<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1421 to 1435.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyfy-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cyfy-2017-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/publications-automated/curricula/courses-taught-and-designed-by-cis/cyberspace-in-its-plurality-cybercultures-workshop-at-tiss-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cv-booklet.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cultural-institution-aka-glam-for-more-oer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/cscs-digital-innovation-fund"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-february-3-2017-kunal-talegri-crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/identity-crisis"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers">
    <title>Data bleeding everywhere: a story of period trackers</title>
    <link>https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers</link>
    <description>
        &lt;b&gt;This is an excerpt from an essay by Sadaf Khan, written for and published as part of the Bodies of Evidence collection of Deep Dives. The Bodies of Evidence collection, edited by Bishakha Datta and Richa Kaul Padte, is a collaboration between Point of View and the Centre for Internet and Society, undertaken as part of the Big Data for Development Network supported by International Development Research Centre, Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please read the full essay on Deep Dives: &lt;a href="https://deepdives.in/data-bleeding-everywhere-a-story-of-period-trackers-8766dc6a1e00" target="_blank"&gt;Data bleeding everywhere: a story of period trackers&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;Sadaf Khan: &lt;a href="http://mediamatters.pk/the-team/" target="_blank"&gt;Media Matters for Democracy&lt;/a&gt; and &lt;a href="https://twitter.com/nuqsh" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;...By now there are a number of questions buzzing around my head, most of them unasked. Are users comfortable with so much of their data being collected? Are there really algorithms that string together all this data into medically-relevant trends? How reliable can these trends be when usage is erratic? Are period tracking apps pioneering, fundamental elements of a future where medical aid is digital and reliable data is inevitably linked to the provision of medical services? And if so, are privacy and health soon to become conflicting rights?&lt;/p&gt;
&lt;p&gt;I also want to find out how users understand data collection and privacy before giving apps consent to utilize their data and information as they will. Hareem says she gives apps informed consent. ‘If my data becomes a part of the statistics aiding medical research, why not? There is no harm in it. I am getting a good service, and if my data helps create a better understanding as a part of a larger statistical pool, they are welcome to use it.’&lt;/p&gt;
&lt;p&gt;But is she really sure that this information will be used only as anonymised data for medical research? ‘Look at the kind of information that is being collected,’ she answers. ‘Dates, mood, consistency of mucus, basal temperature. What kind of use does one have for this data?’&lt;/p&gt;
&lt;p&gt;Naila, in turn, says: ‘Honestly, I have never really thought about what happens to the data the application collects. Obviously I enter detailed information about my cycle and my moods and my sex life. But a), my account is under a fake name and b), even if it wasn’t, who would have any use for stuff like when my period starts and ends and what my mood or digestive system is like at any given moment?’&lt;/p&gt;
&lt;p&gt;In fact, this sentiment is shared among all the women interviewed for this piece — what use would anyone have for this data?&lt;/p&gt;
&lt;p&gt;As users, we often imagine our own data as anonymised within a huge dataset. But as users, we don’t have enough information about how our data is being used — or will be used in future. The open and at times vague language of a platform’s terms and conditions allows menstrual apps to use data in ways that I may not know of. Some apps continue to hold customer data even after an account is deleted. Even though I may technically ‘agree’ to the terms and conditions, is this fully informed consent?&lt;/p&gt;
&lt;p&gt;One of the big concerns around this kind of medical information being collected is the potential for collaborations with big pharmaceuticals and other health service providers. With apps sitting on a goldmine of users’ fertility and health information, health service providers might mine their data for potential consumers and reach out directly to them. While this is like any targeted marketing campaign, the fact that the advertiser is likely to be offering medical services to women suffering from infertility and are at their most vulnerable, raises totally different ethical concerns.&lt;/p&gt;
&lt;p&gt;And these apps and their businesses might grow in directions that users haven’t taken into consideration. Take Ovia’s health feature for companies to buy premium services for their employees. While the gesture is packaged as a goodwill one, it also means that an employer has access to extremely private and intimate medical information about their women employees. And while the data set is anonymised, it is still possible to figure out the identity of users based on specific information. For example, how many women in any company are pregnant at any given time?...&lt;/p&gt;
&lt;p&gt;Pregnant a year after my miscarriage, I initially downloaded multiple apps in a bid to find a good fit. I don’t know which one of these was in communication with Facebook. But almost immediately, my Facebook timeline started becoming littered with ads for baby stuff — clothes, shoes bibs, prams, cribs, ointments for stretch marks, maternity wear, the works.&lt;/p&gt;
&lt;p&gt;It makes me think of those old school clockwork-style videos. You drop a ball and off it goes: making dominos fall, knocking over pots and pans, setting in motion absurd, synchronized mechanisms. Similarly, I drop my data and watch it hurtle into my life, on to other platforms, off to vendors. Maybe to stalkers? To employers? Who knows.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers'&gt;https://cis-india.org/raw/sadaf-khan-data-bleeding-everywhere-a-story-of-period-trackers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bodies of Evidence</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-06T05:03:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyfy-agenda">
    <title>CyFy Agenda</title>
    <link>https://cis-india.org/internet-governance/blog/cyfy-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyfy-agenda'&gt;https://cis-india.org/internet-governance/blog/cyfy-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-16T03:01:13Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cyfy-2017-agenda">
    <title>CyFy 2017 Agenda</title>
    <link>https://cis-india.org/internet-governance/files/cyfy-2017-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cyfy-2017-agenda'&gt;https://cis-india.org/internet-governance/files/cyfy-2017-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-26T09:11:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance">
