<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1811 to 1825.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/about-us"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/about-open-access-day"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/aaron-swartz-the-first-martyr-of-free-information-movement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/aadhaar-by-numbers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/a2k3-panel-xi-open-access-to-science-and-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/a-wikipedia-presentation-at-goa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/mini-hackathon-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/charlotte-lapsansky-talk"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/about-us">
    <title>About Us</title>
    <link>https://cis-india.org/about/about-us</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h2&gt;What we do&lt;/h2&gt;
&lt;h2&gt;
&lt;p align="justify"&gt;The Centre for Internet and Society is a non-profit research organisation that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and intellectual property rights, and openness (including open data, free/open source software, open standards, open access to scholarly literature, open educational resources, and open video), and engages in academic research on reconfigurations of social processes and structures through the Internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;/h2&gt;
&lt;h2&gt;Vision and Mission&lt;/h2&gt;
&lt;p align="justify"&gt;The Centre for Internet and Society will critically engage with concerns of &lt;a href="https://cis-india.org/about/substantive-areas/digital-pluralism" class="internal-link" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="https://cis-india.org/about/substantive-areas/public-accountability" class="external-link"&gt;public accountability&lt;/a&gt; and &lt;a href="https://cis-india.org/../publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p&gt;Through multidisciplinary research, intervention, and collaboration, we seek to explore, understand, and affect the shape and form of the internet, and its relationship with the political, cultural, and social milieu of our times.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/about-us'&gt;https://cis-india.org/about/about-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-06-27T13:59:12Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/about-open-access-day">
    <title>About Open Access Day</title>
    <link>https://cis-india.org/openness/publications/content-access/about-open-access-day</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
October 14, 2008 will be
the world’s first Open Access Day. The founding partners for this
Day are SPARC (the Scholarly Publishing and Academic Resources
Coalition), Students for FreeCulture, and the Public Library of
Science.
&lt;p align="justify"&gt;Open Access Day will help
to broaden awareness and understanding of Open Access, including
recent mandates and emerging policies, within the international
higher education community and the general public.&lt;/p&gt;
&lt;p align="justify"&gt;Open Access&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;
is a growing international movement that uses the Internet to throw
open the locked doors that once hid knowledge. It encourages the
unrestricted sharing of research results with everyone, everywhere,
for the advancement and enjoyment of science and society.&lt;/p&gt;
&lt;p align="justify"&gt;Open Access is the
principle that publicly funded research should be freely accessible
online, immediately after publication, and it’s gaining ever more
momentum around the world as research funders and policy makers put
their weight behind it.&lt;/p&gt;
&lt;p align="justify"&gt;The Open Access
philosophy was firmly articulated in 2002, when the Budapest Open
Access Initiative was introduced. It quickly took root in the
scientific and medical communities because it offered an alternative
route to research literature that was frequently closed off behind
costly subscription barriers.&lt;/p&gt;
&lt;p align="justify"&gt;Today, the OAIster search
engine provides access to 17,799,314 Open Access records from 1015
contributors. According to the Directory of Open Access Journals –
India publishes 105 Open Access journals. Both INSA and IASc have
made their journals open access journals. Indian Institute of Science
has an EPrints repository and it has over 11,000 papers and this
year, the Institute's centenary year, the number is expected to cross
23,000. NIT, Rourkela, has mandated open access to all faculty
research papers. There are about thirty OA institutional repositories
in India today. The IITs and IISc have formed a consortium and are
making their class lectures open access under a project called NPTEL.
These lectures are available in web, video and YouTube formats.&lt;/p&gt;
&lt;h1 class="western"&gt;About CCMG-JMI&lt;/h1&gt;
&lt;p&gt;The Centre seeks to enhance the integration and development of
interdisciplinary research into the media in India and South Asia. To
this end, various programmes envisaged at CCMG will contribute in the
following manner:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;Methodologically, work at the Centre will examine and seek to
	develop new approaches both, quantitative and qualitative. This
	being a recurrent motif across all thematic rubrics pursued.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Archiving the measurement and analysis of media production,
	content and reception takes place in many organisations, but very
	little of such data is available to researchers, or is analysed
	comparatively. To address this void, the Centre aims to create an
	archive of media research data of value to researchers across South
	Asia.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Comparative perspectives across disciplines, mediascapes and
	regions are of utmost importance to the centre’s body of
	objectives. Comparative analyses will require reconciling data based
	on differing calibration approaches rooted in, often, contesting
	intellectual traditions and policy foundations.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Networking will be structured to aid the regular association
	of media scholars and policy analysts from varied, contiguous
	disciplines. Equally, the Centre will act as a focal point for
	dialogues between social scientists, civil society actors and media
	professionals who rarely are able to share a platform.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;This
	section and the next is adapted from the content available at &lt;a class="external-link" href="http://www.openaccessday.org"&gt;http://www.openaccessday.org&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/about-open-access-day'&gt;https://cis-india.org/openness/publications/content-access/about-open-access-day&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-09-21T14:43:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/aaron-swartz-the-first-martyr-of-free-information-movement">
    <title>Aaron Swartz: The First Martyr of the Free Information Movement </title>
    <link>https://cis-india.org/openness/blog-old/aaron-swartz-the-first-martyr-of-free-information-movement</link>
    <description>
        &lt;b&gt;Well known American computer programmer, writer, political organizer and Internet activist died on January 11, 2013. Lawrence Liang from the Alternative Law Forum discusses with Newsclick the tragic loss. The interview was conducted by Prabir Purkayastha. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This interview was originally published by &lt;a class="external-link" href="http://newsclick.in/international/aaron-swartz-first-martyr-free-information-movement"&gt;NewsClick&lt;/a&gt; on January 19, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Discussing on the immediate background in which this tragic event happened, Lawrence says that  all of us are collectively mourning the death of an extremely talented individual. He adds that Aaron was facing a very difficult trial ahead. A couple of years ago he had plugged his computer on to the MIT network and had downloaded approximately four million articles from JSTOR (primary database for social science and other science journals) and he had intended to make freely available. This act of his in many ways marks Aaaron's short life but one which is marked by a certain commitment and activism around the idea of free knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawrence further says that his anger at databases like JSTOR was the fact that they were charging extraordinary amounts of money to provide access (which meant that they were not available to most people in the world) without paying any royalty to the authors contributing to the article or to the people who do the peer review of the articles. Here is a scenario which is rent control of the worst kind essentially of knowledge which is completely privatised and enclosed (public knowledge which is enclosed in this particular way).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most researchers and academics who work and contribute towards making of journals do not get compensated for it but are paid for by public money because they happen to be employed by universities or research centres. And then all this material goes behind pay walls. And that is the context in which we need to understand Aaron's life. Click below to watch the full interview:&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/Bg87SR0TRw4" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/aaron-swartz-the-first-martyr-of-free-information-movement'&gt;https://cis-india.org/openness/blog-old/aaron-swartz-the-first-martyr-of-free-information-movement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>lawrence</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2013-01-24T12:26:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer">
    <title>Aadhaar-enabled smartphones will ease money transfer</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer</link>
    <description>
        &lt;b&gt;With its plans to make smartphones Aadhaar-enabled, the government hopes to provide users a means to do self-authentication and let businesses and banks verify the identity of their clients through their smartphones, a move that could potentially lead the way to a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi and Gulveen Aulakh was &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/banking/finance/banking/aadhaar-enabled-smartphones-will-ease-money-transfer/articleshow/53625690.cms"&gt;published in the Economic Times&lt;/a&gt; on August 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Iris and fingerprint sensors are now becoming a standard feature in smartphones anyway, and this requirement will only take a minor tweak to the operating system. Once enabled, people will be able to use phones to do self-authentication and KYC (know your customer)," Nandan Nikelani, former chairman of the Unique Identification Authority of India, told ET, welcoming the government's plan to make smartphones Aadhaar-enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report that on July 27 a meeting between UIDAI,  which administers Aadhaar, and senior executives of smartphone-makers  discussed ways to allow smartphone handsets let citizens authenticate  their fingerprints and iris on the phone to get services. The most  immediate use for the Aadhaar-enabled smartphones is the Unified Payment  Interface (UPI), the new payment system that allows money transfer  between any two parties using mobile phones and a virtual payment  address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The two-factor authentication in UPI is now being done with mobile phone as one factor, and MPIN as the second factor. But once you have Aadhaar authentication on the phone, then the second factor can be biometric authentication through Aadhaar," said Nilekani. Over time, the idea is to open Aadhaar authentication to third party apps, said another person familiar with the ongoing discussions, who did not wish to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In effect, biometric and iris scan authentication could become one of the permissions a user grants to different third party apps, such as access to camera, contacts, phone book and so on. Handset makers have raised concerns about some security issues on using iris scan for Aadhar authentication. Also, companies such as Apple that have very closed ecosystems, would not be easy to get on board, several people told ET.