The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 11 to 25.
Pinning the Badge
https://cis-india.org/digital-natives/pathways/pinning-the-badge
<b>In a world of competition, badging provides a holistic way of grading and learning, where individual talents are realised and the knowledge of the group is used.</b>
<p><a class="external-link" href="http://www.indianexpress.com/news/pinning-the-badge/925167/0">The article by Nishant Shah was published in the Indian Express on March 18, 2012</a>.</p>
<p>I write this column fresh out of being a judge at the Digital Media and Learning contest on “Badging for Life-long Learning” in San Francisco. While the contest focused largely on the American education system and its future, the idea of badging that each person brings a set of skills to a study or workplace is useful to think about, in connection with India. We have now spent some time, in India, hearing about how education in the country has been ruined. There is a constant narrative of the university in shambles, where we seem to lack competent teachers, engaged students, and the resources to build efficient infrastructure for learning. This argument also positions employment as the only aim of education, reducing our humanist and social sciences legacies to skill-based information transmission.</p>
<p>Digital technologies emerge as a cure for the problems that contemporary education seems to be facing. The availability of resources at affordable costs for anybody online, has been one of the biggest promises of the internet, and it hopes to build a better learning environment and better learners. The condition of being connected to a much larger network of educators and learners, also offers us the possibilities of producing better and innovative knowledge structures. There is also an inherent ambition that the introduction of new digital competencies and skills will encourage both students and teachers to integrate their learning and pedagogy with their lived reality, producing responsible people and citizens. However, in all these expectations around the role of the digital technology in transforming learning, the idea of grading and evaluation remains unquestioned.</p>
<p>Even in the most radical restructuring of education systems, grades remain an absolute form of quantifying and measuring skills that the student is supposed to demonstrate. Grading might take up different forms — numbers, letters, percentile, etc — or it might take up different methods — continuous grading, take-home exams — but it eventually becomes the only badge that the student takes into the “real world”.</p>
<p>The idea of a badge as an alternative to this particular kind of quantification oriented learning that sees the grade as a final evaluation and in some ways, a termination of the learning process, opens up huge possibilities for how we understand learning. The badge is not imagined as yet another kind of grading, but instead it is recognition of certain skills and competences that we bring to and build in classrooms with our peers. A badge allows the students to recognise their own investment in the learning process, enabling them to realise their particular skills on the way to learning. In any learning environment, students play many roles. Some are good as connectors, some serve as conduits of information, some are good in specific areas and need help with others, some are mentors, some are translators of knowledge, some help in creating new forms of knowledge. Unfortunately, most of our grading patterns refuse to acknowledge and credit these skills which are crucial for surviving the academic world. The ability of the students to badge themselves, and others in their peer groups, acknowledging their contributions to their collective learning, might be the motivation and encouragement that we are looking for.</p>
<p>A peer-2-peer system of badging, which enables learners to be critically aware not only of their own interaction with knowledge, but also recognises the ways in which larger communities of knowledge — including the peers and teachers — opens up an extraordinary way of thinking about education. It disrupts the competitive modes of cut-throat modes of education systems we are building and allows us to re-think the function of education and the role of learners in educational environments. The digital systems of social networking and reputation management, already perform some of these tasks, which is why, a student who might not do well in class might be a YouTube sensation, finding thousands of followers worldwide. Or a student who might not show research aptitude in class might be editing complex Wikipedia entries on subjects that high-level researchers are engaging with. All these digital systems acknowledge the roles that people play in learning and knowledge production, and in that reward of recognition, provide incentives for learners to re-examine their role within knowledge systems.</p>
<p>Such a system of badging, that exceeds the static classroom, allows for students to become stakeholders in their own education, building connected communities of learning. It hints at what the future of education is going to look like. More importantly, it offers a new way of thinking about technology and its role in redesigning education, which is not merely about introducing technologies into classrooms and continuing with the traditional modes of learning through new technology skills. Instead, we have a model for what learning means, how we interact with conditions of knowledge consumption and production, and how, we can form global communities of learning which might find an anchor in the classrooms but also transcend the brick-and-mortar institutions of learning as we understand them.</p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/pathways/pinning-the-badge'>https://cis-india.org/digital-natives/pathways/pinning-the-badge</a>
</p>
No publishernishantHigher EducationResearchers at Workdigital pluralismDigital Natives2015-05-08T12:34:23ZBlog EntryDigital Natives and the Myth of the Revolution: Questioning the Radical Potential of Citizen Action
https://cis-india.org/news/digital-natives-and-the-myth-of-revolution
<b>Nishant Shah made a presentation on 'Questioning the radical potential for citizen action' at the Annenberg School of Communication at the University of South California on March 8, 2012. </b>
<p><a class="external-link" href="http://annenberg.usc.edu/Events/2012/120308ARNICDigitalNatives.aspx">The event was organised by the Annenberg Research Network in International Communication (ARNIC) and the Civic Paths research group</a>.</p>
<p>This talk is a thought-in-progress inquiry into the radical claims and potentials of citizen action which has emerged in the last few years in several parts of the world. It seeks to show how citizen action is not necessarily a radical form of politics and that we need to make a distinction between Resistances and Revolutions. It locates Resistance as an endemic condition of governmentality within a State-Citizen-Market relationship and shows how it often strengthens the status-quo rather than radically undermining it. Looking at one particular instance of a campaign against corruption in India, to build a framework that can be deployed to understand the dissonance between the claims of the future and the practices of the present that gets produced in such instances of citizen action.</p>
<p>Nishant Shah is the co-founder and Director-Research at the Bangalore based research organisation Centre for Internet and Society. His interest is in questions of governance, identity, planning and body at the intersections of digital technologies, law and everyday cultural practice. He recently co-edited a 4 volume book titled 'Digital AlterNatives with a Cause?' that explores the relationships between youth-technology-change in emerging ICT contexts of the Global South.</p>
<p>Venue: University of South California<br />Date: March 8, 2012<br />Time: 4.00 p.m to 5.30 p.m.</p>
<p>
For more details visit <a href='https://cis-india.org/news/digital-natives-and-the-myth-of-revolution'>https://cis-india.org/news/digital-natives-and-the-myth-of-revolution</a>
</p>
No publisherpraskrishnaDigital Natives2012-04-03T08:36:19ZNews ItemDigital Natives and the Myth of the Revolution: Questioning the Radical Potential of Citizen Action
https://cis-india.org/news/questioning-the-radical-potential-of-citizen-action
<b>At UC Santa Cruz, on Monday, March 5, 2012, Nishant Shah gave a lecture on "Digital Natives and the Myth of the Revolution: Questioning the Radical Potential of Citizen Action". The lecture focused more on the India Against Corruption case-study rather than the theoretical framework to understanding revolutions.</b>
<p>This talk is a thought-in-progress inquiry into the radical claims and potentials of citizen action which has emerged in the last few years in several parts of the world. It seeks to show how citizen action is not necessarily a radical form of politics and that we need to make a distinction between Resistances and Revolutions. It locates Resistance as an endemic condition of governmentality within a State-Citizen-Market relationship and shows how it often strengthens the status-quo rather than radically undermining it. Looking at one particular instance of a campaign against corruption in India, Nishant is seeking to build a framework that can be deployed to understand the dissonance between the claims of the future and the practices of the present that gets produced in such instances of citizen action.</p>
<p>Follow the original on the<a class="external-link" href="http://film.ucsc.edu/news_events/2012/02/27/nishant_shah"> UC Santa Cruz website</a><br /><a class="external-link" href="http://havc.ucsc.edu/news_events/2012/02/29/digital-natives-and-myth-revolution-questioning-radical-potential-citizen-act">Also see this </a></p>
<p>
For more details visit <a href='https://cis-india.org/news/questioning-the-radical-potential-of-citizen-action'>https://cis-india.org/news/questioning-the-radical-potential-of-citizen-action</a>
</p>
No publisherpraskrishnaDigital Natives2012-04-03T07:15:23ZNews ItemBetween the Stirrup and the Ground: Relocating Digital Activism
https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism
<b>In this peer reviewed research paper, Nishant Shah and Fieke Jansen draws on a research project that focuses on understanding new technology, mediated identities, and their relationship with processes of change in their immediate and extended environments in emerging information societies in the global south. It suggests that endemic to understanding digital activism is the need to look at the recalibrated relationships between the state and the citizens through the prism of technology and agency. The paper was published in Democracy & Society, a publication of the Center for Democracy and Civil Society, Volume 8, Issue 2, Summer 2011.</b>
<p> </p>
<p><span class="Apple-style-span"><em>Cross-posted from <a class="external-link" href="http://www.democracyandsociety.com/blog/wp-content/uploads/2011/08/CDACS-DS-15-v3-fnl.pdf">Democracy and Society</a></em>.</span></p>
<hr />
<h2>Introduction</h2>
<p>The first decade of the 21st century has witnessed the simultaneous growth of the Internet and digital technologies on the one hand and political protests and mobilization on the other. As a result, some stakeholders attribute magical powers of social change and political transformation to these technologies.</p>
<p>In the post-Wikileaks world, governments try to censor the use of and access to information technologies in order to maintain the status quo (Domscheit-Berg 2011). With the expansion of markets, technology multinationals and service providers are trying to strike a delicate balance between ethics and profits. Civil Society Organizations for their part, are seeking to counterbalance censorship and exploitation of the citizens’ rights. Within discourse and practice, there remains a dialectic between hope and despair: Hope that these technologies will change the world, and despair that we do not have any sustainable replicable models of technology-driven transformation despite four decades of intervention in the 6eld of information and communication technology (ICT).</p>
<p>This paper suggests that this dialectic is fruitless and results from too strong of a concentration on the functional role of technology. The lack of vocabulary to map and articulate the transitions that digital technologies bring to our earlier understanding of the state-market-citizen relationship, as well as our failure to understand technology as a paradigm that defines the domains of life, labour, and language, amplify this knowledge gap.</p>
