<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 5241 to 5255.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/guerrieri-del-sapere"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dn-workshop-in-chile"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/accessibility-telecommunications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/is-that-a-friend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/skinputting-mobile-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/brave-new-medium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/myth-history-irreverence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/unique-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/civic-hackers-in-India"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nel-suk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tweet-and-poke"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/guerrieri-del-sapere">
    <title>Knowledge Warriors</title>
    <link>https://cis-india.org/news/guerrieri-del-sapere</link>
    <description>
        &lt;b&gt;Dieci anni fa, quando Jimmy "Jumbo" Wales lanciò l'idea di una piattaforma della conoscenza partecipativa e plurilingue, di tipo enciclopedico, basata sul web, pochi erano pronti a raccoglierla. L'industria della conoscenza era rigidamente divisa tra chi la produceva, chi la fruiva e chi mediava tra i due gruppi.&lt;/b&gt;
        
&lt;p&gt;Scostarsi da questa struttura sembrava assurdo. Eppure Wikipedia è uno dei siti web più grandi del mondo, con oltre 17 milioni di articoli e 365 milioni di lettori in 262 lingue.&amp;nbsp;Basata sulla semplice idea che la conoscenza sia un patrimonio comunitario piuttosto che individuale, Wikipedia ha invitato chiunque avesse accesso a internet a contribuire a rafforzare le proprie conoscenze attraverso un processo di discussione, costruzione del consenso e collaborazione. A differenza di una normale enciclopedia, forte del suo battaglione di "guerrieri del sapere", Wikipedia si affida ai normali utenti, che utilizzano il potere dell'informazione online per «totalizzare la somma della conoscenza umana».&lt;/p&gt;
&lt;p&gt;A un decennio dal suo inizio, la battaglia nata intorno a Wikipedia non si placa. I suoi partigiani esaltano la democratizzazione del sapere e la sfida al regime capitalista dei diritti di proprietà intellettuale che Wikipedia rappresenta. I suoi detrattori, invece, la identificano con nuove concentrazioni di potere, un'ingiusta rappresentazione delle voci alternative e l'appiattimento delle complesse relazioni tra l'umanità e l'informazione. Seguiamo queste guerre-Wiki per vedere quali lezioni possiamo trarne per il futuro del nostro mondo sempre più Wikificato.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;01 – stabilire un punto di vista critico&lt;/p&gt;
&lt;p&gt;La neutralità del punto di vista (Npv) è uno dei capisaldi teorici attraverso cui Wikipedia garantisce la solidità delle sue informazioni e la governance delle sue comunità. Anziché cercare la "Verità", Wikipedia promuove la "Verificabilità", per cui solo quelle idee che sono già state documentate altrove, e che possono essere addotte come prova, hanno diritto di esistere nel suo universo. Le ricerche originali, le nuove idee, le incursioni artistiche e le risposte emotive non trovano spazio in questo scenario di informazione quasi piatto. La Npv mira a eliminare l'intenzione umana, il desiderio e l'investimento nella conoscenza, a favore di quanto è già documentato. Benché questo si sia dimostrato utile per risolvere dibattiti su argomenti particolarmente delicati o provocatori, non può essere una soluzione sostenibile a lungo termine.&lt;/p&gt;
&lt;p&gt;Gli esseri umani non hanno un rapporto neutrale con la conoscenza. Come sostiene appassionatamente il guru della rete Geert Lovink, direttore dell'Institute of Network Cultures di Amsterdam: «La conoscenza, specialmente nella società dell'informazione, è potere e denaro. Wikipedia può professarsi neutrale, ma si tratta di una neutralità costruita e falsa. Cerca di nascondere i complessi meccanismi di potere che alla fine determinano quali tipi di conoscenza sono validi». A dispetto della sua prospettiva di completa inclusione e della sua ambizione, spesso Wikipedia viene definita cabalistica, basata su rituali, priva di una riflessione critica sul suo stesso rapporto con la conoscenza. Occorre riflettere criticamente sugli sforzi di rafforzare la conoscenza umana per individuare criteri che vadano oltre la neutralità e la verificabilità.&lt;/p&gt;
&lt;p&gt;02 – superare la saggezza delle masse&lt;/p&gt;
&lt;p&gt;Wikipedia resta uno dei più visitati siti a contenuto elaborato dagli utenti a livello mondiale. La sua struttura "Open Wiki" invita diversi attori umani e non umani (i "robot") a collaborare nella produzione e nella documentazione della conoscenza. L'esperimento condotto dalla rivista «Nature», che ha confrontato gli articoli scientifici dell'Enciclopedia Britannica con quelli di Wikipedia, ha evidenziato un livello di accuratezza e un tasso di "errori seri" simili.&lt;/p&gt;
&lt;p&gt;Lo scienziato informatico e artista Jaron Lanier, nel libro Tu non sei un gadget, sostiene che il collettivismo online non è la soluzione giusta per documentare il sapere umano a lungo termine. Lanier afferma che l'ethos collettivista alla base di nuovi fenomeni culturali come Wikipedia in realtà riduce la qualità del prodotto finale. Parte dal principio che il design del software di piattaforme del tipo di Wikipedia produce «regole non modificabili» che portano a nuove forme di esclusione. Considera la saggezza delle masse uno strumento che dovrebbe essere usato strategicamente. Lanier contesta a Wikipedia di promuovere «il culto del dilettantismo», che rende le singole voci non essenziali – persino quelle degli esperti – e considera la saggezza collettiva più affidabile che non i tentativi rigorosi di trovare la verità e il significato.&lt;/p&gt;
&lt;p&gt;Negli anni a venire bisognerà sottrarre la saggezza delle masse alle piattaforme che condizionano la partecipazione attraverso il design del software e dell'interfaccia. Bisognerà usarla come uno strumento piuttosto che come fine a se stessa.&lt;/p&gt;
&lt;p&gt;03 – una svolta verso l'inclusione&lt;/p&gt;
&lt;p&gt;Wikipedia, come incarnazione dello zeitgeist Free/Libre/Open Source (Floss), teoricamente abbraccia una cultura di apertura, inclusione e pluralismo. Il suo design tecnologico neutrale, che assicura il diritto di contribuire a chiunque abbia accesso a internet, trascura il fatto che il numero di persone che accedono a internet, globalmente, è molto basso. La mancanza di altre interfacce utilizzabili, tramite cellulari o altre forme di portable computing, fa sì che i contributori restino concentrati in specifiche parti del mondo. Johanna Niesyto, dell'Università di Seigen, nella sua tesi di dottorato afferma: «Il profilo demografico medio di un redattore di Wikipedia è quello di un maschio bianco appassionato di internet con una visione del mondo monoculturale e limitata, basata sulla razionalità occidentale». Le contributrici donne che si sono sentite silenziate dalla cultura tech maschile di Wikipedia hanno già creato spazi alternativi, come Wikichix.org.&lt;/p&gt;
&lt;p&gt;Nonostante la sua ricerca di pluralismo, Wikipedia palesemente esclude quei processi, idee, culture e stili di vita che non rientrano nella mentalità razionale occidentale. Rifiuta altre forme di conoscenza tradizionali, effimere e orali. La popolarità di altre enciclopedie collaborative online come Baidu Baike in Cina, testimonia le implicite esclusioni del mondo di Wikipedia.&lt;/p&gt;
&lt;p&gt;Perché Wikipedia diventi davvero inclusiva, dovrà dissociarsi dai monolitici standard culturali, morali e politici della civiltà dominante e imparare ad arricchirsi di sfumature, diventando più sensibile e pluralista per facilitare davvero la partecipazione e la diversità, a livello di contenuto, design e governance.&lt;/p&gt;
&lt;p&gt;04 – aprirsi alla resistenza&lt;/p&gt;
&lt;p&gt;Wikipedia è l'incarnazione del grido di guerra, scaturito dall'euforia tecnologica, per una società aperta che dovrebbe mettere l'individuo in condizioni di sfuggire alla tirannia dello stato e dei mercati. Tuttavia il cyber-realista Evgeny Morozov, dell'Università di Stanford, nel suo ultimo libro, The Net Delusion, afferma che tale cyber-utopia è frutto di «una fede naif nella natura emancipativa della comunicazione online, fondata su un ostinato rifiuto di riconoscere il suo lato negativo».&lt;/p&gt;
&lt;p&gt;Nel quadro tracciato da Morozov, il "mainstreaming" di progetti tipo Wikipedia costituisce la fine del vero dibattito pubblico e dell'impegno politico. Con Wikipedia il dissenso è difficile. Qualsiasi intervento che violi le "Condizioni di Servizio" e dunque sfidi i presupposti fondamentali di Wikipedia, viene immediatamente "bannato" o contrastato legalmente.&lt;/p&gt;
&lt;p&gt;Il progetto "Wikipedia Art", avviato dagli artisti Nathaniel Stern e Scott Kildall, si è scontrato con un problema simile. È iniziato come voce di Wikipedia supportata da una serie di blog e articoli scritti da un gruppo di collaborazione che appoggiava l'iniziativa. Il progetto artistico intendeva criticare e utilizzare le stesse strutture di autorità che davano autenticità alle voci di Wikipedia. Eppure l'iniziativa è stata rapidamente rimossa, all'inizio dalla comunità e successivamente dalle azioni legali intraprese dalla Fondazione Wikimedia, che gestisce Wikipedia.&lt;/p&gt;
&lt;p&gt;Benché Wikipedia sostenga di essere uno spazio che sovverte i processi dominanti, non riesce ad accettare la resistenza e le sfide che muovono dalla più grande sfera digitale. Se vuole aderire alle originarie ideologie di internet, che avrebbe dovuto costruire un mondo di conoscenze libere e aperte, dovrà evolvere con il web, imparando ad accogliere e facilitare tali sovvertimenti.&lt;/p&gt;
