<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 951 to 965.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/big-data-compilation.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/better-understanding-of-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you">
    <title>BigDog is Watching You! The Sci-fi Future of Animal and Insect Drones</title>
    <link>https://cis-india.org/internet-governance/blog/big-dog-is-watching-you</link>
    <description>
        &lt;b&gt;Do you think robotic aeroplanes monitoring us are scary enough? Wait until you read about DARPA´s new innovative and subtle way to keep us all under the microscope! This blog post presents a new reality of drones which is depicted in none other than animal and insect-like robots, equipped with cameras and other surveillance technologies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Just when we thought we had seen it all, the US Defence Advanced Research Projects Agency (DARPA) funded another controversial surveillance project which makes even the most bizarre sci-fi movie seem like a pleasant fairy-tale in comparison to what we are facing: animal and insect drones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Up until recently, unmanned aerial vehicles (UAVs), otherwise called drones, depicted the scary reality of surveillance, as robotic pilot-less planes have been swarming the skies, while monitoring large amounts of data without people´s knowledge or consent. Today, DARPA has come up with more subtle forms of surveillance: animal and insect drones. Clearly animal and insect-like drones have a much better camouflage than aeroplanes, especially since they are able to go to places and obtain data that mainstream UAVs can not.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;India´s ´DARPA´, the Defence Research and Development Organisation (DRDO), has been creating &lt;a href="http://www.indiastrategic.in/topstories1369_Unmanned_Aerial_Vehicle.htm"&gt;&lt;span&gt;UAVs&lt;/span&gt;&lt;/a&gt; over the last ten years, while the Indian Army first acquired UAVs from Israel in the late 1990s. Yet the use of all UAVs in India is still poorly regulated! Drones in the U.S. are regulated by the &lt;a href="http://www.faa.gov/"&gt;&lt;span&gt;Federal Aviation Administration (FAA)&lt;/span&gt;&lt;/a&gt;, whilst the &lt;a href="https://www.easa.europa.eu/what-we-do.php"&gt;&lt;span&gt;European Aviation Safety Agency (EASA)&lt;/span&gt;&lt;/a&gt; regulates drones in the European Union. In India, the &lt;a href="http://www.civilaviation.gov.in/MocaEx/faces/index.html;jsessionid=BLvyRvDp2NJzl4Q264fTNkXdynJkvJGF6bK1rSJtCrcJzwq1pym2!-750232318?_adf.ctrl-state=buu3l8xph_4"&gt;&lt;span&gt;Ministry of Civil Aviation&lt;/span&gt;&lt;/a&gt; regulates drones, whilst the government is moving ahead with plans to&lt;a href="http://indiatoday.intoday.in/story/aviation-ministry-moots-to-replace-dgca-with-a-super-regulator/1/224097.html"&gt;&lt;span&gt; replace the Directorate General of Civil Aviation (DGCA)&lt;/span&gt;&lt;/a&gt; with a Civil Aviation Authority. However, current Indian aviation laws are vague in regards to data acquired, shared and retained, thus not only posing a threat to individual´s right to privacy and other human rights, but also enabling the creation of a secret surveillance state.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The DRDO appears to be following DARPA´s footsteps in terms of surveillance technologies and the questions which arise are: will animal and insect drones be employed in India in the future? If so, how will they be regulated?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;BigDog/LS3&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/40gECrmuCaU" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Apparently having UAVs flying above us and monitoring territories and populations without our knowledge or consent was not enough. DARPA is currently funding the &lt;a href="http://defensetech.org/2012/02/08/video-the-latest-terrifying-drone-dog/"&gt;BigDog project&lt;/a&gt;, which is none other than a drone dog, a four-legged robot equipped with a camera and capable of surveillance in disguise. DARPA and Boston Dynamics are working on the latest version of BigDog, called the &lt;a href="http://www.darpa.mil/Our_Work/TTO/Programs/Legged_Squad_Support_System_%28LS3%29.aspx"&gt;Legged Squad Support System (LS3)&lt;/a&gt;, which can carry 400 pounds of gear for more than 20 miles without refuelling. Not only can the LS3 walk and run on all types of surfaces, including ice and snow, but it also has ´vision sensors´ which enable it to autonomously maneuver around obstacles and follow soldiers in the battle field. The LS3 is expected to respond to soldiers' voice commands, such as 'come', 'stop' and 'sit', as well as serve as a battery charger for electronic devices.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;BigDog/LS3 is undoubtedly an impressive technological advancement in terms of aiding squads with surveillance, strategic management and a mobile auxiliary power source, as well as by carrying gear. Over the last century most technological developments have manifested through the military and have later been integrated in societies. Many questions arise around the BigDog/LS3 and its potential future use by governments for non-military purposes. Although UAVs were initially used for strictly military purposes, they are currently also being used by governments on an international level for &lt;a href="http://www.nasa.gov/centers/dryden/pdf/111760main_UAV_Assessment_Report_Overview.pdf"&gt;civil purposes&lt;/a&gt;, such as to monitor climate change and extinct animals, as well as to surveille populations. Is it a matter of time before BigDog is used by governments for ´civil purposes´ too? Will robotic dogs swarm cities in the future to provide ´security´?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Like any other surveillance technology, the LS3 should be legally regulated and current lack of regulation could create a potential for abuse. Is authorisation required to use a LS3? If so, who has the legal right to authorise its use? Under what conditions can authorisation be granted and for how long? What kind of data can legally be obtained and under what conditions? Who has the legal authority to access such data? Can data be retained and if so, for how long and under what conditions? Do individuals have the right to be informed about the data withheld about them? Just because it´s a ´dog´ should not imply its non-regulation. This four-legged robot has extremely intrusive surveillance capabilities which may breach the right to privacy and other human rights when left unregulated.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Humming Bird Drone&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/hummingbirddronepic.png/@@images/f6c4be7f-597d-4909-914e-6470256cb1c9.png" style="text-align: justify; " title="Humming bird drone" class="image-inline" alt="Humming bird drone" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source:&lt;a class="external-link" href="http://www.hightech-edge.com/aerovironment-nano-humming-bird-flapping-wing-uav-video-clip/10309/"&gt; HighTech Edge&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;TIME magazine recognised DARPA for its Hummingbird nano air vehicle (NAV) and named the drone bird&lt;a href="http://www.darpa.mil/newsevents/releases/2011/11/24.aspx"&gt;&lt;span&gt; one of the 50 best inventions of 2011&lt;/span&gt;&lt;/a&gt;. True, it is rather impressive to create a robot which looks like a bird, behaves like a bird, but serves as a secret spy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;During the presentation of the humming bird drone, &lt;a href="http://www.ted.com/talks/regina_dugan_from_mach_20_glider_to_humming_bird_drone.html"&gt;&lt;span&gt;Regina Dugan&lt;/span&gt;&lt;/a&gt;, former Director of DARPA, stated:&lt;/p&gt;
&lt;p class="callout" dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt;Since we took to the sky, we have wanted to fly faster and farther. And to do so, we've had to believe in impossible things and we've had to refuse to fear failure&lt;i&gt;."&lt;/i&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although believing in 'impossible things' is usually a prerequisite to innovation, the potential implications on human rights of every innovation and their probability of occurring should be examined. Given the fact that drones already exist and that they are used for both military and non-military purposes, the probability is that the hummingbird drone will be used for civil purposes in the future. The value of data in contemporary information societies, as well as government's obsession with surveillance for ´national security´ purposes back up the probability that drone birds will not be restricted to battlefields.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;So should innovation be encouraged for innovation’s sake, regardless of potential infringement of human rights? This question could open up a never-ending debate with supporters arguing that it´s not technology itself which is harmful, but its use or misuse. However the current reality of drones is this: UAVs and NAVs are poorly regulated (if regulated at all in many countries) and their potential for abuse is enormous, given that &lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;´what happens to our data happens to ourselves....who controls our data controls our lives.´&lt;/span&gt;&lt;/a&gt; If UAVs are used to surveille populations, why would drone birds not be used for the same purpose? In fact, they have an awesome camouflage and are potentially capable of acquiring much more data than any UAV! Given the surveillance benefits, governments would appear irrational not to use them.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;MeshWorms and Remote-Controlled Insects&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/picofmeshworm.png" alt="MeshWorm" class="image-inline" title="MeshWorm" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source: &lt;a class="external-link" href="http://www.nydailynews.com/news/national/scientists-create-resilient-robot-worm-medicine-electronics-spy-missions-roboticists-leading-universities-wroking-pentagon-grant-created-super-durable-synthetic-worm-call-meshworm-robot-article-1.1134361"&gt;NY Daily News&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Think insects are creepy? Now we can have a real reason to be afraid of them. Clearly robotic planes, dogs and birds are not enough.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;DARPA´s &lt;a href="http://www.bbc.co.uk/news/technology-19200285"&gt;&lt;span&gt;MeshWorm project&lt;/span&gt;&lt;/a&gt; entails the creation of earthworm-like robots that crawl along surfaces by contracting segments of their bodies. The MeshWorm can squeeze through tight spaces and mold its shape to rough terrain, as well as absorb heavy blows. This robotic worm will be used for military purposes, while future use for ´civil purposes´ remains a probability.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Robots, however, are not only the case. Actual insects are being wirelessly controlled, such as &lt;a href="http://www.technologyreview.com/news/411814/the-armys-remote-controlled-beetle/"&gt;&lt;span&gt;beetles with implanted electrodes&lt;/span&gt;&lt;/a&gt; and a radio receiver on their back. The giant flower beetle´s size enables it to carry a small camera and a heat sensor, which constitutes it as a reliable mean for surveillance.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Other&lt;/span&gt;&lt;a href="http://www.wired.com/dangerroom/2012/06/ff_futuredrones/"&gt; drone insects&lt;/a&gt;&lt;span&gt; look and fly like ladybugs and dragonflies. Researchers at the Wright State University in Dayton, Ohio, have been working on a butterfly drone since 2008. Former software engineer Alan Lovejoy has argued that the US is developing &lt;/span&gt;&lt;a href="http://www.businessinsider.com/the-future-of-micro-drones-is-getting-pretty-scary-according-to-alan-lovejoy-2012-6"&gt;mosquito drones&lt;/a&gt;&lt;span&gt;. Such a device could potentially be equipped with a camera and a microphone, it could use its needle to abstract a DNA sample with the pain of a mosquito bite and it could also inject a micro RFID tracking device under peoples´ skin. All such micro-drones could potentially be used for both military and civil purposes and could violate individuals´ right to privacy and other civil liberties.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Security vs. Privacy: The wrong debate&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;09/11 was not only a pioneering date for the U.S., but also for India and most countries in the world. The War on Terror unleashed a global wave of surveillance to supposedly enable the detection and prevention of crime and terrorism. Governments on an international level have been arguing over the last decade that the use of surveillance technologies is a prerequisite to safety. However, security expert, &lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;, argues that the trade-off of privacy for security is a false dichotomy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Everyone can potentially be a suspect within a surveillance state. Analyses of Big Data can not only profile individuals and populations, but also identify ‘branches of communication’ around every individual. In short, if you know someone who may be considered a suspect by intelligence agencies, you may also be a suspect. The mainstream argument &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;&lt;span&gt;“I have nothing to hide, I am not a terrorist’&lt;/span&gt;&lt;/a&gt; is none other than a psychological coping mechanism when dealing with surveillance. The reality of security indicates that when an individual’s data is being intercepted, the probability is that those who control that data can also control that individual’s life. Schneier has argued that&lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt; privacy and security are not on the opposite side of a seesaw&lt;/span&gt;&lt;/a&gt;, but on the contrary, the one is a prerequisite of the other. Governments should not expect us to give up our privacy in exchange for security, as loss of privacy indicates loss of individuality and essentially, loss of freedom. We can not be safe when we trade-off our personal data, because privacy is what protects us from abuse from those in power. Thus the entire War on Terror appears to waged through a type of phishing, as the promise of ´security´ may be bait to acquire our personal data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Since the &lt;a href="http://www.thenational.ae/news/world/south-asia/mumbai-police-to-get-aerial-drones-to-help-fight-crime"&gt;2008 Mumbai terrorist attacks&lt;/a&gt;, India has had more reasons to produce, buy and use  surveillance technologies, including drones. Last New Year´s Eve, the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-12-31/mumbai/36078903_1_surveillance-cameras-terror-outfits-netra"&gt;Mumbai police used UAVs&lt;/a&gt; to monitor hotspots, supposedly to help track down revellers who sexually harass women. The Chennai police recently procured &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/it-flies-it-swoops-it-records-and-monitors/article4218683.ece"&gt;three UAVs from Anna University &lt;/a&gt;to assist them in keeping an eye on the city´s vehicle flow. Raj Thackeray´s rally marked&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-08-22/news/33322409_1_mumbai-police-uav-unmanned-aerial-vehicle"&gt; the biggest surveillance exercise ever launched for a single event&lt;/a&gt;, which included UAVs. The Chandigarh police are the first Indian police force to use the &lt;a class="external-link" href="http://www.indianexpress.com/news/UAV--Chandigarh-police-spread-wings-with--Golden-Hawk-/779043/"&gt;´Golden Hawk´&lt;/a&gt; - a UAV which will keep a ´bird´s eye on criminal activities´. This new type of drone was manufactured by the &lt;span&gt;Aeronautical Development Establishment (one of DRDO's premier laboratories based in Bangalore) and as of 2011 is being used by Indian law enforcement agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Although there is no evidence that India currently has any animal or insect drones, it could be a probability in the forthcoming years. Since India is currently using many UAVs either way, why would animal and/or insect drones be excluded? What would prevent India from potentially using such drones in the future for ´civil purposes´? More importantly, how are ´civil purposes´ defined? Who defines ´civil purposes´and under what criteria? Would the term change and if so, under what circumstances? The term ´civil purposes´ varies from country to country and is defined by many political, social, economic and cultural factors, thus potentially enabling extensive surveillance and abuse of human rights.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Drones can potentially be as intrusive as other communications surveillance technologies, depending on the type of technology they´re equipped with, their location and the purpose of their use. As they can potentially violate individuals´ right to privacy, freedom of expression, freedom of movement and many other human rights, they should be strictly regulated. In&lt;a href="http://www.uavs.org/regulation"&gt;&lt;span&gt; Europe UAVs&lt;/span&gt;&lt;/a&gt; are regulated based upon their weight, as unmanned aircraft with an operating mass of less than 150kg are exempt by the EASA Regulation and its Implementation Rules. This should not be the case in India, as drones lighter than 150kg can potentially be more intrusive than other heavier drones, especially in the case of bird and insect drones.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Laws which explicitly regulate the use of all types of drones (UAVs, NAVs and micro-drones) and which legally define the term ´civil purposes´ in regards to human rights should be enacted in India. Some thoughts on the authorisation of drones include the following: A Special Committee on the Use of All Drones (SCUAD) could be established, which would be comprised of members of the jury, as well as by other legal and security experts of India. Such a committee would be the sole legal entity responsible for issuing authorisation for the use of drones, and every authorisation would have to comply with the constitutional and statutory provisions of human rights.  Another committee, the Supervisory Committee on the Authorisation of the Use of Drones (lets call this ´SCAUD´), could also be established, which would also be comprised by (other) members of the jury, as well as by (other) legal and security experts of India. This second committee would supervise the first and it would ensure that SCUAD provides authorisations in compliance with the laws, once the necessity and utility of the use of drones has been adequately proven.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;It´s not about ´privacy vs. security´. Nor is it about ´privacy or security´. In every democratic state, it should be about ´privacy and security´, since the one cannot exist without the other. Although the creation of animal and insect drones is undoubtedly technologically impressive, do we really want to live in a world where even animal-like robots can be used to spy on us? Should we be spied on at all? How much privacy do we give up and how much security do we gain in return through drones? If drones provided the ´promised security´, then India and all other countries equipped with these technologies should be extremely safe and crime-free; however, that is not the case.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In order to ensure that the use of drones does not infringe upon the right to privacy and other human rights, strict regulations are a minimal prerequisite. As long as people do not require that the use of these spying technologies are strictly regulated, very little can be done to prevent a scary sci-fi future. That´s why this blog has been written.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-dog-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-dog-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:38:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou">
    <title>Big Democracy: Big Surveillance - A talk by Maria Xynou</title>
    <link>https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou</link>
    <description>
        &lt;b&gt;Next Tuesday, Maria Xynou will be presenting her latest research on surveillance in India. Come and engage in a discussion on India's controversial surveillance schemes, surveillance industry and much much more! &lt;/b&gt;
        
&lt;p&gt;And so we've heard a lot about the Edward Snowden leaks and about the NSA's controversial mass surveillance projects. But what's happening in India?&lt;/p&gt;
&lt;p&gt;It turns out that the world's largest democracy has some of the most controversial surveillance schemes in the world! Some of India's laws, schemes, projects and technologies are unbeatable when it comes to mass surveillance, censorship and control. While India may be a developing country with issues ranging from poverty to corruption, it nonetheless appears to be at the forefront of surveillance on an international level.&lt;/p&gt;
&lt;p&gt;Join us at the Centre for Internet and Society (CIS) on 3rd December 2013 to hear about India's surveillance laws, schemes and technologies and to engage in a discussion on the potential implications. All that is required is an open mind, critical thought and a will to challenge that which has not been challenged!&lt;/p&gt;
&lt;p&gt;We look forward to seeing you all and to hearing your thoughts, ideas and opinions!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/P6tG8jl6cuo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou'&gt;https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-12T10:23:21Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state">
    <title>Big Democracy, Big Surveillance: India's Surveillance State</title>
    <link>https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state</link>
    <description>
        &lt;b&gt;In India, surveillance is on the rise by the state to tackle crime and terrorism, and private companies are eager to meet the demand.&lt;/b&gt;
