<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1591 to 1605.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/jesters-clowns-pranksters"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/digital-natives-and-politics-in-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-statement-un-cirp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/lecture-at-nal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/oa-week-day-2-an-interview-with-prof.-arunachalam"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/barriers-to-access-connected-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/understanding-right-to-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/igf-remote-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-guide-to-igf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/foss-instrument-for-accessible-development"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/jesters-clowns-pranksters">
    <title>Of Jesters, Clowns and Pranksters: YouTube and the Condition of Collaborative Authorship</title>
    <link>https://cis-india.org/a2k/blogs/jesters-clowns-pranksters</link>
    <description>
        &lt;b&gt;The idea of a single author creating cinematic objects in a well-controlled scheme of support system and production/distribution infrastructure has been fundamentally challenged by the emergence of digital video sharing sites like YouTube, writes Nishant Shah in this peer reviewed essay published in the Journal of Moving Images, Number 8, December 2009.&lt;/b&gt;
        &lt;div&gt;
&lt;p&gt;The idea of the single author creating cinematic objects in a well-controlled scheme of support system and production/distribution infrastructure has been fundamentally challenged by the emergence of digital video sharing sites like YouTube. The recent state of controversies around YouTube, has foregrounded the question of authorship in collaborative conditions. Questions of who owns the particular videos and what is the role that the large communities of authorship play have not been resolved as the debaters have concentrated only on single videos and singular notions of authorship, dismissing the (this paper proposes) collaborators as jesters, clowns and pranksters, without recognizing their contribution to the videos.&lt;/p&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;I shall begin by misquoting and possibly violating copyright regimes by invoking Dostoyevsky, to say that all dissimilar technologies are the same in their own way, but all similar technologies are uniquely different. Every technological innovation, but particularly innovations affecting authorship and the role of the author, brings with it a new set of anxieties and concerns. David Stewart, in his engrossing book on the history of technology and communication, for example, talks about how in the early years of postal service there were debates around who was the author of the mail that was being delivered. Through a particularly fascinating case that looked at a Lord in London holding the post office responsible for some objectionable mail delivered to his daughter, Stewart traces the origins of techno-neutrality and regulation to look upon technology as merely a bearer of knowledge – in this case, the mail – and the original author, this primordial figure that sits and writes or shoots or sings, as the only person upon whom the responsibility and hence also the credit can be placed.&lt;/p&gt;
&lt;p&gt;Mark Joffe, in his movie The Man Who Sued God, introduces us to the case of Steve Myers, an ex-lawyer in Australia, who sues God because his boat is struck by lightning and his insurance company refuses to pay, claiming it to be an act of God. By claiming to be God’s representatives on Earth, the Christian churches and the Jewish synagogues are held to be the liable party, putting them in the difficult position of either having to pay out large sums of money, or prove that God does not exist. But more than anything else, it is the attribution of responsibility to one particular, identifiable entity that lies at the centre of the movie. Even in the pre-Internet world, one of the biggest sources of anxieties has been determining authorship and putting into place a knowledge apparatus that reinforces the need for such a condition. The question of authorship, while it surfaces in a number of contexts – copyright infringements, intellectual property right regimes, plagiarism, crediting and referencing industries, etc – is perhaps most interestingly manifest on video sharing social networking sites like YouTube and Myspace.&lt;/p&gt;
&lt;p&gt;Rather than addressing what constitutes digital cinema or the future of celluloid, I would instead like to locate the emergence of the idea of authorship, through a historical examination of an ‘old media’. I will be looking at the early history of the book and the print revolution to argue that the condition of authorship that one presumes for the book, and subsequently, through a different trajectory, for cinema, is not something that was inherent to it; and in fact the early history of the book is filled with conflicts around the question of how you could attribute the book as an artefact to one individual author. By examining the conditions that enabled the establishment of the book as a stable object that can be linked to the author, I hope to return us to a different way of thinking about Youtube videos and the debates on authorship that surround it.&lt;/p&gt;
&lt;h3&gt;YouTube and the question of authorship&lt;/h3&gt;
&lt;p&gt;The world of YouTube stakeholders can roughly be divided into two camps: People who swear by it and people who swear at it. The camp has arisen mainly because of differences of opinions on who owns a YouTube video and the content therein. The critics of YouTube – largely recording companies and movie studios and distributors – argue that platforms like YouTube are killing their businesses, emptying their coffers, and are a direct threat to the sacred cow of all cultural productions – the livelihood and the integrity of the creative artist. They make claims that a site like YouTube infringes the copyright regimes because videos get published by somebody who has ripped it from another source, and often does no crediting. Also, that the sales of the music or the movies or television serials go down because of such activities.&lt;/p&gt;
&lt;p&gt;One of the most recent infamous example that can be cited is the case of the Let’s Go Crazy Dancing video case, were the world literally went crazy. In early February 2007, Stephanie Lenz’s 13-month-old son started dancing. Pushing a walker across her kitchen floor, Holden Lenz started moving to the distinctive beat of a song by Prince, “Let’s Go Crazy.” &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Lenz wanted her mother to see the film so she did what any citizen of the 21st century would do: She uploaded the file to YouTube and sent her relatives and friends the link. They watched the video scores of times. It was a perfect YouTube moment: a community of laughs around a homemade video, readily shared with anyone who wanted to watch.&lt;/p&gt;
&lt;p&gt;Sometime over the next four months, however, someone from Universal Music Group also watched Holden dance. Universal manages the copyrights of Prince. It fired off a letter to YouTube demanding that it remove the unauthorized “performance” of Prince’s music. YouTube, to avoid liability itself, complied. YouTube sent Lenz a notice that it was removing her video. She wondered, “Why?” What had she done wrong? Her questions reached the Electronic Frontier Foundation and then started the battle, where on Lenz’s behalf, the EFF lawyers sent a ‘counter-notice’ to YouTube, that no rights of Universal were violated by Holden’s dancing video. Lenz as the author of the video was concentrating on her son’s dancing and that the presence of Prince’s song was negligible and definitely fair use. Yet Universal’s lawyers insist to this day that sharing this home movie is wilful copyright infringement under the laws of the United States. On their view of the law, she is liable to a fine of up to $150,000 for sharing 29 seconds of Holden dancing. They specifically state that Lenz is not the ‘original’ artist who made the music and thus she is appropriating authorship and violating the rights of the artist – Prince, to be identified as the creator of the song. The notice also informed her that they were unhappy with the ‘clowning’ around of Prince’s music which might offend his fan-base.&lt;/p&gt;
&lt;p&gt;The questions which come to the fore are very obvious and not new to the history of legal debates on cinema: What is the content of the video? Who is the author of the video? Who watches the video? What are the intentions of the video? The supporters of the ‘Free as in Beer’ access movements and also of YouTube clearly point out the farcical condition of this battle. As Lawrence Lessig very eloquently points out in his essay on the ‘Defence of Piracy’.&lt;/p&gt;
&lt;p&gt;How is it that sensible people, people no doubt educated at some of the best universities and law schools in the country, would come to think it a sane use of corporate resources to threaten the mother of a dancing 13-month-old? What is it that allows these lawyers and executives to take a case like this seriously, to believe there’s some important social or corporate reason to deploy the federal scheme of regulation called copyright to stop the spread of these images and music? “Let’s Go Crazy” indeed!&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In another instance, which is a competition on YouTube between two videos to reach the coveted “first video to be seen 1 million times” status, brings again these question of the author and the pranksters. Avril Lavigne fans, on the release of her recent Single ‘Girlfriend’, started campaigning to make that video the first to be viewed 1 million times on YouTube. They put it in direct competition with the then most viewed video – ‘History of Dance’ – and started activities that violated the Terms of Service for YouTube. They embedded the videos in many sites and started websites which played the videos automatically. They even created a website which auto reloaded the video every fifteen minutes and encouraged fans to keep the website opened, abusing the power of broad band, while they are browsing, surfing, or even sleeping. The efforts paid off and Avril Lavigne’s ‘Girlfriend’, in July 2008, became the first video to be watched 1 million times in the history of YouTube. One would have thought that such publicity is what a distributor’s wet dreams are made of. However, just after the video reached the 1 million mark and entered the heights of popularity, YouTube received a notice from Times Warner, to remove the video because it was a copyright violation. They also demanded that all the other compilations and samplings which included the song be removed from YouTube. The supporters of the move, condemned the Lavigne fans as ‘pranksters’ or ‘jesters’ who were in for the cheap publicity, because they were not really creators of the video or the authors. In a startling Op-Ed titled ‘How Avril Lavigne Killed YouTube’ in the New York Times, a spokesperson for Times Warner suggested.&lt;/p&gt;
&lt;p&gt;This is not respectable fan behaviour. A fan is somebody who loves and worships the author and not somebody who pretends to be the author. The avrilelavignebandaid group just turned out to be a group of pirates who passed off Lavigne’s video as their own and went on to promote it, forgetting the fact that they were using a democratic platform like YouTube for activities which can only be called theft!&lt;/p&gt;
&lt;p&gt;Predictably, the debate on the question of authorship takes place in a rather somber tone, whether it is the zealous claims of monopoly of production and authorship that the established industries claim for themselves, or the passionate defenses of the YouTubeians. What remains constant through the entire process is the fact that the idea of a singular, identifiable author remains stable and unchallenged. I would like to take a slightly different track here, and try and see how we can think the question of the “production of the author” by revisiting the history of the book and of early print culture, and look at the manner in which the idea of the author emerges.&lt;/p&gt;
&lt;p&gt;There is often an unstated assumption about the book as authored by a single person and authorship is spoken of in a value-neutral and ahistorical manner. It would be useful to situate the condition of authorship within a historical moment, where authorship is not seen to be an apriori condition but a constructed one, and one whose history is located in specific technological changes. The technology of print and paper brought about a set of questions around the question of authorship, and in the same way, the domain of Internet video sharing and collaborative authorship raises a set of questions and concerns.&lt;/p&gt;
&lt;h3&gt;The construction of author/ity&lt;/h3&gt;
&lt;p&gt;In many ways, the debate on authorship and knowledge is similar to the older debate in philosophy between body and self. Critics of self, such as Foucault, demonstrate that the notion of the self has often stemmed from very particular experiences in the Christian West, which were then posited as universal experiences. However, doing away with the notion of the self does not do away with the question of the body. In fact, Foucault goes on to explore the technologies of the self and how it informs our understanding of the body. In a similar vein, while the proponents of the Web 2.0 revolution (sometimes unknown to themselves, echoing debates that happened in print about a 100 years ago) announce either the death of the author or the availability of open licensing, fail to recognize that the question of authorship (and hence authority) are rooted both in particular practices as well as in technological forms. Hence the debates take familiar shapes: author versus pirate, digital versus celluloid, collaborative versus single author, etc.&lt;/p&gt;
&lt;p&gt;It is especially when posing the question of authorship in absolute terms that the cultural producers/consumers on YouTube get reduced to pranksters, jesters or clowns. The debate also excludes the temporal framework of the debate and forget that the Internet is still a work in progress. Even though an Internet year is akin to seven pre-digital years, and time is now experienced in accelerated modes, it is necessary to realize that the domain of collaborative online sharing and production of videos is a relatively new one.&lt;/p&gt;
&lt;p&gt;It may be more useful to think of the post-celluloid world as an extremely ambiguous and fluid period, undoubtedly marked by immense possibilities, but we have not reached any settled phase yet. So if we are to make comparisons, then it is more useful to compare the contemporary period with another moment in history, and the emergence of a cultural form other than cinema, which was marked by an equal fluidity. It is here that I go to the early history of print culture or ‘print in the making’&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and the conflicts over the question of authorship, to demonstrate that the condition of authorship question is an important one, but it is not a question that is unique to YouTube or the Internet. And an examination of the conditions under which authorship came to be established may help us get over our anxieties about authorship, and better understand it with certain lightness – through pranks, jests and clowning around.&lt;/p&gt;
&lt;h3&gt;What’s in a name? – The author and the book&lt;/h3&gt;
&lt;p&gt;For us to understand the idea of print in the making, we need to understand some of the practices that preceded the idea of print. They also enable us to understand the specific nature of the disputes around the question of authorship, and more importantly rethink disputes over authorship as productive disputes. Lawrence Liang in his ‘A brief history of the Internet in 13th and 14th Century’ takes up the example of Chaucer, the father of English poetry. He demonstrates, through different readings, “how the structure and the form of the Canterbury Tales reflects, interestingly, the question of approaches to the idea of authorship as well as the conditions of the production of the Canterbury Tales itself.” Liang looks at the manuscript cultures and the ways in which authorship and rights were understood.&lt;/p&gt;
&lt;p&gt;Borrowing from Mark Rose, Liang shows how, in the Middle Ages, the owner of a manuscript was understood to possess the right to grant permission to copy it, and this was a right that could be exploited, as it was, for example, by those monasteries that regularly charged a fee for permission to copy one of their books. This was somewhat similar to copyright royalty with the crucial difference that the book-owner’s property was not a right in the text as such but in the manuscript as a physical object made of ink and parchment. The value provided by the monastery and the reason for their charging for their copy fee did not emerge just from the existence of the copy alone, but also from the fact that each monastery also had their unique elements in the form of the annotations, the commentary, corrections, which only the particular monastery’s copy might contain. The very act of copying and possession made you the author of that text and also the owner of the book.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; The author was not only the reclusive solitary figure that coins the first word but the various scribes, writers, annotators and litterateurs who offered changes, as well as helped in distribution and copying.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;So, while the popular account of preprint cultures is of slavish copying by scribes, the story turns out to be slightly more complicated. Acting as annotators, compilers, and correctors, medieval book owners and scribes actively shaped the texts they read. For example, they might choose to leave out some of the Canterbury Tales, or contribute one of their own. They might correct Chaucer’s versification every now and then. They might produce whole new drafts of Chaucer by combining one or more of his published versions with others. And these were all legitimate, acceptable and engaged forms of authorship. While this activity of average or amateur readers differs in scale and quality from Chaucer’s work, it opens us to new questions of the relationship between author, text, and reader in the Middle Ages, and also what it may mean to understand contemporary practices of knowledge and cultural creation.&lt;/p&gt;
&lt;p&gt;Scribes and readers responded to Chaucer, Langland, and others, not by slavishly copying, canonizing, or passively receiving their texts, but by reworking them as creative readers. In doing so, they continue and contribute to the great layers of intertextual conversation that made the work of these now canonical authors relevant, interesting, and, fundamentally, possible. Similar debates surround the attribution of authorship to William Shakespeare for his work. Literary historians have periodically made claims that Shakespeare’s plays were written by the then court poet Ben Jonson, that Shakespeare’s plays were written by Christopher Marlowe, who is considered to be his arch enemy, that Shakespeare’s plays were written by another man named Shakespeare, and not the Shakespeare we think we know. At the basis of these arguments was the idea that the plays were designed not to be written but be performed and that in the lively rendering of the play, between different actors and producers, the original text changed. Interestingly, the Shakespearean technique of ‘asides’ and ‘taking the audience into confidence’ was actually a way of inviting the audience to not only receive the story but to read it differently, and edit it with their response to it.&lt;/p&gt;
&lt;p&gt;This invitation was accepted by late Elizabethans who took great pleasure in seeing the same play multiple times to see how it has changed in the performance. Moreover, as multiple copies of the same manuscript started appearing in the living public, along with the actors and the producers, the readers also took great pleasure in creating copies of the takes that drastically cut, expand, edit and otherwise Shakespeare’s plays.&lt;a href="#fn6" name="fr1"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This activity goes beyond the mechanics of audience reception and looks at the plays as a collaborative effort which gets glossed over in the making of the authoritative folios which looked upon all such interventions as anomalies to the text. Before the fixity of text, there was a possibility to think of the text not as a finished product but a work in progress that elicits new responses, meanings and forms through its engagement with the audience. Moreover, the audience, in their rights of consumption, also seemed to possess the right to edit, change and circulate the text. They were the original jesters, pranksters and clowns, who, in their playful response to the text, constructed it to respond to their contexts and traditions. This sounds a lot like the debates we are experiencing on YouTube videos where the readers respond in kind to the poetics of reading and composing within which the YouTube videos operate.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Thus rather than speaking about authorship as something that is intrinsic to either a particular mode of authorship or intrinsic to any technological form, it might be more useful instead to consider the variety of knowledge apparatuses which come into play to establish its authority. In the case for the history of the book, it was clear that the establishment of authorship depended on the arrangements, classifications and kinds of assemblage that make it possible, maintain it as well as critique it. The conventions, for instance, by which the title and author of a work are identified play very specific functions in preparing for knowledge, as do the several kinds of documentation, attribution, citation and copyright.&lt;/p&gt;
