<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 191 to 205.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/stirrup-and-the-ground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-january-22-2017-digital-native-back-at-it-again"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/private-eye"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/non-human-intelligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/caonima"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/adrienneshaw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/not-a-goodbye-more-a-come-again"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/blog"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/stirrup-and-the-ground">
    <title>Between the Stirrup and the Ground: Relocating Digital Activism</title>
    <link>https://cis-india.org/digital-natives/stirrup-and-the-ground</link>
    <description>
        &lt;b&gt;In this peer reviewed research paper, Nishant Shah and Fieke Jansen draws on a research project that focuses on understanding new technology, mediated identities, and their relationship with processes of change in their immediate and extended environments in emerging information societies in the global south. It suggests that endemic to understanding digital activism is the need to look at the recalibrated relationships between the state and the citizens through the prism of technology and agency. The paper was published in Democracy &amp; Society, a publication of the Center for Democracy and Civil Society, Volume 8, Issue 2, Summer 2011.&lt;/b&gt;
        
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The first decade of the 21st century has witnessed the simultaneous growth of the Internet and digital technologies on the&amp;nbsp;one hand and political protests and mobilization on the other. As a result, some stakeholders attribute magical powers of&amp;nbsp;social change and political transformation to these technologies.&lt;/p&gt;
&lt;p&gt;In the post-Wikileaks world, governments try to censor the use of and access to information technologies in order to&amp;nbsp;maintain the status quo (Domscheit-Berg 2011). With the expansion of markets, technology multinationals and service&amp;nbsp;providers are trying to strike a delicate&amp;nbsp;balance between ethics and pro6ts. Civil&amp;nbsp;society organizations for their part, are&amp;nbsp;seeking to counterbalance censorship&amp;nbsp;and exploitation of the citizens’ rights.&amp;nbsp;Within discourse and practice, there remains&amp;nbsp;a dialectic between hope and despair:&amp;nbsp;Hope that these technologies will&amp;nbsp;change the world, and despair that we do&amp;nbsp;not have any sustainable replicable models&amp;nbsp;of technology-driven transformation&amp;nbsp;despite four decades of intervention in&amp;nbsp;the 6eld of information and communication&amp;nbsp;technology (ICT).&lt;/p&gt;
&lt;p&gt;This paper suggests that this dialectic&amp;nbsp;is fruitless and results from too strong of&amp;nbsp;a concentration on the functional role&amp;nbsp;of technology. The&amp;nbsp;lack of vocabulary to map and articulate the transitions that digital technologies bring to our earlier understanding of the&amp;nbsp;state-market-citizen relationship, as well as our failure to understand technology as a paradigm that defines the domains&amp;nbsp;of life, labour, and language, amplify this knowledge gap.&lt;/p&gt;
&lt;p&gt;This paper draws on a research project that focuses on&amp;nbsp;understanding new technology, mediated identities, and&amp;nbsp;their relationship with processes of change in their immediate&amp;nbsp;and extended environments in emerging information&amp;nbsp;societies in the global south (Shah 2009). We suggest that&amp;nbsp;endemic to understanding digital activism is the need to&amp;nbsp;look at the recalibrated relationships between the state and&amp;nbsp;the citizens through the prism of technology and agency.&lt;/p&gt;
&lt;h2&gt;Context&lt;/h2&gt;
&lt;p&gt;It is appropriate, perhaps, to begin a paper on digital activism, with a discussion of analogue activism[&lt;a href="#1"&gt;1&lt;/a&gt;]&amp;nbsp;(Morozov 2010).&amp;nbsp;In the recent revolutions and protests from Tunisia&amp;nbsp;to Egypt and Iran to Kryzygystan, much attention has been&amp;nbsp;given to the role of new media in organizing, orchestrating,&amp;nbsp;performing, and shaping the larger public psyche and the&amp;nbsp;new horizons of progressive governments. Global media&amp;nbsp;has dubbed several of them as ‘Twitter Revolutions” and&amp;nbsp;“Facebook Protests” because these technologies played an&amp;nbsp;important role in the production of :ash-mobs, which,&amp;nbsp;because of their visibility and numbers, became the face of&amp;nbsp;the political protests in di)erent countries. Political scientists&amp;nbsp;as well as technology experts have been trying to figure out&amp;nbsp;what the role of Twitter and Facebook was in these processes&amp;nbsp;of social transformation. Activists are trying to determine&amp;nbsp;whether it is possible to produce replicable upscalable models&amp;nbsp;that can be transplanted to other geo-political contexts to&amp;nbsp;achieve similar results,[&lt;a href="#2"&gt;2&lt;/a&gt;]&amp;nbsp;as well as how the realm of political action now needs to accommodate these developments.&lt;/p&gt;
&lt;p&gt;Cyber-utopians have heralded this particular phenomenon&amp;nbsp;of digital activists mobilizing in almost unprecedented&amp;nbsp;numbers as a hopeful sign that resonates the early 20th century&amp;nbsp;rhetoric of a Socialist Revolution (West and Raman&amp;nbsp;2009). (ey see this as a symptom of the power that ordinary&amp;nbsp;citizens wield and the ways in which their voices&amp;nbsp;can be ampli6ed, augmented, and consolidated using the&amp;nbsp;pervasive computing environments in which we now live.&lt;/p&gt;
&lt;p&gt;In a celebratory tone, without examining either the complex&amp;nbsp;assemblages of media and government practices and policies&amp;nbsp;that are implicated in these processes, they naively attribute&amp;nbsp;these protests to digital technologies.&lt;/p&gt;
&lt;p&gt;Cyber-cynics, conversely, insist that these technologies&amp;nbsp;are just means and tools that give voice to the seething anger,&amp;nbsp;hurt, and grief that these communities have harboured for&amp;nbsp;many years under tyrannical governments and authoritarian&amp;nbsp;regimes. They insist that digital technologies played no&amp;nbsp;role in these events — they would have occurred anyway,&amp;nbsp;given the right catalysts — and that this overemphasis on&amp;nbsp;technology detracts from greater historical legacies, movements,&amp;nbsp;and the courage and efforts of the people involved.&lt;/p&gt;
&lt;p&gt;While these debates continue to ensue between zealots&amp;nbsp;on conflicting sides, there are some things that remain&amp;nbsp;constant in both positions: presumptions of what it means&amp;nbsp;to be political, a narrow imagination of human-technology&amp;nbsp;relationships, and a historically deterministic view of socio-political&amp;nbsp;movements. While the objects and processes under&amp;nbsp;scrutiny are new and unprecedented, the vocabulary, conceptual&amp;nbsp;tools, knowledge frameworks, and critical perspectives&amp;nbsp;remain unaltered. They attempt to articulate a rapidly changing&amp;nbsp;world in a manner that accommodates these changes.&amp;nbsp;Traditional approaches that produce a simplified triangulation&amp;nbsp;of the state, market and civil society, with historically&amp;nbsp;specified roles, inform these discourses, “where the state is&amp;nbsp;the rule-maker, civil society the do-gooder and watchdog,&amp;nbsp;and the private sector the enemy or hero depending on one’s&amp;nbsp;ideological stand” (Knorringa 2008, 8).&lt;/p&gt;
&lt;p&gt;Within the more diffuse world realities, where the roles&amp;nbsp;for each sector are not only blurred but also often shared,&amp;nbsp;things work differently. Especially when we introduce technology,&amp;nbsp;we realize that the centralized structural entities&amp;nbsp;operate in and are better understood through a distributed,&amp;nbsp;multiple avatar model. For example, within public-private&amp;nbsp;partnerships, which are new units of governance in emerging&amp;nbsp;post-capitalist societies, the market often takes up protostatist&amp;nbsp;qualities, while the state works as the beneficiary rather&amp;nbsp;than the arbitrator of public delivery systems. In technology-state&amp;nbsp;conflicts, like the well-known case of Google’s conflict&amp;nbsp;with China (Drummond 2010), technology service providers&amp;nbsp;and companies have actually emerged as the vanguards of&amp;nbsp;citizens’ rights against states that seek to curb them.&lt;/p&gt;
&lt;p&gt;Similarly, civil society and citizens are divided around&amp;nbsp;the question of access to technology. The techno-publics&amp;nbsp;are often exclusive and make certain analogue forms of&amp;nbsp;citizenships obsolete. While there is a euphoria about the&amp;nbsp;emergence of a multitude of voices online from otherwise&amp;nbsp;closed societies, it is important to remember that these voices&amp;nbsp;are mediated by the market and the state, and often have to&amp;nbsp;negotiate with strong capillaries of power in order to gain&amp;nbsp;the visibility and legitimacy for themselves. Additionally,&amp;nbsp;the recalibration in the state-market-citizen triad means&amp;nbsp;that there is certain disconnect from history which makes&amp;nbsp;interventions and systemic social change that much more difficult.&lt;/p&gt;
&lt;h2&gt;Snapshots&lt;/h2&gt;
&lt;p&gt;We draw from our observations in the “Digital Natives with a Cause?”[&lt;a href="#3"&gt;3&lt;/a&gt;]&amp;nbsp;research program, which brought together over&amp;nbsp;65 young people working with digital technologies towards&amp;nbsp;social change, and around 40 multi-sector stakeholders in&amp;nbsp;the field to decode practices in order to gain a more nuanced&amp;nbsp;understanding of the relationships between technology and&amp;nbsp;politics.&lt;/p&gt;
&lt;p&gt;The first case study is from Taiwan, where the traditionally&amp;nbsp;accepted uni-linear idea of senders-intermediaries-passive&amp;nbsp;receivers is challenged by adopting a digital information&amp;nbsp;architecture model for a physical campaign.[&lt;a href="#4"&gt;4&lt;/a&gt;]&amp;nbsp;The story not&amp;nbsp;only provides insight into these blurred boundaries and&amp;nbsp;roles, but also offers an understanding of the new realm of&amp;nbsp;political intervention and processes of social transformation.&lt;/p&gt;
&lt;p&gt;As YiPing Tsou (2010) from the Soft Revolt project in Taipei&amp;nbsp;explains, "I have realised how the Web has not only virtually&amp;nbsp;reprogrammed the way we think, talk, act and interact&amp;nbsp;with the work but also reformatted our understanding of&amp;nbsp;everyday life surrounded by all sorts of digital technologies."&lt;/p&gt;
&lt;p&gt;Tsou’s own work stemmed from her critical doubt of&amp;nbsp;the dominant institutions and structures in her immediate&amp;nbsp;surroundings. Fighting the hyper-territorial rhetoric of the&amp;nbsp;Internet, she deployed digital technologies to engage with&amp;nbsp;her geo-political contexts. Along with two team members,&amp;nbsp;she started the project to question and critique the rampant&amp;nbsp;consumerism, which has emerged as the state and market&amp;nbsp;in Taiwan collude to build more pervasive marketing infrastructure&amp;nbsp;instead of investing in better public delivery&amp;nbsp;systems. The project adopted a gaming aesthetic where the&amp;nbsp;team produced barcodes, which when applied to existing&amp;nbsp;products in malls and super markets, produced random&amp;nbsp;pieces of poetry at the check-out counters instead of the&amp;nbsp;price details that are expected. The project challenged the&amp;nbsp;universal language of barcodes and mobilized large groups&amp;nbsp;of people to spread these barcodes and create spaces of&amp;nbsp;confusion, transient data doubles, and alternative ways of&amp;nbsp;reading within globalized capitalist consumption spaces. The project also demonstrates how access to new forms of&amp;nbsp;technology also leads to new information roles, creating&amp;nbsp;novel forms of participation leading to interventions towards&amp;nbsp;social transformation.&lt;/p&gt;
