<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/we-are-cyborgs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/pathways/facultyworkshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-june-16-2019-staying-silent-about-cyberbullying-is-no-longer-an-option"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-june-24-2017-digital-native-on-mute-the-voice-of-the-people"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/what-is-dilligaf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all">
    <title>One Pokémon to Rule Them All</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all</link>
    <description>
        &lt;b&gt;America’s head start on the augmented reality game Pokémon Go shows that the interweb is not an egalitarian space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/technology-others/one-pokemon-to-rule-them-all-2917316/"&gt;published in the Indian Express&lt;/a&gt; on July 17, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I was busy, writing, when a Telegram message trickled in. It was a friend who asked me if I had looked at the new Pokémon Go game which has been getting more attention than national elections and global warfare in the USA lately. A location-based augmented reality game that involves the users moving around their physical environments “collecting” pokemon characters that appear hiding in different locations has a large part of the American population in a frenzy, leading to aching soles, traffic accidents, and involuntary bumping into things and people as the players move around, their eyes glued to their screens. The global release of the game is still in the pipeline, and so the rest of us will have to make do with the videos and screen grabs of the game.&lt;br /&gt;&lt;br /&gt;While a big Pikachu fan myself, I don’t see myself going crazy over this game as and when my geography allows me for it, but the friend who had written to me about it is perturbed. An avid gamer and a self-proclaimed Pokémon fan, he is devastated that the users in privileged geography are going to get a head start in the global leader boards that he can never catch up with. The interwebz is already abuzz with players sharing hacks, cracks, bugs, cheat codes, and tips to collect more Pokémon, discover hidden powers, and rise quickly in the ranks as they drive, walk, run and jog around their neighbourhoods, in the quest of catching those delightful monsters on their phones. While my friend is aware that this cloud-based game will have multiple servers for different geographies, and so there will be relative rankings and customised interfaces for each community of players, he was feeling cheated about living in India and not having access to the first release of the game that has all the attention on the social web right now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘It almost makes me want to leave India and move to the USA,’ he said in mock frustration. It made me think about the privilege of geography when it comes to the presumed flatness of the digital world. One of the imaginations of the peer-to-peer architectures of the internet is its promise of flatness. With a series of non-discriminatory principles like #NetNeutrality and #ZeroRating enshrined as the fundamental attributes of the digital internet, we are often led to believe that when we are online, we are equal. This idea is so prevalent that in most of our technology-based development practices and policies, we think of access as the “be all”, if not the “end all”, of our activities. The rhetoric promises that if we get everybody online, we will have an egalitarian society where everybody will have equal access to resources, and equity by participating in the decision-making processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite overwhelming evidence that the digital world is anecdotally and systemically a space of exclusion, contestation, and intimidation, we continue to propagate the idea that these are “human” problems. Humans, fragile, frail and foolish in their being, contaminate the digital space. Humans, mired in the analogue systems of hatred and abuse, appropriate technologies to perpetuate these older forms of discrimination. The technological structures are imagined as pure, sterile, and committed to constructing parameters of equality through their neutral promises of universal access and seamless connectivity. Technology is clean, the human being is impure. Technology is robust, the human frail. Technology is flat, human hierarchical. These narratives of a neutral and egalitarian technology consequently lead us to put more importance and faith in algorithmic decisions and data-driven governance and policing. We have come to believe that because technologies are neutral, they will do a better job of regulating us than we do ourselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pokémon Go, and its obvious geographical privilege reminds us that the digital is not flat. It is oriented towards a very obvious logic of geopolitical, economic, racial, and identity privileging that continues to promote some parts of the world as favoured standards of first access. The exclusive release of Pokémon Go reminds us that the digital is as subject to Euro-American centrism which treat these erstwhile imperial geographies as the beginning points of all digital activities, slowly expanding their fold to other regions through a trickle-down politics and economics. Whether you are waiting impatiently to join the global bandwagon of Pokémon collection, or are ready to shrug this off as another thing that people do on the web, this differential, preferential, and variable access of the internet is something we definitely want to consider as we continue to push for the digital as the solution to human problems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T01:16:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge">
    <title>IPv6: The Transition Challenge</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge</link>
    <description>
        &lt;b&gt;The future of our connected networks is Internet Protocol version 6 (IPv6). Not only is it more efficient and faster than IPv4 which we are currently working with, it is also more reliable and secure. &lt;/b&gt;
        
&lt;p&gt;The IPv6, for instance, has an in-built security protocol called 
IPSec, which authenticates and secures all IP data. The data carrying 
capacity of IPv6 networks is also going to be higher. This means that 
more devices with more features will be able to work seamlessly through 
these networks. Despite the larger load of information, IPv6 packets are
 easier to handle and route, just like postcards with pincodes in their 
addresses are easier to deliver than those without.&lt;/p&gt;
&lt;p&gt;We have already seen great examples of successful implementation 
during the 2008 Beijing Olympics.&amp;nbsp; Every aspect from the security 
surveillance to managing vehicles and the coverage of the Olympic events
 was done over IPv6, including live streaming of the events over the 
Internet. The Chinese government, in fact, has already launched a ‘China
 Next Generation Internet’ (CNGI) project to build IPv6 networks which 
are going to radically change the face of high-speed internet in the 
country. With all these benefits available to us in this next generation
 protocol, the question that remains is why only a meagre 2% of the 
world’s internet traffic is conducted through it? Why haven’t more ISPs 
shifted to IPv6?&lt;/p&gt;
&lt;p&gt;There are two very clear reasons. The first one is that of costs and 
infrastructure. The IPv6 platforms do not communicate easily with the 
IPv4 networks. We have the choice of a mammoth transition of all IPv4 
websites and networks to new IPv6 protocols. This idea of abandoning 
IPv4 and moving to a new protocol is not only redundant; it is also 
futile, because IPv4 is already running the largest network in human 
history quite efficiently. &lt;strong&gt;What we need is translators which will be 
able to speak to both the different versions and help our devices work 
through them seamlessly&lt;/strong&gt;. Older, more successful technologies have 
been able to do this. So, television, for instance, whether it receives 
terrestrial data, satellite images or data transferred via cable, is 
able to translate and render them into images and sounds which we can 
consume with ease. However, the translators for the IPv4 – IPv6 still 
expensive and we need more resources diverted towards making them 
affordable.&lt;/p&gt;
&lt;p&gt;The second reason is linked to the first. In order for IPv6 to become
 popular, it needs a minimum threshold of service providers and users 
riding that network. As long as the deployment remains nascent, there 
will be no concentrated energy to actually try and make the bridges 
between versions 4 and 6. While global technology organisations like 
Tata Communications are ready for the transition, we are going to need a
 systemic change among all stakeholders to make IPv6 a reality, towards a
 faster, safer and more robust Internet.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by &lt;a class="external-link" href="http://www.tatacommunications.com/"&gt;Tata Communications&lt;/a&gt; and the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The above blog post was reproduced in &lt;a class="external-link" href="http://mis-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;MIS Asia&lt;/a&gt;, &lt;a class="external-link" href="http://www.cio-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;CIO Asia&lt;/a&gt;, &lt;a class="external-link" href="http://computerworld.com.sg/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Singapore&lt;/a&gt;, and &lt;a class="external-link" href="http://www.computerworld.com.my/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Malaysia&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge'&gt;https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change">
    <title>IPv6: Embrace The Change</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-embrace-the-change</link>
    <description>
        &lt;b&gt;A moment of transition is always filled with anxiety. There is concern over the unknown and there is a reluctance to move out of the familiar. However, a transition does not necessarily mean migration; or in other words, as we transition to  IPv6 as the new protocol for digital and electronic communication, it does not mean that we are going to abandon the internet as we know it.&lt;/b&gt;
        
&lt;p&gt;In fact, for most of the users, it is going to be a transparent transition, where their devices are going to be able to harness the powers of IPv4 and 6. While there are huge benefits at the back-end, leading to better security protocols and low maintenance, there are a few advantages that the user should also celebrate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Faster Internet&lt;/strong&gt;: Because IPv6 will open up a huge range of IP addresses, direct routing of data becomes a possibility. As data does not have to be routed through many servers or nodes within a network, it can reach its destination faster. With the way our digital access and sharing is going right now, this is not to be taken lightly. In many ways this is the same transition we had from the dial-up connections, where the transfer of picture and video files within minutes was totally unheard of, while now we’re in an age where we stream high density video on all our computing devices with ease.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More collaborative and shared Internet&lt;/strong&gt;: With the abundance of IP addresses coming our way, there is going to be more scope for multiple devices to be connected online. New platforms of collaborative knowledge production and sharing can be designed to become infinite and inclusive in their scale and architecture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More connected devices&lt;/strong&gt;: The inter-operability features of IPv6 ensure that more devices are able to communicate with each other with ease. The science-fiction futuristic dream of a completely connected environment where human and artificial intelligence can work together, using a range of devices, is actually a material possibility with large scale IPv6 implementation. This can also trigger new innovation that helps reconstruct some of our existing devices in new forms and shapes.&lt;/p&gt;
&lt;p&gt;While affordability and the migration to new network infrastructure are the gating factors to this transition, these are diminishing costs and we are looking at more interesting internet architecture as we move towards IPv6. Perhaps, one of the most reassuring points of this transition is that we do not need to abandon the familiar internet we are already working with; the transition is not a moving on, but a moving to, and in it are the promises of a safe, secure and speedy internet. Global technology organisations like Tata Communications &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;have embraced this change&lt;/a&gt;; it’s only a matter of time before others too recognise the need for IPv6 and the huge difference it will make to our lives.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by Tata Communications and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-embrace-the-change'&gt;https://cis-india.org/internet-governance/ip-v-6-embrace-the-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T06:09:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture">
    <title>Digital Native: The bigger picture</title>
    <link>https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture</link>
    <description>
        &lt;b&gt;For all our sleek machines, we are slaves to the much larger Internet of Things.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://indianexpress.com/article/technology/social/digital-native-the-bigger-picture-5239747/"&gt;Indian Express&lt;/a&gt; on July 1, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There was a time, at the turn of the millennium, when we were trying  to cope with the fact that we live with sapient technologies. It was  new, to be thinking of cohabitation with things that speak, interact,  listen, and act in tandem with us. I still remember the time when the  first pagers and cellphones arrived — how difficult it was for people to  figure out the social etiquette for living with these devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From those early days, we have come a long way. Digital  things are everywhere — and we talk to them everywhere and everywhen. On  a regular day, our phones are on our dining tables, our devices are  buzzing with notifications silently in our pockets, and they are guiding  us in our everyday practices. They are not just bringing us information  but also listening to us, pre-empting our moves, doing things that we  have not even imagined yet. Living with technologies is old — the new  normal is living in technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I was recently reminded by a research team that the cars we drive are  giant super-computers with engines. That a new car on the roads has  more computational processing power than the land-rover on Mars. Our  cars are indeed computing devices and we sit in them, depending on a  variety of computational processes to keep us safe, as we are hurled at  high speeds ahead. Our smart homes, too, are slowly becoming sapient  surfaces with specific functions. Microwaves that remember meal times,  coffee machines that sense our proximity and start brewing or  refrigerators that keep track of our expired food — they are all very  basic computing devices that we are already used to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, our life is not just with the devices but the immense  networks of other devices that they connect with. I got reminded of this  very starkly on a recent trip to India, when I realised that the SIM  card that I had bought the last time has been deactivated for non-use.  At the same time, procuring a new SIM was going to need patience, time  and &lt;a href="https://indianexpress.com/article/what-is/what-is-aadhaar-card-and-where-is-it-mandatory-4587547/"&gt;Aadhaar&lt;/a&gt; authentication, which won’t happen at the airport. Additionally, there  were no wifi hotspots to use in the middle of the night. Thus started  the longest night of my life. In that four-hour digital blackout, I  found myself thinking of my condition as a state of disconnectedness, of  paralysis. I was surrounded by my two phones (don’t ask), my iPad, my  laptop, and, armed to the teeth with charging cords and power-banks.  Yet, none of them were of any use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once disconnected from the cloud that caters to my entertainment and  the services that keep me talking, it was as if all my devices were  useless. I scrolled through multiple screens and then gave up, resigning  myself to looking at others with data, with malignant longing. It was  with great shock that I realised that my devices are only gateway  machines. Despite all the money and effort I have spent in selecting  specific hardware combinations and care equipment, without their  capacity to speak to other machines-servers, controllers, nodes — they  are almost entirely pointless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So used am I to instant interaction, reciprocation and feedback with  my devices, I forgot that I am actually in conversation with an Internet  of Things that far exceeds my immediate intimacy with my personalised  screen. Somewhere in there is a powerful reminder of why data protection  and security are so critical, but also fragile in the connected Web.  Because we can do almost anything that we like to keep our individual  devices secure, but the large networks that give them life and animate  them are completely out of our control. In the face of this  uncontrollable void, the best we can do is hope that things will be  safe. And that illusion is not going to last long — in these moments of  disconnection, one realises it. Thankfully, before the head got filled  with the dark side of digital connectivity, I chanced upon an old movie I  had saved on my laptop to show in a class once. It was Wall-E. I  decided to just watch that film about a world where the only live thing  was a robot, and in some strange way, found it very comforting.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture'&gt;https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2018-08-01T00:11:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching">
