<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1771 to 1785.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/ai-and-healtchare-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/standards/dynamic-coalition-on-open-standards-dcos-agreement-on-procurement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/advocacy/open-access-agenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/eprints-iisc-ernet-october-28-2016-subbiah-arunachalam-madan-muthu-adopting-orcid-as-unique-identifier-will-benefit-all-involved-in-scholarly-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/businesswire-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/address-igf-closing-ceremony"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/ada-camp-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/files/ai-and-healtchare-report">
    <title>AI and Healtchare Report</title>
    <link>https://cis-india.org/internet-governance/files/ai-and-healtchare-report</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/ai-and-healtchare-report'&gt;https://cis-india.org/internet-governance/files/ai-and-healtchare-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-01-26T01:35:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf">
    <title>AI and Governance Case Study pdf</title>
    <link>https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf'&gt;https://cis-india.org/internet-governance/ai-and-governance-case-study-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-01T02:06:47Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report">
    <title>Ahmednagar — Marathi Wikipedia Workshop</title>
    <link>https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report</link>
    <description>
        &lt;b&gt;Wikipedia Community members helped the Higher Education Innovation and Research Applications Programme (HEIRA), CSCS Bangalore organize a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in this report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.aca.edu.in/"&gt;Ahmednagar College&lt;/a&gt; is one of the participant colleges in the ‘&lt;a class="external-link" href="http://www.fordfoundation.org/pdfs/library/pathways_to_higher_education.pdf"&gt;Pathways to Higher Education&lt;/a&gt;’ programme anchored by &lt;a class="external-link" href="http://cscs.res.in/irps/heira"&gt;HEIRA&lt;/a&gt;, and run in collaboration with CIS. This programme works closely with undergraduate students in three states to address the problem of quality of access to higher education. The focus of the programme is on inculcating critical and analytical skills which play a very important role in gaining access to knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Wikipedia workshop in Marathi held at the Ahmednagar College intended to introduce the students to the concepts of open and free sources of knowledge, and encourage active Marathi editors to edit and populate the Marathi Wikipedia domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yogesh Khandke was representing the Wikipedia community. He started off by explaining the five pillars of Wikipedia, the copyright issues and the importance of references and citations. As most of the students were new to the concepts of both editing and knowledge production, we faced a few problems in the beginning. Since the IP addresses were already cleared for multiple registrations we did not face that particular problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The students were asked to come up with material and information that they would want to add to the &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Marathi_Wikipedia"&gt;Marathi Wikipedia&lt;/a&gt; domain. We conducted a group activity where the groups exchanged the information they were planning to use. These groups researched, proof read and added to the information collected by their friends. We had stressed that all the information needed to be cited from a reliable source and must have a clear reference. Hence, a lot of unnecessary and opinionated information was cleared at the first level itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hands-on editing session proved to be challenging as most of the students did not know how to type in Marathi and ended up using phonetic keyboards. The session ended with all the students having been registered as Wikipedia editors and most of the groups were successful in editing. A couple of groups created new pages as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yogesh Khandke was of immense help and he was ably supported by Nagesh Shelake, &lt;a class="external-link" href="http://en.wikipedia.org/wiki/New_Arts,_Science_and_Commerce_College,_Ahmednagar"&gt;Dept. of Sociology, New Arts and Science College, Ahmednagar&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A special thanks to &lt;a class="external-link" href="http://www.aca.edu.in/Details.aspx?Faculty_No=69"&gt;Dr. S.B Iyyer&lt;/a&gt;, Department of Physics, Ahmednagar College and Coordinator of Pathways Cell, and Raikwad, Department of Commerce and Assistant Coordinator of Pathways Cell.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report'&gt;https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Tanveer Hasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-07-26T09:34:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics">
    <title>Ahead of hosting Modi, Facebook rebrands internet.org as Free Basics</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics</link>
    <description>
        &lt;b&gt;Hinting at what could be vital points of discussion when Prime Minister Narendra Modi visits Facebook founder Mark Zuckerberg on Sunday, the social media giant has rebranded its internet access enabling platform Internet.org as Free Basics.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/facebooks-internet-org-is-now-free-basics-115092500238_1.html"&gt;Business Standard&lt;/a&gt; on September 26, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was announced by Chris Daniels, vice-president of Internet.org, at a press meet in Menlo Park on Friday. Zuckerberg confirmed the same and wrote on his Facebook wall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Facebook has opened up its &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Free+Basics" target="_blank"&gt;Free Basics &lt;/a&gt;platform,  which means any app developer can now include their services on it.  “This gives people the power to choose what apps they want to use.”  Zuckerberg in his post also said the company has improved the security  and privacy of Internet.org, which will support HTTPS web services as  well. “Connectivity isn't an end in itself. It’s what people do with it  that matters. We hope the improvements we've made  help even more people  get connected — so that our whole global community can benefit  together,” Zuckerberg said in his post, in which he quoted the example  of a soybean farmer from Maharashtra, Asif Mujhawar, who uses parenting  app BabyCenter for free through Internet.org.&lt;br /&gt; &lt;br /&gt; This is a significant move by Facebook, considering the backlash it had  from various quarters in India following debates on net neutrality.  Internet.org is an open platform by Facebook across 19 developing  countries, including India, to enable easy access of selected apps and  app-based services to people at zero cost. In India, it had partnered  with Reliance Communications to offer free access to about 30 websites.&lt;br /&gt; &lt;br /&gt; “One of the concerns was calling the service ‘Internet.org’, despite it  representing only a tiny sliver of the Internet,” said Pranesh Prakash,  policy director at the centre for Internet and Society, a nonprofit  entity to promote safe internet access in the country.&lt;br /&gt; &lt;br /&gt; He said by removing the Internet word, Facebook is now talking of its  own larger internet affordability project and allowing app developers to  build apps and host it on the  Free Basic platform. “This gives people  the power to choose what apps they want to use,” Prakash said.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics'&gt;https://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-18T14:21:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/standards/dynamic-coalition-on-open-standards-dcos-agreement-on-procurement">
    <title>Agreement on Procurement</title>
    <link>https://cis-india.org/openness/publications/standards/dynamic-coalition-on-open-standards-dcos-agreement-on-procurement</link>
    <description>
        &lt;b&gt;On December 6, 2008, at the closing of the third Internet Governance Forum in Hyderabad, India, the Dynamic Coalition on Open Standards (DCOS) released an agreement entitled the "Dynamic Coalition on Open Standards (DCOS) Agreement on Procurement in Support of Interoperability and Open Standards".&lt;/b&gt;
        
&lt;h2 align="center"&gt;Dynamic Coalition on Open Standards (DCOS) Agreement on Procurement in Support of Interoperability and Open Standards&amp;nbsp;&lt;/h2&gt;
&lt;p align="center"&gt;Third Internet Governance Forum (IGF)&lt;/p&gt;
&lt;p align="center"&gt;&lt;strong&gt;Hyderabad, India &lt;/strong&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;strong&gt;6 December 2008 &lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;Preamble &lt;br /&gt;&lt;/h3&gt;
&lt;p class="western"&gt;The Contracting Parties,&lt;/p&gt;
&lt;p class="western"&gt;&lt;em&gt;Recalling&amp;nbsp; &lt;/em&gt;the
World Summit on the Information Society (WSIS) Declaration of
Principles which states that "[i]nternational standards aim to create
an environment where consumers can access services worldwide regardless
of underlying technology,"&lt;/p&gt;
&lt;p class="western"&gt;&lt;em&gt;Recognizing&lt;/em&gt;&lt;em&gt; &lt;/em&gt;that standards are increasingly global concerns, involving goods and services that move in international trade across borders,&lt;/p&gt;
&lt;p class="western"&gt;&lt;em&gt;Aware&lt;/em&gt;
that current competition and legal remedies may not be enough to solve
the inherent tensions that routinely arise in the realm of patents and
standards,&lt;/p&gt;
&lt;p class="western"&gt;&lt;em&gt;Desirous &lt;/em&gt;of
encouraging procurement policies that require evaluation of multiple,
competing products based on open ICT standards in order to ensure a
level playing field for vendors, governments and consumers,&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cognizant&lt;/em&gt; of the need for procurement policies for software programs that are predicated upon an open standard,&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Open Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Given
the multiplicity of interpretations of the term open standards, for the
purpose of this document we endorse as an acceptable definition the
position contained in the European Union's draft European
Interoperability Framework:&lt;/p&gt;
&lt;p&gt;1)
The open standard is adopted and will be maintained by a not-for-profit
organisation, and its ongoing development occurs on the basis of an
open decision-making procedure available to all interested parties
(consensus or majority decision etc.).&lt;br /&gt; 2) The open standard has
been published and the standard specification document is available
either freely or at a nominal charge. It must be permissible to all to
copy, distribute and use it for no fee or at a nominal fee.&lt;br /&gt; 3) The
intellectual property - i.e. patents possibly present - of (parts of)
the open standard is made irrevocably available on a royalty free basis.&lt;br /&gt; 4) There are no constraints on the re-use of the standard.&lt;/p&gt;
&lt;p align="right"&gt;(IDABC EIF v2 draft (http://ec.europa.eu/idabc/en/document/7728))&lt;/p&gt;
&lt;p class="western"&gt;As
noted in the European Interoperability Framework cited above, open
standards or technical specifications must allow all interested parties
to implement the standards and to compete on quality and price. The
goal is to have a competitive and innovative industry, not to protect
market shares by raising obstacles to newcomers. Thus, open standards
or technical specifications must be possible to implement in software
distributed under the most commonly used open source licences, with no
limitations arising from IPR associated with the standard in question.&lt;/p&gt;
&lt;p class="western"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="western"&gt;In
addition to the above requirements, it is recommended that there should
be multiple independent implementations of the standard.&lt;/p&gt;
&lt;p class="western"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="western"&gt;Governments,  publicly funded and non-profit institutions agree to implement the following policies.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Governments, publicly funded and non-profit institutions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
Hereby agree to the following measures in order to promote
interoperability and accessibility through the use of open standards.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1. To create a policy statement on interoperability and open standards, to be available to employees and the public.&lt;/p&gt;
&lt;p&gt;2. By 2010, procurement of all software should be vendor neutral and implement open standards&lt;/p&gt;
&lt;p&gt;3.
By 2010, tender specifications for hardware (including peripherals and
mobile devices) should require that manufacturers provide the driver
and interface information necessary to work with a reasonable range of
proprietary and free operating system platforms.&lt;/p&gt;
&lt;p&gt;4. By 2010, all public facing web pages should conform to W3C standards for structure, presentation and accessibility.&lt;/p&gt;
&lt;p&gt;5.
By 2010, tenders for the supply of web based services (for example,
online reservations) must specify the requirements of point 4.&lt;/p&gt;
&lt;p&gt;6.
