<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening">
    <title>DesiSec: Episode 1 - Film Release and Screening</title>
    <link>https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. 
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!&lt;/b&gt;
        
&lt;div&gt;Early 2013, the Centre for Internet and Society began shooting its first documentary film project.&amp;nbsp;After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - &lt;strong&gt;DesiSec: Cybersecurity and Civi Society in India&lt;/strong&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Trailer link:&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer"&gt;http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;CIS is hosting a special screening of &lt;strong&gt;DesiSec: Episode 1&lt;/strong&gt; on &lt;strong&gt;11th December, 2013, 6 pm&lt;/strong&gt; and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;We look forward to seeing you there!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;RSVP:&amp;nbsp;&lt;a href="mailto:purba@cis-india.org" target="_blank"&gt;purba@cis-india.org&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Venue:&amp;nbsp;http://osm.org/go/yy4fIjrQL?m=&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'&gt;https://cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-12-17T08:13:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash">
    <title>CIS Cybersecurity Series (Part 13) - Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</link>
    <description>
        &lt;b&gt;CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;
&lt;div&gt;&lt;i&gt;"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-01-20T06:20:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian">
    <title>CIS Cybersecurity Series (Part 1) - Christopher Soghoian</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</link>
    <description>
        &lt;b&gt;CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Christopher is based in Washington, D.C. His website is http://www.dubfire.net/&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:26:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>CIS contributes to the Research and Advisory Group of the Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace (GCSC) is an initiative of the Hague Centre for Strategic Studies and the East West Institute that seeks to promote mutual awareness and understanding among various cyberspace communities. It seeks to develop norms and policies that advance the stability and security of cyberspace.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Chaired by Marina Kaljurand, and Co-Chaired by Michael Chertoff and Latha Reddy, the Commission comprises 26 prominent Commissioners who are experts hailing from a wide range of  geographic regions representing multiple communities including academia industry, government, technical and civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a part of their efforts, the GCSC sent out a call for proposals for papers that sought to analyze and advance various aspects of the cyber norms debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok and Arindrajit Basu’s paper ‘ Conceptualizing an International Security Architecture for Cyberspace’ was selected by the Commissioners  and published as a part of the Briefings of the Research and Advisory Group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arindrajit Basu represented CIS at the Cyberstability Hearings held by the GCSC at the sidelines of the &lt;a href="https://www.globsec.org/projects/globsec-2018/"&gt;GLOBSEC forum &lt;/a&gt;in Bratislava-a multilateral conference seeking to advance dialogue on various issues of international peace and security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The published paper and the Power Point may be accessed &lt;a href="https://cyberstability.org/research/issue-brief-2-bratislava/"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agenda for the hearings is reproduced below&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GCSC HEARINGS, 19 MAY 2018&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HEARINGS: TOWARDS INTERNATIONAL CYBERSTABILITY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Venue: “Habsburg” room, Grand Hotel River Park 15:00-15:15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome Remarks by Marina Kaljurand, Chair of the Global Commission on the Stability of Cyberspace (GCSC) and former Foreign Minister of Estonia 15:15-16:45&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hearing I: Expert Hearing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This session focuses on the topic Cyberstability and the International Peace and Security Architecture and includes scene settings, food-for-thought presentations on the new GCSC commissioned research, briefings and open statements by government and nongovernmental&lt;/i&gt; speakers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Scene setting: ”Cyber Diplomacy in Transition” by Carl Bildt, former Prime Minister of Sweden&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Commissioned Research I: Lessons learned from three historical case studies on establishing international norms” by Arindrajit Basu, Centre for Internet and Society, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commission Research II: The “pre-normative” framework and options for cyber diplomacy” by Elana Broitman, New America Foundation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some Remarks on current thinking within the United Nations”, by Renata Dwan, Director United Nations Institute for Disarmament Research (UNIDIR)  (Registered Statements by Government Advisors)  (Statements by other experts)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Open floor discussion) 16:45-17:15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coffee Break&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2018-07-05T16:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish">
    <title>Pleasure and Pornography: Impassioned Objects</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish</link>
    <description>
        &lt;b&gt;In this post, a third in the series documenting her CIS-RAW project, Pleasure and Pornography, Namita Malhotra explores the idea of fetish as examined by Anne McClintock (i) . This detour is an exploration of the notion of fetish, its histories and meanings, and how it might relate to the story of Indian porn. &lt;/b&gt;
        
&lt;p&gt;&lt;br /&gt;The etymology of fetish derives from the word fetico (Portuguese) which means sorcery or magic arts. In 1760, it was used to refer to primitive religions, especially in relation to the growing project of imperialism. In 1867, Marx coined the term commodity fetishism – using the implied meaning of primitive magic to express the central social form of modern industrial economy, whereby the social relation between people metamorphoses into the relation between things. It was only after this, in 1905, that Freud transferred the word, with all these meanings still clinging to it, to the realm of sexuality and perversions. As Anne McClintock points out, in her useful account and re-understanding of the fetish in the book &lt;em&gt;Imperial Leather&lt;/em&gt; (ii), psychoanalysis, philosophy, and Marxism all take shape around the invention of the primitive fetish, which conveniently displaces what the modern mind cannot accommodate onto the invented domain of the primitive. She states that the not-so-concealed rationale of imperialism is fetishism. Fetishists (racial, sexual and other) became a mode of warranting and justifying conquest and control -- whether it was the policing of sexual fetishism for control of classes in Europe and colonies, or the invention of racial fetishism central to the regime of imposing sexual surveillance in the colonies.&lt;strong&gt; The imperial discourse on fetishism became a discipline of containment&lt;/strong&gt; (iii) .&lt;/p&gt;
&lt;p&gt;On the other hand in the realm of sexuality, fetish becomes a question of male sexuality alone -- male perversion par excellence. There are no female fetishists, either for Freud or Lacan, for to speak of female fetishism would involve displacing the basic precepts of psychoanalysis -- namely the scene of castration leading to phallic fetishism. However, McClintock points to the usefulness of studying female fetishism, as it allows for certain things to happen. First, it dislodges the centrality of the phallus in this discourse, which surprisingly makes way for the presence and legitimacy of a multiplicity of pleasures, needs, and contradictions that can’t be resolved or reduced merely to the desire to preserve the phallus. Very often, feminists such as McClintock read the Lacanian insistence on the centrality of the phallus as itself a fetishistic nostalgia for a single, male myth of origins and fetishistic disavowal of difference. Such a notion of fetish, embedded in phallic theory, gets easily reduced to sexual difference and does not allow/admit race or class as crucially formative categories as well; thus, race and class remain continuously of secondary status in the primarily sexually signifying chain.&lt;/p&gt;
&lt;p&gt;“The racist fetishizing of white skin, black fetishizing gold chains, the fetishizing of black dominatraces, lesbians, cross dressing as men the fetishizing of national flags, slave fetishism, class cross-dressing, fetishes such as nipple clips and bras in male transvestism, leather bondage, PVC fetishism, babyism and so on -- these myriad different deployments of fetishistic ambiguity cannot be categorized under a single mark of desire, without great loss of theoretical subtlety and historical complexity.” Also McClintock points to racist, nationalistic and patriotic fetishes -- such as flags, crowns, maps, swastikas (or for instance chaddis) -- that can’t be simply rendered equivalent to the disavowal of male castration anxiety. &lt;br /&gt;&lt;br /&gt;McClintock calls for a renewed investigation of fetishism -- to open it up to a more complex and valuable history in which racial and class hierarchies would play as formative a role as sexuality. Rejecting the Lacanian and Freudian fixation on the phallus as central to psychoanalysis would call for a mutually transforming investigation into the disavowed relations of psychoanalysis and social history. In a way, it would be the bringing together of the varied ways in which fetish has been used -- by Freud (in the domain of psychoanalysis) in the realm of domesticity and the private, and by Marx (in the domain of male socio-economic history) in the realm of the market and possibly in the public. If these meanings were to speak to each other, what we discover is that fetish is in fact the historical enactment of ambiguity itself.&lt;/p&gt;
&lt;p&gt;Fetishism involves the displacement onto an object of contradictions that the individual cannot resolve at a personal level. These contradictions could indeed be social, though lived with profound intensity in the imagination and flesh of the person. The fetish -- rather than being a merely an insignificant sexual or personal practice -- inhabits both personal and historical memory. It marks a crisis in social meaning -- the embodiment of an impossible resolution. This crisis/contradiction is displaced onto and embodied in the fetish object, which is thus destined to recur in compulsive ways. By displacing this power onto the fetish, then manipulating or controlling the fetish, the individual gains symbolic control over what might otherwise be terrifying ambiguities.&lt;/p&gt;
&lt;p&gt;The fetish then can be called an impassioned object; something that emerges from a variety of social contradictions, rather than merely from the scene of castration or phallic centric domains. Hence they are neither universal, nor are they entirely about personal histories alone, but are about personal and historical memory or a social contradiction that is experienced at an intensely personal level. “As composite symbolic objects, fetishes thus embody the traumatic coincidence not only of individual but also of historical memories held in contradiction” (McClintock). This reading of fetishism gives rise to far richer possibilities of cultural analysis.&lt;/p&gt;
&lt;p&gt;Fetish was neither proper to African or Christian European culture, but sprang into being from an abrupt encounter between two heterogeneous worlds during an era of mercantile capitalism and slavery. At this point it clearly embodies the problem of contradictory social value -- whether it is gold as valuable, or gold as warding off bad luck. Though initially just about heathen customs and rituals, it later also becomes a marking of certain groups of people for conquest. It is from this context that Freud transports the word, laden with meanings of conquest and violence, to the realm of sexuality. Obviously these meanings stain future connotations of fetish, the word fetish itself becoming prey to contradictory meanings of race and sex and difference.&lt;/p&gt;