<p>This paper draws on a research project that focuses on understanding new technology, mediated identities, and their relationship with processes of change in their immediate and extended environments in emerging information societies in the global south (Shah 2009). We suggest that endemic to understanding digital activism is the need to look at the recalibrated relationships between the state and the citizens through the prism of technology and agency.</p>
<h2>Context</h2>
<p>It is appropriate, perhaps, to begin a paper on digital activism, with a discussion of analogue activism[<a href="#1">1</a>] (Morozov 2010). In the recent revolutions and protests from Tunisia to Egypt and Iran to Kryzygystan, much attention has been given to the role of new media in organizing, orchestrating, performing, and shaping the larger public psyche and the new horizons of progressive governments. Global media has dubbed several of them as ‘Twitter Revolutions” and “Facebook Protests” because these technologies played an important role in the production of :ash-mobs, which, because of their visibility and numbers, became the face of the political protests in di)erent countries. Political scientists as well as technology experts have been trying to figure out what the role of Twitter and Facebook was in these processes of social transformation. Activists are trying to determine whether it is possible to produce replicable upscalable models that can be transplanted to other geo-political contexts to achieve similar results,[<a href="#2">2</a>] as well as how the realm of political action now needs to accommodate these developments.</p>
<p>Cyber-utopians have heralded this particular phenomenon of digital activists mobilizing in almost unprecedented numbers as a hopeful sign that resonates the early 20th century rhetoric of a Socialist Revolution (West and Raman 2009). (ey see this as a symptom of the power that ordinary citizens wield and the ways in which their voices can be ampli6ed, augmented, and consolidated using the pervasive computing environments in which we now live.</p>
<p>In a celebratory tone, without examining either the complex assemblages of media and government practices and policies that are implicated in these processes, they naively attribute these protests to digital technologies.</p>
<p>Cyber-cynics, conversely, insist that these technologies are just means and tools that give voice to the seething anger, hurt, and grief that these communities have harboured for many years under tyrannical governments and authoritarian regimes. They insist that digital technologies played no role in these events — they would have occurred anyway, given the right catalysts — and that this overemphasis on technology detracts from greater historical legacies, movements, and the courage and efforts of the people involved.</p>
<p>While these debates continue to ensue between zealots on conflicting sides, there are some things that remain constant in both positions: presumptions of what it means to be political, a narrow imagination of human-technology relationships, and a historically deterministic view of socio-political movements. While the objects and processes under scrutiny are new and unprecedented, the vocabulary, conceptual tools, knowledge frameworks, and critical perspectives remain unaltered. They attempt to articulate a rapidly changing world in a manner that accommodates these changes. Traditional approaches that produce a simplified triangulation of the state, market and civil society, with historically specified roles, inform these discourses, “where the state is the rule-maker, civil society the do-gooder and watchdog, and the private sector the enemy or hero depending on one’s ideological stand” (Knorringa 2008, 8).</p>
<p>Within the more diffuse world realities, where the roles for each sector are not only blurred but also often shared, things work differently. Especially when we introduce technology, we realize that the centralized structural entities operate in and are better understood through a distributed, multiple avatar model. For example, within public-private partnerships, which are new units of governance in emerging post-capitalist societies, the market often takes up protostatist qualities, while the state works as the beneficiary rather than the arbitrator of public delivery systems. In technology-state conflicts, like the well-known case of Google’s conflict with China (Drummond 2010), technology service providers and companies have actually emerged as the vanguards of citizens’ rights against states that seek to curb them.</p>
<p>Similarly, civil society and citizens are divided around the question of access to technology. The techno-publics are often exclusive and make certain analogue forms of citizenships obsolete. While there is a euphoria about the emergence of a multitude of voices online from otherwise closed societies, it is important to remember that these voices are mediated by the market and the state, and often have to negotiate with strong capillaries of power in order to gain the visibility and legitimacy for themselves. Additionally, the recalibration in the state-market-citizen triad means that there is certain disconnect from history which makes interventions and systemic social change that much more difficult.</p>
<h2>Snapshots</h2>
<p>We draw from our observations in the “Digital Natives with a Cause?”[<a href="#3">3</a>] research program, which brought together over 65 young people working with digital technologies towards social change, and around 40 multi-sector stakeholders in the field to decode practices in order to gain a more nuanced understanding of the relationships between technology and politics.</p>
<p>The first case study is from Taiwan, where the traditionally accepted uni-linear idea of senders-intermediaries-passive receivers is challenged by adopting a digital information architecture model for a physical campaign.[<a href="#4">4</a>] The story not only provides insight into these blurred boundaries and roles, but also offers an understanding of the new realm of political intervention and processes of social transformation.</p>
<p>As YiPing Tsou (2010) from the Soft Revolt project in Taipei explains, "I have realised how the Web has not only virtually reprogrammed the way we think, talk, act and interact with the work but also reformatted our understanding of everyday life surrounded by all sorts of digital technologies."</p>
<p>Tsou’s own work stemmed from her critical doubt of the dominant institutions and structures in her immediate surroundings. Fighting the hyper-territorial rhetoric of the Internet, she deployed digital technologies to engage with her geo-political contexts. Along with two team members, she started the project to question and critique the rampant consumerism, which has emerged as the state and market in Taiwan collude to build more pervasive marketing infrastructure instead of investing in better public delivery systems. The project adopted a gaming aesthetic where the team produced barcodes, which when applied to existing products in malls and super markets, produced random pieces of poetry at the check-out counters instead of the price details that are expected. The project challenged the universal language of barcodes and mobilized large groups of people to spread these barcodes and create spaces of confusion, transient data doubles, and alternative ways of reading within globalized capitalist consumption spaces. The project also demonstrates how access to new forms of technology also leads to new information roles, creating novel forms of participation leading to interventions towards social transformation.</p>
<p>Nonkululeko Godana (2010) from South Africa does not think of herself as an activist in any traditional form. She calls herself a storyteller and talks of how technologies can amplify and shape the ability to tell stories. Drawing from her own context, she narrates the story of a horrific rape that happened to a young victim in a school campus and how the local and national population mobilized itself to seek justice for her. For Godana, the most spectacular thing that digital technologies of information and communication offer is the ability for these stories to travel in unexpected ways. Indeed, these stories grow as they are told. They morph, distort, transmute, and take new avatars, changing with each telling, but managing to help the message leap across borders, boundaries, and life-styles. She looks at storytelling as something that is innate to human beings who are creatures of information, and suggests that what causes revolution, what brings people together, what allows people to unify in the face of strife and struggle is the need to tell a story, the enchantment of hearing one, and the passion to spread it further so that even when the technologies die, the signal still lives, the message keeps on passing. As Clay Shirky, in his analysis of the first recorded political :ash-mob in Phillipines in 2001, suggests, "social media’s real potential lies in supporting civil society and the public sphere — which will produce change over years and decades, not weeks or months."</p>
<h2>Propositions</h2>
<p>These two stories are just a taste of many such narratives that abound the field of technology based social transformation and activism. In most cases, traditional lenses will not recognize these processes, which are transient and short-lived as having political consequence. When transformative value is ascribed to them, they are brought to bear the immense pressure of sustainability and scalability which might not be in the nature of the intervention. Moreover, as we have seen in these two cases, as well as in numerous others, the younger generation — these new groups of people using social media for political change, often called digital natives, slacktivists, or digital activists — renounce the earlier legacy of political action. They prefer to stay in this emergent undefined zone where they would not want an identity as a political person but would still make interventions and engage with questions of justice, equity, democracy, and access, using the new tools at their disposal to negotiate with their immediate socio-cultural and geo-political contexts.</p>
<p>In their everyday lives, Digital Natives are in different sectors of employment and sections of society. They can be students, activists, government officials, professionals, artists, or regular citizens who spend their time online often in circuits of leisure, entertainment and self-gratification. However, it is their intimate relationship with these processes, which is often deemed as ‘frivolous’ that enables them, in times of crises, to mobilize huge human and infrastructural resources to make immediate interventions.</p>
<p>It is our proposition that it is time to start thinking about digital activism as a tenuous process, which might often hide itself in capillaries of non-cause related actions but can be materialized through the use of digital networks and platforms when it is needed. Similarly, a digital activist does not necessarily have to be a full-time ideology spouting zealot, but can be a person who, because of intimate relationships with technologized forms of communication, interaction, networking, and mobilization, is able to transform him/ herself as an agent of change and attain a central position (which is also transitory and not eternal) in processes of social movement. Such a lens allows us to revisit our existing ideas of what it means to be political, what the new landscapes of political action are, how we account for processes of social change, and who the people are that emerge as agents of change in our rapidly digitizing world.</p>
<h3>About the Authors</h3>
<p><span class="Apple-style-span">NISHANT SHAH is Director-Research at the Bangalore based Centre for Internet and Society. He is one of the lead researchers for the “Digital Natives with a Cause?” knowledge programme and has interests in questions of digital identity, inclusion and social change.</span></p>
<p><span class="Apple-style-span">FIEKE JANSEN is based at the Humanist Institute for Development Cooperation (Hivos). She is the knowledge officer for the Digital Natives with a Cause? knowledge programme and her areas of </span><span class="Apple-style-span">interest are the role of digital technologies in social change processes.</span></p>