By 2010, agencies should implement policies regarding the storage and
archiving of government data and records to ensure that data is stored
in open data and document formats.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Signed by:&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Aslam Raffee, Government IT Officers' Council, OSS Working Group, Republic of South Africa&lt;/p&gt;
&lt;p&gt;Association for Progressive Communications (APC)&lt;/p&gt;
&lt;p&gt;Bob Jolliffe, Freedom To Innovate, South Africa&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society, India&lt;/p&gt;
&lt;p&gt;Hamid Rabiee, Sharif University of Technology, Iran&lt;/p&gt;
&lt;p&gt;Knowledge Ecology International&lt;/p&gt;
&lt;p&gt;Moving Republic, India&lt;/p&gt;
&lt;p&gt;Shuttleworth Foundation, South Africa&lt;/p&gt;
&lt;p&gt;Swathanthra Malayalam Computing, India&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endorsed by&lt;/strong&gt;:&lt;/h3&gt;
&lt;p&gt;   	 	 	 	 	&lt;/p&gt;
&lt;p&gt;Bangladesh Friendship Education Society, Bangladesh&lt;/p&gt;
&lt;p&gt;Indian Social Action Forum (INSAF), India&lt;/p&gt;
&lt;p&gt;Foundation for Media Alternatives, Philippines&lt;/p&gt;
&lt;p&gt;OpenForum Europe&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/standards/dynamic-coalition-on-open-standards-dcos-agreement-on-procurement'&gt;https://cis-india.org/openness/publications/standards/dynamic-coalition-on-open-standards-dcos-agreement-on-procurement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-12-08T06:08:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/agenda">
    <title>Agenda</title>
    <link>https://cis-india.org/openness/publications/content-access/agenda</link>
    <description>
        &lt;b&gt;The Centre for Culture, Media &amp; Governance, Jamia Millia Islamia, New Delhi, and the Centre for Internet and Society, Bangalore, jointly organise the first Open Access Day on the 14th of October 2008 at Tagore Hall, Dayar-i-Mir Taqi Mir, Jamia Millia Islamia, New Delhi.&lt;/b&gt;
        
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Session&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1400 – 1415&lt;/td&gt;
&lt;td&gt;Welcome and Introduction: Prof. Biswajit Das,
			Director, Centre for Culture, Media &amp;amp; Governance, Jamia Millia
			Islamia&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;1415 – 1535&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Chair: Prof. Arif Ali,
			Head Dept. of Bio-Technology, Jamia Milia Islamia&lt;/p&gt;
&lt;p align="left"&gt;Panelists:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="left"&gt;Mr. Zakir Thomas,
				Project Director -  Open Source Drug Discovery, and Dr. Anshu
				Bhardwaj, Scientist, CSIR, New Delhi.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="left"&gt;Dr. Andrew Lynn,
				Professor, Department of Bio-informatics, Jawaharlal Nehru
				University, New Delhi.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="left"&gt;Prof. Subbiah
				Arunachalam, Distinguished Fellow, Centre for Internet and
				Society&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;1535 – 1600&lt;/p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Question and Answer Session&lt;/p&gt;
&lt;p align="left"&gt;Open Discussion&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;1600 - 1615&lt;/p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Vote of thanks and
			closure by Sunil Abraham, Director – Policy, Centre for Internet
			and Society.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;End with Tea/Coffee&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="left"&gt;&lt;strong&gt;Contact Details&lt;/strong&gt;&lt;/h3&gt;
&lt;table&gt;&lt;col width="327"&gt;
	&lt;col width="315"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&lt;strong&gt;New Delhi&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;&lt;strong&gt;Bangalore&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Vibodh Parthasarathi&lt;br /&gt;Reader/Associate Professor&lt;br /&gt;Centre for Culture, Media and
			Governance&lt;br /&gt;Nelson Mandela House, Mujib Bagh&lt;br /&gt;Jamia Millia Islamia, New Delhi 110 025&lt;br /&gt;P.: +91 11 26933810/26933842&lt;br /&gt;M: +91 9873458688&lt;br /&gt;E: &lt;u&gt;&lt;a href="mailto:ccmgjmi@gmail.com"&gt;ccmgjmi AT gmail.com&lt;/a&gt;&lt;/u&gt;&lt;br /&gt;W: &lt;u&gt;&lt;a href="http://jmi.nic.in/ccmg/index.html"&gt;http://jmi.nic.in/ccm&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Sunil Abraham&lt;br /&gt;Director - Policy&lt;br /&gt;Centre for Internet and Society&lt;br /&gt;No. D2, 3rd Floor, Sheriff Chambers&lt;br /&gt;14, Cunningham Road, Bangalore - 560
			052&lt;br /&gt;P: +91 80 4092 6283 F: +91 80 4114 8130&lt;br /&gt;M: +91 9611100817&lt;br /&gt;E: &lt;u&gt;&lt;a href="mailto:sunil@cis-india.org"&gt;sunil AT cis-india.org&lt;/a&gt;&lt;/u&gt;&lt;br /&gt;W: &lt;u&gt;&lt;a href="https://cis-india.org/../"&gt;www.cis-india.org&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 align="left"&gt;&lt;strong&gt;Map&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="left"&gt;&lt;img class="image-inline" src="CCMG%20Location.jpg/image_large" alt="Map to CCMG" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1 class="western"&gt;&lt;/h1&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/agenda'&gt;https://cis-india.org/openness/publications/content-access/agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-10-13T12:25:59Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/advocacy/open-access-agenda">
    <title>Agenda</title>
    <link>https://cis-india.org/advocacy/open-access-agenda</link>
    <description>
        &lt;b&gt;word file&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/advocacy/open-access-agenda'&gt;https://cis-india.org/advocacy/open-access-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-03-16T06:16:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar">
    <title>After Supreme Court Setback, Fintech Firms Await Clarity On Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar</link>
    <description>
        &lt;b&gt;The 12-digit Aadhaar number is now out of bounds for fintech companies in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Sharma was &lt;a class="external-link" href="https://www.bloombergquint.com/aadhaar/after-supreme-court-setback-fintech-firms-await-clarity-on-aadhaar"&gt;published in Bloomberg Quint&lt;/a&gt; on September 27, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/FiEbZcL3lnY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With the Supreme Court on Wednesday terming Aadhaar authentication by private companies as “&lt;a href="https://www.bloombergquint.com/law-and-policy/2018/09/26/aadhaar-a-quick-summary-of-the-supreme-court-majority-order" target="_blank"&gt;unconstitutional&lt;/a&gt;”,  companies such as online wallets and e-tailers, among others, will now  have to make changes to how they onboard and verify customers, in  addition to how they transact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a 567-page majority judgment  authored by Justice Sikri and concurred upon by two other judges—Chief  Justice Dipak Misra and Justice AM Khanwilkar—it said that Section 57 of  the Aadhaar Act, which allows private companies to use Aadhaar for  authentication services based on a contract between the corporate and an  individual, would enable commercial exploitation of private data and  hence is unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What it essentially means is that the  private bodies, such as lending platforms, wallets, or any private  entity, cannot use Aadhaar for authentication,” said Anirudh Rastogi  founder at Ikigai Law (formerly TRA), a law firm that specialises in  representing businesses on data privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision is set to  impact private companies right from Flipkart-owned PhonePe, Paytm,  Reliance Jio and Amazon, among others, which rely on Aadhaar for  e-verification. Amazon recently launched cardless equated monthly  installments on Amazon Pay through the digital finance platform Capital  Float and asked customers to provide Aadhaar numbers or virtual ID and  PAN details on the Amazon app for verification.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;'Aadhaar Is Just Another ID'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh  Prakash, fellow, Centre for Internet and Society, said that with this  judgment Aadhaar is no longer an identity infrastructure as its creators  have dreamt of. “It is now just another ID.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those opposed to  Aadhaar, on privacy and security grounds, this may be a part victory.  But for the Fintech industry it stymies the use of quick Aadhaar-based  e-KYC (know your customer norms) to onboard customers. “The fintech  industry thrives on the instant paperless mantra, and this move will  curb its rapid growth, ” Amrish Rau, co-founder of PayU, said in a text  message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The verdict is also set to push up costs for the  industry. Rau said: “Conducting physical KYC would be a costly affair,  with every physical KYC costing about Rs 100 per person.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies  like PhonePe await more clarity. “We are waiting to hear from bodies  like the Reserve Bank of India, UIDAI on what KYC that will be required  for wallets moving ahead," Sameer Nigam, cofounder of PhonePe, said.  "Whether we go to no KYC, lower limit environment or go to the physical  KYC environment."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  judgment also stated that the identification number will not be  mandatory for opening bank accounts, mobile-phone connections or for  admissions into educational institutions. However, Aadhaar will continue  to be mandatory for the distribution of state-sponsored welfare schemes  including direct benefit transfers and the public distribution system.  Taxpayers will have to link their Permanent Account Numbers to the  biometric database.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar-Based KYC: Allowed With Consent?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  Supreme Court has concluded that the part of section 57 which enables  body corporate and individuals also to seek authentication, that too on  the basis of a contract between the individual and such body corporate  or person, would impinge upon the right to privacy of such individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna  S, a Supreme Court advocate and lawyer for one of the petitioners in  the Aadhaar matter interpreted it to mean that even if a customer  voluntarily wants to use Aadhaar for e-KYC, businesses cannot accept it.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;They  have struck down the part of Section 57 that allows use of Aadhaar  based on a contract. A contract, by nature is voluntary, But since the  court has struck down this part, even voluntary use won’t be permitted.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jaitley Hints At Legal Backing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile,  Finance Minister Arun Jaitley on Wednesday hinted that the Centre is  likely to examine whether separate legal backing is needed for Section  57 of the Aadhaar Act, the newswire PTI reported. “So, let us first read  the judgement. There are two-three prohibited areas. Are they because  they are totally prohibited or are they because they need legal  backing,” Jaitley was quoted as saying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rastogi of Ikigai Law said  that the court has left open for the government to promulgate a law to  enable private parties to use Aadhaar that can withstand judicial  scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul  Matthan, a technology partner at law firm Trilegal differed with this  view. He said that since the apex court has ruled that private entities  cannot access the Aadhaar infrastructure, it means that even if the  government brings a specific law to allow for that, it would be  unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanna agreed with this interpretation.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  court has hinted that commercial exploitation of personal information  will fail the proportionality test laid down by it in the Right to  Privacy judgment. This is one of the grounds for them to conclude that  Section 57 is unconstitutional. So even a law is introduced, private  access will be impermissible.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Prasanna S, Advocate, Supreme Court&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Are Aadhaar-Based KYCs Tainted?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since  the use of Aadhaar by private entities has been struck down, does it  mean entities who have used it for KYC so far have to re-do that  exercise? And data that was collected as part of Aadhaar-based KYC- does  that need to be deleted?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The majority order hasn’t specifically  addressed these questions, Matthan pointed out. But went on to explain  that his reading of the judgment is that the court wants things to  remain as they are.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;The  Supreme Court has said that collection of data before the Aadhaar Act  was introduced is valid. If you follow that sentiment, may be we can  argue that there’s no requirement to delete the data.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Rahul Matthan, Partner, Trilegal&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Whatever  has been done without the authority of law has to go, Prasanna said.  But this outcome may not be practical and another hearing before the  Supreme Court may be required to clear these questions, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Private  entities such as the online cab aggregator Ola have already removed  eKYC from its e-wallet when BloombergQuint last checked. Others may  follow suit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-10-01T23:39:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay">
    <title>After 15 Years, Is Free Access to Law Here to Stay?</title>
    <link>https://cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay</link>
    <description>
        &lt;b&gt;CIS, in collaboration with partners LexUM and SAFLII, is undertaking a Global Free Access to Law Study.  Being the first of its kind within the Free Access to Law Movement, this comparative study will examine what free access to law initiatives do, evaluate their core benefits and identify factors determining of their sustainability.   In the end, the free access to law study will provide future initiatives and existing LII networks with proven and adoptable best practices which will support the continued growth of the legal information commons.&lt;/b&gt;
        
&lt;p&gt;The question in the title is the
driving force behind a joint research initiative the Centre for
Internet and Society has recently undertaken in collaboration with pioneering institutions, &lt;a class="external-link" href="http://www.lexum.org"&gt;LexUM&lt;/a&gt;,and the &lt;a class="external-link" href="http://www.saflii.org"&gt;South African Legal Information Institute&lt;/a&gt;.&amp;nbsp; Over the past fifteen years, institutions providing free access to
legal materials have transformed the modes in which legal information
is produced and used. However, there have been few analyses of the
ways in which legal information repositories operate. Lessons
learned, best practices and successful models have not been
systematically documented, and administrators may not have access to
useful guidance or peer support. The study will bridge this gap by
analyzing a variety of free access to law initiatives around the
world in greater detail.&lt;/p&gt;
&lt;p&gt;In 1992, the first Legal Information
Institute (LII) at Cornell University began to place primary sources
of law and interpretive legal materials online, free of charge.&amp;nbsp; The &lt;a class="external-link" href="http://www.worldlii.org"&gt;Free Access to Law Movement&lt;/a&gt;
soon expanded to form a broad network of LIIs who shared the belief
that legal information is &lt;a class="external-link" href="http://www.worldlii.org/worldlii/declaration/"&gt;digital common property and should be accessible to all&lt;/a&gt;.
 Today, citizens around the world can access legal information in
multiple languages through easily searchable databases. Among the
resources available are statutes, bills, court decisions, bilateral
treaties, law journal articles, legal reform documents and much more.
This freely available legal information has helped make the law more
accessible to audiences previously underserved by costly commercial
databases, and has allowed comparative legal research to become more
practicable than ever before.&lt;/p&gt;
&lt;p&gt;Research will focus on gauging the
broader societal effects of free access to law initiatives, as well
as on understanding the diverse factors which contribute to or
undermine their sustainability.The CIS will be overseeing research in
Asia, while SAFLII and LexUM will cover South and West Africa, the
South Pacific, Canada and Australia.  The global scope of the study
will facilitate the sharing of expertise and best practices within
the global network of LIIs.&lt;/p&gt;
&lt;p&gt;The value of creating a legal
information commons has been clearly demonstrated. Access to legal
materials helps to strengthen judicial systems, improve legal
expertise, guide policymaking and maintain the rule of law. Legal
transparency helps businesses assess risk and encourage
entrepreneurship. Citizens and civil society actors require access to
law to participate in the political process and assert their rights.
These audiences form an important constituency for open access to
legal scholarship and demonstrate the need to further examine the
core benefits of free access to law initiatives.&lt;/p&gt;
&lt;p&gt;Online free access to legal materials
has also been an indispensable tool in underserved regions where a
host of factors often undermine access to legal information.  The
following examples, derived from preliminary CIS research throughout
Asia, demonstrate how free access to law can bridge various gaps in
legal information accessibility.  In some cases, laws may be
completely unavailable.  For example, bureaucrats may demand bribes
before allowing access to copies of a law, or governments may wish to
keep certain implementing guidelines or regulations a secret. In
other cases, a law might have simply been lost through lack of proper
storage or record-keeping.&lt;/p&gt;
&lt;p&gt;A second problem occurs when laws and
case law are available only in certain locations or certain forms. A
law may be available only in hard copy or in one or two libraries in
the capital city, for example. This causes difficulties for citizens
and practitioners in remote areas who lack the resources to travel.
Sometimes, the libraries containing the legal information also may
require special permissions to access. In other instances, legal
materials may have been digitized but not properly stored or
networked.&lt;/p&gt;
&lt;p&gt;Digitizing and uploading laws to
organized, searchable databases presents its own challenges, and some
governments lack the technical capacity to do so. However, digitizing
and uploading laws does not guarantee general public access. In some
countries, laws may be online but placed in pay-per-use databases.
And some governments retain a copyright or similar intellectual
property rights in their laws and other documents. This may mean that
NGOs or LIIs cannot copy, consolidate, or re-post certain legal
information without exposing themselves to copyright liability.  The
commercialization of legal information also restricts access to
individuals and firms able to pay costly subscription fees.&lt;/p&gt;
&lt;p&gt;Copyright and the commercialization of
legal information can inhibit the free flow of legal
information—notably when legal information can be better organized,
preserved and disseminated further under more open standards. 