    <title>Digital Native: How smart cities can make criminals out of denizens</title>
    <link>https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching</link>
    <description>
        &lt;b&gt;People download information and share it without knowing about the intellectual property rights. On social media bullying, harassment and hate speech find easy avenues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/digital-native-the-citys-watching-5258165/"&gt;Indian Express&lt;/a&gt; on July 15, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I first heard about smart cities in 2003. Sitting in India, it seemed to  be a very strange concept being developed in the Netherlands, where the  planners were trying to arm an entire city with smartness. The idea was  that if we deploy enough cameras, devices that see, machines that hear,  and data connectivity that envelopes the city in a seamless cloud, it  might lead to more order, discipline, and control. To me that felt like a  strange experiment because under all of those different imaginations of  the city as a neat, organised, controlled environment, were assumptions  that were alien to my Indian sensibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was strange to look at all the promises that “smartness” would deliver — it would make human life easier. It would increase safety and create order out of chaos. It would build new lifestyles that are filled with assistive technologies. In all of these, was the imagination of the city as a laboratory — controlled and efficient, as opposed to riotous and serendipitous. The cities were positioned as filled with intention, so that the interruptions of people, animals, festivals, traffic and crowds would be removed through the deployment of these digital devices and networks. What needed to be preserved was the city and its infrastructure, rather than the individuals and communities that make the city alive and exciting. We wanted our infrastructure to be smart, taking decisions on our behalf, and shaping our lives through the algorithmic protocols that they were coded to embody.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In that faraway time, these had felt like idle speculations. Fifteen  years on, I have now come to realise that the biggest motivation for  building smart cities was not really facilitating human movement,  habitation and habits. Indeed, at the heart of the smart city project  was the setting up of a massive surveillance apparatus that would  clinically diagnose the unwanted people and processes in the city, and  surgically remove them — with the assistance of predictive technologies  that would be implemented in policing and planning these city spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smart cities were not constructed to make people’s lives easier. They  were constructed because, increasingly, all the people in a city are  imagined as “users”, who need to be instructed through terms of  services, how they must behave and live in these city spaces. One of the  biggest cultural turns in the massification of the digital web was that  almost all users were imagined as potential criminals by the very  virtue of them being connected. Internet service providers and  regulators knew that if people are connected, they will be violating the  law at some point or another, sometimes unknowingly. People download  information and share it without knowing about the intellectual property  rights. On social media bullying, harassment and hate speech find easy  avenues. The largest traffic on the internet is for pornographic and  often banned material which finds its audiences on the connected web.  Spammers, viruses, hijacked machines, and, often, searches for  unexpected items lead people onto the dark web where the questionable  human interactions happen frequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The introduction of the digital terms of services was essentially to  presume that the user was a potential criminal who leases hardware and  software, and, platforms from proprietary companies and governments  could then control and discipline the user through comprehensive  surveillance practices. Construction of smart cities performs a similar  function in the physical space. Instead of thinking about citizens as  co-owners who shape city spaces, smart cities establish a service level  agreement with its occupants, and reduces them to users. Any deviation  results in punitive action or devaluation, often curbing the movement,  and the rights of belonging to the city spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that smart technologies can facilitate certain  aspects of human life, they depend on unfettered data collection,  predictive profiling, correlative algorithms and conditions of extreme  invasion and control — which are all predicated on the idea that you  will falter. And when you do, the technologies will be there to witness,  record, archive, and punish you for the daily transgressions till you  are wiped into becoming a predictable, controlled, cleaned up drone that  travels in docility across the networked edges of the city. We will be  assimilated. Resistance will be futile.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching'&gt;https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2018-08-01T00:19:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/we-are-cyborgs">
    <title>We Are All Cyborgs</title>
    <link>https://cis-india.org/digital-natives/we-are-cyborgs</link>
    <description>
        &lt;b&gt;The cyborg reminds us that who we are as human beings is very closely linked with the technologies we use.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/we-are-all-cyborgs/942874/0"&gt;Nishant Shah's article was published in the Indian Express on April 29, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you look at any illustrated 
history of human civilisation, you will quickly realise that it is also a
 history of technology. From the discovery of fire by Homo sapiens to 
the contemporary homo digitalis, there is no escaping that technologies 
of different kinds have not only changed the way we live but also helped
 us realise what it means to be human. Often, we treat these 
technologies as external to us, thinking of them as tools that we deploy
 to perform a particular task. However, as our technologies become more 
transparent, intimate and customised, we realise that we are developing 
relationships with the technological devices that surround us. So, if 
your laptop crashes, you feel crippled. There are people who proclaim 
that they feel amputated without their cellphone. It is quite reasonable
 to feel lost without the information compass of the internet.&lt;/p&gt;
&lt;p&gt;This
 relationship between human beings and technologies has been very 
concisely defined in the idea of a cyborg. A cyborg is a 
human-technology synthesis which enhances our capacities to live as 
human beings. While it might seem like a slightly new idea, once you 
realise that we constantly live with technologies and often internalise 
them in our bodies, it is not difficult to wrap our head around it. 
Think of people with pacemakers or prosthetic limbs or different 
implants in their bodies, who experience technologies as an integral 
part of their everyday life. Similarly, think of the wide range of 
technology apparatus that you depend on to live a “regular” human life. 
We have also seen iconic cyborg representations in popular movies — from
 the absolutely unforgettable Arnold Schwarzenegger in Terminator 2 to 
our very own dimpled Shah Rukh Khan as Ra.One — there has been a 
persistent imagining of the human being as we know it, evolving to 
become some sort of a super man, enhanced by advancements in digital 
technologies of virtual reality.&lt;/p&gt;
&lt;p&gt;There
 has been a growing anxiety, almost a moral panic, about how 
technologies are alienating us, replacing face-time with inter-face time
 so that we are all growing “alone together”. There is also, across 
generations and users, a growing separation of those who work with 
technologies and those who don’t. There is much concern about the human 
becoming corrupt because of the ubiquitous presence of the pervasive and
 invasive technologies around us. In the face of these anxieties, the 
cyborg stands as a culturally significant and timely reminder that we, 
as human beings, are very closely linked with the technologies that we 
use. And that we need to stop thinking of technologies as merely gadgets
 and tools that surround us. The different objects that remind us of the
 presence of technology are not the same thing as technology itself. 
Technology is a way of thinking about things, a way of relating to the 
world around us. The most intrinsic forms of technologies are the ones 
that we don’t even recognise as a part of our innate mental make up.&lt;/p&gt;
&lt;p&gt;Do
 this simple experiment. Right now, while you are reading this, do not 
look at any clock or time-measuring device and guess what time it is. 
Chances are that you will be, give or take a few minutes, more or less 
accurate. Even if you are temporally challenged, you will at least know 
what part of the day it is, morning, afternoon, evening or night. The 
point is that we are absolutely and completely creatures of time. We 
cannot think of ourselves outside of it and even when we might be 
dramatically wrong about it, there is no escaping the fact that we are 
always thinking of ourselves and the world around us through time.&lt;/p&gt;
&lt;p&gt;We
 experience our lives and our relationships in cyclical notions of the 
clock’s face, thinking of our actions as borrowed from the future, lived
 in the present, and relegated to the archives of the past. It then, 
must come as a bit of a shock (it certainly did to me, the first time I 
was made to realise it) that time is not natural. Time is a human way of
 measuring a passage of actions. Time is a technology which has now 
become such a potent metaphor of life that we have forgotten to make the
 separation of the human and the technological.&lt;/p&gt;
&lt;p&gt;And
 thus, whether you might be a tech-savvy digital native or a 
byte-fearing luddite, there is no denying the idea that when it comes to
 technologies of time, you are already a natural born cyborg. This 
ability of technologies to become transparent and an inalienable part of
 who we are forms cyborgs. The process through which they become 
transparent is not easily accessible, but it does begin by an 
internalisation of the technology’s processes in our everyday 
vocabulary. So the next time you think of yourself as a system that 
needs to be upgraded, or unable to pay attention because you don’t have 
enough bandwidth, remember that you are engaging in a flirtatious 
relationship with the digital. And slowly, but surely, we are all 
turning into cyborgs, as the new technologies rearrange patterns of our 
life and living.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;digitalnative@expressindia.com&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/we-are-cyborgs'&gt;https://cis-india.org/digital-natives/we-are-cyborgs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T12:00:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/pathways/facultyworkshop">
    <title>The Digital Classroom: Social Justice and Pedagogy</title>
    <link>https://cis-india.org/digital-natives/pathways/facultyworkshop</link>
    <description>
        &lt;b&gt;What happens when we look at the classroom as a space of social justice? What are the ways in which students can be engaged in learning beyond rote memorisation? What innovative methods can be evolved to make students stakeholders in their learning process? These were some of the questions that were thrown up and discussed at the 2 day Faculty Training workshop for participant from colleges included in the Pathways to Higher Education programme, supported by Ford Foundation and collaboratively executed by the Higher Education Innovation and Research Application and the Centre for Internet and Society, Bangalore.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The workshop focused on 3 chief challenges in contemporary
pedagogy and teaching in higher education in India as identified by &lt;a class="external-link" href="http://heira.in/"&gt;HEIRA&lt;/a&gt;: The need for innovative
curricula, challenges to social justice in education, and possibilities offered
by the intersection of digital and internet technologies with classroom
teaching and evaluation. In the open discussions, the participating faculty
members used their multidisciplinary skills and teaching experience to look at possibilities that we might implement in our classrooms to create a more
inclusive and participatory environment. The conversations were varied, and
through 3 blog entries I want to capture the focus points of the workshop. In
this first post, I focus specifically on the changing nature of student
engagement with education and innovative ways by which we can learn from the
digital platforms of learning and knowledge production and implement certain
innovations in pedagogy that might better help create inclusive and just learning
environments in the undergraduate classroom in India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Peer 2 Peer:&lt;/strong&gt; One of the observations that was made
unanimously by all the faculty members was that students respond better, learn
faster, engage more deeply with their syllabus when the instructor has a
personal rapport with them. Traditionally, the teachers who have established
human contact which goes beyond the call of duty are also the teachers that
have become catalysts and inspirations for the students. Especially with the
digital aesthetics of non-hierarchical information interaction, this has become
the call of the day.&lt;/p&gt;
&lt;p&gt;Establishing the teacher as a peer within the classroom,
rather than the fountainhead of information flow, is an experiment worth
conducting. Like on other digital platforms, can we think of the classroom as a
space where the interlocutors each bring their life experience and learning to
start an information exchange and dialogue that would make them stakeholders in
the process of learning? This would mean that the teacher would be a &lt;em&gt;facilitator&lt;/em&gt; who builds conditions of
knowledge production and dissemination, thus also changing his/her relationship
with the idea of curriculum and teaching.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reciprocal evaluation&lt;/strong&gt;: It was pointed out that the grade
oriented academic system often leads to students disengaging with innovative
and meaningful learning practices. With the pressure of completing the
curriculum, the students’ instrumental relationship with their classroom
learning and the highly conservative structures of higher education that do not
offer enough space to experiment with the teaching methods, it often becomes
difficult to initiate innovative pedagogic practices. Learning from the
differently hierarchised digital spaces, it was suggested that one of the ways
by which this could be countered is by introducing reciprocal evaluation
patterns which might not directly be associated with the grades but would
recognise and appreciate the skills that students bring to their learning.&lt;/p&gt;
&lt;p&gt;Inspired by the Badges contest at &lt;a class="external-link" href="http://hastac.org/tag/badges"&gt;HASTAC&lt;/a&gt;,
it was suggested that evaluation has to take into account, more than grades.
