<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 161 to 175.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/the-digital-other"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/historian-wins-over-biographer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/click-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/keeping-it-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-august-6-2016-book-review-apocalypse-now-redux"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/blog_do-i-want-to-say-happy-bday"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/streaming-on-your-nearest-screen"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/the-digital-other">
    <title>The Digital Other</title>
    <link>https://cis-india.org/digital-natives/the-digital-other</link>
    <description>
        &lt;b&gt;Based on my research on young people in the Global South, I want to explore new ways of thinking about the Digital Native. One of the binaries posited as the Digital ‘Other’ -- ie, a non-Digital Native -- is that of a Digital Immigrant or Settler.&lt;/b&gt;
        
&lt;p&gt;I am not comfortable with these terms and they probably need heavy unpacking if not complete abandonment. Standard caricatures of Digital Others show them as awkward in their new digital ecologies, unable to navigate through this brave new world on their own. They may actually have helped produce digital technology and tools but they are not ‘born digital’ and hence are presumed to always have an outsider’s perspective on the digital world order.&lt;/p&gt;
&lt;p&gt;As I’ve interacted with young people in the Global South, one thing suddenly started emerging in dramatic fashion -- that many of the youth working extensively with digital technologies in emerging ICT contexts often shared characteristics of the Digital Other. In countries like India, where the digital realm became accessible and affordable to certain sections of the society as late as 2003, there is a learning curve among youth that does not necessarily match the global thinking on Digital Natives. Even though these young people might be considered Digital Natives, because they are at the center of the digital revolution in their own countries, there is no doubt they are also Digital Others relative to Global North and West conceptions of young people in digital networks.&lt;br /&gt;&lt;br /&gt;There is a very popular tweet that was making the rounds recently, which suggested that Digital Natives don’t have an account of the digital just like fish don’t have a theory of water -- they take to the digital as fish take to water. In this analogy lies a very important distinction between Digital Others and Digital Natives. Out of necessity, Digital Others have a relationship of production, control and design with the technologies they work with. They have a critical engagement with technology, as they code, hack, design, and create protocols and digital environments to suit their needs and resources. Digital Natives, on the other hand, have a purely consumption based interaction with the technology they use.&lt;br /&gt;&lt;br /&gt;I want to repeat that. The Digital Natives I’ve observed have a purely consumption based interaction with the technologies they use. I know this sounds weird in the face of widespread perceptions that Digital Natives have participatory, engaged, intuitive relationships with technology. We are supposed to be living in prosumer times, where the user on the Infobahn is a consumer and producer of information. But Web 2.0 entities like Facebook have created a business where the user is not just consuming but indeed the user is the consumed. While Facebook and Twitter revolutions are interesting in how users have been able to ‘abuse’ information censorship and create new communities of political protest, we still have to remember that the technologies that supported these revolutions were closed, proprietary, and coercive -- often even putting users in danger.&lt;br /&gt;&lt;br /&gt;From my perspective and my research, we have conflated access to information with access to technology, and we have misread this increased access as a sign of intimate relationship with digital technology and the Internet. However, for many youth, media production and information sharing are actually merely forms of consumption.&lt;br /&gt;&lt;br /&gt;What is most alarming to me is that the individual’s relationship with original production and design of technology is on the decline. More and more, technology platforms and apps that Digital Natives interact with are closed hardware and software systems. Private corporations produce and shape the tools of interaction, producing seductive interfaces and information engagement choices that make opaque the actual working of the technologies we use. I am concerned that, increasingly, Digital Natives are acting as pure consumers of technology and gadgets, and seem willing to do so.&lt;/p&gt;
&lt;p&gt;Banner image credit: World Bank Photo Collection &lt;a class="external-link" href="http://www.flickr.com/photos/worldbank/3492673512/"&gt;http://www.flickr.com/photos/worldbank/3492673512/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Nishant wrote the original blog post in DML Central. Read it &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/digital-other"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/the-digital-other'&gt;https://cis-india.org/digital-natives/the-digital-other&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-14T12:07:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/historian-wins-over-biographer">
    <title>The Historian Wins Over the Biographer</title>
    <link>https://cis-india.org/internet-governance/historian-wins-over-biographer</link>
    <description>
        &lt;b&gt;In Walter Isaacson's eponymous biography of Steve Jobs, the multibillion dollar man who is credited with single handedly changing the face of computing and the digital media industry, we face the dilemma of a biographer: how do you make sense of a history that is so new, it is still unfolding? Nishant Shah's detailed review of Steve Jobs' biography is now out in the Biblio and is  is available online (after a free registration) as a PDF.&lt;/b&gt;
        
&lt;p&gt;And how do you stitch it together around a person so iconic that he was always larger than life? Steve Jobs, the authorised story, that Steve Jobs never got to read because of his death to cancer on 5th October 2011, captures the tension between being a biographer and a historian that marks Isaacson's ambitious project. As a biographer, he hasn't yet achieved enough critical distance with the subject at hand, and hence, instead of engaging with Jobs to give us&amp;nbsp; inroads into his mind, we get a history that dons the mantle of objectivity and accuracy, to create a eulogy that would fit Steve Jobs' journey from Apple II to Apps.&lt;/p&gt;
&lt;p&gt;Written lucidly in a fairly conversational style reminiscent of Isaacson’s time spent with the Time Magazine, Steve Jobs is a story stitched together with love, care, rigour and honesty, to look at the times, people, places and circumstances that created the megalith icon Steve Jobs. Isaacson, whose earlier works include biographical histories of Benjamin Franklin (Simon &amp;amp; Schuster, 2003) and Albert Einstein (Simon &amp;amp; Schuster, 2008), confesses to his love of&amp;nbsp; exploring the intersections of technology and humanity. He establishes Steve Jobs as a worthy successor in the series, using Jobs’ own description of himself – “I always thought of myself as a Humanities person as a kid, but I liked electronics” – as the springboard for writing this ambitious history.&lt;/p&gt;
&lt;p&gt;Like a good historian, Isaacson refuses to take Jobs at face value, well aware of his ‘Reality Distortion Field’ that sucks you in even if you are aware of it, making reality appear in morphed forms. With a rigour that befits the project, he sets out in search of the historical truth using over a hundred interview sources comprised of influential people in Jobs’ life, an exhaustive riffling through the public discourse around Apple and its poster boy, a shrewd hand on the economic and technological pulse of the late 20th century and an uncanny ability to read between the lines. The result is a biography filled with tales that we know, stories that we speculated about, anecdotes about what we suspected.&lt;/p&gt;
&lt;p&gt;In one of the most memorable interviews in the book, Isaacson interviews Debi Coleman, one of the early managers at Apple, who says, “He would shout at a meeting, ‘You ---hole, you never do anything right.’ ... Yet I consider myself the absolute luckiest person in the world to have worked with him.” Isaacson traces&lt;br /&gt;this peculiar power that Jobs had over people in his life, to make them feel special and worthless at the same time, to Jobs’ own early knowledge of his adoption and of his oscillations between feeling “Abandoned. Special”. Isaacson shows how Jobs’ own life constantly referenced these two positions – from his dysfunctional relationships with women (the short story of how he got his girlfriend pregnant at 23 and then abandoned her, even denying paternity), to his long travels to India in search of spiritual belonging, and the lessons he learned from his adoptive father, who he hero-worshipped only to later realise that he was “smarter than him” — the adoption and its effects on his young mind, come up repeatedly. It serves as a way of understanding his abrasive attitude to authority, his rude and insensitive behaviour with colleagues and friends, and his strange fads at self improvement that ranged from fruitarian diets to extreme purging and fasting.&lt;/p&gt;
&lt;p&gt;Steve Jobs offers a wide range of examples of his awful behaviour – the bullying, the belittling, the lying – till you are numbed by them. At the same time, there is a fanboy who takes us gleefully through the history that preceded the world of iPod, iPhone and iPad, with backstories of the known, the presumed and the plausible. The book quenches the thirst for information about one of the most private public figures and confirms the polarity, not only of Jobs’ dealings with the world, but also his own life and how he saw it. There is an explosion of facts – unknown facts – that entice you into reading the book, but facts alone do not a good biography make.&lt;/p&gt;
&lt;p&gt;What is missing from the book, is &lt;em&gt;insight&lt;/em&gt;. Throughout the book, while Jobs’ own dramatic life choices sustain your attention and interest, the author does not&amp;nbsp; work too hard at either creating his own impressions of Jobs or at giving insight in more than the surface. There is no doubt that Isaacson is an expert&amp;nbsp; historian— the most enjoyable parts of the book are when he looks at the histories that came together to create Jobs. Using his rich knowledge of the ’70s and the ’80s in the USA he portrays an enchanted universe of the hippy lifestyle, rebellious attitudes to authority, reforming education system, the transition from the analogue to digital technologies, and the heyday of creative experimentation enjoyed by a plush economy.&lt;/p&gt;
&lt;p&gt;The layers of enchantment start fading when Isaacson lets go of the mantle of history and starts talking about the person he is studying. It is almost as if after having done his research on Jobs and then failing to invest in him as an author, he sought respite in writing history rather than giving us more of the person involved. Which is why, after reading the first half of the book, going through a series of strategic beginnings, looking at a wide range of people like Steve Wozniak, Nolan Bushnell, Andrea Cunningham, Daniel Kotke and Mike Markkula, one gets a feeling that you know more about these people than you know about Jobs. While each one of these characters, even in their cameo appearances, bring flavour, variety, complexity and emotionality to the tale, Jobs&amp;nbsp; remains the “enlightened but cruel” person who, even as he grows and transforms, remains tied to that description. Jobs becomes an organising principal for making sense of the jumbled influences behind the making of Apple rather than a person we can know more about. He is often named as an enigma but there is very little effort put into actually exploring his mystery. The historian wins over the biographer in getting you more interested in the time-space&amp;nbsp; continuum rather than in the person.&lt;/p&gt;
&lt;p&gt;I don’t want you to go away with the idea that there is not much substance to Isaacson’s writing. With a fine pen (which could have done with a little reflexive editing — and I am sure this would have happened had the book been released as planned in January of next year instead of being brought forward to fill&amp;nbsp; the void created by Jobs’ death), Isaacson does lead us into Jobs’ universe (if not into his head) in interesting ways. He paints little sketches of the past — like Jobs’ run-in with Bill Gates, like Apple’s rivalry with IBM, like Apple’s ‘stealing’ of the GUI (Graphic User Interface) ideas and technology from Xerox PARC, like the first Mac advertisement that posited Apple as the rebel against the ‘thought police’ in George Orwell’s dystopian epic 1984, or even in the parting of ways between the two Steves (Jobs and Wozniak). Isaacson knows how to tell even an oft-told story well and takes you through a simple but intricate narrative of&amp;nbsp; how Jobs became the poster-boy of the company he founded and his eventual ousting from it as a result of his obnoxious behaviour and the obsessive&amp;nbsp; compulsive personality that was affecting the productivity and business of Apple.&lt;/p&gt;
&lt;p&gt;However, the second half of the book, separated with some poignant and memorable pictures from Jobs’ life, makes it clearer than ever that Isaacson’s&amp;nbsp; interest in Jobs is not as a biographer but as a historian. It deals with Jobs’ ousting from Apple, his near bankrupt status as both Next and Pixar fell to bad&amp;nbsp; days, and the eventual return of Jobs to the Apple empire not as the prodigal son but the ascendant angel. In pithy prose, Isaacson captures the turmoil,&amp;nbsp; frustration and chaos that emerged when the brightest star of the computing industry almost collapsed in his own overambition. We get a sense of the&amp;nbsp; ruthlessness, the hard heartedness and the short memory of a technology industry that is simultaneously unforgiving, forgetful and hinged on a business ethic of capital and market expansion. If Isaacson notices the irony of Jobs’ own firing of “B grade players” from his Macintosh project and the abrasive dismissal of “shitheads” that Jobs regularly engaged in, to feed his own sense of power and control, he doesn’t dwell on it.&lt;/p&gt;
&lt;p&gt;The most dramatic rags-to-riches fairy tale of Jobs’ rise to power and his subsequent emergence as a tech superstar who changed the world as we know it with the iPod, iTunes, iPhone and iPad, in a quest to make his mark in history, is a lacklustre effort. The narrative is slow and sluggish, often making you want to skim through the page and move on. There is also a repeated emphasis on how Jobs was a visionary, was brilliant, was a man who, as he grew, was getting to deal with his life better, instead of an analysis of the different events that have marked Jobs’ public and personal life. The historian, when faced with the present just rushes through it to complete the book. Yet, the last interviews with Jobs, where he refers to himself as a machine, “one click, and it is all gone” are rich in emotions and texture. Isaascon does justice to Jobs’ belief in his being good “at making people talk”. There is a sense of closure that comes with angst, grief, pain and the feeling of loss that Jobs’ death must incite.&lt;/p&gt;
&lt;p&gt;The discontent I am left with is that in what is being read as a homily to the man, there is very little of the man in it. I knew Steve Jobs, through the legends&amp;nbsp; and stories that surround him, as an abrasive and arrogant whizkid who manipulated everybody around him ruthlessly to execute his own visions and dreams.&amp;nbsp; I knew Steve Jobs, through the public discourse and rumours, as a flawed man who could be at once the best and the worst thing that could happen to you, using people as gods when he needed them and shattering them when he no longer needed them in his new visions. I knew Steve Jobs, through the grapevine and the gossip as a man who was obsessed with control and as one who sought spirituality in design and salvation in a good sale. I knew Steve Jobs as a bundle of contradictions and contrariness and while this book explains in fascinating ways the confluences that created this legend, it gives me very little in terms of understanding the man behind the mask.&lt;/p&gt;
&lt;p&gt;The interwebz are already abuzz with the debates for or against Steve Jobs. There is surprise at how Isaacson waters down some of the personal and&amp;nbsp; professional scuffles, often bordering on the unrelenting and the unethical, in his rendering of Jobs’ life. Speculation is rife about some of the more&amp;nbsp; controversial decisions that Jobs took and whose side Isaacson is on. The book captures, comprehensively, so much of Jobs’ life that it is bound to lead to&amp;nbsp; infinite discussion and critique. However, I would recommend that you read the book not as a biography but as a history. If you read it as a history where&amp;nbsp;&amp;nbsp; Steve Jobs features prominently, because, after all, histories are written by those who win, you will be rewarded richly. It is a history that offers innovative&amp;nbsp;&amp;nbsp; ways of looking at technology, one that maps one of the most crucial transitions of the 20th century from the analogue to the digital and shows how a handful of people have shaped the information age we live in. However, if you approach Steve Jobs as a way of understanding Steve Jobs, chances are you will feel short changed.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.biblio-india.org/index.asp"&gt;Read the original published in the Biblio VOL. XV&amp;nbsp; NOS. 11 &amp;amp; 12, NOVEMBER- DECEMBER 2011&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/historian-wins-over-biographer'&gt;https://cis-india.org/internet-governance/historian-wins-over-biographer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-31T12:15:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/click-change">
    <title>Click to Change</title>
    <link>https://cis-india.org/internet-governance/click-change</link>
    <description>
        &lt;b&gt;From organising political protests and flash mobs to uploading their versions of Kolaveri Di, people brought about change with the help of the internet, writes Nishant Shah in this article published in the Indian Express on 1 January 2012. &lt;/b&gt;
        
&lt;p&gt;2011 was a year of connections. At the turn of the last decade, there were many qualms that we are all becoming “alone together”. There was fear that digital webs are building societies of isolated individuals. It was presumed that as cellphones become ubiquitous, broadband becomes affordable, and the digital realm emerges as a significant arbitrator of our everyday life, human connections will lose out to digital connectivity. However, the course of the year has shown that the wide and democratic access to digital and internet technologies has led to creative forms of connections between people. Researchers have proved that the social web has decreased the social gaps between people — the six degrees of separation is now reduced to 4.7 degrees of distance.&lt;/p&gt;
&lt;p&gt;Here is a look at five areas that changed dramatically in 2011 as digital proximities shaped closer human relations.&lt;/p&gt;
&lt;p&gt;The Political: From the Arab Spring and the iconic gathering of people at Tahrir Square in Cairo, Egypt, to the unprecedented mobilisation of people who came out in support of Team Anna’s anti-corruption campaign in India, to the Occupy movements across the world, people reshaped themselves as citizens in 2011. The ability of social networking sites to pass messages, and to share ideas and inspire people to take to the streets has changed the world as we know it. Instead of being passive observers of political protests, thousands of people took to the streets, demanding their rights and expressing their opinions on the politics of their countries.&lt;/p&gt;
&lt;p&gt;The Social: This was also the year of the flash mob. After the first excitement in 2003, when the first flash mob was orchestrated in Mumbai, the idea had fizzled out, facing legal opposition and social disinterest. However, in 2011, the flash mob came back with a vengeance — from the ‘slut walks’ which addressed public sexual harassment in our cities, to the organised and ‘permitted’ dance performance at the Chhatrapati Shivaji Terminus in Mumbai. Planned and executed through viral media, social web and cellphone messages, flash mobs allow people to explore new relationships with malls and roads.&lt;/p&gt;
&lt;p&gt;The Cultural: Bollywood took to the digital world this year, with celebrity blogs and tweets about their personal lives (remember the craze around the Bachchan baby), professional relationships and upcoming movies. Movies like Ra.One experimented with social media integration, producing gaming platforms and interactive environments for fans. However, it was all eclipsed by the rage that asked the simple question: “Why this Kolaveri Di?” What started off as a promo for an upcoming film became one of the most shared videos of the year, leading to thousands of people uploading their versions of the song, recorded with cheap digital video devices.&lt;/p&gt;
&lt;p&gt;The Economic: Perhaps one of the most dramatic changes has been the way corporate houses have started harnessing the power of the Web to go beyond just selling. While advertorials and commissioned bloggers are still going strong, there is a clear recognition that the social web might be one of the ways to influence people towards becoming more responsible citizens. Big Cinema’s magnificent “silent” national anthem that captures children with speech and hearing disability performing to Jana Gana Mana stole our hearts at the beginning of the year, and was followed quickly by Aircel’s campaign, Save Our Tigers.&lt;/p&gt;
&lt;p&gt;The Personal: 2011 was a year of crises: natural disasters that destroyed cities in the US, Thailand, New Zealand, the nuclear crisis at the Fukushima prefecture in Japan, or the bomb blasts in Mumbai and Delhi. No matter where, netizens emerged as heroes. They created Facebook pages to mobilise resources, built Twitter hashtags to offer help, organised information mashups to keep people updated and offered help to those who needed it. People of the year, this year, were people, who showed how their spaces of leisure and entertainment are also spaces through which they can reach out to strangers online.&lt;/p&gt;
