The Centre for Internet and Society
https://cis-india.org
These are the search results for the query, showing results 2931 to 2945.
UID is an invasion of privacy: Experts
https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts
<b>The Nandan Nilekani headed Unique Identification Authority of India (UIDAI) came in for much criricism at the first of a series of debates on the issue organised in the city on Friday - Deccan Chronicle, April 17th.</b>
<p><br />Bengaluru, April 16: Legal experts and several ordinary people find the move to give all citizens of the country an identity number an invasion of their privacy. The Nandan Nilekani headed Unique Identification Authority of India (UIDAI) came in for much criricism at the first of a series of debates on the issue organised in the city on Friday.</p>
<p>Participants found the idea of concentrating so much power in one authority frightening. One of the panelists Usha Ramanathan of the Centre for the Study of Developing Societies said that in two or three years people would not be able to travel without carrying their identity numbers on them. "The logic behind this is that if you don't have a number, you don't exist. Our personal information will be fed into the systems of various agencies with a certain set of people handling that data. Allowing so much power in the guise of security is handing too much control to the State," Ms Ramanathan said.</p>
<p>Malavika Jayaram of the Centre for internet and Society, described the UID as “a technological solution to a problem that isn't even technological in nature.”</p>
<p>Gautam John of Pratham Books, however, felt that a mechanism such as the UID could help identify school dropouts and in tracking quality of education.</p>
<p>But most complained about a lack of clarity on the issue</p>
<p><a class="external-link" href="http://www.deccanchronicle.com/bengaluru/uid-invasion-privacy-experts-908">Link to the original article.</a></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts'>https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts</a>
</p>
No publisherradhaInternet Governance2011-04-02T12:33:19ZNews ItemExperts debate on UID and rights
https://cis-india.org/news/experts-debate-on-uid-and-rights
<b>Bangalore, Apr 16, DHNS:
A debate on ‘UID and Fundamental Rights’ organised by several city-based organisations, discussed the social, ethical issues, economic and legal issues that accompanies the UID. </b>
<p>Noted law researcher Usha Ramanathan said that according to available information, UID would tap into National Population Registry and gather data and biometrics of the whole population. “UID by itself would not result in profiling, but will act as a bridge between silos of information that will help profile the individual,” she noted.</p>
<p>She also said that lack of answers for issues that were raised six months ago were disturbing. “It is not just about privacy, but the power of the state as the UID will be feeding off many registers,” she added.</p>
<p>Speaking on the economics side of it, R Ramkumar from the Tata Institute for Social Sciences, Mumbai, said claims of financial inclusion or elimination of corruption in Public Distribution System and the rural employment guarantee scheme was not enough justification. “Service delivery cannot justify the violation of freedom. It is a misplaced emphasis on benefits of technology,” he remarked.</p>
<p>He criticised the government’s thinking that technology could substitute social transformation, commenting that technology could only aid social development in the presence of conducive circumstances and it would be erroneous to assume a linear relationship between development of technology and development of society.</p>
<p>Col Thomas Mathews of the Citizens Action Forum said that UID could not prevent corruption as technology has to be used by people and new ways would be devised to deprive deserving people of the services.</p>
<p><a class="external-link" href="http://www.deccanherald.com/content/64312/experts-debate-uid-rights.html">Link to the original article</a></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/news/experts-debate-on-uid-and-rights'>https://cis-india.org/news/experts-debate-on-uid-and-rights</a>
</p>
No publisherradhaInternet Governance2011-04-02T12:32:54ZNews ItemDoes the Safe-Harbor Program Adequately Address Third Parties Online?
https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online
<b>While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. </b>
<p>To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law. This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach. While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.</p>
<p>While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem. First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices. Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.</p>
<p><strong>The EU-US
Safe-Harbor Agreement</strong></p>
<p>In 1995, and based on earlier <a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html">OECD
guidelines</a>, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed<a name="_ednref1" href="#_edn1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [1]. The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU. After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly. </p>
<p>While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach<a name="_ednref2" href="#_edn2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> beyond the EU. Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights<a name="_ednref3" href="#_edn3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [2]. Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be <em>transferred </em>to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards<a name="_ednref4" href="#_edn4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [3].
</p>
<p>In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU. Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law. Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce. </p>
<p><strong>Social Networking
Sites and the Safe-Harbor Principles</strong></p>
<p>The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas. While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally. In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program. The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites. </p>
<p>Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed. These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement. The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure. </p>
<p>“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected. The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.</p>
<p>The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.</p>
<p>The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities. The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception. Facebook, for example,
has revamped its <a href="http://www.facebook.com/privacy/explanation.php">privacy
regime</a> several times, and gives explicit notice to users how their
information is being used. The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members. </p>
<p>With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services. For example, the <a href="http://www.networkadvertising.org/">Network Advertising Initiative</a>, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members. In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs. This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites<a name="_ednref5" href="#_edn5"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.</p>
<p>Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites. Of the most famous cases is <a href="http://www.beaconclasssettlement.com/">Lane et al. v. Facebook et al.</a>,
which was a class action suit brought against Facebook’s Beacon Advertising
program. The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices. The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites. This had included,
for example, the movie rentals a user had made through the Blockbuster website. </p>
<p>The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. The Beacon program was ultimately found to
be in breach of US law, including the <a href="http://epic.org/privacy/vppa/">Video
Privacy Protection Act</a>, which bans the disclosure of personally identifiable
rental information. Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar <a href="http://www.p2pnet.net/story/37119">Facebook Privacy Fund</a> dedicated to
privacy and data-related issues. Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s <a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly">privacy
changes</a> in late 2009, and the Google’s recently released <a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html">Buzz
application</a>.</p>
<p>Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program. For example,
Bebo <a href="http://www.bebo.com/Privacy2.jsp">reserves the right</a> to
supplement a social profile with addition information collected from publicly
available information and information from other companies. Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy. It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources. Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”? The right to review information
held by a social networking site is an important one that should be upheld. This is most notable as supplementary information
from outside social networking services is employed to profile individual users in ways which may
work to categorize individuals in undesirable ways.</p>
<p><strong>The Third Party Problem</strong></p>
<p>Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program. It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program. While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program. Facebook itself as a first party site may adhere
to the Safe Harbor Program. However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.</p>
<p>The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party. Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive. Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles. Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. This is the approach taken by
most social networking sites and their third parties.</p>
<p>It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC. The safe harbor website also <a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp">explicitly notes</a>
that the program does not apply to third parties. Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook. The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.</p>
<p>Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly <a href="http://www.facebook.com/policy.php">waives any guarantee</a> that third
parties will “follow their rules”. Prior to allowing third parties to access any
information about users, Facebook requires third parties to <a href="http://www.facebook.com/terms.php">agree to terms</a> that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information. Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”. Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles. In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.</p>
<p>As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector. However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise. Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate. However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles. Therefore, it remains
questionable as to where responsibility for third parties exactly lies. When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from? </p>
<p>While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed is worrisome. Facebook is required to ensure that third
parties provide “<a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp">at least the same
level of privacy protection</a>” as they do.
However, in practice, this has yet to become the case. A quick survey of twelve of the most popular
Platform Applications in the gaming category showed<a name="_ednref6" href="#_edn6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a>
that third parties are not granting their users the “same level of privacy
protection”[5]. For example, section 9.2.3
of Facebooks “<a href="http://www.facebook.com/terms.php">Rights and
Responsibilities</a>” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”. </p>
<p>However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users <em>before</em> they granted the application
access to the personal information, including that of their friends<a name="_ednref7" href="#_edn7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [6]. After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above. In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles. </p>
<p>For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”. This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.
Electronic Arts also maintains similar provisions for data retention in
its privacy policy. Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held. This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games. It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program. </p>
<p>In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model. Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context. Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches. The same is
likely to be true for governments, too. As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation<a name="_ednref8" href="#_edn8"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a> [7]. </p>
<p>In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate. While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook. This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern. If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”. </p>
<p>As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively. Imposing more stringent