&lt;p&gt;Nonkululeko Godana (2010) from South Africa does&amp;nbsp;not think of herself as an activist in any traditional form.&amp;nbsp;She calls herself a storyteller and talks of how technologies&amp;nbsp;can amplify and shape the ability to tell stories. Drawing&amp;nbsp;from her own context, she narrates the story of a horrific&amp;nbsp;rape that happened to a young victim in a school campus&amp;nbsp;and how the local and national population mobilized itself&amp;nbsp;to seek justice for her. For Godana, the most spectacular&amp;nbsp;thing that digital technologies of information and communication&amp;nbsp;offer is the ability for these stories to travel in&amp;nbsp;unexpected ways. Indeed, these stories grow as they are&amp;nbsp;told. They morph, distort, transmute, and take new avatars,&amp;nbsp;changing with each telling, but managing to help the message leap across borders, boundaries, and life-styles. She&amp;nbsp;looks at storytelling as something that is innate to human&amp;nbsp;beings who are creatures of information, and suggests that&amp;nbsp;what causes revolution, what brings people together, what&amp;nbsp;allows people to unify in the face of strife and struggle is&amp;nbsp;the need to tell a story, the enchantment of hearing one,&amp;nbsp;and the passion to spread it further so that even when the&amp;nbsp;technologies die, the signal still lives, the message keeps on&amp;nbsp;passing. As Clay Shirky, in his analysis of the first recorded&amp;nbsp;political :ash-mob in Phillipines in 2001, suggests, "social&amp;nbsp;media’s real potential lies in supporting civil society and the&amp;nbsp;public sphere — which will produce change over years and&amp;nbsp;decades, not weeks or months."&lt;/p&gt;
&lt;h2&gt;Propositions&lt;/h2&gt;
&lt;p&gt;These two stories are just a taste of many such narratives that&amp;nbsp;abound the field of technology based social transformation&amp;nbsp;and activism. In most cases, traditional lenses will not recognize&amp;nbsp;these processes, which are transient and short-lived&amp;nbsp;as having political consequence. When transformative value&amp;nbsp;is ascribed to them, they are brought to bear the immense&amp;nbsp;pressure of sustainability and scalability which might not be&amp;nbsp;in the nature of the intervention. Moreover, as we have seen&amp;nbsp;in these two cases, as well as in numerous others, the younger&amp;nbsp;generation — these new groups of people using social media&amp;nbsp;for political change, often called digital natives, slacktivists,&amp;nbsp;or digital activists — renounce the earlier legacy of political&amp;nbsp;action. They prefer to stay in this emergent undefined&amp;nbsp;zone where they would not want an identity as a political&amp;nbsp;person but would still make interventions and engage with&amp;nbsp;questions of justice, equity, democracy, and access, using the&amp;nbsp;new tools at their disposal to negotiate with their immediate&amp;nbsp;socio-cultural and geo-political contexts.&lt;/p&gt;
&lt;p&gt;In their everyday lives, Digital Natives are in different&amp;nbsp;sectors of employment and sections of society. They can be&amp;nbsp;students, activists, government officials, professionals, artists,&amp;nbsp;or regular citizens who spend their time online often in&amp;nbsp;circuits of leisure, entertainment and self-gratification. However,&amp;nbsp;it is their intimate relationship with these processes,&amp;nbsp;which is often deemed as ‘frivolous’ that enables them, in&amp;nbsp;times of crises, to mobilize huge human and infrastructural&amp;nbsp;resources to make immediate interventions.&lt;/p&gt;
&lt;p&gt;It is our proposition that it is time to start thinking about&amp;nbsp;digital activism as a tenuous process, which might often hide&amp;nbsp;itself in capillaries of non-cause related actions but can be&amp;nbsp;materialized through the use of digital networks and platforms&amp;nbsp;when it is needed. Similarly, a digital activist does not&amp;nbsp;necessarily have to be a full-time ideology spouting zealot,&amp;nbsp;but can be a person who, because of intimate relationships&amp;nbsp;with technologized forms of communication, interaction,&amp;nbsp;networking, and mobilization, is able to transform him/&amp;nbsp;herself as an agent of change and attain a central position&amp;nbsp;(which is also transitory and not eternal) in processes of&amp;nbsp;social movement. Such a lens allows us to revisit our existing&amp;nbsp;ideas of what it means to be political, what the new landscapes&amp;nbsp;of political action are, how we account for processes&amp;nbsp;of social change, and who the people are that emerge as&amp;nbsp;agents of change in our rapidly digitizing world.&lt;/p&gt;
&lt;h3&gt;About the Authors&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;NISHANT SHAH is&amp;nbsp;Director-Research at the Bangalore based Centre for Internet and Society. He is one of the lead researchers for the&amp;nbsp;“Digital Natives with a Cause?” knowledge programme and has interests in questions of digital identity, inclusion and social change.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;FIEKE JANSEN&amp;nbsp;is based at the Humanist Institute for Development Cooperation (Hivos).&amp;nbsp;She is the knowledge officer for the Digital Natives with a Cause? knowledge programme and her areas of &lt;/span&gt;&lt;span class="Apple-style-span"&gt;interest are the role of digital technologies in social change processes.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;References&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Domscheit-Berg, Daniel. 2011. &lt;em&gt;Inside Wikileaks: My Time with Julian Assange&amp;nbsp;at the World’s Most Dangerous Website&lt;/em&gt;. New York: Crown Publishers.&lt;/p&gt;
&lt;p&gt;Drummond, David. 2010. “A New Approach to China.” Available at: http://&amp;nbsp;googleblog.blogspot.com/2010/01/new-approach-to-china.html.&lt;/p&gt;
&lt;p&gt;Godana, Nonkululeko. 2011. “Change is Yelling: Are you Listening?”&amp;nbsp;&lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre for Internet and&amp;nbsp;Society publications. Available at: http://www.hivos.net/content/download/&amp;nbsp;40567/260946/file/Position%20Papers.pdf. Retrieved: February 3,&amp;nbsp;2011.&lt;/p&gt;
&lt;p&gt;Knorringa, Peter. 2010. A Balancing Act — Private Actors in Development,&amp;nbsp;Inaugural Lecture ISS. Available at: http://www.iss.nl/News/Inaugural-Lecture-Professor-Peter-Knorringa. Retrieved: February 3, 2011.&lt;/p&gt;
&lt;p&gt;Morozov, Evgeny. 2011. &lt;em&gt;The Net Delusion: The Dark Side of Internet Freedom&lt;/em&gt;.&amp;nbsp;New York: Public Affairs.&lt;/p&gt;
&lt;p&gt;Shirky, Clay. 2011. “The Political power of Social Media: Technology, the&amp;nbsp;Public Sphere, and Political Change.” &lt;em&gt;Foreign Affairs&lt;/em&gt; 90, (1); p. 28-41.&lt;/p&gt;
&lt;p&gt;Shah, Nishant and Sunil Abraham. 2009. “Digital Natives with a Cause.”&amp;nbsp;Hivos Knowledge Programme. Hivos and the Centre for Internet and Society&amp;nbsp;publications. Available at: http://cis-india.org/research/dn-report. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;Tsou, YiPing. 2010. “(Re)formatting Social Transformation in the Age of&amp;nbsp;Digital Representation: On the Relationship of Technologies and Social&amp;nbsp;Transformation”, &lt;em&gt;Digital Natives Position Papers&lt;/em&gt;. Hivos and the Centre&amp;nbsp;for Internet and Society publications. Available at: http://www.hivos.net/&amp;nbsp;content/download/40567/260946/file/Position%20Papers.pdf. Retrieved:&amp;nbsp;February 3, 2011.&lt;/p&gt;
&lt;p&gt;West, Harry and Parvathi Raman. 2009. &lt;em&gt;Enduring Socialism: Exploration&amp;nbsp;of Revolution and Transformation, Restoration and Continuation&lt;/em&gt;. London:&amp;nbsp;Berghahn Books.&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;End Notes&lt;/span&gt;&lt;/h3&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Morozov looks at how ‘Digital Activism’ often feeds the very structures&amp;nbsp;against we protest, with information that can prove to be counter productive&amp;nbsp;to the efforts. The digital is still not ‘public’ in its ownership and a complex&amp;nbsp;assemblage of service providers, media houses and governments often lead&amp;nbsp;to a betrayal of sensitive information which was earlier protected in the use&amp;nbsp;of analogue technologies of resistance.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]Following the revolutions in Egypt, China, worried that the model &lt;/a&gt;&lt;a name="1"&gt;might be appropriated by its own citizens against China’s authoritarian &lt;/a&gt;&lt;a name="1"&gt;regimes, decided to block “Jan25” and mentions of Egypt from &lt;/a&gt;&lt;a name="1"&gt;Twitter like websites. More can be read here: http://yro.slashdot.org/ &lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="1"&gt;story/11/01/29/2110227/China-Blocks-Egypt-On-Twitter-Like-Site.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]More information about the programme can be found at &lt;/a&gt;&lt;a name="1"&gt;http://www.hivos.net/Hivos-Knowledge-Programme/Themes/ &lt;/a&gt;&lt;a name="1"&gt;Digital-Natives-with-a-Cause.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]Models of digital communication and networking have always imagined &lt;/a&gt;&lt;a name="1"&gt;that the models would be valid only for the digital environments. Hence, &lt;/a&gt;&lt;a name="1"&gt;the physical world still engages only with the one-to-many broadcast model, &lt;/a&gt;&lt;a name="1"&gt;where the central authorities produce knowledge which is disseminated to the passive receivers who operate only as receptacles of information rather than bearers of knowledge. To challenge this requires a re-orientation of existing models and developing ways of translating the peer-to-peer structure in the physical world.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;Cross-posted from Democracy &amp;amp; Society, read the original &lt;a class="external-link" href="http://www.democracyandsociety.com/blog/wp-content/uploads/2011/08/CDACS-DS-15-v3-fnl.pdf"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/stirrup-and-the-ground'&gt;https://cis-india.org/digital-natives/stirrup-and-the-ground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Web Politics</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-14T12:14:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem">
    <title>Why your Facebook Stalker is Not the Real Problem</title>
    <link>https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem</link>
    <description>
        &lt;b&gt;We live in networked conditions. This is a statement that can now be taken at face-value, and immediately explains our highly connected, inter-meshed environments finds Nishant Shah in this article published in FirstPost on March 20, 2012.&lt;/b&gt;
        
&lt;p&gt;Especially within the digital world, the World Wide Web has become synonymous with social networking systems, where increasingly all our access, communication and interaction is located within a series of interconnected networks.&lt;/p&gt;
&lt;p&gt;From the imagination of the web as a complex network, we have evolved to looking at the web as facilitating networks where different relationships, transactions and connections can be mapped and managed. This is why we often have romantic imaginations of networks as free, open, collaborative, shared spaces of interaction and expression.&lt;/p&gt;
&lt;p&gt;However, we have reached a stage where this idea of a network as a liberatory space is under threat. Even as I write this, Internet Service Providers are now planning to set up sophisticated, automated systems that will do a deep-spy on your data transfer to see if you are sharing files (sometimes also called piracy) using the Internet.&lt;/p&gt;
