<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 111 to 125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/dml-central-blog-oct-22-2012-nishant-shah-habits-living-being-human-networked-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/www-indianexpress-com-one-zero"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/internet-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/young-people-technology-new-literacies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/revisiting-techno-euphoria"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/across-borders"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change Is It Anyway? | DML2013 </title>
    <link>https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;As a preparation for the DML conference, Nishant Shah had an interview with Howard Rheingold, a cyberculture pioneer, social media innovator, and author of "Smart Mobs. Nishant Shah is chair of 'Whose Change Is It Anyway? Futures, Youth, Technology And Citizen Action In The Global South (And The Rest Of The World)' track at DML2013. Here, he talks about shifts in citizen engagement in Indian politics and civics, and the underlying significance of these changes.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;"More and more, you have young people who are trying to come together, not merely to express discontent, but actually take action so that they can build the kinds of futures they want to occupy."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The 2013 DML conference will be held in March 14-16, 2013 in Chicago, Illinois. The conference is supported by the MacArthur Foundation and organized by the Digital Media and Learning Research Hub located at the University of California's systemwide Humanities Research Institute at UC Irvine.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More details about the DML2013 Conference and the Call For Workshop/Panel/Paper Proposals can be found at the conference website: &lt;a class="external-link" href="http://dml2013.dmlhub.net"&gt;dml2013.dmlhub.net&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;"&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/Q1ueRSm1TTw" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:47:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement">
    <title>The Rules of Engagement</title>
    <link>https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement</link>
    <description>
        &lt;b&gt;Why the have-nots of the digital world can sometimes be mistaken as trolls. I am not sure if you have noticed, but lately, the people populating our social networks have started to be more diverse than before.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/the-rules-of-engagement/1022938/0"&gt;published in the Indian Express&lt;/a&gt; on October 29, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Oh, sure, we are still talking about a fairly middle-class hang-out that happens largely in English and is restricted to people in urban environments who have the economic and cultural capital of access. But if you browse through your friends’ lists and compare it with, say, the network from five years ago, you will realise that the age demography has changed quite dramatically. I am not suggesting that the Web was only the realm of the young – let us face it, the people who actually created the infrastructure of the Web were not tiny tots. However, with Web 2.0 at the turn of the millennium, we have had an extraordinary focus on young people online.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;But as the networks grow to include more people, there are now a lot of people online, who might not be the 16-year-old BlackBerry-wielding digital native, nor be in the “business of internet” but are finding a space for themselves, tentatively and steadily negotiating with this new space. Some of it might be because, those of us who were new kids on the block in the Nineties, are now older by a decade and are still on the block, but replaced by newer kids around the block. Some of it might be because there is an ease of access as portable computing devices grow more personal and get more people to use their smartphones as a gateway into the online worlds. But a lot of it is actually because the fold of the Web is expanding. The digital spaces of conversation are being integrated into our everyday lives and practices, replacing older forms of media and information structures and processes of social and cultural belonging.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And so, even though the penetration of the interwebz is not as rapid in countries like India as one would have hoped for, we do see a wide age group of people coming online, forming networks, and entering into conversations. I hadn’t really realised this, even though I was adding them to my social networks, that the digital immigrants are now here, and they are here to stay. It suddenly surfaced in my thoughts, because I recently heard a few narratives which made me dwell on the effort and the learning that one takes for granted but is a prerequisite for belonging to these new social spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the first complaints I heard was about a hostility that many digital immigrants face when they start engaging with the social media. They follow the manuals. They read the FAQs. They look at patterns, and learn. And yet, even when they seem to be doing what seems to be exactly what everybody else is doing, they are often told that they got it all wrong. This is bewildering for many, because they cannot really see the difference. And the reason is that the social web is governed by a whole lot of unwritten rules and codes, which clearly are the rites of passage into the online world. These are not things that can be taught. These are not written in a guideline that tells you how to behave on Facebook or how to sift through the live-streams on Twitter. It is a fiercely guarded set of dos and don’ts which clearly distinguish between the digital natives and the digital immigrants, reinforcing exclusivity and exclusion. And when the digital immigrant violates these rules, they are often faced with a sneer, a sarcastic comment, or a dismissal as “not with it”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second thing I have repeatedly noticed is “calling troll” to people who do not always know these rules. Trolling is not new to the world of the internet. People who disrupt conversations and discussions by posting provocative or tangential information, by voicing hateful opinions, by passing harsh judgments, or sometimes by willfully breaking the rules of the communities, in order to seek attention and interrupt the flow of conversations are called trolls. Trolls are universally frowned upon and trolling wars often take up epic proportions because people get emotionally invested in them. Trolls are often shamed publicly, their mistakes brought into an embarrassing spot-light and ridiculed in back-channels or even in public discussions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Calling somebody a troll presumes that the user is conversant with the rules of the game and is then breaking them, working with the idea that if you are online, you are naturally a digital native. The digital immigrants often create noob mistakes that can appear troll-like but are not intended to be so, and are often on the receiving end of a community’s hostility. And it is time, now that our online networks are growing, for us to realise that our presumptions about who is online need to change. If we are looking at an inclusive Web, we need to stop imagining that the person on the other side of the interface is necessarily like us, and develop new networks of nurture, which allows the digital immigrants safe spaces to experiment, make mistakes, and learn like the best of us. The next time, before you call somebody a troll, see if it might just be somebody learning the tricks of the trade. If they are doing something wrong, just politely point it out to them. And remember, acceptance is not only for people who are like us, but about people who are markedly unlike us.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement'&gt;https://cis-india.org/digital-natives/blog/india-express-news-nishant-shah-oct-29-2012-the-rules-of-engagement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:48:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/dml-central-blog-oct-22-2012-nishant-shah-habits-living-being-human-networked-society">
    <title>Habits of Living: Being Human in a Networked Society</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/dml-central-blog-oct-22-2012-nishant-shah-habits-living-being-human-networked-society</link>
    <description>
        &lt;b&gt;Recently, in Bangalore, a cluster of academics, researchers, artists, and practitioners, were supported by Brown University, to assemble in a Thinkathon (a thinking marathon, if you will) and explore how our new habits of everyday life need to be re-thought and refigured to produce new accounts of what it means to be human, to be friends, and to be connected in our networked societies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's column was published in &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/habits-living-being-human-networked-society"&gt;DML Central&lt;/a&gt; on October 22, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There is no denying the fact that life on the interwebz is structured around various negotiations with information. Even as we go blue in the face, in the face of information overload, we have a sacred trust in the idea that information is the new currency of society. In our networked worlds, it is our role and function to transmit information to the nodes we are connected to. On a daily basis, we commit ourselves to the task of producing content, consuming information, relaying and sharing resources, saving and archiving material. We add, through our transactions and interactions, new data sets of information to the already burgeoning world of the web. These information practices, for those of us who are immersed in the info-networks, have become so naturalised, that we have become oblivious to the effort, care, time and resources that go into a sustained engagement with them. They have become a part of our everyday lives, creating structures of comfort and desire, so that the reward and gratification we experience masks the physical and affective energy we invest in sustaining these networks. The discussions at our Thinkathon, spread over four intense days, brought out some really interesting insights I want to map, in a series of posts, providing new ways of thinking about life as created through habits within a network.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Habits of Being Human&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the most effective human turns the digital networks have produced is about connections. Beyond the interfaces, the platforms, the networks and the infrastructure of access, on the other end is a human being who emerges as a friend, mediated by the huge complex of hardware and software that facilitates this relationship. We have learned how to make these mediations invisible, talking about real-time, and instant messaging, and live-chats, concentrating only on the human actors that engage with us in this networked state of being. This making invisible of the network is not a natural thing. Even for digital natives who are supposed to be immersed in these environments like ‘fish taking to water’, there is a recognition that the network demands time, attention, financial and emotional investment in order to sustain the social relations web we create within these worlds. &lt;a href="http://www.brown.edu/Departments/MCM/people/facultypage.php?id=10109"&gt;Wendy Chun&lt;/a&gt; from Brown University suggested we have converted these networks into habits – unthinking, visceral, prewired responses that gloss over the toll they take over us. Which is why, for instance, we habitually connect to our networks, and the human beings within that, and yet face information fatigue and network tiredness that takes us by surprise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://reneeridgway.net/"&gt;Renee Ridgeway&lt;/a&gt; (NEWS, Amsterdam) introduced us to the idea that networked habits stand-in for the transactions we make, ignoring the fact that they are largely a commodification of social relationships, making the labour of care invisible in the quantification through systems of Like, Share, Retweet, Follow, Ping, etc. It becomes important to unpack this idea of ‘labour of care’ because we generally think of care as an essentially human condition. Which is why, we connect, share information, help, offer sympathetic shoulders to cry on, for people who are separated from us through geographies and lifestyles. Care is the way in which we separate ourselves from the technological bots and algorithms which can often outstrip us in performing networked habits but cannot emotionally invest in the relations as we human beings can.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.bgsu.edu/departments/wmst/page86402.html"&gt;Radhika Gajjalla&lt;/a&gt; (Bowling Green State University) furthered this notion of care to look at crowdfunding platforms like &lt;a href="http://www.kiva.org/"&gt;Kiva&lt;/a&gt; and &lt;a href="http://www.kickstarter.com/"&gt;Kickstarter&lt;/a&gt;, which essentially bank on the lay-user’s idea of care, and helps them invest a small sum to better the living conditions of somebody in need. She showed us however, that care is not a ‘natural’ response. The interfaces, the representations of the people, the narrative structures of the stories told within these kind of microfinance websites, are all geared towards shaping a particular kind of first world guilt on the user, inviting them to quantify their ‘care’ towards those in the poorer worlds, in need of financial support. The ways in which networks shape our habits, make them natural and encourage us to believe in them as the preconditions of being digitally human, need to be given more attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These so-called habits have direct implications on how young people learn and engage with conditions of knowledge production. That which we think of as a natural response within the networked worlds is often a habit that disguises the complex mechanics of control, containment, societal pressures and expectations, and systems of reward and punishment which all get flattened as we rethink what it means to be human in the digital worlds. Looking at the infrastructure, the interface, the processes of training, the threshold of critical competence and the incessant personal investment that is actually labour but is disguised as a habit within the networks of learning, makes us more conscious of the fact that the young users are not ‘born digital’ and nor are they going to become experts left to their own devices. It brings back to the surface the question of the role of technology in education, and the form and function of new knowledge actors in our systems of learning.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;Banner image credit: timparkinson &lt;a href="http://www.flickr.com/photos/timparkinson/3788726140/"&gt;http://www.flickr.com/photos/timparkinson/3788726140/&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/dml-central-blog-oct-22-2012-nishant-shah-habits-living-being-human-networked-society'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/dml-central-blog-oct-22-2012-nishant-shah-habits-living-being-human-networked-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2012-10-23T10:26:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like">