&lt;br /&gt;&lt;br /&gt; "The primary challenge lies in safe storing of the iris scan between the time it is captured by the camera and then sent to UIDAI server seeking authentication," said an industry insider, who is aware of the discussions, requesting anonymity. The proposal for smartphone makers includes a "hardware secure zone" where biometric data will be encrypted and sent out. It will not leave the electronic secure zone without encryption, and every phone doing Aadhaar authentication will be registered in the UID system.&lt;br /&gt;&lt;br /&gt;"Unfortunately, from the biometric sensor the data goes to the hardware secure zone via the operating system. Therefore, the biometric data can be intercepted by the operating system before it is sent to the hardware secure zone," said Sunil Abraham, executive director at Bengaluru-based research organisation, the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt; "The reluctance to make changes at the vendor level are mainly coming from a desire for control of biometric data for strategic and commercial purposes. Privacy and security are bogus reasons," Nilekani said, adding that both ends - the handset and the Aadhaar database -- will use the highest level of encryption.&lt;br /&gt;&lt;br /&gt; Samsung India, which in May launched the Galaxy Tab Iris, a device that uses Aadhaar authentication, said it has taken care that its user's biometric data does not fall into the wrong hands. "We ensure that biometric data is encrypted as per UIDAI specifications in device itself for Galaxy Tab Iris," Sukesh Jain, vice president, Samsung India Electronics, told ET in an email response.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer'&gt;https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-10T13:33:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected">
    <title>Aadhaar security: Here's how your private information can be protected</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected</link>
    <description>
        &lt;b&gt;Lock Aadhaar, and notify UIDAI if you get a one-time-password for a transaction you did not initiate&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/aadhaar-security-here-s-how-your-private-information-can-be-protected-117051000611_1.html"&gt;Business Standard&lt;/a&gt; on May 11, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;The linking of Aadhaar — the 12-digit unique  identification number for Indian residents — across various benefits is  going through a roller-coaster ride. On one hand, the government, keen  to make it mandatory, is linking it with filing of income-tax returns  and benefits. But, on the other, many are uncomfortable with it because  of privacy issues and leakages that have been reported recently. The  Supreme Court, on Tuesday, referred another fresh plea challenging the  Aadhaar Act and its mandatory use in government schemes to a larger  Constitution bench. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;There has been several reports that say that Aadhaar numbers and other  personal data are being leaked. Bengaluru-based Centre for Internet and  Society (CIS) has published a report (titled Information security  practices of Aadhaar, or lack thereof) where it lists four government  departments that have posted Aadhaar numbers and other personal  information of people. According to the report, an estimated 130-135  million Aadhaar numbers and 100 million bank account numbers were posted  on the four portals that the CIS researchers checked. Normally such  data should be kept on the government’s intranet, where only authorised  people can access it. However, a few government departments have  uploaded this data on their websites. In many cases, the data was in  excel format, making it all the more easy for people to download and  misuse it. The worst part: If your data is stolen, you cannot file even a  First Information Report with the police. Only the nodal body, the  Unique Identification Authority of India (UIDAI), can file a police  complaint.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your data can be misused:&lt;/b&gt; Experts say that leakage  of Aadhaar numbers and other personal information into the public domain  violates peoples’ privacy. “Your name, phone number, address, bank  account number and Aadhaar number are personal information. Only you  have the right to decide whether to release such information to others.  Such data shouldn’t be complied in excel sheets in large numbers and be  freely accessible on the internet to everyone," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tele-marketers  and advertisers will have access to the personal information of all  those people. More serious problems such as identity theft can occur.  Says Smitha Krishna Prasad, project manager, Centre for Communication  Governance at National Law University, Delhi: “The more sensitive  information a person has about you, the easier it becomes to impersonate  you when that person is speaking to, say, a bank." The impersonator  could open a bank account or even take a loan in your name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suppose  a hacker gets your email ID. “He will use the ‘password reset or forgot  password’ feature to change your password and get access to your  account. This feature poses questions based on personal info about you.  Any such data collected about you comes useful here. Such hackers mine a  lot of data about potential victims from all possible sources," says  Shomiron Das Gupta of NetMonastery, a threat management provider. In the  email, he could find info about your bank account, credit card account,  etc, and cause financial losses to you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Serious risks can  also arise if someone manages to breach the biometric authentication or  one-time password (OTP) required for using the Aadhaar system. “It is  possible to copy an individual’s fingerprints, and replicate them using  very commonly available resins. It is also possible for hackers to  capture the data being communicated between a telephone tower and a  mobile phone, especially if it is poorly encrypted. This will allow the  hacker to see the OTP. Admittedly, this does require expertise and a  targeted effort vis-a-vis an individual," says Tiwari. Now that the  Aadhaar numbers of so many people have been divulged, someone could  utilise their identities to steal their government-granted benefits, or  obtain a SIM card, which could then be misused. Raman Jit Singh Chima,  policy director, Access Now, says at many places where the Aadhaar  number is required today, no biometric authentication is done. So just  the number can be used to impersonate you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lock your biometrics:&lt;/b&gt; If your Aadhaar number and  other personal information have been leaked, here are a few steps you  can take to safeguard yourself. One, be wary of any calls you receive  asking for additional details, which may not have been leaked already.  Be equally wary if you receive a call wherein someone rattles off your  personal data and asks you to verify it. The caller could pretend to be  calling from your bank. It is best not to reveal or confirm any  information over the phone at all. Two, you have the option to lock your  biometric data online. Even if someone manages to steal your  fingerprint, he will not be able to use it if you have locked your  biometric data (see table). Also, if you get an OTP on your phone for an  Aadhaar utilisation that you did not initiate, notify the UIDAI, and  thus ensure that no transaction is carried out using your Aadhaar  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy law: &lt;/b&gt;To  prevent data leaks in the future, the government needs to sensitise  state government officials who work with Aadhaar data about the need to  protect the its privacy. More importantly, India needs a comprehensive  data protection law. At present, there is limited provision in the  Information Technology Act of 2008 under which you can file a civil case  against a corporate that has leaked your personal information. “The  person affected by data leakage has to show that he has suffered  wrongful loss, or somebody else has enjoyed a wrongful gain, and then  claim compensation," says Prasad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the Radia tapes  incident, the government had said it would pass a comprehensive privacy  law. “This law would lead to the creation of a data protection authority  with enforcement powers, which would be able to penalise both companies  and government bodies violating privacy principles. Despite the process  beginning in 2012-13, and multiple drafts being leaked into the public  domain, there has not been much progress on this count," says Chima. He  adds that when the privacy law becomes a reality, any part of the  Aadhaar Act that is contrary to it should also be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to lock your biometric data online&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Go  to the UIDAI web site: https://uidai.gov.inGo to Aadhaar services, then  Lock/Unlock Biometrics Enter Aadhaar number Enter security code that  appears below the Aadhaar numberYou will receive an OTP on your  registered mobile number. Enter it Click ‘Verify’Click box against  ‘Enable biometric lock’Click on Submit buttonSame procedure can be  repeated to disable biometric lock.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T10:05:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians">
    <title>Aadhaar Remains an Unending Security Nightmare for a Billion Indians</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians</link>
    <description>
        &lt;b&gt;Yesterday was the 38th and last day of hearings in the Supreme Court case challenging the constitutional validity of India’s biometric authentication programme. After weeks of arguments from both sides, the Supreme Court has now reserved the matter for judgement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Karan Saini was published in the &lt;a class="external-link" href="https://thewire.in/government/aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians"&gt;Wire&lt;/a&gt; on May 11, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since its inception, the Aadhaar project has lurched from controversy to scandal. In the last two years, the debate has heavily centred around issues of data security, privacy and government overreach. This debate, unfortunately, like with most things Aadhaar, has been obfuscated in no small part due to the manner in which the Unique Identification Authority of India (UIDAI) reacts to critical public discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As India waits for the apex court’s judgement, this is as good time as any to take stock of the security and privacy flaws underpinning the Aadhaar ecosystem.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Poor security standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Let’s start with the lackadaisical attitude towards information security. As has become evident in the &lt;a href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof/view" target="_blank"&gt;past&lt;/a&gt;, harvesting and collecting Aadhaar numbers – or acquiring scans and prints of valid Aadhaar cards – has become a trivial matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several government websites which implement Aadhaar authentication while at the same time lack in basic security practices such as the use of SSL to encrypt user traffic and/or the use of captchas to protect against brute-force or scraping attacks. This includes the biometric attendance website of the &lt;a href="http://dgftbct.attendance.gov.in/register/myemp" rel="noopener" target="_blank"&gt;Director General of Foreign Trade&lt;/a&gt;, the website for the &lt;a href="http://nfsm.gov.in/dbt/aadhaarverification.aspx" rel="noopener" target="_blank"&gt;National Food Security Mission&lt;/a&gt; and the &lt;a href="http://medleaprhry.gov.in/PvtAddRecord.aspx" rel="noopener" target="_blank"&gt;Medleapr website&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With numerous government websites being susceptible, problematic issues such as the use of open directories to store sensitive data gives us a look into how even the bare minimum – when it comes to adhering to security best practices – isn’t enforced across the gamut of websites which interface with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should not be acceptable practice to have government websites with open web directories containing PDF scans of dozens of Aadhaar cards available for just about anyone to view and/or download. Yet, over the past year and even before, many government websites have been found to either inadvertently or knowingly publish this information without much regard for the potential consequences it could have.