&lt;p&gt;For Freud, the fetish is the embodiment in one object of two positions -- castration and its denial. Though this does capture some sense of the ambiguity that McClintock also refers to, here the meanings oscillate between two, and only two, fixed options (a recurring male economy). The fetish becomes both a permanent memorial to the horror of castration, embodied not in the male but in the female -- as well as a token of triumph, and safeguard against the threat of castration. This has, of course, been critiqued by feminists quite severely. McClintock’s basic argument is that it is indeed hard, considering the varied nature of fetish objects, to find a single originary explanation in the psychic development of the individual -- in a single originary trauma. What is important here, however is to take on this notion of the fetish as an historical enactment of ambiguity itself, and see if as a theoretical concept it has any value to the study of the loose category of Indian porn, especially MMS porn. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Soap in these strange days: fetish objects&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;“Such spectacle creates the promise of a rich sight: not the sight of particular fetishized objects, but sight itself as richness, as the grounds for extensive experience.”&lt;br /&gt;Dana Polan (iv)&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Anne McClintock’s work on fetish also looks at the seemingly ubiquitous object of soap as the carrier of many ambiguous meanings around gender, class, imperialism -- both the cult of domesticity (the running of the empire of home with servants, sweepers, cleaners, women, maids etc.) and the cult of new imperialism found in soap in its exemplary mediating form. The story of soap, for McClintock, reveals that fetishism rather than a quintessentially African propensity (belonging in the realm of lands and peoples that were being discovered through imperialism) was in fact central to industrial modernity; fetishism was not original either to industrial capitalism or precolonial economies, but was from the outset the embodiment and record of an incongruous and violent encounter (between two or more heterogenous cultures) and about rapid changes of modernity, rather than about the ‘primitive’. &lt;br /&gt;&lt;br /&gt;Marx says that the mystique of the commodity fetish lies not in its use value, but in its exchange value and its potency as a sign: “So far as (a commodity) is a value in use, there is nothing mysterious about it”. This could be linked to the idea of a mobile phone that is supposed to achieve so much beyond mere communication, at least according to the advertising -- they should mend ruptured relations and homes, get all the hot chicks, grow beautiful gardens, change the boring routine of life. For some time, the Samsung mobile phone ad with Estella Warren played in India, which probably moves the mobile phone with camera out of merely its symbolic use as enhancing attractiveness, to actually ‘getting’ or rather capturing girls by clicking. Magically in the ad, the act of clicking photographs make the girl not just willing, but she also takes the phone and photographs herself. Barring one scary moment when it looks like she might turn into an avenging warrior like Xena or The Bride, but instead she simpers into a loving sexy pose, she is willing. The ad can’t be easily dismissed as misogynistic, but it does give an intriguing glimpse of the intimate pictures and moments that can be captured with a mobile phone. &lt;br /&gt;&lt;br /&gt;That a mobile phone is fetishized as a commodity is probably evident, from the rush to get the more enhanced phone with the better camera and features, though mobile phones are also a ubiquitous element of one’s life, in some ways exactly like soap. Probably in a country like India, having a mobile phone can be read as opening up sexual possibilities in a way that wouldn’t be obvious in a more developed country. If the fetish is a social contradiction that is experienced at an intensely personal level, then the mobile phone, especially after the DPS MMS clip, is precariously located between the zones of the private and personal, and that which is entirely in the public domain beyond any control of the person(s). This ability of the mobile phone to occupy simultaneous universes because of its interconnectedness in a network, and that it is (for most people now) an entirely personal object with messages, numbers, conversations, images, videos, is what makes it unpredictable. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Looking at MMS porn&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;“Memories were meant to fade. They were built that way for a reason”&lt;br /&gt;Mace, Strange Days&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;When looking at MMS porn, I’m irresistibly reminded of the movie &lt;em&gt;Strange Days&lt;/em&gt;, in which Angela Basset’s character Mace expresses her frustration with Lenny (played by Ralph Fiennes). Lenny is obsessed with preserving memory and accessing other people’s experiences, through what in the movie are called playbacks. Playbacks are recordings of events in the brain that were fed back into brain waves to reproduce the earlier event -- the feelings, the sensations of touch, the smells and not just the visual. Playbacks haven’t been invented yet, but the obsessiveness with which Lenny wheels and deals (he’s also a dealer and collector of playbacks) gives a peculiar insight into how mobile phones are becoming fetish objects of sorts -- particularly MMSs recorded on mobile phones where other people are able to occupy the space of an unknown character that conveniently rarely ever appears on the screen. The famous pornographic ones are the DPS MMS clip and other MMS scandals, including the hidden voyeuristic ones taken without permission, and a precursor of this is Mysore Mallige where the man appears rarely on the screen and only at the end, almost like a signature. In a peculiar way MMS porn becomes like playback from Strange Days, a movie that is attempting to unravel the unknown future mired in technological changes that are messily intertwined with human desire and frailty. A future (set on the date of turning the millennium) that we’ve hopelessly gone past without even asking many of the questions that the characters in the movie pose.&lt;br /&gt;&lt;br /&gt;Indian websites advertise MMS scandals as a specific category of pornography. This category also includes genuine MMS clips of celebrities kissing (Kareena Kapoor), wardrobe malfunctions from Fashion Week, and also fake ones with celebrity look-alikes bathing, changing, having sex (Preity Zinta, Mallika Sherawat). Mostly what is being talked about are videos made on mobile phones by men, who record themselves having sex with ‘gullible’ women. The alleged gullibility of these women is probably essential to the erotic charge of such videos. They are shaky videos, especially when sex is underway, and have a grainy quality that makes them eerily real. Their perspective is usually that of the man who is holding the phone camera and rarely enters the frame himself, whereas the woman is definitely the desirable object that is being captured. Maybe this phenomenon can be understood better if one looks at McClintock’s idea of fetish and whether MMS/images on mobile phones can be located within that category -- whether the ambiguous nature of the video or image recorded on the mobile phone and its ability to be an intensely personal and private object and also to be so easily transmitted into networks signifies a crisis in social meanings around private and public. The mobile phone then merely becomes an object onto which this anxiety is displaced, and the recording of images repeatedly (and anxieties and fears triggered when they accidentally slip into the public domain) are ways of trying to control terrifying ambiguities over the private and the public (where aspects of sexuality, family and selfhood could be calamitously disrupted by a slip between the two categories). (v)&lt;br /&gt;&lt;br /&gt;In a strange way this is a parable for a larger phenomenon of pornographic circulation and the law, as well. The mass circulation of pornography is perceived as a private secret that is kept by all, and whenever there is slip between the two categories, the law and public discourse are barely able to deal with the furore of anxieties. And if not, then the law and public discourse proceed to deal with the banal unbuttoning of Akshay Kumar’s jeans by his wife as obscenity in courtrooms, as if we hadn’t all imagined an MMS that allowed us to be doing the same. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;i. Anne Mcclintok’s work on sadomasochism illuminates some of the arguments that I make in relation to sexual subjectivity and the state’s interests and desires in policing it.&amp;nbsp; (unpublished article for book on queer issues and the law). Her work borrows from notions developed by Foucault. “Sadomasochism plays social power backwards, visibly and outrageously staging hierarchy, difference and power, the irrational, ecstasy or alienation of the body, placing these ideas at the centre of western reason.” The analysis of sexual subjectivity and State’s interest in it also looks at the judgment on sadomasochism by the House of Lords, England that declares such activities that cause severe injuries and maim the body, as illegal, regardless of consent of parties. &lt;br /&gt;ii. Anne Mcclintok, Imperial Leather: Race, gender and sexuality in the colonial contest, Routledge, 1995.&lt;br /&gt;iii. Ibid&lt;br /&gt;iv. Cited from Laura Mulvey, Some Thoughts on Theories of Fetishism in the Context of Contemporary Culture, October, Vol. 65 (Summer, 1993), pp. 3-20.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;v. As in the story of Chanda in Dev.d loosely inspired from the DPS MMS clip incident&lt;br /&gt;&lt;img src="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/uploads/kalkichanda.jpg/image_preview" alt="Chanda from Dev.d" class="image-inline image-inline" title="Chanda from Dev.d" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/impassioned-objects-unraveling-the-history-of-fetish&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>namita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>women and internet</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    

   <dc:date>2011-08-02T08:35:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india">
    <title>Emerging Bit Torrent Trends in India</title>
    <link>https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india</link>
    <description>
        &lt;b&gt;Internet has been a revelation ever since its introduction. The writer in this blog examines how the progress made by Internet based technologies could never be reversed.&lt;/b&gt;
        &lt;h2&gt;From Kazaa to The Pirate Bay&lt;/h2&gt;
&lt;p&gt;Little did the world of the VHS era realize in its time where the future of pirate technologies were heading to. The world's favourite music and films were quickly transferred onto optical discs as magnetic tapes went obsolete a few years before the end of the last century. Internet was soon to become the nemesis of discs, which were bulky to store and scratched easily. The first tryst with peer to peer technologies on networks sent shivers down the spine of Jack Valenti and the Motion Pictures Association of America. The speed of dissemination and distribution of content over the Internet was something the world had never seen before. The lawsuits against peer to peer networks such as Kaaza and Limewire ran into millions of dollars. Websites were shut down, but time and progress of technology could never be reversed.  BitTorrent soon became the most common protocol to transfer content over the Internet.  BitTorrent metafiles themselves do not store copyrighted data. Hence, BitTorrent itself is not illegal. However, its use to make copies of copyrighted material that contravenes laws in many countries has created many controversies, including the now famous Pirate Bay Trial in Sweden. The popularity of torrents though
is not specific to the Western world. The strength of the Internet lies in its ability to generate content from any corner of the world
which is then spread across the world through a web of distribution reaching many computers and granting them access to the content simultaneously.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Desi content on Torrent Networks&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Desi : A term derived from Sanskrit, meaning region, province or country. It now refers to the people and culture of South Asian Diaspora.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;On the most popular BitTorrent search engines, &lt;a href="http://torrentz.com/" target="_blank"&gt;torrentz.com&lt;/a&gt;, Hindi and Hindi movies are permanent search tags. Often, one would even see the names of popular Bollywood releases such as Dev D, or at the time of writing this blog entry, Telegu Films, prominently displayed on the site. Bollywood and other content created in India and the rest of the subcontinent is driving the cyberspace. With a huge diaspora spread across every part of the world and increasing Internet penetration alongside rising broadband speeds in urban India, the demand for desi content on torrent networks is on the rise. Websites such as &lt;a href="http://desitorrents.com/" target="_blank"&gt;desitorrents.com&lt;/a&gt; and &lt;a href="http://dctorrent.com/" target="_blank"&gt;dctorrent.com&lt;/a&gt; are two torrent search engines that are popular amongst Internet users and cater exclusively to desi content. A closer look at the content on these sites reveal that the most popular content on these torrent networks are television shows, cricket matches, Bollywood movies, music and regional cinema. Torrent scenes such as aXXo are not unique to Hollywood uploads alone.  Desi content has its own torrent scenes, responsible for uploading torrent trackers, as soon as the content is out in the public. Users identifying themselves as Jay, Captain Jack or Gunga Din are busy uploading these files on the desi networks. 
&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Online since January 2004 and an Internet traffic rank of 7,302, an average visitor spends 8.3 minutes on the Desi Torrents site everyday. Relative to the general Internet population, the website has the highest number of male visitors in the age group of 18 to 34.&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most users are college graduates who prefer to access the website from home. In comparison, Desi Club Torrents, which is a free website has
a younger representative web demographic with males between 18 to 24 years of age being the most prominent visitors. According to the
data, it is also revealed that the website has a higher ratio of visitors who have not attended Graduate School but still have attended some college for education&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Impact on the Traditional Markets&lt;/strong&gt;&lt;/h2&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;In most cases, the popularity of Bollywood films in cinema halls and
on torrent sites seems to be linked. For example, the most successful
Bollywood film of 2008, Ghajini, which ended up raking Rs. 200 crores
on the box office, is also one of the most downloaded films on Bit
Torrent Networks. However, for the Pirate selling DVD's of latest
films, this is not great news.&amp;nbsp;A majority of their customers have migrated to
downloading films on the Internet using Peer to Peer technologies.