&lt;p&gt;Wikipedia resta un autentico fenomeno storico che ha cambiato il modo in cui ci confrontiamo con l'informazione e la conoscenza nel quotidiano. Ha contribuito a mettere radicalmente in discussione la logica del tardo capitalismo e della proprietà intellettuale che ha governato l'industria della conoscenza, producendo strutture di esclusione e dominio. Tuttavia, nel celebrare il suo decimo compleanno, è ora di evolvere verso un futuro in cui la Wikificazione del mondo si confronti realisticamente con le necessità di equità, pluralismo e apertura rappresentate da progetti come Wikipedia.&amp;nbsp;(traduzione di Elisa Comito)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.ilsole24ore.com/art/cultura/2011-01-16/guerrieri-sapere-082124.shtml?uuid=AaZ0FG0C&amp;amp;fromSearch#continue"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/guerrieri-del-sapere'&gt;https://cis-india.org/news/guerrieri-del-sapere&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-04-01T16:50:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dn-workshop-in-chile">
    <title> Digital Natives with a Cause? - Workshop in Chile seeks participants</title>
    <link>https://cis-india.org/news/dn-workshop-in-chile</link>
    <description>
        &lt;b&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. An open call for participation follows. &lt;/b&gt;
        
&lt;p&gt;As the Internet and digital technologies become more widespread, the world is shrinking: we are constantly connected to our contexts, our people, our cultures and our networks. And you, yes YOU are a part of this change. In fact, as a digital native– someone to whom digital technologies are central to life – you are directly affecting the lives of many, sometimes even without knowing about it.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society and Hivos in collaboration with Rising Voices is calling out to young users of technology to join a global conversation. The 3-day workshop titled “From Face to Interface” will focus on how youth utilize new platforms, media and spaces of communication and expression in the digital age. If you have used digital technologies to make your voice heard, to express your opinion in creative ways or to create new knowledge online, we want to hear from you. These can be stories where you have used a mobile phone, GPS or PDA to access the Internet and reduce the online-offline divide, stories where you accessed interactive platforms like user-generated content websites, stories where the use of technology has become part of your identity, or stories where you have been part of a collaborative method of research, production, shared learning process, participation network etc.&lt;/p&gt;
&lt;p&gt;We invite you to share your perspectives in an informal conversation along people with similar approaches from neighboring communities. The workshop is open to applicants from, in and around Latin America and the Caribbean who are interested in an interactive and engaging dialogue that marks the beginning of the “Digital Natives with a Cause?” research inquiry into the region.&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.bahamaislandsinfo.com/index.php?option=com_content&amp;amp;view=article&amp;amp;id=7523:digital-natives-with-a-cause-workshop-in-chile-seeks-particpants&amp;amp;catid=35:Press%20releases%20of%20interest&amp;amp;Itemid=148"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dn-workshop-in-chile'&gt;https://cis-india.org/news/dn-workshop-in-chile&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-04-01T16:50:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/accessibility-telecommunications">
    <title>Accessibility in Telecommunications</title>
    <link>https://cis-india.org/accessibility/blog/accessibility-telecommunications</link>
    <description>
        &lt;b&gt;CIS seeks to gather information about the accessibility of telecommunications products and services for persons with disabilities and elderly persons in India.
 
&lt;/b&gt;
        &lt;p&gt;Given below are the links to two questionnaires:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/publications/service-provider-survey" class="internal-link" title="Service Provider Survey"&gt;Service Provider Survey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/publications/manufacturer-survey" class="internal-link" title="Manufacturer's Survey"&gt;Questionnaire for Mobile Manufacturers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/accessibility-telecommunications'&gt;https://cis-india.org/accessibility/blog/accessibility-telecommunications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-11-08T08:08:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary">
    <title>Privacy Matters — Conference Report</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary</link>
    <description>
        &lt;b&gt;A one-day conference on Privacy Matters was held on Sunday, 23 January 2011 at the National University of Juridical Sciences (NUJS) Law School in Kolkata. This was the first of a series of eleven conferences on ‘privacy’ that Privacy India is scheduled to host in different Indian cities from January to June this year. Members of Parliament, Sri Manoj Bhattacharya from the Revolutionary Socialist Party (RSP) and Sri Nilotpal Basu from the Communist Party of India (Marxist) CPI (M) spoke in the conference. Students, the civil society and lawyers also participated in it.&lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The conference was held to discuss elements of the privacy legislation that has been proposed to the Parliament of India, and the UID Bill and project. The conference focused on the tensions between privacy and society that exist in India today, and acted as a space for opinion sharing and discussion. Privacy India which was formed under the auspices of&amp;nbsp; Privacy International, a UK based organization that works to protect the right of privacy around the world, the Centre for Internet and Society (CIS), an NGO based in Bangalore, and Society in Action Group (SAG), an NGO based in Delhi joined hands to host this event.&lt;/p&gt;
&lt;p&gt;Rajan Gandhi, founder of SAG opened the conference with an explanation of the mandate of Privacy India, the objective of which is of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. &amp;nbsp;One of Privacy India's goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, legislators and the legal and academic community.&lt;/p&gt;
&lt;h3&gt;Keynote&lt;/h3&gt;
&lt;p&gt;The keynote speech was delivered by Dr. Sudhir Krishnaswamy professor of law and governance. Dr. Krishnaswamy began by outlining the present situation of privacy in India. The right to privacy has been read into Sections 19 and 21 of the Constitution of India through case law, which has defined privacy — among other things — as the right to personal autonomy, the right against unreasonable search and seizure, and as a fundamental right that is critical to the person, but does not supersede public or national interest. Dr. Krishnaswamy also raised many intriguing questions including: &amp;nbsp;what does privacy mean to India — is it linked to a person’s dignity and their honour? Or is it purely concerned with misappropriation of information, and further is privacy in India an issue of the individual or an issue of the family and the community? He also described the philosophical groundings of privacy as being in the right to dignity, the right to autonomy, and the misappropriation of information. &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Privacy Challenges&lt;/h3&gt;
&lt;p&gt;The conference was spread into three sessions. In the first session Prashant Iyengar, head researcher of the project at Privacy India, spoke about the challenges that India specifically is facing in shaping a privacy legislation including: the need to balance the right to information/transparency and privacy, the need to create a definition of privacy that does not exclude lower classes and is not a negative right, but instead a positive right, and the problem of ubiquitous surveillance that is happening in society today. &amp;nbsp;Elonnai Hickok, policy analyst at Privacy India, spoke specifically on wire tapping, and the Nira Radia tapes. In her presentation she first outlined other countries definitions of privacy which include: the right to be left alone, the protection from unauthorized searches, and the right to control information about oneself through consent. &amp;nbsp;Using the case study of Nira Radia and Ratan Tata she spoke about the rising concern of wire tapping in the country as being indicative of a social change and relationship of the state and government. Elonnai also raised questions concerning whether privacy should be made inversely proportional to public figures, and if public interest will always supersede the private right of individuals.&lt;/p&gt;
&lt;h3&gt;UID and Privacy&lt;/h3&gt;
&lt;p&gt;The second session of the conference focused on the UID Bill and privacy. Presentations from NUJS student Amba Kak and Sai Vinod raised concerns about the UID project and privacy. Their presentation also compared and contrasted identity schemes of other countries with the UID. A few similarities that they found amongst all scheme were: the collection of data, the processing of data, and the storing of data. &amp;nbsp;Deva &amp;nbsp;Prasad from the National Law School of Bangalore presented on constitutional elements of the UID scheme ranging from loopholes in the Bill to connections that can be made when the UID Bill is placed in the larger picture. &amp;nbsp;Sri Manoj Bhattacharya (MP) from RSP voiced his concerns of the UID, and emphasized that by giving an individual a number which acts as their fundamental identity which they use to function in society, the government in fact is eroding an individual’s actual identity, and that is an invasion of privacy. &amp;nbsp;Sri Nilotpal Basu (MP) from CPI (M) spoke out strongly against the UID, voicing that his greatest concern with the UID is that it will be a way for corporate bodies to target individuals as consumers, and that privacy legislation could be used as a way for corporate bodies to hide from the public eye.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In the concluding session the floor was opened up to the public for questions and opinion sharing. Many participants shared what they believed needed to be included in privacy legislation, and what issues a privacy legislation needs to address. A few of these include: privacy rights and the media, privacy and the right to information, the privacy rights of minorities, and the privacy rights of the government. Also types of regulatory models for privacy were discussed. For instance, should privacy in India be represented and protected through a data protection law, or should privacy be seen as a fundamental right to privacy? Should privacy be represented through a broad framework, or through sector specific statutes? What should the redressal and enforcement mechanisms look like?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As seen from the presentations and the comments at the conference one thing which is clear is that privacy is an issue that concerns every person in India. Over the next six months Privacy India will be conducting ten more conferences in different Indian cities to engage the public in dialogues of privacy and raise awareness around the issues of privacy. &amp;nbsp;The next workshop will be held on 5 February 2011 in Bangalore.&lt;/p&gt;
