<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 171 to 185.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-futures-of-indian-languages-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-selected-sessions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/approaching-open-research-via-open-data-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/raw-lectures-02-anil-menon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/cis_2016.01.22_gk.png"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/open-access-dialogues-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/teri-seminar-on-open-access-in-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/glam"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-proposed-politicsonsocialmedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-proposed-knowledgecommunity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-proposed-wikishadows"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/irc16">
    <title>Internet Researchers' Conference 2016 (IRC16)</title>
    <link>https://cis-india.org/raw/irc16</link>
    <description>
        &lt;b&gt;The first Internet Researchers' Conference (IRC16) will be organised at the Jawaharlal Nehru University (JNU), Delhi, on February 26-28, 2016. The focus of the Conference is on the experiences, adventures, and methods of 'studying internet in India.' We are deeply grateful to the Centre for Political Studies (CPS), JNU, for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for the generous support.  It is a free and open conference. Please use the form to register.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;It is our great pleasure to announce the beginning of the Internet Researchers' Conference (IRC), an annual conference series initiated by the Researchers at Work (RAW) programme at CIS to gather researchers, academic or otherwise, studying internet in/from India to congregate, share insights and tensions, and chart the ways forward.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This conference series is specifically driven by the following interests: 1) creating discussion spaces for researchers studying internet in India and in other comparable regions, 2) foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India, 3) accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India, and 4) exploring and practicing new modes of research and documentation necessitated by new (digital) forms of objects of power/knowledge.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The first edition of the Conference, IRC16, is engaging with the theme of 'studying internet in India.' The word &lt;em&gt;study&lt;/em&gt; here is a shorthand for a range of tasks, from documentation and theory-building, to measurement and representation.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the Convention Centre of the &lt;a href="http://jnu.ac.in/"&gt;Jawaharlal Nehru University (JNU)&lt;/a&gt;, Delhi. We are grateful to &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;Centre for Political Studies (CPS)&lt;/a&gt; at JNU for hosting the Conference, and to the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt; for its generous support.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="https://www.google.com/maps/embed?pb=!1m14!1m12!1m3!1d1752.512135244194!2d77.16642650602853!3d28.53899019877363!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!5e0!3m2!1sen!2s!4v1455124383423" frameborder="0" height="300" width="600"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Registration and Programme&lt;/h2&gt;
&lt;p&gt;Conference programme: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.2.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;Programme booklet: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-Booklet.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[Important]&lt;/strong&gt; Invitation letter to help you enter JNU campus: &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Invitation-Letter.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;Please register for the Conference here: &lt;a href="http://goo.gl/forms/uu0HjXWbxK" target="_blank"&gt;Form&lt;/a&gt; (Google).&lt;/p&gt;
&lt;p&gt;We apologise for not being able to provide travel or accommodation support.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Etherpads&lt;/h2&gt;
&lt;p&gt;#Methods&amp;amp;ToolsForInternetResearch : &lt;a class="external-link" href="https://public.etherpad-mozilla.org/p/IRC16-InternetResearch"&gt;https://public.etherpad-mozilla.org/p/IRC16-InternetResearch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;#DigitalDesires: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-DigitalDesires"&gt;https://public.etherpad-mozilla.org/p/IRC16-DigitalDesires&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#InternetMovements: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-InternetMovements"&gt;https://public.etherpad-mozilla.org/p/IRC16-InternetMovements&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#WebOfGenealogies: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-WebOfGenealogies"&gt;https://public.etherpad-mozilla.org/p/IRC16-WebOfGenealogies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#MinimalComputing: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-MinimalComputing"&gt;https://public.etherpad-mozilla.org/p/IRC16-MinimalComputing&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#STSDebates: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-STSDebates"&gt;https://public.etherpad-mozilla.org/p/IRC16-STSDebates&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#ArchiveAnarchy: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-ArchiveAnarchy"&gt;https://public.etherpad-mozilla.org/p/IRC16-ArchiveAnarchy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#ManyPublicsOfInternet: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-ManyPublicsOfInternet"&gt;https://public.etherpad-mozilla.org/p/IRC16-ManyPublicsOfInternet&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#DigitalLiteraciesAtTheMargins: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-DigitalLiteraciesAtTheMargins"&gt;https://public.etherpad-mozilla.org/p/IRC16-DigitalLiteraciesAtTheMargins&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#FutureBazaars: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-FutureBazaars"&gt;https://public.etherpad-mozilla.org/p/IRC16-FutureBazaars&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#PoliticsOnSocialMedia: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-PoliticsOnSocialMedia"&gt;https://public.etherpad-mozilla.org/p/IRC16-PoliticsOnSocialMedia&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#SpottingData: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-SpottingData"&gt;https://public.etherpad-mozilla.org/p/IRC16-SpottingData&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#WikiShadows: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-WikiShadows"&gt;https://public.etherpad-mozilla.org/p/IRC16-WikiShadows&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#FollowTheMedium: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-FollowTheMedium"&gt;https://public.etherpad-mozilla.org/p/IRC16-FollowTheMedium&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#AFCinema2.0: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-AFCinema2.0"&gt;https://public.etherpad-mozilla.org/p/IRC16-AFCinema2.0&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;#LiterarySpaces: &lt;a href="https://public.etherpad-mozilla.org/p/IRC16-LiterarySpaces"&gt;https://public.etherpad-mozilla.org/p/IRC16-LiterarySpaces&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Resources&lt;/h2&gt;
&lt;p&gt;Call for sessions: &lt;a href="http://cis-india.org/raw/irc16-call" target="_blank"&gt;http://cis-india.org/raw/irc16-call&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Proposed sessions: &lt;a href="http://cis-india.org/raw/irc16-proposed-sessions" target="_blank"&gt;http://cis-india.org/raw/irc16-proposed-sessions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Selected sessions: &lt;a href="http://cis-india.org/raw/irc16-selected-sessions" target="_blank"&gt;http://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Please join the &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;researchers@cis-india&lt;/a&gt; mailing list to take part in pre- and post-conference conversations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16'&gt;https://cis-india.org/raw/irc16&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>CDIF</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-02-27T06:19:33Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns">
    <title>Open Data Hackathons are Great, but Address Privacy and License Concerns</title>
    <link>https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns</link>
    <description>
        &lt;b&gt;This is to cross-publish a blog post from DataMeet website regarding a letter shared with the organisers of Urban Hack 2015, Bangalore, in response to a set of privacy and license concerns identified and voiced during the hackathon by DataMeet members. Sumandro Chattapadhyay co-authored and co-signed the letter. The blog post is written by Nisha Thompson.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Hackathons are a source of confusion and frustration for us. DataMeet actively does not do them unless there is a very specific outcome the community wants like&lt;a href="https://github.com/datameet/maps/tree/master/parliamentary-constituencies"&gt; freeing a whole dataset &lt;/a&gt;or introducing &lt;a href="http://datameet.org/2015/05/13/mumbai-meet-6-data-science-hackathon/"&gt;open data to a new audience&lt;/a&gt;. We feel that they cause burn out, are not productive, and in general don't help create a healthy community of civic tech and open data enthusiasts.&lt;/p&gt;
&lt;p&gt;That is not to say we feel others shouldn't do them, they are very good opportunities to spark discussion and introduce new audiences to problems in the social sector. &lt;a href="http://www.datakind.org/chapters/datakind-blr"&gt;DataKind&lt;/a&gt; and &lt;a href="https://rhokbangalore.wordpress.com/"&gt;RHOK&lt;/a&gt; and numerous others host hackathons or variations of them regularly to stir the pot, bring new people into civic tech and they can be successful starts to long term connections and experiments. A lot of people in the DataMeet community participate and enjoy hackathons.&lt;/p&gt;
&lt;p&gt;However, with great data access comes great responsibility. We always want to make sure that even if no output is achieved when a dataset is opened at least no harm should be done.&lt;/p&gt;
&lt;p&gt;Last October an open data hackathon,&lt;a href="https://www.hackerearth.com/sprints/urban-hack/"&gt; Urban Hack&lt;/a&gt;, run by Hacker Earth, &lt;a href="http://www.nasscom.in/"&gt;NASSCOM&lt;/a&gt;, &lt;a href="http://www.xrci.xerox.com/"&gt;XEROX&lt;/a&gt;, &lt;a href="https://console.ng.bluemix.net/?cm_mmc=EcoDISA-_-Bluemix_day-_-11-15-14::12-31-15-_-UrbanHack"&gt;IBM &lt;/a&gt;and &lt;a href="http://wri-india.org/"&gt;World Resource Institute India&lt;/a&gt; wanted to bring out open data and spark innovation in the transport and crime space by making datasets from &lt;a href="http://mybmtc.com/"&gt;Bangalore Metropolitan Transport Corporation (BMTC)&lt;/a&gt; and the Bangalore City Police available to work with. A DataMeet member (&lt;a href="http://www.lostprogrammer.com/"&gt;Srinivas Kodali&lt;/a&gt;) was participating, he is a huge transport data enthusiast and wanted to take a look at what is being made available.&lt;/p&gt;
&lt;p&gt;In the morning shortly after it started I received a call from him that there is a dataset that was made available that seems to be violating privacy and data security. We contacted the organizers and they took it down, later we realized it was quite a sensitive dataset and a few hundred people had already downloaded it. We were also distressed that they had not clarified ownership of data, license of data, and had linked to sources like &lt;a href="http://openbangalore.org/"&gt;Open Bangalore&lt;/a&gt;  without specifying licensing, which violated the license.&lt;/p&gt;
&lt;p&gt;The organizers were quite noted and had been involved with hackathons before so it was a little distressing to see these mistakes being made. We were concerned that the government partners (who had not participated in these types of events before) were also being exposed to poor practices. As smart cities initiatives take over the Indian urban space, we began to realize that this is a mistake that shouldn't happen again.&lt;/p&gt;
&lt;p&gt;Along with &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; and Random Hacks of Kindness we sent the organizers, Bangalore City Police and BMTC a letter about the breach in protocol. We wanted to make sure everyone was aware of the issues and that measures were taken to not repeat these mistakes.&lt;/p&gt;
&lt;p&gt;You can see the letter here:&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.documentcloud.org/documents/2702333-Appropriate-and-Responsible-Practices-for.html" height="500" width="600"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;We are very proud of the DataMeet community and Srinivas for bringing this violation to the attention of the organizers. As people who participate in hackathons and other data events it is imperative that privacy and security are kept in mind at all times. In a space like India where a lot of these concepts are new to institutions, like the Government, it is essential that we are always using opportunities not only to showcase the power of open data but also good practices for protecting privacy and ensuring security.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally posted on DataMeet website: &lt;a href="http://datameet.org/2016/02/02/to-hack-or-not-to-hack/"&gt;http://datameet.org/2016/02/02/to-hack-or-not-to-hack/&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns'&gt;https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Hackathon</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-02-05T20:37:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes">
