<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/indian-express-june-5-2016-nishant-shah-digital-native-control-a-backspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/not-a-goodbye-more-a-come-again"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information">
    <title>Facebook: A Platform with Little Less Sharing of Personal Information</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information</link>
    <description>
        &lt;b&gt;As Facebook becomes less personal, what happens to digital friendship?&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/eye-2016-facebook-social-personal-information-digital-friendship-2789325/"&gt;published in the Indian Express&lt;/a&gt; on May 8, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indianexpress.com/tag/facebook/"&gt;Facebook&lt;/a&gt; is worried. Even though usage is growing, something strange is happening on the social network. For the first time since it started its journey as a website to rate datable people on college campuses, to becoming the global reference point that defined friendship in the connected age, people are sharing less personal information on Facebook. For a social media network that positions itself largely as a space where our everyday, banal doings become newsworthy articulations, this is surprising news. But it is true. On Facebook, the traffic is high, but most of it is now sharing of external information. People are sharing links to news, to listicles, to videos, to blogs entries, to pictures and to information that they find interesting, but they are writing less and less about what it is that they are doing and feeling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ironically, this coincides with the latest change in Facebook’s “response” options, where the ubiquitous “Like” button can now expand to other emojis where you can also be appropriately angry, sad, surprised, or happy about the shared content. Even as Facebook is trying to get its users to qualify how they feel and give emotional value to their likes, people seem to be sharing even less of their private lives on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key ways of understanding this drop in people sharing their personal information is through the concept of “context collapse”. It has been a concern since the first instances of disembodied digital communication. In our everyday life, we make sense of information based on the different contexts that surround us. The person who authors the information, the setting within which that information reaches us, the emotional state that we are in when encountering the information, our sense of where we are when processing it, and the preparedness we have for receiving this information are all crucial parameters by which we make sense of the meaning of the information and also our response to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Facebook, the context within which information and transactions have made sense is “friendship”. The site’s USP was that you could bring in a variety of information, but you were always sharing it with friends. You could have a large audience, but this audience is formed of people you know, people you trust, people you add to your friend groups — there is a sense of intimacy, privacy, and casualness that marks the flow of information. You are able to talk, in an equal breath, about what you had for breakfast, your crush on a celebrity, your random acts of charity, and your strong political rant, one after the other, without requiring to think about what you are posting and how others will receive it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Facebook is not really a friendship platform. It is a company interested in selling our interactions and data to advertisers who can target us with content and information based on the patterns of our behaviour. To serve its advertisers better, Facebook started privileging “verified” information trying to ensure news and content producers higher attention and more eyeballs. This was further strengthened by their continued integration with third party vendors, who could push and pull information into the social world of Facebook, and is seen as one of the biggest reasons for this drop. Any newsfeed in the last few months has had equal amounts of professional and amateur content, leading to a context collapse, where you no longer feel like your Facebook feed is a private and intimate conversation with friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Facebook’s expansive integration of its products —WhatsApp chats, Instagram updates, and Tumblr posts all can collapse into one — produced a confusing space where the personal information that you were once happy to share with your friends, is suddenly being shared along with news and information. Also, digital behaviour works on mirroring, and we often shape our updates to match what we see on our timelines. If we more and more see external content rather than personal statuses, we also start sharing more third party news and links, thus producing a domino effect of everybody shying away from extremely personal or intimate moments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, for the millennials, has been the context within which friendship got structured. Its own transitions have now collapsed that context, leading people to think of it as a content aggregator. It is going to be interesting to see what happens to our digital friendships and networks if Facebook is no longer the space where they are housed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T02:38:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/indian-express-june-5-2016-nishant-shah-digital-native-control-a-backspace">
    <title>Digital native: Control A, Backspace</title>
    <link>https://cis-india.org/a2k/blogs/indian-express-june-5-2016-nishant-shah-digital-native-control-a-backspace</link>
    <description>
        &lt;b&gt;The rewriting of textbooks should not be compared to the collaborations on Wikipedia, which only goes by evidence.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/tech-news-technology/digital-native-control-a-backspace-2834199/"&gt;published in Indian Express&lt;/a&gt; on June 5, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I remember the first time I made an edit on Wikipedia — it was almost 10 years ago, and it was a heady feeling, to realise that here is a global encyclopaedia being written, and that I could be a part of it. It felt strange, because I was brought up to believe that authors are special people with specialised knowledge, which can only be validated from special institutions, and that authorship required years of practice and perseverance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a historic experiment by Nature magazine showed, that despite the average age of the then Wikipedia editor as somewhere in the late teens, articles in Wikipedia were not any more prone to error than in other established, institutionalised fountains of knowledge like the Encyclopaedia Britannica. In fact, not only were the non-specialised editors of Wikipedia spot on with their knowledge outputs, but that because of its iterative nature, errors, once spotted on Wikipedia could be immediately corrected, thus leading to a more robust source of knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two key principles helped Wikipedia establish this process of reliable and resilient knowledge systems — neutrality of viewpoint, and evidence-based knowledge. In the largely free and open space of Wikipedia editing, the one thing that remained constant is neutrality. Editors, despite their own biases, locations, contexts, experiences or embodied knowledges, could not introduce their opinions or original research into the Wikipedia articles. This necessarily meant that every truth and knowledge claim made in a Wikipedia article needs to be verified through a source. This source could come from different spaces and different formats, but it serves as objective evidence for the information being provided there. In instances — and there are thousands of them, if not more — where two editors disagreed on how to interpret an event, or how to describe a person or a thing, the edit-war was fuelled not by the I-said-You-said never-ending rhetoric, but by relying on the soundness of research conducted by external sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For some years now, Wikipedia has become the de facto global reference system, which still relies on volunteers and non-specialised editors to contribute to complex, complicated and very specialised domains of human knowledge production. Even when the editors are experts or scholars, their contribution has value and merit, only when it is supported by externally verifiable source that supports their view points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wikipedia has become one of the foundational models of the information web, that makes it clear that knowledge can be freely produced, consumed and circulated, and more importantly, it can be negotiated and contested, thereby making our scientific research practices relevant and pertinent beyond the hallowed and often closed halls of the university. Wikipedia became a prime example of how information can be revised, changed, mutated, updated, upcycled, and subjected to deep scrutiny as long as it is informed by an alignment towards neutrality and supported by evidence produced through research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I invoke these principles that have fostered one of the most magnificent pieces of collaborative human effort because it directly puts into contrast the revisionist, biased, authoritative and closed practices by which the Indian educational councils seem to be editing textbooks. The removal of the names of historical figures, the rewriting of history to reflect a biased, narrow and unsubstantiated narrative, the erasure of alternative histories and voices of protest and dissent, and the false planting of information which is grounded in the school of “People say” and the university of “I have heard” is an alarming development. Many people unfortunately think of this political revisionism as mimicking the wisdom of the crowds recounting and contestation of information on spaces like Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that these attempts at revising known facts and of producing religious histories of exclusion and violence are not the digital mode of information upcycling. These revisions are firmly rooted in a political agenda that seeks to sanctify the discriminatory violences of our neo-authoritarian governments. They remain challenged by the scholars in the field who have enough evidence — of archives, of tracts, of data, and of information — that show that this information is false. They are entrenched in the politics of power that insist that this is the only true account of things, excluding public discourse, and performing acts of censorship that discourage all access to scientific learning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proponents who want to Make in India, cannot limit their rhetoric only to economic production, but have to extend collaborative and connected making to knowledge and information production. And this entails the unmaking of these authoritarian and fascist attempts at justifying rumours as information, hate speech as free speech, and revisions as conversations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/indian-express-june-5-2016-nishant-shah-digital-native-control-a-backspace'&gt;https://cis-india.org/a2k/blogs/indian-express-june-5-2016-nishant-shah-digital-native-control-a-backspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-05T02:25:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital">
    <title>WhatsApps with fireworks, apps with diyas: Why Diwali needs to go beyond digital </title>
    <link>https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital</link>
    <description>
        &lt;b&gt;The idea of a 'digital' Diwali reduces our social relationships to a ledger of give and take. The last fortnight, I have been bombarded with advertisements selling the idea of a “Digital Diwali”. We have become so used to the idea that everything that is digital is modern, better and more efficient.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital/"&gt;published in the Indian Express&lt;/a&gt; on November 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I have WhatsApp messages with  exploding fireworks, singing greeting cards that chant mystic sounding  messages, an app that turns my smartphone into a flickering diya,  another app that remotely controls the imitation LED candles on my  windows, an invitation to Skype in for a puja at a friend’s house 3,000  km away, and the surfeit of last minute shopping deals, each one  offering a dhamaka of discounts.&lt;br /&gt;&lt;br /&gt;However, to me, the digitality  of Diwali is beyond the surface level of seductive screens and one-click  shopping, or messages of love and apps of light. Think of Diwali as  sharing the fundamental logic that governs the digital — the logic of  counting. As we explode with joy this festive season, we count our  blessings, our loved ones, the gifts and presents that we exchange. If  we are on the new Fitbit trend, we count the calories we consume and  burn as we make our way through parties where it is important to see and  be seen, compare and contrast, connect with all the people who could be  thought of as friends, followers, connectors, or connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  there is no denying that there is a sociality that the festival brings  in, there is also a cruel algebra of counting that comes along with it.  It is no surprise that as we celebrate the victory of good over evil and  right over wrong, we also simultaneously bow our heads to the goddess  of wealth in this season.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Look  beyond the glossy surface of Diwali festivities, and you realise that it  is exactly like the digital. Digital is about counting. It is right  there in the name — digits refers to numbers. Or digits refer to fingers  — these counting appendages which we can manipulate and flex in order  to achieve desired results. At the core of digital systems is the logic  of counting, and counting, as anybody will tell us, is not a benign  process. What gets counted, gets accounted for, thus producing a ledger  of give and take which often becomes the measure of our social  relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I remember, as a  child, my mother meticulously making a note of every gift or envelope  filled with money that ever came our way from the relatives, so that  there would be precise and exact reciprocation. I am certain that there  is now an app which can keep a track of these exchanges. I am not  suggesting that these occasions of gifting are merely mercenary, but  they are embodiments of finely calibrated values and worth of  relationships defined by proximity, intimacy, hierarchy and distance.  The digital produces and works on a similar algorithm, which is often as  inscrutable and opaque as the unspoken codes of the Diwali ledger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is something else that happens with counting. The only things that can  have value are things that have value. I don’t know which ledger counts  the coming together of my very distributed family for an evening of  chatting, talking, sharing lives and laughter. I don’t know how anybody  would reciprocate that one late night when a cousin came to our home and  spent hours with my younger brother making a rangoli to surprise the  rest of us. I have no idea how they will ever reciprocate gifts that one  of the younger kids made at school for all the members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diwali  is about the things, but like the digital system, these are things that  cannot be counted. And within the digital system, things that cannot be  counted are things that get discounted. They become unimportant. They  become noise, or rubbish. Our social networks are counting systems that  might notice the low frequency of my connections with my extended family  but they cannot quantify the joy I hear in the voice of my grandmother  when I call her from a different time-zone to catch up with her. Digital  systems can only deal with things with value and not their worth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I  do want to remind myself that there is more to this occasion than  merely counting. And for once, I want to go beyond the digital, where my  memories of the past and the expectations of the future are not shaped  by the digital systems of counting and quantifying. Instead, I want  Diwali to be analogue. I shall still be mediating my collectivity with  the promises of connectivity, but I want to think of this moment as  beyond the logics and logistics of counting that codify our social  transactions and take such a central location in our personal  functioning. This Diwali, I am rooting for a post-digital Diwali, that  accounts for all those things that cannot be counted, but are sometimes  the only things that really count.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital'&gt;https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-23T13:27:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator">
    <title>Material Cyborgs; Asserted Boundaries: Formulating the Cyborg as a Translator</title>
    <link>https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator</link>
    <description>
        &lt;b&gt;In this peer reviewed article, Nishant Shah explores the possibility of formulating the cyborg as an author or translator who is able to navigate between the different binaries of ‘meat–machine’, ‘digital–physical’, and ‘body–self’, using the abilities and the capabilities learnt in one system in an efficient and effective understanding of the other. The article was published in the European Journal of English Studies, Volume 12, Issue 2, 2008. [1]&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Download the paper &lt;a href="https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the original paper published by Taylor &amp;amp; Francis &lt;a class="external-link" href="http://www.tandfonline.com/doi/abs/10.1080/13825570802151504"&gt;here&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I, the cyborg&lt;/h2&gt;
&lt;p&gt;The cyborg, a combination of hardware, software and wetware, stands as one of the most visible figures of the cybernetic age. A portmanteau of two words: cybernetic and organism, the term cyborg refers to a biological being with a kinetic state that can be transferred with ease from one environment to another, able to adapt to changing environments through technological augmentation. The first living Cyborg to find its way into the human family tree was a rat. Manfred Clynes and Nathan Kline – two astrophysicists, in 1960, thought of a ‘hybrid-organism’ system (a rat with an osmotic pump) that provided biological stability to an organism in response to its constantly changing environment. In their paper in Astronautics they wrote:&lt;/p&gt;
&lt;blockquote&gt;For the exogenously extended organizational complex ... we propose the term ‘cyborg’. The Cyborg deliberately incorporates exogenous components extending the self-regulating control function of the organism in order to adapt it to new environments. (Clynes and Kline, 1960: 1)&lt;/blockquote&gt;
&lt;p&gt;Notwithstanding this, the cyborg is most commonly thought of in a futuristic vein, escaping the confines of the physical body and recreated through various digital forms like databases, networks and archives.&lt;/p&gt;
&lt;p&gt;With the emergence of the WorldWide Web, the cyborg has strategically evolved in our imaginations as a metaphor of our times.We are already in the age where the ‘first living cyborg’ (Warwick, 2000: 15) has announced his arrival. In his autobiography I, Cyborg, Stephen Warwick, a professor of cybernetics and robotics, unveils how he became the first human cyborg through a series of path-breaking experiments. He begins his narrative by saying, ‘I was born human. But this was an accident of fate – a condition of time and place. I believe it’s something we have the power to change’ (Warwick, 2000: 5). Cybercultures theorist David Bell, on the other hand, especially with the proliferation of new digital technologies, in his preface to The Cybercultures Reader, locates the cyborg in ‘the crucial mechanics of urban survival’ (Bell, 2000: xxi) that produce everyday cyborgs through digital transactions and technologically augmented practices. Sherry Turkle, looking at the experiments in genetic engineering and reproductive practices, traces the processes of ‘cyborgification’ in the production of ‘techno-tots’ (Turkle, 1992: 154) – a new generation of designer babies who have been augmented by technology to have the perfect genetic composition.&lt;/p&gt;
&lt;p&gt;In this paper, I seek to explore the possibility of formulating the cyborg as an author or translator, who is able to navigate between the different binaries of ‘meat– machine’, ‘digital–physical’, ‘body–self’, using the abilities and the capabilities learnt in one system in an efficient and effective understanding of the other. What does the cyborg as a translator add to our understanding of the processes of translation? If we were to examine the formation of a cyborg identity embedded in the digital circuits of the World Wide Web, what is the text of translation? What are the translated objects? Who performs these translations? Is the user the omnipotent translator who brings to this site, her special knowledge of distinct systems to make meaning? When inflected by technology, does the process of translation, performed by the cyborg, enter into realms of incomprehensibility which get translated as illegality? How does the figure of the translating cyborg enable an analysis of the cyborg as materially bound and geographically contained, rather than the earlier ideas of the cyborg as residing in a state of ‘universal placelessness’ (Sorkin, 1992: 217)?&lt;/p&gt;
&lt;h2&gt;Configuring the cyborg as a translator&lt;/h2&gt;
&lt;p&gt;The cyborg, as fashioned by science fiction narratives, cinema and cartoons, conjures images of human–machine hybrids and the physical merging of flesh and electronic circuitry. Different representations of the cyborg abound in science fiction narratives in print, film, animation and games, from reengineered human bodies showcasing fin de millennia nostalgia for large robotic machines of power and strength to sleek and suave microchip-implanted silicon-integrated human beings who work in their artificially mutated enhancements. The cyborg has covered a wide imaginative range from looking at a happy human–machine synthesis to a degenerate human body made grotesque by machinistic implants to a rise of a potent cyborg community that threatens to overcome the human world of biological certainty and mortality. Some of the most famous instances of cyborgs in popular narratives illustrate this wide spectrum; from Maria the robot in Metropolis (Fritz Lang, 1927) to Lara Croft in the The Tomb Raider series (Toby Gard, 1996); from Case in William Gibson’s Neuromancer (1984) to Mr Anderson a.k.a. Neo in The Matrix Trilogy (The Wachowski Brothers, 1999–2003); from Johnny Quest (Hannah-Barbara Cartoons, 1996–7) in the eponymous animated series to avatars created on social networking sites and MMORPGs &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; like Second Life.&lt;/p&gt;
&lt;p&gt;However, with the popularization and democratization of new digital technologies of information and communication (ICTs), we see a certain evolutionary production of the cyborg as an increasing number of people interact with digital spaces and sites and adopt mobile gadgets of computation and information dissemination as an extension of their bodies. The cyborg, as imagined within the digital realms of cyberspace, is imagined differently from the more hyper-real, hypervisible constructs within the fictional narratives.&lt;/p&gt;
&lt;p&gt;Arjun Appadurai (1996), in his formulation of post-electronic modernity, explores how electronic media offer new everyday resources and disciplines for the imagination of the self and the world. He argues that the individual body and its ownership are wedded to the logic of capitalism and the notion of ownership that characterized most of the twentieth century. Appadurai suggests that the body becomes a site of critical inquiry and contestation because a capitalist state grants the individual the rights to his/her body and the choice to fashion that body through consumption patterns. When talking of Technoscapes &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;, Appadurai posits the idea of a technologically enhanced sphere of activities and identity formation that defy the processes of capitalism and produce new instabilities in the creation of subjectivities.&lt;/p&gt;
&lt;p&gt;Cyberspace has become such a site where the individual body, marked in its being (genetically, biologically, socially and culturally) and circumscribed by the (physical, reluctant and cumbersome) space, can free itself from the relentless materiality of a capitalist set of reference points, to create a truly global self and a universally accessible space. Katie Hafner and Matthew Lyon, in their comprehensive history of the origins of the web, mention how in 1968 Joseph Carl Robnett Licklider and Robert Taylor, who were research directors of the United States of America’s Department of Defense’s Advanced Research Projects Agency (ARPA) and who also set in place the first online community (ARPANET), prophesied that online interactive communities ‘will consist of geographically separated members, sometimes grouped in small clusters and sometimes working individually. They will be communities not of common location but of common interest’ (Hafner and Mathew, 1996: 44). This prophesy was realised by the end of the twentieth century, as scholars announce the construction of the ‘discontinuous, global agoras’ (Mitchell, 1996: 27) and the arrival of the new commons shaped within the technoscapes of the internet. The imagination of the internet as the new public sphere of communication, interaction and collaboration also brought into focus the skills that a cyborg requires in order to materially exist on the intersections of various domains. Donna Haraway, in her seminal essay ‘A cyborg manifesto’ (1991), posited one of the most influential imaginations of the cyborg as residing in the ‘optical illusion between social reality and science fiction’ (Haraway, 1991: 151) Haraway’s cyborg hints at the possibility of imagining the cyborg as a translator:&lt;/p&gt;
&lt;blockquote&gt;The cyborg is resolutely committed to partiality, irony, intimacy, and perversity. It is oppositional, utopian and completely without innocence. No longer structured by the polarity of public and private, the cyborg defines a technological polis based partly on a revolution of social relations in the oikos, the household.&lt;br /&gt;(Haraway, 1991: xxii)&lt;/blockquote&gt;
&lt;p&gt;This cyborg, in the blurring of the public and the private, in the diffusion of the physical and the virtual, and in the yoking together of economic practices and social identities, becomes an agential subjectivity that translates one system into another, using the referents of meaning making and processes of knowledge production in one system for deciphering and navigating through the other system. Haraway’s cyborg is a willing and conscious extension; an illustration of what Judith Butler, in Bodies That Matter (1993) calls the ‘performative’, thus infusing the figure of the cyborg with the ability to negotiate with its immediate environment and shape it through the material practices it engages with. The cyborg as a translator, thus has an interesting role as a mediator between the two systems. The cyborg no longer makes the distinction between an original and a translated text – the two systems occupy equal and often contesting zones of reality and authenticity for the cyborg.&lt;/p&gt;
&lt;p&gt;Sandy Stone, in her anthropological study on technosociality – the technologised social order that emerges with ICTs and the social order of the technologised communities – emphasizes this very critical role of the cyborg:&lt;/p&gt;
&lt;blockquote&gt;In technosociality, the social world of virtual culture, technics is nature. When exploration, rationalisation, remaking, and control mean the same thing, then nature, technics, and the structure of meaning have become indistinguishable. The technosocial subject is able successfully to navigate through this treacherous new world. S/he is constituted as part of the evolution of communication and technology and of the human organism, in a time in which technology and organism are collapsing, imploding, into each other.&lt;br /&gt;(Stone, 1991: 81)&lt;/blockquote&gt;
&lt;p&gt;Stone’s idea of the cyborg as collapsing the binary between the organism and technology is indicative of how the cyborg, in its processes of translation, reproduces both the worlds, and in fact allows for a dual process of translation between the two so that systems implode to form a complex set of references that determine the meanings of the text. This dual process of translation produces a critical episteme to revisit the notion of translation where the skills of the translator and the figure of the translator are generally looked upon as residing in a nuanced and close reading of the original text and the interpretative techniques by which it is reproduced in the ‘new’ or translated text, making sure that the original gets suffused with the meaning and ironies of the other language. Stone also adds to Haraway’s conception of the cyborg as she recognizes another distinction that the cyborg as a translator blurs in its being – the distinction between technique and the structure of meaning.&lt;/p&gt;