&lt;p&gt;Download the conference summary &lt;a href="https://cis-india.org/internet-governance/blog/privacy-kolkata-report" class="internal-link" title="Privacy India Calcutta Conference"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-01-27T10:22:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda">
    <title>Privacy Matters Conference Agenda</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda</link>
    <description>
        &lt;b&gt;The "Privacy Matters" conference is taking place on Sunday January 23rd, at NUJS Law school at 10:30. It is a full day event that will discuss the challenges and concerns of privacy in India. Below is the agenda for the event. We look forward to your participation and attendance. &lt;/b&gt;
        
&lt;h2&gt;Privacy Matters agenda&lt;/h2&gt;
&lt;h3&gt;January 23, 2011 NUJS&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;10:30 – 4:30 P.M.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Time:&lt;br /&gt;&lt;br /&gt;&lt;em&gt;10:30 - 11:00 &lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Welcome &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;ol&gt;&lt;li&gt;Who is PI&lt;/li&gt;&lt;li&gt;What are our objectives&lt;/li&gt;&lt;li&gt;Why is privacy important in India &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;em&gt;&lt;strong&gt;11:00 - 11:30&amp;nbsp;&lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Keynote&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Sudhir Krishnaswamy&lt;/li&gt;&lt;/ol&gt;
&lt;strong&gt;&lt;em&gt;11:30 - 11: 45 &lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Tea Break &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;11:45 - 1:00 &lt;/strong&gt;&lt;/em&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session I&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;Personal privacy: violations and Indian legislation that addresses these violations &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Informational privacy: violations and Indian legislation that addresses these violations &lt;br /&gt;&lt;/li&gt;&lt;li&gt;What is the existing vacuum in Indian legislation in concern to privacy&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;strong&gt;&lt;em&gt;1:00 -2:00&lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Lunch&amp;nbsp;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;2:00 - 3:30 &lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session II &lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Identity and privacy: why does it matter &lt;br /&gt;&lt;/li&gt;&lt;li&gt;International approaches to identity&amp;nbsp;&lt;/li&gt;&lt;li&gt;The UID and Privacy &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;em&gt;&lt;strong&gt;3:30 - 3:45&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;Tea Break &lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;3:45 - 4:30&lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session III &lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;Open discussion and opinion sharing &lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-01-14T11:45:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach">
    <title>Rising Voices Seeks Micro-Grant Proposals for Citizen Media Outreach </title>
    <link>https://cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach</link>
    <description>
        &lt;b&gt;Rising Voices is seeking project proposals from non-governmental organizations (NGOs) or individuals for funding of up to $4,000 USD for digital media outreach projects around the world. Application Deadline: Friday, February 4, 2011 at 11:59 PM GMT.&lt;/b&gt;
        
&lt;p&gt;It has been more than three years since Rising Voices began with a simple mandate: to help bring new voices from underrepresented communities to the global conversation through the use of citizen media. We have been accomplishing that by providing microgrant funding, as well as technical and mentoring support to our grantee communities. Ever since the first microgrant competition was announced in May 2007, we have provided seed funding to 24 projects from around the world to help turn their ideas into reality. The diversity of these grantee projects has made Rising Voices a unique place on the web to have a firsthand look at places around the world, such as &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/project-foko/"&gt;Tamatave, Madagascar&lt;/a&gt; and &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/nomad-green-mongolia/"&gt;Ulaanbaatar, Mongolia&lt;/a&gt;, through the first-person accounts of these new bloggers.&lt;/p&gt;
&lt;p&gt;Beginning on January 11th, 2011, Rising Voices is launching the latest round of microgrant funding and is now accepting project proposals from non-governmental organizations (NGOs) or individuals for funding of &lt;strong&gt;up to $4,000 USD&lt;/strong&gt; for digital media outreach projects around the world. Ideal applicants will present innovative and detailed proposals to teach citizen media techniques to underrepresented communities that are poorly positioned to discover and take advantage of tools like blogging, video-blogging, or podcasting on their own.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Who is Eligible to Apply&lt;/h3&gt;
&lt;p&gt;This funding opportunity is open to both NGOs and private individuals. However, if an NGO does not have experienced citizen media trainers on their staff, it is extremely important that they seek collaboration with the local blogging community to find the right trainer(s) with the necessary skills. On the other hand, it would also be highly beneficial for individual applicants to partner with an existing NGO from the communities they plan to serve in order to strengthen the project's impact.&lt;/p&gt;
&lt;h3&gt;What Kind of Projects May be Funded&lt;/h3&gt;
&lt;p&gt;Rising Voices seeks project proposals that share our mission of bringing voices from new communities, as well as underrepresented language groups to the online global conversation through the use of citizen media. The projects' primary activities should be to provide citizen media training workshops to the target community, as well as ongoing support and mentoring to the participants. Please see our roster of current and alumni grantee projects for examples of previously funded projects.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Examples of potential projects include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Distributing flip video cameras to local residents to help map and document environmental issues affecting the area and to propose solutions.&lt;/li&gt;&lt;li&gt;Partnering with a local library with a computer lab to train youth how to record and document the history of their local neighborhood by using mp3 recorders to interview local elders.&lt;/li&gt;&lt;li&gt;Organizing blogging workshop for local artisans to help them market their work online, but also tell the story and history of their handicrafts.&lt;/li&gt;&lt;li&gt;Distributing $10 digital cameras to two different groups in different neighborhoods and create a Flickr group where they interact with each other's&amp;nbsp;&amp;nbsp; photographic perspectives of their city.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Application Process&lt;/h3&gt;
&lt;p&gt;Interested applicants should complete the online proposal application form (&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;link here&lt;/a&gt;), which should also include a detailed budget. If you would like to download the application questions to complete offline in order to upload later, please download the text document here (&lt;a class="external-link" href="http://rising.globalvoicesonline.org/files/2011/01/Rising-Voices-Grant-Application.pdf"&gt;PDF&lt;/a&gt; format). While we welcome and encourage projects from all corners of the global, all applications must be completed in English.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;Online Application Form&lt;/a&gt;&lt;/pre&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;The application deadline is &lt;strong&gt;February 4th, 2011 at 11:59 PM GMT&lt;/strong&gt;. All applicants will receive a confirmation email indicating that we have received your proposal. The proposals will be reviewed by a committee of Global Voices staff and volunteers, as well as members of previous Rising Voices grantees. We will announce the grant recipients by February 28, 2011.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Expectations of Successful Grantees&lt;/h3&gt;
&lt;p&gt;Successful projects will be prominently featured on the Global Voices networks. Grantees will be required to sign a grant agreement, which will outline accounting, reporting, and other terms and conditions regarding how funds will be distributed. Grantees will also be required to post regular project updates to the Rising Voices website, be in regular communication with Rising Voices staff, as well as actively participate in the Rising Voices community.&lt;/p&gt;
&lt;p&gt;Feel free to ask questions in the comments section below or by sending an email to eddie [at] globalvoicesonline [dot] org.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This post is also available in:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://mg.globalvoicesonline.org/2011/01/11/11977/"&gt;Malagasy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://pt.globalvoicesonline.org/2011/01/11/rising-voices-abre-selecao-para-fundo-destinado-a-projetos-de-midia-cidada/"&gt;Português&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach'&gt;https://cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-04T10:36:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/social-media">
