<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 141 to 155.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls">
    <title>‘Mobile’ voters may sway polls</title>
    <link>https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls</link>
    <description>
        &lt;b&gt;BABALAL Patel’s tiny tea stall in Mumbai is a long way from Silicon Valley. It is not even that close to Bangalore, the Indian equivalent.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Avantika Chilkoti was&lt;a class="external-link" href="http://www.bdlive.co.za/life/gadgets/2014/03/05/mobile-voters-may-sway-polls"&gt; published in BDlive&lt;/a&gt; on March 5, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But one night this month, this ramshackle shop became the venue for a social media experiment that highlights the hi-tech face of electioneering in India, the world’s largest democracy. A crowd gathered outside to watch two television screens showing a live broadcast with politician Narendra Modi as he answered questions the audience submitted by text message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar "tea parties" were held across India, designed to ram home Modi’s humble background as a tea seller and his technological credentials. The nationwide event, organised by using mobile technology more commonly seen in US presidential campaigns, signals a shift in Indian politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For decades, political campaigns in India have centred around colossal rallies and billboard advertising. But a growing population of young people, rising internet use and the ubiquity of cellphones mean this year’s battle is playing out equally fiercely online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We are moving far ahead of saying that we are building ‘likes’ on social media," says Arvind Gupta, head of information technology and social media for the Bharatiya Janata Party (BJP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Organisation is being done using digital. So if I’m going to tell everybody there’s an event tomorrow, it can be posted on Facebook, websites, on SMS, on WhatsApp, though the real meeting is happening on the ground."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These techniques, which became familiar during the Arab uprisings of North Africa, are an increasingly important part of communication strategy ahead of a national election that must be held in the next three months, and of which the outcome many believe will be close.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta believes parties are fighting what he calls a "postmodern election" for up to 160 — largely urban — seats out of a total of 543. More than half the 50-strong team working on communications for the BJP are dedicated to digital campaigning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet user base reached a point of inflection last year, exceeded 200-million. While that is a fraction of the 1.3-billion population, prompting many to question the power of social media, use is far greater among urban and young voters, millions of whom will be eligible to vote for the first time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Social media is suddenly becoming important, not for all constituencies, but for urban constituencies, because for the first time the urban youth and the educated class are very much glued into the election and showing interest," says Rajeeva Karandikar, a statistician and election analyst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi, chief minister of Gujarat, has adapted particularly quickly to the changing environment. He captured the public imagination by using holograms to address rallies and Google Hangouts to interact with the diaspora. He has 3.4-million Twitter followers and more than 10.6-million "likes" on his Facebook page, thanks in part to a slick social media team led by high-profile technology entrepreneurs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By contrast, Rahul Gandhi, the reticent, undeclared candidate for the incumbent Congress party, does not even have a verified Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some were disappointed by low attendance at the national "tea parties", but the events were lauded for being interactive and, perhaps most important in a country where newspaper readership remains high, grabbed column inches in the press. The audience could speak directly to Modi at venues with a two-way video link and the footage was immediately available on YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While answering each question, Modi has a point of view," says Pratik Patel, 28, a chartered accountant who organised the event at his grandfather’s tea shop. "He doesn’t have two ways of looking at the same thing — this helps him to be more decisive and forward thinking."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media provide swathes of information to India’s political parties, as they copy the sophisticated data analysis used by US President Barack Obama’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From its offices in suburban Mumbai, digital marketing group Pinstorm tracks social media discussions at constituency level and identifies significant supporters or critics. It describes the service as an early warning system or "social radar", which allows parties to mobilise workers rapidly to oppose or support a point of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sceptics argue, however, that social media have insufficient traction in India to affect results of the coming poll. But the size of the user base does not reflect its full power. Educated, influential Indians use these digital networks and the online debate shapes views in traditional media that reach a wider audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The theory is that since the elites are connected and have more time to spare on social media, let us use social media and the internet more generally to influence discourse through these elites," says Sunil Abraham, executive director for the Bangalore-based Centre for Internet and Society. "It’s an indirect route to the vote."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an adviser to the Obama campaign warns that, given differences in funding and the environment, India’s politicians should be wary of using the US presidential race as a model. This year, a simpler technology may prove the best tool for campaigns in India: the cellphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Folks look to the Obama campaign for this sort of stuff," says Ethan Roeder, who worked on data for the 2008 and 2012 US presidential campaigns. "But a lot of these international campaigns would do best looking elsewhere for a model.… No campaign in the history of the world has ever spent that much money to elect a single individual to a single office."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s version is markedly cheaper, thanks to the roadside chai wallahs and armies of volunteers, pulling in the new breed of voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I have never attended a political rally in my entire life," says Patel, who helped to organise Modi’s nationwide "tea party". "If people want to connect with me they need to connect with me on social media or via e-mail."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls'&gt;https://cis-india.org/news/bd-live-avantika-chilkoti-march-5-2014-mobile-voters-may-sway-polls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-05T11:55:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook">
    <title>India’s ballot battle will also run through Facebook</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook</link>
    <description>
        &lt;b&gt;Facebook on Tuesday launched its widely awaited “election tracker” for the upcoming general elections, a move that signals the growing importance of social media as a political tool in a rapidly urbanizing India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/india-s-ballot-battle-will-also-run-through-facebook/article1-1190947.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on March 4, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s 2014 ballot battle will run through the social-media world, which could likely influence electoral outcomes by swinging 3-4% votes, as more and more young Indians go online to make sense of politics, according to two new surveys.&lt;br /&gt; &lt;br /&gt;In these mostly urbanising seats, social-media usage is now “sufficiently widespread” to influence politics, according to the Internet and Mobile Association of India (IAMAI). An offline study conducted by market research firm TNS and Google India suggested similar shifts.&lt;br /&gt; &lt;br /&gt;The Facebook tracker (&lt;a href="http://on.fb.me/1g6ZJ3k"&gt;http://on.fb.me/1g6ZJ3k&lt;/a&gt;) will help India’s 93 million Facebook users to see which parties and candidates as well as issues are trending.&lt;br /&gt; &lt;br /&gt;Social-media platforms are likely to be influential in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, according to the IAMAI survey.&lt;br /&gt; &lt;br /&gt;These are constituencies where 10% of the voting population uses social media sites such as Facebook, or where the number of social media users is higher than the winning candidate’s margin of victory at the last election.&lt;br /&gt; &lt;br /&gt;Research shows that social media is more persuasive than television ads. Nearly 100 million Indians, or more than Germany’s population, use the Internet each day. Of this, 40 million have assured broadband, the ones most likely to have at least one social media account.&lt;br /&gt; &lt;br /&gt;“Unlike Obama who used social media directly for votes, Indian politicians have tended to use it more to mould public discourse,” says Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;br /&gt; &lt;br /&gt;“I think these trends are over-hyped and the impact, if any, would only be marginal,” said Communist Party of India MP, Gurudas Dasgupta, who created a Facebook account only last month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook'&gt;https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-05T11:49:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology">
    <title>India ‘tea parties’ enable politicians to woo urban youth with technology</title>
    <link>https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology</link>
    <description>
        &lt;b&gt;Babalal Patel’s tiny tea stall in southern Mumbai is a long way from Silicon Valley. It is not even that close to Bangalore, the Indian equivalent. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Avantika Chilkoti was &lt;a class="external-link" href="http://www.ft.com/cms/s/0/e8381500-9784-11e3-809f-00144feab7de.html#slide1"&gt;published in the Financial Times&lt;/a&gt; on February 26, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But one night this month this ramshackle shop became the venue for a social media experiment that highlights the high-tech face of electioneering in India, the world’s largest democracy. A crowd gathered outside to watch two television screens showing a live broadcast with Narendra Modi, prime ministerial candidate for the opposition Bharatiya Janata party, as he answered questions the audience submitted by text message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar “tea parties” were held across the country, designed to ram home Mr Modi’s humble background as a tea seller and his technological credentials. But the nationwide event, organised using mobile technology more commonly seen in US presidential campaigns, also signals a shift in Indian politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For decades, political campaigns in India have centred around colossal rallies and billboard advertising. But a growing population of young people, rising internet use and the ubiquity of mobile phones mean the 2014 battle is playing out equally fiercely online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are moving far ahead of saying that we are building ‘likes’ on social media,” says Arvind Gupta, head of IT and social media for the BJP. “Organisation is being done using digital. So if I’m going to tell everybody there’s an event tomorrow, it can be posted on Facebook, websites, on SMS, on WhatsApp, though the real meeting is happening on the ground.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These techniques, which became familiar during the Arab uprisings of northern Africa, are an increasingly important part of communication strategy ahead of a national election, which must be held in the next three months, and which many believe will be close.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Gupta believes parties are fighting what he calls a “postmodern election” for up to 160 - largely urban - seats of the total 543. More than half the 50-strong team working on communication for the BJP are dedicated to digital campaigning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s internet user base reached a point of inflection last year, passing 200m. While that is a fraction of the 1.3bn population, prompting many to question the power of social media, use is far greater among urban and young voters, millions of whom will be eligible to vote for the first time this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Social media is suddenly becoming important, not for all constituencies but for urban constituencies because for the first time the urban youth and the educated class is very much glued into the election and showing interest,” says Rajeeva Karandikar, a statistician and election analyst.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr Modi, chief minister of Gujarat, has adapted particularly quickly to the changing environment. He captured the public imagination by using holograms to address rallies and Google Hangouts to interact with the diaspora. He has 3.4m Twitter followers and more than 10.6m “likes” on his Facebook page, thanks in part to a slick social media team led by high-profile technology entrepreneurs. Meanwhile Rahul Gandhi, the reticent, undeclared candidate for the incumbent Congress party, does not even have a verified Twitter account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some were disappointed by low attendance at the national “tea parties”, but the events were lauded for being interactive and, perhaps most importantly in a country where newspaper readership remains high, grabbed column inches in local media. The audience could speak directly to Mr Modi at venues with a two-way video link and the footage was immediately available on YouTube.