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has repeatedly shown an attitude of hostility and dismissiveness when it comes to fixing security and privacy issues which are present in the Aadhaar ecosystem. It has also shown no signs of how it plans to tackle this problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In my personal experience as a security researcher, I have found and reported a cache of more than 40,000 scanned Aadhaar cards being available through an unsecured database managed by a private company, which relied on those scans for the purposes of verifying and maintaining records of their customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s worse is that the media reports regarding Aadhaar information being exposed may only be scratching the surface of the issue as more data may actually be susceptible to access and theft, and simply yet to be found and publicly reported. For example, data could be leaking through publicly available data stores of third-party companies interfacing with Aadhaar, or through inadequately secured API and sensitive portals without proper access controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not all security incidents become a matter of public knowledge, so what we know at any given point about the illegal exposure of Aadhaar information may just be a glimpse of what is actually out there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be acknowledged that the possession of these 12-digit numbers and their corresponding demographic information can open up room for potential fraud –  or at the very least make it easier for criminals to carry out identity theft and SIM and banking fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="https://thewire.in/economy/aadhaar-fraud-uidai" target="_blank"&gt;detailed analysis&lt;/a&gt; of all publicly-reported Aadhaar-related or Aadhaar-enabled fraud over the last few years shows that the problem is not only real but deserves far more attention than what it has received so far.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Threat level infinity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Taking a step back, it’s clear that the Aadhaar project snowballed into an ecosystem that it now struggles to control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, demographic information – as is stated in the draft for the &lt;a href="https://www.uidai.gov.in/images/the_aadhaar_act_2016.pdf" rel="noopener" target="_blank"&gt;Aadhaar Act&lt;/a&gt; (NIDAI Bill 2010) – was originally considered confidential information, meaning no entity could request your demographic information such as name, address, phone number etc. for purposes of eKYC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as the ecosystem has progressed, the implementation and usage of eKYC have also changed and grown significantly with companies like PayTM utilising eKYC for the purposes of requesting and verifying customer information. It should be considered that data which has been collected by any of these companies through Aadhaar can be accessed by them in the future for an indefinite period of time depending on their own policies regarding storage and retention of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there ever is a breach of the CIDR or a mirrored silo containing a significant amount of Aadhaar-related data, it would directly affect more than one billion people. To put this in perspective, it would easily be the single largest breach of data in terms of the sheer number of people affected &lt;i&gt;and&lt;/i&gt; it would have far-reaching consequences for everyone affected which might be very hard to offset.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a comparatively smaller scale – although just as serious, if not more in terms of potential implications – would be a breach of any given state’s resident data hub (SRDH) repository. In some cases, SRDHs &lt;a href="https://www.thenewsminute.com/article/13-lakh-aadhaar-numbers-leaked-andhra-govt-website-linked-personal-details-80178" rel="noopener" target="_blank"&gt;have been known to integrate data&lt;/a&gt; acquired from other sources containing information regarding parameters such as caste, banking details, religion, employment status, salaries, and &lt;a href="https://webcache.googleusercontent.com/search?q=cache:-HMXusc-Nm4J:https://mpsrdh.gov.in/aboutUsCitizen.html+&amp;amp;cd=2&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;client=firefox-b-ab" rel="noopener" target="_blank"&gt;then linking the same&lt;/a&gt; to residents’ corresponding Aadhaar data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Damage control would be costly and painstaking due to the number of people enrolled. What adds to the disastrous consequences is that one cannot just deactivate their Aadhaar or opt-out of the programme the way they would with say a compromised Facebook or Twitter account. You can always deactivate Facebook. You cannot deactivate your Aadhaar. It should be noted that even with biometrics set to ‘disabled’, Aadhaar verification transactions can be verified through OTP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Aadhaar ecosystem is such that information about individuals can be accessed not just from UIDAI servers but also from other third-party databases where Aadhaar numbers are linked with their own respective datasets. Due to this aspect – multiple points of failure are introduced for possible compromise of data, especially because third-party databases are almost certainly not as secure as the CIDR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, after taking a closer look at the ecosystem of websites which incorporate the use of Aadhaar based authentication, I &lt;a href="https://www.karansaini.com/extracting-aadhaar-linked-phone-numbers/" rel="noopener" target="_blank"&gt;discovered that it was possible&lt;/a&gt; to extract the phone number linked to any given Aadhaar through the use of websites which poorly implemented Aadhaar text-based (OTP) authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This process worked by first retrieving the last four digits of the phone number linked to an Aadhaar using any website which reveals this information (this includes DigiLocker, NFSM.gov.in and seems to be standard practice which seems to be enforced by UIDAI) and then performing an enumeration attack on the first six digits using websites which allow the user to provide both their Aadhaar number and the verified phone number linked to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This again highlights that while secure practices might be followed by the UIDAI, the errors in implementation and other flaws are introduced neverthelessby third parties who interface with Aadhaar, posing a risk to the privacy and security of its data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The bank mapper rabbit hole&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As of February 24, 2017, it &lt;a href="https://thewire.in/government/india-inc-needs-to-fix-numerous-basic-%20information-security-flaws-quickly)" target="_blank"&gt;was possible&lt;/a&gt; to retrieve bank linking status information directly from UIDAI’s website without any prior verification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, after this information was reported, the ‘&lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;uidai.gov.in&lt;/a&gt;’ website was updated to first require requesters to prove their identity before retrieving Aadhaar bank-linking data from the endpoint on their website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year later – when business technology news site &lt;i&gt;ZDNet &lt;/i&gt;published their report regarding a flawed API on the website of a state-owned utility company (later revealed to be Indane) – part of the data revealed included bank linking status information which was identical to what was previously revealed on UIDAI’s website without proper authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This suggests that both the Indane API and UIDAI website utilised the National Payments Corporation of India (NPCI) to retrieve bank-linking data – but as of now, this remains conjecture since Indane never put out a statement or gave a public comment regarding the flawed API on their website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, what this also suggests is that the NPCI never placed any controls or security mechanisms (such as request throttling or access controls) on the lookup requests it processed for the UIDAI (and seemingly for Indane as well).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This means that while the UIDAI may have fixed their website to not reveal bank linking data without proper verification – the issue was not rectified at its core by the NPCI – allowing the same to happen a year later in Indane’s case. This practice also classifies as a case of security through obscurity, &lt;a href="http://users.softlab.ntua.gr/~taver/security/secur3.html" rel="noopener" target="_blank"&gt;which&lt;/a&gt; “is the belief that a system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who is on the hook?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is a lack of needed accountability when it comes to data breaches. Have any of the organisations against whom allegations of data breach been made been investigated and acted on? Have fines been imposed on those responsible for allowing access/theft of user data? Have there been reports published by any of the affected organisations in which they investigate any alleged breaches to either provide insight regarding the breach and its impact, the scale of data accessed, logs of access and other crucial evidence or dismiss the allegations by proving that there was no intrusion which took place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the times, organisations do not even accept that a breach has taken place, let alone take responsibility for the same and strive to better protect user data in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Switching to ‘PR spin mode’ should never be the answer when dealing with the data of billion-plus Indian citizens and residents. This can be observed in almost all cases where a breach or security lapse was alleged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also acquired the dubious reputation of sending legal notices and slapping cases on journalists and security researchers who seek to highlight the security and privacy problems ailing the Aadhaar infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March 2017, a case against Sameer Kochhar – chairman of the Skoch Group – was filed on the basis of a complaint from Yashwant Kumar of the UIDAI allegedly for “spreading rumours on the internet about vulnerability of the Aadhaar system”. Kochhar had written an article in February 2017 titled “Is a Deep State at Work to Steal Digital India?” in which a request replay attack on biometric Aadhaar authentication was demonstrated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two months later, The Centre for Internet and Society published a report regarding several government websites which were inadvertently leaking millions of Aadhaar card numbers. A few days after this report was published, the UIDAI &lt;a href="https://in.reuters.com/article/india-aadhaar-breach/critics-of-aadhaar-project-say-they-have-%20been-harassed-put-under-surveillance-idINKCN1FX1SS" rel="noopener" target="_blank"&gt;sent a legal notice to the organisation&lt;/a&gt;, stating that the people involved with the report had to be “brought to justice”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January 2018, an investigative story was published by Rachna Khaira of &lt;em&gt;The Tribune&lt;/em&gt; newspaper – in which she reported that access to an Aadhaar portal was being sold by “agents” for as cheap as Rs 500. In response to this story – the UIDAI first sought to discredit the investigative work by calling it a ‘case of misreporting’ – after which they attempted to downplay the magnitude of the report by citing that biometrics were safe and had not been breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the Delhi crime branch registered an FIR against the reporter and others named in the article on the basis of a complaint by a UIDAI official, with charges ranging from forgery, cheating by impersonation and unauthorised access of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March 2018, &lt;em&gt;ZDNet&lt;/em&gt; published a report about Aadhaar-related data leaking from an unsecured API on a utility provider’s website. This was the result of days of testing to first confirm the existence issue and its scope. It was preempted by more than a month of attempted communication through several channels of communication – email, phone, even direct messages via Twitter – with both Indane and the UIDAI (and even the Indian Consulate in New York).