    <title>Getting Connected</title>
    <link>https://cis-india.org/news/social-media</link>
    <description>
        &lt;b&gt;Nishant Shah of the Centre for Internet &amp; Society talks about the growing adoption of social media, and what can constitute a "social media network" &lt;/b&gt;
        
&lt;p&gt;See the video in livemint &lt;a class="external-link" href="http://videos.livemint.com/video/5223036-getting-connected"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/social-media'&gt;https://cis-india.org/news/social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:03:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/is-that-a-friend">
    <title>Is That a Friend on Your Wall?</title>
    <link>https://cis-india.org/digital-natives/blog/is-that-a-friend</link>
    <description>
        &lt;b&gt;Before you start reading today’s column, have a look at the person sitting next to you. It might be a family member if you are at home, a friend in the club, a stranger in a cafe or a fellow commuter on the bus. Now take a moment to figure out how much you trust that person. The intensity of your trust would depend upon your familiarity, your social relationship and the time you’ve known that person.&lt;/b&gt;
        
&lt;p&gt;However, what remains constant in all these different equations is the process by which trust is established in physical spaces.&lt;/p&gt;
&lt;p&gt;How do we trust somebody? How do we know that we are safe with them? We rely on answers like “instincts”, “vibes” or “feelings”, which cannot be easily quantified or explained. The reason we do not have rational explanations for why and how we trust somebody is because we depend upon a social design of trust from the beginning of our social interactions. As young children, we were told not to speak with strangers or accept candy from them. As adults, we were taught that people who look like us and sound like us are probably safer for us. We learn, through signs and experience, on how to be safe in our daily life. Some signs are obvious, like “Beware of pickpockets”.&lt;/p&gt;
&lt;p&gt;Others are learned, the way somebody looks at us, warns us of impending danger. We have learned now to decode physical appearances, intonations, backgrounds and body language in order to develop relationships of trust with people we meet.&lt;/p&gt;
&lt;p&gt;Often, these relationships are mitigated by structures that we trust. We believe that students who study with our children are not going to cause them harm because their schools would have vetted out undesirable people. In public places, we are not paranoid that a gunman is going to start shooting at us because we believe that the law and order systems would have produced conditions of safety.&lt;/p&gt;
&lt;p&gt;However, when we go online, the instincts which we have been trained in to decode people’s social performances suddenly become inadequate. Social cues online are difficult to decipher.&lt;/p&gt;
&lt;p&gt;We no longer have the luxury of studying people “in-person”. Instead, we have to engage with them on interfaces, where their avatars become the faces that we talk to. As the famous cartoon goes, a dog on a laptop is telling another canine friend, “On the internet, nobody knows you are a dog!” For digital natives who populate these virtual worlds with great ease, this is perhaps one of the biggest challenges. Without having the social design that helps them evolve measures of safety or the advice of older generations (there are no older digital natives!), it becomes difficult for them to figure out how to trust somebody online. This lack of design often informs the paranoia about predators, about young users being exploited by those more skilled at navigating the environments, about bullying and exclusion that often happens in the online space. The digital immigrants or settlers look to the digital native for clues about how to trust somebody online.&lt;/p&gt;
&lt;p&gt;Economic structures like banks, corporates and governments advise people on how to trust transactions online. Your bank has probably sent you information about phishing scams. Companies like Facebook also warn you to check URLs and warn you when you navigate to a page outside the Facebook universe. Governments are investing in hi-tech encryption services which can protect citizen data against fraud or misuse.&lt;/p&gt;
&lt;p&gt;Browsers like Firefox have their own parsing techniques which warn you about the possible dubiousness of a webpage. All these measures, while they help to protect us online, still do not help us in determining how and why we trust somebody online.&lt;/p&gt;
&lt;p&gt;This is a question that needs to be emphasised because the solutions do not reside in technology implementations. Just like trust is not a technology problem, the answers to the questions are also not going to be within technologies.&lt;/p&gt;
&lt;p&gt;As we begin the second decade of the 21st century, it is time to start figuring out how we shall learn to identify elements of digital identities. Reminders and signposts about not sharing sensitive information online; a trust-based design system where users are empowered with credentials by their participation in the community and trust ratings provided by their peers will become an integral part of digital identities. We need to learn how to analyse online identities by making database searches, reading through the larger narratives of the avatars by using reference sites that can validate information about the user, and remember that online conversations also carry an element of risk. This will help decode digital behaviour and ensure that we make informed choices about trust online.&lt;/p&gt;
&lt;p&gt;Read the original in Indian Express &lt;a class="external-link" href="http://www.indianexpress.com/news/is-that-a-friend-on-your-wall/735110/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/is-that-a-friend'&gt;https://cis-india.org/digital-natives/blog/is-that-a-friend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-08-04T10:36:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/skinputting-mobile-computing">
    <title>Nishant Shah Quoted in Livemint 2011 Tweet-out</title>
    <link>https://cis-india.org/news/skinputting-mobile-computing</link>
    <description>
        &lt;b&gt;Livemint, recently did a tweet-out which quoted people about what will be big in 2011. Nishant Shah was also quoted. &lt;/b&gt;
        
&lt;p&gt;#LM_2011 Nishant Shah: Skinputting – Mobile computing that uses human body as interface to net; data projected on skin to go truly mobile.&lt;/p&gt;
&lt;p&gt;Read the original tweet in Livemint &lt;a class="external-link" href="http://twitter.com/#!/livemint/status/21824111298748416"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/skinputting-mobile-computing'&gt;https://cis-india.org/news/skinputting-mobile-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T00:58:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/brave-new-medium">
    <title>CIS to Screen Subasri’s film “Brave New Medium”</title>
    <link>https://cis-india.org/events/brave-new-medium</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host a screening of a film “Brave New Medium,” at 6 p.m. on Monday, 10 January 2011. The film is directed by Subasri Krishnan. &lt;/b&gt;
        
&lt;p&gt;"Brave New Medium" documents the complicated dynamics of Internet and censorship across different parts of&amp;nbsp; South-East Asia. It looks at how human rights activists in the region use the Internet as a tool of resistance. The film also examines ways of understanding censorship beyond the lens of the banning and the banned.&lt;/p&gt;
&lt;h3&gt;Subasri Krishnan&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/krishnan.jpg/image_preview" alt="Subasri Krishnan" class="image-inline image-inline" title="Subasri Krishnan" /&gt;&lt;/p&gt;
&lt;p&gt;Subasri Krishnan has been an independent film-maker for the past 6 years.&amp;nbsp; She has directed a number of commissioned non-fiction films on issues ranging from Gender, Micro-Finance, Governance, Farmer’s Suicides to NREGA and the Right to Freedom of Expression. She has just completed&amp;nbsp; a film on Internet Censorship in both democratic and non-democratic countries in South-East Asia. Currently she is working on a research/film project on the idea of official identity documents and the notion of personhood, especially in the context of UIDAI.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In 2008, Subasri was awarded the prestigious George Washington International Documentary Filmmaker Fellowship. Subasri graduated from the Mass Communication Research Centre at Jamia Millia Islamia.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/brave-new-medium'&gt;https://cis-india.org/events/brave-new-medium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:21:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/myth-history-irreverence">
    <title>Myth/History/Irreverence: Flaneurs and Whores of Our Time</title>
    <link>https://cis-india.org/events/myth-history-irreverence</link>
    <description>
        &lt;b&gt;As part of a longer discovery and reading of Walter Benjamin's work, Atreyee Majumder constructs an argument that the turgid notions of the new, the contemporary and the important are endless repetitions of nothing-new. Atreyee will give a lecture on this on 8 January 2011 at the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;Many epochs, many histories seem to collide in a transient yet euphoric sensation of the ‘new’, immediately turning into ash-like heap of nothing-new. This understanding of the historic contemporary as a shuffle of old cards, yields new lenses through which to interpret the turgidity of the 'new' and the 'novel' in our times — technologies, crises (climate change, political upheaval, etc.), Facebook. She revisits the notion of history as scaffolding — especially, through the Benjaminian point of view of the Flaneur and the Whore, albeit the ones of our time.&lt;/p&gt;