    <title>Digital Habits: How and Why We Tweet, Share and Like</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like</link>
    <description>
        &lt;b&gt;There aren’t always rational explanations for the ways in which we behave on networks. While there are trend spotting sciences and pattern recognition methods which try to make sense of how and why we behave in these strange ways on networks, they generally fail to actually help us understand why we do the things that we do when we are connected.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.firstpost.com/tech/digital-habits-how-and-why-we-tweet-share-and-like-488701.html"&gt;originally published in FirstPost&lt;/a&gt; on October 12, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Recently, in a workshop on ‘Habits of Living’, organised by Brown University (USA) and the Centre for Internet and Society (Bangalore), a collection of researchers, artists, practitioners and educators came together to understand how networks form these habits that we take for granted in our digital lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Habits are unthinking, visceral actions that we do for survival within a network. They are things that we do without even realising that we are doing them – Liking a post, retweeting a tweet, sharing an interesting link, adding pictures on an album. These are all things we do without realising that they distract us from our work, need time, energy, and attention which we could have spent on other tasks. Instead of looking at these as actions which can be rationally explained, we might start looking at them as habits that shape the ways in which we trust, transmit and treasure information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Networks are everywhere these days. They are the things that we study and the lens through which we study the world around us. In the last week, I have faced three separate instances that reminded me of how we live in networked societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was the scare that the private messages on facebook have suddenly turned public and available on our timelines for everybody to view. The social network, these simulated fortresses of friendships and trust, suddenly became a place of danger. Conversations which were committed as acts of secrecy emerged as potentially compromising public acts. The network was in my face, blinking red, making me suddenly aware of the fact that the network is not merely something I can take for granted. It is something that works seamlessly for most of the time, is actually something that I cope with, negotiate with, and teach myself to live with, without realising it. The relationship I have with my social network is a lot of work but it gets explained away as ‘habits’ , which are such an everyday part of my digital life that I have stopped looking at it as work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second incident was when a friend complained about the hostility she faces when she is not on any of the popular social networks. As an outsider, who refuses by choice, to belong to either Facebook or Google Plus or many of the activity networks (like Instagram, for instance) around, she constantly gets a raised eyebrow, a pointed question and a look of incredulity when she confesses it to somebody. More often than not, she gets treated like digital pariahs, social outcast who is no longer ‘relevant’ in the current scheme of things. She was telling me about how hard she has to work to convince people that she belongs to the communities, even though not to these networks. And how, she is constantly afraid that while she plugs out, people might be saying things about her that she might want to hear but never get to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third is perhaps more common than we would agree to but it deals with multiple identities online. In the world of Wikipedia, there are people who use sock-puppets and meat-puppets, using multiple avatars and identities to make their point, to fake support for their arguments, and to build false consensus in order to win the edit wars that they are fighting. These puppets, that stand in as surrogate structures of real people, are not mere surface structures. They are fleshed out, have personalities, have styles and identities which the users invest in quite passionately. While the community frowns upon these false identities, and indeed social network platforms encourage us to shun all role-play and stick to our one authenticated social identity, these flourish and often gain a life of their own as a shadow double of the user. And yet, everybody knows that these identities are a matter of habits, a collection of ‘things that we do’ which emerge as important actors in the networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These habits might offer us an explanation of why we participate in memes, sharing and disseminating information virally across the interwebz. They might also give us an insight into why we troll and transmit viruses and spam, to friends in the networks, even when we do not mean to. They might help us understand why we are suffering from such an information fatigue, even when we have smart algorithms and softwares constantly sifting through the information web and filtering customised results for us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea of the network as a series of habits opens up a new way to thinking about all the three instances, which I described above. It shows that the networks become invisible in our everyday practice, thus creating a condition of false crisis, because they are simultaneously transparent and opaque. It shows that networks are not ‘natural’ but take a lot of effort and energy to sustain – something that digital natives might take to easily but are not kind to digital immigrants, settlers or non-inhabitants, who cannot invest as much time in their networked lives, thus creating new demography of exclusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And it shows that the network, despite the much acclaimed wisdom of the crowds, can be easily manipulated by those who learn how to fake conditions of life and living within the simulated networked environments. And it would explain why, if I end this column by asking you to go to Google Images and search for “completely wrong”, partly out of curiosity, partly because of expectation, and partly because of habit, you will run the search strings anyway, in the process, supporting the network but also reinforcing your habits of information search and connections.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/first-post-tech-oct-12-2012-nishant-shah-digital-habits-how-and-why-we-tweet-share-and-like&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2012-10-23T10:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend">
    <title>Who’s that Friend?</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend</link>
    <description>
        &lt;b&gt;If you are reading this, stand on your right foot and start hopping while waving your hands in the air and shouting, “I am crazy” at the top of your voice. If you don’t, your Facebook account will be compromised, your passwords will be automatically leaked, and somebody will use your credit card to smuggle ice across international waters.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: left; "&gt;Nishant Shah's column was published in the &lt;a class="external-link" href="http://www.indianexpress.com/news/who-s-that-friend-/1011997/0"&gt;Indian Express&lt;/a&gt; and in the  &lt;a class="external-link" href="http://www.financialexpress.com/news/who-s-that-friend-/1011997/0"&gt;Financial Express&lt;/a&gt; on October 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have all received messages of this order — if not exactly this much silliness — on the various social networks that we belong to. These are messages that warn us that our security is breached, our data is unsafe, that our transactions are public, and all the sensitive information we have trusted to the different platforms on the Web, is now up for grabs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The best of us have fallen prey to such messages of alarm, and have “shared”, “liked”, or “retweeted” them, and in retrospect felt foolish when we realised that the message was just a hoax. For those of us who are savvy with the ways of the Web, even when we are sending these messages, there is an instinctive feeling that something is wrong, but we do it nevertheless, joining the ranks of conspiracy theorists who make this world enchanting and mysterious in its quotidian banality. These messages are common, harmless and habit-forming — they spread, even when we recognise that they are not completely plausible — because we have formed habits online, which we immediately perform, before rational thought or reason sets in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a recent Thought Marathon on “Habits of Living”, supported by Brown University and organised by the Centre for Internet and Society, a handful of scholars, artists, practitioners and researchers examined how such habits shape the world of the digital. One of the concerns about such habits of viral dissemination is about the design of trust and the nature of friendship in our social networking systems. How do you trust information online? What is the information that uses you as a conduit, disseminating through you into the network? What role do we play in keeping these messages alive, by spreading them, by talking about them, by retracting and discussing them, giving them more value than they could muster on their own?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the centre of all these questions is the idea of proximity, intimacy and friendship. Within the social Web, we have all become “friends”. The six degrees of separation have fallen — every lurker is a potential friend, just waiting to be authenticated by a system, tagged in a photo, connected by a weak link of interest or closeness. These friends are our social safety nets on the Net. They give us a sense of belonging and safety when we are committing our intensely personal and private data on the publically private digital platforms. Despite knowing that information we produce online is going to be archived in servers over which we have no control, in forms and formats that will outlive our social relations and indeed, our very lives, we constantly produce data that quantifies and marks our social relationships. We commit secrets and private thoughts to “friends” in the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, friendship within the social network is a non-reciprocal one-way transmission of secrets. The covenant of digital friendship on Facebook is that we pass on a secret to a friend, knowing well, that the act of passing on the secret expects a betrayal of that secret. The information that we submit to somebody to show our trust, has already been witnessed, stored, archived and mapped by the code and algorithms that make that system. Which is why, we live in constant fear of our data being compromised by the “system” which is both vulnerable and fragile. Which is why, we are continually bombarded by warnings of glitches in the matrix, outside of our control, reminding us of the fearful precariousness of being on the Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the trolling messages and the way they spread, remind us that in the system, it is the “friend” who is invariably the person who puts us in danger. There are almost no documented cases of a system endangering the person who shares information on the social Web. The leak in the network is always done through a human actor — somebody who is close to us, somebody who we trust — who invariably passes on that secret to another “friend” in the network. Similarly, the chances of your machine getting infected by a random virus by a stranger are very low. The people who infect you are those you trust, because you receive information from them without questioning it. An attachment in the email, a link to a dodgy site, instructions asking for personal details are all safe because we are naturally suspicious of strangers bearing candy. But when these questions come from our “friends”, we drop our guards and accept viruses, share personal data, give out compromising pictures, putting ourselves in conditions of threat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the fundamental paradox of the social Web — that those who we trust, are generally the primary sources who put us in danger, and yet, because we think of them as “friends”, we continue to trust them, while remaining suspicious of the systems that are far more benign than the humans in the network.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/financial-express-october-23-2012-nishant-shah-who-s-that-friend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2012-11-04T06:46:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/www-indianexpress-com-one-zero">