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While answering each question Mr Modi has a point of view,” says Pratik Patel, 28, a chartered accountant who organised the event at his grand- father’s tea shop. “He doesn’t have two ways of looking at the same thing - this helps him to be more decisive and forward thinking.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media also provides swaths of information to India’s political parties, as they copy the sophisticated data analytics used by US president Barack Obama’s campaigns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From its offices in suburban Mumbai, the digital marketing group Pinstorm tracks what social media users are discussing at the constituency level and identifies significant supporters or critics. It describes the service as an early warning system or “social radar”, which allows parties to mobilise workers rapidly to oppose or support a point of view.&lt;br /&gt;Sceptics argue, however, that social media has insufficient traction in India to affect results of the forthcoming poll. But the size of the user base does not reflect its full power. It is educated influential Indians who use these digital networks and the online debate shapes views in traditional media that reach a wider audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The theory is that since the elites are connected and have more time to spare on social media, let us use social media and the internet more generally to influence discourse through these elites,” says Sunil Abraham, executive director for the Bangalore-based Centre for Internet and Society. “It’s an indirect route to the vote.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An adviser to the Obama campaign warns, however, that, given differences in funding and the local environment, India’s politicians should be wary of using the US presidential race as a model. This year a simpler technology may prove the best tool for campaigns in India: the mobile phone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Folks look to the Obama campaign for this sort of stuff,” says Ethan Roeder, who worked on data for the 2008 and 2012 US presidential campaigns. “But a lot of these international campaigns would do best looking elsewhere for a model . . . No campaign in the history of the world has ever spent that much money to elect a single individual to a single office.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s version is, of course, markedly cheaper, thanks to the roadside chai-wallahs and armies of volunteers, pulling in the new breed of voters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I have never attended a political rally in my entire life,” says Mr Patel, who helped organise Mr Modi’s nationwide “tea party”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If people want to connect with me they need to connect with me on social media or via email.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Modi’s digital army&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team building the digital campaign for India’s opposition Bharatiya Janata party mixes entrepreneurs and veterans from the technology industry, rather than individuals with experience of electioneering alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rajesh Jain, working on electoral technology, is well known in the industry since setting up successful businesses in online news and digital marketing. These include IndiaWorld Communications, a collection of websites which was bought in 1999 by Satyam Infoway, then India’s largest internet service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has the archetypal curriculum vitae, with a degree from one of the eminent Indian institutes of technology followed by a master’s degree from Columbia University in New York.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arvind Gupta, who heads the BJP’s IT and social media cell, has a remarkably similar educational background - with an added stint in Silicon Valley to his name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the last count, the party had recruited more than 2m volunteers, who are organised online and will provide support in different ways. But there is also a younger generation of advocates who have given up good jobs to join the digital effort. Citizens for Accountable Governance is a non-profit youth organisation co-ordinating nationwide “tea parties” ahead of this year’s national election, where Narendra Modi, the party’s prime ministerial candidate, interacts with audiences at tea stalls via video link.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 100 young professionals lead the operation and all come with impressive credentials, including jobs at prominent global consulting groups such as McKinsey, and banks such as JPMorgan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond that, Mr Modi has had a team working for him personally since he took over as chief minister of Gujarat more than a decade ago.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a discreet IT set-up that still functions independently of the party’s operations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology'&gt;https://cis-india.org/news/financial-times-february-26-2014-india-tea-parties-enable-politicians-to-woo-urban-youth-with-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T12:13:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture">
    <title>Will You be Paid to Post a Picture?</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture</link>
    <description>
        &lt;b&gt;The wave of free information production on the web is on the wane.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/india-others/will-you-be-paid-to-post-a-picture/99/"&gt;published in the Indian Express&lt;/a&gt; on February 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The age of volunteerism is officially over. The last decade of the mass adoption of the internet has been fuelled by endless human hours being spent in producing information which is the new currency of our times. The big transition to Web 2.0 began when the individual “user” became more than either an individual or the user. The individual found herself as a part of a collective, finding a voice and a community of others to belong to. Simultaneously, instead of being a passive consumer of the web, the user started producing data — blogs, videos, tweets, content management systems, online discussion boards, massively multiple online role-playing platforms, social network transactions — all of which became a part of the new Web’s widespread popularity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost everything that we understand as the social web today is contingent upon people producing data in their interactions with the world around them. From knowledge producing websites like Wikipedia to entertainment platforms like YouTube, visualisation and data gathering spaces like Pinterest to photographs of self, food and cute animals on Instagram, political and social commentaries on Tumblr to Listicles and memes on Buzzfeed, the internet is a veritable smorgasbord of new information forms, formats and functions that are generated by the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is possibly the most exciting about this burgeoning information universe has been the amount of free labour that goes into it, and often remains invisible. As digital labour scholar Trebor Schulz points out, the internet has become both a factory and a playground, where our leisure time is capitalised into producing work that sustains the new attention and information economies. For instance, the world’s largest social networking site, Facebook, does not produce any of its contents. It is, in fact, a system of information mining and sorting, which works as long as a growing user base continues to produce information on it. Tomorrow, if all of us stop producing Facebook, and only lurk on it, the platform will collapse. Which is why, Facebook continues to acquire new platforms and applications to be integrated into its universe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the real effort that goes into the sustenance of sites like Wikipedia, which has become the de facto reference for global knowledge systems, is carried out by unsung and invisible editors who patiently, meticulously, and without almost any expectation, continue to add, verify, strengthen and curate reliable information that we can use. When the non-profit organisation WikiMedia Foundation prides itself in running one of the least expensive websites in the top 10 most visited sites in the world, it is signalling its deep appreciation for the countless human hours that have made Wikipedia possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, in recent years, there is noticeable stagnation in the wave of free information production on the Web. Oh, don’t get me wrong. We are producing an unprecedented amount of data — we are constantly being watched by surveillance technologies that detect biometric and genetic make-up of all our transactions, or we are inviting people to watch us on social network sites where we reveal some of our deepest secrets and desires, or we are watching ourselves, quantifying everything from things we ate to the number of hours we sleep. And yet, as we live in a world of Big Data, there is a definite decrease in people contributing to production of free information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the digital natives move from the web to mobile phones, traditional websites are already facing a crisis. News and media agencies that have celebrated the global citizen media networks have started realising that the individual user is more interested in local networks and information ecologies which are independent of mainstream conglomerates. And people are realising that their time and effort is worth money. They can be easily compensated for their online activities and gain reputation and importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tension only becomes more palpable when people start realising that there are others who are being paid to work on the platforms that they are contributing to. We all knew that this model of depending on free information was not a sustainable one. But it seems the day has arrived, especially with the recent drives on Wikipedia to build specialised knowledge editors. In the last few months, we have seen people in the FemTechNet project — an academic activist feminist project that seeks to remind us of the intersections of feminism and technology in network societies — carry out “Wikistorming”, where students are adding pages of women’s contribution to technologies on Wikipedia. More recently, medicine students at University of Chicago have taken to correcting and adding accurate information to Wikipedia, which is often a source of health information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both of these are fantastic efforts to add to the platform that was the underdog that overthrew the mammoth encyclopaedia like The Encyclopaedia Britannica. We hope more specialised users in different locations, fields, disciplines and languages continue to edit and contribute to Wikipedia. However, it is also a signal that the generalist information producer is on the decline. We are transitioning into a new age, where people are going to need rewards, incentives and benefits for performing information transactions on the web. The user is no longer going to be available for free labour, and it is time we started thinking of “paid usership”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture'&gt;https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T11:58:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong">
    <title>The Dangers Of Birdsong </title>
    <link>https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong</link>
    <description>
        &lt;b&gt;Instant gratification? Social media can quickly turn the game into checkmate if you don’t keep your emotions in check. &lt;/b&gt;
        &lt;p&gt;Namrata Joshi's article was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?289264"&gt;published in Outlook&lt;/a&gt; on January 25, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Woke up from a dream in which I had just learned that I was going to keep wickets for India. In my dream, I thought, let me share this news on Twitter. I didn’t, fearing I would be made a laughing stock.” These are few of a series of stream of consciousness tweets about a dream posted this Monday by author-academician Amitava Kumar. Tweets that don’t just have to do with dreaming of a personal achievement, but also about tweeting it. “Twitter has invaded even our sleeping life,” says Amitava on an e-mail but also admits that he didn’t think for a moment that he was sharing something private in a public place while tweeting his reverie. “Instead, perhaps, I was seeking a private connection with a lot of readers.” Which he did rustle up in good measure. He followed it up by tweeting a picture of his son with him, taken by his 10-year-old daughter Ila, as a homage to a similar photostream by author- photographer-art historian Teju Cole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amitava’s unfussy and creative candidness about tweeting things personal, which he prefers to see as “grappling with a form of writing” came in the wake of a weekend of vigorous debate on how social media platforms were bringing the private under unblinking public scrutiny—the immediate hook being the sudden, tragic death of Sunanda Pushkar after her no-holds-barred Twitter war with Pakistani journalist Mehr Tarar (over the latter’s alleged liaison with her husband Shashi Tharoor, which was consumed with much amusement by their vicarious, at times vicious, followers). The Tharoor incident is not a stand-alone case. Be it a confidentiality clause or diplomatic tact, a professional decision or personal affair or even a death of someone close to you, social media has become a stage to play out the classified and the confidential (see infographic) by the celebrit­ies and the aam aadmi alike. The pay­­back? Spats, comebacks, brea­k­do­wns, meltdowns, resignations, embarrassments, humiliations, ker­fuffles....