Because of the importance of free access to law, a significant focus
of the research will be to identify factors that contribute to the
sustainability and success of free access to law initiatives.  This
is of great importance in Asia, where the local capacities of LIIs
require further strengthening before their databases can begin to
rival their commercial counterparts.&lt;/p&gt;
&lt;p&gt;Many &lt;a class="external-link" href="http://law.bepress.com/unswwps/flrps/art42/"&gt;challenges&lt;/a&gt;
remain for the development and sustainability of free access to law
initiatives in the Asian region.  Searchable legal information must
be provided in both English and regional languages, while local
technical capacities require further development.  Mariya
Badeva-Bright
of SAFLII also &lt;a class="external-link" href="http://blog.law.cornell.edu/voxpop/2009/07/15/is-free-access-to-law-here-to-stay/"&gt;notes&lt;/a&gt; that LIIs need to secure working partnerships
within the judicial branch of government in order to reduce the
burdens of digitization and to promote common standards in
preparation of legal material. The AsianLII has only begun to scrape
the surface of valuable legal information that is potentially
available and must continue to develop and strengthen  partnerships
in the region.&lt;/p&gt;
&lt;p&gt;	The study will have several concrete
results.   Upon completion of the study, a Free Access to Law Best
Practices Handbook will be published and will serve as a
comprehensive knowledge resource for both existing and nascent free
access law initiatives.  The handbook will outline various steps in
creating and maintaining successful free access to law initiatives,
while ensuring that important aspects of design and sustainability
are not overlooked.  Also, a comprehensive online library will host
current and future materials relating to the free access to law
movement, including a collection of free access to law case studies.&lt;/p&gt;
&lt;p&gt;Research by the CIS, LexUM, SAFLII,
and their respective team of researchers is expected to commence
within the next few months.&amp;nbsp; In the end, the free access to law study will provide
future initiatives and existing LII networks with proven and
adoptable best practices.  This research will increase the chance
that nascent initiatives will be successful, and support the
continued growth of the thriving legal information commons.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay'&gt;https://cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-08-18T05:07:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom">
    <title>Advocating for Openness: Nine Ways Civil Society Groups Have Mobilized to Defend Internet Freedom</title>
    <link>https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom</link>
    <description>
        &lt;b&gt;The debate over whether the Internet is a better tool for democratic empowerment or authoritarian control misconstrues the nature of the democratic challenges of the digital age. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sarah Oh was published by the &lt;a class="external-link" href="https://www.cima.ned.org/publication/advocating-openness-nine-ways-civil-society-groups-mobilized-defend-internet-freedom/"&gt;Center for International Media Assistance&lt;/a&gt; on November 15, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Key Findings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Civil society groups from the Global South are leading the charge to advocate for an Internet that remains open, pluralistic, and democratic. The nine case studies highlighted in this report demonstrate various ways groups in different countries have successfully fought for policies and norms that strengthen Internet freedom and digital rights. These strategies include awareness-raising, nonviolent direct action, regional and international coalition-building, and strategic litigation.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Media freedom advocates have been at the forefront of many Internet freedom efforts.&lt;/li&gt;
&lt;li&gt;Threats to independent media online and freedom of expression continue to mount as authoritarian regimes become more technologically savvy.&lt;/li&gt;
&lt;li&gt;Building broad civil society coalitions around Internet rights increases the chances of long-term success.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The debate over whether the Internet is a better tool for democratic empowerment or authoritarian control misconstrues the nature of the democratic challenges of the digital age. The Internet is not a tool, but a complex domain of “competing forces and constraints.”1 These forces are comprised of powerful businesses, states, politicians, criminal enterprises, advocacy groups: in short, all of the elements present in any democracy. But in this cyber-democracy, forces compete in part on the shifting ground of the technological and physical infrastructure of the Internet, where some players wield more power than others with an ability to mold the terrain in their favor. Authoritarian states aware of what is at stake in the evolution of the Internet are beginning to engage in long-term and well-resourced efforts to undermine the democratic rights of citizens in this more fundamental way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a reference to the distributed denial-of-service (DDoS) attacks  that take down a specific website, these broader efforts represent what  some have called a &lt;a href="https://www.demworks.org/distributed-denial-democracy"&gt;“distributed denial-of-democracy” (DDoD)&lt;/a&gt; attack aimed at reducing the utility of the Internet for genuine  democratic discourse. These efforts, which are coordinated and well  resourced, are often more insidious, harder to detect, and have the  overall effect of undermining civic engagement and overall trust in the  media ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while the diffuse and fast-changing nature of Internet can at  times make it difficult for authoritarian regimes to exert their  control, the complex interplay between technology, laws, infrastructure,  and socio-political factors shaping the Internet make it equally  difficult for democratic actors to counteract these DDoD strategies. As  an additional obstacle, the values that underpin Internet freedom can be  sidelined in the forums and governing bodies that set Internet  standards by the dominance in those spaces of private tech companies  concerned primarily with generating profits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Formidable though they may be, these challenges are not  insurmountable. Civil society groups from the Global South are leading  the charge to advocate for an Internet that remains open, pluralistic,  and democratic. The nine case studies highlighted in this report  demonstrate various ways groups in different countries have successfully  fought for policies and norms that strengthen Internet freedom and  digital rights. These strategies include awareness-raising, nonviolent  direct action, regional and international coalition-building, and  strategic litigation.&lt;/p&gt;
&lt;p class="BodyA" style="text-align: justify; "&gt;Each of the following case studies corresponds to one of the nine guiding principles of a &lt;a href="https://openinternet.global/comment-draft-principles"&gt;Democratic Framework to Interpret Open Internet Principles&lt;/a&gt;.  This framework was collaboratively developed by a network of civil  society groups worldwide to illuminate the ways that an open Internet is  essential for the functioning of democratic societies. It was inspired  by the norms and standards developed by the &lt;a href="http://internetrightsandprinciples.org/site/"&gt;Internet Rights and Principles Dynamic Coalition (IRPC)&lt;/a&gt; of the United Nations &lt;a href="https://www.intgovforum.org/"&gt;Internet Governance Forum&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework is an important starting point for more effective,  coordinated effort to ensure that the Internet remains a welcoming place  for democratic life. Its aim is to create a consensus around the values  that should shape the future development of the Internet. But moreover,  it also provides an avenue for understanding and sharing knowledge on  the concrete strategies that can be put into practice in different  contexts to make sure that the Internet remains a level playing field.  The following nine examples demonstrate how citizen groups can mobilize  to enshrine such democratic principles in cyberspace.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;“The debate over whether the Internet is a better tool for  democratic empowerment or authoritarian control misconstrues the nature  of the democratic challenges of the digital age.”&lt;/h3&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;1. Freedom of Expression&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In the &lt;i&gt;Philippines&lt;/i&gt;, a cybercrime law introduced in 2012  proposed increasing penalties for libel and giving authorities unchecked  power to track information online. Internet freedom activists worried  several provisions of the law would infringe on freedom of expression by  preventing Filipinos from freely posting content on websites, and  participating in online forums and discussions without fear of being  blocked or facing serious penalties. In response, pro-democracy  organizations from across the political spectrum joined together to  challenge the constitutionality of the law. Through protests,  roundtables, and capacity building activities, they raised awareness and  encouraged advocacy efforts around the dangers the law posted to  freedom of expression and privacy. &lt;a href="http://fma.ph/"&gt;The &lt;/a&gt;&lt;a href="http://fma.ph/"&gt;Foundation for Media Alternatives (FMA&lt;/a&gt;&lt;a href="http://fma.ph/"&gt;)&lt;/a&gt;, a digital rights organization founded after the fall of the Marcos dictatorship and the &lt;a href="https://www.facebook.com/pg/PIFA.ph/about/?ref=page_internal"&gt;Philippine Internet Freedom Alliance (PIFA)&lt;/a&gt;,  a broad nationwide coalition of pro-democracy and Internet freedom  advocates, were among the organizations in the front lines on the  struggle. PIFA was even one of the 20 organizations to file 15 petitions  to the Supreme Court about the constitutionality of the law.&lt;/p&gt;
&lt;p&gt;Public efforts in the courts and actions in the streets contributed  to the takedown of three contested provisions of the law, including  provision that would allow government to block or restrict access to  computer data. The Supreme Court declared these provisions  unconstitutional and delayed implementation of the law. Despite public  concerns about the surviving provisions, the national campaign against  the cybercrime law led to a turning point for Filipino activists; it  showed the power of people coming together and fighting for the  importance of digital rights in the Philippines. Initially fragmented,  the campaign led to a larger movement unified under the goal of  protecting human rights and freedom of expression online. Thus, it took  the introduction of a flawed law and active public campaigns to initiate  a broader dialogue about privacy, surveillance, and digital security.  Digital rights &lt;a href="http://www.rstreet.org/2015/09/10/the-business-case-for-cambodian-Internet-freedom/"&gt;communities across Southeast Asia&lt;/a&gt; have been inspired by Filipino advocacy efforts, which they have  understood to be an example of how to communicate the balance required  between anti-cybercrime measures with fundamental rights to a public  audience.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;2. Freedom of Assembly and Association&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;Social media is an important organizing tool for journalists and advocacy groups in &lt;i&gt;Uganda&lt;/i&gt;. Facebook, WhatsApp, and other messaging applications &lt;a href="https://books.google.com/books?id=2dmeBQAAQBAJ&amp;amp;pg=PA367&amp;amp;lpg=PA367&amp;amp;dq=using+facebook+for+organizing+uganda+-facebook.com&amp;amp;source=bl&amp;amp;ots=Agd54hNXbj&amp;amp;sig=KRs9Ndl7BJfVfBnW9LXHJgpyEv4&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwjjv6fKsdLWAhUK7mMKHVkmB5kQ6AEISzAI#v=onepage&amp;amp;q=using%2520facebook%2520for%2520organizing%2520uganda%2520-facebook.com&amp;amp;f=false"&gt;have been used to share&lt;/a&gt; political knowledge, connect leaders with supporters, and organize  events — even share information about government abuses. During national  ‘&lt;a href="https://en.wikipedia.org/wiki/Walk_to_work_protest"&gt;Walk to Work&lt;/a&gt;’  protests in 2011, organized to protest living costs after presidential  elections, Facebook and Twitter provided a steady stream of updates from  protestors, bystanders, and journalists.&lt;/p&gt;
&lt;p&gt;Using social media, however, can have dangerous consequences for  marginalized groups such as the LGBT community. The government of Uganda  has been known to collect user information and prosecute individuals  based on information shared on social media. Uganda is one of 76  countries where homosexuality is currently criminalized, and LGBT  activists fear that their online conversations will be monitored and  used against them. By posting information taken from photos and content  posted on Facebook, a local tabloid exposed the identity of numerous  members of the LGBT community in 2011 and again in 2014. The tabloid  stories in 2011 are believed to have contributed to the &lt;a href="https://www.theguardian.com/world/2016/jan/26/uganda-lgbt-groups-david-kato-murder-5-years-on"&gt;killing of David Kato&lt;/a&gt;, a prominent gay rights activist.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cima.ned.org/wp-content/uploads/2017/04/Illustration_p11_Network-graphic.jpg"&gt;&lt;img class="alignright wp-image-8162 size-medium" height="300" src="https://www.cima.ned.org/wp-content/uploads/2017/04/Illustration_p11_Network-graphic-300x300.jpg" width="300" /&gt;&lt;/a&gt;Furthermore,  the government has repeatedly restricted access for advocacy groups to  use the Internet to share political information. In 2016, the country’s  media regulator &lt;a href="http://www.bbc.com/news/world-africa-35601220"&gt;restricted the use&lt;/a&gt; of WhatsApp, Facebook, and Twitter to prevent the organizing of  protests before presidential elections in February as the government had  done before in 2011. In both cases, the electoral commission &lt;a href="https://freedomhouse.org/report/freedom-net/2016/uganda"&gt;enforced&lt;/a&gt; the social media shut-down.&lt;/p&gt;
&lt;p&gt;Civil society groups have responded in two ways. First, they have  sought to deepen their digital security capacity. To protect against  threats to journalists, LGBT organizations, and other groups have  learned how to use Facebook and social media applications more securely  and to implement other practices that increase their privacy. In the  lead up to the 2016 election this included the use of &lt;a href="https://en.wikipedia.org/wiki/Virtual_private_network"&gt;virtual private networks&lt;/a&gt; (VPNs) to share information. Civil society groups spread information  about how to use them through radio broadcasts. The fact that the  hashtag #UgandaDecides trended on Twitter shows how they were able to  spread their knowledge through local networks and connect with  international media. Secondly, civil society groups built coalitions  with international organizations to draw attention to abuses taking  place in Uganda. In 2016, &lt;a href="https://www.accessnow.org/"&gt;Access Now&lt;/a&gt; supported a coalition of groups to &lt;a href="https://www.accessnow.org/uganda-blocks-social-media-harms-human-rights/"&gt;demand&lt;/a&gt; that the government stop the Internet shutdown as part of the #KeepitOn campaign.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;3. Accessibility&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;Nigeria&lt;/i&gt;, national broadband plans have overlooked  rural communities, leaving them with low bandwidth and high-cost options  for Internet access. This means that broadband and mobile data fees are  unaffordable to many in Nigeria, especially the poor. Fixed-line  broadband subscriptions cost an average of 39 percent of average income,  and mobile broadband packages cost 13 percent. Given that approximately  80 percent of Nigerians earn below the poverty line ($2 a day or less),  access to the Internet is out of reach and unaffordable for a majority  of citizens in Nigeria.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://a4ai.org/"&gt;The &lt;/a&gt;&lt;a href="http://a4ai.org/"&gt;Alliance for Affordable Internet&lt;/a&gt;,  a global coalition working on Internet affordability, works with  Nigerian civil society leaders to raise awareness around this issue  through thematic working groups. The consumer advocacy and pricing  transparency working group, for instance, works closely with &lt;a href="http://a4ai.org/a4ai-nigeria-multi-stakeholder-coalition/a4ai-nigeria-coalition-members/"&gt;a coalition of Nigerian NGOs&lt;/a&gt; that have been leading campaigns to raise awareness about pricing and  taxation policies that have been proposed in Nigeria. One proposed  policy includes imposing a nine percent tax on voice, data, and SMS  services to consumers. This policy would make the Internet dramatically  more expensive for Nigerian consumers. Groups say they worry about the  consequences of the proposed policy in an environment where farmers are  forced to climb trees just to get a stable Internet connection.&lt;/p&gt;
&lt;p&gt;Civil society leaders who are part of the coalition have worked to  build a healthy dialogue between regulators, civil society, and the  government. A key strategy, according to activists, has been encouraging  groups to find constructive ways to work with government and leveraging  the interests of each of these groups to protect and drive down costs  for Nigerian consumers. They seek to build relationships with the  regulator and to inform them about ways to better communicate with and  engage consumer groups, such as sharing their content through social  media rather than press releases. Another important learning has been  identifying champions within government to work on these issues.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;4. Privacy and Data Protection&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;&lt;a href="https://www.cima.ned.org/wp-content/uploads/2017/11/Cell_phone_android_transparent.jpg"&gt;&lt;img class="alignleft wp-image-8896" height="358" src="https://www.cima.ned.org/wp-content/uploads/2017/11/Cell_phone_android_transparent-212x300.jpg" width="253" /&gt;&lt;/a&gt;In &lt;i&gt;Burma,&lt;/i&gt; gaps in the law have left citizens vulnerable when it comes to privacy  and data protection. Restrictions on privacy have eased since the  country’s transition from military rule, but a lack of data protection  laws and general lack of awareness around privacy and data protection  present significant challenges for protecting an open Internet.&lt;/p&gt;