&lt;p&gt;These systems will now keep track of all your digital transactions and will monitor what you consume, who you talk to and determine whether you are a good ethical subject who is only using the Internet in ways that the powers to be want you to.&lt;br /&gt;&lt;br /&gt;For me, this particular networked condition of being constantly monitored and watched is scary. And it surprises me that this invasive process is less in public attention than Google’s recently changed privacy policies or the TOS-in-progress nature of privacy on Facebook.&lt;br /&gt;&lt;br /&gt;This is because the ubiquitous presences of networks in our lives have made them transparent to us – we do not think of the networks themselves as entities but as spaces where interactions with other objects is possible. Hence, if I ask you, right now, to name the top 5 entities that you interact with the most on Facebook, I am sure you will be able to name them. More probably than not, these top 5 entities with people that you have formed strong Facebook Friendships with.&lt;br /&gt;&lt;br /&gt;In fact there are platforms designed to let you know who you are talking with most on your networks. Network influence measurement indices by services like Klout are able to tell you not only who you talk to but also what are your key areas of influence. This is a way by which the network becomes invisible to us. It hides the fact that the thing that talks to you the most on Facebook is Facebook itself.&lt;br /&gt;&lt;br /&gt;The marketing of Facebook might tell you that you are talking to other human beings, but reality is that the network is more than the sum total of all human beings on the system. Just look at the amount of information Facebook produces on your behalf and to you. Notifications for adding friends, for liking people, for people writing to you, for people commenting on your walls and posts, form more than 50% of the information traffic on Facebook or social networking systems.&lt;br /&gt;&lt;br /&gt;This information is produces and shared by scripts, coded bots, algorithmic applications, and non-human entities that not only support and sustain the network but are also significant members of the networks.&lt;br /&gt;&lt;br /&gt;This is the actual networked condition – where the processes and entities that make the networks possible, produce an illusion of seamless communication and interaction, while performing and extraordinary amount of information and for you.&lt;/p&gt;
&lt;p&gt;This blindness to our own ‘networkedness’ has crucial ramifications for our online activities because it makes us oblivious to questions of privacy, control, safety and trust. We have privacy settings to protect us from human entities on Facebook. There is very little concern about the non-human entities who store, distribute and use the data that we produce. If we don’t even know what these watchers are, how do we protect ourselves from being watched? What happens when between you and your ‘friend’, is a series of silent interceptors who are recording and using your data without your knowledge?&lt;br /&gt;&lt;br /&gt;Being in a network is like being in a glass-house. We cannot see the walls and hence, we presume that we need our privacy from the other inhabitants of the same house. However, in that, we forget that the walls are watching, and that there are invisible watchers beyond the walls, who are in control.&lt;br /&gt;&lt;br /&gt;It is time to make our networks visible again. It is time to realise that what we really need to be afraid of, on social networking systems, is the social network itself, and not the mythical stranger who wants to stalk us or that unwanted friend you want to exclude from your information sharing.&lt;br /&gt;&lt;br /&gt;Privacy and safety are not merely compromised at the interface, where information might leak and travel into zones outside of your knowledge and control. The real questions of being safe are actually in the protocols and designs of the network itself.&lt;br /&gt;&lt;br /&gt;We need to start looking at larger invasive policies exercises by the different invisible actors like the ISP, ICT ministries, corporate policies, design choices and architecture of interception that sustain the networks we so gladly embrace.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society and recently edited a 4 volume book on youth, technology and change, titled ‘Digital AlterNatives with a Cause?’&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/why-your-facebook-stalker-is-not-the-real-problem-249872.html"&gt;Read this in FirstPost&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem'&gt;https://cis-india.org/internet-governance/facebook-stalker-is-not-real-problem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T05:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement">
    <title>The Rules of Engagement</title>
    <link>https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement</link>
    <description>
        &lt;b&gt;Why the have-nots of the digital world can sometimes be mistaken as trolls. I am not sure if you have noticed, but lately, the people populating our social networks have started to be more diverse than before.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/the-rules-of-engagement/1022938/0"&gt;published in the Indian Express&lt;/a&gt; on October 29, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Oh, sure, we are still talking about a fairly middle-class hang-out that happens largely in English and is restricted to people in urban environments who have the economic and cultural capital of access. But if you browse through your friends’ lists and compare it with, say, the network from five years ago, you will realise that the age demography has changed quite dramatically. I am not suggesting that the Web was only the realm of the young – let us face it, the people who actually created the infrastructure of the Web were not tiny tots. However, with Web 2.0 at the turn of the millennium, we have had an extraordinary focus on young people online.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;But as the networks grow to include more people, there are now a lot of people online, who might not be the 16-year-old BlackBerry-wielding digital native, nor be in the “business of internet” but are finding a space for themselves, tentatively and steadily negotiating with this new space. Some of it might be because, those of us who were new kids on the block in the Nineties, are now older by a decade and are still on the block, but replaced by newer kids around the block. Some of it might be because there is an ease of access as portable computing devices grow more personal and get more people to use their smartphones as a gateway into the online worlds. But a lot of it is actually because the fold of the Web is expanding. The digital spaces of conversation are being integrated into our everyday lives and practices, replacing older forms of media and information structures and processes of social and cultural belonging.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And so, even though the penetration of the interwebz is not as rapid in countries like India as one would have hoped for, we do see a wide age group of people coming online, forming networks, and entering into conversations. I hadn’t really realised this, even though I was adding them to my social networks, that the digital immigrants are now here, and they are here to stay. It suddenly surfaced in my thoughts, because I recently heard a few narratives which made me dwell on the effort and the learning that one takes for granted but is a prerequisite for belonging to these new social spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the first complaints I heard was about a hostility that many digital immigrants face when they start engaging with the social media. They follow the manuals. They read the FAQs. They look at patterns, and learn. And yet, even when they seem to be doing what seems to be exactly what everybody else is doing, they are often told that they got it all wrong. This is bewildering for many, because they cannot really see the difference. And the reason is that the social web is governed by a whole lot of unwritten rules and codes, which clearly are the rites of passage into the online world. These are not things that can be taught. These are not written in a guideline that tells you how to behave on Facebook or how to sift through the live-streams on Twitter. It is a fiercely guarded set of dos and don’ts which clearly distinguish between the digital natives and the digital immigrants, reinforcing exclusivity and exclusion. And when the digital immigrant violates these rules, they are often faced with a sneer, a sarcastic comment, or a dismissal as “not with it”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second thing I have repeatedly noticed is “calling troll” to people who do not always know these rules. Trolling is not new to the world of the internet. People who disrupt conversations and discussions by posting provocative or tangential information, by voicing hateful opinions, by passing harsh judgments, or sometimes by willfully breaking the rules of the communities, in order to seek attention and interrupt the flow of conversations are called trolls. Trolls are universally frowned upon and trolling wars often take up epic proportions because people get emotionally invested in them. Trolls are often shamed publicly, their mistakes brought into an embarrassing spot-light and ridiculed in back-channels or even in public discussions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Calling somebody a troll presumes that the user is conversant with the rules of the game and is then breaking them, working with the idea that if you are online, you are naturally a digital native. The digital immigrants often create noob mistakes that can appear troll-like but are not intended to be so, and are often on the receiving end of a community’s hostility. And it is time, now that our online networks are growing, for us to realise that our presumptions about who is online need to change. If we are looking at an inclusive Web, we need to stop imagining that the person on the other side of the interface is necessarily like us, and develop new networks of nurture, which allows the digital immigrants safe spaces to experiment, make mistakes, and learn like the best of us. The next time, before you call somebody a troll, see if it might just be somebody learning the tricks of the trade. If they are doing something wrong, just politely point it out to them. And remember, acceptance is not only for people who are like us, but about people who are markedly unlike us.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement'&gt;https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:48:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1">
    <title>Rethinking the last mile Problem: A cultural argument</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1</link>
    <description>
        &lt;b&gt;This research project, by Ashish Rajadhyaksha from the Centre for the Study of Culture and Society, is mainly a conceptual-archival investigation into India’s history for what has in recent years come to be known as the ‘last mile’ problem. The term itself comes from communication theory, with in turn an ancestry in social anthropology, and concerns itself with (1) identifying the eventual recipient/beneficiary of any communication message, (2) discovering new ways by which messages can be delivered intact, i.e. without either distortion of decay. Exploring the intersection of government policy, technology intervention and the users' expectations, with a specific focus on Internet Technologies and their space in the good governance protocols in India, the project aims at revisiting the last mile problem as one of cultural practices and political contexts in India.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;THE CULTURAL
LAST MILE&lt;/p&gt;
&lt;p&gt;Ashish
Rajadhyaksha&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Argument&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Mapped onto
developmental-democratic language since at least Independence, this concept,
further mapping concrete benefits with the delivery of the message, has come to
define the classic model by which the Indian state attempts to ensure that &lt;em&gt;policy&lt;/em&gt; designed for &lt;em&gt;local implementation&lt;/em&gt; actually reaches its &lt;em&gt;intended beneficiaries&lt;/em&gt; without &lt;em&gt;distortion&lt;/em&gt;.