&lt;p&gt;The preconditions for authorship cannot easily be made into the object that we identify as author. It is a matter of making evident (making known) the structures of authorship which emerge in ways that provide definitive proof of the imperfectability and ambiguity of the authorial position. To speak of the productive nature of conflicts over authorship is then to recognize that any author – either exalted or dismissed - is constructed in a condition of potential collaboration and revision. The question thus centres on how we use the notion of authorship, how we bring it to light and mobilize it today to understand cultural forms differently. The way the authorship debates take place, there is almost a theological devotion to an exalted idea of author, without a consideration of the apparatus that was established to construct that condition.&lt;/p&gt;
&lt;p&gt;The point is not to do away with the question of the author or construct another catch-all retainer that accepts all forms of engagement as authorship, but to recognize it not as something that is intrinsic or a given but something that is always transient, and to locate it, in the case of digital cinema, within specific practices and technologies. To return to the question of YouTube videos and the future of celluloid image; we are now faced with new questions about authorship and the very form that the digital cinema embodies: If the image itself is no longer made to bear the burden of meaning and intention, can we locate new forms of authorship – sometimes in incidental intertextuality, sometimes in creating conditions (as is in the case of DVDs or digital video sharing sites) narratives, meanings, interpretations and paraphernalia that simultaneously re-emphasize the sacredness of the image while deconstructing the apparatus that establishes a fixity of authorship over that image? Can we look at not only novel forms of interaction and consumption of the celluloid image but at a playful engagement with the image to create a galaxy of responses – sometimes as reciprocal videos, often through comments, embedding mechanisms, using the video not as an object unto itself but as a form of complex referencing and citation to a larger community of artists and authors?&lt;/p&gt;
&lt;p&gt;The future of celluloid, especially if we are locating it in the realm of the Digital Moving Objects of Web 2.0 technologies, is going to have debates which were relevant also to the making of the book. However, this is not to say that the challenges faced and the problematic that emerge are redundant. Indeed, the celluloid frame and its overpowering capacity to incorporate technology, content, response and remixes, to produce the spectacle of watching, posit certain challenges to the Web 2.0 celebrations while simultaneously expanding its own scope of production. YouTube debates around infantile abuse of video/cinema technologies to make dancing babies and furry animals popular need to be read as symptomatic of a much larger question of authorship, authority and the conditions of cultural production rather than signalling the death of celluloid. An escape from the authority question also allows for an escape from the celluloid-digital binary and posits a more fruitful engagement in looking at how celluloid technologies (and the constellation of factors therewith) inform our understanding and analysis of the DMIs that are slowly gaining popularity.&lt;/p&gt;
&lt;p&gt;This research was originally published in the &lt;a class="external-link" href="http://www.jmionline.org/jmi8_4.htm"&gt;Journal of Moving Images&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;See the research paper in &lt;a class="external-link" href="http://cis-india.academia.edu/NishantShah/Papers"&gt;Academia.edu&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;/div&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Holden Lenz’s YouTube debut, that probably made him the most popular baby on the Internet is still available for viewing at &amp;lt;&lt;a href="https://cis-india.org/a2k/internet-governance/Holden%20Lenz%E2%80%99s%20YouTube%20debut,%20that%20probably%20made%20him%20the%20most%20popular%20baby%20on%20the%20Internet%20is%20still%20available%20for%20viewing%20at%20%3Chttp:/www.youtube.com/watch?v=N1KfJHFWlhQ%3E%20retrieved%2012:14%20a.m.%2022nd%20January%202010." class="external-link"&gt;http://www.youtube.com/watch?v=N1KfJHFWlhQ&lt;/a&gt;&amp;gt; retrieved 12:14 a.m. 22nd January 2010.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].The essay is available for open access at &amp;lt;&lt;a class="external-link" href="http://online.wsj.com/article/SB122367645363324303.html"&gt;http://online.wsj.com/article/SB122367645363324303.html&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].I am grateful to Lawrence Liang for this methodological framework where he looks at the emergence of Wikipedia and the pre-print cultures, to look at the similarities and differences between the two. “A Brief History of the Internet in the 13th and 14th Century”. Forthcoming 2010.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].See Alberto Manguel’s A History of Reading. 1990. New York: Penguin Books.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].Daniel Wolf, in Reading History in Early Modern England. 2005. Cambridge, UK: Cambridge University Press, explains in great detail how the reader as well as the author were imagined, constructed and recognized in the early days of print.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].See Molly Abel Travis’s comprehensive account of the debates in Construction of Readers in the Twentieth Century. 1998. Illinois, Chicago: Southern Illinois University Press.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/jesters-clowns-pranksters'&gt;https://cis-india.org/a2k/blogs/jesters-clowns-pranksters&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2012-12-14T10:24:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/digital-natives-and-politics-in-asia">
    <title>On Fooling Around: Digital Natives and Politics in Asia</title>
    <link>https://cis-india.org/digital-natives/blog/digital-natives-and-politics-in-asia</link>
    <description>
        &lt;b&gt;Youths are not only actively participating in the politics of its times but also changing the way in which we understand the political processes of mobilisation, participation and transformation, writes Nishant Shah. The paper was presented at the Digital Cultures in Asia, 2009, at the Academia Sinica, Taipei, Taiwan.&lt;/b&gt;
        
&lt;h3&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;As an increasing population in Asia experiences a lifestyle mediated by digital technologies, there is also a correlated concern about the young Digital Natives constructing their identities and expressions through a world of incessant consumption, while remaining apathetic to the immediate political and social needs of their times. Governments, educators, civil society theorists and practitioners, have all expressed alarm at how the Digital Natives across emerging information societies are so entrenched in the rhetoric, vocabulary and practice of consumption, that they have a disconnect with the larger external reality and are often contained within digital deliriums. They discard the emergent communication and expression trends, mobilization and participation platforms, and processes of cultural production, as trivial or often unimportant. Such a perspective is embedded in a non-changing view of the political landscape and do not take into account that the youth's consumption of globalised ideas and usage of digital technologies, has led to a new kind of political revolution, which might not subscribe to earlier notions of change but nevertheless offer possibilities for great social transformation.&lt;/p&gt;
&lt;h3&gt;Context: Techno-Social Identities&lt;/h3&gt;
&lt;div&gt;It was the beginning of the 1990’s that ushered in the digital globalisation in Asia and emerging information societies were experiencing a moment of significant socio-political and econo-cultural transition. &amp;nbsp;Many countries in South and East Asia restructured their developmental agenda to accommodate the neo-liberal paradigm that opened their economic and cultural capital to the globalised world markets (Roy; 2005). Unlike in the West, especially in the United States of North America and North-Western Europe, where the internet technologies developed in hallowed spaces of academic and government research,&amp;nbsp;conceptualised in an idealised ethos of open source cultures, free speech and shared knowledges (Himanen; 2001), the emergence of digital ICTs were signifiers of a certain economic mobility, globalised aesthetic of incessant consumption, availability of lifestyle-choices and a reconfiguring of the State-Citizen relationship.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;As different countries in Asia invested in the physical infrastructure of ICTs and widespread access to cyberspatial technologies, they also posited the figure of a techno-social citizen-subject who was caught in a double bind: On the one hand, these new subjects were the wealth of the nations, providing a base for outsourcing and back-processing industries, using their skills with digital technologies to aid the State’s aspirations of economic progress and development. With the digital technologies appearing as the panacea for the various problems of illiteracy, population explosion and ethnic/regional conflicts that have marked many Asian countries in the second half of the Twentieth Century, these new subjects were looked upon as the pall-bearers who would usher in the much desired economic development and socio-cultural reform in these emerging information societies. On the other hand, the ability of these techno-social subjects to transcend their local, to circumvent State authority and regulation, and adapt to a new era of economic and cultural consumption, posited a huge problem for these States that strove to contain the spills of an economic decision into the domains of the social, cultural and the political (Bagga, et al; 2005).&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Among the populations who were actively (or, as is often the case, unwittingly) embodying these changes, were the Digital Natives – younger children and youth who have embraced digital technologies and tools as central to their every-day lives and sense of the self – who used (and abused) these technologised spaces in unpredictable and creative ways beyond, and often against, the authority of the State (Shah; 2007) . This particular identity has raised a lot of concern from different authorities like the government, the educators, the legislators and policy makers, and even civil society practitioners and theorists. Most governments had their initial responses to these Digital Native identities as rooted in paranoia and pathologisation. The cyberspatial matrices are looked at with suspicion as creating a world of the forbidden, the dirty and the dangerous. Public debates over pornography, obscenity, need to control and censor the unabashed fantasies that the cyberspaces were catering to, and a call to govern, administer and contain these spaces (and consequently, the people occupying them), have riddled through information societies around the globe.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The many anxieties that have surfaced from parents, teachers, interventionists and policy makers, have led to a global industry that is aimed at keeping the children and youth safe from the ‘ill-effects’ of being online. The responses have been varied and diverse: Radical measures from heavy censorship and regulation of all information accessed through the digital spaces to opening up de-addiction and rehabilitation centres; Strong anti-piracy and pornography drives to forming strict legislation on digital crimes; Extraordinary steps to educate the young people about the perils and pit-falls of internet usage to actual policies dissuade internet usage by regulating the physical spaces of access and the promise of dire punishments for ‘abuse’.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Providing a litany of these anxieties – each made unique by the differential and contextual experience of digital technologies across regions and societies – can be a daunting and eventually a futile exercise because the landscape of digital technologies and spaces is extremely varied and fluid and each new crisis leads to the emergence of a new set of problems. However, there are certain common tensions and uncontested assumptions that run through these anxieties, which need to be understood and examined. It is the intention of this paper to extrapolate these less visible anxieties with a particular focus on the techno-social identity more popularly referred to as Digital Natives.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Misunderstood &amp;amp; Misrepresented&lt;/h3&gt;
&lt;div&gt;The term ‘Digital Natives’ (Prensky, 2001) is slowly becoming ubiquitous in its usage amongst scholars and activists working in the youth-technology paradigm, especially in emerging Information Societies. The phrase is used to differentiate a particular generation – generally agreed upon as a generation that was born after 1980 – who has an unprecedented (and often inexplicable) relationship with the information technology gadgets. It is a phrase used to make us aware of the fact that these people are everywhere: On the roads taking pictures on their mobile phones and uploading them on their blogs and photo-streams; In public transport, in their own individually created islands where they listen to music and furiously typing text message their friends; In schools and universities, multitasking, preparing a classroom presentation while chatting with friends and keeping track of their online gaming avatars; In offices, glued in with equal passion on to dating and social networking sites as the geek mailing list that they moderate; In homes and bedrooms, uploading the most private and intimate details of their lives (or becoming subjects to other&amp;nbsp;peoples’ online activities) on live cam feeds and audio and video podcasts; In our imaginations, sometimes cracking into our machines, at others, helping us remove that malware, and at yet others, appearing as flesh-and-body familiar strangers just a click away.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;All of these are the common sense characteristics attributed to Digital Natives. These are all people born into globalised markets and liberal economies; into accelerated communication and digital representations. And they have skills (and choices) to navigate through the increasingly mediated and digitised technosocial&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; environments that we live in. Most of the stories around these Digital Natives, take on the expected tones of euphoria and paranoia. On the one hand, are the unabashed celebrations of this new digital identity and the possibilities and potentials it offers, and on the other are concerns and alarms about the lack of structures which can make meaning or shape these identities in meaningful and constructive ways which can contribute to a certain vision of democracy, equality, community building and freedom. Both these accounts often contain the Digital Native in geo-political (North-Western, developed countries) and socio-cultural (Educated, affluent, empowered), and do not provide much insight into the incipient potentials of social transformation and political participation with the rise of the Digital Native identity.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;There are strident voices that knell the toll of parting day when it comes to Digital Natives. There is a general outcry from scholars that the typical Digital Native is basically dumb. Mark Bauerlein (2008) calls them ‘The Dumbest Generation’ that is jeopardising our future. He paints them as being in a state of constant distraction made of multi-tasking and gadgets that demand their attention. Psychiatrist Edward Hallowell suggests that they exhibit, because of their scattered engagement with technology, symptoms that look like attention deficit disorders. The educators in class lament about how this is a copy + paste culture that refuses to read and write or even think on their own (Bennett et al, 2008) as Digital natives increasingly depend on machines and networks to do their work for them.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="pullquote"&gt;In 2008, China recorded its 100 millionth internet user and also witnessed the death of a 13-year-old Digital Native, who, after two days of non-stop gaming, jumped off an elevator to ‘meet another character from his game’ (China Times; 2008) – the gaming environment leading him to a state of hypnosis where he could not make a distinction between his physical&amp;nbsp;reality and his digital fantasy. Immediately following this, China started its first internet rehabilitation clinics, identifying internet addiction disorder (IAD) as significantly affecting young people’s mental growth as well as their social and interpersonal skills. Dan Tapscott has announced the birth of the “Screenagers” who are unable to look beyond their need for entertainment and personal gratification, all at their fingertips as they live their lives on the Infobahn.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;It is in the nature of the design of trust online (Nevejan, 2008) that the Digital Native in his/her transactions becomes the centre of his/her own universe. The recent explosion of news feeds on sites like Facebook, or the use of Twitter to create social networks, or blogging which is often contained in echo-chambers (as demonstrated by Howard Dean’s political campaign in the USA, 2004), often gives the young Digital Native an inflated sense of the self. The tools that the Digital Natives have for finding people who think exactly like them lead to a sense of intense self gratification (Shah, 2005) and also provide a dangerous outlet for violence to themselves and others, as they find validation for their actions within that group without facing any protest or conflict – what Loren Coleman (2007) calls the ‘copycat effect’. The phenomenon of younger users seeking internet celebrity status by engaging in dangerous activities like confessionals, recording and sharing of sexual escapades, bullying and exposing themselves in ridiculous situations to get attention and limelight, have raised concern among parents and educators (Gasser and Palfrey; 2007).&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;This list is by no means exhaustive but gives a clear indication of how the Digital Natives are contained in the matrices of the internet in their representations and are painted as irresponsible and irreverent individuals who appear as pranksters, jesters, and clowns, carrying with them, also the darker sides of cruel humour, dark deeds and sinister pranks which need to be regulated and censored – to save the society from this growing menace, and indeed, to save them from themselves.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Pranksters, Jesters and Clowns?&lt;/h3&gt;