Different students bring different skills, experiences, personalities and
behaviours to bear upon the syllabus. They work individually and in clusters to
understand and analyse the curriculum. Recognising these skills and the roles
that they play in their learning environments is essential. Getting students to
offer different badges to each other as well as to the teachers involved, helps
them understand their own learning process and engages them in new ways of
learning.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Role based learning: &lt;/strong&gt;Within the Web 2.0 there is a peculiar
condition where individuals are recognised simultaneously as experts and
novices. They bring certain knowledges and experiences to the table which make
them credible sources of information and analysis in those areas. At the same
time, they are often beginner learners in certain other areas and they harness
the power of the web to learn. Such a distributed imagination of a student as
not equally proficient in all areas, but diversely equipped to deal with
different disciplines is missing from our understanding of the higher education
classroom.&lt;/p&gt;
&lt;p&gt;We discussed the possibility of making the student responsible not
only for his/her own learning but also the learning of the peers in the
classroom. Making the student aware of what s/he is good at and where s/he is
lacking allows them to gain confidence and also realise that everybody has
differential strengths and aptitudes. Such a classroom might look different
because the students don’t have to be pitched in stressful competition with
each other but instead work collaboratively to learn, research and produce
knowledge in a nurturing and supportive learning environment.&lt;/p&gt;
&lt;p&gt;These initial discussions look at the possibility of
innovative classroom teaching that can accommodate for the skills and
differences of the students in higher education in India. The conversations
opened up the idea that the classroom can be reshaped so that it becomes a more
inclusive space where the quality of students’ access to education can be
improved. It also ties in with the larger imagination of classrooms as spaces
where principles of social justice can be invoked so that students who are
disadvantaged in language, learning skills, socio-economic backgrounds, are not
just looked at as either ‘beyond help’ or ‘victims of a system’. Instead, it
encourages to look at the students as differential learners who need to be made
stakeholders in their own processes of learning and education.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/pathways/facultyworkshop'&gt;https://cis-india.org/digital-natives/pathways/facultyworkshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Pluralism</dc:subject>
    

   <dc:date>2015-05-08T12:36:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose">
    <title>So Much to Lose</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose</link>
    <description>
        &lt;b&gt;Unless you have been hiding under a rock, you have been a witness to the maelstrom of events that accompanied the death of the political leader Bal Thackeray.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;Nishant Shah's &lt;a class="external-link" href="http://www.indianexpress.com/news/so-much-to-lose/1038938/0"&gt;column was published in the Indian Express&lt;/a&gt; on December 2, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Unless you have been hiding under a rock, you have been a witness to  the maelstrom of events that accompanied the death of the political  leader Bal Thackeray. For me, the brouhaha was elbowed out by the case  of the police arresting two women for critiquing the events on Facebook.  The person who wondered about the nature of the enforced mourning and  the state of our public life, and her friend who “liked” the comment on  Facebook, were booked and arrested under charges that can only be  considered preposterous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I will not repeat these arguments because it is needless to say  that I am on the side of the women and think of this as yet another  manifestation of the stringent measures which are being evolved as an  older broadcast way of thinking meets the decentralised realities of  digital technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the midst of this the idea of internet freedom needs to be  revisited. The global Press Freedom Index 2011-12 report compiled by  Reporters Without Borders, ranks India at 131, or as a “partly free”  country, marking us as a country where the notion of internet freedom is  not to be taken for granted, and possibly also one where the concept is  not properly understood.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing various instances from the central government’s plans to  censor the social web to the authoritarian crackdown on activists and  cultural producers involved in online civic protests, from the  traditional media industry’s stronghold over intellectual property  regimes to the arrest of individuals for voicing their independent  critiques online, the report shows that we not only have an  infrastructure deficit (with only 10 per cent of the people in the  country connected), but also a huge social and political deficit, which  is being exposed by our actions and reactions to the Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the case of professor Ambikesh Mahapatra dean of the  chemistry department of Jadavpur University, who was picked up by the  police and lodged in the lock up for almost 40 hours for forwarding an  e-mail that contained a cartoon of Trinamool Congress leaders Mamata  Banerjee, Mukul Roy and Dinesh Trivedi. He and his housing society  co-resident Subrata Sengupta were charged with defamation and outraging  the modesty of a woman. While the proceedings are underway with the next  date of hearing slated in February, 2013, the Jadavpur university  professor says, “Section, 66A of the IT Act is  being used for  suppression of the freedom of speech. In my opinion, it is being misused  by the state government, repeatedly. The section does not empower  anyone to arrest those who voice their opinion and never meant to harm  anybody’s image. Prompt action is needed to check the misuse of law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, Ravi Srinivasan, a 46-year-old a businessman from  Pondicherry, was arrested for tweeting against Karti Chidambaram, son of  Union Finance Minister P Chidambaram. His arrest and consequent release  has not blunted his spirit. He says, “At the time (of the arrest) I had  not heard of Section 66(A). I still cannot fathom why and how a tweet  sent out to just 12 people — half of them family and friends — caught  the eye of the police. By evening, when I had come home from the police  station, my Twitter following had gone up to 1,700. About 15,000 people  re-tweeted the statement that got me arrested.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the series of incidents that have marked the last year and  the whimsical nature of regulatory injunctions on internet freedom in  the country, it might be a good idea for us to reflect on democracy and  freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We need to examine the fundamental nature of freedom, and how  these attempts at regulating the internet are only a symptom of the  systemic failures of enshrining freedom of speech, information, identity  and dignity in India. However, internet freedom is often a difficult  concept to engage with, because it is one of those phrases that seem to  be self-explanatory but without a straightforward explanation. There are  three axes which might be useful to unpack the baggage that comes with  internet freedom, both for our everyday practices, and our imagined  future:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of: The freedom of the internet is something that is new  and needs more attention. We have to stop thinking of the internet as  merely a medium or a conduit of information. As the Web becomes  inextricably linked with our everyday lives, the internet is no longer  just an appendage or an externality. It becomes a reference point  through which our social, political and economic practices are shaped.  It becomes a defining point through which we draw our meanings of what  it is to be a part of the society, to have rights, to be politically  aware, to be culturally engaged — to be a human. The freedom of the Net  is important because the crackdowns on the Net are an attack on our  rights and freedoms. The silencing of a voice on Facebook, might soon  gag the voices of people on the streets, creating conditions of silence  in the face of violence perpetuated by the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom to: Freedom to the internet is often confused with access  to the internet. While, of course, access is important in our  imagination of a just society where everybody is equally connected,  freedom is also about creating open and fair societies. If the power of  the internet is in creating alternative spaces of expression,  deliberation and opinion-making, then the freedom to the internet is  about being safe and responsible in these spaces. A society that  controls these spaces of public discussion, under the guise of security  and public safety, is a society that has given up its faith in freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom for: It is often not clear that when popular technologies  of information and communication are regulated and censored, it is not  merely the technology that is being controlled. What is being shaped and  contained is the way people use them. The freedom for the internet is  about the freedom for people. The possibility that Internet Service  Providers are being coerced into revealing personal information of users  to police states, that intermediaries are being equipped to remove  content that they find offensive from the web, and that views expressed  on the social media can lead to legal battles by those who have the  power but not the acumen to exercise it, all have alarming consequences.  There is a need to fight for freedom, not only for the defence of  technology but also for the defence of the rights that we cherish that  risk being eroded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of these Facebook arrests is not new. It has happened  before and it will continue happening as immature governments are unable  to cope with the real voices of representational democracy. These cases  sometimes get naturalised because they get repeated, and even without  our knowledge, can start creating a life of fear, where we internalise  the regulatory system, not voicing our opinions and ideas for fear of  persecution. And so, whether you agree with their politics or not,  whether you endorse the viewpoints of the people who are under arrest,  whether you feel implicated or not in this case, we have to realise that  even if we might not agree with somebody’s viewpoint, we must defend  their right to have that particular viewpoint. Anything else, and  tomorrow, when you want to say something against powers of oppression,  you might find yourself alone, as your voice gets heard only by those  who will find creative ways of silencing you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;— With inputs from Gopu Mohan, Madhuparna Das and V Shoba&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose'&gt;https://cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-07T16:39:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-june-16-2019-staying-silent-about-cyberbullying-is-no-longer-an-option">
    <title>Staying silent about cyberbullying is no longer an option</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-june-16-2019-staying-silent-about-cyberbullying-is-no-longer-an-option</link>
    <description>
        &lt;b&gt;Cyberbullying is the dangerous new normal.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nishant Shah was published in the &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/cyberbullying-is-the-dangerous-new-normal-5780934/"&gt;Indian Express&lt;/a&gt; on June 16, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;I found myself in three very different contexts these last couple of weeks, bound together by a normalising of cyberbullying. The first was a conversation with a professor, who had punished a group of students in her class for disruptive behaviour involving their cellphones. As a form of retaliation, they photoshopped her face in a set of pornographic and explicitly profane images and made her into a meme. In the course of a week, many others piled on to this viral phenomenon, and the professor was now suddenly finding her private information, and her face being shared and commented on in ways that she could not control or process. When the four students responsible for the first meme were identified and questioned, their first reaction was that they couldn’t understand what the problem was. “This is what everybody does these days,” was their first collective response. While they were punished and made to recognise their crime, the images of this professor are here to stay on multiple social media sites, with more people sharing them faster than they can be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a very different setting, one of my friends, who has an 11-year-old son, called me frantically, because she found a steady stream of abusive messages on her son’s phone, targeted at him. These messages were on a closed-group social media platform consisting of students from his school. Her son, apparently, had reported some other kids bullying on the school ground and the chastised bullies had taken to tormenting him online. Calls to the school, inquiries from the principal, attempts at mediating and reconciliation had all fallen on deaf ears. When my friend suggested that her son get off the platform, he was in tears, and adamant that his social life will be over and he has to just stay on, and pay his dues. “Everybody has to pay for what they did. This will also get over,” he said, justifying the bullying and mob attacks that he was being subjected to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Reddit channels, I witnessed a furious fight about the suicide of Dr Payal Salman Tadvi — the medical doctor who gave in to depression and, eventually, death, after being bullied by three senior doctors who decided that her caste origins offended their professional sensibilities. The thread was started to talk about caste-based discrimination in contemporary Indian workspaces. It was soon taken over by people using this incident to call people of different castes weak, low-willed, and entitled snowflakes, who could not take hardship because they have been coddled by affirmative action. The irony of this argument aside, the one thing that they kept on insisting was that this act of bullying was not about caste at all because “everybody gets bullied and they have to be strong to fight back” or there is no hope for survival.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all of these three very different cases, scattered around three different continents and privileges, one thing stands out. Cyberbullying is not just here but it seems to have been naturalised and accepted as the new normal. Thus, instead of stopping these acts, the focus seems to be on helping people cope with it. Similarly, the efforts are directed not at calling out such acts, but at supporting victims to see it through, without any structural respite.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-june-16-2019-staying-silent-about-cyberbullying-is-no-longer-an-option'&gt;https://cis-india.org/raw/indian-express-nishant-shah-june-16-2019-staying-silent-about-cyberbullying-is-no-longer-an-option&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-07-02T03:52:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-june-24-2017-digital-native-on-mute-the-voice-of-the-people">
    <title>Digital Native: On mute, the Voice of the People</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-june-24-2017-digital-native-on-mute-the-voice-of-the-people</link>
    <description>