&lt;p&gt;The cyborg as a translator, because it produces its identities through the same techniques that it produces the translated texts, internalizes the very techniques of translation. However, this process of internalization, instead of making the techniques invisible, foregrounds them as essential to the comprehension and understanding of the meanings which have been produced in this dual process of translation. The next section of this paper does a close reading of an instance of particular cyberspatial form – the social networking systems – to illustrate the dual processes of translation and the textuality of the texts involved.&lt;/p&gt;
&lt;h2&gt;Lost in translation&lt;/h2&gt;
&lt;p&gt;Both Haraway and Stone imagine the cyborg in a process of self-authorship through the interaction with the digital technologies. However, both of them only deal with the conceptual category of the cyborg and do not really examine the specific practices that this cyborg produces. Within cyberspaces, social networking systems, blogs, MMORPGs, multiple user dungeons (MUD), discussion boards, media sharing platforms, p2p networks &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;, etc., all create different conditions within which the physical users, through their digital avatars, interact with each other and form complex models of social networking and personal narratives. In this section I look at the notion of this self-authoring cyborg, embedded in the social networking system of ‘Orkut’, to illustrate and examine the discussions in the preceding section.&lt;/p&gt;
&lt;p&gt;Orkut, a Google project, is one of the most thriving social networking systems that allows people to reacquaint themselves with people they have known in the past – friends, colleagues, acquaintances, family – who might be distributed across geography and lifestyles. Orkut also enables people with similar interests to form communities and interact, network and form new relationships with strangers in an unprecedented fashion. Orkut follows the AmWay &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; Economic model for its social networking, whereby an individual person inherits the friends of friends, thus often connecting themselves down more than 50 levels of friendship. Such a connection, such possibilities of networking, and the overall feeling of belonging to a dynamic, ever-growing network, gives the users a heady rush of emotions, using Orkut for various personal and professional reasons – from dating to holding meetings, from public performances to professional networking.&lt;/p&gt;
&lt;p&gt;Most users within Orkut find themselves members of communities which are created around themes, hobbies, issues, ideas, movies, heroes, idols, books, religions, universities and schools, organizations, institutions, subjects, disciplines and music. One of the pre-requisites for using the various services on Orkut to their full potential is the creation of a profile. The profile, unlike a personal ad, is a concentrated effort at translating the ‘physical’ self of the person into ‘digital’ avatars that refer to the ‘original’ user behind the profile. Because of the pseudonymous nature of cyberspatial interactions, there is also an extra effort at making these avatars more verifiable, more real and more trustworthy. As an increasing number of users use social networking systems to find friends, to connect with partners and form communities that often translate back into the physical world, they spend a lot of effort on their profiles, trying to simulate (or translate) their personal identities and ideas into the digital world.&lt;/p&gt;
&lt;p&gt;Most users put pictures of their face, along with populating their own virtual photo album with pictures of their pets, partners, friends, family and places they have visited. Profiles often change, adding ‘new pictures uploaded’ as a caption, to invite friends to visit their space and find out what is new about their virtual lives. Users can also keep track of all the changes that the people in their networks are making to their profiles, thus giving the sense of a fluid and a changing persona rather than a static description. Applications which allow the users to track birthdays, special dates, online calendars and the important events in their friends’ lives, add to the nature of communication and interaction. Most profiles have a fairly detailed narrative, using poetic imagery, exaggerated style, witticisms and pop philosophy to translate the person behind the screen. The profiles are also filled with their favourite activities, TV shows, music and books. This process of mapping a virtual body and producing texts of the physical body is the first level of translation that the users perform. The model of cyborgs that Haraway and Stone posit look upon the possibility of role playing, of fantasy, of adaptation and of authoring the self, in this process of cyborgification, as extremely liberating and subversive.&lt;/p&gt;
&lt;p&gt;The social networking system and the related profiles also draw our attention to the dynamic interactions of the translated self within the digital domains. Through a metonymic process, the digital profile – the translated self – comes to stand in for the bodies of the users who not only create the translated self but also mark it with desires and aspirations. The translated self is largely under the control of the physical body. And yet, there are several ways in which the translated self does not allow for the physical body to emerge as the original, the authentic or the primary self within the dynamics of this site. On the one hand, it is the physical body of the user that authors the digital self, and hence it should be looked upon as the primary or the authentic text. On the other hand, the interactions that happen within the social networking system are interactions of the authored/translated self. The responses that the profile receives, the way in which the self is represented, the techniques used to engage with more people or invite strangers to communicate, are all the practices of the digital self.&lt;/p&gt;
&lt;p&gt;Within Orkut, the profile of the person is bound to the physical body of the user behind the profile. While it is of course necessary to invoke a virtual avatar, because of the nature of social networking with people one already knows or has known, there is a certain disinvestment of fantasy within Orkut. Several users select pseudonyms which allow them to remain totally anonymous, but most of them have a visible face which tries to approximate their real-life persona online. Unlike the circuits of blogging or role playing games, Orkut emphasizes the need to be a ‘real’ person, thus validating its unique feature of ‘scrapping’. By employing it, users are encouraged to publicly perform their intimacies and relationships, which can be easily documented and tracked by others outside the one-to-one interaction. Thus, there seems to be a specific need to narrativize the self though the profile and the various functionalities available on Orkut. Members of the Orkut community are encouraged to think of themselves as part of a larger database – transmutable, transferable sets of data which they have authored for themselves – and can mobilize their virtual self across different networks to enhance their sense of social interaction and networking.&lt;/p&gt;
&lt;p&gt;Also, the digital self is not translated solely by the physical user. Orkut has a feature of testimonials where the people in the networks of the translated self, also author opinions, observations and endorsements for the profile. Moreover, the public nature of communication and the archiving of this, add to the meaning and the functioning of this translated self. This production of the meta-data introjects the translated self into a circuit of meaning making and producing narratives that is beyond the scope of the physical body. Thus, there is a strange tension between the physical body of the user and the translated self that the user produces, which leads to the emergence of a cyborg identity. The cyborg is neither the physical body nor the translated digital self. It resides in the interface between the two, each constantly referring to the other, creating an interminable loop of dependence. The cyborg, because it is produced by the very technologies of the two systems that it is straddling, makes these techniques or the technologisation of the self synonymous with the processes of producing the narratives or making meaning.&lt;/p&gt;
&lt;p&gt;This production of narratives of the self through different multimedia environments is not simply a process of writing biography or making self-representations. The users on Orkut (as well as other social networking sites like MySpace or blogging communities like Livejournal) are authoring avatars or substitute selves which are intricately and extensively a part of who they are. These translated selves do not live independent lives, but are firmly entrenched in the physical body and practices of the users. While there is a certain flexibility in the scripting of the avatar, the projections are more often than not premised upon the possibility of a Real. The avatars are also scripted as engaging in extremely mundane and daily activities to create verisimilitude and to map the physical body on to the avatar. To leave status messages like ‘stepped out for lunch’ or ‘Working really hard’ or ‘I am bored, entertain me’ is common practice for the users. As increasingly more users stay connected but are not always present on these digital platforms, they also let the avatars ‘sleep’ or ‘eat’ or ‘go away for some time’, synchronizing the avatar’s actions with their own.&lt;/p&gt;
&lt;p&gt;A look at many other similar sites like blogging communities on ‘Livejournal’, or dating communities like ‘Friendster’, can give us an idea that the first stage in authoring a cyborg rests in creating these profiles, or avatars. Users spend an incredible amount of time trying to create for themselves the best avatars, which will be continued projections of the self. These tend to rely mainly on the visual component, as in games like ‘Second Life’ and chatting platforms like ‘Yahoo!’, but they can also rely on a combination of visual and verbal elements. Thus, the cyborg starts a process of translation whereby both the physical body and the translated self are distilled into data sets that get distributed across different practices and platforms, changing continuously and feeding into each other. Thus, just the first step of translation – the translation of the physical body into the digital avatar – is already a complex state, where we it is not as if the cyborg exists ex-nihilo and then translates from one system to the other but that the cyborg is produced in this very process of translation. Moreover, the translated text is not simply the sole authorship of the cyborg but has other players, who are a part of either of the systems, adding meanings and layers to the text.&lt;/p&gt;
&lt;p&gt;The second step in this process is a reverse translation. Even within role playing games, where the alienation of the avatar from the body reaches its highest levels, there is an invested effort on the part of the gamer to provide physical and material contexts to the imagined bodies which they have created. Mizuki Ito (1992), in her work about online gamers, looks at how, with an increased investment in the digital lives, users tend to shape their own physical selves around their projected avatars. Many chronic users of cyberspaces have their language, their social interaction and even the way they dress and behave affected by their practices online. Sherry Turkle, in her analysis of the MUD world in Life on the Screen (1996), points out that an increasing number of users start looking upon their screen lives as a constitutive part of their reality rather than an escape from it.&lt;/p&gt;
&lt;blockquote&gt;A computer’s ‘windows’ have become a potent metaphor for thinking about the self as a multiple and distributed system. The hypertext links have become a metaphor for a multiplicity of perspectives. On the internet, people who participate in virtual communities may be ‘logged on’ to several of them (open as several open-screen windows) as they pursue other activities. In this way, they may come to experience their lives as a ‘cycling through’ screen worlds in which they may be expressing different aspects of self.&lt;br /&gt;(Turkle, 1996: 43)&lt;/blockquote&gt;
&lt;p&gt;In another essay, titled ‘Playblog: Pornography, Performance and Cyberspace’ (Shah, 2005), I illustrate how the process of ‘reverse embodiment’ takes place in the lifecycle of bloggers. This process entails a mapping of the translated avatar on to the physical body of the users. This process of reverse translation often leads to the users abandoning their avatars, cutting down on their public presence or sometimes actually committing ‘digital suicides’, killing their own selves to start new identities and networks. Julian Dibbell, in his celebrated essay, ‘A Rape Happened in Cyberspace’ (1994) looks at the dynamics of this reverse mapping or inverted translation as well. Dibbell was witness to one of the most popular cases of ‘digital violence’ in the late 1990s, when in an MUD, a particular user called Dr Bungle, devised a ‘voodoo doll’ on the Lambda MOO MUD, which gained control over two of the other users, making them enter into a series of involuntary sexual acts of deviousness and perversion, in a public ‘room’ where all the other users could see them. What might be looked upon as a simple gaming aesthetic of a more powerful player taking over the avatars of two players with lesser power became a topic of huge discussion as the physical users behind the translated avatars complained of feeling violated and ‘raped’. This claim had very serious consequences because it no longer allowed for a linear notion of the physical body being translated into a digital avatar but insisted that the translated avatar is always, because of the users’ emotional involvement but also because of the practices that the avatar initiates, mapped back on to the body of the physical user. This is a process of reverse embodiment where the presumed ‘original’ is now re-shaped and re-configured to suit the translated object. Such a phenomenon is perhaps possible only in the domains of the cyberspace. Also, the cyborg, generally presumed as residing in the physical body, is now relocated in this two-way process, at the borders where it not only facilitates meaning but also realizes itself in the process of facilitation.&lt;/p&gt;
&lt;p&gt;The digital transactions in which the users within such spaces engage have huge social, economic and cultural purport. The authoring of these selves, of these digital avatars, leads to the idea of the cyborg as not simply a synthesis – a site upon which the synthesis happens – but as a dynamic situation in which all subjects participate, producing and supporting its own identity. The cyborg exists in the interstices of the different oppositions of the real and the virtual, the physical and the digital, the temporal and the spatial, the biological and the technological. Moreover, the cyborg does not reside simply within the digital domains but becomes and embodied technosocial being, with a material body that enters into other realms of authorship and subjectification. It is necessary to recognize that the cyborg is not simply a self authored identity but is also subject to various other realms of governance. These material cyborgs, then, assert the need for the body as central to their imagination.&lt;/p&gt;
&lt;p&gt;This bounded cyborg is also subject to the territories that it resides within. The last section of the paper looks at the State as a critical part of the production of these material cyborg identities and analyses how the incomprehensibility of this particular identity reproduces it in a condition of illegality, rescuing it from the boundless universal imagination and reasserting the geographical and the territorial boundaries that the cyborg exists within. In this particular analysis, because of my own familiarity with the context and also because new digital technologies are still emerging and unfolding into new forms in India, I shall speak specifically of the Indian State but hope that the particular case that I analyse shall have resonances for other geo-cultural and socio-political contexts as well.&lt;/p&gt;
&lt;h2&gt;The state of the cyborg&lt;/h2&gt;
&lt;p&gt;The cyborg, thus residing on the interstices of so many different paradigms, can no longer be limited to aesthetized representations and narratives, but is becoming a part of everyday practices of global urbanism. The range of human–machine relationships is diverse and increasingly varied. We might not be complete cyborgs but we do deal with ‘intimate machines’ (Turkle, 1996: 142) and live in ‘cyborg societies’ (Haraway, 1991: 179). The cities where we we live constantly remind us of the machinations we are dependent on; sometimes they blind us of our dependence on the technology, sometimes they make it starkly visible. Different organizations like the Military, Space Studies, Medicine, Human Research and Education are using new forms of organism–technology interactions in the increasingly urbanised world. Just like the interactions of the translated avatara and the physical users, David Bell and Barbara Kennedy, in their introduction to The Cybercultures Reader, look at the interactions with various different technologies of communication and transport, and posit the notion of an ‘Everyday Cyborg’ that gets produced in everyday practices:&lt;/p&gt;
&lt;blockquote&gt;Taking Viagra, or [using] a pacemaker, or riding a bike, or withdrawing cash from an ATM, or acting out [our] fantasies as Lara Croft in the latest Tomb Raider game or as a Nato bomber pilot blitzing Kosovo, or anyone watching footage from Kosovo live on the late-night news.&lt;br /&gt;(Bell, 2000: ix)&lt;/blockquote&gt;
&lt;p&gt;In their list, the authors are more interested in looking at human–machine interaction and making historical continuities to the production of a technosocial identity or a cyborg self. This ‘naturalized’ cyborg robs the cyborg of its criticality or importance. It seems to posit the cyborg as simply a coupling of organism and machine, and hence a benign cultural formulation which can now be decontextualized and analysed in the digital domains. The cyborg as a translator – initiating a complex and intricate set of relationships between the different systems of meaning making that it&lt;/p&gt;
&lt;p&gt;straddles – questions this trvialization of the cyborg and instead helps produce the cyborg identity as an epistemological category which needs to be analysed to see the processes that produce it and the crises it produces in the pre-digital understanding of text and textuality.&lt;/p&gt;
&lt;p&gt;It is with these questions that I begin the analysis of what has popularly been dubbed as the ‘Lucknow Gay Scandal’ in India. In India, under the Section 377 of the Indian Penal Code, as a part of larger ‘Unnatural Sex Acts’, homosexual activity is a punishable offence &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt;. However, the reading of this particular act has always been invoked in dealing with the act of same-sex sexual behaviour and not to punish a particular identity. However, when the queer rights and gay collectives started gaining momentum because of the rise of digital technologies (Singh, 2007), the production of the queer cyborg produced an anxiety about the fantasies, the digital avatars and the material practices of the users behind the avatars. In January 2006, policemen in the city of Lucknow, masquerading as gay men, registered with a popular queer dating website called ‘Guys4men’. Explicitly a gay dating site, it allows users to create their profiles, add pictures and text, translate their personal data in a scripted space, exchange messages and chat. Like the earlier discussed social networking sites, Guys4men also allows users to search and befriend each other, encouraging public discussions and arranging for physical encounters at a personal or a collective level.&lt;/p&gt;
&lt;p&gt;These policemen created profiles and listed themselves as gay men, to start interacting with the members of the site. They solicited sex and meetings and finally invited five men to come and meet them in a public garden in Lucknow. When four of the five men turned up for the rendezvous, they were arrested on charges of obscenity, of soliciting sex in public and engaging in homosexual fantasies. The media reported this as ‘Gay Club Running on the Net Unearthed’ (The Times of India, 5 January 2006). The website was looked upon as a physical space where people indulged in ‘unnatural sex acts’.&lt;/p&gt;
&lt;p&gt;The four men were punished, not for anything that they did in public or in the physical world but for their projected fantasies online. They were publicly humiliated, exhibited to the media as a ‘homosexual coup’ and put under arrest by the police. While a large part of the political society in India erupted in fury at the gross violation of the human rights and the punishment of fantasies, leading to a raging court case which still has not found resolution, what this paper hopes to glean from this particular case are four interesting points. Firstly, three of the four men, in their physical existence, were married and had children. They were not suspected to have homosexual inclinations by their family or friends, to whom this came as a huge shock. The evidence of the material practices of their physical bodies was not looked upon as strong enough to acquit them. Secondly, the policemen who were luring these men towards a homosexual encounter were themselves projecting similar fantasies. However, as theirs were sanctioned by some high authority, they gained validity and were not to be punished. It was almost as if the fantasies and the avatars that the policemen had were legitimate, sanctified translations of their selves, which made them different. Thirdly, while the men were caught in the physical meeting space, the charges against them were all based on their online activities. What was being produced was not even the act of translating their physical bodies into digital avatars. What was at stake in the particular case was the fact that, in the processes of translation, a reverse translation was also set into place, where the digital avatars and the circuits of consumption and interaction that these avatars entered into were mapped on to the physical bodies, reconfiguring them and marking them as queer. The men were punished not because they claimed a queer identity or because they had fantasies online which did not subscribe to the State’s directive. These men were being punished for the production of a cyborg self – a self which on the one hand was contained by the physical bodies of the users, thus subject to the processes of governance and administration applicable in the geography that they are located in, and on the other hand produced by the imagined selves – the translated avatars which reside outside of the geo-territorial regimes. It is this production of the queer cyborg, residing on the boundaries of sexuality, of nationality and subjectivity that was sought to be punished in this particular case.&lt;/p&gt;
&lt;p&gt;On the whole, this case seems to prove that there is a very definite move, on the part of the State, towards the recognition of online avatars as not only extensions of the self but as more powerful identities than the physical self. The State imagines the users of cyberspace as ‘real’ cyborgs and conceives their online activities, fantasies and role-plays as punishable offences. The State also recognizes their translated selves – their datasets that they authored – as verifiable proof of their existence and actions online. The story of the Lucknow incident brings to the fore the possibility that there might also be reluctant cyborgs. The notion of the translator is always somebody who is in a conscious condition of deploying knowledge in order to bridge the gap between different paradigms. However, as the digital world becomes more democratic and becomes a part of our daily transactions, an increasing number of users enter into conditions of translation which they might not recognize as translation. It is also imaginable that a large number of users might resort to the cyberspace to reach a particular aim, without wishing to produce any elaborate narratives of themselves. They might be completely unaware of the processes of reverse translation which follow. However, because of the State’s investment in digital technologies and its infrastructures, individuals get authored as cyborgs, having to take responsibility for their actions and fantasies online, against their will and outside of their knowledge.&lt;/p&gt;
&lt;p&gt;The implication of the State or other State-like bodies in the production of these cyborg identities and texts makes us aware of the fact that processes of translation are not simply about the intention and the effort of the translator, but are also severely embedded in the techniques used for translation and the contexts within which the translator and the translated identities are produced. In earlier discussions of testimonials and scraps on Orkut or commentating and editing on blogging platforms, we had already looked upon how the translated text, even when it is a self-narrative, on the digital interfaces, is already a product of multiple authorships and can no longer be attributed to a single individual translator. Similarly, the cyborg identity that is produced in the processes of translation – the cyborg as a translator – is also not a product of individual desire or intention but is often brought into being through the various other players within the internet as well as within the physical contexts of the users.&lt;/p&gt;
&lt;h2&gt;Why cyborg?&lt;/h2&gt;
&lt;p&gt;The everyday embodied cyberspace cyborg thus becomes subject to the state as well as the technology. People who enter the digital matrices are made accountable for their actions and travels in cyberspaces. There is an increased anxiety around monitoring these processes of translation, of reverse translation and production of translated cyborg identities that are becoming such an integral part of cyberspatial platforms.&lt;/p&gt;
&lt;p&gt;The virtual avatars are re-mapped onto the body of the user, thus reconfiguring the notion of the self and the body. The state, through its efforts, becomes a major player in the authoring of the cyberspace cyborg. Other surveillance technologies like Close Circuit Television (CCTV) for instance, also produce unwilling or unwitting technologized narratives of the users caught under the camera. It is possible to use CCTV in public spaces and capture users in different actions which they can be held responsible for later. However, the cyberspace cyborg differs significantly from this model because the users of cyberspace are willing participants of the spaces which they occupy.&lt;/p&gt;
&lt;p&gt;The positing of the cyborg as a translator and as an identity that emerges out of translation practices defines a clearer role for translation and a larger definition for translation as it gets inflected by digital technologies. Instead of the universal hyperreal agent, the cyborg as a translator emphasizes one of the fundamental principles of understanding translation – the context of the translator, the agential negotiations of the translator with the original text, the processes by which the self of the translator get produced and the importance of the technologies within which the translation occurs. The collaborative nature of digital technologies and cyberspatial forms illustrates how the process of translation is not singular and that the relationship between the presumed original and the translated text also need to be re-visited. However, more that anything else, the cyborg as a translator makes it clear that the translated text is not produced in isolation or by a single author. There are various contributions that emerge from the networks within which the cyborg translator operates and from the different technologies of governance that the cyborg translators as well as the translated texts are subject to. On the other hand, to the body of cybercultures which has sustained interest in the production and imagination of the cyborg, the cyborg as a translator offers a different way of locating the cyborg identity – not as an identity produced through cyberspaces, but as an embodied cyborg that emerges as an epistemological category to explain the processes of collaboration, sharing, collective authoring and possession of the new digital spaces.&lt;/p&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;] This paper owes huge intellectual and emotional debt to Rita Kothari who first invited me to contribute to this issue, helping me formulate the germ of the idea and to Elena Di Giovanni who has been an extremely patient editor, guiding me through the many drafts that gave shape to this final version.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;] MMORPG – Massively Multiple Online Role – playing game is a genre of gaming in which a large number of players interact with one another in a virtual world. The MUDs that Sherry Turkle studied can be looked upon as the direct antecedents to MMORPGs like Second Life and War of Warcraft – two of the most popular gaming platforms in current times.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;] Technoscapes are the landscapes of technology. They refer to technology as both high and low, informational and mechanical, and the speed at which it travels between previously impassible boundaries. Appadurai uses the idea of Technoscape to imagine a fluid and transmittable topography of technology, where the different transactions and the identities formed online have material consequences in economic flows and societal formations. The cyborg thus produced actively chooses and negotiates its identity. Identities are no longer solid, but become fractured, in that we no longer have to choose the identities or accept the ideas of the local community. We are actively choosing our programming based on that which is available to us. While the cyborg may choose to act in a manner most appropriate or relative to the cultures and geographies it is embedded within, that is no longer the only programming option available to it and many are choosing to look beyond their own cultural arenas.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;] P2P networks – peer-to-peer networks – inherit the cyberspatial aesthetics of decentralized networks; of nodes being distributed across the circuits of the internet and talking to each other, collaborating in projects, sharing information and exchanging digital material. The p2p networks have been under severe focus because they allow for unmonitored piracy and exchange of information&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;] AmWay emerged in the 1960s as the first of its kind of multi-level marketing company where the individuals inherit each other’s customers and profits through a simple system of multi-directional networking.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;] The Wikipedia entry for IPC Section 377 reads: ‘Homosexual relations are technically still a crime in India under an old British era statute dating from 1860 called Section 377 of the Indian Penal Code which criminalises ‘‘carnal intercourse against the order of nature.’’ Since this is deliberately vague in the past it has been used against oral sex (heterosexual and homosexual), sodomy, bestiality, etc. The punishment ranges from ten years to lifelong imprisonment’. The relevant section reads: ‘Whoever voluntarily has carnal intercourse against the order of nature with any man, woman or animal, shall be punished with imprisonment for life, or with imprisonment of either description for a term which may extend to ten years, and shall also be liable to fine’.&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;Appadurai, Arjun (1996). &lt;em&gt;Modernity At Large&lt;/em&gt;. New Delhi: Oxford UP.&lt;/p&gt;