    <title> Cyfy 2015: The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance</link>
    <description>
        &lt;b&gt;In its third year, Cyfy; South Asia’s biggest internet policy conference is being held in New Delhi, from 14-16 October, 2015. The event is organized by Observer Research Foundation at Hotel Taj Mansingh. Sunil Abraham is a panelist in the session "Protection of Intellectual Property and Business Secrets in the Knowledge Economy".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Building on its scope and scale of the previous year — over 55 speakers, from 12 countries, with 350 attendees — the conference discusses issues that affect the emerging world and developed world alike. The conversations will further and widen the debate around internet governance, security, surveillance, freedom of expression, norms of state behaviour, technology and specific societal challenges that emerging and developing countries seek to address by the effective design and deployment on these technologies. In 2015, Cyfy will bring together more experts from South Asia, in order to present new thought on the specific challenges of internet access, policy and regulation, e-governance, financial inclusion, and bottom of the pyramid solutions.&lt;/p&gt;
&lt;p&gt;Along with its growing network of both Indian and international partners, ORF looking forward to hosting another thought-provoking and productive few days, and bridging some digital divides in contemporary internet cyber policy debates.&lt;/p&gt;
&lt;h3&gt;Protection of Intellectual Property and Business Secrets in the Knowledge Economy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past decade, there has been an exponential rise in cyber-enabled theft of intellectual property, and it has been recognized as an unfair predatory practice. With the rise of the globalized knowledge economy, the stability of open trading systems increasingly depends on cross-border IP protection. What is the relevance of the protection of intellectual property and business secrets for economic development and stability of the international trading system?&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cyfy-agenda" class="internal-link"&gt;&lt;b&gt;Download the agenda&lt;/b&gt; &lt;/a&gt;For more info visit &lt;a class="external-link" href="http://cyfy.org/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance'&gt;https://cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-17T14:44:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/publications-automated/curricula/courses-taught-and-designed-by-cis/cyberspace-in-its-plurality-cybercultures-workshop-at-tiss-mumbai">
    <title>Cyberspace in its Plurality: Cybercultures Workshop at TISS, Mumbai</title>
    <link>https://cis-india.org/publications-automated/curricula/courses-taught-and-designed-by-cis/cyberspace-in-its-plurality-cybercultures-workshop-at-tiss-mumbai</link>
    <description>
        &lt;b&gt;Cyberspace has become one of the most potent and persuasive metaphors of our times, enveloping and embracing a wide range and scope of areas across disciplines and perspectives. The cybercultures workshop is designed to be an introduction to the multiplicity of cyberspaces and internet technologies and the key questions which have emerged in the almost four decades of cyberculture theory. The workshop is designed across four days; each day dealing with a certain understanding of cyberspace – in its materiality, in its imagination, in its instrumentality – in order to present a comprehensive view of the vast terrain of cyberspace and its intersections with the contemporary worlds we live in.&lt;/b&gt;
        
&lt;h3&gt;Workshop @ Centre for Media and Cultural Studies, TISS, Mumbai&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The four day workshop at the &lt;a class="external-link" href="http://www.comminit.com/en/node/265160"&gt;Centre for Media and
Cultural Studies&lt;/a&gt;, Tata Institute of Social Sciences, Mumbai, sees CIS engaging with one of the most exciting spaces in the Indian
academia; we design and administer an introduction course on
cyberspace and its plurality to students of media and cultural
studies. The workshop is a part of the Centre for Internet and
Society's larger concern on providing a multidisciplinary,
multi-media approach towards the internet and contextualising it in
India.&lt;/p&gt;
&lt;p&gt;Structured on a seminar model, the workshop hopes to
bring together the questions in academic debate as well as in the
realm of cultural production, for students to understand the internet
technologies and cyberspaces as not only important cultural outputs
but also crucial forms that shape the world we live in.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Objectives:&lt;/strong&gt;
The four day cybercultures workshop hopes to achieve the following
objectives:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;To introduce the students
to the multiplicity and complexity of ‘cyberspace’.&lt;/li&gt;&lt;li&gt;To introduce ‘cyberspace’
as an epistemological category to emphasise the centrality of
cyberspaces in understanding the mechanics of urban survival in the
contemporary.&lt;/li&gt;&lt;li&gt;To orient the students
towards understanding the textuality of cyberspace; rescuing it from
the confines of digital networks and locating it in the transactions
of globalization and urbanization in Asia.&lt;/li&gt;&lt;li&gt;To introduce the key
debates in cybercultures theory: body, gender, sexuality, authorship,
ownership, access and information democratization.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Design:&lt;/strong&gt;
The cybercultures workshop is designed to be conducted over four days with two
sessions (of three hours each) per day. Each day is thematically divided to
look at a particular idea of cyberspace; the sessions are further
sub-divided to introduce a particular perspective on the day’s
theme. Each session has its set of individual pre-readings which will
serve more as indicators of the stake of the debate rather than as texts around which the class will be centred. The readings shall remain as introductory
material, and the class room discussions, while referring to them,
will not concentrate on explaining the material.&lt;/p&gt;
&lt;h3&gt;Day 1: Cyberspace – Form, Textuality and Frameworks&lt;/h3&gt;
&lt;blockquote&gt;
&lt;h3&gt;Session 1: Exploring Cyberspace:&lt;/h3&gt;
&lt;p&gt;Definitions, explanations, locations&lt;/p&gt;
&lt;p&gt;Cyberspace and Digital Technologies&lt;/p&gt;
&lt;p&gt;Form, text, textuality&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-reading:&amp;nbsp;&lt;/strong&gt; Shah, Nishant, 2005. “Playblog:
Pornography, Performance, and Cyberspace” available&lt;a class="external-link" href="http://www.cut-up.com/news/issuedetail.php?sid=413&amp;amp;issue=20"&gt; here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Session 2: The Digital DNA – Database, Networks,
Archives&lt;/h3&gt;
&lt;p&gt;The Database Imperative: Sorting, information,