&lt;p&gt;If 2011 has shown us anything, it is that technologies in themselves are neither the problem nor the solution. It is the people who use them and inhabit them that shape the futures of our technology landscapes. And we might be spending more time behind an interface but that seems to make us only more human.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/click-to-change/894294/1"&gt;Read the original published by the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/click-change'&gt;https://cis-india.org/internet-governance/click-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-03T09:35:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/keeping-it-private">
    <title>Keeping it Private</title>
    <link>https://cis-india.org/internet-governance/keeping-it-private</link>
    <description>
        &lt;b&gt;As we disclose more information online, we must ask who might access it and why. This article by Nishant Shah was published in the Indian Express on Sunday, 15 January 2012. &lt;/b&gt;
        
&lt;p&gt;As a researcher of the blink-and-change cyberspaces, I am often asked 
about the future of all things digital. I generally refuse to answer 
such questions because researchers are happier talking about things past
 than things present. Also, when people ask questions of the future, 
they are more interested in gadgets and platforms. Will Facebook survive
 the next year? Will more people use Twitter? Is the mobile the new 
weapon of protest? Shall we all soon talk only on FaceTime? I shrug my 
shoulders at these questions. However private information and privacy 
ties all these questions.&lt;/p&gt;
&lt;p&gt;I pronounce that 2012 is going to be the year of Personal Information Management and the need for increased privacy, where more than anything else, people will realise that what they do online is not only significant to their present, but that it might bite them in their digital futures. We have heard stories that have hinted at management of information and reputations online. Young people put compromising pictures and videos online, severely damaging their social and professional relationships; people express opinions on public forums, which might not necessarily reflect them well; users reveal personal information, which can be abused by those with malice. These instances should remind us that unlike in the physical worlds, where our foot-in-the-mouth moments, youthful indiscretions or embarrassing behaviour quickly runs through the grapevine and is forgotten, in the digital worlds, the things that we say and do, stay long after we have forgotten them.&lt;/p&gt;
&lt;p&gt;And this is where privacy kicks in. Many people in India, when they encounter the idea of “privacy”, raise their eyebrows. Culturally, we are not very private people. We celebrate our triumphs and sorrows in public, freely part with information to strangers on train rides, and don’t have qualms asking about age, marital status or salary. In the age of ubiquitous computing, we must remember that once something has been committed to the online world, it will be etched somewhere and will be available for somebody else to look at. The internet, specially with increasing bandwidth, expanded spectrum and cloud-based distributed data storage, is an unforgiving space that never lets go.&lt;/p&gt;
&lt;p&gt;Privacy, in this brave new world, is not about disclosure. It is becoming increasingly clear that we will need to disclose more and more of our private information if we want services — from government public delivery systems to private credit and education — online. However, once we have disclosed our private information, then what? Who uses it? Who reads it? Who stores it for what purpose? What are the implications of having that private information out there?&lt;/p&gt;
&lt;p&gt;In the digital world, privacy is about having more control over the personal information that we have disclosed, the right to know who, where, when, how and for what purposes information that we have willingly disclosed is used. And as the country finalises privacy bills, this right of the individual, whose private information is going to feed government and business ecologies, is at stake.&lt;/p&gt;
&lt;p&gt;There is a need to institute better regulation around data protection, data mining, data retention and data retrieval that is still in the limbo in our country, at the mercy of privately crafted terms of service that we blindly accept while signing into the digital world.&lt;/p&gt;
&lt;p&gt;It is time to move away from understanding privacy as disclosure to privacy as control of information — to know who is doing what with your private information and how you should have a say in it. And it is time to realise that just because you don’t have anything to hide, does not mean that you need to be in a state of disclosure. There is a reason why you have curtains in your house, or do not allow strangers to look into your bags.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/keeping-it-private/899804/1"&gt;The article was originally published in the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/keeping-it-private'&gt;https://cis-india.org/internet-governance/keeping-it-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-27T03:50:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust">
    <title>How Facebook is Blatantly Abusing our Trust</title>
    <link>https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust</link>
    <description>
        &lt;b&gt;‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook is just re-emerging from the controversies around how it conducted the voting on its new privacy policies, when it goes and digs itself deeper by trying to push down its email services down the throats of its users. If you have recently logged-in to Facebook, you will have received a notification that says that you have been ‘gifted’ with a free Facebook email account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, that is a later phenomenon. A couple of days ago, the whole community of Facebook users went about their usual way, without knowing that something substantial had changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, who launched their email service as a part of their social networking empire, with or without your consent, has given us a ‘yourname@facebook.com’ email account. I know free things are considered good, but not an email account that I did not sign up for!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And to make things worse, this email account was, without our consent, added to our time-line and displayed as the primary email address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In itself, it is a small move – with the redesign of the Timeline, Facebook had already introduced many such forced disclosures and changes that most of just had to accept, even if it might have had us fuming. However, with this change, Facebook has now started showing exactly what it can do in building your public profile and creating information about you, without your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their lame PR spiel, the company tried to pass it off as a freebie that they were gifting their users. But anybody who was not born yesterday realises that this is a desperate attempt to make a floundering service work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook messaging may work despite the clunky user interface, but its email services remain terribly underused. One of the paradoxes for this lies in the fact that you cannot open a Facebook account without a primary email account with another service, which is used as your authentication as well as the system through which Facebook notifications work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, many times, when introducing Facebook to first-time users of the web, we have to first train them in creating and using an email account before they can get on to the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, when Facebook did offer users the option of using a Facebook email service, most of them politely declined because nobody in their right mind is going to migrate to new a email services unless there was a substantial range of benefits being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how did Facebook respond? It just forced the email service upon its millions of users. While this is no different from the other kind of restrictions that are imposed upon us within the Facebook universe – the advertisements we see, the design and layout, the insipid white-and-blue background, the kind of information we can and cannot share and display – etc. this is the first time that Facebook actually added to our information profile and displayed it to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which means, that the next time somebody looks you up on Facebook – and let’s face it, one of the things we all use Facebook for, is to find people we know and get connected with them – they will see your Facebook email id listed as your contact address. And while you might get a notification in your primary email about any mails that you receive in your Facebook account, the fact is that, all those emails will become a part of Facebook’s huge data farms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a move that is almost a pale imitation of Google’s growing monopoly over our private information, Facebook seems to be now looking to expand its data empires. However, while Google did it through strategic design and marketing, offering innovations and incentives for its users to use their services, Facebook seems to have decided to build a Trojan horse and sneak these services in through the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this might not seem a big deal right now, it has deeper repercussions for what this corporate behemoth can do, not only with our data, but also to our data that we think is actually our own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If your alarm bells aren’t already ringing, they should be, as Facebook demonstrates a blatant abuse of the trust that we have put in its system, to keep our private data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The million dollar question – or maybe a slightly reduced price, given its public listing status on the stock-exchange right now – is that while Facebook might keep us safe from other people using our data, will it also be able to keep us safe from itself?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/how-facebook-is-blatantly-abusing-our-trust-359263.html"&gt;&lt;span class="visualHighlight"&gt;Read the original here&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust'&gt;https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-28T12:42:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-august-6-2016-book-review-apocalypse-now-redux">
    <title>Book Review: Apocalypse Now Redux</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-august-6-2016-book-review-apocalypse-now-redux</link>
    <description>
        &lt;b&gt;My review for Arundhati Roy and John Cusack's new book that captures their encounter with Edward Snowden, 'Things that can and cannot be said' is now out. It's an engaging, if somewhat freewheeling, political critique of the times we live in. &lt;/b&gt;
        &lt;p&gt;The review was &lt;a class="external-link" href="http://indianexpress.com/article/lifestyle/books/book-review-apocalypse-now-redux-arundhati-roy-john-cusack-2956413/"&gt;published in the Indian Express&lt;/a&gt; on August 6, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Book:&lt;/b&gt; Things That Can and Cannot Be Said&lt;br /&gt; &lt;b&gt;Authors:&lt;/b&gt; Arundhati Roy &amp;amp; John Cusack&lt;br /&gt; &lt;b&gt;Publication:&lt;/b&gt; Juggernaut&lt;br /&gt; &lt;b&gt;Pages:&lt;/b&gt; 132&lt;br /&gt; &lt;b&gt;Price:&lt;/b&gt; Rs 250&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The title of the book — Things That Can and Cannot be Said — demands an imperative. It is as if Arundhati Roy and John Cusack, aware of their internal turmoil in dealing with a world that is rapidly becoming unintelligible, though not incomprehensible, are demanding an order where none exists. Hence, they are advocating for certainty and assurance, only to undermine it, ironically, through their own freely associative writing that mimics linear time and causative narrative. This deep-seated irony of needing to say something, but knowing that saying it is not going to shine a divining light on the sordid realities of the world that is being managed through the production of grand structures like valorous nation states, virtuous civil societies, the obsequious NGO-isation of radical action, and the persistent neutering of justice through the benign vocabulary of human rights, defines the oeuvre, the politics and the poetics of the book. Written like a scrap book, filled with excerpts from long conversations scattered over time and space, annotated by reminiscences of books read long ago that have seared their imprints on the mind, and events that are simultaneously platitudinous for their status as global landmarks and fiercely personal for the scars that they have left on the minds of the authors, the book remains an engaging, if a somewhat freewheeling, ride into a political critique that makes itself all the more palatable and disconcerting for the levity, irreverence and the dark sense of humour that accompanies it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Composed in alternating chapters, the first half of the book is about Cusack and Roy laying themselves bare. They spare no words, square no edges, and put their personal, political and collective wounds on display with humble pride and proud humility. Cusack’s experience as a screenplay writer comes in handy — he rescues what could have been a long tirade, into a series of conversations. The familiar narratives are rehistoricised and de-territorialised, put into new contexts while eschewing the older ones, thus providing a large landscape that refers to state-sponsored genocide, structural reorganisation of nation states, the dying edge of political action, the overwhelming but invisible presence of capital, and the dithering state of social justice that treats human beings like things. Cusack, identifying the poetic genius of Roy, gives her centre stage, making her the voice in command.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Roy, for her part, seems to have enjoyed this moment in the soapbox — something that she has been doing quite effectively and provocatively to a national and global audience — and gives it her all. There are moments when the text feels indulgent, when the voice feels a little relentless, when the almost schizophrenic global and historical references become a litany of mixed-up events that might have required further nuance and deeper interpretation. However, the whimsical style of Roy’s narrative, with her sense of what is right, and her demeanour that remains friendly, curious and disarming, saves the text from being heavy handed, even when it does dissolve into cloying poignancy and makes you pause, just so that you can breathe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly, it is the second part of the book, where the two encounter Edward Snowden along with Daniel Ellsberg, the “Snowden of the 1960s” who had leaked the Pentagon papers, that falters. Snowden had jocularly mentioned that Roy was there to “radicalise him”. She does that, but in a way that doesn’t give us anything more than what we already know. While Cusack and Roy were committed to getting to know Snowden beyond his systems-man image, there wasn’t much that they could uncover, either in dialogue or in discourse, that could have told us more, endeared us further to possibly the most over-exposed person in recent times. However, one realises that the genius of the narrative is actually in reminding us how transparent Edward Snowden has become to us. We know all kinds of things about this young man — from his girlfriends past to his actions future, from his values and convictions to his opinion on the NSA watching people’s naked pictures — and yet, what has been missing in the Snowden files, has been the larger arc of global politics, social reordering, and perhaps, a glimpse of the post-nation future that Snowden might have seen in his act of whistleblowing that is going to remain the landmark moment that defines the rest of this century.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once you have gotten over the fact that this is not a book about Snowden, the expectations are better tailored for what is to come, and suddenly, the long prelude to the meeting falls into place. Snowden matches Roy and Cusack in whimsy, irony, political conviction, and the sacred faith in human values that make you want to give them all a fierce hug of hesitant reassurance. What Snowden says, what Roy and Cusack make of it, and how they leave us, almost abruptly at the end, breathless, unnerved, and severely conflicted about some of the 20th century structures like society, activism, nation states, governance, communication, technologies, sharing and caring is what the book has to be read for. The tight screen-writing skills of Cusack meet the perfect timing of Roy’s prose, and all of it becomes surreal, futuristic and indelibly real when it gets anchored on the physical presence of Snowden, who, in exile, talks achingly of the home that has thrown him out and the home that he can never really call his own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And while there are lapses — fragments, translations and evocations which might have needed more explanations to have their pedagogic intent shine through — there is no denying that, in all its flaws, much like the narrators, the book manages to first immerse you in the cold shock of a sobering reality, clearly positioning the apocalypse as the now, and then drags you out and wraps you up in a warm blanket, opening up forms of critique, formats of intervention, and functions of political commitment towards saying things that have and have not been said. The book should have, perhaps, been titled what could, would, should have been said, but can’t, won’t, shan’t be said — not because of anything else, but because it seems futile.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-august-6-2016-book-review-apocalypse-now-redux'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-august-6-2016-book-review-apocalypse-now-redux&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Book Review</dc:subject>
    

   <dc:date>2016-08-06T04:16:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/blog_do-i-want-to-say-happy-bday">
    <title>Do I Want to Say Happy B’day?</title>
    <link>https://cis-india.org/raw/blog_do-i-want-to-say-happy-bday</link>
    <description>
        &lt;b&gt;When it comes to greeting friends on their birthdays, social media prompts are a great reminder. So why does an online message leave us cold?&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This article was published in &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/facebook-do-i-want-to-say-happy-bday-notifications-2957653/"&gt;Indian Express&lt;/a&gt; on August 7, 2016&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;Every morning, I wake up to a Facebook notification that reminds me of the birthdays in my friends group. A  simple click takes me to a calendar view that shows me people who are  celebrating the day, prompting me to wish them and let them know that I  am thinking of them. Just so that I don’t miss the idea, the  notifications are surrounded by ribbons and balloons in gold and blue.  The message is simple. Somebody I know has a birthday. Social convention  says that I should wish them and Facebook has designed a special  interface that makes the communication so much simpler, faster, easier.&lt;/p&gt;
&lt;p&gt;And yet, every morning I seem to face a small crisis, not sure how to  respond to this prompt. Now, I am notorious for forgetting dates and  numbers, so I do appreciate this personalised reminder which has enabled  me to wish people I love and care for. But I generally find myself  hovering tentatively, trying to figure out whether I want to greet these  people.&lt;/p&gt;
&lt;p&gt;This has perplexed me for a while now. Why would I hesitate in  leaving a message on Facebook for people who I have added as “friends”?  Why would I not just post on their wall, adding to the chorus of  greetings that would have also emerged from the automated reminder on  Facebook? I went on to the hive-mind of the social web to figure out if  this was a unique problem, customised to specific neuroses, or whether  this is more universal. It was a great surprise (and relief) to realise  that I’m not alone.&lt;/p&gt;
&lt;p&gt;When trying to figure out our conflicted sociality on social media,  several conversations pointed to three things worth dwelling on. Almost  everybody on that long discussion thread pointed out that the entire  process is mechanised.&lt;/p&gt;
&lt;p&gt;It feels like Facebook has a script for us, and we are just supposed  to follow through. There is very little effort spent in crafting a  message, writing something thoughtful, and creating a specific  connection because it is going to get submerged in a cacophony of  similar messages. Also, the message, though personal, is public. So  anything that is personal and affective just gets scrubbed, and most  people end up mechanically posting “Happy Birthday” with a few emojis of  choice, finding the whole process and the final performance devoid of  the personal.&lt;/p&gt;
&lt;p&gt;Another emerging concern was that social media sustains itself on  reciprocity. However, it is almost impossible to expect the birthday  person to respond to every single message and post that comes their way.  In fact, as somebody pointed out, if your friend spends their entire  day on Facebook, responding to 500 comments and thanking everybody who  spent three seconds writing a banal post, you should stage an  intervention because it is a clear cry for help. You should have been a  better friend and made their day more special by being with them. So the  message feels like shouting in a ravine, expecting an echo and getting  nothing. This lack of reciprocity, even when expected, is still  disconcerting enough for people to shy away from it.&lt;/p&gt;
&lt;p&gt;The most frequent experience that was shared was by people who wanted  to make the person feel special and cherished. Facebook and the social  media sites are now so quotidian and pedestrian that it seems an almost  uncaring space. It was intriguing to figure out that people made choices  of whom to wish based on their actual proximity and intimacy with the  person. If it is a colleague, a distant acquaintance, or just a  companion at work, they throw a quick greeting on their wall and move  on. But for actual friends, loved ones, families, they take the prompt  but then refuse to follow the script. They take that moment to call, to  write, to meet, but not perform it on Facebook.&lt;/p&gt;
&lt;p&gt;This need for connectivity and the suspicion of its meaning continues  to mark our social media interaction. If it were not for social media  networks, a lot of us would feel distinctly disconnected, unable to get  glimpses in the lives of the large number of people we know.&lt;/p&gt;