    <title>One. Zero. </title>
    <link>https://cis-india.org/digital-natives/www-indianexpress-com-one-zero</link>
    <description>
        &lt;b&gt;The digital world is the world of twos. All our complex interactions, emotional negotiations, business transactions, social communication and political subscriptions online can be reduced to a string of 1s and 0s, as machines create the networks for the human beings to speak. So sophisticated is this network of digital infrastructure that we forget how our languages of connection are constantly being transcribed in binary code, allowing for the information to be transmitted across the web. &lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah's article was &lt;a class="external-link" href="http://www.indianexpress.com/news/one.-zero./1003149/0"&gt;published&lt;/a&gt; in the Indian Express on September 16, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Indeed,  we have already reached a point where we don’t even need to be familiar  with code to perform intimate functions with the machines that we live  with, as they respond to us in human languages. While this human-machine  duality has been resolved with the presence of intuitive and  interactive interfaces that allow us to seamlessly connect to the  person(s) at the other end of a digital connection, there is another  binary that still remains at the centre of much discussion around all  things digital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This  is the duality of the Real and the Virtual. In geekspeak, this  particular separation has been coded as a divide between RL (Real Life)  and VR (Virtual Reality). This separation between the two is so  naturalised that it has become a part of our everyday imagination where  things that happen online are ‘out there’ and ‘an escape’ whereas things  that are offline, are ‘real’ and ‘believable’. However, as digital  technologies become pervasive and ubiquitous, these lines between RL and  VR have blurred. Especially with new technologies of augmented reality  and simulated layers like Google Goggles or even location-based services  on your smartphone that help you navigate through the offline world, it  is becoming difficult to clearly say what is online and what is  offline.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There  are two questions that help demonstrate this blurring of boundaries very  clearly. The first is an existential one, something that doesn’t crop  up often in conversations, but suddenly haunts you on at 2 pm on an idle  Thursday: Who are you, when you are online? A famous cartoon on the web  had two dogs sitting on a connected computer, their paws on the mouse,  and telling each other, ‘On the internet, nobody knows you are a dog’.  But in the hyper-connected world that we live in, everybody knows  exactly who we are, even as we ourselves are confused about where our  bodies end and where our digital extensions and avatars begin. Things  that we do in RL affect and shape the ways in which our avatars evolve  on social networking sites. The interactions that our avatars have with  other digital objects map back on our understanding of who we are and  how we dress our bodies. Even when we are not connected, our avatars  interact, constantly, not only with other avatars in the system, but  also machines and artificial intelligence scripts, and robots and  networks, masquerading as ourselves even outside our knowledge. We might  be tagged, liked, shared, transmitted and morphed; we might be  photoshopped, reduced to a tweet, condensed to a status message,  embodied in an avatar on our favourite role playing game, or hovering as  a signature to emails. These are all parts of us, but they are not just  extensions of us. These are things that not only stand in for us but  also shape the ways in which we understand ourselves and how we connect  to the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The  second question crops up regularly in digitally mediated conversations.  When your parents call you on the cell phone, or your friend messages  you on the Blackberry, or your colleague pings you on Skype or your IRC  buddies see you on a chat channel. As our modes of access have become  mobile and devices of access have become portable, we can never really  clearly answer the question, ‘Where are you right now?’. It is a  question worth dwelling on. Where are you when you are walking down a  street, using GPRS data on your cellphone, and a friend uses a Voice  Over IP service like Whatsapp to ask you, ‘Where are you right now?’.  Are you on the street? On your phone? On an application? Located  somewhere on a server? Bits of data on a high-speed optic fibre, zooming  across the ionosphere? Depending upon who is asking the question, you  would be able to and in fact have to give a different answer about where  you are when you are online.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This  blurred duality might be seen as confusing, taking away the assurance of  our body and our geography from everyday practices. In fact, one of the  reasons why the digital revolution has been so well received is because  these technologies facilitate an almost seamless transfer of ideas,  emotions and connections across the different realms of RL and VR,  offering us new ways of thinking about being human, being social, and  being connected. The strength of the digital is in this coupling  together, of the hitherto irreconcilable realms of our life in messy and  enchanting ways, giving us new opportunities to think about who we are  and where we are in our quotidian lives.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/www-indianexpress-com-one-zero'&gt;https://cis-india.org/digital-natives/www-indianexpress-com-one-zero&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:50:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore">
    <title>Social media, SMS are not why NE students left Bangalore</title>
    <link>https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore</link>
    <description>
        &lt;b&gt;I woke up one morning to find that I was living in a city of crisis. Bangalore, where the largest public preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of night-life, the city was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's article on North East exodus was &lt;a class="external-link" href="http://www.firstpost.com/tech/social-media-sms-are-not-why-ne-students-left-bangalore-423151.html"&gt;published&lt;/a&gt; in FirstPost on August 20, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Through technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, of danger and of material harm found currency and we found thousands of people suddenly leaving the city to go back to their imagined homelands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The media spectacle of this exodus around questions of religion, ethnicity and regionalism only emphasised the fact that there is a new wave of connectedness that we live in – the social web, or what have you – that can no longer be controlled, contained or corrected by official authorities and their voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite a barrage of messages from the law enforcement and security authorities, on email, on large screens on the roads, and on the comfort of our cell-phones, there was a growing anxiety and a spiralling information mill that was producing an imaginary situation of precariousness and bodily harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much has been said about the eruption of this irrationality that pokes holes in the mantle of cosmopolitanism that Bangalore (and other such ‘global cities’) is enveloped in, in its quest to represent the India that is supposed to shine. It has been heartening to see how communities that were supposed to be in conflict have worked so hard in the last few days, at building human contacts and providing assurances of safety and inclusion, which are far more effective than the official word.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There has been a rich discourse on what this means for India’s modernity, especially when such an event marks the so-called neo-liberal cities, showing the darker undercurrents of discrimination and suspicion that seem to lie just beneath the surface of networked neighbourhoods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is much to be unpacked about the political motivations and the ecologies of fear that our immigrant lives are enshrined in, I want to focus on two aspects of this phenomenon which need more attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is the fierce localisation of our global technologies. There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging us in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us towards an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the times, these networks are so naturalised and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility, In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The visibility of the networks, when they suddenly crop up for public viewing, for those of us who are outside of that network, it signals that something has gone wrong. There is a glitch in the matrix and we need to start unpacking the local, the specific and the particular that signals the separation of these networks from our habits of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point I want to make is about the need to look at the ellipsis that occurs in this spectacular emergence of the network and the apparatus that is set into place to control and regiment it. The hyper-visibility of the information and technology network destabilises the ways in which we think of our everyday, thus emerging not only as a sign of the crisis but a crisis unto itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These ellipses of the crisis – replacing the crisis with the network – as well as the collusion between the crisis and the network are the easy solution that state authorities pick up on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a problem about the nation-wide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The solution, however, is offered at the level of technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of addressing the larger issues of conservative parochialism, an increasing back-lash by conservative governments and a growing hostility that emerges from these cities which nobody possesses and nobody belongs to, the efforts are being made to blame technology as the site where the problem is located and the object that needs to be controlled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what we have is redundant regulation that controls the number of text messages we are able to send, or policing of internet for those spreading rumours. The entire focus has been on information management, as if the reason for mass exodus of people from the North East Indian states and the sense of fragility that the city has suddenly been immersed in, is all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in peer-2-peer environments outside of the control of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Technologies have become the de facto scapegoats of many problems in our past. It invites more regulation, containment and censorship of the freedom that digital technologies allow you – from the infamous Delhi Public School MMS Scandal in the early 2000s to the recent attempts at filtering the social web – we have seen the repeated futility of such measures of technology control, and yet it appears as a constant trope in the State’s solution to the problems of the contemporary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obsession with governance of technology to resolve a much more nuanced problem is akin to fabulous stories of mad monarchs banishing spinning wheels from their kingdoms or sentencing hammers to imprisonment for the potential and possibility of crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And these solutions are always going to fail, because they fail to recognise either the intimate penetration of digital technologies in our everyday life, or the ways in which our local structures are constructed through the presence of ubiquitous technologies and gadgets and screens and networks.&lt;/p&gt;
&lt;div id="_mcePaste"&gt; 