    <title>NASSCOM-DSCI Annual Information Security Summit 2015 - Notes</title>
    <link>https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes</link>
    <description>
        &lt;b&gt;NASSCOM-DSCI organised the 10th Annual Information Security Summit (AISS) 2015 in Delhi during December 16-17. Sumandro Chattapadhyay participated in this engaging Summit. He shares a collection of his notes and various tweets from the event.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Details about the Summit&lt;/h2&gt;
&lt;p&gt;Event page: &lt;a href="https://www.dsci.in/events/about/2261"&gt;https://www.dsci.in/events/about/2261&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Agenda: &lt;a href="https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf"&gt;https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes from the Summit&lt;/h2&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr.G.K.Pillai ,Chairman DSCI addressing the audience @ 10th Annual Information Security Summit '15 &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/JVcwct3HSF"&gt;pic.twitter.com/JVcwct3HSF&lt;/a&gt;&lt;/p&gt;
— DSCI (@DSCI_Connect) &lt;a href="https://twitter.com/DSCI_Connect/status/676979952277987328"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. G. K. Pillai, Chairman of Data Security Council of India (DSCI), set the tone of the Summit at the very first hour by noting that 1) state and private industries in India are working in silos when it comes to preventing cybercrimes, 2) there is a lot of skill among young technologists and entrepreneurs, and the state and the private sectors are often unaware of this, and 3) there is serious lack of (cyber-)capacity among law enforcement agencies.&lt;/p&gt;
&lt;p&gt;In his Inaugural Address, Dr. Arvind Gupta (Deputy National Security Advisor and Secretary, NSCS), provided a detailed overview of the emerging challenges and framework of cybersecurity in India. He focused on the following points:&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; Dy NSA Dr Arvind Gupta calls 4 &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; by &lt;a href="https://twitter.com/hashtag/design?src=hash"&gt;#design&lt;/a&gt; in &lt;a href="https://twitter.com/hashtag/ICT?src=hash"&gt;#ICT&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/79kq9lWGtk"&gt;pic.twitter.com/79kq9lWGtk&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/676980799347023872"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Security is a key problem in the present era of ICTs as it is not in-built. In the upcoming IoT era, security must be built into ICT systems.&lt;/li&gt;
&lt;li&gt;In the next billion addition to internet population, 50% will be from India. Hence cybersecurity is a big concern for India.&lt;/li&gt;
&lt;li&gt;ICTs will play a catalytic role in achieving SDGs. Growth of internet is part of the sustainable development agenda.&lt;/li&gt;
&lt;li&gt;We need a broad range of critical security services - big data analytics, identity management, etc.&lt;/li&gt;
&lt;li&gt;The e-governance initiatives launched by the Indian government are critically dependent on a safe and secure internet.&lt;/li&gt;
&lt;li&gt;Darkweb is a key facilitator of cybercrime. Globally there is a growing concern regarding the security of cyberspace.
&lt;/li&gt;&lt;li&gt;On the other hand, there exists deep divide in access to ICTs, and also in availability of content in local languages.&lt;/li&gt;
&lt;li&gt;The Indian government has initiated bilateral cybersecurity dialogues with various countries.&lt;/li&gt;
&lt;li&gt;Indian government is contemplating setting up of centres of excellence in cryptography. It has already partnered with NASSCOM to develop cybersecurity guidelines for smart cities.&lt;/li&gt;
&lt;li&gt;While India is a large global market for security technology, it also needs to be self-reliant. Indian private sector should make use of government policies and bilateral trust enjoyed by India with various developing countries in Africa and south America to develop security technology solutions, create meaningful jobs in India, and export services and software to other developing countries.&lt;/li&gt;
&lt;li&gt;Strong research and development, and manufacturing base are absolutely necessary for India to be self-reliant in cybersecurity. DSCI should work with private sector, academia, and government to coordinate and realise this agenda.&lt;/li&gt;
&lt;li&gt;In the line of the Climate Change Fund, we should create a cybersecurity fund, since it is a global problem.&lt;/li&gt;
&lt;li&gt;Silos are our bane in general. Bringing government agencies together is crucial. Trust issues (between government, private sector, and users) remain, and can only be resolved over time.&lt;/li&gt;
&lt;li&gt;The demand for cybersecurity solutions in India is so large, that there is space for everyone.&lt;/li&gt;
&lt;li&gt;The national cybersecurity centre is being set up.&lt;/li&gt;
&lt;li&gt;Thinktanks can play a crucial role in helping the government to develop strategies for global cybersecurity negotiations. Indian negotiators are often capacity constrained.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Rajendra Pawar, Chair of the NASSCOM Cyber Security Task Force,  NASSCOM Cybersecurity Initiative, provided glimpses of the emerging business opportunity around cybersecurity in India:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In next 10 years, the IT economy in India will be USD 350 bn, and &lt;a href="https://blogs.dsci.in/building-usd-35-billion-cyber-security-industry-how-do-we-do-it/"&gt;10% of that will be the cybersecurity pie&lt;/a&gt;. This means a million job only in the cybersecurity space.&lt;/li&gt;
&lt;li&gt;Academic institutes are key to creation of new ideas and hence entrepreneurs. Government and private sectors should work closely with academic institutes.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Companies+Govt+Academia= High growth of the cybersecurity industry' - Rajendra Pawar at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/676995090955530246"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Globally, cybersecurity innovation and industries happen in clusters. Cities and states must come forward to create such clusters.&lt;/li&gt;
&lt;li&gt;2/3rd of the cybersecurity market is provision of services. This is where India has a great advantage, and should build on that to become a global brand in cybersecurity services.&lt;/li&gt;
&lt;li&gt;Everyday digital security literacy and cultures need to be created.&lt;/li&gt;
&lt;li&gt;Publication of cybersecurity best practices among private companies is a necessity.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Corporate disclosures of breaches being considered with Nasscom under cybersec task force: Rajendra Pawar &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/ETtech"&gt;@ETtech&lt;/a&gt;&lt;/p&gt;
— Neha Alawadhi (@NehaAlawadhiET) &lt;a href="https://twitter.com/NehaAlawadhiET/status/676994553799417856"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Dedicated cybersecurity spending should be made part of the e-governance budget of central and state governments.&lt;/li&gt;
&lt;li&gt;DSCI should function as a clearing house of cybersecurity case studies. At present, thought leadership in cybersecurity comes from the criminals. By serving as a use case clearing house, DSCI will inform interested researchers about potential challenges for which solution needs to be created.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Manish Tiwary of Microsoft informed the audience that India is in the top 3 positions globally in terms of malware proliferation, and this ensures that India is a big focus for Microsoft in its global war against malware. Microsoft India looks forward to work closely with CERT-In and other government agencies.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;RSA's Kartik Shahani &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; Adopt a Deep &amp;amp; Pervasive Level of True Visibility Everywhere &lt;a href="https://t.co/2U8J8WkWsI"&gt;pic.twitter.com/2U8J8WkWsI&lt;/a&gt;&lt;/p&gt;
— Debjani Gupta (@DebjaniGupta1) &lt;a href="https://twitter.com/DebjaniGupta1/status/676999786722156544"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Data localization; one of the stumbling blocks that undermine investments in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/vrff3Amcv0"&gt;pic.twitter.com/vrff3Amcv0&lt;/a&gt;&lt;/p&gt;
— Appvigil (@appvigil_co) &lt;a href="https://twitter.com/appvigil_co/status/677043180731301888"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Trust verification 4 embedded devices isnt complex bt much desired as people lives r dependent on that-cld cause physical damage &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677057992831860736"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;"Most compromised OS in 2k15: iOS"-Riyaz Tambe, Palo Alto Networks &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677015382356533249"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Security by default in IOS architecture  tho' can't verify code as noṭ open - is it security by obscurity? &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/kbPZgH8oA0"&gt;pic.twitter.com/kbPZgH8oA0&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677055086611173376"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Catching Fraudsters&lt;/strong&gt; had two insightful presentations from Dr. Triveni Singh, Additional SP of Special Task Force of UP Police, and Mr. Manoj Kaushik, IAS, Additional Director of FIU.&lt;/p&gt;
&lt;p&gt;Dr. Singh noted that a key challenge faced by police today is that nobody comes to them with a case of online fraud. Most fraud businesses are run by young groups operating BPOs that steal details from individuals. There exists a huge black market of financial and personal data - often collected from financial institutions and job search sites. Almost any personal data can be bought in such markets. Further, SIM cards under fake names are very easy to buy. The fraudsters are effective using all fake identity, and is using operational infrastructures outsourced from legitimate vendors under fake names. Without a central database of all bank customers, it is very difficult for the police to track people across the financial sector. It becomes even more difficult for Indian police to get access to personal data of potential fraudsters when it is stored in a foreign server. which is often the case with usual web services and apps. Many Indian ISPs do not keep IP history data systematically, or do not have the technical expertise to share it in a structured and time-sensitive way.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr. Triveni Singh talks about raiding fake call centres in Delhi NCR that scam millions every year &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/EmE4y3jux2"&gt;pic.twitter.com/EmE4y3jux2&lt;/a&gt;&lt;/p&gt;
— pradyumn nand (@PradyumnNand) &lt;a href="https://twitter.com/PradyumnNand/status/677063276442738689"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. Kaushik explained that no financial fraud is uniquely committed via internet. Many fraud begin with internet but eventually involve physical fraudulent money transaction. Credit/debit card frauds all involve card data theft via various internet-based and physical methods. However, cybercrime is continued to be mistakenly seen as frauds undertaken completely online. Further, mobile-based frauds are yet another category. Almost all apps we use are compromised, or store transaction history in an insecure way, which reveals such data to hackers. FIU is targeting bank accounts to which fraud money is going, and closing them down. Catching the people behind these bank accounts is much more difficult, as account loaning has become a common practice - where valid accounts are loaned out for a small amount of money to fraudsters who return the account after taking out the fraudulent money. Better information sharing between private sector and government will make catching fraudsters easier.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/AkhileshTuteja"&gt;@AkhileshTuteja&lt;/a&gt;  With data overload and big data being prevalent are we considering privacy elements &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/KpmgIndiaCyber?src=hash"&gt;#KpmgIndiaCyber&lt;/a&gt;&lt;/p&gt;
— Atul Gupta (@AtulGup15843145) &lt;a href="https://twitter.com/AtulGup15843145/status/677082045701488640"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Tech solns today designed to protect security - solns for privacy need to evolve'- &lt;a href="https://twitter.com/Mayurakshi_Ray"&gt;@Mayurakshi_Ray&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066470325534721"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In-house tools important but community collaboration critical to fight security threats &lt;a href="https://twitter.com/tata_comm"&gt;@tata_comm&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/ZjbCnaROXC"&gt;pic.twitter.com/ZjbCnaROXC&lt;/a&gt;&lt;/p&gt;
— aparna  (@aparnag14) &lt;a href="https://twitter.com/aparnag14/status/677067260268187648"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Orgns in India have a long way to go b4 they internalise privacy principles' Subhash S, CISO ICICI &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066928880410624"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Prof PK giving an interesting brief on Academia role in Cyber Security. &lt;a href="https://twitter.com/ponguru"&gt;@ponguru&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/MEiO6sCJwu"&gt;pic.twitter.com/MEiO6sCJwu&lt;/a&gt;&lt;/p&gt;