responsibilities on safe harbor participants could be a positive step. It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties. However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices. The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.</p>
<div></div>
<div>
<hr align="left" size="1" width="33%" />
</div>
<p class="discreet"><a name="_edn1" href="#_ednref1"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a>[1] Official Directive 95/46/EC</p>
<p class="discreet"><a name="_edn2" href="#_ednref2"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a></p>
<p class="discreet"><a name="_edn3" href="#_ednref3"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a>[2] 95/46/EC</p>
<p class="discreet">[3] Ibid</p>
<p class="discreet"><a name="_edn4" href="#_ednref4"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a><a name="_edn5" href="#_ednref5"><span class="MsoEndnoteReference"></span></a>[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. <em>PET 2006</em></p>
<p class="discreet"><a name="_edn6" href="#_ednref6"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a>[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.</p>
<p class="discreet"><a name="_edn7" href="#_ednref7"><span class="MsoEndnoteReference"><span class="MsoEndnoteReference"></span></span></a>[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically opt out of this practice.</p>
<p class="discreet">[7]See<strong>
</strong> Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. <em>Cardozo Arts and Entertainment Law Journal</em> .</p>
<pre></pre>
<div>
<p> </p>
<p> </p>
</div>
<h2> </h2>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'>https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</a>
</p>
No publisherrebeccaPrivacyInternet GovernanceFacebookData ProtectionSocial Networking2011-08-02T07:19:34ZBlog EntryUnique Identity (UID) Project: A Debate on Fundamental Rights
https://cis-india.org/events/unique-identity-project
<b>A half day workshop on unique identity number and fundamental rights is being held on Friday, 16 April, 2010 at the Institute of Agricultural Technologists in Bangalore. The event is being co-organised by Citizen Action Forum, People's Union for Civil Liberties - Karnataka, Slum Janandolana – Karnataka, Alternative Law Forum and the Centre for Internet and Society.</b>
<p>In the past eight to ten months, there has been much talk about the introduction of the <strong>Unique Identification</strong> for all Indian residents, i.e., the UID. The scheme proceeds from the standpoint that solving the problem of identity will result in the fixing of many other social and economic problems. However, seen against the backdrop of work on a National Population Registry, the National Intelligence Grid and other schemes that focus on the collection of data on individuals, the potential dangers to privacy and other civil liberties need to be discussed along with the stated benefits of the UID project. Given that the key laws relating to the project are not yet enacted, this is a timely exercise and an opportunity to influence change.</p>
<p>While the project has been hailed as a 'gamechanger' and a welfare measure, many have expressed growing concerns about the UID and its implications for ordinary citizens. Many questions are being asked about the nature, status and aims of the scheme and its implementing authority. Countries such as the UK, Australia and the USA have found similar measures unworkable with serious probability of abuse. The cost of the UID scheme is estimated at several thousand crores of rupees. Given the risks that plague identity schemes generally, we felt the need to engage the larger public in an open debate about the UID and its proposed scope, implementation, benefits and risks. The UID would affect every citizen. How it would affect each individual is something everyone should consider before deciding how to engage with the government on this issue. With the viewpoint of different panelists, we hope to provide as much information as is available now to you and take the debate forward to make the spectrum of issues transparent. The organizers listed below would like to provide a platform to kickstart a healthy, open discussion about the potential benefits and pitfalls of the scheme. This event has been jointly organized by the Citizen Action Forum, People's Union for Civil Liberties-Karnataka, the Alternative Law Forum, and the Centre for Internet and Society.</p>
<p></p>
<div>
<div align="center"> </div>
</div>
<h1 align="left" style="text-align: center;">Agenda</h1>
<p><span class="SubtitleChar"></span><a name="table01"></a></p>
<table class="MsoNormalTable">
<tbody>
<tr>
<td colspan="2">
<div>
<div align="left"> </div>
<h1 align="left" style="text-align: center;">Social/Ethical Panel- 2:30-3:30 pm</h1>
</div>
</td>
</tr>
<tr>
<td>
<p><strong>Lead Presentation</strong></p>
</td>
<td>
<p class="Li">Usha Ramanathan, Centre for the Study of
Developing Societies</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 1</strong></p>
</td>
<td>
<p>Ashok Kamat, Pratham Books</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 2</strong></p>
</td>
<td>
<p>Dr. Dominic, Bangalore University</p>
</td>
</tr>
<tr>
<td>
<p><strong>Moderator</strong></p>
</td>
<td>
<p>Prof. Trilochan Sastry, IIM-B</p>
</td>
</tr>
<tr>
<td colspan="2">
<div>
<h1 align="center" style="text-align: center;">Economics
Panel- 3:30-4:30 pm</h1>
</div>
</td>
</tr>
<tr>
<td>
<p><strong>Lead Presentation</strong></p>
</td>
<td>
<p>R. Ramakumar, Tata Institute of Social Sciences</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 1</strong></p>
</td>
<td>
<p>Mathew Thomas, Citizens Action Forum</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 2</strong></p>
</td>
<td>
<p>Nandana
Reddy , Concerned for Working Children[*]</p>
</td>
</tr>
<tr>
<td>
<p><strong>Moderator</strong></p>
</td>
<td>
<p>Rajeev Gowda, IIM-B</p>
</td>
</tr>
<tr>
<td colspan="2">
<div>
<h1 align="center" style="text-align: center;">Legal Panel- 4:30-5:30 pm</h1>
</div>
</td>
</tr>
<tr>
<td>
<p><strong>Lead Presentation</strong></p>
</td>
<td>
<p class="Li">B K Chandrashekar, former Minister of Information, INC</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 1</strong></p>
</td>
<td>
<p>AN Jayaram, Former Additional Solicitor General of India and
Advocate General</p>
</td>
</tr>
<tr>
<td>
<p class="Li"><strong>Panelist 2</strong><strong></strong></p>
</td>
<td>
<p class="Li">Malavika Jayaram, Centre
for Internet & Society</p>
</td>
</tr>
<tr>
<td>
<p><strong>Panelist 3</strong></p>
</td>
<td>
<p>AR Nizamuddin, Former Director General of Police</p>
</td>
</tr>
<tr>
<td colspan="2">
<div>
<h1 align="center" style="text-align: center;">5:30-6:00 pm-
Wrap-up moderated by Vinay Sreenivasa and close with tea, coffee and snacks</h1>
</div>
</td>
</tr>
</tbody>
</table>
<p>[*] = To
be confirmed <em></em></p>
<p class="MsoNoSpacing"><em><strong>Please contact/RSVP at </strong></em></p>
<p class="MsoNoSpacing"> </p>
<p class="MsoNoSpacing">Ajoy Kumar /
Radha Rao</p>
<p class="MsoNoSpacing">Centre for
Internet and Society</p>
<p class="MsoNoSpacing">No.194, 2nd 'C'
Cross,</p>
<p class="MsoNoSpacing">Domlur 2nd
Stage,</p>
<p class="MsoNoSpacing">Bangalore 560071</p>
<p class="MsoNoSpacing">P: +91 80 25350955</p>
<p class="MsoNoSpacing">W: <a href="http://www.cis-india.org/">www.cis-india.org</a></p>
<p class="MsoNoSpacing">E: <a href="mailto:ajoy@cis-india.org">ajoy@cis-india.org</a>,
<a href="mailto:radha@cis-india.org">radha@cis-india.org</a></p>
<p class="MsoNoSpacing">M:
+919845492122</p>
Videos
<p> </p>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfgRgA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfgdQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfhOAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfiCgA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfiTwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdflOQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdflbwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfmQAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfmVwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfnQAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdfoHwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiuLAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiwMgA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiwYwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdixKQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdiyHwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduFRAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduGCAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduGWQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduHYAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduJLAA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgduNfQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz7ZQA"></embed><embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz8NwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz8fQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgdz%2BcwA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgd2AHQA"></embed>
<embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/g_dIgd2DUAA"></embed>
<p>
For more details visit <a href='https://cis-india.org/events/unique-identity-project'>https://cis-india.org/events/unique-identity-project</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-05T04:08:17ZEventExpel or not? That is the question
https://cis-india.org/news/expel-or-not
<b>The decision of an international school to expel 14 students for their alleged ‘promiscuous’ behaviour has led to much debate and discussion. </b>
<p>The International School Bangalore (TISB) said the students were caught in ‘compromising positions’ on several occasions. They did not heed the school’s repeated warnings to desist from such behaviour, school authorities said.<br /><br />The authorities said they had enough ‘evidence’, collected from social networking sites, to support their claim. The students would not be allowed on the campus anymore. They would, however, be allowed to take the exam in May, the authorities said.<br /><br />The students have denied the charges. Many boarding institutions said that policing students was not the right approach.<br /><br />Some of the widely used measures to keep a check on students include monitoring social networking sites, banning laptops on campuses, not allowing students to lock room doors, having security guards patrol campuses and insisting on house masters accompanying students to any part of the campus or hostel after school hours.<br /><br />“There is no point in expelling students for such an activity,” M Srinivasan, principal, GEAR School, said. “If the students had been indulging in such activities often, what were the school authorities doing till now? There is no point making rules if you cannot enforce them. Clearly, there was a lacuna in the system,” he said.<br /><br />Many schools said they keep a tab on the online activities of students. “The IT department at the school tracks the Facebook accounts of students,” Bishwajeet Bhattacharya, public relations officer, Trio World School, said. “Trio also has a presence on Facebook. The administration has appointed officials to monitor what is being posted online regarding Trio,” he said. The officials also look for objectionable materials.<br /><br />Authorities, however, admitted that it was difficult to check all the online activities. “It is impossible to monitor all the social networking sites. You can use evidence from online sites, but why go to that extreme? The children are on your campus, their behaviour on campus is what you should be concerned about,” Srinivasan said.<br /><br />“At the hostel, dorm wardens conduct room checks every hour,” Chenraj Jain, chairman, Jain Group of Institutions, said. “We don’t police the students. Instead, we adopt a more holistic approach,” he said.</p>
<h3>The grey area</h3>
<p><strong>The International</strong> School Bangalore (TISB) said it had expelled the 14 students after collecting “enough evidence”<br />from social networking sites about their inappropriate behaviour. The question is: does online content have<br />legal validity?</p>
<blockquote>
<p>Experts believe it falls in the grey area. “India does not have any specific law that restricts users from joining social networking sites just because they are below a certain age,” Sunil Abraham, executive director of the Centre for Internet and Society, Bangalore, said. “Many other countries have such laws,” he said.</p>
<p>“If the pictures said to be posted by the students were legal (devoid of vulgarity) and were just posted on a personal profile and not on a college group, then the school was not right in expelling them,” he said. “Students are entitled to privacy and schools shouldn’t be intruding into their privacy. If the school had used snooping software to monitor the students’ online activities, then that is also wrong,” he said. “It’s a different story if one of their classmates had forwarded the pictures to the teacher,” he added.</p>
</blockquote>
<p>For link to the <a class="external-link" href="http://www.dnaindia.com/bangalore/report_expel-or-not-that-is-the-question_1366490">original story</a></p>
<p>
For more details visit <a href='https://cis-india.org/news/expel-or-not'>https://cis-india.org/news/expel-or-not</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-02T12:48:28ZNews ItemMarch 2010 Bulletin
https://cis-india.org/about/newsletters/march-2010-bulletin
<b>Greetings from the Centre for Internet and Society! We bring you updates of our research, news, and events for the month of March 2010 in this bulletin.</b>
<h3><b>News Updates</b></h3>