&lt;h3&gt;Atreyee Majumder&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/atreyee.jpg/image_preview" title="Aitreyee Majumder" height="374" width="249" alt="Aitreyee Majumder" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Atreyee graduated from the National Law School of India University in 2006 and is a PhD student of Socio-cultural Anthropology at the Yale University, with keen interests in political anthropology, spatiality, historicity, the interaction of many planes of history which constitute the historical residue of the contemporary. She is doing a dissertation research on the making of political subjects on the peri-urban terrain in Howrah, West Bengal, in the shadows of socialisms, and everyday dialog with metropolitan norms of civicness from neighbouring Kolkata. She has worked as an activist and researcher in the fields of law, environment and development in Delhi.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKojAcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKoqHUA"&gt;&lt;/embed&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/myth-history-irreverence'&gt;https://cis-india.org/events/myth-history-irreverence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-04-04T07:22:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/unique-identity-crisis">
    <title>Would it be a unique identity crisis ?</title>
    <link>https://cis-india.org/news/unique-identity-crisis</link>
    <description>
        &lt;b&gt;The UID project will centralise a humongous amount of data but the fear is that it might fall into the wrong hands.&lt;/b&gt;
        
&lt;p&gt;The Unique Identification (UID) project is already up and running. It’s touted as a watershed in inclusive politics, of bringing people, who by virtue of physical remoteness, their station in society or other liabilities were excluded from the system, back into it. UID Chairman Nandan Nilekani recently said that the aadhaar number will not replace the passport, driving license or the voter identity card and that by 2014, 60 per cent of the country’s population will have the 12-digit UID number. The idea, though it has not been made explicit, is that Aadhaar will eventually become the key document for the common man to navigate the system, whether it is opening a bank account or making a rent agreement to booking a train ticket or applying for a job.&lt;/p&gt;
&lt;p&gt;In fact, there is the implicit danger that sooner than later the original idea of inclusiveness could be turned on its head by denying benefits to people who don’t have the Aadhaar! “There is nothing to ensure that you will continue to receive the same benefits like those who have the UID number. The claim that it is not mandatory is legally correct.&amp;nbsp; But in practice it would not be,” said Prof Sridhar Krishnaswamy of W B University for Juridical Sciences.&lt;/p&gt;
&lt;p&gt;It is a fundamental premise that data subjects ought to have “inalienable moral rights” about the “integrity” of the data collected about them. But even as UID is one of the best things that could have happened to deepen the democratic process in our society, the often un-remarked fact is that the project has also become the biggest industrial collector of personal information. Considering the size and heterogeneity of the Indian population, it becomes as big as Google, and the implications of this are quite frightening.&amp;nbsp; The UID draft bill, which has to be cleared by Parliament for it to become law, has only perfunctorily looked at the dangers posed by such huge and centralized collection of data. It glosses over the issue, content with making conservative noises about “the interlinking of databases”. This only shows how casual our policy makers, even the most enlightened of them, are towards the whole issue of safeguarding privacy.&lt;/p&gt;
&lt;p&gt;The Bangalore-based Centre for Internet and Society (CIS) has analyzed the draft UID bill in considerable depth. They have identified three main areas where the bill needs to be drastically reworked: (i) plugging all loopholes which would enable corporate organizations from accessing information from the Aadhar database for their own commercial or R &amp;amp; D purposes; (ii) stipulating a maximum period for the data to be stored; (iii) to be transparent about the methods it uses to collect, store and disseminate data.&lt;/p&gt;
&lt;p&gt;Prof Krishnaswamy agreed that the UID bill has not taken the corporate threat seriously enough. He contends that the UID authorities should take small, concrete steps that would act as effective safeguards. “In the mobile phone segment, user information is stored only for six months.&amp;nbsp; Now, the government is proposing a similar time cap for ISP too. But when it comes to UID there is no such time limit.&amp;nbsp; It means personal information could be held perpetually,” he explained. All that UID Assistant Director A K Pandey had to say to this was, “if that is it, then we have to live with it.”&lt;/p&gt;
&lt;p&gt;Another worrying aspect of the proposed bill, according to Usha Ramanathan, an activist and expert on identity and digital issues, is its failure to fix accountability on the main players including enrollers, outsourcing companies, and the UDAI authority itself. “The data collector and data controller should be equally held responsible for the protection of data,” she said.&amp;nbsp; However, UID authorities themselves are of the view that the apprehensions are being overplayed. Pandey maintained that there was nothing in the UID that would compromise the privacy of individuals.&amp;nbsp; “You go to a bank or the LIC office and you give whatever information they ask you. But when it comes to UID alone you say the information you give could be dangerous.&amp;nbsp; We don’t quite understand this,” he retorted. He played down the fears that in the central data storage vital information could go corrupt. “We have taken adequate measures to protect it. We will have a backup,” he said.&lt;/p&gt;
&lt;p&gt;The issue of transparency of data collection and storage remains. The CIS analysts feel that the UID should put out a synopsis of the algorithms it will use in collating and protecting data so that the public at large can be reassured of the firewalls that are in place. Then there is also the issue of not having concrete provisions in the UID bill to deal with special cases like whistleblowers and victims of abuse whose identities need to be protected even more carefully.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The UID authority also bypasses the question of whether it is confusing data protection with the larger issue of protection of privacy. A person’s identity is more than her date of birth, surname, religion, fingerprint or even the sum of these. Such information is basically data and allows governments or corporate bodies to provide a person a nominal identity, one that is indispensable if she is to be part of a socio-political system. The state and corporate entities conveniently deny a person her self, thereby reducing her to a subject instead of seeing each individual as a thinking, acting agency.&lt;/p&gt;
&lt;p&gt;Be that as it may, right now the concern of civil society is to make at least protection of data as foolproof as possible. Aadhaar is just one of the projects that pose a threat to the privacy of individual citizens. There is the broader problem of how the Internet and mobile phones, the popularity of social networking sites such as Facebook and Twitter, and the widespread use of credit and debit cards has led to blatant misuse of personal information gathered online, sharing of consumer data without consent and the state’s own Big Brother surveillance. The need for an effective privacy law in India is imperative.&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=81&amp;amp;contentid=20110102201101020220400536210faa"&gt;Bangalore Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/unique-identity-crisis'&gt;https://cis-india.org/news/unique-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:10:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/civic-hackers-in-India">
    <title>Civic hackers seek to find their feet in India</title>
    <link>https://cis-india.org/news/civic-hackers-in-India</link>
    <description>
        &lt;b&gt;In 2006, when Sushant Sinha,who holds a doctorate in Internet security from the University of Michigan, tried to use the Indian government’s judicial rulings website, Judis.nic.in, he found it difficult to get the data he was looking for. “Judis.nic.in didn’t have a good text search or ability to sort results by  relevance,” Sinha said. The lack of these two critical functions rendered the wealth of data on the site largely unusable.&lt;/b&gt;
        
&lt;p&gt;Sinha, who currently works at &lt;strong&gt;Yahoo India&lt;/strong&gt;, set about creating 
the legal search engine Indiankanoon. org, which now has a database of 
more than 1.4 million judgements. It tries to overcome the deficiencies 
of the government’s effort, indexing judgements by the Supreme Court, 
the high courts and various tribunals, and linking them to the 
underlying Acts.&lt;/p&gt;
&lt;p&gt;In November, the portal saw around one million unique visits. Sinha 
is a “civic hacker”, a programmer driven by the urge to create 
applications that will allow fellow citizens to help themselves and 
further the democratic process by using information, often from freely 
available government databases. (A “cracker”, on the other hand, uses 
similar tools to break into secure systems with malicious intent.)&lt;/p&gt;
&lt;p&gt;Nishant Shah, director, research, at the Centre for Internet and 
Society (CIS), Bangalore, offers a wider definition for civic hackers.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“In a Web 2.0 world, you needn’t have programming skills to be a 
civic hacker. When people have access to digital technologies, they are 
potentially civic hackers, because they have learned how to negotiate 
with oppression and injustice. In the West, the ubiquitousness of 
digital technologies has enabled a lot of people to engage with civic 
hacking—from subversive documentaries by the Yes Men group to parodic 
YouTube videos that critique state-market policies— all these qualify as
 civic hacking.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;WikiLeaks, said Shah, is the biggest example of such a civic hacker
 in recent times. “Civic hackers are always in grey territory,” he said.