— Vikas Yadav (@VikasSYadav) &lt;a href="https://twitter.com/VikasSYadav/status/677088566871101440"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Potential for interaction between Academia, Government and Industry but not an established reality yet. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/MappingCyberEducation?src=hash"&gt;#MappingCyberEducation&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677089590717517824"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;I have figured out why information security is not in any boardroom discussions. Cause there are no good speakers / orators . &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Virag Thakkar (@viragthakkar) &lt;a href="https://twitter.com/viragthakkar/status/677078491699871745"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Smart Cities&lt;/strong&gt; focused on discussing the actual cities coming up India, and the security challenges highlighted by them. There was a presentation on Mahindra World City being built near Jaipur. Presenters talked about the need to stabilise, standardise, and securitise the unique identities of machines and sensors in a smart city context, so as to enable secured machine-to-machine communication. Since 'smartness' comes from connecting various applications and data silos together, the governance of proprietary technology and ensuring inter-operable data standards are crucial in the smart city.&lt;/p&gt;
&lt;p&gt;As Special Purposed Vehicles are being planned to realise the smart cities, the presenters warned that finding the right CEOs for these entities will be critical for their success. Legacy processes and infrastructures (and labour unions) are a big challenge when realising smart cities. Hence, the first step towards the smart cities must be taken through connected enforcement of law, order, and social norms.&lt;/p&gt;
&lt;p&gt;Privacy-by-design and security-by-design are necessary criteria for smart cities technologies. Along with that regular and automatic software/middleware updating of distributed systems and devices should be ensured, as well as the physical security of the actual devices and cables.&lt;/p&gt;
&lt;p&gt;In terms of standards, security service compliance standards and those for protocols need to be established for the internet-of-things sector in India. On the other hand, there is significant interest of international vendors to serve the Indian market. All global data and cloud storage players, including Microsoft Azure cloud, are moving into India, and are working on substantial and complete data localisation efforts.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Session - Why should you hire Women Security Professionals?... Balancing gender diversity 
&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/DSCI_Connect?src=hash"&gt;#DSCI_Connect&lt;/a&gt; &lt;a href="https://t.co/uIMfG9PvAb"&gt;pic.twitter.com/uIMfG9PvAb&lt;/a&gt;&lt;/p&gt;
— Jagan Suri (@jsuri90) &lt;a href="https://twitter.com/jsuri90/status/677109792679157760"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;gender Diversity in cybersecurity critical 4 India's future. &lt;a href="https://twitter.com/symantec"&gt;@symantec&lt;/a&gt; partnered with &lt;a href="https://twitter.com/nasscom"&gt;@nasscom&lt;/a&gt; via 1000 women scholarships &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677118674197602304"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Dialogue with CERT-In 
.. Starting 2nd Day of &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;
.. B J Srinath, DG, CERT 
&lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/security?src=hash"&gt;#security&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/privacy?src=hash"&gt;#privacy&lt;/a&gt; &lt;a href="https://t.co/cvDcrgkein"&gt;pic.twitter.com/cvDcrgkein&lt;/a&gt;&lt;/p&gt;
— Vinayak Godse (@godvinayak) &lt;a href="https://twitter.com/godvinayak/status/677342972170493952"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;New &lt;a href="https://twitter.com/hashtag/problems?src=hash"&gt;#problems&lt;/a&gt; can't b solved w old &lt;a href="https://twitter.com/hashtag/solutions?src=hash"&gt;#solutions&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG BJ Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341246281539585"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;17 entities within &lt;a href="https://twitter.com/hashtag/Indian?src=hash"&gt;#Indian&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/government?src=hash"&gt;#government&lt;/a&gt; engaged in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT head &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341728282533888"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Scope of activities by CERT in &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; way more than its counterparts elsewhere &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677342193854451712"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT looks 8 prediction &amp;amp; &lt;a href="https://twitter.com/hashtag/prevention?src=hash"&gt;#prevention&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/emergency?src=hash"&gt;#emergency&lt;/a&gt; not just &lt;a href="https://twitter.com/hashtag/response?src=hash"&gt;#response&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343140630540288"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT willing to &lt;a href="https://twitter.com/hashtag/share?src=hash"&gt;#share&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/information?src=hash"&gt;#information&lt;/a&gt; rather than just receiving &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343512833101824"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Savita CERTin outlines drill initiatives taken 4 preparedness-detect (protect), defend attacks wth response &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/wXrkgoLzr2"&gt;pic.twitter.com/wXrkgoLzr2&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677346822449303553"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;CERTin also offers incident predicatibility,Crisis mgmt plans, &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; assurance ladder (7 levels) besides 24 x 7 prevention &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677348506869239809"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; has 7.2 million bot infected &lt;a href="https://twitter.com/hashtag/machines?src=hash"&gt;#machines&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677355051308871680"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Seizure &amp;amp; protection of electronic devices as admissible evidence (certificate u Sec 65B) imperative under Forensics investigation &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677364713005576192"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Law enforcement agency&amp;amp;corporate world must collaborate to fight cybercrime'-Atul Gupta,Partner-Risk Adv. @ &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/GwAQWhYMmK"&gt;pic.twitter.com/GwAQWhYMmK&lt;/a&gt;&lt;/p&gt;
— KPMG India (@KPMGIndia) &lt;a href="https://twitter.com/KPMGIndia/status/677373217711919104"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. R. Chandrasekhar, President of NASSCOM, foregrounded the recommendations made by the Cybersecurity Special Task Force of NASSCOM, in his Special Address on the second day. He noted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a great opportunity to brand India as a global security R&amp;amp;D and services hub. Other countries are also quite interested in India becoming such a hub.&lt;/li&gt;
&lt;li&gt;The government should set up a cybersecurity startup and innovation fund, in coordination with and working in parallel with the centres of excellence in internet-of-things (being led by DeitY) and the data science/analytics initiative (being led by DST).&lt;/li&gt;
&lt;li&gt;There is an immediate need to create a capable workforce for the cybersecurity industry.&lt;/li&gt;
&lt;li&gt;Cybersecurity affects everyone but there is almost no public disclosure. This leads to low public awareness and valuation of costs of cybersecurity failures. The government should instruct the Ministry of Corporate Affairs to get corporates to disclose (publicly or directly to the Ministry) security breeches.&lt;/li&gt;
&lt;li&gt;With digital India and everyone going online, cyberspace will increasingly be prone to attacks of various kinds, and increasing scale of potential loss. Cybersecurity, hence, must be part of the core national development agenda.&lt;/li&gt;
&lt;li&gt;The cybersecurity market in India is big enough and under-served enough for everyone to come and contribute to it.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Keynote Address by Mr. Rajiv Singh, MD – South Asia of Entrust Datacard, and Mr. Saurabh Airi, Technical Sales Consultant of Entrust Datacard, focused on trustworthiness and security of online identities for financial transactions. They argued that all kinds of transactions require a common form factor, which can be a card or a mobile phone. The key challenge is to make the form factor unique, verified, and secure. While no programme is completely secure, it is necessary to build security into the form factor - security of both the physical and digital kind, from the substrates of the card to the encryption algorithms. Entrust and Datacard have merged in recent past to align their identity management and security transaction workflows, from physical cards to software systems for transactions. The advantages of this joint expertise have allowed them to successfully develop the National Population Register cards of India. Now, with the mobile phone emerging as a key financial transaction form factor, the challenge across the cybersecurity industry is to offer the same level of physical, digital, and network security for the mobile phone, as are provided for ATM cards and cash machines.&lt;/p&gt;
&lt;p&gt;The following Keynote Address by Dr. Jared Ragland, Director - Policy of BSA, focused on the cybersecurity investment landscape in India and the neighbouring region. BSA, he explained, is a global trade body of software companies. All major global software companies are members of BSA. Recently, BSA has produced a study on the cybersecurity industry across 10 markets in the Asia Pacific region, titled &lt;a href="http://cybersecurity.bsa.org/2015/apac/"&gt;Asia Pacific Cybersecurity Dashboard&lt;/a&gt;. The study provides an overview of cybersecurity policy developments in these countries, and sector-specific opportunities in the region. Dr. Ragland mentioned the following as the key building blocks of cybersecurity policy: legal foundation, establishment of operational entities, building trust and partnerships (PPP), addressing sector-specific requirements, and education and awareness. As for India, he argued that while steady steps have been taken in the cybersecurity policy space by the government, a lot remains to be done. Operationalisation of the policy is especially lacking. PPPs are happening but there is a general lack of persistent formal engagement with the private sector, especially with global software companies. There is almost no sector-specific strategy. Further, the requirement for India-specific testing of technologies, according to domestic and not global standards, is leading to entry barrier for global companies and export barrier for Indian companies. Having said that, Dr. Ragland pointed out that India's cybersecurity experience is quite representative of that of the Asia Pacific region. He noted the following as major stumbling blocks from an international industry perspective: unnecessary and unreasonable testing requirements, setting of domestic standards, and data localisations rules.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;The Policy Makers' panel in &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; in progress. Arvind Gupta, Head, BJP IT cell (&lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt;) speaks. &lt;a href="https://t.co/9yWR0gMwf5"&gt;pic.twitter.com/9yWR0gMwf5&lt;/a&gt;&lt;/p&gt;
— Nandkumar Saravadé (@saravade) &lt;a href="https://twitter.com/saravade/status/677437443356798977"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;One of the final sessions of the Summit was the Public Policy Dialogue between &lt;a href="https://twitter.com/rajeevgowda"&gt;Prof. M.V. Rajeev Gowda&lt;/a&gt;, Member of Parliament, Rajya Sabha, and &lt;a href="https://twitter.com/buzzindelhi"&gt;Mr. Arvind Gupta&lt;/a&gt;, Head of IT Cell, BJP.&lt;/p&gt;
&lt;p&gt;Prof. Gowda focused on the following concerns:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We often freely give up our information and rights over to owners of websites and applications on the web. We need to ask questions regarding the ownership, storage, and usage of such data.&lt;/li&gt;
&lt;li&gt;While Section 66A of Information Technology Act started as a anti-spam rule, it has actually been used to harass people, instead of protecting them from online harassment.&lt;/li&gt;
&lt;li&gt;The bill on DNA profiling has raised crucial privacy concerns related to this most personal data. The complexity around the issue is created by the possibility of data leakage and usage for various commercial interests.&lt;/li&gt;
&lt;li&gt;We need to ask if western notions of privacy will work in the Indian context.&lt;/li&gt;
&lt;li&gt;We need to move towards a cashless economy, which will not only formalise the existing informal economy but also speed up transactions nationally. We need to keep in mind that this will put a substantial demand burden on the communication infrastructure, as all transactions will happen through these.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt; Mr. Gupta shared his keen insights about the key public policy issues in &lt;em&gt;digital India&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The journey to establish &lt;em&gt;the digital&lt;/em&gt; as a key political agenda and strategy within BJP took him more than 6 years. He has been an entrepreneur, and will always remain one. His approached his political journey as an entrepreneur.