The immense link between communication theory and democracy thereby defines not
only the Indian state’s historic dependence on &lt;em&gt;technologies&lt;/em&gt; of communication – radio, terrestrial and satellite.
It goes further, as the technological apparatus – and its variants of the
classic ‘broadcast’ model of single sender-multiple receiver – comes to
underpin the very definition of democratic development.&lt;/p&gt;
&lt;p&gt;One consequence
is an &lt;em&gt;evolutionary&lt;/em&gt; definition of
technology, with the last mile defined as a means of eternal purification of
the message, combining content ‘corruption’ with socio-economic corruption, as
newer generations of technology tirelessly eliminate distortion in both. This
could well be the history of Indian state policy, from radio broadcasts
representing the ‘voice of the State’ to the era of e-Governance. &amp;nbsp;Such an authority is somewhat graphically in evidence in
recent years in the deployment of ‘neutral’ technology such as computers within
e-governance initiatives, which have, when successful , seen
computer-illiterate farmers make wide use of ICT services where they ‘do not
feel that there is a barrier to their obtaining information’, a ‘tribute to the
grassroots staff and their training’, but also to ‘faith in the technology’
(Shaik, Jhamtani and Rao 2004: 9). The attribution of such ‘neutrality’ to
modern ‘scientific’ technology has been in evidence from late
nineteenth-century still photography to the use of technologies such as ‘First
In–First Out (FIFO)’, a way that prevents queue-jumping, biometrics and double
screens for users to view typed in matter, including touch screens
(Parthasarathy 2005, VIII: 9).&lt;/p&gt;
&lt;p&gt;&lt;u&gt;The Research
Project&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;This project
assumes that, given the chronic historic failure in bridging the last mile,
whether in communication theory or in the standard functioning of development
projects (a key component of the relatively new discipline of disaster
management) – a failure stemming from difficulties in both naming and accessing
intended beneficiaries – it becomes necessary to reinvestigate the model
itself, along with its historic failures.&lt;/p&gt;
&lt;p&gt;The project is
split into three parts: &lt;br /&gt;
(1) The conceptual argument: a historical trace of the theoretical origins of
the concept ‘Last mile’ (even if not named as such), and key technical
locations of its deployment: the telegraph, the ‘film trains’ in the 1920s, the
radio (extended to transistorization in the 1960s), and the first experiments
with terrestrial and satellite technology. &lt;br /&gt;
(2) It will then take three specific examples (perhaps but may be
changed),(a)&amp;nbsp; the SITE experiment of the
1970s with specific new field work on the well known Kheda experiment; (b) the
Cable Television movements in India in the 1980s, and (c) Experiments with WLL
in IIT Chennai in the 1990s. &lt;br /&gt;
(3) The concluding section will address locations where the last mile has in
fact been bridged successfully, in the review’s estimation, and will inquire
into how it came to be functional. It is at this point speculated that it
worked mainly because (a) the original model was either tampered with or used
contrary to stated intentions, and (b) when it worked, this happened with the
connivance of the state. The project will therefore perhaps conclude with the
following investigations: that historically significant occasions when
alternative definitions were thrown up for the last mile worked mainly because
they were dependent on error and accident (rather than seeing these as
interruptions or distortions to the signal), and that they functioned more on
both peer-to-peer and reverse broadcasting than on the
single-sender-multiple-recipients model.&lt;/p&gt;
&lt;p&gt;&lt;u&gt;References&lt;/u&gt;:&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1990), ‘Beaming Messages to the Nation’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, No. 19 (May): 33–52.&lt;/p&gt;
&lt;p&gt;Ashish Rajadhyaksha
(1999), ‘The Judgement: Re-Forming the Public’, &lt;em&gt;Journal of Arts &amp;amp;
Ideas&lt;/em&gt;, Nos. 32–33 (April)&lt;/p&gt;
&lt;p&gt;N. Meera Shaik, Anita
Jhamtani and D.U.M. Rao, ‘Information and Communication Technology in
Agricultural Development: A Comparative Analysis of Three Projects from India’,
Agricultural Research and Extension Network (AGREN), 2004.&lt;/p&gt;
&lt;p&gt;Balaji Parthasarathy et
al (ed), ‘Information and Communications Technologies for Development: A
Comparative Analysis of Impacts and Costs from India’, Bangalore: International
Institute of Information Technology, 2005.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/post1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2015-04-03T10:54:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton">
    <title>A provisional definition for the Cultural Last Mile</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton</link>
    <description>
        &lt;b&gt;In the first of his entries, Ashish Rajadhyaksha gives his own spin on the 'Last Mile' problem that has been at the crux of all public technologies. Shifting the terms of debate away from broadcast problems of distance and access, he re-purposes the 'last mile' which is a communications problem, to make a cultural argument about the role and imagination of technology in India, and the specific ways in which this problem features in talking about Internet Technologies in contemporary India.&lt;/b&gt;
        
&lt;div class="main"&gt;
&lt;div class="snap_preview"&gt;
&lt;p&gt;In its classical
form, the ‘last mile’ is a communications term defining the final stage
of providing connectivity from a communications provider to a customer,
and has been used as such most commonly by telecommunications and cable
television industries. There has however been a a specific Indian
variant, seen in its most classical avatar in scientist Vikram
Sarabhai’s contention that overcoming the last mile could solve the two
major challenges India has faced, of &lt;strong&gt;linguistic diversity &lt;/strong&gt;and &lt;strong&gt;geographical distance&lt;/strong&gt;,
and mounted as the primary argument for terrestrial television in the
early 1980s. (I will try and attach the Sarabhai paper a little later
to this posting).&lt;/p&gt;
&lt;p&gt;This specifically Indian variation, where technology was mapped onto
developmentalist-democratic priorities, has been the dominant
characteristic of communications technology since at least the
invention of the radio in the 1940s. For at least 50 years now, that
means, the last mile has become a mode of a techno-democracy, where
connectivity has been directly translated into democratic citizenship.
It has continuously provided the major rationale for successive
technological developments, from the 1960s wave of portable
transistors, the terrestrial transponders of the first televisual
revolution it the early 1980s (the Special Plan for the Expansion of
Television), the capacity of satellite since SITE and the INSAT series,
and from the 1990s the arrival of wired networks (LANs, Cable,
fibre-optic) followed by wireless (WLAN, WiMAX, W-CDMA). At each point
the assumption has been consistently made that the final frontier was
just around the corner; that the next technology in the chain would
breach a major barrier, once and for all.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What I hope to do is to provide a historical account to
argue that the theory of the ‘last mile’ has been founded on
fundamental (mis)apprehensions around just what this bridge
constitutes. &lt;/strong&gt;Further, that these apprehensions may have been
derived from a misconstruction of democractic theory, to assume, first,
an evolutionary rather than distributive model for connectivity, and
second, to introduce a major bias for broadcast (or one-to-many) modes
as against many-to-many peer-to-peer formats. The book, whenever I
succeed in writing it, will hope to argue the following:&lt;/p&gt;
&lt;p&gt;1. It has been difficult to include &lt;strong&gt;human resource&lt;/strong&gt;
as an integral component to the last mile. Contrary to the relentlessly
technologized definition of the last mile, it may perhaps be best seen
historically as &lt;em&gt;also&lt;/em&gt;, and even perhaps &lt;em&gt;primarily&lt;/em&gt;, a
human resource issue. This is not a new realization, but it is one that
keeps reproducing itself with every new technological generation&lt;a href="http://culturallastmile.wordpress.com/#_ftn1"&gt;[1]&lt;/a&gt;,
with ever newer difficulties. The endemic assumption, derived from the
broadcasting origins of the definition is that it is primarily the &lt;em&gt;sender&lt;/em&gt;’s responsibility to bridge the divide, that &lt;em&gt;technology &lt;/em&gt;can
aid him to do so on its own, and that such technology can negate the
need to define connectivity as a multiple-way partnership as it reduces
the recipient into no more than an intelligent recipient of what is
sent (the citizen model). On the other hand, it is possible to show how
previous successful experiments bridging the last mile have been ones
where &lt;em&gt;recipients have been successfully integrated into the communications model &lt;/em&gt;both as peers and, even more significantly, as &lt;em&gt;originators &lt;/em&gt;as well as &lt;em&gt;enhancers &lt;/em&gt;of
data. Importantly, this paper will show, this has been evidenced even
in one-way ‘broadcast’ modes such as film, television and radio (in the
movie fan, community radio and the television citizen-journalist).&lt;/p&gt;
&lt;p&gt;2. The one-way broadcast versus peer-to-peer versus two/multiple-way
debate needs to he historically revisited. The need to redefine the
beneficiary of a connectivity cycle as a full-fledged partner tends to
come up against a bias written into standard communications models –
and therefore several standard revenue models – that consistently tend
to underplay what this paper will call the &lt;em&gt;significant sender/recipient&lt;/em&gt;.