 “Their legality is always being questioned, depending on how far they 
go. Remember, WikiLeaks was around for five years before they began 
talking about banning it.”&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Much of the online Indian information in the open domain, from the 
government or autonomous bodies such as the Election Commission (EC), 
isn’t always served up such that it can be sliced and diced in ways that
 citizens can digest, making the civic hacker a critical part of the 
democratic process in the digital age.&lt;/p&gt;
&lt;p&gt; A larger presence in the West, they are thin on the ground in the 
country. “Civic hackers, while present (in India), are not numerous, and
 it’s unclear to what extent they are conscious of the work that others 
are doing, although this could be easily remedied through networking 
efforts both online and offline,” according to a report by CIS.&lt;/p&gt;
&lt;div class="pullquote"&gt;One of the reasons for their sparse numbers CIS 
suggests is that the Indian government doesn’t engage yet with the 
hacking community,&lt;/div&gt;
&lt;p&gt;unlike countries such as the US. New York, Washington DC and San 
Francisco, for instance, have portals that share data with the intention
 of encouraging application development.&lt;/p&gt;
&lt;p&gt;The NYC BigApps competition has a cash prize of $20,000 (nearly `9 
lakh) for the best application using the City of New York’s NYC.gov data
 mine. Around 350 data sets including public safety data, buildings 
complaints, and real-time traffic numbers are thrown open to 
participants. In 2009, an application to let New Yorkers findmass 
transit routes, public school information, etc., based on their location
 won the prize.&lt;/p&gt;
&lt;p&gt;Despite the lack of incentives, some hackers are still mushrooming in
 the Indian space. In 2009, just ahead of the April-May general 
election, 25-year-old Akshay Surve, the founder of a think tank for 
social change called SocialSync.org Labs, was building a Web application
 to profile members of Parliament.&lt;/p&gt;
&lt;p&gt;The application was aimed at generating a snapshot of each legislator
 based on the debates they participated in, the number of Parliament 
sessions attended, and other such information that could help voters 
make an informed choice.&lt;/p&gt;
&lt;p&gt;The websites of the EC and the Lok Sabha had much of this data in 
Excel and Adobe PDF documents, but that didn’t necessarily make it 
usable. The formats changed every year, and some files didn’t allow text
 and numbers to be extracted. To build the mashup—an application that 
throws together data from more than one source, mashing everything up to
 create a new service—Surve had to parse and standardize the data.&lt;/p&gt;
&lt;p&gt;Realizing that the problem he faced was not an isolated one, Surve 
and his friend, Pavan Mishra, launched OpenCivic.in this year, a set of 
standards and APIs (application programming interface) that sift data 
from government websites and make them available in a machine-readable, 
remixable format.&lt;/p&gt;
&lt;p&gt;Surve’s API is the primary engine for Askneta.com and Gov-Check.net, 
which track the performance of elected representatives and use 
OpenCivic’s feed. He plans to keep the API free for non-commercial use. 
Now his team is at work to develop a mobile version of the API. Another 
example is RTINation. com, built in August 2009 by a group of graduates 
from the Kanpur and Delhi Indian Institutes of Technology.&lt;/p&gt;
&lt;p&gt;RTINation.com enables the online filing of Right to Information (RTI)
 applications. A 2009 PricewaterhouseCoopers report estimated that more 
than a quarter of those who file RTI applications have to visit a 
government office over three times to do so. RTINation.com generates its
 revenue by charging each user `125 for an application. It is now 
building a backoffice to handle marketing and promotion.&lt;/p&gt;
&lt;p&gt;“Since we launched, we have seen 200,000 unique visitors,” said Rahul
 Gupta, a cofounder of RTINation.com. Most civic hackers in India 
entered the field through work related to various e-governance 
initiatives and the RTI Act, which has put more government data in the 
public domain than ever before. This data, though, is dumped in a format
 that makes it difficult for citizens to use or understand. “Few of the 
publicly accessible databases are open in terms of data reusability (in 
terms of machine-readability and openness of formats), data reusability 
(legally), easily accessible (via search engines, for persons with 
disabilities, etc.), understandable (marked up with annotations&amp;nbsp; and&amp;nbsp; 
etadata),” according to CIS. Here is where civic hackers such as Sinha 
and Surve come in.&lt;/p&gt;
&lt;p&gt;CIS suggests that networking across civic hacking teams could 
strengthen this effort. OpenCivic.in has been proactive in its tie-ups. 