&lt;p style="text-align: justify; "&gt;There has been a rich discourse on what this means for India’s modernity, especially when such an event marks the so-called neo-liberal cities, showing the darker undercurrents of discrimination and suspicion that seem to lie just beneath the surface of networked neighbourhoods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is much to be unpacked about the political motivations and the ecologies of fear that our immigrant lives are enshrined in, I want to focus on two aspects of this phenomenon which need more attention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first is the fierce localisation of our global technologies. There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging us in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us towards an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the times, these networks are so naturalised and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility, In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The visibility of the networks, when they suddenly crop up for public viewing, for those of us who are outside of that network, it signals that something has gone wrong. There is a glitch in the matrix and we need to start unpacking the local, the specific and the particular that signals the separation of these networks from our habits of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point I want to make is about the need to look at the ellipsis that occurs in this spectacular emergence of the network and the apparatus that is set into place to control and regiment it. The hyper-visibility of the information and technology network destabilises the ways in which we think of our everyday, thus emerging not only as a sign of the crisis but a crisis unto itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These ellipses of the crisis – replacing the crisis with the network – as well as the collusion between the crisis and the network are the easy solution that state authorities pick up on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a problem about the nation-wide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The solution, however, is offered at the level of technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of addressing the larger issues of conservative parochialism, an increasing back-lash by conservative governments and a growing hostility that emerges from these cities which nobody possesses and nobody belongs to, the efforts are being made to blame technology as the site where the problem is located and the object that needs to be controlled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So what we have is redundant regulation that controls the number of text messages we are able to send, or policing of internet for those spreading rumours. The entire focus has been on information management, as if the reason for mass exodus of people from the North East Indian states and the sense of fragility that the city has suddenly been immersed in, is all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in peer-2-peer environments outside of the control of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Technologies have become the de facto scapegoats of many problems in our past. It invites more regulation, containment and censorship of the freedom that digital technologies allow you – from the infamous Delhi Public School MMS Scandal in the early 2000s to the recent attempts at filtering the social web – we have seen the repeated futility of such measures of technology control, and yet it appears as a constant trope n the State’s solution to the problems of the contemporary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This obsession with governance of technology to resolve a much more nuanced problem is akin to fabulous stories of mad monarchs banishing spinning wheels from their kingdoms or sentencing hammers to imprisonment for the potential and possibility of crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And these solutions are always going to fail, because they fail to recognise either the intimate penetration of digital technologies in our everyday life, or the ways in which our local structures are constructed through the presence of ubiquitous technologies and gadgets and screens and networks.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore'&gt;https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-28T10:48:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network">
    <title>What lurks beneath the Network </title>
    <link>https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network</link>
    <description>
        &lt;b&gt;There is a series of buzzwords that have become a naturalised part of discussions around digital social media—participation, collaboration, peer-2-peer, mobilisation, etc. Especially in the post Arab Spring world (and our own home-grown Anna Hazare spectacles), there is this increasing belief in the innate possibilities of social media as providing ways by which the world as we know it shall change for the better. Young people are getting on to the streets and demanding their rights to the future. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's column on the North East exodus and digital networks was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/what-lurks-beneath-network"&gt;Down to Earth&lt;/a&gt; magazine on August 24, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Citizens are mobilising themselves to overthrow authoritarian governments. Socio-economically disadvantaged people, who have always been an alternative to the mainstream, are finding ways of expressing themselves through collaborative practices. Older boundaries of nation, region and body are quickly collapsing as we all become avatars of our biological selves, occupying futures that were once available only to science fiction heroes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this list of very diverse phenomena, I want to add the recent tragic and alarming exodus of people from the north eastern states, from the city of Bengaluru, where I live. There might not be many connections between this state of fear which instigated thousands of people, fearing their safety and security, to leave Bengaluru and return home and the global spectacles of political change that I listed earlier. And yet, there is something about the digital networks, the social web and the ways in which they shape our information societies, that needs to be thought through. In the Arab Spring like events, which are events of global spectacle, there is a certain imagination of digital technologies and its circuits that gets overturned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These events challenge the idea that digital networks are always outward looking—connecting us to somebody and someplace ‘out there’ in a world that is quickly getting flat—and show how these networks actually create new local and specific communities around information production, consumption and sharing.  These networks that connect people in their information practices, often make themselves simultaneously ubiquitous and invisible. So that the interfaces that we operate through—laptops, cellphones and other portable computing devices—become such a part of our everyday life, that we stop noticing them. They are a natural element of our everyday mechanics of urban survival, and in their omnipresence, become invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This invisibility or naturalisation of the digital technologies, often make us forget the intricate and inextricable way in which they are woven into our basic survival strategies. Especially with the younger generation that has ‘grown up digital’, the interface, the gadget and the network is the default space that they turn to for their everyday needs. We develop intimate relationships with these technologised circuits, making them such a part of our quotidian existence that we often forget that these technologies are external to us. Which is why we come across articulations like, “I love my computer because my friends live in it,” or “I feel amputated when you take away my cell-phone”. These are ways in which we naturalise and internalise the digital technologies that we live in and live with. However, in times of crises, we suddenly realise the separation, as the technologies make themselves present, unable to sustain the new conditions of crises. It would be fruitful to see then that the eruption in our seamless connection with the digital technologies is a sign of an external crisis –something that we have seen in the Arab Spring or the Anna Hazare campaign, where these networks became visible to signal towards an external crisis. The emergence of networks into public view is a symptom that there is something that has gone wrong and so we see the separation of the digital ecosystem from its external reality and context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unexpected visibility of the network indicates that the regular information ecologies have been disrupted, the contexts which support community interaction at the local level have been changed, and those changes need to be accounted for and addressed in order for the network to become the transparent infrastructure of new urban communities again. In many ways, it resonates with the science fiction logic of the Matrix Trilogy where, if you can see the matrix, it means that something has gone wrong in the fabric of reality and it needs to be fixed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exodus of the north eastern people also needs to be examined in this context. In an immigrant city like Bengaluru, the sense of belonging and community is often deeply mediated by the digital ecologies of information sharing. Beneath the veneer of a global city that is to connect with the external world, there is also a huge network of local, specific and invisible practices that do not become a part of the global spectacle of digital technologies, and operate in a condition of relative invisibility. However, when the logic of a migrant city gets disrupted because the conditions of its work force get threatened, these networks go into an overdrive. They become gossip and rumour mills. They become visible and suddenly create conditions of fear, danger and crisis that were unexpected. And so, without a warning, over-night, a huge number of people, who were a part of these networks, decided to abandon their lives and head home, because the larger social, cultural and political threats transmitted through these local networks before they could become global spectacles that we could consume.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A large part of the people fleeing the city had already crowded the trains and left their lives behind, before any attempt at regulation or control could be made. All kinds of post-facto theories about the real or perceived nature of the threat, the actual cases of violence, and the conditions of life in the IT City have emerged since then. However, in all these theories is a recognition that the crisis which led to this phenomenon lingers on and cannot be addressed. There is no particular person to hold responsible. The few scattered incidents of attacks, violence or intimidation have been recognised as strategic and opportunistic interventions by local regressive groups. All in all, we have a condition where something drastic and dramatic has happened and there is no real or material person or group of people who can be blamed for it. And so, instead of addressing the crisis and the conditions which led to the exodus, we have committed an ellipsis, where we have made technology the scape-goat of our problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And we have done this repeatedly in the history of technology and crises in India. In the early days, when the notorious Delhi Public School MMS clip that captured two under-age students in sexual activity, became hugely visible, instead of addressing the problem at hand, we eventually set up a committee to regulate the conditions of cultural production and distribution online. During the horrifying bomb-attacks in the trains in Mumbai, we tried to block Blogspot and curtail information online as if technology was the reason that these acts were made possible. Last year, Dr. Sibal’s attempts at establishing a pre-censorship regime on information on the social web, because he encountered material that was disrespectful to the Congress party leader Mrs. Gandhi, sought to regulate the web rather than look at the political discontent and dissent that was being established through those articulations. Because there was no way by which the local situation could be controlled or contained, technology became the only site of regulation, inspiring draconian measures that limit the volume of text messaging and try and censor the web for lingering traces of the information mill that catalysed and facilitated this exodus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a remarkable ellipsis where the actual problem – the conditions of life and safety in our global cities – is hidden under a perceived problem, which is the sudden visibility of a digital information ecosystem which was not apparent to us hitherto. And while there is no denying that at the level of tactics, for immediate fire-fighting this kind of regulation is important, nay, necessary, we also need to realise that at the level of strategy, these kinds of knee-jerk regulatory mechanisms are not a resolution of the problem. These laws and attempts at censorship are neither going to correct what has happened, nor are they going to be potent enough to curb such networked information sharing in the future. They are symbolic tactics that are trying to correct the crisis – the feeling of fear and danger – and in that, they do their job well in establishing some sense of control over the quickly collapsing world. However, we need to look beyond the visibility of this network, and realise that the crisis is not its emergence or its functioning but at something else that lurks behind the facade of the network.&lt;/p&gt;