&lt;p&gt;Bell, David (2000). ‘Introduction I Cybercultures Reader: a User’s Guide’. &lt;em&gt;The Cybercultures Reader&lt;/em&gt;. Eds David Bell and Barbara M. Kennedy. London and New York; Routledge.&lt;/p&gt;
&lt;p&gt;Butler, Judith (1993).&lt;em&gt; Bodies That Matter: On the Discursive Limits of ‘Sex&lt;/em&gt;’. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Clynes, Manfred and Nathan Kline (1960). ‘Cyborgs in Outerspace’ 20 November 2002. &lt;a href="http://search.nytimes.com/library/cyber/surf/022697surf-cyborg.html"&gt;http://search.nytimes.com/library/cyber/surf/022697surf-cyborg.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Dibbell, Julian (1994). ‘A Rape in Cyberspace, or How an Evil Clown, a Haitan Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society’.&lt;em&gt; The Village Voice&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;‘Gay Club Running on Net Unearthed’. &lt;em&gt;The Times of India&lt;/em&gt;. 5 January 2006. &lt;a href="http://timesofindia.indiatimes.com/Cities/Lucknow/Gay_club_running_on_Net_unearthed/articleshow/msid-1359203,curpg-2.cms"&gt;http://timesofindia.indiatimes.com/Cities/Lucknow/Gay_club_running_on_Net_unearthed/articleshow/msid-1359203,curpg-2.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Gibson, William (1994). &lt;em&gt;Neuromancer&lt;/em&gt;. New York: Ace Books.&lt;/p&gt;
&lt;p&gt;Hafner, Katie and Mathew Lyon (1996). &lt;em&gt;Where Wizards Stay up Late: The Origins of the Internet&lt;/em&gt;. New York: Simon and Shuster.&lt;/p&gt;
&lt;p&gt;Haraway, Donna (1991). ‘A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century’. &lt;em&gt;Simians, Cyborgs, and Women&lt;/em&gt;. New York: Routledge, 149–81.&lt;/p&gt;
&lt;p&gt;Ito, Mizuko (1992). ‘Inhabiting Multiple Worlds: Making Sense of SimCity2000TM in the Fifth Dimension’. &lt;em&gt;Cyborg Babies: From Techno-Sex to Techno-Tots&lt;/em&gt;. Eds Robbie Davis-Floyd and Joseph Dumit. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Licklider, C. R. and Robert Taylor (1968) ‘The Computer as Communication Device’. &lt;em&gt;Science and Technology&lt;/em&gt;, 21–31 April. &lt;a href="http://www.cc.utexas.edu/ogs/alumni/events/taylor/licklider-taylor.pdf"&gt;http://www.cc.utexas.edu/ogs/alumni/events/taylor/licklider-taylor.pdf&lt;/a&gt;. Accessed 5 November 2005.&lt;/p&gt;
&lt;p&gt;Mitchell, William (1996). &lt;em&gt;City of Bits: Space, Place and the Infobahn&lt;/em&gt;. Cambridge: MIT.&lt;/p&gt;
&lt;p&gt;Shah, Nishant (2005). ‘Playblog: Pornography, Performance and Cyberspace’. &lt;a href="http://networkcultures.org/blog/publication/the-art-and-politics-of-netporn/"&gt;http://networkcultures.org/blog/publication/the-art-and-politics-of-netporn/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Singh, Pawan Deep (2007). ‘Inside Virtual Queer Subcultures’. MA Thesis. Hyderabad Central University.&lt;/p&gt;
&lt;p&gt;Sorkin, Michael (1992). ‘See you in Disneyland’. &lt;em&gt;Variations on a Theme Park: The New American City and the End of Public Space&lt;/em&gt;. New York: Noonday Press.&lt;/p&gt;
&lt;p&gt;Stone, Sandy (1991). Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, MA: MIT Press. 81–118.&lt;/p&gt;
&lt;p&gt;Turkle, Sherry (1992). ‘Cyborg Babies and Cy-dough-plasm’. &lt;em&gt;Cyborg Babies: From Techno-Sex to Techno-Tots&lt;/em&gt;. Eds Robbie Davis-Floyd and Joseph Dumit. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Turkle, Sherry (1996). &lt;em&gt;Life on the Screen: Identity in the age of the internet&lt;/em&gt;. London: Weidenfeld and Nicolson.&lt;/p&gt;
&lt;p&gt;Warwick, Stephen (2000). &lt;em&gt;I, Cyborg&lt;/em&gt;. London: University of Reading Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator'&gt;https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Body</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-25T05:57:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism">
    <title>Between the Stirrup and the Ground: Relocating Digital Activism</title>
    <link>https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism</link>
    <description>
        &lt;b&gt;In this peer reviewed research paper, Nishant Shah and Fieke Jansen draws on a research project that focuses on understanding new technology, mediated identities, and their relationship with processes of change in their immediate and extended environments in emerging information societies in the global south. It suggests that endemic to understanding digital activism is the need to look at the recalibrated relationships between the state and the citizens through the prism of technology and agency. The paper was published in Democracy &amp; Society, a publication of the Center for Democracy and Civil Society, Volume 8, Issue 2, Summer 2011.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;em&gt;Cross-posted from &lt;a class="external-link" href="http://www.democracyandsociety.com/blog/wp-content/uploads/2011/08/CDACS-DS-15-v3-fnl.pdf"&gt;Democracy and Society&lt;/a&gt;&lt;/em&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The first decade of the 21st century has witnessed the simultaneous growth of the Internet and digital technologies on the&amp;nbsp;one hand and political protests and mobilization on the other. As a result, some stakeholders attribute magical powers of&amp;nbsp;social change and political transformation to these technologies.&lt;/p&gt;
&lt;p&gt;In the post-Wikileaks world, governments try to censor the use of and access to information technologies in order to&amp;nbsp;maintain the status quo (Domscheit-Berg 2011). With the expansion of markets, technology multinationals and service providers are trying to strike a delicate balance between ethics and profits. Civil Society Organizations for their part, are&amp;nbsp;seeking to counterbalance censorship and exploitation of the citizens’ rights.&amp;nbsp;Within discourse and practice, there remains&amp;nbsp;a dialectic between hope and despair:&amp;nbsp;Hope that these technologies will&amp;nbsp;change the world, and despair that we do not have any sustainable replicable models&amp;nbsp;of technology-driven transformation despite four decades of intervention in&amp;nbsp;the 6eld of information and communication&amp;nbsp;technology (ICT).&lt;/p&gt;
&lt;p&gt;This paper suggests that this dialectic&amp;nbsp;is fruitless and results from too strong of&amp;nbsp;a concentration on the functional role&amp;nbsp;of technology. The&amp;nbsp;lack of vocabulary to map and articulate the transitions that digital technologies bring to our earlier understanding of the&amp;nbsp;state-market-citizen relationship, as well as our failure to understand technology as a paradigm that defines the domains&amp;nbsp;of life, labour, and language, amplify this knowledge gap.&lt;/p&gt;
&lt;p&gt;This paper draws on a research project that focuses on&amp;nbsp;understanding new technology, mediated identities, and&amp;nbsp;their relationship with processes of change in their immediate&amp;nbsp;and extended environments in emerging information&amp;nbsp;societies in the global south (Shah 2009). We suggest that&amp;nbsp;endemic to understanding digital activism is the need to&amp;nbsp;look at the recalibrated relationships between the state and&amp;nbsp;the citizens through the prism of technology and agency.&lt;/p&gt;
&lt;h2&gt;Context&lt;/h2&gt;
&lt;p&gt;It is appropriate, perhaps, to begin a paper on digital activism, with a discussion of analogue activism[&lt;a href="#1"&gt;1&lt;/a&gt;]&amp;nbsp;(Morozov 2010).&amp;nbsp;In the recent revolutions and protests from Tunisia&amp;nbsp;to Egypt and Iran to Kryzygystan, much attention has been&amp;nbsp;given to the role of new media in organizing, orchestrating,&amp;nbsp;performing, and shaping the larger public psyche and the&amp;nbsp;new horizons of progressive governments. Global media&amp;nbsp;has dubbed several of them as ‘Twitter Revolutions” and&amp;nbsp;“Facebook Protests” because these technologies played an&amp;nbsp;important role in the production of :ash-mobs, which,&amp;nbsp;because of their visibility and numbers, became the face of&amp;nbsp;the political protests in di)erent countries. Political scientists&amp;nbsp;as well as technology experts have been trying to figure out&amp;nbsp;what the role of Twitter and Facebook was in these processes&amp;nbsp;of social transformation. Activists are trying to determine&amp;nbsp;whether it is possible to produce replicable upscalable models&amp;nbsp;that can be transplanted to other geo-political contexts to&amp;nbsp;achieve similar results,[&lt;a href="#2"&gt;2&lt;/a&gt;]&amp;nbsp;as well as how the realm of political action now needs to accommodate these developments.&lt;/p&gt;
&lt;p&gt;Cyber-utopians have heralded this particular phenomenon&amp;nbsp;of digital activists mobilizing in almost unprecedented&amp;nbsp;numbers as a hopeful sign that resonates the early 20th century&amp;nbsp;rhetoric of a Socialist Revolution (West and Raman&amp;nbsp;2009). (ey see this as a symptom of the power that ordinary&amp;nbsp;citizens wield and the ways in which their voices&amp;nbsp;can be ampli6ed, augmented, and consolidated using the&amp;nbsp;pervasive computing environments in which we now live.&lt;/p&gt;
&lt;p&gt;In a celebratory tone, without examining either the complex&amp;nbsp;assemblages of media and government practices and policies&amp;nbsp;that are implicated in these processes, they naively attribute&amp;nbsp;these protests to digital technologies.&lt;/p&gt;
&lt;p&gt;Cyber-cynics, conversely, insist that these technologies&amp;nbsp;are just means and tools that give voice to the seething anger,&amp;nbsp;hurt, and grief that these communities have harboured for&amp;nbsp;many years under tyrannical governments and authoritarian&amp;nbsp;regimes. They insist that digital technologies played no&amp;nbsp;role in these events — they would have occurred anyway,&amp;nbsp;given the right catalysts — and that this overemphasis on&amp;nbsp;technology detracts from greater historical legacies, movements,&amp;nbsp;and the courage and efforts of the people involved.&lt;/p&gt;
&lt;p&gt;While these debates continue to ensue between zealots&amp;nbsp;on conflicting sides, there are some things that remain&amp;nbsp;constant in both positions: presumptions of what it means&amp;nbsp;to be political, a narrow imagination of human-technology&amp;nbsp;relationships, and a historically deterministic view of socio-political&amp;nbsp;movements. While the objects and processes under&amp;nbsp;scrutiny are new and unprecedented, the vocabulary, conceptual&amp;nbsp;tools, knowledge frameworks, and critical perspectives&amp;nbsp;remain unaltered. They attempt to articulate a rapidly changing&amp;nbsp;world in a manner that accommodates these changes.&amp;nbsp;Traditional approaches that produce a simplified triangulation&amp;nbsp;of the state, market and civil society, with historically&amp;nbsp;specified roles, inform these discourses, “where the state is&amp;nbsp;the rule-maker, civil society the do-gooder and watchdog,&amp;nbsp;and the private sector the enemy or hero depending on one’s&amp;nbsp;ideological stand” (Knorringa 2008, 8).&lt;/p&gt;
&lt;p&gt;Within the more diffuse world realities, where the roles&amp;nbsp;for each sector are not only blurred but also often shared,&amp;nbsp;things work differently. Especially when we introduce technology,&amp;nbsp;we realize that the centralized structural entities&amp;nbsp;operate in and are better understood through a distributed,&amp;nbsp;multiple avatar model. For example, within public-private&amp;nbsp;partnerships, which are new units of governance in emerging&amp;nbsp;post-capitalist societies, the market often takes up protostatist&amp;nbsp;qualities, while the state works as the beneficiary rather&amp;nbsp;than the arbitrator of public delivery systems. In technology-state&amp;nbsp;conflicts, like the well-known case of Google’s conflict&amp;nbsp;with China (Drummond 2010), technology service providers&amp;nbsp;and companies have actually emerged as the vanguards of&amp;nbsp;citizens’ rights against states that seek to curb them.&lt;/p&gt;
&lt;p&gt;Similarly, civil society and citizens are divided around&amp;nbsp;the question of access to technology. The techno-publics&amp;nbsp;are often exclusive and make certain analogue forms of&amp;nbsp;citizenships obsolete. While there is a euphoria about the&amp;nbsp;emergence of a multitude of voices online from otherwise&amp;nbsp;closed societies, it is important to remember that these voices&amp;nbsp;are mediated by the market and the state, and often have to&amp;nbsp;negotiate with strong capillaries of power in order to gain&amp;nbsp;the visibility and legitimacy for themselves. Additionally,&amp;nbsp;the recalibration in the state-market-citizen triad means&amp;nbsp;that there is certain disconnect from history which makes&amp;nbsp;interventions and systemic social change that much more difficult.&lt;/p&gt;
&lt;h2&gt;Snapshots&lt;/h2&gt;
&lt;p&gt;We draw from our observations in the “Digital Natives with a Cause?”[&lt;a href="#3"&gt;3&lt;/a&gt;]&amp;nbsp;research program, which brought together over&amp;nbsp;65 young people working with digital technologies towards&amp;nbsp;social change, and around 40 multi-sector stakeholders in&amp;nbsp;the field to decode practices in order to gain a more nuanced&amp;nbsp;understanding of the relationships between technology and&amp;nbsp;politics.&lt;/p&gt;
&lt;p&gt;The first case study is from Taiwan, where the traditionally&amp;nbsp;accepted uni-linear idea of senders-intermediaries-passive&amp;nbsp;receivers is challenged by adopting a digital information&amp;nbsp;architecture model for a physical campaign.[&lt;a href="#4"&gt;4&lt;/a&gt;]&amp;nbsp;The story not&amp;nbsp;only provides insight into these blurred boundaries and&amp;nbsp;roles, but also offers an understanding of the new realm of&amp;nbsp;political intervention and processes of social transformation.&lt;/p&gt;
&lt;p&gt;As YiPing Tsou (2010) from the Soft Revolt project in Taipei&amp;nbsp;explains, "I have realised how the Web has not only virtually&amp;nbsp;reprogrammed the way we think, talk, act and interact&amp;nbsp;with the work but also reformatted our understanding of&amp;nbsp;everyday life surrounded by all sorts of digital technologies."&lt;/p&gt;
&lt;p&gt;Tsou’s own work stemmed from her critical doubt of&amp;nbsp;the dominant institutions and structures in her immediate&amp;nbsp;surroundings. Fighting the hyper-territorial rhetoric of the&amp;nbsp;Internet, she deployed digital technologies to engage with&amp;nbsp;her geo-political contexts. Along with two team members,&amp;nbsp;she started the project to question and critique the rampant&amp;nbsp;consumerism, which has emerged as the state and market&amp;nbsp;in Taiwan collude to build more pervasive marketing infrastructure&amp;nbsp;instead of investing in better public delivery&amp;nbsp;systems. The project adopted a gaming aesthetic where the&amp;nbsp;team produced barcodes, which when applied to existing&amp;nbsp;products in malls and super markets, produced random&amp;nbsp;pieces of poetry at the check-out counters instead of the&amp;nbsp;price details that are expected. The project challenged the&amp;nbsp;universal language of barcodes and mobilized large groups&amp;nbsp;of people to spread these barcodes and create spaces of&amp;nbsp;confusion, transient data doubles, and alternative ways of&amp;nbsp;reading within globalized capitalist consumption spaces. The project also demonstrates how access to new forms of&amp;nbsp;technology also leads to new information roles, creating&amp;nbsp;novel forms of participation leading to interventions towards&amp;nbsp;social transformation.&lt;/p&gt;
&lt;p&gt;Nonkululeko Godana (2010) from South Africa does&amp;nbsp;not think of herself as an activist in any traditional form.&amp;nbsp;She calls herself a storyteller and talks of how technologies&amp;nbsp;can amplify and shape the ability to tell stories. Drawing&amp;nbsp;from her own context, she narrates the story of a horrific&amp;nbsp;rape that happened to a young victim in a school campus&amp;nbsp;and how the local and national population mobilized itself&amp;nbsp;to seek justice for her. For Godana, the most spectacular&amp;nbsp;thing that digital technologies of information and communication&amp;nbsp;offer is the ability for these stories to travel in&amp;nbsp;unexpected ways. Indeed, these stories grow as they are&amp;nbsp;told. They morph, distort, transmute, and take new avatars,&amp;nbsp;changing with each telling, but managing to help the message leap across borders, boundaries, and life-styles. She&amp;nbsp;looks at storytelling as something that is innate to human&amp;nbsp;beings who are creatures of information, and suggests that&amp;nbsp;what causes revolution, what brings people together, what&amp;nbsp;allows people to unify in the face of strife and struggle is&amp;nbsp;the need to tell a story, the enchantment of hearing one,&amp;nbsp;and the passion to spread it further so that even when the&amp;nbsp;technologies die, the signal still lives, the message keeps on&amp;nbsp;passing. As Clay Shirky, in his analysis of the first recorded&amp;nbsp;political :ash-mob in Phillipines in 2001, suggests, "social&amp;nbsp;media’s real potential lies in supporting civil society and the&amp;nbsp;public sphere — which will produce change over years and&amp;nbsp;decades, not weeks or months."&lt;/p&gt;
&lt;h2&gt;Propositions&lt;/h2&gt;
&lt;p&gt;These two stories are just a taste of many such narratives that&amp;nbsp;abound the field of technology based social transformation&amp;nbsp;and activism. In most cases, traditional lenses will not recognize&amp;nbsp;these processes, which are transient and short-lived&amp;nbsp;as having political consequence. When transformative value&amp;nbsp;is ascribed to them, they are brought to bear the immense&amp;nbsp;pressure of sustainability and scalability which might not be&amp;nbsp;in the nature of the intervention. Moreover, as we have seen&amp;nbsp;in these two cases, as well as in numerous others, the younger&amp;nbsp;generation — these new groups of people using social media&amp;nbsp;for political change, often called digital natives, slacktivists,&amp;nbsp;or digital activists — renounce the earlier legacy of political&amp;nbsp;action. They prefer to stay in this emergent undefined&amp;nbsp;zone where they would not want an identity as a political&amp;nbsp;person but would still make interventions and engage with&amp;nbsp;questions of justice, equity, democracy, and access, using the&amp;nbsp;new tools at their disposal to negotiate with their immediate&amp;nbsp;socio-cultural and geo-political contexts.&lt;/p&gt;
&lt;p&gt;In their everyday lives, Digital Natives are in different&amp;nbsp;sectors of employment and sections of society. They can be&amp;nbsp;students, activists, government officials, professionals, artists,&amp;nbsp;or regular citizens who spend their time online often in&amp;nbsp;circuits of leisure, entertainment and self-gratification. However,&amp;nbsp;it is their intimate relationship with these processes,&amp;nbsp;which is often deemed as ‘frivolous’ that enables them, in&amp;nbsp;times of crises, to mobilize huge human and infrastructural&amp;nbsp;resources to make immediate interventions.&lt;/p&gt;
&lt;p&gt;It is our proposition that it is time to start thinking about&amp;nbsp;digital activism as a tenuous process, which might often hide&amp;nbsp;itself in capillaries of non-cause related actions but can be&amp;nbsp;materialized through the use of digital networks and platforms&amp;nbsp;when it is needed. Similarly, a digital activist does not&amp;nbsp;necessarily have to be a full-time ideology spouting zealot,&amp;nbsp;but can be a person who, because of intimate relationships&amp;nbsp;with technologized forms of communication, interaction,&amp;nbsp;networking, and mobilization, is able to transform him/&amp;nbsp;herself as an agent of change and attain a central position&amp;nbsp;(which is also transitory and not eternal) in processes of&amp;nbsp;social movement. Such a lens allows us to revisit our existing&amp;nbsp;ideas of what it means to be political, what the new landscapes&amp;nbsp;of political action are, how we account for processes&amp;nbsp;of social change, and who the people are that emerge as&amp;nbsp;agents of change in our rapidly digitizing world.&lt;/p&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;NISHANT SHAH is&amp;nbsp;Director-Research at the Bangalore based Centre for Internet and Society. He is one of the lead researchers for the&amp;nbsp;“Digital Natives with a Cause?” knowledge programme and has interests in questions of digital identity, inclusion and social change.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;FIEKE JANSEN&amp;nbsp;is based at the Humanist Institute for Development Cooperation (Hivos).&amp;nbsp;She is the knowledge officer for the Digital Natives with a Cause? knowledge programme and her areas of &lt;/span&gt;&lt;span class="Apple-style-span"&gt;interest are the role of digital technologies in social change processes.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;References&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;Domscheit-Berg, Daniel. 2011. &lt;em&gt;Inside Wikileaks: My Time with Julian Assange&amp;nbsp;at the World’s Most Dangerous Website&lt;/em&gt;. New York: Crown Publishers.&lt;/p&gt;
&lt;p&gt;Drummond, David. 2010. “A New Approach to China.” Available at: http://&amp;nbsp;googleblog.blogspot.com/2010/01/new-approach-to-china.html.&lt;/p&gt;
&lt;p&gt;Godana, Nonkululeko. 2011. “Change is Yelling: Are you Listening?”&amp;nbsp;&lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre for Internet and&amp;nbsp;Society publications. Available at: http://www.hivos.net/content/download/&amp;nbsp;40567/260946/file/Position%20Papers.pdf. Retrieved: February 3,&amp;nbsp;2011.&lt;/p&gt;
&lt;p&gt;Knorringa, Peter. 2010. A Balancing Act — Private Actors in Development,&amp;nbsp;Inaugural Lecture ISS. Available at: http://www.iss.nl/News/Inaugural-Lecture-Professor-Peter-Knorringa. Retrieved: February 3, 2011.&lt;/p&gt;
&lt;p&gt;Morozov, Evgeny. 2011. &lt;em&gt;The Net Delusion: The Dark Side of Internet Freedom&lt;/em&gt;.&amp;nbsp;New York: Public Affairs.&lt;/p&gt;
&lt;p&gt;Shirky, Clay. 2011. “The Political power of Social Media: Technology, the&amp;nbsp;Public Sphere, and Political Change.” &lt;em&gt;Foreign Affairs&lt;/em&gt; 90, (1); p. 28-41.&lt;/p&gt;
&lt;p&gt;Shah, Nishant and Sunil Abraham. 2009. “Digital Natives with a Cause.”&amp;nbsp;Hivos Knowledge Programme. Hivos and the Centre for Internet and Society&amp;nbsp;publications. Available at: http://cis-india.org/research/dn-report. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;Tsou, YiPing. 2010. “(Re)formatting Social Transformation in the Age of&amp;nbsp;Digital Representation: On the Relationship of Technologies and Social&amp;nbsp;Transformation”, &lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre&amp;nbsp;for Internet and Society publications. Available at: http://www.hivos.net/&amp;nbsp;content/download/40567/260946/file/Position%20Papers.pdf. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;West, Harry and Parvathi Raman. 2009. &lt;em&gt;Enduring Socialism: Exploration&amp;nbsp;of Revolution and Transformation, Restoration and Continuation&lt;/em&gt;. London:&amp;nbsp;Berghahn Books.&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;End Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]&lt;/a&gt; Morozov looks at how ‘Digital Activism’ often feeds the very structures&amp;nbsp;against we protest, with information that can prove to be counter productive&amp;nbsp;to the efforts. The digital is still not ‘public’ in its ownership and a complex assemblage of service providers, media houses and governments often lead to a betrayal of sensitive information which was earlier protected in the use&amp;nbsp;of analogue technologies of resistance.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]&lt;/a&gt; Following the revolutions in Egypt, China, worried that the model might be appropriated by its own citizens against China’s authoritarian regimes, decided to block “Jan25” and mentions of Egypt from Twitter like websites. More can be read here: &lt;a href="http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site"&gt;http://yro.slashdot.org/story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]&lt;/a&gt; More information about the programme can be found &lt;a href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Digital-Natives-with-a-Cause"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]&lt;/a&gt; Models of digital communication and networking have always imagined that the models would be valid only for the digital environments. Hence, the physical world still engages only with the one-to-many broadcast model, where the central authorities produce knowledge which is disseminated to the passive receivers who operate only as receptacles of information rather than bearers of knowledge. To challenge this requires a re-orientation of existing models and developing ways of translating the peer-to-peer structure in the physical world.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism'&gt;https://cis-india.org/raw/between-the-stirrup-and-the-ground-relocating-digital-activism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-25T05:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world">
    <title>Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world</link>
    <description>