        &lt;p&gt;This article by Maria Xynou was&lt;a class="external-link" href="http://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; published by OpenDemocracy&lt;/a&gt; on 10 February 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Worried about the secret, mass surveillance schemes being carried out by the NSA? While we should be, some of the surveillance schemes in the world's largest democracy, India, are arguably&lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt; in the same league&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="http://www.amazon.com/Globalization-Surveillance-Armand-Mattelart/dp/0745645119"&gt;Surveillance is being globalised&lt;/a&gt; to the extent that even India, a country with huge poverty issues, is investing millions of dollars in creating an &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;expansive surveillance regime&lt;/a&gt;. However, why would communications monitoring interest Indian authorities, when the majority of the population lives below the line of poverty and &lt;a href="http://wearesocial.net/tag/india/"&gt;only 17% of the population&lt;/a&gt;&lt;a href="http://wearesocial.net/tag/india/"&gt; has access to the Internet&lt;/a&gt;?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The official political motivation behind surveillance in India appears to be the government's &lt;a href="http://digitaljournal.com/article/268467"&gt;determination to tackle terrorism&lt;/a&gt; in the country. The &lt;a href="http://edition.cnn.com/2013/09/18/world/asia/mumbai-terror-attacks/"&gt;2008 Mumbai terrorist attacks&lt;/a&gt; were arguably a similar landmark to the 9/11 terrorist attacks in the US, and both governments officially announced their intention to carry out surveillance as a counter-terrorism measure. However, unlike in the west, terrorist attacks in India are much more common, and the National Security Adviser reported in 2008 that 800 terrorist cells were operational in the country. With India’s history of &lt;a href="http://www.thenews.com.pk/Todays-News-2-210676-Major-terror-attacks-in-India-during-last-25-years"&gt;major terror attacks in India over the last 25 years&lt;/a&gt;, it's easy for one to be persuaded that terrorism is actually a major threat to national security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance schemes&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India’s surveillance programs mostly started following the 2008 Mumbai terror attacks. That was when the Ministry of Home Affairs first proposed the creation of a &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;National Intelligence Grid (NATGRID)&lt;/a&gt;, which will give &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;11 intelligence and investigative agencies real-time access to 21 citizen data sources&lt;/a&gt; to track terror activities. These citizen data sources will be provided by various ministries and departments, otherwise called “provider agencies”, and will include &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-national-intelligence-grid-databases"&gt;bank account details, telephone records, passport data and vehicle registration details&lt;/a&gt;, among other types of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs has &lt;a href="http://www.deccanherald.com/content/181065/mha-seeks-over-rs-3400.html"&gt;sought over Rs. 3,400 crore&lt;/a&gt; (around USD 540 million!) for the implementation of NATGRID, which aims to create comprehensive patterns of intelligence by collecting sensitive information from databases of departments like the police, banks, tax and telecoms to supposedly track any terror suspect and incident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But NATGRID is far from India's only data sharing scheme. In 2009 the Cabinet Committee on Economic Affairs approved the creation and implementation of the &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Crime and Criminal Tracking Network &amp;amp; &lt;/a&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=49261"&gt;Systems&lt;/a&gt; (CCTNS), which would facilitate the sharing of databases among &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;14,000 police stations across all 35 states and Union Territories&lt;/a&gt; of India, excluding 6,000 police offices which are high in the police hierarchy. &lt;a href="http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot-project/article4272857.ece"&gt;Rs. 2,000 crore&lt;/a&gt; (around USD 320 million) have been allocated for the CCTNS, which is being implemented by the National Crime Records Bureau under the national e-governance scheme. The CCTNS not only increases transparency by automating the function of police stations, but also &lt;a href="http://ncrb.nic.in/AboutCCTNS.htm"&gt;provides the civil police with tools, technology and information&lt;/a&gt; to facilitate the investigation of crime and detection of criminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But apparently, sharing data and linking databases is not enough to track criminals and terrorists. As such, in the aftermath of the 2008 Mumbai terror attacks, the Indian government also implemented various interception systems. In September 2013&lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt; it was reported&lt;/a&gt; that the Indian government has been operating Lawful Intercept &amp;amp; Monitoring (LIM) systems, widely in secret. In particular, &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;mobile operators in India have deployed their own LIM systems&lt;/a&gt; allowing for the so-called “lawful interception” of calls by the government. And possibly to enable this, mobile operators are required to provide &lt;a href="http://telecomtalk.info/dot-tightens-norms-no-mobile-connection-without-physical-verification/102120/"&gt;subscriber verification&lt;/a&gt; to the Telecom Enforcement, Resource and Monitoring (TERM) cells of the Department of Telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Internet traffic, the LIM systems are deployed at the &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;international gateways of large Internet Service Providers (ISPs) &lt;/a&gt;and expand to a broad search across all Internet traffic using “keywords” and “key-phrases”. In other words, security agencies using LIM systems are capable of launching a search for suspicious words, resulting in the indiscriminate monitoring of all Internet traffic, possibly without court oversight and without the knowledge of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also automated and centralized the interception of communications through the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;. This project was initially envisioned in 2009, following the 2008 Mumbai terror attacks and was approved in 2011.  The CMS intercepts all telecommunications in India and &lt;a href="https://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about"&gt;centrally stores the data in national and regional databases&lt;/a&gt;. The CMS will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Agencies&lt;/a&gt; which will have access to the CMS include the Intelligence Bureau (IB), the Central Bureau of Investigation (CBI), the Directorate of Revenue Intelligence (DRI), the Research and Analysis Wing (RAW) and the National Investigation Agency (NIA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike mainstream interception, where service providers are required to intercept communications and provision interception requests to law enforcement agencies, the Central Monitoring System will automate the entire process of interception. This means that the CMS authority will have centralized access to all intercepted data and that the authority can also bypass service providers in gaining such access. Once security agencies have access to this data, they are equipped with &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Direct Electronic Provisioning, filters and alerts on the target numbers&lt;/a&gt;, as well as with Call Details Records (CDR) analysis and data mining tools to identify the personal information of target numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that roughly &lt;a href="http://wearesocial.net/tag/india/"&gt;73% of India's population uses mobile phones&lt;/a&gt;, this means that the Central Monitoring System can potentially affect about 893 million people, more than double the population of the United States! However, how is it even possible for Indian authorities to mine the data of literally millions of people? Who supplies Indian authorities with the technology to do this and what type of technology is actually being used?&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;India's surveillance industry&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, consisting of more than a billion people and an expanding middle class. Undoubtedly, India is a big market and many international companies aspire in investing in the country. Unfortunately though, along with everything else being imported into India, surveillance technologies are no exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the biggest and most notorious surveillance technology companies in the world, such as ZTE, Utimaco and Verint, have offices in India. Even &lt;a href="https://citizenlab.org/2013/04/for-their-eyes-only-2/"&gt;FinFisher command and control servers&lt;/a&gt; have been found in India. However, in addition to allowing foreign surveillance technology companies to create offices and to sell their products and solutions in the country, local companies selling controversial spyware appear to be on the rise too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kommlabs Dezign is an Indian company which loves to show off its Internet monitoring solutions at&lt;a href="http://www.kommlabs.com/events.asp"&gt; various ISS trade shows&lt;/a&gt;, otherwise known as &lt;a href="http://www.wired.com/beyond_the_beyond/2011/12/at-the-wiretappers-ball/"&gt;“the Wiretapper's Ball”&lt;/a&gt;. In particular, Kommlabs Dezign sells VerbaNET, an Internet Interception Solution, as well as VerbaCENTRE, which is a Unified Monitoring Centre that can even detect cognitive and emotional stress in voice calls and flag them! In other words, Kommlabs Dezign makes a point that not only should we worry about what we text and say over our phones, but that we should also worry about what we sound like when on the phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vehere is another Indian company which sells various surveillance solutions and notably sells vCRIMES, which is a Call Details Records (CDR) analysis system. VCRIMES is used to analyse and gather intelligence and to unveil hidden interconnections and relations through communications. This system also includes a tool for detecting sleeper cells through advanced statistical analysis and &lt;a href="http://www.veheretech.com/products/vcrimes/"&gt;can analyse more than 40 billion records in less than 3 seconds&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.paladion.net/"&gt;Paladion Networks&lt;/a&gt; is headquartered in Bangalore, India and sells various Internet Monitoring Systems, Telecom Operator Interception Systems, SSL Interception and Decryption Systems and Cyber Cafe Monitoring Systems to law enforcement agencies in India and abroad. In fact, Paladion Networks even states in its website that its &lt;a href="http://www.paladion.net/client_list.html"&gt;customers include India's Ministry of Information Technology and the U.S Department of Justice&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail Technologies is yet another Indian company which not only &lt;a href="http://www.issworldtraining.com/iss_europe/sponsors.html"&gt;sponsors global surveillance trade shows&lt;/a&gt; but also sells a wide range of monitoring solutions to law enforcement agencies in India and abroad. ComTrail is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;centralised mass interception and monitoring of voice and data networks&lt;/a&gt;, including Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls. Furthermore, ComTrail is equipped to handle millions of communications per day, correlating identities across multiple networks, and can instantly analyse data across thousands of terabytes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ClearTrail also sells xTrail, which is a solution for the &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted interception, decoding and analysis of data traffic over IP networks&lt;/a&gt; and which enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. Interestingly, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apparently, some the biggest challenges that law enforcement agencies face when monitoring communications include cases when targets operate from public Internet networks and/or use encryption. However, it turns out that ClearTrail's QuickTrail solution is designed to &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;gather intelligence from public Internet networks&lt;/a&gt;, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. This device can remotely deploy spyware into a target's computer and supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, QuickTrail can identify a target machine on the basis of metadata, such as an IP address, and can monitor Ethernet LANs in real time, as well as monitor Gmail, Yahoo and all other HTTPS-based communications. ClearTrail's mTrail is designed for the passive &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;'off-the-air' interception of GSM communications&lt;/a&gt;, including the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information. MTrail also identifies a target's location by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation of so-called “lawfully intercepted” calls in near real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, it looks like India is reaching the top league when it comes to surveillance technologies, especially since many of its companies and their products appear to be just as scary as some of the most sophisticated spying gear sold by the West. India may be the world's largest (by population) democracy, but that means that it has a huge population with way too many opinions...and apparently, the private and public sectors in India appear to be joining forces to do something about it.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So do Indians have nothing to hide?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A very popular rhetoric in both India and the west is that citizens should &lt;i&gt;not&lt;/i&gt; be concerned about surveillance because, after all, if they are not terrorists, they should have nothing to hide. However, privacy advocate &lt;a href="https://cis-india.org/internet-governance/blog/interview-with-caspar-bowden-privacy-advocate"&gt;Caspar Bowden&lt;/a&gt; has rightfully stated that this rhetoric is fundamentally flawed and that we should all indeed “have something to hide”. But is privacy just about “having something to hide”? &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt; has stated that this rhetoric is merely a psychological copying mechanism when dealing with security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's probably rather comforting and reassuring to think that we are not special or important enough for surveillance to affect us personally. But is that really up to us to decide? Unfortunately not. The very point of data mining is to match patterns, create profiles of individuals and to unveil hidden interconnections and relations. A data analyst can uncover more information about us than what we are even aware of and it is they who decide if our data is “incriminating” or not. Or even worse: in many cases it's up to &lt;i&gt;data mining software&lt;/i&gt; to decide how “special” or “important” we are. And unfortunately, technology is &lt;i&gt;not&lt;/i&gt; infallible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world's largest democracy, which is also &lt;a href="http://www.hindustantimes.com/india-news/india-less-corrupt-than-pakistan-ranks-94th-in-world-survey/article1-1158513.aspx"&gt;one of the most corrupt countries in the world&lt;/a&gt;, is implementing many controversial surveillance schemes which lack transparency, accountability and adequate legal backing, and which are largely being carried out in secret. And to make matters worse, India lacks privacy legislation. Over a billion people in a democratic regime are exposed to inadequately regulated surveillance schemes, while a local surveillance industry is thriving without any checks or balances whatsoever. What will this mean for the global future of democracy?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state'&gt;https://cis-india.org/internet-governance/blog/big-democracy-big-surveillance-indias-surveillance-state&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-02-28T10:35:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis">
    <title>Big Data in the Global South - An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;I. &lt;/b&gt; &lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;The period that we have embarked upon is unprecedented in history in terms of our ability to learn about human behavior.&lt;/i&gt;"	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world we live in today is facing a slow but deliberate metamorphosis of decisive information; from the erstwhile monopoly of world leaders and the 	captains of industry obtained through regulated means, it has transformed into a relatively undervalued currency of knowledge collected from individual 	digital expressions over a vast network of interconnected electrical impulses.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; This seemingly random 	deluge of binary numbers, when interpreted represents an intricately woven tapestry of the choices that define everyday life, made over virtual platforms. 	The machines we once employed for menial tasks have become sensorial observers of our desires, wants and needs, so much so that they might now predict the 	course of our future choices and decisions.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; The patterns of human behaviour that are reflected within this 	data inform policy makers, in both a public and private context. The collective data obtained from our digital shadows thus forms a rapidly expanding 	storehouse of memory, from which interested parties can draw upon to resolve problems and enable a more efficient functioning of foundational institutions, 	such as the markets, the regulators and the government.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term used to describe a large volume of collected data, in a structured as well as unstructured form is called Big Data. This data requires niche 	technology, outside of traditional software databases, to process; simply because of its exponential increment in a relatively short period of time. Big Data is usually identified using a "three V" characterization - larger volume, greater variety and distinguishably high rates of velocity.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; This is exemplified in the diverse sources from which this data is obtained; mobile phone records, 	climate sensors, social media content, GPS satellite identifications and patterns of employment, to name a few. Big data analytics refers to the tools and 	methodologies that aim to transform large quantities of raw data into "interpretable data", in order to study and discern the same so that causal 	relationships between events can be conclusively established.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Such analysis could allow for the 	encouragement of the positive effects of such data and a concentrated mitigation of negative outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper seeks to map out the practices of different governments, civil society, and the private sector with respect to the collection, interpretation 	and analysis of big data in the global south, illustrated across a background of significant events surrounding the use of big data in relevant contexts. 	This will be combined with an articulation of potential opportunities to use big data analytics within both the public and private spheres and an 	identification of the contextual challenges that may obstruct the efficient use of this data. The objective of this study is to deliberate upon how 	significant obstructions to the achievement of developmental goals within the global south can be overcome through an accurate recognition, interpretation 	and analysis of big data collected from diverse sources.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;II. &lt;/b&gt; &lt;b&gt;Uses of Big Data in the Global Development&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Big Data for development is the process though which raw, unstructured and imperfect data is analyzed, interpreted and transformed into information that 	can be acted upon by governments and policy makers in various capacities. The amount of digital data available in the world today has grown from 150 	exabytes in 2005 to 1200 exabytes in 2010.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; It is predicted that this figure would increase by 40% annually in the next few years&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;, which is close to 40 times growth of the world's population.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The implication of this is essentially that the share of available data in the world today that is less 	than a minute old is increasing at an exponential rate. Moreover, an increasing percentage of this data is produced and created real-time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data revolution that is incumbent upon us is characterized by a rapidly accumulating and continuously evolving stock of data prevalent` in both 	industrialized as well as developing countries. This data is extracted from technological services that act as sensors and reflect the behaviour of 	individuals in relation to their socio-economic circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For many global south countries, this data is generated through mobile phone technology. This trend is evident in Sub Saharan Africa, where mobile phone 	technology has been used as an effective substitute for often weak and unstructured State mechanisms such as faulty infrastructure, underdeveloped systems 	of banking and inferior telecommunication networks.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, a recent study presented at the Data for Development session at the NetMob Conference at MIT used mobile phone data to analyze the impact of opening a new toll highway in Dakar, Senegal on human mobility, particularly how people commute to work in the metropolitan area.	&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A huge investment, the improved infrastructure is expected to result in a 	significant increase of people in and out of Dakar, along with the transport of essential goods. This would initiate rural development in the areas outside 	of Dakar and boost the value of land within the region.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The impact of the newly 	constructed highway can however only be analyzed effectively and accurately through the collection of this mobile phone data from actual commuters, on a 	real time basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile phones technology is no longer used just for personal communication but has been transformed into an effective tool to secure employment 	opportunities, transfer money, determine stock options and assess the prices of various commodities.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; This generates vast amounts of data about individuals and their interactions with the government and private sector companies. Internet Traffic is 	predicted to grow between 25 to 30 % in the next few years in North America, Western Europe and Japan but in Latin America, The Middle East and Africa this 	figure has been expected to touch close to 50%.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; The bulk of this internet traffic can be traced back to 	mobile devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential applicability of Big Data for development at the most general level is the ability to provide an overview of the well being of a given 	population at a particular period of time.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; This overcomes the relatively longer time lag that is 	prevalent with most other traditional forms of data collection. The analysis of this data has helped, to a large extent, uncover "digital smoke signals" - 	or inherent changes in the usage patterns of technological services, by individuals within communities.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This may act as an indicator of the changes in the underlying well-being of the community as a whole. This information about the well-being of a community 	derived from their usage of technology provides significantly relevant feedback to policy makers on the success or failure of particular schemes and can 	pin point changes that need to be made to status quo. &lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;The hope is that this feedback delivered in real-time, would in turn lead to a more flexible and accessible system of international development, thus securing more measurable and sustained outcomes.	