The upper middle-class niche film watching audiences, have been the
fastest to acquire computers and get on the Internet. Increasing
broadband speeds have ensured that this segment of consumer
transitions away from the traditional 'on the corner' pirate shop. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india'&gt;https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>siddharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>cybercultures</dc:subject>
    
    
        <dc:subject>cyberspaces</dc:subject>
    

   <dc:date>2011-08-04T04:44:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india">
    <title>The Potential for the Normative Regulation of Cyberspace: Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india</link>
    <description>
        &lt;b&gt;Author: Arindrajit Basu
Edited by: Elonnai Hickok, Sunil Abraham and Udbhav Tiwari
Research Assistance: Tejas Bharadwaj&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The standards of international law combined with strategic considerations drive a nation's approach to any norms formulation process. CIS has already produced work with the &lt;a class="external-link" href="https://cyberstability.org/wp-content/uploads/2018/06/GCSC-Research-Advisory-Group-Issue-Brief-2-Bratislava-1.pdf"&gt;Research and Advisory Group (RAG)&lt;/a&gt; of the Global Commission on the Stability of Cyberspace (GCSC), which looks at the negotiation processes and strategies that various players may adopt as they drive the cyber norms agenda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report focuses more extensively on the substantive law and principles at play and looks closely at what the global state of the debate means for India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the cyber norms formulation efforts in a state of flux,India needs to advocate a coherent position that is in sync with the standards of international law while also furthering India's strategic agenda as a key player in the international arena.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report seeks to draw on the works of scholars and practitioners, both in the field of cybersecurity and International Law to articulate a set of coherent positions on the four issues identified in this report. It also attempts to incorporate, where possible, state practice on thorny issues of International Law. The amount of state practice that may be cited differs with each state in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report provides a bird’s eye-view of the available literature and applicable International Law in each of the briefs and identifies areas for further research, which would be useful for the norms process and in particular for policy-makers in India.Historically, India had used the standards of International Law to inform it's positions on various global regimes-such as UNCLOS and legitimize its position as a leader of alliances such as the Non-Aligned Movement and AALCO. However, of late, India has used international law far less in its approach to International Relations. This Report therefore explores how various debates on international law may be utilised by policy-makers when framing their position on various issues. Rather than creating original academic content,the aim of this report is to inform policy-makers and academics of the discourse on cyber norms.In order to make it easier to follow, each Brief is followed by a short summary highlighting the key aspects discussed in order to allow the reader to access the portion of the brief that he/she feels would be of most relevance. It does not advocate for specific stances but highlights the considerations that should be borne in mind when framing a stance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report focuses on four issues which may be of specific relevance for Indian policy-makers. The first brief, focuses on the Inherent Right of Self-Defense in cyberspace and its value for crafting a stable cyber deterrence regime. The second brief looks at the technical limits of attributability of cyber-attacks and hints at some of the legal and political solutions to these technical hurdles. The third brief looks at the non-proliferation of cyber weapons and the existing global governance framework which india could consider when framing its own strategy. The final brief looks at the legal regime on counter-measures and outlines the various grey zones in legal scholarship in this field. It also maps possible future areas of cooperation with the cyber sector on issues such as Active Cyber Defense and the legal framework that might be required if such cooperation were to become a reality.Each brief covers a broad array of literature and jurisprudence and attempts to explore various debates that exist both among international legal academics and the strategic community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ongoing global stalemate over cyber norms casts a grim shadow over the future of cyber-security. However, as seen with the emergence of the nuclear non-proliferation regime, it is not impossible for consensus to emerge in times of global tension. For India, in particular, this stalemate presents an opportunity to pick up the pieces and carve a leadership position for itself as a key norm entrepreneur in cyberspace.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/normative-regulation-of-cyber-space-report/at_download/file"&gt;Read the full report here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india'&gt;https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-31T23:49:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research">
    <title>The Geopolitics of Cyberspace: A Compendium of CIS Research</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research</link>
    <description>
        &lt;b&gt;Cyberspace is undoubtedly shaping and disrupting commerce, defence and human relationships all over the world. Opportunities such as improved access to knowledge, connectivity, and innovative business models have been equally met with nefarious risks including cyber-attacks, disinformation campaigns, government driven digital repression, and rabid profit-making by ‘Big Tech.’ Governments have scrambled to create and update global rules that can regulate the fair and equitable uses of technology while preserving their own strategic interests.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;With a rapidly digitizing economy and clear interests in shaping global rules that favour its strategic interests, India stands at a crucial juncture on various facets of this debate. How India governs and harnesses technology, coupled with how India translates these values and negotiates its interests globally, will surely have an impact on how similarly placed emerging economies devise their own strategies. The challenge here is to ensure that domestic technology governance as well as global engagements genuinely uphold and further India’s democratic fibre and constitutional vision.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since 2018, researchers at the Centre for Internet and Society have produced a body of research including academic writing, at the intersection of geopolitics and technology covering global governance regimes on trade and cybersecurity, including their attendant international law concerns, the digital factor in bilateral relationships (with a focus on the Indo-US and Sino-Indian relationships). We have paid close focus to the role of emerging technologies in this debate, including AI and 5G as well as how private actors in the technology domain, operating across national jurisdictions, are challenging and upending traditionally accepted norms of international law, global governance, and geopolitics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The global fissures in this space matter fundamentally for individuals who increasingly use digital spaces to carry out day to day activities: from being unwitting victims of state surveillance to harnessing social media for causes of empowerment to falling prey to state-sponsored cyber attacks, the rules of cyber governance, and its underlying politics. Yet, the rules are set by a limited set of public officials and technology lawyers within restricted corridors of power. Better global governance needs more to be participatory and accessible. CIS’s research and writing has been cognizant of this, and attempted to merge questions of global governance with constitutional and technical questions that put individuals and communities centre-stage.&lt;/p&gt;
&lt;p&gt;Research and writing produced by CIS researchers and external collaborators from 2018 onward is detailed in the appended compendium.&lt;/p&gt;
&lt;h2&gt;Compendium&lt;/h2&gt;
&lt;h3&gt;Global cybersecurity governance and cyber norms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Two decades since a treaty governing state behaviour in cyberspace was mooted by Russia, global governance processes have meandered along. The security debate has often been polarised along “Cold War” lines but the recent amplification of cyberspace governance as developmental, social and economic has seen several new vectors added to this debate. This past year two parallel processes at the United Nations General Assembly’s First Committee on Disarmament and International Security-United Nations Group of Governmental Experts (UN-GGE) and the United Nations Open Ended Working Group managed to produce consensus reports but several questions on international law, norms and geopolitical co-operation remain. India has been a participant at these crucial governance debates. Both the substance of the contribution, along with its implications remain a key focus area for our research.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Edited Volumes&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu &lt;a href="https://www.india-seminar.com/2020/731.htm"&gt;India and Digital World-Making&lt;/a&gt;, &lt;em&gt;Seminar &lt;/em&gt;731, 1 July 2020 &lt;em&gt;(featuring contributions from Manoj Kewalramani, Gunjan Chawla, Torsha Sarkar, Trisha Ray, Sameer Patil, Arun Vishwanathan, Vidushi Marda, Divij Joshi, Asoke Mukerji, Pallavi Raghavan, Karishma Mehrotra, Malavika Raghavan, Constantino Xavier, Rajen Harshe' and Suman Bery&lt;/em&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Long-Form Articles&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok, &lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"&gt;&lt;em&gt;Cyberspace      and External Affairs: A Memorandum for India&lt;/em&gt;&lt;/a&gt; (Memorandum,      Centre for Internet and Society, 30 Nov 2018) &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-potential-for-the-normative-regulation-of-cyberspace-implications-for-india"&gt;&lt;em&gt;The Potential for the Normative Regulation of Cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(White Paper, Centre for Internet and Society,      30 July 2018) &lt;/li&gt;
&lt;li&gt;Arindrajit Basu and      Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"&gt;&lt;em&gt;Conceptualizing      an International Security Architecture for cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(Briefings of the Global      Commission on the Stability of Cyberspace, Bratislava, Slovakia, May 2018)&lt;/li&gt;
&lt;li&gt;Sunil      Abraham, Mukta Batra, Geetha Hariharan, Swaraj Barooah, and Akriti      Bopanna,&lt;a href="https://cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates"&gt; India's contribution to internet governance debates&lt;/a&gt; (NLUD Student Law Journal, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;&lt;br /&gt;Blog Posts and Op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, Irene Poetranto, and Justin Lau, &lt;a href="https://carnegieendowment.org/2021/05/19/un-struggles-to-make-progress-on-securing-cyberspace-pub-84491"&gt;The UN struggles to make progress in cyberspace&lt;/a&gt;&lt;em&gt;, Carnegie Endowment for International Peace&lt;/em&gt;, May 19th, 2021&lt;/li&gt;
&lt;li&gt;Andre’ Barrinha and Arindrajit Basu, &lt;a href="https://directionsblog.eu/could-cyber-diplomacy-learn-from-outer-space/"&gt;Could cyber diplomacy learn from outer space&lt;/a&gt;, &lt;em&gt;EU Cyber Direct&lt;/em&gt;, 20th April 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranesh Prakash&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.thehindu.com/opinion/lead/patching-the-gaps-in-indias-cybersecurity/article34000336.ece"&gt;Patching the gaps in India’s cybersecurity&lt;/a&gt;, &lt;em&gt;The Hindu, &lt;/em&gt;6th March 2021&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.leidensecurityandglobalaffairs.nl/articles/will-india-negotiate-in-cyberspace"&gt;Will India negotiate in cyberspace?&lt;/a&gt;, Leiden Security and Global Affairs blog,December 16, 2020&lt;/li&gt;
&lt;li&gt;Elizabeth Dominic, &lt;a href="https://cis-india.org/internet-governance/blog/the-debate-over-internet-governance-and-cyber-crimes-west-vs-the-rest"&gt;The debate over internet governance and cybercrimes: West vs the rest?&lt;/a&gt;,&lt;em&gt; Centre for Internet and Society, &lt;/em&gt;June 08, 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.lawfareblog.com/indias-role-global-cyber-policy-formulation"&gt;&lt;em&gt;India’s role in Global Cyber Policy Formulation&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, Lawfare, Nov 7, 2019&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Pukhraj Singh, &lt;a href="https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation"&gt;Before cyber norms,let's talk about disanalogy and disintermediation&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society, &lt;/em&gt;Nov 15th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karan Saini, &lt;a href="https://mwi.usma.edu/setting-international-norms-cyber-conflict-hard-doesnt-mean-stop-trying/"&gt;Setting International Norms of Cyber Conflict is Hard, But that Doesn’t Mean that We Should Stop Trying&lt;/a&gt;&lt;em&gt;, Modern War Institute, &lt;/em&gt;30th Sept, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://www.orfonline.org/expert-speak/politics-by-other-means-fostering-positive-contestation-and-charting-red-lines-through-global-governance-in-cyberspace-56811/"&gt;&lt;em&gt;Politics by other means: Fostering positive contestation and charting red lines through global governance in cyberspace&lt;/em&gt;&lt;/a&gt;&lt;em&gt; (Digital Debates, &lt;/em&gt;Volume 6, 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu&lt;em&gt;, &lt;/em&gt;&lt;a href="https://thewire.in/trade/will-the-wto-finally-tackle-the-trump-card-of-national-security"&gt;Will the WTO Finally Tackle the ‘Trump’ Card of National Security?&lt;/a&gt;&lt;em&gt; (The Wire, &lt;/em&gt;8th May 2019&lt;em&gt;)&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Policy Submissions&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/blog/cis-comments-on-pre-draft-of-the-report-of-the-un-open-ended-working-group"&gt;CIS Submission to OEWG &lt;/a&gt;(Centre for Internet and Society, Policy      Submission, 2020)&lt;/li&gt;