        &lt;b&gt;We are at the mercy of trigger-happy governments and profit-hungry corporations that hold our digital lives ransom. They have the capacity to censor, contain, control and eradicate all our digital data without our consent and without repercussions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/tech-news-technology/digital-native-on-mute-the-voice-of-the-people-4718592/"&gt;published in the Indian Express&lt;/a&gt; on June 24, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The first time I encountered an internet shutdown was in 2009. I was a  visiting researcher at the Shanghai University and I received a  computer which had default web-filtering software installed on it. My  already restricted access to the web was intensified by the Chinese  government shutting down the internet as a response to riots in the  north-western province of Xinjiang. My connections to friends and  families back home were disrupted. It took me three days to figure out  how to circumvent the ban using proxy-servers and anonymisers, which  cloaked my physical location. I could then send out a message that  reassured everyone that all was fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During those two weeks of shutdown, I realised, for the first time,  how fragile our digital ecosystems are and how completely without  ownership our digital transactions. We are at the mercy of trigger-happy  governments and profit-hungry corporations that hold our digital lives  ransom. They have the capacity to censor, contain, control and eradicate  all our digital data without our consent and without repercussions. In  those romantic days, when I still believed that the digital promise of  connectivity implied free and open public spaces for different voices to  be heard and counted, it came as quite a shock to realise that the web  is a contested and a controlled space. During my stay in China, once I  figured out the work-arounds for these shutdowns, I spent the rest of my  research time volunteering to create safe, open networks that allowed  people in Shanghai, especially my students, to access the digital space.  I used to take pride in the fact that, despite all our troubles in  India, the internet shall remain free and that the Indian government  would not compromise what is a constitutional right for free speech and  expression. I remember joking that in India, the only reason I had  internet shutdown was because of power outage or the incompetency of my  service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the last few years, and especially 2017, have taken away  that false sense of faith and pride I had in our nation’s commitment to  securing public voices of dissent, protest, and expression. The Human  Rights Watch has reported that while we are just half-way into the year,  the state governments in India have imposed 20 temporary internet  shutdowns so far. These arbitrary, unplanned, ad hoc and reactive  shutdowns have been marked as violations of India’s obligations under  the international human rights law. The right to be connected is one of  the new generation of basic rights available to citizens in a  functioning democracy. While one can partially sympathise with the  state’s argument that the shutdown was intended to crack down on rumours  and hate speech instigating violence, there is no denying that these  draconian measures cannot be justified by this empty rhetoric of  security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If anything, research has shown that shutting down communication  channels in times of conflict encourages speculation and rumour because  people no longer have access to verifiable news sources. When an  internet shutdown is imposed, speculation, rampant misinformation, and  credible untruths can contribute to a feeling of insecurity, danger, and  knee-jerk action, which can precipitate mass violence. Especially for  people who are already living precarious lives, the condition of being  disconnected is severe because if they do come under attack, they no  longer have any respite for urgent and immediate help. Analysis, over a  period of time, has shown that the shutdown of the internet is not in  the interest of keeping people safe but in the service of keeping  authorities unaccountable for their actions. A suspension of all  telecommunication services essentially provides the authoritarian powers  an escape valve, where they are able to continue their actions, often  violent, with impunity and without a sense of responsibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet shutdowns are not just about means of control but about  exercising power, reminding the people in the digital commons who is in  charge. It is also a sign of a crumbling apparatus of democracy, where  the voice of the citizen, instead of being celebrated in the public, is  seen as a problem which has to be solved. Internet shutdowns also have a  clear identification of which kinds of voices should not be heard and,  indeed, what can and cannot be said under restrictive conditions.  Eventually, they discriminate against specific kinds of bodies — marked  by identity characteristics — and leads to pathologisation and  punishment of people who question the status quo. It is shameful for us  that even as we dream digital, we are inching closer to the side of  undemocratic demagogues rather than building robust telecommunication  networks that enable the true potential of public participation and  democratic governance.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-june-24-2017-digital-native-on-mute-the-voice-of-the-people'&gt;https://cis-india.org/raw/indian-express-nishant-shah-june-24-2017-digital-native-on-mute-the-voice-of-the-people&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2017-07-05T17:04:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace">
    <title>The Body in Cyberspace</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace</link>
    <description>
        &lt;b&gt;Perhaps one of the most interesting histories of the cyberspace has been its relationship with the body. Beginning with the meatspace-cyberspace divide that Gibson introduces, the question of our bodies’ relationship with the internet has been hugely contested. There have been some very polarized debates around this question. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Where are we when we are online? Are we the person in the chair behind an interface? Are we the avatar in a social networking site interacting with somebody else? Are we a set of data running through the atmosphere? Are we us? Are we dogs? These are tantalising and teasing questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early debates around the body-technology questions were polarized. There were people who offered that the cyberspace is a virtual space. What happens in that make-believe, performative space does not have any direct connections with who we are and how we live. They insisted that the cyberspace is essentially a performance space, and just like acting in a movie does not make us the character, all our interactions on the internet are also performances. The idea of a virtual body or a digital self were proposed, thinking of the digital as an extension of who we are – as a space that we occupy to perform different identities and then get on with our real lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sherry Turkle, in her book &lt;i&gt;Life on the Screen&lt;/i&gt;, was the first one to question this binary between the body and the digital self. Working closely with the first users of the online virtual reality worlds called Multiple User Dungeons, Turkle notes how being online started producing a different way of thinking about who we are and how we relate to the world around us. She indicates three different ways in which this re-thinking happens. The first, is at the level of language. She noticed how the users were beginning to think of their lives and their social relationships through the metaphors that they were using in the online world. So, for instance, people often thought of life through the metaphor of windows – being able to open multiple windows, performing multiple tasks and identities and ‘recycling’ them in their everyday life. Similarly, people saying that they are ‘low on bandwidth’ when they don’t have enough time and attention to devote to something, or thinking about the need to ‘upgrade’ our senses. We also are quite used to the idea that memory is something that resides on a chip and that computing is what machines do. These slippages in language, where we start attributing the machine characteristics to human beings are the first sign of understanding the human-technological relationship and history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second slippage is when the user start thinking of the avatars as human. We are quite used to, in our deep web lives, to think of machines as having agency. Our avatars act. Things that we do on the internet perform more actions than we have control of – a hashtag that we start on twitter gets used and responded to by others and takes on a life of its own. We live with sapient technologies – machines that care, artificial intelligence algorithms that customise search results for us, scripts and bots that protect us from malware and viruses. We haven’t attributed these kinds of human agencies to machines and technologies in the past. However, within the digital world, there is a complex network of actors, where all the actors are not always human. Bruno Latour, a philosopher of science and technology, posits in his ‘Actor Network Theory’ that the emergence of these non-human actors has helped us understand that we are not only dependent on machines and technologies for our everyday survival, but that many tasks that we had thought of as ‘human’ are actually performed, and performed better by these technologies. Hence, we have come to care for our machines and we also think of them as companions and have intimate relationships with them. And the machines, even as they make themselves invisible, start becoming more personal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third slippage that Turkle points out is the way in which the boundaries between the interior and the exterior were dissolved in the accounts of the users’ narratives of their digital adventures. There is a very simplistic understanding that what is human is inside us, it is sacred and organic and emotional. Earlier representational technology products like cinema, books, TV etc. have emphasised this distinction between real life and reel life. No actor is punished for the crime they commit in the narrative of a film. It is not very often that an author claims to be the character in a book. We have always had a very strong sense of distinction between the real person and the fictional person. But within the virtual reality worlds, these distinctions seem to dematerialize. The users not only thought of their avatars as human but also experienced the emotions, frustrations, excitement and joy that their characters were simulating for them. And what is more important, they claimed these experiences for themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namita Malhotra, who is a legal scholar and a visual artist, in her monograph on Pleasure, Porn and the Law, looks at the way in which we are in a process of data-stripping – constant revelation of our deepest darkest secrets and desires, within the user generated content rubric. Looking at the low-res, grainy videos on sites like YouTube and Vimeo, which have almost no narrative content and are often empty of sexual content, produce all of us in a global orgiastic setting, where our bodies are being extended beyond ourselves. In the monograph, Malhotra argues that the Internet is not merely an extension but almost like a third skin that we wear around ourselves – it is a wrapper, but it is tied, through ligaments and tendons, to the flesh and bone of our being, and often things that we do online, even when they are not sexual in nature, can become pornographic. Conversely, the physical connections that we have are now being made photographically and visually available in byte sized morsels, turned into a twitpic, available to be shared virally, and disseminated using mobile applications, thus making our bodies escape the biological containers that we occupy but also simultaneously marks our bodies through all these adventures that we have on the digital infobahn.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Case Study: A Rape in Cyberspace&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;A contemporary of Sherry Turkle, Julian Dibbell, in his celebrated account of ‘A Rape in Cyberspace’&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;describes a case-study that corroborates many of the observations that Turkle posits. Dibbell analyses a particular incident that occurred one night in a special kind of MUD – LambdaMOO (MUD, Object-Oriented) – which was run by the Xerox Research Corporations. A MUD, is a text-based virtual reality space of fluid dimensions and purposes, where users could create avatars of themselves in textual representations. Actions and interactions within the MUD are also in long running scripts of texts. Of course, technically all this means that a specially designed database gives users the vivid impression of their own presence and the impression of moving through physical spaces that actually exists as descriptive data on some remotely located servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When users log into LambdaMoo, the program presents them with a brief textual description of one of the rooms (the coat closet) in the fictional database mansion. If the user wants to navigate, s/he can enter a command to move in a particular direction and the database replaces the original description with new ones, corresponding to the room located in the direction s/he chose. When the new description scrolls across the user’s screen, it lists not only the fixed features of the room but all its contents at that moment – including things (tools, toys, weapons), as well as other avatars (each character over which s/he has sole control). For the database program that powers the MOO, all of these entities are simply subprograms or data structures which are allowed to interact according to rules very roughly mimicking the laws of the physical world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Characters may leave the rooms in particular directions. If a character says or does something (as directed by its user), then the other users who are located in the same ‘geographical’ region within the MOO, see the output describing the utterance or action. As the different players create their own fantasy worlds, interacting and socialising, a steady script of text scrolls up a computer screen and narratives are produced. The avatars, as in Second Life or even on Social Networking Sites like Orkut, have the full freedom to define themselves, often declining the usual referents of gender, sexuality, and context to produce fantastical apparitions. It is in such an environment of free-floating fantasy and role-playing, of gaming and social interaction mediated by digital text-based avatars, that a ‘crime’ happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibell goes on to give an account of events that unfolded that night. In the social lounge of LambdaMoo, which is generally the most populated of all the different nooks, corners, dimensions and rooms that users might have created for themselves, there appeared an avatar called Dr. Bungle. Dr. Bungle had created a particular program called Vodoo Doll, which allowed the creator to control avatars which were not his own, attributing to them involuntary actions for all the other players to watch, while the targeted avatars themselves remained helpless and unable to resist any of these moves. This Dr. Bungle, through his evil Vodoo Doll, took hold of two avatars – legba and Starsinger and started controlling them. He further proceeded to forcefully engage them in sexually violent, abusive, perverted and reluctant actions upon these two avatars. As the users behind both the avatars sent a series of invective and a desperate plea for help, even as other users in the room (# 17) watched, the Vodoo Doll made them enter into sexually degrading and extremely violent set of activities without their consent. The peals of his laughter were silenced only when a player with higher powers came and evicted Dr. Bungle from the Room # 17. As an eye-witness of the crime and a further interpolator with the different users then present, Dibbell affirms that most of the users were convinced that a crime had happened in the Virtual World of the digital Mansion. That a ‘virtual rape’ happened and was traumatic to the two users was not questioned. However, what this particular incident brought back into focus was the question of space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibbell suggests that what we had was a set of conflicting approaches to understand the particular phenomenon:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where virtual reality and its conventions would have us believe that legba and Starsinger were brutally raped in their own living room, here was the victim legba scolding Mr. Bungle for a breach of *civility* … [R]eal life, on the other hand, insists the incident was only an episode in a free-form version of Dungeons and Dragons, confined to the realm of the symbolic and at no point threatening any players life, limb, or material well-being…’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meaning and the understanding of this particular incident and the responses that it elicited, lie in the ‘buzzing, dissonant gap’ between the perceived and experienced notion of Technosocial Space. The discussions that were initiated within the community asked many questions: If a crime had happened, where had the crime happened? Was the crime recognised by law? Are we responsible for our actions performed through a digital character on the cyberspaces? Is it an assault if it is just role playing?