&lt;div&gt;It is easy, from such perspectives, to not only demonise (thus enabling regulation and control) of Digital Native identities but also ignoring their new aesthetics, politics and mechanisms of participation and change as trivial or ‘merely cultural’. There have been many instances, over the years, where each new technology and technologised space of cultural production has been treated as frivolous, infantile or faddy. Let me take this discussion through three case-studies where Digital Native spaces, engagements and activities have been perceived as juvenile or foolish to examine this particular presumption of trivialness that is often pegged on the Digital Natives and their activities. Each Case-Study has been structured in two parts: the first gives a short understanding of the technologised phenomenon and space, the second provides a brief summary of the event.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;Flash (Mob) in a Pan from India&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;&lt;strong&gt;Flash-mobs&lt;/strong&gt;: Organise, congregate, act, disperse – that is the anatomy of a flash mob. Howard Rheingold, in his book titled Smart Mobs, suggests that the people who make up smart mobs co-operate in ways never before possible because they carry devices that possess both communication and computing capabilities. Their mobile devices connect them with other information devices in the environment as well as with other people's telephones. Dirt-cheap microprocessors embedded in everything from box tops to shoes are beginning to permeate furniture, buildings, neighbourhoods, products with invisible intercommunicating smartifacts. When they connect the tangible objects and places of our daily lives with cyberspace, handheld communication media mutate into wearable remote control devices for the physical world (Rheingold, 2001). &amp;nbsp;The flash-mobs, along with the now ubiquitous terms like viral-networking and crowd-sourcing are the most significant examples of the ways in which the digital networks can mobilise people towards a common cause within the digital matrices as well as in the physical world.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;The story&lt;/strong&gt;: India’s first recorded flash-mob started with a website asking for volunteers who wanted to ‘have some serious fun’. On the 3rd of October, &amp;nbsp;when several cell phones rang and email inboxes found an email that briefly chalked out the time and space for a venue – a Flash site. Text messages were sent to all the members who had volunteered by anonymous agencies. And then at 5:00 p.m., the next day, about a 100 participants assembled at a mall called Crossroads.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;At the Crossroads Flash-Mob, the mobsters screamed at the top of their voices and sold imaginary shares. They danced. They all froze still in the middle of their actions. And then without as much as a word, after two minutes of historic histrionics, they opened their umbrellas and dispersed, leaving behind them a trail of bewilderment and confusion. This was India’s first recorded flash-mob. People who never knew each other, did not have any largely political purpose in mind and did not really intend to extend relationships, got together to perform a set of ridiculous actions at Crossroads. This first flash mob sparked off many different flash mobs all around the nation – most of them marking out spaces like multiplexes, shopping malls, gaming parlours, body shops, large commercial roads and shopping complexes as their flash sites.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;One of the most celebrated accounts of the flash-mob was by Bijoy Venugopal, a serious blogger and writer (Venugopal; October 2003), who also reiterated the fact that the intention of participation was to have some ‘serious fun.’ Subsequent experience-sharing by other members of the flash-mobs also endorsed the idea that the flash-mob was like an extension of online gaming or the tenuous digital communities which are a part of the lifestyle choices and social networking for an increasing number of people in the large urban wi-fi centres of India. The Flash-mob seemed to carry with it all the elements that digital cyberspaces have to offer – a sense of tentative belonging, a grouping of people who seek to network with each other based on similar interests, a growing sense of a need to ‘enchant’ the otherwise quickly mechanised world around us, and an exciting space of novel experiences and unmonitored, pseudonymous (except for the physical presence) fun.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The flash-mob gained huge media coverage and local buzz and was talked about and debated upon quite furiously in popular media. The organisers of the flash-mobs became instant celebrities and were questioned repeatedly about the reasons for organising the flash-mob. The answer was always unwavering – the organisers insisted that the flash-mobs were a way for them to instil fun and novelty in the very hurried life in Mumbai. On the website, Rohit Tikmany, one of the original organisers, very passionately argues:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;blockquote&gt;
&lt;div&gt;We are not making any statement here - we are not protesting anything - we are not a revolution, a movement or an agitation. Our purpose (if any) is solely to have fun… None of us is here for anything except fun. We will not have any sponsors (covert or overt) and we will never respond to any commercial/political/religious influences. (Tikmany, 2003)&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;There was a particular and specific disavowal of the ‘political’. The organisers went out of their way to convince that they do not have any political cause that they endorse, that they are not affiliated with any socio-political organisations or parties in the city, and that their actions were guided only by the desire to have some fun and games. The popular media painted it as a fad that made its point about internet mobilisation but was nothing more than a flash in a pan. Initial responses to the flash-mobsters painted them as clowns – a bunch of young people having a bit of fun. It came as a particular shock, in the face of this celebratory mode of looking at flash-mobs and the composition of the crowd (largely upper class, English speaking, Educated, and implicated in the digital circuits of globalised consumption), when the flash-mobs came to be banned in Mumbai and then around the country, as ‘a serious threat the safety and security of the public’ and offering ‘unfavourable conditions of danger’ in the city.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Flash-mobs have been recorded around the globe, for different reasons and to fulfil varied socio-political ambitions. However, most of them have been explicitly for fun. Tapio Makela at the Tempare University, Finland, suggests that flash-mobs are indeed the first real-time digital gaming experience that the internet can provide us with. And yet, flash-mobs are being regulated in almost all emerging Information Societies. While the political rhetoric of unsupervised mobilisation can be understood easily, what lies beneath it is a much more interesting story. For emerging information societies in the world, the digital technologies have a much more significant role to play in economic development and creation of global infrastructure. Most governments have invested highly in the creation of techno-social skill based identities and have a clear idea of the ‘correct’ usage of technology. The flash-mobs present a situation where the ‘ideal’ citizens who should be engaging with these technologies to enhance the labour markets and augment the nation’s efforts at restructuring in global times, are engaging in apparently frivolous activities which are aimed at self gratification and fun. Flash-mobs, through their aesthetic of irreverence and fun, also present a space for criticism and political negotiation to the Digital Natives, who, while they might not be equipped to engage with traditional channels of politics, are now finding ways by which to make their opinions and expressions heard.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The Flash-mob in Mumbai, for example, builds upon a much richer contextual local history of politics and access. Crossroads, the flash-site, was also the first American Super-Mall in India. In 2001, when the mall opened, it was restrictive in its access, where it demanded the curious onlooker to either pay an entry fee of 50 Indian Rupees or be in possession of a Platinum Credit Card or a Cell phone to enter the mall. The idea was that only a certain kind of citizenship was welcome in this consumerist heaven. It was presumed that people who do not come from a class that can afford to purchase things in the mall might not know how to behave in the mall. A public interest litigation suit against the mall soon revoked these conditions of access and announced the mall as a public space of consumption. However, the lineage of the restrictive conditions that the mall opened with, resonates through the local knowledge systems. The first flash-mob at Crossroads, even though it was ‘fun’, managed to provide a critique of the new class based urban society that global India is building. Ironically, the people who constituted that flash-mob and managed to turn the mall into a place of total chaos for the brief performance were the ‘desirable’ people for the mall. Such a critique, while it might not be overtly articulated for different reasons, still manages to surface once the contextual histories of these events are produced.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;10 Legendary Obscene Beasts &amp;nbsp;from China&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;&lt;strong&gt;User Generated Knowledge sites&lt;/strong&gt;: The world of knowledge production was never as shaken as it was with the emergence of the Wikipedia – a user generated knowledge production system, where anybody who has any knowledge, on almost anything in the world, can contribute to share it with countless users around the world. The camps around Wikipedia are fairly well divided: there are those who swear by it, and there are those who swear against it. There are scholars, activists and lobbyists who celebrate the democratisation of knowledge production as the next logical evolutionary step to the democratic access to knowledge. They appreciate the wisdom of crowds and revel in the joy that in the much discussed Nature magazine experiment, the number of errors in Wikipedia and its biggest opponent, Encyclopaedia Britannica, were almost the same. And then there are those who think of the Wikipedia and other such peer knowledge production and sharing systems as erroneous, unreliable and a direct result of collapsing standards that the vulgarisation of knowledge has succumbed to in the age where information has become currency. Add to this the hue and cry from academics around the globe who lament falling research standards as the copy+paste generations (Vaidhyanathan; 2008) in classrooms skim over subjects in Wikipedia rather than analysing and studying them in detail from those hallowed treasuries of knowledge – reference books.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;As can be expected, the questions about the veracity, verifiability, trustworthiness and integrity of Wikipedia and other such user generated knowledge sharing sites (including YouTube, Flickr, etc.) are carried on in sombre tones by zealots who are devoted to their beliefs. However, the one question that remains unasked, in the discussion of these sites, is the question of what purpose it might serve beyond the obvious knowledge production exercise.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;The Story&lt;/strong&gt;: In China, where the government exerts great control over regulating online information, Wikipedia had a different set of debates which would not feature in the more liberal countries – the debates were around what would be made accessible to a Wikipedia user from China and what information would be blanked out to fit China’s policy of making information that is ‘seditious ‘and disrespectful’, invisible. After the skirmishes with Google, where the search engine company gave in to China’s demands and offered a more censored search engine that filtered away results based on sensitive key-words and issues, Wikipedia was the next in line to offer a controlled internet knowledge base to users in China.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;However, another user-generated knowledge site, more popular locally and with more stringent self-regulating rules than Wikipedia, became the space for political commentary, satire, protest and demonstration against the draconian censorship regimes that China is trying to impose on its young users. The website Baidu Baike (pinyin for Baidu Encyclopaedia), became popular in 2005 and was offered by the Chinese internet search company Baidu. With more than 1.5 million Chinese language articles, Baidu has become a space for much debate and discussion with the Digital Natives in China. Offered as a home-grown response to Wikipedia, Baidu implements heavy ‘self-censorship to avoid displeasing the Chinese Government’ (BBC; 2006) and remains dedicated to removing ‘offensive’ material (with a special emphasis on pornographic and political events) from its shared space.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;It is in this restrictive regime of information sharing and knowledge production, that the Digital Natives in China, introduced the “10 legendary obscene beasts” meme which became extremely popular on Baidu. Manipulating the Baidu Baike’s potential for users to share their knowledge, protestor’s of China’s censorship policy and Baidu’s compliance to it, vandalised contributions by creating humorous pages describing fictitious creatures, with names vaguely referring to Chinese profanities, with homophones and characters using different tones.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The most famous of these creations was &amp;nbsp;Cao Ni Ma &amp;nbsp; (Chinese: 草泥马), literally "Grass Mud Horse", which uses the same consonants and vowels with different tones for the Chinese language profanity which translates into “Fuck Your Mother” &amp;nbsp;cào nǐ mā (肏你妈) . This mythical animal belonging to the Alpaca race had dire enemies called héxiè (河蟹), literally translated as “river crabs”, very close to the word héxié (和谐) meaning harmony, referring to the government’s declared ambition of creating a “harmonious society” through censorship. The Cao Ni Ma, has now become a popular icon appearing in videos distributed on YouTube, in fake documentaries, in popular Chinese internet productions, and even in themed toys and plushies which all serve as mobilising points against censorship and control that the Chinese government is trying to control.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;However, the reaction from those who do not understand the entire context is, predictably, bordering on the incredulous. Most respondents on different blogs and meme sites, think of these as mere puns and word-plays and juvenile acts of vandalism. The Chinese monitoring agencies themselves failed to recognise the profane and the political intent of these productions and hence they survived on Baidupedia, to become inspiring and iconic symbols of the slow and steady protest against censorship and the right to information act in China. Following these brave acts, Baidu’s user base also experimented very successfully with well-formed parodies and satires, opening up the first spaces in modern Chinese history, for political criticism and negotiation.&lt;a name="fr2" href="#fn1"&gt;[2]&lt;/a&gt; What is discarded or overlooked as jest or harmless pranks, are actually symptomatic of a new generation using digital tools and spaces to revisit what it means to be politically active and engaged. The 10 obscene legendary creatures, like the flash-mobs, can be easily read as juvenile fun and the actions of a youth that is quickly losing its connection with the immediate contemporary questions. However, a contextual reading combined with a dismantling of the “Digital Native in a bubble” syndrome, can lead to a better understanding of the new aesthetic of social transformation and political participation – one which is embedded in the growing aesthetic of fun, irreverence, and playfulness.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;strong&gt;A 32 Year Old Dancing Global Nomad&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;Context: The aesthetic of irreverence, of playfulness and of exuberant joy is perhaps the best demonstrated by the third case-study which deals with user generated content and sharing&amp;nbsp;sites like YouTube and Blip TV or social networking sites like Facebook and Livejournal.&amp;nbsp;With the easy availability of digital technologies of production – portable laptops and digital cameras, PDAs enabled with phones and multi-media services, webcams and microphones – and tools to share and exchange these productions, there has been an unprecedented amount of digital cultural production which has propelled what we now call the Web 2.0 explosion. There has been much criticism about how we are building a junkyard of digital information. Videos of cats and hamsters dancing, inane audio and video podcasts documenting personal anecdotes and opinions, blogs that publish everything from favourite recipes to sexual escapades, and social networking sites that map rising networks, all add to the immense amount of data that dwells in cyberspace. Questions of data mining, of data redundancy are coupled with alarms of the ‘infantile’ uses of technology have emerged in recent debates around this user generated content. Governments are also battling with problems of piracy, hate-speech, bullying and fundamentalism that have found pervasive channels through these platforms and networks.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;The Story&lt;/strong&gt;: In the middle of celebrity hamsters (Hampster the Hamster), popular dancing babies, and parodies of pop stars, there was one particular internet celebrity who is famous, because nobody knows where he is going to dance next. “Where the Hell is Matt?” is a viral video which shot to fame first in 2006, which features Matt Harding, a video game designer from America, who performs a singularly identifiable dance routine in front of various popular destinations in different countries around the world. It started off as a friend recording Matt Harding doing a peculiar dance in Vietnam became popular on the internet and became one of the most popular videos on cyberspace, with his second video released in 2008, viewed 19,860,041 times on YouTube as on 31st March 2009.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Harding has now become a celebrity, featuring on TV talk shows, guest lecturing at universities, and is brand ambassador to a couple of global brands. He is now, also featured dancing on NASA’s Astronomy Picture of the Day website under the title “Happy People Dancing on Planet Earth”, claiming that it shows humans worldwide sharing a joy of dancing. Unlike the flash-mobs and the Baidupedia instances, Where The Hell is Matt? does not have any overt political position or agenda. It has not entered into a condition of strife or struggle with any authoritative regimes or systems of conflict. And yet, what Harding has managed, through his ‘pranks’ , is to create a series of videos which have now come to embody values of cultural diversity, tolerance and universal joy. Instead of making serious speeches, petitions or demonstrations, through his prankster image, Matt Harding has become the unofficial ambassador of peace and harmony around the globe, being discussed avidly by anybody who sees him, with a smile.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;One can either ignore this viral video as a short-lived meme that will soon be forgotten by the next dancing sensation. Even if it might be true, the impact that the “Where the Hell is Matt?” videos have created is significant. When Matt sarcastically said at Entertainment Gathering, that his videos were a hoax, that he was an actor and the videos were an exercise in animatronic puppets and video editing, he had everybody from fans on blogs to new reporters on television responding to it – some often with outrage at being ‘fooled’ by such morphing. Harding revealed his ‘hoax about a hoax’ at the Macworld convention to great amusement. While Matt’s dancing pranks might indeed be forgotten by the next big thing, it is still a fruitful exercise to read it as symptomatic of a much larger redefinition of notions of political participation and social transformation that the Digital Natives and their technology-mediated environments are bringing about.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Digital Natives: Causes, Pauses&lt;/h3&gt;
&lt;div&gt;Running common, through all these three stories, in popular discourse as well as in academic scholarship, is the presumption of frivolity and non-seriousness that misses out on the much larger contexts of socio-political change. The youth have always been at the forefront of social transformation and political participation. The youth, traditionally, has also had an intimate relationship with new technologies of cultural production, producing influential aesthetics through experimentation and innovation. A brief look at the socio-political history of technologies, shows us that the young who grow up with certain technologies as central to their mechanics of life and living, have led to a reconfiguring of their role and function in the society. The emergence of the print culture, for example, led to the energising of the public spheres in Europe, where young people with access to education and books, could participate and restructure their immediate socio-political environments. Cinematic realism has had its heyday as the tool for political mobilisation through representing the voice of the underprivileged communities. The expansion of the tele-communication networks have led to the rise and fall of governments while changing the face of socio-political and economic activities.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;It is not as if these technologies were without their own concerns, questions and doubts. However, most of these anxieties have been successfully resolved through experience, experiment and analysis. Such practices and communities have Moreover, the promise and the potential of this youth-technology engagement have always surpassed the ensuing anxiety.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;With the Digital Natives, as a small percentage of the world’s population engages with technologies and tools that are quickly gaining currency and popularity, there seems to be a cacophony of alarms and anxieties which seem to have no scope for resolution or respite. And this alarm seems to be louder and more anxious than ever before because it marks a disconnect of the Digital Natives from the role that youth-technology relationships has borne through history – that the Digital Natives are in a state of apathy when it comes to engaging in processes of social transformation and political mobilisation and prefer to stay in isolated bubbles of consumerism and entertainment. This particular accusation that is levelled at the Digital Natives, if true, is not only alarming but also bodes dire fortunes for the whole world as a new generation refuses to engage with questions of politics, governance and transformation outside of the realm of the economic and the personal. This particular disconnect amplifies the other anxieties – moral anxieties around pornography and sexuality, ethical anxieties about plagiarism and piracy, intellectual anxieties about knowledge production and research – because the re-assurance that the Digital Natives will augment the processes of positive social transformation and fruitful political participation, is perceived as lost.