujarati Wikipedian. He came up and spoke to them on how he  discovered Gujarati Wikipedia and has not only gained in terms of  knowledge but also friendships that he has made with fellow editors  across the state and overseas! We also explained the importance of  learning correct ways of editing to these students who might pursue  public relations as their professions.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 align="JUSTIFY"&gt;Meeting Wikipedians&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;The trip to Rajkot, apart from meeting a whole bunch of new people, was also about connecting offline with Gujarati Wikipedians. Their warmth and day long support in terms of logistics, context and guidance kept us enthused. I extend my gratitude to Jitendrasinh Chauhan and his friend Harsh, both Wikipedians for their help. They have also helped us establish a dialog with Saurashtra University where we hope to plan a two-day conference centered around Gujarati language and digitization.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;img src="https://cis-india.org/home-images/GUWPvisual.png" alt="Gujarati Wikipedia Participants" class="image-inline" title="Gujarati Wikipedia Participants" /&gt;&lt;br /&gt;&lt;i&gt;Given here is a network visualization infographic highlighting the key points&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 align="JUSTIFY"&gt;Videos&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Gujarati Wikipedia workshop at Christ college - 1&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/_jhc-Ymy5k4" width="300"&gt;&lt;/iframe&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Gujarati Wikipedia workshop at Christ College - 2&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/Jb6AF89STZU" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Write about your city on Gujarati Wikipedia &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/YJu2-gOHjaI" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot'&gt;https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>noopur</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-10-31T08:17:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu">
    <title>Guest Report: Bridging the Concerns with Recommending Aarogya Setu</title>
    <link>https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu</link>
    <description>
        &lt;b&gt;Keywords: Aarogya Setu, Constitutionality, Digital Contact Tracing, Location Data, Personal Data Protection Bill, 2019, Exemptions, Personal Data, Sensitive Personal Data, Mosaic Theory, Surveillance, Privacy, Governing Law, Necessity, Intensity of Review, disparate Impact, Proportionality

&lt;/b&gt;
        
&lt;p id="docs-internal-guid-8cd22a8f-7fff-cd1f-19b3-539a748e971f" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This report was edited and reviewed by Arindrajit Basu, Mira Swaminathan, and Aman Nair.Read the full report &lt;a class="external-link" href="http://cis-india.org/aarogya setu privacy"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;EXECUTIVE SUMMARY&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Aarogya Setu collects real-time location data of users every fifteen minutes to facilitate digital contact tracing during the Pandemic. It inter alia color-codes users indicating the extent of risk they pose based on their health status and predicts hotspots which are more susceptible to COVID-19. Its forecasts have reportedly facilitated the identification of 650 clusters of COVID-19 hotspots and predicting 300 emerging hotspots which may have been otherwise missed. In a welcome move, the source code of the application was recently made public. The initially-introduced mandate to use the application was reportedly diluted and a Protocol supplementing the privacy policy with additional safeguards was released. Despite these steps in the right direction, some key concerns continue to require alleviation through engagement. This Report seeks to constructively engage with these concerns towards making privacy safeguards governing its operability more consistent with international best practices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;First, the Report maps situations in which Aarogya Setu in fact remains mandatory (in Table 1) In these situations, there exists no restriction against private parties (e.g. employers, airlines, etc.) from indirectly making its use mandatory. Consequently, there is no real choice in determining the use of the application. Even where there exists a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the apn remains mandatory for practical purposes since there still exists an obligation to undertake due diligence towards making sure that every employee uses the application. In other words, this part of the report explains why it remains indirectly mandatory to use the application. This indirect mandate impedes the exercise of meaningful consent. This could be addressed through a notification directing that no one should be indirectly compelled to use the application. This part also acknowledges that even where a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the application.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Second, the report explains why the mandate to use the Application raises concerns in the first place: i.e. in the absence of transparency beyond the publication of the source code. The open-source code may not necessarily result in meaningful algorithmic transparency (since the processing in the models at the Government of India server continues to remain a black box) in respect of predictions made to determine appropriate health responses. Based on the source code per se, people are unable to verify the wherever there exists operability of the Application more meaningfully. Algorithmic transparency enables people to make an informed decision in using the Application by choice. The ability to make an informed decision is critical to the right to privacy. The right to privacy does not just mean drawing boundaries or creating limitations against any external interference. The right also includes the public’s right to know how an algorithm affects their lives. Given the centrality of transparency in the ability of the user to exercise their privacy better, beyond releasing the source code of Aarogya Setu, publicizing information about how predictions are made is important. This part acknowledges the limitations of transparency in that it can only facilitate identification of privacy harms and not really solve them by itself. Yet, it goes ahead and re-emphasises the inter-relationship of transparency and privacy, highlighting how it became a basis recently in striking down a government-used algorithm, which indicates incentive to increase transparency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Third, the report reviews whether based on the already-available information from the combined reading of the privacy policy and the protocol, the operability of the application seems consistent with best international practices in protecting user privacy. This part begins with an analysis of the privacy policy and the protocol, which indicate privacy concerns in relation to inter alia location data, followed by an explanation as to why there exists a reasonable expectation of privacy over location data (to establish a privacy intrusion). This is followed by structurally applying the proportionality test to identify necessary modifications to the current framework:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The 'legality' prong may be satisfied by a combined reading of the NDMA and the specificity in the delegated legislation, as has been done in the past particularly in the context of location tracking. However, it is suggested (in the recommendations section) that a statutory legislation comprehensively governing the operability of the Application is introduced to ensure predictability and permanency in the framework governing the operability of the Application as done internationally. Moreover, determining appropriate health responses to the Pandemic is indeed a legitimate interest that is sought to be achieved through the application&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Given the limitations of traditional methods of contact-tracing, digital contact tracing could perhaps be a suitable method of ascertaining appropriate health responses to the Pandemic subject to a comprehensive review of evidence on a regular basis to evaluate verifiably its effectiveness. Since the use of the application seems likely in the long run, its efficacy needs to be backed by concrete evidence which corroborates its accuracy and effectiveness such as statistical data on false positives and negatives that result from the application&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A careful reading of the combined reading of the Aarogya Setu privacy policy and the Protocol with Fair Information Protection Principles (‘FIPP’) indicates