<h2><span class="Apple-style-span">References</span></h2>
<p>Domscheit-Berg, Daniel. 2011. <em>Inside Wikileaks: My Time with Julian Assange at the World’s Most Dangerous Website</em>. New York: Crown Publishers.</p>
<p>Drummond, David. 2010. “A New Approach to China.” Available at: http:// googleblog.blogspot.com/2010/01/new-approach-to-china.html.</p>
<p>Godana, Nonkululeko. 2011. “Change is Yelling: Are you Listening?” <em>Digital Natives Position Papers</em>. Hivos and the Centre for Internet and Society publications. Available at: http://www.hivos.net/content/download/ 40567/260946/file/Position%20Papers.pdf. Retrieved: February 3, 2011.</p>
<p>Knorringa, Peter. 2010. A Balancing Act — Private Actors in Development, Inaugural Lecture ISS. Available at: http://www.iss.nl/News/Inaugural-Lecture-Professor-Peter-Knorringa. Retrieved: February 3, 2011.</p>
<p>Morozov, Evgeny. 2011. <em>The Net Delusion: The Dark Side of Internet Freedom</em>. New York: Public Affairs.</p>
<p>Shirky, Clay. 2011. “The Political power of Social Media: Technology, the Public Sphere, and Political Change.” <em>Foreign Affairs</em> 90, (1); p. 28-41.</p>
<p>Shah, Nishant and Sunil Abraham. 2009. “Digital Natives with a Cause.” Hivos Knowledge Programme. Hivos and the Centre for Internet and Society publications. Available at: http://cis-india.org/research/dn-report. Retrieved: February 3, 2011.</p>
<p>Tsou, YiPing. 2010. “(Re)formatting Social Transformation in the Age of Digital Representation: On the Relationship of Technologies and Social Transformation”, <em>Digital Natives Position Papers</em>. Hivos and the Centre for Internet and Society publications. Available at: http://www.hivos.net/ content/download/40567/260946/file/Position%20Papers.pdf. Retrieved: February 3, 2011.</p>
<p>West, Harry and Parvathi Raman. 2009. <em>Enduring Socialism: Exploration of Revolution and Transformation, Restoration and Continuation</em>. London: Berghahn Books.</p>
<h2><span class="Apple-style-span">End Notes</span></h2>
<p class="discreet"><a name="1">[1]</a> Morozov looks at how ‘Digital Activism’ often feeds the very structures against we protest, with information that can prove to be counter productive to the efforts. The digital is still not ‘public’ in its ownership and a complex assemblage of service providers, media houses and governments often lead to a betrayal of sensitive information which was earlier protected in the use of analogue technologies of resistance.</p>
<p class="discreet"><a name="1"> </a></p>
<p class="discreet"><a name="2">[2]</a> Following the revolutions in Egypt, China, worried that the model might be appropriated by its own citizens against China’s authoritarian regimes, decided to block “Jan25” and mentions of Egypt from Twitter like websites. More can be read here: <a href="http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site">http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site</a>.</p>
<p class="discreet"><a name="3">[3]</a> More information about the programme can be found <a href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Digital-Natives-with-a-Cause">here</a>.</p>
<p class="discreet"><a name="4">[4]</a> Models of digital communication and networking have always imagined that the models would be valid only for the digital environments. Hence, the physical world still engages only with the one-to-many broadcast model, where the central authorities produce knowledge which is disseminated to the passive receivers who operate only as receptacles of information rather than bearers of knowledge. To challenge this requires a re-orientation of existing models and developing ways of translating the peer-to-peer structure in the physical world.</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism'>https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism</a>
</p>
No publishernishantDigital ActivismDigital NativesResearchNet CulturesPublicationsResearchers at Work2015-10-25T05:58:59ZBlog EntryDigital native: Lie Me a River
https://cis-india.org/raw/indian-express-nishant-shah-march-19-2017-digital-native-lie-me-a-river
<b>The sea of social media around us often drowns the truth, exchanging misinformation for facts.</b>
<p style="text-align: justify; "><img alt="Social media, Fake news, Fake messages on WhatsApp, Fake news problem, Snopes, Facebook, Google, WhatsApp forwards, technology, tech culture, tech news" class="size-full wp-image-4574844" src="http://images.indianexpress.com/2017/03/fakenews_big_1.jpg" style="float: none; " /><br /><span class="discreet">This basic process of truth telling loses all affordance in social media practices. Let me channel my inner school teacher and present you with a question.</span></p>
<p style="text-align: justify; ">One of the most common methods of testing a student’s knowledge is the multiple choice question template that asks the examinee to identify one of four options as correct solutions to a problem. The pedagogic principle behind these questions is simple enough: We live in a world where truth and accuracy are important. No matter what our subjective feelings, impressions, memories or instincts might be, we need to rely on verifiable facts to make a truth claim. If we fail to do so, there would be negative consequences.</p>
<p style="text-align: justify; ">This basic process of truth telling loses all affordance in social media practices. Let me channel my inner school teacher and present you with a question. Drawing on samples of WhatsApp messages on my social media feeds, I invite you to answer this simple question: Which of these statements is not true?</p>
<ol>
<li style="text-align: justify; "> Drinking from disposable paper cups lined with wax to keep the liquid from seeping leads to wax deposits in your stomach, resulting in fatal health risks.</li>
<li>Beverages in India have been contaminated by the Ebola virus and are on our shelves right now.</li>
<li>According to Ayurveda, burning camphor and cardamom together kills the swine flu virus in air.</li>
<li>Bollywood actor <a href="http://indianexpress.com/about/farida-jalal">Farida Jalal</a> is dead.</li>
</ol>
<p><iframe frameborder="0" height="260" scrolling="auto" src="http://vidshare.indianexpress.com/players/FrunroOr-xe0BVfqu.html" width="320"></iframe></p>
<p style="text-align: justify; ">Of all of these, the only one you can verify is that Farida Jalal is not dead. The reason we know it for sure is because, she had to come to Twitter, and like Oscar Wilde, announce that the rumours of her death were wildly exaggerated. As Jalal herself pointed out in an interview, she was harassed by a barrage of phone calls, of people calling her up to ask her (oh, the irony!) if she was dead. The other three claims are right now floating in the air, ready to settle down as truth, with continuous repetition. We cannot be sure that they are inaccurate. Especially because they don’t just come as one-line headlines but long narratives of imaginary proofs.</p>
<p style="text-align: justify; ">Why have we reached this post-truth moment? Why have our social media feeds become minefields of dubious information masquerading as lies? There are many laments lately about how this lack of veracity and fact-checking is becoming the new normal and the blame is always put on either the media that promotes accelerated spread of messages without space for reflection, or gullible people who do not pause to think about the ludicrousness of the message before they spread it to their groups. And, while it is necessary to develop a critical literacy to make sure that we understand the responsibility of our role as information circulators and curators, there is one dimension that needs to be explored more — trust.</p>
<p style="text-align: justify; ">In our pre-digital knowledge practices, when information came with a signature, we believed that somebody had done the due diligence needed for the information to be published. An author’s book was supported by the rigour of the publisher behind it. A news report was fact-checked by verifiers who are employed precisely to do that. Information from a friend or somebody we know was credible because of our assessment of the person’s expertise and knowledge. We have always been able to determine the source of information, and our proximity with the source allowed us to trust the information that came through it.</p>
<p style="text-align: justify; ">However, with social media, this relationship has changed. When somebody sends us a message on WhatsApp, it is still coming from a source that we know, but we have to realise that this source is not producing or verifying this information, but merely circulating it. Messages come with a signature, they seem to emerge from people we know and trust, and, hence, we presume that they have done the due diligence required before passing on the information.</p>
<p style="text-align: justify; ">It is important to realise that within the social web we don’t really parse, analyse or process information, we merely pass and distribute it. This is how digital media perceives its users — as information circulators. And, this means, that information which mimics facts but is blatantly false, finds easy prey. So, the next time you come across information on these endless message groups, ask a simple question before you pass it along: no matter what the message claims, can you actually locate the source of the information? Is the person who forwards that message producing the information or merely sharing it? If they are sharing it, get back to them and ask how they know what they know. We trust things that are authored, but in our social apps, people are not authors, they are circulators. Making the distinction between the two might be the first step towards developing a critical literacy for fact-telling on the digital web.</p>
<p style="text-align: justify; "><i>Nishant Shah is a professor of new media and the co-founder of The Centre for Internet & Society, Bangalore.</i></p>
<p>
For more details visit <a href='https://cis-india.org/raw/indian-express-nishant-shah-march-19-2017-digital-native-lie-me-a-river'>https://cis-india.org/raw/indian-express-nishant-shah-march-19-2017-digital-native-lie-me-a-river</a>
</p>
No publishernishantResearchers at WorkRAW BlogDigital Natives2017-03-19T14:47:16ZBlog EntryWhose Change Is It Anyway? | DML2013
https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway
<b>As a preparation for the DML conference, Nishant Shah had an interview with Howard Rheingold, a cyberculture pioneer, social media innovator, and author of "Smart Mobs. Nishant Shah is chair of 'Whose Change Is It Anyway? Futures, Youth, Technology And Citizen Action In The Global South (And The Rest Of The World)' track at DML2013. Here, he talks about shifts in citizen engagement in Indian politics and civics, and the underlying significance of these changes.</b>
<p style="text-align: justify;">"More and more, you have young people who are trying to come together, not merely to express discontent, but actually take action so that they can build the kinds of futures they want to occupy."</p>
<p style="text-align: justify;">The 2013 DML conference will be held in March 14-16, 2013 in Chicago, Illinois. The conference is supported by the MacArthur Foundation and organized by the Digital Media and Learning Research Hub located at the University of California's systemwide Humanities Research Institute at UC Irvine.</p>
<p style="text-align: justify;">More details about the DML2013 Conference and the Call For Workshop/Panel/Paper Proposals can be found at the conference website: <a class="external-link" href="http://dml2013.dmlhub.net">dml2013.dmlhub.net</a>.</p>
<hr />
<h3 style="text-align: justify;">Video</h3>
<p><iframe src="http://www.youtube.com/embed/Q1ueRSm1TTw" frameborder="0" height="315" width="320"></iframe></p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway'>https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway</a>
</p>
No publishernishantVideoCyberculturesResearchers at WorkDigital Natives2015-04-24T11:47:19ZBlog EntryDigital native: You can check out, you can never leave
https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave
<b>Aadhaar is not something you define and opt into, it is something that defines you.</b>
<p style="text-align: justify; ">The article was <a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-you-can-check-out-you-can-never-leave-4595503/">published in the Indian Express</a> on April 2, 2017. Nishant Shah is a professor of new media and the co-founder of The Centre for Internet & Society, Bangalore.</p>