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Moreover, unlike earlier technologies, the youth is not being guided into the use of digital technologies but are actually spearheading the development, consumption and rise of these technologies. There is a strong reversal of the power structure, where the digital migrants and settlers have to depend upon the Digital Natives to traverse the terrain of the digital environments. The Digital Natives are in a uniquely singular position where, due to the economic and global restructuring of the world, their world-view and ideas are gaining more currency and visibility than those belonging to previous generations. However, the adults who enter the world of the Digital Natives, insist on viewing them through certain misapplied prisms:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Difference without change&lt;/strong&gt;: &amp;nbsp;These stories or anecdotal data almost always gives us a sense of marked difference of identity in an unchanging world. The Digital Native remains a category or identity which remains to be understood in its difference to integrate it into a world vision that precedes them. The difference is invoked only to emphasise the need for continuity from one generation to another; and thus making a call to ‘rehabilitate’ this new generation into earlier moulds of being.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;The social construction of loss&lt;/strong&gt;: A common intention of these stories is to mourn a loss. Each new technology has always been accompanied by a nostalgia industry that immediately recreates a pre-technologised, innocent world that was simpler, better, fairer, and easier to live in. Similarly, the Digital Native identity is premised on multiple losses&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; : loss of childhood, loss of innocence, loss of control, loss of privacy etc. Predicated on this list, is the specific loss of political participation and social transformation; a loss of the youth as the political capital of our digital futures.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Trivialising the realm of the Cultural&lt;/strong&gt;: The third is that these anecdotes of celebration and fear, mark the Digital Native’s actions and practices as confined to some “My bubble, My space” personal/cultural &amp;nbsp;private world of consumption which, when they do connect to larger socio-political phenomena, is accidental. Moreover, they concentrate on the activities and the immediate usage/abuse of technology rather than concentrating on the potentials that these tools and interactions have for the future. They paint the Digital Native as without agency, solipsistic, and in the ‘pointless pursuit of pleasure’, thus dismissing their cultural interactions and processes as trivial and residing in indulgent consumption and personal gratification.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Such perspectives and analytical impulses are a result of the pertinent and influential research methods and disciplinary baggage within contemporary cybercultures studies. Much of the imagination of the Digital Natives carries the baggage of false dichotomies and binaries of discourse around technologically mediated identities. Within cybercultures studies, as well as in earlier interdisciplinary work on digital internets, there has been an explicit and now an implied division of the physical and the virtual. The virtual seems to be a world only loosely anchored in the material and physical reality, and almost seems to be at logger heads with the real in producing its own hyper-visual reality. These distinctions, though not often invoked, are present in different imaginations of the Digital Natives. They seem to reside in virtual worlds producing a ‘disconnect’ from their everyday reality. The alternative public spheres of speech and expression created by the rise of the blogosphere and peer-to-peer networking&amp;nbsp;sites seem to reside only within the digital domain. The frenzied cultural production and consumption on sites like YouTube and Second Life are contained within digital deliriums. Similarly, when attention is paid to Digital Natives and their activities, it is confined to what they do, inhabit, consume and produce online, often forgetting their embodied presence circumscribed by different contexts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The notion of contexts, as it is relevant and important to understand techno-social identities, is even more crucial when talking about Digital Natives. Contextualised understanding of their environments, histories, and engagement help us to realise that Digital Native is not a universal identity. Even though the technologies that they use are often global in nature, and the tools and gadgets they employ are shared across borders, the way a digital native identity is constructed and experienced is different with different contexts. As we see, in the case of the flash-mobs and the Baidupedia, the digital native, especially when it comes to social transformation and political participation, is a fiercely local and context based identity and community. It is because of this, that Ethan Zuckerman’s Cute Cat Theory (2005) actually makes sense – that the Digital Natives, when they do utilise digital tools for social transformation or mobilisation, will not go in search for new tools. Instead, they will use the existing platforms and spaces that they are already using to share pictures of cute cats across the globe. The idea of a context based Digital Native identity also leads me to suggest two things to conclude this paper: The first, that Digital Natives are not merely people who are using new tools and technologies to augment the ideas of change and participation that an earlier, development-centric generation has grown up with. By introducing and experimenting with their aesthetic of fun, playfulness and irreverence, they are re-visiting the terrain of what it means to be political and often embedding their politics into seemingly inane or fruitless cultural productions, which create sustainable conditions of change. The second, that the Digital Natives, while they seem to be a different generation and having a unique technology-human relationship, are not really different when it comes to envisioning the role of youth-technology paradigm in the society. What is really different, with this young generation of active, interested and engaged &amp;nbsp;people, is that their local movements and actions are globally shared and accessed, thus forging, perhaps in unprecedented ways, international and cross-cultural communities of support, help and interest. Moreover, these communities subscribe to a new paradigm and vocabulary of socio-political change which is often tied to their every-day actions of entertainment, leisure, networking and cultural production, which provide the potential for the next big change that the Digital Natives set themselves to.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. The term ‘techno-social’, coined by Arturo Escobar, refers to a social identity mediated by technology. It puts special emphasis that the digital and physical environments need to be seen in segue with each other rather than disconnected as is often the case in cybercultures and technology studies.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].A more serious political satire that moves beyond just punning and avoiding censorship was found in the now-deleted entry for revolutionary hero Wei Guangzheng (伟光正, taken from 伟大, 光荣, 正确, "great, glorious, correct"). An excerpt from it is included here for sampling.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;strong&gt;Wei Guangzheng&lt;br /&gt;&lt;/strong&gt;Comrade Wei Guangzheng is a superior product of natural selection. In the course of competition for survival, because of certain unmatched qualities of his genetic makeup, he has a great ability to survive and reproduce, and hence Wei Guangzheng represents the most advanced state of species evolution.&amp;nbsp;Here is the evolution of Wei Guangzheng's thinking: Since the day of his birth, comrade Wei Guangzheng established a guiding ideology for the people's benefit, and in the course of connecting it with the real circumstances of his beloved Sun Kingdom, a process of repeated comparisons that involved the twists and turns of campaigns of encirclement and suppression, his ideology finally realized a historic leap forward and generated two major theoretic achievements. The first great theoretic leap was the idea of leading a handful of people to take up arms to cause trouble, rebellion, and revolution in order to build a brave new world, and to successfully seize power. This was the "spear ideology." The second great theoretic leap was a theory, with Sun Kingdom characteristics, in which Wei Guangzheng was unswervingly upheld as leader and the people were forever prevented from standing up. This was the "shield theory." Under the guidance of these two great theoretic achievements, comrade Wei Guangzheng won victory after victory. Practice has proven, "Without Wei Guangzheng, there would be no Sun Kingdom." Following the road of comrade Wei Guangzheng was the choice of the people of the Sun Kingdom and an inevitable trend of historical development.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]Indeed, as Chris Jenks notes in his work on the construction of youth, through history, it is the function of civilisation to construct youth as not only an innocent category which needs to be saved but also a demonic identity which needs to be trained and taught into the roles and functions of civilisation. Each emergent technology of cultural production, in its turn, has been examined as potentially contributing to the notions of the youth and their role and function in the society.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Bagga, R.K, Kenneth Keniston and Rohit Raj Mathur (Eds). (2005)&amp;nbsp;The State, IT and Development. New Delhi: Sage.&lt;/li&gt;
&lt;li&gt;Bauerlein, Mark. (2008). &lt;em&gt;The Dumbest Generation : How the Digital Age Stupefies Young Americans and Jeopardizes Our Future, or Don't Trust Anyone Under 30&lt;/em&gt;. New York : Tarcher/Penguin Books.&lt;/li&gt;
&lt;li&gt;BBC News. (2006). "Site Launches: Chinese Wikipedia". Available at &lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/asia-pacific/4761301.stm"&gt;http://news.bbc.co.uk/2/hi/asia-pacific/4761301.stm&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Bennett, Sue, Karl Maton and Lisa Kervin. 2008. “The ‘Digital Natives’ Report - &amp;nbsp;A Critical Review of the Evidence”, Melbourne. Available at &lt;a class="external-link" href="http://www.cheeps.com/karlmaton/pdf/bjet.pdf"&gt;http://www.cheeps.com/karlmaton/pdf/bjet.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;China Times, The. (2008). “Internet de-addiction centres in China”. Article available at &lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/asia-pacific/4327258.stm"&gt;http://news.bbc.co.uk/2/hi/asia-pacific/4327258.stm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Coleman, Loren. (2007). &lt;em&gt;The Copycat Effect: How the Media and Popular Culture Trigger the Mayhem in Tomorrow's Headlines&lt;/em&gt;. Simon &amp;amp; Schushter.&lt;/li&gt;
&lt;li&gt;Escobar, Arturo. (1994). “Welcome to Cyberia: Notes on the Anthropology of Cyberculture.” The Cybercultures Reader. Eds. David Bell and Barbara Kennedy. NY:Routledge.&lt;/li&gt;
&lt;li&gt;Himanen, Pekka. (2001). &lt;em&gt;The Hacker Ethic&lt;/em&gt;. New York: &amp;nbsp;Random house Trade Paperbacks.&lt;/li&gt;
&lt;li&gt;Navejan, Caroline. (2008). &lt;em&gt;The Design of Trust&lt;/em&gt;. Utrecht University. (Forthcoming).&lt;/li&gt;
&lt;li&gt;Palfrey, John and Urs Gasser. (2008). Born Digital. New York: Basic Books.&lt;/li&gt;
&lt;li&gt;Prensky, Marc. (2001). Digital Natives, Digital Immigrants, available at &lt;a href="https://cis-india.org/digital-natives/blog/Prensky, Marc. 2001. Digital Natives, Digital Immigrants, available at http:/www.marcprensky.com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf Retrieved January 2009." class="external-link"&gt;http://www.marcprensky.com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf&lt;/a&gt;,&amp;nbsp;retrieved January 2009.&lt;/li&gt;
&lt;li&gt;Rheingold, Howard. (2001). Smart Mobs: the next social revolution . New York: Perseus Publishing.&lt;/li&gt;
&lt;li&gt;Roy, Sumit. (2005). &lt;em&gt;Globalisation, ICT and Developing Nations&lt;/em&gt;. New Delhi: Sage.&lt;/li&gt;
&lt;li&gt;Shah, Nishant. (2005). &amp;nbsp;“Playblog: Pornography, Performance and Cyberspace”. Available at &lt;a class="external-link" href="http://www.cut-up.com/news/detail.php?sid=413"&gt;http://www.cut-up.com/news/detail.php?sid=413 &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Shah, Nishant. (2007). “Subject to Technology” Inter Asia Cultural Studies Journal. Available at &lt;a href="https://cis-india.org/publications/cis-publications/nishant-shahs-publications" class="external-link"&gt;http://cis-india.org/publications/cis-publications/nishant-shahs-publications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tapscott, John. (2008). Grown-Up Digital: How the Net Generation is Changing your World. New York: Vintage Books.&lt;/li&gt;
&lt;li&gt;Tikmany, Rohit. (2003). &lt;a href="https://cis-india.org/digital-natives/blog/Tikmany, Rohit. 2003. http:/www.mumbaiorgs.com 3rd March, 2004, 11:15 a.m. IST" class="external-link"&gt;http://www.mumbaiorgs.com&lt;/a&gt; 3rd March, 2004, 11:15 a.m. IST.&lt;/li&gt;
&lt;li&gt;Vaidhyanathan, Siva. (2008). Available at Chronicle of Higher Education, September 19, 2008. &lt;a class="external-link" href="http://chronicle.com/free/v55/i04/04b00701.htm"&gt;http://chronicle.com/free/v55/i04/04b00701.htm&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Venugopal, Bijoy. (2003). &lt;a class="external-link" href="http://www.rediff.com/netguide/2003/oct/05flash.htm"&gt;http://www.rediff.com/netguide/2003/oct/05flash.htm&lt;/a&gt;. 20th December, 2003, 12:23 p.m. IST.&lt;/li&gt;
&lt;li&gt;Zuckerman, Ethan. (2008). "The Cute Cat Theory Talk at ETech". Available at &lt;a class="external-link" href="http://www.ethanzuckerman.com/blog/2008/03/08/the-cute-cat-theory-talk-at-etech/"&gt;http://www.ethanzuckerman.com/blog/2008/03/08/the-cute-cat-theory-talk-at-etech/&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;This research paper was published in&amp;nbsp;Academia.edu. It can be downloaded &lt;a class="external-link" href="http://cis-india.academia.edu/NishantShah/Papers"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/digital-natives-and-politics-in-asia'&gt;https://cis-india.org/digital-natives/blog/digital-natives-and-politics-in-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Web Politics</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-14T12:11:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc">
    <title>Open Access to Academic Knowledge</title>
    <link>https://cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc</link>
    <description>
        &lt;b&gt;The Indian Institute of Science and the Centre for Internet and Society are holding a workshop on 'Open Access to Academic Knowledge' on Wednesday 2nd November from 14:30 to 17:00&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The workshop will involve an introductory presentation by Dr Francis Jayakanth of the National Centre for Science Information, followed by an interactive discussion of Open Access issues and ideas. This is a free event.&lt;/p&gt;
&lt;p&gt;The workshop will take place in the Seminar Hall of the National Centre for Science Information, within the Indian Institute of Science from 14:30&amp;nbsp;to 17:00. For a map to this event &lt;a class="external-link" href="http://maps.google.co.in/maps/place?cid=4928722993497384404&amp;amp;q=ncsi&amp;amp;hl=en&amp;amp;ie=UTF8&amp;amp;ll=13.043024,77.496185&amp;amp;spn=0.000167,0.000172&amp;amp;t=m&amp;amp;z=13&amp;amp;vpsrc=0"&gt;click here.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For more information and to confirm attendance please contact Tom Dane (&lt;a href="mailto:tom@cis-india.org"&gt;tom at cis-india dot org&lt;/a&gt;) or on +91 7829 451 902.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc'&gt;https://cis-india.org/openness/events/open-access-to-academic-knowledge-at-the-iisc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>thomas</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-03T05:40:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-statement-un-cirp">
    <title>India's Statement Proposing UN Committee for Internet-Related Policy</title>
    <link>https://cis-india.org/internet-governance/blog/india-statement-un-cirp</link>
    <description>
        &lt;b&gt;This is the statement made by India at the 66th session of the United Nations General Assembly, in which its proposal for the UN Committee for Internet-Related Policy was presented.&lt;/b&gt;
        
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;66th Session of the UN General Assembly&lt;/h2&gt;
&lt;h2&gt;New York. October 26, 2011.&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Agenda Item 16: Information and Communications&lt;/h2&gt;
&lt;h2&gt;Technologies for Development (ICT): Global Internet Governance&lt;/h2&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Statement by India&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;br /&gt;Mr. Chairman,&lt;br /&gt;&lt;br /&gt;We thank the Secretary-General for his report on enhanced cooperation on public policy issues pertaining to the Internet, contained in document A/66/77, which provides a useful introduction to the discussions under this agenda item.&lt;br /&gt;&lt;br /&gt;As a multi-ethnic, multi-cultural and democratic society with an open economy and an abiding culture of pluralism, India emphasizes the importance that we attach to the strengthening of the Internet as a vehicle for openness, democracy, freedom of expression, human rights, diversity, inclusiveness, creativity, free and unhindered access to information and knowledge, global connectivity, innovation and socio-economic growth.&lt;br /&gt;&lt;br /&gt;We believe that the governance of such an unprecedented global medium that embodies the values of democracy, pluralism, inclusion, openness and transparency should also be similarly inclusive, democratic, participatory, multilateral and transparent in nature.&lt;br /&gt;&lt;br /&gt;Indeed, this was already recognized and mandated by the Tunis Agenda in 2005, as reflected in paragraphs 34, 35, 56, 58, 59, 60, 61 and 69 of the Agenda. Regrettably, in the six long years that have gone by, no substantial initiative has been taken by the global community to give effect to this mandate.&lt;br /&gt;&lt;br /&gt;Meanwhile, the internet has grown exponentially in its reach and scope, throwing up several new and rapidly emerging challenges in the area of global internet governance that continue to remain inadequately addressed. It is becoming increasingly evident that the Internet as a rapidly-evolving and inherently global medium, needs quick-footed and timely global solutions and policies, not divergent and fragmented national policies.&lt;br /&gt;&lt;br /&gt;The range and criticality of these pressing global digital issues that continue to remain unaddressed, are growing rapidly with each passing day. It is, therefore, urgent and imperative that a multilateral, democratic participative and transparent global policy-making mechanism be urgently instituted, as mandated by the Tunis Agenda under the process of ‘Enhanced Co-operation’, to enable coherent and integrated global policy-making on all aspects of global Internet governance.&lt;br /&gt;&lt;br /&gt;Operationalizing the Tunis mandate in this regard should not be viewed as an attempt by governments to “take over” or “regulate and circumscribe” the internet. Indeed, any such misguided attempt would be antithetical not only to the internet, but also to human welfare. As a democratic and open society that has historically welcomed outside influences and believes in openness to all views and ideas and is wedded to free dialogue, pluralism and diversity, India attaches great importance to the preservation of the Internet as an unrestricted, open and free global medium that flourishes through private innovation and individual creativity and serves as a vehicle for open communication, access to culture, knowledge, democratization and development.&lt;br /&gt;&lt;br /&gt;India recognizes the role played by various actors and stakeholders in the development and continued enrichment of the internet, and is firmly committed to multi-stakeholderism in internet governance, both at the national and global level. India believes that global internet governance can only be functional, effective and credible if all relevant stake-holders contribute to, and are consulted in, the process.&lt;br /&gt;&lt;br /&gt;Bearing in mind the need for a transparent, democratic, and multilateral mechanism that enables all stakeholders to participate in their respective roles, to address the many cross-cutting international public policy issues that require attention and are not adequately addressed by current mechanisms and the need for enhanced cooperation to enable governments, on an equal footing, to carry out their roles and responsibilities in international public policy issues pertaining to the Internet, India proposes the establishment of a new institutional mechanism in the United Nations for global internet-related policies, to be called the United Nations Committee for Internet-Related Policies (CIRP). The intent behind proposing a multilateral and multi-stakeholder mechanism is not to “control the internet’’ or allow Governments to have the last word in regulating the internet, but to make sure that the Internet is governed not unilaterally, but in an open, democratic, inclusive and participatory manner, with the participation of all stakeholders, so as to evolve universally acceptable, and globally harmonized policies in important areas and pave the way for a credible, constantly evolving, stable and well-functioning Internet that plays its due role in improving the quality of peoples’ lives everywhere.&lt;br /&gt;&lt;br /&gt;The CIRP shall be mandated to undertake the following tasks:&lt;/p&gt;