<p class="ecxmsonormal" style="text-align: justify; "><b>An Open Answer to Office</b><span style="text-decoration: underline;"><br /> </span>OpenOffice with its new features is giving Microsoft Word tough competition, says Deepa Kurup in this article published in The Hindu.<br /> <a href="https://cis-india.org/news/open-office" target="_blank">http://cis-india.org/news/open-office</a></p>
<h3><b>Upcoming Events</b></h3>
<p class="ecxmsonormal" style="text-align: justify; "><b>CPOV: Wikipedia Research Initiative</b><span style="text-decoration: underline;"><br /> </span>The second WikiWars conference will be held in Amsterdam from 26 to 27 March 2010<br /> <a href="https://cis-india.org/research/conferences/conference-blogs/cpov" target="_blank">http://cis-india.org/research/conferences/conference-blogs/cpov</a></p>
<p class="ecxmsonormal" style="text-align: justify; "><b>CI Global Meeting on A2K</b><span style="text-decoration: underline;"><br /> </span>CIS is a co-sponsor of the Consumers International Meeting on A2K to be held in Kuala Lumpur, Malaysia on April 21 and 22, 2010.<br /> <a href="https://cis-india.org/events/ci-global-meeting-a2k" target="_blank">http://cis-india.org/events/ci-global-meeting-a2k</a></p>
<h3><b>Research</b></h3>
<p class="ecxmsonormal" style="text-align: justify; "><b>India Game Developer Summit Bangalore 2010</b><span style="text-decoration: underline;"><br /> </span>The India Game Developer Conference held at Nimhans Convention Centre on the 27th of February, 2010 was attended by Arun Menon who is working on The Gaming and Gold Project at The Centre for Internet and Society. The Developer forum brought together game developers from different sectors of the Game Production Cycle, with hardware manufacturers like Nvidia demonstrating their latest 3d technology and Software developers like Crytek and Adobe demonstrating the latest in developer tools for creating and editing games on multiple platforms.<br /> <a href="https://cis-india.org/research/cis-raw/histories/gaming/india-game-developer-summit-in-bangalore-2010" target="_blank">http://cis-india.org/research/cis-raw/histories/gaming/india-game-developer-summit-in-bangalore-2010</a><br /> <br /> <b>10 Legendary Obscene Beasts</b><br /> Nishant Shah analyses a peculiar event of vandalism which has now become the core of free speech and anti-censorship debates in mainland China. Looking at the structure of user generated knowledge websites and the specific event on the Chinese language encyclopaedia, 'Baidu Baike', he shows how, in cities where spaces of political spectacle and public protest are quickly diminishing, the Internet has become a tool for producing new public spaces of demonstration and protest.<br /> <a href="https://cis-india.org/research/grants/ISShanghai/itcity4" target="_blank">http://cis-india.org/research/grants/ISShanghai/itcity4</a></p>
<p class="ecxmsonormal"><b>WikiWars - A report</b><br /> In this blog, Nishant Shah analyses about the WikiWars, the first of the three events held in Bangalore on January 12 and 13.<br /> <a href="https://cis-india.org/research/conferences/conference-blogs/wwrep" target="_blank">http://cis-india.org/research/conferences/conference-blogs/wwrep</a></p>
<h3><b>Telecom</b></h3>
<p class="ecxmsonormal"><b>Understanding Spectrum</b><span style="text-decoration: underline;"><b><br /> </b></span>What is spectrum and how do government and commercial decisions on this scientific phenomenon affect public facilities and costs? Shyam Ponappa examines this in his latest blog published in the Business Standard on March 4, 2010.<b><br /> </b><a href="https://cis-india.org/advocacy/telecom/blog/understanding-spectrum%0c" target="_blank">http://cis-india.org/advocacy/telecom/blog/understanding-spectrum</a></p>
<p>
For more details visit <a href='https://cis-india.org/about/newsletters/march-2010-bulletin'>https://cis-india.org/about/newsletters/march-2010-bulletin</a>
</p>
No publisherpraskrishnaAccess to KnowledgeDigital NativesTelecomIntellectual Property RightsAccessibilityInternet GovernanceCISRAWOpenness2012-08-13T05:02:42ZPageSense and censorship
https://cis-india.org/internet-governance/blog/sense-and-censorship
<b>Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express.</b>
<p>Some believe that Google’s co-founder Sergey Brin’s memories as a six-year-old in the former Soviet Union has inspired Google’s crusade against censorship in China. However, as Siva Vaidhyanathan, author of upcoming book The Googlisation of Everything, notes in a recent blog post — this “isn’t a case of Google standing up for free speech....but about Google standing up against the attacks.”</p>
<p>He was referring to the attacks on Google’s servers that originated from China mid-December last year. Anyone running a multi-billion dollar enterprise online would be well attuned to the security threats posed by anarchists, crackers, spammers and phishers on a daily basis. So what made the recent Google attacks so special? According to Google, intellectual property was stolen and two human-right activists accounts were compromised during the attack. So which was the straw that broke the camel’s back — intellectual property or human rights? Google could have spoken out against censorship years ago — after all it still censors search results in more than 20 countries, including India. Although there is no official channel or protocol guiding censorship practices in India, Google is regularly contacted by government officials and continues to delete web content deemed sensitive according to various ethnic, political and religious groups. Human rights activists note that Google offers some token resistance and then usually complies with the state’s demands. Google’s deputy general counsel, Nicole Wong, justifies her cooperation with the authorities citing the Indian way of torching buses during riots. Therefore it is odd that the US government endorses Google’s selective idealism in China. One week after the attacks, Hillary Clinton decided to lecture the world on Internet freedom. Then, Google and the National Security Agency announced a collaboration to deal with future cyber-attacks. This was followed by Google honouring female bloggers in Iran, forcing cyber-ethnographer, Maximilian Forte to wonder on Twitter, “Is it just me, or is Google consistently joining the causes of the US State Department?” How is Google’s move, and recent White House support for a “free web”, to be understood? How is Google’s move consistent with the Obama administration’s goal of protecting US business interests across the globe? Such questions may tell us why Google is picking a fight with China rather than Saudi Arabia or Burma. The recent privacy disaster incited by the release of Google’s new social networking application Buzz became yet another occasion when many began to doubt Google’s high rhetoric about freedom of expression. When Buzz first made the social connections of Gmail users public without their consent, blogger Evgeny Morozov questioned the company’s logic in protecting the email accounts of Chinese human rights activists (ie, when they are happy to tell the rest of the world who those activists are talking to). According to Morozov, Google has only managed to capture 30 per cent of the Chinese search market, and he believes that Google was willing to sacrifice this market for some much need needed positive PR given after a storm of bad press after projects like Buzz and Wave. </p>
<p>It is clear that Google will have to fight such pressures towards greater control of the internet across the globe, China being no great exception. This week, Google and Yahoo have come out strongly in opposition to Australia’s plan to implement a mandatory ISP filter. Sometimes, a particular form of censorship serves a useful and necessary purpose — for example, Google and Microsoft were forced by the Indian Supreme Court in September 2008 to stop serving advertisements for do-it-yourself foetus sex determination kits. Given our daughter deficit, I would not have it any other way. However, in Thailand, such filtering takes the form of overly expansive lèse majesté laws which force ISPs to reveal details of individuals posting content deemed insulting to the monarch, Bhumibol Adulyadej — this practice leading to self-censorship and over-moderation on forums and mailing lists in Thailand.</p>
<p>Also, soon as traffic was redirected from Google.cn to Google.com.hk, Google advised its enterprise customers in China to use VPN (virtual private networking), SSH (secure shell) tunneling, or a proxy server to access Google Apps. These are circumvention technologies of choice for many Chinese cyber-activists, says Rebecca McKinnion, founder of Global Voices Online. In her recent congressional submission, she also points out that in China, online defiance has a very different history, perhaps best illustrated by the Mud Grass Horse Internet meme which was an obscene pun on a government media campaign aimed at national unity and harmony. In China, aesthetics rather than technology is the primary tool for subversive political speech. Also like in Burma and Saudi Arabia, offline piracy and pirated satellite television ensures that most citizens are able to access censored content. And the average Chinese netizen cannot tell the difference between Google censoring its own results and the Great Firewall censoring Google. Google’s recent actions has very little real impact on the state of censorship in China.</p>
<p>For original article in the <a class="external-link" href="http://www.indianexpress.com/news/senseandcensorship/596260/">Indian Express</a></p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/sense-and-censorship'>https://cis-india.org/internet-governance/blog/sense-and-censorship</a>
</p>
No publishersunilInternet Governance2012-03-21T10:15:15ZBlog EntryIndians Get Particular about Online Marriage
https://cis-india.org/news/indians-online-marriage
<b>The article quotes Nishant Shah's views on online behaviour of people seen elsewhere in the world.</b>
<p>From the overweight and transsexuals to people with HIV and those supposedly afflicted by negative planetary positions, the Internet dating game in India increasingly has a website for everyone.</p>
<p>And with Valentine's Day on Sunday, the specialist sites are seeing a rise in hits.</p>
<p>"There's always an increase in activity around this time of year," said Megha Singhal, who with her sister runs a portal for larger lonely hearts -- www.overweightshaadi.com.</p>
<p>"Valentine's Day is still a big deal here. Everyone wants a date," the 21-year-old economics student told AFP from New Delhi.</p>
<p>Marriage -- or "shaadi" in Hindi -- remains a cornerstone of society in conservative India, with hundreds of matchmaking sites concentrating on finding their members suitable life partners rather than casual dates.</p>
<p>Long-established portals like www.shaadi.com, www.bharatmatrimony.com and www.jeevansathi.com offer general searches. Would-be brides and grooms can be selected by age, caste, religion, language or where they live.</p>
<p>But Singhal and others say that niche matrimonial sites can often be more effective.</p>
<p>Yazdi Tantra, a computer consultant in Mumbai, runs www.theparsimatch.com, one of a number of websites for the dwindling community of followers of the ancient Zoroastrian faith.</p>
<p>"Essentially, Parsis like to marry within the community. It saves time rather than trawling through other multicultural sites to get a profile," he said.</p>
<p>Sanjeev Pahwa, head of the New Delhi-based firm Strikeone Advertising, said targeting niche groups made business sense as he realised smaller start-ups like his couldn't compete with the major players.</p>
<p>The result was www.bposhaadi.com, for call centre workers working unsociable hours, and www.govtshaadi.com, targeting state sector employees looking for love.</p>
<p>Another came about from the belief in Indian astrology that a Manglik -- a person born when Mars was in an inauspicious position in the skies -- is a bad match for marriage but that two Mangliks can cancel out its negative effects.</p>
<p>Now, www.manglikshaadi.com has more than 14,000 members, he said.</p>
<p>Since starting five years ago, Pahwa has introduced more sites, including for people with disabilities and the over 30s, who have preferred to further their careers before getting married.</p>
<p>Elsewhere, there are sites for hijras -- transsexuals and transvestites commonly known in India as eunuchs -- people with HIV and those who shun the officially banned, but still widely practised, dowry system.</p>
<p>Satya Naresh, who set up www.idontwantdowry.com, said the site is helping to break down traditional attitudes and a practice that can place an intolerable financial strain on families.</p>
<p>"We've been very successful in changing the mindset of people and hope it continues," he said from the southern city of Hyderabad.</p>
<p>For these Internet entrepreneurs, web access in India -- although still small at about 14 percent for broadband connections -- is good news for those looking for love.</p>
<p>"The Internet does make the access to a pool of suitable people much easier than matrimony in other times," said Singhal.</p>
<p>Nishant Shah, director of research at the Centre for Internet and Society, based in the IT hub of Bangalore, said the phenomenon reflected online behaviour already seen elsewhere in the world.</p>
<p>"As more and more people are going online they're going to replicate tight and personalised communities which are very local and bound by existing structures at the same time as trying to look more globally," he explained.</p>
<p>"The matrimonial sites are fairly indicative of that. We find people not going on to general websites but very narrow ones.</p>
<p>"It's not just matrimonial sites. Facebook, for example, looks like a very large community of users but when you look at friend networks you realise people connect in small and specialist networks.</p>
<p>"It reflects the old idea of 'birds of a feather stick together'."</p>