&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And it’s not something confined to India alone. “US Congressman Anthony Weiner’s tweet of his, let’s call it, torso, to a young woman in Seattle is perhaps the most egregious example of a US politic­ian behaving badly online,” says Amit­ava. No surprise then that Weiner bec­ame a butt of late-night comedy shows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the larger question here is why. Why this urge and urgency to share it all? What is it about a platform like Twitter or Facebook that makes people bare and dare? Is it that the immediacy, speed and reach allows them the easiest way to extend the boundaries of their secluded, lonely lives, get instant attention and fan the curiosity of someone out there who they don’t even know? And why is propriety and moderation getting thrown out of the window in the world of virtual exchanges? Adman-columnist Santosh Desai calls Twitter a “broadcast system to the universe”. The tweets are often “thought bubbles”, “something you mutter” without a full sense of what public means. “The spur of the moment opinion or feeling acquires public currency,” he says. “The unraveling of the human being, the opening up of the closed box then becomes a new source of stimulation and pleasure,” he says. “I sometimes wonder how we shared before Twitter. We talk about what we like, don’t like at the drop of a hat. At times you are vulnerable and vent things out without an agenda and without knowing the repercussions. We creative bunch are like that,” says popular actress Divya Dutta.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ShashiTharoor1.png" alt="Shashi" class="image-inline" title="Shashi" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ShashiTharoor2.png" alt="Shashi Tharoor 2" class="image-inline" title="Shashi Tharoor 2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, private information is a currency in the global attention eco­nomy. “One of the many ways of climbing the attention economy is to div­ulge private information. Those in public life like filmstars and socialites understand this completely and exploit all traditional broadcast channels and contemporary multicast channels like social media to amass public attention,” he says. Look closely and the online space is no different from the real. There are as many exceptions as there are rules. So for every exhibitionist handle that exploits our latent voyeurism, there is a Natasha Bad­h­war, one of the most life-affirming pre­sences on Twitter. For her, like Ami­tava, sharing is a mode of expression. “Sharing gives us agency. We take back the power to tell our story, express our views, share our version in our own words,” she says. According to her, “honest” sharing fuels empathy. “It is contagious, it makes the reader want to share too,” she says. And from that sharing could emerge a new pool of acquaintances, friends and well-wishers. It may not be a virtual escape from the real but a journey and connect back to the actual, an expansion of the human circle than a depletion of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all our friends and followers need necessarily be sympathetic. Often they are also brutally savage. “The anonymity allows people to say exactly what they want without considering the implications. They don’t realise that it’s not just a handle but a human being they are talking to,” says Nikhil Pahwa, founder of medianama.com. Amitava compares it to drone warfare. “The technology of remote destruction has introduced a new experience of war, and a new logic of killing. You can kill with greater abandon; you can strike in unexpected places; you are confronted with few consequences of your fatal mistakes. Similarly, Twitter allows a mode of social exchange with less culpability. There are very few consequences for trolls, but disastrous ones for their victims,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But surely that doesn’t mean that you blur all the lines between the private and the public? How to exercise caution? How much to open up (or not) and how much of your core to keep to yourself? Life, after all, is too complex and fragile for blame games and finger-pointing at social media alone. It’s those using it who need to own up. “People need to take responsibility for what they say. It’s like someone telling me how he was abused for 15 minutes on the phone when he could have easily cut the call,” says Nikhil Pahwa. “It’s a modern form of communication which you have to embrace but there’s a line you must draw. For instance, my wife and I never interact on FB or Twitter. I keep the family to myself. Jokes are fine but I don’t abuse or use swear words,” says actor Ashwin Mushran. “There has to be a sense of decorum. I won’t put out what I gossip about with my friends. I have no strategy but am guarded by my own belief system,” says actor Rajat Kapoor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s normal human nature to express. Be it anger or frustration, as a counsellor I tell people to not suppress emotions but some moderation and etiquette need to apply in cyber space,” says Mukta Pun­tambekar deputy director of Pune-based Muktangan Rehabilitation Centre. “You have to accept that your followers and friends will have access to details about you. You have to exercise discretion in saving something of yourself for yourself. There are areas that need not be opened up for all,” says actor-comedian Vir Das, who recently posted an open letter on FB—‘Twitter Bad? Facebook Evil? or We Stupid?’—on the pointlessness of blaming social media for the Tharoor family tragedy. To extend the argument further, and add another layer to it, aren’t we also living in times when privacy itself is evolving, asks Raj­esh Lalwani, CEO of blogworks and a self-confessed people-watcher. “My gra­n­dmother would not even eat in public. But we eat in restaurants, on the streets,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is also becoming an ambiguous, vague and complex entity. Getting tagged in a friend’s photo compromises your privacy without your involvement or participation. “The line between private and public has mostly dissolved because of the temporal persistence of digital traces in cyberspace, the global nature of the network and the ubiquitous and pervasive surveillance state,” says Abraham. “On Twitter and FB, things get circulated...what we put up, whether it’s a tweet, an update or a picture, is permanent unlike memory,” says Desai. The digital trail stays online. “We are leaving our digital footprints behind. What we post might be easy but the implications of it are complicated,” says writer, filmmaker and media observer Amit Khanna.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, there is a gap bet­ween the progression of technology and society. “There are newer windows but our minds are not growing apace to handle the connected world in a mature way,” he says. So one needs to be additionally circumspect about what we do online, how much of us we put out there. The ‘creative minds’ don’t see it as cut and dried. Natasha thinks that sharing can make people vulnerable to ridicule. “Confronting and embracing that vulnerability is the only way forward. These are not real fears to cling to, these are fears to shed as we grow and realise the extent of our individual power.” Amitava says he has seen seve­ral careers destroyed because of a single tweet. But he’d hate to back down and be cautious. As he puts it, “You’ve got to push the envelope and experiment with expression. I hope that when my wrong moment comes, peo­ple will be forgiving.” Amen to that.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong'&gt;https://cis-india.org/news/outlook-namrata-joshi-january-25-2014-dangers-of-birdsong&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-12T10:29:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom">
    <title>Wikipedia Editing as Assessment Tool in the Indian Higher Education Classroom</title>
    <link>https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom</link>
    <description>
        &lt;b&gt;Getting students to create and edit Wikipedia entries in English and Indian languages can be a comprehensive assessment tool at the Bachelor’s and Master’s levels. Both levels of higher education require the demonstration of the ability to present knowledge in encyclopaedic form, which can be done by a good review of relevant literature and the showcasing of key arguments in the field.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Using the &lt;a href="https://cis-india.org/openness/blog-old/dublin-descriptors.pdf" class="internal-link"&gt;Dublin competency level descriptors&lt;/a&gt;,&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; we can put down what sorts of &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Higher_education"&gt;higher education&lt;/a&gt; skills Wikipedia editing can help evaluate. The most commonly accepted descriptors internationally are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Demonstration of Knowledge and understanding &lt;/li&gt;
&lt;li&gt;Applying knowledge and understanding &lt;/li&gt;
&lt;li&gt;Making judgements &lt;/li&gt;
&lt;li&gt;Communication abilities&lt;/li&gt;
&lt;li&gt;Learning skills relevant to higher education&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Main_Page"&gt;Wikipedia&lt;/a&gt; allows for assessing the ‘depth’ of an article which is the measure of the quality of an entry. The depth is a function of several parameters like the number of edits an article has seen, the length of discussion in the talk pages, the number of footnotes, references, hyperlinks and editors active on that page. In addition to this, providing Wiki-interlinks to key concepts within an article and categorization of articles exposes the students to a "semantic web" of interconnections between various fields of knowledge. Although, it may not be a complete substitute for the more formal modes of assessment, it provides a more rounded form of evaluation for student assessment. The ‘depth’ indicator also shows the relative significance of an article for the larger community of users, thereby providing a better model for student assessment in the long run.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Bachelor's Level&lt;/h3&gt;
&lt;p&gt;By getting students to edit on Wikipedia at the Bachelor’s Level, you can test the following, and appropriate weightage can be given to each aspect of the work:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Comprehension of the theory, concepts and processes pertaining to a field or fields of learning &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Demonstration of knowledge, supported by the use of advanced textbooks and other reading materials, of one or more specialised areas &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to apply this knowledge and comprehension in a manner that indicates a thorough and informed approach to the work, and have competences typically demonstrated through devising and sustaining arguments&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to gather and interpret relevant data to inform independent judgements which include reflection on relevant social, scientific or ethical issues &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to communicate information, ideas, problems and solutions to both specialist and non-specialist audiences [in the case of Wikipedia, the audience would usually be a non-specialist one]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Master's Level&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;By getting students to edit on Wikipedia at the Master’s Level, you can test the following, and appropriate weightage can be given to each aspect of the work:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Demonstration of knowledge and comprehension that is founded upon, extends and enhances that associated with the Bachelor’s level and is at the forefront of a field of learning &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Critical awareness of current problems and new insights, new tools and new processes within their field of learning (ability to do a good literature review, which can be seen through the citations provided for a Wikipedia entry)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to apply their knowledge, comprehension, and critical awareness in broader or multidisciplinary areas related to their fields of study &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to integrate knowledge and handle complexity, to formulate judgements with incomplete or limited information, with an awareness of the social and ethical responsibilities linked to the application of their knowledge and judgements &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to communicate their conclusions, and knowledge, rationale and processes underpinning these, to specialist and non-specialist audiences clearly and unambiguously&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to reflect on one’s own writing by engaging with feedback received from a collaborative network.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to form peer knowledge networks through collaboration and interaction with other contributors&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Risks and Mitigation&lt;/h3&gt;