&lt;ol type="i"&gt;&lt;li&gt;Develop and establish international public policies with a view to ensuring coordination and coherence in cross-cutting Internet-related global issues;&lt;/li&gt;&lt;li&gt;Coordinate and oversee the bodies responsible for technical and operational functioning of the Internet, including global standards setting;&lt;/li&gt;&lt;li&gt;Facilitate negotiation of treaties, conventions and agreements on Internet-related public policies;&lt;/li&gt;&lt;li&gt;Address developmental issues related to the internet;&lt;/li&gt;&lt;li&gt;Promote the promotion and protection of all human rights, namely, civil, political, social, economic and cultural rights, including the Right to Development;&lt;/li&gt;&lt;li&gt;Undertake arbitration and dispute resolution, where necessary; and,&lt;/li&gt;&lt;li&gt;Crisis management in relation to the Internet.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;br /&gt;The main features of CIRP are provided in the annex to this statement. In brief, the CIRP will comprise 50 Member States chosen on the basis of equitable geographical representation, and will meet annually for two working weeks in Geneva. It will ensure the participation of all relevant stakeholders by establishing four Advisory Groups, one each for civil society, the private sector, inter-governmental and international organizations, and the technical and academic community. The Advisory Groups will provide their inputs and recommendations to the CIRP. The meetings of CIRP and the advisory groups will be serviced by the UNCTAD Secretariat that also services the meetings of the Commission on Science and Technology for Development. The Internet Governance Forum will provide inputs to CIRP in the spirit of complementarity between the two. CIRP will report directly to the General Assembly and present recommendations for consideration, adoption and dissemination among all relevant inter-governmental bodies and international organizations. CIRP will be supported by the regular budget of the United Nations; a separate Fund would be set up by drawing from the domain registration fees collected by various bodies, in order to mainly finance the Research Wing to be established by CIRP to support its activities.&lt;br /&gt;&lt;br /&gt;Those familiar with the discourse on global internet governance since the beginning of the WSIS process at the turn of the millennium, will recognize that neither the mandated tasks of the CIRP, nor its proposed modalities, are new. The Working Group on Internet Governance (WGIG) set up by the UN Secretary- General had explicitly recognized the institutional gaps in global internet governance and had proposed four institutional models in its report to the UN General Assembly in 2005. The contours of the CIRP, as proposed above, reflect the common elements in the four WGIG institutional models. While the excellent report of the WGIG was much discussed and deliberated in 2005, unfortunately, no concrete follow-up action was taken to give effect to its recommendations on the institutional front. We hope that this anomaly will be redressed at least six years later, with the timely establishment of the CIRP.&lt;br /&gt;&lt;br /&gt;In order to operationalize this proposal, India calls for the establishment of an open-ended working group under the Commission on Science and Technology for Development for drawing up the detailed terms of reference for CIRP, with a view to actualizing it within the next 18 months. We are open to the views and suggestions of all Member States, and stand ready to work with other delegations to carry forward this proposal, and thus seek to fill the serious gap in the implementation of the Tunis Agenda, by providing substance and content to the concept of Enhanced Co-operation enshrined in the Tunis Agenda.&lt;br /&gt;&lt;br /&gt;Thank you, Mr. Chairman.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;***&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Annex&lt;/h2&gt;
&lt;h3&gt;The United Nations Committee for Internet-Related Policies (CIRP)&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;The United Nations Committee for Internet-Related Policies (CIRP) will have the following features:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Membership&lt;/strong&gt;: The CIRP will consist of 50 Member States of the United Nations, chosen/elected on the basis of equitable geographical representation. It will provide for equitable representation of all UN Member States, in accordance with established UN principles and practices. It will have a Bureau consisting of one Chair, three Vice-Chairs and a Rapporteur.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Meetings&lt;/strong&gt;: The CIRP will meet annually for two working weeks in Geneva, preferably in May/June, and convene additional meetings, as and when required. The UNCTAD Secretariat will provide substantive and logistical support to the CIRP by servicing these meetings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Multi-stakeholder participation&lt;/strong&gt;: Recognizing the need to involve all stakeholders in Global Internet Governance in their respective roles, the CIRP shall ensure the participation of all stakeholders recognized in the Tunis Agenda. Four Advisory Groups – one each for Civil Society, the Private Sector, Inter-Governmental and International Organisations, and the Technical and Academic Community - will be established, to assist and advise the CIRP. These Groups would be self-organized, as per agreed principles, to ensure transparency, representativity and inclusiveness. The Advisory Groups will meet annually in Geneva and in conjunction with any additional meetings of the CIRP. Their meetings will be held back-to- back with the meetings of the CIRP, so that they are able to provide their inputs and recommendations in a timely manner, to the CIRP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reporting&lt;/strong&gt;: The CIRP will report directly to the UN General Assembly annually, on its meetings and present recommendations in the areas of policy and implementation for consideration, adoption and dissemination to all relevant inter-governmental bodies and international organizations. .&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Research Wing&lt;/strong&gt;: The Internet is a rapidly-evolving and dynamic medium that throws up urgent and rapidly-evolving challenges that need timely solutions. In order to deal effectively and prudently with these emerging issues in a timely manner, it would be vital to have a well-resourced Research Wing attached to the CIRP to provide ready and comprehensive background material, analysis and inputs to the CIRP, as required.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Links with the IGF&lt;/strong&gt;: Recognizing the value of the Internet Governance Forum as an open, unique forum for multi-stakeholder policy dialogue on Internet issues, the deliberations in the IGF along with any inputs, background information and analysis it may provide, will be taken as inputs for consideration of the CIRP. An improved and strengthened IGF that can serve as a purposeful body for policy consultations and provide meaningful policy inputs to the CIRP, will ensure a stronger and more effective complementarity between the CIRP and the IGF.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Budget&lt;/strong&gt;: Like other UN bodies, the CIRP should be supported by the regular budget of the United Nations. In addition, keeping in view its unique multi-stakeholder format for inclusive participation, and the need for a well-resourced Research Wing and regular meetings, a separate Fund should also be set up drawing from the domain registration fees collected by various bodies involved in the technical functioning of the Internet, especially in terms of names and addresses.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;
&lt;h3&gt;Excerpts from the Tunis Agenda&lt;/h3&gt;
&lt;p&gt;&lt;br /&gt;Paragraph 34 of the Tunis Agenda defines Internet Governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 35 reaffirms the respective roles of stakeholders as follows: “(a) Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues”. (b) The private sector has had, and should continue to have, an important role in the development of the Internet, both in the technical an economic fields. (c) Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role. (d) Intergovernmental organizations have had, and should continue to have, a facilitating role in the coordination of Internet-related public policy issues. (e) International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.”&lt;br /&gt;&lt;br /&gt;While delineating the respective roles of stakeholders, Paragraph 56 recognizes the need for an inclusive, multi-stakeholder approach by affirming that “The Internet remains a highly dynamic medium and therefore any framework and mechanisms designed to deal with Internet governance should be inclusive and responsive to the exponential growth and fast evolution of the Internet as a common platform for the development of multiple applications”.&lt;br /&gt;&lt;br /&gt;Paragraph 58 recognizes “that Internet governance includes more than Internet naming and addressing. It also includes other significant public policy issues such as, &lt;em&gt;inter alia&lt;/em&gt;, critical Internet resources, the security and safety of the Internet, and developmental aspects and issues pertaining to the use of the Internet”.&lt;br /&gt;&lt;br /&gt;Paragraph 59 further recognizes that “Internet governance includes social, economic and technical issues including affordability, reliability and quality of service”. Paragraph 60 further recognizes that “there are many cross-cutting international public policy issues that require attention and are not adequately addressed by the current mechanisms”.&lt;br /&gt;&lt;br /&gt;Paragraph 61 of the Tunis Agenda therefore concludes that “We are convinced that there is a need to initiate, and reinforce, as appropriate, a transparent, democratic, and multilateral process, with the participation of governments, private sector, civil society and international organisations, in their respective roles. This process could envisage creation of a suitable framework or mechanisms, where justified, thus spurring the ongoing and active evolution of the current arrangements in order to synergize the efforts in this regard”.&lt;br /&gt;&lt;br /&gt;Paragraph 69 further recognizes “the need for enhanced cooperation in the future, to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues”.&lt;br /&gt;&lt;br /&gt;***&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-statement-un-cirp'&gt;https://cis-india.org/internet-governance/blog/india-statement-un-cirp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-31T15:28:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/lecture-at-nal">
    <title>Open Access Week begins in Bangalore</title>
    <link>https://cis-india.org/openness/lecture-at-nal</link>
    <description>
        &lt;b&gt;On Monday 24 October, the National Aerospace Laboratories in Bangalore held an event to mark the beginning of Open Access Week 2011&lt;/b&gt;
        
&lt;p&gt;During the event, &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Padmanabhan_Balaram"&gt;Professor Balaram&lt;/a&gt; spoke on&lt;strong&gt; 'Issues of Access in Science Publishing'&lt;/strong&gt;,  and &lt;a class="external-link" href="http://nal-ir.nal.res.in/view/creators/Venkatakrishnan=3AL=3A=3A.html"&gt;Dr. L Venkatakrishnan&lt;/a&gt; gave a talk '&lt;strong&gt;Open Access: Promised Utopia or Eventual Reality?'&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;Before the speakers, Shyam Chetty framed the discussion by suggesting that India currently lags behind other nations in the adoption of Open Access. He said that the Indian &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Council_of_Scientific_and_Industrial_Research"&gt;Council of Scientific and Industrial Research &lt;/a&gt;should lead an initiative to promote India's&amp;nbsp;&lt;a class="external-link" href="http://www.ncsi.iisc.ernet.in/OAworkshop2006/pdfs/NationalOAPolicyDCs.pdf"&gt;National Open Access Policy&lt;/a&gt;&amp;nbsp;and perhaps bring it into law.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Prof. Balaram spoke next, and brought some refreshing realism and complexity to the Open Access discussion.&amp;nbsp;He noted that both as a reader and as an author he supports&amp;nbsp;Open Access, but there are costs involved in making research available, and these will have to be covered in some way. He shared first-hand experience of expensive subscriptions for Indian institutions, and how even the IISc has cancelled many journal purchases.
In a &lt;a href="https://cis-india.org/about/openness/professor-balaram-talks-open-access" class="external-link"&gt;later interview, Professor Balaram&lt;/a&gt; discusses some solutions to these problems.&amp;nbsp;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Prof. Balaram highlighted that Closed Access journals do add value to scholarship ― in terms of peer review, editing, and aggregation&amp;nbsp;(the collection of related articles in useful ways).&amp;nbsp;While Open Access journals may offer these services too, Prof. Balaram suggested that some of the&amp;nbsp;strongest supporters of Closed Access journals are working academics who value the increased reputation and status they can offer.&amp;nbsp;This lead him to expressing an opposition to institutional Open Access mandates. Instead, he encouraged an approach where academics are motivated to open their work for self-interest, rather than by obligation.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Prof. Balaram also said that India must take an independent approach to Open Access and not expect western nations to lead the way. Increasingly India and China are seen as real competitors in the international field, and in the future may not receive concessions in journal subscriptions or other help currently offered to developing nations.
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Dr Venkatakrishnan was more skeptical towards Open Access. He emphasized that the price to make an article freely available in a Closed Access journal could be over USD $3000. From this he suggested that the&amp;nbsp;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Open_access_journal"&gt;Gold Route&lt;/a&gt;&amp;nbsp;to Open Access lacked potential because the costs involved are prohibitive. This does leave out&amp;nbsp;&lt;a class="external-link" href="http://oad.simmons.edu/oadwiki/OA_journal_business_models"&gt;alternative ways of financing&lt;/a&gt;&amp;nbsp;Open Access journals that do not involve the author paying for submission.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Dr. Venkatakrishnan&lt;span class="Apple-style-span"&gt;&amp;nbsp;echoed Prof. Balaram in saying that a strong motivation to publish in top-tier Closed Access journals is the increased reputation or funding it can bring.&amp;nbsp;&lt;/span&gt;While it is true that academics can usually still upload their work to Open Access databases,&amp;nbsp;&lt;span class="Apple-style-span"&gt;Dr.&amp;nbsp;&lt;/span&gt;Venkatakrishnan&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;concluded that he did not know if Open Access was an 'open door' or a 'blind corner'.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;This could be taken as a strange end to an Open Access celebration, but the implication seemed to be this: in order for more Indian academics to support Open Access, they must be convinced of the real benefits it can bring to their own reputation and career success.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;For the event flier&lt;a class="external-link" href="http://www.icast.org.in/events/oad2011.html"&gt; click here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;For details of Open Access Week, &lt;a class="external-link" href="http://www.openaccessweek.org/"&gt;click here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/lecture-at-nal'&gt;https://cis-india.org/openness/lecture-at-nal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tom Dane</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2012-08-03T23:04:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question">
    <title>India’s vanishing fingerprints put UID in question</title>
    <link>https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question</link>
    <description>
        &lt;b&gt;A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).&lt;/b&gt;
        
&lt;p&gt;To find out more,&lt;em&gt; Firstpost &lt;/em&gt;visited five UID centres in the North West district, which incidentally has the highest enrolments (619,571 and counting) among Delhi’s nine districts since the show hit the road in February 2011, and one centre in North Delhi.&lt;/p&gt;
&lt;p&gt;The officials at the Unique Identification Authority of India (UIDAI) will tell you that there is no overemphasising the importance of the quality of biometric data to the success of the super ambitious UID, now known as Aadhar project. If the quality of a person’s biometric data is poor, it automatically compromises the authentication of that data by him when he wants to access a service based on his UID.&lt;/p&gt;
&lt;p&gt;So what happens when the data – fingerprints, for instance – are inherently unreliable on account of various biological and socio-economic reasons, some of which are especially relevant to the Indian context.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/uid2.jpg/image_preview" alt="uid 2" class="image-inline" title="uid 2" /&gt;&lt;/p&gt;
&lt;p&gt;The UIDAI’s Committee on Biometrics in a December 2009 was rather forthright about its reservations on the fingerprint reliability. Titled Biometrics Design Standards For UID Applications (page 4, para 4), it stated, "….two factors however, raise uncertainty about the accuracy that can be achieved through fingerprints. First, retaining efficacy while scaling the database size from fifty million to a billion has not been adequately analysed. Second, fingerprint quality, the most important variable for determining de-duplication accuracy, has not been studied in depth in the Indian context." (Emphasis added).&lt;/p&gt;
&lt;p&gt;The findings on the ground were revelatory. Operators and technical experts at the UID enrolment centres confirmed to Firstpost that they routinely came across cases where fingerprints had been damaged/destroyed/underdeveloped. And such cases, they said, were more common among senior citizens, those involved in manual labour (who handle rough objects, for instance) and children (mostly below 10 years of age).&lt;/p&gt;
&lt;p&gt;Here is an example that &lt;em&gt;Firstpost &lt;/em&gt;observed.&lt;/p&gt;
&lt;p&gt;Batuli, 72, arrived at around noon at the Basti Vikas Kendra, now also a UID centre, in Mangol Puri to get herself a ‘smart card’ everyone has been talking about. (The 'Aadhar' brand name hasn’t caught on in these parts of Delhi, with everyone insisting on calling it the 'smart card'.)&lt;/p&gt;
&lt;p&gt;The helpful operator with the fancy gadgets helps Batuli to her seat. After her photo is taken, Batuli is asked to place four fingers — one hand at a time — on a green-lit device. Right hand, then left hand.&lt;/p&gt;
&lt;p&gt;She is, however, asked to repeat the exercise a second time for the left hand. The operator explains. "In some case, we have to scan the fingerprints and Iris multiple times. If it doesn’t pass the required quality percentage of 70 per cent (the quality is indicated in percentage terms on the computer screen that is connected to the fingerprint machine, see pic), we repeat the exercise up to four times."&lt;/p&gt;
&lt;p&gt;Batuli’s hands are then wiped using a cloth and placed back on the device. The exercise is repeated a fourth and final time. But still the same result. 'Fail', declares the reading on the operator’s computer.&lt;/p&gt;
&lt;p&gt;An operator at the next station, says, "In the case of senior citizens, Iris scans also sometime fail. It registers weakly when the retina is damaged."&lt;/p&gt;
&lt;p&gt;(Enrolment centres are run by private companies on contracts given by registrars chosen by the UIDAI. Strategic Outsourcing is one such company and it runs many of centres in the North West and South West districts of Delhi.)&lt;/p&gt;
&lt;p&gt;The project coordinator of the UID enrolment centre working out of the Destitute Welfare Trust, an NGO in Sultanpuri, too, confirmed that he was aware of the problem of damaged fingerprints and the challenge it posed in getting good quality fingerprint data.&lt;/p&gt;
&lt;p&gt;"The hands of children are very soft and in some cases fingerprints are not yet fully developed. Also, children tend to have sweaty hands and this can interfere with the quality of fingerprints. Extremely dry hands also pose problems. We have to often, wipe the hands or provide lotion to improve the quality of fingerprints," said a technical expert working with Strategic Outsourcing.&lt;/p&gt;
&lt;p&gt;While the number of attempts, as prescribed by the UIDAI, to get a stronger finger print when the result reads 'fail' is four, operators report that sometimes attempts go up to 10 to 15. (The machine picks up the strongest impression of the attempts made). They say they didn’t anticipate such a problem and it was only when they started enrolments in January that they were confronted with such a scenario. “Now, of course, everybody knows about it."&lt;/p&gt;