<p><a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5ip7NJMliQrRO7oQu7Mc7FYS6bc7g">For link to the original article</a></p>
<p>
For more details visit <a href='https://cis-india.org/news/indians-online-marriage'>https://cis-india.org/news/indians-online-marriage</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-04T06:48:58ZNews ItemCommunity Informatics: Successfully Applying Information and Communications Technologies as a Support to Local Economic and Social Development
https://cis-india.org/events/community-informatics-information
<b>Dr. Gurstein will present a talk on the current state of development in Community Informatics and facilitate a broader discussion on community based ICTs for local development and community empowerment as are currently applied in India and worldwide.</b>
<p>Community Informatics (CI), also known as community networking,
electronic community networking, community-based technologies or
community technology refers to an emerging field of investigation
concerned with principles and practices related to information and
communication technology (ICT) as it applies to enabling or empowering
communities or groups. It draws on insights on community development
from social sciences disciplines and applies these in the areas of
Information Studies and Information Systems. It is a cross- or
interdisciplinary approach interested in the utilization of ICTs for
different forms of community action, as distinct from pure academic
study or research about ICT effects.</p>
<p>Community Informatics is very closely linked to broader strategies
for ICT for Development that is the use of information and
communications technologies as a support to economic and social
development among and within less developed countries, regions and
marginalized populations. </p>
<p>Dr. Gurstein will give a brief introduction to the current state of
development in Community Informatics and facilitate a broader
discussion on community based ICTs for local development and community
empowerment as they are currently being applied in India and
internationally.</p>
<h3>The Speaker<br /></h3>
<p>Dr. Gurstein is currently Executive Director of the Centre for
Community Informatics Research, Development and Training (CCIRDT) in
Vancouver, Canada; Research Professor in the School of Management at
the New Jersey Institute of Technology (Newark); Research Professor in
the Faculty of Management at the University of Quebec (Ouatouais); and
Adjunct Professor in the Faculty of Information at the University of
Toronto. The CCIRDT has an affiliated organization based in Cape Town,
South Africa, and Memorandums of Agreement with Izandla Zethu
(Pretoria, SA) and currently being finalized with the the Bangladesh
Institute of ICT in Development (BIID) and with IT for Change (IT4C) an
NGO based in Bangalore, India.</p>
<p>He is the Editor in Chief of the <a class="external-link" href="http://ci-journal.net/">Journal of Community Informatics</a>
and Foundation Chair of the Community Informatics Research Network. He
currently has a continuing Advisory relationship with the (Canadian)
Northern Indigenous Communities Satellite Network in the creation of
its Research Consortium and is an Advisor to the EU funded N4C project
looking at telecommunications services for underserved and indigenous
people in Northern and Central Europe. He has consulted to the
governments of Canada, Australia, New Zealand, Malaysia, Nepal and
Jordan; to the Ford Foundation, the Hewlett Foundation, the UN
Development Program, and the European Union; and to Nortel, Mitel, Bell
Canada, and Intel among others.</p>
<h3>Date and Time</h3>
<p>February 25th, 2010, 05.00 pm to 07.00 pm.</p>
<h3>Venue</h3>
<p>Centre for Internet and Society, 2nd 'C' Cross, Domlur, 2nd Stage, Bangalore - 71</p>
<p>
For more details visit <a href='https://cis-india.org/events/community-informatics-information'>https://cis-india.org/events/community-informatics-information</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-05T04:13:17ZEventDe facebook
https://cis-india.org/news/de-facebook
<b>Facebook used to be our playground but privacy concerns are now souring that fantasy. Why do we trust a clutch of new corporations with such phenomenal amounts of personal data?</b>
<p>The age of privacy is over, Facebook’s fresh-faced founder and CEO Mark Zuckerberg declared a couple of months back. Social norms have shifted. We are now used to living out loud. “When I got started in my dorm room at Harvard, the question a lot of people asked was, ‘Why would I want to put any information on the internet at all? Why would I want to have a website?’” he said.</p>
<p>That paranoid past is behind us, claimed Zuckerberg, justifying Facebook’s controversial new decision to fling open the curtains and make maximum visibility the new normal. “In the last five or six years, blogging has taken off in a huge way, and (there are) just all these different services that have people sharing all this information,” he said.</p>
<p>In other words, get over the stage fright. Everyone else is out there over-sharing, arguing, preening, and generally acting out online.</p>
<p>In June last year, Facebook sneaked in a feature called the Everyone update. This makes it much like Twitter, and also allows it to share with and sell information to search engines like Google, Bing or Yahoo. “Facebook’s privacy changes are relevant as it tries to compete with real-time search on platforms like Twitter. It does give you an option to work around that though I am certain the whole process of setting privacy preferences could be a lot more intuitive,” says Sidharth Rao, digital industry watcher and CEO of internet marketing firm Webchutney.</p>
<p>On the surface, the new Facebook settings are better and much more malleable, if you can figure out how to work them — you can now choose, per post, what you want different sets of people to see. They have eliminated regional networks which would unwittingly expose you to an entire city sometimes (meaning that not everyone who is on the Delhi network, say, has automatic access to your information if you are in Delhi). But on the other hand, the default setting that Facebook recommends is deeply problematic. You, your profile picture, current city, gender, networks, and the pages that you are a “fan” of are all “publicly available information”. Earlier, you could make sure only your friends saw the rest of your friends — now, that option no longer exists as a setting.</p>
<p>Wasn’t privacy once a Facebook fundamental? Unlike the seedier environments of Orkut or Myspace, Facebook grew out of a small Harvard community, expanded to cover other East Coast schools, then conquered companies and countries. In September 2006, Facebook opened registration to anyone with an email address. But it was extremely cautious about how it engineered interaction. In essence, you were meant to socialise with people you already knew.</p>
<p>“It felt safer. It wasn’t about random people sending you scraps and stalking you, like on Orkut or whatever. Facebook reflected my real world. It kept you loosely, comfortably connected to so many people”, says Nomita Sawhney, a young Delhi-based architect. Unlike the threat of cyberstalking, intimidation, and impersonation that stalk less selective networks, Facebook remained clear of what media scholar Danah Boyd calls ‘stranger danger’. Only two years back, Zuckerberg told tech blogger Marshall Kirkpatrick that privacy “is the vector around which Facebook operates”. <br /><br /></p>
<h3>I Like To Watch</h3>
<p><br />Why are these changes such a big deal? Zuckerberg’s claim about privacy rings true for most unself-conscious Facebookers. After all, only recently, bra colour status updates were the big buzz on Facebook, ostensibly in support of breast cancer awareness. Now, it’s doppelganger week, where you tell the world what celebrity you most resemble. You can take dippy quizzes, remember birthdays, discuss the news, giggle over pictures. Grim warnings about corporate avarice and government spying sound faintly ridiculous in this pleasant context.</p>
<p>Social networks and blogs have certainly reconfigured privacy. Anyone who’s spent time on Facebook knows the impulse to meander through the pages and pictures of people in that amorphous category called ‘friends of friends’. In just a few years, we have got used to the thought that our lives are externalised and sprawled out for near-strangers to see.</p>
<p>In fact, Facebook is now the largest photo site in the world. When you join Facebook, under its Terms of Service, you give it a “license” (that is, legal permission) to use your content “on or in connection with the Facebook Service or the promotion thereof.” It takes some effort to realise how recent all this is, that it’s still a great unfolding experiment, and that we are granting these companies fabulous power. <br />In his recent book, The Peep Diaries: How We’re Learning to Love Watching Ourselves and Our Neighbors, cultural critic Hal Niedzviecki describes the digital glasshouse: “Peep culture is reality TV, YouTube, Twitter, Flickr, MySpace and Facebook. It’s blogs, chat rooms, amateur porn sites, virally spread digital movies of a fat kid pretending to be a Jedi Knight, cell phone photos — posted online — of your drunk friend making out with her ex-boyfriend, and citizen surveillance. Peep is the backbone of Web 2.0 and the engine of corporate and government data mining.”</p>
<p>Web 2.0 was the clunky name for a whole range of liberating personal expression platforms — from Flickr and Youtube to Livejournal and Facebook. These companies provide the space and you bring the party. They encourage you to feel right at home and treat these platforms like your lounge, confessional or salon. Meanwhile, they also collect and refine data about you, and often wield it without your awareness.<br />In its over-eagerness, Facebook has blundered into several privacy minefields before this—when it first introduced Newsfeed, pushing a steady stream of your friends’ status updates at you, it embarrassed and annoyed many. Boyd compared it to the experience of shouting to be heard at a party, when the music abruptly stops and everyone else can suddenly hear your careless small talk. Of course, it turns out Zuckerberg was right when he told users to “calm down and breathe”, and Newsfeed has been naturalised into the Facebook experience. Another, more scarring experience was Beacon — its attempt to track what users in the US bought on partner sites — and tell on them to their friends. After an avalanche of protests, Facebook backed down and modified the ad platform. It even employs a chief privacy officer to address our fears.</p>
<p>In the early days, Facebook generated awkwardness because it didn’t respect context — the fact that you wear and cast off selves depending on who you’re interacting with, your crazy roommate or your conservative grand-aunt who decided to befriend you online. “It is the problem that arises when worlds collide, when norms get caught in the crossfire between communities, when walls that separate social situations come crashing down,” writes Chris Peterson of the University of Massachusetts, who has studied Facebook’s privacy architecture.</p>
<p>But now you can tweak settings and set up differential access. People have figured out how to work Facebook and not get burnt. “Profile pictures flatter, tagged pictures shatter,” says Priya Singh, a twenty-something law student, with a laugh. “You never know what someone’s going to put up and who’s going to see what. I don’t want everyone to see drunken party pictures, and so I’ve just learnt to place family on a new level of privacy settings.” And that’s the general pattern on Facebook: most people have learnt to adjust to the public glare, after some initial blinking and bemusement. <br /><br /></p>
<h3>Privacy from Whom?</h3>
<p><br />You can segment your social world as minutely as you like, but that doesn’t mean your life is any more private. It’s not just the fact that potential employers can scan and dismiss you, or current employers keep tabs — though such stories abound. For instance, MIT’s Gaydar research project discovered that you can identify a person’s sexual preferences by studying who their friends are on Facebook, even if they have avoided sharing that information in their profile.</p>
<p>But perhaps we have been gulled into thinking that the whole privacy fuss is about each other. “It’s very clever of Facebook to foreground this aspect of control. Your other friends, pictures, the games you play — that’s something we regularly give out anyway”, says Nishant Shah, director of the Bangalore-based Centre for Internet and Society. “But Facebook is not a single entity — it is a collection of third party apps (applications) that we have no control over. A simple birthday calendar can harvest all your data, all your online traces and you grant it access without knowing it,” he says. So Facebook makes a big show of protecting you from your acquaintances, even as it sells your information continuously.</p>
<p>This becomes a much bigger possibility when it comes to search engine integration, which allows the open flow on Facebook to be harnessed for perfect reach and recall.</p>
<p>To get a clearer sense of what’s at stake with these influential corporations, take a more powerful example: Google.com. Every day, we confide our trivial confusions, our deep doubts to one willing ear. And these billions of broken questions can add up to an eerily accurate picture of the world. But do you search Google or does Google search you? “Google can track you across applications: email, search, blogs, pictures and books read. That means they can profile you in a very detailed, exhaustive way, and they do,’ says Rahul Matthan. “They never delete information, and they’re getting progressively more intelligent about you, as they make search more relevant with features like Google Suggest.” As technology scholar Siva Vaidyanathan puts it, “we have to realise that we are not Google’s customers. We are its product. We are what Google sells to advertisers.” These behaviourially targeted ads are the most perfect, evolved form of advertising so far and in concept, the least annoying, because they are customised to you. Google has promised that its information is utterly secure and that search logs are anonymised after a certain period.</p>