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis of big data involves the use of advanced computational technology that can aid in the determination of trends, patterns and correlations 	within unstructured data so as to transform it into actionable information. It is hoped that this in addition to the human perspective and experience 	afforded to the process could enable decision makers to rely upon information that is both reliable and up to date to formulate durable and self-sustaining 	development policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The availability of raw data has to be adequately complemented with intent and a capacity to use it effectively. To this effect, there is an emerging 	volume of literature that seeks to characterize the primary sources of this Big Data as sharing certain easily distinguishable features. Firstly, it is 	digitally generated and can be stored in a binary format, thus making it susceptible to requisite manipulation by computers attempting to engage in its 	interpretation. It is passively produced as a by-product of digital interaction and can be automatically extracted for the purpose of continuous analysis. 	It is also geographically traceable within a predetermined time period. It is however important to note that "real time" does not necessarily refer to 	information occurring instantly but is reflective of the relatively short time in which the information is produced and made available thus making it relevant within the requisite timeframe. This allows efficient responsive action to be taken in a short span of time thus creating a feedback loop.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most cases the granularity of the data is preferably sought to be expanded over a larger spatial context such as a village or a community as opposed to 	an individual simply because this affords an adequate recognition of privacy concerns and the lack of definitive consent of the individuals in the 	extraction of this data. In order to ease the process of determination of this data, the UN Global Pulse has developed taxonomy of sorts to assess the 	types of data sources that are relevant to utilizing this information for development purposes.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; These 	include the following sources;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Data Exhaust&lt;/i&gt; or the digital footprint left behind by individuals' use of technology for service oriented tasks such as web purchases, mobile phone transactions and real 	time information collected by UN agencies to monitor their projects such as levels of food grains in storage units, attendance in schools etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Online Information&lt;/i&gt; which includes user generated content on the internet such as news, blog entries and social media interactions which may be used to identify trends in 	human desires, perceptions and needs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Physical sensors&lt;/i&gt; such as satellite or infrared imagery of infrastructural development, traffic patterns, light emissions and topographical changes, thus enabling the remote 	sensing of changes in human activity over a period of time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Citizen reporting or crowd sourced data&lt;/i&gt; , which includes information produced on hotlines, mobile based surveys, customer generated maps etc. Although a passive source of data collection, this is 	a key instrument in assessing the efficacy of action oriented plans taken by decision makers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The capacity to analyze this big data is hinged upon the reliance placed on technologically advanced processes such as powerful algorithms which can 	synthesize the abundance of raw data and break down the information enabling the identification of patterns and correlations. This process would rely on 	advanced visualization techniques such &lt;i&gt;"sense-making tools"&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;b&gt;[21]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The identification of patterns within this data is carried out through a process of instituting a common framework for the analysis of this data. This 	requires the creation of a specific lexicon that would help tag and sort the collected data. This lexicon would specify &lt;i&gt;what &lt;/i&gt;type of information 	is collected and &lt;i&gt;who &lt;/i&gt;it is interpreted and collected by, the observer or the reporter. It would also aid in the determination of &lt;i&gt;how &lt;/i&gt;the 	data is acquired and the qualitative and quantitative nature of the data. Finally, the spatial context of the data and the time frame within which it was 	collected constituting the aspects of &lt;i&gt;where &lt;/i&gt;and &lt;i&gt;when&lt;/i&gt; would be taken into consideration. The data would then be analyzed through a process 	of &lt;i&gt;Filtering, Summarizing and Categorizing&lt;/i&gt; the data by transforming it into an appropriate collection of relevant indicators of a particular 	population demographic. &lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intensive mining of predominantly socioeconomic data is known as "reality mining" &lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; and this can shed light on the processes and interactions that are reflected within the data. This is carried out via a tested three fold process. Firstly, the "	&lt;i&gt;Continuous Analysis over the streaming of the data", &lt;/i&gt;which involves the monitoring and analyzing high frequency data streams to extract often uncertain raw data. For example, the systematic gathering of the prices of products sold online over a period of time. Secondly,	&lt;i&gt;"The Online digestion of semi structured data and unstructured data", &lt;/i&gt;which includes news articles, reviews of services and products and opinion 	polls on social media that aid in the determination of public perception, trends and contemporary events that are generating interest across the globe. 	Thirdly, a &lt;i&gt;'Real-time Correlation of streaming data with slowly accessible historical data repositories,' &lt;/i&gt;which refers to the "mechanisms used for 	correlating and integrating data in real-time with historical records."&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; The purpose of this stage is to 	derive a contextualized perception of personalized information that seeks to add value to the data by providing a historical context to it. &lt;i&gt; &lt;/i&gt;Big 	Data for development purposes would make use of a combination of these depending on the context and need.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) &lt;/b&gt; &lt;b&gt;Policy Formulation &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The world today has become increasingly volatile in terms of how the decisions of certain countries are beginning to have an impact on vulnerable 	communities within entirely different nations. Our global economy has become infinitely more susceptible to fluctuating conditions primarily because of its 	interconnectivity hinged upon transnational interdependence. The primordial instigators of most of these changes, including the nature of harvests, prices of essential commodities, employment structures and capital flows, have been financial and environmental disruptions.	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; According to the OECD, " 	&lt;i&gt; Disruptive shocks to the global economy are likely to become more frequent and cause greater economic and social hardship. The economic spillover 		effects of events like the financial crisis or a potential pandemic will grow due to the increasing interconnectivity of the global economy and the 		speed with which people, goods and data travel."&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;b&gt;[26]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The local impacts of these fluctuations may not be easily visible or even traceable but could very well be severe and long lasting. A vibrant literature on 	the vulnerability of communities has highlighted the impacts of these shocks on communities often causing children to drop out of school, families to sell 	their productive assets, and communities to place a greater reliance on state rations.&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; These 	vulnerabilities cannot be definitively discerned through traditional systems of monitoring and information collection. The evidence of the effects of these 	shocks often take too long to reach decision makers; who are unable to formulate effective policies without ascertaining the nature and extent of the 	hardships suffered by these in a given context. The existing early warning systems in place do help raise flags and draw attention to the problem but their 	reach is limited and veracity compromised due to the time it takes to extract and collate this information through traditional means. These traditional 	systems of information collection are difficult to implement within rural impoverished areas and the data collected is not always reliable due to the 	significant time gap in its collection and subsequent interpretation. Data collected from surveys does provide an insight into the state of affairs of 	communities across demographics but this requires time to be collected, processed, verified and eventually published. Further, the expenses incurred in 	this process often prove to be difficult to offset.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; The digital revolution therefore provides a significant opportunity to gain a richer and deeper insight into the very nature and evolution of the human 		experience itself thus affording a more legitimate platform upon which policy deliberations can be articulated. This data driven decision making, once the monopoly of private institutions such as The World Economic Forum and The McKinsey Institute		&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;b&gt;[28]&lt;/b&gt;&lt;/a&gt; has now emerged at the forefront of the public policy discourse. Civil society 		has also expressed an eagerness to be more actively involved in the collection of real-time data after having perceived its benefits. This is evidenced by the emergence of 'crowd sourcing'&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;b&gt;[29]&lt;/b&gt;&lt;/a&gt; and other 'participatory sensing'		&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;b&gt;[30]&lt;/b&gt;&lt;/a&gt; efforts that are founded upon the commonalities shared by like minded communities of individuals. This is being done on easily accessible platforms such as mobile phone interfaces, hand-held radio devices and geospatial technologies.		&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The predictive nature of patterns identifiable from big data is extremely relevant for the purpose of developing socio-economic policies that seek to 	bridge problem-solution gaps and create a conducive environment for growth and development. Mobile phone technology has been able to quantify human 	behavior on an unprecedented scale.&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; This includes being able to detect changes in standard commuting 	patterns of individuals based on their employment status&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; and estimating a country's GDP in real-time by 	measuring the nature and extent of light emissions through remote sensing. &lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent research study has concluded that "due to the relative frequency of certain queries being highly correlated with the percentage of physician 	visits in which individuals present influenza symptoms, it has been possible to accurately estimate the levels of influenza activity in each region of the United States, with a reporting lag of just a day." Online data has thus been used as a part of syndromic surveillance efforts also known as infodemiology.	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; The US Centre for Disease Control has concluded that mining vast quantities of data through online 	health related queries can help detect disease outbreaks " 	&lt;i&gt; before they have been confirmed through a diagnosis or a laboratory confirmation."		&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;b&gt;[36]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; Google trends works in a similar way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another public health monitoring system known as the Healthmap project compiles seemingly fragmented data from news articles, social media, eye-witness reports and expert discussions based on validated studies to "&lt;i&gt;achieve a unified and comprehensive view of the current global state of infectious diseases"&lt;/i&gt; that may be visualized on a map.	&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Big Data used for development purpose can reduce the reliance on human inputs thus narrowing the room for error and ensuring the accuracy of information 	collected upon which policy makers can base their decisions.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(ii) &lt;/b&gt; &lt;b&gt;Advocacy and Social Change&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Due to the ability of Big Data to provide an unprecedented depth of detail on particular issues, it has often been used as a vehicle of advocacy to 	highlight various issues in great detail. This makes it possible to ensure that citizens are provided with a far more participative experience, capturing 	their attention and hence better communicating these problems. Numerous websites have been able to use this method of crowd sourcing to broadcast socially 	relevant issues&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;. Moreover, the massive increase in access to the internet has dramatically improved the 	scope for activism through the use of volunteered data due to which advocates can now collect data from volunteers more effectively and present these issues in various forums. Websites like Ushahidi&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; and the Black Monday Movement	&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; being prime examples of the same. These platforms have championed various causes, consistently 	exposing significant social crises' that would otherwise go unnoticed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ushahidi application used crowd sourcing mechanisms in the aftermath of the Haiti earthquake to set up a centralized messaging system that allowed 	mobile phone users to provide information on injured and trapped people.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; An analysis of the data showed that the concentration of text messages was correlated with the areas where there was an increased concentration of damaged buildings.	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; Patrick Meier of Ushahidi noted "These results were evidence of the system's ability to predict, with surprising accuracy and statistical significance, the location and extent of structural damage post the earthquake."	&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another problem that data advocacy hopes to tackle, however, is that of too much exposure, with advocates providing information to various parties to help 	ensure that there exists no unwarranted digital surveillance and that sensitive advocacy tools and information are not used inappropriately. An interesting 	illustration of the same is The Tactical Technology Collective&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; that hopes to improve the use of 	technology by activists and various other political actors. The organization, through various mediums such as films, events etc. hopes to train activists 	regarding data protection and privacy awareness and skills among human rights activists. Additionally, Tactical Technology also assists in ensuring that 	information is used in an appealing and relevant manner by human rights activists and in the field of capacity building for the purposes of data advocacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Observed data such as mobile phone records generated through network operators as well as through the use of social media are beginning to embody an 	omnipotent role in the development of academia through detailed research. This is due to the ability of this data to provide microcosms of information 	within both contexts of finer granularity and over larger public spaces. In the wake of natural disasters, this can be extremely useful, as reflected by 	the work of Flowminder after the 2010 Haiti earthquake.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; A similar string of interpretive analysis can 	be carried out in instances of conflict and crises over varying spans of time. Flowminder used the geospatial locations of 1.9 million subscriber identity 	modules in Haiti, beginning 42 days before the earthquake and 158 days after it. This information allowed researches to empirically determine the migration 	patterns of population post the earthquake and enabled a subsequent UNFPA household survey.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt; In a 	similar capacity, the UN Global Pulse is seeking to assist in the process of consultation and deliberation on the specific targets of the millennium 	development goals through a framework of visual analytics that represent the big data procured on each of the topics proposed for the post- 2015 agenda 	online.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent announcement of collaboration between RTI International, a non-profit research organization and IBM research lab looks promising in its initiative 	to utilize big data analytics in schools within Mombasa County, Kenya.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; The partnership seeks to develop 	testing systems that would capture data that would assist governments, non-profit organizations and private enterprises in making more informed decisions 	regarding the development of education and human resources within the region. Äs observed by Dr. Kamal Bhattacharya, The Vice President of IBM 	Research, "A significant lack of data on Africa in the past has led to misunderstandings regarding the history, economic performance and potential of the 	government." The project seeks to improve transparency and accountability within the schooling system in more than 100 institutions across the county. The 	teachers would be equipped with tablet devices to collate the data about students, classrooms and resources. This would allow an analysis of the correlation between the three aspects thus enabling better policy formulation and a more focused approach to bettering the school system.	&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; This is a part of the United States Agency for International Development's Education Data for Decision 	Making (EdData II) project. According to Dr Kommy Weldemariam, Research Scientist , IBM Research, "… there has been a significant struggle in making 	informed decisions as to how to invest in and improve the quality and content of education within Sub-Saharan Africa. The Project would create a school 	census hub which would enable the collection of accurate data regarding performance, attendance and resources at schools. This would provide valuable 	insight into the building of childhood development programs that would significantly impact the development of an efficient human capital pool in the near 	future."&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar initiative has been undertaken by Apple and IBM in the development of the "Student Achievement App" which seeks to use this data for "content 	analysis of student learning". The Application as a teaching tool that analyses the data provided to develop actionable intelligence on a per-student 	basis." &lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt; This would give educators a deeper understanding of the outcome of teaching methodologies and 	subsequently enable better leaning. The impact of this would be a significant restructuring of how education is delivered. At a recent IBM sponsored 	workshop on education held in India last year , Katharine Frase, IBM CTO of Public Sector predicted that "classrooms will look significantly different 	within a decade than they have looked over the last 200 years."&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(iii) &lt;/b&gt; &lt;b&gt;Access and the exchange of information &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data used for development serves as an important information intermediary that allows for the creation of a unified space within which unstructured 	heterogeneous data can be efficiently organized to create a collaborative system of information. New interactive platforms enable the process of 	information exchange though an internal vetting and curation that ensures accessibility to reliable and accurate information. This encourages active 	citizen participation in the articulation of demands from the government, thus enabling the actualization of the role of the electorate in determining 	specific policy decisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Grameen Foundation's AppLab in Kampala aids in the development of tools that can use the information from micro financing transactions of clients to 	identify financial plans and instruments that would be be more suitable to their needs.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt; Thus, through 	working within a community, this technology connects its clients in a web of information sharing that they both contribute to and access after the source 	of the information has been made anonymous. This allows the individual members of the community to benefit from this common pool of knowledge. The AppLab 	was able to identify the emergence of a new crop pest from an increase in online searches for an unusual string of search terms within a particular region. 	Using this as an early warning signal, the Grameen bank sent extension officers to the location to check the crops and the pest contamination was dealt 	with effectively before it could spread any further.&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(iv) &lt;/b&gt; &lt;b&gt;Accountability and Transparency&lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data enables participatory contributions from the electorate in existing functions such as budgeting and communication thus enabling connections 	between the citizens, the power brokers and elites. The extraction of information and increasing transparency around data networks is also integral to 	building a self-sustaining system of data collection and analysis. However it is important to note that this information collected must be duly analyzed in 	a responsible manner. Checking the veracity of the information collected and facilitating individual accountability would encourage more enthusiastic 	responses from the general populous thus creating a conducive environment to elicit the requisite information. The effectiveness of the policies formulated 	by relying on this information would rest on the accuracy of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is Chequeado, a non-profit Argentinean media outlet that specializes in fact-checking. It works on a model of crowd sourcing information on the basis of which it has fact checked everything from the live presidential speech to congressional debates that have been made open to the public.	&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; It established a user friendly public database, DatoCHQ, in 2014 which allowed its followers to participate in live fact-checks by sending in data, which included references, facts, articles and questions, through twitter.	&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; This allowed citizens to corroborate the promises made by their leaders and instilled a sense of trust 	in the government.