&lt;p&gt;'Everybody' implies those who are directly involved in collecting biometric data. An operator from another private company Smartchip working in a JJ (slum) colony in the North Delhi district of Model town, revealed similar problems on being probed. &amp;nbsp;"A fingerprint strength of 70 percent or more is pass. About 10 per cent of the cases we get every day register the 'fail' reading. What can we do? In the case of stone cutters, for instance, the fingers are completely smooth, the fingerprints are completely wiped out."&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_copy5_of_copy4_of_copy3_of_copy2_of_copy_of_uid3.jpg/image_preview" alt="uid 3" class="image-inline image-inline" title="uid 3" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;So what are the implications of poor quality fingerprints for the UID project? The UIDAI admitted that it could provide challenges to authentication.&lt;br /&gt;&lt;br /&gt;In an email response to Firstpost, Sujata Chaturvedi, UIDAI’s Deputy Director General for the Delhi region said, "It could provide some challenges in de-duplication although that has been mitigated to a large extent by the decision of the UIDAI to go in for iris an additional de-duplication factor… Also to be noted is the fact that normally not all fingers are equally de-graded. So UIDAI is evolving a protocol to inform the residents about their good quality fingerprints as part of the Aadhaar letter so that they are aware of the finger to use for authentication."&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;But not everyone is convinced. Sunil Abraham is the executive director of Centre for Internet and Society (CIS), which has written seven open letters to the Standing Committee on the Finance Branch (before which is the National Identification Authority of India Bill, 2010) asking the committee to consider their research on the UID project and change aspects of the Bill and the project.&lt;/p&gt;
&lt;p&gt;The seventh letter sent last week, says Abraham, provides statistical analysis that demonstrates how the UID will never be able to create a unique database.&lt;/p&gt;
&lt;div class="pullquote"&gt;"In CIS’s seventh open letter to the finance committee, statistical analysis reveals that UIDAI tender specification is 1,000 times less accurate than it should be to have a reasonable chance of building a truly unique database. This analysis depends on high quality biometrics. With poor biometric quality the problem of de-duplication is compounded."&lt;/div&gt;
&lt;p&gt;When UIDAI was asked what the percentage of the population enrolled (all India and Delhi) had recorded below-standard fingerprint quality, no specific data was forthcoming.&lt;/p&gt;
&lt;p&gt;Chaturvedi wrote, "Currently the population with very poor quality fingerprints is a very small percentage. It must also be remembered that this population is scattered all over the country."&lt;/p&gt;
&lt;p&gt;In India, even a small percentage translates to millions of people. "Small percentage could mean absolutely anything. Why can’t they be more specific? One percent in the Indian context is 12 million people," said Abraham.&lt;/p&gt;
&lt;p&gt;On how the UIDAI was dealing with challenge of poor fingerprint quality, Chaturvedi said, "Even amongst the populace that has damaged/destroyed/underdeveloped fingerprints, chances are very high that they would have at least one good fingerprint that could be used for authentication. Second, UIDAI is also starting to actively develop iris authentication ecosystem. Fingerprint authentication and iris authentication could supplement each other to ensure a universal coverage."&lt;/p&gt;
&lt;p&gt;She added that Aadhaar authentication will supplement and work in conjunction with existing authentication systems to strengthen the overall authentication rather than replace completely the existing authentication systems.&lt;/p&gt;
&lt;p&gt;That begs the question, as Abraham puts it, "If the UIDAI is not going to replace existing forms of authentication it is not clear why the government is spending all this money on unproven biometric technology."&lt;/p&gt;
&lt;p&gt;Chaturvedi, however, maintained that the initial PoC (proof of concept) study that was taken up in Andhra Pradesh, Karnataka and Jharkhand collected about 60,000 enrolments indicated that the biometric accuracy levels necessary for de-duplication of all residents of India are achievable.&lt;/p&gt;
&lt;p&gt;"The PoC results also indicated the time needed for capture of biometrics in typical rural conditions is small enough to support large scale enrolment. Over and above the initial PoC, the UIDAI has currently completed over 5 crore enrolments for which Aadhaars have been generated. This experience reinforces the initial PoC results that the de-duplication accuracy is sufficient and sustainable to enrol the rest of the population."&lt;/p&gt;
&lt;p&gt;The original article is written by Pallavi Polanki. It was published in Firstpost on October 24, 2011 and can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/aadhar-indias-vanishing-fingerprints-put-unique-identity-in-question-115144.html/2"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question'&gt;https://cis-india.org/news/vanishing-fingerprints-put-uid-in-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-26T10:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/oa-week-day-2-an-interview-with-prof.-arunachalam">
    <title>OA Week Day 2 - An Interview with Professor Arunachalam</title>
    <link>https://cis-india.org/news/oa-week-day-2-an-interview-with-prof.-arunachalam</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Subbiah_Arunachalam"&gt;Professor Subbiah Arunachalam&lt;/a&gt; has been called&amp;nbsp;&lt;a class="external-link" href="http://users.ecs.soton.ac.uk/harnad/Hypermail/Amsci/3239.html"&gt;"India's and the Developing World's great advocate for Open Access"&lt;/a&gt;. He has worked in the field for over ten years, holding workshops, trainings, and political and policy initiatives.
&lt;div&gt;&lt;br /&gt;
&lt;div&gt;In this interview we talk about how to improve the current state of Open Access, what the Indian Open Access experience might teach the rest of the world, and Arunachalam's view on the future of the Open Access movement.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;object height="81" width="100%"&gt; &lt;param name="movie" value="http://player.soundcloud.com/player.swf?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F26365586"&gt; &lt;param name="allowscriptaccess" value="always"&gt; &lt;embed allowscriptaccess="always" height="81" src="http://player.soundcloud.com/player.swf?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F26365586" type="application/x-shockwave-flash" width="100%"&gt;&lt;/embed&gt; &lt;/object&gt;  &lt;a href="http://soundcloud.com/cis-india/oainterviews-prof-arunachalam"&gt;Open Access Interviews - Professor Arunachalam&lt;/a&gt; by &lt;a href="http://soundcloud.com/cis-india"&gt;CIS_India&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;0:18 - 0:47&lt;/strong&gt; A brief summary of Professor Arunachalam's work&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;0:51 - 2:15&lt;/strong&gt; How to expand Open Access in India&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;2:25 - 4:15&lt;/strong&gt;&amp;nbsp;What other countries might learn from India&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;4:25 - 5:40&lt;/strong&gt; The future of Open Access in India&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/oa-week-day-2-an-interview-with-prof.-arunachalam'&gt;https://cis-india.org/news/oa-week-day-2-an-interview-with-prof.-arunachalam&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>thomas</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-15T06:04:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/barriers-to-access-connected-world">
    <title>Barriers to Access in a Connected World</title>
    <link>https://cis-india.org/accessibility/barriers-to-access-connected-world</link>
    <description>
        &lt;b&gt;Accessibility is an imperative to achieve a truly inclusive and participatory society writes and every individual, corporation, organization and government has a crucial role to play in nurturing it, writes Nirmita Narasimhan in this article which was published by Hans Foundation in their Annual Review 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine a world in which there are phones but you cannot communicate; there are televisions but you cannot watch or hear any of the programmes; there are millions of books, but you cannot read even one of them. Imagine that you were to go into a supermarket but couldn’t buy anything because you couldn’t find what you wanted, or find out the price; that you went to an ATM machine, but couldn’t withdraw money; that you went to a website of an airline, but couldn’t buy your tickets because you couldn’t view the options on the menu bar; a world where you alone are denied access to all information and entertainment like watching movies, going to museums and other places of public interest. It shouldn’t be very difficult to imagine this, because this is exactly the world we live in today. This is the reality faced by over a million persons living with disabilities around the world.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Today the number of persons with disabilities is increasing, compounded by the decrease in mortality rates and the increase in the number of diseases. Over 90 per cent of persons with disabilities live in developing countries and have little or in many cases, no access to basic human rights of education, food and shelter, employment, independent living and access to information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is to address this situation that the United Nations Convention on the Rights of Persons with Disabilities (‘Convention’) came into force in May 2008, marking a watershed in the disability rights movement. &amp;nbsp;One of the unique features of the Convention is that for the first time equal importance was accorded to the right to access information and Information and Communication Technologies (ICT) bringing it on par with transportation and physical environment. It placed a clear obligation on the states parties to ensure that all websites and ICT services as well as information both in the public domain and with respect to cultural materials such as books, movies, etc should be made available to persons with disabilities in accessible formats, at the same time and no extra cost. The convention requires that countries should amend their laws to incorporate flexibilities which will enable persons with disabilities to enjoy their human rights and fundamental freedoms.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Technology – A Fundamental Enabler for Accessibility&lt;/h3&gt;
&lt;p&gt;The Information Society has opened up several avenues for persons with disabilities to participate and live independently. Through the use of assistive technologies, persons with disabilities can access computers, study, work, book tickets and travel, pay taxes, shop, transact business, use social media and work. For instance, blind persons can access computers using a screen reader[&lt;a href="#1"&gt;1&lt;/a&gt;]&amp;nbsp;on computers or mobile phones, enabling them to send messages, make calls, listen to books, navigate the route and use the internet like other people; deaf persons can carry on a conversation through relay or text messaging and listen to audio using hearing aids; autistic persons can use symbols or pictures on their mobile phones to communicate their needs to persons around them. Hence, the range of platforms and media available today, offer tremendous opportunities for participation and inclusion.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Challenges to Inclusion&lt;/h3&gt;
&lt;p&gt;The general lack of awareness amongst policy makers and the public, resulting in widespread social stigma and insensitive attitudinal barriers associated with disability, often negates the advantages provided by technology. Attitudinal change is fundamental to making the world a more inclusive place.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to social attitudes and awareness, several other challenges which hamper the ability of persons with disabilities to harness the power of assistive technology, are discussed briefly below.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;One major challenge is inaccessible technology. Technology may be inaccessible due to a multiplicity of reasons, such as the unavailability of suitable software in a given region&amp;nbsp;[&lt;a href="#2"&gt;2&lt;/a&gt;]&amp;nbsp;or prohibitive pricing. In the absence of equally appropriate open source solutions, persons with disabilities cannot afford assistive technology. For instance, a screen reader which costs upwards of $1000 for a single user license is unaffordable for a person with disability in most countries.&lt;/p&gt;
&lt;div class="pullquote"&gt;Another barrier is the inaccessibility of web sites. The failure to adhere to universally accepted Web Content Access Guidelines (WCAG) formulated by the World Wide Web Consortium (W3C) renders web sites unfit for use by persons using assistive technology. The guidelines lay&amp;nbsp;down very simple instructions such as ensuring that images are accompanied by alternative text attributes which enable screen readers to read out the description of the image to the listener and providing alternate formats where anything on a web site is inaccessible. Many countries today such as USA, UK and Canada have made it mandatory for all public web sites to conform to these guidelines. However, there are still several countries which do not have any such policies in place.&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The lack of accessible content also poses a significant challenge. There is a severe shortage of content in formats such as electronic text, Braille, audio, etc which can be accessed by assistive technology. This may occur either due to technological (content created in inaccessible format)&amp;nbsp;[&lt;a href="#3"&gt;3&lt;/a&gt;]&amp;nbsp;or legal reasons (copyright laws prevent content from being rendered in accessible formats). The latter issue is the subject matter of treaty deliberations at the World Intellectual Property Organization. Today barely 5 per cent of all published materials in developed countries and 0.5 per cent in developing countries are available to persons with disabilities who are not able to read printed materials in accessible formats such as electronic text, Braille, audio, etc. Organizations serving the blind have to constantly obtain permission from copyright holders for each book that they want to convert, which is not always forthcoming. In some countries, this is simplified by the inclusion of a fair use provision (exception) in their copyright laws, which essentially does away with the requirement of having to obtain permission in cases of conversion and distribution for the disabled. However, while such a provision exists in approximately 53 countries, it is not available in over 127 countries where even the countries with exceptions cannot exchange books. Developing countries are the most severely hit since they neither have the legal provisions permitting conversion in their country nor the resources and funding to undertake conversion, and are unable to borrow books from libraries for the blind in other countries. This has resulted in a huge book famine for persons with blindness and other print disabilities around the world, preventing them from exercising their human rights of education, access to information, social and cultural participation and independent living.&lt;/p&gt;
&lt;p&gt;Training is a very crucial aspect of ensuring effective and rapid adoption of technology by persons with disabilities, since they need to orient and familiarize themselves with the technology in order to be able to use it effectively. It is imperative that adequate resources are channelled towards capacity building and training activities and that governments, DPOs [&lt;a href="#4"&gt;4&lt;/a&gt;]and industry work together to identify appropriate implementation strategies.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;The Road Ahead&lt;/h3&gt;
&lt;p&gt;To surmount all the challenges to accessibility and achieve universal inclusion, we need to achieve a solution through a mix of policy formulations and practical interventions in which all stakeholders participate i.e., by following both a top down and bottoms up approach. Incorporating accessibility and universal design principles uniformly across all services and products will ensure accessibility not only to the disabled, but also to the other categories of users who are unable to access such as elderly and illiterate persons, linguistic minorities and those with limited bandwidth. It will also reduce the long term cost and effort associated with retrofitting things to make them more accessible at a future date.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;DPOs&amp;nbsp;[&lt;a href="https://cis-india.org/barriers-to-access#4"&gt;4&lt;/a&gt;]&amp;nbsp;around the world&amp;nbsp;are also trying to work with industry to leverage the business case in making products which are universally inclusive and develop solutions which are more widely available in the market, rather than created exclusively for a niche community. Considering that persons requiring accessible products constitute nearly half of the world’s population (including seniors, illiterate persons and other categories), there are clearly huge market opportunities for business houses to follow. For persons with disabilities, an increase in the number of manufacturers creating accessible goods would help drive down prices and increase variety. A good case in point is that of NTT Docomo in Japan which increased its market to over 70 per cent after it surveyed the demographics of elderly and disabled persons and brought out a new line called Raku Raku phones. Within three years, this line sold over 15 million handsets since even persons without disabilities found accessibility features like high colour contrast, large icons and digits etc more comfortable to use.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Accessibility is an imperative to achieve a truly inclusive and participatory society and every individual, corporation, organization and government has a crucial role to play in nurturing it. Any effort, whether it is making one’s website accessible and ensuring that all information published is accessible to persons using assistive technologies or participating in awareness raising, capacity building, creating employment opportunities for the disabled, supporting advocacy activities or on ground projects of DPOs such as conversion of books, is significant and brings us nearer to achieving our vision ― an inclusive world.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned&amp;nbsp;version of the article published in the Hans Foundation's Annual Review 2011 &lt;a href="https://cis-india.org/barriers-to-access.pdf" class="internal-link" title="Barriers to Access in a Connected World"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 4.09 MB]&lt;/strong&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1].A software which will read out what appears on the screen.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2].For example, in India text to speech software is not available for all the 25 official Indian languages but is only available for English and a few other languages, which results in the exclusion of a large proportion of the population.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3].For instance,instead of creating a proper pdf document, if one converts a scanned image of a document (instead of text) to pdf, it will not be readable by a screen reader.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]Disabled Persons Organizations.&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/barriers-to-access-connected-world'&gt;https://cis-india.org/accessibility/barriers-to-access-connected-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-08T05:30:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf">
    <title>Sixth Annual Meeting of the Internet Governance Forum, Nairobi: A Summary</title>
    <link>https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf</link>
    <description>
        &lt;b&gt;The sixth annual meeting of the Internet Governance Forum was held from 27 to 30 September 2011 at the United Nations Office in Nairobi, Kenya. Sunil Abraham participated in six workshops: Privacy, Security, and Access to Rights: A Technical and Policy Analyses, Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward, The Impact of Regulation: FOSS and Enterprise, Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards, Access and Diversity of Broadband Internet Access and Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/b&gt;
        