<p>It provides limited disclosure of outside ads, lets users manage the categories that Google has assigned to them and tinker with it for a more accurate picture and also provides an opt-out option. But Search 2.0 is a scary beast — it can also facilitate social control and surveillance. Your online activities are not scattered across applications any more, Google can hear what you tell Facebook.</p>
<p>While selling us stuff more efficiently is probably a good thing, what happens when this intimate knowledge shades into active surveillance? Even if we live in countries where rights are respected, “we give out enough personal information in an innocuous way to a single repository. They are sitting on top of a very valuable resource, and all this information can easily be reverse-engineered to reveal specifics about you,” says Rahul Matthan, technology lawyer and founder-partner of Trilegal.</p>
<p>In India, we are even more oblivious to such stealthy watching. “Privacy concerns here are lesser than in the West, where they’re so dependent on digital ID. There, if someone impersonates you or overdraws credit limits, it could affect your house, your job,” says Matthan.</p>
<p>Privacy legislation doesn’t really exist in India — the right to keep personal information confidential has only been articulated as protection against state action. “There’s no easy legal recourse to being thoroughly spied on by a company,” says Matthan (Europe has enforced data protection directives since 1984 — you can control what information is gathered about you, and how it is used. While the US has somewhat diluted laws, personal information is still strongly guarded). While it’s tempting to think that you have nothing to hide, you are acceding to a set-up where outliers can be identified and dealt with. Privacy matters, no matter how unexceptionable your own life. So what’s to be done? “Holding Facebook and other companies to account is crucial. We must set up legislations by which people can look back, ask exactly what about their activity is being tracked. They have to treat consumers as peers,” says Shah. “If Facebook can gaze at us, we must be given the right to gaze back at its functioning — it has to be a peer-to-peer relationship.”</p>
<p>So far, Facebook and the Googleverse and Twitter are still our friends and enablers. But as they amass more and more power, it is better to see them as fallible companies rather than confidantes, and to make sure that they account for our information. </p>
<p>For original article on the <a class="external-link" href="http://www.indianexpress.com/news/de-facebook/576119/0">Indian Express</a></p>
<p><br /><br /><br /></p>
<p>
For more details visit <a href='https://cis-india.org/news/de-facebook'>https://cis-india.org/news/de-facebook</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-02T13:41:13ZNews ItemReport on the Fourth Internet Governance Forum for Commonwealth IGF
https://cis-india.org/internet-governance/blog/report-on-fourth-IGF
<b>This report by Pranesh Prakash reflects on the question of how useful the IGF is in the light of meetings on the themes of intellectual property, freedom of speech and privacy.</b>
<p>The first Internet Governance Forum was held in Athens in 2006, as a follow on to the 2005 Tunis World Summit on the Information Society, and to fulfil the principles drawn up at there. Its explicit objective is to “promote and assess, on an ongoing basis the embodiment of WSIS principles in Internet governance processes”. Those principles still form the basis of the talks that happen at the IGF, and are frequently referred to by the various groups that attend the IGF as the basis for their positions and claims. Sometimes, some of the values promoted by the principles are claimed by opposing groups (child safety vs. freedom of expression). Thus, in a way the negotiation of those principles were what really set the tone for the IGF, which in and of itself is a process by which those principles could be furthered. The one question that formed part of people’s conversations through the fourth Internet Governance Forum (IGF) at Sharm el Sheik, as it had in third IGF at Hyderabad, and no doubt ever since the first edition, was “How<br />useful is the IGF?” This report shall reflect on that question, particularly based on the workshops and meetings that happened around the themes of intellectual property, freedom of speech, and privacy.</p>
<p>There are not many meetings of the nature of the IGF. It is not a governmental meeting, though it is sponsored by the United Nations. It is not a meeting of civil society groups, nor of academics nor industry. It is a bit like the Internet: large and unwieldy, allowing for participation of all while privileging those with certain advantages (rich, English-speaking), and a place where a variety of interests (government, civil society, academia and industry) clash, and where no one really has the final word. While the transformational potential of the Internet and the World Wide Web have been felt by a great many, the potential of the Internet Governance Forum is still to be felt. This report, in part, seeks to present an apology of the IGF process, though it is the belief of this reporter that it could do with a few modifications.</p>
<h3>DAY 0 (Saturday, November 14, 2009)</h3>
<p>This reporter arrived with his colleagues at Sharm el Sheik late in the afternoon on Saturday, November 14, 2009, with the IGF set to begin the next day. Though we had been advised to register that evening itself, the fatigue of travel (in the case of my colleagues) and the requirement of purchasing new clothes to replace those in the suitcase that had been lost (in my case) kept us from doing so.</p>
<h3>DAY 0 (Sunday, November 15, 2009)</h3>
<p>The IGF began on Sunday, November 15, 2009, with a large delay. The registration desks seemed to have a bit of difficulty handling the number of people who were pouring in for registration that morning. By the time this reporter was done with registration, the first set of workshops were already under way, and nearing completion, leaving not much time before the commencement of Workshop 361 (Open Standards: A Rights-Based Framework), which was being organized by this reporter.</p>
<p>That workshop had as speakers Sir Tim Berners-Lee (World Wide Web Consortium), Renu Budhiraja (Department of IT, Government of India), Steve Mutkoski (Microsoft), Rishab Ghosh (UNU-MERIT), and Sunil Abraham (Centre for Internet and Society), with Aslam Raffee (Sun Microsystems, formerly with the Government of South Africa) chairing the session thus representing government, industry, civil society, and academia. The theme of the workshop (rights-based framework for open standards) was explored in greatest depth by Tim Berners-Lee, Sunil Abraham, and Rishab Ghosh, while Renu Budhiraja and Steve Mutkoski decided to explore the fault-lines, and the practicalities of ensuring open standards (as well as the interoperability, e-governance, and other promises of open standards). Rishab Ghosh pointed out that while a government could not make it a requirement that your car be a Ford to be granted access to the parking lot of the municipality, it often made such arbitrary requirements when it came to software and electronic access to the government.</p>
<p>Open standards, most of the panellists agreed, had to be royalty-free, and built openly with free participation by anyone who wished to. This model, Sir Tim pointed out, was what made the World Wide Web the success that it is today. This would ensure that different software manufacturers could ensure interoperability which would encourage competition amongst them; that all governments -- even the less developed ones -- would have equal access to digital infrastructure; that citizen-government and intragovernment interaction would be made much more equitable and efficient; and that present-day electronic information would be future-proofed and safeguard against software obsolescence.</p>
<p>Renu Budhiraja in a very useful and practically-grounded presentation pointed out some of the difficulties that governments faced when deciding upon definitions of “open standards”, as well as the limited conditions under which governments may justify using proprietary standards. She spoke of the importance of governments not following the path laid out by market forces, but rather working to lead the market in the direction of openness. Governments, she reminded the audience, are amongst the foremost consumers of software and standards, and have to safeguard the interests of their citizens while making such decisions. Steve Mutkoski challenged the audience to not only think about the importance of open standards, but also think of the role it plays in ensuring efficient e-governance. Standards, he contended, are but one part of e-governance, and that often the reason that e-governance models fail are not because of standards but because of other organizational practices and policies. Pointing to academic studies, he showed that open standards by themselves were not sufficient to ensure</p>
<p>Sunil Abraham pointed out examples of citizens’ rights being affected by lack of open standards, and pointed out the concerns made public by ‘right to information’ activists in India on the need they perceived for open standards. He also pointed out an example from South Africa where citizens wishing to make full use of the Election Commission’s website were required to use a particular browser, since it was made with non-standard proprietary elements that only company’s browser could understand. Since that browser was not a cross-platform browser like Firefox, users also had to use a particular operating system to interact with the government. The session ended with a healthy interaction with the audience.</p>
<p>The importance of having this discussion at the IGF was underscored by Rishab Ghosh who noted that issues of defining and choosing technical standards are often left to technical experts, while they have ramifications much further than that field. That, he opined, is the reason that discussing open standards at a forum like the IGF is important. A more complete report of this workshop may be found at <http://cis-india.org/advocacy/openness/blog/dcos-workshop-09>.</p>
<p>Post the workshop was the opening ceremony which had Mr. Sha Zukang, U.N. Under-Secretary General for Economic and Social Affairs, Tarek Kamel, the Egyptian Minister for Communications and Information Technology, Dr. Ahmed Nazif, the Prime Minister of Egypt, Tim Berners-Lee, and Jerry Yang. The theme of this year’s IGF was the rather unwieldy “access, diversity, openness, security, and critical Internet resources”. The spread of the Internet, as noted by Sha Zukang, is also quite revealing: In 2005, more than 50% of the people in developed regions were using the Internet, compared to 9% in developing regions, and only 1% in least developed countries. By the year 2009, the number of people connecting in developing countries had expanded by an impressive 475 million to 17.5%, and by 4 million in LDCs to 1.5%, while Internet penetration in developed regions increased to 64%. All in all (Jerry Yang pointed out), around 1.6 billion people, or about 25 per cent of the world, is online. Mr. Kamel noted that “the IGF has<br />proved only over four years that it is not just another isolated parallel process but it has rather managed to bring on board all the relevant stakeholders and key players”.</p>
<p>Of importance in many of the speeches were the accountability structures of the Internet due to the Affirmation of Commitment that the U.S. Department of Commerce signed with ICANN, and the growing internationalisation of the World Wide Web due to ICANN’s decision to allow for domain names in multiple languages. Tim Berners-Lee again pointed out the need to keep the Web universal, and in particular highlighted the role that royalty-free open standards play in building the foundations of the World Wide Web. Other than small remarks, privacy and freedom of expression did not really figure greatly in the opening ceremony. Jerry Yang, through his talk of the Global Net Initiative, was the one who most forcefully pointed out the need for both online. The Prime Minister of Egypt, in passing, pointed out the need to safeguard intellectual property rights online, but that note was (in a sense) countered by Sir Tim’s warning about the limiting effect of strong intellectual property would have on the very foundations of the World Wide Web and the Internet.</p>
<h3>DAY 2 (Monday, November 16, 2009)</h3>
<p>On the second day was begun by attending the Commonwealth IGF Open Forum. This open forum was most enlightening as in it one truly got to see Southern perspectives on display. Speakers (both on the dais as well as from the audience) were truly representative of the diversity of the Commonwealth, which presently includes 54 states and around 2.1 billion people (including 1.1 billion from India). Issues of concern included things such as the lack of voice of whole regions like East and West Africa in the international IG policy-making arena. Some of the participants noted that issues such as music piracy, which is a favourite topic of conversation in the West, is of no relevance to most in Africa where the pressing copyright- related issues those of education, translation rights, etc. One participant noted that “Intellectual property issues need developing countries to speak in one voice at international fora; the Commonwealth IGF might allow that.”</p>