&lt;p&gt;At the same time, this thinned out connection that characterises most  of social media also seems to make us realise that not all friends are  the same friends, and that Facebook might be social media, but it isn’t  quite personal media.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/blog_do-i-want-to-say-happy-bday'&gt;https://cis-india.org/raw/blog_do-i-want-to-say-happy-bday&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2016-08-22T09:53:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture">
    <title>Will You be Paid to Post a Picture?</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture</link>
    <description>
        &lt;b&gt;The wave of free information production on the web is on the wane.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/india-others/will-you-be-paid-to-post-a-picture/99/"&gt;published in the Indian Express&lt;/a&gt; on February 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The age of volunteerism is officially over. The last decade of the mass adoption of the internet has been fuelled by endless human hours being spent in producing information which is the new currency of our times. The big transition to Web 2.0 began when the individual “user” became more than either an individual or the user. The individual found herself as a part of a collective, finding a voice and a community of others to belong to. Simultaneously, instead of being a passive consumer of the web, the user started producing data — blogs, videos, tweets, content management systems, online discussion boards, massively multiple online role-playing platforms, social network transactions — all of which became a part of the new Web’s widespread popularity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost everything that we understand as the social web today is contingent upon people producing data in their interactions with the world around them. From knowledge producing websites like Wikipedia to entertainment platforms like YouTube, visualisation and data gathering spaces like Pinterest to photographs of self, food and cute animals on Instagram, political and social commentaries on Tumblr to Listicles and memes on Buzzfeed, the internet is a veritable smorgasbord of new information forms, formats and functions that are generated by the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is possibly the most exciting about this burgeoning information universe has been the amount of free labour that goes into it, and often remains invisible. As digital labour scholar Trebor Schulz points out, the internet has become both a factory and a playground, where our leisure time is capitalised into producing work that sustains the new attention and information economies. For instance, the world’s largest social networking site, Facebook, does not produce any of its contents. It is, in fact, a system of information mining and sorting, which works as long as a growing user base continues to produce information on it. Tomorrow, if all of us stop producing Facebook, and only lurk on it, the platform will collapse. Which is why, Facebook continues to acquire new platforms and applications to be integrated into its universe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the real effort that goes into the sustenance of sites like Wikipedia, which has become the de facto reference for global knowledge systems, is carried out by unsung and invisible editors who patiently, meticulously, and without almost any expectation, continue to add, verify, strengthen and curate reliable information that we can use. When the non-profit organisation WikiMedia Foundation prides itself in running one of the least expensive websites in the top 10 most visited sites in the world, it is signalling its deep appreciation for the countless human hours that have made Wikipedia possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, in recent years, there is noticeable stagnation in the wave of free information production on the Web. Oh, don’t get me wrong. We are producing an unprecedented amount of data — we are constantly being watched by surveillance technologies that detect biometric and genetic make-up of all our transactions, or we are inviting people to watch us on social network sites where we reveal some of our deepest secrets and desires, or we are watching ourselves, quantifying everything from things we ate to the number of hours we sleep. And yet, as we live in a world of Big Data, there is a definite decrease in people contributing to production of free information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the digital natives move from the web to mobile phones, traditional websites are already facing a crisis. News and media agencies that have celebrated the global citizen media networks have started realising that the individual user is more interested in local networks and information ecologies which are independent of mainstream conglomerates. And people are realising that their time and effort is worth money. They can be easily compensated for their online activities and gain reputation and importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tension only becomes more palpable when people start realising that there are others who are being paid to work on the platforms that they are contributing to. We all knew that this model of depending on free information was not a sustainable one. But it seems the day has arrived, especially with the recent drives on Wikipedia to build specialised knowledge editors. In the last few months, we have seen people in the FemTechNet project — an academic activist feminist project that seeks to remind us of the intersections of feminism and technology in network societies — carry out “Wikistorming”, where students are adding pages of women’s contribution to technologies on Wikipedia. More recently, medicine students at University of Chicago have taken to correcting and adding accurate information to Wikipedia, which is often a source of health information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both of these are fantastic efforts to add to the platform that was the underdog that overthrew the mammoth encyclopaedia like The Encyclopaedia Britannica. We hope more specialised users in different locations, fields, disciplines and languages continue to edit and contribute to Wikipedia. However, it is also a signal that the generalist information producer is on the decline. We are transitioning into a new age, where people are going to need rewards, incentives and benefits for performing information transactions on the web. The user is no longer going to be available for free labour, and it is time we started thinking of “paid usership”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture'&gt;https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T11:58:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get">
    <title>Networks: What You Don’t See is What You (for)Get</title>
    <link>https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get</link>
    <description>
        &lt;b&gt;When I start thinking about DML (digital media and learning) and other such “networks” that I am plugged into, I often get a little confused about what to call them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was originally &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/networks-what-you-don%E2%80%99t-see-what-you-forget"&gt;published in DML Central&lt;/a&gt; on April 17, 2014 and mirrored in &lt;a class="external-link" href="http://hybridpublishing.org/2014/05/what-you-dont-see-is-what-you-forget/"&gt;Hybrid Publishing Lab&lt;/a&gt; on May 13, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are we an ensemble of actors? A cluster of friends? A conference of scholars? A committee of decision makers? An array of perspectives? A group of associates? A play-list of voices? I do not pose these  questions rhetorically, though I do enjoy rhetoric. I want to look at this inability to name collectives and the confusions and ambiguity it produces as central to our conversations around digital thinking. In particular, I want to look at the notion of the network. Because, I am sure, that if we were to go for the most neutralised digital term to characterise this collection that we all weave in and out of, it would have to be the network. We are a network.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, what does it mean to say that we are a network? The network is a very strange thing. Especially within the realms of the Internet, which, in itself, purports to be a giant network, the network is self-explanatory, self-referential and completely denuded of meaning. A network is benign, and like the digital, that foregrounds the network aesthetic, the network is inscrutable. You cannot really touch a network or name it. You cannot shape it or define it. You can produce momentary snapshots of it, but you can never contain it or limit it. The network cannot be held or materially felt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the network touches us. We live within networked societies. We engage in networking – network as a verb. We are a network – network as a noun. We belong to networks – network as a collective. In all these poetic mechanisms of network, there is perhaps the core of what we want to talk about today – the tension between the local and the global and the way in which we will understand the Internet and then the frameworks of governance and policy that surround it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me begin with a genuine question. What predates the network? Because the network is a very new word. The first etymological trace of the network is in 1887, where it was used as a verb, within broadcast and communications models, to talk about an outreach. As in ‘to cover with a network.’ The idea of a network as a noun is older where in the 1550s, the idea of ‘net-like arrangements of threads, wires, etc.’ was first identified as a network. In the second half of the industrial 19th Century, the term network was used for understanding an extended, complex, interlocking system. The idea of network as a set of connected people emerged in the latter half of the 20thCentury. I am pointing at these references to remind us that the ubiquitous presence of the network, as a practice, as a collective, and as a metaphor that seeks to explain the rest of the world around us, is a relatively new phenomenon. And we need to be aware of the fact, that the network, especially as it is understood in computing and digital technologies, is a particular model through which objects, individuals and the transactions between them are imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For anybody who looks at the network itself – especially the digital network that we have accepted as the basis on which everything from social relationships on Facebook to global financial arcs are defined – we know that the network is in a state of crisis.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Networks of crises: The Bangalore North East Exodus&lt;/h3&gt;
&lt;p&gt;Let me illustrate the multiple ways in which the relationship between networks and crisis has been imagined through a particular story. In August 2012, I woke up one morning to realise that I was living in a city of crisis. Bangalore, which is one of my homes, where the largest preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of a nightlife, was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, danger, and material harm found currency. The city suddenly witnessed thousands of people running away from it, heading back to their imagined homelands. It was called the North East exodus, where, following an ethnic-religious clash between two traditionally hostile communities in Assam, there were rumours that the large North East Indian community in Bangalore was going to be attacked by certain Muslim factions at the end of Ramadan.&lt;br /&gt;The media spectacle of the exodus around questions of religion, ethnicity, regionalism and belonging only emphasised the fact that there is a new way of connectedness that we live in – the network society that no longer can be controlled, contained or corrected by official authorities and their voices. Despite a barrage of messages from law enforcement and security authorities, on email, on large screens on the roads, and on our cell phones, there was a growing anxiety and a spiralling information explosion that was producing an imaginary situation of precariousness and bodily harm. For me, this event, was one of the first signalling how to imagine the network society in a crisis, especially when it came to Bangalore, which is supposed to represent the Silicon dreams of an India that is shining brightly. While there is much to be unpacked about the political motivations and the ecologies of fear that our migrant lives in global cities are enshrined in, I want to specifically focus on what the emergence of this network society means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us toward an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the time, these networks are so natural and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility. In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking. But in this production of hyper-visible spectacles, the network works incessantly to make itself invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why, in the case of the North East exodus, the steps leading to the resolution of the crisis, constructed and fuelled by networks is interesting. As government and civil society efforts to control the rumours and panic reached an all-time high and people continued to flee the city, the government eventually went in to regulate the technology itself. There were expert panel discussions about whether the digital technologies are to be blamed for this rumour mill. There was a ban on mass-messaging and there was a cap on the number of messages which could be sent on a day by each mobile phone subscriber. The Information and Broadcast Ministry along with the Information Technologies cell, started monitoring and punishing people for false and inflammatory information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Network as Crisis: The unexpected visibility of a network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What, then, was the nature of the crisis in this situation? It is a question worth exploring. We would imagine that this crisis was a crisis about the nationwide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The crisis could have been read as one of neo-liberal flatness in imagining the nation and its fragments, that hides the inherent and historical sites of conflict under the seductive rhetoric of economic development. And yet, when we look at the operationalization of the resolutions, it looked as if the crisis was the appearance and the visibility of the hitherto hidden local networks of information and communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her analysis of networks, Brown University’s Wendy Chun posits that this is why networks are an opaque metaphor. If the function of metaphor is to explain, through familiarity, objects which are new to us, the network as an explanatory paradigm presents a new conundrum. While the network presumes and exteriority that it seeks to present, while the network allows for a subjective interiority of the actor and its decisions, while the network grants visibility and form to the everyday logic of organisation, what the network actually seeks to explain is itself. Or, in less evocative terms, the network is not only the framework through which we analyse, but it is also the object of analyses. Once the network has been deployed as a paradigm through which to understand a crisis, once the network has made itself visible, all our efforts are driven at explaining and strengthening, and almost like digital mothers, comfort the network back into its peaceful existence as infrastructure. We develop better tools to regulate the network. We define new parameters to mine the data more effectively. We develop policies to govern and govern through the network with greater transparency and ease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in the case of the North East exodus, instead of addressing the larger issues of conservative parochialism, an increasing backlash by right-wing governments and a growing hostility that emerges from these cities that nobody possesses and nobody belongs to, the efforts were directed at blaming technology as the site where the problem is located and the network as the object that needs to be controlled. What emerged was a series of corrective mechanisms and a set of redundant regulations that controlled the number of text messages that people were able to send per day or policing the Internet for spreading rumours. The entire focus was on information management, as if the reason for the mass exodus of people from the NE Indian states and the sense of fragility that the city had been immersed in, was all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in p2p (peer-to-peer) environments outside of the government’s control. This lack of exteriority to the network is something that very few critical voices have pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duncan Watts, the father of network computing, working through the logic of nodes, traffic and edges, has suggested there is a great problem in the ways in which we understand the process of network making. I am paraphrasing his complex mathematical text that explains the production of physical networks – what he calls the small worlds – and pointing out his strong critique about how the social scientists engage with networks. In the social sciences’ imagination of networks, there is a messy exteriority – fuzzy, complex and often not reducible to patterns or basic principles. The network is a distilling of the messy exteriority, a representation of the complex interplay between different objects and actors, and a visual mapping of things as they are. Which is to say, we imagine there is a material reality and the network is a tool by which this reality, or at least parts of this reality, are mapped and represented to us in patterns which can help us understand the true nature of this reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing from practices of network modelling and building, Watts proved, that we have the equation wrong. The network is not a representation of reality but the ontology of reality. The network is not about trying to make sense of an exteriority. Instead, the network is an abstract and ideological map that constructs the reality in a particular way. In other words, the network precedes the real, and because of its ability to produce objective, empiricist and reductive principles (constantly filtering out that which is not important to the logic or the logistics of the network design), it then gives us a reality that is produced through the network principles. To make it clear, the network representation is not the derivative of the real but the blue-print of the real. And the real as we access it, through these networked tools, is not the raw and messy real but one that is constructed and shaped by the network in those ways. The network, then, needs to be understood, examined and critiqued, not as something that represents the natural, but something that shapes our understanding of the natural itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of the Bangalore North East Exodus, the network and its visibility created a problem for us – and the problem was, that the network, which is supposed to be infrastructure, and hence, by nature invisible, had suddenly become visible. We needed to make sure that it was shamed, blamed, named and tamed so that we can go back to our everyday practices of regulation, governance and policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Intersectional Network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What I want to emphasise, then, is that this binary of local versus the global, or local working in tandem with global, or the quaintly hybridised glocal are not very generative in thinking of policy and politics around the Internet. What we need is to recognise what gets hidden in this debate. What becomes visible when it is not supposed to? What remains invisible beyond all our efforts? And how do we develop a framework that actually moves beyond these binary modes of thinking, where the resolution is either to collapse them or to pretend that they do not exist in the first place? Working with frameworks like the network makes us aware of the ways in which these ideas of the global and the local are constructed and continue to remain the focus of our conversations, making invisible the real questions at hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we need to think of networks, not as spaces of intersection, but in need of intersections. The networks, because of their predatory, expanding nature, and the constant interaction with the edges, often appear as dynamic and inclusive. We need to now think of the networks as in need of intersections – or of intersectional networks. Developing intersections, of temporality, of geography and of contexts are great. But, we need to move one step beyond – and look at the couplings of aspiration, inspiration, autonomy, control, desire, belonging and precariousness that often mark the new digital subjects. And our policies, politics and regulations will have to be tailored to not only stop the person abandoning her life and running to a place of safety, not only stop the rumours within the Information and communication networks, not only create stop-gap measures of curbing the flows of gossip, but to actually account for the human conditions of life and living.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. This post has grown from conversations across three different locations. The first draft of this talk was presented at the Habits of Living Conference, organised by the Centre for Internet &amp;amp; Society and Brown University, in Bangalore. A version of this talk found great inputs from the University of California Humanities Research Institute in Irvine, where I found great ways of sharpening the focus. The responses at the Milton Wolf Seminar at the America Austria Foundation, Austria, to this story, helped in making it more concrete to the challenges that the “network” throws to our digital modes of thinking. I am very glad to be able to put the talk into writing this time, and look forward to more responses.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get'&gt;https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:30:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets">
    <title> Open Secrets</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets</link>
    <description>