&lt;p&gt;Messaging applications such as Viber and Facebook Messenger, for  example, are the de-facto tool for communication for activists and are  used to organize political events and activities. Cheaper than voice  calls, far more accessible than landlines, and easier to use than email,  these tools are the primary way people in Burma communicate. &lt;a href="https://www.fastcompany.com/40438242/jailed-for-a-facebook-poem-the-fight-against-myanmars-draconian-defamation-laws"&gt;Activists have received harsh penalties for sharing content that may be viewed as threatening state security&lt;/a&gt;.  These applications are often not secure, making it possible for Burma  state authorities or agents of the state to intercept their  conversations. &lt;a href="https://pen.org/sites/default/files/unfinished_freedom_lowres.pdf"&gt;During a crackdown on student protests in March 2015, mobile phones were taken by police&lt;/a&gt;. Activists worried at the time that information on these phones would eventually be used against them.&lt;/p&gt;
&lt;p&gt;Observing the need to protect activists and educate them about data  protection, activists in 2016 formed a coalition, Digital Rights MM. The  coalition, led by &lt;a href="http://phandeeyar.org/"&gt;Phandeeyar&lt;/a&gt;, &lt;a href="http://www.myanmar-responsiblebusiness.org/index.php"&gt;Myanmar Center for Responsible Business&lt;/a&gt;, &lt;a href="http://www.myanmarido.org/"&gt;Myanmar ICT for Development&lt;/a&gt;, and Free Expression Myanmar, has led a national conversation on the issue. &lt;a href="https://www.forbes.com/sites/chynes/2016/12/21/digital-rights-must-become-a-top-priority-in-myanmars-connectivity-revolution/#4fde153b2267"&gt;Drawing on expertise from the region and international organizations&lt;/a&gt;,  22 local Burma-based organizations have been successful in pointing out  gaps when it comes to privacy and freedom of expression in the &lt;a href="https://www.article19.org/resources.php/resource/38665/en/myanmar:-telecommunications-law"&gt;national telecommunications law&lt;/a&gt;,  a comprehensive law that oversees the development of the  telecommunications sector in Burma. They also participated in meetings  with the government and launched a &lt;a href="https://www.facebook.com/MMTelecomLaw/photos/a.821155664669495.1073741830.821091201342608/1347827635335626/?type=3&amp;amp;theater"&gt;public facing campaign #ourvoiceourhluttaw&lt;/a&gt; pushing to amend 23 articles, including one on lawful interception of data.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="light_blue with-bg dropquote-blue tsd-dropquote tsd-cima-module" style="text-align: justify; "&gt;
&lt;div class="expand-on-mobile quote"&gt;&lt;/div&gt;
&lt;div class="expand-on-mobile content"&gt;
&lt;h3&gt;“Messaging applications such as Viber and Facebook  Messenger, for example, are the de-facto tool for communication for  activists and are used to organize political events and activities.”&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;5. Personal Safety and Security&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;Pakistan&lt;/i&gt;, women face threats of physical, sexual, and  psychological harassment online. Leaking explicit photos and threats of  blackmail are growing increasingly more common. &lt;a href="https://digitalrightsfoundation.pk/drfpcwstraining/"&gt;From  2014 to 2015, more than 3,000 cybercrimes were reported to the Federal  Investigation Agency and of those cases, nearly half were targeted to  women on social media&lt;/a&gt;. Observers estimate far more cases go unreported. In fact, in workshops conducted by the &lt;a href="https://digitalrightsfoundation.pk/"&gt;The Digital Rights Foundation&lt;/a&gt;, many female college students reported that they did not know cyber harassment was a crime.&lt;/p&gt;
&lt;p&gt;Online platforms are an important space for political engagement,  expression, and mobilization in Pakistan. Thus, online harassment  directly impacts the political participation of women, including female  journalists and women politicians. In 2016 the &lt;a href="https://digitalrightsfoundation.pk/"&gt;Digital Rights Foundation&lt;/a&gt; established a &lt;a href="https://digitalrightsfoundation.pk/cyber-harassment-helpline-completes-its-four-months-of-operations/"&gt;Cyber Harassment Helpline&lt;/a&gt; that women can reach out to for help when they are harassed on the  Internet. One of the main objective of the helpline is to help bridge  the trust deficit between survivors and law enforcement agencies. &lt;a href="http://digitalrightsfoundation.pk/wp-content/uploads/2017/04/4-Month-Report.Final_.pdf"&gt;An analysis of more than 400 cases &lt;/a&gt;showed  that the most common barriers to equal participation are non-consensual  use of information, impersonation, account hacking, black mailing, and  receiving unsolicited messages; the most targeted groups include women,  children, human rights defenders, and minority communities. The Digital  Rights Foundation has also been leading efforts to strengthen legal  protections for women and responding to survivors by recommendations to  law enforcement agencies and the government. Pakistan has a National  Response Centre for Cybercrime, but it has faced challenges serving  women outside of major cities.&lt;/p&gt;
&lt;/div&gt;
&lt;div class="tsd-simple_content tsd-cima-module" style="text-align: justify; "&gt;
&lt;h2&gt;6. Inclusion&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;In &lt;i&gt;India&lt;/i&gt;, the population of people with disabilities is  estimated to be as high as 150 million people, and the recorded rates of  those who are vision-impaired are among the highest in the world.  Indian digital rights advocacy groups, like the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society (CIS)&lt;/a&gt; have worked to ensure that these individuals are able to participate  fully online by promoting policies that prioritize accessibility. These  include the National Policy on Universal Electronics Accessibility, the  Rights of Persons with Disabilities Act, and &lt;a href="http://guidelines.gov.in/"&gt;Guidelines for Indian Government Web (GIGW)&lt;/a&gt;,  which all require government information be shared in formats that are  accessible. Advocacy groups, however, have successfully shown that  policies alone are not enough and have taken action to ensure persons  with disabilities have access to critical resources and information  online.&lt;/p&gt;
&lt;p&gt;Mobile phones in particular are a vital portal to access government  services, but mobile applications remain largely inaccessible to many  people with disabilities, especially those with vision disabilities. For  example, CIS observed in 2015 that the &lt;a href="https://www.mygov.in/"&gt;MyGov&lt;/a&gt;,  the Indian Government’s mobile citizen engagement platform and the  Prime Minister’s application was highly inaccessible: screens cannot be  navigated by visually impaired users and can also not be read using a  screen reader. Based on this, CIS with other advocacy organizations  worked on framing accessibility guidelines for mobile applications  recommended to the Government of India as a standard. Advocacy groups,  such as the &lt;a href="http://www.ncpedp.org/"&gt;National Centre for Promotion of Employment for Disabled People (NCPEDP)&lt;/a&gt;,  have also been appealing to the private sector to ensure products  designed to serve these needs are affordable and readily available to  people with disabilities. They appeal to Indian companies and  policymakers by advocating for the universal appeal of assistive  technology to ensure disabled communities are not left behind.&lt;/p&gt;
&lt;p&gt;Sustained advocacy, new legal mandates applied to public and private  sectors, and increased research in this domain have helped advance the  issue of accessibility of mobile applications. The country’s National  Informatics Centre has set up a committee to revise the GIGW to bring  them up to speed with international standards.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom'&gt;https://cis-india.org/accessibility/news/cima-sarah-oh-november-15-2017-openness-nine-ways-civil-society-groups-have-mobilized-to-defend-internet-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2017-11-26T03:58:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/eprints-iisc-ernet-october-28-2016-subbiah-arunachalam-madan-muthu-adopting-orcid-as-unique-identifier-will-benefit-all-involved-in-scholarly-communication">
    <title>Adopting ORCID as a Unique Identifier will Benefit all Involved in Scholarly Communication </title>
    <link>https://cis-india.org/openness/eprints-iisc-ernet-october-28-2016-subbiah-arunachalam-madan-muthu-adopting-orcid-as-unique-identifier-will-benefit-all-involved-in-scholarly-communication</link>
    <description>
        &lt;b&gt;ORCID, the Open Researcher and Contributor ID, is a nonprofit, community-driven effort to create and maintain a registry of unique researcher identifiers and a transparent method of linking research activities and outputs to these identifiers. Together with other persistent identifiers for scholarly works such as digital object identifiers (DOIs) and identifiers for organizations, ORCID makes research more discoverable.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The research paper jointly authored by Prof. Subbiah Arunachalam and Muthu Madhan was published on the &lt;a class="external-link" href="http://eprints.iisc.ernet.in/54925/"&gt;eprints@IISc repository&lt;/a&gt; on October 28, 2016. The article was originally published in the &lt;a class="external-link" href="http://eprints.iisc.ernet.in/54925/1/NatlMedJIndia000-103373_025217.pdf"&gt;National Medical Journal of India, Vol. 29, No.4, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;It helps ensure that one’s grants, publications and outputs are correctly attributed. It helps the research community not just in aggregating publications, but in every stage of research, viz. publishing, reviewing, profiling, metrics, accessing and archiving. Funding agencies in Austria, Australia, Denmark, Portugal, Sweden and the UK, and the world’s leading scholarly publishers and associations have integrated their systems with ORCID registry. Among the BRICS countries, China and South Africa are adopting ORCID avidly. India is yet to make a beginning. If research councils and funding agencies in India require researchers to adopt ORCID and link ORCID iDs to funding as well as tracking performance, it will help them keep track of the workflow. Journal editors can also keep track of contributions made by different authors and work assigned to different reviewers through their ORCID iDs.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;INTRODUCTION&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Names in scholarly publishing are not all that simple. Names here mean both names of authors of papers and names of researchers referred to in those papers. They can cause much confusion to researchers, editors of journals, database producers, librarians and bibliometricists, but if we handle them correctly we can overcome most of the problems.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;SCHOLARLY LITERATURE: DISAMBIGUATION OF NAMES AND AGGREGATING ONE’S WORKS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As early as 1969, Eugene Garfield had expressed his dismay at the ‘needless ambiguity and confusion’ caused by authors who omit parts of their names and initials in their published works, and recommended that ‘scientists who are just now embarking on their careers would be well advised to measure the information content on their names as they appear in indexes such as Index Medicus, Physics Abstracts, Biological Abstracts and Science Citation Index.&lt;a href="#ftn1"&gt;[1]&lt;/a&gt; Some 12 years later, he wrote a detailed paper on the problems the scholarly world faces on account of mere names of people.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt; He had reasons to worry more than anyone else; as the publisher of Science Citation Index, Current Contents and several other search and indexing tools for the world’s scientists and scholars, he had the unenviable task of processing millions of papers and author names not only in the byline of these papers but also in the references cited in them and rendering these author names accurately and attributing research papers to the right authors and institutions within a few weeks of publication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People hail from all parts of the world and from different cultures, each having its own peculiarities in naming their people so much so people from one culture may find names of another strange. Added to that are the ways names from different cultures and languages are transliterated into the Roman script. The names in most parts of the western world have three parts, viz. the first name (or given name), middle name and last name (also called the family name or surname). Often the last name may have more than one word, e.g. Duncan Smith, von Braun, van der Waals, de Solla Price. The prefix ‘van’ in some names may be spelt with a capital V, albeit rarely, e.g. Van de Graaff (of generator fame). In some cultures there are a very large number of people having the same surname. For example, close to 85% of China’s population have one of only 129 surnames, and three names in particular, viz. Wang, Li and Chen, are predominant among authors publishing currently. Also there are two Chinese surnames that can be spelt as Wang when publishing in English language, says Jane Qiu.&lt;a href="#ftn3"&gt;[3]&lt;/a&gt; Eight Chinese names transliterate in Roman script into Wei Wang and to avoid ambiguity in such cases journals may allow authors the option to include their names in their own language in parentheses after the transliterated name.&lt;a href="#ftn4"&gt;[4]&lt;/a&gt; Among Korean authors, Kim and Park account for a large percentage. In India there are many Agarwals, Guptas, Mukherjees, Raos, Sharmas and Singhs among publishing authors. While some Indians have two-part surnames, e.g. Ghosh Dastidar, Guha Thakurta and Sen Sharma, a few drop their initials altogether, e.g. Karmeshu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some have hyphenated names, e.g. Noel-Baker, Szent-Györgyi, Julius Wagner-Jauregg, all three Nobel laureates. Curiously, Noel-Baker was born Philip Baker, but took Noel as his second surname on marriage to Irene Noel and subsequently started hyphenating his surname. But in the majority of cases hyphenated names are those of women who add their husband’s family name to their own, e.g. Françoise Barré-Sinoussi, Rita Levi-Montalcini, both of whom won Nobel Prizes for medicine, and Irene JoliotCurie, who won a Nobel Prize for chemistry. In a variation, Marie Curie, née Sklodowska, who won Nobel Prizes in both physics and chemistry, used her husband’s name ahead of her maiden name: Marie Curie, née Sklodowska. Some examples from among Fellows of the Indian Academy of Sciences and the Indian National Science Academy: mathematician Rajinder Jeet HansGill, photochemist Krishna Kamini Rohatgi-Mukherjee, plant physiologist Renu Khanna-Chopra, condensed matter physicist Tanusri Saha-Dasgupta, development biologist Professor Priyambada Mohanty-Hejmadi, conservation biologist Professor Asha Chandola-Saklani, and neurophysiologist Professor Sushil Dua-Sharma. Many of these women scientists have published papers both under their maiden names and under their hyphenated family names.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Japan, married couples are required by a 1898 law, which is valid till date, to have the same surname, even though giving up one’s maiden name does disadvantage women in certain ways, including professionally.&lt;a href="#ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both retaining one’s maiden name and adopting the husband’s surname have their advantages. If one achieves a lot as a young person, one would be better off retaining the name that brought her the reputation in the first place. If one achieves much after taking her husband’s name, she will have much to lose if she ever gets a divorce. Better to hold on to one’s maiden name, says Kalpana Sharma.&lt;a href="#ftn6"&gt;[6]&lt;/a&gt; Some professionals, e.g. Bhatnagar award winner and fluid flows expert Professor Rama Govindarajan, has chosen this option. The situation is changing in India albeit slowly. A woman in Maharashtra can now use either her father’s or husband’s names in all official documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also rare instances of people changing their names midway in their career, e.g. a woman electrical engineer of Indian origin working in the University of Waterloo has over the years published under three different names, viz. K.H. Sheshakamal, Shesha Jayaram, Shesha H. Jayaram (personal communication, Muthanna J, 23 Dec 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Missing middle name in the byline, spelling mistakes and problems faced in printing (or processing by computers) texts with diacritical marks can all lead to ambiguity. But with all these vagaries, it is important that contributions such as papers, patents, datasets and software are attributed to the right contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many researchers have recognized the problem of author name disambiguation. A Scopus search (on 28 June 2015) using the key words ‘author name’ and ‘disambiguation’ led to 86 papers in the 13-year period 2003–2015. Of these, 46 had the keywords in the title. Some of these papers were related to the problems faced by biomedical databases, e.g.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Author Name Disambiguation for PubMed, http://online library.wiley.com/doi/10.1002/asi.23063/pdf&lt;/li&gt;