In February, it joined hands with Yes To Politics, a civic participation
 endeavour by Texas-based software engineer Murali M. Launched in 2009, 
Yes To Politics offers tools to help communities work on causes. Among 
these are analytics of previous elections and a tracker of ongoing 
campaigns. During its peak usage in the four weeks leading up to the 
2009 assembly elections in Andhra Pradesh, the website had on an average
 43,000 visitors a day, with a oneday surge of 97,457 visitors on 9 
April that year. Yes To Politics, inactive since last year’s polls, is 
going to launch a new version in January. “Once we do that, we 
contribute our own data feeds to OpenCivic,” said Murali.&lt;/p&gt;
&lt;p&gt;Talking about the challenges, Murali said, “The data sets from the Election Commission’s site were raw and not directly presentable to users. So we had to iteratively transform it and correct (it) on the way and make meaningful sets. It took me almost 
three-and-a-half weeks to get it ready. And when the EC releases any new
 data, they always release in PDF files that are hard to retrieve and 
mashup. So I wrote special apps (applications) to scan files, transform 
data, and automatically correct spelling mistakes in names.” The 
36-year-old software engineer works full-time for Alcatel-Lucent and 
develops the applications when he’s free. Yes To Politics has been 
steadily adding bells and whistles to its portal. Recently, it 
integrated Google Maps into an application called Vote2009, layering it 
with information such as when a constituency is scheduled to have 
elections. “Another example is, due to delimitation, about 77 assembly 
and eight parliamentary constituencies in AP (Andhra Pradesh) have been 
reorganized. We set up a section where users can look at what has 
changed and find their constituency based on mandal and district 
information,” Murali said.&lt;/p&gt;
&lt;p&gt;Read the original article in Livemint &lt;a class="external-link" href="http://epaper.livemint.com/Default.aspx?BMode=100#"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read it in IndiaInfoline &lt;a class="external-link" href="http://www.indiainfoline.com/Markets/News/Civic-hackers-seek-to-find-their-feet-in-India/5037582858"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/civic-hackers-in-India'&gt;https://cis-india.org/news/civic-hackers-in-India&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-04T06:45:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nel-suk">
    <title>Nel suk dei nativi digitali. Perché gli studenti 2.0 hanno bisogno di una bussola per orientarsi</title>
    <link>https://cis-india.org/news/nel-suk</link>
    <description>
        &lt;b&gt;Addio al vecchio sapere lineare fondato sulla parola scritta e sulla trasmissione di conoscenza maestro-alunno: imparare oggi ha la forma di un suk arabo nell'ora di punta. Tra social network, video-racconti su YouTube, la musica di MySpace, il linguaggio sincopato delle chat e le bufale online, gli studenti di nuova generazione hanno bisogno di una bussola per orientarsi. Ma la scuola non c'è. O meglio, non ce la fa: a studenti 2.0 corrispondono spesso istituti scolastici da secolo scorso.&lt;/b&gt;
        
&lt;p&gt;Chi sono questi famigerati "nativi digitali" nati e cresciuti a rivoluzione Internet compiuta? Come ha scritto l'ex direttore del programma Comparative media studies dell' Mit di Boston, Henry Jenkins, la loro cultura è "partecipativa" e si fonda su "produzione e condivisione di creazioni digitali" e una "partnership informale" tra insegnanti e alunni che porta il bambino a sentirsi responsabile del progetto educativo. Il maestro non è più un trasmettitore di conoscenza ma un "facilitatore", che fa da filtro tra il caos della rete e il cervello del piccolo studente.&lt;/p&gt;
&lt;p&gt;"Frequentano gli schermi interattivi fin dalla nascita", spiega Paolo Ferri docente di tecnologie didattiche e teoria e tecnica dei nuovi media all'Università Bicocca di Milano, "e considerano Internet "il principale strumento di reperimento, condivisione e gestione dell'informazione". È la prima generazione (che oggi ha tra gli o e i 12 anni) veramente hi-tech che pensa, apprende e conosce in maniera differente dai suoi fratelli maggiori.&amp;nbsp; "Se per noi imparare significava leggere-studiare-ripetere, per i bambini cresciuti con i videogames vuol dire innanzitutto risolvere i problemi in maniera attiva", spiega Ferri che studia e promuove da anni il "digital learning".&lt;/p&gt;
&lt;p&gt;I bambini cresciuti con consolle e cellulare sono "abituati a vedere la risoluzione di compiti cognitivi come un problema pragmatico", aggiunge. Lynn Clark direttrice dell' Estlow International Center for Journalism and New Media dell'Università di Denver ha condotto un progetto di ricerca su 300 famiglie americane per capire come se la cavano con i media digitali.&lt;/p&gt;
&lt;p&gt;"Grazie ai videogiochi, il sapere dei bambini si nutre di simboli, sfide e modelli sempre diversi di narrazione", spiega Clark che aggiunge: "quando le modalità di apprendimento scolastico sono simili a quelle di un gioco ci sono maggiori chances che gli alunni apprendano volentieri e in fretta". "Se qualcosa può essere visto, ascoltato, suonato, perché dovrebbe essere raccontato a parole?", si chiede Paolo Ferri.&lt;/p&gt;
&lt;p&gt;Nishant Shah, che a 26 anni dirige il Center for Internet and Society di Bangalore in India, lo spiega così via Skype: "La tecnologia dei nostri padri è quella televisiva: un modello analogico che stabilisce ruoli, responsabilità e struttura della produzione, diffusione e consumo di conoscenza. Con l'esplosione del p2p - l'idea di una rete dove non esiste gerarchia e tutto viene condiviso- i ruoli sono messi in discussione dallo studente, che si considera parte attiva nella produzione di sapere e vede i libri come una fonte tra le tante".&lt;/p&gt;
&lt;p&gt;Se è vero che il "l'ha detto Internet" ha assunto tra i bambini l'autorevolezza di una sentenza della Cassazione, è innegabile che la rete sia la patria del vero-simile. "Internet sta ridisegnando i confini della verità - continua Shah - e questo pone grandi sfide per gli educatori del XXI secolo: come si fa a imparare utilizzando fonti che non hanno approvazione istituzionale? Come si può riconoscere un valido provider di conoscenza nel caos online?".&lt;/p&gt;
&lt;p&gt;Anche il professore della Bicocca ammette che "la cut-and-paste culture e la presunzione di veridicità della Rete" tendono ad abbassare la percezione critica degli utenti: "Internet diventa per i bambini "la fonte" a prescindere dall'autorevolezza del sito e da chi scrive", dice.&lt;/p&gt;
&lt;p&gt;Se passa il modello Wikipedia, crolla l'importanza dell'autore. O, come ha scritto l'antropologa Susan D. Blum sul New York Times, "se per lo studente non è fondamentale essere unico, va bene usare parole di altri. Dice cose a cui non crede? Allora è ok scrivere testi su argomenti sconosciuti con l'unico scopo di prendere un buon voto: conoscere è diventato un mezzo per ottenere consensi e socialità".&lt;/p&gt;
&lt;p&gt;Per il momento le iniziative più interessanti di digital learning riguardano i fratelli più grandi. Dal prossimo anno in 2500 campus universitari americani arriverà un software per pc, iPad e telefonini (il costo va dai 30 ai 70 dollari e il maggiore produttore è la Turning Technologies) chiamato "clickers", che permette all'insegnante di verificare il livello di attenzione dello studente - immerso nella navigazione internet - chiedendo feedback sulla tastiera ogni 15 minuti. Il professore di Harvard Charles Nesson ha tenuto un corso virtuale su Second Life, mentre il progetto di educazione civica "YouMedia", sponsorizzato dall'amministrazione di Chicago, promuove l'apprendimento attraverso video-racconti pubblici di libri.&lt;/p&gt;
&lt;p&gt;Nella Woodside High School, in California, gli studenti hanno borse di studio per comprare l'iPad, un centro multimediale da tre milioni di dollari e lezioni su come registrare la musica e usare Internet in maniera responsabile. Grazie ai computer economici del guru informatico Nicholas Negroponte, tutti i bambini uruguaiani delle elementari hanno un pc.&lt;/p&gt;
&lt;p&gt;In Europa - che ha messo la competenza digitale al quarto posto (dopo prima lingua, lingua straniera e matematica e scienze) tra le competenze chiave per l'educazione degli stati membri dell'Unione - il paese più "nativi digitali oriented" è l'Inghilterra, dove la riforma del sistema scolastico voluta dal governo Blair ha ridotto drasticamente il numero degli studenti per classi, favorendo così la personalizzazione dell'insegnamento, e tagliato il numero delle materie. "Sono passati- sottolinea Paolo Ferri - da un modello disciplinare basato sui contenuti a quello per competenze che si regge su un principio: imparare ad imparare". Ferri ricorda che la lavagna interattiva è presente nel 100% delle classi primarie e secondarie inglesi mentre in Italia si punta ad averne una su dieci entro il 2011. Qui la strada è ancora tutta in salita.&lt;/p&gt;
&lt;p&gt;Il ministero dell'Istruzione porta avanti il progetto LIM, che riguarda l'introduzione di lavagne interattive nelle aule, e quello Cl@ssi 2.0 che punta a finanziare con 30mila euro 156 classi (in Italia ci sono circa 25mila scuole) delle scuole medie inferiori per lo sviluppo di progetti innovativi. "C'è una grande carenza di investimenti dall'alto - denuncia Ferri - arginata da qualche dirigente di buona volontà". Per il professore della Bicocca è a livello territoriale, grazie all'autonomia scolastica e alle capacità manageriali e creative di qualche preside, che si vedono i migliori esperimenti.&lt;/p&gt;
&lt;p&gt;A Bollate, un comune di 37 mila abitanti alle porte di Milano, per imparare a usare l'iPad basta chiedere aiuto a un bambino. Nelle aule dell'Istituto di via Brianza - due scuole elementari e due medie inferiori - al posto di quadernetti e matite, da settembre gli alunni usano il tablet computer prodotto dalla Apple.&lt;/p&gt;