        &lt;b&gt;We need to think of privacy in different ways — not only as something that happens between people, but between you and corporations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was originally &lt;a class="external-link" href="http://www.indianexpress.com/news/open-secrets/1187814/0"&gt;published in the Indian Express&lt;/a&gt; on October 27.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you are a part of any social networking site, then you know that privacy is something to be concerned about. We put out an incredible amount of personal data on our social networks. Pictures with family and friends, intimate details about our ongoing drama with the people around us, medical histories, and our spur-of-the-moment thoughts of what inspires, peeves or aggravates us. In all this, the more savvy use filters and group settings which give them some semblance of control about who has access to this information and what can be done with it.&lt;br /&gt;&lt;br /&gt;But it is now a given that in the world of the worldwide web, privacy is more or less a thing of the past. Data transmits. Information flows. What you share with one person immediately gets shared with thousands. Even though you might make your stuff accessible to a handful of people, the social networks work through a "friend-of-a-friend effect", where others in your networks use, like, share and spread your information around so that there is an almost unimaginable audience to the private drama of our lives. Which is why there is a need for a growing conversation about what being private in the world of big data means.&lt;br /&gt;&lt;br /&gt;Privacy is about having control over the data and some ownership about who can use it and for what purpose. Interface designs and filters that allow limited access help this process. The legal structures are catching up with regulations that control what individuals, entities, governments and corporations can do with the data we provide. However, most people think of privacy as a private matter. Just look at last month's conversations around Facebook's new privacy policies, which no longer allow you to hide. If you are on Facebook, people can find you using all kinds of parameters — meta data — other than just your name. They might find you through hobbies, pages you like, schools you have studied in, etc. This can be scary because it means that based on particular activities, people can profile and follow you. Especially for people in precarious communities — the young adults, queer people who might not be ready to be out of the closet, women who already face increased misogyny and hostility online. This means they are officially entering a stalkers' paradise.&lt;br /&gt;&lt;br /&gt;While those concerns need to be addressed, there is something that seems to be missing from the debate. Almost all of these privacy alarms are about what people can do to people. That we need to protect ourselves from people, when we are in public — digital or otherwise. We are reminded that the world is filled with predators, crackers and scamsters, who can prey on our personal data and create physical, emotional, social and financial havoc. But this is the world we already know. We live in a universe filled with perils and we have learned and coped with the fact that we navigate through dangerous spaces, times and people all the time. The digital is no different than the physical when it comes to the possible perils that we live in, though digital might facilitate some kinds of behaviour and make data-stalking easier.&lt;br /&gt;&lt;br /&gt;What is different with the individualised, just-for-you crafted world of the social web is that there are things which are not human, which are interacting with you in unprecedented ways. Make a list of the top five people you interact with on Facebook. And you will be wrong. Because the thing that you interact with the most on Facebook, is Facebook. Look at the amount of chatter it creates — How are you feeling today?; Your friend has updated their status; Somebody liked your comment… the list goes on. In fact, much as we would like to imagine a world that revolves around us, we know that there are a very few people who have the energy and resources to keep track of everything we do. However, no matter how boring your status message or how pedestrian your activity, deep down in a server somewhere, an artificial algorithm is keeping track of everything that you do. Facebook is always listening, and watching, and creating a profile of you. People might forget, skip, miss or move on, but Facebook will listen, and remember long after you have forgotten.&lt;br /&gt;&lt;br /&gt;If this is indeed the case, we need to think of privacy in different ways — not only as something that happens between people, but between people and other entities like corporations. The next time there is a change in the policy that makes us more accessible to others, we should pay attention. But what we need to be more concerned about are the private corporations, data miners and information gatherers, who make themselves invisible and collect our personal data as we get into the habit of talking to platforms, gadgets and technologies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets'&gt;https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:21:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/streaming-on-your-nearest-screen">
    <title>Now Streaming on Your Nearest Screen </title>
    <link>https://cis-india.org/internet-governance/streaming-on-your-nearest-screen</link>
    <description>
        &lt;b&gt;Digital cinema, especially the kinds produced using mobile devices and travelling on Internet social networking systems like YouTube and MySpace, are often dismissed as apolitical and ‘merely’ a fad. Moreover, content in the non-English language, due to incomprehensibility or lack of understanding of the cultural context of the production, is labeled as frivolous, or inconsequential, writes Nishant Shah in this peer reviewed essay published in the Journal of Chinese Cinemas, Volume 3, Issue 1, June 2009.&lt;/b&gt;
        
&lt;h3&gt;Contextualising new digital cinema through Kuso&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;Deploying the aesthetic framework of kuso as political engagement, this essay analyzes how its ‘aesthetic’ form of expression offers spaces of political participation and negotiation for the ‘Strawberry Generation’ digital natives in Taiwan. This paper draws from various youth phenomena like the emergence of the ‘BackDorm Boys’ as iconic representations of flawed stardom, the adoption of kuso lifestyles and the consumption/distribution cycles of cinema on the web to see the possibilities they offer for political engagement and participation through cultural expressions and productions, that are otherwise dismissed in contemporary discourse.&lt;/p&gt;
&lt;p&gt;New digital technologies, initially developed for surveillance and strategic communication, because of the proliferation of the internet/s and the cyberspaces, have now become freely available at very inexpensive rates around the world. The easy availability of these technologies enables new conditions of production of hitherto privileged art forms. The new globalised circuits of un-contextualized distribution lead to the imagination of a deterritorialized community of consumers who share common systems of making meaning and receiving these objects. As has been noted in earlier cybercultures studies, objects found on the internet/s – the people and the narratives that they produce - are often consumed as outside of time and geographical space. William J. Mitchell (1996) in his now much critiqued conception of the ‘Infobahn’, conflates all geographical distinction in his imagining of the larger neural circuits of digital information and economy. Similarly, in his extraordinary book. Everything is Miscellaneous, David Weinberger (2007), explores the role that digital dissemination and distribution (as also storage and archiving) play in evolving a new miscellaneous form of sorting and classification, thus deconstructing established coda of knowledge determination. Weinberger, despite the keen insight into the importance of metadata and user-based personalised galaxies of information, is unable to talk of the entire range of phenomena as rooted in particular geo-political contexts. In fact, as Gasser and Palfresy (2008) make evident in their book Born Digial, whenever a body is referred to within cybercultures studies, it is the body of a white, upper class, masculine body; whenever a place is evoked, it is unequivocally the economic centres of the North-West; Time, which is an affiliate of the space and the body, is also then the linear and historical time determined by these concrete referents.&lt;/p&gt;
&lt;p&gt;The West, with its wide consumer base and widespread proliferation of new digital technologies, often becomes the hegemonic legitimising authority as objects produced elsewhere are understood through ‘foreign’ aesthetics and logistics. Imagining the internet/s as residing outside of the time-space continuums, allows for a cyclical re-assertion of the Western paradigms as credible and authentic, and other forms as parodic or derivative in nature. New forms of cultural expression and narrativisation, received outside of the context of their production or the circuits of distribution and reception, are often mis-read and interpreted to fit the existing modes of making meaning.&lt;/p&gt;
&lt;p&gt;This paper is an attempt to look at a specific form of new digital cinema in North East Asia that challenges the west-centric modes of understanding these objects. New digital cinema is a category that needs to be more sharply defined. In the last three decades of extensive technological advent and deployment in the fields of cinematic production, many different forms have claimed the space of new digital cinema. Post-celluloid cinema,&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; production of movies augmented by technologies, studio house experiments in animation and 3D technologies, distribution of movies and the networks of piracy that come into being with peer2peer networks,&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; conditions of reception and movie watching with digitally owned copies of movies,&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; the emergence of multiplex cinema and conditions of consumption,&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; etc. have been looked upon by different theoreticians and practitioners as new digital cinema.&lt;/p&gt;
&lt;p&gt;I use the term ‘new digital cinema’ in the rest of the paper in a very specific sense of the phrase to make a very clear point of departure from the aforementioned approaches, which, though exploring the possibilities that digital technologies offer, still, often, stay with contained and unquestioned understanding of the established cinematic practices of production, authorship, distribution and spectatorship. New digital cinema is located in the new wave of cinematic forms produced by people who are enabled to do so by the easy availability of conditions of production and distribution that are framed by new digital technologies. Instead of looking at movies being produced by ‘film-makers’ or ‘film-studios’, maintaining the distinctions of authorship, readership and distribution circuits, I explore movies which are produced by people who are otherwise relegated to the realm of spectatorship and consumption. For the scope of this paper, new digital cinema refers to the cheaply produced cinematic forms, shot through inexpensive and slowly-becoming ubiquitous camera enabled devices. Geared towards an almost obscene abundance of details and demanding an untiring self-narrativisation,&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; these sites of social networking and expression have led to the production of videos and distribution of the self in unprecedented ways. These videos are further marked in their distribution through cyberspatial forms like YouTube, MySpace, and Google video, Television based reality shows based that run on user based programming consisting of personal videos, personal webcam sites, and MMS forums, to millions of users who enter into an interaction that is no longer limited to spectatorship.&lt;/p&gt;
&lt;p&gt;There are three dialectic processes around the ‘personal’ videos broadcast on such sites of digital social networking and sharing, that need to be mapped in order to understand the impulse of this paper as well as to look at the dialectic reconstruction of earlier categories as understood by non-digital, pre-internet cultural forms. The first trope of dialectic comes in the form of continuity. Histories of technology taking the When Old Technologies were New (Marvyn, 1988) approach, often produce these digital moving images as bearing a relational value with the emergence of earlier technological forms and the use of these forms to produce personal narratives – print, camera, video, to name the three most influential forms of self expression and narrativisation. Such a historical narrative, unless carefully inflected with the growth and development of indigenous technologies and the indigenisation of these technologies, reads both, the technological development as well as the cultural forms thus produced, only through a West-centric paradigm of aesthetics, glossing over the differences that might be present in the very process and methods of reading such technologised forms. This non-disruptive, uninterrupted historicisation, while it is fruitful in questioning some presumed categories in the process of cultural production,&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; still reinforce these digital moving images as merely a new form of old cinema.&lt;/p&gt;
&lt;p&gt;The second tension that needs to be mapped out occurs in the form of carefully maintained distinctions between the Sacred Cow of originality and the much maligned miasma of derivative, plagiarised, copied (left, right, centre), forms that have been facilitated by the proliferation of copy-paste digital technologies and internet networks. In the public as well as the theoretical discourse around these digital moving images, there is almost a Universal original (generally Western, otherwise canonised by the Western gaze in other geo-political contexts), to which everything else has a relation that is either praodic or uniformly derivative in nature. Even within the West, these videos on youtube and myspace are easily dismissed as plagiarised or unoriginal, often leading to a wide range of public controversy and exchange.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The third dialectic is in the blurring of the pre-digital accepted terms of producers, spectators and processes of reading that these digital moving images produce. It is necessary to realise that the context of not only the production but also that of the reader is crucial to understanding the aesthetics of cyberspatial forms. The author in the digital world is as digital and ephemeral as the object itself. The tension between the corporeal and the digital has been effectively resolved by conceptualising the ‘interface’ – the space between the two conflicting and tense oppositional ideas- as the bearer of thought, idea, meaning and intention for digital objects. Such a complex structuring challenges the earlier crystalised practices authorship, spectatorship, distribution and reception, thus marking new digital cinema as not merely a cinematic practice augmented by technology but as a new form of cinema that challenges, quite radically, the earlier cinematic forms, in very much the same way that, in another historical and cultural moment, the print did to the manuscript.&lt;/p&gt;
&lt;p&gt;This paper locates itself in these three dialectical flows to explore new digital cinema as a form of popular and cultural expression in Asia, specifically in Taiwan. It hopes to dismantle the myth of the universal/accessible/west-centric view of new digital cinema and demonstrate the need to assert the geo-socio-cultural contexts of their origin through exploring the aesthetics and genre of Kuso.&lt;/p&gt;
&lt;h3&gt;Knowing Miso from Kuso&lt;/h3&gt;
&lt;p&gt;Kuso, though it is a relatively new term, is highly popular in describing the new cybercultural forms that emerged with the proliferation of the internet/s. Anime fans are familiar with Kuso as an expletive or an interjection, used as the English equivalent of ‘Shit!’ Though Japanese in origin, it was made popular as a word, an aesthetic and a lifestyle in Taiwan around 2000, subsequently spreading to Hong Kong and China. Now, Kuso, along with other N.E. Asian products like Hentai,&lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; and Manga, is a popular way of identifying cybercultural forms. The wikipedia mentions that


&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class="callout"&gt;[t]he roots of Taiwanese “Kuso’ was Kuso-ge’s from Japan. The word Kuso-ge is a portmanteau of Kuso and game, which means, quite literally, “shitty games.” The introduction of such a category is to teach gamers how to appreciate and enjoy a game of poor quality – such as appreciating the games’ outrageous flaws instead of getting frustrated at them. &lt;br /&gt;(Wikipedia, 2006)&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;It was an attempt to not only identify or locate flaws but to celebrate them and encourage an active production of them. Kuso, for the younger generation in Taiwan (and the thousands of fans all around the world, who subscribe to Kuso Bulletin Boards and discussion forums) is not just a cursory form of parody but a lifestyle. A Taiwanese artist, Yeh Yi-Li, in her solo exhibition, seems to suggest that as well. Her introduction to her exhibition titled ‘KUSO – Red, Spring Snow, Orange Flower’ says&lt;/p&gt;
&lt;p class="callout"&gt;In Taiwan’s pop culture, internet subculture and video gamers’ communities, it (Kuso) became a trendy term that suggests “making fun of anything, playing practical jokes on everything.” KUSO subverts conventional values and turns things into garbage. It has no limits, history, agendas or logic. Like an amoeba, it is a subculture phenomenon that has no rules. (Yi-Li, 2006)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Making a list of characteristics of what might be Kuso is futile. As Yi-Li seems to suggest, Kuso, on the surface, is located on the ‘fun’ and ‘hilarity’ of an object. However, Kuso actually resides in the processes of subversion and resistance. Kuso not only makes ‘things into garbage’ but also, by logical corollary, turns ‘garbage into things’. It started as a subculture phenomenon but is now highly popular in mainstream cultures – on reality TV on youth oriented channels like MTV and Channel V, in local performances and spectacles, and in Stephen Chou movies. Kuso seems to refer to not just the discourse around a particular object but a subjective mode of representing the self into different narrative conditions enabled by new digital technologies. Kuso is about the ability to create fluid and transitory spectacles of the self as a trope of social interaction and communication. While Yi-Li might look upon Kuso as without ‘limits, history, agendas or logic’, she forgets that Kuso has been the way for organising political protests, flash mobs and social awareness collectives in many part of Asia.&lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; It is in this very ‘free’ and ‘excessive’ structure of Kuso that one can locate the politics and processes by which New Digital Cinema can be understood.&lt;/p&gt;
&lt;p&gt;In her Kuso exhibition, Yi-Li created the ‘Worm-man’ that&lt;/p&gt;
&lt;p class="callout"&gt;drags its body and slithers in the ever-changing world. In different kinds of worlds, the Worm-man develops into different phases. As phenomena are happening, it is also transforming. The Worm-man has multipe possibilities, multiple personalities and multiple identities. &lt;br /&gt;(Yi-Li, 2006)&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;While Kuso is often understood as parody, trash culture or camp humour, and is even attributed to MTV style movies by enthusiasts, for the large section of Kuso consumers, it is the governing principle for social interaction, dressing and appearance, hair and accessories, consumption of products and modes of expression. Kuso seems to be a way in which they produce themselves as parodic forms of themselves – producing themselves in conditions of constant transformation with ‘multiple possibilities, multiple personalities and multiple identities.’ As Yi-Li suggests in her art, Kuso is not just about producing parodies and mimicking popular art forms but it is also a way of producing the spectacle of the self. It is not surprising then, that Kuso emerges as an aesthetic with the proliferation of technologies and tools which allow for a narrativisation of the self for distribution and consumption in the public.&lt;/p&gt;
&lt;h3&gt;Contexualising Kuso&lt;/h3&gt;
&lt;p&gt;I look at two specific instances of Kuso to understand and frame the concept in this paper. The first emerged out of my own involvement with some of the students and their scheduled performances at the annual sports day.&lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; My Chinese language teacher Mandy Hua, who is an undergraduate student at the NCU, is also a professional hip hop dancer. For her annual day performance at the university, Mandy chose (with some inputs from me) a popular Bollywood song that was creating raves in India at that time.&lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; Mandy chose the song, edited the audio to make it tighter and shorter in duration and started the practice. Along with a flock of dancers from other schools on the campus, Mandy replicated an ‘Indian’ aesthetic for the song, doing elaborate costumes which included a lot of flowing skirts, veils, sequins and shimmer – the kind that was shown in the song. The female performers were in a state of erotic relationship – not only in their imitation of the seductive postures and movements of the dance sequence in the original movie song but also in presenting themselves as eroticised objects of glamour and desire to a young audience made primarily of students. The expected reactions of cat calls, of hooting, of lascivious laughter and of gasps of wonder and awe were all present in the crowd. However, a brief minute into the performance, their narrative of seduction, eroticism and obvious parody-imitation was disrupted and somehow harmoniously irrupted by a group of boys, wearing glasses, their bodies far from the perfectly sculpted eroticised bodies of the female performers, wearing clumsy looking ill-fitting karate dresses and making unrehearsed animal movements around the female performers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;It was the introduction of these dancers that completely displaced the element of parody within which I understood the performance. The male performers, who were completely unfamiliar with the original song, were imitating the female dancers on the ground. They were not interested in replicating either the movements of the female dancers or the sequences they were following. They were more interested in undermining the very aesthetic that the female dancers were trying to replicate or produce. Their movements were jerky, unpractised, bordering on the ridiculous. Their half naked bodies were un-sculpted and uneroticised. These were not the college hunks or super jocks coming out to parade their masculinities but the ‘geeks’ or the ‘dorks’ who were ravelling in their un-eroticised status and celebrating it with gusto.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;What was more interesting was the way in which the audience was receiving these male performers. In spite of the engaged erotic relationship with the female performers, the audience was extremely appreciative of the male performers’ attempts at overthrowing the female performers’ spectacle. The audience was egging them to constantly be more ridiculous, be more flamboyant, be more self mocking, guiding their movements and actions, leading to a final mock chase sequence, where the male performers chased the female performers off the ground, stripped themselves to their shorts, flexed their un-muscled bodies and made their exit among huge cheering and applause. They were obviously the star attraction of the performance. Such a response was puzzling. It was the women who had put in hours of practice to produce themselves as erotic objects of consumption. The audience, in the beginning had engaged with them at that level. And yet, it was this bunch of slightly ‘with an L on my head’ guys who emerged in their buffoonery and antics as the heroes of the minute.&lt;/p&gt;