&lt;p&gt;Nishant Shah is director (research), Centre for Internet and Society, Bengaluru&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network'&gt;https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-25T07:10:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/internet-censorship">
    <title>Internet Censorship: Anonymous Can’t be Just Harmful Hackers</title>
    <link>https://cis-india.org/internet-governance/internet-censorship</link>
    <description>
        &lt;b&gt;If there was ever an interesting time for people concerned with freedom of speech and expression to live in, it is now, and it is definitely in India. It has been a series of battles the last couple of years, where a slightly out-dated government machinery has been trying to control and contain the burgeoning online spaces, only to be put in their place by the new-age tech-ninjas that have risen as the new heroes in our digital times.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.firstpost.com/tech/internet-censorship-anonymous-protests-should-be-more-than-harmful-hacks-376564.html"&gt;published&lt;/a&gt; in the First Post on July 13, 2012&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We might not have had our Wikileaks moment in India yet, but the recent consolidation of resources by civic hacker groups and a public outrage against top-down blocking of everyday webspaces have steadily and surely put the questions of censorship and freedom on our minds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The protests have taken many forms – from civic action routes of campaigns and petitions by civil society and non-governmental organisations to guerrilla warfare in the shape of distributed denial of service attacks and hacking of government websites.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img class="wp-image-376597 size-full" height="176" src="http://www.firstpost.com/wp-content/uploads/2012/07/Anonymous_AP_NEW.jpg" title="Anonymous_AP_NEW_13JULY" width="235" /&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;Anonymous must be more than just a hacker group: AP&lt;/p&gt;
&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;A lot of these efforts have found popular interest and media attention, but they haven’t always found a solid ground for negotiation and dialogue with the policy makers and legislators designing this information regime. However, after the first off-line mobilisation of protests by Anonymous in India, the government has had to face the fact that the clicktivist users are not going to remain passive, merely venting their discontent on their blogs and social networking spaces.&lt;/p&gt;
&lt;p&gt;With the sustained and systemic attacks on government, public and  corporate websites, revealing sensitive information and taking down web  resources the new hackers have shown that they mean business. In a  recent attack, Anonymous hacked the Tamil Nadu police’s websites and  revealed information about the complaints people have made and the  actions taken on them.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;They leaked the document under their Twitter handle ‘opindia_revenge’ to show the police inaction. The documents have redacted some information but it has also revealed personally identified data about the people involved, without taking into consideration that it might affect the people involved in the cases adversely. Acts like these have the cybercrime bureau now tracking down the attackers and taking the help of Internet Service Providers and other intermediaries to punish those responsible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the outcomes of this battle are going to be, will eventually change the ways in which our digital publics shape up. Given the lack of resistance that ISPs have shown in the past, when pressed for private information on suspicious users, the chances are that we might soon have a public spectacles of hacker-criminals. Looking at the past bungles in this arena, one also hopes that it will not be yet another instance of mixed up administration leading to wrong and misplaced prosecution.&lt;br /&gt;&lt;br /&gt;But more than anything else, one hopes that the attackers, who have seen their protests as a part of their civic action and right to protest and demonstrate, have been wise enough to protect themselves because they are going to be tracked and tried as criminals if they are caught.&lt;br /&gt;&lt;br /&gt;Much can be said about the nature of civic hacking, and much has already been said, heralding them as code warriors and berating them as a public nuisance. But in all that cacophony, we might need to separate the ideology (constitutional rights, free speech and expression) from the tactics (DDoS, hacking, parking on websites) and see what interests they eventually serve.&lt;br /&gt;&lt;br /&gt;Because even as my heart sings with these sounds of protests, there is a growing alarm that these seemingly radical guerrilla warfare might actually be more counter-productive than helpful to the cause of building an open and inclusive internet.&lt;br /&gt;&lt;br /&gt;Over the last years, many civil society and citizen collectives have realised that policies and regulation are more a dialogue than open warfare. Polarising ourselves on an axis of ‘good versus bad’, at the end of the day, only leads to more regulation and draconian measures because it makes the state feel under threat. Considerable energy has gone into building a culture of public policy consultations and dialogue that allows for different stakeholders to work towards a collective future of the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so we come back to the question of whose interest gets served in the spate of these attacks? This is the same question that haunts us when we hear about our favourite political parties taking to destroying public property and blocking public infrastructure. It is the question that resurfaces when you realise that you might agree with the politics but the tactics are actually harming what you think is important.&lt;br /&gt;&lt;br /&gt;In the case of the Anonymous attacks, it unfortunately seems more bravado and aspiration to radical heroism than a sustained and strategic set of interventions. With this particular act they seemed to have not only hurt the people on whose behalf they are fighting, but also given the government more reasons and plausible excuses to exercise more regulation and control over the digital technologies.&lt;br /&gt;&lt;br /&gt;The attacks are a bold move to put the questions of censorship into public discourse, and force the state to acknowledge the problems with its governance. But it would be great to see if we can build on these energies and momentum and lead to a more sustained engagement with the political questions at stake, so at to construct a larger movement to protect our rights to free speech and expression that is beyond the world of ad-hoc hacking and random acts of protest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/internet-censorship'&gt;https://cis-india.org/internet-governance/internet-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-06T06:56:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/young-people-technology-new-literacies">
    <title>Deconstructing Digital Natives: Young People, Technology and the New Literacies</title>
    <link>https://cis-india.org/digital-natives/young-people-technology-new-literacies</link>
    <description>
        &lt;b&gt;Nishant Shah was invited to do a book review of a new anthology 'Deconstructing Digital Natives', edited by Michael Thomas. The review was published in Routledge's Journal of Children and Media on July 18, 2012. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Deconstructing Digital Natives: Young People, Technology and the New Literacies&lt;/em&gt; is an anthology that revisits the debates and scholarship that have arisen around youth and technology in the last decade or so. It is a timely intervention that invites some of the most influential scholars who have contributed to and shaped the discourse around “digital natives” to come and revisit their original ideas from the last decade. The term “digital native” probably bears witness to the strident discourses that, more often than not, fall into the trap of exotically glorifying or despairingly vilifying young peoples’ engagement with digital technologies. As Buckingham points out in his foreword to the book, these conversations either take up the language of a “generation gap [that] entails a narrative of transformation and even of rupture, in which fundamental continuities between the past and the future have been destroyed” or they guise themselves in an “almost utopian view of technology—a fabulous story about technology liberating and empowering young people, enabling them to become global citizens, and to learn and communicate and create in free and unfettered ways” (p. ix). The essays seek a point of departure from these tried and tested arguments in order to provide a “balanced view” on the topic. And so we have a distinguished author list from the world of digital natives scholarship, coming together not only to ponder on their own contributions to the field and how those ideas need to be upgraded, but also to provide new contexts, concepts, and frameworks to understand who, or indeed, what, is a “digital native,” often in tension with their earlier work.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its ambition of revisiting existing debates and providing a “research-based approach by presenting empirical evidence and argument from international researchers in the field,” the book succeeds unevenly (p. xi). Despite its efforts to chart a point of departure, some of the essays end up falling into some usual traps. For example, despite the fact that the oldest digital natives are probably in their thirties, they are thought of as being young. They are defined only as “students” within formal learning institutions without looking at the radical potential of learning outside organized education, embedded in their everyday practices. The digital natives remain an object of research and the peer-to-peer structures that are supposed to shape them, but do not feature in the methodologies of researching them. This notwithstanding, the essays still offer a historical and social perspective on the debates around digital natives in certain developed pockets of the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the first section, “Reflecting on the Myth,” Thomas’ essay “Technology, Education and the Discourse of the Digital Native” introduces a tension between the techno-euphorists and the “digital luddites,” which replays itself through the rest of the contributions. While Thomas places himself between “technoevangelism” and “technoskepticism,” Prensky, who coined the term “Digital Natives” in 2001, then introduces to us a new binary of “digitally wise” and “digitally dumb” (p. 4). Prensky reviews the responses that his opposition of “digital natives” and “digital immigrants” have produced over the last decade and emphasizes that his coinage was at the level of a metaphor, and was not to be taken seriously. Prensky agrees that the earlier opposition might be discarded because it evokes too many simple responses based on skills with technology. Digital wisdom, for Prensky, is in the ways in which digital technologies enhance the human brain “to anticipate second- and third-order effects to which the unaided mind may be blind” as the world becomes too complex for the “unenhanced human brain” to cope with it (p. 23). Typically, Prensky’s argument creates a dichotomy of those who can (and will) and those who will be outside of this web of digital enhancements. His analysis tries to complicate the idea of human wisdom by looking at questions of ethics and agency, but the final formulations appear cliche´d, merely re-creating the older tensions rather than thinking through them. Jones’ following essay on the “Net Generation” is more persuasive, where he argues for dismissing the idea that “nature of certain technologies . . . &lt;em&gt;has affected the outlook of an entire age cohort&lt;/em&gt; in advanced economies” and instead should unpack how “new technologies emerging with this generation have particular characteristics that &lt;em&gt;afford certain types of social engagement&lt;/em&gt;” (p.42).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the second section, titled “Perspectives,” the essays take up two different tones.The first is about looking at digital literacy, skill, and fluency in everyday practices of digital natives, and how they shape our contemporary and future sociopolitical and cultural landscapes. Banaji, in exploring the EU Civic Web Project, echoes Jones’ ideas. The presumptions within education about an entire generation as “born with technologies” has consequences in the field of civic action, where programs for citizen action are designed with expectations that the young people will have core digital competencies and literacy. She does not push that argument further, but in her study of the two Scottish e-initiatives, one can see the promise of a radical reconstruction of civic engagement movements, where the young participants are not going to be satisfied as mere participators, and will demand a space for their voice to be heard.