&lt;/li&gt;&lt;li&gt;While we are producing numerous digitally literate citizens, the companies offering services on the internet often unknowingly acquire data about these citizens, store them, and sometimes even expose them. India perhaps produces the greatest volume of digital exhaust globally.&lt;/li&gt;
&lt;li&gt;BJP inherited the Aadhaar national identity management platform from UPA, and has decided to integrate it deeply into its digital India architecture.&lt;/li&gt;
&lt;li&gt;Financial and administrative transactions, especially ones undertake by and with governments, are all becoming digital and mostly Aadhaar-linked. We are not sure where all such data is going, and who all has access to such data.&lt;/li&gt;
&lt;li&gt;Right now there is an ongoing debate about using biometric system for identification. The debate on privacy is much needed, and a privacy policy is essential to strengthen Aadhaar. We must remember that the benefits of Aadhaar clearly outweigh the risks. Greatest privacy threats today come from many other places, including simple mobile torch apps.&lt;/li&gt;
&lt;li&gt;India is rethinking its cybersecurity capacities in a serious manner. After Paris attack it has become obvious that the state should be allowed to look into electronic communication under reasonable guidelines. The challenge is identifying the fine balance between consumers' interest on one hand, and national interest and security concerns on the other. Unfortunately, the concerns of a few is often getting amplified in popular media.&lt;/li&gt;
&lt;li&gt;MyGov platform should be used much more effectively for public policy debates. Social media networks, like Twitter, are not the correct platforms for such debates.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;: &lt;a href="https://twitter.com/rajivgowda"&gt;@rajivgowda&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt; are talking abt proactive disclosure as a key part of &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; strategy &lt;a href="https://twitter.com/hashtag/openData?src=hash"&gt;#openData&lt;/a&gt; &lt;a href="https://twitter.com/DataPortalIndia"&gt;@DataPortalIndia&lt;/a&gt;&lt;/p&gt;
— sumandro (@ajantriks) &lt;a href="https://twitter.com/ajantriks/status/677447609502445568"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes'&gt;https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>NASSCOM</dc:subject>
    
    
        <dc:subject>DSCI</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2016-01-19T07:58:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-futures-of-indian-languages-2015">
    <title>Consultation on 'Digital Futures of Indian Languages'</title>
    <link>https://cis-india.org/raw/digital-futures-of-indian-languages-2015</link>
    <description>
        &lt;b&gt;A consultation on 'digital futures of Indian languages' will be held at the CIS office in Bangalore on December 12, 2015,  to generate ideas and structure the Indian languages focus area of the CSCS Digital Innovation Fund (CDIF). It is being led by Dr. Tejaswini Niranjana, Centre for the Study of Culture and Society (CSCS), and Tanveer Hasan, A2K programme at CIS; and is supported by CDIF.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;A Consultation to Generate Ideas for the CSCS Digital Innovation Fund (CDIF)&lt;/h2&gt;
&lt;p&gt;We at the Centre for the Study of Culture and Society, Bangalore; Centre for Indian Languages in Higher Education, Tata Institute of Social Sciences, Mumbai; and Access to Knowledge Programme, Centre for Internet and Society, Bangalore, have between us more than a decade-long experience in the field of Indian languages for higher education and Indic language computing. Together we have, over the past ten years, produced new research and incubated innovative pilot projects to stimulate the use of Indian languages in higher education, especially in the context of a widening linguistic divide in that sphere.&lt;/p&gt;
&lt;p&gt;As a new phase in this process, we would like to explore the possible digital futures of Indian languages. Already, there have been many interesting but sporadic attempts at digitization of Indian language text resources and development of software for translation between Indian languages and a host of Indian language support platforms for web-based services. While this momentum is impressive, a lot more remains to be done, when seen against the backdrop of the surging demand for Indian language computational tools, especially those with potential for knowledge-use, that is, tools which could be used by students, teachers, researchers, media analysts, self-learners, bibliographers, librarians, archivists, collectors and the public at large.&lt;/p&gt;
&lt;p&gt;The &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund" target="_blank"&gt;CSCS Digital Innovation Fund&lt;/a&gt; is looking to help set up new platforms that aid in generating, processing and making available a wide range of born-digital content. Under the CDIF, the Indian Languages initiative will support the development of new technological aids, apps, software programmes, websites, DYI digitisation devices, and any other project which will enrich the digital use of Indian languages.&lt;/p&gt;
&lt;p&gt;We are organising this national consultation with the intention of bringing together people who have been or would like to be involved in such initiatives. We expect each participant to make a short 10-15 minute presentation on an idea they would like to develop, to take part in the general discussions, and to offer feedback to other speakers. We hope to learn from these conversations so that our own research and initiative development will benefit from the inputs as also to contribute to the conversation in such a way that isolated practices, innovations and opportunities are given a platform for greater generalisation and scalability.&lt;/p&gt;
&lt;p&gt;- &lt;em&gt;&lt;strong&gt;Tejaswini Niranjana, Ashwin Kumar AP, and Tanveer Hasan&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-futures-of-indian-languages-2015'&gt;https://cis-india.org/raw/digital-futures-of-indian-languages-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Language</dc:subject>
    
    
        <dc:subject>CDIF</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>Indic Computing</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-01-15T06:10:57Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-selected-sessions">
    <title>Internet Researchers' Conference 2016 (IRC16) - Selected Sessions</title>
    <link>https://cis-india.org/raw/irc16-selected-sessions</link>
    <description>
        &lt;b&gt;We are proud to announce that the first Internet Researchers' Conference (IRC16), organised around the theme of 'studying internet in India,' will be held on February 26-28, 2016, at the Jawaharlal Nehru University (JNU), Delhi. We are deeply grateful to the Centre for Political Studies (CPS) at JNU for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for generously supporting it. Here are the details about the session selection process, the selected sessions, the Conference programme (draft), the pre-Conference discussions, accommodation, and travel grants. The Conference will include a book sprint to produce an open handbook on 'methods and tools for internet research.'&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session Selection Process&lt;/h2&gt;
&lt;p&gt;We received 23 superb session proposals for the IRC16. All the teams that submitted sessions were invited to vote for their eight favourite session in a double-blind manner - the teams did not know the names of the people who proposed other sessions, and we at CIS did not know which team has voted for which particular set of sessions. After receiving all the votes, we could not help but change the format of the Conference (as planned earlier) to accommodate 15 sessions in total. All Discussion and Workshop sessions of the Conference are double track, except for the three Discussion sessions that received most number of votes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Selected Sessions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitaldesires"&gt;&lt;strong&gt;#DigitalDesires&lt;/strong&gt;&lt;/a&gt;: Received 8.15% votes. Proposed by Silpa Mukherjee, Ankita Deb, and Rahul Kumar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-followthemedium"&gt;&lt;strong&gt;#FollowTheMedium&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Zeenab Aneez and Neha Mujumdar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-stsdebates"&gt;&lt;strong&gt;#STSDebates&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Sumandro Chattapadhyay and Jahnavi Phalkey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitalliteraciesatthemargins"&gt;&lt;strong&gt;#DigitalLiteraciesAtTheMargins&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Aakash Solanki, Sandeep Mertia, and Rashmi M.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-internetmovements"&gt;&lt;strong&gt;#InternetMovements&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Becca Savory, Sarah McKeever, and Shaunak Sen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-futurebazaars"&gt;&lt;strong&gt;#FutureBazaars&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Maitrayee Deka, Adam Arvidsson, Rohini Lakshané, and Ravi Sundaram.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-minimalcomputing"&gt;&lt;strong&gt;#MinimalComputing&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Padmini Ray Murray and Sebastian Lütgert.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-webofgenealogies"&gt;&lt;strong&gt;#WebOfGenealogies&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Ishita Tiwary, Sandeep Mertia, and Siddharth Narrain.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-wikishadows"&gt;&lt;strong&gt;#WikiShadows&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Tanveer Hasan and Rahmanuddin Shaik.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-literaryspaces"&gt;&lt;strong&gt;#LiterarySpaces&lt;/strong&gt;&lt;/a&gt;: Received 5.43% votes. Proposed by P.P. Sneha and Arup Chatterjee.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-archiveanarchy"&gt;&lt;strong&gt;#ArchiveAnarchy&lt;/strong&gt;&lt;/a&gt;: Received 4.34% votes. Proposed by Ranjani M Prasad and Farah Yameen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-afcinema2.0"&gt;&lt;strong&gt;#AFCinema2.0&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Akriti Rastogi and Ishani Dey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-manypublicsofinternet"&gt;&lt;strong&gt;#ManyPublicsOfInternet&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Sailen Routray and Khetrimayum Monish.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-politicsonsocialmedia"&gt;&lt;strong&gt;#PoliticsOnSocialMedia&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Rinku Lamba and Rajarshi Dasgupta.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-spottingdata"&gt;&lt;strong&gt;#SpottingData&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Dibyajyoti Ghosh and Purbasha Auddy.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the &lt;a href="http://jnu.ac.in/"&gt;&lt;strong&gt;Jawaharlal Nehru University (JNU)&lt;/strong&gt;&lt;/a&gt;, Delhi. We are delighted to announce that the Conference will be hosted by the &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;&lt;strong&gt;Centre for Political Studies (CPS)&lt;/strong&gt;&lt;/a&gt; at JNU, and will be generously supported by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;&lt;strong&gt;CSCS Digital Innovation Fund (CDIF)&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conference Programme&lt;/h2&gt;
&lt;p&gt;Access the draft programme (v.2.1): &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.1.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Pre-Conference Conversations&lt;/h2&gt;
&lt;p&gt;Please join the researchers@cis-india mailing list to take part in the pre-conference conversations: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Accommodation&lt;/h2&gt;
&lt;p&gt;CPS and CIS will provide accommodation to all non-Delhi-based team members of the selected sessions, during the days of the Conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Travel Grants&lt;/h2&gt;
&lt;p&gt;We will offer 10 travel grants, up to Rs. 10,000 each, for within-India travel. The following non-Delhi-based team members of the selected sessions have been selected for travel grants: Aakash Solanki, Dibyajyoti Ghosh, Neha Mujumdar, Purbasha Auddy, Rahmanuddin Shaik, Rashmi M, Rohini Lakshané, Sailen Routray, P.P. Sneha, and Zeenab Aneez.&lt;/p&gt;
&lt;p&gt;The travel grants are made possible by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-selected-sessions'&gt;https://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-18T09:23:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/approaching-open-research-via-open-data-2015">