&lt;p&gt;My first impulse was to read in it, the dynamics of a gendered space and a certain mock valorisation of this hyper masculinity. While gendered readings of the performance are indeed valuable and might offer an entry into looking at the construction of eroticism, desire, spectacle and the performative self, I am going to focus on the Kuso in this performance. My own gendered impulses were quickly overshadowed by the repeated use of the word Kuso that the members of the audience were using in order to explain the male performances. It was obvious that these male performers, in spite of their actions, were not really clowns but some sort of heroes and embodying this peculiar word – Kuso.&lt;/p&gt;
&lt;p&gt;When I started asking around for Kuso, people pointed at several different objects, from Stephen Chou movies to Reality TV on Channel V, from personal videos to popular Kuso shows where people engaged in a set of ludicrous, often bizarre performances to make a public spectacle of themselves. The more I encountered these Kuso forms, the more difficult and incomprehensible it became to understand either the appeal or the aesthetic of the form. It looked like cheesy camp or an extension of a certain MTV aesthetic as a result of vulgarisation of technologies. When I crawled on the web looking at discussion forums that were devoted to Kuso, I found a huge number of people sharing my incomprehensibility and raised eyebrows at the Kuso objects, trying to figure out what it was that was attracting thousands of users to produce and consume Kuso with such dedication.&lt;/p&gt;
&lt;p&gt;Especially in the context of Taiwan, Kuso belongs to the realm of what is called the ‘Strawberry Generation’ (Tsao-Mei Yi-Dai). The Strawberry generation in Taiwan refers to the people born between 1981 and 1991, and, despite its suggestions in English, carries negative connotations with it. The three most popular characteristics of the Strawberry generation – a phrase that has huge currency in popular media – have been severally explained. Rachel, who writes on the National Central University’s (Taiwan) website, explains:&lt;/p&gt;
&lt;p class="callout"&gt;In Taiwan, the Strawberry Generation refers to those who were born between 1981 and 1991, ranging from the 22-year-old university students to the 12-year-old junior high school students. This generation is labeled as “strawberry” due to two reasons: first, this generation of youth was raised in a better environment, as strawberries grown and nourished in a greenhouse, than the earlier generation. Second, strawberries are known for their beauty, delicacy and high price, suggesting that the young people can not withstand pressure, difficulties, and frustration as they grew up in a nice and comfortable environment and are able to get almost whatever they ask for.&lt;br /&gt;(Rachel, 2008)&lt;/p&gt;
&lt;p&gt;Henrry (2006), a student who also belongs to the Strawberry Generation, writes in his classroom assignment, ‘People of this generation are said to be fragile when facing pressure, just like the strawberries.’ He further goes on to suggest that the problems of the Strawberry Generation are largely economic in nature and might lead to serious problems for Taiwan’s economy. Myr Lim (2006) also looks at the economic and political instability of this generation and describes them as ‘Like the fruit, they look extremely good and sinfully juicy, who wouldn’t want one? But they have a very limited shelf life.’ Built into this criticism is also the understanding that the Strawberry Generation is also in a state of political disavowal.&lt;/p&gt;
&lt;p&gt;And yet, when introduced to the different manifestations of Kuso, there was a very clear idea of resistance, subversion and mobilisation. A local incident, which made temporary heroes of two teenage boys who stripped in Public, on a university campus, was read as a sign of resisting the University’s attempts at regulating dress-codes for the students.&lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Other videos which were made for internet circulation had the digital natives refusing the Western models of masculinity or heroism and producing buffoon-like images to correspond with the glorified pop icons from the West – often producing infantile and juvenile forms of behaviour to exaggerate the effect. Other Kuso manifestations were in consumption, as different objects which were seemingly ‘cute’ (se-jiao) or ‘innocent’ were invested with sinister or often ludicrous intent.&lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; The same kinds of aesthetics were also seen on the ‘LOL Cat’&lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; and ‘All your base are belong to us’&lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; internet memes which have gained currency online. It is while browsing through these worlds that I was introduced to a Kuso phenomenon which was garnering huge media and popular attention globally. This was a phenomenon which has now popularly been dubbed as the Backdorm Boys.&lt;/p&gt;
&lt;p&gt;BackDorm Boys were three graduate students, two of whom became instant celebrities – Huang Yi Xin and Wei Wei - from the Guangzhu Academy of Fine Arts in China, who shot to instant fame when, in a state of boredom, they made a lip-sync cover version of popular Backstreet Boys singles, using nothing more than cheap digital cameras on their computers, in the restrictive space of their dormitories, and distributing them through video sharing spaces like YouTube, MySpace and other blogs (The Full Plate, 2008). These weren’t, at a first glance, very different from the ‘funny’ videos that one encounters online all the time – cheaply produced, shot with a webcam mounted on the screen, an almost unedited, uninterrupted full frontal frame, and an exaggerated attempt creating a certain Kitsch video that have gained popularity in the past. However, within my own contexts, the BackDorm Boys had strong resonances with the earlier dance performance I described. Once again, the three students in the videos were not the hyper eroticised masculinities that the boy bands like Backstreet Boys have embodied in popular cultures. Given the Confucian model of academia and studentship, students are not easily granted such erotic value to begin with. These were also not students who were particularly talented at singing. In fact, they were not singing at all, they were lip synching the songs in their videos. The videos did not involve any attempts at shooting but were in the full-frontal, almost pornographic frames of spectacle where the camera was mounted over the screen and the two performers were being caught in that frame. Dressed in identical clothes, the two main performers sang with extraordinary histrionics, the otherwise mellow and slightly cliché ridden love ballads that the Backstreet Boys had made their signature. In the background, one of their other dorm mates, played a Kuso-ge called Quaker throughout the video. He occasionally simulated the actions of a music mixer or a DJ or sometimes helped them with props.&lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/boyz.jpg/image_preview" alt="Boys" class="image-inline image-inline" title="Boys" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;There was, at the first glance, nothing spectacular about the Backdorm Boys. As one of the responders on a blog dedicated to the Backdorm Boys very succinctly puts it:&lt;/p&gt;
&lt;p align="left" class="callout"&gt;Let’s face it: it doesn’t take a lot of talent to make faces. They didn’t write the song, didn’t sing the song, didn’t play any musical instructions, etc. Their sole accomplishment is they made faces at a camera. That’s not talent, man!!! And if they weren’t Chinese—i.e., didn’t have the freak factor of Chinese boys lip-synching to Backstreet Boys songs—NOBODY will notice this.&lt;br /&gt;Da Xiangchang 2005&lt;/p&gt;
&lt;p align="left"&gt;And yet, the Backdorm Boys, apart from cults developing around them and various internet memes devoted to them,&lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; were featured live on NBC and both dropped out of their academic programmes to become hugely successful brand ambassadors and spokespersons for some of the largest mass media brands in China. They have both acquired a celebrity status and are role models and now popular media persons on TV channels, hosting their own shows.&lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt; In trying to understand these Kuso products in the realm of parody one starts asking the wrong kind of questions: where is the talent? Several respondents, including Da Xiangchang very pointedly pointed out that ‘it takes very little talent to make a fool out of yourselves.’ The more interesting question to ask would be the question that Yi-Li asked in her exhibition: How does Kuso manage to make garbage out of things? And further, is it possible, to read into Kuso, a new politics which guises itself as ‘fun’ or ‘hilarity’.&lt;/p&gt;
&lt;h3&gt;Differentiating between parody and Kuso&lt;/h3&gt;
&lt;p&gt;The Western gaze will only allow Kuso to be understood in a relationship of parody. However, looking at the contexts within which Kuso emerges and its ability to ‘make garbage out of things’, Kuso changes the relationship between the ‘original’ and the ‘discursive’ objects. parody, as a literary and a narrative form, resides more in the object being parodied (original) rather than in the parodic creation (discursive). To understand, appreciate or enjoy the discursive object, it becomes necessary to be familiar with, sometimes at a very intimate level, with the original object. The chief aim of a parody is to invoke the original object by introjecting it into new frames of references and meaning making, establishing a tenuous relationship of invocation between the original and the discursive objects. Parody seeks, not to replace the original but add to the ‘aura’ of the original object. Legends, myths, cult-stories and folklores can be understood as parodic in nature as they add to the understanding of the original or the core object. In the case of cinema especially, parody is not simply a process of poking fun at an earlier cinematic form or object but is an effort to evoke the original as a way of making meaning and seeking sense in the narrative.&lt;/p&gt;
&lt;p&gt;The relationship between the original object and the discursive object is one of invocation where the parody invokes, glorifies and seeks justification for its existence through the original object. parody also resides in a certain historical reading of cinema as it produces often unintentional but present residues of earlier forms. parody can be looked upon as enabling a certain genealogical reading of cinematic narratives and forms. In the non-linear consumption patterns of cinema reception, especially with cable television and global distribution, the boundaries between the original and the discursive are often blurred and reconfigured. Often the audiences and consumers encounter the discursive before they get familiar with the original and hence they change the way in which the original object is understood or received, often mis/reading it through the lens of the parody instead of the other way round. Cinema also makes more visible, the ways in which the parody can also work through different genres and media – be it in the production of books that try to appropriate the cinematic language of telling stories or in the production of movies that are based on books or sometimes try to deploy the narrative conditions of books in the cinematic narratives. The only way to talk of parody is to read it in the cinematic object itself and in the invocations that it produces with the imagined or the real object. The concept of an original is necessary to the understanding of the parody.&lt;/p&gt;
&lt;p&gt;It is exactly this relationship between the original and the parody that Kuso disrupts from the within. Kuso does not produce the definitive terminal points of the original and the discursive objects that parody requires. In the instance of any Backdorm Boys video, there is no presumed knowledge of either the Backstreet Boys videos or the kind of globalised consumption that they can be contextualised under. While there are many references – almost at the level of invocation, in the clothes that they wear, in the choices they make in songs etc. – they are not necessarily the frameworks through which their videos can be made meaning of. If it was merely a question of parody of Backstreet Boys, their subsequent videos where they also ‘Kuso-ed’ other performers and local artists would not have worked for their fans.&lt;/p&gt;
&lt;p&gt;Like a network, the relationship between the original and the discursive objects of Kuso is masked so that each constantly feeds back into the other. Hence, in the case of the Backdorm Boys, if you tried to understand their work as simply a Chinese/Asian parody of a Western form of popular culture, you end up bewildered, unable to account for the huge popularity and success. However, if we place their production as Kuso, it allows us to realise that the objects being parodied in the videos, are not American popular cultural forms or specifically Backstreet Boys videos. What is being parodied is the original self of the performers.&lt;/p&gt;
&lt;p&gt;Instead of the framework of parody or intertextuality, we can locate the Backdorm Boys Kuso videos as embedded in a particular lifestyle choices and consumption of cultural forms, accessories, appearances, class differences, language and most importantly the conditions made available by technologies. The original object is the three boys and their ‘real’ or ‘original’ status in their lived practices. The discursive object is also the three boys and their projected selves or desired selves which they are expected to either appropriate or wish for. The Kuso is in exaggerating the differences between these two and celebrating the obvious flaws in them and making them available as a public spectacle. While I shall steer away from discussions of talent, it becomes more evident that Kuso allows for us to recognise the aesthetics, politics and proliferation of these new digital cinema artefacts which earlier notions of parody did not.&lt;/p&gt;
&lt;p&gt;Kuso establishes more non-linear, sometimes disruptive relationships, between different objects that it refers to in its production. The relationship between the various objects is not invocative but evocative in nature. The Kuso narrative does not presume specific knowledge of some other object being invoked. Instead, it produces a redolent relationship where the different objects mutually explain each other. Like any cyberspatial form, Kuso seems to produce a system of self-referential, almost cannibalistic meaning making where a range of objects seem to co-exist in improbably frames of non-real and in-credible, each forming a node through which the others are understood. The references Kuso makes in its narrative, are not to the other, original object in a wistfully reconstructed or imagined past but to the other back-tracking objects present in the narrative itself. This produces an almost infinite chain of inter-referencing objects that justify each others’ existence. Kuso thus disrupts the more linear and historical constructions that parody (and the subsequent attempts to read parody as a relationship between new digital cinema and Cinema) establishes. It is located in the materiality of the object, its reception, its manipulation, its distribution, its transformation and its ability to escape the more effective-causal circuits of meaning making.&lt;/p&gt;
&lt;p&gt;While parody seeks to reaffirm the similarities between the original and the discursive objects, Kuso emphasises the inability of the original to explain the discursive, thus producing a relationship of difference rather than one of similarity. While parody deals with the questions of representation, Kuso enters into conditions of simulation. It is this evocative relationship that allows me to locate Kuso as an aesthetic of understanding New Digital Cinema in Asia and to materialise it as a lifestyle and as a condition of reception in the body of the Asian consumer.&lt;/p&gt;
&lt;h3&gt;Politicising Kuso&lt;/h3&gt;
&lt;p&gt;An uncontextualised notion of Kuso only allows for a relationship at the level of the Parodic. Hence, the discussants of the Backdorm Boys were always in a condition of unintelligibility about why these slightly clownish characters would become imitable heroes for a particular generation. Given the highly polarized nature of political orientations in Taiwan, it has been the despair of many educators and practitioners that the Strawberry Generation, which is also the largest subscriber base to Kuso, has no apparent interest in politics. It is a generally lamented as a generation that is unashamedly devoted only to having fun. I propose, in my reading and understanding of Kuso objects and Kuso as an aesthetic, that the participatory and performative nature of Kuso paradigm, offers space for negotiation and expression of political intent. I shall demonstrate this particular argument at two levels – the level of the body and the personal, and at the level of the public and the national.&lt;/p&gt;
&lt;p&gt;The question of the body becomes central to almost all representation studies. Analysis of Kuso videos or objects lends itself easily to see how the accessorisation and the freedom to produce unsupervised spectatorial narratives of the self lead to new spaces of negotiation. There is also, very clearly, a definite deconstruction of the traditional, masculine and often imported forms of masculinity, femininity and sexuality which the videos lend themselves to. Cross dressing, excessive make-up, exaggerated actions, etc. all create a fluid world where gender structures used to define the body are dismissed and indeed, enter into parodic relationship with traditional perceptions or expectations. However, for the scope of this paper, I shall more narrowly focus on the construction of the heroic body in the Kuso videos.&lt;/p&gt;
&lt;p&gt;The body comes to materialise Kuso through various practices and becomes the site upon which the Kuso self is enacted. As Kuso celebrates the flaws and exaggerates the imperfections, it allows for a certain masked relationship between the private self and the public politics. As is demonstrated in the case of the Backdorm Boys, Kuso, with its self referential boundaries, allows for a critical engagement with the very practices of the generation that subjects them to sever criticism. The Kuso bodies or the narratives of self are not longer in relation with the imagined body of the star or the aura of the star vehicle but in masked relationship with the larger politics of its time. The bewilderment or unintelligibility that the discussants of the Backdorm videos exhibit, is not particularly about why or how the video was created but how heroism or stardom was created by the celebration of the un-iconic or the unheroic.&lt;/p&gt;
&lt;p&gt;And it is to answer this question that we go back to the Strawberry Generation again. The Strawberry Generation in Taiwan was not merely marked by economic transitions and infidelity. It is also a generation that has seen a severely politicised state of nationalism and national identity in Taiwan. The younger generation that grew up after the removal of the martial law has engaged in serious consumerism as a part of their national identity. As Chen Kuan Hsing (1998) points out, ‘From 1994 onwards…the cultural atmosphere was mediated through commodity structures.’ Chen further goes on to explain how the political economy and the question of the national are intrinsically linked. Given the hegemonic presence of the West in the cultural galaxy of Taiwan and the constant negotiations between the political position vis-à-vis China as well as the cultural imperialism of Japan, the Taiwanese Strawberry Generation finds itself without a particular model of national identity to follow. Along with these are the allegations of widespread corruption and the complete disinterest of the current political parties in the ill-effects of liberalisation (Asian Economic News, 2007) which contribute to a high rate of mental ill-health and suicides in the Strawberry Generation (The China Post, 2008). Given such a murky situation, the Strawberry Generation has indeed withdrawn from active political participation of fighting in the streets and has taken to new forms of expression, which, outside of the context, appear as solipsistic or merely for fun.&lt;/p&gt;
&lt;p&gt;Kuso, as an aesthetic then, transcends the analysis of gender and sexuality, performativity and spectatorship, and becomes a site of national representation and subversion and the Kuso stars like the BackDorm boys embody these positions for a Strawberry Generation in Taiwan. The notion of flawed heroism, which simultaneously mocks the ubiquitous presence of the pop-culture from the West, the inability of the local cultural industries to produce original works of art, the apathy of the younger generation caught in the mechanisms of a liberalised globalisation, and the unavailability of spaces for political negotiations that they are built in. This is the defence that many of the Taiwanese and other Chinese speaking individuals produce on the discussions around Kuso. On the discussions on the Sinosplice blog, one of the most vocal defenders, John, who starts with calling this condition, a ‘rare talent’ goes on to say,&lt;/p&gt;
&lt;p class="callout"&gt;Have you ever tried to make a funny video? It’s much harder than you give these boys credit for. The fact that they were able to do it merely by lip synching is testament to their talent. If they’re using certain cultural expectations for humorous effect, then that’s further evidence of talent.&lt;br /&gt;(John, Sinosplice, 2005)&lt;/p&gt;