&lt;li&gt;Author Name Disambiguation in MEDLINE, http://www. ncbi.nlm.nih.gov/pmc/articles/PMC2805000&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;From 2012 onwards PubMed uses a ranking algorithm for author searches to show more relevant results by disambiguating common author names.&lt;a href="#ftn7"&gt;[7]&lt;/a&gt; This helps pooling papers by the real A.K. Sen when there are papers by others with the same name and initials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The name ambiguity problem can only be solved collaboratively, when all stakeholders agree on a standard identification scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rachel Bruce, deputy chief innovation officer, Joint Information Systems Committee (Jisc), UK, says that our inability to associate valuable research outputs with their right authors ‘has led to extremely inefficient research management and difficulty in identifying what has been produced. Ineffective reporting and sharing of research impact on both individual researcher’s and universities’ profiles.’ According to her, ‘wider adoption and use of Open Researcher and Contributor ID (ORCID)’ is the solution to this problem.&lt;a href="#ftn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;WHAT IS ORCID?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A person’s ORCID iD takes the form of a unique 16-digit number, e.g. 0000-0000-0000-0000. ORCID also gives each person a web page profile based on the iD, e.g. http://orcid.org/0000-00024398-4658, listing their iD number, name(s), institution(s) and publications. (Generally ORCID is used for the organization and the registry, and ORCID iD to denote the identifier itself.) Publications here go beyond research publications such as journal articles, conference papers, dissertations, reports, research techniques, software and inventions to include books, lectures/ speeches, websites, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These profiles or records together comprise the ORCID registry. This registry of unique researcher identifiers and a transparent method of linking research activities and outputs to these identifiers (http://orcid.org/node/47) is created and maintained by an open, non-profit, community-driven effort. ORCID iDs help distinguish individuals with common names, and they are not affected by changes in name or name order or alphabet in which the name is rendered. ORCID is researcher-controlled; the researcher decides what information is included in her ORCID record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID iDs can be embedded in research workflows. If included by the publisher or funding agency, they are part of the metadata associated with scholarly works and grants. Together with other persistent identifiers for scholarly works such as DOIs and identifiers for organizations, ORCID makes research more discoverable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ORCID is not the first such attempt to associate unambiguously research papers (and other output such as datasets and software) with the right authors. Fenner has listed a number of them.&lt;a href="#ftn9"&gt;[9]&lt;/a&gt; Some of these cover only specific fields. Some are country specific. Some are proprietary. Some are linked to specific databases while others want to cover a wide area of science and scholarship. Fenner’s list includes RePEc Author (set up by Thomas Krichel in 1999), LATTES (an information platform mandatory for researchers in Brazil, set up by the National Council of Scientific and Technological Development or CNPq, in 1999), VIAF (set up by OCLC in 2003), NARCIS (set up in 2004 by the Royal Academy of Sciences of the Netherlands and mandatory for all researchers in the Netherlands), arXiv Author ID (set up in 2005 by Cornell University for researchers in physics and related disciplines), Scopus Author ID (set up in 2006 by Elsevier), Names Project Mimas (set up in 2007 by the British Library for authors and institutions in all academic disciplines), Researcher ID (set up in 2008 by Thomson Reuters) and Author Claim (set up by Thomas Krichel in 2008).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there are many author identity services already available, why add ORCID, one may ask. The other services are not truly interoperable, whereas ORCID allows linkage to other identifiers such as Scopus ID and Researcher ID. ORCID is the only service trying to associate its identifier with other existing author identifiers, with more than publications, and to collaborate across the community to embed it at the time that a work is ‘released’ by a researcher. Also, most other services are linked to a single bibliographic database (e.g. Researcher ID is linked to Web of Science).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Thus, since none of the available author identifier services looked like the solution to the name ambiguity problem, the ORCID initiative was started in late 2009 and formed as a nonprofit organization in August 2010.’&lt;a href="#ftn10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Why should a researcher have an ORCID iD?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section draws on information mainly from private communication with the Executive Director and other staff of&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID and the Library Guide of the University of Southampton.&lt;a href="#ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID helps ensure that one’s grants, publications and outputs are correctly attributed. It is for life, irrespective of where one chooses to live and work. Connections between the ORCID registry and other databases help one to keep one’s research profile updated and to make it visible worldwide. Authors with an ORCID iD can have Crossref automatically push information about their published work to their ORCID record.&lt;a href="#ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Often researchers waste much time in filling forms that require address, employment history, collaborator names, affiliation, etc. when applying for jobs, awards, academy fellowships or grants or submitting manuscripts to journals. One can have all such information in one’s ORCID profile and draw upon it at short notice. Researchers can save much of their productive time by linking their ORCID iDs to the grants or manuscript processing systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the Caltech Library Guide points out, as one collaborates across disciplines, institutions and borders, one ‘must interact with an increasing number and diversity of research information systems. Entering data over and over again can be time-consuming, and often frustrating’ (http://libguides.caltech.edu/orcid).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To obtain the list of publications of a researcher from a database such as Web of Science, one would need to give the name (with all variants), research domains and names of organizations (with all their variants) associated with the author. With all that, one may not get the full list. But if one uses the researcher’s ORCID iD in the identifier field, the search will give the correct list instantaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anstey, editor of the 125-year-old British Journal of Dermatology, has explained lucidly why researchers, editors and funders should embrace ORCID and how through ORCID iDs one could connect to websites such as Web of Science, figshare, Impact story and others.&lt;a href="#ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How do researchers get an ORCID iD?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Scientists, researchers, teachers, students, clinicians, scholars, authors and anyone at all, contributing to scholarly outputs from anywhere in the world can sign up for a free ORCID iD through the ORCID website (https://orcid.org/register). It is also possible to create an ID at other websites that are integrated with ORCID, for example manuscript submission websites of journals. About 5000 journals, including those published by the Institute of Electrical and Electronic Engineers (IEEE), Taylor &amp;amp; Francis, and Cambridge University Press, use ScholarOne developed by Thomson Reuters and whenever one submits a paper to these journals one is asked to provide an ORCID iD. And if you do not have one you can create it through the publisher’s Application Program Interface (API). Claiming an ORCID iD is not at all difficult. After claiming, researchers can associate the ORCID iDs with their education and employment details and details related to collaborators, publications and outputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Including one’s publications is simple. One can import bibliographic details of one’s publications having unique identifiers (e.g. DOI, ISBN) from the list of databases integrated with ORCID registry. The list includes Scopus, Web of Science, Europe PubMed Central, Crossref Metadata Search, Redalyc, etc.&lt;a href="#ftn14"&gt;[14]&lt;/a&gt;One can just log in to ORCID and choose the database from which one wants to import bibliographic data. For publications that are not indexed by the databases integrated with ORCID, one can use the template provided by ORCID to manually add details. Also ORCID has created a tool by which one can import bibliographic data from BibTeX (.bib) files into one’s ORCID record, including files exported from Google Scholar and other popular reference management tools.&lt;a href="#ftn15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is one’s ORCID private information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, one can choose which information to be assigned as public or private in one’s record except the actual iDs assigned by ORCID that are designed to be publicly available. Once researchers have claimed their ORCID iD, the settings are in their sole control. ORCID has a privacy selector option that lets one set the privacy level of all new works, education, employment and funding items. Usually, everyone makes the list of publications public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID features&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID offers its essential features for free to individual researchers and organizations across the world. Researchers would be able to automatically update their ORCID record with links to published manuscripts in which they have included their ORCID iD. However, ORCID charges membership fees from organizations such as publishers, funders, and academic and research institutions, in order to sustain the registry and the mission to achieve name disambiguation, and in return offers them premium API services and personalized technical support. Also, when many organizations join as a consortium, they benefit from reduced ORCID membership costs and enhanced technical support.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID conforms to the values of an open scholarly infrastructure organization.&lt;a href="#ftn16"&gt;[16]&lt;/a&gt; Indeed, Public Knowledge Project (PKP) Director John Willinsky considers ORCID ‘an important emerging technology with opportunities to help shape and improve the open access publishing landscape worldwide’.&lt;a href="#ftn17"&gt;[17]&lt;/a&gt;Organizations can integrate ORCID iDs into research management systems and workflows using the free public API. ORCID releases a public data file annually under Creative Commons License (CC0 1.0 Public Domain Dedication) to support broad access to data that are made public by individual researchers through their ORCID records. The file contains the public information associated with each user’s ORCID record. Each record is included as a separate file in both JSON and XML formats (http://orcid.org/content/ orcid-public-data-file-2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID helps institutions track one’s work, compile information for university-level reporting (including total funding received by its scholars), and more efficiently manage information on faculty profiles. By eliminating redundancies and automating some reporting functions, ORCID will be especially helpful in reducing time and monies spent on other assessment activities such as the Research Excellence Framework (REF) in the UK.&lt;a href="#ftn18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Feedback from a pilot study with eight UK universities showed that organizations that have adopted ORCID were likely to see ‘measurable efficiency improvements within two years of implementation—especially in internal data quality, streamlining of publications management, and enhanced reporting to funders— with accrued benefits increasing steadily over the following three to four years.’&lt;a href="#ftn19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jan                 Jan                 Jan                 Jan&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2013                2014               2015                2016&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Year&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FIG 1. Growth of ORCID iDs (http://support.orcid.org/ knowledgebase/articles/150557-number-of-orcid-ids)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Funders, 5%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Associations, 7%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Repositories,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Publishers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research institutes,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;65%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FIG 2. Sectoral distribution of ORCID members (Haak LL, personal communication, 30 Sep 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Middle East and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Africa, 2%              South America, 1%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Australasia, 6%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asia, 8%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;North                                                                        Europe, 53%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;America,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30%&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FIG 3. Geographical distribution of ORCID members (Haak LL, personal communication, 30 Sep 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Uptake of ORCID&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The number of live ORCID iDs grew rapidly from late 2012 (Fig. 1) and as of 29 July 2016, it exceeded 2.43 million. These are currently used by more than 200 research and workflow platforms at academic and other research institutions, at funding agencies and at publishers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of mid-December 2015, more than 350 organizations have opted for ORCID’s member services and are at different stages of integrating ORCID iDs into their systems and workflows (Miyairi N, personal communication, 18 Dec 2015). As of 30 September 2015, 65% of ORCID members were universities (Fig. 2) spread all over the globe (Fig. 3). A representative list of different categories of members is provided in Box 1. The large European contingent is a result of three national consortia. These proportions are expected to be fluid over the next couple of years as more consortia are formed and join ORCID (Haak LL, personal communication, 30 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognizing that publishers can promote systems that would provide support to researchers and to science, commencing January 2016, eight publishers will be requiring the use of ORCID iDs by corresponding authors during the publication process. These include the American Association for Advancement of Science (AAAS; publishers of Science), American Geophysical Union&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(AGU), eLife, EMBO, Hindawi, IEEE, the Public Library of&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Box 1. Uptake of ORCID &lt;/b&gt;Among the long list of members of ORCID are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Publishers: &lt;/b&gt;AIP Publishing, Elsevier, National Academy of Sciences (USA), Oxford University Press, Public Library of Science (PLoS), Science Open, Springer, Taylor &amp;amp; Francis, Wiley, Wolters Kluwer&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Associations: &lt;/b&gt;American Association for Advancement of Science (AAAS), American Astronomical Society, American Chemical Society, American Psychological Association, American Physical Society, American Society of Microbiology, American Society of Civil Engineers, Association of Computing Machinery, Electrochemical Society, Institute of Electrical and Electronic Engineers (IEEE), IOP, Modern Language Association, Royal Society of Chemistry&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Universities: &lt;/b&gt;Harvard University, Massachusetts Institute of Technology, Caltech, Cornell University, Lund University, Stockholm University, City University of Hong Kong, National Taiwan University, CINECA, Italy’s consortium of 70 universities and four research institutes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Academies: &lt;/b&gt;African Academy of Science, Chinese Academy of Science, Royal Society&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Funding agencies: &lt;/b&gt;National Institutes of Health (USA), Department of Energy (USA), Wellcome Trust (UK), National Institute for Health Research (UK), Fundação para a Ciência e a Tecnologia (Portugal)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intergovernmental bodies: &lt;/b&gt;CABI, CERN, International Food Policy Research Institute, International Water Management Institute&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Libraries: &lt;/b&gt;British Library, Royal Library – Denmark&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Repositories: &lt;/b&gt;Social Science Research Network (SSRN) For the full list of members, see http://orcid.org/about/ community/members&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Science (PLoS), and the Royal Society. More than 3000 journals are already collecting ORCID iDs from corresponding authors. Currently about 75% of all registrations are through journal accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, six consortia too will require the use of ORCID iDs. These are: Jisc (50 universities and research councils, UK), Italy/ ANVUR (70+ universities and research institutes), Australia, via the Australian Access Federation (40 universities, research institutes, and Australian Research Council and National Health and Medical Research Council funders), and three library consortia in the US: Committee on Institutional Cooperation (CIC) consisting of 15 universities in the US midwest, the Greater Western Library Alliance (GWLA), a consortium of 35 research libraries located in the central and western US, and the North East Research Libraries Consortium (NERL) comprising 29 core member academic research libraries and approximately 90 affiliate member academic and/or research libraries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jisc negotiated an ORCID consortium through which universities would benefit from premium ORCID membership at significantly reduced costs. The official launch event for the consortium took place at Imperial College in late September 2015 with the participation of more than 50 UK universities, ORCID, Jisc, GuildHE, RCUK and Current Research Information System (CRIS) vendors.