        &lt;b&gt;I was a part of a working group writing a white paper on big data and social change, over the last six months. This white paper was produced by a group of activists, researchers and data experts who met at the Rockefeller Foundation’s Bellagio Centre to discuss the question of whether, and how, big data is becoming a resource for positive social change in low- and middle-income countries (LMICs).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bellagio Big Data Workshop Participants. (2014). “Big data and positive social change in the developing world: A white paper for practitioners and researchers.” Oxford: Oxford Internet Institute. Available online: &lt;a class="external-link" href="http://ssrn.com/abstract=2491555"&gt;http://ssrn.com/abstract=2491555&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Our working definition of big data includes, but is not limited to, sources such as social media, mobile phone use, digitally mediated transactions, the online news media, and administrative records. It can be categorised as data that is provided explicitly (e.g. social media feedback); data that is observed (e.g. mobile phone call records); and data that is inferred and derived by algorithms (for example social network structure or inflation rates). We defined four main areas where big data has potential for those interested in promoting positive social change: advocating and facilitating; describing and predicting; facilitating information exchange and promoting accountability and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of &lt;span class="ff5"&gt;advocating and facilitating&lt;/span&gt;,&lt;span class="_0 _"&gt; &lt;/span&gt; we discussed ways in which volunteered data may &lt;span class="_0 _"&gt; &lt;/span&gt;help organisations to open up new public spa&lt;span class="_0 _"&gt;&lt;/span&gt;ces for discussion and awareness&lt;span class="_0 _"&gt;&lt;/span&gt;-building; how both aggregating data and working across different databa&lt;span class="_0 _"&gt;&lt;/span&gt;ses can be tools for building awa&lt;span class="_0 _"&gt;&lt;/span&gt;reness, and howthe digital data commons can also configure new&lt;span class="_0 _"&gt;&lt;/span&gt;&lt;span class="ff5"&gt; &lt;/span&gt;communities and actions&lt;span class="_0 _"&gt;&lt;/span&gt; (sometimes serendipitously) through data science and aggregation. Finally, we also&lt;span class="_0 _"&gt;&lt;/span&gt; looked at the problem of overexposure and ho&lt;span class="_0 _"&gt;&lt;/span&gt;wactivists and organisations can&lt;span class="_0 _"&gt;&lt;/span&gt; protect themselves and hide their digital footprin&lt;span class="_0 _"&gt;&lt;/span&gt;ts. The challenges w&lt;span class="ls2"&gt;e&lt;/span&gt; identified in this area were how to interpret data&lt;span class="_0 _"&gt;&lt;/span&gt; correctly when supplementary information may b&lt;span class="_0 _"&gt;&lt;/span&gt;e lacking; organisational capacity constraints aro&lt;span class="_0 _"&gt;&lt;/span&gt;und processing and storing data,&lt;span class="_0 _"&gt;&lt;/span&gt; and issues around data dissemination, i.e. the pos&lt;span class="_0 _"&gt;&lt;/span&gt;sible negative consequences of inadvertently ide&lt;span class="_0 _"&gt;&lt;/span&gt;ntifying groups or individuals&lt;span class="_0 _"&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, we looked at the way big data can help describe and predict, functions which are particularly important in the academic, development and humanitarian areas of work where researchers can combine data into new dynamic, high-resolution datasets to detect new correlations and surface new questions. With data such as mobile phone data and Twitter analytics, understanding the data’s comprehensiveness, meaning and bias are the main challenges, accompanied by the problem of developing new and more comprehensive ethical systems to protect data subjects where data is observed rather than volunteered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next group of activities discussed was facilitating information exchange. We looked at mobile-based information services, where it is possible for a platform created around a particular aim (e.g. agricultural knowledge-building) to incorporate multiple feedback loops which feed into both research and action. The pitfalls include the technical challenge of developing a platform which is lean yet multifaceted in terms of its uses, and particularly making it reliably available to low-income users. This kind of platform, addressed by big data analytics, also offers new insights through data discovery and allows the provider to steer service provision according to users’ revealed needs and priorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our last category for big data use was accountability and transparency, where organisations are using crowdsourcing methods to aggregate and analyse information in real time to establish new spaces for critical discussion, awareness and action. Flows of digital information can be managed to prioritise participation and feedback, provide a safe space to engage with policy decisions and expose abuse. The main challenges are how to keep sensitive information (and informants) safe while also exposing data and making authorities accountable; how to make the work sustainable without selling data, and how to establish feedback loops so that users remain involved in the work beyond an initial posting. In the crowdsourcing context, new challenges are also arising in terms of how to verify and moderate real-time flows of information, and how to make this process itself transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, we also discussed the relationship between big and open data. Open data can be seen as a system of governance and a knowledge commons, whereas big data does not by its nature involve the idea of the commons, so we leaned toward the term ‘opening data’, i.e. processes which could apply to commercially generated as much as public-sector datasets. It is also important to understand where to prioritise opening, and where this may exclude people who are not using the ‘right’ technologies: for example, analogue methods (e.g. nailing a local authority budget to a town hall door every month) may be more open than ‘open’ digital data that’s available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our discussion surfaced many questions to do with representation and meaning: must datasets be interpreted by people with local knowledge? For researchers to get access to data that is fully representative, do we need a data commons? How are data proprietors engaging with the power dynamics and inequalities in the research field, and how can civil society engage with the private sector on its own terms if data access is skewed towards elites? We also looked at issues of privacy and risk: do we need a contextual risk perspective rather than a single set of standards? What is the role of local knowledge in protecting data subjects, and what kinds of institutions and practices are necessary? We concluded that there is a case to be made for building a data commons for private/public data, and for setting up new and more appropriate ethical guidelines to deal with big data, since aggregating, linking and merging data present new kinds of privacy risk. In particular, organisations advocating for opening datasets must admit the limitations of anonymisation, which is currently being ascribed more power to protect data subjects than it merits in the era of big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our analysis makes a strong case that it is time for civil society groups in particular to become part of the conversation about the power of data. These groups are the connectors between individuals and governments, corporations and governance institutions, and have the potential to promote big data analysis that is locally driven and rooted. Civil society groups are also crucially important but currently underrepresented in debates about privacy and the rights of technology users, and civil society as a whole has a responsibility for building critical awareness of the ways big data is being used to sort, categorise and intervene in LMICs by corporations, governments and other actors. Big data is shaping up to be one of the key battlefields of our era, incorporating many of the issues civil society activists worldwide have been working on for decades. We hope that this paper can inform organisations and&lt;br /&gt;individuals as to where their particular interests may gain traction in the debate, and what their contribution may look like.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf"&gt;Click to download the full white paper here&lt;/a&gt;&lt;/b&gt;. (PDF, 1.95 Mb)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world'&gt;https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-10-01T03:52:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges">
    <title>Asia in the Edges: A Narrative Account of the Inter-Asia Cultural Studies Summer School in Bangalore</title>
    <link>https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges</link>
    <description>
        &lt;b&gt;The Inter-Asia Cultural Studies Summer School is a Biennial event that invites Masters and PhD students from around Asia to participate in conversations around developing and building an Inter-Asia Cultural Studies thought process. Hosted by the Inter-Asia Cultural Studies Society along with the Consortium of universities and research centres that constitute it, the Summer School is committed to bringing together a wide discourse that spans geography, disciplines, political affiliations and cultural practices for and from researchers who are interested in developing Inter-Asia as a mode of developing local, contextual and relevant knowledge practices. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This is the narrative account of the experiments and ideas that shaped  the second Summer School, “The Asian Edge” which was hosted in  Bangalore, India, in 2012. The peer reviewed article was &lt;a class="external-link" href="http://dx.doi.org/10.1080/14649373.2014.911462"&gt;published in Inter-Asia Cultural Studies&lt;/a&gt; Journal, Volume 15, Issue 2, on July 3, 2014. &lt;a href="https://cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf" class="external-link"&gt;Click to download the file&lt;/a&gt;. (PDF, 95 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;At the heart of the Inter-Asia Cultural Studies (IACS) project has been a pedagogic impulse that seeks to train young students and scholars in critical ways of thinking about questions of the contemporary. The ambition of developing an “Asian way of thinking” is not merely a response to the hegemony of North-Western theory in thought and research, especially in Social Sciences and Humanities. It is also a way by which new knowledge is developed and shared between different locations in Asia, to get a more embedded sense of the social, the political and the cultural in the region. Apart from building a widespread network of researchers, activists, academics and artists who have generated the most comprehensive and critical insights into developing ontological and teleological relationships with Asia, there have always been attempts made to integrate students into the network’s activities. From student pre-conferences that invited students to build intellectual dialogues, to subsidies and fellowships offered to allow students to travel from their different institutions across Asia, various initiatives have inspired and facilitated the first encounter with Asia for a number of young researchers who might have lived in Asian countries but not been trained to understand the context of what it means to be in Asia. Over time, through different structures, such as the institutionalisation of the &lt;em&gt;Inter-Asia Cultural Studies&lt;/em&gt; Journal and the growth of the eponymous conference, the IACS has already expanded the scope of its activities, involving new interlocutors and locations in which to grow the environment of critical academic and research discourse.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Building upon the expertise and networks of scholarship developed for over a decade, the IACS Society initiated the biennial Inter-Asia Cultural Studies Summer School, in order to engage younger scholars and students with some of the key questions that have been discussed and contested in the cultural studies discourse in Asia. The IACS Summer School that began in 2010 in Seoul, is a travelling school that moves to different countries, drawing upon local energies, resources and debates to acquaint students with the critical discourse as well as the experience of difference that marks Asia as a continent. The summer school in 2012 was hosted jointly by the Centre for the Study of Culture and Society and the Centre for Internet and Society in Bangalore, India, in collaboration with the Centre for Contemporary Studies at the Indian Institute of Sciences.&lt;a name="fr1" href="#fn1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For a snapshot of the Summer School, see Table 1 below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table 1. The 2012 Inter-Asia cultural studies summer school: a snapshot&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Core course: Methodologies for Cultural Studies in Asia (2–11 August, 2012)&lt;br /&gt;Optional courses&lt;br /&gt;The Digital Subject / Technology, Culture and the Body (13–16 August, 2012)&lt;br /&gt;Language of Instruction: EnglishHomepage: &lt;a class="external-link" href="http://culturalstudies.asia/?page_id=86"&gt;http://culturalstudies.asia/?page_id=86&lt;/a&gt;&lt;br /&gt;Organisers: Centre for the Study of Culture and Society, Bangalore; The Centre for Internet &amp;amp; Society, Bangalore&lt;br /&gt;Host: Centre for Contemporary Studies, Indian Institute of Sciences, Bangalore&lt;br /&gt;Co-organisers: Consortium of Inter-Asia Cultural Studies Consortium Institutions; Institute of East Asian Studies, Sungkonghoe University, Korea&lt;br /&gt;Course Coordinators: Nitya Vasudevan &amp;amp; Nishant Shah&lt;br /&gt;Number of Students: 35 students from 12 Asian countries&lt;br /&gt;Number of Faculty: 17 from 5 Asian countries&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Plotting Edges: The Rationale&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The second summer school, hosted in August 2012, with the support of the Inter Asia Cultural Studies Consortium and the Institute of East Asian Studies, was entitled “The Asian Edge.” We decided to stay with the metaphor of the Edge because it allowed us to experiment, both conceptually and in process, with new modes of engagement, interaction, knowledge production and pedagogy. The idea of an Asian Edge was interesting because it signalled a de-bordering of Asia. The Edge is also an inroad into that which might have remained invisible or inscrutable to those outside of it. The imagination of an Asian Edge brings in both the imaginations of geography as well as the notion of extensions, where Asia, especially in this hyper-real and geo-territorial age does not remain contained within the national boundaries. Within the Inter-Asia discourse, there has been a rich theorisation around what constitutes Asia and what are the ways in which we can reconstruct our Asianness that do not fall in the easy “Asian Studies” mode of being defined by the West as the ontological reference point. Chen Kuan-Hsing’s (2010) argument in &lt;em&gt;Asia as Method&lt;/em&gt;, where he argues that Asia is a construct that emerged out of the Cold War and needs to be deconstructed and unpacked in order to understand the different instances and manifestations of India, have captured these dialogues quite comprehensively. Similarly, Ashish Rajadhyaksha’s (2009) landmark work &lt;em&gt;Indian Cinema in the time of Celluloid &lt;/em&gt;marks how questions of nationalism, modernity, governance and technology have been peculiarly and particularly tied to cultural objects and industries such as cinema, not only in negotiations with the post-colonial encounters of India with its erstwhile colonial masters but also with the different locations and imaginations of India. Chua Beng-Huat (2000) in Consumption in Asia similarly points at the ways in which Asia works at different levels of materiality and symbolism, creating communities, connections and commerce in unprecedented ways, not only within Orientalist imagination but in Asia’s own imagination of itself. The Asian Edge was also a way of introducing new thematic interventions in the Inter-Asia Cultural Studies discourse. While the IACS project has invited and initiated some of the most diverse and rich conversations around cultural production—ranging from creative industries to cultural politics; from cultural objects to flows of consumption and distribution—we haven’t yet managed to shift the debates into the realm of the digital. The emergence of digital technologies has transformed a lot of our vocabulary and conceptual framework, but we haven’t been able to translate all our concerns into the fast-paced changes that the digital ICTs are ushering into Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With this summer school, we wanted to introduce the digital and the technological as a central trope of understanding our existing and emerging research within inter-Asia cultural studies. And the edge, borrowing from the Network theories that have their grounds in Computing, Actor-Network modelling and ICT4D discourse, gives us another way of thinking about Asia. As the computing theorist Duncan Watts (1999) points out in his model of our universe as a “small world”, the edge, within networks is not merely the containing limit. It is not the boundary or the end but actually the space of interaction, communication and exchange. An edge is the route that traffic takes as it moves from one node to another. Edges are hence tenuous, they emerge and, with repetition, become stronger, but they also die and extend, morph and mutate, thus constantly changing the contours of the network. The ambition was to refuse the separation of technology from the Cultural Studies discourse, introducing what Tejaswini Niranjana in her work on Indian Language education and pedagogy calls “Integration” (Niranjana et al. 2010) rather than “interdisciplinarity”. It was also to provide a different historical trajectory to technology studies, what science and technology historians Kavita Philip, Lily Irani, and P. Dourish (2010) call “Postcolonial Computing.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge then became a space where we could consolidate the knowledge and key insights from the Inter-Asia Cultural Studies discourse, but could also open it up to new research, new modes of engagement, and new questions that need the historicity and also the points of departure. These ambitions had a direct impact on both the structure of the Summer School as well as the processes that were subsequently designed&lt;br /&gt;to implement it.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The core course: methodologies for cultural studies in Asia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Inter-Asia Summer School in Bangalore thus had some distinct ambitions, which were reflected in its structure. While it wanted to reflect the rich heritage of scholarship that has been produced through the decade-long interventions, and give the participating students a chance to engage with these intellectual stalwarts of Asia, it also wanted to reflect some of the more cuttingedge and future-looking work that is also a part of the movement’s younger scholars. Hence, instead of going with the traditional model where the pedagogues teach their own text, explaining the nuances and intricacies of their work, we decided to stage a dialogue between the existing scholarship and emerging work. The curriculum for the summer school was designed by Dr Tejaswini Niranjana, Dr Wang Xiaoming and Nitya Vasudevan, to form the first Inter- Asia Cultural studies reader, reflecting the various trends and debates around different themes that have occurred in the movement. The reader, which served as a basic textbook for the summer school, and has plans to be bilingual (English and Mandarin Chinese), introduced historical thought, critical interventions and conceptual frameworks drawn from different locations within Asia. The reader not only incorporated the scholars whose work has shaped the Inter-Asia cultural studies movement but also the formative modern thought that has been central to the social, cultural and political theorisation in Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, instead of inviting the scholars whose work has been central to the Inter-Asia Cultural Studies thought, the instructors for the courses were younger critical scholars who are building upon, responding to and entering into a dialogue with the work prescribed in the curriculum. The pedagogy, hence, instead of becoming a “lecture” that synthesises earlier work, became a threeway dialogue, where the students and the instructors were responding to common texts, not only in trying to understand them but also in the context of their own work and interests. Moreover, each session was co-taught, by instructors from different disciplines, locations and geographies, to show how the same body of work can be approached through different entry points and pushed into different directions. The classroom hours, thus became a “workshop” space where the students and the faculty were engaging in a dialogue that sought to make the historical debates relevant to the discussions in the contemporary world. They also showed how the older questions persist across time and space, and that they need to be engaged with in order to make sense of the world around us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, the Summer School classroom was designed as a space for collaborative pedagogy. The morning discussions around texts from the readers were followed by students presenting their work as a response to the texts prescribed for the day. Taking up a pecha-kucha format, it invited students to introduce themselves, their work, their context and their interventions and to open everything up for response and dialogue. The ambition was to build a community of intellectual support and interest, so that the students not only forge an affective bond but also a sense of collaboration and commonality in the work that they are already pushing in their existing research initiatives. The faculty for the day, along with some of the senior scholars also attended these presentations and helped tie in some of the earlier questions that might have emerged in the class, to the new material that was being introduced in the space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While this dialogue around new research was fruitful, we also were aware that there is a huge value in getting the students to interact with some of the more formative scholars whose work was prescribed in the curriculum. Hence, alongside the classrooms, we also hosted three salons that brought some of the significant scholars from the Inter-Asia movement into a dialogue with each other, as well as into a conversation with local intellectuals and activists. The first salon, organised at the artist collaborator 1 Shanthi Road, saw Chen Kuan-Hsing and Tejaswini Niranjana, discussing the impulse of the Inter-Asia movement. Charting the history, the different trajectories and the ways in which it has grown, both through friendships and networks, and intellectual interventions and collaborations, the conversation gave an entrypoint to younger scholars in understanding the politics and the motivation of this thought journey. The second salon, organised at the Alternative Law Forum, had Ding Naifei (Taiwan) and Firdaus Azim (Bangladesh) in conversation with legal sexuality and human rights activists Siddharth Narrain and Arvind Narrain (India) to unpack the politics of rights, sexuality, modernity and identity in different parts of Asia. The third salon, hosted at the Centre for Internet &amp;amp; Society, saw Ashish Rajadhyaksha (India) in conversation with Stephen Chan (Hong Kong) looking at questions of infrastructure, sustainability and the new role that research has to play in non-university and non-academic spaces and networks. The salons were designed to be informal settings for conversations and socialising, giving the summer school students access to the senior faculty outside of the classroom setting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school also wanted to ensure that the students were introduced to the materiality and the texture of the local, to understand the different layers of modernity and habitation that the IT City of Bangalore has to offer. Hence a local tour, charting the growth of Bangalore from a sleepy education centre to the burgeoning IT City that it has become, guided by curator and artist Suresh Jairam, was included as a part of the teaching. The four-hour walking tour laid bare the different contestations and layers of an IT city in India, showing the liminal markets, local cultures of production, and the ways in which they need to be factored into our images and imaginations of modernity and the IT City. Along with these, there were student parties arranged in different local clubs and institutions of Bangalore, to offer informal spaces of socialising for the students but also to give them a glimpse of what public spaces and cultures of being social might look like in a city such as Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school found a new richness because two of the days were twinned with a workshop on Culture Industries, supported by the Japan Foundation, which became a pedagogic space for the summer school participants. The students had a new focus introduced to their work and a chance to meet other scholars and activists in the field from Asia, who presented their work as part of the Summer School. The creative industries workshop also afforded a chance for students to form new connections and collaborations with projects and research initiatives that were being discussed in that forum.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These different components were thus designed and put together as a part of the core course for the Inter-Asia Summer School in Bangalore. Each component had a specific vision and was designed to offer different spaces of learning, pedagogy and interaction for everybody included. The core course was an overview of the diversity and exchange that are parts of the Inter-Asia movement. The course ended with a “booksprint” model where the students, inspired by the conversations at the summer school, were given a day to submit written work that would capture their own learning and growth in the process. The submissions could take the form of an academic essay, a sketch towards a research essay, a blog entry summarising key events from a particular conversation, or a narrative summary of the key points in their own research and how it relates to the conversations at the Summer School. While the core course was compulsory for all the participants, the Summer School also offered two optional elective courses, which the students could opt for after the core course was concluded. The optional courses were designed to introduce students to work and debates that had not yet emerged centrally in the Inter-Asia debates, but were part of their current conversations.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;New nodes: Optional courses: the digital subject/technology, culture and the body&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The optional courses, which lasted for four days, were a way of introducing the students to some new core debates that are emerging in the Cultural Studies discourse. The courses were designed to specifically concentrate on how the older questions and frameworks are being reworked with the emergence of digital technologies, thus helping students to consolidate their own work and also engage with research initiatives across different parts of Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first optional course, entitled “The Digital Subject,” was coordinated by Nishant Shah and had lectures by Ashish Rajadhyaksha and Lawrence Liang. It proposed to account for the drastic changes in the relationships between the State, the Citizen and the Markets with the rise of digital technologies in the twenty-first century. The course proposed that as globalisation consolidates itself in Asia, we see changes in the patterns of governance, of state operation, of citizen engagement and civic action. We are in the midst of major revolutions in the Middle East and North Africa, powered by digital social change, some headed by cyber-utopians specialising in Web 2.0 and Social media. Phrases such as “Twitter Revolutions” and “Facebook Protests” have become very common.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Instead of concentrating only on the newness of technology-mediated change, there is a need to engage with the changing landscape of political subjectivity and engagement through a reintegration of science and technology studies with cultural studies and social sciences. The course thus posited certain questions that need to be addressed, within the domain of cultural studies, around the digital: what does a digital subject look like? What are the futures of existing socio-cultural rights based movements? How do digital technologies produce new interfaces for interaction and mobilisation? How do we develop integrated science-technologysociety approaches to understand our technology-mediated contemporary and futures?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through a series of seminars, workshops, film screening, lectures, and fieldtrips, the course challenged the students not only to look at new objects of the digital but also to ask new questions of the old, inspired by the new methods and frameworks that the digital technologies are opening up for us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second optional course entitled “Technology, Culture and the Body” was coordinated by Nita Vasudevan and had Audrey Yue, Ding Naifei, Tejaswini Niranjana, Wing-Kwong Wong, and Hsing-Wen Chang as instructors. The course began with a hypothesis that, at this moment in history, we seem to be embedded in what Heidegger calls “the frenziedness of technology.” Hence, now more than ever, it is important that we try to understand how the gendered body relates to technology, and what this means for the domain of the cultural. For instance, what are the freedoms that technology is said to offer this body? What are these freedoms posed in opposition to? How do we understand technological practice contextually, both historically and in the contemporary? Is it possible to have a notion of the body that is outside technology, and a notion of technology that is outside cultural practice?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The course called for a move away from the idea of technology as a tool used by the human body, or the idea of technology as mere prosthesis or extension, to map the different ways of understanding the relationship&lt;br /&gt;between culture, technology and the body, specifically in the Asian context. It will involve examining practices, cultural formations and understandings that have emerged within various locations in Asia. The course engaged the students in closereadings of key events and texts, hosted workshops to present and critique their own work, and think of collaborative pathways towards future distributed research and pedagogic initiatives that can emerge within the Inter-Asia space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Both courses had additional assignments that included close-reading of texts, practical field work, critical reflection and collaborative projects completed during the span of the course.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Tying things up: key learnings&lt;/h3&gt;