<hr />
<p style="text-align: justify; ">Ok. I get it. You don’t want yet another piece on the horrors and perils of the surveillance state that has come to the forefront with Aadhaar numbers now being tied to our taxes. I know that you must have already made up your mind about whether this is a good thing or a bad thing. If you believe that the way to streamlining bureaucracy and making our systems more accountable is transparency, then you are ready to welcome the digital ecosystem of Aadhaar, as introducing checks and balances that might help to curb some of the excesses and wastes of our governance systems . If you are of the opinion, however, that the state cannot be trusted with our information, without the oversee of the Parliament and the judiciary, then you want to resist this mandatory implementation of the “voluntary” Aadhaar. And, for once, I am unable to take a side, favouring one set of arguments over the other. This ambiguity does not come from a lack of political conviction. I continue to fear about the future of our lives when these technologies of control and domination fall in the hands of governments which have an authoritarian bend of mind.</p>
<p style="text-align: justify; ">Instead, my lack of preference on the good, bad and ugly sides of Aadhaar stems from a completely different concern around network technologies of digital connectivity that has found very little attention in the almost zealous discourse about “yes Aadhaar, no Aadhaar”.</p>
<p style="text-align: justify; ">This is a concern about the relationship between technological networks and the messy realities that we embody. There has been an easy acceptance of a digital network as a description of our everyday life. If you look at any network that you belong to — from public discussion forums to private WhatsApp groups — you will realise that these networks offer to visualise your connections and transactions with the people, places and things in your circles. Thus, it is possible to say that <a href="http://indianexpress.com/about/facebook/">Facebook</a> describes your collection of friends and your social life. Or you could suggest that <a href="http://indianexpress.com/about/linkedin/">LinkedIn</a> is a visualisation of your professional landscape. And, in a similar vein, we can also propose that Aadhaar is a representation of the working of our government systems of identification.</p>
<p style="text-align: justify; ">Each one of these propositions, seemingly innocent, is blatantly wrong. Facebook, for example, didn’t just connect you with your friends. It has fundamentally changed the idea of what is a friend. For a generation of young people who grew up naturalised in social media, the notion of a friend has lost all its meaning and nuance. Every connection, acquaintance, friend of a friend, a random stranger who likes the same band as you do, is now a friend. And the increasing anxiety we have about people falling prey to predatory friendships is because Facebook has now normalised the idea that if somebody calls you their friend, you don’t have to worry about sharing personal and private information with them. Similarly , for anybody who has spent time on LinkedIn, we know that it is not just a portal that describes our work. It is the space where we stay connected with events and people far removed from us. It is the resource pool that we draw on while looking for new work. It is also the space that we keep an eye on just to see if a better job has opened up. It is a collection of events, links and connections that not only shows what you do but what you aspire for, who you connect with and what are the kinds of professional ambitions you see for yourself.</p>
<p style="text-align: justify; ">Just like Facebook and LinkedIn, which don’t just describe a reality but actually simulate, prescribe and shape it, Aadhaar is a digital network that is seeking to change the very foundational reality of our lives. Like most digital networks, it is not merely an explanation of how things are but the context within which who we are and what we do finds meaning and validation. Thus, Aadhaar might propose that it is merely trying to describe your identity but it is actually offering to shape a new one for you. The programme might suggest that it is trying to implement a system already in place, but it is, in reality, creating an entirely new system within which you and I have to now find space, function and identity. The latest announcements of mainstreaming Aadhaar merely betray this fact – that Aadhaar is not something you define and opt into, Aadhaar defines you. And opting out is going to have severe penalties and consequences.</p>
<p style="text-align: justify; ">Digital networks have long masqueraded as benign visualisations of the world. But they are, in principle, blueprints that transform the world as we know it. This, in itself, is not bad. However, hiding this transformation is. Because when a transformation happens, especially at systemic levels, it is always the people who are the most vulnerable that suffer the most from it. Think about the older friend who might not be the most tech savvy and how they struggle for inclusion on Facebook and WhatsApp messages. Pay some attention to people who did not understand the public nature of LinkedIn and ended up getting fired because they wrote about their current work conditions and the desire to change them. And, similarly, do think if the people who are being pushed into these digital ecosystems without adequate digital literacy, care and information about the consequences of their actions, are being made vulnerable in their access to resources of life and dignity.</p>
<p style="text-align: justify; ">Whether you and I like Aadhaar or not is not really the question. The question is not about the right to privacy either. What is at stake in this deployment of Aadhaar is a government that is pushing radical transformations of the life of its citizens without consulting with them and addressing their needs. In the past, when governments have done this, we have developed strong voices of protest and correction asking the state to be responsible towards those affected by the transformation. The reliance on the digital, however, allows these governments to escape this responsibility and, in the guise of description, are making prescriptions of reality which need to be resisted.</p>
<p>
For more details visit <a href='https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave'>https://cis-india.org/raw/indian-express-nishant-shah-april-2-2017-digital-native-you-can-check-out-you-can-never-leave</a>
</p>
No publishernishantResearchers at WorkAadhaarDigital Natives2017-05-05T01:31:46ZBlog EntryDigital native: Snap out of outrage mode
https://cis-india.org/raw/indian-express-nishant-shah-april-30-2017-digital-native-snap-out-of-outrage-mode
<b>Rage at the inequality of the digital world is good. But why stop at the Snapchat CEO?</b>
<p style="text-align: justify; ">Nishant Shah is a professor of new media and the co-founder of The Centre for Internet & Society, Bangalore. The article was <a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-snap-out-of-outrage-mode-4632813/">published in the Indian Express</a> on April 30, 2017.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">If you are reading this right now, let’s just get something out of the way — you are not poor. Just the affordability of English language literacy and access to national news media marks you as belonging to a very small elite group in the country. If you are reading this online, the point is driven home even more. So, when you heard about the CEO of Snapchat (If you are asking SnapWhat, don’t feel crestfallen, you are not “out of it”, you are just not 17) being quoted from a statement he made two years ago, that he is not interested in expanding in poor countries like India, you were obviously riled.</p>
<p style="text-align: justify; ">There were many things wrong with the alleged statement that Evan Spiegel made. He betrayed his own ignorance and arrogance, where he was unable to understand the growing consumer base of mobile-based apps in emerging networked countries like India. He also more or less failed to understand that poverty is layered, and while India continues to struggle with poverty, it has a growing population of extremely wealthy and affluent users, who are not only driving global consumption trends but also the key focus of digital growth. His biggest faux pas was to not recognise that in the global information technologies development cycles, there is a huge chance that a large number of his employees and contractors might be located in India, and that Digital India is an undeniable extension of Silicon Valley apps and platforms.</p>
<p style="text-align: justify; ">Speigel’s cockiness is actually so common in how digital ecosystems are mapped, that you could almost ignore it because “everybody says it”. It is great that he was called out on his neo-colonial viewpoints. Users from India (and around the world) joined in to not only to protest against his bravado, but also to call for an action that hurts private companies in the one way they recognise — revenue. #BoycottSnapchat has been trending this last week, and millions of people using this visual filtered storytelling app are uninstalling it from their devices. People have been making jokes and criticising Snapchat, leading to a huge dip in the user base of Snapchat.</p>
<p style="text-align: justify; ">These moments of digital collective action are admirable and we need more instances where we call out such acts of discrimination and exclusion. We do need to make sure that we do not make Snapchat Enemy No. 1, pretending that the rest of the web is all good. Speigel is profoundly wrong, in his comments or in his defence that his app is “free” to download, which shows that he is not excluding India. However, Speigel cannot be singled out in all of this. Across the digital landscape, countries like India are always trapped in a strange dichotomy. On the one hand, Indian engineers and knowledge workers are being harvested as the cheap labour who “steal global jobs” and on the other, India is always seen as poor, underdeveloped, in need of saving.</p>
<p style="text-align: justify; ">This distilling of the Indian landscape, in all its complexity, into these two polarised identities, allows for these tech companies to continue unfair practices which affect both the glamorous white-collar techies and the invisible labours of IT cities. It emphasises the idea that the IT worker, upwardly and geographically mobile, is being offered a path to escape either the country or their context, because they are touched by the economic power of the digital corporation. It also justifies the exploited labour conditions of IT industries, where the story of transformation is presented as an excuse for underpaid overworked production environments.</p>
<p style="text-align: justify; ">At the same time, these companies seek to take up state-like responsibilities without the accountability, destroying fundamental media and information rights in the guise of bridging the digital divide. Remember Internet.Org’s attack on #NetNeutrality in their attempt to provide free Internet to the poor. Pay attention to Uber’s continued exploitation of its drivers, refusing to treat them as employees and yet regulating them more than any employer can dare to. Realise that despite our #MakeInIndia campaigns, we have very little investment in creating localised, Indian language digital infrastructure. Notice that the Indian digital scene, far from being start-up friendly, is turning into a monopoly of a handful of telecom companies, which nonchalantly discard the legal apparatus of safeguards. Reflect on how we are building biometric databases like Aadhaar, without any regard for data protection and security, so that millions of people are compromised through data leaks. All of these different phenomena need to be read along with our outrage at Snapchat. All of these are stern reminders that our act of questioning the digital does not stop at uninstalling an app, but at reorganising our policies and politics of the digital in the country.</p>
<p>
For more details visit <a href='https://cis-india.org/raw/indian-express-nishant-shah-april-30-2017-digital-native-snap-out-of-outrage-mode'>https://cis-india.org/raw/indian-express-nishant-shah-april-30-2017-digital-native-snap-out-of-outrage-mode</a>
</p>
No publishernishantResearchers at WorkDigital Natives2017-05-05T01:45:12ZBlog EntryOne. Zero.