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;III. &lt;/b&gt; &lt;b&gt;Big Data and Smart Cities in the Global South &lt;/b&gt;&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Smart cities have become a buzzword in South Asia, especially after the Indian government led by Prime Minister Narendra Modi made a commitment to build 	100 smart cities in India&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;. A smart city is essentially designed as a hub where the information and 	communication technologies (ICT) are used to create feedback loops with an almost minimum time gap. In traditional contexts, surveys carried out through a 	state sponsored census were the only source of systematic data collection. However these surveys are long drawn out processes that often result in a drain 	on State resources. Additionally, the information obtained is not always accurate and policy makers are often hesitant to base their decisions on this 	information. The collection of data can however be extremely useful in improving the functionality of the city in terms of both the 'hard' or physical 	aspects of the infrastructural environment as well as the 'soft' services it provides to citizens. One model of enabling this data collection, to this 	effect, is a centrally structured framework of sensors that may be able to determine movements and behaviors in real-time, from which the data obtained can 	be subsequently analyzed. For example, sensors placed under parking spaces at intersections can relay such information in short spans of time. South Korea 	has managed to implement a similar structure within its smart city, Songdo.&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another approach to this smart city model is using crowd sourced information through apps, either developed by volunteers or private conglomerates. These 	allow for the resolving of specific problems by organizing raw data into sets of information that are attuned to the needs of the public in a cohesive 	manner. However, this system would require a highly structured format of data sets, without which significantly transformational result would be difficult 	to achieve.&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There does however exist a middle ground, which allows the beneficiaries of this network, the citizens, to take on the role of primary sensors of 	information. This method is both cost effective and allows for an experimentation process within which an appropriate measure of the success or failure of 	the model would be discernible in a timely manner. It is especially relevant in fast growing cities that suffer congestion and breakdown of infrastructure 	due to the unprecedented population growth. This population is now afforded with the opportunity to become a part of the solution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle challenge associated with extracting this Big Data is its restricted access. Most organizations that are able to collect this big data 	efficiently are private conglomerates and business enterprises, who use this data to give themselves a competitive edge in the market, by being able to 	efficiently identify the needs and wants of their clientele. These organizations are reluctant to release information and statistics because they fear it 	would result in them losing their competitive edge and they would consequently lose the opportunity to benefit monetarily from the data collected. Data 	leaks would also result in the company getting a bad name and its reputation could be significantly hampered. Despite the individual anonymity, the 	transaction costs incurred in ensuring the data of their individual customers is protected is often an expensive process. In addition to this there is a 	definite human capital gap resulting from the significant lack of scientists and analysts to interpret raw data transmitted across various channels.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(i) &lt;/b&gt; &lt;b&gt;Big Data in Urban Planning &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Urban planning would require data that is reflective of the land use patterns of communities, combined with their travel descriptions and housing 	preferences. The mobility of individuals is dependent on their economic conditions and can be determined through an analysis of their purchases, either via 	online transactions or from the data accumulated by prominent stores. The primary source of this data is however mobile phones, which seemed to have 	transcend economic barriers. Secondary sources include cards used on public transport such as the Oyster card in London and the similar Octopus card used 	in Hong Kong. However, in most developing countries these cards are not available for public transport systems and therefore mobile network data forms the 	backbone of data analytics. An excessive reliance on the data collected through Smart phones could however be detrimental, especially in developing 	countries, simply because the usage itself would most likely be concentrated amongst more economically stable demographics and the findings from this data 	could potentially marginalize the poor.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile network big data (MNBD) is generated by all phones and includes CDRs, which are obtained from calls or texts that are sent or received, internet 	usage, topping up a prepaid value and VLR or Visitor Location Registry data which is generated whenever the phone is question has power. It essentially 	communicates to the Base Transceiver Stations (BSTs) that the phone is in the coverage area. The CDR includes records of calls made, duration of the call 	and information about the device. It is therefore stored for a longer period of time. The VLR data is however larger in volume and can be written over. Both VLR and CDR data can provide invaluable information that can be used for urban planning strategies.	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; LIRNE&lt;i&gt;asia, &lt;/i&gt;a regional policy and regulation think-tank has carried out an extensive study 	demonstrating the value of MNBD in SriLanka.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt; This has been used to understand and sometimes even 	monitor land use patterns, travel patterns during peak and off seasons and the congregation of communities across regions. This study was however only 	undertaken after the data had been suitably pseudonymised.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; The study revealed that MNBD was incredibly 	valuable in generating important information that could be used by policy formulators and decision makers, because of two primary characteristics. Firstly, 	it comes close to a comprehensive coverage of the demographic within developing countries, thus using mobile phones as sensors to generate useful data. Secondly, people using mobile phones across vast geographic areas reflect important information regarding patterns of their travel and movement.	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MNBD allows for the tracking and mapping of changes in population densities on a daily basis, thus identifying 'home' and 'work' locations, informing 	policy makers of population congestion so that thy may be able to formulate policies with respect to easing this congestion. According to Rohan Samarajiva, 	founding chair of LIRNEasia, "This allows for real-time insights on the geo-spatial distribution of population, which may be used by urban planners to 	create more efficient traffic management systems."&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This can also be used for the 	developmental economic policies. For example, the northern region of Colombo, a region inhabited by the low income families shows a lower population density on weekdays. This is reflective of the large numbers travelling to southern Colombo for employment.	&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Similarly, patterns of land use can be ascertained by analyzing the various 	loading patterns of base stations. Building on the success of the Mobile Data analysis project in SriLanka LIRNEasia plans to collaborate with partners in 	India and Bangladesh to assimilate real time information about the behavioral tendencies of citizens, using which policy makers may be able to make 	informed decisions. When this data is combined with user friendly virtual platforms such as smartphone Apps or web portals, it can also help citizens make informed choices about their day to day activities and potentially beneficial long term decisions.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Challenges of using Mobile Network Data&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile networks invest significant sums of money in obtaining information regarding usage patterns of their services. Consequently, they may use this data 	to develop location based advertizing. In this context, there is a greater reluctance to share data for public purposes. Allowing access to one operator's 	big data by another could result in significant implications on the other with respect to the competitive advantage shared by the operator. A plausible 	solution to this conundrum is the accumulation of data from multiple sources without separating or organizing it according to the source it originates 	from. There is thus a lesser chance of sensitive information of one company being used by another. However, even operators do have concerns about how the 	data would be handled before this "mashing up" occurs and whether it might be leaked by the research organization itself. LIRNE&lt;i&gt;asia &lt;/i&gt;used 	comprehensive non-disclosure agreements to ensure that the researchers who worked with the data were aware of the substantial financial penalties that may 	be imposed on them for data breaches. The access to the data was also restricted. &lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another line of argumentation advocates for the open sharing of data. A recent article in the &lt;i&gt;Economist &lt;/i&gt;has articulated this in the context of the 	Ebola outbreak in West Africa. " 	&lt;i&gt; Releasing the data, though, is not just a matter for firms since people's privacy is involved. It requires governmental action as well. Regulators in 		each affected country would have to order operators to make their records accessible to selected researchers, who through legal agreements would only 		be allowed to use the data in a specific manner. For example, Orange, a major mobile phone network operator has made millions of CDRs from Senegal and 		The Ivory Coast available for researchers for their use under its Data Development Initiative. However the Political will amongst regulators and 		Network operators to do this seems to be lacking."&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;b&gt;[69]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would therefore be beneficial for companies to collaborate with the customers who create the data and the researchers who want to use it to extract important insights. This however would require the creation of and subsequent adherence to self regulatory codes of conduct.	&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt; In addition to this cooperation between network operators will assist in facilitating the transference 	of the data of their customers to research organizations. Sri Lanka is an outstanding example of this model of cooperation which has enabled various 	operators across spectrums to participate in the mobile-money enterprise.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(ii) &lt;/b&gt; &lt;b&gt;Big Data and Government Delivery of Services and Functions &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The analysis of Data procured in real time has proven to be integral to the formulation of policies, plans and executive decisions. Especially in an Asian 	context, Big data can be instrumental in urban development, planning and the allocation of resources in a manner that allows the government to keep up with 	the rapidly growing demands of an empowered population whose numbers are on an exponential rise. Researchers have been able to use data from mobile 	networks to engage in effective planning and management of infrastructure, services and resources. If, for example, a particular road or highway has been 	blocked for a particular period of time an alternative route is established before traffic can begin to build up creating a congestion, simply through an 	analysis of information collected from traffic lights, mobile networks and GPS systems.&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also an emerging trend of using big data for state controlled services such as the military. The South Korean Defense Minister Han Min Koo, in his recent briefing to President Park Geun-hye reflected on the importance of innovative technologies such as Big Data solutions.	&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chinese government has expressed concerns regarding data breaches and information leakages that would be extremely dangerous given the exceeding 	reliance of governments on big data. A security report undertaken by Qihoo 360, China's largest software security provider established that 2,424 of the 	17,875 Web security loopholes were on government websites. Considering the blurring line between government websites and external networks, it has become 	all the more essential for authorities to boost their cyber security protections.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Japanese government has considered investing resources in training more data scientists who may be able to analyze the raw data obtained from various 	sources and utilize requisite techniques to develop an accurate analysis. The Internal Affairs and Communication Ministry planned to launch a free online 	course on big data, the target of which would be corporate workers as well as government officials.&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data analytics is emerging as an efficient technique of monitoring the public transport management systems within Singapore. A recent collaboration between IBM, StarHub, The Land Transport Authority and SMRT initiated a research study to observe the movement of commuters across regions.	&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This has been instrumental in revamping the data collection systems already in 	place and has allowed for the procurement of additional systems of monitoring.&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The idea is essentially to institute a "black box" of information for every operational unit that allows for the relaying of real-time information from sources as varied as power switches, tunnel sensors and the wheels, through assessing patterns of noise and vibration.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to this there are numerous projects in place that seek to utilize Big Data to improve city life. According to Carlo Ritti, Director of the MIT 	Senseable City Lab, "We are now able to analyze the pulse of a city from moment to moment. Over the past decade, digital technologies have begun to blanket 	our cities, forming the backbone of a large, intelligent infrastructure." &lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The 	professor of Information Architecture and Founding Director of the Singapore ETH Centre, Gerhart Schmitt has observed that "the local weather has a major 	impact on the behavior of a population." In this respect the centre is engaged in developing a range of visual platforms to inform citizens on factors such as air quality which would enable individuals to make everyday choices such as what route to take when planning a walk or predict a traffic jam.	&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Schmitt's team has also been able to arrive at a pattern that connects the 	demand for taxis with the city's climate. The amalgamation of taxi location with rainfall data has been able to help locals hail taxis during a storm. This 	form of data can be used in multiple ways allowing the visualization of temperature hotspots based on a "heat island" effect where buildings, cars and 	cooling units cause a rise in temperature. &lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft has recently entered into a partnership with the Federal University of Minas Gerais, one of the largest universities in Brazil to undertake a research project that could potentially predict traffic jams up to an hour in advance.	&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The project attempts to analyze information from transport departments, road 	traffic cameras and drivers social network profiles to identify patterns that they could use to help predict traffic jams approximately 15 to 60 minutes 	before they actually happen.&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In anticipation of the increasing demand for professionals with requisite training in data sciences, the Malaysian Government has planned to increase the 	number of local data scientists from the present 80 to 1500 by 2020, through the support of the universities within the country.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;IV. &lt;/b&gt; &lt;b&gt;Big Data and the Private Sector in the Global South &lt;/b&gt;&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Essential considerations in the operations of Big Data in the Private sector in the Asia Pacific region have been extracted by a comprehensive survey 	carried out by the Economist Intelligence Unit.&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt; Over 500 executives across the Asia Pacific region were 	surveyed, from across industries representing a diverse range of functions. 69% of these companies had an annual turnover of over US $500m. The respondents 	were senior managers responsible for taking key decisions with regard to investment strategies and the utilization of big data for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The results of the Survey conclusively determined that firms in the Asia Pacific region have had limited success with implementing Big Data Practices. A 	third of the respondents claimed to have an advanced knowledge of the utilization of big data while more than half claim to have made limited progress in 	this regard. Only 9% of the Firms surveyed cited internal barriers to implementing big data practices. This included a significant difficulty in enabling 	the sharing of information across boundaries. Approximately 40% of the respondents surveyed claimed they were unaware of big data strategies, even if they 	had in fact been in place simply because these had been poorly communicated to them. Almost half of the firms however believed that big data plays an 	important role in the success of the firm and that it can contribute to increasing revenue by 25% or more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Numerous obstacles in the adoption of big data were cited by the respondents. These include the lack of suitable software to interpret the data and the 	lack of in-house skills to analyze the data appropriately. In addition to this, the lack of willingness on the part of various departments to share their 	data for the fear of a breach or leak was thought to be a major hindrance. This combined with a lack of communication between the various departments and 	exceedingly complicated reports that cannot be analyzed given the limited resources and lack of human capital qualified enough to carry out such an 	analysis, has resulted in an indefinite postponement of any policy propounding the adoption of big data practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 59% of the firms surveyed agreed that collaboration is integral to innovation and that information silos are a huge hindrance within a knowledge based 	economy. There is also a direct correlation between the size of the company and its progress in adopting big data, with larger firms adopting comprehensive 	strategies more frequently than smaller ones. A major reason for this is that large firms with substantially greater resources are able to actualize the 	benefits of big data analytics more efficiently than firms with smaller revenues. These businesses which have advanced policies in place outlining their 	strategies with respect to their reliance on big data are also more likely to communicate these strategies to their employees to ensure greater clarity in 	the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of big data was recently voted as the "best management practice" of the past year according to a cumulative ranking published by Chief Executive 	China Magazine, a Trade journal published by Global Sources on 13th January, 2015 in Beijing. The major benefit cited was the real-time information sourced from customers, which allows for direct feedback from clients when making decisions regarding changes in products or services.	&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A significant contributor to the lack of adequate usage of data analytics is the belief that a PhD is a prerequisite for entering the field of data 	science. This misconception was pointed out by Richard Jones, vice president of Cloudera in the Australia, New Zealand and the Asean region. Cloudera 	provides businesses with the requisite professional services that they may need to effectively utilize Big Data. This includes a combination of the 	necessary manpower, technology and consultancy services.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Deepak Ramanathan, the 	chief technology officer, SAS Asia Pacific believes that this skill gap can be addressed by forming data science teams within both governments and private 	enterprises. These teams could comprise of members with statistical, coding and business skills and allow them to work in a collaborative manner to address 	the problem at hand.&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; SAS is an Enterprise Software Giant that creates tools 	tailored to suit business users to help them interpret big data. Eddie Toh, the planning and marketing manager of Intel's data center platform believes 	that businesses do not necessarily need data scientists to be able to use big data analytics to their benefit and can in fact outsource the technical 	aspects of the interpretation of this data as and when required.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analytical team at Dell has forged a partnership with Brazilian Public Universities to facilitate the development of a local talent pool in the field of data analytics. The Instituto of Data Science (IDS) will provide training methodologies for in person or web based classes.	&lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The project is being undertaken by StatSoft, a subsidiary of Dell that was 	acquired by the technology giant last year. &lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;V. &lt;/b&gt; &lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have emerged numerous challenges in the analysis and interpretation of Big Data. While it presents an extremely engaging opportunity, which has the 	potential to transform the lives of millions of individuals, inform the private sector and influence government, the actualization of this potential 	requires the creation of a sustainable foundational framework ; one that is able to mitigate the various challenges that present themselves in this 	context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A colossal increase in the rate of digitization has resulted in an unprecedented increment in the amount of Big Data available, especially through the 	rapid diffusion cellular technology. The importance of mobile phones as a significant source of data, especially in low income demographics cannot be 	overstated. This can be used to understand the needs and behaviors of large populations, providing an in depth insight into the relevant context within 	which valuable assessments as to the competencies, suitability and feasibilities of various policy mechanisms and legal instruments can be made. However, 	this explosion of data does have a lasting impact on how individuals and organizations interact with each other, which might not always be reflected in the 	interpretation of raw data without a contextual understanding of the demographic. It is therefore vital to employ the appropriate expertise in assessing 	and interpreting this data. The significant lack of a human resource to capital to analyze this information in an accurate manner poses a definite 	challenge to its effective utilization in the Global South.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal and technological implications of using Big Data are best conceptualized within the deliberations on protecting the privacy of the contributors 	to this data. The primary producers of this information, from across platforms, are often unaware that they are in fact consenting to the subsequent use of 	the data for purposes other than what was intended. For example people routinely accept terms and conditions of popular applications without understanding 	where or how the data that they inadvertently provide will be used.