some inconsistencies with international best practices. The extent of inconsistency with best practices may not be considered the least restrictive and therefore necessary form in which digital contact tracing can be conducted in India&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Since the inconsistencies seem relatively more restrictive than necessary to facilitate digital contact tracing in India, a balancing of privacy and public health could result in the conclusion that the application is not ‘proportionate’ to the potential privacy harms that can result from using the application. While conducting the balancing exercise, privacy and public health should be viewed as complementary, not competing interests. This conception would encourage courts to consider privacy concerns with sufficient extent of intensity&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;Based on this analysis, the report concludes that digital contact tracing provided the following conditions (detailed in the ‘Recommendations’ section) are conjunctively satisfied:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Digital contact tracing should supplement (e.g. be in addition to) and not supplant (i.e. replace) traditional methods of contact tracing entirely, particularly for vulnerable groups (e.g. interviews where vulnerable groups, particularly marginalized women do not have access to mobile phones);&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A statutory law should be introduced which strictly and comprehensively governs the scope of the application,&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;the suitability of the application (with meaningful algorithmic transparency) should be corroborated by reliable and relevant statistical evidence (e.g. with the help of closer scrutiny of the basis of predictive outcomes) and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The privacy compromises using the application should be intrusive to the minimum extent possible. This could be done by further adding robust safeguards through stronger restrictions on sharing the collected data&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;(Final year undergraduate student of the National University of Juridical Sciences (NUJS), Kolkata with a sustained interest in law, technology and policy (graduating with the class of 2020).&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu'&gt;https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-24T05:19:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/guest-blog-retd-col-ashwin-baindur-on-strategy-wikimedia-strategy-salon-vijayawada">
    <title>Guest Blog: Retd. Col. Ashwin Baindur on Strategy, Wikimedia Strategy Salon, Vijayawada</title>
    <link>https://cis-india.org/a2k/blogs/guest-blog-retd-col-ashwin-baindur-on-strategy-wikimedia-strategy-salon-vijayawada</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p dir="ltr"&gt;&lt;span id="docs-internal-guid-a7485abf-4d48-578c-481d-9b1e9e1305a3"&gt;&lt;em&gt;User:AshLin aka Col Ashwin Baindur (retd) gave a Plenary Speech(in absentia) on Strategy at the Wikimedia Movement Strategy Salon, held in Vijayawada, Andhra Pradesh on 27 August 2017. It is reproduced here with permission:&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;Ladies and gentlemen, distinguished guests and my dear Wikimedia friends and colleagues,&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;I am deeply honoured to be asked to say the opening words for the Movement Strategy Salon being held today at Vijayawada. The problems of ill health prevent me from coming to be with you as I most dearly wish, but I do hope my few words and thoughts will make do instead. Let me introduce myself. I happen to be a retired army officer but I see myself as a citizen of the world, as a Wikipedian whose cherished dream is to make Jimmy Wales dream come true.&lt;/p&gt;
&lt;p&gt;“Imagine a world where the sum of all knowledge is available to all mankind!”&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;The occasion for this conclave or salon is timely. The twenty first century paradigm of Open Culture, of sharing and collective intelligence are well established. Crowdsourcing, Wikipedia, Creative Commons, Project Gutenberg, the Internet Archive and so many other important global resources are proof.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;Education has received a huge fillip by the vastly increased amounts of data and knowledge on the Internet. Open sourcing has made its mark in the software side of the business world. Just as has open access publishing in Academia. &amp;nbsp;Society as a whole has gained by all these manifestations of open culture.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;And today, we are gathered here to begin thinking on the directions for the future of the Wikimedia movement in India.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;What does this mean in our case? India is a country of many languages, dialects, people, communities, religions, tribes. Along with this are the collective efforts of 1.3 billion people to make a secular, democratic, economically strong nation. The ability to share learning, understanding, experiences are key to this process. And for this, collaboration is a vital necessity.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;As of now the Wikimedia effort in India consists of a potpourri of projects, encyclopedia, quote, text repository and the use of Wikimedia Commons as a media repository. We have to grow this into a large, useful and versatile resource in each of our Indic languages.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;The Wikimedians, a small band of volunteers to date, must take along the entire society of India so that we have betterment as a nation by first creating and using these resources. And today’s conclave with kindred souls from society, academia, industry.. is a beginning in this regard.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;Now we are here to think what directions this Movement must take. I am envious that I can’t be part of this process with you. However, as a retired military person, let me say a few words on strategy and how it is decided.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;All planning occurs at three levels. The most basic of activities to be done are referred to as tactics. Tactics are governed by operational planning which comprises of a worked out plan of how to achieve the overall plan or the goal.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;The deciding of this overall plan or goal is referred to as strategy.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;To be more specific..&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;“a high level plan to achieve one or more goals under conditions of uncertainty..”&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;And when we do this for a long period of the future, it is more appropriately termed as ‘grand strategy".&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;For this we have to ponder - What is our aim? What are our strengths? What are our challenges? What are our opportunities? What are our resources and what are our constraints? What path should we take to achieve our aim?&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;These are to be reduced into a few directions which are broad based, actionable and full of potential. A good strategy must open huge opportunities, new fields, new possibilities.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;The &amp;nbsp;is not easy to do or quick to make. It will take more than one session, more than one day, week or even a month to get our strategy right.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;Most important of all is that we learn to think in the new paradigm of sharing and open culture. We should leave behind the mindset of scarcity, possessiveness and personal benefit and embrace the values of the common good, creation of opportunities and innovation.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;On our success in making a good strategy, depends the fate of millions of our children and youth who will either benefit from our decisions or lose opportunities if we are not wise and generous. We have to believe in the future. We have to want to make that future great for our nation.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;I wish you the very best in this endeavour. I repeat, that I am envious that I can't be with you today. I pray that the things we decide from today onward in this process of grand strategy for the Wikimedia movement in the decades to come.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;At the very end, I would like to thank the Wikimedia movement in India, CIS-India, the organisers of this salon and of course, my young friend Krishna Chaitanya Velaga for this opportunity.&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;Jai Hind!&lt;/p&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/guest-blog-retd-col-ashwin-baindur-on-strategy-wikimedia-strategy-salon-vijayawada'&gt;https://cis-india.org/a2k/blogs/guest-blog-retd-col-ashwin-baindur-on-strategy-wikimedia-strategy-salon-vijayawada&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>manasarao</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-10-24T11:52:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/guerrilla-glam-an-alternate-way-of-doing-glam-in-indie-way">