&lt;li&gt;Aayush      Rathi, Ambika Tandon, Elonnai Hickok, and Arindrajit Basu. “&lt;a href="https://cis-india.org/internet-governance/blog/cis-submission-to-un-high-level-panel-on-digital-cooperation"&gt;CIS Submission to UN High-Level Panel on Digital      Cooperation&lt;/a&gt;.” Policy submission. Centre for Internet and      Society, January 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit      Basu,Gurshabad Grover, and Elonnai Hickok. “&lt;a href="https://cis-india.org/internet-governance/blog/arindrajit-basu-gurshabad-grover-elonnai-hickok-january-22-2019-response-to-gcsc-on-request-for-consultation"&gt;Response to GCSC on Request for Consultation: Norm      Package Singapore&lt;/a&gt;.” Centre for Internet and Society, January      17, 2019.&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok. &lt;a href="https://cis-india.org/internet-governance/files/gcsc-response."&gt;Submission of Comments to the GCSC Definition of      ‘Stability of Cyberspace&lt;/a&gt; (Centre for Internet and Society,      September 6, 2019)&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h3&gt;Digital Trade and India's Political Economy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;The modern trading regime and its institutions were born largely into a world bereft of the internet and its implications for cross-border flow and commerce. Therefore, regulatory ambitions at the WTO have played catch up with the technological innovation that has underpinned the modern global digital economy. Driven by tech giants, the “developed” world has sought to restrict the policy space available to the emerging world to impose mandates regarding data localisation, source code disclosure, and taxation - among other initiatives central to development. At the same time emerging economies have pushed back, making for a tussle that continues to this day. Our research has focussed both on issues of domestic political economy and data governance,and the implications these domestic issues have on how India and other emerging economies negotiate at the world stage.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form articles and essays&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, Elonnai Hickok and Aditya Chawla,&lt;em&gt; &lt;/em&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;&lt;strong&gt;T&lt;/strong&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-localisation-gambit-unpacking-policy-moves-for-the-sovereign-control-of-data-in-india"&gt;he Localisation Gambit: Unpacking      policy moves for the sovereign control of data in India&lt;/a&gt;&lt;em&gt; (&lt;/em&gt;Centre for Internet and Society&lt;em&gt;, &lt;/em&gt;March 19, 2019)&lt;strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Arindrajit Basu,&lt;a href="about:blank"&gt;Sovereignty in a datafied world: A framework for      Indian diplomacy&lt;/a&gt; in Navdeep Suri and Malancha Chakrabarty (eds) &lt;em&gt;A 2030 Vision for India’s Economic      Diplomacy &lt;/em&gt;(Observer Research Foundation 2021) &lt;/li&gt;
&lt;li&gt;Amber Sinha, Elonnai Hickok, Udbhav Tiwari and      Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/files/mlat-report"&gt;Cross Border Data-Sharing and India &lt;/a&gt;(Centre      for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/"&gt; Can the WTO build consensus on digital trade,&lt;/a&gt; Hinrich Foundation,October 05,2021&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Amber Sinha, &lt;a href="https://thewire.in/tech/twitter-modi-government-big-tech-new-it-rules"&gt;The power politics behind Twitter versus Government of India&lt;/a&gt;, &lt;em&gt;The Wire&lt;/em&gt;, June 03, 2021&lt;/li&gt;
&lt;li&gt;Karthik Nachiappan and Arindrajit Basu, &lt;a href="https://www.thehindu.com/opinion/op-ed/shaping-the-digital-world/article32224942.ece?homepage=true"&gt;Shaping the Digital World&lt;/a&gt;, &lt;em&gt;The Hindu&lt;/em&gt;, 30th July 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Karthik Nachiappan, &lt;a href="https://www.india-seminar.com/2020/731/731_arindrajit_and_karthik.htm"&gt;&lt;em&gt;India and the global battle for data governance&lt;/em&gt;&lt;/a&gt;, Seminar 731, 1st July 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://scroll.in/article/960676/analysis-reliance-jio-facebook-deal-highlights-indias-need-to-revisit-competition-regulations"&gt;Reliance Jio-Facebook deal highlights India’s need to revisit competition regulations&lt;/a&gt;, &lt;em&gt;Scroll&lt;/em&gt;, 30th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Amber Sinha, &lt;a href="https://thediplomat.com/2020/04/the-realpolitik-of-the-reliance-jio-facebook-deal/"&gt;The realpolitik of the Reliance-Jio Facebook deal&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 29th April 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/"&gt;&lt;em&gt;The Retreat of the Data Localization Brigade: India, Indonesia, Vietnam&lt;/em&gt;&lt;/a&gt;&lt;em&gt;, The Diplomat&lt;/em&gt;, Jan 10, 2020&lt;/li&gt;
&lt;li&gt;Amber Sinha and Arindrajit Basu, &lt;a href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;&lt;em&gt;The Politics of India’s Data Protection Ecosystem&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;EPW Engage&lt;/em&gt;, 27 Dec 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://www.lawfareblog.com/key-global-takeaways-indias-revised-personal-data-protection-bill"&gt;Key Global Takeaways from India’s Revised Personal Data Protection Bill&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, Jan 23, 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave,“&lt;a href="https://cis-india.org/internet-governance/geo-economic-impacts-of-the-coronavirus-global-supply-chains-part-i"&gt;Geo-Economic Impacts of the Coronavirus: Global Supply Chains&lt;/a&gt;.” &lt;em&gt;Centre for Internet and Society&lt;/em&gt; , June 16, 2020.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;International Law and Human Rights&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;International law and human rights are ostensibly technology neutral, and should lay the edifice for digital governance and cybersecurity today. Our research on international human rights has focussed on global surveillance practices and other internet restrictions employed by a variety of nations, and the implications this has for citizens and communities in India and similarly placed emerging economies. CIS researchers have also contributed to, and commented on World Intellectual Property Organization negotiations at the intersection of international Intellectual Property (IP) rules and the human rights.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-form article&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Arindrajit Basu, &lt;a href="https://cis-india.org/internet-governance/extra-territorial-surveillance-and-the-incapacitation-of-human-rights"&gt;Extra Territorial Surveillance      and the incapacitation of international human rights law&lt;/a&gt;, 12 NUJS LAW REVIEW 2 (2019)&lt;/li&gt;
&lt;li&gt;Gurshabad Grover and Arindrajit Basu, ”&lt;a href="https://cyberlaw.ccdcoe.org/wiki/Scenario_24:_Internet_blockage"&gt;Internet Blockage&lt;/a&gt;”(Scenario contribution to NATO CCDCOE Cyber      Law Toolkit,2021)&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Elonnai Hickok, &lt;a href="https://www.ijlt.in/journal/conceptualizing-an-international-framework-for-active-private-cyber-defence"&gt;Conceptualizing an international      framework for active private cyber defence &lt;/a&gt;(Indian Journal of Law and Technology, 2020)&lt;/li&gt;&lt;li&gt;Arindrajit Basu,&lt;a class="external-link" href="http://www.orfonline.org/wp-content/uploads/2021/10/Digital-Debates__CyFy2021.pdf"&gt;Challenging the dogmatic inevitability of extraterritorial state surveillance &lt;/a&gt;in Trisha Ray and Rajeswari Pillai Rajagopalan (eds) Digital Debates: CyFy Journal 2021 (New Delhi:ORF and Global Policy Journal,2021)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog Posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu, “&lt;a href="https://www.medianama.com/2020/08/223-american-law-on-mass-surveillance-post-schrems-ii/"&gt;Unpacking US Law And Practice On Extraterritorial Mass Surveillance In Light Of Schrems II&lt;/a&gt;”, &lt;em&gt;Medianama&lt;/em&gt;, 24th August 2020&lt;/li&gt;
&lt;li&gt;Anubha Sinha, “World Intellectual Property Organisation: Notes from the Standing Committee on Copyright Negotiations (&lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-1"&gt;Day 1&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-2"&gt;Day 2&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-41-notes-from-day-3-and-day-4-1"&gt;Day 3 and 4&lt;/a&gt;)”, July 2021&lt;/li&gt;&lt;li&gt;Raghav Ahooja and Torsha Sarkar,&lt;a class="external-link" href="http://www.lawfareblog.com/how-not-regulate-internet-lessons-indian-subcontinent"&gt;How (not) to regulate the internet:Lessons from the Indian Subcontinent&lt;/a&gt;,Lawfare,September 23,2021,&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Bilateral Relationships&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Technology has become a crucial factor in shaping bilateral and plurilateral co-operation and competition. Given the geopolitical fissures and opportunities since 2020, our research has focussed on how technology governance and cybersecurity could impact the larger ecosystem of Indo-China and India-US relations. Going forward, we hope to undertake more research on technology in plurilateral arrangements, including the Quadrilateral Security Dialogue. &lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman, &lt;a href="https://thediplomat.com/2021/03/the-huawei-factor-in-us-india-relations/"&gt;The Huawei Factor in US-India Relations&lt;/a&gt;,&lt;em&gt;The Diplomat&lt;/em&gt;, 22 March 2021&lt;/li&gt;
&lt;li&gt;Aman Nair, “&lt;a href="https://cis-india.org/internet-governance/blog/tiktok-it2019s-time-for-biden-to-make-a-decision-on-his-digital-policy-with-china"&gt;TIkTok: It’s Time for Biden to Make a Decision on His Digital Policy with China&lt;/a&gt;,” &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, January 22, 2021,&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Gurshabad Grover, &lt;a href="https://thediplomat.com/2020/10/india-needs-a-digital-lawfare-strategy-to-counter-china/"&gt;India Needs a Digital Lawfare Strategy to Counter China&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, 8th October 2020&lt;/li&gt;
&lt;li&gt;Anam Ajmal, &lt;a href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/the-app-ban-will-have-an-impact-on-the-holding-companies-global-power-projection-begins-at-home/"&gt;The app ban will have an impact on the holding companies...global power projection begins at home&lt;/a&gt;, &lt;em&gt;Times of India&lt;/em&gt;, July 7th, 2020 (Interview with Arindrajit Basu)&lt;/li&gt;
&lt;li&gt;Justin Sherman and Arindrajit Basu, &lt;a href="https://thediplomat.com/2020/03/trump-and-modi-embrace-but-remain-digitally-divided/"&gt;Trump and Modi embrace, but remain digitally divided&lt;/a&gt;, &lt;em&gt;The Diplomat&lt;/em&gt;, March 05th, 2020&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Emerging Technologies&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Governance needs to keep pace with the technological challenges posed by emerging technologies, including 5G and AI. To do so an interdisciplinary approach that evaluates these scientific advances in line with the regimes that govern them is of utmost importance. While each country will need to regulate technology through the lens of their strategic interests and public policy priorities, it is clear that geopolitical tensions on standard-setting and governance models compels a more global outlook.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Long-Form reports&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Anoushka Soni and Elizabeth Dominic,&lt;a href="https://cis-india.org/internet-governance/legal-and-policy-implications-of-autonomous-weapons-systems"&gt; Legal and Policy implications of Autonomous weapons systems&lt;/a&gt; (Centre for Internet and Society, 2020)&lt;/li&gt;
&lt;li&gt;Aayush Rathi, Gurshabad Grover, and Sunil Abraham,&lt;a href="https://cis-india.org/internet-governance/blog/regulating-the-internet-the-government-of-india-standards-development-at-the-ietf"&gt; Regulating the internet: The Government of India &amp;amp; Standards Development at the IETF&lt;/a&gt; (Centre for Internet and Society, 2018)&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Blog posts and op-eds&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Aman Nair, &lt;a href="https://cis-india.org/internet-governance/blog/would-banning-chinese-telecom-companies-make-5g-secure-in-india"&gt;Would banning Chinese telecom companies make India 5G secure in India?&lt;/a&gt; &lt;em&gt;Centre for Internet and Society&lt;/em&gt;, 22nd December 2020&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Justin Sherman&lt;strong&gt;, &lt;/strong&gt;&lt;a href="https://www.lawfareblog.com/two-new-democratic-coalitions-5g-and-ai-technologies"&gt;Two New Democratic Coalitions on 5G and AI Technologies&lt;/a&gt;, &lt;em&gt;Lawfare&lt;/em&gt;, 6th August 2020&lt;/li&gt;
&lt;li&gt;Nikhil Dave, &lt;a href="https://cis-india.org/internet-governance/blog/the-5g-factor."&gt;The 5G Factor: A Primer&lt;/a&gt;, &lt;em&gt;Centre for Internet and Society,&lt;/em&gt; July 20, 2020.&lt;/li&gt;
&lt;li&gt;Gurshabad Grover, &lt;a href="https://indianexpress.com/article/opinion/columns/huawei-ban-india-united-states-china-5755232/"&gt;The Huawei bogey&lt;/a&gt; &lt;em&gt;Indian Express&lt;/em&gt;, May 30th, 2019&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Pranav MB, &lt;a href="https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective"&gt;What is the problem with 'Ethical AI'?:An Indian perspective&lt;/a&gt;, Centre for Internet and Society, July 21, 2019&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(This compendium was drafted by Arindrajit Basu with contributions from Anubha Sinha. Aman Nair, Gurshabad Grover, and&amp;nbsp; Pranav MB reviewed the draft and provided vital insight towards its conceptualization and compilation&lt;/em&gt;. Dishani Mondal and Anand Badola provided important inputs at earlier stages of the process towards creating this compendium)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-september-24-2021-the-geopolitics-of-cyberspace-compendium-of-cis-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2021-11-15T14:48:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss">