&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt; This is especially true of media 	generated on social networks that are increasingly being made available on more accessible platforms such as mobile phones and tablets. Privacy has and 	always will remain an integral pillar of democracy. It is therefore essential that policy makers and legislators respond effectively to possible 	compromises of privacy in the collection and interpretation of this data through the institution of adequate safeguards in this respect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another challenge that has emerged is the access and sharing of this data. Private corporations have been reluctant to share this data due to concerns 	about potential competitors being able to access and utilize the same. In addition to this, legal considerations also prevent the sharing of data collected 	from their customers or users of their services. The various technical challenges in storing and interpreting this data adequately also prove to be 	significant impediments in the collection of data. It is therefore important that adequate legal agreements be formulated in order to facilitate a reliable 	access to streams of data as well as access to data storage facilities to accommodate for retrospective analysis and interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order for the use of Big Data to gain traction, it is important that these challenges are addressed in an efficient manner with durable and 	self-sustaining mechanisms of resolving significant obstructions. The debates and deliberations shaping the articulation of privacy concerns and access to 	such data must be supported with adequate tools and mechanisms to ensure a system of &lt;i&gt;"privacy-preserving analysis." The &lt;/i&gt;UN Global Pulse has put 	forth the concept of data philanthropy to attempt to resolve these issues, wherein " &lt;i&gt;corporations &lt;/i&gt;[would] 	&lt;i&gt; take the initiative to anonymize (strip out all personal information) their data sets and provide this data to social innovators to mine the data for 		insights, patterns and trends in realtime or near realtime."&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;b&gt;[92]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concept of data philanthropy highlights particular challenges and avenues that may be considered for future deliberations that may result in specific 	refinements to the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the primary uses of Big Data, especially in developing countries is to address important developmental issues such as the availability of clean 	water, food security, human health and the conservation of natural resources. Effective Disaster management has also emerged as one of the key functions of 	Big Data. It therefore becomes all the more important for organizations to assess the information supply chains pertaining to specific data sources in 	order to identify and prioritize the issues of data management. &lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt; Data emerging from different contexts, 	across different sources may appear in varied compositions and would differ significantly across economic demographics. The Big Data generated from certain 	contexts would be inefficient due to the unavailability of data within certain regions and the resulting studies affecting policy decisions should take into account this discrepancy. This data unavailability has resulted in a digital divide which is especially prevalent in the global south.	&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Appropriate analysis of the Big Data generated would provide a valuable insight into the key areas and inform policy makers with respect to important 	decisions. However, it is necessary to ensure that the quality of this data meets a specific standard and appropriate methodological processes have been 	undertaken to interpret and analyze this data. The government is a key actor that can shape the ecosystem surrounding the generation, analysis and 	interpretation of big data. It is therefore essential that governments of countries across the global south recognize the need to collaborate with civic 	organizations as well technical experts in order to create appropriate legal frameworks for the effective utilization of this data.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Onella, Jukka- Pekka. &lt;i&gt;"&lt;/i&gt;Social Networks and Collective Human Behavior&lt;i&gt;." UN Global Pulse&lt;/i&gt;. 10 Nov.2011. 			&amp;lt;http://www.unglobalpulse.org/node/14539&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; http://www.business2community.com/big-data/evaluating-big-data-predictive-analytics-01277835&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; http://unglobalpulse.org/sites/default/files/BigDataforDevelopment-UNGlobalPulseJune2012.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid, p.13, pp.5&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Helbing, Dirk , and Stefano Balietti. "From Social Data Mining to Forecasting Socio-Economic Crises." &lt;i&gt;Arxiv &lt;/i&gt;(2011) 1-66. 26 Jul 2011 			http://arxiv.org/pdf/1012.0178v5.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Manyika, James, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh andAngela H. Byers. &lt;i&gt;"&lt;/i&gt;Big data: The next frontier 			for innovation, competition, and productivity.&lt;i&gt;" McKinsey&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Global Institute &lt;/i&gt; (2011): 1-137. May 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; "World Population Prospects, the 2010 Revision." &lt;i&gt;United Nations Development Programme.&lt;/i&gt; &amp;lt;http://esa.un.org/unpd/wpp/unpp/panel_population.htm&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Mobile phone penetration, measured by Google, from the number of mobile phones per 100 habitants, was 96% in Botswana, 63% in Ghana, 66% in 			Mauritania, 49% in Kenya, 47% in Nigeria, 44% in Angola, 40% in Tanzania (Source: Google Fusion Tables)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; http://www.brookings.edu/blogs/africa-in-focus/posts/2015/04/23-big-data-mobile-phone-highway-sy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &amp;lt;http://www.google.com/fusiontables/Home/&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; "Global Internet Usage by 2015 [Infographic]." &lt;i&gt;Alltop. &lt;/i&gt;&amp;lt;http://holykaw.alltop.com/global-internetusage-by-2015-infographic?tu3=1&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Goetz, Thomas. "Harnessing the Power of Feedback Loops." &lt;i&gt;Wired.com. &lt;/i&gt;Conde Nast Digital, 19 June 2011. 			&amp;lt;http://www.wired.com/magazine/2011/06/ff_feedbackloop/all/1&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Bollier, David. &lt;i&gt;The Promise and Peril of Big Data. &lt;/i&gt;The Aspen Institute, 2010. 			&amp;lt;http://www.aspeninstitute.org/publications/promise-peril-big-data&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Eagle, Nathan and Alex (Sandy) Pentland. "Reality Mining: Sensing Complex Social Systems",&lt;i&gt;Personal and Ubiquitous Computing&lt;/i&gt;, 10.4 (2006): 			255-268.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Kirkpatrick, Robert. "Digital Smoke Signals." &lt;i&gt;UN Global Pulse. &lt;/i&gt;21 Apr. 2011. 			&amp;lt;http://www.unglobalpulse.org/blog/digital-smoke-signals&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; OECD, Future Global Shocks, Improving Risk Governance, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; "Economy: Global Shocks to Become More Frequent, Says OECD." &lt;i&gt;Organisation for Economic Cooperationand Development. &lt;/i&gt;27 June. 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Friedman, Jed, and Norbert Schady. &lt;i&gt;How Many More Infants Are Likely to Die in Africa as a Result of the Global Financial Crisis? &lt;/i&gt;Rep. The 			World Bank &amp;lt;http://siteresources.worldbank.org/INTAFRICA/Resources/AfricaIMR_FriedmanSchady_060209.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute,June 			2011&amp;lt;http://www.mckinsey.com/mgi/publications/big_data/pdfs/MGI_big_data_full_report.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; The word "crowdsourcing" refers to the use of non-official actors ("the crowd") as (free) sources of information, knowledge and services, in 			reference and opposition to the commercial practice of&lt;/p&gt;
&lt;p&gt;outsourcing. "&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Burke, J., D. Estrin, M. Hansen, A. Parker, N. Ramanthan, S. Reddy and M.B. Srivastava. &lt;i&gt;ParticipatorySensing. &lt;/i&gt;Rep. Escholarship, 			University of California, 2006. &amp;lt;http://escholarship.org/uc/item/19h777qd&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; "Crisis Mappers Net-The international Network of Crisis Mappers." &amp;lt;http://crisismappers.net&amp;gt;, http://haiti.ushahidi.com and Goldman et al., 			2009&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Alex Pentland cited in "When There's No Such Thing As Too Much Information". &lt;i&gt;The New York Times&lt;/i&gt;.23 Apr. 			2011&amp;lt;http://www.nytimes.com/2011/04/24/business/24unboxed.html?_r=1&amp;amp;src=tptw&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Nathan Eagle also cited in "When There's No Such Thing As Too Much Information". &lt;i&gt;The New YorkTimes&lt;/i&gt;. 23 Apr. 2011. 			&amp;lt;http://www.nytimes.com/2011/04/24/business/24unboxed.html?_r=1&amp;amp;src=tptw&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Helbing and Balietti. "From Social Data Mining to Forecasting Socio-Economic Crisis."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Eysenbach G. &lt;i&gt;Infodemiology: tracking flu-related searches on the Web for syndromic surveillance.&lt;/i&gt;AMIA 			(2006)&amp;lt;http://yi.com/home/EysenbachGunther/publications/2006/eysenbach2006cinfodemiologyamia proc.pdf&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Syndromic Surveillance (SS)." &lt;i&gt;Centers for Disease Control and Prevention. &lt;/i&gt;06 Mar. 			2012.&amp;lt;http://www.cdc.gov/ehrmeaningfuluse/Syndromic.html&amp;gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; Health Map &amp;lt;http://healthmap.org/en/&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; see &lt;a href="http://www.detective.io/"&gt;www.detective.io&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; www.ushahidi.com&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;a href="http://www.facebook.com/BlackMondayMovement"&gt;www.facebook.com/BlackMondayMovement&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ushahidi is a nonprofit tech company that was developed to map reports of violence in Kenya followingthe 2007 post-election fallout. Ushahidi 			specializes in developing "&lt;i&gt;free and open source software for&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;information collection, visualization and interactive mapping." &lt;/i&gt; &amp;lt;http://ushahidi.com&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Conducted by the European Commission's Joint Research Center against data on damaged buildingscollected by the World Bank and the UN from satellite 			images through spatial statistical techniques.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; www.ushahidi.com&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; See https://&lt;b&gt;tacticaltech&lt;/b&gt;.org/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; see www. flowminder.org&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;a href="http://post2015.unglobalpulse.net/"&gt;http://post2015.unglobalpulse.net/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; http://allafrica.com/stories/201507151726.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; http://www.computerworld.com/article/2948226/big-data/opinion-apple-and-ibm-have-big-data-plans-for-education.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; http://www.grameenfoundation.org/where-we-work/sub-saharan-africa/uganda&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; http://chequeado.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; http://datochq.chequeado.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Times of India &lt;/i&gt; (2015): "Chandigarh May Become India's First Smart City," 12 January, http://timesofi ndia.indiatimes.com/india/Chandigarh- may-become-Indias-fi 			rst-smart-city/articleshow/ 45857738.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; http://www.cisco.com/web/strategy/docs/scc/ioe_citizen_svcs_white_paper_idc_2013.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Townsend, Anthony M (2013): &lt;i&gt;Smart Cities: Big Data, Civic Hackers and the Quest for a New Utopia&lt;/i&gt;, New York: WW Norton.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; See "Street Bump: Help Improve Your Streets" on Boston's mobile app to collect data on roadconditions,			&lt;a href="http://www.cityofboston.gov/DoIT/"&gt;http://www.cityofboston.gov/DoIT/&lt;/a&gt; apps/streetbump.asp&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Mayer-Schonberger, V and K Cukier (2013): &lt;i&gt;Big Data: A Revolution That Will Transform How We Live, Work, and Think&lt;/i&gt;, London: John Murray.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; http://www.epw.in/review-urban-affairs/big-data-improve-urban-planning.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Newman, M E J and M Girvan (2004): "Finding and Evaluating Community Structure in Networks,"&lt;i&gt;Physical Review E, American Physical Society&lt;/i&gt;, 			Vol 69, No 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; http://www.sundaytimes.lk/150412/sunday-times-2/big-data-can-make-south-asian-cities-smarter-144237.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; http://www.epw.in/review-urban-affairs/big-data-improve-urban-planning.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; GSMA (2014): "GSMA Guidelines on Use of Mobile Data for Responding to Ebola," October, http://			&lt;a href="http://www.gsma.com/mobilefordevelopment/wpcontent/"&gt;www.gsma.com/mobilefordevelopment/wpcontent/&lt;/a&gt; uploads/2014/11/GSMA-Guidelineson-&lt;/p&gt;
&lt;p&gt;protecting-privacy-in-the-use-of-mobilephone- data-for-responding-to-the-Ebola-outbreak-_ October-2014.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; An example of the early-stage development of a self-regulatory code may be found at http:// lirneasia.net/2014/08/what-does-big-data-sayabout- 			sri-lanka/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; See "Sri Lanka's Mobile Money Collaboration Recognized at MWC 2015," &lt;a href="http://lirneasia/"&gt;http://lirneasia&lt;/a&gt;. 			net/2015/03/sri-lankas-mobile-money-colloboration- recognized-at-mwc-2015/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; http://www.thedailystar.net/big-data-for-urban-planning-57593&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; &lt;a href="http://koreaherald.com/"&gt;http://koreaherald.com&lt;/a&gt; , 19/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; http://www.news.cn/, 25/11/2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; &lt;a href="http://the-japan-news.com/"&gt;http://the-japan-news.com&lt;/a&gt; , 20/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; http://www.todayonline.com/singapore/can-big-data-help-tackle-mrt-woes&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; http://edition.cnn.com/2015/06/24/tech/big-data-urban-life-singapore/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; http://venturebeat.com/2015/04/03/how-microsofts-using-big-data-to-predict-traffic-jams-up-to-an-hour-in-advance/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; https://www.hds.com/assets/pdf/the-hype-and-the-hope-summary.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; &lt;a href="http://www.news.cn/"&gt;http://www.news.cn&lt;/a&gt; , 14/01/2015&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; http://www.techgoondu.com/2015/06/29/plugging-the-big-data-skills-gap/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; http://www.zdnet.com/article/dell-to-create-big-data-skills-in-brazil/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Efrati, Amir. "'Like' Button Follows Web Users." &lt;i&gt;The Wall Street Journal. &lt;/i&gt;18 May 2011.&lt;/p&gt;
&lt;p&gt;&amp;lt;http://online.wsj.com/article/SB10001424052748704281504576329441432995616.html&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Krikpatrick, Robert. "Data Philanthropy: Public and Private Sector Data Sharing for Global Resilience."&lt;/p&gt;
&lt;p&gt;&lt;i&gt;UN Global Pulse. &lt;/i&gt; 16 Sept. 2011. &amp;lt;http://www.unglobalpulse.org/blog/data-philanthropy-public-privatesector-data-sharing-global-resilience&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Laney D (2001) 3D data management: Controlling data volume, velocity and variety. Available at: http://blogs. 			gartner.com/doug-laney/files/2012/01/ad949-3D-DataManagement-Controlling-Data-Volume-Velocity-andVariety.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; Boyd D and Crawford K (2012) Critical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon. Information, 			Communication, &amp;amp; Society 15(5): 662-679.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis'&gt;https://cis-india.org/internet-governance/blog/big-data-in-the-global-south-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-01-24T02:54:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report">
    <title>Big Data in India: Benefits, Harms, and Human Rights - Workshop Report</title>
    <link>https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society held a one-day workshop on “Big Data in India: Benefits, Harms and Human Rights” at India Habitat Centre, New Delhi on the 1st of October, 2016.  This report is a compilation of the the issues discussed, ideas exchanged and challenges recognized during the workshop. The objective of the workshop was to discuss aspects of big data technologies in terms of harms, opportunities and human rights. The discussion was designed around an extensive study of current and potential future uses of big data for governance in India, that CIS has undertaken over the last year with support from the MacArthur Foundation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contents&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#1"&gt;&lt;strong&gt;Big Data: Definitions and Global South Perspectives&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#2"&gt;&lt;strong&gt;Aadhaar as Big Data&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#3"&gt;&lt;strong&gt;Seeding&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#4"&gt;&lt;strong&gt;Aadhaar and Data Security&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#5"&gt;&lt;strong&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#6"&gt;&lt;strong&gt;The Myths surrounding Aadhaar&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#7"&gt;&lt;strong&gt;IndiaStack and FinTech Apps&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#8"&gt;&lt;strong&gt;Problems with UID&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;Big Data: Definitions and Global South Perspectives&lt;/h2&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;“Big Data” has been defined by multiple scholars till date. The first consideration at the workshop was to discuss various definitions of big data, and also to understand what could be considered Big Data in terms of governance, especially in the absence of academic consensus. One of the most basic ways to define it, as given by the National Institute of Standards and Technology, USA, is to take it to be the data that is beyond the computational capacity of current systems. This definition has been accepted by the UIDAI of India. Another participant pointed out that Big Data is not only indicative of size, but rather the nature of data which is unstructured, and continuously flowing. The Gartner definition of Big Data relies on the three Vs i.e. Volume (size), Velocity (infinite number of ways in which data is being continuously collected) and Variety (the number of ways in which data can be collected in rows and columns).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The presentation also looked at ways in which Big Data is different from traditional data. It was pointed out that it can accommodate diverse unstructured datasets, and it is ‘relational’ i.e. it needs the presence of common field(s) across datasets which allows these fields to be conjoined. For e.g., the UID in India is being linked to many different datasets, and they don’t constitute Big Data separately, but do so together. An increasingly popular definition is to define data as “Big Data” based on what can be achieved through it. It has been described by authors as the ability to harness new kinds of insight which can inform decision making. It was pointed out that CIS does not subscribe to any particular definition, and is still in the process of coming up with a comprehensive definition of Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Further, discussion touched upon the approach to Big Data in the Global South. It was pointed out that most discussions about Big Data in the Global South are about the kind of value that it can have, the ways in which it can change our society. The Global North, on the other hand, &amp;nbsp;has moved on to discussing the ethics and privacy issues associated with Big Data.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;After this, the presentation focussed on case studies surrounding key Central Government initiatives and projects like Aadhaar, Predictive Policing, and Financial Technology (FinTech).&lt;/p&gt;
&lt;h2 id="2"&gt;Aadhaar as Big Data&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In presenting CIS’ case study on Aadhaar, it was pointed out that initially, Aadhaar, with its enrollment dataset was by itself being seen as Big Data. However, upon careful consideration in light of definitions discussed above, it can be seen as something that enables Big Data. The different e-governance projects within Digital India, along with Aadhaar, constitute Big Data. The case study discussed the Big Data implications of Aadhaar, and in particular looked at a ‘cradle to grave’ identity mapping through various e-government projects and the datafication of various transaction generated data.&lt;/p&gt;
&lt;h2 id="3"&gt;Seeding&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Any digital identity like Aadhaar typically has three features: 1. Identification i.e. a number or card used to identify yourself; 2. Authentication, which is based on your number or card and any other digital attributes that you might have; 3. Authorisation: As bearers of the digital identity, we can authorise the service providers to take some steps on our behalf. The case study discussed ‘seeding’ which enables the Big Data aspects of Digital India. In the process of seeding, different government databases can be seeded with the UID number using a platform called Ginger. Due to this, other databases can be connected to UIDAI, and through it, data from other databases can be queried by using your Aadhaar identity itself. This is an example of relationality, where fractured data is being brought together. At the moment, it is not clear whether this access by UIDAI means that an actual physical copy of such data from various sources will be transferred to UIDAI’s servers or if they will &amp;nbsp;just access it through internet, but the data remains on the host government agency’s server. An example of even private parties becoming a part of this infrastructure was raised by a participant when it was pointed out that Reliance Jio is now asking for fingerprints. This can then be connected to the relational infrastructure being created by UIDAI. The discussion then focused on how such a structure will function, where it was mentioned that as of now, it cannot be said with certainty that UIDAI will be the agency managing this relational infrastructure in the long run, even though it is the one building it.&lt;/p&gt;