&lt;p&gt;It is helpful to be aware of the typical risks a faculty may face in using Wikipedia entries as an assessment tool.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New article creation: Wikipedias, especially the &lt;a class="external-link" href="http://en.wikipedia.org/wiki/English_Wikipedia"&gt;English Wikipedia&lt;/a&gt;, are closely monitored by thousands of volunteers from across the world. Often, articles created by new users come under a lot of scrutiny. It is advisable to first encourage the students to edit and improve the existing articles before creating a new article all by themselves. Also taking the help of an experienced Wikipedian will go a long way in mentoring the students on the nuances of the Wikipedia platform and the volunteer community that strives in good faith to preserve the quality of entries. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Copyright violation: &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Control-C"&gt;Ctrl+c&lt;/a&gt; and &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Cut,_copy,_and_paste"&gt;Ctrl+v&lt;/a&gt; (i.e., &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Plagiarism"&gt;plagiarism&lt;/a&gt;) is a major challenge for the higher education sector across the world. Often the students find that copy-pasting the content from various sources is an easy way of doing an assignment. On Wikipedia, plagiarism is taken very seriously and a student editor can get banned from further contribution to Wikipedia, which may de-motivate the entire class. It’s useful for the faculty to give a detailed orientation on this aspect before encouraging the students to take up writing a Wikipedia entry as an assignment. There are numerous resources (text and videos) made available by Wikimedians across the world explaining the problem of plagiarism. These could be used by the faculty. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you are encouraging students to write an entry in an Indian language Wikipedia, special attention and support needs to be planned to train the students in typing in that particular Indian language script. Wikipedias have a useful tool called &lt;a class="external-link" href="http://www.mediawiki.org/wiki/Universal_Language_Selector"&gt;Universal Language Selector&lt;/a&gt; (ULS) which makes it very easy for the student to start typing in any script using the transliteration method. There is increasing support for Indian language scripts, however. You could check whether your University computer lab has Unicode compliant computers/systems. This will help the students to work offline on their assignment, if required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One of the biggest challenges for a teacher is to get the student to see the value of taking up a Wikipedia entry as an assignment. Some of the students may see this as an additional task or extra-curricular activity and may not put in a committed effort, which could affect the goals you have set for your course. Faculties are encouraged to find various means of integrating/dovetailing the Wikipedia assignment into the curriculum or course. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Faculty may also feel this as an additional burden on them, especially in terms of evaluation of the assignment. There are various tools available to measure most of the assessment parameters set out above, which will not take much time. It is in fact possible to save faculty time if the evaluation is planned meticulously. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A pragmatic challenge for the faculty would be to deal with a scenario where the entire class submits the assignments on Wikipedia on the last day. This will not only increase burden on the faculty but can also result in a lot of plagiarism. An effective way to address this challenge is to make the Wikipedia entry assignment part of a formative assessment, whereby the student develops the entry over a period of time (e.g. one month or during the course). There are various tools through which you can track the students’ contribution continuously and share feedback with them periodically.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].Available at &lt;a class="external-link" href="http://www.tcd.ie/teaching-learning/academic-development/assets/pdf/dublin_descriptors.pdf"&gt;http://www.tcd.ie/teaching-learning/academic-development/assets/pdf/dublin_descriptors.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom'&gt;https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Dr. Tejaswini Niranjana, Ashwin Kumar A.P. and T. Vishnu Vardhan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-01-30T10:06:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over">
    <title>The net is taking over</title>
    <link>https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over</link>
    <description>
        &lt;b&gt;For many days to come, people will speculate what caused Sunanda Pushkar's death last week in a New Delhi hotel. Did Union minister Shashi Tharoor's wife die of poisoning or a drug overdose? Wasn't she unwell? Was it suicide? Or was it murder? No less a matter of speculation has been the social media's role in the whole affair.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Veenu Sandhu and Surabhi Agarwal &lt;a class="external-link" href="http://www.business-standard.com/article/beyond-business/the-net-is-taking-over-114012401193_1.html"&gt;published in the Business Standard&lt;/a&gt; on January 24, 2014 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Writer Suketu Mehta has called it "murder by &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter&lt;/a&gt;". Pushkar's very public spat with Mehr Tarar, a Pakistani journalist, on the micro-blogging site, many psychologists feel, may have multiplied her anguish. Apart from other things, Tarar had tweeted: "The blonde's &lt;i&gt;aqal&lt;/i&gt; is weaker thn (sic) her grammar &amp;amp; spellings." Still others believe Pushkar had the premonition that end was near, and it was there for all to see on social media. &lt;i&gt;"Hasta hua jayega,"&lt;/i&gt; (will go laughing), she had tweeted a few days before her death.&lt;br /&gt;&lt;br /&gt;Social media is no longer time-pass in the country, certainly not with over 90 million users. The line that divides online and offline lives has blurred. &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Networking+Sites" target="_blank"&gt;Networking sites&lt;/a&gt; have begun to impact human behaviour. Lives are being lived in the open: open to comment, analysis and abuse. Mahesh Murthy, the founder of digital brand management firm Pinstorm, calls it the "demise of the culture of secrecy". This is the age, he says, "of diversity, of coming out in the open with sexual preferences &lt;i&gt;et cetera&lt;/i&gt;. Social media will help slaughter sacred cows. It is a good thing to happen, except for the sacred cows." According to Murthy, the pitfalls of uncensored speech are for those "who think they can control their lives or are insecure".&lt;br /&gt;&lt;br /&gt;But pitfalls are showing up. Some time ago, a high-profile couple from Delhi approached marriage and family counsellor Nisha Khanna. Their problem was aggravated by the wife's obsession with &lt;a href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook&lt;/a&gt;, to the extent that she would put out everything, including the ups and downs of her relationship with her husband, as status messages for the consumption of her social media friends and acquaintances. The husband was livid - he felt exposed. It took six months of rigorous counselling before the wife started controlling, though marginally, her social media behaviour. "We are seeing obsession, irrationality and an inability to spot the very &lt;i&gt;thick&lt;/i&gt; line that divides the private from the public," says Varkha Chulani, clinical psychologist, psychotherapist and consultant with Lilavati Hospital in Mumbai. People, she adds, are looking for Facebook 'like' buttons even in real life.&lt;br /&gt;&lt;br /&gt;Feelings of extreme happiness, depression, loneliness and even suicidal thoughts are being shared not with family and friends but with Facebook 'connections' and Twitter 'followers'. Tweets or status updates that point to suicidal tendencies, in particular, can be telling. Some of these key expressions are "depressed", "feeling abused", "it's over" or "empty inside". A study - Tracking Suicide Risk Factors through Twitter - conducted in the US last year found a strong correlation between the number of tweets that indicated suicidal intentions and the number of suicides committed.&lt;br /&gt;&lt;br /&gt;Having realised that the platform is also being used as a medium to vent and express personal trauma, Facebook has, for about a year, been sending reports on profiles of people with suicide risk to Mumbai-based suicide helpline Aasra. "In the last one year, we have received 350 such email intimations concerning Indians," says Aasra Director Johnson Thomas. Aasra then mails that person to subtly and sensitively convey that there is help at hand, in case it is needed. Facebook and Twitter did not offer any comment for this article.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Decoding Social Media Slang&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;I  am an aggregator who has left a cookie crumb trail (while writing   this) for a machine algorithm to follow. So, can it point out to my boss   the scoops and their origin? In all probability, yes. For an   all-devouring algorithm, no crumb, no target, is too small. Algorithms   (at their core, a step-by-step method for doing a job) can sound scary,   but social media analysts depend on these little-understood, obscure   mathematical creatures.&lt;br /&gt;&lt;br /&gt; So, information posted publicly on  blogs, Facebook, Twitter, and  other sites are fair game for these data  predators. Suppose you click  ‘like’ on Facebook, you’re giving away a  lot more than you might think.  Your ‘likes’ can be pieced together to  form an eerily true portrait of  yourself. A study of 58,000 volunteers  by Michal Kosinski and David  Stillwell (University of Cambridge) and  Thore Graepel (Microsoft  Research, Cambridge) charts the chances of an  accurate prediction: 67  per cent for single versus in a relationship,  73 per cent for cigarette  smoking, 70 per cent for alcohol drinking, 65  per cent for drug use, 88  per cent for male homosexuality, 75 per cent  for female homosexuality,  and 93 per cent for gender.&lt;br /&gt;&lt;br /&gt; Another  point is not all data out there are cold facts. Far from  that, most  are sentiments and slang: sweet, bitter and often intimate.  “Wazup  homie!! howz it going!!” is a profound example. “‘Yo, homie, I'll  be at  my house in case you want to come kick it later” is another. How  is a  number cruncher such as an algorithm expected to crunch slang and   emotions? But experts insist there’s a bull market in sentiments and   foul language. And an emerging field known as sentiment analysis is   taking shape. The simplest algorithms here work by scanning keywords to   categorise a statement as positive or negative, based on a simple  binary  analysis (‘love’ is good, ‘hate’ is bad). But a more reliable  analysis  requires decoding many linguistic shades of gray. For example,  to get at  the true intent of a statement like ‘dude, i'm  like......duuuude,’ the  software will have to activate several  different filters, including  polarity (is the statement positive or  negative?), intensity (what is  the degree of emotion being expressed?)  and subjectivity (how partial or  impartial is the source?)&lt;br /&gt;&lt;br /&gt; “People first thought that emotions expressed on social media were  just  cute and stupid,” says Sreeju Thankan who has done computer science   and engineering from the Indian Institute of Technology Roorkee and is   now working at Mango Solutions. “Now, they are recognising it as a rich   vein.” But translating slang into binary code can be much tougher.   “Sentiments are different from conventional facts,” says Thankan. “There   is a long way for slang patrol to go.” For casual web surfers, a   simpler sentiment-analysis tool, Tweetfeel, is available. It tells you   the numbers of positive and negative tweets on a given topic. It also   gives you their percentages. Its analysis is based not just on   emoticons, but also words and phrases.&lt;/p&gt;
&lt;p style="text-align: right; "&gt;Ashish Sharma&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Last October in Mumbai, a 17-year-old college student, Aishwarya Dahiwal, killed herself after her parents barred her from using Facebook. "Is Facebook so bad? I cannot stay in a home with such restrictions as I can't live without Facebook," her suicide note reportedly read. The parents were in utter shock. "Girls are more prone to putting personal and emotional messages on social networking sites," says Manju Chhabra, child counsellor who runs an organisation called Cactus Lily in Delhi. And they tend to get more affected by what people say and how they react. "And comments on this very impersonal medium which we are giving a very personal space can be very cruel."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seema Hingorrany, a Mumbai-based psychologist, says one of her recent patients is a girl studying in Class 9. Her friend from school had uploaded a photo of herself, which got 200 'likes'. That upset the patient terribly because it reinforced her belief that she was unattractive and she became extremely upset, to the extent that her parents felt she needed counselling. Constant use of Facebook can affect one's self-esteem, if it's already low. Another of Hingorrany's patient was a 30-year-old who took to social media after he lost his job. But seeing other people's photos and updates made him increasingly jealous, and he began posting nasty comments. The recipients of his ire began "unfriending" him, which only made him more withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Irrational behaviour can also be seen in the world of random video chat. Sites like Omegle and Chatroulette aim to bring together surfers together with the help of webcams. The promise is irresistible: an endless stream of visitors in your room. When Ashish Sharma (the author of the accompanying article) logged on, he met a gaggle of girls who giggled endlessly, a German painter who was looking for his muse and wanted him to pose in a state of undress, a Swede who danced around and asked him to sing in praise of his bottom, and a man with an iron mask. It was crude and shocking. The excessively sexual behaviour can be unsettling for an unsuspecting (and young) visitor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another side to it. "Twitter posts," says an article posted on rediff.com, "have saved lives. A man lost on a ski slope in Switzerland got help when he tweeted his predicament. Another got bail from arrest as his friends discovered from a tweet that he was jailed in a foreign country." Human resource managers check out the profiles of job applicants on social media. "People might mask many judgmental things in an interview; there is a possibility that they might express it on social media," says Debdas Sen, leader of technology consulting, PricewaterhouseCoopers. "Inclusion and diversity are important for us." But job seekers have become wise to it. That's why many airbrush their social media profiles. All politically incorrect posts are removed. Friends are treated lavishly offline so that they write nice posts on Facebook pages. Some even hire professional photographers for as much as Rs 20,000 to paste good profile pictures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But those who hire have started to see through it. Says Murthy of Pinstrip, "One can easily figure out the truthfulness of your statements by seeing what your friends are saying." One human resource manager says he pays more attention to what people post after 10 pm because "it tends to be more truthful". A senior functionary of a Gurgaon-headquartered firm says that he had hired somebody after he had found nothing suspicious on his LinkedIn profile; it was only later he found out that this person had been involved in some financial misdemeanour in his earlier job. "His LinkedIn profile had no clues, he was not on Facebook. That should have struck me," he says. Of course, the person was asked to leave.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Bangalore-based Centre for Internet and Society, says social media has made people forget the distinction between private, semi-private and public statements. "Speech used to be ephemeral, but Internet has given it the power it never had," he says. "Internet never forgets." The fact that traces of a communication may remain in cyberspace even after they have been deleted has prompted a legislation called the Right to Erasure by the European Union. Under the law, earlier called Right to be Forgotten, an individual can request all his data to be erased, including by third parties. India is also mulling a similar legislation under its Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those at the bottom of the social pyramid, who have little to lose, express themselves most freely on social media, while those with reputations to protect are cautious. The consequences can be serious, as the Mumbai girl who questioned the city's shutdown after Bal Thackeray's death in November 2012 on Facebook and her friend who "liked" realised: both were called in by the police. It's not surprising why even standup comedians, who can't resist taking potshots at one and all, turn extremely careful before they tweet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, is social media good or bad? "Social media can help," Amartya Sen said at the recent Jaipur Literature Festival, "But you must read more books".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over'&gt;https://cis-india.org/news/business-standard-january-24-2014-veenu-sandhu-surabhi-agarwal-the-net-is-taking-over&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T05:57:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter">