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of ‘whereness’ of the crime, or rather the placelessness of the crime made it especially more difficult to pin it to a particular body. The users who termed the event as rape had necessarily inverted the expected notion of digital space as predicated upon and imitative of physical space; they had in fact done the exact opposite and exposed digital spaces as not only ‘bleeding into reality’ but also a constitutive part of the physical spaces. Their Technosocial Space was not the space of the LambdaMoo Room # 17 but the physical locations (and thus the bodies, rather than the avatars) of the players involved. However, this blurring was not to make an easy resolution of complex metaphysical questions. This blurring was to demonstrate, more than ever, that the actions and pseudonymous performances or narratives which are produced in the digital world are not as dissociated from the ‘Real’ as we had always imagined. More importantly, the notional simulation of place or a reference to the physical place is not just a symbolic gesture but has material ramifications and practices. As Dibell notes in his lyrical style.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Months later, the woman in Seattle would confide to me that as she wrote those words posttraumatic tears were streaming down her face — a real-life fact that should suffice to prove that the words’ emotional content was no mere playacting. The precise tenor of that content, however, its mingling of murderous rage and eyeball-rolling annoyance, was a curious amalgam that neither the RL nor the VL facts alone can quite account for.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The eventual decision to ‘toad’ Dr. Bungle – to condemn him to a digital death (a death only as notional as his crime) and his reappearance as another character take up the rest of Dibbell’s argument. Dibbell is more interested in looking at how a civil society emerged, formed its own ways of governance and established the space of LamdaMOO as more than just an emotional experience or extension; as a legitimate place which is almost as much, if not more real, than the physical places that we occupy in our daily material practices. Dibbell’s moving account of the entire incident and the following events leading the final ‘death’ and ‘reincarnation’ has now been extrapolated to make some very significant and insightful theorisations of the notions of the body and its representations online.&lt;/p&gt;
&lt;b&gt;Exercise&lt;/b&gt;: Based on this case-study, break into small groups to determine whether a rape happened on cyberspace and how we can understand the relationship of our online personas with our bodies.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and the State&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of body and technology is one way of approaching the history of the internet. However, as we realise, that more than the management of identity or the projection of our interiority, it is a narrative about governance. How does the body get regulated on the internet? How does it become the structure through which communities, networks, societies and collective can be imagined? The actions and transactions between the internet and the body can also help us to look at the larger questions of state, governance and technology which are such an integral part of our everyday experience of the internet. Questions of privacy, security, piracy, sharing, access etc. are all part of the way in which our practices of cultural production and social interaction are regulated, by the different intermediaries of the internet, of which the State is one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asha Achuthan, in her landmark work &lt;i&gt;Re:Wiring Bodies&lt;/i&gt;&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; that looks at the history of science and technology in India, shows that these are not new concerns. In fact, as early as the 1930s and 1940s, when the architects of India’s Independence movements were thinking about shaping what the country is going to look like in the future, they were already discussing these questions. It is more popularly known that Jawaharlal Nehru was looking to build a ‘scientific temperament’ for the country and hoping to build it through scientific institutions as well as infrastructure – he is famously credited to having said that ‘dams are the temples of modern science.’ Apart from Nehru’s vision of a modern India, there was a particular conversation between M.K. Gandhi and Rabindranath Tagore, that Achuthan analyses in great detail. Achuthan argues that the dialogue between Gandhi and Tagore is so couched in ideology, poetry and spirituality that we often forget that these were actually conversations about a technology – specifically, the charkha or the spinning wheel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For both Gandhi and Tagore, the process of nation building was centred around this one particular charkha. The charkha was the mobile, portable, wearable device (much like our smart phones) that was supposed to provide spiritual salvation and modern resources to overcome the evils of both traditional and conservative values as well as unemployment and production. The difference in Gandhi and Tagore was not whether the charkha – as a metaphor of production and socio-economic organisation – should be at the centre of our discourse. The difference was that Gandhi thought that the usage of charka, complete immersion in the activity, and the devotion to it would help us weave a modern nation For Gandhi, the citizen was not somebody who used the charkha, but the citizen was somebody who becomes a citizen in the process of using the charkha. Tagore, meanwhile, was more concerned about whether we are building a people-centred nation or a technology-centred device. He was of the opinion that building a nation with the technology at its core, might lead to an apocalyptic future where the ‘danavayantra’ or demonic machine might take over and undermine the very human values and ideals that we are hoping to structure the nation through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you even cursorily look at this debate, you will realise that the way Gandhi was talking about the charkha is in resonance with how contemporary politicians talk about the powers of the internet and the way in which, through building IT Cities, through foreign investment, through building a new class of workers for the IT industry, and through different confluences of economic and global urbanisation, we are going to Imagine India&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;of the future. Similarly, the caution that Tagore had, of the charkha as superseding the human, finds its echoes in the sceptics who have been afraid that the human is being forgotten&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; in the e-governance systems that are being set up, which concentrate more on management of data and information rather than the rights and the welfare of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical continuity between technology and governance, also finds theorisation in Ashish Rajadhyaksha’s book &lt;i&gt;The Cultural Last Mile&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;that looks at the critical turns in India’s governance and policy history and how the technological paradigm has been established. Rajadhyaksha opens up the State-technology-governance triad to more concrete examples and looks at how through the setting up of community science centres, the building of India’s space and nuclear programmes, and through on-the-ground inventions like radio and chicken-mesh wire-loops, we have tried to reinforce a broadcast based model of governance. Rajadhyaksha proposes that the earlier technologies of governance which were at our disposal, helped us think of the nation state through the metaphor of broadcast. So we had the State at the Centre, receiving and transmitting information, and in fact managing all our conversation and communication by being the central broadcasting agency. And hence, because the state was responsible for the message of the state reaching every single person, but also responsible that every single person can hypothetically communicate with every other single person, the last mile became important. The ability to reach that last person became important. And the history of technology and governance has been a history of innovations to breach that last mile and make the message reach without noise, without disturbance, and in as clean and effective a way as possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the emergence of the digital governance set up, especially with the building of the Unique Identity Project,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; we now have the first time when the government is not concerned about breaching the last mile. The p2p networks that are supposed to manage the different flows of information mean that the State is not a central addressee of our communication but one of the actors. It produces new managers – internet service providers, telecom infrastructure, individual hubs and connectors, traditional media agencies – that help us think of governance in a new way. Which is why, for instance, with the UID authorities, we are no longer concerned about the relay of state information from the centre to the subject. Hence, we have many anecdotal stories of people enrolling for the Aadhaar card without actually knowing what benefits it might accrue them. We also have stories coming in about how there are people with Aadhaar numbers which have flawed information but these are not concerns. Because for once, the last mile has to reach the Government. The State is a collector but there are also other registrars. And there is a new regime here, where the government is now going to become one of the actors in the field of governance and it is more interested in managing data and information rather than directly governing the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical turn is interesting, because it means that we are being subjected to different kinds of governance structures and institutions, without necessarily realising how to negotiate with them to protect us. One of the most obvious examples is the Terms of Services&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; that we almost blindly sign off when using online platforms and services and what happens when they violate rights that we think are constitutionally given. What happens when Facebook removes some content from your profile without your permission because it thinks that it is problematic? Who do you complain to? Are your rights as a user or a citizen? Which jurisdiction will it fall under? Conversely, what happens when you live in a country that does not grant you certain freedoms (of speech and expression, for instance) and you commit an infraction using a social media platform. What happens when your private utterances on your social networks make you vulnerable [&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. to persecution and prosecution in your country?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions of the human, the technological, and the governmental which have been discussed differently and severally historically, in India and also at the global level. Asking these questions, unpacking the historical concerns and how they have leap-frogged in the contemporary governmental debates is important because it helps us realise that the focus of what is at stake, what it means to be human, what we recognise as fair, just and equal are also changing in the process. Instead of thinking of e-governance as just a digitization of state resources, we have to realise that there is a certain primacy that the technologies have had in the state’s formation and manifestation, and that the digital is reshaping these formulations in new and exciting, and sometimes, precarious ways.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyberspace and Criminality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The history of the internet in India, but also around the world, is bookended between pornography and terrorism. While there has been an incredible promise of equity, equality, fairness, and representation of alternative voices on the internet, there is no doubt that what the internet has essentially done is turn us all into criminals – pornographers, pirates, terrorists, hackers, lurkers… If you have been online, let us just take for granted that you have broken some law or the other, no matter how safe you have been online, and where you live. The ways in which the internet has facilitated peer-2-peer connections and the one-one access means that almost everything that was governed in the public has suddenly exploded in one large grey zone of illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Sundaram calls this grey zone of illegal or semi-legal practices the new ‘cyberpublics’. For Sundaram, the new public sphere created by the internet is not only in the gentrified, middle-class, educated people who have access to the cyberspaces and are using social media and user generated content sites to bring about active social and political change. More often than not, the real interesting users of the internet are hidden. They access the internet from cybercafés, in shared names. They have limited access to the web through apps and services on their pirated phones. They share music, watch porn, gamble, engage in illicit and surreptitious social and sexual engagements and they are able to do this by circumventing the authority and the gaze of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other side are the more tech savvy individuals who create alternative currencies like Bitcoin, trade for weapons, drugs and sex on SilkRoute, form guerrilla resistance groups like Anonymous, and create viruses and malware that can take over the world. These cyberpublics are not just digital in nature. They erupt regularly in the form of pirate bazaars, data swaps, and the promiscuous USB drive that moves around the machines, capturing information and passing it on further. These criminalities are often the defining point of internet policy and politics – they serve as the subjects that need to be governed, as well as the danger that lurks in the digital ether, from which we need to be protected. For Sundaram, the real contours and borders of the digital world are to be tested in an examination of these figures. Because, as Lawrence Liang suggests, the normative has already been assimilated in the system. The normative or the good subject is no longer a threat and has developed an ethical compass of what is desirable and not. However, this ethical subject also engages in illicit activities, while still producing itself as a good person. This contradiction makes for interesting stories.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;DPS MMS: Case Study&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;One of the most fascinating cases of criminality that captured both public and legal  attention was the notoriously cases where the ideas of Access were complicated in the Indian context, was the legal and public furore over the distribution of an MMS (Multi-Media Message) video that captured two underage young adults in a sexual act. The clip, which was dubbed in popular media as ‘DPS Dhamaka’ became viral on the internet. The video clip was listed on an auction (peer-2-peer) website as an e-book and as ‘Item 27877408 – DPS Girl having fun!!! Full video + Bazee points’ for Rs. 125. This visibility of the clip on the auction site Bazee.com, brought it to the eyes of the State where its earlier circulation through private circuits and P2P networks had gone unnoticed. Indeed, the newspapers and TV channels had created frenzy around it, this video clip would have gone unnoticed. However, the attention that Bazee.com drew led to legal intervention.&lt;/p&gt;