While both terrestrial and satellite systems require some level of
peer-to-peer transmission systems to facilitate last-mile
communications, it has been a common problem that unless &lt;em&gt;either&lt;/em&gt; a clear focus exists on geographic areas &lt;em&gt;or&lt;/em&gt;
significant peer-to-peer participation exists, broadcast models
inevitably find themselves delivering large amounts of S/N at low
frequencies without sufficient spectrum to support large information
capacity. While it is technically possible to ‘flood’ a region in
broadcasting terms, this inevitably leads to extremely high wastage as
much of the radiated ICE never reaches any user at all. As information
requirements increase, broadcast ‘wireless mesh’ systems small enough
to provide adequate information distribution to and from a relatively
small number of local users, require a prohibitively large number of
broadcast locations along with a large amount of excess capacity to
make up for the wasted energy.&lt;/p&gt;
&lt;p&gt;This problem, importantly, springs as much from a built-in &lt;em&gt;ideological &lt;/em&gt;commitment
to one-way broadcasting formats, as from technological limitations. The
technology itself poses further problems given the bias of different
systems to different kinds of connectivity, and with it different types
of peer-to-peer possibilities. Rather than attempting a
one-size-fits-all model for all models to follow, we need to work out
different &lt;em&gt;synergies &lt;/em&gt;between broadcast-dependent and peer-to-peer-enabled platforms.&lt;/p&gt;
&lt;p&gt;This book will eventually hope to study the history of peer-to-peer
and multiple-way structures as systems where sending has become a
component part of receiving. Key technological precedents to the
present definition of the sender-communication ‘partner’ would be &lt;strong&gt;community radio&lt;/strong&gt;, &lt;strong&gt;low-power transmission-reception systems &lt;/strong&gt;(most famously the Pij experiment in Gujarat conducted by ISRO), and various &lt;strong&gt;internet-based networking models&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;3. The need to revisit the technological community is therefore
critical. The key question is one of how technological communities have
been produced, and how they may be sustained. In January 2007, the
attack by V.S. Ailawadi, former Chairman, Haryana Electricty Regulatory
Commission, on India’s public sector telecom giants BSNL and MTNL for
keeping their ‘huge infrastructure’ of ‘copper wire and optic fibre’ to
themselves, when these could be used by private operators as cheaper
alternatives to WiMAX, W-CDMA and broadband over power lines, shows the
uneasy relationship between new players and state agencies. Mr.
Ailawadi’s contention that the ‘unbundling’ of the last mile would
bring in competition for various types of wireless applications and
broadband services not just for 45 million landlines but also for 135
million mobile users of various service providers, also therefore needs
to be revisited from the perspective of community formation. How would
the new 135 million mobile users be effectively tapped for their
capacity to become what we are calling significant senders?&lt;/p&gt;
&lt;p&gt;In defining the last mile as to do with the recipient-as-sender, and thus the &lt;strong&gt;community&lt;/strong&gt;, this paper will focus on a history of community action along specific models of connectivity. These are: cinema’s &lt;strong&gt;movie fan&lt;/strong&gt;, internet’s &lt;strong&gt;blogger&lt;/strong&gt; and &lt;strong&gt;networker&lt;/strong&gt;, solar energy’s &lt;strong&gt;barefoot engineer&lt;/strong&gt;, software’s &lt;strong&gt;media pusher&lt;/strong&gt; and television’s &lt;strong&gt;citizen-journalist. &lt;/strong&gt;A specific focus for study will be the models of &lt;strong&gt;participatory learning&lt;/strong&gt; in the classroom, using &lt;strong&gt;film&lt;/strong&gt;, the &lt;strong&gt;vinyl disc&lt;/strong&gt;, the &lt;strong&gt;audio cassette&lt;/strong&gt;, the &lt;strong&gt;radio&lt;/strong&gt;, the &lt;strong&gt;television&lt;/strong&gt;, the &lt;strong&gt;web &lt;/strong&gt;and now the &lt;strong&gt;mobile phone&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights>A copy of this post is also available on the author's personal blog at http://culturallastmile.wordpress.com/2009/10/25/1-what-is-the-cultural-last-mile/</dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    

   <dc:date>2011-08-02T08:57:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-january-22-2017-digital-native-back-at-it-again">
    <title>Digital native: Back at it Again</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-january-22-2017-digital-native-back-at-it-again</link>
    <description>
        &lt;b&gt;The Indian digital landscape has put us in a loop of hashtags and outrage, a space where we have mastered the art of shame.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/digital-native-back-at-it-again-4485235/"&gt;published in the Indian Express&lt;/a&gt; on January 22, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Writing a regular column is daunting. One of the things that I constantly have to check is that I am not repeating myself. At the same time, in the digital age where all memory has become storage, and all that is stored is quickly forgotten, I also hope that what I write has life beyond the first few clicks, the Sunday morning coffee, the shares and likes that mark the beginning of the end of digital information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as I write the column this new year, I find myself in a strange situation where I am repeating what I have done the last three years at the beginning of each new year, and where I am desperately wishing that things I had last written became dated. Three years ago, while commenting on the Indian digital landscape, I had written about the rage, the fury, and the almost deafening battle cry that had captured the national imagination, when, at the turn of the year, a young woman we named Nirbhaya lost her life to violent sexual abuse on a moving bus in Delhi. #NeverAgain, we tweeted. #AlwaysRemember, we chanted. We called her #OurBraveheart and, in that moment of national outcry and dialogue about gender and sexual abuse in our public spaces, it seemed as if the digital landscape was reflecting a pivotal change in the fabric of the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The year after that, as we struggled to find ways in which law can keep us safe, the apex court in India re-criminalised homosexuality, reverting the judgment of the Delhi High Court which had given life and dignity to same sex and queer couples. The legal system proved that it is not only blind but also susceptible to mass populism that denies the rights to consenting adults to live their lives in dignity. That was the year when we hashtagged our solidarity with #NoGoingBack, making it trend so that umpteen number of people came out in support of homosexuality in the country. Support to the queer community came from unexpected quarters, like the generally reticent Bollywood celebrities who supported #Scrap377, and even religious and political representatives who recognise that the continued abuse of queer communities is a violation of our constitutional rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the struggles for gender and sexual equality continue in the country, and tireless activists and civil society advocates persist in their demands of justice and protection, here we are, waking up to yet another year of public shame and private grief, as reports came of the aggressive sexual abuse that women had to endure on the streets of Bangalore. The incident unfolded with all the trappings of victim blaming, slut shaming, and a sentence that should never be allowed — “She was asking for it.” On the digital social web, in the meantime, some sanctimonious men, indignant at the thought of being accused of patriarchal silence and misogynist privilege, decided to take attention away from the victims and decided to steal the spotlight with a hashtag that says #NotAllMen. These tweeters, who have no problem in enjoying the benefits of an abusive sexist social order — they might not actively go out to inflict gendered violence, but they are complicit in enjoying the privileges of that system — had a problem with taking responsibility for that system. They would not be shamed. Not even when an overwhelming number of women wrote back with #YesAllWomen, would they concede their grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it occurs so often on the Interwebz, the conversation that demanded both a private reflection and a public dialogue, devolved into personal name calling and collective anger deflected from the problem at hand. In the midst of the sensationalism that passes off as discussion in populist media channels, I want to think of something else. If all these voices in our public discourse were to be heard, it would feel like gendered and sexual safety are national preoccupations and bipartisan concerns. The customised expressions of our personalised media abound with anger, shame, critique, and analyses of why our country is increasingly becoming unsafe for certain bodies to walk through it. Social media accounts are producing a spectacle of concern for safety so effectively that it would seem these questions will be resolved immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, even as I look at my biographical history of writing this column, I realised that I have revisited these discussions over and over again. This is a debate that now occurs regularly, each time, giving us the chance to identify a problem, go online and make a lot of noise about it, and then settle down, with a smug smile on our faces of having done our public performance, without ever translating it into action. On the digital web, we seem to have mastered the art of shame without guilt. We continue to hashtag, like, tweet, share, and click our ways, using prepackaged formulae of expression without translating it into personal reflection or collective action. And the digital seems to be enabling this where having an opinion seems to matter more than actual transformation, and spectacles of shame seem to acquit us of the responsibility of action.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-january-22-2017-digital-native-back-at-it-again'&gt;https://cis-india.org/raw/indian-express-nishant-shah-january-22-2017-digital-native-back-at-it-again&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2017-02-02T15:04:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-kolaveri-di">
    <title>Open letter to Kolaveri Di makers: How Dare You!</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-kolaveri-di</link>
    <description>
        &lt;b&gt;When it comes to piracy, you are sure to have an opinion. You might either make a virtue out of it, talking about cultural commons and collaborative conditions of production. Or you might vilify it as the social fault-line that is destroying the very pillars of commerce and cultural negotiations.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/open-letter-to-kolaveri-di-makers-how-dare-you-317703.html#disqus_thread"&gt;This article by Nishant Shah was published in First Post on May 22, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;No matter which part of the fault-line you fall under, this is the time for all good (and otherwise ambiguously identified) people to come to the aid of the party. This is an open call for anybody who has been on the interwebz, to share and distribute one particular object whose rights protector have recently taken your right to access countless platforms which are a part of your everyday life online.&lt;/p&gt;
&lt;p&gt;If you haven’t yet grasped it, I am referring to the recent events where, following a John Doe order from the High Court of Chennai, all kinds of file sharing platforms are suddenly being blocked by Internet Service Providers (ISPs) across India.&lt;/p&gt;
&lt;p&gt;The film producers of ‘3’, the movie whose claim to fame has been the spectacular viral success of the &lt;em&gt;Kolaveri Di &lt;/em&gt;song, have moved the courts to issue a blanket order that has suddenly made it impossible for Indian netizens to access file sharing, user-generated-content hosting websites which allowed for digital cultural texts – from print to music to movies to presentations – to be shared and disseminated freely online.&lt;/p&gt;
&lt;p&gt;The producers and those who support them, are glorying in this legal battle where they have identified nodes in our networks, through which their copyright information was potentially being pirated. They are hoping that by ensuring this lack of digital mobility for their film, they will be able to entice audiences to come into the theatres and spend their money ‘legitimately’ on the film.&lt;/p&gt;
&lt;p&gt;They are revelling in the fact that hundreds of thousands of users have been thwarted in their attempts at copyright infringement. What they haven’t realised is that they have justified their box-office greed by infringing on your and my rights to perform everyday activities online.&lt;/p&gt;
&lt;p&gt;I am sure there is going to be a smart-aleck riding a moral high horse, who will applaud this move and point out to me about the rights of the producers to protect their content. There are many who support this high-censorship which not only betrays the power of the Music And Film Industry Association (MAFIA, to friends) to curb us of our rights, but also the completely depraved technology apparatus of the State which seems to have no understanding of how the internet actually works.&lt;/p&gt;