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But still, when the report was published after a lack of acknowledgement/response from affected parties, the UIDAI was quick to deny the report as well as any possibility of such a thing occurring. The Aadhaar agency then released a statement in which they said they were ‘contemplating legal action’ against the publication of their report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data security and privacy laws won’t do much to affect the dismissive and hostile attitude the UIDAI seems to have regarding the people that investigate and report on security and privacy issues relating to Aadhaar.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Hide and seek&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In general, when it comes to reports of security breaches and security incidents, many authorities in India prefer playing the blame-game. This was seen latest in response to an internal letter (ironically marked as ‘SECRET’) that was circulated on social media – which mentioned that data was stolen from the Aadhaar Seeding portal of the EPFO by hackers exploiting a known vulnerability in the Apache Struts framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this – the EPFO &lt;a href="https://economictimes.indiatimes.com/wealth/personal-finance-news/epfo-slams-aadhaar-data-theft-reports-on-social-media/articleshow/63999631.cms?utm_source=WAPusers&amp;amp;utm_medium=whatsappshare&amp;amp;utm_campaign=socialsharebutton&amp;amp;from=mdr" rel="noopener" target="_blank"&gt;quickly switched to PR mode&lt;/a&gt; and publicly issued a statement through their official Twitter account (@socialepfo) denying the breach – saying that “There is no leak from EPFO database. We have already shut down the alleged Aadhaar seeding site run by Common Service Centres on 22.03.2018.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time reports of a potential breach or leak of data circulate, Indian government agencies are quick to come out and announce that no breach has taken place. However, this is always to be taken just on the basis of their saying so, as opposed to the reports which they’re meant to be arguing (in some cases) contain verifiable evidence which is the result of arduous investigative work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regardless, passing around the blame and in cases completely denying security incidents is not something authorities should be doing when it concerns the data of more than a billion people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to a recent story by &lt;em&gt;Asia Times&lt;/em&gt; &lt;a href="https://www.thewire.in/government/cracked-aadhaar-enrolment-software-being-sold" rel="noopener" target="_blank"&gt;regarding Aadhaar enrolment software being cracked and sold&lt;/a&gt;, the UIDAI sought to discredit and discount the report through messages shared on their social media profiles – where they stated that the report was “baseless, false, misleading and irresponsible”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI should have an interest in protecting any and all data which stems from or relates to Aadhaar as it has to do with a project they are ultimately responsible for. It should not matter whether the leak occurred from a portal on EPFO’s website, an API without proper access controls on Indane’s website, a website of the Andhra Pradesh state government, through biometric request replay attacks, through sold access to admin portals and cracked software, or however else. It should ultimately be the UIDAI’s responsibility to not only be reactive about these issues when they’re brought to light but to do so in such a way which does not hinder reporters from continuing their work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, if the UIDAI wishes to keep its systems as secure as they could be – they should proactively seek such reports about flaws or vulnerabilities in critical infrastructure pertaining to their project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In April 2018, the head of the Indian Computer Emergency Response Team (CERT-IN), &lt;a href="https://factordaily.com/vulnerability-reported-cert/" rel="noopener" target="_blank"&gt;rather defensively noted&lt;/a&gt; that “not a single person had reported any incident” to the organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CERT-In, a part of the IT ministry, is the central agency responsible for dealing with security issues and incidents. To put it bluntly, it has not done a very great job of outreach when it comes to the people it ultimately relies on: security researchers and hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, there is an abundance of skills and talent when it comes to IT security and this could be of immense help to organisations responsible for managing critical infrastructure – but only if they cared enough to utilise it to the fullest extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, the CEO of UIDAI,  promised a secure and legal bug reporting environment for the Aadhaar ecosystem sometime in 2017. However, almost a year later, there are no tangible signs of any steps being taken to ensure the same. In fact, the UIDAI would already be straying from their usual course of action if they stopped harassing people reporting on issues of security and privacy with regard to Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been suggested that the UIDAI employ a bug bounty programme – which involves rewarding hackers with monetary compensation or through means such as an addition to a ‘Security Hall of Fame’ as an incentive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I personally believe that there is no need for a bug bounty programme in its traditional sense – meaning that UIDAI should not have to provide material incentives to attract hackers to report valid issues to them. Simply acknowledging the work of those that discover and report valid issues should more than likely be incentive enough to get talent on-board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US Department of Defense (DoD) employs a similar approach &lt;a href="https://www.hackerone.com/sites/default/files/2018-03/Distributed%20Defense-How%20Governments%20Deploy%20Hacker-Powered%20Security.pdf" rel="noopener" target="_blank"&gt;where they invite hackers from the world&lt;/a&gt; over to test their systems for security vulnerabilities/bugs and then report them in a responsible manner. What the hackers get in return is the acknowledgement of their skill and devotion to ensuring the security of DoD’s platform. Something similar needs to be set up with regard to critical information infrastructures in India so that issues can be reported by anyone who wishes to do so – without hassle and/or fear of persecution hanging over the heads of hackers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians'&gt;https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-13T16:28:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/aadhaar-by-numbers">
    <title>Aadhaar by Numbers</title>
    <link>https://cis-india.org/internet-governance/news/aadhaar-by-numbers</link>
    <description>
        &lt;b&gt;Sunil Abraham will be addressing a public seminar at an event organized by National Institute of Public Finance and Policy (NIPFP) in New Delhi on Friday, April 29, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This talk will reflect on several aspects of the Aadhaar project from a technical perspective. First, there will be a reflection on biometrics as a unique, identification and authentication technology. Second, there will be a critique of open washing by the UIDAI through their adoption of free software and open standards and finally there will be an analysis of alternative technical solutions and architecture which will allow India to harvest the benefits of identity management without the harms and risks of centralized biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sunil Abraham&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham (an Ashoka Fellow) is the executive director of the Centre for Internet and Society (CIS), Bangalore/New Delhi. CIS is a 7 year old policy and academic research organisation that focuses on accessibility, access to knowledge, internet governance and  telecommunications. He is also the founder and director of Mahiti, a 17 year old social enterprise that aims to reduce the cost and complexity of ICTs for the voluntary sector by using free software. Starting 2004, for 3 years, Sunil also managed the International Open Source Network, a project of UNDP's APDIP, serving 42 countries in the Asia-Pacific region.  Sunil currently serves on the advisory boards of OSF – Information Programme, Mahiti and Samvada.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The talk reflected on several aspects of the Aadhaar project from a technical perspective.  First, there is a reflection on biometrics as a unique, identification  and authentication technology. Second, there is a critique of open  washing by the UIDAI through their adoption of free software and open  standards and finally there is an analysis of alternative technical  solutions and architecture which will allow India to harvest the benefits of identity management without the harms and risks of centralized biometrics.&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/Y9uOBAqjIMg" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/aadhaar-by-numbers'&gt;https://cis-india.org/internet-governance/news/aadhaar-by-numbers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-11T16:36:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns">
    <title>Aadhaar assurances fail to assuage privacy concerns</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns</link>
    <description>