https://cis-india.org/digital-natives/www-indianexpress-com-one-zero
<b>The digital world is the world of twos. All our complex interactions, emotional negotiations, business transactions, social communication and political subscriptions online can be reduced to a string of 1s and 0s, as machines create the networks for the human beings to speak. So sophisticated is this network of digital infrastructure that we forget how our languages of connection are constantly being transcribed in binary code, allowing for the information to be transmitted across the web. </b>
<hr />
<p style="text-align: justify;">Nishant Shah's article was <a class="external-link" href="http://www.indianexpress.com/news/one.-zero./1003149/0">published</a> in the Indian Express on September 16, 2012</p>
<hr />
<p style="text-align: justify;">Indeed, we have already reached a point where we don’t even need to be familiar with code to perform intimate functions with the machines that we live with, as they respond to us in human languages. While this human-machine duality has been resolved with the presence of intuitive and interactive interfaces that allow us to seamlessly connect to the person(s) at the other end of a digital connection, there is another binary that still remains at the centre of much discussion around all things digital.</p>
<p style="text-align: justify;">This is the duality of the Real and the Virtual. In geekspeak, this particular separation has been coded as a divide between RL (Real Life) and VR (Virtual Reality). This separation between the two is so naturalised that it has become a part of our everyday imagination where things that happen online are ‘out there’ and ‘an escape’ whereas things that are offline, are ‘real’ and ‘believable’. However, as digital technologies become pervasive and ubiquitous, these lines between RL and VR have blurred. Especially with new technologies of augmented reality and simulated layers like Google Goggles or even location-based services on your smartphone that help you navigate through the offline world, it is becoming difficult to clearly say what is online and what is offline.</p>
<p style="text-align: justify;">There are two questions that help demonstrate this blurring of boundaries very clearly. The first is an existential one, something that doesn’t crop up often in conversations, but suddenly haunts you on at 2 pm on an idle Thursday: Who are you, when you are online? A famous cartoon on the web had two dogs sitting on a connected computer, their paws on the mouse, and telling each other, ‘On the internet, nobody knows you are a dog’. But in the hyper-connected world that we live in, everybody knows exactly who we are, even as we ourselves are confused about where our bodies end and where our digital extensions and avatars begin. Things that we do in RL affect and shape the ways in which our avatars evolve on social networking sites. The interactions that our avatars have with other digital objects map back on our understanding of who we are and how we dress our bodies. Even when we are not connected, our avatars interact, constantly, not only with other avatars in the system, but also machines and artificial intelligence scripts, and robots and networks, masquerading as ourselves even outside our knowledge. We might be tagged, liked, shared, transmitted and morphed; we might be photoshopped, reduced to a tweet, condensed to a status message, embodied in an avatar on our favourite role playing game, or hovering as a signature to emails. These are all parts of us, but they are not just extensions of us. These are things that not only stand in for us but also shape the ways in which we understand ourselves and how we connect to the world.</p>
<p style="text-align: justify;">The second question crops up regularly in digitally mediated conversations. When your parents call you on the cell phone, or your friend messages you on the Blackberry, or your colleague pings you on Skype or your IRC buddies see you on a chat channel. As our modes of access have become mobile and devices of access have become portable, we can never really clearly answer the question, ‘Where are you right now?’. It is a question worth dwelling on. Where are you when you are walking down a street, using GPRS data on your cellphone, and a friend uses a Voice Over IP service like Whatsapp to ask you, ‘Where are you right now?’. Are you on the street? On your phone? On an application? Located somewhere on a server? Bits of data on a high-speed optic fibre, zooming across the ionosphere? Depending upon who is asking the question, you would be able to and in fact have to give a different answer about where you are when you are online.</p>
<p style="text-align: justify;">This blurred duality might be seen as confusing, taking away the assurance of our body and our geography from everyday practices. In fact, one of the reasons why the digital revolution has been so well received is because these technologies facilitate an almost seamless transfer of ideas, emotions and connections across the different realms of RL and VR, offering us new ways of thinking about being human, being social, and being connected. The strength of the digital is in this coupling together, of the hitherto irreconcilable realms of our life in messy and enchanting ways, giving us new opportunities to think about who we are and where we are in our quotidian lives.</p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/www-indianexpress-com-one-zero'>https://cis-india.org/digital-natives/www-indianexpress-com-one-zero</a>
</p>
No publishernishantResearchers at WorkInformation TechnologyDigital Natives2015-04-24T11:50:32ZBlog EntryWhose Change is it Anyway?
https://cis-india.org/news/whose-change-is-it-anyway
<b>The first product from the Whose Change is it Anyway? Hague workshop with Hivos in February is out. The video captures the process of knowledge generation there. </b>
<h2>Videos</h2>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/KsG0XgLuv1U" width="320"></iframe></p>
<hr />
<p> </p>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/xEUySbndIpc" width="320"></iframe></p>
<p>
For more details visit <a href='https://cis-india.org/news/whose-change-is-it-anyway'>https://cis-india.org/news/whose-change-is-it-anyway</a>
</p>
No publisherpraskrishnaVideoDigital Natives2013-06-05T08:40:17ZNews ItemDigital Native: Cause an Effect
https://cis-india.org/raw/indian-express-nishant-shah-june-17-2018-digital-native-cause-an-effect
<b>Aadhaar is a self-contained safe system, its interaction with other data and information systems is also equally safe and benign.</b>
<p style="text-align: justify; ">The article was published in the <a class="external-link" href="https://indianexpress.com/article/technology/social/digital-native-cause-an-effect-5219977/">Indian Express</a> on June 17, 2018.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">Statistically, it has been proven, that the consumption of ice cream in the country increases significantly in the summer months. In the same months, the number of housebreak incidents also increase. It might be possible, though ridiculous, to now make an argument that eating ice cream leads to increased frequencies of housebreakings, and, hence, sale and consumption of ice cream should be regulated more rigorously. The humour in this situation arises out of the fact that we know, at a very human level, that correlation is not the same as causation.</p>
<p style="text-align: justify; ">We know that just because two things happen in temporal or spatial proximity with each other doesn’t necessarily mean they are connected or responsible in a chain of events. This is because human communication is designed to make a distinction between cause-and-effect relationship and happened-together relationship between two sets of information.</p>
<p style="text-align: justify; ">However, when it comes to computation, things turn slightly different. Within the database logics of computation, two sets of data, occurring in the same instance, are subjected to a simple scrutiny: Either one of them is linked with the other, or, one of the two is noise, and, hence, needs to be removed from the system. Computation systems are foundationally anchored on logic. Within logical systems, all the events and elements described in the system are interlinked and have a causal relationship with each other. Computational learning systems, thus, do not have the capacity to make a distinction between causal and correlative phenomena.</p>
<p style="text-align: justify; ">This is why computation systems of data mining and profiling are so much more efficient than human cognition. Not only are these systems able to compute a huge range of data, but they are also able to make unprecedented, unforeseen, unexpected, and often unimagined connections between seemingly disparate and separate information streams. I present to you this simplified notion of computer logic because it is at the heart of the biometric identity-based debates around <a href="https://indianexpress.com/article/what-is/what-is-aadhaar-card-and-where-is-it-mandatory-4587547/">Aadhaar</a> right now. Recently, Ajay Bhushan Pandey, CEO, UIDAI, wrote an opinion piece that insisted that the data collective mechanisms of Aadhaar are not only safe but also benign. His opinion is backed by Bill Gates, who also famously suggested that “Aadhaar in itself” is not dangerous.</p>
<p style="text-align: justify; ">And, in many ways, Gates is right, even if Pandey’s willful mischaracterisation of Gates’s statement is not. For Gates, a computer scientist looking at the closed architecture of the Aadhaar system, it might appear, that in as much as any digital system could be safe, Aadhaar is indeed safe. In essence, Gates’s description was, that as a logical system of computational architecture, Aadhaar is safe, and the data within it, in their correlation with each other, does not form any sinister networks that we need to worry about.</p>
<p style="text-align: justify; ">However, Pandey takes this “safe in itself” argument to extend it to the applications and implementations of Aadhaar. He argues that because Aadhaar is a self-contained safe system, its interaction with other data and information systems is also equally safe and benign. In this, Pandey, either out of ignorance or willful mischaracterisation, confuses correlation with causality. He refuses to admit that Aadhaar and the biometrics within that are the central focal point around which a variety of data transactions happen which produce causal links between disconnected subjects.</p>
<p style="text-align: justify; ">Thus, the presence of a digital biometric data set might not in itself be a problem, but when it became the central verification system that connects your cellphone with your geolocation data, your presence and movement with your bank account and your income tax returns, your food and lifestyle consumption with your medical records, it starts a causal link between information which was hitherto unconnected, and, hence, considered trivial.</p>
<p style="text-align: justify; ">The alarm that the critics of Aadhaar have been raising is not about whether the data on Aadhaar is safe or not, but, how, in the hands of unregulated authorities, the correlations that Aadhaar generates and translates into causal profiles have dire consequences on the privacy and liberty of the individuals who carry the trace of Aadhaar in all facets of life. Pandey and his team of governors need to explain not the safety of Aadhaar but what happens when the verification information of Aadhaar is exploited to create non-human correlations of human lives, informing policy, penalisation and pathologisation through these processes.</p>
<p>
For more details visit <a href='https://cis-india.org/raw/indian-express-nishant-shah-june-17-2018-digital-native-cause-an-effect'>https://cis-india.org/raw/indian-express-nishant-shah-june-17-2018-digital-native-cause-an-effect</a>
</p>
No publishernishantResearchers at WorkAadhaarDigital Natives2018-06-26T15:21:01ZBlog EntryHow to Put Up a Facebook Resistance
https://cis-india.org/digital-natives/media-coverage/facebook-resistance
<b>Review of Marc Stumpel’s essay, "Mapping the Politics of Web 2.0: Facebook Resistance", in Digital Alternatives with a Cause Book 2: To Think, pp.24-31 by Oliver Leistert.</b>
<p>Facebook is right now in a peculiar situation: the planned IPO bears a
lot of risks and puts pressure on the Western market leader of Social
Networking Sites. The current discussion about Facebook's timeline is
only the tip of the iceberg, a symptom of a larger conflict that lurks
behind it: how much direct marketing are Facebook users willing to take?