&lt;p&gt;However, i want to shift the focus from the rights of these victimised producers and right-holders to the right of the individual who is actually the structural unit of cyberspaces. And I want to suggest to you that these right-holders, who incidentally, have such global value only because the &lt;em&gt;Kolaveri Di&lt;/em&gt; song put them on the global meme map, have now infringed upon my right to access my content which I had put out to share.&lt;/p&gt;
&lt;p&gt;There are open content videos on Vimeo that we have produced through years of research and a huge amount of financial investment, which are now no longer available to people who want to view them.&lt;/p&gt;
&lt;p&gt;There are powerpoint presentations and publications on file sharing sites, seeded through torrents, which are now impossible to access for people in India. A large amount of our personal research and lectures, which we have shared for educational purposes, are now not even available for us to download.&lt;/p&gt;
&lt;p&gt;And we are not alone in this. Hundreds of thousands of individuals, who have shared openly licensed material, have now lost the ability to access that information because one private company wanted to make sure it made its profits.&lt;/p&gt;
&lt;p&gt;I am not going to write a manifesto for the digital world, but I do want to put it out there, this new cultural MAFIA, grant to me my rights which their actions have violated. For every site that they have included in their banned list, they have disrespected the open, collaborative licenses that enabled sharing of information whose value, usage and worth is more than their commercial pot boiler, which shall hopefully be forgotten before we realise it was released in the markets.&lt;/p&gt;
&lt;p&gt;Their commercially driven arrogance has suddenly demanded that we pay a price for the shared information, and that price should be to those who hold rights over the movie.&lt;/p&gt;
&lt;p&gt;And so I am writing this open call, for you to come and demand your right. If that movie producer has the right to protect his interests, you and I have the right to protect ours. I demand that for every site that I am not able to access, for public domain information that I am entitled to, they pay us a penalty.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-kolaveri-di'&gt;https://cis-india.org/internet-governance/open-letter-to-kolaveri-di&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-23T07:02:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/private-eye">
    <title>The Private Eye</title>
    <link>https://cis-india.org/internet-governance/private-eye</link>
    <description>
        &lt;b&gt;The world’s largest digital social networking system, oh ok, Facebook, to just name names, was ­recently in a lot of buzz.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/the-private-eye/948806/0"&gt;Nishant Shah's article was published in the Indian Express on May 14, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The world’s largest digital social networking system, oh ok, Facebook, to just name names, was ­recently in a lot of buzz. For once, it was not about the laments of how we are downgrading the meaning of friendship, eroding social relationships, and visions of an apocalyptic future where people will lose the knack of face-time to interface intimacies. Instead, the buzz was about Facebook’s collaboration with the American non-profit coalition Donate Life America to encourage more people to sign themselves up as organ donors. The feature that allows the American users to sign up as organ donors, promising their organs, in the event of their death, to others who might live through them, has been an instant hit. More than a lakh people have updated their status to reflect their volunteering as organ donors, and thousands others have signed up for the noteworthy initiative.&lt;br /&gt;&lt;br /&gt;There is no doubt that harnessing the powers of social networks for such causes is laudable, and indeed, follows the trends that we have been witnessing the last few years, where people have mobilised their networks for a range of things — from overthrowing governments to dancing in flash mobs. It is interesting that initiatives which were already working with large-scale networks are now collaborating within the social media space to tap into the immense potential of social networking. It is also noteworthy that Facebook Connect, which is a slowly growing system by which users authenticate themselves to different portals and can use their Facebook credentials instead of creating new profiles with more passwords to remember, was used effectively to facilitate registering for a new system. It is a testimony to Facebook’s growing omnipresence, that initiatives like these can use those credentials in their systems.&lt;br /&gt;&lt;br /&gt;There is a wide range of interests that punctuate this phenomenon and there is a rich discourse that reports, analyses and maps it. However, I want to take this opportunity to make a distinction between data types that is often lost in the presumption that all information on a social network is the same kind of information. With the enabling of this feature, Facebook has started mining a new set of personal data that is at once fiercely private and vulnerable. Till now, Facebook and other such social networking systems were already harvesting a wide range of data — personal data such as name, gender, birth-date, pictures, etc.; social data such as relationships, interactions, communities, groups, likes, etc.; usage data like preferences, navigation, search, frequency of interaction et al. While all this data has been about the personal, it is also data that we share and display in our everyday life. Who we are, what we look like, the politics that we subscribe to, the communities we are a part of, languages we speak, products we consume and people we hang out with is physical data that is available to anybody who cares to watch us.&lt;br /&gt;&lt;br /&gt;While there are serious repercussions on what happens when such data falls into malicious hands, there is still objectivity to this data. This is data which we can understand as personal — as referring to the person, but not necessarily private. Private data is actually the information that we have singular access to. And this distinction between the personal and the private is good to understand, because with the Organ Donor badge, Facebook has entered a new realm of data mining, which is truly private. Till now, privacy arguments around Facebook have not been as fuelled as they might otherwise be, because there is an innate understanding that there is a certain performative aspect to our personal data, because it facilitates different kinds of negotiations, transactions and engagements. However, with private data — health and medical history, gender and sexual orientations, desires and fantasies, moral and ethical choices — we are entering murky waters. This happens because while violation of personal data can be easily rectified by resorting to the law, the private is more in the grey zone, subject to interpretations and often unquantifiable in its intensity.&lt;br /&gt;&lt;br /&gt;The concerns that will emerge are the same kinds that we have seen in other large projects that deal with private data like the Aadhar project that uses biometric identification data to identify citizens in India. While Facebook might not be collecting biometric data, it is important to recognise that this new kind of data disclosure, which puts our private information in the public domain, only mandates better security and privacy control within these social networks. As we move towards a data-driven future, we need to be more aware of the different kinds of data sets that we are making public and educate ourselves about the risks of this disclosure, without being carried away by the sway of meme-like behaviour and viral trends online. The next time you decide to reveal some new kinds of data about yourself, pause for a moment and reflect on whether it is personal or private, and whether it is absolutely necessary to facilitate your interaction within that information system and the ­rewards and dangers it comes with.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/private-eye'&gt;https://cis-india.org/internet-governance/private-eye&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-24T06:25:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/non-human-intelligence">
    <title>Non human intelligence is closer than you think!</title>
    <link>https://cis-india.org/internet-governance/non-human-intelligence</link>
    <description>
        &lt;b&gt;In one of the research projects that I have been involved in, I was recently a part of a jury, for a contest which required on-line voting. It sounded like a fun thing, giving the participants a chance to bring in their inherited networks and also expanding the reach of the contest entries.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/non-human-intelligence-is-closer-than-you-think-288019.html"&gt;Nishant Shah's article was published in FirstPost on April 25, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We were just about to close shop and announce the clear winners who had a landslide victory in the contest, when following up on a clue – a simple mismatch between the number of people who had visited the webpage and the number of votes polled – sniffed up by a colleague, we were suddenly faced with the suggestion that a lot of the votes cast in the contest were by non-human actors.&lt;br /&gt;&lt;br /&gt;The first instincts for many of us involved were that an act of deception or fraud had happened. It felt natural, to most of us that when we asked for votes, we were specifically looking for human votes. Our relationship with technologies – digital or otherwise – has been primarily defined through usage. We use technologies so that we can perform an intended task. Especially with transparent and wearable portable technologies, we constantly think of them as disposable extensions which help execute our ideas and actions with efficiency.&lt;/p&gt;
&lt;p&gt;In this one-way functional understanding of technologies, we often forget that these technologies are not merely tools. More often than not, the technologies that we interact with and engage with, shape the ways in which we look at the world. This is true even of the simplest of tools – If you have a hammer in your hand, the whole world appears to be a nail.&lt;br /&gt;&lt;br /&gt;Within large-scale digital networks this becomes so much more complicated because the lines between human and non-human actors within those networks are very blurred. Our engagement with the network is not merely to use it as a conduit for communication. The network is an intelligent entity. It grows, learns, watches and responds to our different actions. There are actors within the network which can perform actions which might resemble, if they are not exactly the same, as the human actions in the same environment.&lt;br /&gt;&lt;br /&gt;In fact, we are often faced with non-human actors – call them bots, scripts, artificial intelligence, or any other name – which are more efficient in performing certain repetitive and recursive actions which are necessary to sustain the network, that the human actor might be unable to cope with.&lt;br /&gt;&lt;br /&gt;Think of your favourite social network and realise that there are so many ways by which the interface and the network, aided by a range of non-human actors, are interacting with you constantly to customise and ease your interactions within the network. Anthropomorphised guides give you tours of new applications. Email based bots notify of activity in your network. Sniffers detect your browser, your ISP, your connectivity speed, your browser, your access device, your preferred language, your customised settings, etc. to render the social network legible on your screen.&lt;br /&gt;&lt;br /&gt;We increasingly depend upon these transparent workers, very much like the magical servants in Beast’s enchanted castle in the fairy tale about Beauty and the Beast. If you do a measure of who you interact with the most within a network you will quickly realise that what you actually interact with, within a network, is these non-human actors who facilitate your peer-2-peer connections in the digital domain.&lt;br /&gt;&lt;br /&gt;And this is not limited to your social networking systems. As we move towards a more intuitive internet that operates through multiple nodes and forms pervasive and persuasive networks of being, we are increasingly living with non-human actors who can mimic life more efficiently in their native environments. The bots that perform edits on Wikipedia entries to clean the language and correct styles are made out of code.&lt;br /&gt;&lt;br /&gt;Scripts that relay information about your usage so that it gets logged, tracked and visually presented in Google Analytics are also bits and bytes. The IVR that you use for your financial transactions or indeed the very systems which authenticate your credit card details, without you worrying about fraud is because it is done without human intervention. It is despite these transactions, or perhaps, because of it, that we refuse to think of technologies as sapient.&lt;br /&gt;&lt;br /&gt;We often think of ourselves in technology terms and sometimes also Disnefy our gadgets by giving them names and talking of them as almost-human. However, when it comes to questions of actions or doing things, there is a false presumption that the human proposes and the technological does it, despite the contrary evidence that we generally have the technological dictating terms and us following them through within digital networks.&lt;br /&gt;&lt;br /&gt;We resolved our small crisis by counting only the human votes. But that resolution is not one that we will be able to live with for long. We are soon going to enter worlds where the non-human actor in the network is going to have equal rights, agency, will and choices, and it will perform actions that will have equal credibility as the human one. If not more.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/non-human-intelligence'&gt;https://cis-india.org/internet-governance/non-human-intelligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-24T06:36:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook">