        &lt;b&gt;While Aadhaar may be secure from external attacks, a failsafe system hasn’t been developed to protect it from Edward Snowden-style leakages and hacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/clV1RHlNttIVTJNkQt8WqM/Aadhaar-assurances-fail-to-assuage-privacy-concerns.html"&gt;published by Livemint &lt;/a&gt;on May 5, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As calls for a privacy and data protection law grow louder with each passing day amid reports of a central government ministry having made up to 130 million Aadhaar numbers public on its website, widespread concerns continue to emerge over loopholes in the security of the unique identification programme, though the man who created the system continues to defend the security and integrity of the system.&lt;br /&gt;&lt;br /&gt;Most worryingly, a consensus is emerging among security and privacy experts, who have argued that while the Aadhaar system may be secure from external attacks, a failsafe system has not been developed to protect it from Edward Snowden-style internal leaks or hacks.&lt;br /&gt;&lt;br /&gt;“(What has been suggested by the Unique Identification Authority of India and Nandan Nilekani) is that there will never be a data breach like what we saw in the US with the National Security Agency, Central Intelligence Agency, or Office of Personnel and Management breaches (data of federal government personnel, including more than 5.6 fingerprints, was leaked), or in Mexico or Turkey, or even in India when the department of defence was breached for cyber-espionage for multiple years without detection,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;“While the system may be secure from external attacks, there is no failsafe system to make it invulnerable to Snowden-style breaches,” he added.&lt;br /&gt;&lt;br /&gt;In an interview, former UIDAI chairman and Infosys Ltd co-founder Nandan Nilekani continued to defend the security of the system and said steps are being taken everyday to enhance the failsafe processes surrounding the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think the Aadhaar system is extremely well-designed. It’s not an online system that is exposed to the Internet. When enrolment happens, the packet is encrypted at source and sent, so that there can’t be a man-in-the-middle attack. And when the authentication happens, that is also encrypted—not compared to the original data, but to a digital minutiae. The point is that the system is very, very secure. So, if the objection is to centralization, then you should not have clouds. Clouds are also centralized,” said Nilekani. He added that Aadhaar was also safe from internal breaches, an assumption that is being challenged by security experts all across.&lt;br /&gt;&lt;br /&gt;“Within seven years of its launch, the Aadhaar system has made a remarkable leap in terms of its security and privacy and it will keep improving things. Technology does not come through immaculate conception, where one morning some perfect technology is born. It has to evolve. It’s called learning by doing,” added Nilekani. He added that improving the security of the system is an ongoing process and conceded that a data protection and privacy law needs to be in place to supplement the current Aadhaar law.&lt;br /&gt;&lt;br /&gt;“I know the government has sent a notice to everyone. If somebody has done it; they ought not to have done it—there’s a law for that,” said Nilekani when asked about recent instances of Aadhaar numbers being made public by government departments.&lt;br /&gt;&lt;br /&gt;“We should have a data protection and privacy law which is an umbrella law, which looks at all these phenomena and certainly Aadhaar should be part of that. That’s perfectly fine—but people are behaving as if Aadhaar is the only reason why we should have a privacy law,” added Nilekani.&lt;br /&gt;&lt;br /&gt;The last few weeks and months have witnessed a steady stream of negative news surrounding Aadhaar and three main cases are currently being fought in the Supreme Court, including one challenging the government’s decision to make the 12-digit ID mandatory for filing income tax returns as well as for obtaining and retaining a PAN Card.&lt;br /&gt;&lt;br /&gt;Meanwhile, as Mint reported in April, questions are being raised on the Aadhaar biometric authentication failure rate in the rural job guarantee scheme in areas such as Telangana.&lt;br /&gt;&lt;br /&gt;The report of Aadhaar numbers being listed on the government ministry website has caused widespread uproar, although a lawyer pointed out that it is not due to a breach in the Aadhaar system.&lt;br /&gt;&lt;br /&gt;“It’s a misnomer to say this a leak because this was voluntarily, very actively put up there. A leak is when some information being kept securely gets breached somehow and comes out. Now, why is this information up on government websites? This is the problem of our government’s perception of transparency...The fact that the Aadhaar numbers are on the government website is not a flaw of the Aadhaar system, but it is a flaw of the understanding of what needs to be done to demonstrate transparency,” said Rahul Matthan, partner at Trilegal.&lt;br /&gt;&lt;br /&gt;In a column in Mint, Matthan had also pointed out that while Aadhaar has been a transformative project, there remains enough scope of misusing the database.&lt;br /&gt;&lt;br /&gt;“There is a legitimate fear that this identity technology will open us all up to discrimination, prejudice and the risk of identity theft,” Matthan wrote. “Aadhaar has given us the tools to harness data in large volumes. If used wisely, this technology can transform the nation. If not, it can cause us untold harm. We need to be prepared for the impending flood of data—we need to build dams, sluice gates and canals in its path so that we can guide its flow to our benefit.”&lt;br /&gt;&lt;br /&gt;Even as both sides debate the issue of Aadhaar’s security, calls are getting louder to revamp the unique identification database.&lt;br /&gt;&lt;br /&gt;“The point is that the UIDAI knows the device ID of the machine with which the biometric transaction took place along with the time and date, which means that by just using basic data analytics, any one with access to the transaction logs from the UIDAI (which have to be kept for a period of 5 years and 6 months) can have a complete view of a person’s Aadhaar-based interactions that are increasing day by day.”&lt;br /&gt;&lt;br /&gt;“Further, the UIDAI has built up a biometric profile of the entire country. This means that courts can order UIDAI to provide law enforcement agencies the biometrics for an entire state (as the Bombay high court did) to check if they match against the fingerprints recovered from a crime scene. This too is surveillance, since it collects biometrics of all residents in advance rather than just that of criminal suspects,” said Prakash of CIS.&lt;br /&gt;&lt;br /&gt;“The UIDAI could have chosen to derive unique 16 digit numbers from your Aadhaar number and provide a different one to each requesting entity. That would have prevented much of these fears. But the UIDAI did not opt for that more privacy-friendly design,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns'&gt;https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:23:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/a2k3-panel-xi-open-access-to-science-and-research">
    <title>A2K3 Panel XI: Open Access to Science and Research</title>
    <link>https://cis-india.org/openness/blog-old/a2k3-panel-xi-open-access-to-science-and-research</link>
    <description>
        &lt;b&gt;Prof. Subbiah Arunachalam participated in the third Access to Knowledge hosted by The Information Society Project (ISP) at Yale Law School between September 8-10, 2008, in Geneva, Switzerland. The conference held at the Geneva International Conference Centre brought together hundreds of decision-makers and experts on global knowledge to discuss the urgent need for policy reforms.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://a2k3.org/2008/09/panel-xi-open-access-to-science-and-research/#more-184"&gt;Original Article on A2K3 website&lt;/a&gt;&lt;/p&gt;
&lt;a href="https://cis-india.org/../../open-access/a2k3/Subbiah%20Arunachalam%20-%20Why%20Do%20We%20Need%20Open%20Access%20to%20Science" class="internal-link" title="Why Do We Need Open Access to Science?: A Developing Country Perspective"&gt;Download Subbiah Arunachalam's Paper&lt;/a&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Audio file of Session on Open Access to Science and Research (&lt;a href="https://cis-india.org/../../open-access/a2k3/Open%20Access%20to%20Science%20and%20Research.ogg" class="external-link"&gt;Ogg&lt;/a&gt;, MP3)&lt;br /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Open access (OA) literature is digital, online, free of charge, and
free of unnecessary copyright and licensing restrictions. Made possible
by the internet and author consent, OA supports wider and faster access
to knowledge. This panel featured &lt;a href="http://www.utsc.utoronto.ca/%7Echan/"&gt;Leslie Chan&lt;/a&gt;, of the University of Toronto; &lt;a href="http://en.wikipedia.org/wiki/Subbiah_Arunachalam"&gt;Subbiah Arunachalam&lt;/a&gt; of the M.S. Swaminathan Research Foundation and Global Knowledge Partnership; &lt;a href="http://www.cet.uct.ac.za/EveGray"&gt;Eve Gray&lt;/a&gt; of the Centre for Educational Technology, UCT; and &lt;a href="http://wikis.bellanet.org/asia-commons/index.php/D._K._Sahu"&gt;DK Sahu&lt;/a&gt; of Medknow Publications Pvt. Ltd. &lt;a href="http://wikis.bellanet.org/asia-commons/index.php/D._K._Sahu"&gt;Peter Suber&lt;/a&gt; from the Yale Information Society Project and SPARC moderated this panel.&lt;/p&gt;
&lt;p&gt;&lt;span id="more-184"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; It’s a distant dream for most kinds of literature, where authors
are unwilling to give up the revenue they currently earn from
publishers. But it’s growing quickly for scholarly journal articles,
where journals don’t pay for articles and authors write for impact, not
for money. The result is a revolutionary opportunity to accelerate
research and share knowledge. OA is especially important for
researchers and medical practitioners in developing countries, where
access to knowledge has been sharply reduced by four decades of
fast-rising journal prices.&lt;/p&gt;
&lt;p&gt;This panel will examine what universities and governments can do to
promote OA, with a special focus on medical research and health
information. Among the models discussed will be peer-reviewed OA
journals, OA repositories, the WHO’s Health InterNetwork Access to
Research Initiative (HINARI), and the new policy from the U.S. National
Institutes of Health requiring NIH-funded researchers to deposit their
peer-reviewed manuscripts in an OA repository.&lt;/p&gt;
&lt;p&gt;The questions to be addressed will include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;    How do access barriers slow research in developing countries?  How does OA remove those barriers?&lt;/li&gt;&lt;li&gt;What can universities do to promote OA?&lt;/li&gt;&lt;li&gt;What can governments, and public funding agencies, do to promote OA?&lt;/li&gt;&lt;li&gt;What special challenges do developing countries face in providing OA?&lt;/li&gt;&lt;li&gt;What are some concrete examples of successful OA policies and projects in developing countries?&lt;/li&gt;&lt;li&gt;Why is OA a critical issue for policy-makers concerned with public health, scientific innovation, and higher education?&lt;/li&gt;&lt;li&gt;How does OA accelerate the advance and spread of knowledge in medicine as well as in other disciplines?&lt;/li&gt;&lt;li&gt;How can OA promote the work of researchers in developing and transitional countries, both as readers and as authors?&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;
&lt;strong&gt;PETER SUBER&lt;/strong&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
OA literature is digital, online, free of charge, free of needless copyright&lt;/li&gt;&lt;li&gt;
OA is compatible with peer review, copyright, revenue and profit, print, preservation, prestige&lt;/li&gt;&lt;li&gt;
3622 peer-reviewed OA journals, 1220 OA repositories, 22 university
OA mandates (15 countries), 27 funding agencies OA mandates (14
countries)&lt;/li&gt;&lt;li&gt;
Part of the problem: journal prices have risen 4 times faser than
inflation since mid-1980s. Indian institute of science is the best
funded research library in india providing access to 10600 serials.&lt;/li&gt;&lt;li&gt;
Harvard has 98990&lt;/li&gt;&lt;li&gt;
Yale has 73900&lt;/li&gt;&lt;li&gt;
Average ARL library = 50,566&lt;/li&gt;&lt;li&gt;
U of Witwatersrand = 29,309&lt;/li&gt;&lt;li&gt;U of Malawi = 17000 ejournals, 95 print&lt;/li&gt;&lt;li&gt;
The case for OA is especially strong for publicly funded research, medical research, research from developing countries&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;SUBBIAH ARUNACHALAM&lt;/strong&gt;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
Why do we needopen access to science?&lt;/li&gt;&lt;li&gt;
Science as Knowledge commons&lt;/li&gt;&lt;li&gt;
Created by researchers, a communal activity, science is about sharing, internet has opened new opportunities&lt;/li&gt;&lt;li&gt;
Primary goal of science is the creation of new knowledge for the benefit of humanity&lt;/li&gt;&lt;li&gt;
Emergence of open access – seeks to restore knowledge commons to creators. Movement, like everything else, is uneven&lt;/li&gt;&lt;li&gt;
Physicists vs. chemists&lt;/li&gt;&lt;li&gt;
UK, Netherlands and USA – have had many more successes&lt;/li&gt;&lt;li&gt;