databases&lt;/p&gt;
&lt;p&gt;The Networking Impulse: Social Networking Systems and
the condition of networking&lt;/p&gt;
&lt;p&gt;The Archiving Aspirations: Intention, aspiration and
archiving the present&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-reading:&lt;/strong&gt; &amp;nbsp;Manovich, Lev, 2001. “The
Database as a Symbolic Form” available &lt;a class="external-link" href="http://transcriptions.english.ucsb.edu/archive/courses/warner/english197/Schedule_files/Manovich/Database_as_symbolic_form.htm"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Day 2: Information technology and
human engineering&lt;/h3&gt;
&lt;blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Session 3 : &amp;nbsp;Gender, Technology and Cyberspace&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Gendering of Technology; Gendered Technologies&lt;/p&gt;
&lt;p&gt;The body and its boundaries&lt;/p&gt;
&lt;p&gt;Physical bodies; Digital selves; cyborgs&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-reading: &lt;/strong&gt;Light, Jennifer, 1999. “When Computers Were Women” available&lt;a class="external-link" href="http://tinyurl.com/Jennifer-light"&gt; here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Dibbell, Julian, 1991. “A Rape in Cyberspace: How an Evil Clown, a
Haitian Trickster, Two Wizards, and a Cast of Dozens Turned a
Database into a Society” available &lt;a class="external-link" href="http://www.juliandibbell.com/texts/bungle_vv.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&amp;nbsp;Session 4: Techno-social Worlds&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Orkut Deaths : The distributed self&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Role playing and identity : The real and the authentic&lt;/p&gt;
&lt;p&gt;&amp;nbsp;DPS MMS: The trajectories of selves&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Day 3- 4 : Cyberspace and the
Infobahn&lt;/h3&gt;
&lt;blockquote&gt;
&lt;h3&gt;Session 5: Movie Screening: &lt;a class="external-link" href="http://www.goodcopybadcopy.net/"&gt;Good Copy, Bad Copy&lt;/a&gt;
(followed by discussion) &lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Session 6: Who owns Cyberspace?&lt;/h3&gt;
&lt;p&gt;Ownership and Possession&lt;/p&gt;
&lt;p&gt;Licensing and access&lt;/p&gt;
&lt;p&gt;Open source and the gift economy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-reading:&lt;/strong&gt; UNCTAD essay on copyright and related
questions, available &lt;a class="external-link" href="http://www.unctad.org/en/docs/iteipc200610_en.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Session 7: 18 Reasons Why Piracy is Good for You&lt;/h3&gt;
&lt;p&gt;The need for piracy&lt;/p&gt;
&lt;p&gt;Piracy, theft, and property&lt;/p&gt;
&lt;h3&gt;Session 8: The Cultural Value of Intellectual
Property&lt;/h3&gt;
&lt;p&gt;The Digital Millenium Rights&lt;/p&gt;
&lt;p&gt;The Copy Right and the Copy Left&lt;/p&gt;
&lt;p&gt;Open Access and the Creative Commons&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;Outputs&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://community.livejournal.com/authenticpirate/"&gt;http://community.livejournal.com/authenticpirate/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://myspaceformusic.livejournal.com/"&gt;http://myspaceformusic.livejournal.com/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://jennyontherocks.livejournal.com/"&gt;http://jennyontherocks.livejournal.com/&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/publications-automated/curricula/courses-taught-and-designed-by-cis/cyberspace-in-its-plurality-cybercultures-workshop-at-tiss-mumbai'&gt;https://cis-india.org/publications-automated/curricula/courses-taught-and-designed-by-cis/cyberspace-in-its-plurality-cybercultures-workshop-at-tiss-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>cybercultures</dc:subject>
    
    
        <dc:subject>teaching</dc:subject>
    
    
        <dc:subject>cyberspaces</dc:subject>
    
    
        <dc:subject>pedagogy</dc:subject>
    
    
        <dc:subject>education</dc:subject>
    
    
        <dc:subject>digital pluralism</dc:subject>
    

   <dc:date>2008-10-31T10:38:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs">
    <title>Cyberspace and External Affairs</title>
    <link>https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs'&gt;https://cis-india.org/internet-governance/files/cyberspace-and-external-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-12-01T03:59:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf">
    <title>Cybersecurity Compilation</title>
    <link>https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf'&gt;https://cis-india.org/internet-governance/files/cyber-security-compilation.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-06-18T13:15:49Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses">
    <title>Cyber security tips for small businesses</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses</link>
    <description>
        &lt;b&gt;It is important to have good cyber security practices, experts recommend.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Theres Sudeep was published in the &lt;/span&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/cyber-security-tips-for-small-businesses-781533.html" style="text-align: justify; "&gt;Deccan Herald&lt;/a&gt;&lt;span style="text-align: justify; "&gt; on December 1, 2019. Arindrajit Basu was quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many times small businesses don’t allocate any of their budgets to cybersecurity. This is due to the common misconception that it’s only larger companies and governments that need to worry about attacks by hackers and the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not the case as Arindrajit Basu of The Centre for Internet and Society explains, “The kind of risks that smaller players are vulnerable to may not be on the scale of threats that larger companies encounter, but it is equally important for them to have good cybersecurity practices,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Phishing, an attempt to obtain sensitive information by disguising oneself as a trustworthy entity, and ransomware, a type of malware that threatens to publish the victim’s data or block access to it unless a ransom is paid, are the two most common kinds of attacks on small business according to Basu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds that many hackers see small businesses as an easy way into a larger network. Once the smaller nodes are breached, they can easily get to the bigger players on the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru, the startup capital of the country, has many such small businesses that need to better their cybersecurity practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first and foremost step recommended by Basu is to create a strategy within your business plan and revise it periodically. This must include employee training and guidelines on what to if there is a breach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from this owners and employees are advised to routinely change passwords and back up their data on a device that doesn’t connect to the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Owners are also advised to monitor access to admin accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many small businesses and startups don’t have offices of their own, which means employees end up working at a cafe or the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When working at these venues, make sure to carry your own WiFi or use the hotspot from your phone. Open WiFi networks are vulnerable to attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Basu concludes by saying that small businesses must be periodically audited by an independent cybersecurity firm.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses'&gt;https://cis-india.org/internet-governance/news/deccan-herald-december-1-2019-theres-sudeep-cyber-security-tips-for-small-businesses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Theres Sudeep</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-12-05T23:35:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cv-booklet.pdf">