    <title>Social Notworking - 'Murder by Twitter'</title>
    <link>https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter</link>
    <description>
        &lt;b&gt;Suketu Mehta (@suketumehta) - terrible news about sunanda tharoor. this is murder by twitter. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Malini Nair &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-19/social-media/46345808_1_sunanda-pushkar-social-media-that-pushkar"&gt;published in the Times of India&lt;/a&gt; quotes Nishant Shah.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even before forensic science has 		declared the reasons behind Sunanda Pushkar's shocking death on 		Friday night, social media has been accused of murder. Writer 		Suketu Mehta wasn't the only one to point fingers. "First 		murder by @TwitterIndia , claps, fellow &lt;a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter"&gt;twitter&lt;/a&gt; matured guns!" is how another tweet went. Besides the deadly 		cocktail of depression, drugs, a strained marriage, questions have 		been raised about whether the vicious banter and collective howls 		of derision on social media over her very public meltdown — again 		on social media — pushed her over the edge. &lt;br /&gt;Have we, the 		tweeple, in our eagerness to share every detail of our lives over 		an internet megaphone, not quite understood what the social media 		can do, especially its pitfalls? Is the line between the public and 		private blurring too fast? Commentators say that the rules that 		govern human and social behaviour haven't changed, and the fault 		lies in how we negotiate the cyber turf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can our digital lives 		have serious offline consequences? Nishant Shah, director, research 		, Centre for Internet &amp;amp; Society, Bangalore, says people need to 		realize that though twitter amplifies everything, but the ability 		to hurt, be mean, fight, question, critique and bully is not new.&lt;/p&gt;
&lt;p&gt;"These are human practices , which replay themselves across 	different media forms. What is perhaps new is that our most personal 	and darkest desires have become available for public spectacle," 	says Shah.&lt;/p&gt;
&lt;div dir="LTR" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;That the twitterati can be brutal has been shown 	often enough this last year. When Tehelka editor Tarun Tejpal was 	mired in allegations of sexual harassment, his daughter was hounded 	on social media. Recently when novelist Lavanya Sankaran wrote an 	op-ed for New York Times defending the decent Indian man, she was 	royally derided, so much so that another journalist Rahul Bhatia 	tweeted in her defence, asking people to lay off.&lt;/p&gt;
&lt;p&gt;Sunanda's 	story hurtled towards a tragedy in a space of 48 hours after she 	went public. As Shah points out it wasn't as though there were no 	affairs and scandals before the dawn of social media but the tangle 	would have spun out differently and less brutally in another time 	and age. It all began, as Pushkar admitted to some papers and later 	denied, with the spilling of alleged BBMs sent by Pakistani 	journalist Mehr Tarar to Tharoor on his twitter account.&lt;/p&gt;
&lt;p&gt;Predictably, the effect of the first round of revelations was 	explosive. In fact, Pushkar herself appeared taken aback by the fact 	that a twitter spat ended up making front page headlines.&lt;/p&gt;
&lt;p&gt;The 	entire drama which, in another age, would have played out at home or 	a circle of family, friends and acquaintances — and at the most in 	far less dramatic gossip columns and on TV— was up on social 	media, provide enormous vicarious pleasure to thousands of social 	media bystanders. That Pushkar herself set the virtual assault in 	motion only adds to the bleak irony of it all. This was also not the 	first time Pushkar took a spat to twitter. @SPTVrocks tweeted about 	her fight with a journalist in Dubai earlier this month.&lt;/p&gt;
&lt;p&gt;Clinical 	psychologist Varkha Chulani says it is the personality behind the 	media usage not the form itself that is to be blamed. "People 	choose to talk about their private lives to impress others, to get 	attention. We forget what is real and what is virtual." Shah, 	however, believes that we live in a world of digital striptease and 	that the ubiquitous and pervasive technologies that surround us have 	forever blurred the lines between real and virtual.&lt;/p&gt;
&lt;p&gt;Activists 	have often pointed out that the social media has everything going 	for it — quick and vast connect and instant response — but what 	it lacks is empathy. It is easy enough to send out an RIP message, 	for instance, for someone you don't know or even care for, 	positioning yourself as a caring, empathetic soul in 140 characters.&lt;/p&gt;
&lt;p&gt;Post Pushkar's death, news anchor Barkha Dutt tweeted that we 	need to limit viciousness , stop judging and use greater compassion 	on twitter.&lt;/p&gt;
&lt;p&gt;Shah makes a similar plea for the human touch.&lt;/p&gt;
&lt;p&gt;"We 	are all so self-involved , creating narratives of our selves, 	bit-stripping every moment , instagramming every event, tweeting 	every encounter, and liking all the various things that happen 	around us, that we don't always have enough time to stop, to 	respond, to think and reflect upon other people's conditions . We 	have become jaded, to the various 'great' moments in people's time 	lines, but we are also becoming jaded to the pain that our 	involvement in these social networks can bring to those who are the 	subject of our attention," he says.&lt;/p&gt;
&lt;/div&gt;
&lt;div dir="LTR" id="mod-a-body-after-second-para" style="text-align: justify; "&gt;
&lt;p&gt;&lt;i&gt;With additional reporting by Shobita Dhar&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter'&gt;https://cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-04T07:02:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression">
    <title>Digital Citizens: Why Cyber Security and Online Privacy are Vital to the Success of Democracy and Freedom of Expression</title>
    <link>https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Michael Oghia will give a presentation which will show why cyber security and online privacy are vital for democracy and freedom of expression.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the time when Edward Snowden is fighting for both clemency and to be known as a brave whistle blower that exposed government wrongdoing, cyber security and online privacy have never been more important. As &lt;a class="external-link" href="https://www.youtube.com/watch?feature=player_embedded&amp;amp;v=H0I7wi3ZLG8&amp;amp;noredirect=1"&gt;Jacob Applebaum discussed in May last year&lt;/a&gt;, and CIS’ Maria Xynou &lt;a href="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou" class="external-link"&gt;presented recently in December&lt;/a&gt;, surveillance throughout the world is increasing. With security apparatus’ likethe NSA and now India’s Central Monitoring System, coupled with corporate data centers around the world storing our e–mails, address books, preferences, and passwords, it is easy to see how our online privacy is increasingly being threatened and often, violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, online privacy is inextricably linked to freedom of expression, and freedom of expression is a fundamental civil liberty imperative to democracy. Moreover, online security and privacy are essential to good, transparent, and accountable democratic governance. This is largely because surveillance, censorship, and monitoring ultimately create environments where self-censorship is the norm, as is the fear of the government instead of spaces that allow for freedom of expression and democratic dialogue and dissent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I would like to accomplish my speaking at CIS is not to merely educate about the dangers posed to Internet security or to world democracy, but rather to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Reiterate the importance of digital privacy and cyber security to the success of democracy and the continued protection of free expression.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Encourage citizens, technology specialists, Internet and privacy advocates, and others to see themselves as part of a larger system of democratic governance and civic participation. This means understanding how technical capabilities intersect with civil society, and then use them to advocate for a more open, accessible, and private cyberspace.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reinforce that digital media literacy education is vital to ensuring a free, open, accessible, and democratic Internet.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, I want to present ideas and recommendations for what you can do to engage with these problems, and how we can collaborate together to address them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Public Intelligence Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Intelligence Project is an independent, non-partisan, not-for-profit think tank conducting research, education, and advocacy on the importance of diversity, critical thinking, dialogue, and freedom of expression. We seek to promote more robust systems of participatory democracy, civic engagement, and conflict prevention in order to create a culture of democracy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Michael Oghia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Michael is responsible for a new project at Meta-Culture called the Public Intelligence Project, which focuses on expanding participatory democracy, civic engagement, and conflict prevention by conducting research, education, and advocacy on the intersections between diversity, dialogue, critical thinking, and freedom of expression. While new to the conflict resolution field, as a poet, musician, editor, writer, blogger, and activist, he is well-versed in the importance of freedom of expression and participating in the democratic process. He was born in Kentucky to Lebanese-Syrian parents, and after graduating with a BS in sociology from the University of Louisville, he moved to Lebanon to pursue an MA in sociology from the American University of Beirut. There, he had the opportunity to witness the Arab Revolutions first-hand while research about topics such as Internet ownership in the Middle East, social movements, Arab media, globalization, Arab youth and family, and his thesis subject, romantic love in the Arab world. Michael enjoys engaging Twitter conversations, and has an unnatural affinity for crunchy peanut butter.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Date: Tuesday, January 14, 2014&lt;br /&gt;Time: 6.30 p.m. to 8.00 p.m.&lt;br /&gt;Talk by: Michael Oghia&lt;br /&gt;Title: Research &amp;amp; Advocacy Consultant, and Project Manager&lt;br /&gt;Organisation: Meta-Culture / Public Intelligence Project&lt;br /&gt;Websites: &lt;a class="moz-txt-link-abbreviated" href="http://www.meta-culture.in"&gt;www.meta-culture.in&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.meta-culture.in"&gt;&amp;lt;http://www.meta-culture.in&amp;gt;&lt;/a&gt; &amp;amp; &lt;a class="moz-txt-link-abbreviated" href="http://www.publicintelligenceproject.org"&gt;www.publicintelligenceproject.org&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.publicintelligenceproject.org"&gt;&amp;lt;http://www.publicintelligenceproject.org&amp;gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression'&gt;https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-01-08T04:59:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot">
    <title>Rise of the bot: all you need to know about the latest threat online</title>
    <link>https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot</link>
    <description>