&lt;p&gt;Following the visibility of the video clip, there was an attempt to find somebody responsible for the crime and be held liable for the ‘crime’ that had happened. Originally, Ravi Raj, a student at IIT Kharagpur, who had put up the clip on Bazee was arrested for possessing and selling pornography. He was arrested and kept in police custody for at least three days and so was the male student who made the clip. They were both made to go through proceedings in juvenile court (though he was the last to be arrested). Both the students in the video were suspended from school after the incident. Eventually, the most high profile arrest and follow up from the DPS MMS incident was the arrest of the CEO of Bazee.com – Avnish Bajaj. However, Bajaj was released soon because as the host of the platform and not its content, he had no liability.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;This is the beginning of a series of slippages where a punishable body in the face of public outcry had to be identified. We witnessed a witch-hunt that sought to hold the boy who made the video clip responsible, the student of IIT who attempted to circulate the clip and eventually the CEO of Bazee. The string of failed prosecutions seems to indicate that the pornographer-as-a-person was slipping through the cracks of the legal system. As NamitaMalhotra argues, it is not the pornographic object which is ‘eluding the grasp of the court’ but that it seems to be an inescapable condition of the age of the internet -that the all transactions are the same transactions, and all users are pornographers.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;We can see in the case that the earlier positions that were easily criminalised when it came to objects in mass media – producer, consumer, distributor of obscenity, were vacated rapidly in the DPS MMS case. We have a case where the bodies, when looked at through simplified ideas of Access, could not be regulated. The girl in the clip could not be punished because she was the victim in the case that could be read as statutory rape. In the case of the boy, a stranger argument was posed – ‘that in our fast urbanising societies where parents don’t have time for children, they buy off their love by giving them gadgets – which makes possible certain kinds of technological conditions...thus the blame if it is on the boy, is on the larger society’ (Malhotra, 2011).&lt;/p&gt;
&lt;p class="MsoNormal"&gt;Eventually, the court held that the description of the object and the context of its presence indicates that the said obscene object is just a click away and such a ‘listing which informed the potential buyer that such a video clip that is pornographic can be procured for a price’. There is a suggestion that there was nobody in particular that could be fixed with the blame. What was at blame was access to technology and conditions of technology within which the different actors in this case were embedded. Malhotra points out that in earlier cases around pornography, judgements have held pornography responsible for itself.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;In the case of the DPS MMS, it seemed that technology – especially access to technology by unsupervised persons – has taken that role. The eventual directive that came out of this case was a blanket warning issued to the public that ‘anyone found in possession of the clip would be fined and prosecuted’. It is as if the attention of the court was on the ways in which the video clip was produced, circulated and disseminated, rather than the content. There was an anxiety around peoples’ unsupervised access to digital technologies, the networks that facilitated access to content without the permission of the state, and modes of circulation and dissemination that generated high access to audiences which cannot be controlled or regulated.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;The State’s interest in this case, is not in the sexual content of the material but in the way it sidesteps the State’s authorial positions and produces mutable, transmittable, and transferable products as well as conditions of access. Such a focus on practices and behaviours around the obscene object, rather than the content itself, seems not to disrupt the law’s neat sidestepping of the force of the image itself. These different tropes of access to technology informed the State’ attempt at control and containment of techno-social practices in the country, giving rise to imaginations of the User as being in conditions of technology which make him/her a potential criminal. This idea of access as transgression or overriding the legal regulatory framework does not get accounted for in the larger technology discourse. However, it does shape and inform the Information Technology regulations which are made manifest in the IT Act. The DPS MMS case complicated the notion of access and posited a potentially criminal techno-social subject who, because of access to the digital, will be able to consume information and images beyond the sanction of the law.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;The DPS MMS case shows how the ways in which public discourse can accuse, blame and literally hang technology seems to diverge from how the court attempts to pin down an offence or crime and prosecute by constructing a techno-social subject as the pervert, while also accusing pornography as a phenomenon. The court is unable to hold technology to blame but the accused is technology-at-large and modernity, which subsumes practices around technology and separates out the good and ethical ways in which a citizen should access and use technologies to rise from the potentially criminal conditions of technology within which their Techno-social identity is formed.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We started by making a distinction between Internet and Cyberspace to see how the two are separate objects of focus and have a relationship that needs to be examined in greater detail. It was argued that while the Internet – in material, infrastructural and technological forms – is important to understand the different policies and politics at the local, regional and global level, it has an account that is easier to follow. Cyberspace, on the other hand, because it deals with human interactions and experiences, allows for a more complex set of approaches into understanding our engagement with the digital domain. We began with the original definitions and imaginations of cyberspace and the ways in which it founded and resolved debates about the real-virtual, the physical-digital, and the brain-mind divides which have been historically part of the cybercultures discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was proposed, hence, that instead of looking at the history of the Internet, we will look at the history of cyberspace, and see if we can move away from a straight forward historical narrative of the Internet which focuses largely on the institutions, numbers, names and technological advances. The ambition was not to just produce a similar history of cyberspace but think of conceptual frameworks through which cyberspace can be studied. The proposition was that instead of just looking at history as a neutral and objective account of events and facts, we can examine how and why we need to create histories. Also, that it is fruitful to look at the aspirations and ambitions we have in creating historical narratives. It was then suggested that instead of trying to create a definitive history, or even a personal history of the internet, it might be more fruitful to look at the intersections that cyberspace has with different questions and concerns that have historically defined the relationship between technologies and society. 3 different conceptual frameworks were introduced as methods or modes by which this historical mode of inquiry can be initiated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first framework examined how we can understand the boundaries and contours of the internet and cyberspace by looking at its relationship with our bodies. The ways in which we understand our bodies, the mediation by technologies, and the extensions and simulations that we live with, help us to understand the human-technology relationship in more nuanced fashions. Looking at the case-study of a rape that happened in cyberspace, we mapped out the different ways in which we can think of a technosocial relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second framework drew from historical debates around technology and governance to see how the current concerns of e-governance and digital subjectivity are informed by older debates about technology and nation building. Looking at the dialogues between Gandhi and Tagore, and then the imagination of a nation through the broadcast technologies, we further saw how the new modes of networked governance are creating new actors, new conditions and new contexts within which to locate and operate technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third framework showed how the technological is not merely at the service of the human. In fact, the presence of the technological creates new identities and modes of governance that create potential criminals of all of us. Through the case-study of the DPS MMS, and in an attempt to look at the grey zone of illegal cyberpublics, we saw how at new technosocial identities are created at the intersection of law, technology, governance and everyday practices of the web. The fact that the very condition of technology access can create us as potential criminals, in need to be governed and regulated, reflects in the development of internet policy and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the intention of this module to complicate three sets of presumptions and common knowledge that exist in the discourse around Internet and Cyberspace. The first was to move away from thinking of the Internet merely as infrastructure and networks. The second was to suggest that entering the debates around human-technology everyday relationships would offer more interesting ways of looking at accounts of the technological. The third was to propose that the history of the internet does not begin only with the digital, but it needs larger geographical and techno-science contexts in order to understand how the contemporary landscape of internet policy and governance is shaped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The module was not designed to give a comprehensive history and account of the internet. Instead, it built a methodological and conceptual framework that would allow us to examine the ways in which we approach Internet and Society questions – in the process, it would also help us reflect on our own engagement, intentions and expectations from the Internet and how we create the different narratives and accounts for it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Additional Readings&lt;/h2&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li&gt;Johnny Ryan,“A History of the Internet and the Digital Future”, &lt;i&gt;University of Chicago Press&lt;/i&gt;, &lt;a href="http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html"&gt;http://press.uchicago.edu/ucp/books/book/distributed/H/bo10546731.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;John Naughton,“A Brief History of the Future”, &lt;i&gt;Overlook&lt;/i&gt;, &lt;a href="https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/"&gt;https://www.kirkusreviews.com/book-reviews/john-naughton/a-brief-history-of-the-future/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Christos J.P. Moschovitis et al.,“History of the Internet”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182"&gt;http://www.barnesandnoble.com/w/history-of-the-internet-christos-j-p-moschovitis/1100883985?ean=9781576071182&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Katie Hafner and Matthew Lyon, “Where Wizards Stay up Late”, &lt;i&gt;Barnes &amp;amp; Noble&lt;/i&gt;, &lt;a href="http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014"&gt;http://www.barnesandnoble.com/w/where-wizards-stay-up-late-katie-hafner/1113244151?ean=9780684812014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Janet Abbate,“Inventing the Internet”, &lt;i&gt;MIT Press&lt;/i&gt;, &lt;a href="http://mitpress.mit.edu/books/inventing-internet"&gt;http://mitpress.mit.edu/books/inventing-internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tim Berners-Lee,“Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web”,&lt;a href="http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor"&gt;http://en.wikipedia.org/wiki/Weaving_the_Web:_The_Original_Design_and_UltimateDestiny_of_the_World_Wide_Web_by_its_inventor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Peter Salus,“Casting the Net: From ARPANET to INTERNET and Beyond”, &lt;i&gt;Pearson&lt;/i&gt;, &lt;a href="http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx"&gt;http://www.pearson.ch/1471/9780201876741/Casting-the-Net-From-ARPANET-to-INTERNET.aspx&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Julian Dibbell “A Rape in Cyberspace”, available at http://www.juliandibbell.com/articles/a-rape-in-cyberspace/, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Asha Achuthan, “Re:Wiring Bodies”, Centre for Internet and Society, available at http://cis-india.org/raw/histories-of-the-internet/rewiring-bodies.pdf, last accessed on January 25, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Nandan Nilekani, “Imagining India: The Idea of a Renewed Nation”, &lt;i&gt;Penguin&lt;/i&gt;, available at &lt;a href="http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html"&gt;http://www.penguin.ca/nf/Book/BookDisplay/0,,9780670068449,00.html&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Jahnavi Phalkey, “Focus: Science, History, and Modern India”, &lt;i&gt;The University of Chicago Press&lt;/i&gt;, &lt;a href="http://www.jstor.org/stable/10.1086/670950"&gt;http://www.jstor.org/stable/10.1086/670950&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Ashish Rajadhyaksha, “The Last Cultural Mile”, &lt;i&gt;The Centre for Internet and Society&lt;/i&gt;, available at &lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf"&gt;http://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf&lt;/a&gt;, last accessed on January 24, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Ashish Rajadhyaksha, “In the Wake of Aadhar: The Digital Ecosystem of Governance in India”, &lt;i&gt;Centre for Study of Culture and Society&lt;/i&gt;, available at &lt;a href="http://eprints.cscsarchive.org/532/"&gt;http://eprints.cscsarchive.org/532/&lt;/a&gt;, last accessed on January 23, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Terms of Service, Didn’t Read, available at &lt;a href="http://tosdr.org/"&gt;http://tosdr.org/&lt;/a&gt;, last accessed on January 26, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Siva Vaidyanathan, “The Googlization of Everything: (And Why Should We Worry)”, &lt;i&gt;University of California Press&lt;/i&gt;, available at &lt;a href="http://www.ucpress.edu/book.php?isbn=9780520258822"&gt;http://www.ucpress.edu/book.php?isbn=9780520258822&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/body-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2014-05-13T10:13:22Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives">
    <title>In Search of the Other: Decoding Digital Natives</title>
    <link>https://cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives</link>
    <description>
        &lt;b&gt;This is the first post of a research inquiry that questions the ways in which we have understood the Youth-Technology-Change relationship in the contemporary digital world, especially through the identity of ‘Digital Native’. Drawing from three years of research and current engagements in the field, the post begins a critique of how we need to look at the outliers, the people on the fringes in order to unravel the otherwise celebratory nature of discourse about how the digital is changing the world.&lt;/b&gt;
        
&lt;p&gt;In this first post, I chart the trajectories of our research at the Centre for Internet and Society (Bangalore, India) and Hivos (The Hague, The Netherlands) to see how alternative models of understanding these relationships can be built.&lt;/p&gt;
&lt;p&gt;The Digital Native has many different imaginations. From the short hand understanding of ‘anybody who is born after the 1980s’ (Prensky, 2001) to more nuanced definitions of populations who are ‘born digital’ (Palfrey &amp;amp; Gasser, 2008), the digital native has firmly been ensconced in our visions of technology futures. From DIY decentralized learning environments to viral and networked forms of engagements that span from the Arab Spring to Occupy Together, the Digital Native – somebody who has grown up with digital technologies (and the skills to negotiate with them) as the default mode of being – has become central to how we see usage and proliferation of new digital tools and technologies.&lt;/p&gt;