    <title>CV Booklet</title>
    <link>https://cis-india.org/internet-governance/blog/cv-booklet.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cv-booklet.pdf'&gt;https://cis-india.org/internet-governance/blog/cv-booklet.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-20T04:34:46Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open">
    <title>Cultural knowledge needs to be more open</title>
    <link>https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open</link>
    <description>
        &lt;b&gt;Subhashish Panigrahi is an educator and open source activist based in Bangalore, India. He is currently working at the Centre for Internet and Society's Access To Knowledge program where he builds partnership with universities, language researchers, and GLAM organizations. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Jen Wike Huger was published on the website of OpenSource.com. It can be &lt;a class="external-link" href="https://opensource.com/community/15/2/contributor-spotlight-subhashish-panigrahi"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Their goal is to bring more scholarly and encyclopedic content under  free licenses. During his work at the Wikimedia Foundation's India  Program, Subha was involved in designing community sustaining and new  contributor cultivation models.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For his effort to share and spread open source far and wide, this year he was awarded a &lt;a href="https://opensource.com/community/15/1/winners-2015-community-awards" target="_blank"&gt;2015 Opensource.com People's Choice Award&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His most recent articles include: &lt;i&gt;&lt;a href="https://opensource.com/life/14/3/wikipedia-project-hindu-poetry" target="_blank"&gt;Digitize any book in the public domain&lt;/a&gt;&lt;/i&gt;, on his work to with Indian poetry important to the culture. &lt;i&gt;&lt;a href="https://opensource.com/education/14/5/odia-wikimedia" target="_blank"&gt;Books and more are relicensed to Creative Commons&lt;/a&gt;, &lt;/i&gt;about news from the Wikimedia Foundation. &lt;i&gt;&lt;a href="https://opensource.com/community/14/7/mozilla-brings-indian-communities-together" target="_blank"&gt;Mozilla brings Indian communities together&lt;/a&gt;&lt;/i&gt;, about the Indic FirefoxOS L10n Sprint 2014. And, &lt;i&gt;&lt;a href="https://opensource.com/education/14/10/open-access-platform-odia-language" target="_blank"&gt;Open access platform to save the Odia Indian language&lt;/a&gt;&lt;/i&gt;, on his work to preserve his native culture.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Basics&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Name&lt;/b&gt;: Subhashish Panigrahi ("Subha")&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Opensource.com username&lt;/b&gt;: &lt;a href="https://opensource.com/users/psubhashish" target="_blank"&gt;psubhashish&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Location&lt;/b&gt;: India (Bengaluru and Odisha)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Occupation/Employer/Position&lt;/b&gt;: Programme Officer, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Favorite open source tool or application&lt;/b&gt;: Audacity&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Favorite Opensource.com channel&lt;/b&gt;: Education&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Open up to us&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;I was away from home for my studies and was longing to read and write  more in my native language of Odia. That led me to co-found  eOdissa.com, a portal to tell stories to the rest of the world about my  language, history, and cultural heritage. I was a sporadic editor on  Wikipedia; anonymously since 2006. Then, in 2011, I was introduced to  editing for Odia Wikipedia by my mentor Shiju Alex and friend Asutosh  Kar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That was my entry point to the free software movement. And it was a trap I could never get out of!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I thankfully began a full-time job with the Wikimedia Foundation in  2012 for its India Program. The program is now housed with their Indian  movement partner, Centre for Internet and Society, under the Access To  Knowledge program. I work in the Bengaluru office but mostly travel to  work with the communities. I work on building capacity for the Indian  language Wikimedia communities, building institutional partnerships for  long term outreach engagement, negotiating with publishers and copyright  holders to bring more content relicensed under Creative Commons  licenses, and taking part in policy level discourses around open access  and enforcing free software for governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What open tools and data help you get things done?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For my day job, I solely rely on Wikimedia Stats to collate data  related to Wikimedia projects. I use some Python programming, jQery.ime,  and JavaScript for other data-related work. But, I am a people's man  and my interaction is mostly with humans rather than tools.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What do you wish were more open?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GLAM (galleries, libraries, archives and museums) and many other  cultural institutions have historically been the keepers of cultural  knowledge. But I see possessiveness in not opening up their archival for  public consumption. I wish more policy level negotiations and open  collaborations were happening to open up cultural data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the biggest challenges to openness that you encounter, either at work or in your life?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Community and its growth. Working in a developing nation with  historical, cultural, economic, and political hindrances pulls  volunteerism down. It's is a huge challenge for me. Tapping into many  existing networks and communities, and leveraging ongoing activities for  the betterment for the free and open source movement, is something I am  struggling for.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why choose the open source way?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;I would like to quote a good friend and activist Michelle Thorne who  says, "Human civilization has everything free and open from the  beginning, but slowly the problems of restriction start beginning."  Furthermore filmmaker Nina Paley says, "Knowledge is not created by us,  rather shared by us."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we are here to share knowledge, why to restrict its free flow?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open'&gt;https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-03-12T16:41:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer">