&lt;p&gt;However, John’s idea of ‘playing with cultural expectation’ remains a solitary voice. The other discussants go on to talk about how this particular series is only interesting because of the ‘freak value’ of the videos. Karen, another participant who introduces herself as a student in the West, writes&lt;/p&gt;
&lt;p class="callout"&gt;I have to reluctantly admit, as politically incorrect and offensive (sic) some of the comments may be, they are mostly valid in my opinion. I’m not saying that the “Back Dormitory Boys’” talent doesn’t play a part in why it’s so funny but the fact that the they’re Chinese with no doubt plays a huge role in the humour that that you could easily find elsewhere. How hard is it to find a few college students making goofball videos and putting them on the internet?&lt;br /&gt;(Karen, Sinosplice, 2005)&lt;/p&gt;
&lt;p&gt;The opinions that Karen and XiangChang express, resonate with the general perception of the BackDorm boys on many different discussion groups and media talks around the world. As they gained more popularity and exposure, there were more and more people exclaiming at why these antics were being heralded as heroic. However, there were no explanations which were forwarded. The interesting part is that a similar predecessor called the ‘Numa Numa Boy’ (Wolk, 2006), who also had a parodic relationship with the Romanian song, while he gained equal amounts of popularity, was not at the centre of any debate. His claim to fame was slapstick humour and very clearly complied with the Western understanding of parody. However, in the case of the Backdorm Boys, the debates continue as the existing understanding of parody as a universal value fail to account for the aura that surrounds them.&lt;/p&gt;
&lt;p&gt;Kuso, as a way of looking at it, offers that the Backdorm Boys were not mere imitators. Imitation would have been in them trying to do a representation of the original Backstreet Boys videos. Instead, the Backdorm Boys are in a world of simulation, where they are simulating the flawed masculinities and identities that are excluded within popular cultures. In this method of simulation, they are able to produce a new and perhaps more believable ‘reality’ which needs to be dealt with in the larger context of the production.&lt;/p&gt;
&lt;p&gt;The reason why Kuso makes garbage of things is because that is the only way to deal with the way things are – demolish them, look at their flaws, and find, within those flaws, interstices of negotiation and interaction, which are no longer available. The Kuso, refuses to identify a homogeneous way of understanding digital cinema on the web and insists on thus, contextualising the cultural products through their geo-political status. Because of the geographical origins of digital technologies – the West, and the generally assumed audience and paradigms of understanding it – the West again, most of these new digital cinema forms are looked upon as derivative or engaging in a parodic relationship with the original which is placed in the West. Kuso is a way of complicating the relationship between the two.&lt;/p&gt;
&lt;p&gt;This is the first step in thinking about ways in which one can formulate a digital aesthetic which does not presume a homogenised community online but asserts, not only the physical bodies that are behind the production of these narratives but also the geographical boundaries and socio-cultural locations, without which the objects become incomprehensible and indecipherable. Moreover, it is necessary to rescue such ‘popular’ ‘aesthetic’ forms from discussions that confine them to the realms of performance or solipsism and look at the larger potential they have in creating new conditions of political engagement. For Taiwan’s Strawberry Generation, Kuso is a lifestyle, by which they are able to establish discursive and subversive relationships with the very actions and practices which subject them to sever criticism. The wave of new digital cinema, streaming on a screen near us, thus emphasise the need to revisit the relationship between aesthetics and politics on the one hand and the connections between the universal and the contextual on the other.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;Asian Economic News. 2007. “Thousands Protest Against Taiwan President”. Retrieved on 5th March, 2007 from &lt;a class="external-link" href="http://findarticles.com/p/articles/mi_m0WDP/is_2007_Sept_15/ai_n27465185"&gt;http://findarticles.com/p/articles/mi_m0WDP/is_2007_Sept_15/ai_n27465185&lt;/a&gt;&lt;br /&gt;Kuan-Hsing, Chen. 2005. “Interview with Kuan-Hsing Chen” by Greert Lovink. Retrieved on 12th March, 2007 from &lt;a class="external-link" href="http://www.nettime.org/Lists-Archives/nettime-l- 9803/msg00002.html"&gt;http://www.nettime.org/Lists-Archives/nettime-l-&lt;br /&gt;9803/msg00002.html&lt;/a&gt;&lt;br /&gt;China Post, The. 2008. “Disturbing Suicide Rate Among Young People”. Retrieved on 11th August, 2008 from &lt;a class="external-link" href="http://www.chinapost.com.tw/editorial/taiwan%20issues/2008/08/01/168122/Disturbing-suicide.htm"&gt;http://www.chinapost.com.tw/editorial/taiwan%20issues/2008/08/01/168122/Disturbing-suicide.htm&lt;/a&gt;&lt;br /&gt;Fischer, Herve. 2006. The Decline of the Hollywood Empire. Tr. Rhonda Mullins. New York: Talon Books.&lt;br /&gt;Full Plate, The. 2008. “Back Dorm Boys: Where are they now?”. Retrieved on 18th March, 2008 from &lt;a class="external-link" href="http://escapetochengdu.wordpress.com/2008/02/24/back-dorm-boyswhere-are-they-now/"&gt;http://escapetochengdu.wordpress.com/2008/02/24/back-dorm-boyswhere-are-they-now/&lt;br /&gt;&lt;/a&gt;Gasser, Urs and John Palfrey. 2008. Born Digital: Understanding the first generation of Digital Natives. New York : Basic Books.&lt;br /&gt;Henrry. 2006. Retrieved on 5th March, 2008. from Michel Cheng’s blog for her Writing Class at NCCU, available at &lt;a class="external-link" href="http://nccujuniorwriting.blogspot.com/2006/06/weaknessesof-strawberry-generation_09.html"&gt;http://nccujuniorwriting.blogspot.com/2006/06/weaknessesof-strawberry-generation_09.html&lt;br /&gt;&lt;/a&gt;Ko, Yu-Fen. 2000. “Hello Kitty and the Identity Politics in Taiwan”. Retrieved on 10th January, 2007 from &lt;a class="external-link" href="http://www.international.ucla.edu/cira/paper/TW_Ko.pdf"&gt;http://www.international.ucla.edu/cira/paper/TW_Ko.pdf&lt;/a&gt;&lt;br /&gt;Lessig, Lawrence. 2008. “In Defence of Piracy”. The Wall Street Journal retrieved on 11th October 2008, available at &lt;a class="external-link" href="http://online.wsj.com/article/SB122367645363324303.html?mod=googlenews_wsj"&gt;http://online.wsj.com/article/SB122367645363324303.html?mod=googlenews_wsj&lt;br /&gt;&lt;/a&gt;Liang, Lawrence. Forthcoming. “A brief history of the internet in the 14th and the 15th Century”&lt;br /&gt;Lim, Myr. 2006. Retrieved on 5th March, 2008 from her blog titled ‘Wanderlust’ available at &lt;a class="external-link" href="http://myr_fashionstylist.blogs.friendster.com/myr/2006/08/strawberry_gene.html"&gt;http://myr_fashionstylist.blogs.friendster.com/myr/2006/08/strawberry_gene.html&lt;br /&gt;&lt;/a&gt;Mark Mclelland. 2006. “A Short History of Hentai”. Intersections: History and Culture in the Asian Context. Issue 12 http://intersections.anu.edu.au/issue12/mclelland.html&lt;br /&gt;Marvin, Carolyn.1990. When Old Technologies Were New: Thinking about Electric communication in the earliest 19th Century. London: Oxford University Press.&lt;br /&gt;Mitchell, William J. 1996. City of Bits: Space, Place and the Infobahn. Massachusetts: MIT Press&lt;br /&gt;Rachel. 2008. Retrieved on 5th March, 2008 from the National Central University’s (Taiwan) PR Team Page available at &lt;a class="external-link" href="http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys"&gt;http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys&lt;/a&gt;&lt;br /&gt;Yi-Li, Yeh. 2006. KUSO –Red, Spring Snow, Orange Flower. Taipei National University of the Arts, Taipei. Retrieved on 20th November, 2006 from &lt;a class="external-link" href="http://www2.tnua.edu.tw/etnua/modules/news/article.php?storyid=28"&gt;http://www2.tnua.edu.tw/etnua/modules/news/article.php?storyid=28&lt;/a&gt;&lt;br /&gt;Sinosplice. 2005. “Backdorm Boys”, a blog entry on a blog. Retrieved on 10th November 2006 from &lt;a class="external-link" href="http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys"&gt;http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys&lt;/a&gt;&lt;br /&gt;Turkle, Sherry. 1996. Life on the screen: Identity in the age of the internet. London: Weidenfeld and Nicolson.&lt;br /&gt;Weinberger, David. 2007. Everything is Miscellaneous The Power of the new digital disorder. New York : Times Books.&lt;br /&gt;Wolk, Douglas. 2006. “The Syncher, Not the Synch : The irresistible rise of the Numa Numa Dance”. Retrieved on 10th November, 2007 from &lt;a class="external-link" href="http://www.believermag.com/issues/200606/?read=article_wolk"&gt;http://www.believermag.com/issues/200606/?read=article_wolk&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].A first draft of this article was first presented at the ‘New Cinemas in Asia’ conference organized by the Centre for the Study of Culture and Society at the Christ University, Bangalore. The paper owes its gratitude to S.V. Srinivas for his support both for my journey to Taiwan and for the confidence required to write such an essay on cultures and phenomena that I cannot with confidence claim to be my own.&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. The Jadavpur University Film and Media Lab, as recently as November 2008, organized a conference to discuss The Future of Celluloid,where, there were many engrossing presentations on what celluloid can mean in the digital age and where its futures reside. Ashish Rajadhyaksha, in his key-note speech, made a significant remark that the Celluloid is the original object that the digital shall always invoke in its manifestation; not merely in its aesthetics, which might change, but in the sheer capacity that the digital has to pay unprecedented attention to the moving image and reconstruct it for new meanings.&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. Hervé Fischer, in The Decline of The Hollywood Empire, arrives in a long line of prophets who have been announcing the demise and the end of Celluloid Cinema as we know it. Fischer announces, quite early in the book, ‘[d]igital distribution will end this archaic system of distribution and hasten the decline of the Hollywood Empire: Two giant steps forward for film in one fell step!’&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. The large undivided screen gets replaced by a small ‘Window’ on the right hand corner of the monitor which also houses various other contesting media forms that vie for the users’ attention. Sherry Turkle, in her study of MUD users also talks of how the Window has become a metaphor of our times.&lt;br /&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;].In a much more measured tone, Kim Soyoung, in her formulation of a trans-cinema and new public spheres simulated by Korean Cinema, suggests that ‘new digital cinema…attentive to the transformation of its production, distribution and reception modes as shown by independent digital filmmaking and its availability on the net’. She further goes on to propose ‘digital and net, cinema LCD screens (installed in subways, taxis and buses) and gigantic electrified display boards (chonkwangpan in Korean) should be seen as spaces into which cinema theories and criticism should intervene.’ This paper adds to the list, the extremely personalised but virtually public and shared space of the computer monitor and portable media devices.&lt;br /&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. In another essay exploring the aesthetics of social networking and blogging (especially with the increasing implementation of Web 2.0), I make a claim at these sites being sustained through a constant and incessant production of both the virtual persona of the author as well as the body of the author that serves as an anchor to the virtual reality. I further suggest that this process of continuous translation leads to the self as being recognised and gratified only in a state of performativity over inter-looped surfaces.&lt;br /&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. Lawrence Liang, in his forthcoming essay, “The History of the Internet from the 15th to the 18th Century”, examines the history of the print and pre-print cultures, to make a brilliant argument around the questions of knowledge, the authority of the knowledge, and the problems of legitimacy or authenticity that have surrounded the Wikipedia in recent years.&lt;br /&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. The anxiety around such objects primarily circulates around questions of copyright infringements and piracy. The Music And Film Independent Association, for instance, claims that due to the re-mix, unlicensed distribution, and/or re-working of their material, they are suffering a heavy financial loss, leading to ridiculous legal cases that seem to hold no legitimacy in their sense or sensibility. Lawrence Lessig looks at a recent controversy on youtube where a mother, who broadcast digital moving images of her 13 month old son dancing to Prince’s song Let’s go Crazy was accused of copyright violation by the License owners who demanded the withdrawal of the video from YouTube.&lt;br /&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. In A short History of Hentai, Marc Mclelland, defines Hentai as follows: “Hentai is a Sino-Japanese compound term widely used in modern Japanese to designate a person, action or state that is considered queer or perverse, particularly in a sexual sense. Unlike the English term 'queer', however, hentai does not have predominantly homosexual connotations but can be used to describe any sexual acts or motivations other than what might be termed 'normal' sexual relations. Indeed the loanword nōmaru (normal) is sometimes used as an antonym for hentai. Apart from this general use of the term hentai, it can also be used to designate a specific genre of Japanese manga and animation that features extreme or perverse sexual content and it is in this sense that hentai has become well-known among western fans of Japanese popular culture.”&lt;br /&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Professor Yu-Fen Ko (2000) at the Hsih-Shin University in Taipei, locates similar receptions of the ‘Hello Kitty’ phenomenon in Taiwan. Yu-Fen Ko examines how, the larger reception of popular cultural artifacts fail to look at the political potential that these objects have in the way they reconfigure the existing relationship between the personal and the political.&lt;br /&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. This paper owes great intellectual and emotional debt to many people. Mandy Hua, who, apart from teaching me Chinese, also helped me get introduced to the intricacies of youth fashion and trends in Taiwan. Ted Cheng, who introduced me to many different Kuso objects and helped, whenever my own skills at access or analysis flailed. Amie Parry, Naifei Ding, David Barton, Chen Kuan-Hsing and Josephine Ho who made my stay in Taiwan so fruitful, providing emotional support, and listened to me patiently, correcting me when I was wrong and directing me to people and resources that helped me frame this argument and understand the entire new digital cinema phenomenon in a new light.&lt;br /&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. After much screening and watching of Indian movie songs from Bollywood, we finally narrowed down to “Kajrare Kajrare” from the movie Bunty aur Bubly, with Aishwarya Rai doing a special dance number.&lt;br /&gt;[&lt;a name="fn1" href="#fr13"&gt;13&lt;/a&gt;]. The particular video can be viewed at &lt;a class="external-link" href="http://tw.youtube.com/watch?v=9NlZaDGPEOg"&gt;http://tw.youtube.com/watch?v=9NlZaDGPEOg&lt;/a&gt; The original video that is supposed to make this particular kind of Kuso-streaking is the video which also shot two young men into becoming Television celebrities and can be viewed at http://tw.youtube.com/watch?v=0caIbkYfWTY&lt;br /&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. One of the most popular icons of such consumption is in the popularity of Hello Kitty – a young female cat without a mouth (and hence without speech or the need to eat) - and has elicited much popular discourse. An example of how Hello Kitty is used as a way of also resisting the Western, Disneyfied, Barbie concepts of femininity can be seen in the video available at &lt;a class="external-link" href="http://www.youtube.com/watch?v=JFBHPbEtfqA"&gt;http://www.youtube.com/watch?v=JFBHPbEtfqA&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. LOLCat started as an internet meme which displayed a set of cat pictures, with cheeky captions, parodying ot only the internet slang known as ‘netspeak’ but also reflecting upon how central internet discussions and arguments were to the lives of the digital natives. Some of the most famous examples of LOLCat captions are ‘I can haz cheezburger’, ‘Ceiling Cat’ and then subsequently ‘Basement Cat’. More information and almost an exhaustive range of pictures can be seen at &lt;a class="external-link" href="http://icanhascheezburger.com/"&gt;http://icanhascheezburger.com/&lt;/a&gt; More interesting LOLCat phenomena also include the under construction LOLCat Bible translation project available at&lt;br /&gt;&lt;a class="external-link" href="http://www.lolcatbible.com/"&gt;http://www.lolcatbible.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. ‘All your base are belong to us’ started as a successful parody of the obsession with UFO and space travel in the late nineties. The meme borrows this slightly cryptic line from European Sega Mega Drive Version of the video game Zero Wing, where it signified victory and total takeover of enemy territories by aliens, and specializes in putting up the caption on different familiar images taken from contemporary as well as historical times. A large collection of ‘All your base are belong to us’ images can be found at &lt;a class="external-link" href="http://www.allyourbasearebelongtous.com/"&gt;http://www.allyourbasearebelongtous.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. A full list of their videos is available to view and download at &lt;a class="external-link" href="http://twochineseboys.blogspot.com/"&gt;http://twochineseboys.blogspot.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. A quick glimpse of their popularity can be obtained on fan and internet monitoring sites like &lt;a class="external-link" href="http://www.milkandcookies.com/tag/backdormboys/"&gt;http://www.milkandcookies.com/tag/backdormboys/&lt;/a&gt; and &lt;a class="external-link" href="http://www.tian.cc/2005/10/asian-backstreetboys.html"&gt;http://www.tian.cc/2005/10/asian-backstreetboys.html&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. This trajectory from Reality TV to popular cultural icons is not unfamiliar or new. Various popular shows like American Idol in the USA, Big Brother in the UK, SaReGaMaPa in India, and Kuso Kuso in China, have all spawned instant celebrities who have cashed their media presence and fame to bag roles in featured television programming, cinema, etc. This particular ability of making one’s self popular and recognizable, often by using the internet as a medium for the same, and then penetrating more corporatized and affluent mass media markets, is a ploy that many aspiring media professionals are employing these days.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/now-streaming-nearest-screen.pdf/view" class="external-link"&gt;Click &lt;/a&gt;for the &lt;img alt="" /&gt; PDF document, 297 kB (305086 bytes) &lt;br /&gt;&lt;a class="external-link" href="http://www.intellectbooks.co.uk/journals/view-Article,id=8200/"&gt;Click &lt;/a&gt;to read the original published in the Journal of Chinese Cinemas, Volume 3, Issue 1, June 2009&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/streaming-on-your-nearest-screen'&gt;https://cis-india.org/internet-governance/streaming-on-your-nearest-screen&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-12-24T08:58:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges">
    <title>Asia in the Edges: A Narrative Account of the Inter-Asia Cultural Studies Summer School in Bangalore</title>
    <link>https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges</link>
    <description>