    <title>Approaching Open Research via Open Data - Presentation at TERI, December 22, 2015</title>
    <link>https://cis-india.org/openness/approaching-open-research-via-open-data-2015</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, organised a seminar on 'Open Access in Research Area: A Strategic Approach' on December 22, 2015. We supported the seminar as a knowledge partner. Sumandro Chattapadhyay was invited to deliver a special address. Here are the notes and slides from the presentation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The brief presentation foregrounded &lt;em&gt;open data&lt;/em&gt; as a crucial part of open research, and also as an instrument of opening up research for public consumption, discussion, and scrutiny.&lt;/p&gt;
&lt;p&gt;The presentation started with reference to the &lt;a href="http://cis-india.org/openness/open-access-dialogues-report"&gt;Open Access Dialogues&lt;/a&gt; organised by The African Commons Project and the Centre for Internet and Society during November 2012 to March 2013 that explored the global open access agenda from a developing world perspective.&lt;/p&gt;
&lt;p&gt;I noted that one of the key findings from the Indian participants of the online consultations organised as part of the Open Access Dialogues was the need for a &lt;em&gt;broader vision of open access&lt;/em&gt;. Open research data is a key component of this broader vision of open access and open research.&lt;/p&gt;
&lt;p&gt;There was a brief discussion of how to start doing and thinking about open data as an approach to open research. I highlighted the need to get started on 1) getting government to open up data relevant to research, 2) opening up academic research data, and 3) sectoral conversations on data standards (technical and semantic); as well as the need to think about 1) open data as bridge across disciplinary communities, 2) quantification of life and the widening sphere of research data, and 3) academic research and public life.&lt;/p&gt;
&lt;p&gt;In next slides, I quickly mentioned the international processes going on in the open data landscape - the conversation on open data and Sustainable Development Data, the possibility of using big (social and telecom) data for purposes of development monitoring, and the International Open Data Charter as a set of global principles for open data.&lt;/p&gt;
&lt;p&gt;More about the seminar: &lt;a href="http://cis-india.org/openness/teri-seminar-on-open-access-in-research"&gt;http://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/la5ulZYBT15DiL" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/approaching-open-research-via-open-data-2015'&gt;https://cis-india.org/openness/approaching-open-research-via-open-data-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-01-12T14:37:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance">
    <title>Pre-Budget Consultation 2016 - Submission to the IT Group of the Ministry of Finance</title>
    <link>https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance</link>
    <description>
        &lt;b&gt;The Ministry of Finance has recently held pre-budget consultations with different stakeholder groups in connection with the Union Budget 2016-17. We were invited to take part in the consultation for the IT (hardware and software) group organised on January 07, 2016, and submit a suggestion note. We are sharing the note below. It was prepared and presented by Sumandro Chattapadhyay, with contributions from Rohini Lakshané, Anubha Sinha, and other members of CIS.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is our distinct honour to be invited to submit this note for consideration by the IT Group of the Ministry of Finance, Government of India, as part of the pre-budget consultation for 2016-17.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society is (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. We receive financial support from Kusuma Trust, Wikimedia Foundation, MacArthur Foundation, IDRC, and other donors.&lt;/p&gt;
&lt;p&gt;We have divided our suggestions into the different topics that our organisation has been researching in the recent years.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Free/Libre and Open Source Software (FLOSS) is the Basis for Digital India&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We congratulate the policies introduced by the government to promote use of free/libre and open source software and that of open APIs for all e-governance projects and systems. This is not only crucial for the government to avoid vendor lock-in when it comes to critical software systems for governance, but also to ensure that the source code of such systems is available for public scrutiny and do not contain any security flaws.&lt;/p&gt;
&lt;p&gt;We request the government to empower the implementation of these policies by making open sharing of source code a necessity for all software vendors hired by government agencies a necessary condition for awarding of tenders. The 2016-17 budget should include special support to make all government agencies aware and capable of implementing these policies, as well as to build and operate agency-level software repositories (with version controlling system) to host the source codes. These repositories may function to manage the development and maintenance of software used in e-governance projects, as well as to seek comments from the public regarding the quality of the software.&lt;/p&gt;
&lt;p&gt;Use of FLOSS is not only important from the security or the cost-saving perspectives, it is also crucial to develop a robust industry of software development firms that specialise in FLOSS-based solutions, as opposed to being restricted to doing local implementation of global software vendors. A holistic support for FLOSS, especially with the government functioning as the dominant client, will immensely help creation of domestic jobs in the software industry, as well as encouraging Indian programmers to contribute to development of FLOSS projects.&lt;/p&gt;
&lt;p&gt;An effective compliance monitoring and enforcement system needs to be created to ensure that all government agencies are  Strong enforcement of the 2011 policy to use open source software in governance, including an enforcement task force that checks whether government departments have complied with this or not.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Open Data is a Key Instrument for Transparent Decision Making&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With a wider set of governance activities being carried out using information systems, the government is increasingly acquiring a substantial amount of data about governance processes and status of projects that needs to be effectively fed back into the decision making process for the same projects. Opening up such data not only allows for public transparency, but also for easier sharing of data across government agencies, which reduces process delays and possibilities of duplication of data collection efforts.&lt;/p&gt;
&lt;p&gt;We request the 2016-17 budget to foreground the National Data Sharing and Accessibility Policy and the Open Government Data Platform of India as two key enablers of the Digital India agenda, and accordingly budget for modernisation and reconfiguration of data collection and management processes across government agencies, so that those processes are made automatic and open-by-default. Automatic data management processes minimise the possibility of data loss by directly archiving the collected data, which is increasingly becoming digital in nature. Open-by-default processes of data management means that all data collected by an agency, once pre-recognised as shareable data (that is non-sensitive and anonymised), will be proactively disclosed as a rule.&lt;/p&gt;
&lt;p&gt;Implementation of the National Data Sharing and Accessibility Policy has been hindered, so far, by the lack of preparation of a public inventory of data assets, along  with the information of their collection cycles, modes of collection and storage, etc., by each union government agency. Specific budgetary allocation to develop these inventories will be crucial not only for the implementation of the Policy, but also for the government to get an extensive sense of data collected and maintained currently by various government agencies. Decisions to proactively publish, or otherwise, such data can then be taken based on established rules.&lt;/p&gt;
&lt;p&gt;Availability of such open data, as mentioned above, creates a wider possibility for the public to know, learn, and understand the activities of the government, and is a cornerstone of transparent governance in the digital era. But making this a reality requires a systemic implementation of open government data practices, and various agencies would require targeted budget to undertake the required capacity development and work process re-engineering. Expenditure of such kind should not be seen as producing government data as a product, but as producing data as an infrastructure, which will be of continuous value for the years to come.&lt;/p&gt;
&lt;p&gt;As being discussed globally, open government data has the potential to kickstart a vast market of data derivatives, analytics companies, and data-driven innovation. Encouraging civic innovations, empowered by open government data - from climate data to transport data - can also be one of the unique initiatives of budget 2016-17.&lt;/p&gt;
&lt;p&gt;For maximising impact of opened up government data, we request the government to publish data that either has a high demand already (such as, geospatial data, and transport data), or is related to high-net-worth activities of the government (such as, data related to monitoring of major programmes, and budget and expenditure data for union and state governments).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Promotion of Start-ups and MSMEs in Electronics and IT Hardware Manufacturing&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In line with the Make in India and Digital India initiatives, to enable India to be one of the global hubs of design, manufacturing, and exporting of electronics and IT hardware, we request that the budget 2016-17 focus on increasing flow of fund to start-ups and Medium and Small-Scale Manufacturing Enterprises (MSMEs) in the form of research and development grants (ideally connected to government, especially defense-related, spending on IT hardware innovation), seed capital, and venture capital.&lt;/p&gt;
&lt;p&gt;Generation of awareness and industry-specific strategies to develop intellectual property regimes and practices favourable for manufacturers of electronics and IT hardware in India is an absolutely crucial part of promotion of the same, especially in the current global scenario. Start-ups and MSMEs must be made thoroughly aware of intellectual property concerns and possibilities, including limitations and exceptions, flexibilities, and alternative models such as open innovation.&lt;/p&gt;
&lt;p&gt;We request the budget 2016-17 to give special emphasis to facilitation of technology licensing and transfer, through voluntary mechanisms as well as government intervention, such as compulsory licensing and government enforced patent pools.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Applied Mathematics Research is Fundamental for Cybersecurity&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Recent global reports have revealed that some national governments have been actively involved in sponsoring distortion in applied mathematics research so as to introduce weaknesses in encryption standards used in for online communication. Instead of trying to regulate key-length or mandating pre-registration of devices using encryption, as suggested by the withdrawn National Encryption Policy draft, would not be able to address this core emerging problem of weak cybersecurity standards.&lt;/p&gt;
&lt;p&gt;For effective and sustainable cybersecurity strategy, we must develop significant expertise in applied mathematical research, which is the very basis of cybersecurity standards development. We request the budget 2016-17 to give this topic the much-needed focus, especially in the context of the Digital India initiative and the upcoming National Encryption Policy.&lt;/p&gt;
&lt;p&gt;Along with developing domestic research capacity, a more immediately important step for the government is to ensure high quality Indian participation in global standard setting organisations, and hence to contribute to global standards making processes. We humbly suggest that categorical support for such participation and contribution is provided through the budget 2016-17, perhaps by partially channeling the revenues obtained from spectrum auctions.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance'&gt;https://cis-india.org/openness/pre-budget-consultation-2016-submission-to-the-ministry-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2016-01-12T13:34:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/raw-lectures-02-anil-menon">