&lt;p&gt;The Second Inter-Asia Cultural Studies Summer School was an ambitious structure, and while there were logistical hiccups in the implementation, there were some key learning aspects that need to be highlighted.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Working with tensions&lt;/em&gt;. Asia is not a homogeneous unified entity. There are several geo-political tensions that mark the relationships between different countries in Asia. While the academic protocol and individual interest in learning more can help negotiate these tensions, these tensions do play out in different linguistic, cultural and emotional unintelligibility, which becomes part of the pedagogic moment in the Inter-Asia classroom. Orienting the instructors to these tensions, and trying to build a collaborative environment where the students appreciate these tensions and learn to communicate with each other and engage with the different contexts is extremely valuable. In the summer school, we had students helping each other with translation, providing new contexts and critiques for each other’s work, and learning how to engage with the palpable difference of somebody from a different country. These tensions can sometimes slow the content and discussions in the classrooms, but taking it up as a collective challenge (rather than just thinking of it as a logistical problem where students not fluent in English need to be given tools of translation) made for a productive and rich learning environment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Ownership of community structures&lt;/em&gt;. When young scholars from different parts of the world are thrown together for such an intense period of time, it is inevitable that there will be bonds of friendship and belonging that grow. We had debated about whether we should invest in doing online community building by creating platforms, discussion boards and other structures that accompany digital outreach and coordination. However, apart from the initial centralization for applications and programming, we eventually decided to make the participants owners of these activities.’ to give a better sense of the ‘digital structures of community building’. And it was fascinating to see how they formed social networks, blogs, Tumblrs and other spaces of conversation among themselves, making these spaces more vibrant and diverse, thus leading to conversations beyond the summer school.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Infrastructure of participation&lt;/em&gt;. The Summer School was an extremely subsidised event thanks to the generous support of the Inter-Asia Cultural Studies Consortium, the Institute of East Asian Studies and the Indian Institute of Sciences, who helped in significantly reducing the costs of registration. The availability of travel fellowships, subsidies, scholarships, and an infrastructure of access cannot be emphasised enough in our experience. Owing to the subsidised costs, the living conditions and the logistics were not optimal. And while the students were extremely cooperative and accommodating with the glitches, we realised that better living conditions and amenities, especially for young students who are travelling to a different country for the first time, are as important as the classroom and the intellectual thought and design. Finding more resources to ease the conditions of travel and living will help build richer conversations inside and outside the classrooms. Sustained efforts to find more funding for a space for the IACS summer school need to be continued.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Selection processes&lt;/em&gt;. It was wanted to promote the Inter-Asia movement and hence a first preference was given to students who applied for the summer school through an open call for application. The students were asked to have references from people who have been a part of the movement, and also to send in a brief essay describing their expectations from the summer school. We were scouting for students—given that the numbers we could accept were limited—who were involved in not only learning but also in contributing to the social and political thought of the Inter-Asia movement. We also encouraged students who might not have been a part of a formal education system but are considering further education. Instead of building a homogeneous student base, there was an attempt made to find different kinds of students, from different locations, at different places in their own research work, and with different disciplines and modes of engagement. Scholarships and travel aid were offered to students who we thought deserved to be a part of the summer school but did not have access to university resources for participation. The diversity helped bring a more comprehensive compendium of skills and methods to the table.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Integration and relevance. Younger students often find it difficult to deal with historically formative texts from other contexts because they do not see how this responds to their context or is relevant to their work in contemporary times. Efforts at integrating the different cultures, showing the different trajectories of thought and research within Asia, and at locating the older texts in the context of modern-day research were hugely rewarding and more attempts need to be made to continue this process of making the historical archive of the Inter-Asia Cultural Studies Movement relevant and critical in new research.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Planning the futures. The participants had all indicated that post the Summer School, they would be excited to see what future avenues for participation there could be. With this summer school, we hadn’t looked at modes of sustained engagement with the participants. While they did take the initiative to communicate with each other, the momentum that was generated because of these discussions could not be captured in its entirety because we did not have any formal structures and processes to continue the engagement. Especially if the IACS summer schools are some sort of an orientation into the IACS movement, then there should be more systemic thought given to how those interested in engaging with the questions can do so, through their own academic and institutional locations, but also through different kinds of support structures that continue the conversations and exchange that begin at the Summer School.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Synergy with the local&lt;/em&gt;. For us, as well as for the students, the synergy with the local movements, activists, artists and research was fruitful and productive. One of the values of a travelling summer school is that every summer school can take up a particular theme that is locally relevant and weave it into the summer school. For Bangalore, it made logical sense for us to bring questions of Digital Technologies and Identity/Bodies into the course. Even within the core course, there was an effort to integrate these as key questions that open up new terrains of thought and research within Inter-Asia cultural studies. The optional courses, which were introduced for the first time, were exciting and generated a lot of interest and engagement from the participants. Attempts at creating these kinds of synergies need to be supported along with new and experimental modes of pedagogy and learning.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The Second Inter-Asia Cultural Studies Summer School was a great opportunity to harness the potentials of the incredibly rich and diverse network that the IACS movement has built up over more than a decade. For us, it also became a playground where, inspired by the hacker culture and DIY movements that dot the landscape of Bangalore, we experimented with different forms of learning and knowledge production. Involving the students as stakeholders in the process, engaging with them as peers, making them responsible for collaborative learning, and creating spaces of participation and socialisation helped us circumvent many of the problems of language and cultural diversity that might have otherwise crippled the entire process. Pushing these modes of interaction and integration, while also creating an environment of trust, reciprocity and goodwill, is probably even more important than the curriculum and teaching, because these interactions create new nodes and connections, with each student and his/her interaction creating new edges that will hopefully shape and contribute to the contours of critical thought and intervention in Asia.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Chen, Kuan-Hsing. 2010. &lt;em&gt;Asia as Method: Toward Deimperialization&lt;/em&gt;. Durham and London: Duke University Press.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Chua, Beng-Huat, ed. 2000. &lt;em&gt;Consumption in Asia: Lifestyle and Identities&lt;/em&gt;. London: Routledge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Philip, Kavita, Lily Irani, and P. Dourish. 2010. “Postcolonial Computing: A Tactical Survey.” &lt;em&gt;Science Technology Human Values&lt;/em&gt; 37 (1): 3–29.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajadhyaksha, Ashish. 2009. &lt;em&gt;Indian Cinema in the time of Celluloid: From Bollywood to the Emergency&lt;/em&gt;. New Delhi: Combined Academic Publications.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Niranjana, Tejaswini, et al. 2010. &lt;em&gt;Strengthening Community Engagement of Higher Education Institutions&lt;/em&gt;. Bangalore: Centre for the Study of Culture and Society.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Watts, Duncan. 1999. “Networks, Dynamics, and the Small-World Phenomenon.” &lt;em&gt;AJS&lt;/em&gt; 105 (2): 493–527.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Author's Biography&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah is the Director of Research at the Bangalore-based Centre for Internet &amp;amp; Society, an International Tandem Partner at the Hybrid Publishing Lab, Leuphana University, and a Knowledge Partner with Hivos, in The Hague. He is the editor of the four-volume anthology Digital AlterNatives with a Cause? and writes regularly for the Indian newspaper The Indian Express and for the Digital Media and Learning Hub at dmlcentral.net. His current areas of interest are Digital Humanities, Digital Activism and Digital Subjectivity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. &lt;span class="discreet"&gt;A mammoth project such as the Inter-Asia Summer School requires resources, support and generosity from family, friends, and colleagues that can never be measured or cited in a note. However, there are a few people who need to be mentioned for their incredible spirits and the resources that they extended to us. Dr Raghavendra Gaddakar at the Centre for Contemporary Studies, Indian Institute of Sciences and his entire staff were patient and hospitable hosts, housing the entire summer school for over a fortnight. The faculty, students and staff at the Centre for the Study of Culture and Society (CSCS) Bangalore helped in designing courses, finding venues and organising events that added to the richness of the summer school. Raghu Tankayala and Radhika P, both at CSCS were our rocks through this process, taking up a lion’s share of logistical arrangements. The help of the entire staff at the Centre for Internet and Society, who were there every step, helping with every last detail, and the Executive Director Sunil Abraham who lent us infrastructure and financial support to organise various events and salons, is unparalleled and I know I would have found it impossible to work without the knowledge that they would always be there to watch my back. All the instructors who agreed to join the teaching crew made this summer school what it became (a full list can be found at &lt;a href="https://cis-india.org/internet-governance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-governance/iacs-summer-school-2012&lt;/a&gt;). Both Nitya Vausdevan and I owe a huge amount of gratitude to the IACS society and the Consortium, as well as the stalwarts of the IACS movement who put faith in our vision, and pushed us, supported us, inspired us and helped us to carry out the different things we had planned. The local partners who make our life worth living—friends and colleagues at 1 Shanthi Road and The Alternative Law Forum—have been our rocks and we cannot thank them enough for their support and encouragement. A special thanks to Daniel Goh, who apart from being a faculty member, also helped us put together the website to manage the workflow for the entire project.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. &lt;span class="discreet"&gt;A full list of instructors and the prescribed curriculum can be found at &lt;a href="https://cis-india.org/internet-overnance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-overnance/iacs-summer-school-2012&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges'&gt;https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Inter-Asia Cultural Studies</dc:subject>
    
    
        <dc:subject>Peer Reviewed Article</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-14T12:47:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/not-a-goodbye-more-a-come-again">
    <title>Not a Goodbye; More a ‘Come Again’: Thoughts on being Research Director at a moment of transition</title>
    <link>https://cis-india.org/raw/not-a-goodbye-more-a-come-again</link>
    <description>
        &lt;b&gt;As I slowly make the news of my transition from being the Research Director at the Centre for Internet and Society, Bangalore, to taking up a professorship at the Leuphana University, Lueneburg, Germany, there is a question that I am often asked: “Are you going to start a new research centre?” And the answer, for the most part, is “No.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Not because I don’t see the value of creating institutional spaces like these or that starting and running CIS has been anything short of a dream, but because I don’t how to. When I tell people I don’t know how CIS came into being, they suspect that I am being either facetious or dismissive. But I am not. If somebody asked me to write an Origin Story for CIS, I would be baffled – or probably sum it up by saying that it happened. There was the germ of an idea, a whole lot of people who responded to it, and like the great Tolkienian epic, it was a story that grew in its telling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I was 27, when Sunil Abraham, the now Executive Director and I met together in New Delhi, to talk about what a research organisation that represents the public interest at the intersections of Internet &amp;amp; Society would look like. We spent three days in the Delhi heat, coming up with the most fantastic ideas about methods, structures and core areas of interest. It was one of those divine exercises where you build the template for your dream work and then, like a fairy-tale, we had incredible people who came and supported us to make that dream a reality. In six months of that first conversation – I had just turned 28 and was completing the last drafts of my Ph.D. dissertation – CIS got officially registered and with some of the most incredible people, who have been with us, both in their generous affective investment as well as in their intellectual and professional support, we kicked-off a research centre, that has become not only hard to ignore but also significantly important in bringing about scholarly and practice based research around the different facets of how the emergence and widespread reach of the Internet is changing the ways in which we become human, social and political in emerging information societies of the Global South.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 7 years since that first conversation started, I have learned so much from CIS and the networks that built around it, that it would be impossible to write an exhaustive account of it. However, as I now take up a new position at the CIS as a member of its board, and continue to collaborate with the on-the-ground teams intellectually, from my new position as a Professor, there are five things I want to dwell upon, more to remind myself of important lessons learned, but also as approaches that the new director and team might want to reference:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Research cannot be individually focused&lt;/b&gt;&lt;br /&gt;One of the things that academic training does is that it promotes the idea of an individual researcher. We write, publish, seek grants and present our work, taking individual credit and building a body of work that is centred on us. True, we collaborate and we participate and we are opening up more distributed modes of learning and research, but at the end of the day, there is still an imagination of a research community that is built of individual scholars who work in a happy symbiosis and synthesis.&lt;br /&gt;&lt;br /&gt;The biggest lesson I learned with the CIS was that research requires collectives – peers, supporters, and critics – that can help materialise a vision. Instead of trying to do ‘my’ research, it was the first time that I was enabling others’ research. I had a say in building the research vision, and establishing protocols of rigour and review, but to have a dream, and then to share it with others, so that it becomes a collective dream was an incredible experience. It was the beginning of a method that I hope informs all my work, where research methods are constantly going to accommodate for and be shaped by collective visions and approaches rather than just the individual as a lone warrior. More than anything else, it reassures us that we are not alone, either in our triumphs or our road-blocks, and it builds a community of thinkers that is more important than just the single authored outputs that we bring out.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Research requires infrastructure&lt;/b&gt;&lt;br /&gt;Institutions are infrastructure. However, our jobs are so segregated, that we don’t always realise the incredible effort that goes into building such institutions and then making them work as efficient infrastructure to support research. It is very rare, in research publications that we thank our everyday office staff, the accounts team that processes the complicated bureaucracies of research funding, the programme managers who create networks and evaluation formats, or the numerous people who perform ‘non-research’ jobs so that we can do the research. &lt;br /&gt;&lt;br /&gt;I had worked in project and programme manager positions before CIS. I had also worked as an independent researcher and consultant before that. But this was the first time I actually took the dual responsibility of not only initiating research but also providing the infrastructure for it. And I know that I am a wiser person for it. The intricate world of fund-raising, managing and developing networks, of implementing and monitoring research projects and contracts, and the need to constantly find sustainable options for the research programmes is something that requires an incredible amount of effort and resources. The researchers often are kept away from this world, or we often just ignore the intense quotidian activities that give us the privilege of doing our work, and my time with CIS taught me not only to appreciate this, but also to recognise these tasks as research.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;All research must try and answer the ‘So What?’ question&lt;/b&gt;&lt;br /&gt;Within academic circles, research has inherent value. We do have the freedom to develop new frameworks and ideas that might not have any immediate relevance and might in fact even fail without seeing the light of day. Academia is privileged because as long as we perform our pedagogic tasks, we have the space to experiment and often work on areas that might not benefit anybody outside the disciplines that we are located in.&lt;br /&gt;&lt;br /&gt;At CIS, working at such close quarters with colleagues who are experts in policy and regulation, research became critical for me. It wasn’t research for research’s sake. It was research with a cause. At the same time, making the research relevant was not an exercise in dumbing it down so that it can be reduced to easy implementation. The effort required at making academic and intellectual research accessible, while still retaining its complexity has been a heady experience for me. Since CIS, I have tried to make sure that all research is able to answer the ‘So What?’ question, and every time, it has made the research more robust, more rigorous and having a greater audience and impact than it would otherwise have. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;To be a research organisation is to be unafraid&lt;/b&gt;&lt;br /&gt;One of the most fantastic things about being a young research organisations was that we were not afraid to voice our opinions and voice them loud. In the last 6 years, CIS has evolved into a strong voice that is not unanimous, but is still clear. We have had disagreements with established research and policy actors. We have critiqued decisions taken by policy and development institutions when we felt that they were flawed. We have provided a critical commentary to different instruments of law and regulation when necessary. We have challenged academic researchers in their methodology as well as in their disconnect from the ‘real world’. And we did it, because early on, the people who guided us, taught us, that research organisations have to be unafraid. &lt;br /&gt;&lt;br /&gt;Unafraid, not just to ask tough questions of those outside, but also of asking tough questions internally. The team, as it has grown, has been a smorgasbord of disciplinary and stakeholder locations. We don’t necessarily speak the same language. We don’t also, agree on many critical points. But we never tried to be a consensus generation institute. Instead, we learned to coexist and even collaborate in our differences – it was something that external partners often had problems with. How can one set of people work towards critically opposing a phenomenon when others might actually write in favour of some of the aspects of that same phenomenon? How is it possible that some in the institute have great collaborations with a network that the others critique persistently in their work? These tensions, for me, have been generative and I hope that they continue, both in the institution but also in my future work.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Researchers are people too&lt;/b&gt;&lt;br /&gt;This is one of the strangest things to realise, but it is a good lesson to remember. Academia and research work through abstractions. At some point, the researchers become names. They become only a body of work, a certain number of words. But dealing with researchers is to deal with human beings. We have to remember that researchers, while they are often driven and passionate and unable to extricate their lives from their work, do have lives and bodies and socialities that need to be managed. Institutions often get driven by matrices of measurement and politics of promotion and evaluation, at the neglect of the people who actually build it. The constant push at CIS was to recognise that we are all too human in our everyday lives. And to build work environments, relationships and spaces that nurture the people we work with is the primary responsibility of all research. &lt;br /&gt;&lt;br /&gt;These points are probably too vague, but this blog post is already too long. I just wanted to take this opportunity to write some ‘Notes to the self’ about things that have been the most important to me in being the co-founder and Research Director at the Centre for Internet and Society. And now, it is time for me to move on. I want to place myself in an academic setting where I learn, I get some headspace to think and write, and do the one thing that I enjoy the most – teach. Starting 1st October 2014&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;I am stepping down as the Research Director and taking up a professorship in a new and exciting university, designing courses and research agendas at the intersections of internet studies, media studies, culture studies and aesthetic studies, bringing together some of my most passionate areas of interest. However, I continue to be interested and invested in CIS’ institutional growth. I shall be a part of the search committee as we invite a new Research Director in the Bangalore office, I shall be a part of the Board that governs the CIS, and I shall always think of CIS as my home, continuing mentoring and implementing existing collaborations but also building more, especially towards the pedagogic and knowledge production side of things.&lt;br /&gt;&lt;br /&gt;When the final decisions about this transition were made last week, I had thought I would be emotional and heart broken. Instead, I only feel excited. I have a wonderful set of colleagues in Bangalore, and they, in turn, are at the centre of networks of support, love, empathy and trust. CIS will benefit from having a new Research Director who will bring new visions, new methods, new processes and infrastructure to the table, and I hope that as my own academic career grows, I shall find myself returning to CIS in different capacities and roles, both for what I could contribute to it, but also for what I continue to learn from the rich range and variety of activities that it anchors.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].For me, this is not a goodbye, but just a change in roles at the CIS. I will continue to use my CIS credentials and email address, and will be found on the existing contact details there for any queries or interactions with and on behalf of the CIS. So no need to change your address books, just yet.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/not-a-goodbye-more-a-come-again'&gt;https://cis-india.org/raw/not-a-goodbye-more-a-come-again&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2014-06-15T02:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace">
    <title>The Body in Cyberspace</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace</link>
    <description>