&lt;a href="#ftn20"&gt;[20]&lt;/a&gt;Since August 2015, the Wellcome Trust has required all lead applicants for grants to provide an ORCID iD.&lt;a href="#ftn21"&gt;[21]&lt;/a&gt;From 23 September 2015, an ORCID iD has become mandatory for all new National Institute of Health Research (NIHR, UK) personal award applications.&lt;a href="#ftn22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Italy has implemented ORCID on a national scale, and has signed a three-year consortium membership agreement with ORCID. Under the auspices of ANVUR (National Agency for the Evaluation of the University and Research Systems) and CRUI (the Conference of Italian University Rectors), 70 universities and four research centres initially participate in the consortium (Cineca). ANVUR made ORCID mandatory in order to participate in the National Assessment from November 2015.&lt;a href="#ftn23"&gt;[23]&lt;/a&gt;The Italians expect that at least 80% of Italian researchers will have an ORCID iD, with links to their research output by the end of 2016.&lt;a href="#ftn23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID is now included in the Danish National Open Access Strategy and the National Research Data Strategy. The Danish Council for Independent Research recommends, and the Novo Nordisk foundation requires an ORCID iD in funding applications. Currently DEFF, a library collaboration funded by several ministries, is sponsoring a national ORCID implementation project with project partners including seven of the eight Danish universities, a consortium of all Danish university colleges and a consortium of research institutions under the Ministry of Culture.&lt;a href="#ftn24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Australia, according to Arthur Sale of the University of Tasmania, ‘there is an active ORCID activity, and it has been adopted (or recommended) for universal application, but this has not yet reached the status of a mandate by government’ (personal communication, 2 Jan 2016). The Australian ORCID Consortium was launched on 1 January 2016 with 38 organizations (http:// aaf.edu.au/orcid/). The Universities of Sydney, Melbourne, New South Wales, and Queensland, Macquarie University, Griffith University, Queensland University of Technology, La Trobe University and Charles Darwin University and the Australian National Data Service (ANDS) are all members of ORCID. ORCID Working Group of Australia comprising research councils and associations has developed a consortium model for implementing ORCID iDs across the Australian research sector.&lt;a href="#ftn25"&gt;[25]&lt;/a&gt;Funding agencies are also keen to partner with ORCID. Portugal’s Foundation for Science and Technology (FCT) mandated the use of ORCID in 2013. The National Institutes of Health (NIH) asks that grantees use ORCID iDs to manage information in their ScienCV system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many other funding agencies across the world have also adopted ORCID:&lt;a href="#ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Swedish Research Council (SRC) mandated the use of ORCID in Spring 2015.&lt;/li&gt;
&lt;li&gt;Austrian Science Fund (FWF) has mandated the use of ORCID starting in 2016.&lt;/li&gt;
&lt;li&gt;European Commission H2020 Grantee Guidelines recommend that contributors be uniquely identifiable through identifiers which are persistent, non-proprietary, open and interoperable (e.g. through leveraging existing sustainable initiatives such as ORCID).&lt;a href="#ftn27"&gt;[27]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Science Foundation Ireland (SFI) will mandate the use of ORCID in the next funding cycle.&lt;/li&gt;
&lt;li&gt;Autism Speaks, a US-based awareness, advocacy and funding body, requires all investigators and mentors to register with ORCID to obtain a unique iD. This enables Autism Speaks to update one’s funding record and to monitor one’s research progress. Autism Speaks will not consider applications without ORCID accounts for the key personnel.&lt;a href="#ftn28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Publishing platforms such as Aries Editorial Manager, eJournal Press, and ScholarOne have already built-in ORCID support so authors publishing in those journals can create their ORCID iDs through them. PKP is working on developing modules for the Open Journal Systems used by more than 8600 journals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research information systems such as Elements, Plum Analytics, PURE, SmartSimple, InfoEd, University Office and Research Master, and the open access repository platforms DSpace, Dryad, EPrints, and VIVO have also built-in ORCID support.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards the end of 2015, Altmetrics integrated ORCID with its Explorer apps, and now one can search for Altmetric attention data for all the research outputs associated with one’s ORCID profile and thus scholars can get credit for all their research contributions, including journal articles and participation in social media.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;SUPPORT TO ORCID&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Right from the beginning, ORCID’s aim was to become completely self-sustaining based on member fees. However, they did have some sponsors and they did take some loans from their own members/stakeholders (http://orcid.org/about/community/ sponsors).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September 2011, ORCID received an NSF Eager grant of US$ 200 000 via the University of Chicago.&lt;a href="#ftn29"&gt;[29]&lt;/a&gt; The APIs developed with this funding and released in November 2011 could be used by third parties to integrate grant, manuscript or personnel tracking systems with ORCID. This project led to the formal launch of ORCID and its website (http://orcid.org). The philosophy and evolution of ORCID were disseminated through journals such as Nature and EduCAUSE, outreach meetings and social media channels such as twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seeing its value, a few philanthropic foundations came forward to support ORCID. An award by Alfred P. Sloan Foundation to ORCID funded the pilot integration of ORCID identifiers by a group of universities and science and social science professional associations, such as Purdue University and the Society of Neurosciences. This programme supported the collaborative elicitation and documentation of ‘use cases’ and open source code, and established a collaborative venue for disseminating best practices. All projects were completed in December 2014. Partnering institutions have shared integration source code and lessons learnt with the ORCID community through ORCID’s GitHub open source repository and online ‘use cases’, and now serve as reference sites for organizations planning similar integrations.&lt;a href="#ftn30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April 2015, the Leona M. and Harry B. Helmsley Charitable Trust awarded US$ 3 million to ORCID to develop the infrastructure and capacity to support international adoption and technical integration.&lt;a href="#ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;ORCID IN EMERGING AND DEVELOPING COUNTRIES&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The National Science Library (NSL) of the Chinese Academy of Sciences (CAS) has taken the lead in China and is taking steps to adopt ORCID nationwide.&lt;a href="#ftn32"&gt;[32]&lt;/a&gt; China fully recognizes the importance of the unique author identifiers, especially so for Chinese authors and the NSL sees the value in an international, open, and researcherdriven person identifier. Scientists in China are willing to work with ORCID to promote it in CAS and in the country. To this purpose, the NSL is enlisting cooperation from Web of Science, the Chinese Science Citation Database (CSCD), Chinese Social Science Citation Index (CSSCI), CAS Science, Technology and Medicine (STM) Journal Association, University STM Journal Association, and a number of major research and academic libraries. NSL has developed the iAuthor platform, as an easy Chinese front gate to register for an ORCID identifier and to interoperate with Chinese journals, CSCD and others. The NSL iAuthor service was launched in October 2014.&lt;a href="#ftn32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID is yet to pick up in India. As of 15 September 2015, more than 1.5 million ORCID iDs have been assigned. Of these, 14 439 have been registered with an email address that ends in ‘.in’ and 17 048 records where the country is set to India (email communication from ORCID, 29 Jun 2015). That comes to &amp;lt;1.14%. Many authors may be using web mail addresses and we will not be able to identify them as Indian researchers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID is just starting in Latin America, according to Dominique Babini, Open Access Program Coordinator at the Latin American Council of Social Sciences (CLACSO) (personal communication, 1 Jan 2016). According to Abel Packer, Director of SciELO, ‘ORCID is not yet widely adopted in LA. There is an increasing awareness of it and its role and importance. But, only a few institutions adopted it as an obligatory policy to their affiliates’ (personal communication, 2 Jan 2016). Less than 10% of the authors fill the ORCID field in the submission form in the online manuscript submission/processing services used by SciELO Brazil. But, it will be adopted if funding agencies and journals make it mandatory on their submission systems. A barrier to its wide adoption is that researchers have many options to manage their profiles (personal communication, 2 Jan 2016). The first to join ORCID were:&lt;a href="#ftn33"&gt;[33]&lt;/a&gt; Redalyc, the University of the State of Mexico’s open access platform; CONCYTEC – National Council of Science and Technology in Peru; and UNESP (Sao Paulo State University) in Brazil.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interest in ORCID has been growing in Africa for some time. In South Africa alone over 3500 researchers have registered and three universities, viz. University of Cape Town, Stellenbosch University, and the Gordon Institute of Business Science are ORCID members, as is the National Research Foundation. In all of Africa, there are &amp;gt;7000 registered researchers mostly from South Africa, Egypt, Nigeria, Tunis, Ghana, Kenya and Botswana. The cities in Africa that lead in ORCID use are Cairo, Tunis, Lagos, Algiers, Giza, Cape Town, Pretoria and Alexandria.&lt;a href="#ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Asia–Pacific region there were 37 members of ORCID&lt;a href="#ftn35"&gt;[35]&lt;/a&gt;as of August 2015, including 13 in Australia, 3 in New Zealand, 6 in Hong Kong, 5 in Taiwan and 4 in Japan. There is one in India—a multinational company providing editing and publishing services—with offices in many countries and does not really qualify to be known exclusively as an Indian entity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;SOME CONCERNS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some are critical of ORCID. One criticism is that ORCID is not open access and it appears to be a complicated, expensive, proprietary and monopolistic system, and the participation of several commercial publishers makes it a Trojan horse which could eventually lead to strengthening the stranglehold of the publishing industry over scholarly communication. We were alerted to this concern by Thomas Krichel (personal communication, 6 Jul 2015). Krichel ignores the fact that without the participation of large bibliographic databases, ORCID cannot provide the service effectively. Bringing on board Scopus (Elsevier), Web of Science (Thomson Reuters), etc. is not only a clever move but is an absolute necessity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many others do not agree with this view. Bilder et al.&lt;a href="#ftn16"&gt;[16]&lt;/a&gt; believe that ORCID conforms to the values of an open scholarly infrastructure organization. Also, as Paglione&lt;a href="#ftn36"&gt;[36]&lt;/a&gt; has put it: ‘One of the core principles of ORCID is that all software we develop will be publicly released under an open source software license approved by the Open Source Initiative. In addition to transparency, releasing our code will improve interoperability and integration with external services, lead to more robust code because more individuals are auditing and testing it, and, with an extended developer community, enable faster code iteration and evolution.’ Haak has also listed the open features of ORCID, viz. it provides free, barrier-free access, it is democratic and transparent, and it is open access.&lt;a href="#ftn37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another concern is: what if unscrupulous individuals claim authorship on papers that are not theirs, if the ORCID authorship has not been previously claimed by the true author? Is there any safeguard to prevent such a possibility? Can ORCID help prevent fraudulent reviewing?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the early days, it is possible for someone to claim authorship of papers written by others. But, according to Laure Haak (personal communication, 10 Dec 2015), ‘ORCID is a public resource, and if someone claims erroneously this can be monitored by the community and reported and addressed using ORCID’s dispute procedures (see http://orcid.org/orcid-dispute-procedures). As universities and other employers of researchers are using ORCID to assert affiliation (and funders are asserting awardees also using ORCID), there becomes built a web of trusted data about an individual’s research activities, all with researcher consent.’ Also, as more and more publishers receive ORCID iDs of authors as part of the metadata when authors submit papers, and as Crossref updates the ORCID records, it will reduce unethical claims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as peer-review fraud is concerned, there are attempts to counter it using ORCID.&lt;a href="#ftn38"&gt;[38]&lt;/a&gt; But, these are social problems and technical solutions are not the answer. The fight between good and evil is often a see-saw. However, as the uptake of ORCID gains momentum it will become difficult for such fraudsters to lay claim on others’ works.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some reservations though about the costs involved in becoming a member of ORCID. Here is what J.K. Vijayakumar of King Abdullah University, Saudi Arabia, told us: ‘if an institution wants to use ORCID to integrate with their repository, research management systems, etc., the institution needs to become a member (the fees are high and one has to pay even more if ORCID integration is required for more than one system). This needs to be debated and ORCID should bring down the membership fee according to income of the country, so that developing nations can also take part’ (personal communication, 11 Jul 2015). This seems to be a good suggestion. In fact, a member can use one member API credential in many systems. ORCID also provides a substantial discount for small organizations (&amp;lt;US$ 200 000). In addition, affordability is partly why the consortium member model was launched. Haak says: ‘We continue to evaluate membership fees and are starting an initiative for adoption in developing countries in 2016’ (personal communication, 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we are concerned more is the fact that although the number of live ORCID iDs exceed 2.43 million (as of 29 July 2016), only about 337 000 of them have at least one work (https://orcid.org/statistics). Only about one in five iDs is actually being used.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DISCUSSION&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The value of ORCID is evident even in its first 5 years. As Jonathon Kram of the Strategic Planning and Policy Unit at Wellcome Trust says, ‘the ability to uniquely identify contributors is a deceptively simple concept which, if realized, could enable forms of real-time understanding of scientific research that up to now have been extremely costly (if not impossible).’&lt;a href="#ftn39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the Modern Language Association (MLA) enabled in June 2015 retroactive assigning of ORCID iDs to the nearly two million records in its International Bibliography, which holds the key to language and literary scholarship for more than 90 years, it met an especially critical need in the humanities and arts, where publication types and venues are so diverse, needing more work to be done to create clarity and connect the parts than in the sciences. It would also bring increased recognition and validation of humanities scholarship.&lt;a href="#ftn40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As early as 2012, concerned by the lack of quality, comprehensive data about biomedical researchers, the US NIH recommended the development of a simple, comprehensive tracking system for trainees, and implemented a researcher profile system called the Science Experts Network Curriculum Vitae (SciENcv), and encouraged the adoption of unique, persistent ORCID identifiers for researchers.&lt;a href="#ftn41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ORCID, along with open access and open educational resources, is integral to the open knowledge movement. It supports ‘the transition from science to e-Science, wherein scholarly publications can be mined to spot links and ideas hidden in the ever-growing volume of scholarly literature’.