        &lt;b&gt;In the last week of December, 2013, former union railway minister Pawan Kumar Bansal lodged a police complaint in Chandigarh after witnessing “an unusual rise in his online fan following”. The former minister told the police that his Facebook page had received more than 10,000 likes, within a span of 24 hours. While his allegation that the ‘likes’ were “fabricated” may be true, information technology experts believe a bot was at work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Danish Raza was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/rise-of-the-bot-all-you-need-to-know-about-internet-s-latest-threat/article1-1169500.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on January 5, 2014. Snehashish Ghosh is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A bot is a software that mimics human behaviour on the Internet. Bots can be used to create artificial accounts on social media, provide numerous likes on a particular page, send tweets or visit various websites. All this is done without any human involvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bots already constitute a significant percentage of Non Human Traffic (NHT) online, which has, according to some estimates, eclipsed human traffic. Comscore, a US-based Internet technology company noted on its blog that NHT, also known as Artificial Traffic, increased from approximately 6% of the total web traffic in 2011, to 36% in 2012. Last month, a report from Incapsula, a cloud-based security service, which aids the security and performance of websites, stated that more than 60% of web traffic was non-human in 2013. The figure was based on data collected from the 20,000 sites on Incapsula’s network .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than bots, NHT on the web includes traffic generated by Internet routers and back end services used by websites to communicate with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is not immune to the problem. According to the Symantec Internet Security Threat Report for 2012, there was a 280% increase in bot infections in India between 2011 and 2012. 17% of bot-infected computers, the highest in the world, are in India and 15% of global bot-net spam is generated here. The report also states that 69 Indian cities are prone to bot infections which includes Bhubaneswar, Surat, Cochin, Jaipur, Visakhapatnam, Indore, Kota, Ghaziabad and Mysore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bot spotting&lt;/b&gt;&lt;br /&gt;How do you spot a bot? When a bot or its friend is at work, the browser directs you to sites other than the ones you intend to visit, you get full-page pop ups and pop unders, and when you quit the browser, it gets relaunched after a few minutes. Chances are your computer is part of a chain of online events which create NHT on the web, the purpose of which may be to attack a site or a server.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why you should be wary&lt;/b&gt;&lt;br /&gt;Malicious traffic, malware, hacking attempts, viruses slow down the Internet and delay legitimate traffic and services. Used to target systems or take down websites, NHT generates fake clicks on advertisements to increase website statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the perils of ignoring artificial web traffic is that it gets counted for real impressions for which clients end up paying. For example, a website owner may hire the services of a digital marketing firm to publicise the site. In the guise of increasing page views, the marketing firm can produce a bill for fake impressions, supplementing actual human traffic to the page with bot usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unless there is a curb on this practice of malicious NHT, one stands at risk of being duped by marketers, agencies and even clients,” said Chiragh Cherian, director, online PR at Perfect Relations, a brand management firm. Recent studies have estimated bot traffic to be between 4 - 31% of total web traffic in the US, which translates to between $650 million and $4.7 billion in wasted marketing spend. According to Miaozhen Systems, a leading Chinese advertising technology company, NHT caused advertisers in China to lose approximately US$ 1.6 billion between July 2012 and June 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to combat Non-Human Traffic&lt;/b&gt;&lt;br /&gt;Most servers have defence mechanisms to tackle spam and cyber attacks. Websites are also now developing mechanisms such as asking for human authentication which is difficult for a bot to execute. “But even personal computers should be equipped with strong Internet security applications such as anti-virus and anti-spyware to prevent hacking and phishing attempts and to prevent being used as slave machines for distributed cyber attacks,” said Chintu Cherian Abraham, a digital media professional. Figures show that we need to watch out where and how we go online. According to Norton Report, 2013, 61% Indians access their social network accounts from unsecured wi-fi connections, while 42% access bank accounts and 44% shop online using unsecured wi-fi connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media companies are gradually devising mechanisms to filter bots. “When a page and a fan connect on Facebook, we want to ensure that connection involves a real person interested in hearing from a specific page and engaging with that brand’s content. As such, we have recently increased our automated efforts to remove Likes on Pages that may have been gained by means that violate our terms,” mentions Facebook’s site integrity policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agency-client intervention is necessary to ensure that artificial traffic is not presented as real. “It’s also important to make all agencies, advertisers and clients aware of their responsibility to keep the Internet free from malicious NHT,” said Chiragh Cherian.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government involvement is also needed to control the problem of malicious bots. “A lot needs to be done from the government’s side to tackle bots which can be used to target the country’s critical infrastructure such as banking websites,” said Jiten Jain, a cyber security analyst, adding, “Last year, I highlighted the flaws in HDFC’s net banking website which have been rectified now. They could have been exploited to block the net-banking service.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Until we have a robust mechanism to filter out bogus traffic from real, it will be difficult to say whether the social media followers of Bansal and other public figures are human or not.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/FactFile.png" alt="Fact File" class="image-inline" title="Fact File" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Know your Bots&lt;/b&gt;&lt;br /&gt;Not all bots are used with a negative intent. Some help in research and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Malicious&lt;/b&gt;&lt;br /&gt;Bots can be effectively used to impersonate and to hack accounts leading to financial losses and intellectual property theft. “Theft of personal details, username and password to operate one’s bank account is a classic example of how bots can lead to financial losses. It is an organised cyber crime,” explained Commander (Retd) Mukesh Saini, former national information security coordinator, Government of India. In May 2013, cyber criminals broke into the Mumbai-based account of the RPG group and siphoned off `2.4 crore. Three people were arrested in the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The rate at which NHT is increasing is alarming,” says Tinu 	Cherian Abraham. “Any computer connected to the Internet is 	vulnerable to such attacks. The user will not get to know about it 	unless he or she has installed an Internet security application.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides bots, computers also generate other kinds of secondary 	activities, while the user is surfing the Internet. This activity 	remains in the background and is never seen by the user, unlike the 	bot-generated pop ups, observes Comscore. For example, your computer 	might be being used as a channel to reach a server with the 	intention of hacking it. And you will never know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Good&lt;/b&gt;&lt;br /&gt;Not all NHT is bad, though. In fact, 	good bots such as scrapers can be effectively used to conduct 	research. “Wikipedia can be scraped to investigate the frequency 	of edits on a Wikipedia page and track the increase in the number of 	editors,” explained Snehashish Ghosh, policy associate at the 	Bangalore-based Centre for Internet &amp;amp; Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Good bots are also used by search engines to track content on 	websites and enhance their search results. Search bots and other 	good bots formed 31% of total bots, the Incapsula report noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Social&lt;/b&gt;&lt;br /&gt;Apart from malicious and good 	bots, there are social media bots too. “Extensive analysis is done 	on social media traffic for monitoring, business lead generation, as 	well as reputation management. This has amounted to a lot of 	automated or non-human traffic,” said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Facebook’s filings published in a Forbes report in 	February 2012, around 83 million of its users are bogus. “It’s a 	violation of our policies to use a fake name or operate under a 	false identity, and we encourage people to report any user they 	suspect of doing this, either through the report links we provide on 	the site or through the contact forms in our help centre,” a 	Facebook spokesperson told HT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter bots have also made its presence felt on the platform. 	“Twitter has witnessed very interesting bots which have found 	appreciation from the community for being funny and creative. The 	microblogging site cracked down on some harmful bots, but still some 	of the advanced level bots slip through the net,” said Ghosh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2012, London-based firm Digital Evaluators, which 	evaluates social media presence of worldwide companies, released an 	analysis of Twitter followers of the US Presidential Election 	candidates Barack Obama and Mitt Romney. 21.9% of Barack Obama’s 	17.82 million Twitter followers were found to be bogus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Big Brother&lt;/b&gt;&lt;br /&gt;Ghosh said that the increase 	in NHT related to the Internet of things, the concept which enables 	communication between two or more devices, results in privacy 	issues. “Take a situation where your mobile device is constantly 	tracking your location for the purpose of switching on the air 	conditioner at your home before you reach. Such applications produce 	huge amounts of personal data and there is no clarity whether this 	data is being stored,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As the new networks link data from products, company assets, 	or the operating environment, they will generate better information 	and analysis, which can enhance decision making significantly. Some 	organisations are starting to deploy these applications in targeted 	areas, while more radical and demanding uses are still in the 	conceptual or experimental stages,” noted a McKinsey &amp;amp; Company 	report on Internet of things.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot'&gt;https://cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-01-31T07:16:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail">
    <title>Indian government wakes up to risk of Hotmail, Gmail</title>
    <link>https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail</link>
    <description>
        &lt;b&gt;Worried by US spying revelations, India has begun drawing up a new email policy to help secure government communications, but the man responsible for drafting the rules still regularly uses Hotmail.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was originally published by &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5goPLsuDV0nXQ5To1xWzthPSETXlw?docId=f8f4236f-1218-4fea-bf25-a01a9f50351a"&gt;AFP&lt;/a&gt; on December 7, 2013, was also mirrored by the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-09/internet/44988376_1_new-email-policy-nsa-official-email"&gt;Times of India&lt;/a&gt;, &lt;a class="external-link" href="http://www.livemint.com/Home-Page/VBuZT9V4A5vsNOcEDuZZfL/India-wakes-up-to-risk-of-Hotmail-Gmail.html"&gt;Livemint&lt;/a&gt;, &lt;a class="external-link" href="http://www.gulf-times.com/india/185/details/374083/govt-wakes-up-to-hotmail,-gmail-risk"&gt;Reuters&lt;/a&gt;, &lt;a class="external-link" href="http://www.dawn.com/news/1061413/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;Dawn&lt;/a&gt;, &lt;a class="external-link" href="http://www.ndtv.com/article/india/indian-government-wakes-up-to-risk-of-hotmail-gmail-455999"&gt;NDTV&lt;/a&gt;, &lt;a class="external-link" href="http://nz.news.yahoo.com/a/-/technology/20216609/indian-government-wakes-up-to-risk-of-hotmail-gmail/"&gt;Yahoo News&lt;/a&gt;, &lt;a class="external-link" href="http://www.themalaysianinsider.com/technology/article/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;The Malaysian Insider&lt;/a&gt; and &lt;a class="external-link" href="http://www.digitalone.com.sg/news/article/28250"&gt;Asia One Digital&lt;/a&gt;. A slightly modified version was &lt;a class="external-link" href="http://www.siliconindia.com/news/enterpriseit/Indian-Government-Boots-to-Safe-Mode-After-Gmail-And-Hotmail-Security-Threats--nid-157899-cid-7.html"&gt;published by Silicon India&lt;/a&gt; on December 11. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Like many of his peers in ministries across New Delhi, IT Minister Kapil Sibal's office recently sent an email inviting journalists to the launch of his new personal website using the free email service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others, including senior foreign ministry officials, the information and broadcasting minister and the health ministry secretary, also use Gmail, Hotmail or Yahoo instead of their government accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked why he continued to use his Hotmail for official use, Sibal declined to comment, but a senior bureaucrat in his ministry admitted that he personally preferred Gmail because it is "just a lot easier".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We keep moving, get different designations, go different places and with that, our emails change. You lose contacts and important emails, which you don't need to worry about with a Gmail account," the bureaucrat told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To be honest, the quality of our official mail isn't that great yet. It still needs some work," he added on condition of anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IT security expert Sunil Abraham said the use of Gmail and the like was highly risky since the American services had their servers in the US and the National Security Agency has been known to tap into their database systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many state and federal public workers actively use popular email services for office, but some of the estimates are startling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As much as 90 percent of government officials use private email (services) for official use... that's because their official email is not as stable or speedy," said Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September Sibal's ministry announced a new "Email Policy of the Government of India" in the wake of spying allegations about the NSA revealed by former NSA contractor Edward Snowden.