&lt;p&gt;Three years ago, when the identity Digital Native was already in currency but before the overwhelming examples that are now so easily available in the post MENA (Middle East-North Africa) world, we asked ourselves the question: “What does a Digital Native look like?” When we started sifting through the literature (published and grey), practice-based discourse and policy, we started spotting certain patterns: Digital Natives were almost always young, white, (largely male) middle class, affluent, English speaking populations who could afford education and were located in developed Information and Communication Technologies (ICT) contexts of ubiquitous connectivity. These users of technology were treated as the proto-type around which digital natives in the ‘rest of the world’ were imagined. The ‘rest of the world’ was not necessarily an exotic geography elsewhere, but often was a person whose relationships with the digital were impeded by class, education, gender, sexuality, literacy etc.&lt;/p&gt;
&lt;p&gt;Moreover, we found that the accounts of Digital Natives that were being discussed across the board were accounts of super stars. They either heralded the digital native as the young messiah who is drastically changing the world, overthrowing governments and building collaborative and participatory structures of openness. Or they feared the digital native as an unthinking, self contained, dysfunctional person who pirates and plagiarizes and needs to be rehabilitated into becoming a civic individual. Very little was said about Everyday Digital Natives – users who, through the presence of digital technologies, were changing their lives on an everyday basis.&lt;/p&gt;
&lt;h3&gt;Other Digital Natives&lt;/h3&gt;
&lt;p&gt;Based on this, we began the quest for the Other Digital Natives – people who did not necessarily fit the existing models of being digital but who often had to strive to ‘Become Digital’ and in the process produce possibilities and potentials for social change and political participation in their immediate environments. This was the first step to discover what being a digital native would be in emerging ICT contexts, where connectivity, access, usage, affordability, geo-political regulation, and questions of the biological and of living would give us new understandings of what a digital native is. This quest for the Other inspired us to work across Asia, Africa and Latin America, to talk to some of the most strident voices in the region who claimed to be digital natives, expressed discomfort with being called digital natives, refused to be called digital natives, and sought to provide critique of the existing expectations of digital nativity. The proceedings from these conversations in the Global South have been consolidated in the book Digital AlterNatives With a Cause? available for free download.&lt;/p&gt;
&lt;p&gt;For this post, I want to look at some of the presumptions in existing understanding of Digital Natives and how we can contest them to build Digital AlterNative identities.&lt;/p&gt;
&lt;h3&gt;Presumption 1: Digital Natives are always young&lt;/h3&gt;
&lt;p&gt;Even if we go by Mark Prensky’s problematic definition that everybody born after the 1980s is a digital native, we must realize that there is a large chunk of digital native users who are now in their thirties. They are in universities, work forces, governments and offices. They have not only grown older with technologies but they have also radically changed the technologies and tech platforms that they inhabit.&lt;/p&gt;
&lt;p&gt;It is time to let go of the Peter-Pan imagination of a Digital Native as always perpetually young. Moreover, we must realize that digital natives existed even before the name ‘Digital Native’ came into existence. There were people who built internets, who might not have been young but were still native to the digital environments that they were a part of.&lt;/p&gt;
&lt;p&gt;Instead of looking at a youth-centric, age-based exclusive definition of a digital native, it is more fruitful to say that people who natively interact with digital technologies – people who are able to inhabit the remix, reuse, share cultures that digitality produces, might be marked as digital AlterNatives.&lt;/p&gt;
&lt;h3&gt;Presumption 2: Digital Natives are born digital&lt;/h3&gt;
&lt;p&gt;It does sound nice – the idea that there were people who were born as preconfigured cyborgs, interacting with interfaces from the minute they were born. And yet, we know that people are taught to interact with technologies. True, technologies often define our own conceptions of who we are and how we perceive the world around us, but there is still a learning curve that is endemic to human technology relationships.&lt;/p&gt;
&lt;p&gt;Because of the ubiquitous and pervasive nature of certain kinds of technology mediated interaction, it is sometimes difficult to look at our habits of technology as learned interactions. Recognizing that there is a thrust, an effort and an incentive produced for people to Become Digital, is also to recognize that there are different actors, players, promoters and teachers who help young people enter into relationships with technologies, which can often be greater than the first interactions.&lt;/p&gt;
&lt;h3&gt;Presumption 3: Digital Natives live digital lives&lt;/h3&gt;
&lt;p&gt;This is a concern voiced by many people who talk about digital natives. They are posited as slacktivists – removed from their material realities and apathetic to the physical world around them. They are painted as dysfunctional screenagers who are unable to sustain the fabric of social interaction and community formation outside of social networking systems. They are discussed as a teenage mutant nightmare that unfolds almost entirely in the domains of the digital.&lt;/p&gt;
&lt;p&gt;But these kinds of imaginations forget that a digital native is not primarily a digital native, or at least, not exclusively digital. Being a digital native is one of many identities these users appropriate. The digital often serves as a lens that informs all their other socio-cultural and political interactions, but it is not an all-containing system. The bodies that click on ‘Like’ buttons on Facebook are also often the bodies that fill up the streets to fight for their rights. The division between Physical Reality and Virtual Reality needs to be dismissed to build more comprehensive accounts of digital native practices.&lt;/p&gt;
&lt;h3&gt;Presumption 4: Connectivity is digitality&lt;/h3&gt;
&lt;p&gt;This is often an easy conflation. It is presumed that once one has constant connectivity, one will automatically become a digital native. Especially in policy and development based approaches, connectivity and access have become the buzzwords by which the digital divide can be breached. However, we have now learned that this one-size, fits-all solution actually fits nobody. Being connected – by building infrastructure and affording gadgets – does not make somebody a digital native.&lt;/p&gt;
&lt;p&gt;The digital native identity needs to be more than mere access to the digital. It involves agency, choice, critical literacy and fluency with the digital media that we live with. So instead of thinking of anybody who is connected as a digital native, we are looking at people who are strategically able to harness the powers of the digital to produce a change in their immediate environments. These changes can range from making personal collections of media to mobilising large numbers of people for political protests. To be digital is to be intimately connected with the technologies so that they can augment and amplify the ways in which we respond to the world around us.&lt;/p&gt;
&lt;p&gt;I offer these as the building blocks of looking at the ‘Other’ of the Digital Natives as we have discursively produced them. From hereon, in my subsequent posts, I hope to drill deeper to locate nuances and differences, concepts and frameworks that we need to map in order to build a digital native model that is inclusive, differential and context based.&lt;/p&gt;
&lt;p&gt;Banner image credit: AFSC Photos &lt;a class="external-link" href="http://www.flickr.com/photos/afscphotos/6266795673/"&gt;http://www.flickr.com/photos/afscphotos/6266795673/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This&amp;nbsp;blog post&amp;nbsp;by Nishant Shah was published in &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/search-other-decoding-digital-natives"&gt;DML central on 24 October 2011&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives'&gt;https://cis-india.org/digital-natives/in-search-of-the-other-decoding-digital-natives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-14T12:12:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/what-is-dilligaf">
    <title>What is Dilligaf?</title>
    <link>https://cis-india.org/internet-governance/what-is-dilligaf</link>
    <description>
        &lt;b&gt;On the web, time moves at the speed of thought: Groups emerge, proliferate and are abandoned as new trends and fads take precedence. Nowhere else is this dramatic flux as apparent as in the language that evolves online. While SMS lingo – like TTYL (Talk To You Later) and LOL (Laughing Out Loud)– has endured and become a part of everyday language, new forms of speech are taking over.&lt;/b&gt;
        
&lt;p&gt;“Leetspeak” or “L33t” (derived the word “elite”), for example, incorporate numbers in words, giving geeks their own language. One that they use to bypass firewalls and filters trained to recognize certain words – so in “l33t”-speak, porn becomes Pr0n, and onwards moves mankind.&lt;/p&gt;
&lt;p&gt;These mutations are not permanent: Like organisms, they grow to form new constellations of words and expressions demanding that users keep pace. And while purists have bled their hearts out, lamenting the savage attack on the language and grammar that digital technology has spawned, there is also a recognition of the fact that these linguistic developments are not merely experiments – they capture the spirit of a democratized knowledge system and the opening up of the information highway. User-generated content sites like Wikipedia, YouTube and Tumblr embody these acronyms and attitudes, where any attempt at regulation, control or imposition of authority is usually met with the reply – DILLIGAF (Do I Look Like I Give A F***)?&lt;/p&gt;
&lt;p&gt;DILLIGAFers – people who live a significant part of their lives online – might scoff at older forms of institutional control, but they don’t necessarily live in a space of anarchy, either. For example, academic credentials, institutional affliations and geopolitical location might not bear the same weight on Wikipedia as while writing a book, but there are other ways in which digital rank can be pulled. Your overall Internet experience, editing history and ability to garner mass support for your views are more important in determining your place in Wikipedia’s hierarchy. Any attempt at pulling rank with assets like money, influence or name are casually discarded with succinct exclamations like WTF (What The F***) and BFD (Big F****ing Deal).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the defining characteristics of the DILLIGAF generation is their fiercely independent spirit. While they’re constantly connected and incessantly sharing information, they are also terribly alone. When it comes to searching for information, finding people or exploring the web, personal skills with different digital tools and platforms makes one independent. In fact, one of the deterrents for the less technically inclined to join online communities is the idea that they’re supposed to find their own way as they tread unknown digital paths. Hence, DILLIGAFers often resort to acronyms like RTFM (Read The F***ing Manual) for people (read: the rest of us) who ask for information that can be easily found. And with the rapid Googlization of the world, an obvious question is met with an obvious answer – RTFG (Read The F****ing Google).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Geeks have invented many interesting and creative acronyms to make their voices heard, and while some of the acronyms predate the Internet, they often capture the irony of online and offline existence. SNAFU (Situation Normal: All F***ed Up), an acronym that supposedly emerged in America during the Second World War, often finds its way into describing the complexity of our lives. The dramatic nature of interactions, the struggle to establish trust and the complex structure of experiences all find voice online. FML (F*** My Life), an acronym as well as a popular networking site, is a sterling example of such a space, where people share stories of how things went wrong for them, allowing other users to rate their stories on a sympathy meter.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the most delicious ironies of the online space is that while irreverence might find a way into acronyms, unnecessary profanity is looked down upon. If you go around swearing on discussion pages, you will immediately be ostracized, and quite possibly asked to STFU (Shut The F*** Up).&lt;/p&gt;
&lt;p&gt;This article by Nishant Shah was&lt;a class="external-link" href="http://www.gqindia.com/content/what-dilligaf"&gt; published in GQ India &lt;/a&gt;on September 4, 2011.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/what-is-dilligaf'&gt;https://cis-india.org/internet-governance/what-is-dilligaf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-01T09:52:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia">
    <title>The Digital Classroom in the Time of Wikipedia</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia</link>
    <description>
        &lt;b&gt;The digital turn in education comes across a wide range of initiatives and processes. The Wikipedia which is the largest user generated content website stands as a figurehead of such a digital turn, writes Nishant Shah.&lt;/b&gt;
        
&lt;h2&gt;Context&lt;/h2&gt;
&lt;p&gt;The digital turn in education has been described across a wide range of initiatives and processes. These include the introduction of digital tools and gadgets as a part of the learning environment, building digital archives and repositories of learning and curriculum building, facilitating remote access to education through information and communications technologies&amp;nbsp; infrastructure, improving quality of access to education and learning resources, building diverse and customised syllabi to accommodate for alternative and contesting perspectives, building peer knowledge communities of information and knowledge production, and including non-canonical material and experiences into formal institutions of education. Different locations, contexts, geo-political circumstances, socio-economic factors, and cultural differences influence the spread, rise and integration of digital technologies in mainstream education. Much academic, policy and implementation attention has been given to these processes and several models of new learning environments and infrastructure have been postulated over the last two decades. The democratising promise of internet technologies has been largely if not exclusively about education, learning, literacy and production of knowledge from different parts of the world.&lt;/p&gt;
Wikipedia, one of the first and possibly the largest user generated content websites, that aims to put together the ‘sum total of all human knowledge’ in an open encyclopaedia, stands as the figurehead of such a digital turn. It questions and subverts the traditional analogue forms of knowledge production and relationships. The much discussed experiment conducted by Nature (Giles, 2005 and Orlowski, 2006) that established Wikipedia as an almost equal (if not more) reliable source of information to the fountainhead of print-based knowledge &lt;em&gt;Encyclopaedia Britannica&lt;/em&gt;, has become the touchstone by which digital collaborative knowledge structures&amp;nbsp; seek their validity within mainstream classroom pedagogy and learning.
Wikipedia itself has emerged as an object of deep scrutiny and contestation, with warring factions going strong about its strengths and weaknesses. The supporters look at how this collaborative peer-to-peer structure has changed knowledge relationships that defined consumers, producers and mediators of knowledge. They see in the rise of Wikipedia, and other such wiki-based structures and user generated content sites that remix, reuse and share knowledge within the digital realm, the potentials and possibilities of changing the futures of knowledge ecologies and economies. The detractors of Wikipedia make a strong case for specialised and expert curatorial practices of knowledge, without which the information explosion of the digital world would collapse all distinctions between speculative writing and rigorous accountable research.