&lt;a href="#ftn42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such benefits of ORCID adoption will be fully realized only if ORCID iDs are adopted widely across the research community, and if ORCID iDs are integrated within systems of higher educational institutions, funders and publishers.&lt;a href="#ftn43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If research councils such as the Council of Scientific and Industrial Research (CSIR), Indian Council of Agricultural Research (ICAR), and Indian Council of Medical Research (ICMR) and funding agencies such as the Department of Science and Technology (DST), Department of Biotechnology (DBT) and the University Grants Commission (UGC) mandate ORCID iDs for all researchers in all their laboratories and for all applicants for grants, India can make quick progress. Vice chancellors of universities, directors of research institutions, and the governing boards of academies and professional associations and societies could insist on all researchers in their respective institutions registering for an ORCID iD. Scholarly journals published by the science academies, CSIR-NISCAIR, ICAR, ICMR, professional associations, etc. could mandate inclusion of ORCID iDs by all authors at the time of submitting manuscripts. It would help immensely if India were to adopt a manpower tracking system based on ORCID in all areas of science, technology and innovation, similar to that used by NIH.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has done reasonably well in the area of open educational resources (OER). In particular, the National Programme of Technology Enabled Learning (NPTEL) executed by a consortium of IITs and Indian Institute of Science is highly regarded and is used well. But it took several years of voluntary effort before green open access became acceptable to a small percent of Indian researchers and research institutions, long after it became standard practice in many countries. We hope this time around things will move quickly and many researchers and institutions will adopt ORCID soon.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;ACKNOWLEDGEMENTS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are grateful to Dr L.L. Haak, Alice Meadows, Nobuko Miyairi and Alainna Wrigley of ORCID, Rachel Bruce of Jisc, Thomas Krichel of GESIS and RePEc, Peter Suber of the Harvard Berkman Center for Internet &amp;amp; Society, Martin Fenner of DataCite, Arthur Sale of University of Tasmania, John Willinsky of Stanford University, Dominique Babini of CLACSO, Abel Packer of SciELO, for answering our questions and providing some valuable information. We are indebted to Subbiah Gunasekaran of the Central Electrochemical Research Institute, Karaikudi, for valuable discussion and for alerting us to some important developments. The comments of two referees were very helpful in rewriting and improving the original text.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;REFERENCES&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn1"&gt;[1] &lt;/a&gt;Garfield E. British quest for uniqueness versus American egocentrism. Nature 1969;&lt;b&gt;223:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn2"&gt;[2] &lt;/a&gt;Garfield E. What is in a surname? Current Contents 1981;5:26–30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn3"&gt;[3] &lt;/a&gt;Qiu J. Scientific publishing: Identity crisis. Nature 2008; 451:766–67.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn4"&gt;[4] &lt;/a&gt;Sprouse GD. Which Wei Wang? Phys Rev Lett 2007:99.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn5"&gt;[5] &lt;/a&gt;Calamur K. The 19th-century Japanese law on last names, The Atlantic Dec 2015. Available at theatlantic.com/international/archive/2015/12/japan-last-name/ 420711 (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn6"&gt;[6] &lt;/a&gt;Sharma K, The other half: What’s in a name? The Hindu 7 Aug 2010. Available at http://www.thehindu.com/opinion/columns/Kalpana_Sharma/the-other-half-whatsin-a-name/article196918.ece (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn7"&gt;[7] &lt;/a&gt;Canese K. PubMed and computed author sorted display. NLM Tech Bull 2012;386:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn8"&gt;[8] &lt;/a&gt;Medows A. ORCID Blog 23 Jun 2015. Available at https://orcid.org/blog/2015/06/ 23/national-consortium-orcid-set-improve-uk-research-visibility-and-collaboration (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn9"&gt;[9] &lt;/a&gt;Fenner M. Author identifier overview. PLOS Blogs: Gobbledygook Available at http://blogs.plos.org/mfenner/author-identifier-overview/ (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn10"&gt;[10] &lt;/a&gt;Wilson B, Fenner M. Open researcher &amp;amp; contributor ID (ORCID): Solving the name ambiguity problem. EDUCAUSE Rev 2012;47(3):54–5.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn11"&gt;[11] &lt;/a&gt;University of Southampton. Southampton ORCID––FAQs and Support. LibGuides@Southampton Available at http://library.soton.ac.uk/orcid (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn12"&gt;[12] &lt;/a&gt;Hendricks G. Crossref to auto-update ORCID records. Available at http://crosstech. crossref.org/2015/09/orcid-auto-update.html (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn13"&gt;[13] &lt;/a&gt;Anstey A. How can we be certain who authors really are? Why ORCID is important to the British Journal of Dermatology. Br J Dermatol 2014;171:679–80.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn14"&gt;[14] &lt;/a&gt;Link works to your ORCID record from another system. Available at http://support.orcid.org/knowledgebase/articles/188278-import-works-website-user (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn15"&gt;[15] &lt;/a&gt;Import works from BibTeX files: Website user. Available at http:// support.orcid.org/knowledgebase/articles/390530 (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn16"&gt;[16] &lt;/a&gt;Bilder G, Lin J, Neylon C. Principles for open scholarly infrastructure-v1. Available at http://dx.doi.org/10.6084/m9.figshare.1314859 (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn17"&gt;[17] &lt;/a&gt;Bryant R. ORCID outreach activities in Latin America, 2013. Available at http:// orcid.org/blog/2013/09/10/orcid-outreach-activities-latin-america (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn18"&gt;[18] &lt;/a&gt;Joint Information Systems Committee (Jisc). National consortium for ORCID set to improve UK research visibility and collaboration. 2015. Available at jisc.ac.uk/ news/national-consortium-for-orcid-set-to-improve-uk-research-visibility-andcollaboration-23-jun (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn19"&gt;[19] &lt;/a&gt;Joint Information Systems Committee (Jisc). Jisc-ARMA ORCID Pilot Project.Available at http://orcidpilot.jiscinvolve.org/wp/hei-based-projects/ (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn20"&gt;[20] &lt;/a&gt;Reimer T. UK ORCID members meeting and launch of Jisc ORCID consortium at Imperial College, London, 28 September 2015, Available at http:// wwwf.imperial.ac.uk/blog/openaccess/2015/10/07/uk-orcid-members-meeting-andlaunch-of-jisc-orcid-consortium-at-imperial-college-london-28th-september-2015/ (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn21"&gt;[21] &lt;/a&gt;Wellcome Trust. Who are you? Recognising researchers with ORCID identifiers, 30 Jun 2015. Available at http://blog.wellcome.ac.uk/2015/06/30/who-are-yourecognising-researchers-with-orcid-identifiers/ (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn22"&gt;[22] &lt;/a&gt;National Institute for Health Research. NIHR begins roll out of mandatory ORCID iD requirement, 23 September 2015. Available at nihr.ac.uk/newsroom/featurednews/nihr-begins-roll-out-of-mandatory-orcid-id-requirement/3024 (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn23"&gt;[23] &lt;/a&gt;Meadows A. Italy launches national ORCID implementation, 22 June 2015. Available at http://orcid.org/blog/2015/06/19/italy-launches-national-orcid-implementation (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn24"&gt;[24] &lt;/a&gt;Ferguson N. Research identifiers: National approaches to ORCID and ISNI implementation, July 2015. Available at https://repository.jisc.ac.uk/6181/1/KEreport-national-approaches-to-ORCID-and-ISNI.pdf (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn25"&gt;[25] &lt;/a&gt;Meadows A. Australian ORCID consortium officially launched. 16 February 2016. Available at https://orcid.org/blog/2016/02/19/australian-orcid-consortiumofficially-launched (accessed on 20 Feb 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn26"&gt;[26] &lt;/a&gt;Haak L. Adoption and use by the research community: Focus on funders. Available at http://slideshare.net/ORCIDslides/orcid_adoption_and_use (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn27"&gt;[27] &lt;/a&gt;European Commission. Directorate General for Research &amp;amp; Innovation. Guidelines on open access to scientific publications and research data in Horizon 2020: Version 1.0. Available at http://ec.europa.eu/research/participants/data/ref/ h2020/grants_manual/hi/oa_pilot/h2020-hi-oa-pilot-guide_en.pdf (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn28"&gt;[28] &lt;/a&gt;Autism Speaks. Policy on ORCID integration with Autism Speaks science grants system, Available at autismspeaks.org/science/policy-statements/policyORCID-integration-autism-speaks-science-grants-system (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn29"&gt;[29] &lt;/a&gt;Ratner H. ORCID: Getting to launch. 2012. Available at slideshare.net/ ORCIDSlides/2-ratner-orcid-getting-to-launch-v5 (slide No. 22) (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn30"&gt;[30] &lt;/a&gt;Adoption and integration program. Available at http://orcid.org/content/ adoption-and-integration-program (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn31"&gt;[31] &lt;/a&gt;ORCID receives $3 million grant to build international engagement. Available at http://helmsleytrust.org/news/orcid-receives-3-million-grant-build-internationalengagement (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn32"&gt;[32] &lt;/a&gt;Haak L. ORCID Blog. Available at https://orcid.org/blog/2014/12/03/iauthor-andorcid-supporting-international-identifiers-chinese-researchers-national (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn33"&gt;[33] &lt;/a&gt;Pessoa L. ORCID Blog. Available at https://orcid.org/blog/2015/08/20/orcidgrowing-latin-america (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn34"&gt;[34] &lt;/a&gt;Buys M. ORCID in Southern Africa. 2015. Available at http://orcid.org/blog/2015/ 05/14/orcid-research-management-south-africa (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn35"&gt;[35] &lt;/a&gt;Miyairi N. ORCID: Building academic trust. Panel discussion on reputation management and research integrity, STM Publishing and China Industry Day, Beijing, 25 August 2015. Available at stm-assoc.org/ 2015_08_25_STM_CAST_Miyairi_ORCID_Industry_Day.pdf (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn36"&gt;[36] &lt;/a&gt;Paglione L. ORCID Blog. Available at http://orcid.org/blog/2013/02/21/orcidopen-source (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn37"&gt;[37] &lt;/a&gt;Haak L. ORCID Blog. Available at http://orcid.org/content/o-orcid (accessed on 29 Sep 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn38"&gt;[38] &lt;/a&gt;Ferguson C, Marcus A, Oransky I. Publishing: The peer-review scam. Nature 2014;515:480–2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn39"&gt;[39] &lt;/a&gt;Kram J. ORCID Blog. Available at https://orcid.org/blog/2015/06/26/host-reasonswhy-funders-should-be-investing-orcid-%E2%80%A6 (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn40"&gt;[40] &lt;/a&gt;Taylor LN. MLA (Modern Language Association) International Bibliography launches ORCID App. 2015 Available at http://laurientaylor.org/2015/06/19/news-mlamodern-language-association-international-bibliography-launches-orcid-app/ (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn41"&gt;[41] &lt;/a&gt;Schaffer W. The adoption of ORCID identifiers by funding organizations. Available at slideshare.net/ORCIDSlides/20140423-webinar-schaffer (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn42"&gt;[42] &lt;/a&gt;Higher Education Funding Council for England (HEFCE). Metrics cannot replace peer review in the next REF. Available at hefce.ac.uk/news/newsarchive/2015/ Name,104464,en.html (accessed on 3 Jan 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="ftn43"&gt;[43] &lt;/a&gt;Research Councils UK (RCUK) Administrator. We’re now a member of ORCID. Available at http://blogs.rcuk.ac.uk/2015/12/03/were-now-a-member-of-orcid/ (accessed on 3 Jan 2016).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/eprints-iisc-ernet-october-28-2016-subbiah-arunachalam-madan-muthu-adopting-orcid-as-unique-identifier-will-benefit-all-involved-in-scholarly-communication'&gt;https://cis-india.org/openness/eprints-iisc-ernet-october-28-2016-subbiah-arunachalam-madan-muthu-adopting-orcid-as-unique-identifier-will-benefit-all-involved-in-scholarly-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Subbiah Arunachalam and Muthu Madhan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Educational Resources</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2016-10-28T16:28:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/businesswire-">
    <title>Adianta School for Leadership and Innovation to Host Design Public</title>
    <link>https://cis-india.org/news/businesswire-</link>
    <description>
        &lt;b&gt;The conclave in its 5th edition will feature Aam Aadmi Party members Rajmohan Gandhi and Somnath Bharti along with Sunil Abraham in conversation with Dr. Aditya Sood about different approaches through citizen centric governance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The information was posted on &lt;a class="external-link" href="http://www.businesswireindia.com/news/news-details/adianta-school-leadership-innovation-host-design-public/38580"&gt;BusinessWire India&lt;/a&gt; on March 11, 2014. Source : Adianta School for Leadership and Innovation&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Adianta School of Leadership and Innovation is setting up the stage for  yet another conclave to establish a dialogue around innovation with  ‘Design Public’. The key aspect of the conclave would be a dialogue  between Raj Mohan Gandhi, Member- Aam Aadmi Party (AAP) &amp;amp; Grandson  of Mahatma Gandhi; Somnath Bharti, Former Law Minister Delhi, Member-  Aam Aadmi Party (AAP); Sunil Abraham, Executive Director, Centre for  Internet &amp;amp; Society and Dr. Aditya Dev Sood, Founder &amp;amp; CEO, CKS  about different approaches through citizen centric governance.&lt;br /&gt; &lt;br /&gt; &lt;span&gt;The fifth edition of the Design Public Conclave which will be held on Friday, March 14&lt;sup&gt;th&lt;/sup&gt;,  2014 at Vihara Campus, is being produced by the Center for Knowledge  Societies, the Adianta School for Leadership and Innovation, the Startup  Tunnel, the Bihar Innovation Lab, and the Financial Innovation  Alliance, in partnership and with the support of the Bill and Melinda  Gates Foundation, Grameen Foundation, CGAP, UNDP's GCEPA and the Social  Innovation Exchange (SIX).&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; Over the past three years, Design Public has emerged as the premier  location for high-level conversations about the public role and social  impact of design and innovation in India. It has attracted some erudite  and high profile speakers and discussants across regions, society and  sectors of industry. &lt;span&gt;The fifth edition of Design Public will focus on “Social Innovation through Partnership with Private Sector&lt;/span&gt;”  and “The Elements of Governance Innovation” as both are relevant in  present day context. The discussions will set the stage for  recommendations and suggestions around promotion of&lt;span&gt; social innovation through new partnerships between the social and  private sectors, promoting social enterprises and beneficial social  consequences of private sector activity with specific focus on the new  companies bill and how it brings centre stage new opportunities for  promoting social innovation&lt;/span&gt;. Focus on “&lt;span&gt;The Elements of Governance Innovation&lt;/span&gt;” will focus on the importance of&lt;span&gt; distinguishing governance innovation from policy work, the key constituencies involved in governance innovation &lt;/span&gt;and how better collaboration can create more meaningful impact.&lt;br /&gt; &lt;br /&gt; &lt;span&gt;The conclave will see two Keynotes touching both the aspects by Esko Kilpi, Writer and Theorist of the Networked Society&lt;/span&gt; and &lt;span&gt;Arndt Hussar, UNDP-GCPSE, Singapore&lt;/span&gt;, respectively. Apart from the Keynotes, there would be other speakers which include &lt;span&gt;Ada Wong, Chair, SIX, Hong Kong&lt;/span&gt;; &lt;span&gt;Nehal Sanghavi, Advisor, USAID, India&lt;/span&gt;; &lt;span&gt;Rajesh Sawhney, Founder, Global Superangels Fund, India&lt;/span&gt;; Louis Pulford, Director of SIX (Social Innovation Exchange) and Prof. M.P. Ranjan, Design Chair, CEPT University&lt;span&gt;.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; Apart from the keynotes, the conclave will also feature two working groups and three breakout sessions followed by &lt;span&gt;presentations from each breakout&lt;/span&gt; and a d&lt;span&gt;ialogue for framing conclusions and charting next steps&lt;/span&gt;.&lt;br /&gt; &lt;br /&gt; &lt;span&gt;The working groups will focus on designing a Social Innovation Exchange for India&lt;/span&gt; and b&lt;span&gt;uilding an action plan for Governance Innovation&lt;/span&gt; respectively. The breakouts will be e&lt;span&gt;xplaining Open Data in the Indian context&lt;/span&gt;, o&lt;span&gt;pening out closed systems of Governance&lt;/span&gt; and developing &lt;span&gt;start-up opportunities in Governance Innovation&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other key participants for the fifth edition of Design Public conclave  include Abhimanyu Nowhar, Founder, The Kiba Design; Ambrish Arora, Head,  Lotus Design; Balasubramanian Munuswamy, Private Sector Development  Advisor, Department for International Development (DIFD), British High  Commission; Chakshu Roy, Heads, Outreach Initiatives, PRS Legislative  Research; Chandni Ohri, CEO, Grameen Foundation, India; Daniel  Radcliffe, Senior Program Officer, Bill &amp;amp; Melinda Gates Foundation;  Gautam Gandhi, New Business Development for Emerging Markets, Google;  Harsh Srivastava, Chief Operating Officer, Centre of Civil Society;  Ishan Khosla, Founder, Ishan Khosla Design; Jatin Modi, Founder,  FrogIdeas, India; Karan Malik, Associate, Advisory Research, Dasra;  Lysander Menezes, Team Leader, Maternal Child Health &amp;amp; Nutrition,  PATH; Namit Arora, Writer &amp;amp; Activist; Nehal Sanghavi, Advisor,  USAID, India; Rajesh Khati, Founder &amp;amp; Principal Consultant, Clearway  Advisors; Ramanjit Chima, Senior Policy Analyst, Google; Sanjay Rishi,  President, MCS, Usha International Ltd.; Shweta Banerjee, CGAP, India;  Soaib Grewal, Founder, Bold Capital, India; Somnath Bharti, Member-AAP  and Former Law Minister, Government of Delhi; Suhas Mhaskar, Senior  General Manager &amp;amp; Head, Mahindra and Mahindra Ltd.; Sumandro  Chattapadhyay, Researcher, The Sarai Programme at the Centre for the  Study of Developing Societies and Usha Alexander, Writer and  Instructional Designer.