&lt;p&gt;Qualche centinaia di chilometri più a Sud, a Reggio Emilia - la città dove tutti vorrebbero avere 3 anni per quel "Reggio Approach", lodato dal New York Times (parole d'ordine: arte, assemblee di classe e respiro globale), che ha fatto guadagnare al capoluogo emiliano il titolo di capitale mondiale degli asili nido - software, dispositivi elettronici e lavagne interattive hanno ormai sostituito seggioloni e orsacchiotti.&lt;/p&gt;
&lt;p&gt;Bollate e Reggio non sono residui di una bizzarra avanguardia pedagogica, il cui simbolo cinematografico è ancora "Bianca" di Nanni Moretti, con le vicende della scuola "Marylin Monroe" dove al posto della foto del presidente della Repubblica c'e' Dino Zoff e i professori giocano alle slot machines e al flipper. Dimostrano piuttosto che ci sono, anche in Italia, presidi e maestri che hanno capito chi sono e come si educano i nativi digitali.&lt;/p&gt;
&lt;p&gt;"Ma il risultato è quella di una cartina dell'innovazione a macchia di leopardo", dichiara Ferri, che tuttavia si dice ottimista. Da un lato perché "nel 2013 andrà in pensione la metà degli insegnanti italiani", dall'altro perché crede nel contagio positivo: "In 10 anni le scuole al passo con le trasformazioni sociali e tecnologiche, e per questo premiate con finanziamenti e alto numero di iscrizioni, avranno costretto le altre ad adeguarsi". Una speranza? No, un dovere. Perché "innovare innovare innovare", il famoso mantra di Hal Varian di Google News, è l'unica chance di sopravvivenza anche per la scuola italiana.&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://www.ilsole24ore.com/art/cultura/2011-01-01/nativi-digitali-151924.shtml?uuid=AYcB4RwC"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nel-suk'&gt;https://cis-india.org/news/nel-suk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:31:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tweet-and-poke">
    <title>A Tweet and a poke from the CEO</title>
    <link>https://cis-india.org/news/tweet-and-poke</link>
    <description>
        &lt;b&gt;The official grapevine has moved online, and Twitter is the new water-cooler.&lt;/b&gt;
        
&lt;p&gt;The office grapevine has moved online, and Twitter is the new water cooler.&amp;nbsp; Social media may be all the rage, and every company may want in, but for the majority of Indian companies grappling with the phenomenon, it is proving too tempestuous a beast to control.&lt;/p&gt;
&lt;p&gt;From India alone, for instance, 18 million unique visitors logged on to Facebook in May, each of them posting multiple status messages that often dealt with their places of work. Ban these practices all you like, experts say, but employees will still find ways to log on to social media. Better, then, to ride the wave rather than risk going down with it.&lt;/p&gt;
&lt;p&gt;Some Indian companies have already begun to learn this the hard way. When Infosys Technologies Ltd announced its IRace (Infosys Role and Career Enchancement) programme in April, changing the company’s hierarchy drastically, disgruntled employees lashed out at their company on blogs and Facebook.&lt;/p&gt;
&lt;p&gt;“The company couldn’t do much then, because they didn’t have a social media policy in place,” says Mahesh Murthy, CEO of Pinstorm Consulting and a social media expert. Murthy mentions another large financial services firm that fired employees for commenting on Orkut about internal incentive programmes.&lt;/p&gt;
&lt;p&gt;The time has arrived, then, for companies to institute social media policies—to define, in a sense, what sort of tweet is appropriate and what will earn a black mark. But Indian firms trying to do just this are emerging with very mixed results.&lt;/p&gt;
&lt;p&gt;There are, on the one hand, the fast adopters. Technology and media companies that were the first to run head-on into social media were also, not surprisingly, the first to put basic guidelines in place.&lt;/p&gt;
&lt;p&gt;Wipro Ltd and HCL Technologies Ltd not only have social media policies, they also promote communication and events for their employees on these media. A couple of months ago, the Spirit of Wipro run was promoted in real-time on Twitter and on its official Facebook page. “Wipro became one of the first companies to hold a Twitter conference, for our joint CEO to discuss our diversity initiatives,” says Rajan Kohli, Wipro’s chief marketing officer.&lt;/p&gt;
&lt;p&gt;Also Read The Future of the Internet (&lt;a class="external-link" href="http://www.livemint.com/articles/keywords.aspx?kw=India%20Internet"&gt;Complete Series&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;HCL has named digital ambassadors who use their social networks and online personas to share ideas and help the company reach out. In HCL’s annual exercise to articulate the company’s vision, employees communicate with the CEO through Facebook. Infosys has formulated its own social media policy now, and is preparing to roll it out over the next six months.&lt;/p&gt;
&lt;p&gt;The other early adopter has been the media sector. As traditional media houses have started to build digital presences, conglomerates such as HT Media Ltd and Bennet, Coleman and Co. Ltd specify what a journalist’s digital avatar can and cannot say online. (Mint has an extensive social media policy for its employees.) Print journalists typically cannot reveal their employer on their Facebook or Twitter pages, or post original opinions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;But here’s the catch with such a strategy: The Internet is a hard place to be anonymous. “If you are a well-known writer, even if you don’t identify yourself, people can easily put two and two together,” says Nishant Shah, of the Centre for Internet and Society (CIS). “Policies like that are hard to implement and don’t really make sense.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To be sure, there are exceptions; Open, the weekly magazine, looks at Facebook and Twitter as channels to direct traffic to its online content. “We have no policy of employees not identifying themselves on social media or associating themselves with the magazine,” says Rajesh Jha, a deputy editor at &lt;em&gt;Open&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Another surprisingly prompt responder to social media trends has been the education sector. While most institutions don’t have restrictive policies for public platforms such as Facebook, Twitter and blogs, some have gone in a different direction and created closed networks. Shah argues that a closed network has the same features—and issues—as open social media.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“These are again peer-to-peer platforms, where teachers and students interact with each other, and any communication has a large audience and gets recorded for posterity,” he says. “This makes it as much of a social medium as Facebook or Twitter.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Bangalore’s Christ University has created an institutional repository for every single submission made by students and faculty. Test grades and lesson plans are posted online, and students and teachers communicate through the system. The Indian Institute of Management, Bangalore, has completely digitized its classrooms, so that write-ups on every lesson are available online. Students and teachers co-develop curricula through its platform as well.&lt;/p&gt;
&lt;p&gt;One sector that has been slow to respond to these trends is the outsourcing sector. With annual attrition rates of 50-60%, these firms focus more on turnaround than on investment. Social media websites are typically banned altogether in call centres.&lt;/p&gt;
&lt;p&gt;As social media evolves, ways to leverage it do as well. Large telecom firms such as Bharti Airtel Ltd, Tata Teleservices Ltd and Alcatel-Lucent use Facebook for research and development. Supriya Dhanda, Alcatel-Lucent’s head of human resources, says that her firm encourages “senior leaders...to keep blogs active and use them to promote key messages on strategy, people and operating mechanisms”.&lt;/p&gt;
&lt;p&gt;In the US, a couple of smaller firms have been able to harness social media in innovative ways. Best Buy, an electronics retail chain, aggregates employee activity online, whether on blogs or Twitter, onto a platform called Best Buy Connect. Zappos, which sells shoes and bags online, has a similar Twitter aggregation tool that pulls any tweet mentioning the company. Employees are encouraged to post on the firm’s Facebook and YouTube pages, and its CEO, Tony Hsieh, has at least a million followers on Twitter.&lt;/p&gt;
&lt;p&gt;But Murthy doesn’t necessarily think that Indian firms need to follow in the wake of US firms such as Intel, IBM and CNN, which have clearly defined social media policies. “First, the US is a litigious country and most social media policies there are circumscribed by what corporate lawyers allow employees to say and not say,” he says. “Two, Indian firms can actively use social media as a global marketing tool, especially because it involves no media costs. In the US, firms still look at it largely as a...customer-service function.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Shah adds that India doesn’t have a clearly installed legal privacy framework, unlike the US or Australia. “What is public space and what is private is still largely a subject of interpretation,” Shah says. “So we will evolve our own path.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in Livemint &lt;a class="external-link" href="http://www.livemint.com/2010/12/30212513/A-Tweet-and-a-poke-from-the-CE.html?h=B"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tweet-and-poke'&gt;https://cis-india.org/news/tweet-and-poke&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:30:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