    <title>CIS Cybersecurity Series (Part 8) - Jeff Moss</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss</link>
    <description>
        &lt;b&gt;CIS interviews Jeff Moss, Chief Security Officer for ICANN, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"Most consumers don't understand the privacy trade offs when they browse the web... the data that is being collected about them, the analytics that is being run against their buying behaviour, it is invisible... it is behind the scenes... and so it is very difficult for the consumer to make an informed decision." - Jeff Moss, Chief Security Officer, ICANN.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eighth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Jeff Moss. Jeff is the chief security officer for ICANN. He&amp;nbsp;founded Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world.&amp;nbsp;In 2009, Jeff was sworn in as a member of the U.S. Department of Homeland Security Advisory Council (DHS HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to domestic security. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/VuarlhLqBII" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-30T09:25:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan">
    <title>CIS Cybersecurity Series (Part 2) - Ram Mohan</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan</link>
    <description>
        &lt;b&gt;CIS interviews Ram Mohan, a pioneer in the field of Internet security and internationalization, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"In the Indian context, I think the government does have&amp;nbsp;a significant&amp;nbsp;responsibility&amp;nbsp;to protect its citizenry&amp;nbsp;from cybercrime. There is a greater need for the&amp;nbsp;government to work with private industries as well as academic institutions to ensure a strong understanding of the threats unique to India. After all there are many&amp;nbsp;threats that either originate in the context of the Indian sub-continent and are specific to India." - Ram&amp;nbsp;Mohan, Executive Vice President, &amp;amp; Chief Technology &lt;/em&gt;&lt;em&gt;Officer of Afilias Limited.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its second&amp;nbsp;installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly&amp;nbsp;debated aspects of cybersecurity and hopes to encourage&amp;nbsp;wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Ram Mohan, a pioneer&amp;nbsp;in the field of Internet security and&amp;nbsp;internationalization. Ram Mohan is Executive Vice&amp;nbsp;President, &amp;amp; Chief Technology Officer of Afilias&amp;nbsp;Limited. He also serves on the Board of Directors of the&amp;nbsp;Internet Corporation for Assigned Names and Numbers&amp;nbsp;(ICANN).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/Riub6EIwCgk" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:27:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin">
    <title>CIS Cybersecurity Series (Part 3) - Eva Galperin</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</link>
    <description>
        &lt;b&gt;CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.&lt;/p&gt;
&lt;p&gt;EFF homepage: &lt;a href="https://www.eff.org/"&gt;https://www.eff.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:55:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake">
    <title>CIS Cybersecurity Series (Part 4) - Marietje Schaake</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake</link>
    <description>
        &lt;b&gt;CIS interviews  Marietje Schaake, member of the European parliament, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;div&gt;&lt;em&gt;"It is important that we don't confine solutions in military head quarters or in government meeting rooms but that consumers, internet users, NGOs, as well as businesses, together take responsibility to build a resilient society where we also don't forget what it is we are defending, and that is our freedoms... and we have learned hopefully from the war on terror, that there is a great risk to compromise freedom for alleged security and that is a mistake we should not make again." - Marietje Schaake, member of European parliament.&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourth installment of the CIS Cybersecurity Series.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In this installment, CIS interviews Marietje Schaake, member of the European Parliament for the Dutch Democratic Party (D66) with the Alliance of Liberals and Democrats for Europe (ALDE) political group. She serves on the Committee on Foreign Affairs, where she focuses on neighbourhood policy, Turkey in particular; human rights, with a specific focus on freedom of expression, Internet freedom, press freedom; and Iran. In the Committee on Culture, Media, Education, Youth and Sports, Marietje works on Europe’s Digital Agenda and the role of culture and new media in the EU´s external actions. In the Committee on International Trade, she focuses on intellectual property rights, the free flow of information and the relation between trade and foreign affairs.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Marietje's website is: http://www.marietjeschaake.eu/&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/F7IIHCu2D4g" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:24:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter">
    <title>CIS Cybersecurity Series (Part 5) - Amelia Andersdotter</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter</link>
    <description>
        &lt;b&gt;CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"Normally a good security policy will also provide privacy to the citizen that is encompassed by the security policy. So things like encryption, for instance, bring a more secure communication, more private communication, where you are able to interact with other people on equal terms and you don't have to fear outside interference. And that is obviously good for both the individual and for security. But then of course, security policies can be framed in different ways. It depends on who you are trying to protect with the security policy. Are you trying to create a secure situation for a copyright holder, or are you trying to create a secure situation for a law enforcement officer, or for a private citizen?" - Amelia Andersdotter, member of European parliament.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its fifth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Amelia Andersdotter is a Member of the European Parliament for the Pirate Party in Sweden. She works with industrial policy in the parliamentary committee of Industry, Research and Energy and is a substitute member of the committees for international trade, INTA, and budget control, CONT. Amelia is the Patron of the European Parliament Free Software User Group (EPFSUG), and also works in the delegations for the Andean community and Korean peninsula.&lt;/p&gt;
&lt;p&gt;Amelia's website is: http://ameliaandersdotter.eu/&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RPh7RF2dkcw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace">
    <title>The Body in Cyberspace</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace</link>
    <description>
        &lt;b&gt;Perhaps one of the most interesting histories of the cyberspace has been its relationship with the body. Beginning with the meatspace-cyberspace divide that Gibson introduces, the question of our bodies’ relationship with the internet has been hugely contested. There have been some very polarized debates around this question. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Where are we when we are online? Are we the person in the chair behind an interface? Are we the avatar in a social networking site interacting with somebody else? Are we a set of data running through the atmosphere? Are we us? Are we dogs? These are tantalising and teasing questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early debates around the body-technology questions were polarized. There were people who offered that the cyberspace is a virtual space. What happens in that make-believe, performative space does not have any direct connections with who we are and how we live. They insisted that the cyberspace is essentially a performance space, and just like acting in a movie does not make us the character, all our interactions on the internet are also performances. The idea of a virtual body or a digital self were proposed, thinking of the digital as an extension of who we are – as a space that we occupy to perform different identities and then get on with our real lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sherry Turkle, in her book &lt;i&gt;Life on the Screen&lt;/i&gt;, was the first one to question this binary between the body and the digital self. Working closely with the first users of the online virtual reality worlds called Multiple User Dungeons, Turkle notes how being online started producing a different way of thinking about who we are and how we relate to the world around us. She indicates three different ways in which this re-thinking happens. The first, is at the level of language. She noticed how the users were beginning to think of their lives and their social relationships through the metaphors that they were using in the online world. So, for instance, people often thought of life through the metaphor of windows – being able to open multiple windows, performing multiple tasks and identities and ‘recycling’ them in their everyday life. Similarly, people saying that they are ‘low on bandwidth’ when they don’t have enough time and attention to devote to something, or thinking about the need to ‘upgrade’ our senses. We also are quite used to the idea that memory is something that resides on a chip and that computing is what machines do. These slippages in language, where we start attributing the machine characteristics to human beings are the first sign of understanding the human-technological relationship and history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second slippage is when the user start thinking of the avatars as human. We are quite used to, in our deep web lives, to think of machines as having agency. Our avatars act. Things that we do on the internet perform more actions than we have control of – a hashtag that we start on twitter gets used and responded to by others and takes on a life of its own. We live with sapient technologies – machines that care, artificial intelligence algorithms that customise search results for us, scripts and bots that protect us from malware and viruses. We haven’t attributed these kinds of human agencies to machines and technologies in the past. However, within the digital world, there is a complex network of actors, where all the actors are not always human. Bruno Latour, a philosopher of science and technology, posits in his ‘Actor Network Theory’ that the emergence of these non-human actors has helped us understand that we are not only dependent on machines and technologies for our everyday survival, but that many tasks that we had thought of as ‘human’ are actually performed, and performed better by these technologies. Hence, we have come to care for our machines and we also think of them as companions and have intimate relationships with them. And the machines, even as they make themselves invisible, start becoming more personal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third slippage that Turkle points out is the way in which the boundaries between the interior and the exterior were dissolved in the accounts of the users’ narratives of their digital adventures. There is a very simplistic understanding that what is human is inside us, it is sacred and organic and emotional. Earlier representational technology products like cinema, books, TV etc. have emphasised this distinction between real life and reel life. No actor is punished for the crime they commit in the narrative of a film. It is not very often that an author claims to be the character in a book. We have always had a very strong sense of distinction between the real person and the fictional person. But within the virtual reality worlds, these distinctions seem to dematerialize. The users not only thought of their avatars as human but also experienced the emotions, frustrations, excitement and joy that their characters were simulating for them. And what is more important, they claimed these experiences for themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namita Malhotra, who is a legal scholar and a visual artist, in her monograph on Pleasure, Porn and the Law, looks at the way in which we are in a process of data-stripping – constant revelation of our deepest darkest secrets and desires, within the user generated content rubric. Looking at the low-res, grainy videos on sites like YouTube and Vimeo, which have almost no narrative content and are often empty of sexual content, produce all of us in a global orgiastic setting, where our bodies are being extended beyond ourselves. In the monograph, Malhotra argues that the Internet is not merely an extension but almost like a third skin that we wear around ourselves – it is a wrapper, but it is tied, through ligaments and tendons, to the flesh and bone of our being, and often things that we do online, even when they are not sexual in nature, can become pornographic. Conversely, the physical connections that we have are now being made photographically and visually available in byte sized morsels, turned into a twitpic, available to be shared virally, and disseminated using mobile applications, thus making our bodies escape the biological containers that we occupy but also simultaneously marks our bodies through all these adventures that we have on the digital infobahn.