    <title>Sharing in the time of Facebook, or Why I’m not a Pirate</title>
    <link>https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook</link>
    <description>
        &lt;b&gt;It is now over a month that my favourite network has been dead. Library.nu the rare space for sharing of academic resources to a free and open community has succumbed to the pressures of publishing industry stalwarts who, in their quest for promoting the knowledge industry, are killing sources through which knowledge survives.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/sharing-in-the-time-of-facebook-or-why-im-not-a-pirate-269717.html"&gt;Nishant Shah's article was published in FirstPost on April 9, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;True, Library.nu, that Mecca for those of us who live in countries where public libraries are not well stocked and resources for procurement of books are low, was essentially a file sharing network. It allowed people to offer digital copies of books in their possession to be shared around the world for no commercial gain.&lt;/p&gt;
&lt;p&gt;For scholars and learners around the world, this was the place to find books which would otherwise be unavailable in their local contexts without expending a lot of time and effort. And now it is closed with an R.I.P. sign on their website which once offered such promises of joy.&lt;/p&gt;
&lt;p&gt;This shutting down of Library.nu is not new or unexpected. Large scale global networks of sharing information online have been persecuted ever since the emergence of the WWW. From the historic battles that Napster had to fight to allow users to share music which was under copyright to large companies, to the persistent wars that ThePirateBay resolutely fights, networks which counter the logic of the libertarian web dream have always come under huge pressures to shut down.&lt;br /&gt;&lt;br /&gt;This is a part of a much larger debate around intellectual property rights and infringement within the digital world that we live in, and voices on both the sides are always going to be strident in their discussions of free and open knowledge. However, what I want to talk about is how these acts of sharing, which are being condemned as acts of ‘stealing’ or ‘piracy’ are actually endemic conditions of building digital networks.&lt;br /&gt;&lt;br /&gt;The network is not merely a combination of elements. While the infrastructure and logistics of a network are crucial to its sustenance, the mere assemblage of these objects does not make a network.&lt;br /&gt;&lt;br /&gt;It is now known that the networks that we occupy are alive and need different investments of human and non-human efforts and energies to sustain them. Or in other words, just putting together of servers and platforms is not what Facebook is about. Or what is the most important thing on Pinterest is actually what you do with it.&lt;br /&gt;&lt;br /&gt;Similarly, just getting people on to the networks is not enough – Remember Diaspora? You don’t? That’s the point. It is highly possible to have failed networks that have all requisite infrastructures and a wide corpus of people who are a part of it. What really sustains a network is the ability of the members to act within them. Networks are not only places to occupy but also sites where people can perform different activities.&lt;br /&gt;&lt;br /&gt;And it should come as a surprise to nobody that within the digital networks, the primary activity that people perform, is sharing. We share information about our lives, relationships, likes, political causes, and cultural objects that we are fond of. We share data about things that intrigue us, things we are concerned about, things that we need to know about. We share content including books that we like, videos that amuse us, and music that we need to connect through. All these social networks of sharing and collaboration form the basis of innovation and radical change, shaping our futures.&lt;br /&gt;&lt;br /&gt;And yet, these corporate networks which also allow for sharing are never looked at as piracy. Once in a while, a video on YouTube gets revoked because it has a sound track that might be owned by a big Music Industry. There might be an instance where Orkut or Google Plus might take down content which might be objectionable. Facebook alleges that it has bots which check for possible pirated content. But all in all, because these networks are so obviously tied in to both the circulation and production of capital and filling the coffers of wealthy corporate houses, remain unaffected by charges of piracy.&lt;br /&gt;&lt;br /&gt;However, smaller independent networks – networks that are established to realise the true potentials of openness, sharing and collaboration – and do not necessarily run up big balances for private sectors, immediately get vilified as vice houses of piracy. The introduction of piracy as the demon to fight on the Internet has provoked many false advertisements that equate it to stealing a car, or robbing a bank.&lt;br /&gt;&lt;br /&gt;In this, they try to obscure the fact that piracy – sharing of material – is a community activity. It subscribes to the logical flows of information and opens it to new audiences, interpretations and dialogues continually. What is often pathologised as piracy, is the basis of new and innovative knowledge practices, granting access to knowledge for constituencies and demographies which have been excluded from knowledge practice in the past.&lt;br /&gt;&lt;br /&gt;What piracy threatens is not knowledge but the industries that seek to make their wealth out of knowledge economies. And to protect the interests of these limited few, independent file-sharing networks get targeted as promoting piracy whereas activities within corporate social networks are tolerated as benign.&lt;br /&gt;&lt;br /&gt;Piracy, when it affects small scale producers or independent artists does need to be thought about. But at stake in those events is the larger conditions of commoditised cultural production and the alienation of the artist from their own products – forfeiting their rights to large corporate houses. What sharing as a phenomenon offers to us, is the promise of a new knowledge economy where affordability or remoteness do not become discriminatory factors for those keen to consume and share cultural products and knowledge.&lt;br /&gt;&lt;br /&gt;The Pirate Party in Sweden has announced that File Sharing is a religion and is trying to make it into a practice that is sacred to all of us who thrive in these conditions of free and open knowledge. I want to join my voice to theirs, in the memory of that Promised Land – Library.nu – and the lords of free books, and ask for my right to Pirate Share in networks of my choice.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook'&gt;https://cis-india.org/internet-governance/sharing-in-the-time-of-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-10T10:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/caonima">
    <title>Cao Ni Ma plushies</title>
    <link>https://cis-india.org/home-images/caonima</link>
    <description>
        &lt;b&gt;The Cao Ni Ma became so popular that plushies were sold in the markets.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/caonima'&gt;https://cis-india.org/home-images/caonima&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-02-23T11:09:33Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/adrienneshaw">
    <title>Adrienne Shaw</title>
    <link>https://cis-india.org/home-images/adrienneshaw</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/adrienneshaw'&gt;https://cis-india.org/home-images/adrienneshaw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-11-18T04:26:06Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook">
    <title>Digital Native: Delete Facebook?</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook</link>
    <description>
        &lt;b&gt;You can check out any time you like, but you can never leave.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/digital-native-delete-facebook-5127198/"&gt;published in Indian Express&lt;/a&gt; on April 8, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One fine day, we all woke up and were told that &lt;/span&gt;&lt;a href="http://indianexpress.com/about/facebook/"&gt;Facebook&lt;/a&gt;&lt;span&gt; sold our data to Cambridge Analytica and then they made dastardly profiles of us to target us with advertisement and political propaganda, so, we made a beeline for #DeleteFacebook. The most surprising part about the expose is how much of a non-event it is. We have been warned, at least since the Edward Snowden revelations, if not earlier, that our data is the new oil, coal and gold. It is being used as a resource, it is being mined from our everyday digital transactions, and it is precious because it can result in a massive social engineering without our consent or knowledge. Ever since Facebook started expanding its domain from being a friends-poke-friends-with-livestock website, we have been warned that the ambition of Facebook was never to connect you with your friends but to be your friend.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Time and again, we have been told that the sapient Facebook algorithm remembers everything you say and do, anticipates all your future needs, and listens to the most banal litany of your life. More than your mom, your partner or your shrink, it’s the Facebook algorithm which is interested in all your quotidian uselessness. It is not the stranger who accesses your post that should worry you. The biggest perpetrator of privacy violations on Facebook is Facebook itself. There is good reason why a company that offers its prime products for free is valuated as one of the richest corporations in the world. The product of Facebook – it has always been known – is us.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Why, then, are we suddenly taken aback at the fact that Facebook sold us? And while we are sharing our thoughts (ironically on Facebook) about deleting our profiles, the question that remains is this: How much of your digital life are you willing to erase? Because, and I am sorry if this pricks your filter bubble, Facebook’s problem is not really a Facebook problem. It is almost the entire World Wide Web, where we lost the battle for data ownership and platform openness more than two decades ago. Name one privately owned free service that you use on the internet and I will show you the section in its “terms and services” where you have surrendered your data. In fact, you can’t even find government services, tied up with their private partners, where your data is safe and stored in privacy vaults where it won’t be abused.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It is time to realise that the popular ’90s meme “All your base are belong to us” is the lived reality of our digital lives. As we forego ownership for convenience, as our governments sold our sovereignty for profits, and as digital corporations became behemoths that now have the capacity to challenge and write our constitutional and fundamental rights, we are waking up to a battle that has already been fought and resolved. A large part of our physical hardware to access the internet is privately owned. This means that almost all our PCs, tablets, phones, servers are owned and open to exploitation by private companies. Every time your phone does an automatic update or your PC goes into house-cleaning mode, you have to realise that you are being stored, somewhere in the cloud in ways that you cannot imagine.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It is tiring to hear this alarm and panic around Facebook’s data trading. Not only is it legal, it is something that has been happening for a while, most of us have been aware of it, and we have resolutely ignored it because, you know, cute cats. If somebody tells you that they are against privately owned physical property and are going to start a revolution to take away all private property and make it equally shared with the public, you would laugh at them because they are arriving at the battle scene after the war is over. This digital wokeness trend to #DeleteFacebook is the digital equivalent of that moment. If you want to fight, fight the governments and nations who can still protect us. Participate in conversations around Internet governance. Take responsibility to educate yourself about the politics of how the digital world operates. But stop trying to feel virtuous because you pulled out of a social media network, pretending that that is the end of the problem.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook'&gt;https://cis-india.org/raw/indian-express-nishant-shah-april-8-2018-digital-native-delete-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-05-06T03:08:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/not-a-goodbye-more-a-come-again">