        &lt;b&gt;The Inter-Asia Cultural Studies Summer School is a Biennial event that invites Masters and PhD students from around Asia to participate in conversations around developing and building an Inter-Asia Cultural Studies thought process. Hosted by the Inter-Asia Cultural Studies Society along with the Consortium of universities and research centres that constitute it, the Summer School is committed to bringing together a wide discourse that spans geography, disciplines, political affiliations and cultural practices for and from researchers who are interested in developing Inter-Asia as a mode of developing local, contextual and relevant knowledge practices. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This is the narrative account of the experiments and ideas that shaped  the second Summer School, “The Asian Edge” which was hosted in  Bangalore, India, in 2012. The peer reviewed article was &lt;a class="external-link" href="http://dx.doi.org/10.1080/14649373.2014.911462"&gt;published in Inter-Asia Cultural Studies&lt;/a&gt; Journal, Volume 15, Issue 2, on July 3, 2014. &lt;a href="https://cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf" class="external-link"&gt;Click to download the file&lt;/a&gt;. (PDF, 95 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;At the heart of the Inter-Asia Cultural Studies (IACS) project has been a pedagogic impulse that seeks to train young students and scholars in critical ways of thinking about questions of the contemporary. The ambition of developing an “Asian way of thinking” is not merely a response to the hegemony of North-Western theory in thought and research, especially in Social Sciences and Humanities. It is also a way by which new knowledge is developed and shared between different locations in Asia, to get a more embedded sense of the social, the political and the cultural in the region. Apart from building a widespread network of researchers, activists, academics and artists who have generated the most comprehensive and critical insights into developing ontological and teleological relationships with Asia, there have always been attempts made to integrate students into the network’s activities. From student pre-conferences that invited students to build intellectual dialogues, to subsidies and fellowships offered to allow students to travel from their different institutions across Asia, various initiatives have inspired and facilitated the first encounter with Asia for a number of young researchers who might have lived in Asian countries but not been trained to understand the context of what it means to be in Asia. Over time, through different structures, such as the institutionalisation of the &lt;em&gt;Inter-Asia Cultural Studies&lt;/em&gt; Journal and the growth of the eponymous conference, the IACS has already expanded the scope of its activities, involving new interlocutors and locations in which to grow the environment of critical academic and research discourse.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Building upon the expertise and networks of scholarship developed for over a decade, the IACS Society initiated the biennial Inter-Asia Cultural Studies Summer School, in order to engage younger scholars and students with some of the key questions that have been discussed and contested in the cultural studies discourse in Asia. The IACS Summer School that began in 2010 in Seoul, is a travelling school that moves to different countries, drawing upon local energies, resources and debates to acquaint students with the critical discourse as well as the experience of difference that marks Asia as a continent. The summer school in 2012 was hosted jointly by the Centre for the Study of Culture and Society and the Centre for Internet and Society in Bangalore, India, in collaboration with the Centre for Contemporary Studies at the Indian Institute of Sciences.&lt;a name="fr1" href="#fn1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For a snapshot of the Summer School, see Table 1 below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table 1. The 2012 Inter-Asia cultural studies summer school: a snapshot&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Core course: Methodologies for Cultural Studies in Asia (2–11 August, 2012)&lt;br /&gt;Optional courses&lt;br /&gt;The Digital Subject / Technology, Culture and the Body (13–16 August, 2012)&lt;br /&gt;Language of Instruction: EnglishHomepage: &lt;a class="external-link" href="http://culturalstudies.asia/?page_id=86"&gt;http://culturalstudies.asia/?page_id=86&lt;/a&gt;&lt;br /&gt;Organisers: Centre for the Study of Culture and Society, Bangalore; The Centre for Internet &amp;amp; Society, Bangalore&lt;br /&gt;Host: Centre for Contemporary Studies, Indian Institute of Sciences, Bangalore&lt;br /&gt;Co-organisers: Consortium of Inter-Asia Cultural Studies Consortium Institutions; Institute of East Asian Studies, Sungkonghoe University, Korea&lt;br /&gt;Course Coordinators: Nitya Vasudevan &amp;amp; Nishant Shah&lt;br /&gt;Number of Students: 35 students from 12 Asian countries&lt;br /&gt;Number of Faculty: 17 from 5 Asian countries&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Plotting Edges: The Rationale&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The second summer school, hosted in August 2012, with the support of the Inter Asia Cultural Studies Consortium and the Institute of East Asian Studies, was entitled “The Asian Edge.” We decided to stay with the metaphor of the Edge because it allowed us to experiment, both conceptually and in process, with new modes of engagement, interaction, knowledge production and pedagogy. The idea of an Asian Edge was interesting because it signalled a de-bordering of Asia. The Edge is also an inroad into that which might have remained invisible or inscrutable to those outside of it. The imagination of an Asian Edge brings in both the imaginations of geography as well as the notion of extensions, where Asia, especially in this hyper-real and geo-territorial age does not remain contained within the national boundaries. Within the Inter-Asia discourse, there has been a rich theorisation around what constitutes Asia and what are the ways in which we can reconstruct our Asianness that do not fall in the easy “Asian Studies” mode of being defined by the West as the ontological reference point. Chen Kuan-Hsing’s (2010) argument in &lt;em&gt;Asia as Method&lt;/em&gt;, where he argues that Asia is a construct that emerged out of the Cold War and needs to be deconstructed and unpacked in order to understand the different instances and manifestations of India, have captured these dialogues quite comprehensively. Similarly, Ashish Rajadhyaksha’s (2009) landmark work &lt;em&gt;Indian Cinema in the time of Celluloid &lt;/em&gt;marks how questions of nationalism, modernity, governance and technology have been peculiarly and particularly tied to cultural objects and industries such as cinema, not only in negotiations with the post-colonial encounters of India with its erstwhile colonial masters but also with the different locations and imaginations of India. Chua Beng-Huat (2000) in Consumption in Asia similarly points at the ways in which Asia works at different levels of materiality and symbolism, creating communities, connections and commerce in unprecedented ways, not only within Orientalist imagination but in Asia’s own imagination of itself. The Asian Edge was also a way of introducing new thematic interventions in the Inter-Asia Cultural Studies discourse. While the IACS project has invited and initiated some of the most diverse and rich conversations around cultural production—ranging from creative industries to cultural politics; from cultural objects to flows of consumption and distribution—we haven’t yet managed to shift the debates into the realm of the digital. The emergence of digital technologies has transformed a lot of our vocabulary and conceptual framework, but we haven’t been able to translate all our concerns into the fast-paced changes that the digital ICTs are ushering into Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With this summer school, we wanted to introduce the digital and the technological as a central trope of understanding our existing and emerging research within inter-Asia cultural studies. And the edge, borrowing from the Network theories that have their grounds in Computing, Actor-Network modelling and ICT4D discourse, gives us another way of thinking about Asia. As the computing theorist Duncan Watts (1999) points out in his model of our universe as a “small world”, the edge, within networks is not merely the containing limit. It is not the boundary or the end but actually the space of interaction, communication and exchange. An edge is the route that traffic takes as it moves from one node to another. Edges are hence tenuous, they emerge and, with repetition, become stronger, but they also die and extend, morph and mutate, thus constantly changing the contours of the network. The ambition was to refuse the separation of technology from the Cultural Studies discourse, introducing what Tejaswini Niranjana in her work on Indian Language education and pedagogy calls “Integration” (Niranjana et al. 2010) rather than “interdisciplinarity”. It was also to provide a different historical trajectory to technology studies, what science and technology historians Kavita Philip, Lily Irani, and P. Dourish (2010) call “Postcolonial Computing.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Asian Edge then became a space where we could consolidate the knowledge and key insights from the Inter-Asia Cultural Studies discourse, but could also open it up to new research, new modes of engagement, and new questions that need the historicity and also the points of departure. These ambitions had a direct impact on both the structure of the Summer School as well as the processes that were subsequently designed&lt;br /&gt;to implement it.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The core course: methodologies for cultural studies in Asia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Inter-Asia Summer School in Bangalore thus had some distinct ambitions, which were reflected in its structure. While it wanted to reflect the rich heritage of scholarship that has been produced through the decade-long interventions, and give the participating students a chance to engage with these intellectual stalwarts of Asia, it also wanted to reflect some of the more cuttingedge and future-looking work that is also a part of the movement’s younger scholars. Hence, instead of going with the traditional model where the pedagogues teach their own text, explaining the nuances and intricacies of their work, we decided to stage a dialogue between the existing scholarship and emerging work. The curriculum for the summer school was designed by Dr Tejaswini Niranjana, Dr Wang Xiaoming and Nitya Vasudevan, to form the first Inter- Asia Cultural studies reader, reflecting the various trends and debates around different themes that have occurred in the movement. The reader, which served as a basic textbook for the summer school, and has plans to be bilingual (English and Mandarin Chinese), introduced historical thought, critical interventions and conceptual frameworks drawn from different locations within Asia. The reader not only incorporated the scholars whose work has shaped the Inter-Asia cultural studies movement but also the formative modern thought that has been central to the social, cultural and political theorisation in Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, instead of inviting the scholars whose work has been central to the Inter-Asia Cultural Studies thought, the instructors for the courses were younger critical scholars who are building upon, responding to and entering into a dialogue with the work prescribed in the curriculum. The pedagogy, hence, instead of becoming a “lecture” that synthesises earlier work, became a threeway dialogue, where the students and the instructors were responding to common texts, not only in trying to understand them but also in the context of their own work and interests. Moreover, each session was co-taught, by instructors from different disciplines, locations and geographies, to show how the same body of work can be approached through different entry points and pushed into different directions. The classroom hours, thus became a “workshop” space where the students and the faculty were engaging in a dialogue that sought to make the historical debates relevant to the discussions in the contemporary world. They also showed how the older questions persist across time and space, and that they need to be engaged with in order to make sense of the world around us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, the Summer School classroom was designed as a space for collaborative pedagogy. The morning discussions around texts from the readers were followed by students presenting their work as a response to the texts prescribed for the day. Taking up a pecha-kucha format, it invited students to introduce themselves, their work, their context and their interventions and to open everything up for response and dialogue. The ambition was to build a community of intellectual support and interest, so that the students not only forge an affective bond but also a sense of collaboration and commonality in the work that they are already pushing in their existing research initiatives. The faculty for the day, along with some of the senior scholars also attended these presentations and helped tie in some of the earlier questions that might have emerged in the class, to the new material that was being introduced in the space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While this dialogue around new research was fruitful, we also were aware that there is a huge value in getting the students to interact with some of the more formative scholars whose work was prescribed in the curriculum. Hence, alongside the classrooms, we also hosted three salons that brought some of the significant scholars from the Inter-Asia movement into a dialogue with each other, as well as into a conversation with local intellectuals and activists. The first salon, organised at the artist collaborator 1 Shanthi Road, saw Chen Kuan-Hsing and Tejaswini Niranjana, discussing the impulse of the Inter-Asia movement. Charting the history, the different trajectories and the ways in which it has grown, both through friendships and networks, and intellectual interventions and collaborations, the conversation gave an entrypoint to younger scholars in understanding the politics and the motivation of this thought journey. The second salon, organised at the Alternative Law Forum, had Ding Naifei (Taiwan) and Firdaus Azim (Bangladesh) in conversation with legal sexuality and human rights activists Siddharth Narrain and Arvind Narrain (India) to unpack the politics of rights, sexuality, modernity and identity in different parts of Asia. The third salon, hosted at the Centre for Internet &amp;amp; Society, saw Ashish Rajadhyaksha (India) in conversation with Stephen Chan (Hong Kong) looking at questions of infrastructure, sustainability and the new role that research has to play in non-university and non-academic spaces and networks. The salons were designed to be informal settings for conversations and socialising, giving the summer school students access to the senior faculty outside of the classroom setting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school also wanted to ensure that the students were introduced to the materiality and the texture of the local, to understand the different layers of modernity and habitation that the IT City of Bangalore has to offer. Hence a local tour, charting the growth of Bangalore from a sleepy education centre to the burgeoning IT City that it has become, guided by curator and artist Suresh Jairam, was included as a part of the teaching. The four-hour walking tour laid bare the different contestations and layers of an IT city in India, showing the liminal markets, local cultures of production, and the ways in which they need to be factored into our images and imaginations of modernity and the IT City. Along with these, there were student parties arranged in different local clubs and institutions of Bangalore, to offer informal spaces of socialising for the students but also to give them a glimpse of what public spaces and cultures of being social might look like in a city such as Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summer school found a new richness because two of the days were twinned with a workshop on Culture Industries, supported by the Japan Foundation, which became a pedagogic space for the summer school participants. The students had a new focus introduced to their work and a chance to meet other scholars and activists in the field from Asia, who presented their work as part of the Summer School. The creative industries workshop also afforded a chance for students to form new connections and collaborations with projects and research initiatives that were being discussed in that forum.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These different components were thus designed and put together as a part of the core course for the Inter-Asia Summer School in Bangalore. Each component had a specific vision and was designed to offer different spaces of learning, pedagogy and interaction for everybody included. The core course was an overview of the diversity and exchange that are parts of the Inter-Asia movement. The course ended with a “booksprint” model where the students, inspired by the conversations at the summer school, were given a day to submit written work that would capture their own learning and growth in the process. The submissions could take the form of an academic essay, a sketch towards a research essay, a blog entry summarising key events from a particular conversation, or a narrative summary of the key points in their own research and how it relates to the conversations at the Summer School. While the core course was compulsory for all the participants, the Summer School also offered two optional elective courses, which the students could opt for after the core course was concluded. The optional courses were designed to introduce students to work and debates that had not yet emerged centrally in the Inter-Asia debates, but were part of their current conversations.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;New nodes: Optional courses: the digital subject/technology, culture and the body&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The optional courses, which lasted for four days, were a way of introducing the students to some new core debates that are emerging in the Cultural Studies discourse. The courses were designed to specifically concentrate on how the older questions and frameworks are being reworked with the emergence of digital technologies, thus helping students to consolidate their own work and also engage with research initiatives across different parts of Asia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first optional course, entitled “The Digital Subject,” was coordinated by Nishant Shah and had lectures by Ashish Rajadhyaksha and Lawrence Liang. It proposed to account for the drastic changes in the relationships between the State, the Citizen and the Markets with the rise of digital technologies in the twenty-first century. The course proposed that as globalisation consolidates itself in Asia, we see changes in the patterns of governance, of state operation, of citizen engagement and civic action. We are in the midst of major revolutions in the Middle East and North Africa, powered by digital social change, some headed by cyber-utopians specialising in Web 2.0 and Social media. Phrases such as “Twitter Revolutions” and “Facebook Protests” have become very common.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Instead of concentrating only on the newness of technology-mediated change, there is a need to engage with the changing landscape of political subjectivity and engagement through a reintegration of science and technology studies with cultural studies and social sciences. The course thus posited certain questions that need to be addressed, within the domain of cultural studies, around the digital: what does a digital subject look like? What are the futures of existing socio-cultural rights based movements? How do digital technologies produce new interfaces for interaction and mobilisation? How do we develop integrated science-technologysociety approaches to understand our technology-mediated contemporary and futures?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through a series of seminars, workshops, film screening, lectures, and fieldtrips, the course challenged the students not only to look at new objects of the digital but also to ask new questions of the old, inspired by the new methods and frameworks that the digital technologies are opening up for us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second optional course entitled “Technology, Culture and the Body” was coordinated by Nita Vasudevan and had Audrey Yue, Ding Naifei, Tejaswini Niranjana, Wing-Kwong Wong, and Hsing-Wen Chang as instructors. The course began with a hypothesis that, at this moment in history, we seem to be embedded in what Heidegger calls “the frenziedness of technology.” Hence, now more than ever, it is important that we try to understand how the gendered body relates to technology, and what this means for the domain of the cultural. For instance, what are the freedoms that technology is said to offer this body? What are these freedoms posed in opposition to? How do we understand technological practice contextually, both historically and in the contemporary? Is it possible to have a notion of the body that is outside technology, and a notion of technology that is outside cultural practice?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The course called for a move away from the idea of technology as a tool used by the human body, or the idea of technology as mere prosthesis or extension, to map the different ways of understanding the relationship&lt;br /&gt;between culture, technology and the body, specifically in the Asian context. It will involve examining practices, cultural formations and understandings that have emerged within various locations in Asia. The course engaged the students in closereadings of key events and texts, hosted workshops to present and critique their own work, and think of collaborative pathways towards future distributed research and pedagogic initiatives that can emerge within the Inter-Asia space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Both courses had additional assignments that included close-reading of texts, practical field work, critical reflection and collaborative projects completed during the span of the course.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Tying things up: key learnings&lt;/h3&gt;