    <title>Cultural institution AKA GLAM for more OER </title>
    <link>https://cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer</link>
    <description>
        &lt;b&gt;The OER conference was held in Edinburgh, Scotland on April 19 and 20, 2016. Subhashish Panigrahi gave a talk at the event organised by the University of Edinburg. &lt;/b&gt;
        
&lt;p&gt;The vision for the conference was to focus&amp;nbsp;on the value proposition of embedding open culture in the context of institutional strategies for learning, teaching and research. The conference was chaired by&amp;nbsp;Melissa Highton, Director of Learning, Teaching and Web Services at the University of Edinburgh, and Lorna Campbell, OER Liaison at the University of Edinburgh and EDINA Digital Education Manager. The OER 16 conference primarily focused on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The strategic advantage of open and creating a culture of openness.&lt;/li&gt;
&lt;li&gt;Converging and competing cultures of open knowledge, open source, open content, open practice, open data and open access.&lt;/li&gt;
&lt;li&gt;Hacking, making and sharing.&lt;/li&gt;
&lt;li&gt;The reputational challenges of openwashing.&lt;/li&gt;
&lt;li&gt;Openness and public engagement.&lt;/li&gt;
&lt;li&gt;Innovative approaches to opening up cultural heritage collections for education.&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe src="http://www.slideshare.net/slideshow/embed_code/key/IwwO926qj1iFvX" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt; &lt;a title="Subhashish Panigrahi - Cultural Institution aka GLAM for More OER (OER16, 19-20.04.2016)" href="http://www.slideshare.net/CIS_India/subhashish-panigrahi-cultural-institution-aka-glam-for-more-oer-oer16-1920042016" target="_blank"&gt;Subhashish Panigrahi - Cultural Institution aka GLAM for More OER (OER16, 19-20.04.2016)&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="http://www.slideshare.net/CIS_India" target="_blank"&gt;The Centre for Internet and Society&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://commons.wikimedia.org/wiki/File:OER16_-_Presentation_slides_of_Subhashish_Panigrahi.pdf"&gt;Presentation slides of the talk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://media.ed.ac.uk/media/Cultural%20institution%20AKA%20GLAM%20for%20more%20OER/1_m28pkox9"&gt;Video of the talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://open.ed.ac.uk/event/oer16-conference-edinburgh/"&gt;More info on University of Edinburg website&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer'&gt;https://cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-09T12:51:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cultural-institution-aka-glam-for-more-oer">
    <title>Cultural institution AKA GLAM for more OER</title>
    <link>https://cis-india.org/a2k/blogs/cultural-institution-aka-glam-for-more-oer</link>
    <description>
        &lt;b&gt;My submission titled "Cultural institution AKA GLAM for more OER" under the theme of "Innovative approaches to opening up cultural heritage collections for education" has been selected for the OER16 conference to be held in Edinburg, Scotland from 19 to 20 April 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;GLAM (Galleries, Libraries, Archives, and Museums) is a global initiative for making cultural data open targeting galleries, libraries, archives and museums in particular. GLAM projects are run in collaboration with these cultural institutions where the artifacts and other institutional collections get all sorts of digital treatment, from digitizing manuscripts and &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:GLAM/National_Library_and_National_Archives_of_the_Netherlands/Data#Books"&gt;books&lt;/a&gt; to creating meta data and developing tools to automate and &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Commons:GLAMwiki_Toolset_Project"&gt;ease the life of contributors&lt;/a&gt;, building and 3D models of artifacts and creating multilingual &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:GLAM/NHMandSM/Virtual_Museum"&gt;virtual museum experience&lt;/a&gt; by using Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These institutions historically being the reservoir of knowledge need more attention with more digital innovation coming in day by day. There being a synergy between the fundamental focus of OER and GLAM initiative, it leaves scholars and GLAM and/or OER practitioners to explore this area that is currently not widely covered. GLAM projects are centered around data mining, digitizing and publishing the work in both machine and human readable forms. The output of all the GLAM projects could directly contribute to creating OERs classifying and customizing the OERs for different age groups and people with accessibility needs. This, in return will also benefit the GLAM projects and institutions for both expanding their reach and replicating these initiatives. The presentation will be around the best practices of several GLAM initiatives and how these projects could lead to create useful OERs. I will also shed some light on the methodology of creating OERs during the development of a GLAM project.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cultural-institution-aka-glam-for-more-oer'&gt;https://cis-india.org/a2k/blogs/cultural-institution-aka-glam-for-more-oer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-02-27T06:00:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/cscs-digital-innovation-fund">
    <title>CSCS Digital Innovation Fund (CDIF)</title>
    <link>https://cis-india.org/raw/cscs-digital-innovation-fund</link>
    <description>
        &lt;b&gt;The CSCS Digital Innovation Fund (CDIF) has been set up by the Centre for the Study of Culture and Society (CSCS) and the Centre for Internet and Society (CIS) to encourage, host, and provide seed funding for the development of digital tools and infrastructure for arts, humanities, and social science research in India. The Fund’s priorities have been shaped by Ashish Rajadhyaksha, Lawrence Liang, Nishant Shah, Sitharamam Kakarala, S.V. Srinivas, and Tejaswini Niranjana; and it is administered by the Researchers at Work (RAW) programme at CIS.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A fundamental challenge has emerged in arts, humanities, and social science research with the coming of digital media. The challenge is of at least two kinds: 1) the ways in which we access our primary materials have changed, opening up the possibility of formulating new problems as well as conducting our research, and 2) additionally, the digital networks and objects that facilitate research are themselves becoming part of the phenomena we document and analyse. While the contexts under investigation are rich and diverse, the digital tools and methods by which to explore them are not readily available, especially in India.&lt;/p&gt;