<p>A number of people also brought up the issue of youth, and pointing towards children as both the present and the future of the Internet. This attitude also showed up in the session that was held later that day at Workshop 277 (IGF: Activating and Listening to the Voice of Tweens) in which not only were youth and IG issues discussed, but the discussion was also by youth. The formation of the new Dynamic Coalition on Youth and Internet Governance with Rafik Dammak as the coordinator also underlines the importance of this issue which came up at the CIGF open forum.</p>
<p>Other concerns were that of sharing ICT best practices and examples, and the need to urgently bridge the rural-urban divide that information and communication technologies often highlight, and sometimes end up precipitating. This divide is, in many ways, similar to the divide between developing and developed nations, and this point was also highlighted by many of the participants. One strength that the CIGF has as a platform, which the IGF possibly lacks, is the commonality of the legal systems of most of the Commonwealth countries, and hence the possibility that arises of joint policy-making. It was heartening to see that British Parliamentarians, apart from bureaucrats from many countries, were in attendance. This strong focus on developing countries and Southern perspective is, this reporter believes, one of the strengths of the CIGF, which needs to be pushed into the global IGF.</p>
<p>The next workshop attended was Workshop 92: A Legal Survey of Internet Censorship and Filtering, which was organized by UNESCO. A large number of very interesting people presented here, and panellists included IFLA/Bibliotheca Alexandrina (whose Sohair Washtawi was surprisingly critical of the Egyptian government), UNESCO (Mogens Schmidt), Freedom House (Robert Guerra), and Frank La Rue, U.N. Special Rapporteur for Freedom of Opinion and Expression. What came of this workshop was the need to engage with to study the online state of freedom of expression as fully as “offline” state of press freedoms are studied, as an interesting fact that came out of this workshop was that there are currently more online journalists behind bars around the world than traditional journalists. A critique of the Freedom House’s online freedom report, which was not sufficiently voiced at the workshop itself, is that it represents a very Western, state-centric idea of freedom of speech and expression, and often looks at the more direct forms of censorship (state censorship) rather than private censorship (via advertising revenue, copyright law, and “manufactured consent”) and self-censorship. This reporter also intervened from the audience to point out that copyright is often a way of curbing freedom of speech (as was the case with the newspaper scholarly reprints of Nazi-era newspapers in Germany recently, or with the Church of Scientology wishing<br />to silence its critics). The panellists, including Mogens Schmidt and Frank La Rue agreed, and responded by noting that this dimension of copyright requires greater reflection by those groups involved in promoting and safeguarding freedom of speech and expression both online and offline.</p>
<p>The time before the meeting of the Dynamic Coalition on Open Standards was spent listening to Bruce Schneier, Marc Rotenberg, Frank La Rue, Namita Malhotra, and others at the Openness, Security and Privacy Session. Bruce Schneier, one of the most astute and insightful thinkers on issues of security and privacy, focussed on a topic that anyone who reads his blog/newsletters would be familiar with: that openness, security and privacy are not really, contrary to popular perception, values that are inimical to each other. Mr. Schneier instead sees them as values that complement each other, and argued that one cannot ensure security by invading privacy of citizens and users. He noted that “privacy, security, liberty, these aren’t salient. And usually whenever you have these sort of non-salient features, the way you get them in society is through legislation.” On the same note, he held the view that privacy should not be a saleable commodity, but an inalienable fundamental right of all human beings (a position that Frank La Rue agreed with).</p>
<p>Apart from the traditional focus area of states, there was also a lot of focus on corporations and their accountability to their users. On the issue of corporations versus states, Frank La Rue made it clear that he believed the model that some corporations were advocating of first introducing technologies into particular markets, expanding, and then using that to push for human rights, was not a viable model. Human rights, he reiterated, were not alienable, and stated: “You [internet companies] strengthen democracy and democratic principles and then you bring up the technology. Otherwise, it will never work, and it is a self defeating point.”</p>
<p>The meeting of the Dynamic Coalition on Open Standards was next. This meeting served as a ground to build a formal declaration from Sharm el Sheik for DCOS. The meeting was held in the room Luxor, the seating in which was rectangular, promoting a vibrant discussion rather than making some people “presenters” and the rest “audience”. Many of the members of the Dynamic Coalition on Accessibility and Disability were in attendance, seeing common purpose with the work carried out by DCOS. There was spirited discussion on how best to move from a formulation of open standards as “principles” to more citizen- centric “rights”. This shift, pointed out as an important one because they allow for claims to be made in a way that principles and concessions do not. One of the participants helped re-draft the entire statement, based on suggestions that came from him and the rest of the participants. This was, in a sense, the IGF’s multi-stakeholderism (to coin a phrase) at its best.</p>
<p>Because of the late ending to the DCOS meeting, this reporter arrived late for the Commonwealth IGF follow-up meeting. It seemed that the meeting took its time in finding its raison d’être. It was, for a long while, unclear what direction the meeting was headed in because the suggestions from the audience members were of different types: programmatic actionable items, general thematic focus area suggestions, as well as general wishlists. However, in the end, this came together and became productive thanks to the focus that the chairperson and the rapporteur brought to the discussion. Furthermore, it was a great opportunity to connect with the various young people who had been brought together from various backgrounds to attend the IGF by the CIGF travel bursary. It will be interesting to see the shape that CIGF’s future work takes.</p>
<h3>Day 3 (Tuesday, November 17, 2009)</h3>
<p>The first session attended on the third day was the meeting on “Balancing the Need of Security with the Concerns for Civil Liberties”. The speakers included Alejandro Pisanty (Workshop Chair), Wolfgang Benedek, Steve Purser, Simon Davies, and Bruce Schneier. Once again, the one point that everyone agreed on is that those pitting security against privacy are creating a false dichotomy, and that for security to exist, privacy must be safeguarded. Steve Purser pointed out that common sense takes a long while to develop and that we, as a human collective, have not yet developed “electronic common sense”. Simon Davies’ main point was that accountability must necessarily be appended to all breaches of privacy in the name of security. Indeed, he lamented that oftentimes the situation is such that people have to justify their invocation of privacy, though the state’s invocation of security to trample privacy does not require any such justification. Security, he pointed out, is not something that is justified by the government, judged by the people, and to which the government is held accountable for its breaches of civil liberties.</p>
<p>Bruce Schneier, as usual, was quite brunt about things. He noted that only identity-based security have anything to do with privacy, and that there are a great many ways of ensuring security (metal detectors in a building, locks in a hotel room) that do not affect privacy. At the meeting, this reporter made a comment noting that a lot of debate is happening at a theoretical level, and that while a lot of good ideas are coming out of that discussion, those ideas have to be translated into good systems of governance in countries like India. Some organizations internationally are trying to make human readable privacy signs such as the human readable copyright licences used by Creative Commons. Concerning citizens’ privacy, a lot of systems (such as key escrow) that have been discredited by knowledgeable people (such as Bruce Schneier) are still being considered or adopted by many countries such as India (where this blew up because of a perceived security threat due to RIM BlackBerry’s encryption). National ID schemes are also being considered in many countries, without their privacy implications being explored. In the name of combatting terrorism, unregistered open wireless networks are being made illegal in India. While there have been informed debates on these issues at places like the IGF, these debates need to find actual recognition in the governance systems. That translation is very important.</p>
<p>The next session this reporter attended was the meeting of the Dynamic Coalition on Freedom of Expression of the Media on the Internet. Amongst the other items of discussion during the session, the site Global Voices Online was showcased, and many of the speakers gave their opinions on whether freedom of speech online required a new formulation of the rights, or just new applications of existing rights. The consensus seemed to be that tying up with the Internet Rights and Principles DC would be useful, but that the project need not be one of reformulation of existing rights, since the existing formulations (as found in a variety of international treaties, including the UDHR) were sufficient. One of the participants stressed though that it was important to extend freedom of press guarantees to online journalists (in matters such as defamation, or copyright violation, where news organizations might be granted protection over and above that which an ordinary citizen would receive). Citizen-led initiatives for circumventing censorship were also discussed.</p>
<p>Two very important points were raised during the Openness main session on Day 2 when someone noted that the freedom of expression was not only an individual right but it also a collective right: the right of peoples to express not only ideas but to express their cultures, their traditions, their language and to reproduce those cultures and languages and traditions without any limitation or censorship. This aspect of the freedom of expression finds much resonance in many Southern countries where collective and cultural rights are regarded as being as important as individual and civil-political rights. Secondly, Frank La Rue pointed out that freedom of speech and expression went beyond just giving out information and opinion: it extended to the right to receive information and opinion. Excessively harsh copyright regimes harm this delicate balance, and impinge on the free speech.</p>
<p>One of the issues that was not explored sufficiently was that of the changes wrought by the Internet on the issues raised by the participants. For instance, while there was much talk about defamation laws in many countries and their grave faults (criminal penalties, defamation of ideas and not just persons), there was no talk of issues such as forum-shopping that arises due to online defamation being viewable around the world with equal ease. Thankfully, the coordinators of the Dynamic Coalition urged people to register on the DC’s Ning site (http://dcexpression.ning.com) and keep the conversation alive there and on the DC’s mailing list.</p>
<p>The session held on Research on Access to Knowledge and Development, organized by the A2K Global Academy was most informative. It brought together many recent surveys of copyright law systems from around the world and their provisions for access to knowledge, including the Africa Copyright and Access to Knowledge project with which this reporter is very familiar. The three main focus areas of discussion were Access to Education (A2E), Open Source Software (OSS) and Access to Medicines (A2M). The best presentation of the day was that made by Carlos Affonso of FGV (Brazil) who made an impassioned case for access to knowledge in the developing world, showcasing many practical examples from Brazil. He noted that many of the examples he was showing were plainly illegal under Brazilian laws, which had very limiting limitations and exceptions. He showcased the usage of Creative Commons licensing, Technobrega music, usage of common ICT infrastructure (such as cybercafes), which are often only semi-legal, and the general acceptance of commons-based peer production. The conclusion of the Egyptian study was that more work is needed to expand access to educational materials, including expansion of the limitations and<br />exceptions to copyright law for educational purposes. The overall consensus of all the various studies was that open source software was playing a very useful and crucial role in promotion of access to knowledge, but pointed out that the main barrier that open source software was facing was that of anti-competitive practices and not something related to copyright law.</p>
<h3>Day 4 (Wednesday, November 18, 2009)</h3>