&lt;p&gt;The Second Inter-Asia Cultural Studies Summer School was an ambitious structure, and while there were logistical hiccups in the implementation, there were some key learning aspects that need to be highlighted.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Working with tensions&lt;/em&gt;. Asia is not a homogeneous unified entity. There are several geo-political tensions that mark the relationships between different countries in Asia. While the academic protocol and individual interest in learning more can help negotiate these tensions, these tensions do play out in different linguistic, cultural and emotional unintelligibility, which becomes part of the pedagogic moment in the Inter-Asia classroom. Orienting the instructors to these tensions, and trying to build a collaborative environment where the students appreciate these tensions and learn to communicate with each other and engage with the different contexts is extremely valuable. In the summer school, we had students helping each other with translation, providing new contexts and critiques for each other’s work, and learning how to engage with the palpable difference of somebody from a different country. These tensions can sometimes slow the content and discussions in the classrooms, but taking it up as a collective challenge (rather than just thinking of it as a logistical problem where students not fluent in English need to be given tools of translation) made for a productive and rich learning environment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Ownership of community structures&lt;/em&gt;. When young scholars from different parts of the world are thrown together for such an intense period of time, it is inevitable that there will be bonds of friendship and belonging that grow. We had debated about whether we should invest in doing online community building by creating platforms, discussion boards and other structures that accompany digital outreach and coordination. However, apart from the initial centralization for applications and programming, we eventually decided to make the participants owners of these activities.’ to give a better sense of the ‘digital structures of community building’. And it was fascinating to see how they formed social networks, blogs, Tumblrs and other spaces of conversation among themselves, making these spaces more vibrant and diverse, thus leading to conversations beyond the summer school.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Infrastructure of participation&lt;/em&gt;. The Summer School was an extremely subsidised event thanks to the generous support of the Inter-Asia Cultural Studies Consortium, the Institute of East Asian Studies and the Indian Institute of Sciences, who helped in significantly reducing the costs of registration. The availability of travel fellowships, subsidies, scholarships, and an infrastructure of access cannot be emphasised enough in our experience. Owing to the subsidised costs, the living conditions and the logistics were not optimal. And while the students were extremely cooperative and accommodating with the glitches, we realised that better living conditions and amenities, especially for young students who are travelling to a different country for the first time, are as important as the classroom and the intellectual thought and design. Finding more resources to ease the conditions of travel and living will help build richer conversations inside and outside the classrooms. Sustained efforts to find more funding for a space for the IACS summer school need to be continued.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Selection processes&lt;/em&gt;. It was wanted to promote the Inter-Asia movement and hence a first preference was given to students who applied for the summer school through an open call for application. The students were asked to have references from people who have been a part of the movement, and also to send in a brief essay describing their expectations from the summer school. We were scouting for students—given that the numbers we could accept were limited—who were involved in not only learning but also in contributing to the social and political thought of the Inter-Asia movement. We also encouraged students who might not have been a part of a formal education system but are considering further education. Instead of building a homogeneous student base, there was an attempt made to find different kinds of students, from different locations, at different places in their own research work, and with different disciplines and modes of engagement. Scholarships and travel aid were offered to students who we thought deserved to be a part of the summer school but did not have access to university resources for participation. The diversity helped bring a more comprehensive compendium of skills and methods to the table.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Integration and relevance. Younger students often find it difficult to deal with historically formative texts from other contexts because they do not see how this responds to their context or is relevant to their work in contemporary times. Efforts at integrating the different cultures, showing the different trajectories of thought and research within Asia, and at locating the older texts in the context of modern-day research were hugely rewarding and more attempts need to be made to continue this process of making the historical archive of the Inter-Asia Cultural Studies Movement relevant and critical in new research.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Planning the futures. The participants had all indicated that post the Summer School, they would be excited to see what future avenues for participation there could be. With this summer school, we hadn’t looked at modes of sustained engagement with the participants. While they did take the initiative to communicate with each other, the momentum that was generated because of these discussions could not be captured in its entirety because we did not have any formal structures and processes to continue the engagement. Especially if the IACS summer schools are some sort of an orientation into the IACS movement, then there should be more systemic thought given to how those interested in engaging with the questions can do so, through their own academic and institutional locations, but also through different kinds of support structures that continue the conversations and exchange that begin at the Summer School.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Synergy with the local&lt;/em&gt;. For us, as well as for the students, the synergy with the local movements, activists, artists and research was fruitful and productive. One of the values of a travelling summer school is that every summer school can take up a particular theme that is locally relevant and weave it into the summer school. For Bangalore, it made logical sense for us to bring questions of Digital Technologies and Identity/Bodies into the course. Even within the core course, there was an effort to integrate these as key questions that open up new terrains of thought and research within Inter-Asia cultural studies. The optional courses, which were introduced for the first time, were exciting and generated a lot of interest and engagement from the participants. Attempts at creating these kinds of synergies need to be supported along with new and experimental modes of pedagogy and learning.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The Second Inter-Asia Cultural Studies Summer School was a great opportunity to harness the potentials of the incredibly rich and diverse network that the IACS movement has built up over more than a decade. For us, it also became a playground where, inspired by the hacker culture and DIY movements that dot the landscape of Bangalore, we experimented with different forms of learning and knowledge production. Involving the students as stakeholders in the process, engaging with them as peers, making them responsible for collaborative learning, and creating spaces of participation and socialisation helped us circumvent many of the problems of language and cultural diversity that might have otherwise crippled the entire process. Pushing these modes of interaction and integration, while also creating an environment of trust, reciprocity and goodwill, is probably even more important than the curriculum and teaching, because these interactions create new nodes and connections, with each student and his/her interaction creating new edges that will hopefully shape and contribute to the contours of critical thought and intervention in Asia.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Chen, Kuan-Hsing. 2010. &lt;em&gt;Asia as Method: Toward Deimperialization&lt;/em&gt;. Durham and London: Duke University Press.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Chua, Beng-Huat, ed. 2000. &lt;em&gt;Consumption in Asia: Lifestyle and Identities&lt;/em&gt;. London: Routledge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Philip, Kavita, Lily Irani, and P. Dourish. 2010. “Postcolonial Computing: A Tactical Survey.” &lt;em&gt;Science Technology Human Values&lt;/em&gt; 37 (1): 3–29.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rajadhyaksha, Ashish. 2009. &lt;em&gt;Indian Cinema in the time of Celluloid: From Bollywood to the Emergency&lt;/em&gt;. New Delhi: Combined Academic Publications.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Niranjana, Tejaswini, et al. 2010. &lt;em&gt;Strengthening Community Engagement of Higher Education Institutions&lt;/em&gt;. Bangalore: Centre for the Study of Culture and Society.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Watts, Duncan. 1999. “Networks, Dynamics, and the Small-World Phenomenon.” &lt;em&gt;AJS&lt;/em&gt; 105 (2): 493–527.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Author's Biography&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah is the Director of Research at the Bangalore-based Centre for Internet &amp;amp; Society, an International Tandem Partner at the Hybrid Publishing Lab, Leuphana University, and a Knowledge Partner with Hivos, in The Hague. He is the editor of the four-volume anthology Digital AlterNatives with a Cause? and writes regularly for the Indian newspaper The Indian Express and for the Digital Media and Learning Hub at dmlcentral.net. His current areas of interest are Digital Humanities, Digital Activism and Digital Subjectivity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. &lt;span class="discreet"&gt;A mammoth project such as the Inter-Asia Summer School requires resources, support and generosity from family, friends, and colleagues that can never be measured or cited in a note. However, there are a few people who need to be mentioned for their incredible spirits and the resources that they extended to us. Dr Raghavendra Gaddakar at the Centre for Contemporary Studies, Indian Institute of Sciences and his entire staff were patient and hospitable hosts, housing the entire summer school for over a fortnight. The faculty, students and staff at the Centre for the Study of Culture and Society (CSCS) Bangalore helped in designing courses, finding venues and organising events that added to the richness of the summer school. Raghu Tankayala and Radhika P, both at CSCS were our rocks through this process, taking up a lion’s share of logistical arrangements. The help of the entire staff at the Centre for Internet and Society, who were there every step, helping with every last detail, and the Executive Director Sunil Abraham who lent us infrastructure and financial support to organise various events and salons, is unparalleled and I know I would have found it impossible to work without the knowledge that they would always be there to watch my back. All the instructors who agreed to join the teaching crew made this summer school what it became (a full list can be found at &lt;a href="https://cis-india.org/internet-governance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-governance/iacs-summer-school-2012&lt;/a&gt;). Both Nitya Vausdevan and I owe a huge amount of gratitude to the IACS society and the Consortium, as well as the stalwarts of the IACS movement who put faith in our vision, and pushed us, supported us, inspired us and helped us to carry out the different things we had planned. The local partners who make our life worth living—friends and colleagues at 1 Shanthi Road and The Alternative Law Forum—have been our rocks and we cannot thank them enough for their support and encouragement. A special thanks to Daniel Goh, who apart from being a faculty member, also helped us put together the website to manage the workflow for the entire project.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. &lt;span class="discreet"&gt;A full list of instructors and the prescribed curriculum can be found at &lt;a href="https://cis-india.org/internet-overnance/iacs-summer-school-2012" class="external-link"&gt;http://cis-india.org/internet-overnance/iacs-summer-school-2012&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges'&gt;https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Inter-Asia Cultural Studies</dc:subject>
    
    
        <dc:subject>Peer Reviewed Article</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-14T12:47:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend">
    <title>Who’s that Friend?</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend</link>
    <description>
        &lt;b&gt;If you are reading this, stand on your right foot and start hopping while waving your hands in the air and shouting, “I am crazy” at the top of your voice. If you don’t, your Facebook account will be compromised, your passwords will be automatically leaked, and somebody will use your credit card to smuggle ice across international waters.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: left; "&gt;Nishant Shah's column was published in the &lt;a class="external-link" href="http://www.indianexpress.com/news/who-s-that-friend-/1011997/0"&gt;Indian Express&lt;/a&gt; and in the  &lt;a class="external-link" href="http://www.financialexpress.com/news/who-s-that-friend-/1011997/0"&gt;Financial Express&lt;/a&gt; on October 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have all received messages of this order — if not exactly this much silliness — on the various social networks that we belong to. These are messages that warn us that our security is breached, our data is unsafe, that our transactions are public, and all the sensitive information we have trusted to the different platforms on the Web, is now up for grabs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The best of us have fallen prey to such messages of alarm, and have “shared”, “liked”, or “retweeted” them, and in retrospect felt foolish when we realised that the message was just a hoax. For those of us who are savvy with the ways of the Web, even when we are sending these messages, there is an instinctive feeling that something is wrong, but we do it nevertheless, joining the ranks of conspiracy theorists who make this world enchanting and mysterious in its quotidian banality. These messages are common, harmless and habit-forming — they spread, even when we recognise that they are not completely plausible — because we have formed habits online, which we immediately perform, before rational thought or reason sets in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a recent Thought Marathon on “Habits of Living”, supported by Brown University and organised by the Centre for Internet and Society, a handful of scholars, artists, practitioners and researchers examined how such habits shape the world of the digital. One of the concerns about such habits of viral dissemination is about the design of trust and the nature of friendship in our social networking systems. How do you trust information online? What is the information that uses you as a conduit, disseminating through you into the network? What role do we play in keeping these messages alive, by spreading them, by talking about them, by retracting and discussing them, giving them more value than they could muster on their own?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the centre of all these questions is the idea of proximity, intimacy and friendship. Within the social Web, we have all become “friends”. The six degrees of separation have fallen — every lurker is a potential friend, just waiting to be authenticated by a system, tagged in a photo, connected by a weak link of interest or closeness. These friends are our social safety nets on the Net. They give us a sense of belonging and safety when we are committing our intensely personal and private data on the publically private digital platforms. Despite knowing that information we produce online is going to be archived in servers over which we have no control, in forms and formats that will outlive our social relations and indeed, our very lives, we constantly produce data that quantifies and marks our social relationships. We commit secrets and private thoughts to “friends” in the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, friendship within the social network is a non-reciprocal one-way transmission of secrets. The covenant of digital friendship on Facebook is that we pass on a secret to a friend, knowing well, that the act of passing on the secret expects a betrayal of that secret. The information that we submit to somebody to show our trust, has already been witnessed, stored, archived and mapped by the code and algorithms that make that system. Which is why, we live in constant fear of our data being compromised by the “system” which is both vulnerable and fragile. Which is why, we are continually bombarded by warnings of glitches in the matrix, outside of our control, reminding us of the fearful precariousness of being on the Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the trolling messages and the way they spread, remind us that in the system, it is the “friend” who is invariably the person who puts us in danger. There are almost no documented cases of a system endangering the person who shares information on the social Web. The leak in the network is always done through a human actor — somebody who is close to us, somebody who we trust — who invariably passes on that secret to another “friend” in the network. Similarly, the chances of your machine getting infected by a random virus by a stranger are very low. The people who infect you are those you trust, because you receive information from them without questioning it. An attachment in the email, a link to a dodgy site, instructions asking for personal details are all safe because we are naturally suspicious of strangers bearing candy. But when these questions come from our “friends”, we drop our guards and accept viruses, share personal data, give out compromising pictures, putting ourselves in conditions of threat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the fundamental paradox of the social Web — that those who we trust, are generally the primary sources who put us in danger, and yet, because we think of them as “friends”, we continue to trust them, while remaining suspicious of the systems that are far more benign than the humans in the network.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2012-11-04T06:46:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like">
    <title>Digital Habits: How and Why We Tweet, Share and Like</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like</link>
    <description>
        &lt;b&gt;There aren’t always rational explanations for the ways in which we behave on networks. While there are trend spotting sciences and pattern recognition methods which try to make sense of how and why we behave in these strange ways on networks, they generally fail to actually help us understand why we do the things that we do when we are connected.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.firstpost.com/tech/digital-habits-how-and-why-we-tweet-share-and-like-488701.html"&gt;originally published in FirstPost&lt;/a&gt; on October 12, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Recently, in a workshop on ‘Habits of Living’, organised by Brown University (USA) and the Centre for Internet and Society (Bangalore), a collection of researchers, artists, practitioners and educators came together to understand how networks form these habits that we take for granted in our digital lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Habits are unthinking, visceral actions that we do for survival within a network. They are things that we do without even realising that we are doing them – Liking a post, retweeting a tweet, sharing an interesting link, adding pictures on an album. These are all things we do without realising that they distract us from our work, need time, energy, and attention which we could have spent on other tasks. Instead of looking at these as actions which can be rationally explained, we might start looking at them as habits that shape the ways in which we trust, transmit and treasure information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Networks are everywhere these days. They are the things that we study and the lens through which we study the world around us. In the last week, I have faced three separate instances that reminded me of how we live in networked societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was the scare that the private messages on facebook have suddenly turned public and available on our timelines for everybody to view. The social network, these simulated fortresses of friendships and trust, suddenly became a place of danger. Conversations which were committed as acts of secrecy emerged as potentially compromising public acts. The network was in my face, blinking red, making me suddenly aware of the fact that the network is not merely something I can take for granted. It is something that works seamlessly for most of the time, is actually something that I cope with, negotiate with, and teach myself to live with, without realising it. The relationship I have with my social network is a lot of work but it gets explained away as ‘habits’ , which are such an everyday part of my digital life that I have stopped looking at it as work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second incident was when a friend complained about the hostility she faces when she is not on any of the popular social networks. As an outsider, who refuses by choice, to belong to either Facebook or Google Plus or many of the activity networks (like Instagram, for instance) around, she constantly gets a raised eyebrow, a pointed question and a look of incredulity when she confesses it to somebody. More often than not, she gets treated like digital pariahs, social outcast who is no longer ‘relevant’ in the current scheme of things. She was telling me about how hard she has to work to convince people that she belongs to the communities, even though not to these networks. And how, she is constantly afraid that while she plugs out, people might be saying things about her that she might want to hear but never get to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third is perhaps more common than we would agree to but it deals with multiple identities online. In the world of Wikipedia, there are people who use sock-puppets and meat-puppets, using multiple avatars and identities to make their point, to fake support for their arguments, and to build false consensus in order to win the edit wars that they are fighting. These puppets, that stand in as surrogate structures of real people, are not mere surface structures. They are fleshed out, have personalities, have styles and identities which the users invest in quite passionately. While the community frowns upon these false identities, and indeed social network platforms encourage us to shun all role-play and stick to our one authenticated social identity, these flourish and often gain a life of their own as a shadow double of the user. And yet, everybody knows that these identities are a matter of habits, a collection of ‘things that we do’ which emerge as important actors in the networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These habits might offer us an explanation of why we participate in memes, sharing and disseminating information virally across the interwebz. They might also give us an insight into why we troll and transmit viruses and spam, to friends in the networks, even when we do not mean to. They might help us understand why we are suffering from such an information fatigue, even when we have smart algorithms and softwares constantly sifting through the information web and filtering customised results for us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea of the network as a series of habits opens up a new way to thinking about all the three instances, which I described above. It shows that the networks become invisible in our everyday practice, thus creating a condition of false crisis, because they are simultaneously transparent and opaque. It shows that networks are not ‘natural’ but take a lot of effort and energy to sustain – something that digital natives might take to easily but are not kind to digital immigrants, settlers or non-inhabitants, who cannot invest as much time in their networked lives, thus creating new demography of exclusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And it shows that the network, despite the much acclaimed wisdom of the crowds, can be easily manipulated by those who learn how to fake conditions of life and living within the simulated networked environments. And it would explain why, if I end this column by asking you to go to Google Images and search for “completely wrong”, partly out of curiosity, partly because of expectation, and partly because of habit, you will run the search strings anyway, in the process, supporting the network but also reinforcing your habits of information search and connections.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2012-10-23T10:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