    <title>Guerrilla GLAMː An alternate way of doing GLAM in indie-way</title>
    <link>https://cis-india.org/a2k/blogs/guerrilla-glam-an-alternate-way-of-doing-glam-in-indie-way</link>
    <description>
        &lt;b&gt; I have been working on a concept called the Guerrilla GLAM. Here is a very quick summary about the concept that was published in the GLAM-wiki newsletter for November.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://outreach.wikimedia.org/wiki/GLAM" title="GLAM"&gt;GLAM&lt;/a&gt; stands for cultural institutions like Galleries, Libraries, Archives  and Museums. It is a globally acclaimed free knowledge movement for  opening up cultural data using various free software platforms as a  tool. GLAM activities include collaboration with cultural institutions,  data mining, meta data and other documentation of institutional  collections, digitization of published works, records and artifacts, and  publishing the collected information in both human and machine readable  forms with open standards. Building partnership with GLAM institutions  is a great way of funneling the cultural content acquisition and  bringing open access to such valuable data. But it is not that easy  given the complications each country have in terms of formal agreement,  organizational framework, and dissemination of information. "Guerrilla  GLAM" techniques are based on the learning curve of institutional  partnership building for large scale GLAM projects and leveraging  personal contacts in small scale GLAM projects. It bring in several  frugal strategies for cutting cost implication and operating in flexible  modes. Guerrilla GLAM's range of work aims to accommodate people of  different core expertise and it targets small to large orgaizations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Guerrilla GLAM appeared first as a &lt;a class="text external" href="https://wikimania2015.wikimedia.org/wiki/Submissions/How_to_do_GuerillaGLAM"&gt;public presentation during Wikimania&lt;/a&gt; which I presented this year. It later interested many GLAM practitioners of New Zealand who organized a &lt;a class="text external" href="https://blogs.otago.ac.nz/openotago/2015/10/06/how-to-do-guerilla-glam/" rel="nofollow"&gt;webinar&lt;/a&gt; which provided a great platform to add many interesting ideas to my  existing set of ideas. Guerrilla GLAM is still a budding concept that  aims for being implemented by many cultural enthusiasts especially those  who would like to document much about the artifacts, digitize old text  from archives and manuscripts, and create meta data for institutional  collections. Guerrilla GLAM operates with zero or with some informal  institutional partnership with the institution and carried on the  shoulders of the Wikimedians. The Wikimedians seek out for support from  local communities, leverage the permissible access to institutional  property and to some extent the personal relations with the institutions  keeping the legal restrictions in mind, and do their best to acquire as  much data as possible. Often times, near to zero cost Guerrilla GLAM  projects with detailed planning with right kind of people on-board could  yield more or less the same like any conventional GLAM project.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the original published on &lt;a class="external-link" href="https://outreach.wikimedia.org/wiki/GLAM/Newsletter/November_2015/Contents/Special_story"&gt;Wikimedia Blog&lt;/a&gt; on November 25, 2015.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span id="comments"&gt; &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/guerrilla-glam-an-alternate-way-of-doing-glam-in-indie-way'&gt;https://cis-india.org/a2k/blogs/guerrilla-glam-an-alternate-way-of-doing-glam-in-indie-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2015-12-16T03:09:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham">
    <title>Govt narrative on Aadhaar has not changed in the last six years: Sunil Abraham</title>
    <link>https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham</link>
    <description>
        &lt;b&gt;The bill is basically the same as the UPA version, with some cosmetic changes, and some tokenism towards the right to privacy, says Abraham.&lt;/b&gt;
        &lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Shreeja Sen interviewed Sunil Abraham. The article was &lt;a class="external-link" href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html"&gt;published in Livemint &lt;/a&gt; on March 8, 2016.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The government’s bid to push financial inclusiveness and access to government services has received a fresh boost, with finance minister Arun Jaitley introducing a proposed law to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This project, which uses a person’s biometric data like fingerprints and iris scans to authenticate identity of people receiving subsidies and other state benefits, will move India towards a cashless economy and help digital initiatives such as biometric attendance, Pradhan Mantri Jan Dhan Yojana, digital certificates, pension payments and the proposed introduction of payments banks.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, 42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is executive director of Centre for Internet and Society, a Bengaluru-based think tank focusing on accessibility, access to knowledge, telecom and Internet governance. He has written extensively on the UID scheme, and the intersection of privacy and security. He founded Mahiti—an enterprise that aims to reduce the cost and complexity of information and communications technology for the voluntary sector by using free software.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar project has faced its share of roadblocks with cases challenging it pending before the Supreme Court. A constitution bench of the court will decide whether the right to privacy is a fundamental right and if Aadhaar violates it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Centre for Internet and Society, a Bengaluru-based policy research institute, is a critic of Aadhaar for several reasons. He explained his concerns in an interview. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Have any of the concerns regarding the Aadhaar project since its inception in 2009 been addressed?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever we complained about six or seven years ago, whatever complaints were made by the civil society...all of those complaints remain in the exact same situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing has changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What kind of concerns?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first thing to remember is that privacy and security are just two sides of the same coin. You cannot have one without the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our first concern with the project is centralization. Whenever you build an information system, and you create a central point of failure, then it will fail because the possibility of failure exists. The Internet has no central point of failure. That is why it is so difficult for you to bring the Internet down. Complaint number 2 is the opaque technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI keeps saying that “we have built a technology using a free software and open standard stack”. The first is a de-duplication software and the second one is the authentication software—those are the most important pieces of software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This software is proprietary and nobody knows how they work and nobody can independently audit them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third complaint is the use of an irrevocable and non-consensual authentication factor. In the UID scheme, the biometrics serve two purposes: it can be used to identify a citizen and it can be used to authenticate a transaction. Authentication factors, commonly known as passwords, should always be revocable. That means if the password is compromised, you should be able to change the password or at least say that this password is no longer valid. The use of biometrics eliminates those two important requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in most other authentication, the process of authentication ensures that you are consenting. For example, PIN (personal identity number) authentications. But