<p>On the last day, this reporter was a presenter in a workshop on the “Global State of Copyright and Access to Knowledge”. This session had the following panellists: Tobias Schonwetter, Faculty of Law, University of Cape Town; Bassem Awad, Chief Judge at the Egyptian Ministry of Justice and IP Expert; Perihan Abou Zeid, Faculty of Legal Studies and International Relations, Pharos University; Pranesh Prakash, Programme Manager, Centre for Internet and Society; Jeremy Malcolm, Project Coordinator, Consumers International; and Lea Shaver, Associate Research Scholar and Lecturer in Law at Yale Law School.</p>
<p>This workshop was the result of the merger of workshops proposed by the African Copyright and Access to Knowledge project, and by Consumers International (to showcase their IP Watch List). Lea Shaver noted that the purpose of copyright law is to encourage creativity and the diffusion of creative works, and not as an industrial subsidy. If copyright law gets in the way of creativity and access to knowledge, then it is in fact going against its purpose. She asserted that copyright law should be assessed by touchstones of access, affordability and participation. “Copyright shapes affordability and access because as the scope of rights expands, the more control is centralised and the less competition. It also shapes participation, because under current law the amateur who wants to build upon existing works is at a disadvantage, and risks running afoul of others’ rights.” Rent-seeking behaviour is what is driving the expansion that we see globally in the coverage of copyright law, and not the costs of production and distribution (which are ever becoming cheaper).</p>
<p>Dr. Abou Zeid noted that technology grants copyright holders (and even non-holders) great control over knowledge, and that strong safeguards are required against this control in the form of limitations to technological protection methods (TPMs). Further, copyright law must take advantage of the benefits offered by technology, such as distance education, granting access to the disabled, and must extend present day E&L to cover these as well. Tobias Schonwetter presented the findings of the ACA2K project, and noted that most countries granted greater protection to rights holders than international law required. Amongst the survey countries, none dealt with distance and e-learning, and only one (Uganda) dealt with the needs of the disabled. He hoped that the extended dissemination phase would assist other projects to build on ACA2K’s work. Thus, “legal systems worldwide are not meeting consumers’ needs for access to knowledge. A better legal system, the research suggests, would support non-commercial sharing and reuse of material, which in turn would drive down costs and increase sales of licensed material, and could also increase consumers’ respect for the law overall.”</p>
<p>The present reporter started by asking why this abstract phrase “access to knowledge” is so important. A2K actually effects almost all areas of concern to citizens and consumers: education, industry, food security, health, amongst many more areas. Mark Getty notes that “IP is the oil of the 21st century”. By creating barriers through IP, there is less scope for expansion and utilization of knowledge, and this most affect “IP poor” nations of the South. In India, there is a new copyright amendment that will introduce DRMs, even though India is not bound by international law to do so. There is also a very worrisome movement to pass state-level criminal statutes that class video pirates in the same category as “slum lords, drug peddlers and goonda”, which includes measures for preventative detention without warrant.</p>
<p>One tool to help change the mindsets of the public is the Consumers International IP Watch List, which can help policy makers and academics and advocates compare the best and worst practices of various countries. At an earlier session, Carlos Affonso of FGV had used the Watch List to demonstrate the weakness of Brazil’s copyright law on the educational front. Copyright is often characterised as a striking of balance between the interests of creators and consumers, but this rhetoric might be misplaced. In fact creators often benefit from freer sharing by users. Knowledge is an input into creation of works, not just an output from it. Given this, it is important to counter IP expansionism by using laws promoting freedom of speech, competition law, consumer law, privacy law, while framing them within the context of development (as appropriate in various countries), to eventually produce a change in mindsets of people.</p>
<h3>Stock-Taking</h3>
<p>As Jeremy Malcolm of Consumers International notes in his response to the formal stock-taking process, “the IGF is yet to develop from a simple discussion forum into a body that helps to develop public policy in tangible ways.” This reporter, writing for the Dynamic Coalition on Open Standards, also voted for the continuation of the IGF, “in order to ensure that the WSIS Declaration of Principles, specifically in the important area of open standards, be realised through a multi-stakeholder process.” The IGF is, in a sense, the least bureaucratic of the UN’s endeavours. But certain rules, evolved in inter-governmental settings, might require careful reconsiderations to suit the multi-stakeholder approach that the IGF embodies. The IGF also needs to reach out from being a conference for a few to becoming a place/process for the many.</p>
<h3>General Reflections</h3>
<p>While this year there were more remote participation hubs (13) than last (11), and the Remote Participation Working Group seems to have done much work and some serious reflection on that work, individual experiences sometimes did not match up with what was perceived as the collective experience (via RPWG’s feedback survey). As a workshop organizer, this reporter was not provided any information about the remote participation tools, nor was there any screening of remote participants’ comments. With the shift from a single (open-source) product DimDim, to two products, WebEx (sponsored by Cisco) and Elluminate, much confusion was created even amongst those in the know since there were two separate tools being used. It is this reporter’s perception that live captioning from the main sessions has been a great success, and will have to be used much more extensively, especially if places where the bandwidth to download streaming video does not exist. Further, they help create very useful quasi-official records of the various workshops and open fora that are held at the IGF. That apart, the suggestions offered by the<br />RPWG (live video feedback from the remote hubs, dedicated remote participation chair in each workshop,<br />etc.) should be worked upon this year to enable those who cannot travel to Vilnius to participate more effectively.</p>
<p>All the sessions that happened around intellectual property rights were highly critical of the present state of IP laws around the world, and were calling for a reversal of the IP expansionism we see from various perspectives (access to knowledge, competition law, etc.) However, it was often felt by this reporter that these workshops were cases of the choir being preached to. Of course, many new people were being introduced to these ideas, but generally there was appreciation but not as much opposition as one is used to hearing outside the IGF. An exception (in the IP arena) was the workshop on open standards, in which there was much heat as well as illumination. Perhaps, a greater effort could be made to engage with people who are critical of the Access to Knowledge movement, those who are critical of privacy being regarded as a fundamental right, and those who believe that cultural relativism (for instance) must find a central place while talking about the right to free speech. After all, when one leaves the IGF, these voices<br />are heard. Those voices must be engaged with at the IGF itself, and a way forward (in terms of concrete policy recommendations, whether at the local level or the international level) must be found. Of course, the problem with the above suggestion is that many of these values are embedded in the WSIS principles, and are taken as a granted. But, still, if such debate is not had at the IGF, it might become something much worse than a ‘talking shop’: a forum where not much meaningful talk happens.</p>
<h3>Appendix I: Tweets and Dents During the IGF</h3>
<p>This is list of some posts made by the reporter on the microblogging sites Twitter<br />(http://twitter.com/pranesh_prakash) and Identi.ca (http://identi.ca/pranesh) during the IGF.<br /># @leashaver: Recording of yesterday’s session by the Access to Knowledge ♺ Global Academy:<br />http://trunc.it/3dldl #a2kga #IGF09 #yaleisp 8:55 PM Nov 18th, 2009<br /># “Great possibilities of #foss, but a disabling, anti-competitive environment has stunted growth of<br />open source software in #Egypt.” #igf09 6:47 PM Nov 17th, 2009<br /># Excellent set of resources on Access to Knowledge, from @YaleISP: http://tr.im/F8At #igf09 6:37 PM<br />Nov 17th, 2009<br /># “Tecno brega in Brazil can only be bought from street vendors: good relationship between artists<br />and street vendors.” #igf09 6:30 PM Nov 17th, 2009<br /># “There is not even a private copying exception in Brazil”, but is still part of “axis of IP evil” for<br />rightsholders #igf09 6:26 PM Nov 17th, 2009<br /># Tobias: “Even though s/w patents are not allowed by SA law, some large MNC s/w comps found<br />ways of bypassing that & getting patents” #igf09 6:19 PM Nov 17th, 2009<br /># Case studies from SA: CommonSense project, Freedom to Innovate SA, OOXML v. ODF struggle #igf09<br />6:18 PM Nov 17th, 2009<br /># 2 new studies on #a2k from Brazil (http://tr.im/F8tI)and SA (http://tr.im/F8uJ). Also see ACA2K’s<br />outputs: http://tr.im/F8uQ #igf09 6:13 PM Nov 17th, 2009<br /># ♺ @sunil_abraham: RT @mathieuweill: #igf09 Dardailler : Internet standards are open standards<br />and that makes a difference! 3:57 PM Nov 17th, 2009<br /># Oops. Wrong URL. It should be: http://threatened.globalvoicesonline.org/ #igf09 3:46 PM Nov 17th,<br />2009<br /># Mogens Schmidt of UNESCO praises Global Voices Online. Says defamation & libel laws should not<br />be *criminal* offences. #igf09 3:40 PM Nov 17th, 2009<br /># http://threatened.globalvoices.org/ helps report on FoE issues with bloggers through crowdsourcing.<br />#igf09 3:24 PM Nov 17th, 2009<br /># “Along with the right to give out information and opinion is the right to receive information and<br />opinion”: Frank La Reu #a2k #igf09 3:13 PM Nov 17th, 2009<br /># Schneier: “Before we die, we will have a US President who’ll send a lolcat to the Russian PM” #igf09<br />2:06 PM Nov 17th, 2009<br /># Privacy vs. security is a false dichotomy. But any privacy that is taken away in name of security<br />must be turned into accountability. #igf09 1:50 PM Nov 17th, 2009<br /># All wireless networks now have to be registered in India, and we talk of privacy? @schneier #igf09<br />1:47 PM Nov 17th, 2009<br /># RT @rmack Free Expression Online dynamic coalition meeting at 11:30am Egypt time in Siwa Room.<br />http://dcexpression.ning.com #igf09 1:36 PM Nov 17th, 2009<br /># @OWD: E Daniel, (http://bit.ly/3oFYqu), takes on the myth of the Digital Native, ♺ reveals the shallowness<br />of their native knowledge. #igf09 12:05 AM Nov 17th, 2009<br /># Commonwealth IGF’s follow-up meeting took time to find out its raison d’etre, but ended on a productive<br />note. #igf09 11:34 PM Nov 16th, 2009<br /># #schneierfact : Bruce Schneier actually exists! I can see him! 6:53 PM Nov 16th, 2009<br /># @timdavies: You might then be interested at a report by @cis_india on a different take at DNs:<br />http://tr.im/F3tk 3:29 PM Nov 16th, 2009 from Gwibber in reply to timdavies<br /># Estonia & Georgia DDoS are famous, but individual NGOs are also being targetted by DoSes. #igf09<br />3:08 PM Nov 16th, 2009<br /># Now more online journalists are behind bars than offline ones. #freespeech #igf09 3:07 PM Nov 16th,<br />2009<br /># ♺ @aslam: if you get an email from nigeria people will block it because they think that it is spam -<br />reputation #fail #igf09 2:14 PM Nov 16th, 2009<br /># Many are saying: listen to children; document and share best ICT practices and examples; bridge<br />rural-urban divide as also devel’d-devel’g. 1:57 PM Nov 16th, 2009<br /># Several British Parliamentarians in the room at the Commonwealth IGF event #igf09 1:56 PM Nov<br />16th, 2009<br /># CIGF should look at gaps at IGF and speak to them. Our common legal systems allow for focus on legislations<br />(ie, on data protection) #igf09 1:36 PM Nov 16th, 2009<br /># “We need to get to a point where access to the Internet is seen as a human right” #igf09 1:27 PM<br />Nov 16th, 2009<br /># “Intellectual property issues need developing countries to speak in one voice at intl fora. Commonwealth<br />IGF might allow that.” #igf09 1:24 PM Nov 16th, 2009<br /># “Music aspects of the Internet debates, which gets so much focus, doesn’t have as much relevance<br />in W. Africa as education & health.” #igf09 1:21 PM Nov 16th, 2009<br /># Commonwealth covers more than 2 billion people. Some whole regions, like E. & W. Africa “have no<br />voice in Geneva & global IGF” #igf09 1:18 PM Nov 16th, 2009</p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/report-on-fourth-IGF'>https://cis-india.org/internet-governance/blog/report-on-fourth-IGF</a>
</p>
No publisherpraneshInternet Governance ForumInternet Governance2012-02-29T05:42:27ZBlog EntryIGF 2009 - Main Session: Emerging Issues: Social Networks
https://cis-india.org/news/emerging-issues-social-networks
<b>Current laws don't seem to scale well to handle Web 2.0 issues</b>