&lt;h2 id="4"&gt;Aadhaar and Data Security&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This case study also dealt with the sheer lack of data protection legislation in India except for S.43A of the IT Act. The section does not provide adequate protection as the constitutionality of the rules and regulations under S.43A is ambivalent. More importantly, it only refers to private bodies. Hence, any seeding which is being done by the government is outside the scope of data protection legislation. Thus, at the moment, no legal framework covers the processes and the structures being used for datasets. Due to the inapplicability of S.43A to public bodies, questions were raised as to the existence of a comprehensive data protection policy for government institutions. Participants answered the question in the negative. They pointed out that if any government department starts collecting data, they develop their own privacy policy. There are no set guidelines for such policies and they do not address concerns related to consent, data minimisation and purpose limitation at all. Questions were also raised about the access and control over Big Data with government institutions. A tentative answer from a participant was that such data will remain under the control of &amp;nbsp;the domain specific government ministry or department, for e.g. MNREGA data with the Ministry of Rural Development, because the focus is not on data centralisation but rather on data linking. As long as such fractured data is linked and there is an agency that is responsible to link them, this data can be brought together. Such data is primarily for government agencies. But the government is opening up certain aspects of the data present with it for public consumption for research and entrepreneurial purposes.The UIDAI provides you access to your own data after paying a minimal fee. The procedure for such access is still developing.&lt;/p&gt;
&lt;h2 id="5"&gt;Aadhaar’s Relational Arrangement with Big Data Scheme&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The various Digital India schemes brought in by the government were elucidated during the workshop. It was pointed out that these schemes extend to myriad aspects of a citizen’s daily life and cover all the essential public services like health, education etc. This makes Aadhaar imperative even though the Supreme Court has observed that it is not mandatory for every citizen to have a unique identity number. The benefits of such identity mapping and the ecosystem being generated by it was also enumerated during the discourse. But the complete absence of any data ethics or data confidentiality principles make us unaware of the costs at which these benefits are being conferred on us. Apart from surveillance concerns, the knowledge gap being created between the citizens and the government was also flagged. Three main benefits touted to be provided by Aadhaar were then analysed. The first is the efficient delivery of services. This appears to be an overblown claim as the Aadhaar specific digitisation and automation does not affect the way in which employment will be provided to citizens through MNREGA or how wage payment delays will be overcome. These are administrative problems that Aadhaar and associated technologies cannot solve. The second is convenience to the citizens. The fallacies in this assertion were also brought out and identified. Before the Aadhaar scheme was rolled in, ration cards were issued based on certain exclusion and inclusion criteria.. The exclusion and inclusion criteria remain the same while another hurdle in the form of Aadhaar has been created. As India is still lacking in supporting infrastructure such as electricity, server connectivity among other things, Aadhaar is acting as a barrier rather than making it convenient for citizens to enroll in such schemes.The third benefit is fraud management. Here, a participant pointed out that this benefit was due to digitisation in the form of GPS chips in food delivery trucks and electronic payment and not the relational nature of Aadhaar. Aadhaar is only concerned with the linking up or relational part. About deduplication, it was pointed out how various government agencies have tackled it quite successfully by using technology different from biometrics which is unreliable at the best of times.&lt;/p&gt;
&lt;h2 id="6"&gt;The Myths surrounding Aadhaar&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also reflected on the fact that &amp;nbsp;Aadhaar is often considered to be a panacea that subsumes all kinds of technologies to tackle leakages. However, this does not take into account the fact that leakages happen in many ways. A system should have been built to tackle those specific kinds of leakages, but the focus is solely on Aadhaar as the cure for all. Notably, participants &amp;nbsp;who have been a part of the government pointed out how this myth is misleading and should instead be seen as the first step towards a more digitally enhanced country which is combining different technologies through one medium.&lt;/p&gt;
&lt;h2 id="7"&gt;IndiaStack and FinTech Apps&lt;/h2&gt;
&lt;h3 id="71"&gt;What is India Stack?&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The focus then shifted to another extremely important Big Data project, India Stack, being conceptualised and developed &amp;nbsp;by a team of private developers called iStack, for the NPCI. It builds on the UID project, Jan Dhan Yojana and mobile services trinity to propagate and develop a cashless, presence-less, paperless and granular consent layer based on UID infrastructure to digitise India.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant pointed out that the idea of India Stack is to use UID as a platform and keep stacking things on it, such that more and more applications are developed. This in turn will help us to move from being a ‘data poor’ country to a ‘data rich’ one. The economic benefits of this data though as evidenced from the TAGUP report - a report about the creation of National Information Utilities to manage the data that is present with the government - is for the corporations and not the common man. The TAGUP report openly talks about privatisation of data.&lt;/p&gt;
&lt;h3 id="72"&gt;Problems with India Stack&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The granular consent layer of India Stack hasn’t been developed yet but they have proposed to base it on MIT Media Lab’s OpenPDS system. The idea being that, on the basis of the choices made by the concerned person, access to a person’s personal information may be granted to an agency like a bank. What is more revolutionary is that India Stack might even revoke this access if the concerned person expresses a wish to do so or the surrounding circumstances signal to India Stack that it will be prudent to do so. It should be pointed out that the the technology required for OpenPDS is extremely complex and is not available in India. Moreover, it’s not clear how this system would work. Apart from this, even the paperless layer has its faults and has been criticised by many since its inception, because an actual government signed and stamped paper has been the basis of a claim.. In the paperless system, you are provided a Digilocker in which all your papers are stored electronically, on the basis of your UID number. However, it was brought to light that this doesn’t take into account those who either do not want a Digilocker or UID number or cases where they do not have access to their digital records. How in such cases will people make claims?&lt;/p&gt;
&lt;h3 id="73"&gt;A Digital Post-Dated Cheque: It’s Ramifications&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A key change that FinTech apps and the surrounding ecosystem want to make is to create a digital post-dated cheque so as to allow individuals to get loans from their mobiles especially in remote areas. This will potentially cut out the need to construct new banks, thus reducing the capital expenditure , while at the same time allowing the credit services to grow. The direct transfer of money between UID numbers without the involvement of banks is a step to further help this ecosystem grow. Once an individual consents to such a system, however, automatic transfer of money from one’s bank accounts will be affected, regardless of the reason for payment. This is different from auto debt deductions done by banks presently, as in the present system banks have other forms of collateral as well. The automatic deduction now is only affected if these other forms are defaulted upon. There is no knowledge as to whether this consent will be reversible or irreversible. As Jan Dhan Yojana accounts are zero balance accounts, the account holder will be bled dry. The implication of schemes such as “Loan in under 8 minutes” were also discussed. The advantage of such schemes is that transaction costs are reduced.The financial institution can thus grant loans for the minimum amount without any additional enquiries. It was pointed out that this new system is based on living on future income much like the US housing bubble crash. Interestingly, in Public Distribution Systems, biometrics are insisted upon even though it disrupts the system. This can be seen as a part of the larger infrastructure to ensure that digital post-dated cheques become a success.&lt;/p&gt;
&lt;h3 id="74"&gt;The Role of FinTech Apps&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;FinTech ‘apps’ are being presented with the aim of propagating financial inclusion. The Technology Advisory Group for Unique Projects report stated that as managing such information sources is a big task, just like electricity utilities, a National Information Utilities (NIU) should be set up for data sources. These NIUs as per the report will follow a fee based model where they will be charging for their services for government schemes. The report identified two key NIUs namely the National Payments Corporation of India (NPCI) and the Goods and Services Tax Network (GSTN). The key usage that FinTech applications will serve is credit scoring. The traditional credit scoring data sources only comprised a thin file of records for an individual, but the data that FinTech apps collect - &amp;nbsp;a person’s UID number, mobile number. and bank account number all linked up, allow for a far &amp;nbsp;more comprehensive credit rating. Government departments are willing to share this data with FinTech apps as they are getting analysis in return. Thus, by using UID and the varied data sources that have been linked together by UID, a ‘thick file’ is now being created by FinTech apps. Banking apps have not yet gone down the route of FinTech apps to utilise Big Data for credit scoring purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The two main problems with such apps is that there is no uniform way of credit scoring. This distorts the rate at which a person has to pay interest. The consent layer adds another layer of complication as refusal to share mobile data with a FinTech app may lead to the app declaring one to be a risky investment thus, subjecting that individual to a &amp;nbsp;higher rate of interest .&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 id="75"&gt;Regulation of FinTech Apps and the UID Infrastructure&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt; India Stack and the applications that are being built on it, generate a lot of transaction metadata that is very intimate in nature. The privacy aspects of the UID legislation doesn't cover such data. The granular consent layer which has been touted to cover this still has to come into existence. Also, Big Data is based on sharing and linking of data. Here, privacy concerns and Big Data objectives clash. Big Data by its very nature challenges privacy principles like data minimisation and purpose limitation.The need for regulation to cover the various new apps and infrastructure which are being developed was pointed out.&lt;/p&gt;
&lt;h2 id="8"&gt;Problems with UID&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It has been observed that any problem present with Aadhaar is usually labelled as a teething problem, it’s claimed that it will be solved in the next 10 years. But, this begs the question - why is the system online right now?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Aadhaar is essentially a new data condition and a new exclusion or inclusion criteria. Data exclusion modalities as observed in Rajasthan after the introduction of biometric Point of Service (POS) machines at ration shops was found to be 45% of the population availing PDS services. This number also includes those who were excluded from the database by being included in the wrong dataset. There is no information present to tell us how many actual duplicates and how many genuine ration card holders were weeded out/excluded by POS.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also mentioned that any attempt to question Aadhaar is considered to be an attempt to go back to the manual system and this binary thinking needs to change. Big Data has the potential to benefit people, as has been evidenced by the scholarship and pension portals. However, Big Data’s problems arise in systems like PDS, where there is centralised exclusion at the level of the cloud. Moreover, the quantity problem present in the PDS and MNREGA systems persists. There is still the possibility of getting lesser grains and salary even with analysis of biometrics, hence proving that there are better technologies to tackle these problems. Presently, the accountability mechanisms are being weakened as the poor don’t know where to go to for redressal. Moreover, the mechanisms to check whether the people excluded are duplicates or not is not there. At the time of UID enrollment, out of 90 crores, 9 crore were rejected. There was no feedback or follow-up mechanism to figure out why are people being rejected. It was just assumed that they might have been duplicates.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another problem is the rolling out of software without checking for inefficiencies or problems at a beta testing phase. The control of developers over this software, is so massive that it can be changed so easily without any accountability.. The decision making components of the software are all proprietary like in the the de-duplication algorithm being used by the UIDAI. Thus, this leads to a loss of accountability because the system itself is in flux, none of it is present in public domain and there are no means to analyse it in a transparent fashion..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;These schemes are also being pushed through due to database politics. On a field study of NPR of citizens, another Big Data scheme, it was found that you are assumed to be an alien if you did not have the documents to prove that you are a citizen. Hence, unless you fulfill certain conditions of a database, you are excluded and are not eligible for the benefits that being on the database afford you.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why is the private sector pushing for UIDAI and the surrounding ecosystem?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Financial institutions stand to gain from encouraging the UID as it encourages the credit culture and reduces transaction costs.. Another advantage for the private sector is perhaps the more obvious one, that is allows for efficient marketing of products and services..&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The above mentioned fears and challenges were actually observed on the ground and the same was shown through the medium of a case study in West Bengal on the smart meters being installed there by the state electricity utility. While the data coming in from these smart meters is being used to ensure that a more efficient system is developed,it is also being used as a surrogate for income mapping on the basis of electricity bills being paid. This helps companies profile neighbourhoods. The technical officer who first receives that data has complete control over it and he can easily misuse the data. This case study again shows that instruments like Aadhaar and India Stack are limited in their application and aren’t the panacea that they are portrayed to be.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant &amp;nbsp;pointed out that in the light of the above discussions, the aim appears to be to get all kinds of data, through any source, and once you have gotten the UID, you link all of this data to the UID number, and then use it in all the corporate schemes that are being started. Most of the problems associated with Big Data are being described as teething problems. The India Stack and FinTech scheme is coming in when we already know about the problems being faced by UID. The same problems will be faced by India Stack as well.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Can you opt out of the Aadhaar system and the surrounding ecosystem?&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion then turned towards whether there can be voluntary opting out from Aadhaar. It was pointed out that the government has stated that you cannot opt out of Aadhaar. Further, the privacy principles in the UIDAI bill are ambiguously worded where individuals &amp;nbsp;only have recourse for basic things like correction of your personal information. The enforcement mechanism present in the UIDAI Act is also severely deficient. There is no notification procedure if a data breach occurs. . The appellate body ‘Cyber Appellate Tribunal’ has not been set up in three years.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;CCTNS: Big Data and its Predictive Uses&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is Predictive Policing?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The next big Big Data case study was on the &amp;nbsp;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS). Originally it was supposed to be a digitisation and interconnection scheme where police records would be digitised and police stations across the length and breadth of the country would be interconnected. But, in the last few years some police departments of states like Chandigarh, Delhi and Jharkhand have mooted the idea of moving on to predictive policing techniques. It envisages the use of existing statistical and actuarial techniques along with many other tropes of data to do so. It works in four ways: 1. By predicting the place and time where crimes might occur; 2. To predict potential future offenders; 3. To create profiles of past crimes in order to predict future crimes; 4. Predicting groups of individuals who are likely to be victims of future crimes.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How is Predictive Policing done?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;To achieve this, the following process is followed: 1. Data collection from various sources which includes structured data like FIRs and unstructured data like call detail records, neighbourhood data, crime seasonal patterns etc. 2. Analysis by using theories like the near repeat theory, regression models on the basis of risk factors etc. 3. Intervention&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Flaws in Predictive Policing and questions of bias&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;An obvious weak point in the system is that if the initial data going into the system is wrong or biased, the analysis will also be wrong. Efforts are being made to detect such biases. An important way to do so will be by building data collection practices into the system that protect its accuracy. The historical data being entered into the system is carrying on the prejudices inherited from the British Raj and biases based on religion, caste, socio-economic background etc.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;One participant brought about the issue of data digitization in police stations, and the impact of this haphazard, unreliable data on a Big Data system. This coupled with paucity of data is bound to lead to arbitrary results. An effective example was that of black neighbourhoods in the USA. These are considered problematic and thus they are policed more, leading to a higher crime rate as they are arrested for doing things that white people in an affluent neighbourhood get away with. This in turn further perpetuates the crime rate and it becomes a self-fulfilling prophecy. In India, such a phenomenon might easily develop in the case of migrants, de-notified tribes, Muslims etc. &amp;nbsp;A counter-view on bias and discrimination was offered here. One participant pointed out that problems with haphazard or poor quality of data is not a colossal issue as private companies are willing to fill this void and are actually doing so in exchange for access to this raw data. It was also pointed out how bias by itself is being used as an all encompassing term. There are multiplicities of biases and while analysing the data, care should be taken to keep it in mind that one person’s bias and analysis might and usually does differ from another. Even after a computer has analysed the data, the data still falls into human hands for implementation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The issue of such databases being used to target particular communities on the basis of religion, race, caste, ethnicity among other parameters was raised. Questions about control and analysis of data were also discussed, i.e. whether it will be top-down with data analysis being done in state capitals or will this analysis be done at village and thana levels as well too. It was discussed as topointed out how this could play a major role in the success and possible persecutory treatment of citizens, as the policemen at both these levels will have different perceptions of what the data is saying. . It was further pointed out, that at the moment, there’s no clarity on the mode of implementation of Big Data policing systems. Police in the USA have been seen to rely on Big Data so much that they have been seen to become ‘data myopic’. For those who are on the bad side of Big Data, in the Indian context, laws like preventive detention can be heavily misused.There’s a very high chance that predictive policing due to the inherent biases in the system and the prejudices and inefficiency of the legal system will further suppress the already targeted sections of the society. A counterpoint was raised and it was suggested that contrary to our fears, CCTNS might lead to changes in our understanding and help us to overcome longstanding biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Open Knowledge Architecture as a solution to Big Data biases?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The conference then mulled over the use of ‘Open Knowledge’ architecture to see whether it can provide the solution to rid Big Data of its biases and inaccuracies if enough eyes are there. It was pointed out that Open Knowledge itself can’t provide foolproof protection against these biases as the people who make up the eyes themselves are predominantly male belonging to the affluent sections of the society and they themselves suffer from these biases.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Who exactly is Big Data supposed to serve?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The discussion also looked at questions such as who is this data for? Janata Information System (JIS), is a concept developed by MKSS &amp;nbsp;where the data collected and generated by the government is taken to be for the common citizens. For e.g. MNREGA data should be used to serve the purposes of the labourers. The raw data as is available at the moment, usually cannot be used by the common man as it is so vast and full of information that is not useful for them at all. It was pointed out that while using Big Data for policy planning purposes, the actual string of information that turned out to be needed was very little but the task of unravelling this data for civil society purposes is humongous. By presenting the data in the right manner, the individual can be empowered. The importance of data presentation was also flagged. It was agreed upon that the content of the data should be for the labourer and not a MNC, as the MNC has the capability to utilise the raw data on it’s own regardless.