    <title>Not a Goodbye; More a ‘Come Again’: Thoughts on being Research Director at a moment of transition</title>
    <link>https://cis-india.org/raw/not-a-goodbye-more-a-come-again</link>
    <description>
        &lt;b&gt;As I slowly make the news of my transition from being the Research Director at the Centre for Internet and Society, Bangalore, to taking up a professorship at the Leuphana University, Lueneburg, Germany, there is a question that I am often asked: “Are you going to start a new research centre?” And the answer, for the most part, is “No.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Not because I don’t see the value of creating institutional spaces like these or that starting and running CIS has been anything short of a dream, but because I don’t how to. When I tell people I don’t know how CIS came into being, they suspect that I am being either facetious or dismissive. But I am not. If somebody asked me to write an Origin Story for CIS, I would be baffled – or probably sum it up by saying that it happened. There was the germ of an idea, a whole lot of people who responded to it, and like the great Tolkienian epic, it was a story that grew in its telling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I was 27, when Sunil Abraham, the now Executive Director and I met together in New Delhi, to talk about what a research organisation that represents the public interest at the intersections of Internet &amp;amp; Society would look like. We spent three days in the Delhi heat, coming up with the most fantastic ideas about methods, structures and core areas of interest. It was one of those divine exercises where you build the template for your dream work and then, like a fairy-tale, we had incredible people who came and supported us to make that dream a reality. In six months of that first conversation – I had just turned 28 and was completing the last drafts of my Ph.D. dissertation – CIS got officially registered and with some of the most incredible people, who have been with us, both in their generous affective investment as well as in their intellectual and professional support, we kicked-off a research centre, that has become not only hard to ignore but also significantly important in bringing about scholarly and practice based research around the different facets of how the emergence and widespread reach of the Internet is changing the ways in which we become human, social and political in emerging information societies of the Global South.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 7 years since that first conversation started, I have learned so much from CIS and the networks that built around it, that it would be impossible to write an exhaustive account of it. However, as I now take up a new position at the CIS as a member of its board, and continue to collaborate with the on-the-ground teams intellectually, from my new position as a Professor, there are five things I want to dwell upon, more to remind myself of important lessons learned, but also as approaches that the new director and team might want to reference:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Research cannot be individually focused&lt;/b&gt;&lt;br /&gt;One of the things that academic training does is that it promotes the idea of an individual researcher. We write, publish, seek grants and present our work, taking individual credit and building a body of work that is centred on us. True, we collaborate and we participate and we are opening up more distributed modes of learning and research, but at the end of the day, there is still an imagination of a research community that is built of individual scholars who work in a happy symbiosis and synthesis.&lt;br /&gt;&lt;br /&gt;The biggest lesson I learned with the CIS was that research requires collectives – peers, supporters, and critics – that can help materialise a vision. Instead of trying to do ‘my’ research, it was the first time that I was enabling others’ research. I had a say in building the research vision, and establishing protocols of rigour and review, but to have a dream, and then to share it with others, so that it becomes a collective dream was an incredible experience. It was the beginning of a method that I hope informs all my work, where research methods are constantly going to accommodate for and be shaped by collective visions and approaches rather than just the individual as a lone warrior. More than anything else, it reassures us that we are not alone, either in our triumphs or our road-blocks, and it builds a community of thinkers that is more important than just the single authored outputs that we bring out.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Research requires infrastructure&lt;/b&gt;&lt;br /&gt;Institutions are infrastructure. However, our jobs are so segregated, that we don’t always realise the incredible effort that goes into building such institutions and then making them work as efficient infrastructure to support research. It is very rare, in research publications that we thank our everyday office staff, the accounts team that processes the complicated bureaucracies of research funding, the programme managers who create networks and evaluation formats, or the numerous people who perform ‘non-research’ jobs so that we can do the research. &lt;br /&gt;&lt;br /&gt;I had worked in project and programme manager positions before CIS. I had also worked as an independent researcher and consultant before that. But this was the first time I actually took the dual responsibility of not only initiating research but also providing the infrastructure for it. And I know that I am a wiser person for it. The intricate world of fund-raising, managing and developing networks, of implementing and monitoring research projects and contracts, and the need to constantly find sustainable options for the research programmes is something that requires an incredible amount of effort and resources. The researchers often are kept away from this world, or we often just ignore the intense quotidian activities that give us the privilege of doing our work, and my time with CIS taught me not only to appreciate this, but also to recognise these tasks as research.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;All research must try and answer the ‘So What?’ question&lt;/b&gt;&lt;br /&gt;Within academic circles, research has inherent value. We do have the freedom to develop new frameworks and ideas that might not have any immediate relevance and might in fact even fail without seeing the light of day. Academia is privileged because as long as we perform our pedagogic tasks, we have the space to experiment and often work on areas that might not benefit anybody outside the disciplines that we are located in.&lt;br /&gt;&lt;br /&gt;At CIS, working at such close quarters with colleagues who are experts in policy and regulation, research became critical for me. It wasn’t research for research’s sake. It was research with a cause. At the same time, making the research relevant was not an exercise in dumbing it down so that it can be reduced to easy implementation. The effort required at making academic and intellectual research accessible, while still retaining its complexity has been a heady experience for me. Since CIS, I have tried to make sure that all research is able to answer the ‘So What?’ question, and every time, it has made the research more robust, more rigorous and having a greater audience and impact than it would otherwise have. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;To be a research organisation is to be unafraid&lt;/b&gt;&lt;br /&gt;One of the most fantastic things about being a young research organisations was that we were not afraid to voice our opinions and voice them loud. In the last 6 years, CIS has evolved into a strong voice that is not unanimous, but is still clear. We have had disagreements with established research and policy actors. We have critiqued decisions taken by policy and development institutions when we felt that they were flawed. We have provided a critical commentary to different instruments of law and regulation when necessary. We have challenged academic researchers in their methodology as well as in their disconnect from the ‘real world’. And we did it, because early on, the people who guided us, taught us, that research organisations have to be unafraid. &lt;br /&gt;&lt;br /&gt;Unafraid, not just to ask tough questions of those outside, but also of asking tough questions internally. The team, as it has grown, has been a smorgasbord of disciplinary and stakeholder locations. We don’t necessarily speak the same language. We don’t also, agree on many critical points. But we never tried to be a consensus generation institute. Instead, we learned to coexist and even collaborate in our differences – it was something that external partners often had problems with. How can one set of people work towards critically opposing a phenomenon when others might actually write in favour of some of the aspects of that same phenomenon? How is it possible that some in the institute have great collaborations with a network that the others critique persistently in their work? These tensions, for me, have been generative and I hope that they continue, both in the institution but also in my future work.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Researchers are people too&lt;/b&gt;&lt;br /&gt;This is one of the strangest things to realise, but it is a good lesson to remember. Academia and research work through abstractions. At some point, the researchers become names. They become only a body of work, a certain number of words. But dealing with researchers is to deal with human beings. We have to remember that researchers, while they are often driven and passionate and unable to extricate their lives from their work, do have lives and bodies and socialities that need to be managed. Institutions often get driven by matrices of measurement and politics of promotion and evaluation, at the neglect of the people who actually build it. The constant push at CIS was to recognise that we are all too human in our everyday lives. And to build work environments, relationships and spaces that nurture the people we work with is the primary responsibility of all research. &lt;br /&gt;&lt;br /&gt;These points are probably too vague, but this blog post is already too long. I just wanted to take this opportunity to write some ‘Notes to the self’ about things that have been the most important to me in being the co-founder and Research Director at the Centre for Internet and Society. And now, it is time for me to move on. I want to place myself in an academic setting where I learn, I get some headspace to think and write, and do the one thing that I enjoy the most – teach. Starting 1st October 2014&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;I am stepping down as the Research Director and taking up a professorship in a new and exciting university, designing courses and research agendas at the intersections of internet studies, media studies, culture studies and aesthetic studies, bringing together some of my most passionate areas of interest. However, I continue to be interested and invested in CIS’ institutional growth. I shall be a part of the search committee as we invite a new Research Director in the Bangalore office, I shall be a part of the Board that governs the CIS, and I shall always think of CIS as my home, continuing mentoring and implementing existing collaborations but also building more, especially towards the pedagogic and knowledge production side of things.&lt;br /&gt;&lt;br /&gt;When the final decisions about this transition were made last week, I had thought I would be emotional and heart broken. Instead, I only feel excited. I have a wonderful set of colleagues in Bangalore, and they, in turn, are at the centre of networks of support, love, empathy and trust. CIS will benefit from having a new Research Director who will bring new visions, new methods, new processes and infrastructure to the table, and I hope that as my own academic career grows, I shall find myself returning to CIS in different capacities and roles, both for what I could contribute to it, but also for what I continue to learn from the rich range and variety of activities that it anchors.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].For me, this is not a goodbye, but just a change in roles at the CIS. I will continue to use my CIS credentials and email address, and will be found on the existing contact details there for any queries or interactions with and on behalf of the CIS. So no need to change your address books, just yet.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/not-a-goodbye-more-a-come-again'&gt;https://cis-india.org/raw/not-a-goodbye-more-a-come-again&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2014-06-15T02:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/blog">
    <title>Conference Blogs</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/blog</link>
    <description>
        &lt;b&gt;The conferences that CIS participates in, individually or institutionally, and the ideas that emerge from them.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/blog'&gt;https://cis-india.org/research/conferences/conference-blogs/blog&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-20T23:19:42Z</dc:date>
   <dc:type>Collection (Old)</dc:type>
   </item>




</rdf:RDF>