How many drastic top-down changes of the user's Facebook experience are
possible unless they understand that their presence on this site and
what they do there is in tension with the company's goals that provides
this digital environment?</p>
<p>Stumpel addresses Facebook as a communication instance that is
subordinated by power lines. He refers to Manuel Castell's notion of
power in the network society. This characterization then is expanded to
the concept of protocological control as outlined by Alexander Galloway
and Eugene Thacker. While Castell's power concept still very much
resonates within conventional power theories of the political sciences,
which proclaim that someone holds power while someone else doesn't,
Galloway and Thacker open this notion towards the micro-elements within
power relations of a networked society. Considering software and
protocol as agents of power that proscribe the way how communication
flows are possible, they open the black box of technology and understand
it, like many other Science and Technology Studies Scholars, as
enmeshed into societal relations, as products of societal relations and
as production sites of societal relations. Code is law, code is an
executable materiality, and code is flawed. The point of design is one
possible point of resistance: “the possibilities afforded by Facebook to
its users are infinite only as long as they subscribe to the normative
operating logic of its design” and thus Stumpel's project, <a class="external-link" href="http://fbresistance.com/">Fbresistance.com</a>, plays with new designs to provoke new use.</p>
<p>Since many debates about Facebook either concentrate on how to use it
the right way (i.e. more privacy aware) or ways to leave Facebook
completely, Stumpel's proposal is original as it discusses how to
empower users within Facebook, which at first glance looks
counterintuitive and not so promising. And of course, the effects are
limited because the remaining part of a systemic logic reduces the means
of resistance to the degree that the key components of Facebook use
need to remain operational. This is not a proposal for the n-th new,
decentralized and non-commercial geek-affine network. In a sense,
Stumpel reconsiders within the realm of an undemocratic regime the kind
of bottom-up approaches that both, put pressure on Facebook and make it
at least look more like an instance of software that the user has
produced. As he writes “control is exercised through predefined options,
preferences and possible actions which are imposed onto the user” (28)
therefore a line of resistance, and thus empowerment, is to eliminate
such predefined options and invent new ones beyond Facebook's regime.</p>
<p>These means are limited technically as the point of interrogation is
on the client side. Most effectively, Facebook Resistance as Stumpel
envisions it, is a tool <a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fn1" name="fr1">[1]</a>
to change the User Interface beyond the default lines defined by either
browser setting or the user's Facebook options page. The client-sided
site of action has a surprising effect that goes clearly beyond what the
company wants: because JavaScript is a powerful instance in the
machinic process that affects not only how one sees the screen, but can
change functionality and processes. <br /><br />But there is a downside
here: as much as Facebook interacts with single users and single users
are replicating their subjectivity on Facebook in an opportunistic
fashion, to use Greasemonkey <a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fn2" name="fr2">[2]</a>
as tool of resistance keeps the effects of change limited to the
individual user's page and screen. Friends that check a Facebook page
that has been changed with Greasemonkey tools will not see these
changes. They remain excluded from this resistance. This is because a
client-side resistance designed with Greasemonkey cannot be shared and
cannot become a common experience. Here, I think, the proposal to
challenge Facebook within Facebook's realm reaches its limits and it
becomes clear that the protocological regime is stable as long as its
servers are not affected. The “exploit” that Galloway and Thacker seek
as the contemporary form of resistance within digital environments need
to be placed within the network and needs to have a bi-directional
communication capacity to reach out. Stumpel argues that applying
client-sided Javascript already is a way to exploit the protocological
regime <a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fn3" name="fr3">[3]</a>.<br /><br />At
the core of the rhetorics of Web 2.0 prosumerism is the blurring of
production and consumption and the proclamation of the user as a
productive entity. Stumpel's argument lies somewhat in between two
worlds: rightly claiming that code is the key to digital autonomy and
client side code cannot deliver this autonomy, like an alternative
Social Networking Site that offers open protocols so that any other code
base can connect. Scripting away one's Facebook page is a good start to
understand the materiality of one's online presence. <br /><br />A way out
of this systemic dilemma is to publish screenshots of how one sees the
page changed with self made scripts. This method has already proven to
be a great aid in circumventing censorship <a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fn4" name="fr4">[4]</a>,
which is just another regime of what-you-see-is-what-we-want-you-to-see
(WYSIWWWYTS). This as well shows the limits of power of code: image
files can transport human centric layers that machines are (still) not
capable to decode. Thus, by and large images remain a non-object in the
code regime. This is a cheap and useful exploit.<br /><br />As a lot of
people don't feel the agency to leave Facebook altogether because they
have invested too much of their social life into the machine, already
one can consider this as Facebook's real power: the social lock-in. Thus
all considerations to challenge Facebook from within its own domain and
regime are ways to irritate Facebook's basic layer: their economy which
is based on selling ads and data through standardized forms and sites.
If a critical number of Facebook sites would be DIY styled, many clients
of Facebook and the huge armada of third-parties behind it would fast
be worried about their assumption that with Facebook, communal
communications have been successfully commodified in a stable way that
allows investments of billions of dollars.</p>
<hr />
<table class="plain">
<tbody>
<tr>
<td><img src="https://cis-india.org/home-images/OliverLeistert.jpg/image_preview" title="Oliver Liestart" height="93" width="80" alt="Oliver Liestart" class="image-inline image-inline" /></td>
<td><strong>Oliver Leistert</strong><br />Oliver Leistert is a media researcher focusing on mobile, online, and
protest media. Currently a research fellow at the Center for Media and
Communication Studies at the Central European University, Budapest, he
recently co-edited, together with Theo Röhle, the first critical volume
about Facebook in German: <a class="external-link" href="http://www.transcript-verlag.de/ts1859/ts1859.php">Generation Facebook. Über das Leben im Social Net</a>. He runs a little blog: <a class="external-link" href="http://nomedia.noblogs.org/">http://nomedia.noblogs.org</a></td>
</tr>
</tbody>
</table>
<hr />
<p>[<a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fr1" name="fn1">1</a>].<a class="external-link" href="http://fbresistance.com/">http://fbresistance.com/</a></p>
<p>[<a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fr2" name="fn2">2</a>].<a class="external-link" href="https://addons.mozilla.org/en-US/firefox/addon/greasemonkey">https://addons.mozilla.org/en-US/firefox/addon/greasemonkey</a></p>
<p>[<a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fr3" name="fn3">3</a>].For a larger list of scripts that are affecting one's view on Facebook, see <a class="external-link" href="https://userscripts.org/tags/facebook">https://userscripts.org/tags/facebook</a></p>
<p>[<a href="https://cis-india.org/digital-natives/media-coverage/how-to-put-up-a-facebook-resistance-1#fr4" name="fn4">4</a>].The
art work of Christoph Wachter and Matthias Jud called Picidae takes
screenshots of a site from one node of the internet and sends the view
to a user somewhere else:<a class="external-link" href="http://net.picidae.net/"> http://net.picidae.net/</a></p>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/media-coverage/facebook-resistance'>https://cis-india.org/digital-natives/media-coverage/facebook-resistance</a>
</p>
No publisherOliver LeistertDigital Natives2012-02-21T08:47:15ZNews ItemDigital native: Are You Still Having Fun?