        &lt;b&gt;Perhaps one of the most interesting histories of the cyberspace has been its relationship with the body. Beginning with the meatspace-cyberspace divide that Gibson introduces, the question of our bodies’ relationship with the internet has been hugely contested. There have been some very polarized debates around this question. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Where are we when we are online? Are we the person in the chair behind an interface? Are we the avatar in a social networking site interacting with somebody else? Are we a set of data running through the atmosphere? Are we us? Are we dogs? These are tantalising and teasing questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early debates around the body-technology questions were polarized. There were people who offered that the cyberspace is a virtual space. What happens in that make-believe, performative space does not have any direct connections with who we are and how we live. They insisted that the cyberspace is essentially a performance space, and just like acting in a movie does not make us the character, all our interactions on the internet are also performances. The idea of a virtual body or a digital self were proposed, thinking of the digital as an extension of who we are – as a space that we occupy to perform different identities and then get on with our real lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sherry Turkle, in her book &lt;i&gt;Life on the Screen&lt;/i&gt;, was the first one to question this binary between the body and the digital self. Working closely with the first users of the online virtual reality worlds called Multiple User Dungeons, Turkle notes how being online started producing a different way of thinking about who we are and how we relate to the world around us. She indicates three different ways in which this re-thinking happens. The first, is at the level of language. She noticed how the users were beginning to think of their lives and their social relationships through the metaphors that they were using in the online world. So, for instance, people often thought of life through the metaphor of windows – being able to open multiple windows, performing multiple tasks and identities and ‘recycling’ them in their everyday life. Similarly, people saying that they are ‘low on bandwidth’ when they don’t have enough time and attention to devote to something, or thinking about the need to ‘upgrade’ our senses. We also are quite used to the idea that memory is something that resides on a chip and that computing is what machines do. These slippages in language, where we start attributing the machine characteristics to human beings are the first sign of understanding the human-technological relationship and history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second slippage is when the user start thinking of the avatars as human. We are quite used to, in our deep web lives, to think of machines as having agency. Our avatars act. Things that we do on the internet perform more actions than we have control of – a hashtag that we start on twitter gets used and responded to by others and takes on a life of its own. We live with sapient technologies – machines that care, artificial intelligence algorithms that customise search results for us, scripts and bots that protect us from malware and viruses. We haven’t attributed these kinds of human agencies to machines and technologies in the past. However, within the digital world, there is a complex network of actors, where all the actors are not always human. Bruno Latour, a philosopher of science and technology, posits in his ‘Actor Network Theory’ that the emergence of these non-human actors has helped us understand that we are not only dependent on machines and technologies for our everyday survival, but that many tasks that we had thought of as ‘human’ are actually performed, and performed better by these technologies. Hence, we have come to care for our machines and we also think of them as companions and have intimate relationships with them. And the machines, even as they make themselves invisible, start becoming more personal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third slippage that Turkle points out is the way in which the boundaries between the interior and the exterior were dissolved in the accounts of the users’ narratives of their digital adventures. There is a very simplistic understanding that what is human is inside us, it is sacred and organic and emotional. Earlier representational technology products like cinema, books, TV etc. have emphasised this distinction between real life and reel life. No actor is punished for the crime they commit in the narrative of a film. It is not very often that an author claims to be the character in a book. We have always had a very strong sense of distinction between the real person and the fictional person. But within the virtual reality worlds, these distinctions seem to dematerialize. The users not only thought of their avatars as human but also experienced the emotions, frustrations, excitement and joy that their characters were simulating for them. And what is more important, they claimed these experiences for themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namita Malhotra, who is a legal scholar and a visual artist, in her monograph on Pleasure, Porn and the Law, looks at the way in which we are in a process of data-stripping – constant revelation of our deepest darkest secrets and desires, within the user generated content rubric. Looking at the low-res, grainy videos on sites like YouTube and Vimeo, which have almost no narrative content and are often empty of sexual content, produce all of us in a global orgiastic setting, where our bodies are being extended beyond ourselves. In the monograph, Malhotra argues that the Internet is not merely an extension but almost like a third skin that we wear around ourselves – it is a wrapper, but it is tied, through ligaments and tendons, to the flesh and bone of our being, and often things that we do online, even when they are not sexual in nature, can become pornographic. Conversely, the physical connections that we have are now being made photographically and visually available in byte sized morsels, turned into a twitpic, available to be shared virally, and disseminated using mobile applications, thus making our bodies escape the biological containers that we occupy but also simultaneously marks our bodies through all these adventures that we have on the digital infobahn.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Case Study: A Rape in Cyberspace&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;A contemporary of Sherry Turkle, Julian Dibbell, in his celebrated account of ‘A Rape in Cyberspace’&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;describes a case-study that corroborates many of the observations that Turkle posits. Dibbell analyses a particular incident that occurred one night in a special kind of MUD – LambdaMOO (MUD, Object-Oriented) – which was run by the Xerox Research Corporations. A MUD, is a text-based virtual reality space of fluid dimensions and purposes, where users could create avatars of themselves in textual representations. Actions and interactions within the MUD are also in long running scripts of texts. Of course, technically all this means that a specially designed database gives users the vivid impression of their own presence and the impression of moving through physical spaces that actually exists as descriptive data on some remotely located servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When users log into LambdaMoo, the program presents them with a brief textual description of one of the rooms (the coat closet) in the fictional database mansion. If the user wants to navigate, s/he can enter a command to move in a particular direction and the database replaces the original description with new ones, corresponding to the room located in the direction s/he chose. When the new description scrolls across the user’s screen, it lists not only the fixed features of the room but all its contents at that moment – including things (tools, toys, weapons), as well as other avatars (each character over which s/he has sole control). For the database program that powers the MOO, all of these entities are simply subprograms or data structures which are allowed to interact according to rules very roughly mimicking the laws of the physical world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Characters may leave the rooms in particular directions. If a character says or does something (as directed by its user), then the other users who are located in the same ‘geographical’ region within the MOO, see the output describing the utterance or action. As the different players create their own fantasy worlds, interacting and socialising, a steady script of text scrolls up a computer screen and narratives are produced. The avatars, as in Second Life or even on Social Networking Sites like Orkut, have the full freedom to define themselves, often declining the usual referents of gender, sexuality, and context to produce fantastical apparitions. It is in such an environment of free-floating fantasy and role-playing, of gaming and social interaction mediated by digital text-based avatars, that a ‘crime’ happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibell goes on to give an account of events that unfolded that night. In the social lounge of LambdaMoo, which is generally the most populated of all the different nooks, corners, dimensions and rooms that users might have created for themselves, there appeared an avatar called Dr. Bungle. Dr. Bungle had created a particular program called Vodoo Doll, which allowed the creator to control avatars which were not his own, attributing to them involuntary actions for all the other players to watch, while the targeted avatars themselves remained helpless and unable to resist any of these moves. This Dr. Bungle, through his evil Vodoo Doll, took hold of two avatars – legba and Starsinger and started controlling them. He further proceeded to forcefully engage them in sexually violent, abusive, perverted and reluctant actions upon these two avatars. As the users behind both the avatars sent a series of invective and a desperate plea for help, even as other users in the room (# 17) watched, the Vodoo Doll made them enter into sexually degrading and extremely violent set of activities without their consent. The peals of his laughter were silenced only when a player with higher powers came and evicted Dr. Bungle from the Room # 17. As an eye-witness of the crime and a further interpolator with the different users then present, Dibbell affirms that most of the users were convinced that a crime had happened in the Virtual World of the digital Mansion. That a ‘virtual rape’ happened and was traumatic to the two users was not questioned. However, what this particular incident brought back into focus was the question of space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibbell suggests that what we had was a set of conflicting approaches to understand the particular phenomenon:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where virtual reality and its conventions would have us believe that legba and Starsinger were brutally raped in their own living room, here was the victim legba scolding Mr. Bungle for a breach of *civility* … [R]eal life, on the other hand, insists the incident was only an episode in a free-form version of Dungeons and Dragons, confined to the realm of the symbolic and at no point threatening any players life, limb, or material well-being…’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meaning and the understanding of this particular incident and the responses that it elicited, lie in the ‘buzzing, dissonant gap’ between the perceived and experienced notion of Technosocial Space. The discussions that were initiated within the community asked many questions: If a crime had happened, where had the crime happened? Was the crime recognised by law? Are we responsible for our actions performed through a digital character on the cyberspaces? Is it an assault if it is just role playing?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of ‘whereness’ of the crime, or rather the placelessness of the crime made it especially more difficult to pin it to a particular body. The users who termed the event as rape had necessarily inverted the expected notion of digital space as predicated upon and imitative of physical space; they had in fact done the exact opposite and exposed digital spaces as not only ‘bleeding into reality’ but also a constitutive part of the physical spaces. Their Technosocial Space was not the space of the LambdaMoo Room # 17 but the physical locations (and thus the bodies, rather than the avatars) of the players involved. However, this blurring was not to make an easy resolution of complex metaphysical questions. This blurring was to demonstrate, more than ever, that the actions and pseudonymous performances or narratives which are produced in the digital world are not as dissociated from the ‘Real’ as we had always imagined. More importantly, the notional simulation of place or a reference to the physical place is not just a symbolic gesture but has material ramifications and practices. As Dibell notes in his lyrical style.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Months later, the woman in Seattle would confide to me that as she wrote those words posttraumatic tears were streaming down her face — a real-life fact that should suffice to prove that the words’ emotional content was no mere playacting. The precise tenor of that content, however, its mingling of murderous rage and eyeball-rolling annoyance, was a curious amalgam that neither the RL nor the VL facts alone can quite account for.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The eventual decision to ‘toad’ Dr. Bungle – to condemn him to a digital death (a death only as notional as his crime) and his reappearance as another character take up the rest of Dibbell’s argument. Dibbell is more interested in looking at how a civil society emerged, formed its own ways of governance and established the space of LamdaMOO as more than just an emotional experience or extension; as a legitimate place which is almost as much, if not more real, than the physical places that we occupy in our daily material practices. Dibbell’s moving account of the entire incident and the following events leading the final ‘death’ and ‘reincarnation’ has now been extrapolated to make some very significant and insightful theorisations of the notions of the body and its representations online.&lt;/p&gt;
&lt;b&gt;Exercise&lt;/b&gt;: Based on this case-study, break into small groups to determine whether a rape happened on cyberspace and how we can understand the relationship of our online personas with our bodies.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and the State&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of body and technology is one way of approaching the history of the internet. However, as we realise, that more than the management of identity or the projection of our interiority, it is a narrative about governance. How does the body get regulated on the internet? How does it become the structure through which communities, networks, societies and collective can be imagined? The actions and transactions between the internet and the body can also help us to look at the larger questions of state, governance and technology which are such an integral part of our everyday experience of the internet. Questions of privacy, security, piracy, sharing, access etc. are all part of the way in which our practices of cultural production and social interaction are regulated, by the different intermediaries of the internet, of which the State is one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asha Achuthan, in her landmark work &lt;i&gt;Re:Wiring Bodies&lt;/i&gt;&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; that looks at the history of science and technology in India, shows that these are not new concerns. In fact, as early as the 1930s and 1940s, when the architects of India’s Independence movements were thinking about shaping what the country is going to look like in the future, they were already discussing these questions. It is more popularly known that Jawaharlal Nehru was looking to build a ‘scientific temperament’ for the country and hoping to build it through scientific institutions as well as infrastructure – he is famously credited to having said that ‘dams are the temples of modern science.’ Apart from Nehru’s vision of a modern India, there was a particular conversation between M.K. Gandhi and Rabindranath Tagore, that Achuthan analyses in great detail. Achuthan argues that the dialogue between Gandhi and Tagore is so couched in ideology, poetry and spirituality that we often forget that these were actually conversations about a technology – specifically, the charkha or the spinning wheel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For both Gandhi and Tagore, the process of nation building was centred around this one particular charkha. The charkha was the mobile, portable, wearable device (much like our smart phones) that was supposed to provide spiritual salvation and modern resources to overcome the evils of both traditional and conservative values as well as unemployment and production. The difference in Gandhi and Tagore was not whether the charkha – as a metaphor of production and socio-economic organisation – should be at the centre of our discourse. The difference was that Gandhi thought that the usage of charka, complete immersion in the activity, and the devotion to it would help us weave a modern nation For Gandhi, the citizen was not somebody who used the charkha, but the citizen was somebody who becomes a citizen in the process of using the charkha. Tagore, meanwhile, was more concerned about whether we are building a people-centred nation or a technology-centred device. He was of the opinion that building a nation with the technology at its core, might lead to an apocalyptic future where the ‘danavayantra’ or demonic machine might take over and undermine the very human values and ideals that we are hoping to structure the nation through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you even cursorily look at this debate, you will realise that the way Gandhi was talking about the charkha is in resonance with how contemporary politicians talk about the powers of the internet and the way in which, through building IT Cities, through foreign investment, through building a new class of workers for the IT industry, and through different confluences of economic and global urbanisation, we are going to Imagine India&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;of the future. Similarly, the caution that Tagore had, of the charkha as superseding the human, finds its echoes in the sceptics who have been afraid that the human is being forgotten&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; in the e-governance systems that are being set up, which concentrate more on management of data and information rather than the rights and the welfare of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical continuity between technology and governance, also finds theorisation in Ashish Rajadhyaksha’s book &lt;i&gt;The Cultural Last Mile&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;that looks at the critical turns in India’s governance and policy history and how the technological paradigm has been established. Rajadhyaksha opens up the State-technology-governance triad to more concrete examples and looks at how through the setting up of community science centres, the building of India’s space and nuclear programmes, and through on-the-ground inventions like radio and chicken-mesh wire-loops, we have tried to reinforce a broadcast based model of governance. Rajadhyaksha proposes that the earlier technologies of governance which were at our disposal, helped us think of the nation state through the metaphor of broadcast. So we had the State at the Centre, receiving and transmitting information, and in fact managing all our conversation and communication by being the central broadcasting agency. And hence, because the state was responsible for the message of the state reaching every single person, but also responsible that every single person can hypothetically communicate with every other single person, the last mile became important. The ability to reach that last person became important. And the history of technology and governance has been a history of innovations to breach that last mile and make the message reach without noise, without disturbance, and in as clean and effective a way as possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the emergence of the digital governance set up, especially with the building of the Unique Identity Project,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; we now have the first time when the government is not concerned about breaching the last mile. The p2p networks that are supposed to manage the different flows of information mean that the State is not a central addressee of our communication but one of the actors. It produces new managers – internet service providers, telecom infrastructure, individual hubs and connectors, traditional media agencies – that help us think of governance in a new way. Which is why, for instance, with the UID authorities, we are no longer concerned about the relay of state information from the centre to the subject. Hence, we have many anecdotal stories of people enrolling for the Aadhaar card without actually knowing what benefits it might accrue them. We also have stories coming in about how there are people with Aadhaar numbers which have flawed information but these are not concerns. Because for once, the last mile has to reach the Government. The State is a collector but there are also other registrars. And there is a new regime here, where the government is now going to become one of the actors in the field of governance and it is more interested in managing data and information rather than directly governing the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical turn is interesting, because it means that we are being subjected to different kinds of governance structures and institutions, without necessarily realising how to negotiate with them to protect us. One of the most obvious examples is the Terms of Services&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; that we almost blindly sign off when using online platforms and services and what happens when they violate rights that we think are constitutionally given. What happens when Facebook removes some content from your profile without your permission because it thinks that it is problematic? Who do you complain to? Are your rights as a user or a citizen? Which jurisdiction will it fall under? Conversely, what happens when you live in a country that does not grant you certain freedoms (of speech and expression, for instance) and you commit an infraction using a social media platform. What happens when your private utterances on your social networks make you vulnerable [&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. to persecution and prosecution in your country?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions of the human, the technological, and the governmental which have been discussed differently and severally historically, in India and also at the global level. Asking these questions, unpacking the historical concerns and how they have leap-frogged in the contemporary governmental debates is important because it helps us realise that the focus of what is at stake, what it means to be human, what we recognise as fair, just and equal are also changing in the process. Instead of thinking of e-governance as just a digitization of state resources, we have to realise that there is a certain primacy that the technologies have had in the state’s formation and manifestation, and that the digital is reshaping these formulations in new and exciting, and sometimes, precarious ways.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and Criminality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of the internet in India, but also around the world, is bookended between pornography and terrorism. While there has been an incredible promise of equity, equality, fairness, and representation of alternative voices on the internet, there is no doubt that what the internet has essentially done is turn us all into criminals – pornographers, pirates, terrorists, hackers, lurkers… If you have been online, let us just take for granted that you have broken some law or the other, no matter how safe you have been online, and where you live. The ways in which the internet has facilitated peer-2-peer connections and the one-one access means that almost everything that was governed in the public has suddenly exploded in one large grey zone of illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Sundaram calls this grey zone of illegal or semi-legal practices the new ‘cyberpublics’. For Sundaram, the new public sphere created by the internet is not only in the gentrified, middle-class, educated people who have access to the cyberspaces and are using social media and user generated content sites to bring about active social and political change. More often than not, the real interesting users of the internet are hidden. They access the internet from cybercafés, in shared names. They have limited access to the web through apps and services on their pirated phones. They share music, watch porn, gamble, engage in illicit and surreptitious social and sexual engagements and they are able to do this by circumventing the authority and the gaze of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other side are the more tech savvy individuals who create alternative currencies like Bitcoin, trade for weapons, drugs and sex on SilkRoute, form guerrilla resistance groups like Anonymous, and create viruses and malware that can take over the world. These cyberpublics are not just digital in nature. They erupt regularly in the form of pirate bazaars, data swaps, and the promiscuous USB drive that moves around the machines, capturing information and passing it on further. These criminalities are often the defining point of internet policy and politics – they serve as the subjects that need to be governed, as well as the danger that lurks in the digital ether, from which we need to be protected. For Sundaram, the real contours and borders of the digital world are to be tested in an examination of these figures. Because, as Lawrence Liang suggests, the normative has already been assimilated in the system. The normative or the good subject is no longer a threat and has developed an ethical compass of what is desirable and not. However, this ethical subject also engages in illicit activities, while still producing itself as a good person. This contradiction makes for interesting stories.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;DPS MMS: Case Study&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;One of the most fascinating cases of criminality that captured both public and legal  attention was the notoriously cases where the ideas of Access were complicated in the Indian context, was the legal and public furore over the distribution of an MMS (Multi-Media Message) video that captured two underage young adults in a sexual act. The clip, which was dubbed in popular media as ‘DPS Dhamaka’ became viral on the internet. The video clip was listed on an auction (peer-2-peer) website as an e-book and as ‘Item 27877408 – DPS Girl having fun!!! Full video + Bazee points’ for Rs. 125. This visibility of the clip on the auction site Bazee.com, brought it to the eyes of the State where its earlier circulation through private circuits and P2P networks had gone unnoticed. Indeed, the newspapers and TV channels had created frenzy around it, this video clip would have gone unnoticed. However, the attention that Bazee.com drew led to legal intervention.&lt;/p&gt;
&lt;p&gt;Following the visibility of the video clip, there was an attempt to find somebody responsible for the crime and be held liable for the ‘crime’ that had happened. Originally, Ravi Raj, a student at IIT Kharagpur, who had put up the clip on Bazee was arrested for possessing and selling pornography. He was arrested and kept in police custody for at least three days and so was the male student who made the clip. They were both made to go through proceedings in juvenile court (though he was the last to be arrested). Both the students in the video were suspended from school after the incident. Eventually, the most high profile arrest and follow up from the DPS MMS incident was the arrest of the CEO of Bazee.com – Avnish Bajaj. However, Bajaj was released soon because as the host of the platform and not its content, he had no liability.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;This is the beginning of a series of slippages where a punishable body in the face of public outcry had to be identified. We witnessed a witch-hunt that sought to hold the boy who made the video clip responsible, the student of IIT who attempted to circulate the clip and eventually the CEO of Bazee. The string of failed prosecutions seems to indicate that the pornographer-as-a-person was slipping through the cracks of the legal system. As NamitaMalhotra argues, it is not the pornographic object which is ‘eluding the grasp of the court’ but that it seems to be an inescapable condition of the age of the internet -that the all transactions are the same transactions, and all users are pornographers.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;We can see in the case that the earlier positions that were easily criminalised when it came to objects in mass media – producer, consumer, distributor of obscenity, were vacated rapidly in the DPS MMS case. We have a case where the bodies, when looked at through simplified ideas of Access, could not be regulated. The girl in the clip could not be punished because she was the victim in the case that could be read as statutory rape. In the case of the boy, a stranger argument was posed – ‘that in our fast urbanising societies where parents don’t have time for children, they buy off their love by giving them gadgets – which makes possible certain kinds of technological conditions...thus the blame if it is on the boy, is on the larger society’ (Malhotra, 2011).&lt;/p&gt;