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Concerns about Big Data usage&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Participants pointed out that &amp;nbsp;privacy concerns are usually brushed under the table due to a belief that the law is sufficient or that the privacy battle has already been lost. &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the absence of knowledge of domain and context, Big Data analysis is quite limited. Big Data’s accuracy and potential to solve problems needs to be factually backed.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The narrative of Big Data often rests on the assumption that descriptive statistics take over inferential statistics, thus eliminating the need for domain specific knowledge. It is claimed that the data is so big that it will describe everything that we need to know.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data is creating a shift from a deductive model of scientific rigour to an inductive one. In response to this, a participant offered the idea that troves of good data allow us to make informed questions on the basis of which the deductive model will be formed. A hybrid approach combining both deductive and inductive might serve us best.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The need to collect the right data in the correct format, in the right place was also expressed.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Potential Research Questions &amp;amp; Participants’ Areas of Research&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Following this discussion, participants brainstormed to come up with potential areas of research and research questions. They have been captured below:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data, Aadhaar and India Stack:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Has Aadhaar been able to tackle illegal ways of claiming services or are local negotiations and other methods still prevalent?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Is the consent layer of India Stack being developed in a way that provides an opportunity to the UID user to give informed consent? The OpenPDS and its counterpart in the EU i.e. the My Data Structure were designed for countries with strong privacy laws. Importantly, they were meant for information shared on social media and not for an individual’s health or credit history. India is using it in a completely different sphere without strong data protection laws. What were the granular consent layer structures present in the West designed for and what were they supposed to protect?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The question of ownership of data needs to be studied especially in context of &amp;nbsp;a globalised world where MNCs are collecting copious amounts of data of Indian citizens. What is the interaction of private parties in this regard?&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data and Predictive Policing:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How are inequalities being created through the Big Data systems? Lessons should be taken from the Western experience with the advent of predictive policing and other big data techniques - they tend to lead to perpetuation of the current biases which are already ingrained in the system.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It was also pointed out how while studying these topics and anything related to technology generally, we become aware of a divide that is present between the computational sciences and social sciences. This divide needs to be erased if Big Data or any kind of data is to be used efficiently. There should be a cross-pollination between different groups of academics. An example of this can be seen to be the ‘computational social sciences departments’ that have been coming up in the last 3-4 years.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Why are so many interim promises made by Big Data failing? A study of this phenomenon needs to be done from a social science perspective. This will allow one to look at it from a different angle.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Studying Big Data:&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What is the historical context of the terms of reference being used for Big Data? The current Big Data debate in India is based on parameters set by the West. For better understanding of Big Data, it was suggested that P.C. Mahalanobis’ experience while conducting the Indian census, (which was the Big Data of that time) can be looked at to get a historical perspective on Big Data. This comparison might allow us to discover questions that are important in the Indian context. It was also suggested that rather than using ‘Big Data’ as a catchphrase &amp;nbsp;to describe these new technological innovations, we need to be more discerning.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;What are the ideological aspects that must be considered while studying Big Data? What does the dialectical promise of technology mean? It was contended that every time there is a shift in technology, the zeitgeist of that period is extremely excited and there are claims that it will solve everything. There’s a need to study this dialectical promise and the social promise surrounding it.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Apart from the legitimate fears that Big Data might lead to exclusion, what are the possibilities in which it improve inclusion too?&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The diminishing barrier between the public and private self, which is a tangent to the larger public-private debate was mentioned.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How does one distinguish between technology failure and process failure while studying Big Data? &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Big Data: A Friend?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the concluding session, the fact that the Big Data moment cannot be wished away was acknowledged. The use of analytics and predictive modelling by the private sector is now commonplace and India has made a move towards a database state through UID and Digital India. The need for a nuanced debate, that does away with the false equivalence of being either a Big Data enthusiast or a luddite is crucial.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A participant offered two approaches to solving a Big Data problem. The first was the Big Data due process framework which states that if a decision has been taken that impacts the rights of a citizen, it needs to be cross examined. The efficacy and practicality of such an approach is still not clear. The second, slightly paternalistic in nature, was the approach where Big Data problems would be solved at the data science level itself. This is much like the affirmative algorithmic approach which says that if in a particular dataset, the data for the minority community is not available then it should be artificially introduced in the dataset. It was also &amp;nbsp;suggested that carefully calibrated free market competition can be used to regulate Big Data. For e.g. a private personal wallet company that charges higher, but does not share your data at all can be an example of such competition. &amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Another important observation was the need to understand Big Data in a Global South context and account for unique challenges that arise. While the convenience of Big Data is promising, its actual manifestation depends on externalities like connectivity, accurate and adequate data etc that must be studied in the Global South.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the promises of Big Data are encouraging, it is also important to examine its impacts and its interaction with people's rights. Regulatory solutions to mitigate the harms of big data while also reaping its benefits need to evolve.&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-90fa226f-6157-27d9-30cd-050bdc280875"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report'&gt;https://cis-india.org/internet-governance/big-data-in-india-benefits-harms-and-human-rights-a-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda, Akash Deep Singh and Geethanjali Jujjavarapu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Machine Learning</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2016-11-18T12:58:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/big-data-compilation.pdf">
    <title>Big Data Compilation</title>
    <link>https://cis-india.org/internet-governance/files/big-data-compilation.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/big-data-compilation.pdf'&gt;https://cis-india.org/internet-governance/files/big-data-compilation.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-02-26T16:18:07Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf">
    <title>Big Data and Positive Social Change in the Developing World</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf'&gt;https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-01T03:49:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>https://cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you">
    <title>Big Brother is watching you</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you</link>
    <description>
        &lt;b&gt;India has no requirements of transparency whether in the form of disclosing the quantum of interception or in the form of notification to people whose communication was intercepted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Chinmayi Arun was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/big-brother-is-watching-you/article5530857.ece"&gt;published in the Hindu&lt;/a&gt; on January 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Gujarat telephone tapping controversy is just one of  many kinds of abuse that surveillance systems enable. If a relatively  primitive surveillance system can be misused so flagrantly despite  safeguards that the government claims are adequate, imagine what is to  come with the Central Monitoring System (CMS) and Netra in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;News  reports indicate Netra — a “NEtwork TRaffic Analysis system” — will  intercept and examine communication over the Internet for keywords like  “attack,” “bomb,” “blast” or “kill.” While phone tapping and the CMS  monitor specific targets, Netra is vast and indiscriminate. It appears  to be the Indian government’s first attempt at mass surveillance rather  than surveillance of predetermined targets. It will scan tweets, status  updates, emails, chat transcripts and even voice traffic over the  Internet (including from platforms like Skype and Google Talk) in  addition to scanning blogs and more public parts of the Internet.  Whistle-blower Edward Snowden said of mass-surveillance dragnets that  “they were never about terrorism: they’re about economic spying, social  control, and diplomatic manipulation. They’re about power.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So  far, our jurisprudence has dealt with only targeted surveillance; and  even that in a woefully inadequate manner. This article discusses the  slow evolution of the right to privacy in India, highlighting the  context and manner in which it is protected. It then discusses  international jurisprudence to demonstrate how the right to privacy  might be protected more effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Constitution&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  proposal to include the right to privacy in the Constitution was  rejected by the Constituent Assembly with very little debate.  Separately, a proposal to give citizens an explicit fundamental right  against unreasonable governmental search and seizure was also put before  the Constituent Assembly. This proposal was supported by Dr. B.R.  Ambedkar. If accepted, it would have included within our Constitution  the principles from which the United States derives its protection  against state surveillance. However, the proposed amendment was rejected  by the Constituent Assembly.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Fortunately, the  Supreme Court has gradually been reading the right to privacy into the  fundamental rights explicitly listed in the Constitution. After its  initial reluctance to affirm the right to privacy in the 1954 case of &lt;i&gt;M.P. Sharma vs. Satish Chandra, &lt;/i&gt;the  court came around to the view that other rights and liberties  guaranteed in the Constitution would be seriously affected if the right  to privacy was not protected. In &lt;i&gt;Kharak Singh vs. The State of U.P., &lt;/i&gt;the  court recognised “the right of the people to be secure in their  persons, houses, papers, and effects” and declared that their right  against unreasonable searches and seizures was not to be violated. The  right to privacy here was conceived around the home, and unauthorised  intrusions into homes were seen as interference with the right to  personal liberty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the &lt;i&gt;Kharak Singh &lt;/i&gt;judgment  was progressive in its recognition of the right to privacy, it was  conservative about the circumstances in which the right applies. The  majority of judges held that shadowing a person could not be seen to  interfere with that person’s liberty. Dissenting with the majority,  Justice Subba Rao maintained that broad surveillance powers put innocent  citizens at risk, and that the right to privacy is an integral part of  personal liberty. He recognised that when a person is shadowed, her  movements will be constricted, and will certainly not be free movements.  His dissenting judgment showed remarkable foresight and his reasoning  is consistent with what is now a universally acknowledged principle that  there is a “chilling effect” on expression and action when people think  that they are being watched.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The right to privacy as defined by the Supreme Court now extends beyond government intrusion into private homes. After &lt;i&gt;Govind vs. State of M.P.&lt;/i&gt;, and &lt;i&gt;Dist. Registrar and Collector of Hyderabad vs. Canara Bank&lt;/i&gt;,  this right is seen to protect persons and not places. Any inroads into  this right for surveillance of communication must be for permissible  reasons and according to just, fair and reasonable procedure. State  action in violation of this procedure is open to a constitutional  challenge.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our meagre procedural safeguards against phone tapping were introduced in &lt;i&gt;PUCL vs. Union of India &lt;/i&gt;(1997)  after the Supreme Court was confronted with extensive, undocumented  phone tapping by the government. The apex court found itself compelled  to lay down what it saw as bare minimum safeguards, consisting mostly of  proper record-keeping and internal executive oversight by senior  officers such as the home secretary, the cabinet secretary, the law  secretary and the telecommunications secretary. These safeguards are of  little use since they are opaque and rely solely on members of the  executive to review surveillance requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There  is a difference between targeted surveillance in which reasons have to  be given for surveillance of particular people, and the  mass-surveillance which Netra sets up. The question of mass surveillance  and its attendant safeguards has been considered by the European Court  of Human Rights in &lt;i&gt;Liberty and Others vs. the United Kingdom&lt;/i&gt;.  Drawing upon its own past jurisprudence, the European Court insisted on  reasonable procedural safeguards. It stated quite clearly that there are  significant risks of arbitrariness when executive power is exercised in  secret and that the law should be sufficiently clear to give citizens  an adequate indication of the circumstances in which interception might  take place. Additionally, the extent of discretion conferred and the  manner of its exercise must be clear enough to protect individuals from  arbitrary interference. The principles laid down by the European Court  in relation to phone-tapping also require that the nature of the  offences which may give rise to an interception order, the procedure to  be followed for examining, using and storing the data obtained, the  precautions to be taken when communicating the data to other parties,  and the circumstances in which recordings may or must be erased or the  tapes destroyed be made clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;Opaque and ineffective&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our  safeguards apply only to targeted surveillance, and require written  requests to be provided and reviewed before telephone tapping or  Internet interception is carried out. CMS makes the process of tapping  more prone to misuse by the state, by making it even more opaque: if the  state can intercept communication directly, without making requests to a  private telecommunication service provider, then it is one less layer  of scrutiny through which the abuse of power can reach the public. There  is no one to ask whether the requisite paperwork is in place or to  notice a dramatic increase in interception requests.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;India  has no requirements of transparency whether in the form of disclosing  the quantum of interception taking place each year, or in the form of  subsequent notification to people whose communication was intercepted.  It does not even have external oversight in the form of an independent  regulatory body or the judiciary to ensure that no abuse of surveillance  systems takes place. Given these structural flaws, the Amit Shah  controversy is just the beginning of what is to come. Unfettered mass  surveillance does not bode well for democracy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi  Arun is research director, Centre for Communication Governance,  National Law University, Delhi, and fellow, Centre for Internet and  Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-06T09:31:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">
    <title>Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</link>
    <description>
        &lt;b&gt;The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Keerthana Sankaran was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html"&gt;New Indian Express&lt;/a&gt; on December 26, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While last week's government order on  snooping caused an uproar, the Centre's plans for a far-reaching  monitoring system have been in the making for almost a decade -- with  the groundwork being done by the previous UPA regime. The recently  released 2017-18 annual report of the Centre for Development of  Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS)  is “practically complete”, confirming that the Orwellian ‘Big Brother’  is here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says that surveillance equipment is being rolled out in 21  service areas across the country and operations have commenced in 12  service areas. The system will monitor and intercept calls and messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims the CMS is based on the Telegraph Act of 1885  which states that the central or state government may intercept messages  if the government is “satisfied that it is necessary or expedient to do  so in the interests of the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states or public  order or for preventing incitement to the commission of an offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the surveillance system was publicly announced in 2009,  C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a  “lawful interception, monitoring” system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the Cabinet Committee on Security during the  UPA government in 2011, receiving flak from experts and the press for  not safeguarding the citizen’s right to privacy. However, in a Lok Sabha  session in May 2016, Telecom Minister Ravi Shankar Prasad said that the  system is for the “process of lawful interception”, adding that  regional monitoring centres in Delhi and Mumbai had been  operationalised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest C-DOT report also talks about a Centre of Excellence for  Lawful Interception being set up, which would use high-end technologies -  such as open source intelligence, image processing and search engine  tools to scan Twitter and Facebook - for surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs released a notification,  authorising 10 central agencies to intercept, monitor and decrypt any  "information generated, transmitted, received or stored in any  computer." While the public and opposition parties expressed alarm over  the new order, the C-DOT report clearly shows that state surveillance  plans are already in an advanced stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These government moves are taking place despite the August 2017  landmark judgement by the Supreme Court, which declared the right to  privacy as a fundamental right which will protect citizens from  intrusive activities by the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'&gt;https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-26T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf'&gt;https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:19:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness">
    <title>Beyond Property Rights: Thinking About Moral Definitions of Openness</title>
    <link>https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness</link>
    <description>