suppose I am authenticating you through your irises, then as long as your eyes are open, the machine will think you’re authenticating. There’s no way of saying I don’t want to authenticate. Or if you’re sleeping, somebody can hold your fingers over a biometric reader and open your iPhone. So that’s complaint number three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fourth complaint from the privacy perspective is: there is a very important database that they don’t talk about. I call it the transactions database. Suppose there is somebody who is using the UIDAI service to authenticate a transaction, then UIDAI should keep a record of that successful or unsuccessful transaction authentication. That means you have been registered into the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You go to a fair price shop to purchase subsidized grain and at that fair price shop or ration shop, you use your finger on the biometric reader, and then the UIDAI system says “yes you are indeed who you say you are”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, at that point, later the shop should not be able to say X never came here, or X came twice. So, in order for them to not say all those things, a record should be made on the UID database, that on this day, from this geographical location, this particular biometric reader sent us X’s biometric template and asked if the template matched against X’s UID number...the transaction database can be used for profiling. They never talk about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They never tell us what that database holds and how long they’re keeping all those records. None of that is clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Does Aadhaar bill help assuage your doubts about the project?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government narrative has not changed in the last six years; the bill is basically the same as the UPA (United Progressive Alliance) version, with some cosmetic changes, and some tokenism towards the right to privacy. The proof that the technology is fallible is in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the technology was infallible, as the UIDAI would like us to believe, then the bill would not criminalize the following: (1) impersonation at the time of enrolment; (2) unauthorized access to the Central Identities Data Repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine that the bill admits that every Indian’s biometric can be stolen from one single centralized database. Now why don’t we have a similar offence for stealing all private keys from the Internet—we don’t because that is technical impossibility thanks to decentralization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore we don’t need a law to make (it) illegal. We’ve suggested changes to both the technology and the law. We’ve written seven open letters to the UIDAI, and we’ve never gotten any response. Very few of our concerns have been addressed. We’ve seen dogs getting UID, various other things getting UID, so there’s a lot of evidence that the system does not work. From Kerala we have stories of one person getting several UIDs, so we have no idea about technological feasibility of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of our distinguished fellows, Hans Varghese Mathews, has published an academic paper in the latest &lt;i&gt;EPW&lt;/i&gt; (&lt;i&gt;Economic and Political Weekly&lt;/i&gt;), by extrapolating UIDAI field trial data to national scale. He predicts that by the time the number crosses 1 billion, every time UIDAI tries to register someone new, they will match with about 850 people already in the database positively. So, the unique identification capability of the UIDAI will not scale above the billion. The consequence of the technology failing is not trivial. If someone replaces your biometrics in the central database, then the onus is on you to prove that you are a resident of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously, human beings determined the answer to this question, and they had to find proof that you were not a resident. Now, a fallible technology will be asked to answer this important question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Isn’t the basic function of the Aadhaar project to ensure that benefits reach the person they are meant for, and it’s easier for people to get an identity proof for those who have no other ID, like migrant workers?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two responses: is it good anti- corruption technology? Unfortunately not, because it is intended at retail fraud. The person under surveillance is very poor. But the person responsible for corruption is not poor. So, I believe you should be surveilling those responsible for corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I had said is UID should be first given to every single bureaucrat and every single politician in the country. From Delhi till the Panchayat office, till the ration shop in the village, that supply chain must be monitored and documented using cryptography, so that nobody can deny anything. We need non-repudiatable audit trail from New Delhi to the village because according to all analyses, that is where the theft is happening—in the supply chain. The villager who is taking false benefits, that is called retail fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bulk of the fraud is actually wholesale fraud. Please tackle wholesale fraud using non-repudiatable public audit trail from New Delhi to the village first, before you start surveilling the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point is that people find it easy to get the UID. That is fine, but there is a problem; that it’s not uniquely identifying anybody. So, people will keep registering and the UID system will keep giving them more and more UIDs because there are no human checks and balances. Because you’ve gone with a pure technological solution, it’s very easy to fool (the system).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, the ease of registration has not served the purpose.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham'&gt;https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T16:37:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/govt-legalising-parallel-import">
    <title>Govt for legalising parallel import of copyright works; publishers oppose</title>
    <link>https://cis-india.org/a2k/blogs/govt-legalising-parallel-import</link>
    <description>
        &lt;b&gt;This article by Shamnad Basheer was published in the Economic Times on 17 March 2011.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/govt-legalising-parallel-import'&gt;https://cis-india.org/a2k/blogs/govt-legalising-parallel-import&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-30T04:24:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship">
    <title>Government to hold talks with stakeholders on Internet censorship </title>
    <link>https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship</link>
    <description>
        &lt;b&gt;In an unprecedented move, the government, through the Department of Telecommunications and the Department of Electronics and Information Technology, has agreed to initiate dialogue on Internet censorship with mega Internet companies, social media giants such as Google and Facebook, members of civil society, technical community, media, ISPs and legal experts.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Shalini Singh was &lt;a class="external-link" href="http://www.thehindu.com/news/national/article3856121.ece"&gt;published&lt;/a&gt; in the Hindu on September 4, 2012. Pranesh Prakash's analysis is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The triggers for the discussion, which will be held on Wednesday, are the riots in Assam, Mumbai and Uttar Pradesh, as well as the mass exodus of north-east Indians from Bangalore, which resulted in bringing the government, civil society organisations and the media to a flashpoint.&lt;br /&gt;&lt;br /&gt;Two of India’s seniormost officers in the area of Internet censorship, DoT Secretary R. Chandrashekhar and Director General, CERT-IN, Gulshan Rai will engage with a range of stakeholders in a two-hour meeting titled ‘Legitimate Restrictions on Freedom of Online Speech: The need for balance – from Deadlock to Dialogue.’&lt;br /&gt;&lt;br /&gt;Other panellists include representatives from Google and Facebook; Pranesh Prakash from the Centre for Internet and Society (a civil society group); Prabir Purkayasta, Delhi Science Forum (technical community); Paranjoy Guha Thakurta, president, Foundation for Media Professionals; Rajesh Chharia, president, Internet Service Providers Association of India; and Apar Gupta, an advocate dealing with cyber issues.