&lt;h3&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 219&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Kim Pham, Expression Technologies, Civil Society (United States). The panel members included Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil), Christopher Soghoian, Indiana University (United States), Karen Reilly, Tor Project, Technical/Civil Society (United States) and Sunil Abraham, Centre for Internet and Society (India).&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 184&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Katim S Touray Council Vice Chair, Free Software and Open Source Foundation for Africa and Member, ICANN Board of Directors. Fouad Bajwa of Gerry Morgan Foundation (Pakistan) was the remote moderator. Nnenna Nwakanma of Nnenna.org, Simeon Oriko of @TheKuyuProject &amp;amp;@StorySpaces, Wael Khalil, Activist and Sunil Abraham of the Centre for Internet &amp;amp; Society were the panel members. Nishant Shah from the Centre for Internet &amp;amp; Society participated remotely from Bangalore.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/873-ei-workshop-80184-use-of-digital-technologies-for-civic-engagement-and-political-change-lessons-learned-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;The Impact of Regulation: FOSS and Enterprise&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 211&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Dorothy Gordon, Director General, AITI-KACE, Judy Okite was the remote moderator. The panel members were Satish Babu, ICFOSS, India, Yves Miezan Ezo, Smile Training, Manager, (France), Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society, Bangalore, Evans Ikua, FOSS Certification Manager, ict@innovation program.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/842-28-september-2011-ad-workshop-73211-foss-as-an-instrument-for-accessible-development-the-impact-of-regulation-open-source-and-enterprise"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 201&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Alejandro Pisanty, Director General for Academic Computing Services of the National University of Mexico (UNAM), Mexico. Tracy Hackshaw, Computer Society of Trinadad and Tobago, Trinadad and Tobago, Venkatesh Hariharan, Head of Public Policy and Government Affairs at Google, India and Scott O Bradner, University Technology Security Officer, Harvard University, USA were the panel members.&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=201"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/835-28-september-2011-other-201-proprietary-influences-in-free-and-open-source-software-lessons-to-open-and-universal-internet-standards"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Access and Diversity of Broadband Internet Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 113&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by N Ravi Shanker, Addl Secy, Department of Information Technology, Ministry of Information Technology, Government of India (Chair). Abhishek Singh, Director, Department of Information Technology, Ministry of Information Technology, Government of India, Venkatesh Hariharan, Head of Public Policy and Government &amp;nbsp;Relations, Google India and Sunil Abraham, Executive Director, The Centre for Internet and Society, India were the panel members.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=113"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/811-ad-feeder-workshop-113-access-and-diversity-of-broadband-internet-access-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Putting users First: How can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 75&lt;/strong&gt;&lt;br /&gt;This workshop was moderated by Ambassador David Gross, Partner, Wiley Rein LLP, Yiannis Theodorou, Regulatory Policy Manager, GSMA was the remote moderator. The panel members included Pat Walshe, Director of Privacy-GSMA), Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T), Patrick Ryan, Policy Counsel, Open Internet for Google Inc, Ms Juliana Rotich, Executive Director of Ushahidi Inc, Sunil Abraham, Executive Director, The Centre for Internet and Society (India) and Ian Brown, co-director of Oxford University's Information Security and Privacy Programme.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/870-sop-75-putting-users-first-how-can-privacy-"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf'&gt;https://cis-india.org/internet-governance/blog/sixth-annual-meeting-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-24T09:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid">
    <title>SCOSTA and UID Comparison not Valid, says Finance Committee</title>
    <link>https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid</link>
    <description>
        &lt;b&gt;The Standing Committee on Finance Branch, Lok Sabha Secretariat has responded to the suggestions offered by CIS on the National Identification Authority of India, Bill 2010 and has requested it to mail its views by 14 October 2011.&lt;/b&gt;
        
&lt;p&gt;On January 6, 2011, CIS had sent an &lt;a href="https://cis-india.org/internet-governance/blog/blog/privacy/letter-to-finance-committee" class="external-link"&gt;open letter to the Parliamentary Finance Committee&lt;/a&gt; demonstrating how the Aadhaar biometric standard is weaker than the SCOSTA standard. The text of the reply is reproduced below.&lt;/p&gt;
&lt;p&gt;Sir,&lt;/p&gt;
&lt;p&gt;This is in response to one of the views/suggestions offered by CIS on the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;h3&gt;CIS View /Suggestion:&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;"Though the Aadhaar biometrics are useful for the de-duplication and identification of individuals, the Smart Card Operating System for Transport Application [(SCOSTA), developed by the National Informatics Centre in India)] standard is a more secure, structurally sound, and cost-effective approach to authentication of identity for India. Therefore, the Aadhaar biometric based authentication process should be replaced with a SCOSTA standard based authentication process."&lt;/p&gt;
&lt;p&gt;In this regard, do you agree with the following view? If not, please justify.&lt;/p&gt;
&lt;p&gt;"Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the unique id project.&lt;/p&gt;
&lt;p&gt;The UID project follows a different approach and has multiple objectives — providing identity to residents of India, ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services, eliminating the fakes, duplicates and ghost identities prevalent in other databases and provide a platform for authentication in a cost effective and accessible manner.&lt;/p&gt;
&lt;p&gt;UIDAI is not issuing cards or smart cards. Cards can be issued by agencies that are providing services. UID authentication does not exclude smart cards — service providers can still choose to issue smart&amp;nbsp;cards to their beneficiaries or customers if they want to."&lt;/p&gt;
&lt;p&gt;You are requested to email your view by 14 October, 2011 positively.&lt;/p&gt;
&lt;p&gt;Standing Committee on Finance Branch&lt;br /&gt;Lok Sabha Secretariat&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid'&gt;https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T16:37:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/understanding-right-to-information">
    <title>Understanding the Right to Information</title>
    <link>https://cis-india.org/internet-governance/understanding-right-to-information</link>
    <description>
        &lt;b&gt;Elonnai Hickok summarises the Right to Information Act, 2005, how it works, how to file an RTI request, the information that an individual can request under the Act, the possible responses and the challenges to the citizen and the government. She concludes by saying that there are many structural changes that both citizens and governmental officers can make to improve the system.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://righttoinformation.gov.in/webactrti.htm"&gt;Right to Information Act, 2005&lt;/a&gt; (RTI) was created in 2005 and marked an important time in Indian legislative history. The Right to Information enables citizens to hold the government accountable and ensure that it is a transparent body. Questions that can be asked by the citizen to the government range from anything that may concern to some meeting notes to why a teacher is not present in a public school, etc. In the current RTI system there are many challenges that are inhibiting the government’s efficient delivery of the RTI as a service to the people. This has changed the concept of how the citizens view the RTI, as the government feels harassed and the citizens feel as though their rights are being unjustly denied. Additionally, individuals have turned the RTI into a redressal mechanism rather than a way to ensure transparency and learn/understand how their government is functioning. The use of the RTI as a redressal mechanism has created a relationship of animosity between the government and citizens. The below note outlines the ecosystem of the RTI and notes specific challenges that both citizens and the government face.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;h2&gt;The RTI Ecosystem&lt;/h2&gt;
&lt;h3&gt;RTI work flow&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;An individual files an RTI with the central/ state public information officer (PIO) or a specific PIO. PIOs are often not trained, and rarely apply for the position, but are instead designated.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Within five days the information is to be forwarded to the correct PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The PIO must open a file and dispose of the request within 30 days. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO fails to reply to the applicant by either approving or denying a request, the PIO is liable to pay a fine of Rs. 250 for each day of delay. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If information is electronically uploaded, it is stored in any format the officer chooses (jpeg, pdf, html, etc).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Except for land records and staff records, files are retained for a maximum of one year. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If the PIO does not dispose of the request, there is scope for an appeal within 30-45 days to the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is scope for a second appeal to the information commissioner if the authority does not respond within 90 days or the answer is found to be unsatisfactory. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The final decision of the information commissioner is binding. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Filing an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: justify; "&gt;Though there is no specific format an individual must follow when submitting an RTI, when filing a request, individuals must include:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;His /her name and address.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The name and address of the public information officer (PIO).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The particulars of information/documents required (limited to 150 words and one subject matter).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The time period of the information required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof of payment.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Signature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proof if the individual is a BPL holder.[&lt;a href="#2"&gt;2&lt;/a&gt;] &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Information that an individual can request under the RTI Act&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Inspection of work, documents, and records&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking notes, extracts or certified copies of documents or records.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Taking certified samples of material.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining of information in the form of diskettes, floppies, tapes, and video cassettes, or in any other electronic mode, or through printouts where such information is stored in a computer, or in any other device.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obtaining the status of an RTI request or complaint.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Note: If an individual is requesting third party information, the PIO must inform the third party and provide the individual the opportunity to state a reason for not disclosing the information.&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;Accepted format of requested materials and records&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Material requested can be in any format including: records, documents, memos, emails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, and data material held in any electronic form.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Records requested can include: any document, manuscript and file, any microfilm, microfiche and facsimile copy of a document, and reproduction of image or images embodied in such microfilm (whether enlarged or not), and any other material produced by a computer or any other device.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Possible Responses to an RTI request&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;b&gt;An information officer can respond to an RTI in the following ways&lt;/b&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Transfer request to appropriate PIO within five days and notify the applicant about the transfer.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide the requested information within 30 days.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reject the request information within 30 days stating the reasons for rejection, the period within which an appeal against such rejection may be preferred, and the details of the appellate authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Not respond to the applicant. If no response is received within 30 days the officer is liable for a penalty of Rs. 250 per day.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Appeal/Complaint Process&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First appeal can be filed after 30 days or if the information given was unsatisfactory. The appeal must include: name and address of the appellant, name and address of the PIO involved, brief facts leading to appeal, relief sought, grounds for appeal, and copies of the application or documents involved, including copies of the reply, if received from the PIO.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Second appeal must contain: name and address of the applicant, and name and address of the PIO involved, particulars of the Order including the number if any against which the appeal is preferred, brief facts leading to the appeal, if appeal/complaint is preferred against deemed refusal then the particulars of the application, including number and date and name, address of the PIO to whom the  application was originally made, relief sought, grounds for the relief, verification by the applicant, any other information which the commission may deem necessary for deciding during the appeal, self attested copies of the application or documents involved, copies of the documents relied upon by the appellant and referred to in the appeal, and an index of the documents referred to in the appeal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complaint must include: name and address of the complainant, name and address of the state PIO against whom the complaint is being made, facts leading to the complaint, particulars of the application [number, date, name and address of the PIO (three copies)], relief sought, grounds and proof for relief, verification of the complainant (three copies), index of documents referred to in the complaint, and any other necessary information.[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges to the Citizen&lt;/h2&gt;
&lt;h3&gt;Knowing the correct Public Information Officer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Knowing which public information officer to mail in the RTI request is the first difficulty that an individual faces. As noted above in 2008 there were a total of 73,256 recorded public information commissioners in the State of Karnataka. New public information commissioners are created every day, because the RTI extends not only to any department of the government, but to any sub-contracted company, organization, school, or NGO that is receiving government funding and doing work on behalf of the government directly or indirectly. Lists of PIOs can be found on department bulletin boards and websites, but there is no clear method for an individual to know what information each PIO is the custodian over. Thus, they are left to determine on their own, and rely on the PIO to forward their application to the correct individual.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Filing in the correct format&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Though it is stated in the law what language an RTI request will be accepted in, and what information should be included – individuals are often unaware of the guidelines and unaware of how to correctly fill out an RTI request. An incorrectly formatted request is one of the major reasons for rejection of a request by the PIO.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Language&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In the State of Karnataka, RTIs can be filed only in two languages: Kannada and English. By law, RTI responses are given only in the language that the department works in on a daily basis, and in English. The information that is supplied through the request is given in its original language. For example, if you ask for a document that is originally in Marathi, the document will be photo copied and sent to you. No translation of documents takes place, because it is not the job function of the officer to translate documents.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;If an individual is denied information, or does not receive a reply within 30 days, they have the option of seeking an appeal through an appellate authority. In 2008 Karnataka had 5416 Appellate Authorities.  Currently, because of the backlog in appeal cases and the slow functioning of the system, an individual might have to wait for upto one year for his/her appeal to be heard. Often at this point the information is no longer relevant or needed.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;In some cases individuals are denied a request for information based on the grounds that it would invade the privacy of the public officer. This is sometimes the case and sometimes not the case. Finding the right balance between the right to information and privacy is important, as protecting an individual’s privacy is crucial, but privacy should not be used as a reason for the government to be less transparent to the citizen and be used as a way to deny a citizen the information that they are entitled to.[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Challenges in the RTI System for the Government&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Too many RTI requests and no system to record duplicates&lt;/b&gt;: As the figure shows above, in 2008, the Karnataka Government received 42208 RTI requests. Currently, it is not possible to know how many of these requests were duplicates since departments handling RTIs do not make it a practice to upload and organize filed RTI requests in a format easily accessible to citizens. Thus, there is no present system in place to track, upload, and store past RTI's in a meaningful way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Additional overhead in recording, organizing, accessing, and storing data&lt;/b&gt;: In the current system every time an RTI request is received by the government, they open a new file for that request. Though in some ways this system of storage simplifies the process of finding past RTIs, it adds an additional overhead cost as photocopies must be made, new files created, and correctly added to the organized system. Each state follows its own method of recording, organizing, accessing, and storing data – thus, currently it is not possible to easily access the information from another state or combine information from two separate states.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Lack of compliance with section 4(d) pro-active disclosure&lt;/b&gt;: Under section 4 (d), the government is required to pro-actively disclose a pre-determined data to the public via websites and other useful modes. Currently there is very little compliance with section 4(d) from governmental departments. There are many factors that contribute to the low rate of compliance that exist including lack of resources and lack of proper enforcement. If governmental departments were to comply with section 4(d) then the load of RTI requests and the time each request must take to answer could be lightened considerably as the government could respond by pointing citizens to the already disclosed information. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;div style="text-align: justify; "&gt;Though the Right to Information is an important right, the above entry looks at some of the weaknesses and challenges in the system. There are many structural changes that both citizens and governmental officers can make to improve the system such as pro-actively disclosing information, ensuring that an RTI is filed correctly, and creating a system for organizing previously asked questions. Alongside of these structural changes it is also critical that a positive culture of transparency and accountability is fostered throughout society, thus encouraging citizens to actively engage with the government and exercise their right to information.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].I am grateful to N. Vikram Simha, RTI activist, for his insight and feedback into the RTI system.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].N. Vikram Simha, Right to Information Act of 2005: Guide for Citizens.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].N. Vikram Simha, Right to Information: Trend Ahead. Karanataka State Chartered Accountants Association, Bangalore&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].N. Vikram Simha, RTI and Protection of Individual Privacy&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/understanding-right-to-information'&gt;https://cis-india.org/internet-governance/understanding-right-to-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T11:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/igf-remote-participation">
    <title>Internet Governance Forum: Participate Remotely</title>