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Design Public&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past three years, Design Public has emerged as the premier  location for high-level conversations about the public role and social  impact of design and innovation in India. It has attracted speakers and  discussants from all regions of the world, from all estates of society  and from diverse sectors of industry. Out of the conversations held  here, many new initiatives have emerged, including the Bihar Innovation  Lab, the Adianta School for Leadership and Innovation, among others.  There has been wide coverage of the themes and ideas emerging from  Design Public in the media and blogosphere, including in the New York  Times, Economic Times, Times of India, and Mint Newspaper. High value  participants in the past have included Arun Maira (Planning Commission),  Sam Pitroda (National Innovation Council), Geoff Mulgan (NESTA, UK),  Ashok Alexander (BMGF), Rohini Nilekani (Arghyam), Yamini Aiyer  (Accountability Initiative), Ashwin Mahesh (Lok Satta Party), Samanth  Subramanaian (Writer), Vish Palekar (Mahindra Group), Jeby Cherian  (IBM), Riku Makela (Tekes, FI), among many others.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Adianta&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The  Adianta School for Leadership and Innovation promotes a radical and  empowering educational approach that promotes Learning by Doing. It is a  collaborative effort between some of the world’s leading innovation  organizations, including the &lt;b&gt;&lt;span&gt;School  of Design at the Technische Universiteit Delft (Netherlands), NESTA  (UK), The Social Innovation Exchange (Global), and the Center for  Knowledge Societies (India)&lt;/span&gt;&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; With a  distinguished team of advisors, international faculty and a global  network of over 100 mentors, the Adianta School provides an  unprecedented quality of international education right here in India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;For News Release background on                             Adianta School for Leadership and Innovation                              &lt;a class="link" href="http://businesswireindia.com/company/company-news/4904" title="Click Here"&gt;click here &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;Media Contact Details &lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;Abhishek Shivam, Greyhound Neo, &lt;span class="skype_c2c_container" dir="ltr"&gt;&lt;span class="skype_c2c_highlighting_inactive_common" dir="ltr"&gt;&lt;span class="skype_c2c_textarea_span"&gt;&lt;img class="skype_c2c_logo_img" src="resource://skype_ff_extension-at-jetpack/skype_ff_extension/data/call_skype_logo.png" /&gt;&lt;span class="skype_c2c_text_span"&gt;+919582199990&lt;/span&gt;&lt;span class="skype_c2c_free_text_span"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;,                                              &lt;span&gt; &lt;a href="mailto:%20ashivam@greyhoundgroup.com"&gt; ashivam@greyhoundgroup.com &lt;/a&gt; &lt;/span&gt; Priyanka Ahuja, Brand Manager, Adianta School for Leadership and Innovation,                                              &lt;span&gt; &lt;a href="mailto:%20outreach@adianta.org"&gt; outreach@adianta.org &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div class="skype_c2c_menu_container" id="skype_c2c_menu_container"&gt;
&lt;div class="skype_c2c_menu_click2call"&gt;&lt;a class="skype_c2c_menu_click2call_action" id="skype_c2c_menu_click2call_action"&gt;Call&lt;/a&gt;&lt;/div&gt;
&lt;div class="skype_c2c_menu_click2sms"&gt;&lt;a class="skype_c2c_menu_click2sms_action" id="skype_c2c_menu_click2sms_action"&gt;Send SMS&lt;/a&gt;&lt;/div&gt;
&lt;div class="skype_c2c_menu_add2skype"&gt;&lt;a class="skype_c2c_menu_add2skype_text" id="skype_c2c_menu_add2skype_text"&gt;Add to Skype&lt;/a&gt;&lt;/div&gt;
&lt;div class="skype_c2c_menu_toll_info"&gt;&lt;span class="skype_c2c_menu_toll_callcredit"&gt;You'll need Skype Credit&lt;/span&gt;&lt;span class="skype_c2c_menu_toll_free"&gt;Free via Skype&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/businesswire-'&gt;https://cis-india.org/news/businesswire-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-04-04T08:08:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/address-igf-closing-ceremony">
    <title>Address delivered during the IGF Closing Ceremony </title>
    <link>https://cis-india.org/internet-governance/blog/address-igf-closing-ceremony</link>
    <description>
        &lt;b&gt;This address was delivered by Dr. Anja Kovacs, as a representative of civil society, to the IGF during its closing ceremony.&lt;/b&gt;
        
&lt;p&gt;Good evening, Mr Chairperson and all the distinguished participants, ladies and gentlemen. Thank you for this opportunity to address this assembly on behalf of civil society, it is a real honour.&amp;nbsp; And thank you also to the organisers and to the government of Egypt, for the wonderful arrangements and for creating such a excellent environment for us to work in.&lt;/p&gt;
&lt;p&gt;I would like to use this opportunity to celebrate, together with you, two very important achievements in particular that we have made collectively during the four days of our intensive deliberations together.&lt;/p&gt;
&lt;p&gt;The first one is the progress we are making in terms of recognising the importance of attention for human rights in ensuring a people-centred, development-oriented, non-discriminatory information society.&amp;nbsp; Thus, for example, in the main session on security, openness and privacy, speakers across stakeholder groups couched the debate not any more in terms of security vs. privacy, but in terms of security and privacy.&amp;nbsp; Security or other concerns, it was consistently argued, while obviously deserving our attention, should not be used to justify curtailing longstanding gains made in terms of human rights; rather, it is an improved implementation of already agreed on human rights instruments that we need to reach our goal of an inclusive, people-centred information society.&amp;nbsp; The growing recognition of this fact is an evolution that civil society welcomes with open arms.&lt;/p&gt;
&lt;p&gt;Another very hopeful evolution during this IGF was the central attention devoted to the question of where we stand in terms of promoting a people-centred, development-oriented information society more generally.&amp;nbsp; The message that came out of the main session on “Internet governance in the light of the WSIS principles” clearly confirmed the urgent need to pay greater attention to this important issue, and several suggestions were made to address this concern.&amp;nbsp; These include devoting devoting a main session solely to the topic of Internet governance for development in next next year's IGF, and I sincerely hope that these suggestions will be taken up.&lt;/p&gt;
&lt;p&gt;While we thus have important reason to celebrate, challenges of course remain.&amp;nbsp; Throughout the existence of the IGF, and perhaps increasingly so, the value of the multistakeholder model has been recognised and stressed by all stakeholder groups.&amp;nbsp; However, at the same time, it has also been acknowledged that we need to continue to work to further strengthen participation from currently underrepresented countries and groups.&amp;nbsp; I would like to note, however, that it is important that we do not restrict our efforts in this regard to capacity building, significant as that may be.&amp;nbsp; Perhaps even more crucial is that the agenda of the IGF consistently talks to the concerns of actors in the developing parts of the world as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reconfirmation of the importance of a development agenda that we have seen in this IGF is thus a very important step forward indeed. At the same time, within this larger development agenda, it is crucial that we also as soon as possible start to discuss some of the specific issues that require our attention on an urgent basis.&amp;nbsp; For example, within the IGF as elsewhere, it is generally acknowledged that access to knowledge is central to development processes; yet the IGF so far has not paid systematic attention to the ways in which the amazing possibilities that the Internet offers in this regard are increasingly threatened by new policies that seem to make intellectual property regimes more stringent day by day.&amp;nbsp; From a developing country perspective, finding a balanced solution that can address these concerns is an urgent priority.&amp;nbsp; Starting the debate on how this can be achieved here, in the IGF, is certain to attract a larger number of developing country participants, including from governments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Going by the experience of the past years as well as this particular meeting, I have no doubt that if given the opportunity, we will measure up to the challenges before us. Without wanting to preclude the Under-Secretary General's report, the proceedings during this IGF have made clear time and again its crucial significance in Internet governance processes.&amp;nbsp; I hope with all my heart that we will continue to get the opportunity to work together on addressing these important issues and on resolving tensions and contradictions as they emerge, with the support of an independent secretariat that can ensure an environment genuinely inclusive of all stakeholders.&amp;nbsp; Only when such open, inclusive conditions govern our own processes, may we in turn, together be able to create a genuinely inclusive information society which will indeed create opportunities for all.&lt;/p&gt;
&lt;p&gt;Thank you.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/address-igf-closing-ceremony'&gt;https://cis-india.org/internet-governance/blog/address-igf-closing-ceremony&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    

   <dc:date>2011-08-02T07:18:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/ada-camp-bangalore">
    <title>AdaCamp Bangalore: "Nothing could be more open and encouraging than this"</title>
    <link>https://cis-india.org/openness/news/ada-camp-bangalore</link>
    <description>
        &lt;b&gt;I can say this conference was the most truly touched feminist endeavor I have ever witnessed or thought of. An inspiration to last through. — Rupali Talwatkar. &lt;/b&gt;
        &lt;p&gt;Rohini Lakshané delivered a session on digital security. For more info see the &lt;a class="external-link" href="https://adainitiative.org/2014/12/adacamp-bangalore-nothing-could-be-more-open-and-encouraging-than-this/"&gt;details on Ada Initiative website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Session on Imposter Syndrome:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Impostor syndrome is a common       reaction to doing publicly visible and publicly criticised work       like that done in open technology and culture. Impostor Syndrome &lt;b&gt;is         the feeling that you aren't actually qualified for the work you         are doing and will be discovered as a fraud&lt;/b&gt;. It is prevalent       among women in open tech/culture, many of whom have been       socialised to value other's opinion of their work above their own,       and to do things "by the book."&lt;br /&gt; &lt;a href="http://adainitiative.org/what-we-do/impostor-syndrome-training/" target="_blank"&gt;http://adainitiative.org/what-we-do/impostor-syndrome-training/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Session on Open Street Maps:&lt;/b&gt;&lt;br /&gt; &lt;a href="https://etherpad.wikimedia.org/p/yAxa2Kwkfm" target="_blank"&gt;https://etherpad.wikimedia.org/p/yAxa2Kwkfm&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/ada-camp-bangalore'&gt;https://cis-india.org/openness/news/ada-camp-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-02-12T01:53:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks">
    <title>Act now to protect yourself against future ransomware attacks</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks</link>
    <description>
        &lt;b&gt;There was Wannacry, then Petya, and several other lesser-known ones: With ransomware attacks coming thick and fast, get proactive about protecting yourself.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published by &lt;a class="external-link" href="http://www.business-standard.com/article/markets/act-now-to-protect-yourself-against-future-attacks-117070400742_1.html"&gt;Business Standard&lt;/a&gt; on July 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wannacry ransomware attack in May was followed by the Petya attack last week. This attack affected the Ukrainian government and large corporates like Maersk and Merck. In India it affected the operations of terminals at Jawaharlal Nehru Port Trust (JNPT), operated by Maersk. According to Kaspersky Lab, the rate of ransomware attacks on businesses grew from one every 120 seconds in January 2016 to one every 40 seconds by October that year. The rate of attack on individuals' computers rose from one every 20 seconds to one every 10 seconds over this period. Today, it has become imperative for everyone, including entrepreneurs and small business owners, to learn how to defend themselves against such attacks.          &lt;br /&gt;&lt;br /&gt;A trend witnessed in 2016 was the growth of ransomware-as-a-service business model. "Code creators offer their malicious product on demand, selling uniquely modified versions to criminals who then distribute it through spam and websites, paying a commission to the creator," says Altaf Halde, managing director, Kaspersky Lab (South Asia). He adds that the growth of cashless payments in India will undoubtedly attract the attention of cyber criminals and lead to more attacks in future.   &lt;br /&gt;&lt;br /&gt;Next, let us turn to how ransomware works. An operating system (OS) is a large and complicated piece of software with millions of lines of software code. A malware exploits vulnerabilities within the OS to infiltrate it. An infiltration can happen in multiple ways: if you download a malicious email attachment, visit a code-carrying web site, via an infected pen drive, and so on.&lt;br /&gt;&lt;br /&gt;Ransomware is a form of malware that encrypts the files in a critical part of the computer, such as My Documents or Desktop, where people usually store their files. It could also encrypt specific file types, say, such .doc files. The user is then informed that his files have been encrypted along with the warning that unless he pays up within the next few hours his files will be deleted. Says Udbhav Tiwari, policy officer at the Centre for Internet and Society, Bengaluru: "You first have to first pay the attackers using anonymous money like bitcoins and then they give you the key for decrypting your files."&lt;br /&gt;&lt;br /&gt;A ransomware attack can be dealt with in two ways: either pay the money and get the files unlocked, or find a way to circumvent the encryption. The latter option can, however, take a fair bit of time.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Safeguard measure you should adopt&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Back up important files regularly. Check periodically that these files have not  got damaged&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enable ‘Show file extensions’ option in Windows settings. Stay away from extensions like “exe”, “vbs” and “scr”. Many &lt;a href="http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/" target="_blank"&gt;familiar file types can be dangerous&lt;/a&gt; as scammers use multiple extensions (like hot-chics.avi.exe or doc.scr)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you discover an unknown process on your machine, cut off the Internet connection immediately&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you have been infected, find the name of the ransomware. If it's an older version, your files can be restored. For restoration tools visit &lt;a href="https://www.nomoreransom.org/" target="_blank"&gt;https://www.nomoreransom.org/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Among the safeguard measures you should adopt, first and foremost, never open a suspicious file. By being vigilant you can avoid a lot of ransomware attacks.&lt;br /&gt;&lt;br /&gt;Most malware exploit vulnerabilities within the OS. "These vulnerabilities are frequently patched by the creators of the OS. But if people use pirated OS, or don't upgrade it regularly, they could land in trouble," says Tiwari. Soon after the Wannacry attack, Microsoft had issued a patch. People who updated their computers immediately didn't get affected by it. Also, use the latest version of an OS.&lt;br /&gt;&lt;br /&gt; Use a quality antivirus (AV) solution, which is usually one you have to pay for. A high-quality AV can even protect you against vulnerabilities not patched by the OS manufacturer. AVs scan files. If they detect patterns indicating the presence of malware, they lock them apart from the rest of the computer, thereby preventing them from spreading.&lt;br /&gt;&lt;br /&gt; One option is to use an OS that is less vulnerable, like Mac and Linux. Fewer malware are designed for these OS as fewer people use them.&lt;br /&gt;&lt;br /&gt;Finally, if your files do get encrypted, don’t pay the ransom, unless instant access to those files is critical. "Each payment only fuels this unlawful business," says Halde.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks'&gt;https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-10T14:46:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