&lt;br /&gt;&lt;br /&gt;One analysis by the CIS has shown that 309 specific items, including URLs, Twitter accounts, IMG tags, blog posts and blogs were blocked. Complaints arose when blocking a page resulted in the blocking of an entire website — which has scores or hundreds of web pages. The government maintained that this was necessary as there was a sense of crisis. Home Minister Sushil Kumar Shinde insisted that the government was “taking strict action only against those accounts or people which are causing damage or spreading rumours.” However, the collateral damage of the move was the Twitter accounts of several people, including journalists like Kanchan Gupta, being blocked.&lt;br /&gt;&lt;br /&gt;“Mass censorship is like killing a fly with a sledgehammer. Rather than blocking the sites, the government should have used the same media, Facebook, Twitter and Google to counter terrorism and hate speech. I am glad that they are now open to dialogue,” says Mr. Thakurta.&lt;br /&gt;&lt;br /&gt;“It is an extremely productive move as it will generate awareness among content providers, government and users. In the absence of any dialogue, everyone was just sticking to their own positions without listening to the other stakeholders’ point of view,” says Mr. Chharia.&lt;br /&gt;&lt;br /&gt;The meeting is to bring several stakeholders in dialogue on a single platform.&lt;br /&gt;&lt;br /&gt;Nearly 50 other experts from industry, mobile service providers, Internet companies, intermediaries, academia and some international organisations as well as multilaterals are expected to join the conference, which will be held at 2.30 p.m. on September 4 at FICCI.&lt;br /&gt;&lt;br /&gt;While this is seen as a brave attempt by some, there are an equal number of sceptics who believe that the discussion may not yield the desired result given the national security objectives governing law enforcement agencies on the one hand and the desire of users, media and civil society to preserve free speech on the other. Clearly, ISPs, Internet companies and social media are in a tough spot since they face legal obligations on legitimate orders for blocking on one hand while needing to protect their user privacy and rights to unhindered access to information.&lt;br /&gt;&lt;br /&gt;If successful, it is possible that this dialogue will ensure that legitimate restrictions do not slide into illegitimate censorship.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship'&gt;https://cis-india.org/news/www-the-hindu-com-shalini-singh-sep-4-2012-govt-to-hold-talks-with-stakeholders-on-internet-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-04T03:39:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge">
    <title>Government of Odisha adopting Creative Commons License to Promote Transparency and Access to Knowledge</title>
    <link>https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge</link>
    <description>
        &lt;b&gt;This year started with an astonishing announcement by the Government of Odisha towards the free knowledge movement. On the Public Domain day, which is celebrated every year on 1st January, The Government of Odisha continuing its collaboration with the Odia Wikipedia community has announced to release the content of its two major departments under Creative Commons license.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/NPFB1.jpg/@@images/949ffb09-6c7a-4167-b7c8-b9cb1684e22a.jpeg" alt="Naveen Patnaik" class="image-inline" title="Naveen Patnaik" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Last year, the Government of Odisha became the first state government in India to release their social media content under free license and released the content of &lt;/span&gt;&lt;a href="https://blog.wikimedia.org/2017/09/18/odisha-social-media-free-license/"&gt;its 8 social media accounts&lt;/a&gt;&lt;span&gt; and the &lt;/span&gt;&lt;a href="https://blog.wikimedia.org/2017/07/28/digest-asia-athletics-championships/"&gt;website of 2017 Asian athletics Championships&lt;/a&gt;&lt;span&gt; under CC-BY-4.0 international license, which has overall helped in adding &lt;/span&gt;&lt;a href="https://tools.wmflabs.org/glamtools/glamorous.php?doit=1&amp;amp;category=Images+from+Odisha2017.games&amp;amp;use_globalusage=1&amp;amp;ns0=1&amp;amp;projects[wikipedia]=1&amp;amp;projects[wikimedia]=1&amp;amp;projects[wikisource]=1&amp;amp;projects[wikibooks]=1&amp;amp;projects[wikiquote]=1&amp;amp;projects[wiktionary]=1&amp;amp;projects[wikinews]=1&amp;amp;projects[wikivoyage]=1&amp;amp;projects[wikispecies]=1&amp;amp;projects[mediawiki]=1&amp;amp;projects[wikidata]=1&amp;amp;projects[wikiversity]=1"&gt;207 distinct images&lt;/a&gt;&lt;span&gt; into various Wikipedia projects.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The decision about the relicensing of the content was announced to the public in a &lt;/span&gt;&lt;a href="https://twitter.com/IPR_Odisha/status/947805003611217920"&gt;tweet &lt;/a&gt;&lt;span&gt; by the twitter account of  the Information and Public Relations department (I&amp;amp;PR) which says “On the occasion of Public Domain Day, the website and social media feeds of I&amp;amp; PR Department are being licensed under Creative Commons which means all content on the website and social media accounts are now free for public usage. That includes photographs, videos, government publications and much more. This is in continuation with State Government’s principles of Teamwork, Transparency &amp;amp; Technology for bringing about Transformation.”&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The two departments announced by the state Government to be the part of the collaboration are Information and Public Relations department; that informs the public on the plans, policies and Programmes of the Government. The I&amp;amp;PR department also publishes 2 state magazines, &lt;a href="http://magazines.odisha.gov.in/utkalprasanga/utkalprasanga.htm"&gt;Utkala Prasanga&lt;/a&gt;, a state magazine published in Odia language and &lt;a href="http://magazines.odisha.gov.in/Orissareview/orissareview.htm"&gt;Odisha Review&lt;/a&gt;, a 72 years old state magazine published in English language. Also the ST&amp;amp;SC Development department; which works for the welfare of the backward and minority communities in Odisha. This department holds a major source of information in the form of &lt;a href="http://www.stscodisha.gov.in/Advasi.asp?GL=publication&amp;amp;PL=1"&gt;Adivasi journal&lt;/a&gt; and &lt;a href="http://www.stscodisha.gov.in/ResearchInst.asp?GL=publication&amp;amp;PL=2"&gt;research papers&lt;/a&gt; on Indigenous community of Odisha  from its Research and Training institute. Most importantly, the social media accounts along with the websites are released under the Creative Commons license. Social media channels are updated on a daily basis and provides fresh content everyday about different collaborations of the Government.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In near future, the Government of Odisha is also planning to release content of some major departments under open license for people to access the information for free.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge'&gt;https://cis-india.org/a2k/blogs/government-of-odisha-adopting-creative-commons-license-to-promote-transparency-and-access-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sailesh Patnaik</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-01-18T01:22:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/government-of-indias-response-to-wgec-questionnaire-1">
    <title>Government of India's Response to WGEC Questionnaire </title>
    <link>https://cis-india.org/internet-governance/resources/government-of-indias-response-to-wgec-questionnaire-1</link>
    <description>
        &lt;b&gt;The Working Group on Enhanced Cooperation circulated a questionnaire to collect the views and positions of the stakeholders on the various aspects of enhanced cooperation. India's response to the questionnaire is documented below for archival purposes. &lt;/b&gt;
        
&lt;div id="parent-fieldname-text" class="plain"&gt;
&lt;p style="text-align: justify;"&gt;INDIA, Permanent Mission of India to the United Nations Office&lt;br /&gt;9, RUE DU VALAIS, 1202, GENEVA&lt;br /&gt;Mission.india@ties.itu.int&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1.&lt;/strong&gt; &lt;strong&gt;Which stakeholder category do you belong to?&lt;/strong&gt;&lt;br /&gt;Government&lt;br /&gt;If non-government, please indicate:&lt;br /&gt;If non-government, please indicate if you are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;2. What do you think is the 
significance, purpose and scope of  enhanced cooperation as per the 
Tunis Agenda? 1) Significance 2) Purpose 3) Scope&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;&lt;li&gt;Significance&lt;br /&gt;The World Summit 
on Information Society (WSIS),  held in two phases had discussed the 
issues relating to Internet  Governance at a great length and in detail 
and recommended (i) convening  a new forum for multi-stake holder policy
 dialogue and (ii) beginning  the process towards Enhanced Cooperation. 