Brazil – doing very well – but China and India are not doing so well with open access&lt;/li&gt;&lt;li&gt;
Restore the knowledge commons is to the community&lt;/li&gt;&lt;li&gt;
This movement is like any other movement which is uneven&lt;/li&gt;&lt;li&gt;Developments in India&lt;/li&gt;
&lt;ol&gt;&lt;li&gt;3.1% papers in chemical abstracts&lt;/li&gt;&lt;li&gt;30,000 papers a year indexed in SCI&lt;/li&gt;&lt;li&gt;Problems of Access and Visibility&lt;/li&gt;&lt;/ol&gt;
&lt;li&gt;New Developments:&lt;/li&gt;
&lt;ol&gt;&lt;li&gt;Consortia – able to provide a lot of journals&lt;/li&gt;&lt;li&gt;open courseware&lt;/li&gt;&lt;li&gt;arXiv&lt;/li&gt;&lt;/ol&gt;
&lt;li&gt;Problems: papers that are published are put in inaccessible journals,
and people in global South laboratories would be unable to access this
knowledge. The Government gives the money but the research then ends up
flying out&lt;/li&gt;&lt;li&gt;The policy front:&lt;/li&gt;
&lt;ol&gt;&lt;li&gt;Individual efforts&lt;/li&gt;&lt;li&gt;National Knowledge Commission has recommended OA&lt;/li&gt;&lt;li&gt;Number of institutional repositories&lt;/li&gt;&lt;li&gt;Need advocacy and training programmes&lt;/li&gt;&lt;li&gt;Action missing from key players&lt;/li&gt;&lt;/ol&gt;
&lt;li&gt;Some individuals are doing a great job and putting all their materials online&lt;/li&gt;&lt;li&gt;Medical information and developing countries&lt;/li&gt;
&lt;ol&gt;&lt;li&gt;No nation can afford to be without access to S&amp;amp;T research capacity&lt;/li&gt;&lt;li&gt;Neglected diseases are not a priority for pharmaceutical companies&lt;/li&gt;&lt;li&gt;HINARI – any country that has per capita less than $1000 is eligible&lt;/li&gt;&lt;/ol&gt;
&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;DK SAHU&lt;/strong&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
Infectious diseases (chikungunya goes Italian)&lt;/li&gt;&lt;li&gt;
Non-infectious diseases (india becoming global hub for diabetes)&lt;/li&gt;&lt;li&gt;
Industry effects (how safe are clinical trials)&lt;/li&gt;&lt;li&gt;
Several examples (such as MedKnow, Journal of Postgraduate Medicine) of free access to no-fee journals.&lt;/li&gt;&lt;li&gt;
A journal from India has the most visits from London&lt;/li&gt;&lt;li&gt;
A journal called International Journal of Shoulder Surgery but visitors are from Melbourne&lt;/li&gt;&lt;li&gt;
More original research articles, 40+ articles in 2005 vs. 160+
articles in 2008 in IJU, more issues per year for journals, check on
scientific misconduct, international recognition (11 journals in SCI in
2 years)&lt;/li&gt;&lt;li&gt;
Going online increases citations – this is an open access advantage&lt;/li&gt;&lt;li&gt;
Scientific output of new economies: medicine&lt;/li&gt;&lt;li&gt;
Open access publishing is not alone sufficient – there are
disappearing journals. Commercial publishers are taking over, there is
a lack of continuity, non-interoperability/archiving&lt;/li&gt;&lt;li&gt;
20-80 phenomenon (majority of journals are not OA)&lt;/li&gt;&lt;li&gt;
Local journals are not preferred (high IF journals)&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;LESLIE CHAN&lt;/strong&gt;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
Role of Universities and Researchers&lt;/li&gt;&lt;li&gt;
You need citations in order to advance in academia – if your papers
get picked up and ripple throughout the research arena. What about
policy impact?&lt;/li&gt;&lt;li&gt;
“Impact factor” is evil. Open access was meant to counter the tyranny
of impact factor, so OA journals should not try to battle it out in
this arena.&lt;/li&gt;&lt;li&gt;
Issues involve “big science” and “lost science”, research literature
as infrastructure, integrating the gold and green roads to open access.&lt;/li&gt;&lt;li&gt;
Institutional repositories and open access journals&lt;/li&gt;&lt;li&gt;
There’s a lot of Big Science that costs a lot of money (like LHC)&lt;/li&gt;&lt;li&gt;
But we have another big hole – the 10-90Gap. 10% of the global health
research spending is allocated to diseases affecting 90% of the
population&lt;/li&gt;&lt;li&gt;
The G8 countries account for 85% of most cited articles indexed in ISI&lt;/li&gt;&lt;li&gt;
The other 126 countries account for 2.5%&lt;/li&gt;&lt;li&gt;
How much of these journals are relevant in terms of content?&lt;/li&gt;&lt;li&gt;
We are operating with a dominant model of knowledge dissemination from the Center to the Periphery&lt;/li&gt;&lt;li&gt;
We end up having “lost science” in the developing world because of that knowledge&lt;/li&gt;&lt;li&gt;
Perpetuate the cycle of knowledge poverty in this way&lt;/li&gt;&lt;li&gt;
African countries need to have in place appropriate mechanisms and
infrastructure for training and exploitation of knowledge. This will
enable them to make meaningful evidence based policy that pertains to
local needs&lt;/li&gt;&lt;li&gt;
Researchers in developing countries ranked access to subscription-based journals as one of their most pressing problems&lt;/li&gt;&lt;li&gt;
HINARI: health sciences&lt;/li&gt;
&lt;ol&gt;&lt;li&gt;108 countries, 1043 institutions, 5000 journals&lt;/li&gt;&lt;li&gt;Collaboration of &amp;gt;45 publishers: free or reduced-cost access to journals for developing countries&lt;/li&gt;&lt;li&gt;Others: eIFL.net, AGORA: agricultural sciences, OERE: environmental sciences, PERI&lt;/li&gt;&lt;li&gt;Dissemination through information philanthropy. http://libraryconnect.elsevier.com/lcp/1001/lcp100109.html&lt;/li&gt;&lt;/ol&gt;
&lt;li&gt;Open access: the solution to the “lost science”&lt;/li&gt;&lt;li&gt;Two routes to Open Access (OA) – open access journals and respositories&lt;/li&gt;&lt;li&gt;African health sciences: two years ago there was a n article
published in this journal and authors found that over 50% of these
drugs were substandard or fake. This got the local newspaper, and then
BBC, and then other researchers started looking at it&lt;/li&gt;&lt;li&gt;Open Access repositories:&lt;/li&gt;&lt;li&gt;Institutionally-based (universities, etc) or subject-based (e.g. PubMet Central, arXiv.org)&lt;/li&gt;&lt;li&gt;Collect copies of articles published by the institutions researchers&lt;/li&gt;&lt;li&gt;Researchers themselves  deposit knowledge&lt;/li&gt;&lt;li&gt;Benefits for authors (research output instantly accessible for all (higher impact)&lt;/li&gt;&lt;li&gt;Research output of international research community accessible to author&lt;/li&gt;&lt;li&gt;Partnerships/collaborative projects develop as a result&lt;/li&gt;&lt;li&gt;Career prospects advanced – publications noted by authorities&lt;/li&gt;&lt;li&gt;Opportunities for new research discoveries, data mining etc&lt;/li&gt;&lt;li&gt;Alternative impact assessment&lt;/li&gt;&lt;li&gt;Benefits for funding bodies: what has been discovered with our financial support? Was it a good investment?&lt;/li&gt;&lt;li&gt;Researchers have a moral and intellectual obligation to ensure that their research is accessible&lt;/li&gt;&lt;li&gt;Universities share a common goal and public mission advancement of knowledge for the betterment of human kind&lt;/li&gt;&lt;li&gt;Open access is key to the MDG&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;&lt;strong&gt;EVE GRAY&lt;/strong&gt;&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
When we talk about open access, we talk about change and change delivery.&lt;/li&gt;&lt;li&gt;It’s not just intellectual property and copyright issues, but values,
cultures, systems, practices, everything that underlie the process
moving towards scientific research&lt;/li&gt;&lt;li&gt;We faced the biggest problem in facing change – we’ve seen a massive
overhaul, of transformative reports, of leveraging the country into a
different direction. Undoing the damage of apartheid and colonialism&lt;/li&gt;&lt;li&gt;What is meant by international? What is meant by local?&lt;/li&gt;&lt;li&gt;African knowledge for Africa: we need to rejuvenate, regenerate our own knowledge&lt;/li&gt;&lt;li&gt;SA: first heart transplant in the world. Have their own vaccines. Operate as a leading scientific country&lt;/li&gt;&lt;li&gt;Growing international competitiveness – publication is perceived as a
matter of journal articles in international journals. Little or no
support for publication in nationally-based publications&lt;/li&gt;&lt;li&gt;Much research output in grey literature, not easily findable or accessible&lt;/li&gt;&lt;li&gt;The Medicines and Related Substances Control Act, 2001&lt;/li&gt;&lt;li&gt;Research has to address the burning economic issues of a country&lt;/li&gt;&lt;li&gt;Things are changing…slowly&lt;/li&gt;&lt;li&gt;Support for open access publications&lt;/li&gt;&lt;li&gt;What needs to be done – open access journals are necessary.&lt;/li&gt;&lt;li&gt;Changing values and promotion systems – we have to somehow pick up on
the vision of that vibrant African dance movement, translate this
feeling&lt;/li&gt;&lt;li&gt;Providing support for publication efforts&lt;/li&gt;&lt;li&gt;Expand the range of publication outputs&lt;/li&gt;&lt;li&gt;Ensuring the social impact of research&lt;/li&gt;&lt;li&gt;There is a huge amount of research being pumped out and being printed out by NGOs&lt;/li&gt;&lt;li&gt;Great literature is almost inaccessible in universities&lt;/li&gt;&lt;li&gt;Could not access African journals – no access from their own countries or neighboring countries&lt;/li&gt;&lt;li&gt;Electric Book Works has manuals for health-care workers – manuals are very high-quality, out of University of Cape Town&lt;/li&gt;&lt;li&gt;Often forgotten that science information is necessary to trickle
down, if everything is online, we can get things to trickle down&lt;/li&gt;&lt;li&gt;Harvard said: it is our duty to disseminate our research. Stanford:
Caroline Handy – when you publish research, research for community use
is part of the duty&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/a2k3-panel-xi-open-access-to-science-and-research'&gt;https://cis-india.org/openness/blog-old/a2k3-panel-xi-open-access-to-science-and-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-08-18T05:07:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1">
    <title>A Workshop on "Exploring the Internals of Mobile Technologies"</title>
    <link>https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites all individuals interested in investigating and exploring the internal of the Mobile/Hardware Technologies and understanding of capabilities of mobile phones to join our workshop on Saturday, October 27, 2012, at the TERI Southern Regional Centre.&lt;/b&gt;
        &lt;p&gt;&lt;b id="internal-source-marker_0.38347873743623495"&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="internal-source-marker_0.38347873743623495"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Objective:&lt;/b&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Bringing together the technical/hacker community and individuals interested in mobile devices to explore mobile devices internals and capabilities&lt;/p&gt;
&lt;h3&gt;Scope of Conference and Workshop:&lt;/h3&gt;
&lt;div&gt;Our proposed topics/areas which we hope to have discussions on are:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Hardware Hacking (Board/Chips Capabilities)&lt;/li&gt;
&lt;li&gt;Operating System Internals (Hardware/OS Interfacing)&lt;/li&gt;
&lt;li&gt;Software Development Kit (MRE, etc.)&lt;/li&gt;
&lt;li&gt;Forensic Analysis&lt;/li&gt;
&lt;li&gt;Understanding of Mobile as Telecommunication Device (2G/3G, etc.)&lt;/li&gt;
&lt;li&gt;Understanding Mobile/Devices Internals&lt;/li&gt;
&lt;li&gt;Working with JTAG/UART Ports&lt;/li&gt;
&lt;li&gt;Porting Open Softwares on Mobiles/Hardwares&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Expected outcomes:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Understanding of mobile devices internals and capabilities&lt;/li&gt;
&lt;li&gt;Documenting mobile devices capabilities and internals&lt;/li&gt;
&lt;li&gt;Publishing of blogs on knowledge generated&lt;/li&gt;