    <link>https://cis-india.org/internet-governance/events/igf-remote-participation</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to attend the sixth annual meeting of the Internet Governance Forum (IGF) as a remote participant from Bangalore. The IGF is being held in Nairobi from 27-30 September 2011. CIS has been registered as a remote IGF hub. This will allow many of us who are unable to attend the IGF in person. You can follow the discussion, watch the web cast of the event, follow real-time closed captioning and participate live (via text or video) that will be answered by panelists in the IGF.  &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The IGF is a multi-stakeholder forum that
addresses public policy issues related to key elements of Internet governance. The overall
theme of the meeting will be ‘&lt;strong&gt;Internet as a Catalyst for Change: Access, Development,
Freedoms and Innovation&lt;/strong&gt;'. The various themes are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Internet Governance
for Development&lt;/li&gt;&lt;li&gt;Emerging Issues&lt;/li&gt;&lt;li&gt;Managing Critical
Internet Resources&lt;/li&gt;&lt;li&gt;Security, Openness
and Privacy&lt;/li&gt;&lt;li&gt;Access and Diversity&lt;/li&gt;&lt;li&gt;Taking Stock and the
Way Forward&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Sunil Abraham,
Executive Director of the Centre for Internet and Society, will be
participating in the following workshops:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/events/digital-technologies-for-civic-engagement" class="external-link"&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons Learned
and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;The
Impact of Regulation: FOSS and Enterprise&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt;Putting
Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;Privacy,
Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Shyam Ponappa,
Fellow at the Centre for Internet and Society, will be presenting remotely for
the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=121"&gt;Open
Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Nishant
Shah, Director Research at Centre for Internet and
Society, has organized the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons
Learned and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We are not limited to following specific workshops. Please follow
the link for more information on
workshops of your interest, program details and the schedule:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/schedule-a-programme-2011"&gt;http://www.intgovforum.org/cms/schedule-a-programme-2011&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Participation is free. However, we would be grateful if you could
confirm your attendance by emailing Natasha Vaz “n&lt;a href="mailto:atasha@cis-india.org"&gt;atasha@cis-india.org&lt;/a&gt; or Tom Dane at
“&lt;a class="external-link" href="mailto:tjdane@gmail.com"&gt;tjdane@gmail.com&lt;/a&gt;”. We hope you will join us to watch the web cast and
contribute your own insights on the various workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Looking
forward to welcoming you at the workshops!&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/igf-remote-participation'&gt;https://cis-india.org/internet-governance/events/igf-remote-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-27T05:09:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-guide-to-igf">
    <title>Netizen's Guide to the Internet Governance Forum</title>
    <link>https://cis-india.org/news/netizen-guide-to-igf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The&lt;a class="external-link" href="http://www.intgovforum.org/cms/"&gt; Internet Governance Forum&lt;/a&gt; is a multi-stakeholder forum where &lt;a class="external-link" href="http://www.intgovforum.org/cms/provisional-list-of-participants-2011"&gt;people from all over the world&lt;/a&gt; - from government, industry, the technical community and civil society - come together to discuss the Internet's future. The Sixth Annual meeting officially kicks off on Tuesday morning in Nairobi, Kenya. A number of pre-meetings will be held all day on Monday.&lt;/p&gt;
&lt;p&gt;The IGF is set up for &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011"&gt;remote participation&lt;/a&gt;, so you do not need to be in Kenya physically to follow the discussions or to ask questions and make your views known. Before the start of each day, IGF staff will post &lt;a class="external-link" href="http://www.intgovforum.org/cms/remote-participation-2011/rp-links"&gt;remote participation links&lt;/a&gt; for each conference room so that you can participate remotely through the conference's WEBEX system. (&lt;a class="external-link" href="http://www.webex.com/lp/stest/index.php?t=ppuUS"&gt;Click here&lt;/a&gt; to see if your computer is compatible with their system.)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Monday pre-meetings&lt;/strong&gt;: &amp;nbsp;Several interesting and important meetings will be held on Monday and four of them are open to everybody on the Internet. Two of them have made their schedules publicly available and promoted them:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.apc.org/en/news/governance/internet-governance-forum-2011-preevent-access-rig"&gt;The Association for Progressive Communications&lt;/a&gt; meeting on access as a right. (10am-6pm Kenya time). Why attend? Click here for the invitation flyer and click here for the full run-down of the day's discussions. Also see APC's briefing paper on priorities for this year's IGF and other short papers on key IGF discussion themes. The final panel of the day, a &lt;strong&gt;Roundtable on the State of Internet Rights (17:15-18:15 local time)&lt;/strong&gt; will be held jointly with the next group. A guest blogger from APC will be reporting from the meeting here on GVA later this week.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://giga-net.org/page/2011-annual-symposium"&gt;Global Internet Governance Academic Network (Giganet) annual symposium&lt;/a&gt;. (also approximately 10am-6pm) Many of the papers or abstracts are available for download. See for instance Arresting the decline of multi-stakeholderism in Internet governance by Jeremy Malcolm; The legality of internet blackouts in times of crisis. An assessment at the intersection of human rights law, humanitarian law and internet governance principles by Matthias Ketteman; and Upholding online anonymity in Internet governance. Affordances, ethical frameworks, and regulatory practices by Robert Bodle.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;The main conference: So many sessions, which ones to join? At any given time, several different meetings, workshops, and plenary sessions are held concurrently. The IGF organizers have posted the schedule as a rather unweildy Excel file here. Fortunately, other participants have taken the time to post the schedule in more digestible formats.&amp;nbsp;&amp;nbsp;The &lt;a class="external-link" href="http://www.diplomacy.edu/"&gt;Diplo Foundation's&lt;/a&gt; e-Diplomacy project has an online &lt;a class="external-link" href="http://igf2011.diplomacy.edu/sessions"&gt;list of sessions&lt;/a&gt; and&lt;a class="external-link" href="http://igf2011.diplomacy.edu/schedule/2011-W40"&gt; schedule&lt;/a&gt;. The indefatigable &lt;a class="external-link" href="http://www.timdavies.org.uk/"&gt;Tim Davies &lt;/a&gt;has also created a &lt;a class="external-link" href="http://igf2011.diplomacy.edu/home"&gt;social media page&lt;/a&gt; aggregating all tweets, blogs and photos posted by participants. The official hashtag, by the way, is #IGF11.&lt;/p&gt;
&lt;p&gt;If you want to get involved with a global community of people working for Internet users' rights whose work extends throughout the year, be sure to join one or more of the “&lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamiccoalitions"&gt;dynamic coalitions&lt;/a&gt;.” Examples include the &lt;a class="external-link" href="http://internetrightsandprinciples.org/"&gt;Internet Rights and Principles Coalition&lt;/a&gt; (meeting on Tuesday from 11-12:30 Kenya time) and the &lt;a class="external-link" href="http://www.intgovforum.org/cms/dynamic-coalitions/75-foeonline"&gt;Freedom of Expression Coalition&lt;/a&gt; (Wednesday 4:30-6pm).&lt;/p&gt;
&lt;p&gt;Many participating organizations have posted lists of the workshops they are organizing or participating in on their websites. Those interested in sessions related to activism, human rights and free expression on the Internet may want to check out session listings by the APC (scroll down below the jump),&amp;nbsp;the &lt;a class="external-link" href="https://www.eff.org/calendar/2011/09/27/eff-united-nations-internet-governance-forum"&gt;Electronic Frontier Foundation&lt;/a&gt;, the &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/GNI_announces_workshop_at_IGF_2011_in_Nairobi.php"&gt;Global Network Initiative&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;, among others.&lt;/p&gt;
&lt;p&gt;Kieren McCarthy of dot-nxt has also created a handy &lt;a class="external-link" href="http://news.dot-nxt.com/2011/09/25/igf-2011-practical-guide"&gt;practical guide &lt;/a&gt;to this year's IGF, with his top session picks. He observes that while the opening session on Tuesday afternoon has “far, far too many speakers,” it will nonetheless be interesting “given all that is happening in the Internet governance world.” No doubt, speeches from Hamadoun Toure (ITU), Neelie Kroes (EC), Janis Karklins (UNESCO), Larry Strickling (US), Rod Beckstrom (ICANN) and Vint Cerf (Google) not be uniform in their visions for the Internet's future.&lt;/p&gt;
&lt;p&gt;For those interested in truly doing their homework on the IGF and the current global impasse over Internet governance, see Jeremy Malcolm's post on IGF Watch: &lt;a class="external-link" href="http://igfwatch.org/discussion-board/where-to-develop-internet-policy-itu-g8-oecd-or-an-empowered-igf#Z9R7kctbwaRSKNjToF9Aog"&gt;Where to develop Internet policy: ITU, G8, OECD or an empowered IGF?&lt;/a&gt; Also see his previous posts on twists and turns of the IGF's five-year history.&lt;/p&gt;
&lt;p&gt;Written by Rebecca MacKinnon, the story was published in Global Voices Advocacy on 26 September 2011. The original can be read &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/09/26/igf11guide/"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-guide-to-igf'&gt;https://cis-india.org/news/netizen-guide-to-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-26T08:59:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2011-bulletin">
    <title>September 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage that happened in the month of September 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research base, the RAW programme has been collaborating with different organizations and individuals in order to focus on its two year thematic of Histories of the Internets in India. Five monographs were recently launched at a workshop, &lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum&lt;/a&gt; held in Ahmedabad from 19 to 22 August 2011.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/rewiring-bodies"&gt;Re:Wiring Bodies&lt;/a&gt; by Asha Achuthan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/porn-law-video-technology"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita A Malhotra &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/archives-and-access"&gt;Archives and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/internet-society-space"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; - This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around ‘digital revolutions’ in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-alternatives-book-review"&gt;Digital (Alter)Natives with a Cause? — Book Review by Maarten van den Berg&lt;/a&gt; - The books come in a beautifully designed cassette and are accompanied by a funky yellow package in the shape of a floppy disk containing the booklet ‘D:coding Digital Natives’, a corresponding DVD, and a pack of postcards portraying the evolution of writing - in the sentence ‘I love you’, written with a goose feather in 1734, to the character set ‘i&amp;lt;3u’ entered on a mobile device in 2011, writes Maarten van den Berg. The review was published in "&lt;a href="http://www.thebrokeronline.eu/Articles/Digital-Alter-Natives"&gt;The Broker&lt;/a&gt;" on 19 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/book-launch"&gt;Digital AlterNatives book launch&lt;/a&gt; – CIS and Hivos launched this book at the Museum for  Communication, Hague on 16 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/usof-meeting"&gt;Stakeholders Meeting of the USOF on Facilitating ICT Access to Persons with Disabilities in Rural Areas&lt;/a&gt;, on 7 September 2011. Nirmita Narasimhan made a presentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. CIS believes that access to knowledge and culture is essential, and such access promotes creativity and innovation, and helps bridge the differences between the developing and developed worlds in a positive manner. Towards this end, CIS is campaigning for an international treaty on copyright exceptions for print-challenged people, advocating against laws (such as the PUPFIP Bill) that privatize public-funded knowledge, call for the WIPO Broadcast Treaty to be restricted to broadcast, question the demonization of 'pirates', and support endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/copyright-bill-parliament"&gt;Copyright Amendment Bill in Parliament&lt;/a&gt; by Nirmita Narasimhan, 30 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/photocopying-the-past"&gt;Photocopying the past&lt;/a&gt; by Sunil Abraham in the Indian Express, 2 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/calling-out-the-bsa-on-bs"&gt;Calling Out the BSA on Its BS&lt;/a&gt; by Pranesh Prakash, 9 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet technologies have fundamentally questioned the notion of governance, not only at the level of administration but also at the level of mechanisms of control, regulation and shaping of the individual. e-Governance initiatives, in combination with other regimes of surveillance, control and censorship, are redefining what it means to be a citizen, a subject, and an individual. We look at questions of governance — at the micro level of the individual and the private (family, relationships, community structures, etc.) as well as the level of governmentality — at the macro level of nation state, citizenship, market economies, and the public (spaces of consumption, work, leisure, political engagement, etc.) under the umbrella of digital governance.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/understanding-right-to-information"&gt;Understanding the Right to Information&lt;/a&gt; by Elonnai Hickok, 28 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Using the Internet as a Tool for Political Change: Lessons Learned and Way Forward&lt;/a&gt;, IGF, Nairobi, 27 September 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/reviving-growth"&gt;Reviving Growth&lt;/a&gt;, published in the Business Standard on 1 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/open-spectrum-for-development-in-the-context-of-the-digital-migration"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;, IGF, Nairobi, 29 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Film Screening&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/partners-in-crime"&gt;Screening of Partners in Crime&lt;/a&gt;, Vikalp@Smriti Nandan along with CIS screened the film and followed it with a discussion with the director of the film, Paromita Vohra, Smriti Nandan Cultural Centre, 9 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"&gt;Prime Security: The Mathematics of RSA Encryption&lt;/a&gt;, a one-day workshop with Rohit Gupta, a leading Mathematician.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-masks-forgotten-protests"&gt;India's social media "spring" masks forgotten protests&lt;/a&gt; [Alistair Scrutton in Reuters, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-key-to-hazare-success"&gt;Social media holds the key to Hazare's campaign success&lt;/a&gt; [Alistair Scrutton in NEWS.scotsman.com, 26 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-divide"&gt;Digital divide: Why Irom Sharmila can’t do an Anna&lt;/a&gt; [FirstPost.Ideas, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/revolutions-viral?searchterm=When+revolutions+go+viral+"&gt;When revolutions go viral&lt;/a&gt; [Times of India (Crescent Edition), 27 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibsa-seminar"&gt;IBSA Seminar on Global Internet Governance&lt;/a&gt;, organised by the Brazilian Ministry of External Relations, with support from the Brazilian Internet Steering Committee (CGI.br) and the Center for Technology &amp;amp; Society (CTS/FGV) and governmental and non- governmental actors from India, Brazil and South Africa, 1 to 2 September 2011, Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil. Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment-bill-in-indian-parliament"&gt;Copyrights Amendment Bill to Be Tabled in Indian Parliament – Parallel Import provisions have Been Removed&lt;/a&gt; [Mike Palmedo in infojustice.org, 5 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/power-of-information"&gt;The Power of Information: New Technologies for Philanthropy and Development&lt;/a&gt; [Indigo Trust, 15 September 2011]. Sunil Abraham participated in this event. A video of his speech is now available on &lt;a href="http://www.youtube.com/watch?v=XhpLkEhn9AY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/using-social-media-to-understand-peoples-pulse"&gt;Planning Commission, Census 2011 and India Post using social media to understand people's pulse better&lt;/a&gt; [Vikas Kumar in the Economic Times, 20 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foss-instrument-for-accessible-development"&gt;The Impact of Regulation: FOSS and Enterprise&lt;/a&gt;, organised by FOSSFA and ICFOSS, IGF, Nairobi, 28 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-security-access-to-rights"&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;, organised by Expression Technologies, IGF, Nairobi, 29 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/how-can-privacy-be-protected"&gt;Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;, organised by GSM Association, 29 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/truman-show-in-kerala"&gt;The Truman Show, in Kerala&lt;/a&gt; [Times of India, posted on CIS website on 23 September 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/making-difference-online-offline"&gt;Making a difference, online and offline&lt;/a&gt; [LiveMint, 27 September 2011].&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2011-bulletin'&gt;https://cis-india.org/about/newsletters/september-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-07-30T06:34:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/foss-instrument-for-accessible-development">
    <title>The Impact of Regulation: FOSS and Enterprise</title>
    <link>https://cis-india.org/news/foss-instrument-for-accessible-development</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The workshop seeks to elaborate the impact of regulation, between Free and Open Source Software and Enterprise. It will look at the following key areas:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Education,&amp;nbsp;&lt;/li&gt;&lt;li&gt;Software development,&lt;/li&gt;&lt;li&gt;Digital Content,&amp;nbsp;&lt;/li&gt;&lt;li&gt;Empowering persons with disability,&amp;nbsp;&lt;/li&gt;&lt;li&gt;FOSS for disaster preparedness etc.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;If time allows, we will explore, if cloud computing is an open Source adjacent?&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;This lively discussion, is meant to bring into perspective the real picture in the market and broaden the minds of participants to realize the options available and come up with recommendations on what needs to be considered to have a fair playing ground, more especially for the developing countries.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Access and Diversity&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; Yes&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?%20chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=43"&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?%20chronoformname=Workshopsreports2009View&amp;amp;curr=1&amp;amp;wr=43&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Provide the names and affiliations of the panellists you are planning to invite:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Mr.Samer Azmy- ICT Manager / Solution Integration Consultant, Huawei(Moderator)&lt;/li&gt;&lt;li&gt;Mr. Satish Babu -ICFOSS,India&amp;nbsp;&lt;/li&gt;&lt;li&gt;Mr. Yves Miezan Ezo- Smile Training, Manager, (France)&lt;/li&gt;&lt;li&gt;Mr. Sunil Abraham,Executive Director, Center for Internet and&amp;nbsp;Society, Bangalore, India&lt;/li&gt;&lt;li&gt;Mr. Evans Ikua- FOSS Certification Manager in the ict@innovation program&lt;/li&gt;&lt;li&gt;Dorothy Gordon- Director General, AITI-KACE&lt;/li&gt;&lt;li&gt;Ms. Judy Okite (Remote Moderator)&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Mr. Samer Azmy- FOSSFA(Pan-African)&lt;/li&gt;&lt;li&gt;Mr. Satish Babu -ICFOSS,(India)&lt;/li&gt;&lt;li&gt;Mr. Yves Miezan Ezo - Smile Training Centre(France)&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Organization&lt;/strong&gt;: FOSSFA, ICFOSS&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Contact Person&lt;/strong&gt;: Mr. Samer Azmy, Mr. Satish Babu&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Workshop Number: 211&lt;/div&gt;
&lt;div&gt;See the &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=211"&gt;event details&lt;/a&gt; on the IGF website&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/foss-instrument-for-accessible-development'&gt;https://cis-india.org/news/foss-instrument-for-accessible-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-09-22T10:53:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