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Takahashi’s essay on the &lt;em&gt;oyaubibunka&lt;/em&gt; (“thumb culture”) mobile generations in Japan stands alone in its analysis of an Asian context—though many might argue that Japan, with its developed economy, can hardly be counted as a typically “Asian” perspective. Takahashi is rooted, both in practice and discourse, in youth and technology in Japan, where the youth often experience close-knit community experiences through mobile interfaces, in their otherwise alienated modern habitats. Almost as a response to Turkle’s Alone Together (2011), Takahashi shows how collaborative and cocreation cultures ranging from the mobile novels on Mixi to everyday interaction on Social Networking Systems is bringing in new kinds of social spaces of belonging. The essay, however, resists simply celebrating this space and works in complex ideas of freedom, control, risks, and the tensions between traditionalization and modernity in Japan.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Zimic and Dalin, writing from a similar heavily connected Nordic region, pose a different set of questions in their essay, “Actual and Perceived Online Participation Among Young People in Sweden.” For Zimic and Dalin, in a space where connectivity can be taken for granted, the further question to ask is not whether digital natives participate online or not, but whether they participate in ways that are expected of “a digital citizen in the information age” (p. 137). Through empirical data and case studies, the essay shows the different kinds of activities that youth engage with and also concludes that though engaging in civic issues is important to the young people’s sense of belonging to participatory cultures, using the Internet does not provide an “automatic guarantee” toward participation, and “assistance is required in order to engage them in relevant activities” (p. 148).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second set of essays in this section all cluster around the digital native as a student. Locating the digital native within educational institutions, they look at the ways in which the ideas of learning, pedagogy and engagement with the text are changing with the rise of digital technologies. Levy and Michael look at two case studies involving students in Australian high schools, to “facilitate a deeper understanding of products and processes in multimodal text construction,” which they think is core to interactive communication technology literacy skills (p. 85). The data is rigorous and rich, but the conclusions are a bit of a disappointment: digital natives need to better manage their time and resources and they need to learn traditional skills in order to cope with their educational environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The trend of an exciting hypothesis and conclusion, which do not necessarily leave you with anything more than what you already knew, continues in this section. Erstad sets out on a journey to see how digital literacy posits challenges to educating the digital generation and ends by suggesting that the digital divide should address questions of “how to navigate in the information jungle on the Internet, to create, to communicate, and so forth” (p. 114). Similarly, Kennedy and Judd want to unravel the mystery of why “students, who are so clearly familiar and apparently adept with Internet tools, are at times so poor at using the Internet academically” (p. 119). Through empirical research and interaction with students, they end up making an argument against the Googlization of everything (Vaidhyanathan, 2011), suggesting that “satisficing strategies” of information search, defined by a need for instant gratification and not looking beyond the first information sets, has produced “a generation of students that has grown up with Google [who] may over-value expediency when locating and selecting appropriate scholarly information” (p. 132). On similar trends, Levy proposes to question the assumption of whether all “young children are inherently ‘native’ users of digital technology” for implications on our future pedagogy within the new textual landscape (p. 152). The case studies and the frameworks built are interesting, but they reveal nothing more than the claim that the essay begins with by Marsh et al. (2005) and Bearne et al. (2007) that “young children are immersed in ‘digital practices’ from an early age and that they often develop skills in handling screen texts even when they are not exposed directly to computers at their own homes” (Levy, 2011, p. 163). The implication is clear: change our schools to accommodate for these new textual practices and help children capitalize on their digital competence and develop “digital wisdom.” But it is a recommendation that has been around for at least a decade, if not more.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The third and concluding section of the book, “Beyond Digital Natives,” is possibly the most promising part of the book. Bennett and Maton seek to look beyond “nuanced versions of the idea” and move the debate on to firmer grounds of how the rise of the digital natives is going to affect the policies around educational technology” (p. 169). They engage with a body of work that is specifically oriented toward building empirical evidence-based frameworks for understanding the potential role of technology in education. With a fine conceptual tool that makes distinctions between access and usage, they systemically dismiss the “academic moral panic” that characterizes conversations around youth-technology-change.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Bennett and Maton, the object of inquiry is not the digital native but the body of discourse that surrounds this particular entity—and they make a plea for research rather than imaginings, showing how the influential work in the area has been plagued by unsupported claims, unevidenced observations, and futuristic imaginations, which paint a poetic picture of digital natives but offer very little in terms of furthering the argument. It is also noteworthy that they do not flinch from critiquing the colleagues who also feature in the same book, as an idealizing and homogenizing group that has shown “diversity rather than conformity” (p. 181).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Palfrey and Gasser, whose &lt;em&gt;Born Digital&lt;/em&gt; (2008) has been the guide for lay readers to understand the nuances and complexities of the area, in their essay, begin by acknowledging that “digital natives” is an awkward term. However, they argue, it is still a term that resonates deeply with parents and educators, and that this resonance should not be taken lightly by researchers. Their decision was to use this term, albeit with caution and discretion, strategically to refer to a small subset of young people and the gamut of relationships and engagements they have with digital technologies. The suggestion is to use the term and in every usage, look at the unevennesses and awkwardness it creates, thus actually unpacking an otherwise opaque relationship which is reduced to “usage” or “access.” Their concerns are more about the quality of information and access, infrastructure for critical literacy and digital fluency, and making legible these everyday practices to larger implications for a future that they posit is bright and hopeful.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Deconstructing Digital Natives&lt;/em&gt; is an interesting revisit of a term that has grown in different ways through the first decade of the new millennium. However, the book still remains located in the same geopolitics in which the early discourse of digital natives were grounded—developed, privileged locations where connectivity, affordability, and ubiquitous digital literacy are taken for granted—reminiscent of the frantic cries one hears in piracy markets in Bangkok, “same, same, but different.” The revisiting does not seem to feel the need to explore other contexts. A few essays talk about factoring in local and contextual information in understanding digital natives, but the scholarship reinforces the idea of how technologies shape and are shaped by identities in some parts of the world, and that these identities can be heralded as universally viable, with a little nuancing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The questions that have emerged in this discourse in the recent years, remain ignored. What does a digital native look like in the Global South? Can we have new concepts and frameworks which emerge from these contexts? Is it possible to produce accounts in languages and ideas that are embedded in everyday practices rather than forcing them to become legible in existing vocabularies? One would hope that the next book that deconstructs digital natives would also deconstruct the prejudices, presumptions, and methodological processes that are embedded in this field.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Bearne, E., Clark, C., Johnson, A., Manford, P., Motteram, M., &amp;amp; Wolsencroft, H. (2007). Reading on screen. Leicester: UKLA.&lt;/li&gt;
&lt;li&gt;Marsh, J., Brookes, G., Hughes, J., Ritchie, L, Roberts, S., &amp;amp; Wright, K. (2005). &lt;em&gt;Digital beginnings: Young children’s use of popular culture, media and new technologies&lt;/em&gt;. Sheffield: Literacy Research Centre, University of Sheffield.&lt;/li&gt;
&lt;li&gt;Palfrey, J., &amp;amp; Gasser, U. (2008). &lt;em&gt;Born digital&lt;/em&gt;. New York, NY: Basic Books.&lt;/li&gt;
&lt;li&gt;Turkle, S. (2011). &lt;em&gt;Alone together: Why we expect more from technology and less from each other&lt;/em&gt;, NY. New York: Basic Books.&lt;/li&gt;
&lt;li&gt;Vaidhyanthan, S. (2011). &lt;em&gt;The Googlization of everything: (And why we should worry)&lt;/em&gt;. Berkeley, CA: University of California Press.&lt;/li&gt;
&lt;hr /&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;span class="visualHighlight"&gt;Nishant Shah is the Director-Research at the Bangalore-based Centre for Internet and Society. He is the principal researcher for a Global South inquiry into digital natives and sociopolitical change, and recently edited four-volume book, Digital AlterNatives with a Cause?, which is available as a free download at &lt;a href="https://cis-india.org/digital-natives/blog/dnbook" class="external-link"&gt;http://cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;. Correspondence to: Nishant Shah, Centre for Internet and Society, Bangalore, India. E-mail: nishant@cis-india.org&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;Download the file (originally published by Taylor &amp;amp; Francis) &lt;a href="https://cis-india.org/digital-natives/deconstructing-digital-natives" class="internal-link"&gt;here&lt;/a&gt; [PDF, 66 Kb]&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;Read the original published by Taylor &amp;amp; Francis &lt;a class="external-link" href="http://www.tandfonline.com/doi/abs/10.1080/17482798.2012.697661"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/young-people-technology-new-literacies'&gt;https://cis-india.org/digital-natives/young-people-technology-new-literacies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Book Review</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:51:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/revisiting-techno-euphoria">
    <title>Revisiting Techno-euphoria</title>
    <link>https://cis-india.org/digital-natives/revisiting-techno-euphoria</link>
    <description>
        &lt;b&gt;In my last post, I talked about techno-euphoria as a condition that seems to mark much of our discourse around digital technologies and the promise of the future. The euphoria, as I had suggested, manifests itself either as a utopian view of how digital technologies are going to change the future that we inhabit, or woes of despair about how the overdetermination of the digital is killing the very fibre of our social fabric. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/revisiting-techno-euphoria"&gt;Published&lt;/a&gt; in DML Central on July 5, 2012&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A way out of it, for some of us working with young people and their relationships with (as opposed to usage of) technologies, is to think of digital technologies as a paradigm through which everyday life is reconfigured, or as contexts within which we evolve new relationships of power and negotiation. Or to put it plainly, it has forced us to think of digital technologies not in terms of tools and gadgets, infrastructure and logistics (though those are also important) but as embodied experiences that reshape the very ways in which we conceptualize our everyday life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When we talk of digital natives in India, the immediate spaces that they inhabit conjure up images of big crowded IT cities that are transforming into hubs of international outsourcing industries and IT development. We presume that digital natives would be found in the 12% of the Indian sub-continent where broadband access is available. We often narrow our focus to look at urban, middle class, affluent, English speaking, educated youth who occupy extremely privileged positions in their social, cultural and economic practice.