https://cis-india.org/raw/indian-express-nishant-shah-april-17-2017-digital-native-are-you-still-having-fun
<b>Before you accept a fun app into your digital ecosystem, prepare yourself for the data you will be giving away.</b>
<p style="text-align: justify; "><i>Nishant Shah is a professor of new media and the co-founder of The Centre for Internet & Society, Bangalore. </i>The article was <a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-are-you-still-having-fun-4614491/">published in the Indian Express</a> on April 17, 2017.</p>
<hr style="text-align: justify; " />
<p style="text-align: justify; ">So, I hope, by now, you have figured out who your celebrity lookalike is. Mine, for her sins, is <a href="http://indianexpress.com/about/emma-watson/">Emma Watson</a>. Now, as you scratch your heads and wonder how a “facial recognition algorithm’”decided that my mug matches with the stunning actor who shall always remain imprinted as Hermione Granger to my Harry Potter- fan-boy self, it is worth wondering how on earth I know this.</p>
<p style="text-align: justify; ">If you have been on <a href="http://indianexpress.com/about/facebook/">Facebook</a> the last week or two, you will have noticed that almost all of your friends, as if drawn in a zombie apocalypse, taking this quiz and posting their results. It was a simple enough app — you upload a picture, and then using advanced computer morphing, it shows how your face transitions from yours to the stunning celebrities that we love and worship.</p>
<p style="text-align: justify; ">Nothing better on a Monday morning to know that the barely human face you are wearing — a mixture of grump and where-is-my-coffee — actually looks like the photoshopped avatar of a celeb. In many ways, this was a truly progressive app because it refused to look at gender, race, ethnicity, age or any of the other criteria of biometric representation and no matter what super-grouch face you presented, it always matched you with the celebrity you always secretly wanted to look like anyway.</p>
<p style="text-align: justify; ">Now, listen! I know that the earnest value of social media is essentially in apps like these. The point of these apps, which are largely just a continuation of the old trash magazine quizzes about self-determination and expression, is that they continue to enthrall, enchant and make our everyday click-and-scroll lives slightly more memorable and enjoyable. However, unlike those old Cosmo and Vogue quizzes which you secretly took to see if you are more a Miranda or a Carrie (I know that is an old reference, but hey, this is an old quiz!), these apps have a more sinister dimension.</p>
<p style="text-align: justify; ">When you clicked on that small app, because your friend did so, you did not count on three things. One, that as you nonchalantly clicked on ‘OK’ giving permission to this app to your Facebook profile, you also gave it consent to access your almost entire social media profile. Most of these apps are able to now look at your friends list, your contact list, your messaging history, your photo-gallery, and can access your microphone and camera, to give an answer that is so fake, it can easily masquerade as an elected official.</p>
<p style="text-align: justify; ">Second, that you might have taken the test for a moment of childish fantasy and then decided to move on with your life. Except that even if you did not share that post, the results were saved because you gave that app consent to use your uploaded picture in its own advertisement and also gave it authority to show your friends that you were stupid enough to take this test. This also includes your boss on Facebook, who might see what you were doing at 2.44 that afternoon when you were sitting in a serious meeting that was supposed to engulf you. Just like your friend might not have actively shared the first click-bait post but the app posted on their behalf.</p>
<p style="text-align: justify; ">And third, you gave this app the permission to not only harvest your Facebook profile for data that it is going to sell to third-party consumers who are curious to know about your location, age, eating habits, cultural preferences, friendship networks, and mood representations so that they can customise advertisements to sell you things that you didn’t know you wanted. In the world of Big Data, a single click-based consent can be the beginning of an avalanche of data mining, where, before you know it, all your correlated data across all your apps – sometimes sensitive data that might even betray your financial and physical safety — can easily be harvested, and all because you wanted to check out a fun app.</p>
<p style="text-align: justify; ">Apps pretend to be benign and often are so. However, when you accept an app into your digital ecosystem, it is sometimes useful to be slightly more cautious of what the added value of the app is. And before you say yes, it might also be good to just take a little more caution about what permissions you are granting it, and whether you really want to give away that data for a moment of fun. Facebook and other social media networks will continue to warn you about keeping your information private and safe from strangers. However, they will refuse to remind you that when you are online, your private data is more likely to be harmfully abused and used by apps with celebrity pictures and dancing babies, rather than the friend from school who has already probably put you into a block list.</p>
<p>
For more details visit <a href='https://cis-india.org/raw/indian-express-nishant-shah-april-17-2017-digital-native-are-you-still-having-fun'>https://cis-india.org/raw/indian-express-nishant-shah-april-17-2017-digital-native-are-you-still-having-fun</a>
</p>
No publishernishantResearchers at WorkDigital Natives2017-05-05T01:37:40ZBlog EntryMay 2013 Bulletin
https://cis-india.org/about/newsletters/may-2013-bulletin
<b>The Centre for Internet & Society (CIS) welcomes you to the fifth issue of its newsletter for 2013. We bring you an overview of our research, report of events held by us and announcement of upcoming ones, events we participated in, and recent media coverage.</b>
<p style="text-align: justify; "><b><a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis">Celebrating 5 Years of CIS</a></b><br />CIS is now 5 years old and we just celebrated this by holding an open exhibition in our offices in Bangalore and Delhi from May 20 to 23, showcasing our work and accomplishments over the period. We had about 170 visitors from the general public coming in to our office. Renowned artists like Tara Kelton, Kiran Subbaiah, Navin Thomas, Abhishek Hazra and Sharath Chandra Ram exhibited their work. The four day event attracted press coverage: <a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">Bangalore Mirror</a> (May 18, 2013), <a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">DNA</a> (May 19, 2013), <a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">Hindu</a> (May 22, 2013), <a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-pavanaja-talk-at-cis">Prajavani</a> (May 23, 2013), <a href="https://cis-india.org/news/udayavani-may-25-2013-report-on-cis-5-years-celebration">Udayavani</a> (May 25, 2013) and <a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die">Bangalore Mirror</a> (May 31, 2013). <a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip">Download all posters that were part of the exhibition here</a>.</p>
<p style="text-align: justify; "><a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"><b>Google Policy Fellowship</b></a><br />CIS is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India fellow who will be selected by July 1, 2013. The Fellowship focus areas include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom. Send in your applications for the position by June 15, 2013.</p>
<p><b>Jobs</b><br /> CIS invites applications for the posts of <a href="https://cis-india.org/jobs/vacancy-for-developer">Developer</a> (NVDA Screen Reader Project), and <a href="https://cis-india.org/jobs/programme-officer-internet-governance">Programme Officer</a> (Internet Governance). To apply send your resume to <a href="mailto:sunil@cis-india.org">sunil@cis-india.org</a> and <a href="mailto:pranesh@cis-india.org">pranesh@cis-india.org</a>.</p>
<h3><a href="https://cis-india.org/accessibility">Accessibility</a></h3>
<p style="text-align: justify; ">CIS is doing two projects in partnership with the <b>Hans Foundation</b>. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and other similar organisations to develop a Treaty for the Visually Impaired helped by the WIPO:</p>
<p style="text-align: justify; "><b>National Resource Kit for Persons with Disabilities<br /></b>Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Sikkim and Odisha:</p>
<ul>
<li><a href="https://cis-india.org/accessibility/blog/national-resource-kit-sikkim-chapter-call-for-comments">The Sikkim Chapter</a> (by Manojna Yeluri, May 30, 2013).</li>
<li><a href="https://cis-india.org/accessibility/blog/national-resource-kit-odisha-call-for-comments">The Odisha Chapter</a> (by Anandhi Viswanathan, May 31, 2013).</li>
</ul>
<p>Note: <i>All of these are early drafts and will be reviewed and updated</i>.</p>
<p><b>Banking Accessibility</b></p>
<p><b> </b></p>
<ul>
<b> </b>
<li style="text-align: justify; "><a href="https://cis-india.org/accessibility/blog/survey-on-banking-accessibility">Survey on Banking Accessibility</a> (by Vrinda Maheshwari, May 30, 2013). G3ict is a survey on accessibility of financial services in banks for persons with disabilities around the world. The survey is available <a href="http://www.surveygizmo.com/s3/1187917/Survey-on-Banking-Accessibility">here</a>. </li>
</ul>
<p><b>Event Organised</b></p>
<p><b> </b></p>
<ul>
<b> </b>
<li style="text-align: justify; "><a href="https://cis-india.org/accessibility/blog/global-accessibility-awareness-day-event">Global Accessibility Awareness Day</a> (May 9, 2013, TERI, Southern Regional Centre, Domlur, Bangalore).</li>
</ul>
<h3><a href="https://cis-india.org/about/a2k">Access to Knowledge</a> and <a href="https://cis-india.org/openness">Openness</a></h3>
<p style="text-align: justify; ">The Wikimedia Foundation <a href="https://cis-india.org/a2k/access-to-knowledge-program-plan">awarded</a> CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.</p>
<p style="text-align: justify; "><b>Access to Knowledge (Wikipedia)</b><br />Beginning from September 1, 2012, Wikimedia Foundation <a href="https://cis-india.org/a2k/access-to-knowledge-program-plan">awarded</a> CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The <a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team">A2K team</a> consists of three members based in Bangalore: <a href="https://cis-india.org/about/people/our-team">T. Vishnu Vardhan</a>, <a href="https://cis-india.org/about/people/our-team">Dr. U.B. Pavanaja</a> and <a href="https://cis-india.org/about/newsletters/people/our-team">Subhashish Panigrahi</a> and one team member <a href="https://cis-india.org/about/newsletters/people/our-team">Nitika Tandon</a> who is working from Delhi office. <a href="https://cis-india.org/about/newsletters/people/our-team">Noopur Raval</a>, Programme Officer has left the organisation. April 24, 2013 was her last working day.</p>
<p><b>Announcements</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan">Access to Knowledge Work Plan</a> (April 2013 - June 2014): CIS has announced its detailed plan detailed plan with projection of outcomes and expected impact of the A2K programme activities. The document has been made in consultation with various stakeholders and keeping in mind the objectives, opportunities and challenges faced by each of the Indian language Wikimedia projects. Feel free to share any feedback.</li>
<li style="text-align: justify; ">WMF-A2K Revised Budget (draft) and Utilization (Sept 2012 - Feb 2013): In our effort to increase transparency with the working of CIS-A2K programme, we are <a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf">sharing</a> with you the A2K Programme Budget along with the Utilization for the period Sept. 2012 to February 2013. The proposed revisions to the budget along with some notes are <a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Revised_Budget_%28draft%29_and_Utilization_Sept_12-Feb_13.pdf">here</a>.</li>
<li style="text-align: justify; "><a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf">WMF-A2K Grant Budget and Utilization</a> (Sept 2012 – February 2013): CIS has given an open disclosure of the Access to Knowledge budget to Wikimedia India and the global community.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/cis-signs-mou-with-tiss">CIS Signs MOU with TISS, Mumbai</a>: has signed a MoU with TISS as part of which we will collaboratively work towards building Digital Knowledge Partnerships with select higher education institutions.</li>