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Case Study: A Rape in Cyberspace&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;A contemporary of Sherry Turkle, Julian Dibbell, in his celebrated account of ‘A Rape in Cyberspace’&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;describes a case-study that corroborates many of the observations that Turkle posits. Dibbell analyses a particular incident that occurred one night in a special kind of MUD – LambdaMOO (MUD, Object-Oriented) – which was run by the Xerox Research Corporations. A MUD, is a text-based virtual reality space of fluid dimensions and purposes, where users could create avatars of themselves in textual representations. Actions and interactions within the MUD are also in long running scripts of texts. Of course, technically all this means that a specially designed database gives users the vivid impression of their own presence and the impression of moving through physical spaces that actually exists as descriptive data on some remotely located servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When users log into LambdaMoo, the program presents them with a brief textual description of one of the rooms (the coat closet) in the fictional database mansion. If the user wants to navigate, s/he can enter a command to move in a particular direction and the database replaces the original description with new ones, corresponding to the room located in the direction s/he chose. When the new description scrolls across the user’s screen, it lists not only the fixed features of the room but all its contents at that moment – including things (tools, toys, weapons), as well as other avatars (each character over which s/he has sole control). For the database program that powers the MOO, all of these entities are simply subprograms or data structures which are allowed to interact according to rules very roughly mimicking the laws of the physical world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Characters may leave the rooms in particular directions. If a character says or does something (as directed by its user), then the other users who are located in the same ‘geographical’ region within the MOO, see the output describing the utterance or action. As the different players create their own fantasy worlds, interacting and socialising, a steady script of text scrolls up a computer screen and narratives are produced. The avatars, as in Second Life or even on Social Networking Sites like Orkut, have the full freedom to define themselves, often declining the usual referents of gender, sexuality, and context to produce fantastical apparitions. It is in such an environment of free-floating fantasy and role-playing, of gaming and social interaction mediated by digital text-based avatars, that a ‘crime’ happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibell goes on to give an account of events that unfolded that night. In the social lounge of LambdaMoo, which is generally the most populated of all the different nooks, corners, dimensions and rooms that users might have created for themselves, there appeared an avatar called Dr. Bungle. Dr. Bungle had created a particular program called Vodoo Doll, which allowed the creator to control avatars which were not his own, attributing to them involuntary actions for all the other players to watch, while the targeted avatars themselves remained helpless and unable to resist any of these moves. This Dr. Bungle, through his evil Vodoo Doll, took hold of two avatars – legba and Starsinger and started controlling them. He further proceeded to forcefully engage them in sexually violent, abusive, perverted and reluctant actions upon these two avatars. As the users behind both the avatars sent a series of invective and a desperate plea for help, even as other users in the room (# 17) watched, the Vodoo Doll made them enter into sexually degrading and extremely violent set of activities without their consent. The peals of his laughter were silenced only when a player with higher powers came and evicted Dr. Bungle from the Room # 17. As an eye-witness of the crime and a further interpolator with the different users then present, Dibbell affirms that most of the users were convinced that a crime had happened in the Virtual World of the digital Mansion. That a ‘virtual rape’ happened and was traumatic to the two users was not questioned. However, what this particular incident brought back into focus was the question of space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibbell suggests that what we had was a set of conflicting approaches to understand the particular phenomenon:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where virtual reality and its conventions would have us believe that legba and Starsinger were brutally raped in their own living room, here was the victim legba scolding Mr. Bungle for a breach of *civility* … [R]eal life, on the other hand, insists the incident was only an episode in a free-form version of Dungeons and Dragons, confined to the realm of the symbolic and at no point threatening any players life, limb, or material well-being…’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meaning and the understanding of this particular incident and the responses that it elicited, lie in the ‘buzzing, dissonant gap’ between the perceived and experienced notion of Technosocial Space. The discussions that were initiated within the community asked many questions: If a crime had happened, where had the crime happened? Was the crime recognised by law? Are we responsible for our actions performed through a digital character on the cyberspaces? Is it an assault if it is just role playing?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of ‘whereness’ of the crime, or rather the placelessness of the crime made it especially more difficult to pin it to a particular body. The users who termed the event as rape had necessarily inverted the expected notion of digital space as predicated upon and imitative of physical space; they had in fact done the exact opposite and exposed digital spaces as not only ‘bleeding into reality’ but also a constitutive part of the physical spaces. Their Technosocial Space was not the space of the LambdaMoo Room # 17 but the physical locations (and thus the bodies, rather than the avatars) of the players involved. However, this blurring was not to make an easy resolution of complex metaphysical questions. This blurring was to demonstrate, more than ever, that the actions and pseudonymous performances or narratives which are produced in the digital world are not as dissociated from the ‘Real’ as we had always imagined. More importantly, the notional simulation of place or a reference to the physical place is not just a symbolic gesture but has material ramifications and practices. As Dibell notes in his lyrical style.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Months later, the woman in Seattle would confide to me that as she wrote those words posttraumatic tears were streaming down her face — a real-life fact that should suffice to prove that the words’ emotional content was no mere playacting. The precise tenor of that content, however, its mingling of murderous rage and eyeball-rolling annoyance, was a curious amalgam that neither the RL nor the VL facts alone can quite account for.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The eventual decision to ‘toad’ Dr. Bungle – to condemn him to a digital death (a death only as notional as his crime) and his reappearance as another character take up the rest of Dibbell’s argument. Dibbell is more interested in looking at how a civil society emerged, formed its own ways of governance and established the space of LamdaMOO as more than just an emotional experience or extension; as a legitimate place which is almost as much, if not more real, than the physical places that we occupy in our daily material practices. Dibbell’s moving account of the entire incident and the following events leading the final ‘death’ and ‘reincarnation’ has now been extrapolated to make some very significant and insightful theorisations of the notions of the body and its representations online.&lt;/p&gt;
&lt;b&gt;Exercise&lt;/b&gt;: Based on this case-study, break into small groups to determine whether a rape happened on cyberspace and how we can understand the relationship of our online personas with our bodies.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and the State&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of body and technology is one way of approaching the history of the internet. However, as we realise, that more than the management of identity or the projection of our interiority, it is a narrative about governance. How does the body get regulated on the internet? How does it become the structure through which communities, networks, societies and collective can be imagined? The actions and transactions between the internet and the body can also help us to look at the larger questions of state, governance and technology which are such an integral part of our everyday experience of the internet. Questions of privacy, security, piracy, sharing, access etc. are all part of the way in which our practices of cultural production and social interaction are regulated, by the different intermediaries of the internet, of which the State is one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asha Achuthan, in her landmark work &lt;i&gt;Re:Wiring Bodies&lt;/i&gt;&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; that looks at the history of science and technology in India, shows that these are not new concerns. In fact, as early as the 1930s and 1940s, when the architects of India’s Independence movements were thinking about shaping what the country is going to look like in the future, they were already discussing these questions. It is more popularly known that Jawaharlal Nehru was looking to build a ‘scientific temperament’ for the country and hoping to build it through scientific institutions as well as infrastructure – he is famously credited to having said that ‘dams are the temples of modern science.’ Apart from Nehru’s vision of a modern India, there was a particular conversation between M.K. Gandhi and Rabindranath Tagore, that Achuthan analyses in great detail. Achuthan argues that the dialogue between Gandhi and Tagore is so couched in ideology, poetry and spirituality that we often forget that these were actually conversations about a technology – specifically, the charkha or the spinning wheel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For both Gandhi and Tagore, the process of nation building was centred around this one particular charkha. The charkha was the mobile, portable, wearable device (much like our smart phones) that was supposed to provide spiritual salvation and modern resources to overcome the evils of both traditional and conservative values as well as unemployment and production. The difference in Gandhi and Tagore was not whether the charkha – as a metaphor of production and socio-economic organisation – should be at the centre of our discourse. The difference was that Gandhi thought that the usage of charka, complete immersion in the activity, and the devotion to it would help us weave a modern nation For Gandhi, the citizen was not somebody who used the charkha, but the citizen was somebody who becomes a citizen in the process of using the charkha. Tagore, meanwhile, was more concerned about whether we are building a people-centred nation or a technology-centred device. He was of the opinion that building a nation with the technology at its core, might lead to an apocalyptic future where the ‘danavayantra’ or demonic machine might take over and undermine the very human values and ideals that we are hoping to structure the nation through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you even cursorily look at this debate, you will realise that the way Gandhi was talking about the charkha is in resonance with how contemporary politicians talk about the powers of the internet and the way in which, through building IT Cities, through foreign investment, through building a new class of workers for the IT industry, and through different confluences of economic and global urbanisation, we are going to Imagine India&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;of the future. Similarly, the caution that Tagore had, of the charkha as superseding the human, finds its echoes in the sceptics who have been afraid that the human is being forgotten&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; in the e-governance systems that are being set up, which concentrate more on management of data and information rather than the rights and the welfare of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical continuity between technology and governance, also finds theorisation in Ashish Rajadhyaksha’s book &lt;i&gt;The Cultural Last Mile&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;that looks at the critical turns in India’s governance and policy history and how the technological paradigm has been established. Rajadhyaksha opens up the State-technology-governance triad to more concrete examples and looks at how through the setting up of community science centres, the building of India’s space and nuclear programmes, and through on-the-ground inventions like radio and chicken-mesh wire-loops, we have tried to reinforce a broadcast based model of governance. Rajadhyaksha proposes that the earlier technologies of governance which were at our disposal, helped us think of the nation state through the metaphor of broadcast. So we had the State at the Centre, receiving and transmitting information, and in fact managing all our conversation and communication by being the central broadcasting agency. And hence, because the state was responsible for the message of the state reaching every single person, but also responsible that every single person can hypothetically communicate with every other single person, the last mile became important. The ability to reach that last person became important. And the history of technology and governance has been a history of innovations to breach that last mile and make the message reach without noise, without disturbance, and in as clean and effective a way as possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the emergence of the digital governance set up, especially with the building of the Unique Identity Project,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; we now have the first time when the government is not concerned about breaching the last mile. The p2p networks that are supposed to manage the different flows of information mean that the State is not a central addressee of our communication but one of the actors. It produces new managers – internet service providers, telecom infrastructure, individual hubs and connectors, traditional media agencies – that help us think of governance in a new way. Which is why, for instance, with the UID authorities, we are no longer concerned about the relay of state information from the centre to the subject. Hence, we have many anecdotal stories of people enrolling for the Aadhaar card without actually knowing what benefits it might accrue them. We also have stories coming in about how there are people with Aadhaar numbers which have flawed information but these are not concerns. Because for once, the last mile has to reach the Government. The State is a collector but there are also other registrars. And there is a new regime here, where the government is now going to become one of the actors in the field of governance and it is more interested in managing data and information rather than directly governing the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical turn is interesting, because it means that we are being subjected to different kinds of governance structures and institutions, without necessarily realising how to negotiate with them to protect us. One of the most obvious examples is the Terms of Services&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; that we almost blindly sign off when using online platforms and services and what happens when they violate rights that we think are constitutionally given. What happens when Facebook removes some content from your profile without your permission because it thinks that it is problematic? Who do you complain to? Are your rights as a user or a citizen? Which jurisdiction will it fall under? Conversely, what happens when you live in a country that does not grant you certain freedoms (of speech and expression, for instance) and you commit an infraction using a social media platform. What happens when your private utterances on your social networks make you vulnerable [&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. to persecution and prosecution in your country?