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the story* I want to share with you today comes from an unusual location in India – from the village of Banni in the desert region of Kutch, located at the North-Western borders of India and Pakistan. In this small village that is about 80 kilometers from the biggest town with amenities like hospitals and schools, almost every household has a smart phone with access to the internet. In the absence of more popular forms like radio, which are disallowed because of the proximity to the turbulent India-Pakistan borders, the Chinese-made smart phones become the de facto interface of communication and cultural production. The phones become not only the life-line in times of crises, but also everyday objects through which the villages stay connected with the world of cultural production and entertainment. The internet services on the phones allow them to access Bollywood songs and movies, images and games, popular television programming and other popular cultural products in the country. In many ways, Banni is probably more digitally connected than many parts of the larger cities in the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, the strong influence of Islam in this fairly homogenized community means differential access for the people who live in it. Women, according to the village doctrines, are not allowed access to technologies for fear of corruption. Hence the smart phones are all exclusively owned by men who have complete access to the information highway whereas the women do not have immediate ownership of such interfaces. And yet, the women in the village are quite updated about the latest news, gossip, politics, information about the weather, and cultural productions like TV soaps and Bollywood movies. This discrepancy between lack of access to digital technologies on the one hand, and a fairly comprehensive access to information of their choice is perplexing at first. Till you turn your attention to the children, who, in their pre-pubertal space, are not segregated so clearly into the technology publics and privates, and hence can navigate the spaces which are otherwise so gender exclusive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These children would not usually be recognized as digital natives because they are not particularly tech savvy and they do not have direct and unlimited access to the digital devices or connectivity. However, they become interfaces through which the information consumed by the male population permeates and travels to the female population in the village. The children become embodied interfaces, who imbibe the information from these digital devices and re-enact it for the women in their own private spaces. The village now has its own child-stars who not only pass on the local news and information, but also re-enact, on a daily basis, scenes, songs, and story-lines from the soaps and movies that are popular with the women in the village.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the gendered politics of technology access and the creative ways in which children are able to work as embodied interfaces is interesting – and perhaps needs more space than is afforded here – what remains interesting to me is how this story disrupts the regular narratives of techno-euphoria. It cannot be explained away merely in terms of usage. It cannot be used to claim radical social change in community and gendered relationships. It is difficult to make a technology-empowerment argument though this. What is perhaps most interesting is that it shows how we need to start thinking about digital technologies as producing new ecosystems that reconfigure our understanding of who we are and the roles we play in developing social relationality. The digital natives in these stories are not merely the children – though their embodied interface produces startling insights into how personal relationships with technologies are produced. The men who have access to the phones and have mastered digital literacy in navigating through these phones, the women who become the last-mile consumers who have found creative ways of staying connected despite their lack of access, and the children who become the nodes in this technology-information infrastructure, are all digital natives of a certain kind. They might not have claimed that identity and indeed might never want to. And yet, the very conditions of everyday life, as they are mediated by the presence of digital technologies in Banni, help us understand the social structures and information relationships in ways which are more complex than theorized by our techno-euphoric attention to network visualizations which are heavily determined by usage and action.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This story from Banni is layered and needs unpacking at many different levels. However, it shall always remain, for me, a catalyst to re-think the focus and framework of our technology discourse, and talk about digitally mediated identities (digital natives or otherwise) in a vocabulary that moves beyond usage, infrastructure and access. It emphasizes, for me, the idea that the gadgets and tools we use are, actually, only material manifestations of the digital -- which operates at the level of a paradigm or a context, through which we are slowly reshaping the material, social, and cultural notions of who we are and how we connect to the world around us.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Read Nishant's last post &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/techno-euphoria"&gt;here&lt;/a&gt;&lt;br /&gt;Link to the picture &lt;a class="external-link" href="http://www.flickr.com/photos/pranavsingh/1311922613/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;* &lt;em&gt;I am greatly thankful to my friend Rita Kothari at the Indian Institute of Technologies, Gandhinagar, for first introducing me to this context and its peculiar technology ecosystem&lt;/em&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/revisiting-techno-euphoria'&gt;https://cis-india.org/digital-natives/revisiting-techno-euphoria&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:53:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/across-borders">
    <title>Across Borders</title>
    <link>https://cis-india.org/digital-natives/across-borders</link>
    <description>
        &lt;b&gt;A friend and I were at a cafe in Bangalore the other day, when an acquaintance walked in. After the initial niceties, and invitation to join us for coffee, the new person looked at us and asked a question that sounded so archaic and so unexpected that we had no answers for it: How do you two know each other? This innocuous question threw us both off the loop because we didn’t have an immediate answer. &lt;/b&gt;
        
&lt;p&gt;Nishant Shah's &lt;a class="external-link" href="http://www.indianexpress.com/news/across-borders/970341/"&gt;article&lt;/a&gt; was published in the Indian Express on July 5, 2012&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;How  do we two know each other? My story would begin with Livejournal — a  community-based blogging platform that was popular in the early  Noughties and was the first large-scale digital network I belonged to,  and where I spoke with and befriended people writing in that closed  social network. My friend probably pins it down to Twitter and how our  blogging-friendship solidified through the charms of 140-character  direct messages. There is another story somewhere, that we discovered  later, when we added each other on Facebook and realised that we have a  few close friends in common. Over the last many years, we have also  worked together on a couple of projects, have caught up IRL (In Real  Life) whenever we visit each others’ cities — Mumbai and Bangalore — and  have thought of ourselves as friends, without trying to form a  narrative that identifies the point of origin.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;When  you compare this state of being, which is increasingly the default mode  of being for many young people who cement their relationships through  digital connections, with how we used to get to know people even two  decades ago, we know that things have changed dramatically. For the  longest time, the act and fact of knowing somebody was to find physical,  material and communitarian similarities — filters that allowed us to  hobnob with others like us. Of course, we were always progressive and  cosmopolitan, but a quick sweep of any social circle would show that we  were mostly confined to people who shared common stories with us.  Sometimes these stories were of material proximity, we grew up in the  same neighbourhoods, went to the same schools, etc. Sometimes these  stories were of class and affordability, we belonged to the same clubs  and hung out at similar places. Sometimes these stories were about an  imaginary sameness, of religion, community, family etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If  there is a truly democratising principle that the digital revolution  brought to the fore, it can be seen in this destabilising of an older  world order, where we are quite comfortable in coexisting and embracing  those who are unlike us. I do not mean this to be a celebratory moment  where the flat, non-discriminatory and inclusive societies are finally  being built. Indeed, the digital networks have their own set of filters  that eventually allow us to connect only with people of the same ilk. If  you are online in India, you are necessarily talking to people who  speak in a particular language and speak it in a particular way.  Grammar, diction, fluency, references to global cultural icons and  productions, consumption-based lifestyles, all betray the different  locations (physical or otherwise) that people come from and serve as  extremely strong filters to determine who we connect with.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This,  sometimes, even translates into gadget snobbery. For example, a young  friend told me that she finds it impossible to connect with people who  don’t have a BlackBerry phone because she doesn’t know how she can  sustain relationships without being constantly in touch through the  BlackBerry Messenger. Similarly, the celebration of social applications  like Instagram, which were available only to iPhone users, warns us that  there are severe economic, social, cultural and political prejudices  that abound in cyberspaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However,  in the middle of these complications, digital natives are not only a  mobile-wielding generation, but also a mobile generation. They are  fluid, not necessarily tied to the geographies of their origin, and  often imagine themselves, as travelling across different networks and  systems, like the information traffic on the internet. This dislocation  of the fixity of where we are from and who we are, is one of the most  exciting results of the digital turn. The fact that we are able to not  only step out of these older networks, which are often entrenched in  old-world politics that perpetuate mindless discrimination, but also  fabricate new communities and collectives that bring together a  diversity, for me, is heartening. While these new social forms will have  their own set of problems — gendered, social, linguistic and  class-based — they are also the new forms of our socio-cultural being.  And there is hope that as the physical translates into the digital,  there is a possibility of reconfiguring our pasts and recycling them for  more collaborative and shared futures.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/across-borders'&gt;https://cis-india.org/digital-natives/across-borders&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:55:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust">
    <title>How Facebook is Blatantly Abusing our Trust</title>
    <link>https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust</link>
    <description>
        &lt;b&gt;‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook is just re-emerging from the controversies around how it conducted the voting on its new privacy policies, when it goes and digs itself deeper by trying to push down its email services down the throats of its users. If you have recently logged-in to Facebook, you will have received a notification that says that you have been ‘gifted’ with a free Facebook email account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, that is a later phenomenon. A couple of days ago, the whole community of Facebook users went about their usual way, without knowing that something substantial had changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, who launched their email service as a part of their social networking empire, with or without your consent, has given us a ‘yourname@facebook.com’ email account. I know free things are considered good, but not an email account that I did not sign up for!