&lt;p&gt;CDIF uses the terms &lt;strong&gt;tools&lt;/strong&gt; and &lt;strong&gt;infrastructure&lt;/strong&gt; to respectively refer to autonomous software programmes and hardware devices, and platforms for collective use. A software to enable capturing of comments posted on a news website will be an example of the former, while an archive to be populated and annotated by a number of users will be an example of the latter.&lt;/p&gt;
&lt;p&gt;The core mandate of CDIF is as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identifying digital tools and infrastructure needed by researchers and practitioners in arts, humanities, and social science fields. This is clearly not a one-time exercise, but a continuous one.&lt;/li&gt;
&lt;li&gt;Promote, support, and fund the development of new digital tools and infrastructure, as well as revision and expansion of existing ones.&lt;/li&gt;
&lt;li&gt;Creating focused conversations and materials around teaching of, and teaching through, digital tools and infrastructure across the arts, humanities, and social science disciplines.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;During 2015-2017, CDIF has a specific interest in supporting efforts that engage with questions of the digital futures of Indian languages, needs and forms of archive-building, and tools and infrastructure of academic collaboration, among learners and among researchers.&lt;/p&gt;
&lt;p&gt;CDIF will periodically announce open calls for project proposals related to development of digital tools and infrastructure for research. To receive these announcements, please subscribe to the &lt;a href="https://lists.ghserv.net/mailman/listinfo/cdif" target="_blank"&gt;cdif@cis-india.org&lt;/a&gt; mailing list. In exceptional cases, we may also consider directly supporting a project.&lt;/p&gt;
&lt;p&gt;For any clarification, including sharing of project ideas, please write to raw[at]cis-india[dot]org.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/cscs-digital-innovation-fund'&gt;https://cis-india.org/raw/cscs-digital-innovation-fund&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CDIF</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    

   <dc:date>2018-05-14T07:25:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-february-3-2017-kunal-talegri-crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done">
    <title>Crowdsourced innovation for government projects and services is easier said than done</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-february-3-2017-kunal-talegri-crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done</link>
    <description>
        &lt;b&gt;Late January. The buzz was palpable at the MLR Convention Centre in South Bengaluru. Developers were streaming into 50p, a conference organised by HasGeek, which has curated technology forums since 2011. But this wasn't just one of the six HasGeek communions that the programmers attend annually. 50p put the spotlight on digital payments, which meant the gathering would be more diverse than anything before. &lt;/b&gt;
        &lt;p&gt;The article by Kunal Talgeri was &lt;a href="http://timesofindia.indiatimes.com/trend-tracking/crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done/articleshow/56951942.cms"&gt;published         in the Times of India&lt;/a&gt; on February 3, 2017. Sunil Abraham was       quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Of the 250-plus attendees in two days, only 40% were developers.       There were around 10 lawyers, an activist here, a social-impact       investor there, product managers, and a 20-strong team from online       payment systems company PayPal. There were managers from       traditional banks too. "We realised early on that one thing the       developer community really needs to know is how various       payment-systems work, like who makes what percentage (in the value       chain)?," said Zainab Bawa, cofounder of HasGeek. "It is a big       mystery to them."&lt;/p&gt;
&lt;p&gt;Kiran Jonnalagadda, co-founder of HasGeek and       Bawa's husband, concurred: "A payment conference cannot primarily       be centred on technology. Regulations make a bulk of the       difference." So the interdisciplinary forum traversed areas as       diverse as customer data and privacy, payment-systems unique to       India, regulations, and the Watal Committee report apart from       technology.&lt;/p&gt;
&lt;p align="justify"&gt;HasGeek got folks from the payments industry to converse with       developers. At the outset, Bawa spelt out to the audience       something about technology's role in society. "While we (coders)       are here to bridge gaps, we also need to understand that       technology is not necessarily the solution. Developers must have       their ears to the ground." She had touched upon the divide between       the coder community and the government. &lt;br /&gt; &lt;br /&gt; Globally, governments are only just beginning to be exposed to the       geeks. "The broader theme of digitisation and opening up of APIs       (application programming interface) is happening across the       world," said Sanjay Swamy, managing partner at Prime Venture       Partners, and an &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Aadhaar-volunteer"&gt;Aadhaar         volunteer&lt;/a&gt; with the Unique Identity Authority of India       (UIDAI) until early 2011. APIs empower developers to build       applications that access the features or data of an operating       system or service. This requires developers to come together with,       in this case, the government. &lt;br /&gt; &lt;br /&gt; The digital dream has never showed more promise in India—the       chance for a few developers to build a platform that can digitise       government services for millions of users. "The government wants       to use &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/hackathons"&gt;hackathons&lt;/a&gt; for digital disruption—leverage hackers to build solutions for       them," says Subhendu Panigrahi, co-founder of Venturesity that       helps companies find developers. &lt;br /&gt; &lt;br /&gt; This is easier said than done. But how did India even get to this       point? &lt;br /&gt; &lt;br /&gt; &lt;b&gt;CODE NAME: GENESIS&lt;/b&gt;&lt;br /&gt; On 10 June 2016, the Indian Software Product Industry Round Table       (iSPIRT) think-tank released a paper that took note of the country       moving from "data poor to data rich." &lt;br /&gt; &lt;br /&gt; This was a few weeks after the &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/UIDAI-platform"&gt;UIDAI         