&lt;p class="MsoNormal"&gt;Eventually, the court held that the description of the object and the context of its presence indicates that the said obscene object is just a click away and such a ‘listing which informed the potential buyer that such a video clip that is pornographic can be procured for a price’. There is a suggestion that there was nobody in particular that could be fixed with the blame. What was at blame was access to technology and conditions of technology within which the different actors in this case were embedded. Malhotra points out that in earlier cases around pornography, judgements have held pornography responsible for itself.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;In the case of the DPS MMS, it seemed that technology – especially access to technology by unsupervised persons – has taken that role. The eventual directive that came out of this case was a blanket warning issued to the public that ‘anyone found in possession of the clip would be fined and prosecuted’. It is as if the attention of the court was on the ways in which the video clip was produced, circulated and disseminated, rather than the content. There was an anxiety around peoples’ unsupervised access to digital technologies, the networks that facilitated access to content without the permission of the state, and modes of circulation and dissemination that generated high access to audiences which cannot be controlled or regulated.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;The State’s interest in this case, is not in the sexual content of the material but in the way it sidesteps the State’s authorial positions and produces mutable, transmittable, and transferable products as well as conditions of access. Such a focus on practices and behaviours around the obscene object, rather than the content itself, seems not to disrupt the law’s neat sidestepping of the force of the image itself. These different tropes of access to technology informed the State’ attempt at control and containment of techno-social practices in the country, giving rise to imaginations of the User as being in conditions of technology which make him/her a potential criminal. This idea of access as transgression or overriding the legal regulatory framework does not get accounted for in the larger technology discourse. However, it does shape and inform the Information Technology regulations which are made manifest in the IT Act. The DPS MMS case complicated the notion of access and posited a potentially criminal techno-social subject who, because of access to the digital, will be able to consume information and images beyond the sanction of the law.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;The DPS MMS case shows how the ways in which public discourse can accuse, blame and literally hang technology seems to diverge from how the court attempts to pin down an offence or crime and prosecute by constructing a techno-social subject as the pervert, while also accusing pornography as a phenomenon. The court is unable to hold technology to blame but the accused is technology-at-large and modernity, which subsumes practices around technology and separates out the good and ethical ways in which a citizen should access and use technologies to rise from the potentially criminal conditions of technology within which their Techno-social identity is formed.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We started by making a distinction between Internet and Cyberspace to see how the two are separate objects of focus and have a relationship that needs to be examined in greater detail. It was argued that while the Internet – in material, infrastructural and technological forms – is important to understand the different policies and politics at the local, regional and global level, it has an account that is easier to follow. Cyberspace, on the other hand, because it deals with human interactions and experiences, allows for a more complex set of approaches into understanding our engagement with the digital domain. We began with the original definitions and imaginations of cyberspace and the ways in which it founded and resolved debates about the real-virtual, the physical-digital, and the brain-mind divides which have been historically part of the cybercultures discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was proposed, hence, that instead of looking at the history of the Internet, we will look at the history of cyberspace, and see if we can move away from a straight forward historical narrative of the Internet which focuses largely on the institutions, numbers, names and technological advances. The ambition was not to just produce a similar history of cyberspace but think of conceptual frameworks through which cyberspace can be studied. The proposition was that instead of just looking at history as a neutral and objective account of events and facts, we can examine how and why we need to create histories. Also, that it is fruitful to look at the aspirations and ambitions we have in creating historical narratives. It was then suggested that instead of trying to create a definitive history, or even a personal history of the internet, it might be more fruitful to look at the intersections that cyberspace has with different questions and concerns that have historically defined the relationship between technologies and society. 3 different conceptual frameworks were introduced as methods or modes by which this historical mode of inquiry can be initiated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first framework examined how we can understand the boundaries and contours of the internet and cyberspace by looking at its relationship with our bodies. The ways in which we understand our bodies, the mediation by technologies, and the extensions and simulations that we live with, help us to understand the human-technology relationship in more nuanced fashions. Looking at the case-study of a rape that happened in cyberspace, we mapped out the different ways in which we can think of a technosocial relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second framework drew from historical debates around technology and governance to see how the current concerns of e-governance and digital subjectivity are informed by older debates about technology and nation building. Looking at the dialogues between Gandhi and Tagore, and then the imagination of a nation through the broadcast technologies, we further saw how the new modes of networked governance are creating new actors, new conditions and new contexts within which to locate and operate technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third framework showed how the technological is not merely at the service of the human. In fact, the presence of the technological creates new identities and modes of governance that create potential criminals of all of us. Through the case-study of the DPS MMS, and in an attempt to look at the grey zone of illegal cyberpublics, we saw how at new technosocial identities are created at the intersection of law, technology, governance and everyday practices of the web. The fact that the very condition of technology access can create us as potential criminals, in need to be governed and regulated, reflects in the development of internet policy and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the intention of this module to complicate three sets of presumptions and common knowledge that exist in the discourse around Internet and Cyberspace. The first was to move away from thinking of the Internet merely as infrastructure and networks. The second was to suggest that entering the debates around human-technology everyday relationships would offer more interesting ways of looking at accounts of the technological. The third was to propose that the history of the internet does not begin only with the digital, but it needs larger geographical and techno-science contexts in order to understand how the contemporary landscape of internet policy and governance is shaped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The module was not designed to give a comprehensive history and account of the internet. Instead, it built a methodological and conceptual framework that would allow us to examine the ways in which we approach Internet and Society questions – in the process, it would also help us reflect on our own engagement, intentions and expectations from the Internet and how we create the different narratives and accounts for it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Additional Readings&lt;/h2&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li&gt;Johnny Ryan,“A History of the Internet and the Digital Future”, &lt;i&gt;University of Chicago Press&lt;/i&gt;, &lt;a href="http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html"&gt;http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;John Naughton,“A Brief History of the Future”, &lt;i&gt;Overlook&lt;/i&gt;, &lt;a href="https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/"&gt;https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Christos J.P. Moschovitis et al.,“History of the Internet”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182"&gt;http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Katie Hafner and Matthew Lyon, “Where Wizards Stay up Late”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014"&gt;http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Janet Abbate,“Inventing the Internet”, &lt;i&gt;MIT Press&lt;/i&gt;, &lt;a href="http://mitpress.mit.edu/books/inventing-internet"&gt;http://mitpress.mit.edu/books/inventing-internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tim Berners-Lee,“Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web”,&lt;a href="http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor"&gt;http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Peter Salus,“Casting the Net: From ARPANET to INTERNET and Beyond”, &lt;i&gt;Pearson&lt;/i&gt;, &lt;a href="http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx"&gt;http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Julian Dibbell “A Rape in Cyberspace”, available at http://www.juliandibbell.com/articles/a-rape-in-cyberspace/, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Asha Achuthan, “Re:Wiring Bodies”, Centre for Internet and Society, available at http://cis-india.org/raw/histories-of-the-internet/rewiring-bodies.pdf, last accessed on January 25, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Nandan Nilekani, “Imagining India: The Idea of a Renewed Nation”, &lt;i&gt;Penguin&lt;/i&gt;, available at &lt;a href="http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html"&gt;http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Jahnavi Phalkey, “Focus: Science, History, and Modern India”, &lt;i&gt;The University of Chicago Press&lt;/i&gt;, &lt;a href="http://www.jstor.org/stable/10.1086/670950"&gt;http://www.jstor.org/stable/10.1086/670950&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Ashish Rajadhyaksha, “The Last Cultural Mile”, &lt;i&gt;The Centre for Internet and Society&lt;/i&gt;, available at &lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf"&gt;http://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Ashish Rajadhyaksha, “In the Wake of Aadhar: The Digital Ecosystem of Governance in India”, &lt;i&gt;Centre for Study of Culture and Society&lt;/i&gt;, available at &lt;a href="http://eprints.cscsarchive.org/532/"&gt;http://eprints.cscsarchive.org/532/&lt;/a&gt;, last accessed on January 23, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Terms of Service, Didn’t Read, available at &lt;a href="http://tosdr.org/"&gt;http://tosdr.org/&lt;/a&gt;, last accessed on January 26, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Siva Vaidyanathan, “The Googlization of Everything: (And Why Should We Worry)”, &lt;i&gt;University of California Press&lt;/i&gt;, available at &lt;a href="http://www.ucpress.edu/book.php?isbn=9780520258822"&gt;http://www.ucpress.edu/book.php?isbn=9780520258822&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2014-05-13T10:13:22Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get">
    <title>Networks: What You Don’t See is What You (for)Get</title>
    <link>https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get</link>
    <description>
        &lt;b&gt;When I start thinking about DML (digital media and learning) and other such “networks” that I am plugged into, I often get a little confused about what to call them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was originally &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/networks-what-you-don%E2%80%99t-see-what-you-forget"&gt;published in DML Central&lt;/a&gt; on April 17, 2014 and mirrored in &lt;a class="external-link" href="http://hybridpublishing.org/2014/05/what-you-dont-see-is-what-you-forget/"&gt;Hybrid Publishing Lab&lt;/a&gt; on May 13, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are we an ensemble of actors? A cluster of friends? A conference of scholars? A committee of decision makers? An array of perspectives? A group of associates? A play-list of voices? I do not pose these  questions rhetorically, though I do enjoy rhetoric. I want to look at this inability to name collectives and the confusions and ambiguity it produces as central to our conversations around digital thinking. In particular, I want to look at the notion of the network. Because, I am sure, that if we were to go for the most neutralised digital term to characterise this collection that we all weave in and out of, it would have to be the network. We are a network.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, what does it mean to say that we are a network? The network is a very strange thing. Especially within the realms of the Internet, which, in itself, purports to be a giant network, the network is self-explanatory, self-referential and completely denuded of meaning. A network is benign, and like the digital, that foregrounds the network aesthetic, the network is inscrutable. You cannot really touch a network or name it. You cannot shape it or define it. You can produce momentary snapshots of it, but you can never contain it or limit it. The network cannot be held or materially felt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the network touches us. We live within networked societies. We engage in networking – network as a verb. We are a network – network as a noun. We belong to networks – network as a collective. In all these poetic mechanisms of network, there is perhaps the core of what we want to talk about today – the tension between the local and the global and the way in which we will understand the Internet and then the frameworks of governance and policy that surround it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me begin with a genuine question. What predates the network? Because the network is a very new word. The first etymological trace of the network is in 1887, where it was used as a verb, within broadcast and communications models, to talk about an outreach. As in ‘to cover with a network.’ The idea of a network as a noun is older where in the 1550s, the idea of ‘net-like arrangements of threads, wires, etc.’ was first identified as a network. In the second half of the industrial 19th Century, the term network was used for understanding an extended, complex, interlocking system. The idea of network as a set of connected people emerged in the latter half of the 20thCentury. I am pointing at these references to remind us that the ubiquitous presence of the network, as a practice, as a collective, and as a metaphor that seeks to explain the rest of the world around us, is a relatively new phenomenon. And we need to be aware of the fact, that the network, especially as it is understood in computing and digital technologies, is a particular model through which objects, individuals and the transactions between them are imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For anybody who looks at the network itself – especially the digital network that we have accepted as the basis on which everything from social relationships on Facebook to global financial arcs are defined – we know that the network is in a state of crisis.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Networks of crises: The Bangalore North East Exodus&lt;/h3&gt;
&lt;p&gt;Let me illustrate the multiple ways in which the relationship between networks and crisis has been imagined through a particular story. In August 2012, I woke up one morning to realise that I was living in a city of crisis. Bangalore, which is one of my homes, where the largest preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of a nightlife, was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, danger, and material harm found currency. The city suddenly witnessed thousands of people running away from it, heading back to their imagined homelands. It was called the North East exodus, where, following an ethnic-religious clash between two traditionally hostile communities in Assam, there were rumours that the large North East Indian community in Bangalore was going to be attacked by certain Muslim factions at the end of Ramadan.&lt;br /&gt;The media spectacle of the exodus around questions of religion, ethnicity, regionalism and belonging only emphasised the fact that there is a new way of connectedness that we live in – the network society that no longer can be controlled, contained or corrected by official authorities and their voices. Despite a barrage of messages from law enforcement and security authorities, on email, on large screens on the roads, and on our cell phones, there was a growing anxiety and a spiralling information explosion that was producing an imaginary situation of precariousness and bodily harm. For me, this event, was one of the first signalling how to imagine the network society in a crisis, especially when it came to Bangalore, which is supposed to represent the Silicon dreams of an India that is shining brightly. While there is much to be unpacked about the political motivations and the ecologies of fear that our migrant lives in global cities are enshrined in, I want to specifically focus on what the emergence of this network society means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us toward an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the time, these networks are so natural and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility. In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking. But in this production of hyper-visible spectacles, the network works incessantly to make itself invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why, in the case of the North East exodus, the steps leading to the resolution of the crisis, constructed and fuelled by networks is interesting. As government and civil society efforts to control the rumours and panic reached an all-time high and people continued to flee the city, the government eventually went in to regulate the technology itself. There were expert panel discussions about whether the digital technologies are to be blamed for this rumour mill. There was a ban on mass-messaging and there was a cap on the number of messages which could be sent on a day by each mobile phone subscriber. The Information and Broadcast Ministry along with the Information Technologies cell, started monitoring and punishing people for false and inflammatory information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Network as Crisis: The unexpected visibility of a network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What, then, was the nature of the crisis in this situation? It is a question worth exploring. We would imagine that this crisis was a crisis about the nationwide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The crisis could have been read as one of neo-liberal flatness in imagining the nation and its fragments, that hides the inherent and historical sites of conflict under the seductive rhetoric of economic development. And yet, when we look at the operationalization of the resolutions, it looked as if the crisis was the appearance and the visibility of the hitherto hidden local networks of information and communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her analysis of networks, Brown University’s Wendy Chun posits that this is why networks are an opaque metaphor. If the function of metaphor is to explain, through familiarity, objects which are new to us, the network as an explanatory paradigm presents a new conundrum. While the network presumes and exteriority that it seeks to present, while the network allows for a subjective interiority of the actor and its decisions, while the network grants visibility and form to the everyday logic of organisation, what the network actually seeks to explain is itself. Or, in less evocative terms, the network is not only the framework through which we analyse, but it is also the object of analyses. Once the network has been deployed as a paradigm through which to understand a crisis, once the network has made itself visible, all our efforts are driven at explaining and strengthening, and almost like digital mothers, comfort the network back into its peaceful existence as infrastructure. We develop better tools to regulate the network. We define new parameters to mine the data more effectively. We develop policies to govern and govern through the network with greater transparency and ease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in the case of the North East exodus, instead of addressing the larger issues of conservative parochialism, an increasing backlash by right-wing governments and a growing hostility that emerges from these cities that nobody possesses and nobody belongs to, the efforts were directed at blaming technology as the site where the problem is located and the network as the object that needs to be controlled. What emerged was a series of corrective mechanisms and a set of redundant regulations that controlled the number of text messages that people were able to send per day or policing the Internet for spreading rumours. The entire focus was on information management, as if the reason for the mass exodus of people from the NE Indian states and the sense of fragility that the city had been immersed in, was all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in p2p (peer-to-peer) environments outside of the government’s control. This lack of exteriority to the network is something that very few critical voices have pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duncan Watts, the father of network computing, working through the logic of nodes, traffic and edges, has suggested there is a great problem in the ways in which we understand the process of network making. I am paraphrasing his complex mathematical text that explains the production of physical networks – what he calls the small worlds – and pointing out his strong critique about how the social scientists engage with networks. In the social sciences’ imagination of networks, there is a messy exteriority – fuzzy, complex and often not reducible to patterns or basic principles. The network is a distilling of the messy exteriority, a representation of the complex interplay between different objects and actors, and a visual mapping of things as they are. Which is to say, we imagine there is a material reality and the network is a tool by which this reality, or at least parts of this reality, are mapped and represented to us in patterns which can help us understand the true nature of this reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing from practices of network modelling and building, Watts proved, that we have the equation wrong. The network is not a representation of reality but the ontology of reality. The network is not about trying to make sense of an exteriority. Instead, the network is an abstract and ideological map that constructs the reality in a particular way. In other words, the network precedes the real, and because of its ability to produce objective, empiricist and reductive principles (constantly filtering out that which is not important to the logic or the logistics of the network design), it then gives us a reality that is produced through the network principles. To make it clear, the network representation is not the derivative of the real but the blue-print of the real. And the real as we access it, through these networked tools, is not the raw and messy real but one that is constructed and shaped by the network in those ways. The network, then, needs to be understood, examined and critiqued, not as something that represents the natural, but something that shapes our understanding of the natural itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of the Bangalore North East Exodus, the network and its visibility created a problem for us – and the problem was, that the network, which is supposed to be infrastructure, and hence, by nature invisible, had suddenly become visible. We needed to make sure that it was shamed, blamed, named and tamed so that we can go back to our everyday practices of regulation, governance and policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Intersectional Network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What I want to emphasise, then, is that this binary of local versus the global, or local working in tandem with global, or the quaintly hybridised glocal are not very generative in thinking of policy and politics around the Internet. What we need is to recognise what gets hidden in this debate. What becomes visible when it is not supposed to? What remains invisible beyond all our efforts? And how do we develop a framework that actually moves beyond these binary modes of thinking, where the resolution is either to collapse them or to pretend that they do not exist in the first place? Working with frameworks like the network makes us aware of the ways in which these ideas of the global and the local are constructed and continue to remain the focus of our conversations, making invisible the real questions at hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we need to think of networks, not as spaces of intersection, but in need of intersections. The networks, because of their predatory, expanding nature, and the constant interaction with the edges, often appear as dynamic and inclusive. We need to now think of the networks as in need of intersections – or of intersectional networks. Developing intersections, of temporality, of geography and of contexts are great. But, we need to move one step beyond – and look at the couplings of aspiration, inspiration, autonomy, control, desire, belonging and precariousness that often mark the new digital subjects. And our policies, politics and regulations will have to be tailored to not only stop the person abandoning her life and running to a place of safety, not only stop the rumours within the Information and communication networks, not only create stop-gap measures of curbing the flows of gossip, but to actually account for the human conditions of life and living.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. This post has grown from conversations across three different locations. The first draft of this talk was presented at the Habits of Living Conference, organised by the Centre for Internet &amp;amp; Society and Brown University, in Bangalore. A version of this talk found great inputs from the University of California Humanities Research Institute in Irvine, where I found great ways of sharpening the focus. The responses at the Milton Wolf Seminar at the America Austria Foundation, Austria, to this story, helped in making it more concrete to the challenges that the “network” throws to our digital modes of thinking. I am very glad to be able to put the talk into writing this time, and look forward to more responses.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get'&gt;https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:30:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice">
    <title>Digital Gender: Theory, Methodology and Practice</title>
    <link>https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah was a panelist at a workshop jointly organized by HUMlab and UCGS (Umeå Centre for Gender Studies) at Umeå University from March 12 to 14, 2014. He blogged about the conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by HUMLAB Blog on March 20, 2014 &lt;a class="external-link" href="http://blog.humlab.umu.se/?p=5147"&gt;here&lt;/a&gt;. Details of the workshop on Digital Gender can be seen &lt;a class="external-link" href="http://www.humlab.umu.se/digitalgender"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“When I was first invited to be a part of the Digital Gender conference curated by Anna Foka at the HUMlab in Umea, Sweden, there were many things that I had expected to find there: Historical approaches to understanding the relationship between digital technologies and practices and construction of gender, multi-modal and multi-disciplinary frameworks that examine the intersections of gender and the digital; Material and discursive descriptions of how we understand gender in contemporary realms. And indeed, I found it all there, and more, as a great collection of people, came together in dialogues of scholarly rigour, critical inquiry and political solidarity and empathy, to learn, to teach, to exchange research and scholarship. Given my past experiences of being at HUMlab and the incredible range of scholarship that was curated there, this came as no surprise.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/shah.png" alt="Nishant Shah" class="image-inline" title="Nishant Shah" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Dr. Nishant Shah in HUMlab&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;However, the one thing that stood out for me was an incredible session on Game Making conducted by Carl-Eric Engqvist. When I first saw it in the programme, I was apprehensive. What can Game Making have to do with digital gender? What would we learn from trying to design a game? I have been in ‘doing workshops’ before where things don’t always go as planned. Especially with the new ‘maker culture’ movements and DIY hipster phases, I have often found myself disappointed with workshops that focus too much on the technological and the interface. And I was in two minds about this – surely, we could have spent the time in more traditional academic experiences – round tables, discussion groups, or even just increased time for the participants to present their work. And so when the workshop began, I was waiting for it to make sense – to see what the game making’ workshop could have in store for the motley group of people that had assembled there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Engqvist started off by showing us three games that have inspired him the most and what he wanted us to take as our points of thought and from that moment on, I knew we were in safe hands. Engqvist was not interested in games for gaming. He was interested in games as artefacts, as ways of thinking, as modes of engagement into exploring, reifying and concretizing many of the questions around power and empathy. And more than anything else, he presented with us the idea that games can be pedagogic,  they can be learning tools; and though they might be designed for young players, they can be ways by which we translate our academic knowledge and research into practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What emerged in the subsequent two hours, was a great exercise in feminist methods and knowledge meeting new pedagogy and discussions. The group divided into two teams and set out to make a game that would be suitable for 8-10 year olds, and questions ideas of power and imbalance in their lives. Here are some things that I learned from the conversations:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The nature of true power: One of the most interesting discussions  that emerged was where the power resides. Scripted games often give us  the illusion of power by making the power of the script writer  invisible. While games are often open to creative interpretation and  negotiation, these are only within the context of the constraints of the  game. How do we design games that are then transparent about their own  limitations? Can we think of a game that is about building the game  rather than playing a game? Can we think of game outside of structures  of competition and winning, closer to the designs of the Theatre of the  Oppressed?