As a result of the first  recommendation, an Internet Governance Forum 
was established in 2006 as a  forum for dialogue among various 
stakeholders. However, the process  towards Enhanced Cooperation to 
develop international public policy  issues pertaining to Internet in a 
fair and equitable manner is yet to  take off. The use of internet and 
its socio-economic impact has grown  further in the last few years. This
 has made the need for Enhanced  Cooperation even more significant and 
urgent.&lt;/li&gt;&lt;li&gt;Purpose&lt;br /&gt;The  purpose of Enhanced Cooperation is to enable 
governments, on an equal  footing, through a suitable multilateral, 
transparent and democratic  mechanism, to carry out their roles and 
responsibilities in  international public policy issues pertaining to 
the Internet, in  consultation with all other stakeholders.&lt;/li&gt;&lt;li&gt;Scope&lt;br /&gt;The scope of  Enhanced Cooperation covers international 
public policy issues  pertaining to the internet as well as the 
development of  globally-applicable principles on public policy issues 
pertaining to the  coordination and management of critical internet 
resources, but not the  dayto-day technical and operational matters, 
that do not impact on  international public policy issues.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;3. To what extent has or has 
not enhanced cooperation been  implemented? Please use the space below 
to explain and to provide  examples to support your answer.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Enhanced Cooperation, as envisaged in 
Paras 68 and 69 of the Tunis  Agenda, has not been realized. This 
remains a major shortcoming in  implementation of WSIS Outcomes related 
to Enhanced Cooperation,  considering that a specific mandate was given 
by the World Summit for  Information Society (WSIS) in 2005 to begin 
such a process of Enhanced  Cooperation in the first quarter of 2006. 
There is no multilateral,  transparent and democratic global platform 
where governments can, on an  equal footing, decide the full range of 
international public policies  related to internet, in a holistic 
manner. There is also no mechanism  for the development of 
globally-applicable principles on public policy  issues including those 
pertaining to coordination and management of  critical Internet 
resources. Not establishing an Enhanced Cooperation  process has denied 
the Governments an opportunity to carry out their  roles and 
responsibilities in international public-policy issues  pertaining to 
the internet.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;4. What are the relevant international public policy issues pertaining to the Internet?&lt;/strong&gt;&lt;br /&gt;The
  Working Group on Internet Governance set up by WSIS identified many  
public policy issues pertaining to internet, which continue to be  
relevant today, as listed below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt; Issues relating to infrastructure
 and the management of critical  Internet resources, including 
administration of the domain name system  and Internet protocol 
addresses (IP addresses), administration of the  root server system, 
technical standards, peering and interconnection,  telecommunications 
infrastructure, including innovative and convergent  technologies, as 
well as multilingualization;&lt;/li&gt;&lt;li&gt;Issues relating to the use of the Internet, including spam, network security and cybercrime;&lt;/li&gt;&lt;li&gt;Issues that are relevant to the Internet but have an impact much 
wider  than the Internet and for which existing organizations are 
responsible,  such as intellectual property rights (IPRs) or 
international trade;&lt;/li&gt;&lt;li&gt;Issues relating to the developmental aspects of Internet governance, in  particular capacity building in developing countries;&lt;/li&gt;&lt;li&gt;Issues  relating to interconnection costs, meaningful participation 
in global  policy development, freedom of expression, Data protection 
and privacy  rights, Consumer rights, convergence and “next generation 
networks”  (NGNs), as well as trade and e-commerce; Furthermore, Para 59
 of the  Tunis Agenda recognised that Internet Governance includes 
social,  economic and technical issues including affordability, 
reliability and  quality of service and para 60 of the Tunis Agenda 
recognised that there  are many cross-cutting public policy issues that 
require attention.  Since WSIS, international internet-related public 
policy issues have  only grown in their number as well as importance. 