<li style="text-align: justify; ">India Access to Knowledge IRC can be accessed here: <a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/13th_May">May 13, 2013</a> (All Language Discussion) and <a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/26th_May">May 26, 2013</a> (Odia Language Discussion). </li>
</ul>
<p><b>Blog Entries</b></p>
<ul>
<li><a href="https://cis-india.org/openness/blog/odia-wikipedia-needs-assessment">Odia Wikipedia: Needs Assessment</a> (by Subhashish Panigrahi, May 11, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians">Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians</a> (by Nitika Tandon, May 20, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog/wikipedia-introductory-session">Wikipedia Introductory Session organized for Data and India portal consultants</a> (by Subhashish Panigrahi, May 30, 2013).</li>
</ul>
<p><b>Event Organised</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013">Kannada Wikipedia Workshop</a> (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia</li>
</ul>
<p><b>Event Participated In</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/news/kannada-irc-meet-may-7-2013">Kannada IRC Meet</a> (organised by the Wikipedia Community, May 7, 2013). Dr. U.B. Pavanaja participated in this.</li>
</ul>
<p><b>Upcoming Event</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education">Digital Humanities for Indian Higher Education</a> (co-organised in collaboration with HEIRA-CSCS, Tumkur University, CILHE-TISS and CCS (IISc), Indian Institute of Science, Bangalore, July 13, 2013).</li>
</ul>
<p><b>Press Coverage</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years">CIS Celebrates 5 Years: A Report in Prajavani</a> (Prajavani, May 23, 2013). Prajavani published a report of Dr. U.B. Pavanja’s talk “From Palm Leaf to Tablet – Journey of Kannada”.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years">CIS Celebrates 5 Years: A Report in Udayavani</a> (Udayavani, May 25, 2013). Udayavani published a report of the evening programme hosted as part of the Centre for Internet and Society's 5 year celebrations in its Bangalore edition.</li>
</ul>
<p><b><span style="text-decoration: underline;">Access to Knowledge (Previously IP Reforms)</span><br />Blog Entry</b></p>
<ul>
<li><a href="https://cis-india.org/a2k/blog/unfortunate-rise-of-india-slapp-suit">On the Unfortunate Rise of the Indian SLAPP Suit</a> (by Ujwala Uppaluri, May 27, 2013).</li>
</ul>
<p><span style="text-decoration: underline;"><b>Openness</b></span><br /><b>Research Papers</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog/current-science-vol-101-10-1287-s-gunasekharan-s-arunachalam-use-of-open-access-journals-by-indian-researchers">Use of Open Access Journals by Indian Researchers</a> (by Subbiah Gunasekharan and Prof. Subbiah Arunachalam, May 27, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/blog/use-made-of-open-access-journals-by-indian-researchers-to-publish-their-findings">Use made of Open Access Journals by Indian Researchers to Publish their Findings</a> (by Madhan Muthu and Prof. Subbiah Arunachalam, May 28, 2013).</li>
</ul>
<p><b>Comments</b></p>
<p><b> </b></p>
<ul>
<b> </b>
<li><a href="https://cis-india.org/openness/blog/comments-on-draft-icar-open-access-policy">Draft ICAR Open Access Policy</a> (by Nehaa Chaudhari, May 28, 2013). The comments were submitted to the Indian Council for Agricultural Research.</li>
</ul>
<p><b>Event Hosted</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/openness/events/rhok-bangalore-2013">RHoK Global Event</a> (Centre for Internet and Society, Bangalore, June 1 – 2, 2013). A report of the event would be published soon.</li>
</ul>
<h3><a href="https://cis-india.org/about/internet-governance">Internet Governance</a></h3>
<p style="text-align: justify; ">The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. We began two new projects earlier this year. The first one, with Privacy International, London to facilitate research and events around surveillance, and freedom of speech and expression and the second one with Citizen Lab, Munk School of Global Affairs, University of Toronto on mapping of cyber security actors in South Asia and South East Asia:</p>
<p><b>Cyber Stewards Project</b><br />Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.</p>
<p><b>Video Interview</b></p>
<p><b> </b></p>
<ul>
<b> </b>
<li><a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian">An Interview with Christopher Soghoian</a> (May 28, 2013).</li>
</ul>
<p><b>Upcoming Event</b></p>
<ul>
<li><a href="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls">The Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata</a> (TERI, Bangalore, June 19, 2013).</li>
</ul>
<p><b>Privacy</b></p>
<ul>
<li><a href="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world">Comparative Analysis of DNA Profiling Legislations from Across the World</a> (by Srinivas Atreya, May 23, 2013).</li>
</ul>
<p><b>Events Co-organised</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting">3rd Privacy Round Table meeting</a> (co-organised with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, Chennai, May 18, 2013). Maria Xynou participated in this event and gives an overview of the discussions and recommendations.</li>
<li><a href="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">Consilience – 2013</a> (co-organised with the Law and Technology Committee of National Law School of India University, Bangalore, May 25, 2013).</li>
</ul>
<p><b>Events Participated In</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures">ICT, Law and Innovation: Recent Developments, Challenges and Lessons Learned</a> (organised by Bilgi University, Istanbul, May 2013). Chinmayi Arun was a speaker on the Internet Governance panel at Towards a Global Network of Internet and Society Centres.</li>
<li style="text-align: justify; ">India’s Politics of Free Expression (co-sponsored by the Asian Studies Centre, Free Speech Debate, the Oxford India Society and Ideas for India Oxbridge Exchange, May 31, 2013 at Nissan Lecture Theatre, St. Antony’s College, Oxford). Chinmayi Arun was a speaker at the <a href="https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures">Bapsybanoo Marchioness of Winchester Lectures</a> on 'India's Politics of Free Expression'.</li>
</ul>
<p><b>Upcoming Event</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/internet-governance/events/privacy-round-table-mumbai">Privacy Round Table, Mumbai</a> (Mayfair Banquets, Mumbai, June 15, 2013).</li>
</ul>
<p><b>Blog Entry</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers">The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!</a> (by Maria Xynou, May 2, 2013).</li>
</ul>
<p><b>Media Coverage</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go">Sex on-the-go</a> (by Anand Holla, Mumbai Mirror, May 4, 2013). Pranesh Prakash is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary">CIS anniversary</a> (Hindu Business Line, May 5, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations">Central Monitoring System to make government privy to phone calls, text messages and social media conversations</a> (by Indu Nandakumar, May 7, 2013). Pranesh Prakash is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">Messaging apps find another foe in India’s market regulator</a> (Quartz, May 8, 2013). Elonnai Hickok is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication">India's Rs 400-crore Central Monitoring System to snoop on all communication</a> (Tech 2, May 9, 2013). Pranesh Prakash is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother">Is India's government becoming Big Brother?</a> (by Talia Ralph and Jason Overdorf, May 9, 2013). Pranesh Prakash is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground">Worldwide Playground</a> (Telegraph, May 15, 2013). Pranesh Prakash is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts">NGO invites public to peruse its accounts</a> (by Vandana Kamath, May 18, 2013). Sunil Abraham is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">Online privacy should not come at the cost of security: Sunil Abraham</a> (by Anirban Sen, May 19, 2013). Sunil Abraham is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">A lifetime of five years on the internet</a> (by Subir Ghosh, DNA, May 19, 2013). Sunil Abraham is quoted.</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">CIS highlights changes ushered in by the Internet</a> (Hindu, May 22, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum">Burma to host first Internet freedom forum</a> (by Chan Myae Khine, Asian Correspondent, May 22, 2013).</li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society">INET Bangkok to Explore Internet’s Impact on Thailand’s Economy and Society</a> (BusinessWire, May 30, 2013). Sunil Abraham is participating in this conference. </li>
<li style="text-align: justify; "><a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die">Shooting cyber cafes before they die</a> (by Bangalore Mirror, May 31, 2013). CIS’s film on Cyber Cafes is mentioned in this article.</li>
</ul>
<p style="text-align: justify; "><span class="visualHighlight"><a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access">Knowledge Repository on Internet Access</a></span><br />CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: <a href="http://www.internet-institute.in">www.internet-institute.in</a>.</p>
<p><b>Ongoing Event</b></p>
<p><b> </b></p>
<ul>
<b> </b>
<li style="text-align: justify; "><a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society">Institute on Internet and Society</a> (supported by Ford Foundation, Golden Palms Resort, Bangalore, June 8 – 14, 2013). The <a href="http://internet-institute.in/repository/agenda-revised-by-sv">agenda</a> for the event has been finalised.</li>
</ul>
<p>The following unit was published recently:</p>
<ul>
<li><a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/network-connections-modes-of-access">Network Connections and Modes of Access</a> (by Srividya Vaidyanathan, May 30, 2013).</li>
</ul>
<h3><a href="https://cis-india.org/about/telecom">Telecom</a></h3>
<p style="text-align: justify; ">CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:</p>
<p><b>Newspaper Column</b></p>
<ul>
<li style="text-align: justify; "><a href="https://cis-india.org/telecom/blog/business-standard-may-9-2013-shyam-ponappa-configuring-a-non-toothless-trai">Configuring a 'Non-Toothless' Regulator</a> (TRAI) (by Shyam Ponappa, Business Standard, May 9, 2013 and Organizing India Blogspot, May 10, 2013).</li>
</ul>
<h2 style="text-align: justify; "><a href="http://cis-india.org/about/newsletters/">About CIS</a></h2>
<p style="text-align: justify; ">The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.<br /> <b>Follow us elsewhere</b></p>
<ul>
<li>Get short, timely messages from us on <a href="https://twitter.com/cis_india">Twitter</a></li>
<li>Join the CIS group on <a href="http://www.facebook.com/groups/28535315687/">Facebook</a></li>
<li>Visit us at <a href="https://cis-india.org/">http://cis-india.org</a></li>
</ul>
<p><b>Support Us</b><br />Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.</p>
<p style="text-align: justify; "><b>Request for Collaboration</b><br />We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at <a href="mailto:sunil@cis-india.org">sunil@cis-india.org</a> or Nishant Shah, Director – Research, at <a href="mailto:nishant@cis-india.org">nishant@cis-india.org</a></p>
<p style="text-align: justify; "><i>CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.</i></p>
<ul>
</ul>
<ul>
</ul>
<ul>
</ul>
<p>
For more details visit <a href='https://cis-india.org/about/newsletters/may-2013-bulletin'>https://cis-india.org/about/newsletters/may-2013-bulletin</a>
</p>
No publisherpraskrishnaAccess to KnowledgeDigital NativesTelecomAccessibilityInternet GovernanceOpennessResearchers at Work2013-08-13T11:51:46ZPageDigital Natives with a Cause? Thinkathon: Position Paper
https://cis-india.org/digital-natives/publications/position-paper
<b>The Digital Natives with a Cause? research inquiry seeks to look at the potentials of social change and political participation through technology practices of people in emerging ICT contexts. In particular it aims to address knowledge gaps that exist in the scholarship, practice and popular discourse around an increasing usage, adoption and integration of digital and Internet technologies in social transformation processes. A conference called Digital Natives with a Cause? Thinkathon was jointly organised by CIS and Hivos in the Hague in December 2010. The Thinkathon aimed to reflect on these innovations in social transformation processes and its effects on development, and in particular to understand how new processes of social transformation can be supported and sustained, how they can inform our existing practices, and provide avenues of collaboration between Digital Natives and "Analogue Activists". </b>
<p>
For more details visit <a href='https://cis-india.org/digital-natives/publications/position-paper'>https://cis-india.org/digital-natives/publications/position-paper</a>
</p>
No publisherpraskrishnaRAW PublicationsWeb PoliticsDigital NativesPublicationsResearchers at Work2015-05-08T12:22:29ZFile