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And to make things worse, this email account was, without our consent, added to our time-line and displayed as the primary email address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In itself, it is a small move – with the redesign of the Timeline, Facebook had already introduced many such forced disclosures and changes that most of just had to accept, even if it might have had us fuming. However, with this change, Facebook has now started showing exactly what it can do in building your public profile and creating information about you, without your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their lame PR spiel, the company tried to pass it off as a freebie that they were gifting their users. But anybody who was not born yesterday realises that this is a desperate attempt to make a floundering service work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook messaging may work despite the clunky user interface, but its email services remain terribly underused. One of the paradoxes for this lies in the fact that you cannot open a Facebook account without a primary email account with another service, which is used as your authentication as well as the system through which Facebook notifications work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, many times, when introducing Facebook to first-time users of the web, we have to first train them in creating and using an email account before they can get on to the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, when Facebook did offer users the option of using a Facebook email service, most of them politely declined because nobody in their right mind is going to migrate to new a email services unless there was a substantial range of benefits being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how did Facebook respond? It just forced the email service upon its millions of users. While this is no different from the other kind of restrictions that are imposed upon us within the Facebook universe – the advertisements we see, the design and layout, the insipid white-and-blue background, the kind of information we can and cannot share and display – etc. this is the first time that Facebook actually added to our information profile and displayed it to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which means, that the next time somebody looks you up on Facebook – and let’s face it, one of the things we all use Facebook for, is to find people we know and get connected with them – they will see your Facebook email id listed as your contact address. And while you might get a notification in your primary email about any mails that you receive in your Facebook account, the fact is that, all those emails will become a part of Facebook’s huge data farms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a move that is almost a pale imitation of Google’s growing monopoly over our private information, Facebook seems to be now looking to expand its data empires. However, while Google did it through strategic design and marketing, offering innovations and incentives for its users to use their services, Facebook seems to have decided to build a Trojan horse and sneak these services in through the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this might not seem a big deal right now, it has deeper repercussions for what this corporate behemoth can do, not only with our data, but also to our data that we think is actually our own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If your alarm bells aren’t already ringing, they should be, as Facebook demonstrates a blatant abuse of the trust that we have put in its system, to keep our private data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The million dollar question – or maybe a slightly reduced price, given its public listing status on the stock-exchange right now – is that while Facebook might keep us safe from other people using our data, will it also be able to keep us safe from itself?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/how-facebook-is-blatantly-abusing-our-trust-359263.html"&gt;&lt;span class="visualHighlight"&gt;Read the original here&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust'&gt;https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-28T12:42:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy">
    <title>Beyond Anonymous: Shit people say on Internet piracy</title>
    <link>https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy</link>
    <description>
        &lt;b&gt;This post is a series of provocations around piracy, censorship and the state of Internet in India. Like all good tasting things, these observations need to be taken with a pinch of salt. But it is the hope of the author that this serves as a response to otherwise very persistent voices that have been demonizing file-sharing online.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/beyond-anonymous-shit-people-say-on-internet-piracy-335588.html"&gt;Firstpost published Nishant Shah's column along with the video that CIS and ALF had made on 'shit people say about piracy' as a lead story on June 7, 2012&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;9 June is going to be a big day in India, for all concerned with internet regulation, censorship and the current attacks on file-sharing.&lt;/p&gt;
&lt;p&gt;The International Hacker group Anonymous – a group that has become iconic with its members wearing Guy Fawkes mask as they mobilise protest and hacker attacks on what they see as tyrannical regimes – has called for marched protests in 16 Indian cities, to demand a free and open Internet.&lt;/p&gt;
&lt;p&gt;They have already started launching Denial of Service attacks and taking down websites owned by the Indian government to express their displeasure about the recent regulation of the internet. Whether or not their guerrilla tactics are efficient and effective, in the right or not, is something that has been discussed quite popularly.&lt;/p&gt;
&lt;p&gt;There are hordes of people who think of them as the NewAge Mutant Ninja Hackers, who are protecting our digital worlds from being clamped down. There are others who paint them as the Big Bad Wolf who huffed and puffed and will blow our houses away.&lt;/p&gt;
&lt;p&gt;You might be sympathetic, suspicious or scared of the emergence of such a ‘crowd vigilante’, sporting the slogan that has spawned Internet memes galore – Y U No Wake up? – But there is no doubt that the rise of such a collective signals how discourse around piracy, rights, and openness is no longer in the domain of the uber-geek and the academic researcher.&lt;/p&gt;
&lt;p&gt;These are concepts with very material realities that affect our everyday functioning and require not only better policies but also a more nuanced public discourse. Today, I look at some of the most ludicrous things that have been said about file-sharing, around the world, wondering why this idea of sharing has evoked such startling responses from different quarters.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and depression&lt;/strong&gt;: There has always been a concern about the physical well-being of internet users. From Internet addiction rehabilitation clinics in China to online support groups for internet addicts (I swear I am not making this up!), from doctors worried about posture and eye-sight to mothers concerned about violent video games, we thought we had heard it all.&lt;/p&gt;
&lt;p&gt;And then came the extraordinary study that suggested that file sharing might lead to depression. Or rather, if you are an avid file-sharer on the internet, you are prone to attacks of depression. This had the twitter world abuzz, where people were trying to make sense of this ‘scientific’ study that connected spending long hours on the interwebz with mental illness. A trending tweet just about summed up the situation, when it said, “File sharers are depressed only because of what is done to them when they share”.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and jobs&lt;/strong&gt;: There was a time when the Music and Film Industry Associations (MAFIA) around the world used to protest file sharing by painting a romanticised picture of the independent starving artists, from whose mouths, we stole morsels, as we shared their work without paying for it. But that argument collapsed in the days of Napster (remember that?) and it has been proven over and over again, that the artist almost always benefits from their work being shared.&lt;/p&gt;
&lt;p&gt;However, lately, research from respectable universities (expensively funded by respectable interested parties) have started hitting the real you, rather than the imagined artist. Every torrent being downloaded on the web is correlated with a lost job, because these companies can no longer afford to hire as many people as they used to, because of the growing losses. And then it goes into complicated mumbo-jumbo about how that one torrent that sits merrily on your computer, actually affects all the jobs to kingdom come and will be responsible for your children’s unemployment.&lt;/p&gt;
&lt;p&gt;They remain silent about the jobs lost because of the funding that went into buying supporting this research.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I am not a Pirate&lt;/strong&gt;: And lest you go away with the idea that the rest of the junta does not gaff, here are some of the gems that have come our way while working with people in the field. It is common, for instance, for people to take a moral stance on piracy, radiating a holier-than-thou ethical persona, without realising that recording that last IPL match to watch later on your tablet is also an act of piracy.&lt;/p&gt;
&lt;p&gt;Then there are those who only consume material pirated by others, happily ignoring the fact that the ring-tone that they copied from their friend is also an act of piracy. Ditto, people who claim “I am not a pirate”, meaning that they haven’t yet figured out the bittorrent system and hence go to the local corner shop to buy pirated DVDs of the latest releases. In their heads, they have paid somebody for the material and hence it must be alright.&lt;/p&gt;
&lt;p&gt;Piracy is not a one-point source process. It is a networked ecosystem, and I am still to find that one person who has never shared anything and make a video of them saying “I am not a pirate”. But that is probably just wishful thinking.&lt;/p&gt;
&lt;p&gt;There are many more such instances which make your mind boggle and your eyes goggle and you wonder if you heard it right for the first time. Do share your favourite ones if you can. In the meantime you might also want to look at the &lt;a class="external-link" href="http://youtu.be/xYjqe_n3sv8"&gt;new meme video ‘Sh!t People say about Piracy’&lt;/a&gt; that captures some of these responses in their absurdity.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;iframe src="http://www.youtube.com/embed/xYjqe_n3sv8" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;
&lt;p&gt;(Video by The Centre for Internet and Society , and the Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Follow the video on &lt;a class="external-link" href="http://www.youtube.com/watch?v=xYjqe_n3sv8&amp;amp;feature=youtu.be"&gt;YouTube&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy'&gt;https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T14:01:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change">
    <title>IPv6: Embrace The Change</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-embrace-the-change</link>
    <description>
        &lt;b&gt;A moment of transition is always filled with anxiety. There is concern over the unknown and there is a reluctance to move out of the familiar. However, a transition does not necessarily mean migration; or in other words, as we transition to  IPv6 as the new protocol for digital and electronic communication, it does not mean that we are going to abandon the internet as we know it.&lt;/b&gt;
        
&lt;p&gt;In fact, for most of the users, it is going to be a transparent transition, where their devices are going to be able to harness the powers of IPv4 and 6. While there are huge benefits at the back-end, leading to better security protocols and low maintenance, there are a few advantages that the user should also celebrate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Faster Internet&lt;/strong&gt;: Because IPv6 will open up a huge range of IP addresses, direct routing of data becomes a possibility. As data does not have to be routed through many servers or nodes within a network, it can reach its destination faster. With the way our digital access and sharing is going right now, this is not to be taken lightly. In many ways this is the same transition we had from the dial-up connections, where the transfer of picture and video files within minutes was totally unheard of, while now we’re in an age where we stream high density video on all our computing devices with ease.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More collaborative and shared Internet&lt;/strong&gt;: With the abundance of IP addresses coming our way, there is going to be more scope for multiple devices to be connected online. New platforms of collaborative knowledge production and sharing can be designed to become infinite and inclusive in their scale and architecture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More connected devices&lt;/strong&gt;: The inter-operability features of IPv6 ensure that more devices are able to communicate with each other with ease. The science-fiction futuristic dream of a completely connected environment where human and artificial intelligence can work together, using a range of devices, is actually a material possibility with large scale IPv6 implementation. This can also trigger new innovation that helps reconstruct some of our existing devices in new forms and shapes.&lt;/p&gt;
&lt;p&gt;While affordability and the migration to new network infrastructure are the gating factors to this transition, these are diminishing costs and we are looking at more interesting internet architecture as we move towards IPv6. Perhaps, one of the most reassuring points of this transition is that we do not need to abandon the familiar internet we are already working with; the transition is not a moving on, but a moving to, and in it are the promises of a safe, secure and speedy internet. Global technology organisations like Tata Communications &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;have embraced this change&lt;/a&gt;; it’s only a matter of time before others too recognise the need for IPv6 and the huge difference it will make to our lives.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by Tata Communications and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-embrace-the-change'&gt;https://cis-india.org/internet-governance/ip-v-6-embrace-the-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T06:09:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