Several issues such as  cloud computing have emerged in the last few 
years. Newer issues will  keep arising with significant international 
public policy dimensions as  the Internet continues to evolve and grow 
in its reach and spread.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;5. What are the roles and 
responsibilities of the different  stakeholders, including governments, 
in implementation of the various  aspects of enhanced cooperation?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Enhanced Cooperation is a dynamic 
process due to the dynamic nature  of internet. As a result, the roles 
and responsibilities of different  stakeholders would need to be broadly
 defined. In this regard, we concur  with the recommendations of the 
Working Group on Internet Governance on  the role of different 
stakeholders — as listed below: Governments:  Public authority for 
Internet related public policy issues is the  sovereign right of States 
and that they have rights and responsibilities  for international 
Internet public policy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Their roles and responsibilities include:-&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Public policy-making  and 
coordination and implementation, as appropriate, at the national  level,
 and policy development and coordination at the regional and  
international levels; &lt;/li&gt;&lt;li&gt;Creating an enabling environment for information  and communication 
technology (ICT) development; Oversight functions;  Development and 
adoption of laws, regulations and standards; &lt;/li&gt;&lt;li&gt;Treaty-making; Development of best practices; Fostering  capacity-building in and through ICTs; &lt;/li&gt;&lt;li&gt;Promoting research and  development of technologies and standards; &lt;/li&gt;&lt;li&gt;Promoting access to ICT  services; Combating cybercrime; &lt;/li&gt;&lt;li&gt;Fostering international and regional  cooperation; &lt;/li&gt;&lt;li&gt;Promoting the development of infrastructure and ICT  applications; &lt;/li&gt;&lt;li&gt;Addressing general developmental issues; &lt;/li&gt;&lt;li&gt;Promoting  multilingualism and cultural diversity;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Dispute resolution and arbitration.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Private sector: The private sector has important role and responsibilities which include the following:-&lt;br /&gt;Industry
  self-regulation; Development of best practices; Development of policy 
 proposals, guidelines and tools for policymakers and other 
stakeholders;  Research and development of technologies, standards and 
processes;  Contribution to the drafting of national law and 
participation in  national and international policy development; 
Fostering innovation;  Arbitration and dispute resolution; Promoting 
capacity-building.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Civil society: Civil society has also 
played an important role on  Internet matters especially at the 
community level and should continue  to play such roles. The roles and 
responsibilities of civil society  include:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Awareness-raising and capacity-building (knowledge,  training, skills sharing); &lt;/li&gt;&lt;li&gt;Promoting various public interest objectives;  Facilitating network-building; Mobilizing citizens in democratic  processes; &lt;/li&gt;&lt;li&gt;Bringing perspectives of marginalized groups, including, for  example, excluded communities and grass-roots activists; &lt;/li&gt;&lt;li&gt;Engaging in  policy processes; Contributing expertise, skills, experience and  knowledge in a range of ICT policy areas; &lt;/li&gt;&lt;li&gt;Contributing to policy  processes and policies that are more 
bottom-up, people-centred and  inclusive; Research and development of 
technologies and standards;  Development and dissemination of best 
practices; &lt;/li&gt;&lt;li&gt;Helping to ensure  that political and market forces are accountable to the needs of all  members of society;&lt;/li&gt;&lt;li&gt;Encouraging social responsibility and good  governance practice. 
Advocating for the development of social projects  and activities that 
are critical but may not be “fashionable” or  profitable; &lt;/li&gt;&lt;li&gt;Contributing to shaping visions of human-centred information  
societies based on human rights, sustainable development, social  
justice and empowerment.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the contribution to 
the  Internet of the academic community is very valuable and constitutes
 one  of its main sources of inspiration, innovation and creativity.  
Similarly, the technical community and its organizations are deeply  
involved in Internet operation, Internet standard-setting and Internet  
services development. Both of these groups make a permanent and valuable
  contribution to the stability, security, functioning and evolution of 
 the Internet. They interact extensively with and within all stakeholder
  groups. The para 35 of the Tunis Agenda recognises the role of  
intergovernmental organizations in facilitating the coordination of  
internet related public policy issues and international organizations in
  the development of internet related technical standards and relevant  
policies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;6. How should enhanced cooperation 
be implemented to enable  governments, on an equal footing, to carry out
 their roles and  responsibilities in international public policy issues
 pertaining to the  Internet?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A suitable multilateral, transparent 
and democratic mechanism must be  created where governments, on an equal
 footing, may carry out their  roles and responsibilities in 
international public policy issues  pertaining to the Internet and 
public policy issues pertaining to  coordination and management of 
critical Internet resources, in  consultation with all other 
stakeholders. India would submit its  recommendations on such a 
mechanism separately to the WGEC.&lt;br /&gt;WGEC  should submit its 
recommendation on the broad parameters of such a  mechanism to the UNGA 
through CSTD as an input to the overall review of  the outcomes of the 
WSIS.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;7. How can enhanced cooperation enable other stakeholders to carry out their roles and responsibilities?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The mechanism should be designed so as 
to enable the other  stakeholders to discharge their respective roles 
and responsibilities as  mentioned above in response to Question 5 above
 in an effective manner.  Further, Para 70 of the Tunis Agenda stated 
that relevant international  organizations responsible for essential 
tasks associated with the  Internet should contribute in creating an 
environment that facilitates  the development of public policy 
principles. Therefore these  organizations would need to make necessary 
changes to facilitate an  appropriate interface with the mechanism of 
Enhanced Cooperation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;8. What are the most appropriate 
mechanisms to fully implement  enhanced cooperation as recognized in the
 Tunis Agenda, including on  international public policy issues 
pertaining to the Internet and public  policy issues associated with 
coordination and management of critical  Internet resources?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is relevant to recall relevant 
paragraphs of the Tunis Agenda to  identify most appropriate mechanisms 
to fully implement enhanced  cooperation. The Para 69 sets the tone for 
Governments to define a  mechanism of the enhanced cooperation. This 
paragraph together with  other paras in the Tunis Agenda, when read with
 the WSIS outcomes  clearly provides the basis for establishing the 
mechanism of enhanced  cooperation. The sequence of paragraphs that help
 define the contours of  a mechanism is as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Para 29 states that international 
 management of internet should be multilateral, transparent and  
democratic with the full involvement of governments and other  
stakeholders.&lt;/li&gt;&lt;li&gt;Para 31 commits to full participation of all  stakeholders, within 
respective roles and responsibilities, to ensure  requisite legitimacy 
of governance of internet.&lt;/li&gt;&lt;li&gt;The roles and  responsibilities of various stakeholders have been 
defined in brief in  para 35 of the Tunis Agenda and in detail in paras 
29-34 of WGIG report.&lt;/li&gt;&lt;li&gt;In Para 60 of the Tunis Agenda, the Leaders have clearly pointed out
  the inadequacy of the current mechanisms for dealing with many  
cross-cutting international public policy issues. As a sequel to this  