&lt;h2&gt;Concerns&lt;/h2&gt;
&lt;p&gt;In the seemingly unbridgeable differences of these two contesting positions, there is however, a set of common presumptions which remained unquestioned and unchallenged. The example of Wikipedia accordingly serves to throw in sharp relief these more general questions regarding digitally produced knowledge and digitally enabled learning practices.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Design of Trust&lt;/strong&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;p&gt;The first among them is the concern around Authority and Authorship (Liang, 2010). Increasingly, as Wikipedia becomes a de facto global reference site available in different languages, there is a growing dependence on the authority of information available on Wikipedia. Given that the number of users of Wikipedia is exponentially higher than the number of editors on Wikipedia, there are many users who never confront the structures of participation, processes of editing, and questioning the source of information (Harouni, 2009, Broughton, 2002) found on the site. This is not a problem exclusive to Wikipedia. Given the explosion of user generated sites which often gloss over the problems of authority and authorship, misdirected or misguided information, there is a need for digital criticality which can help people sift through different kinds of information and develop the capacity for effective critical judgment regarding both truth or falsity and rhetorical persuasiveness or manipulation.&amp;nbsp; Especially within the context of scholarly and academic research and learning, classroom teaching and pedagogy, there is a need to define new parameters by which information introduced in the classroom or learning environment needs to stand deeper scrutiny regarding reliability (over authority).&lt;/p&gt;
&lt;h3&gt;Flattened Politics&lt;/h3&gt;
&lt;p&gt;The second concern has to do with the depoliticized perception of participation, collaboration and knowledge production on Wikipedia (Graham, 2010). Not only are geographical counters, experiential knowledges and non-standard forms of citation (Prabhala, 2010) ignored on Wikipedia, but they are also rendered redundant under the guise of objectivity. The essentially viral nature of information online and conditions of easy replicability that allow for copy and paste cultures often means that the information gets de-contextualised and de-politicized from its original intentions and circuits of production/distribution.&lt;/p&gt;
&lt;p&gt;In many ways, Wikipedia’s adherence to an encyclopaedic model, promotes the idea that there is universal, objective knowledge which can be produced and understood without engaging with the politics of context, language, translation, evidence, etc. This adoption of an older model of aggregating knowledge becomes problematic in the light of new perspectives and theories of reading and writing, which establish knowledge as a contested terrain rather than the benign site that can be mediated through protocols, bots and procedures (Miller, 2007 and Rosenzweig, 2006). In classrooms, students and teachers are both faced with problems when they encounter the simultaneously authoritative and collaborative, definite and tentative nature of information on Wikipedia. The flattened structure of information further complicates our engagement with the larger contexts it refers to and often hinders the learner’s ability to go beyond the self contained universe of Wikipedia, unable to engage with that which has been omitted or left-out and only concentrating on that what has been written and represented.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Technology as Tool&lt;/h3&gt;
&lt;p&gt;The third concern marks a larger anxiety with the Web 2.0 technologies 
and their integration with formal structures of education and learning. 
It has to do with new configurations of power, recalibrated hierarchies 
of learning and teaching, and distributed communities of learning which 
might not often be cohesive and concurrent. With the unqualified 
emphasis on digital gadgets – OLPC, Smart Boards, iPads – and ubiquitous
 connectivity, there is often a danger to reducing these structures to 
sheer functionality. There have been experiments where pedagogues have 
merely introduced user generated sites as reference material and ways of
 accessing information without actually looking at how they posit 
questions to existing education systems. The larger trend of distrusting
 non-academic spaces continues.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/DC.jpg/image_preview" title="Digital Technology" height="270" width="363" alt="Digital Technology" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;A lecture on the problems of Wikipedia 
is immediately followed by a ban on or “policing” of the use of 
Wikipedia as a reliable resource, trying to create a false and divisive 
distinction between offline and online learning tools (Davidson, 2007). 
With the increased focus on ‘Digital Natives’ within education policy 
and everyday classroom pedagogy, there is a call for changing the 
existing classroom and replacing it with a digital classroom – a classroom that challenges the teacher-student relationships, the 
authority of the prescribed curricula, and the form of learning and 
teaching within college and university structures. The Digital Classroom
 is often mistaken to be a virtualisation of the contemporary classroom,
 where virtual presences and cloud-based resources of learning structure
 the syllabi and the methods of learning. However, the larger anxieties 
are about rendering the physical classroom digital by establishing new 
relationships and structures at the levels of curricula design, 
teaching, learning and evaluation. The need is to look beyond the social
 media as a tool, and start unpacking the transparency of the digital 
interface and the perceived non-hierarchical nature of information 
filtering (Geiger, 2010) on Wikipedia and other such user generated 
content portals.&lt;/p&gt;
&lt;h3&gt;Quality of Access&lt;/h3&gt;
&lt;p&gt;The fourth concern draws from digital internet rhetoric of Do It Yourself. There is a heavy promotion of howthe only thing that stops a student (or anybody who is a learner) from being an intelligent and engaged student is lack of resources. This rhetoric finds bolstering in other political movements like FLOSS and A2K (Willinsky, 2006). There is a presumption that the teacher is merely a proxy for the paucity of resources and that once the students have unlimited access to the ‘sum total of all human knowledge’, they will be able to Learn everything on their own. The DIY University models, the proposition of phasing out teachers and investing in digital infrastructure instead, the idea that the digital native student has instinctive abilities to navigate through knowledge systems (like a fish does to water), all obfuscate not only the traditional learning processes but also reduce all learning to Access.&lt;/p&gt;
&lt;p&gt;There is no debate about the quality of access. Even when factual errors are spotted, it is celebrated as an opportunity to improve so that information on Wikipedia is by definition flawed and always potentially in the process of being improved. There is little theorisation of both the role of a teacher in a classroom and the relationship with information access and learning. The presumption that the only gating factor to better education is lack of resources glosses over questions of social and economic disadvantage, political contexts, age, language, race, gender, sexuality, social support, etc., that come into play when designing inclusive education systems. Instead, there is a promotion of fact-based skill-oriented learning that fits the larger neo-liberal agenda of producing workforces who necessarily should not have to be critical in their everyday labours (Achterman, 2005). Universities and colleges are finding increasing pressure to produce students who work within such flat knowledge horizons towards market expansion and promotion of information capitalism rather than a critical learner who is able to deploy lessons learned from education in order to question and change the reality of the conditions within which s/he lives.&lt;/p&gt;
&lt;h2&gt;Rationale&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Given these dramatic measures and accelerated changes happening in academia and within the university systems across the worlds, it is necessary to dwell on what a digital college classroom and learning environment looks like in the time of Wikipedia. A synthesis of perspectives from different stakeholders in varied disciplines, engaging with knowledge production, consumption, distribution and access is necessary to understand what the futures and contours of the university system and classroom pedagogy are. The ambition is to look at Wikipedia as a symptom of our times rather than a site of analyses.&lt;/p&gt;
&lt;h2&gt;Call for Proposals&lt;/h2&gt;
&lt;p&gt;This is a call for proposals towards a special Reader, from people who are interested in producing historical and contemporary accounts of relationships between education, technology, learning, and pedagogy in order to map existing crises and questions of our present times. We take the classroom as the unit where different processes and flows of the education system meet. In this context, we invite researchers, academic practitioners, students, artists, new media theorists, education policy actors and historians of knowledge to look at the &lt;em&gt;Digital Classroom in the Time of Wikipedia&lt;/em&gt; as an opportunity to question global trends in education and ways by which Wikipedia (and other such structures) can be fruitfully integrated in formal education towards better learning. Proposals can be for producing theoretical accounts, critical analyses, case-studies from one’s practice, review of information and knowledge, narratives of art and activist interventions, regional and local snap-shots, and other innovative forms by which the diverse and complex questions can be elaborated.&lt;/p&gt;
&lt;h2&gt;Key Questions&lt;/h2&gt;
&lt;p&gt;Proposals can be inspired by but not limited to some of the questions listed below that we identify as beginning points for engaging with the area:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;What does a digital classroom look like? If we had to think beyond just integration of digital tools into the classroom, what are the new models and structures of classrooms (physical, pedagogical, or otherwise) that we are looking at?&lt;/li&gt;&lt;li&gt;What are the new relationships that we are mapping in the time of Wikipedia – student-teacher, teacher-curriculum, student-classroom, student-student, technology-education, pedagogy-learning? How do we account for the shifts and map the transitions?&lt;/li&gt;&lt;li&gt;How do we understand the changing nature and function of the university and education with the rise of the internet? What are the policy and practice visions of the University of the Future?&lt;/li&gt;&lt;li&gt;What does the integration of Wikipedia and similar structures in everyday classroom practice lead to? What does it change and for whom?&lt;/li&gt;&lt;li&gt;What is the role of the teacher in the age of ubiquitous information access? How do we restructure our ideas of pedagogy, learning and evaluation?&lt;/li&gt;&lt;li&gt;What are the historical tensions between technology and education that are being replayed with the rise of the digital?&lt;/li&gt;&lt;li&gt;What does the rise of Wikipedia mean for our traditional understandings of data repositories? What are the politics and implications of Wikimedia’s other projects on Alternative Citation, Wikipictures, GLAM, etc. on the larger knowledge ecology and industry?&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Achterman, D. (2005). “Surviving Wikipedia: Improving student search habits through information literacy and teacher collaboration”, &lt;em&gt;Knowledge Quest&lt;/em&gt;, 33(5), 38−40.&lt;/li&gt;&lt;li&gt;Davidson, C. (2007). “We can’t ignore the influence of digital technologies”,&lt;em&gt; Education Digest&lt;/em&gt;, 73(1), 15−18.&lt;/li&gt;&lt;li&gt;Geiger, S. (2011). “The Lives of Bots”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Giles, J. (2005). “Internet encyclopedias go head to head”, &lt;em&gt;Nature&lt;/em&gt;, 438(7070), 900−901.&lt;/li&gt;&lt;li&gt;Graham, M. (2011). “Wiki Space: Palimpsests and the Politics of Exclusion”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Harouni, H. (2009). “High School Research and Critical Literacy: Social Studies with and Despite Wikipedia”, &lt;em&gt;Harvard Educational Review&lt;/em&gt;, 79 (3), 473-494.&lt;/li&gt;&lt;li&gt;Liang, L. (2011). “A brief History of the Internet from the 15th to the 18th Century”, &lt;em&gt;Critical Point of View A Wikipedia Reader&lt;/em&gt; (Eds.) Geert Lovink and Nathaniel Tkacz. Institute of Network Cultures : Amsterdam.&lt;/li&gt;&lt;li&gt;Miller, N. (2007). “Wikipedia revisited” &lt;em&gt;ETC: A Review of General Semantics&lt;/em&gt;, 64(2), 147−150.&lt;/li&gt;&lt;li&gt;Orlowski, A. (2006, March 26). Nature mag cooked Wikipedia study, &lt;em&gt;The Register&lt;/em&gt;. Retrieved December 17, 2011, from &lt;a class="external-link" href="http://www.theregister.co.uk/2005/10/18/wikipedia_quality_problem/"&gt;http://www.theregister.co.uk/2005/10/18/wikipedia_quality_problem/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Prabhala, A. (2011). &lt;em&gt;People Are Knowledge&lt;/em&gt;. Documentary retrieved from December 17, 2011 from &lt;a class="external-link" href="http://vimeo.com/26469276"&gt;http://vimeo.com/26469276&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Rosenzweig, R. (2006). “Can history be open source? Wikipedia and the future of the past” &lt;em&gt;Journal of American History&lt;/em&gt;, 93(1), 117–146.&lt;/li&gt;&lt;li&gt;Willinsky, J. (2006). &lt;em&gt;The Access Principle: The Case for Open Access to Research and Scholarship&lt;/em&gt;. MIT Press :Massachusetts.
&lt;hr /&gt;&lt;strong&gt;Collaborators&lt;/strong&gt;: Dr. David Theo Goldberg, &lt;em&gt;University of California 
Humanities Research Institute&lt;/em&gt; and Claudia Sullivan, &lt;em&gt;Digital Media and 
Learning Initiative, HASTAC&lt;/em&gt;.&lt;br /&gt;&lt;strong&gt;Photo source&lt;/strong&gt;: &lt;a class="external-link" href="http://www.flickr.com/search/?q=digital+classrooms&amp;amp;l=1"&gt;Flickr&lt;/a&gt; (Creative Commons-licensed content for noncommercial use requiring attribution and share alike distribution).&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia'&gt;https://cis-india.org/raw/digital-humanities/blogs/digital-classroom/digital-classroom-in-time-of-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>Digital Classroom in the Time of Wikipedia</dc:subject>
    

   <dc:date>2015-10-05T14:53:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