&lt;br /&gt;NSA's tentacles not only crept into the Indian embassy in Washington and its UN office in New York, but also accessed email and chat messenger contact lists of hundreds of millions of ordinary citizens worldwide, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During a single day last year, the NSA's Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, The Washington Post said, according to an internal NSA presentation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The $11 million Indian project aims to bring some five million public employees onto the government's email domain powered by the National Informatics Centre (NIC) as early as mid-December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is awaiting clearances and suggestions from all ministries before the proposal goes to the cabinet this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Satyanarayana, secretary of the department of electronics and IT, dismissed claims that the policy was too late and was a response to the Snowden scandal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The policy is not a reaction to any global spying revelations, it was already in the works. It is just a mere coincidence that both came around the same time," he said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fresh doubts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some cyber security experts say bringing millions aboard a centralised server could make a hacker's job easier, with all critical government information available on a single platform.&lt;br /&gt;More than 11,000 Indian websites were hacked or defaced between May and August this year, with a large number of attacks on the ".in" domain whose servers are in India, the Times of India reported last month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Making the use of a centralised government server is not the best way to proceed. Having everything on one platform makes it even more vulnerable to cyber attacks and hacking," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It also brings about new worries of the NIC becoming the local snoop."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some also predict that the ambitious policy would eventually fizzle out for lack of attention from ministers and bureaucrats, who work in government offices where stacks of yellowing files and papers are still a common sight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's sad but most of these officials don't understand much about technology, so mastering email is something that is miles and miles away," said Vijay Mukhi, a Mumbai-based cyber security expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These guys saw all the snooping news and suddenly they woke up and said 'lets make an email policy'. Enforcing this is not possible on a practical basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT ministry also plans to conduct workshops to teach employees about email security such as when to change passwords and user names and how to use email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Every employee should know how, what and when critical data can be vulnerable... with most work still done on paper, it is important to know the nitty-gritty of using email," Satyanarayana said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail'&gt;https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-12-30T04:24:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice">
    <title>International View of the State-of-the-Art of Cryptography and Security and its Use in Practice (IV)</title>
    <link>https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice</link>
    <description>
        &lt;b&gt;Building on the workshop in Dagstuhl in June-July 2011 (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice), Beijing  (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  II), and Athens (International View of the State-of-the-Art of Cryptography and Security and its Use in Practice  III) that set the stage for discussions on cryptography among a group of key researchers from Europe, Asia, and North America, the  one day workshop in Bangalore, following AsiaCrypt 2013  will again bring together internationally recognized scientists to discuss direction and development in  theoretical and applied cryptography and surrounding societal issues. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There will be four focus areas:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt;Real-life cryptography&lt;/li&gt;
&lt;li&gt;Standardization&lt;/li&gt;
&lt;li&gt;Regulatory requirements&lt;/li&gt;
&lt;li&gt;Innovative use cases for cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Each focus area will be anchored in an invited talk               and/or panel, but the emphasis will be on discussion. The               participants will address broad research directions in               encryption and secure computation and their applications               in cloud computing, smart grid, mobile and embedded               computing, hardware, software, and network security. They               will also examine non-technical issues surrounding               deployment and adoption of new security technologies using               encryption, such as privacy or economic consideration.               Approaches and projects in different countries will be               discussed, in order to increase awareness of the R&amp;amp;D               activities internationally and continue to for a strong               community of research and practice and in order to               generate new ideas in this field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the workshop will cover a broad spectrum of               issues from the list presented below with a specific focus               that will be announced shortly. The topics of               interest include (but are not limited to) the following               subjects:&lt;/p&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;li&gt; Secret versus public ciphers&lt;/li&gt;
&lt;li&gt; Cipher and algorithm development process&lt;/li&gt;
&lt;li&gt; Algorithms maturity and review&lt;/li&gt;
&lt;li&gt; Lightweight cryptography&lt;/li&gt;
&lt;li&gt; New requirements for cryptography for novel                 applications&lt;/li&gt;
&lt;li&gt; Cipher implementation and interoperability&lt;/li&gt;
&lt;li&gt; Standardization&lt;/li&gt;
&lt;li&gt; Regulatory initiatives&lt;/li&gt;
&lt;li&gt; Privacy enhancing cryptography&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;8:15 a.m.&lt;/td&gt;
&lt;td&gt;Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:30 a.m.&lt;/td&gt;
&lt;td&gt;Opening statement (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8:40 a.m.&lt;/td&gt;
&lt;td&gt;Opening keynote (TBD)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:10 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 1 and discussion: Advances in cryptography; new use cases, Participants:  Dan Bernstein (University of Illinois at Chicago), Tanja Lange (Eindhoven), Veni Madhavan (ERNET), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel II and  discussion: Regulatory environment and standardization: Sunil Abraham (India CIS), Kazue Sako (NEC), Claire Vishik (Intel), others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 a.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel 3 and discussion: Implementation and interoperability for new environments (e.g., smart grid, Internet of things): Reji Kumar (Smart Grid India), other TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.00 p.m.&lt;/td&gt;
&lt;td&gt;Coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.30 p.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Panel IV and discussion: Privacy, social networking, ubiquitous connectivity and cryptography: Rene Peralta (NIST), Kumar Ranganathan, others TBD&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.00 p.m.&lt;/td&gt;
&lt;td&gt;Thoughts and next workshop&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.20 p.m.&lt;/td&gt;
&lt;td&gt;Closing statements (Organizers)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.30 p.m.&lt;/td&gt;
&lt;td&gt;Adjourn&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="list-style-type: disc; text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice'&gt;https://cis-india.org/news/international-view-of-state-of-the-art-of-cryptography-and-security-and-its-use-in-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T09:05:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote">
    <title>A Three-Way Race Draws Delhi’s Young, and Everyone Else, Out to Vote</title>
    <link>https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote</link>
    <description>
        &lt;b&gt;The polling stations were supposed to close at 5:30 p.m. on Wednesday, just after sunset. But with thousands still waiting in the dark to cast their vote in the state assembly elections, the Delhi Election Commission decided to extend the voting until 6:30 p.m. Then to 7:30 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Betwa Sharma was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/12/04/a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote/?_r=1"&gt;published in the New York Times&lt;/a&gt; on December 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Finally, the Election Commission said it would wait until 9:30 p.m. to close the polls. At the polling station in the New Delhi district, those waiting in line agreed that a relatively warm winter evening was helping to draw people out to vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though no official data on voter turnout had been released by 9 p.m., it was clear that voters were coming out in unprecedented numbers for this year’s Delhi state elections. Analysts were predicting that this election would break the previous voter turnout record of 61.75 percent in 1993.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike in the past, this year’s contest featured a potential spoiler in the Aam Aadmi, or Common Man, Party. Its leader, the firebrand anticorruption activist Arvind Kejriwal, was battling to dethrone the state’s longtime chief minister, Sheila Dikshit of the Congress Party, and siphon votes from the other establishment choice, the Bharatiya Janata Party, or B.J.P. (Exit polls by the &lt;a href="http://zeenews.india.com/assembly-elections-2013/delhi-polls/delhi-exit-polls-live-bjp-biggest-winner-aap-plays-spoilsport-for-congress_894372.html"&gt;local media&lt;/a&gt; on Wednesday night were showing that the B.J.P. was likely to win the most seats in the state assembly.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The prospect of upending the political status quo brought out young voters like 23-year-old Hina Kousar, although she had to put up a fight with her family to cast her vote for the Aam Aadmi Party. Her mother lectured her on how governments don’t care about people, but that didn’t deter Ms. Kousar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They have the wrong mentality, and young people should change it,” she said. “My granny is 70 years old and I told her to vote.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the youthful voters turned voting into a social activity, both in person and online. At one polling station, most people cast their votes quietly and left, but many of the young voters came with their friends. They talked animatedly about their choices while leaving the polling stations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others called their families to say they had voted. Some clicked photos of each other on their smartphones and posted the images on their Facebook pages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In less than a year, Mr. Kejriwal, 45, and his party has pasted itself quite literally on city’s consciousness with aggressive campaigns and posters of brooms, symbolizing sweeping away the old order. And that’s why he got Ms. Kousar’s vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The most important thing is that he has promised to remove corruption. The money that is going into Swiss banks is our money. The rising market prices are because of it,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several voters between the ages of 20 to 25 who were interviewed by India Ink said they were backing Mr. Kejriwal, who represented a change from the three-term winner Ms. Dikshit. The B.J.P. had no star state candidate that appealed to them, even though its prime ministerial candidate, Narendra Modi, engaged with students at Delhi University earlier this year and is extremely active on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides corruption, several young voters, both male and female, said that ensuring women’s safety had to be a priority for any Delhi government.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal voter, Kavita, a 27-year-old teacher who goes by one name, said that Ms. Dikshit’s government hadn’t effectively improved women’s safety after the gang rape of a physiotherapy student one year ago. “I don’t feel the difference,” she said. “I still feel unsafe on the streets, so let’s see what some new leaders can do to change this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.Betwa Sharma Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal supporter, Abhilash Sasidharan, 27, said a safe environment for women is “absolutely” the most important thing to him, but the software engineer also was moved that Mr. Kejriwal had left his lucrative job as a revenue service officer to join politics.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Kavita.png" alt="Kavita" class="image-inline" title="Kavita" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="caption"&gt;Kavita, 27, after she cast her vote at a polling booth in New Delhi on Wednesday.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;“I don’t have the courage to step into dirty politics, but he does and I want to support that,” he said. “Look, Congress has had 15 years, so why not see if someone can do better, and all these parties should feel a threat to do better.