    <title>RAW Lectures #02: Anil Menon on 'Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom' </title>
    <link>https://cis-india.org/raw/raw-lectures-02-anil-menon</link>
    <description>
        &lt;b&gt;Anil Menon will give a talk on 'Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom' at the Centre for Internet and Society's office in Bangalore on Wednesday, January 13, 2016 at 6 pm. Please join us for tea and coffee before the lecture at 5.30 pm.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Update: The video recording of the lecture can be accessed &lt;a href="http://cis-india.org/raw/raw-lectures-02-anil-menon-video"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The RAW Lectures series was initiated by the Researchers at Work (RAW) programme to take stock, reflect, and chart courses into the studies of Internet in/from India. The lectures address the experiences and practices of Internet in India as plural and intertwined with longer-duration processes. The lectures also critically respond to the questions around the methods of studying Internet in/from India, and the opportunities and challenges of studying Indian society on/through the Internet.&lt;/p&gt;
&lt;p&gt;It gives us great pleasure to announce that Anil Menon will present the second lecture of the series on Wednesday, January 13, 2016, at 6 pm.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="raw-lectures-02-anil-menon/leadImage" alt="RAW Lectures #02 - Anil Menon - Poster" height="423" width="300" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Undermining the Tyrant’s Protocols: Speculative Fiction and Freedom&lt;/h3&gt;
&lt;p&gt;Story-telling, like the internet, depends on the existence of fixed protocols between the sender and the receiver. However,  by manipulating ambiguity and contexts, speculative fiction constantly creates new and ever-changing protocols of reading. This makes it hard to define what exactly speculative fiction is. Spec-fic may be described as a catch-all term to describe genres such as magic-realism, fabulist fiction, slipstream, science-fiction, fantasy and various fusions thereof.  In my talk, I will outline the history of spec-fic on the subcontinent, and show how it was used by authors such as Kylas Chundar Dutt to undermine imperialist narratives. In the last decade, the internet, which may be conceived as a speculative network, has emerged as another such tool. Internet access in India is growing at an extraordinary rate, but less well-known is the fact that Indian spec-fic is also undergoing a rather remarkable renaissance. I will show that these two threads of development are related, mutually reinforcing, and point to an interesting metaphor of speculative sovereignity, perhaps unique to India, and that serves to undermine any would-be tyrant’s protocols.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Anil Menon&lt;/h3&gt;
&lt;p&gt;Anil Menon’s research work has appeared in peer-reviewed journals such as &lt;em&gt;Intl J. of Neural Networks&lt;/em&gt;, &lt;em&gt;Neural Proc. Letters&lt;/em&gt;, &lt;em&gt;IEEE Trans On Evolutionary Computation&lt;/em&gt;, &lt;em&gt;Foundations of Genetic Algorithms&lt;/em&gt;, &lt;em&gt;British J. of the History of Science&lt;/em&gt;, and &lt;em&gt;Small Business Economics&lt;/em&gt;. His short fiction has appeared in a variety of magazines and anthologies including &lt;em&gt;Interzone&lt;/em&gt;, &lt;em&gt;Interfictions&lt;/em&gt;, &lt;em&gt;Strange Horizons&lt;/em&gt;, &lt;em&gt;Jaggery Lit Review&lt;/em&gt;, and &lt;em&gt;Lady Churchill’s Rosebud Wristlet&lt;/em&gt;. His stories have been translated into German, French, Chinese, Romanian and Hebrew. His debut novel &lt;em&gt;The Beast With Nine Billion Feet&lt;/em&gt; (Zubaan Books, 2010) was short-listed for the 2010 Vodafone-Crossword award and the Carl Brandon Society's 2011 Parallax Award. Along with Vandana Singh, he co-edited &lt;em&gt;Breaking the Bow&lt;/em&gt; (Zubaan Books 2012), an international anthology of speculative fiction inspired by the Ramayana epic. His most recent work is the novel &lt;em&gt;Half Of What I Say&lt;/em&gt; (Bloomsbury, 2015).&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="http://anilmenon.com/"&gt;http://anilmenon.com/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/raw-lectures-02-anil-menon'&gt;https://cis-india.org/raw/raw-lectures-02-anil-menon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>RAW Lectures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Protocols</dc:subject>
    

   <dc:date>2016-02-09T08:43:57Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/cis_2016.01.22_gk.png">
    <title>Gene Kogan - A.I. Hype Cycles and Artistic Subversions</title>
    <link>https://cis-india.org/cis_2016.01.22_gk.png</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/cis_2016.01.22_gk.png'&gt;https://cis-india.org/cis_2016.01.22_gk.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-01-01T07:51:36Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/open-access-dialogues-report">
    <title>Open Access Dialogues - Report and Policy Recommendations</title>
    <link>https://cis-india.org/openness/open-access-dialogues-report</link>
    <description>
        &lt;b&gt;The Open Access Dialogues were a series of global electronic debates facilitated by Eve Gray and Kelsey Wiens, in partnership with The African Commons Project (South Africa) and the Centre for Internet and Society (India), during November  2012 to March 2013. It was supported by the Institute of Development Studies, Sussex, and was hosted at WSIS Knowledge Communities Discussion Forum.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Report: &lt;a href="https://www.ids.ac.uk/files/dmfile/OpenAccessDialoguesReport.pdf" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h3&gt;
&lt;h3&gt;Policy Recommendations (as below): &lt;a href="https://www.ids.ac.uk/files/dmfile/Is_OpenAccess_only_for_rich_countries.pdf" target="_blank"&gt;Download&lt;/a&gt; (PDF)&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Is Open Access Only for Rich Countries?&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Authors: Eve Gray, Sumandro Chattapadhyay, Kelsey Wiens and Alistair Scott&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;It is not unusual for analysis of research systems in the developing world to provide startlingly low figures for the participation of developing countries in world research. For example, the Times of India last October cited a report that claimed that India produced only 3.5% of the world’s research – a shocking statistic, the newspaper commented. The commonly accepted figure for Africa’s contribution is even worse, at 0.3%. In reality, these figures do not reflect at all the size and shape of the national research systems in these count ries nor their productivity. Rather, they are a measure of how many journal articles are published in journals in the global North and particularly in journals in the Thomson Reuters ISI indices.&lt;/p&gt;
&lt;p&gt;The developing world has been badly served by the scholarly publishing system inherited from the 20th century. The commercialization and consolidation of scholarly publishing over the last 60 years has progressively put the publication of the bulk of the world’s research in the hands of a small number of giant co rporations, in an environment characterized by very high and continuously escalating subscription charges, putting access to the world’s research out of the reach of most developing countries. If Harvard complains, as it did recently, that it cannot afford the subscriptions to the major journals, then what could be said for universities in Africa or India?&lt;/p&gt;
&lt;p&gt;To add to this, the impact of the dominant systems for measuring the quality and impact of global research have a perverse effect in the developing world, consigning its research to the periphery and categorizing it as of ‘local’ interest rather than being ‘global’, or ‘international’ in its importance.&lt;/p&gt;
&lt;h3&gt;Global Open Access Policy&lt;/h3&gt;
&lt;p&gt;Global Open access policy moved forward decisively from late 2011 to early 2013, with UNESCO’s launch of its Open Access to Scientific Information Programme &lt;strong&gt;[1]&lt;/strong&gt; and the World Bank’s launch of its Open Knowledge Platform &lt;strong&gt;[2]&lt;/strong&gt;. At national and regional levels, the Finch Group Report in the United Kingdom &lt;strong&gt;[3]&lt;/strong&gt;, the White House Memorandum on Access to Federally Funded Research &lt;strong&gt;[4]&lt;/strong&gt; in the US A and the announcement of the open access provisions of the Horizon 2020 Framework for Research and Innovation &lt;strong&gt;[5]&lt;/strong&gt; in the European Union all marked a global move to entrench open access to publicly funded research. These policies commit political weight and financial support to policy implementation, based on an understanding of the contribution that OA can make to innovation and thus to social and economic development across the world. In the face of these developments, the developing countries, which currently tend to have fragmented OA and research communication policies, face the risk of falling even further behind in finding their place in global and locally relevant research production.&lt;/p&gt;
&lt;p&gt;What these events have added to the policy debate about open access over the last year is not only the recognition of the need for government - level logistical and financial support for open research communication, but also a widening of the mandate for open access. Early formulations of open access policy focused on opening up ‘the peer reviewed journal literature’, as the founding document on Open Access, the Budapest Open Access initiative, defined it in 2002 &lt;strong&gt;[6]&lt;/strong&gt;. The principle was that these publications should be freely available to readers, to read, to download and data-mine.. It is this approach that largely informs the UNESCO’s Policy Guidelines for the Development and Promotion of Open Access (2012) &lt;strong&gt;[7]&lt;/strong&gt;. The World Bank policy, on the other hand, takes a broader view of open access, applying a Creative Commons CC-BY licence to the work that it commissions, thus allowing for reuse and repurposing of content in order to reach the widest possible audience and have the maximum development impact &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Open Access Dialogues&lt;/h3&gt;
&lt;p&gt;A number of policy issues emerged from the Open Access Dialogues (OAD), facilitated by Eve Gray, The African Commons Project and the Centre for Internet and Society, Bangalore, India, in late 2012 and early 2013 with participants from South Africa, India and Latin America. The overriding policy outcome was an expressed desire to expand the concept of open access to include other kinds of openness, such as open education and open development and to expand beyond journal articles in leveraging the benefits of openness in developing countries, as well as involving outside - university knowledge producers and distributors in the OA agenda. O ver - reliance on the ISI Impact Factor was also a key aspect of the present OA system that came in for criticism , leading to demands for the formulation of research reward systems that are better aligned with national and institutional research strategies and development of alternative metrics for evaluating research success.&lt;/p&gt;
&lt;p&gt;The discuss ion took place on the UNESCO/WSIS Knowledge Communities discussion forum, where a total of 19 discussants, excluding the core team, took part. Additionally, the OAD Facebook page was ‘liked’ by 116 people (as of 1 March 2013), with the most common age grou p being 25 - 34 and the gender bias being towards female users at 60%. Two (one hour - long) Twitter discussions were also organised, which attracted 83 unique users in total, who shared 530 tweets using the #developOA hashtag.&lt;/p&gt;
&lt;h3&gt;Strategic Issues and Policy Recommendations&lt;/h3&gt;
&lt;h4&gt;Beyond the Impact Factor&lt;/h4&gt;