&lt;li&gt;Exploration/Speculation on research/development avenues&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Agenda &lt;/b&gt;&lt;/h3&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;I. Core Talks&lt;/b&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee: &lt;br /&gt;Time: 9:00 - 9:30 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;1. Arduino Board Capabilities and Playing Around It!&lt;/b&gt;&lt;br /&gt;Objective: Understanding Arduino board capabilities and playing with it&lt;br /&gt;Speaker: Sudar Muthu&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 9:30 - 10:30 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;2. Initiatives@CIS&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discussing the research initiative that has led CIS to become interested in mobile device internals and capabilities&lt;br /&gt;Speaker: Jadine Lannon&lt;br /&gt;Level: Introduction&lt;br /&gt;Duration: 10-15 Minutes&lt;br /&gt;Time: 10:30 - 10:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;3. Mobile Hacking Through Linux Drivers&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Understanding the Linux kernel &amp;amp; driver internals from the perspective of reverse engineering&lt;br /&gt;Speaker: Anil Kumar Pugalia&lt;br /&gt;Level: Intermediate to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 10:45 - 11:45 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;4. Hardware Hacking (Board/Chips Capabilities)&lt;br /&gt;&lt;/b&gt;
&lt;p class="normal"&gt;Objective: Discuss and explore key areas of mobile hardware&lt;br /&gt;(power, clock, pin multiplexing, peripherals, etc.)&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Introductory to Advanced&lt;br /&gt;Duration: 1 Hour&lt;br /&gt;Time: 11:45 - 12:45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lunch Time&lt;br /&gt;Time: 12:45 - 1:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;5. Porting Open Software on Hardware&lt;/b&gt;&lt;br /&gt;Objective:&lt;br /&gt;Cover porting examples for each type of peripherals&lt;br /&gt;Cover Android and Linux bringup as an example&lt;br /&gt;Speaker: Khasim Syed Mohammed&lt;br /&gt;Level: Intermediate to Advance&lt;br /&gt; Duration: 2 Hours&lt;br /&gt;Time: 1:30 - 3:30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: left; "&gt;&lt;b&gt;II.&lt;/b&gt;&lt;b&gt;Community Knowledge Sharing/Hacking! &lt;/b&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Time: 3.30 to 5.30 p.m.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;5. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="normal"&gt;&lt;b&gt;6. Free Slot&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tea/Coffee Time&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;7. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;8. Free Slot&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;p dir="ltr"&gt;&lt;span class="Apple-tab-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;We are inviting community members to take up &lt;b&gt;Free Slots &lt;/b&gt;to share their knowledge in this section. In this section, any person can propose a talk, workshop, or speculation about any device for a duration 30 minutes to 1 hour, as long as the topic falls within broader scope of the focus areas described at the in the “Scope of the Conference and Workshop” section of the workshop objectives.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Venue, Dates and Logistics&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The event will take place on Saturday, October 27, 2012, at the following address:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="internal-source-marker_0.6882451646961272" style="text-align: start; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;TERI Southern Regional Centre&lt;br /&gt;4th Main, Domlur II Stage &lt;br /&gt;Bangalore - 560 071 &lt;br /&gt;Karnataka&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The event will be begin at 9 a.m. on Saturday and end in the evening around 5 p.m. Lunch and snacks will be provided by CIS.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Available Resources:&lt;br /&gt;&lt;/b&gt;CIS has purchased 12 gray-market mobile phones with the intent to document as much information about the life-cycles, hardware, software and content of each phone as possible. We request that the producers, make and model of each device be kept anonymous in discussions/publications that take place outside of the workshop.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 class="normal" style="text-align: justify; "&gt;The Speakers&lt;/h3&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;1. Anil Kumar Pugalia&lt;/b&gt;&lt;br /&gt;The author is a freelance trainer in Linux internals, Linux device drivers, embedded Linux &amp;amp; related topics. Prior to this, he was at Intel and Nvidia. He has been working with Linux since 1994. A gold medallist from IISc, Linux &amp;amp; knowledge sharing are two of his many passions. Creating and playing with open source hardware is one of his hobbies, which he materializes through his company eSrijan, which can be accessed at:&lt;a href="http://profession.sarika-pugs.com/"&gt;&lt;br /&gt;Website: &lt;/a&gt;&lt;a href="http://profession.sarika-pugs.com/"&gt;http://profession.sarika-pugs.com/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt; 2. Jadine Lannon&lt;/b&gt;&lt;br /&gt;Jadine is a research intern at the Centre for Internet and Society. She is currently working on the “Pervasive Technologies: Access to Knowledge in the Marketplace” research project. More information on the research project can be found here: &lt;a href="https://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place"&gt;http://cis-india.org/a2k/pervasive-technologies-access-to-knowledge-in-the-market-place&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;3. Khasim Syed Mohammed&lt;/b&gt;&lt;br /&gt;Khasim leads Open Hardware and Software Initiatives at Texas Instruments. Blog: &lt;a href="http://www.khasim.in/"&gt;http://www.khasim.in/&lt;/a&gt;; &lt;a href="http://khasim.blogspot.in/"&gt;http://khasim.blogspot.in/&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;4. Sudar Muthu&lt;/b&gt;&lt;br /&gt;Sudar does open hardware as hobby; Arudino is his playground. He is passionate about programming (particularly web-based) and loves to design and build web sites/services from scratch. AJAX, Web2.0, Semantic Web, Comet, RDF or any of those latest buzz-field jargons.&lt;/p&gt;
&lt;p class="normal"&gt;Blog: &lt;a href="http://sudarmuthu.com/"&gt;http://SudarMuthu.com&lt;/a&gt;; &lt;a href="http://hardwarefun.com/"&gt;http://hardwarefun.com&lt;/a&gt;; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Supporting Communities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NULL: &lt;a href="http://null.co.in/"&gt;http://null.co.in/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;SecurityXploaded: &lt;a href="http://securityxploded.com/"&gt;http://securityxploded.com/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Computer Club India: &lt;a href="http://computerclub.in/Main_Page"&gt;http://computerclub.in/Main_Page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;b&gt;Register at:&lt;/b&gt;&lt;a href="https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ"&gt; https://docs.google.com/spreadsheet/viewform?fromEmail=true&amp;amp;formkey=dG1UcHBYR2xRLWhPZ0QwVWlaaEg0SXc6MQ&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1'&gt;https://cis-india.org/a2k/events/workshop-exploring-the-internals-of-mobile-technologies-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-10-25T06:52:50Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait">
    <title>A Wikipedia Workshop at NMAIT</title>
    <link>https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Delhi collaborated with Metawings Institute to spread the words about Wikipedia for Indian languages. A one-day workshop was organized to educated the students on contributing to Wikipedia on December 21, 2012. About 170 engineering students took part in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop began with interaction with the students about their understanding. I asked few questions like what is Wikipedia, who edits articles on Wikipedia, is it paid or free, did they ever try to edit Wikipedia, etc. I took them through a presentation to explain basics of Wikipedia, five pillars, notability and copyright issues related to vandalism. One of the students were called to create his user account. Students were showed the simpler sign up process. To explain how articles are edited we introduced errors in the article on Bengaluru and &lt;a href="http://en.wikipedia.org/w/index.php?title=Bangalore&amp;amp;diff=529072240&amp;amp;oldid=529071146"&gt;made it the capital of India for few minutes&lt;/a&gt;! Students were explained how Wikipedia editors correct mistakes like these in real time and correct facts are published in Wikipedia. A majority of the students asked about the authenticity of articles which is open to anyone. So I got a chance to refresh the page and show how the error introduced was reverted within a few minutes.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/openness/blog-old/ParticipantsatKarkala.png" alt="Participants at Karkala" class="image-inline" title="Participants at Karkala" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Above is a picture of the participants from the Wikipedia Workshop at Karkala&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The session went on with such interaction and students were explained more about the importance of citing references to add credibility to the facts they can add on Wikipedia articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also had Dr. Ashok Kumar, prof, Computer science department, a wikipedian and columnist for Kannada newspaper &lt;a href="http://www.udayavani.com/"&gt;Udaya Vani&lt;/a&gt;. Dr. Kumar &lt;a href="http://meta.wikimedia.org/wiki/File:Wikipedia_Outreach_Document_-_Kannada.pdf"&gt;introduced&lt;/a&gt; Kannada Wikipedia to the students. At the end of the session I had a discussion with him about organizing more workshops for Kannada Wikipedia and supporting participant students. Special thanks to &lt;a href="http://www.metawinggroups.com/"&gt;Metawings&lt;/a&gt; for finding the venue and supporting for the event.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait'&gt;https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-01-04T16:30:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/a-wikipedia-presentation-at-goa">
    <title>A Wikipedia Presentation at BITS, Goa</title>
    <link>https://cis-india.org/openness/blog-old/a-wikipedia-presentation-at-goa</link>
    <description>
        &lt;b&gt;Quark is one of India's largest science, technology and management festivals, held every February at BITS Pilani - K.K. Birla Goa Campus. This year in 2015, the event was held from February 6 to 8, 2015. This blog post captures the key moments. About 12 delegates attended the event.&lt;/b&gt;
        &lt;h3&gt;How it Started?&lt;/h3&gt;
&lt;p&gt;For celebrating this annual event, "Quark 2015", &lt;a class="external-link" href="http://www.bits-pilani.ac.in/goa/"&gt;BITS Pilani&lt;/a&gt; invited speakers from all over India. Many parallel tracks happen during this event. I got an Invite to speak about Wikimedia projects.The Centre for Internet and Society (CIS) supported my event participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Sunil Kumar, a BITS physics professor who could not join the presentation due to conflicting meetings met me in the morning that day. He was curious to understand how Wikimedia projects work, how people collaborate to write the same article, how the conflicting views gets resolved among editors and how one can trust the content. He was excited to know the mechanics behind. We discussed about organizing a quiz for their students. He responded very positive and said that he will discuss this internally and get back to me later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS team also helped me to establish contact with Luis Gomes, a local Konkani Wikipedian. We met at the event and shared our thoughts. It was a good learning for me to understand how Konkani Wikipedia is progressing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I gave my speech in the afternoon. The participants showed great enthusiasm to learn about Wikipedia projects. The session was very interactive. The participants tried answering open ended questions like — As on today, what are the possible ways to preserve unique knowledge and skill? The participants also asked questions on the source of knowledge contribution to Wikipedia and how it survives?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://prezi.com/a2qogoowdy2a/wikimedia-projects/"&gt;My presentation&lt;/a&gt; showcased how anyone could contribute to Wikipedia and also explore greater possibilities of exploring existing frame work with examples like &lt;a class="external-link" href="http://qrpedia.org/"&gt;QRpedia&lt;/a&gt;, &lt;a class="external-link" href="http://www.wikiwand.com/"&gt;WikiWand&lt;/a&gt;, and many more.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/a-wikipedia-presentation-at-goa'&gt;https://cis-india.org/openness/blog-old/a-wikipedia-presentation-at-goa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Radhakrishna Arvapally</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2015-03-09T01:21:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/mini-hackathon-delhi">