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions of the human, the technological, and the governmental which have been discussed differently and severally historically, in India and also at the global level. Asking these questions, unpacking the historical concerns and how they have leap-frogged in the contemporary governmental debates is important because it helps us realise that the focus of what is at stake, what it means to be human, what we recognise as fair, just and equal are also changing in the process. Instead of thinking of e-governance as just a digitization of state resources, we have to realise that there is a certain primacy that the technologies have had in the state’s formation and manifestation, and that the digital is reshaping these formulations in new and exciting, and sometimes, precarious ways.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and Criminality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of the internet in India, but also around the world, is bookended between pornography and terrorism. While there has been an incredible promise of equity, equality, fairness, and representation of alternative voices on the internet, there is no doubt that what the internet has essentially done is turn us all into criminals – pornographers, pirates, terrorists, hackers, lurkers… If you have been online, let us just take for granted that you have broken some law or the other, no matter how safe you have been online, and where you live. The ways in which the internet has facilitated peer-2-peer connections and the one-one access means that almost everything that was governed in the public has suddenly exploded in one large grey zone of illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Sundaram calls this grey zone of illegal or semi-legal practices the new ‘cyberpublics’. For Sundaram, the new public sphere created by the internet is not only in the gentrified, middle-class, educated people who have access to the cyberspaces and are using social media and user generated content sites to bring about active social and political change. More often than not, the real interesting users of the internet are hidden. They access the internet from cybercafés, in shared names. They have limited access to the web through apps and services on their pirated phones. They share music, watch porn, gamble, engage in illicit and surreptitious social and sexual engagements and they are able to do this by circumventing the authority and the gaze of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other side are the more tech savvy individuals who create alternative currencies like Bitcoin, trade for weapons, drugs and sex on SilkRoute, form guerrilla resistance groups like Anonymous, and create viruses and malware that can take over the world. These cyberpublics are not just digital in nature. They erupt regularly in the form of pirate bazaars, data swaps, and the promiscuous USB drive that moves around the machines, capturing information and passing it on further. These criminalities are often the defining point of internet policy and politics – they serve as the subjects that need to be governed, as well as the danger that lurks in the digital ether, from which we need to be protected. For Sundaram, the real contours and borders of the digital world are to be tested in an examination of these figures. Because, as Lawrence Liang suggests, the normative has already been assimilated in the system. The normative or the good subject is no longer a threat and has developed an ethical compass of what is desirable and not. However, this ethical subject also engages in illicit activities, while still producing itself as a good person. This contradiction makes for interesting stories.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;DPS MMS: Case Study&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;One of the most fascinating cases of criminality that captured both public and legal  attention was the notoriously cases where the ideas of Access were complicated in the Indian context, was the legal and public furore over the distribution of an MMS (Multi-Media Message) video that captured two underage young adults in a sexual act. The clip, which was dubbed in popular media as ‘DPS Dhamaka’ became viral on the internet. The video clip was listed on an auction (peer-2-peer) website as an e-book and as ‘Item 27877408 – DPS Girl having fun!!! Full video + Bazee points’ for Rs. 125. This visibility of the clip on the auction site Bazee.com, brought it to the eyes of the State where its earlier circulation through private circuits and P2P networks had gone unnoticed. Indeed, the newspapers and TV channels had created frenzy around it, this video clip would have gone unnoticed. However, the attention that Bazee.com drew led to legal intervention.&lt;/p&gt;
&lt;p&gt;Following the visibility of the video clip, there was an attempt to find somebody responsible for the crime and be held liable for the ‘crime’ that had happened. Originally, Ravi Raj, a student at IIT Kharagpur, who had put up the clip on Bazee was arrested for possessing and selling pornography. He was arrested and kept in police custody for at least three days and so was the male student who made the clip. They were both made to go through proceedings in juvenile court (though he was the last to be arrested). Both the students in the video were suspended from school after the incident. Eventually, the most high profile arrest and follow up from the DPS MMS incident was the arrest of the CEO of Bazee.com – Avnish Bajaj. However, Bajaj was released soon because as the host of the platform and not its content, he had no liability.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;This is the beginning of a series of slippages where a punishable body in the face of public outcry had to be identified. We witnessed a witch-hunt that sought to hold the boy who made the video clip responsible, the student of IIT who attempted to circulate the clip and eventually the CEO of Bazee. The string of failed prosecutions seems to indicate that the pornographer-as-a-person was slipping through the cracks of the legal system. As NamitaMalhotra argues, it is not the pornographic object which is ‘eluding the grasp of the court’ but that it seems to be an inescapable condition of the age of the internet -that the all transactions are the same transactions, and all users are pornographers.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;We can see in the case that the earlier positions that were easily criminalised when it came to objects in mass media – producer, consumer, distributor of obscenity, were vacated rapidly in the DPS MMS case. We have a case where the bodies, when looked at through simplified ideas of Access, could not be regulated. The girl in the clip could not be punished because she was the victim in the case that could be read as statutory rape. In the case of the boy, a stranger argument was posed – ‘that in our fast urbanising societies where parents don’t have time for children, they buy off their love by giving them gadgets – which makes possible certain kinds of technological conditions...thus the blame if it is on the boy, is on the larger society’ (Malhotra, 2011).&lt;/p&gt;
&lt;p class="MsoNormal"&gt;Eventually, the court held that the description of the object and the context of its presence indicates that the said obscene object is just a click away and such a ‘listing which informed the potential buyer that such a video clip that is pornographic can be procured for a price’. There is a suggestion that there was nobody in particular that could be fixed with the blame. What was at blame was access to technology and conditions of technology within which the different actors in this case were embedded. Malhotra points out that in earlier cases around pornography, judgements have held pornography responsible for itself.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;In the case of the DPS MMS, it seemed that technology – especially access to technology by unsupervised persons – has taken that role. The eventual directive that came out of this case was a blanket warning issued to the public that ‘anyone found in possession of the clip would be fined and prosecuted’. It is as if the attention of the court was on the ways in which the video clip was produced, circulated and disseminated, rather than the content. There was an anxiety around peoples’ unsupervised access to digital technologies, the networks that facilitated access to content without the permission of the state, and modes of circulation and dissemination that generated high access to audiences which cannot be controlled or regulated.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;The State’s interest in this case, is not in the sexual content of the material but in the way it sidesteps the State’s authorial positions and produces mutable, transmittable, and transferable products as well as conditions of access. Such a focus on practices and behaviours around the obscene object, rather than the content itself, seems not to disrupt the law’s neat sidestepping of the force of the image itself. These different tropes of access to technology informed the State’ attempt at control and containment of techno-social practices in the country, giving rise to imaginations of the User as being in conditions of technology which make him/her a potential criminal. This idea of access as transgression or overriding the legal regulatory framework does not get accounted for in the larger technology discourse. However, it does shape and inform the Information Technology regulations which are made manifest in the IT Act. The DPS MMS case complicated the notion of access and posited a potentially criminal techno-social subject who, because of access to the digital, will be able to consume information and images beyond the sanction of the law.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;The DPS MMS case shows how the ways in which public discourse can accuse, blame and literally hang technology seems to diverge from how the court attempts to pin down an offence or crime and prosecute by constructing a techno-social subject as the pervert, while also accusing pornography as a phenomenon. The court is unable to hold technology to blame but the accused is technology-at-large and modernity, which subsumes practices around technology and separates out the good and ethical ways in which a citizen should access and use technologies to rise from the potentially criminal conditions of technology within which their Techno-social identity is formed.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We started by making a distinction between Internet and Cyberspace to see how the two are separate objects of focus and have a relationship that needs to be examined in greater detail. It was argued that while the Internet – in material, infrastructural and technological forms – is important to understand the different policies and politics at the local, regional and global level, it has an account that is easier to follow. Cyberspace, on the other hand, because it deals with human interactions and experiences, allows for a more complex set of approaches into understanding our engagement with the digital domain. We began with the original definitions and imaginations of cyberspace and the ways in which it founded and resolved debates about the real-virtual, the physical-digital, and the brain-mind divides which have been historically part of the cybercultures discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was proposed, hence, that instead of looking at the history of the Internet, we will look at the history of cyberspace, and see if we can move away from a straight forward historical narrative of the Internet which focuses largely on the institutions, numbers, names and technological advances. The ambition was not to just produce a similar history of cyberspace but think of conceptual frameworks through which cyberspace can be studied. The proposition was that instead of just looking at history as a neutral and objective account of events and facts, we can examine how and why we need to create histories. Also, that it is fruitful to look at the aspirations and ambitions we have in creating historical narratives. It was then suggested that instead of trying to create a definitive history, or even a personal history of the internet, it might be more fruitful to look at the intersections that cyberspace has with different questions and concerns that have historically defined the relationship between technologies and society. 