&lt;p&gt;The ISI Impact Factor (IF) remains the dominant measure for research evaluation and determining academic rewards and promotions in the Anglophone world and beyond. The discussants identified the extreme preference for publication in ('closed') journals with high Impact Factors (IF) as a central obstacle to effective research communication aligned with national and regional goals. Of particular concern was the role this system has had in aligning developing country research activities with academic interests in the universities of the global North, and thus di verting developed country research away from local challenges and opportunities. This model also renders invisible much of the research that is actually produced that addresses local/national/regional concerns. Another concern was bibliographic malpractices including bias against citing works from developing country scholars and work published in non - 'prestigious' journals. Strong argument s were made for the use of article-level metrics as opposed to journal - level impact measurement . Studies were suggested to argue that article-level impact increases with OA journals.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Policy recommendations:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Replacing reliance on bibliometric s and journal-level citation indexes with article-level metrics and emerging alternative metrics that take into consideration the circulation and usage of knowledge beyond higher education institutes.&lt;/li&gt;
&lt;li&gt;Developing education policies and guidelines to evaluate res earch and researchers in their specific contexts of relevance and impact, and aligning academic rewards with national, regional and local development strategies.&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Uneven Geographies and the Need for Sustainable Models&lt;/h4&gt;
&lt;p&gt;Attention was drawn to the unfortunate lack of awareness about the nature and potential of OA across developing countries, even in scholarly communities. Simultaneously, the discussants highlighted several success stories of OA journals in developing countries, though mostly from science disciplines. Thus the developing world experiences an uneven geography of OA awareness and adoption, where the OA agenda is being pursued successfully by specific scholarly communities but not translating into widespread support across the higher academia landscape nor into coherent national policy development.&lt;/p&gt;
&lt;p&gt;The role played by the global commercial businesses of scholarly works in impeding the Open Access agenda in developing countries was mentioned by most of the commentators. Simultaneously, the complicity of developing country academics in reinforcing the culture of 'prestigious' journals published by global publishers was also criticized. The increasing embracing of Author Processing Charges (APC), the discussants feared, will further entrench this uneven geography of OA adoption and research visibility. This issue is crucial since it is generating a sense of cynicism about OA as yet another incarnation of commercial exploitation of scholarship that advantages the rich countries. The use of fee waivers was criticised for being only an exceptional measure that serves to reinforce exclusion of researchers outside of or new to the dominant scholarly publishing system. There is a need, it was argued, to develop a sustainable business model that is functional in making knowledge circulate in ways that are useful to society, and not solely driven by profit-making needs of publishers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Policy recommendations:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Promoting a bottom-up strategy for OA adoption in the developing world by focusing on capacity and community building exercises. This could involve scholarly colleagues and advocates gathered around thematic and/or disciplinary forums, facilitated by institutional and governmental recognition and support.&lt;/li&gt;
&lt;li&gt;Linking the issue of OA to academic works to the structural problems in developing country academics, adopting a wide-ranging and systematic approach to research capacitation. There is a need to promote OA through curriculum development, knowledge dissemination, training and advocacy, engaging actors ranging from senior administrators to young scholars.&lt;/li&gt;
&lt;li&gt;Addressing and involving non-university circuits of learning, of both institutional (primary and secondary education) and non-institutional (informal learning groups around MOOC courses) varieties, and also non-governmental organisations working o n education in particular, and development in general.&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;A Broader Vision for Open Access&lt;/h4&gt;
&lt;p&gt;A number of discussants argued for a broader mandate for OA than the traditional journal focus. There were two aspects to this recommendation: firstly, OA should align with other forms of ‘open’ agendas , such as open science, open education and open development, and secondly, OA policies should support distribution and re - usage of a wider range of research outputs. Thus the scope of OA needs to be broadened to focus on the needs of potential consumers of research findings rather than only on the scholar-to-scholar discourse that journals constitute. This wider agenda could include research data, multimedia, 'grey literature ’ such as research and briefing papers, and policy papers. In the context of developing countries, it was argued that 'translations' of research for communities outside academia were important, especially ' recognizing the importance of publishing in a format that most appropriately meets the information and knowledge needs of those who can use the research to improve society's development', as a leading public health academic argued in the OA dialogue.&lt;/p&gt;
&lt;p&gt;This broader vision of OA challenges the conventional hierarchy of basic research over applied research, proposing that OA can provide a communicative continuum between scholar - to - scholar discourse, teaching and learning needs, and the mobilization of research for development.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Policy recommendations:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Build on the present governmental acceptance of the OA agenda by strategically using it as an entry point to promote the broader 'open' agenda, including open sharing of research data, bibliographic data, policy papers etc.&lt;/li&gt;
&lt;li&gt;Recognize, support and reward OA initiatives and systems that facilitate sharing of a wide range of academic outputs, from journals, books and other scholarly publications to development - focused research outputs targeted at communities outside of higher academia.&lt;/li&gt;
&lt;li&gt;Financial and logistical support for the creation and maintenance of websites, repositories, archives and other (offline/outreach) initiatives aimed at hosting and sharing a wide-range of academic outputs, including data and multimedia, and mandating licences that allow for re-use of scholarly materials ( such as CC-BY), for development and educational needs.&lt;/li&gt;
&lt;li&gt;A comprehensive (national and international) institutional policy approach, ensuring a central role for research communication in universities and research institutes and for integrated administrative, technology and skills infrastructure to support these roles.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Notes&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: http://www.unesco.org/new/en/communication-and-information/access-to-knowledge/open-access-to-scientific-information/&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: https://openknowledge.worldbank.org/&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; The Finch Report: http://www.res earchinfonet.org/wp-content/uploads/2012/06/Finch-Group-report-executive-summary-FINAL-VERSION.pdf&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; The White House Open Access Memorandum: https://petitions.whitehouse.gov/response/increasing-public-access-results-scientific-research&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; http://europa.eu/rapid/press-release_IP-12-790_en.htm&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; http://www.opensocietyfoundations.org/openaccess/read&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; http://www.unesco.org/new/en/communication-and-information/resources/publications-and-communication-materials/publications/full-list/policy-guidelines-for-the-development-and-promotion-of-open-access/&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; http://web.worldbank.org/WBSITE/EXTERNAL/NEWS/0,,contentMDK:23164491~pagePK:64257043~piPK:437376~theSitePK:4607,00.html&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/open-access-dialogues-report'&gt;https://cis-india.org/openness/open-access-dialogues-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access Dialogues</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-12-22T06:52:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/teri-seminar-on-open-access-in-research">
    <title>Seminar on Open Access in Research Area: A Strategic Approach</title>
    <link>https://cis-india.org/openness/teri-seminar-on-open-access-in-research</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, is organising a seminar on open access in research on Tuesday, December 22, 2015. The seminar will focus on: 1) wider access to scientific publications and research data, 2) access to scientific information, and 3) challenges and opportunities of research data. The Centre for Internet and Society is supporting the event as a Knowledge Partner.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Background&lt;/h2&gt;
&lt;p&gt;Open Access has become central importance to advancing the interests of researchers, scholars, students, business, and the public as well as librarians. Increasingly, research institutions require researchers to publish articles that report research findings openly accessible in open domain.&lt;/p&gt;
&lt;p&gt;Open Access pursues to yield scholarly publishing to spread knowledge and allow that knowledge to be built upon. Price barriers should not stop researchers from getting access to research data. Open Access, and the open availability and search ability of scholarly research that it entails, will have a significant positive impact on everything from education to the research practice in various fields.&lt;/p&gt;
&lt;p&gt;To explore why Open Access is so important to a number of groups, TERI Library along with The Centre for Internet &amp;amp; Society (CIS) as Knowledge Partner is organizing a half day seminar on &lt;em&gt;Open Access in Research Areas: a Strategic Approach&lt;/em&gt; on December 22, 2015 at TERI Seminar Hall, IHC, Lodhi Road, New Delhi.&lt;/p&gt;
&lt;p&gt;The Seminar will focus on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;wider access to scientific publications and research data&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;access to scientific information, and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;challenges and opportunities of research data.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Schedule&lt;/h2&gt;
&lt;p&gt;No registration is required to attend the seminar. Seats are limited, and will be provided on first-come-first-served basis.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;13:45 - 14:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration and Networking&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00 - 14:10&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome Address - &lt;strong&gt;Mr. Prabir Sengupta&lt;/strong&gt;, Distinguished Fellow and Director, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:10 - 14:20&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Special Address - &lt;strong&gt;Sumandro Chattapadhyay&lt;/strong&gt;, Research Director, The Centre for Internet and Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:20 - 14:35&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote Address - &lt;strong&gt;Dr. K.R. Murali Mohan&lt;/strong&gt;, Advisor, Big Data Initiatives Division, Department of Science and Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:35 - 14:50&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inaugural Address - &lt;strong&gt;Dr. Chandrima Shaha&lt;/strong&gt;, Director, National Institute of Immunology, New Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:50 - 15:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Setting the Theme and Vote of Thanks - &lt;strong&gt;Dr. P.K. Bhattacharya&lt;/strong&gt;, Fellow and Area Convenor, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00 - 15:30&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea and Refreshments&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 - 17:15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Plenary Session&lt;/strong&gt;&lt;br /&gt;
Chair: &lt;strong&gt;Dr. Ramesh Sharma&lt;/strong&gt;, Director, CEMCA&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Puneet Kishor&lt;/strong&gt;,  Researcher and Independent Consultant - "Science, Data, and Creative Commons"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Beth Sandore Namachchivaya&lt;/strong&gt;, Associate Dean of Libraries and Professor University of Illinois - "Developing Services, Infrastructure, and Best Practices to Conserve and Provide Access to Research Data: Challenges and Opportunities"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Usha Mujoo Munshi&lt;/strong&gt;, Librarian, Indian institute of Public Administration&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/teri-seminar-on-open-access-in-research'&gt;https://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2015-12-22T05:37:44Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/glam">