        &lt;b&gt;It is hard for Westerners to realize just how much we take for granted about intellectual property, and in particular, how much the property owner’s perspective--be it a corporation, government or creative artist--is embedded in our view of the world as the natural order of things.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post by David Eaves &lt;a class="external-link" href="http://techpresident.com/news/wegov/24244/beyond-property-rights-thinking-about-moral-definitions-openness"&gt;was published in TECH President &lt;/a&gt;on August 6, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While sharing and copying technologies are disrupting some of the  ways we understanding “content,” when you visit a non-Western country  like India, the spectrum of choices become broader. There is less  timidity wrestling with questions like: should poor farmers pay inflated  prices for patented genetically-engineered seeds? How long should  patents be given for life-saving medicines that cost more than many make  in a year? Should Indian universities spend millions on academic  journals and articles? In the United States or other rich countries we  may weigh both sides of these questions--the rights of the owner vs. the  moral rights of the user--but there’s no question people elsewhere,  such as in India, weigh them different given the questions of life and  death or of poverty and development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, conversations about open knowledge outside the  supposedly settled lands of the “rich” often stretch beyond  permission-based “fair use” and “creative commons” approaches. There is a  desire to explore potential moral rights to use “content” in addition  to just property rights that may be granted under statutes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A couple of months ago I sat down in Bangalore with &lt;a href="https://cis-india.org/publications-automated/cis/sunil"&gt;Sunil Abraham&lt;/a&gt;, the founder and executive director of the &lt;a href="https://cis-india.org/"&gt;Center for Internet &amp;amp; Society (CIS)&lt;/a&gt; there, to talk about the center, and his views on the role of  technology and openness in politics and society. One part of our  conversation led to &lt;a href="http://techpresident.com/news/23934/how-technology-and-isnt-helping-fight-corruption-india"&gt;this WeGov column on “I Paid a Bribe”&lt;/a&gt;&lt;a&gt; and the challenge of fighting corruption in India using technology.  Here I want to reflect further on how Sunil and his counterparts may be  radically challenging how we should think about open information more  generally.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we talked, Sunil outlined how people and organizations were using  “open” methodologies to advance social movements or create counter  power. To explain his view he sketched out the following “map” of IP  rights and freedoms to show people use and view the different  “permissions” (some legal, some illegal).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mapping.png" alt="Mapping the Definition and Use of Open" class="image-inline" title="Mapping the Definition and Use of Open" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As a high-level overview this map offers a general list of the tools  at the disposal of citizens interested in playing with intellectual  property, particularly as they pursue social justice issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the top of the chart are the various forms of “permissions” that a  property owner may (or may not) grant you. Thus at the far left sits  the most restrictive IP regime and, as you move right, the user gets  more and more freedoms (or, if you take the perspective of property  owners, property loses more and more of its formal legal protections and  a different notion, of “moral rights,” arises).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second row divides the permissions and the actors along what  Sunil believes is one of the most important permissions - the  requirement to attribute (or the freedom not to).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, at the bottom, I’ve placed various actors along the spectrum  to both show where they might be positioned in the access debate and/or  how they use these tools to advance their aims. Thus someone like  Lawrence Lessig, the intellectual father of Creative Commons, might  support many uses of information as long as the owner gives permission;  whereas groups like the Pirate Party or the Yes Men edge further out  into uses that may not appear legitimate to a property owner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly interesting is Sunil’s decision to include non-legal  “permissions” such as ignoring the property holders rights in his  spectrum of openness. He sees this as the position of the Pirate Party,  which he suggests advocates that people should have the right to do what  they want with intellectual property even if they don’t have  permission, with the exception, interestingly, of ignoring attribution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also includes two even more radical “permissions” –  counterfeiting, that is claiming that you created the work – and false  attribution – assigning your work to someone else! Sunil sees Anonymous  as often using the former and the Yes Men as using the latter. “They  (the Yes Men) are playing with the attribution layer,” he says, by  conducting actions such as their fake DOW press release about the Bhopal  disaster.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pushing the identity envelope&lt;/b&gt;&lt;br /&gt;To Sunil, the big dividing line is less about legal vs. illegal but  around this issue of attribution. “This is the most exciting area  because this (the non-attribution area) is where you escape  surveillance,” he declares.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All the modern day regulation over IP is trying to pin an individual  against their actions and then trying to attach responsibility so as to  prosecute them,” Sunil says. “All that is circumvented when you play  with the attribution layer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This matters a great deal for individuals and organizations trying to  create counter power – particularly against the state or large  corporate interests. In this regard Sunil is actually linking the tools  (or permissions) along the open spectrum to civil disobedience. Of  course, such “permissions” are also used by states all the time, such as  pretending that a covert action was the responsibility of someone else,  or simply denying responsibility for some action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in turn, has some interesting implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is, that it allows Sunil to weave together a number of  groups that might not normally be seen as connected because he can map  their strategies or tools against a common axis. Thus Lawrence Lessig,  the Yes Man, companies and journalists can all be organized based on  what “permissions” they believe are legitimate. For example, journalists  and new publishers are often seen as fairly pro-copyright (it protects  their work) but they are quite happy to ignore the proprietary rights of  a government or corporate document and publish its contents, if they  believe that action is in the public interest. Hence their position on  the spectrum as “willing to ignore proprietary rights.” (Leave aside  government arguments that publishing such documents is “stealing” when,  at least in the US, they are technically already not subject to  copyright.) However, a credible newspaper or journalist would never  knowingly attribute a quote or document to a different person.  Attribution remains sacred, even when legal proprietary rights are not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also tests the notions of who is actually an IP radical. As Sunil  notes: “The more you move to the right the more radical you are. Because  everywhere on the left you actually have to educate people about the  law, which is currently unfair to the user, before you even introduce  them to the alternatives. You aren’t even challenging the injustice in  the law! On the right you are operating at a level that is liberated  from identity and accountability. You are hacking identity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil is thus justifying how the use of “illegal” permissions may  actually be a form of civil disobedience that can be recognized as  legitimate. This is something journalists confront regularly as well.  Many are willing to publish “illegally” obtained leaked documents when  they believe that may serve the public good. What is ethical is not  always legal and so there position on this chart is more nuanced than  one might initially suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not to say that Sunil doesn’t believe in the effectiveness of  legal approaches. For him this map represents a more complete range of  choices an activist can choose from as they try to develop their  strategy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So what you do, and the specific change you are trying to  precipitate, you’ll have to determine what strategy you need. Sometimes  working within the left hand group is sufficient. Having a  non-derivative, non-commercial license to enable students to access  academic works, in India, is good enough… But then, to do what the &lt;a href="http://www.democracynow.org/2004/12/6/yes_men_hoax_on_bbc_reminds"&gt;Yes Men did to DOW Chemicals&lt;/a&gt;? You have to be over on the right side.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness'&gt;https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-08-07T09:43:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion">
    <title>Beyond Access as Inclusion</title>
    <link>https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion</link>
    <description>
        &lt;b&gt;On 13 September, the day before the fifth Internet Governance Forum opens, CIS is coorganising in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting is to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet.&lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;One of the most attractive characteristics of the
Internet – and perhaps also one of the most debated ones – is its
empowering, democratising potential. In expositions in favour of
access to the Internet for all, this potential certainly often plays
a central role: as the Internet can help us to make our societies
more open, more inclusive, and more democratic, everybody should be
able to reap the fruits of this technology, it is argued. In other
words, in debates on access to the Internet, most of us take as our
&lt;em&gt;starting point&lt;/em&gt; the desirability of such access, for the above
reasons. But how justified is such a stance? Is an Internet-induced
democratic transformation of our societies what is actually happening
on the ground?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I would like to move away, in this blog post, from
the more traditional approaches to the issue of access, where debates
mostly veer towards issues of infrastructure (spectrum, backbones,
last mile connectivity, …) or, under the banner of “diversity”,
towards the needs of specific, disadvantaged communities (especially
linguistic minorities and the disabled). To remind us more sharply of
the issues at stake and of the wide range of human rights that need
our active attention to make our dreams a reality, I would like to
take a step back and to ask two fundamental questions regarding
access: why might access be important? And what do we actually have
access to?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Let me start, then, by exploring the first question:
why, actually, is Internet access important? In his canonical work on
the information age, and especially in the first volume on the rise
of the network society, Manuel Castells (2000) has perhaps provided
the most elaborate and erudite description of the ways in which new
technologies are restructuring our societies and our lives. We are
all all too familiar with the many and deep-seated ways in which the
Internet changes the manner in which we learn, play, court, pay, do
business, maintain relationships, dream, campaign. And yet, the exact
nature of the divide created by the unequal distribution of technical
infrastructure and access, despite being so very real, receives
relatively little attention: this divide is not simply one of
opportunities, it is crucially one of power. If in traditional
Marxist analysis the problem was that the oppressed did not have
access to the means of production, today, one could well argue, the
problem is that they do not have access to the means of communication
and information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Indeed, the Internet is not something that is simply
happening to us: there are people who are responsible for these new
evolutions. And so it becomes important to ask: who is shaping the
Internet? Who is creating this new world? Let us, by way of example,
consider some figures relating to Internet use in India. So often
hailed as the emerging IT superpower of the world, there are, by the
end of 2009, according to official government figures, in this
country of 1 billion 250 million people slightly more than 15 million
Internet connections. Of these, only slightly more than half, or
almost 8 million, are broadband connections – the rest are still
dial-up ones (TRAI 2010). The number of Internet users is of course
higher – one survey estimates that there are between 52 million and
71 million Internet users in urban areas, where the bulk of users is
still located (IAMAI 2010). But while this is a considerable number,
it remains a fraction of the population in a country so big. What
these figures put in stark relief, then, is that the poor and
marginalised are not so much excluded from the information society
(in fact, many have to bear the consequences of new evolutions made
possible by it in rather excruciating fashion), but rather, that they
are fundamentally excluded from shaping the critical ways in which
our societies are being transformed.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To have at least the possibility to access the
Internet is, then, of central significance in this context for the
possibility of participation it signals in the restructuring of our
societies at the community, national and global level, and this in
two ways: in the creation of visions of where our societies should be
going, and in the actual shaping of the architecture of our societies
in the information age.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we agree that access attains great significance
in this sense, then a second question poses itself, and that is: in
practice, what exactly are we getting access to? This query should be
of concern to all of us. With the increasing corporatisation of the
Internet and the seemingly growing urges of governments on all
continents to survey and control their citizens, new challenges are
thrown up of how to nurture the growth of open, inclusive, democratic
societies, that all of us are required to take an interest in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yet it is in the case of poor and marginalised
people that the challenges are most pronounced.&amp;nbsp; Efforts to
include them in the information society are disproportionately
legitimised on the basis of the contribution these can make to
improving their livelihoods. Initiatives, often using mobile
technology, that allow farmers to get immediate information about the
market prices of the produce they are intending to sell, are perhaps
the most well-known and oft-cited examples in this category. Other
efforts aim to improve the information flow from the government to
citizens: India has set up an ambitious network of Common Service
Centres, for example, that aim to greatly facilitate the access of
citizens to particular government services, such as obtaining birth
or caste certificates – and going by first indications, this also
seems to be succeeding in practice. Only rarely, however, do
initiatives to “include” the poor in the information society
address them as holistic beings who do not only have economic lives,
but political, emotional, creative and intellectual existences as
well.&amp;nbsp; This is not to say that economic issues are not of
importance. But by highlighting only this aspect of poor people's
lives, we promote a highly impoverished understanding of their
existences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The focus on a limited aspect of the poor's identity
- important as that aspect may be - has a function, however: it makes
it possible to hide from view the extremely restrictive terms on
which poor people are currently being integrated into the information
society. Even initiatives such as the Common Service Centres are in
fact based on a public-private-partnership model that explicitly aims
to “align [..] social and commercial goals” (DIT 2006: 1), and in
effect subordinates government service design to the requirements of
the CSC business model (Singh 2008). The point is not simply that we
need strong privacy and data protection policies in such a context –
although we clearly do. There is a larger issue here, which is that
efforts to include the poor in the information society, in the
present circumstances, really seem to simply integrate them more
closely into a capitalist system over which they have little control,
or to submit them to ever greater levels of government and corporate
surveillance. Their own capacity to give shape to the system in which
they are “included”, despite the oft-heralded capacities of the
Internet to allow greater democratic participation and to turn
everybody into a producer and distributor, as well as a consumer,
remains extremely limited.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such tendencies have not gone unnoticed. For
example, unlike in many other parts of the world, social movements in
India fighting against dams, special economic zones or mining
operations in forest areas - all initiatives that lead to large-scale
displacement – have not embraced technology as enthusiastically as
one might have expected. There are various reasons for this. Within
Indian nationalism, there have always been strands deeply critical of
technology, with Gandhi perhaps their most illustrious proponent. But
for many activists, technology often also already comes with an
ideological baggage: an application such as Twitter, for example, in
so many of its aspects is clearly manufactured by others, for others,
drawing on value sets that activists often in many ways are reluctant
to embrace. And such connotations only gain greater validity because
of the intimate connections that exist in India between the IT boom
and neoliberalism: technology has great responsibility for many of
the trends and practices these activists are fighting against. While
the Internet might have made possible many new publics, most
movements do not – as movements – recognise these publics as
their own (Kovacs, forthcoming).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To some extent, these are of course questions of the
extent of access that people are granted. But they also raise the
important issue of the value structure of the Internet. Efforts at
inclusion always take for granted a standard that is already set. But
what if the needs and desires of the many billions that still need to
be included are not served by the Internet &lt;em&gt;as it exists&lt;/em&gt;? What
if, for it to really work for them, they need to be able to make the
Internet a different place than the one we know today? While it is
obvious that different people will give different answers in
different parts of the world, such debates are complicated
tremendously by the fact that it is no longer sufficient to reach a
national consensus on the issues under discussion, as was the case in
earlier eras. The global nature of the Internet's infrastructure
requires that the possibility of differing opinions, too, needs to be
facilitated at the global level. What are the consequences of this
for the development of democracy?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For access to the Internet to be substantively
meaningful from a human rights perspective in the information age, it
is crucial, then, that at a minimum, the openness of the Internet is
ensured at all levels. Of course, openness can be considered a value
in itself. But perhaps more importantly, at the moment, it is the
only way in which the possibility of a variety of answers to the
pressing question of what shape our societies should take in the
information age can emerge. Open standards and the portability of
data, for example, are crucial if societies are to continue to decide
on the role corporations should play in their public life, rather
than having corporations &lt;em&gt;de facto&lt;/em&gt; rule the roost. Similarly,
under no circumstances should anyone be cut off from the Internet, if
people are to participate in the public life of the societies of
which they are members. And these are not just concerns for
developing countries: if recent incidents from France to Australia
are anything to go by, new possibilities facilitated by the Internet
have, at least at the level of governments, formed the impetus for a
clear shift to the right of the political spectrum in many developed
countries. In the developed world, too, the questions of access and
what it allows for are thus issues that should concern all. In the
information age, human rights will only be respected if such respect
is already inscribed in the very architecture of its central
infrastructure itself.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;List of References&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Castells, Manuel (2000). &lt;em&gt;The Rise of the Network
Society, 2&lt;sup&gt;nd&lt;/sup&gt; edition&lt;/em&gt;. Oxford: Blackwell.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Department of Information Technology (DIT) (2006).
&lt;em&gt;Guidelines for the Implementation of Common Services Centers
(CSCs) Scheme in States&lt;/em&gt;. New Delhi: Department of Information
Technology, Government of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Internet and Mobile Association of India (IAMAI)
(2010). &lt;em&gt;I-Cube 2009-2010: Internet in India&lt;/em&gt;. Mumbai: Internet
and Mobile Association of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Kovacs, Anja (forthcoming). &lt;em&gt;Inquilab 2.0?
Reflections on Online Activism in India&lt;/em&gt; (working title).
Bangalore: Centre for Internet and Society.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Singh, Parminder Jeet (2008). &lt;em&gt;Recommendations for a
Meaningful and Successful e-Governance in India&lt;/em&gt;. IT for Change Policy
Brief, IT for Change, Bangalore.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Telecom Regulatory Auhority of India (TRAI) (2010).
&lt;em&gt;The Indian Telecom Services Performance Indicators,
October-December 2009&lt;/em&gt;. New Delhi: Telecom Regulatory Auhority of
India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion'&gt;https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    

   <dc:date>2011-08-02T07:29:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/better-understanding-of-privacy">
    <title>Better Understanding of the Idea of Privacy Sought</title>
    <link>https://cis-india.org/news/better-understanding-of-privacy</link>
    <description>
        &lt;b&gt;Understanding the ways in which an individual's privacy is violated will help provide a better definition of privacy in India. At a public conference called ‘Privacy Matters' held at the Madras Institute of Development Studies (MIDS) here on Saturday, speakers underscored the need for discussions surrounding the privacy bill. &lt;/b&gt;
        
&lt;p&gt;Prashant Iyengar from Privacy India said, "In India, we do not have a set view on privacy. There is a lot of articulation around privacy in law, yet we do not have an omnibus concept." He stressed the importance of bringing about discussions around the adequacy of safeguards.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Post 26/11 terror attacks, the country has seen an enhancement of electronic surveillance and the proliferation of databases that collect information from individuals, said Santhosh Babu, Secretary, Information Technology Department.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"The problem arises when these databases are misused for political or other reasons. In a legal framework, we have to figure out what information can be given out, what cannot and what can be misused," he said. He stressed the importance of databases going through a software development lifecycle to make them more secure.&lt;/p&gt;
&lt;p&gt;Speaking from a media practitioner's perspective, Sashi Kumar, Chairman, Media Development Foundation, said it is the business of the media to conduct sting operations especially when people in power are obfuscating information. “Sting operations are legitimate when larger public good is at stake. We have to be aware of this when we discuss the privacy bill. It should not protect people in power and keep exposure at bay,” he said. He also stressed that privacy is closely linked with the dignity of the person. R. Ramamurthy, Chairman, Cyber Society of India said, “The definition of privacy varies from what it was twenty years ago to what it is today. A lot has changed since the internet came to India.” The statutes that govern all forms of communication in India should be revamped, he said. Discussions around privacy in relation to&amp;nbsp;telecommunications, financial transactions, consumer rights and basic rights followed. The conference was a collaborative effort between Privacy India, Citizen Consumer and Civic Action Group, Chennai and MIDS.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A staff reporter from the Hindu covered the event. The original can be read &lt;a class="external-link" href="http://www.thehindu.com/news/cities/Chennai/article2331506.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/better-understanding-of-privacy'&gt;https://cis-india.org/news/better-understanding-of-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-08T07:40:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