platform&lt;/a&gt; Aadhaar crossed 1 billion enrolments. "The Aadhaar       system can authenticate 100 million transactions per day in real       time," iSPIRT stated. The paper also pointed to three national       platforms - essentially services that would in time digitise       government services on a national scale. &lt;br /&gt; &lt;br /&gt; These were the Goods and Services Tax (GST) Network, the Bharat       Bill Payment System which would cover utility services       (electricity, water, gas, and so on), and the electronic toll       collection system. &lt;br /&gt; &lt;br /&gt; All three platforms come under the National Payments Corporation       of India (NPCI), an umbrella organisation for retail payment       systems in India. iSPIRT had helped NPCI organise a hackathon in       Mumbai in February 2016 to build prototypes for harnessing the       Unified Payment Interface (UPI) platform's application programming       interface to digitise bank transfers in real time. Similarly,       steps were being taken to open up APIs to large companies for the       other NPCI platforms. &lt;br /&gt; &lt;br /&gt; On its part, iSPIRT was drawing the attention of a breed of       software developers to the national-scale opportunities ahead. It       unequivocally stated: "Data flows benefit public services and       governments." But even as India moves to being data rich, the       outreach to developers - estimated to be more than 5 million in       India - could be futile for two reasons. &lt;br /&gt; &lt;br /&gt; First, government departments and traditional systems of, say,       nationalised banks have a technology procurement culture that is       at odds with how developers build digital solutions. While       government is the largest technology procurer, procurement       contracts typically have clauses that encourage lowest (cost)       bidders, which rarely spawns innovation. &lt;br /&gt; &lt;br /&gt; "Government needs to adopt and evangelise pro-challenger tools and       policies that reduce barriers to experimentation, level-playing       field and encourage innovating around national issues," wrote       Swati T Satpathy for iSPIRT in a November 2015 paper titled       'Igniting Hundreds of Experiments'. &lt;br /&gt; &lt;br /&gt; Second, independent developers still have to come out in larger       numbers for the best solutions to shine. Sachin Gupta, CEO of       HackerEarth, another developer platform, agrees: "Governments may       still go ahead and give projects to a TCS and Wipro, but they want       to crowdsource the innovation, prototype and the whole concept.       They want to build an active relationship with the tech       community." &lt;br /&gt; &lt;br /&gt; These can be government bodies at the state level, too, like the &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Department-of-Urban-Land-Transport"&gt;Department         of Urban Land Transport&lt;/a&gt; in Karnataka, for whom Venturesity       helped with a 'transit hack' to solve traffic in Bangalore with       submissions like how to enable carpooling or track public       transport. &lt;br /&gt; &lt;br /&gt; "The government is really interested in the final product or an       app they can use," Panigrahi said. For this, governments are       willing to distribute their APIs to eventually own the app.       "Developers participate in such hackathons to make it part of       their portfolios or resumes, or because they love building       products, or for the prize-money." &lt;br /&gt; &lt;br /&gt; This is crowd sourced innovation. Yet, culturally, it is hard for       developers and governments' interests to be aligned. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;INSIDE THE DICHOTOMY&lt;/b&gt;&lt;br /&gt; The API-driven approach is based on a philosophy in the &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/United-States"&gt;United         States&lt;/a&gt; that dates back to the 1960s. It a culture of giving       powerful building blocks, as opposed to just building an actual       solution, said Jonnalagadda. A 'solution' evolves into a platform       if it can serve as 'building blocks' for the next set of       developers to build on. &lt;br /&gt; &lt;br /&gt; "A good product is also one on top of which something more can be       built. That has been the principle on which the developer       community has thrived," he said. This approach works well in       technology. "It means you are slow, but also that you are a lot       more mature and innovative." &lt;br /&gt; &lt;br /&gt; The government has got this aspect right, by opening up secure       APIs to nationalscale projects and systems. But while they have       provided such building blocks, they have already decided the path       to meet goals like financial inclusion. Mobile apps like BHIM       (Bharat Interface for Money) are becoming the default mode of       reaching the masses. Many observers agree with the smartphone as a       medium for India, but developers feel web browsers are more secure       than apps.&lt;/p&gt;
&lt;div align="justify"&gt;Jonnalagadda cites a 50p session, 'Everyone can see your credit       card details. Seriously,' where the speaker Arnav Gupta described       the flow of the web as independent websites that can't actually       communicate with each other. As against this, every function of a       mobile app is a subset of the parent app. "So whatever password       you type for one 'function' can be visible to the parent, which       never happens on the web," Jonnalagadda said. "If security is       defined by the fact that it is tested against being broken, a       mobile app is trusted on the basis of goodwill. For developers,       this is a shitty way to do technology. It bothers the heck out of       him when a security model assumes goodwill because government       wants an app." &lt;br /&gt; &lt;br /&gt; Also, solutions need a decentralised approach from governing       bodies like local municipalities. Independent budgets and       decision-making can lead to stronger links between government and       local service providers. There are exceptions to this, like       Singapore, a city nation. But in larger developed countries like       the United States, local government bodies are stronger than in       India. "Here, we are getting even more centralised over time,"       Jonnalagadda said. It makes the government look like a monolith in       the eyes of developers. How can the two be compatible? "We haven't       found a solution yet."&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-february-3-2017-kunal-talegri-crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-february-3-2017-kunal-talegri-crowdsourced-innovation-for-government-projects-and-services-is-easier-said-than-done&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T15:36:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/identity-crisis">
    <title>Crisis for identity or identity crisis?</title>
    <link>https://cis-india.org/news/identity-crisis</link>
    <description>
        &lt;b&gt;The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions.