    <title>GLAM</title>
    <link>https://cis-india.org/openness/glam</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/glam'&gt;https://cis-india.org/openness/glam&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-12-15T08:26:04Z</dc:date>
   <dc:type>Collection</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-proposed-politicsonsocialmedia">
    <title>IRC16 - Proposed Session - #PoliticsOnSocialMedia</title>
    <link>https://cis-india.org/raw/irc16-proposed-politicsonsocialmedia</link>
    <description>
        &lt;b&gt;This is a session proposed for the Internet Researchers' Conference (IRC) 2016 by Dr. Rinku Lamba and Dr. Rajarshi Dasgupta, with Dr. Mohinder Singh, Professor Valerian Rodrigues and Professor Shefali Jha as co-members.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session&lt;/h2&gt;
&lt;p&gt;Indian politics had witnessed the entry of new social movements in the 1970s, adding a whole set of new issues, actors, and ways of activism to the older nationalist tradition. We suggest a similar change is now taking place, as different ways of governance and interventions aided by latest technologies are emerging in the social media. Websites, blogs, tweets, emails and online petitions are creating a new virtual space for politics, through information, propaganda, debates, appeals and mobilizations.&lt;/p&gt;
&lt;p&gt;The proposed session will discuss this emerging field of power, critically considering its democratic potential and interrogating the political issues and ideas at stake in it. The aim is to tackle the new forms of civic and
public-political engagements witnessed in the domain of social media, and analyze their implications for the theory and practice of democracy. In the process our papers would explore conceptual notions such as agency, political act and participation as well as notions of selfhood and subjectivity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Plan&lt;/h2&gt;
&lt;p&gt;We will present four papers, with a question-answer and discussion session at the end. The papers will be addressing broadly three kinds of concerns.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The first concern is to identify novel understandings of the political  and political acts in the social media. We ask the following questions in this regard: What are the political issues and ideas at stake and how do they affect conventional understandings of democracy? Who are the new actors outside the fray of party-centered politics and how do they see what is political in the acts of internet-users? How are political institutions including parties reacting to the phenomena?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The second concern relates to probing the new forms of political subjectivity that are emerging in this process. The questions here include: What kind of political actor is getting shaped by the forms of political participation engendered by the social media? How does the virtual nature of practice impact on questions of location and identity as determinants of political membership and political action? Is this nature of virtual participation too fluid for the state to control?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The third concern relates to the forms of exclusion and inclusion that virtual participation entails. This involves questions like: What kind of social capital is necessary for talking part in the process and does it cut across cultural and economic divisions? What kinds of interest drive the social media? How does it shape the meaning of political concepts like representation and rights, accountability and political agency?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It is likely that we will raise more questions than we can answer at this point. However, we think it is important to raise them all the more in keeping with the questions that make up the focus of the conference,
especially, the first question of how do we conceptualize, as an intellectual and political task, the mediation and transformation of social, cultural, political, and economic processes, forces, and sites through internet and digital media technologies in contemporary India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Readings&lt;/h2&gt;
&lt;p&gt;None.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-proposed-politicsonsocialmedia'&gt;https://cis-india.org/raw/irc16-proposed-politicsonsocialmedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Proposed Sessions</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2016-01-03T06:51:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-proposed-knowledgecommunity">
    <title>IRC16 - Proposed Session - #KnowledgeCommunity (Computing, Community and Knowledge Production: Problems and Prospects)</title>
    <link>https://cis-india.org/raw/irc16-proposed-knowledgecommunity</link>
    <description>
        &lt;b&gt;This is a session proposed for the Internet Researchers' Conference (IRC) 2016 by Ravikant.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session&lt;/h2&gt;
&lt;p&gt;Our session will approach the history of digital knowledge production and dissemination in India from the standpoint of community-oriented experiments and practices in tool making and resource-sharing in the vernacular domain, mainly Hindi. It will attempt to demonstrate that Hindi public domain represents a depth and diversity that is normally not visible to the monolingually-trained, English-only mode of cognition. We wish to argue that the diversity of content is symptomatic of a culture of deeply-ingrained culture of sharing in South Asia. Free software movement, especially its localisation units, Wikipedia and Web 2.0 platforms in general have played a stellar role in handing us the tools of creation, consumption and sharing beyond scripts. But the full potential of how much we can produce and share has not been realised.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Plan&lt;/h2&gt;
&lt;p&gt;We will try and present successful and unsuccessful cases in order to understand why certian efforts worked and not others, and try and suggest a few possible strategies of creative engagement with bhasha communities in general.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Readings&lt;/h2&gt;
&lt;p&gt;None.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-proposed-knowledgecommunity'&gt;https://cis-india.org/raw/irc16-proposed-knowledgecommunity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Proposed Sessions</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2016-01-03T06:54:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-proposed-wikishadows">
    <title>IRC16 - Proposed Session - #WikiShadows (Techno-Political Contours of Knowledge Production on Wikipedia)</title>
    <link>https://cis-india.org/raw/irc16-proposed-wikishadows</link>
    <description>
        &lt;b&gt; This is a session proposed for the Internet Researchers' Conference (IRC) 2016 by Tanveer Hasan and Rahmanuddin Shaik.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session&lt;/h2&gt;
&lt;p&gt;Wikipedia is a group project, and people in the group need to have separate pages to discuss changes and improvements to Wikipedia's content, be that an article, a policy, a help page, or something anything else. Reading these discussion pages is a vastly rewarding, slightly addictive, experience. Sometimes reading Wikipedia can ruffle feathers.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;E.g. 1:&lt;/p&gt;
&lt;p&gt;The song, Jana-gana-mana, composed originally in Bengali by Rabindranath Tagore, was adopted in its Hindi version by the Constituent Assembly as the National Anthem of India on January 24, 1950. It was first sung on December 27, 1911 at the Calcutta session of the Indian National Congress. [1]&lt;/p&gt;
&lt;p&gt;Whereas Wikipedia entry of National anthem mentions thus:&lt;/p&gt;
&lt;p&gt;"&lt;em&gt;Jana Gana Mana&lt;/em&gt; is the national anthem of India. Written in highly Sanskritised (Tatsama) Bengali." [2]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;E.g. 2:&lt;/p&gt;
&lt;p&gt;Are these beautiful waterfalls on the Kaveri River located in Tamil Nadu – or on the border between Tamil Nadu and Karnataka – or in Tamil Nadu on its border with Karnataka? Or is it really the Cauvery river, and Hogenakal Falls? [3]&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Whatever you believe, be sure to bring a (Google) map to the debate, and point out that your opponent's sources are not RS or NPOV!&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;E.g. 3:&lt;/p&gt;
&lt;p&gt;Born of Serbian parents in a part of the Austrian Empire, which a short time later became a part of the Hungarian half of Austria-Hungary and is now in Croatia. He eventually became a naturalized citizen of the US. [4]&lt;/p&gt;
&lt;p&gt;&lt;em&gt;So was he Serbian? Croatian? Austrian? Austro-Hungarian? Istro-Romanian? Jewish? American? Martian? You decide! But don't forget to leave an edit summary saying how pathetic it is to choose any other version. (Guess who are we talking about?) Clue: He is inventor par excellence.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In this day and age where information is often a touch and go process, a forgotten mode, a solitary quest towards creating knowledge sounds romantic (almost). Networked collaborations (such as Wikipedia) which have created Knowledge sites have led to democratic interpretation and assimilation of such knowledge. They also as a basic necessity have sprung up various modes of annotation, verifiability of the Knowledge thus produced and utility quotient of the same. After all, why create and hold on to information that no body really cares about.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Plan&lt;/h2&gt;
&lt;p&gt;In this discussion session, the co-leaders of the session shall attempt to peel out the benign face of the visible Wikipedia page(there is a hidden world out there) and discuss the political, technological and social contours of information available on Wikipedia. We shall take the participants through the various stages of discussion about a Wikipedia page and how discussions tend to alter the course of an article. How false consensus is proposed, consent is manufactured and how these efforts are usually defeated by 'Answer People' and 'Vandal Fighters'. It is no less of a war than the one between information and mis-information. The discussion on, calculus, for instance, was host to some sparring over whether the concept of "limit," central to calculus, should be better explained as an "average."&lt;/p&gt;
&lt;p&gt;This discussion session brings to the table questions of legitimisation of knowledge and the inherent hierarchies that operate even within open networks of collaboration and offers a critique on consumption oriented knowledge production. The session also aims to ask questions around  knowledge as an agent that has levelled some of the earlier existing contours but has introduced some of its own and how that has changed our usages and shapes our experiences.&lt;/p&gt;
&lt;p&gt;The session will involve an edit-a-thon on a topic that will be selected by the co-leaders of the session and live commentary on the discussion pages will be tracked for further analysis. The session intends to build a dialogue towards attempting to problematise the questions of the starkly hierarchical and segmented experiences that have played a significant role in production of knowledge in the era of new knowledge practices. The session also will question the 'best practices' in building consent in the present global techno-economic contours of the internet, and its effect on academic spaces, creative practice and intervention.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Readings&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Help:Using_talk_pages"&gt;Using Talk Pages&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Talk_page_guidelines"&gt;Talk page guidelines&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Tutorial/Talk_pages"&gt;Tutorial on Wikipedia talk pages&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Help:Introduction_to_talk_pages/1"&gt;Introduction to talk pages&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/raw/www.networkcultures.org/_uploads/%237reader_Wikipedia.pdf"&gt;A Wikipedia Reader (pdf, 6.6 MB)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-proposed-wikishadows'&gt;https://cis-india.org/raw/irc16-proposed-wikishadows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Proposed Sessions</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2016-01-03T06:57:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