3 different conceptual frameworks were introduced as methods or modes by which this historical mode of inquiry can be initiated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first framework examined how we can understand the boundaries and contours of the internet and cyberspace by looking at its relationship with our bodies. The ways in which we understand our bodies, the mediation by technologies, and the extensions and simulations that we live with, help us to understand the human-technology relationship in more nuanced fashions. Looking at the case-study of a rape that happened in cyberspace, we mapped out the different ways in which we can think of a technosocial relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second framework drew from historical debates around technology and governance to see how the current concerns of e-governance and digital subjectivity are informed by older debates about technology and nation building. Looking at the dialogues between Gandhi and Tagore, and then the imagination of a nation through the broadcast technologies, we further saw how the new modes of networked governance are creating new actors, new conditions and new contexts within which to locate and operate technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third framework showed how the technological is not merely at the service of the human. In fact, the presence of the technological creates new identities and modes of governance that create potential criminals of all of us. Through the case-study of the DPS MMS, and in an attempt to look at the grey zone of illegal cyberpublics, we saw how at new technosocial identities are created at the intersection of law, technology, governance and everyday practices of the web. The fact that the very condition of technology access can create us as potential criminals, in need to be governed and regulated, reflects in the development of internet policy and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the intention of this module to complicate three sets of presumptions and common knowledge that exist in the discourse around Internet and Cyberspace. The first was to move away from thinking of the Internet merely as infrastructure and networks. The second was to suggest that entering the debates around human-technology everyday relationships would offer more interesting ways of looking at accounts of the technological. The third was to propose that the history of the internet does not begin only with the digital, but it needs larger geographical and techno-science contexts in order to understand how the contemporary landscape of internet policy and governance is shaped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The module was not designed to give a comprehensive history and account of the internet. Instead, it built a methodological and conceptual framework that would allow us to examine the ways in which we approach Internet and Society questions – in the process, it would also help us reflect on our own engagement, intentions and expectations from the Internet and how we create the different narratives and accounts for it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Additional Readings&lt;/h2&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li&gt;Johnny Ryan,“A History of the Internet and the Digital Future”, &lt;i&gt;University of Chicago Press&lt;/i&gt;, &lt;a href="http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html"&gt;http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;John Naughton,“A Brief History of the Future”, &lt;i&gt;Overlook&lt;/i&gt;, &lt;a href="https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/"&gt;https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Christos J.P. Moschovitis et al.,“History of the Internet”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182"&gt;http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Katie Hafner and Matthew Lyon, “Where Wizards Stay up Late”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014"&gt;http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Janet Abbate,“Inventing the Internet”, &lt;i&gt;MIT Press&lt;/i&gt;, &lt;a href="http://mitpress.mit.edu/books/inventing-internet"&gt;http://mitpress.mit.edu/books/inventing-internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tim Berners-Lee,“Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web”,&lt;a href="http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor"&gt;http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Peter Salus,“Casting the Net: From ARPANET to INTERNET and Beyond”, &lt;i&gt;Pearson&lt;/i&gt;, &lt;a href="http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx"&gt;http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Julian Dibbell “A Rape in Cyberspace”, available at http://www.juliandibbell.com/articles/a-rape-in-cyberspace/, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Asha Achuthan, “Re:Wiring Bodies”, Centre for Internet and Society, available at http://cis-india.org/raw/histories-of-the-internet/rewiring-bodies.pdf, last accessed on January 25, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Nandan Nilekani, “Imagining India: The Idea of a Renewed Nation”, &lt;i&gt;Penguin&lt;/i&gt;, available at &lt;a href="http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html"&gt;http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Jahnavi Phalkey, “Focus: Science, History, and Modern India”, &lt;i&gt;The University of Chicago Press&lt;/i&gt;, &lt;a href="http://www.jstor.org/stable/10.1086/670950"&gt;http://www.jstor.org/stable/10.1086/670950&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Ashish Rajadhyaksha, “The Last Cultural Mile”, &lt;i&gt;The Centre for Internet and Society&lt;/i&gt;, available at &lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf"&gt;http://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Ashish Rajadhyaksha, “In the Wake of Aadhar: The Digital Ecosystem of Governance in India”, &lt;i&gt;Centre for Study of Culture and Society&lt;/i&gt;, available at &lt;a href="http://eprints.cscsarchive.org/532/"&gt;http://eprints.cscsarchive.org/532/&lt;/a&gt;, last accessed on January 23, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Terms of Service, Didn’t Read, available at &lt;a href="http://tosdr.org/"&gt;http://tosdr.org/&lt;/a&gt;, last accessed on January 26, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Siva Vaidyanathan, “The Googlization of Everything: (And Why Should We Worry)”, &lt;i&gt;University of California Press&lt;/i&gt;, available at &lt;a href="http://www.ucpress.edu/book.php?isbn=9780520258822"&gt;http://www.ucpress.edu/book.php?isbn=9780520258822&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2014-05-13T10:13:22Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity">
    <title>IT and the cITy</title>
    <link>https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity</link>
    <description>
        &lt;b&gt;Nishant Shah tells ten stories of relationship between Internet Technologies and the City, drawing from his experiences of seven months in Shanghai. In this introduction to the city, he charts out first experiences of the physical spaces of Shanghai and how they reflect the IT ambitions and imaginations of the city. He takes us through the dizzying spaces of Shanghai to see how the architecture and the buildings of the city do not only house the ICT infrastructure but also embody it in their unfolding. In drawing the seductive nature of embodied technology in the physical experience of Shanghai, he also points out why certain questions about the rise of internet technologies and the reconfiguration of the Shanghai-Pudong area have never been asked. In this first post, he explains his methdologies that inform the framework which will produce the ten stories of technology and Shanghai, and how this new IT City, delivers its promise of invisibility.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Shanghai. City of bits, bytes and
Baozi. China’s home-grown success story that eclipses the colonial legends of
HongKong. The city that was, until the Bejing Olympics, the showcase city which
is now working hard at recovering some of its stolen glory as it prepares for
the World Trade Expo in 2010. A city that is constantly at war with itself,
trying to museumise its past, eradicate pockets of history and times, and
running to escape its present and live in a futuristic tomorrow. A city that
broke the distinctions of the public and the private, by privatising all that
was public, and by encouraging the private to be constructed for a public
spectacle. There are many stories of Shanghai to be told, but the one that
needs to be told now, is about the space of the city and how, in its attempt to
become an IT city, it has become a city of surfaces, all reminding you, in an
overwhelming hypervisual way that is the predominant aesthetic of cyberspaces,
that it is the city that not only houses technology but also embodies it,
becoming, possibly, the only city in Asia that brings the IT back into the
City.&lt;/p&gt;
&lt;img src="https://cis-india.org/home-images/shanghai/image_preview" alt="Aerial view" class="image-left" title="Aerial view" /&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A cursory glance around you,
perhaps travelling in the uber efficient metro system that feeds into the
mobile metaphor of accelerated speed and space that Shanghai has become, or
just walking down the more touristy XinTianDi where the rich and the famous of
Shanghai’s society hang out, or walking down the HuaiHai Road where
sky-scrapers fortress the sky and shopping malls greet you with neon-lit spaces
of consumption, you are overwhelmed at the significant and ubiquitous presence
of internet technologies. The buildings are designed to be interfaces, rather
than walls, covered constantly with the graffiti of digital advertisements,
live weather and stock updates, displaying the latest block-buster movie, or
just presenting a kaleidoscopic array of lights spiralling in a dizzying,
schizophrenic style on the surfaces of the buildings. As you walk through the
sci-fi inspired urban landscape, you try and suppress the feeling of being
inside a giant-size arcade game, waiting for a gobbling monster to come and
devour you, and continue browsing at the city that never remains the same –
either the surfaces mutate so that not even signboards or billboards remain the
same, or the very buildings disappear into rubble under the shadows of gigantic
cranes, as a concentrated demand for real estate necessitates a constant
recycling of limited space (The estimate says that 60 per cent of Shanghai gets
rebuilt every ten years), or high speed transport dissolves the city into a
blur so that only the biggest and the brightest buildings stay as north-stars
to the fluid geography of the city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If you happen to stand on the
magnificent Bund in PuXi (The older Shanghai), you keep on looking down at the
ground beneath your feet, making sure that it is still there, because the
slightly lurid but dazzling sky-line that faces you, with huge LCD screens
mounted on buildings, lights flirting with low lying clouds on the top of
gigantic buildings, and a constant buzz of electricity breaking the waves in
the Huangpu river, you know that you are in a city that gives IT its address.
No other city in Asia – not even the almost-not-Asia spaces of Tokyo or
Singapore – gives you the assurance of being completely and totally immersed in
the glory of Internet technologies. Shanghai stands, networked, connected,
mobile, accelerated, and in a time-less vacuum that hoovers the future into the
present, as a city that technology studies will have to reckon with in a
paradigm of its own.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Bund/image_preview" alt="Shanghai Bund" class="image-right" title="Shanghai Bund" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And so strong is this seduction
of technology that conversations about technology and its place in Shanghai,
always revolves around the surface – about the building of the surface, about
the dissolution of depth (temporal or spatial),&amp;nbsp;
and about imagining the city only in terms of light, connectivity, and
speed. &amp;nbsp;So that the historicity in PuXi
becomes a flat display of the Chinese Way (Zhongguo Fangshi) and the
work-in-progress present in PuDong remains a quest for the future. In this split discourse, the questions and concerns&amp;nbsp; - about governance, about citizenship, about regulation, about cultural production and political negotiation - become invisible. Like the buildings, which get guised in digital cloaks, the questions that pressingly need to be asked but are always postponed, also get cloaked in the rhetoric of development propelled by ICTs and globalisation. In a city that was constructed to eternally deflect attention, ownership or voices, how does one begin to scratch at the surfaces (Literally and figuratively) to search for something more than narratives of consumption, solipsist self-gratification, and self-congratulatory development?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is with this agenda, in this city, torn and
marked and seamlessly stitched by technology, that I start to unravel my
questions about Internet and Society in China, trying to look at relationships
between technologies, city spaces and identities, drawing from seven months spent
at the Centre for Contemporary Studies at the Shanghai University. These stories, written with retrospective memory and embellished by the privilege of
hindsight, posit a set of questions about Internet technologies, construction
of city spaces, and manifestation of identities in China, but especially in
Shanghai, to locate potentials of social transformation, political
participation, engagement and discourse, which has not been transplanted on
technology studies in China. In the process it also lays down a framework to
understand how, in an oppressive or authoritarian regime, the cultural becomes
the grounds upon which foundations of new political intervention and social
change can be built.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog, in its ten different
entries, relies on academic and popular discourse, semi-structured interviews,
participant observation, field work, conversations, and personal experiences that
I collected in my stay there, trying to deal with the double translations of
culture and language. Whenever I have been unsure – and those moments have been
many – I have tried to discuss and debate ideas with colleagues, friends, peers
and participants, to ensure that the observations or arguments are qualified by
more than just a neo-colonial meaning making sensibilities.&amp;nbsp; Despite that rigour, if faults remain, they
are all mine, and hopefully will serve as points of entry into a fruitful
discourse.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity'&gt;https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Shanghai</dc:subject>
    
    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2009-09-18T10:45:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