    <title>A Wikipedia Mini-hackathon in Delhi</title>
    <link>https://cis-india.org/openness/blog-old/mini-hackathon-delhi</link>
    <description>
        &lt;b&gt;Wikipedian Yuvaraj Pandian visited the CIS office in Delhi and helped the Access to Knowledge team conduct a super-ad-hoc mini-hackathon with two other volunteers, Sheel from Delhi and Harsh from Ahmedabad. The aim was to get them a kickstart in developing userscripts/gadgets, and get them to a point where the prior existing documentation makes sense to them. &lt;/b&gt;
        &lt;p&gt;The ad-hoc plan had three parts:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The execution environment (Concept of userscripts vs gadgets, ResourceLoader)&lt;/li&gt;
&lt;li&gt;The API concepts (Special:ApiSandbox, concept of 'actions' in the API)&lt;/li&gt;
&lt;li&gt;Accessing the API from JS (mediawiki.api module, concept of AJAX)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Here is the account of what they did, written by Yuvi:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We covered all parts of them slowly, with both Harsh and Sheel working at things until they fully understood what they were doing and why whatever they were doing was working.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I introduced them to the environment first by having them execute code in Chrome's JS Console, and then in their own common.js. Once they understood the context in which the code was getting executed, the 'ResourceLoader default modules'&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;documentation started making sense to them, and they could pick up other modules from there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We then explored the API via the API Sandbox&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;, which is a relatively new (and not very well known) way of letting people play around with the API. It is a massive improvement over the older, non-interactive docs&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;, and both Harsh and Sheel were very excited about being able to discover all the things they could do with the API. A fair amount of time was spent messing around with it on different wikipedias (en, hi and gu) and reading bits of the API Documentation&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; to understand the concepts behind the actions - and for filling in the gaps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally we had them use the API from a userscript to make calls. I went through the entire process line by line, explaining how AJAX works and how asynchronous programming works. We traced the flow of code together to understand how the seamingly nonlinear asynchronous programming model works. Then we dug into a bit of how to use the mw.loader module to make dependencies work, and why the same code that was working in the chrome js console was not working in their common.js.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It ended with them trying to port HotCat to their native language wikipedias. Harsh started to explore more about getting started with MediaWiki dev itself (rather than just gadgets), but the clone took a looooong time and we had run out of time by then. I directed him to a WMF tech open chat happening today, and hopefully that could help!&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].&lt;a class="external-link" href="https://www.mediawiki.org/wiki/ResourceLoader/Default_modules"&gt;https://www.mediawiki.org/wiki/ResourceLoader/Default_modules&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].&lt;a class="external-link" href="https://en.wikipedia.org/wiki/Special:ApiSandbox"&gt;https://en.wikipedia.org/wiki/Special:ApiSandbox&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].&lt;a class="external-link" href="https://en.wikipedia.org/w/api.php"&gt;https://en.wikipedia.org/w/api.php&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].&lt;a class="external-link" href="https://www.mediawiki.org/wiki/API:Main_page"&gt;https://www.mediawiki.org/wiki/API:Main_page&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/mini-hackathon-delhi'&gt;https://cis-india.org/openness/blog-old/mini-hackathon-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Yuvraj Pandian</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-12-04T07:31:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind">
    <title>A Treat for the Blind</title>
    <link>https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind</link>
    <description>
        &lt;b&gt;The WIPO treaty will provide copyright exceptions on books making them available to blind people in formats they can use.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Chitra Narayanan was &lt;a class="external-link" href="http://www.businessworld.in/en/storypage/-/bw/a-treat-for-the-blind/r959485.0/page/0"&gt;published in Business World&lt;/a&gt; on June 26, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For  millions of visually impaired people around the globe, it’s a landmark  treaty that could open up the kingdom of books for them. After days of  intense deliberations at Marrakesh in Morrocco, about 600 World  Intellectual Property Organisation (Wipo) negotiators, including  delegates from India, reached a consensus on a treaty that will provide  copyright exceptions on books making them available to blind people in  formats they can use.&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify; "&gt;
&lt;div&gt;Wipo,  a United Nations agency, is dedicated to the use of intellectual   property as a means of stimulating innovation and creativity. The agency   has 186 member states.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;Sure, content is king. But for  the visually impaired, the right platform for accessing content is what  makes the difference. Thanks to audio books, a host of apps, and digital  platforms such as Bookshare, which provides content in accessible  formats, the technology is already there to bring the rich world of  'hardcovers' and 'paperbacks' alive for those who cannot see. What’s  more, these books are compatible with all kinds of devices from mobile  phones to tablets to PCs.&lt;br /&gt; &lt;br /&gt;Now, at last, there is legal sanction  as well to content that was not being made available in accessible  formats by the copyrights holders. For the 15 million people who are  blind in India, the treaty is expected to open education doors as well  as provide entertainment needs. India has the world’s largest number of  blind people.&lt;br /&gt; &lt;br /&gt;Bangalore-based Centre for Internet Society, a  policy research organisation, has been at the forefront of negotiations  at WIPO to get the treaty through. Minutes after the session concluded,  Pranesh Prakash, policy Director at CIS and his colleague Sunil Abraham  were tweeting ecstatically about the “win”.&lt;br /&gt;&lt;br /&gt;For five long years,  this Wipo treaty has witnessed contentious discussions on issues such as  including exports of copyrighted works, translations of copyrighted  works and so on. According to Prakash, who responded over twitter, “On  Exports we won, but re-exports which was earlier permitted has become  much more difficult.”&lt;br /&gt; &lt;br /&gt;There are also other grainy areas such as  commercial availability of the books. According to a post on the  Intellectual Property Watch website, soon after the agreement was  reached, commercial availability still stands under Article 4 (National  Law Limitations and Exceptions on Accessible Format Copies) but has  disappeared from Article 5 (cross border exchange of accessible format  copies).&lt;br /&gt; &lt;br /&gt;Although blind music legend Stevie Wonder, one of the  most ardent supporters of the treaty, must be crooning Signed, Sealed,  Delivered... it’s early days yet. The draft of the treaty has to be  ratified by governments before being adopted.&lt;br /&gt; &lt;br /&gt;But for five long  years, it has been a long hard battle between copyright owners and those  fighting for human rights of the visually impaired. Finally, as one  observer, put it: 'a rare victory is in sight for human rights'.&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind'&gt;https://cis-india.org/news/business-world-june-26-2013-chitra-narayanan-a-treat-for-the-blind&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-07-11T06:02:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/charlotte-lapsansky-talk">
    <title>A Talk by Charlotte Lapsansky</title>
    <link>https://cis-india.org/events/charlotte-lapsansky-talk</link>
    <description>
        &lt;b&gt;Charlotte Lapsansky will give a lecture on the "Mobile Voices project" at the Centre for Internet and Society, Bangalore on Thursday, 16 September 2010. &lt;/b&gt;
        
&lt;p&gt;Mobile Voices is an academic-community partnership to research and design a platform for low-wage immigrants in LA to publish stories about their lives and their communities directly from their mobile phones. This low-cost, open source, customizable, and easy to deploy multimedia mobile storytelling platform will be designed in collaboration with its users, and will help recent immigrants who lack computer access gain greater participation in the digital public sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Charlotte will describe the Mobile Voices project and discuss key themes that have arisen for the Mobile Voices project team, including participatory technology design, community digital storytelling, and digital inclusion through mobile-phone based platforms. She will then describe the key technological and social issues that have arisen in the process of adapting Mobile Voices for India and the opportunities and challenges this presents.&lt;/p&gt;
&lt;h2&gt;About Charlotte Lapsansky&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Charlotte_Lecture.jpg/image_preview" alt="Charlotte" class="image-inline image-inline" title="Charlotte" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Charlotte Lapsansky&lt;/strong&gt; is a PhD Candidate and American Association of University Women Dissertation Fellow at the Annenberg School for Communication at the University of Southern California. Charlotte has a background in development communication and mass media campaigns addressing gender and health in India. At Annenberg, her research interests include communication for social change, participatory development communications, community mobilization and strategic campaign planning. For the past two years, she has been a team member for Mobile Voices, a participatory project which has created a Drupal-based digital storytelling platform for first-generation, low-wage migrant workers in Los Angeles, allowing them to create and publish stories about their communities directly from their mobile phones. &amp;nbsp;Currently, Charlotte is collaborating with organizations in India to customize and adapt the mobile voices platform social endeavours in India. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHrycA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsE8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsTgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKH%2BD0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIm3UA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInF4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInR8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIomIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKI9FQA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/charlotte-lapsansky-talk'&gt;https://cis-india.org/events/charlotte-lapsansky-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-22T07:41:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