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all young people are buying Mr. Kejriwal’s promises of sweeping change. Shiv Raj Syal, 20, called them “flowery and too good to believe,” as he cast his vote for Ms. Dikshit. “He is just very new at this and I don’t think it’s wise to hand over the running of a national capital to a party with no experience,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chief minister had focused on development, the college student said, making Delhi a hub for foreign brands and corporates, and transforming it into an international city.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Abhilash.png" title="Abhilash" height="215" width="161" alt="Abhilash" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Despite the appearance of a robust youth presence at the polls on Wednesday, analysts are waiting on the Election Commission’s numbers before declaring this election cycle the year of the youth vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sanjay Kumar, an election analyst from the Center for the Study of Developing Societies in Delhi, said that as of July, only 68 percent of eligible voters between the ages of 18 and 21 had registered to vote, far lower than the 86 percent average of other demographics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V.S. Sampath, the chief election commissioner in India, said that youth participation in the electoral process had been a priority in recent years, and several efforts including visiting universities and colleges had been made to register them, which had resulted in a “significant increase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Mr. Sampath said, 119,000 voters between the ages of 18 and 19 were on the electoral rolls in Delhi, which accounted for 0.93 percent of total Delhi voters, but now the numbers had gone up to 405,000, or 3.4 percent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Election observers have also pointed out that the hype about social media, especially Twitter, becoming a tool for political expression and organization for the youth has not necessarily translated into a surge in voting in that demographic of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The political debates on social media could translate into votes by the next elections, according to Sunil Abraham from the Centere of Internet and Society in Bangalore, who describes the Internet penetration as “limited,” and social media use even smaller and dominated by the economic elite.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham, however, said social media is influencing the political discourse, not by motivating voters, but by influencing the coverage in mainstream media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relative to the country’s population, he added, social media users had a “disproportionate influence on discourse.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the young voters who spoke to India Ink said that at least for them, social media did play a role in drawing them into politics this year. Mr. Syal, the Congress voter, for instance, said that he had posted a message on his Facebook wall criticizing some of Mr. Kejriwal’s claims, which drew 50 comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Mr. Sasidharan, the Aam Aadmi Party supporter, posted on Facebook a photo of him holding up his finger stained with ink, showing that he voted, immediately after coming out of the polling station. “I hope that it inspires more people to come and vote,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote'&gt;https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T07:03:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one">
    <title>When the virtual world wakes up the real one</title>
    <link>https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one</link>
    <description>
        &lt;b&gt;The unprecedented wave of voices speaking up against sexual harassment in recent times has as much to do with technology as the determination to seek justice. From Twitter to Tumblr, and blogs to pastebin, the internet's anonymity, reach and speed allow small, personal stories of abuse to swell into big stories.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malini Nair was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-11-24/deep-focus/44411700_1_social-web-sexual-harassment-editor-tarun-tejpal"&gt;published in the Times of India&lt;/a&gt; on November 24. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The outrage over the Tehelka case started with a post on pastebin, an  anonymous document sharing site, on Wednesday evening. It contained the  email managing editor Shoma Chaudhury had sent to the Tehelka staff with  editor Tarun Tejpal's "atonement" letter appended below. A few hours  later, the story had ballooned into a heated debate, and the outpouring  forced what was being dismissed as an "internal matter" to be treated as  a criminal case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two &lt;a href="http://timesofindia.indiatimes.com/topic/Women"&gt;women&lt;/a&gt; who recently spoke up against harassment at the hands of a retired  Supreme Court judge also used Facebook and the blogosphere to tell their  stories, ensuring that the real world was actually moved into taking  action. "The social web's biggest comfort is that we are no longer  alone," says Nishant Shah, director, Research at the Centre for Internet  and Society, Bangalore. "No matter what has happened to us, it has  happened to somebody else. The possibility of finding credulous and  empathetic audiences who but share our pain, understand it, and respond  to it is unprecedented." Retweets and comments have often been described  as the digital equivalent of holding hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah's pick of web  campaigns that highlighted the problems include Blank Noise which calls  women to talk of small, everyday stories of harassment, the Pink Chaddi  drive and Why We Need Feminism, a web venture across American  universities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason why the net encourages victims of  abuse who might otherwise have stayed quiet to speak out is its  "pseudonymity", as Shah terms it. In societies where there is shame  attached to talking about sexual assault, the online space saves women  from having to put themselves out in the "physical space" while ensuring  that the perpetrator is exposed, he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plus for  social web is that it gets other victims to speak up as well, gathering  force and magnitude in the process. This happened in the instance of the  legal interns. Another instance that surfaced just a month ago was of  two American women science bloggers Danielle Lee and Monica Byrne. When  Lee refused to write a piece for free for Biology Online, she was called  "urban whore" by an enraged editor. She blogged about it and the  ensuing storm over social media got her huge support. After Lee's  expose, Byrne blogged about an acutely sexual conversation a powerful  science writer inflicted on her. The outrage this provoked abated only  after he made amends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an article in Gender and Culture blog project puts it: "( The digital world provided) a &lt;a href="http://timesofindia.indiatimes.com/topic/Forum"&gt;forum&lt;/a&gt; for these victims to document their abuse, and a courtroom where the  abusers have been judged and found guilty by public opinion".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of  course there are problems with the internet's version of justice — it  tends to play judge, jury and executioner with giddy recklessness. In  the Tehelka case, the first questionable moment came when the survivor's  email was tweeted and re-tweeted with no concern for her requests for  anonymity. "The problem with Twitter and Facebook is the incredible and  gross violations of privacy of the survivor. And otherwise responsible  adults join lynch mobs calling either the &lt;a href="http://timesofindia.indiatimes.com/topic/Survivor"&gt;survivor&lt;/a&gt; or the accused names, making ridiculous allegations, desperately  looking for an easy narrative to hang everything on," says author Nisha  Susan, who led the Pink Chaddi campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentator Santosh Desai says that it is tough to choose between an  unbridled but powerful social web and one that is cautious and governed  by norms. "Earlier, there were receivers and broadcasters who were few  and governed by licenses and a code of behaviour. Now everyone is a  broadcaster, everyone is a circulator and everyone is an aggregator.  Having no oversight here could be problematic," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Susan says communities need to go beyond social media in such situations. "It should also be a time for us to reflect. On what we would do in such a situation, how we could perhaps prevent it, on the sense of entitlement powerful men have all over the world, on the awful pressures young women face. We should all be reflecting. Instead we are just re-tweeting."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one'&gt;https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello">
    <title>I Just Pinged to Say Hello</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello</link>
    <description>
        &lt;b&gt;A host of social networks find us more connected than ever before, but leave us groping for words in the digital space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was &lt;a class="external-link" href="http://www.indianexpress.com/news/i-just-pinged-to-say-hello/1198448/0"&gt;published in the Indian Express&lt;/a&gt; on November 24, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I am making a list of all the platforms that I use to connect with the large networks that I belong to. Here goes: I use Yahoo! Messenger to talk to my friends in east Asia. Most of my work meetings happen on Skype and Google Hangout. A lot of friendly chatter fills up my Facebook Messenger. Twitter is always available for a little back-chat and bitching. On the phone, I use Viber to make VoIP calls and WhatsApp is the space for unending conversations spread across days. And these are just the spaces for real-time conversation. Across all these platforms, something strange is happening. As I stay connected all the time, I am facing a phenomenon where we have run out of things to say, but not the desire to talk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I had these three conversations today on three different instant-messaging platforms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Person 1 (on WhatsApp): Hi.&lt;br /&gt;&lt;br /&gt;Me: Hey, good to hear from you. How are you doing?&lt;br /&gt;&lt;br /&gt;Person 1: Good.&lt;br /&gt;&lt;br /&gt;Me (after considerable silence): So what's up?&lt;br /&gt;&lt;br /&gt;Person 1: Nothing.&lt;br /&gt;&lt;br /&gt;End of conversation.&lt;br /&gt;&lt;br /&gt;Person 2 (On an incoming video call on Skype): Hey, you there?&lt;br /&gt;&lt;br /&gt;Me: Yeah. What time is it for you right now?&lt;br /&gt;&lt;br /&gt;Person 2: It is 10 at night.&lt;br /&gt;&lt;br /&gt;Me: Oh! That is late. How come you are calling me so late?&lt;br /&gt;&lt;br /&gt;Person 2: Oh, I saw you online.&lt;br /&gt;&lt;br /&gt;Me: Ok….. *eyes raised in question mark*&lt;br /&gt;&lt;br /&gt;Person 2: So, that's it. I am going to sleep soon.&lt;br /&gt;&lt;br /&gt;Me: Ok…. Er…goodnight.&lt;br /&gt;&lt;br /&gt;Person2: Goodnight.&lt;br /&gt;&lt;br /&gt;We hang up.&lt;br /&gt;&lt;br /&gt;Person 3 (pinging me on Facebook): Hey, you are in the US right now?&lt;br /&gt;&lt;br /&gt;Me: Yes. I am attending a conference here.&lt;br /&gt;&lt;br /&gt;Person 3: Cool!&lt;br /&gt;&lt;br /&gt;Me: Umm… yeah, it is.&lt;br /&gt;&lt;br /&gt;Person 3: emoticon of a Facebook 'like'. Have fun. Bye.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially I was irritated at the futility of these pings that are bewildering in their lack of content. I dismissed it as one of those things, but I realise that there is a pattern here. Our lives are so particularly open and documented, such minute details of what we do, where we are and who we are with, is now available for the rest of the world to consume, making most of the conversations seeking information, redundant. If you know me on my social media networks, you already know most of the basic things that you would want to know about me. And it goes without saying that no matter how close and connected we are, we are not necessarily in a state where we want to talk all the time. The more distributed our lives are, the more diminished is the need for personal communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the habit or the urge to ping, buzz, DM or chat has not caught up with this interaction deficit. So, we still seem to reach out, using a variety of platforms just to say hello, even when there is nothing to say. I call this the 'Always On' syndrome. We live in a world where being online all the time has become a ubiquitous reality. Even when we are asleep, or busy in a meeting, or just mentally disconnected from the online spaces, our avatars are still awake. They interact with others. And when they feel too lonely, they reach out and send that empty ping — just to confirm that they are not alone. That on the other side of the glowing screen is somebody else who is going to connect back, and to reassure you that we are all together in this state of being alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This empty ping has now become a signifier, loaded with meaning. The need for human connection has been distributed, but it does not compensate our need for one-on-one contact. In the early days of the cell phone, when incoming calls were still being charged, the missed call, without any content, was a code between friends and lovers. It had messages about where to meet, when to meet, or sometimes, just that you were missing somebody. The empty ping is the latest avatar of the missed call — in a world where we are always online but not always connected, when we are constantly together, but also spatially and emotionally alone, the ping remains that human touch in the digital space that reassures us that on the other side of that seductive interface and the buzzing gadget, is somebody we can say hello to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello'&gt;https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:36:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