recognition, Para 61 stresses the need to initiate, and reinforce, as  
appropriate, a transparent, democratic, and multilateral process, with  
the participation of governments, private sector, civil society and  
international organizations, in their respective roles.&lt;/li&gt;&lt;li&gt;Para 68  further recognizes the need for development of public 
policy by  governments in consultation with all stakeholders. The Para 
69  recognises the importance of the governments to act on an equal 
footing  with each other. Thus, there is a clear mandate for defining a 
mechanism  for effective and enhanced cooperation on global internet 
governance. India would submit its recommendations on such a mechanism 
separately to the WGEC. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;9. What is the possible relationship between enhanced cooperation and the IGF?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The IGF is a forum for 
multi-stakeholder dialogue. The discussions  and dialogue in IGF would 
enrich the process of development of the  international public policy 
issues pertaining to the Internet by the  mechanism proposed under 
Enhanced Cooperation. Enhanced Cooperation is a  mechanism for policy 
development whereas IGF is a forum for policy  dialogue - IGF is, thus, a
 distinct and a complementary process to the  enhanced cooperation 
mechanism. IGF should contribute its outcomes as  inputs into the policy
 development/ making processes to be undertaken by  the new mechanism 
for Enhanced Cooperation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;10. How can the role of developing countries be made more effective in global Internet governance?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Paragraph 65 of the Tunis Agenda 
underlines the need to maximize the  participation of developing 
countries in decisions regarding Internet  governance, which should 
reflect their interests, as well as in the  development of capacity 
building. The developing countries are integral  part of the global 
Internet governance. They would participate, at equal  footing in the 
mechanism explained above.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;11. What barriers remain for all 
stakeholders to fully participate  in their respective roles in global 
Internet governance? How can these  barriers best be overcome?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The main barrier to the participation 
of stakeholders is the absence  of a mechanism for global internet 
governance where they can participate  in their respective roles. Second
 barrier to participation of  stakeholders is the nature of selection 
process of participants who  represent these stakeholders. The process 
of selection of the  representatives should be made in a transparent 
manner and using an  inclusive approach.&lt;br /&gt;&lt;strong&gt;12. What actions are needed to promote effective participation of all marginalised people in the global information society?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The mechanism proposed above involves 
all stakeholders, having  important role to play in addressing the 
challenge to effective  participation of marginalised people. Challenges
 like accessibility,  availability and affordability of information 
services have to be  addressed at regional, national and international 
level with  participation of all stakeholders in their respective roles 
and  responsibilities effectively.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;13. How can enhanced cooperation address key issues toward global, social and economic development?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since enhanced cooperation would 
facilitate establishment of a  mechanism to formulate international 
internet related public policies  with the participation of all 
stakeholders in their respective roles  from developed and developing 
countries, the implementation of these  policies would be able to 
address the issues toward global, social and  economic development in a 
better way than today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;14. What is the role of various stakeholders in promoting the development of local language content?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Development of local language content 
is an important element in  ensuring overall socioeconomic development. 
All stakeholders have an  important role to play in generation, 
dissemination and consumption of  the local language content. National 
governments would be responsible  for creation of an enabling 
environment including, development of  relevant standards, legal 
protection and business opportunities. Private  sector would be 
responsible to provide innovative solutions to the  challenge. Civil 
society would play a very important role in supporting  and generating 
community interest towards local language content  development.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;15. What are the international internet-related public policy issues that are of special relevance to developing countries?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The issues important for developing 
countries include accessibility,  affordability and availability of the 
information services and  technologies. The public policy issues 
contained in our replies to  Question No. 4 are also equally important 
for developing countries.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;16. What are the key issues to be 
addressed to promote the  affordability of the Internet, in particular 
in developing countries and  least developed countries?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The key issues relating to affordability of the Internet, include the following:-&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Co-location of content in geographically dispersed location along with Content Distribution Networks (CDNs)&lt;/li&gt;&lt;li&gt;Lowering of Interconnection costs&lt;/li&gt;&lt;li&gt;Internet Exchange Points with peering for routing local traffic and interconnection across borders&lt;/li&gt;&lt;li&gt;Location of Internet “host” computers in the country and/or region.&lt;/li&gt;&lt;li&gt;Regional backbones that interlink countries in the region and which also link to international backbones&lt;/li&gt;&lt;li&gt;Location of the root server systems in these countries&lt;/li&gt;&lt;li&gt;Interoperability and Net Neutrality - In response to the limitation 
 posed by propriety software, alternative products such as Free and Open
  Source Software (FOSS) and alternative licensing regimes (for example 
 Creative Commons, Copy left etc.) to help reduce the costs and (legal) 
 risks associated with proprietary software and content.&lt;/li&gt;&lt;li&gt;Multi-lingualization (Internationalized Domain Names and Local Language Content).&lt;/li&gt;&lt;li&gt;Affordability in accessing International internet connectivity.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;17. What are the national 
capacities to be developed and  modalities to be considered for national
 governments to develop  Internet-related public policy with 
participation of all stakeholders?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The national capacities that need to be considered by national governments to develop Internet related public policy include:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Setting up of Centre of Excellence on Internet Governance and related issues.&lt;/li&gt;&lt;li&gt;Establishment of R&amp;amp;D centers in the area of Internet related Public Policy.&lt;/li&gt;&lt;li&gt;Introduction of formal courses on Internet governance in premier  
educational institutes for Industries, Academia &amp;amp; Civil Society.&lt;/li&gt;&lt;li&gt;Introduction of Training and Awareness building programmes in the area of Internet Governance.&lt;/li&gt;&lt;li&gt;Creation of online Knowledge Repository Portal on Internet Governance.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;18. Are there other comments, or areas of concern, on enhanced cooperation you would like to submit?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Enhanced Cooperation is a dynamic 
process, and hence it requires  periodic reassessment – based on the 
feedback from Governments as well  as other relevant stakeholders, on 
any inter-governmental mechanism that  is set up to oversee its 
operationalization.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/government-of-indias-response-to-wgec-questionnaire-1'&gt;https://cis-india.org/internet-governance/resources/government-of-indias-response-to-wgec-questionnaire-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-01-22T16:55:43Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