&lt;/b&gt;
        
&lt;p&gt;“It will empower all”, declared Prime Minister Manmohan Singh when he issued the first UID card to a villager from Tembhli village in Maharashtra. But as days pass and relevant issues come for public discourse, many people have begun to doubt prime minister’s assurance.&lt;/p&gt;
&lt;p&gt;Unique identification number (UID), named Aadhaar is a 12 digit identification number that the government plans to issue to all citizens that will not only be an identity card but will also serve multiple purposes for its holder.&lt;/p&gt;
&lt;p&gt;Infosys co-founder Nandan Nilekani has been assigned the responsibility to execute this proposal as Chairman of the Unique Identification Authority of India (UIDAI). Mr Nilekani leads a team of 120 people having the task of assigning unique identities to 1.2 billion people. He plans to take Aadhaar beyond being just a 12-digit identification number for every Indian. This ambitious and mammoth project is pitched to handle projects as diverse as a national-highway toll-collection system, a technology backbone for the forthcoming Goods and Services Tax (GST) and reform of the vast public distribution system (PDS) for subsidized foodgrains.&lt;/p&gt;
&lt;p&gt;Government plans to cover 60 per cent of the nation’s population under this project in the next three years starting October this year. This project is intended to collect identification data about all residents in the country. It is said that it will impact the PDS and NREGA programmes, and plug leakages and save the government large sums of money.&lt;/p&gt;
&lt;p&gt;But the UID will not replace ration cards and passports, and is not mandatory as of now. No questions would be asked related to language, caste or religion of the person applying for UID.&lt;/p&gt;
&lt;p&gt;The UID number is linked to the fingerprints and the pattern of the eyes of the person assigned that number. This inimitable biometric data ensures that any given number is linked to only one person. So there is hardly a chance of any misgiving or stealing of rations and wages from the holder. It is believed that soon banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you.&lt;/p&gt;
&lt;p&gt;In short, in the future our name, address, bank account numbers, personal information and identity as a whole will be solely linked and governed by those 12 digit number we hold.&lt;/p&gt;
&lt;div class="pullquote"&gt;Critics say that there has been no feasible study conducted about UID project, neither has there been a cost benefit analysis done. To add to it, there are serious concerns about data and identity theft.&lt;/div&gt;
&lt;p&gt;But apart from the buzz about this new project, there is an air of suspicion surrounding it too.&lt;/p&gt;
&lt;p&gt;The launch of the UID has led to a flurry of debate amongst policy-makers, legal experts and civil society at large. In response, Mr Nilekani claims the UID to be “a foolproof project implemented at a low cost”.&lt;/p&gt;
&lt;p&gt;However, some critical issues remain unanswered.&lt;/p&gt;
&lt;p&gt;One of the major objections about UID is that there has been no feasible study conducted, neither has there been a cost benefit analysis done. There is no project document as such.&lt;/p&gt;
&lt;p&gt;To add to it, there are serious concerns about data and identity theft.&lt;/p&gt;
&lt;p&gt;In a world where cyber terrorism is the new threat, and the countries are gearing themselves to protect against such a threat, projects like UID come as an open invitation to terrorist outfits to infiltrate their defences.&lt;/p&gt;
&lt;div&gt;The UID number is linked to fingerprints and the patterns of the holder’s eye. But medical studies show that our eye's iris patterns can change due to aging, disease or malnourishment. More over the government has no alternative option for many millions who fall outside this pattern of identification owing to callused hands, corneal scars and cataract induced by malnourishment. Even as enrollment is poised to begin, authentication is still an unstudied field. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;&lt;span class="Apple-style-span"&gt;Recently, Sunil Abraham, Director, Centre for Internet and Society has remarked, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf. They could use that number, to share information about anybody.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;A cyber-criminal having access to any person’s identification number can virtually control that person. Telephone numbers, addresses, family history can all be tracked down. Bank accounts can be manipulated and transactions done without the person knowing. Since these days, a lot of money transactions are done through internet, a cyber criminal can easily steal few UID numbers and impersonate those persons to manipulate the bank or credit card accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In an even uglier scenario, where people might be tracked and judged by their numbers, a criminal’s fingerprints left behind on a scene of crime can be mixed with some one else through a slight manipulation and exchange of UID numbers, making an entirely innocent person a suspect in the eyes of law. Some incompetent or revengeful government officials can also frame innocents for a crime one never committed.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Human rights activists claim that a tech-savvy person can hack into the system and gain any person’s information from the servers unless the government tightens the defenses. A reminiscence of the Bruce Willis starrer Hollywood blockbuster Die Hard 4, a bunch of techno geeks operating from trailer truck hold the entire United States hostage as they hack into every main frame computing network from transportation, communication, power, defence and individual accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The number can also be used for real time tracking, profiling, mounting surveillance and ‘convergence’ of information. Apart from the concerns about identity theft, the number can also invade our private space. If in the future insurance companies and hospitals merge their databases, the insurance companies can increase premium, or simply refuse insurance cover to a person who is not keeping well.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Poor labourers and immigrants who are on the move in search of work could also be the victims of the ‘Aadhaar’. In future, in case of card being lost or misplaced, poor labour would be threatened with financial and welfare exclusion. Where being a legal resident is to be closely tied in with having a UID number, it could render the poor vulnerable to exclusion and expulsion by exploitative employers and others.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Though Mr Nilekani claims that UID would be a cost effective project, however deeper analysis throws a different story. It is reported that the UIDAI project will cost Rs 45,000 crores to the exchequer in the next 4 years. This does not seem to include the costs that will be incurred by Registrars, Enrollers, additional costs on the PDS system to connect it to the UID, the estimated cost to the end user and to the number holder.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Defending himself from the flurry of queries, Mr Nilekani has stressed that the identification number is not mandatory for everyone and only those interested can enroll. The project aims to first enroll the poor and uneducated masses promising them better wages and ration schemes. As was reported, the first villager to get the UID card was ‘happy but did not know its benefits’. Critics allege that the reason why Aadhaar is selling itself to millions of poor in the country is to create a foundation of legitimacy to deflect concerns over its possible misuse, unsafe technology and huge costs. Later, with a larger foundation, the UID can be enforced upon all citizens in the near future as the apex identity proof, making everyone vulnerable to several risks described above.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The UIDAI project has proceeded so far without any legal authorization. There has been no feasibility study or cost-benefit analysis preceding the setting up of such a pervasive project. All calculations are of the back-of-the envelope variety. Data theft is a very serious threat to every individual and the country as a whole. There are deeply disconcerting facts about the project that should make even a die-hard UID supporter worry about its long term implications.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;This article has been written by Sushant Sharma. He is a college fresher and avid reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The decision came after about 15,000 citizens had already been enrolled and given their numbers. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/p&gt;
&lt;p&gt;The UK system like the Indian UID had also started with much fanfare, claiming to save nearly 900 million pounds for the taxpayers. While the project was axed, UK’s Home Secretary Theresa May stated - “It (the identity card project) is intrusive and bullying, ineffective and expensive. It is an assault on individual liberty that does not promise a great good.”&lt;/p&gt;
&lt;p&gt;The same logic implies to the India as well. But instead of scraping this over-hyped-failure-in-the-making project, our Prime Minister claims the UID project “will empower all”. But will it actually? That is for us to decide now.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original article &lt;a class="external-link" href="http://www.d-sector.org/article-det.asp?id=1396"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/identity-crisis'&gt;https://cis-india.org/news/identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:16:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