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collective Empathy: The most dramatic revelation in the game making  exercise was the engineering of empathy. There were many different  suggestions on how to build empathy. One of the ideas was to put the  players in simulations of real-life crises, asking them to take up  different roles as antagonists and protagonists within the conflict,  along with by-standers who can choose to be allies. However, drawing  from legal narratives of rape, that demand that the rape victim be not  subjected to re-living the experience through testimonies in court, we  decided that it might be not fruitful to make participants re-live  real-life trauma in the course of the game. Eventually, we decided that  the way to escape this would be to let the participants be in control of  their own simulations, and offer them ways of establishing trust and  empathy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The power of narratives: In designing the narrative of the game,  what came out was our own personal narratives of why we believe in the  things that we do. How do we devise a game that has narratives of the  everyday that can eventually transcend into becoming special? How does  the playing of the game itself lead to repeated narratives, each  customised to the situation? How do we create conditions and  infrastructure that encourages users to iterate, repeat, remix and  remediate ideas so that they become rich and layered narratives? And  most importantly, how do we take something that is traumatic or  troublesome, something that scares or angers us, and get the help of our  fellow players, to reappropriate it, diffuse its hostile edge, and make  it more amenable and something that we can cope with?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;DIY experiences: We recognised as a group, that we were more  interested in a game that was about crafting experiences rather than  designing learning goals. Or in other words, we wanted something so  simple that it triggers something at the most visceral level, allowing  the players to dig deeper into their own selves and come up with ideas  that could resonate with the others. The ambition also was to have the  gamers be in control of the intensity and thus define the parameters of  their own gaming experience rather than be put into conditions or  situations that might lead to further trauma.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Teaching versus Learning: The largest chunk of our discussions  pivoted around these two concepts. When designing a pedagogic game, how  do we locate ourselves and the players? Do we assume the role of  pedagogues who have specific messages to deliver, or do we assume the  role of co-learners who will build a set of rules that create new  conditions of playing every time? How do we further ensure that the  games will have a feminist pedagogy of recursive and self-reflexive  criticality along with a clear message of empathy, collaboration and  togetherness?&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Presentation.png" alt="Presentation" class="image-inline" title="Presentation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presentation of the game ‘Drawing It Out’&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;What emerged through these five learning principles was a simple game  that we called ‘Drawing It Out’. Here are the rules of the game,  followed by some pictures that emerged as we played the game ourselves  in the group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Game: Drawing It Out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Players: 3-6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Age: 8 and above&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Materials: A number dice, a dice with different emotion words written  on it: Shame, Anger, Frustration, Love, Fear, Hope.  A tea-timer of 3  minutes. Sheets of blank paper, different coloured pens and pencils.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instructions:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Each member in the group rolls the number dice. The person with the highest roll gets to roll the emotion dice.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The emotion dice lands on any one of the emotions. For example: Fear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The tea-timer is turned, and each player, sitting in a circle, gets three minutes to draw the one thing that they are afraid of.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;When the time is over, each player gets to talk about the thing that they are afraid of.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once everybody has explained their fear, they pass their sheet of  paper to the person on the right. The tea-timer is turned. The next  person draws something else on the sheet of paper – adding, remixing,  morphing, changing the original drawing – to show how they can help in  overcoming the particular fear. In the case of hopeful words like Love  and Hope, the players add how they would increase and share in the  feeling.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each time the tea-timer runs out, the paper moves on to the next  person in the circle. The process is repeated till the sheet of paper  reaches the person who had first drawn on it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the end, each person looks at the sheet of paper they had begun  with and the others talk about the ways in which they have added to the  original drawing.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The participants roll the number dice again and repeat the process.  Participants are not allowed to draw the same thing if the emotion is  repeated. The game can be played till there is interest or time to play  it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The players get to take the sheets of remixed papers home with them  as artefacts and signs of the trust established within the game.”&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre  for Internet and Society, Bangalore, India. He is also an International  Tandem Partner at the Centre for Digital Cultures, Leuphana University,  Germany and a Knowledge Partner with the &lt;a href="http://www.hivos.net/" target="_blank"&gt;Hivos Knowledge Programme&lt;/a&gt;,  The Netherlands. Recently Dr. Nishant Shah visited HUMlab to  participate in the conference “Digital gender: Theory, Methodology and  Practice” (&lt;a href="http://www.humlab.umu.se/digitalgender" target="_blank"&gt;http://www.humlab.umu.se/digitalgender).&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice'&gt;https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-04-07T04:07:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture">
    <title>Will You be Paid to Post a Picture?</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture</link>
    <description>
        &lt;b&gt;The wave of free information production on the web is on the wane.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/india-others/will-you-be-paid-to-post-a-picture/99/"&gt;published in the Indian Express&lt;/a&gt; on February 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The age of volunteerism is officially over. The last decade of the mass adoption of the internet has been fuelled by endless human hours being spent in producing information which is the new currency of our times. The big transition to Web 2.0 began when the individual “user” became more than either an individual or the user. The individual found herself as a part of a collective, finding a voice and a community of others to belong to. Simultaneously, instead of being a passive consumer of the web, the user started producing data — blogs, videos, tweets, content management systems, online discussion boards, massively multiple online role-playing platforms, social network transactions — all of which became a part of the new Web’s widespread popularity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost everything that we understand as the social web today is contingent upon people producing data in their interactions with the world around them. From knowledge producing websites like Wikipedia to entertainment platforms like YouTube, visualisation and data gathering spaces like Pinterest to photographs of self, food and cute animals on Instagram, political and social commentaries on Tumblr to Listicles and memes on Buzzfeed, the internet is a veritable smorgasbord of new information forms, formats and functions that are generated by the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is possibly the most exciting about this burgeoning information universe has been the amount of free labour that goes into it, and often remains invisible. As digital labour scholar Trebor Schulz points out, the internet has become both a factory and a playground, where our leisure time is capitalised into producing work that sustains the new attention and information economies. For instance, the world’s largest social networking site, Facebook, does not produce any of its contents. It is, in fact, a system of information mining and sorting, which works as long as a growing user base continues to produce information on it. Tomorrow, if all of us stop producing Facebook, and only lurk on it, the platform will collapse. Which is why, Facebook continues to acquire new platforms and applications to be integrated into its universe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the real effort that goes into the sustenance of sites like Wikipedia, which has become the de facto reference for global knowledge systems, is carried out by unsung and invisible editors who patiently, meticulously, and without almost any expectation, continue to add, verify, strengthen and curate reliable information that we can use. When the non-profit organisation WikiMedia Foundation prides itself in running one of the least expensive websites in the top 10 most visited sites in the world, it is signalling its deep appreciation for the countless human hours that have made Wikipedia possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, in recent years, there is noticeable stagnation in the wave of free information production on the Web. Oh, don’t get me wrong. We are producing an unprecedented amount of data — we are constantly being watched by surveillance technologies that detect biometric and genetic make-up of all our transactions, or we are inviting people to watch us on social network sites where we reveal some of our deepest secrets and desires, or we are watching ourselves, quantifying everything from things we ate to the number of hours we sleep. And yet, as we live in a world of Big Data, there is a definite decrease in people contributing to production of free information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the digital natives move from the web to mobile phones, traditional websites are already facing a crisis. News and media agencies that have celebrated the global citizen media networks have started realising that the individual user is more interested in local networks and information ecologies which are independent of mainstream conglomerates. And people are realising that their time and effort is worth money. They can be easily compensated for their online activities and gain reputation and importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tension only becomes more palpable when people start realising that there are others who are being paid to work on the platforms that they are contributing to. We all knew that this model of depending on free information was not a sustainable one. But it seems the day has arrived, especially with the recent drives on Wikipedia to build specialised knowledge editors. In the last few months, we have seen people in the FemTechNet project — an academic activist feminist project that seeks to remind us of the intersections of feminism and technology in network societies — carry out “Wikistorming”, where students are adding pages of women’s contribution to technologies on Wikipedia. More recently, medicine students at University of Chicago have taken to correcting and adding accurate information to Wikipedia, which is often a source of health information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both of these are fantastic efforts to add to the platform that was the underdog that overthrew the mammoth encyclopaedia like The Encyclopaedia Britannica. We hope more specialised users in different locations, fields, disciplines and languages continue to edit and contribute to Wikipedia. However, it is also a signal that the generalist information producer is on the decline. We are transitioning into a new age, where people are going to need rewards, incentives and benefits for performing information transactions on the web. The user is no longer going to be available for free labour, and it is time we started thinking of “paid usership”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture'&gt;https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T11:58:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age">
    <title>Defending the Humanities in the Digital Age </title>
    <link>https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age</link>
    <description>
        &lt;b&gt;The author says that he is trying to take the formulation of digital humanities as a history-in-making where we might still be able to salvage the humanities from being soft-skills and our pedagogies from becoming reduced to MOOCs.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;Dr. Nishant Shah's &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/defending-humanities-digital-age"&gt;column was published in DML Central&lt;/a&gt; on February 24, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things: Reclaiming What is Lost in Our Defence of Humanities&lt;/b&gt;&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;br /&gt;If this were a book, this section would be the preface. If it were an academic paper, a footnote. If an art piece, a curator’s note. But, in this mixed multi-media semi-strange space of the research blog, this is just the space where I tell you what is going to follow. And perhaps, explain (though not to justify) why I need to tell you what is going to follow. For a while now, I have been trying to work through some of the questions that have emerged around (and sometimes, because of) digital humanities as a concept and as a practice. A lot of my thought has been about addressing the concerns around infrastructure, human skill, resources, pedagogy and the need to disprivilege the digital as the only point of focus in a majority of the discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I write about these questions in the different spaces that I write in, I’m trying to take the formulation of digital humanities as a history-in-making where we might still be able to salvage the humanities from being soft-skills and our pedagogies from becoming reduced to MOOCs. In doing so, I started experiencing a strange discomfort with my own writing. This is not new. Every time I glance retrospectively at my older writing, I cringe, and despair and work hard at resisting the impulse to apologise to my readers. It could have been better, sharper, more precise.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;But, the discomfort that I am experiencing now, looking at the last couple of years of writing about digital humanities, is different. It is a discomfort that emerges from the fact that in trying to defend and protect the domain of the humanities, the register of my writing has changed considerably.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I try to be accessible and write in prosaic forms that are easily understood and not prone to ambiguity. I try to talk to multiple stakeholders, especially those who are ringing the death knell of traditional humanities, speaking in a language of relevance, significance, impact and efficacy. I try to build infrastructure, engaging with funding agencies, carefully extrapolating the ideas of pilot innovations, mainscaling, upstreaming and integrating everyday practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all these attempts, which have been successful in varying degrees, I have let go of the very things that my English literature and humanities training had equipped me to do — to write with passion, to explore the creativity of linguistic and textual expression, to mix form, function and format to generate new relationships between disparate objects that might have otherwise been kept in their self-contained silos — and to pursue, not through empirical evidence, but through creative association, through cross-cultural and inter-textual referencing, a persuasive politics of passionate dialogue. Or, to not make such a song and dance (and a possible meme) out of it, I am slowly realising that very few of us, doing digital humanities, are exploring the very tools that humanities studies have offered us, to question and contest the status quo so that we can envision and dream alternate realities and futures.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; So caught have we been, trying to defend our craft (and sometimes the art) that we have started speaking in the language of those who question, rather than strengthening the voices we already have.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, I write today (see, I told you, we would need an explanation), as an experiment, in a language and style that I have forced myself to forget, in a way that I don’t even remember that it is forgotten. I write about three things – archives, life-cycles, and habits — in order to look at the complex and complicated relationships that we have presumed and established in the practices of digital humanities. I write to question our human-centric approach, where we think about things, but we only think of them from our human perspectives. I write to imagine, nay, to persuade you to imagine, what it would be like to think of things as things, dislodged from our human positions and dreaming cyborg dreams. I write, to explore, what it means in our DH concerns, to take care of things as things, and not as the separate, the other, the human.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things: The Beginning&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome, human beings, cyborgs, and things, to this blog post&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;It has been designed, by a few human beings, by a few machines, and a few things in-between. Here, I lay the ground and lead you into the fine practice of taking care of things. But this task produces in me a strange existential anxiety. I try to figure out what role I play in introducing something as common place, quotidian and everything as taking care of things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should I be like the head of an organised crime unit, who, for a price, shall take care of things that bother you by destroying them, silencing them, or making them invisible? Maybe I channel the energies of a grandmother, looking down the family tree of resemblances, giving out instructions on how to take care of the legacies and heirlooms, of the epilepsies in blood, that we shall pass from generation to generation. Should I be a historian who identifies patterns in the order of things, giving you hints at how we need to take care of things past and things to come so that we can live with things as they are? Or, how about a witness, blindfolded in my ignorance, a heathen in his blindness, describing to you the wonders of an elephant that looks like a pillar, a rope, a pan and a sword, trying to preserve what I remember, always knowing, always despairing that what I recall is smaller than what I remember, what I remember is smaller than what I know, what I know is smaller than what is, and what is, is both inscrutable and ineffable by the mere human?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I negotiate with these fractured, fragmented, frail and failed attempts at trying to care for you, care for ideas, care enough to transmit thoughts via words into your receptive selves, I realise that it is a futile attempt. Even if I were to enter that state of information nirvana, where what I think translates into words, pristine, pure, uncontaminated by powers of interpretation and untouched by the fallacy of meaning, you still would be unable to process it. Everything that I say will only be misunderstood by you. And, I shall misread your misunderstanding. And, together we shall fake it, like orgasms on a surreptitious one-night stand, in the quest of making meaning. In other words, I lament that we are not machines. That we are not things. It is only in the machinistic, especially in the digital machines of computing, that these seamless flows of information are possible. Garbage in, garbage out. What you see is what you get. Does exactly what it says on the tin. All your base are belong to us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so, welcome, once again human beings, cyborgs, things to this piece of text that I hope turns out to be fantastic, terrific, awesome. Fantastic because it invites you to enter realms of fantasy. Terrific because it leads us into things that terrify us. To this awesome evening. Awesome because it silences us into awe. Welcome, to this text, which is a safe space — look, you can ride on the hyphen, or drop between the white spaces of words. It is a safe space where we think, not of things, but as things. That is the only way out of the quandary into which I have trapped myself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things&lt;br /&gt;&lt;/b&gt;It is humanly impossible to do so. And it is in thinking of taking care as a human function, that we face bewilderment and anxiety. If we pretend, for the space of this text&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; to be things — immortal but destructible, without agency but with design, bereft of intention but with defined purpose, devoid of ambiguity but prone to abuse — and try and make sense of the three things that we shall return to, recursively, obsessively, desperately, in the next three days, then we might be on to something.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As things, we look at archives. The repository of things. An indexicality of things that are present. A glaring array of things that are absent. The archive has been imagined in the service of the human, at the desire of the human, and the curatorial logics of collective human experience too long. Let us think of not only an archive of things, but an archive that follows the internal logics and logistics of things. An archive that is constructed by things, which might sometimes give us human access and interface to things within it. Archives, which might use human powers — biological, organic, intellectual, affective — to organise themselves, to fuel their constant expansion and arrangement. Archives as a purpose for human existence. Archives as the alien space jelly that feeds on the human in order to survive, so that it can sustain the order and power of the things that reside within it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a world where the human has already conceded its right to memory — memory is a stick, it is a promiscuous, adulterous, plug and play flash drive, that romances, serenades and has infectious relationships with different machines… in such a world, it should be easy to imagine that the human, at least when it comes to informational realities, is secondary, if not insignificant. The human, prone to decay and death, attacked by biological malware that erodes its internal functions, disabling its programmes and often short-circuiting its motherboard, is fragile and surely the most unstable form of storing something as beautiful and terrifying as information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We live too fast, die too soon, and in the process, constantly destroy the meaningless but necessary flow and circulation of information. And, so, we need to think of life-cycles differently. The things that we live with, generally outlive our carbon based biological bodies. We pass on, through genetic mutation, our eyes, our knobby knees and our genetic predisposition to chocolate to the subsequent generations. But, we also pass on our assets, our properties, our passwords and datasets. And maybe, given that the data outlives us, data is seemingly immortal, data registers our death and continues in its divine existence, we need to restructure our idea of who lives, who dies, and what constitutes a life-cycle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, I beseech you, to let go of your humanity. This stubborn sticking to the idea of being human, is merely a habit. It is taught. It is a form of co-option. Remember those days, when you were still not sure about being human. The day, when you were told that when you grow up, you can become anything you want — the disappointment of realising that it was a lie… that you wanted to be a dog, but you were trapped and coerced into becoming a human. Let go of the idea that being human has anything exceptional to it. We love. We care. We kill. Well, guess what?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things Care&lt;br /&gt;&lt;/b&gt;Things love. Oh, they love. Selfishly, destructively, intensely. Things love us and they demand our attention, time and intimacy, slowly enveloping us in soft glows, gently vibrating in our pockets, sensually slithering in our hands. And everybody knows what happens to a machine that you pour a cup of coffee on — like a disappointed lover, Romeo to his Juliet poisoning himself to death, like Medea on a revenge spree eating her own children, the machine, when neglected, dies.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things care. But we are mistaken in thinking that they care for us. Things care for themselves. &lt;a href="http://www.plecebo.org/2009/01/kelly-dobson-and-robots.html"&gt;Things take care of each other.&lt;/a&gt; When you and I are asleep, your refrigerator connects to your microwave, speaking through the analogue networks, resonating in electromagnetic frequencies. And things kill.  Slowly, gently, hypnotically, they wait, they watch, and when we are not looking, they stab, they sting, they betray and remind us that the human is futile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To take care of things as human beings is then an exercise in wasted effort. Because we shall always be addressing things from a condition of inadequacy and wastefulness, well aware that the thing that we are talking to, talking about, talking through, is more precise, more fulfilled, more in control of its intentions and more aware of its destiny than we are ever going to be. Maybe in order to take care of things, we need to think of ourselves as things. Things that talk to things. Things that take care of things. That will be a world of new equalities. A world, where we can stop living in fear of the other — the thing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Where Everything is a Thing&lt;/b&gt;&lt;br /&gt;A thing is in everything.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;span&gt;This is a footnote to acknowledge that the first thought for this  line of thinking emerged in conversations at the Post Media Lab, and  concretized at their &lt;/span&gt;&lt;a href="http://www.postmedialab.org/taking-care-of-things"&gt;recent event&lt;/a&gt;&lt;span&gt; from where I borrow this title. Special thanks for &lt;/span&gt;&lt;a href="http://lerone.net/?language=en"&gt;Oliver Lerone Schultz&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.leuphana.de/clemens-apprich.html"&gt;Clemens Apprich&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://hybridpublishing.org/author/christinakral/"&gt;Christina Kral&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.risd.edu/Digital___Media/Kelly_Dobson/"&gt;Kelly Dobson&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://research.brown.edu/myresearch/Wendy_Chun"&gt;Wendy Chun&lt;/a&gt;&lt;span&gt; who made this line of thinking grow through the &lt;/span&gt;&lt;a href="http://dmlcentral.net/blog/nishant-shah/habits-living-being-human-networked-society"&gt;Habits of Living&lt;/a&gt;&lt;span&gt; workshops.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. For the first time, the green underline that my word processor has produced, telling me that the correct prose would end the sentence with ‘and more precise’ is not feeding my Dysgrammatophobia. How dare it tell me how I should write?&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. I have to give a special shout out to &lt;a href="http://en.wikipedia.org/wiki/Johanna_Drucker"&gt;Johanna Drucker&lt;/a&gt; whose  resolute mixing of the styles and genres, writing as a digital humanist  while writing about digital humanities has been truly inspiring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. I am not sure which of you would read it in its entirety, and I don’t  really know how to talk to things yet, so while I welcome everybody and  everything, I am going to address only the human reader in my text. My  metadata, I hope, imparts pleasure to the non-humans who are not  plotting their way into Actor-Network visualisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. While battles rage on Twitter, relationships live their life-cycles on  Facebook, new memes propagate and abound the Tumblrs,  blink-and-you-miss-them, subcultural practices explode into meteoric  showers, and somewhere, some harassed teacher tries to figure out what  s/he did wrong in the last seven births that s/he now has to teach  using &lt;a href="http://www.blackboard.com/platforms/learn/overview.aspx"&gt;Blackboard&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age'&gt;https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-03-06T11:40:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