<p><strong>Session description:</strong> Discussion was centered on the development of social media (social networks, user-generated content sites, micro-blogging, collaboration tools, etc.) in order to explore whether these developments require to new or modified policy approaches. Key issues explored include privacy and data protection, rules applicable to user-generated content and copyrighted material, and freedom of expression and illegal content. The session also addressed the importance of the “terms of service” of large platforms, how they are developed and their relationship with emerging business models that are based on behavioral analysis.<br /><br /><strong>Participants in the discussion included:</strong> Sunil Abraham, director of policy, Centre for Internet and Society, Bangalore; Rebecca MacKinnon, co-founder of the Global Network Initiative; Grace Bomu, manager, Kenya-Heartstrings and Fanartics Theatre Company, Kenya; Sergio Suiama, prosecutor, State of São Paulo, Brazil; Rachel O'Connell, VP of people networks and chief safety officer, Bebo.<br /><br /><strong>November 18, 2009 - Sunil Abraham</strong>, an Internet policy expert from Bangalore, was a key panelist in this session who introduced the primary concerns tied to social networks today.<br /><br />"I'm going to raise nine emerging issues about social media," he began, "and I categorize them into four categories: Intellectual property rights, morality laundering, the hegemony of the connected and the hegemony of text."<br /><br />He noted that intellectual property law is completely outdated and cannot be applied in today's communications environment, saying it is "irrelevant." He added, "To take some examples, the right of the consumer to review, the right of the consumer to privacy, the right of the entrepreneur or enthusiast to make interoperable, complementary or competing products. All these rights used to be protected under the right to reverse-engineer. Issue 2 under IPR: On some corporate-mediated social media platforms, copyright takedown notices from one political party are acted on much more swiftly when compared to similar takedown notices from an opposing party. Issue 3, under IPR: Some rights holders, and in particular news organizations, use copyright takedown notices selectively to purge social media Web sites of content that opposes their editorial viewpoint. Issue 4 under intellectual property rights: The increased use of automated enforcement of copyright by rights holders is seriously undermining freedom of expression on the Internet, as in the case of the baby dancing to Prince's 'Let's Go Crazy.'"<br /><br />He explained "morality laundering" - saying that, like policy laundering, it is "trying to impose a globally homogenized morality regime." He cited the example of breast-feeding photos on a social network being deleted because they were considered obscene. "Breast-feeding, I may remind you, is still a public activity in many southern countries," he said. "Photographs of public life on a beach in a country where nudism is the norm becomes child pornography in another country."<br /><br />He said that religious traditions can sometime be reduced to a monoculture on community-managed social media platforms that "depend on editors to determine the truth," adding "That is because upper-crust and upper-class populations have greater access to the Internet. Literate communities will try to maintain their hegemony on the Internet. Community-managed social media platforms that depend on textual citation often ignore the knowledge of the oral communities of the global south."<br /><br />Session moderator <strong>Simon Davies</strong>, director of Privacy International, asked Abraham if automated enforcement of social network policies should be outlawed. "I don't think it is possible for us to completely take out machine involvement in moderating content online," Abraham said, "whether it is from a freedom-of-speech perspective or a hate-speech perspective or from an intellectual-property-rights perspective. But I think the process has to become more transparent, so that the public will know what happened and why it happened and that there is due process and the possibility of appeal."<br /><br />Davies had kicked off the session with a plea that participants try to think ahead in this discussion of social networks. "Our role today in this panel is to look to the future, and our mentors at the UN and at IGF have urged me to motivate, as much as possible, an imagining of the future," he said. "Our role, as we can see on the program, is to look at social networks and social spaces such as micro-blogging and Web 2.0, as we move through to the next - what are the issues that we're likely to confront. So our two goals, if I can suggest a focus, is: What have we brought out of this last few days that tells us something about the way the future will go? Particularly in terms of social interaction. And second, imagine that future."<br /><br /><strong>Sergio Siuama</strong>, prosecutor for the State of São Paulo, Brazil, was asked to describe the privacy problem that developed there on Google's social network Orkut. "Social networks are the fourth most popular online activity, ahead of personal e-mail," he said. "Eighty percent of Brazilian Intenet users interact through social network sites. In Brazil as well in India and Pakistan, the most popular social networking service is Google's Orkut. More than 30% of Brazilian users access regularly use Orkut and about 25% of them are children and teenagers." He said many social networks accessed by people globally are transnational. "The most-accessed services in Brazil are provided by companies physically located in the United States," he said.<br /><br />In 2005 Google set up a branch in São Paulo, but it was not enough to handle the business of 30 million users. Since 2004 Brazilian authorities have been receiving reports of cyberbullying, drug dealing, child pornogrphy and other human rights violations in Orkut's space. In 2006 the federal attorney's office started a collective lawsuit against Google. Google responded with a proactive plan. After two years of litigation, in July 2008, the parties settled on a collective agreement in which Google agreed, among other obligations, to comply with Brazilian legislation, to store traffic data for at least six months, to take down child-abuse images, to develop a proactive system of child-abuse images detection, removal and report to law enforcement, and to establish a customer-service office able to quickly respond to all users' complaints. Some of these obligations were adopted as standards for the whole of Latin America in a document - the memorandum of Montevideo.<br /><br />Siuama raised several governance issues that arise from this case: Which criteria should be used to define the ability of a country to legislate over and sanction conducts committed on the Internet? Is it legitimate to enforce rules at a local company's office regarding a service operated from another country? What are the basic standards we should expect from ISPs to help cope with human rights violations on the Internet? Is any national law enforcement agency equipped to cope with crimes committed on social networking sites? Will it be necessary to ensure minimum levels of transparency and social accountability of networking services?<br /><br />Panel member <strong>Rachel O'Connell</strong>, vice president of people networks and chief safety officer for Bebo, chaired the <a class="external-link" href="http://www.europeandigitalmedia.org/safer-social-networking">European Union's Safer Social Networking Cross-Industry Task Force</a> - an effort by 18 social networking companies, including Facebook and Google, working with the European Commission and civil liberties, child welfare, law enforcement and parenting groups.<br /><br />"We came up with seven principles that relate to education and ensuring that we have prominent and easily accessible safety messages and also addressing reporting abuse and providing people with the technologies and capabilities so they can use the Internet safely," she said. "We are doing a lot of filtering on the back end. We have moderation teams in place. We have very strong links with law enforcement. We look at the legal issues in each of the countries and the markets in which we operate and see how that ties up with being a US-based company. We're also aware of treaties like the multinational legal assistance treaty, in terms of working with law enforcement and investigators."<br /><br />O'Connell said the industry has probably not been clear enough about how these procedures are implemented. She expects that the principles set out by the task force will make things more clear. "The number of signatories was 18 and now it's up to 23, and part of my role is to encourage companies to become signatories," she said. "It means you need to self-declare how you have implemented the principles and each of the substantive recommendations. These self-declarations are being reviewed by independent researchers, and their report will be released to coincide with Safer Internet Day in February."<br /><br />She added that U.S. attorneys general have asked social networking companies to begin being more transparent and accountable. "Facebook has an internal auditor to ensure that they are meeting the requirements outlined by the attorneys general, and similarly MySpace has an agreement, so there is an incredible amount of work going on," she said. "That said, there is still a log of work to do, as there always will be. For example, AOL has been working closely with the National Center for Missing and Exploited Children and are diligent about working with law enforcement in other countries to ensure we can facilitate the investigative process. We also have a filtering process we run on the back end."<br /><br /><strong>Grace Bomu</strong>, manager for Kenya-Heartstrings and Fanartics Theatre Company, Kenya, was on hand to talk about the positive influence of social networks. Her creative troupe uses them to do marketing, research and concept development. "From our Facebook page," she explained, "we're able to tell which issues the youth in Kenya are facing, and from those issues, we are able to develop a concept and sell our plays. On our Facebook page, people propose lines, other people propose they be actors, and this has really changed the way we do business. It's the actors who write the script, and our friends help us in writing the script.<br /><br />"Another way the Internet helps us is using the mobile money payment systems. Our management uses a mobile phone to update the page, to make comments and so on. Friends came up with the idea that they could pay to attend plays using mobile money payment systems."<br /><br />She said there are some negatives. Anonymous respondents and competitors write negative comments on the troupe's page, politicians sometimes try to use the page to advance their goals, "and we have had problem of balancing what some people call abusive language with what others say is artistic expression."<br /><br />"We'd say that these tools have really helped news opening up culture, in growth of urban language and also in the contribution of topical issues," she concluded. "Tools are helping us to expand freedom of expression rather than caging it. So what we have done as a company is that we are coming up with - slowly, we are coming up with a code within us that we shall follow in balancing the competing interests."<br /><br /><strong>Rebecca MacKinnon</strong>, Open Society Institute fellow and co-founder of the Global Network Initiative, noted that throughout the sessions of IGF-2009 people have been speaking out about the power of social networks as spaces where individual citizens can speak truth to power. "Spaces that help to make governments and other institutions more accountable to individuals," she said. "This is happening all over the world, across a range of political systems. But there are trends that are counteracting the potential of social networks to be a force that can truly help citizens participate in public life. This may be contributing to social networks acting as more opaque extensions of incumbent power in some situations, rather than as transparent conduits between citizens and institutions."<br /><br />MacKinnon raised four key points. The first is the level of liability governments place on social networking services in regard to user-generated content.<br /><br />While it is part of the groundrules for IGF that participants are encouraged to avoid singling out people or nations when meting out criticism, it was clear that she was referring to China when she said, "In some jurisdictions, international social networking sites end up being blocked because the sovereign government is not happy with some of the content being posted on the sites. And in some of those jurisdictions, what then ends up happening is that a robust set of domestic social networking sites evolve. And the social networking sites that are hosted domestically are held liable for all the content that their users are posting on the site. And so in order to comply with government requirements and the particular government's definition of what constitutes legal speech, these social networking sites end up having to develop large departments of people whose job it is to police content. international social networking sites that want to act - want to operate in certain jurisdictions have to make a choice, either to be blocked to users in that country because users may post things that the local government objects to, or agree to develop a locally hosted site in the local language which would then be subject to greater local jurisdiction and agree to police it. And there have been some cases where certain - and I have again been asked not to name and shame - but where certain companies have chosen to host locally and comply with government requests for political censorship in that regard. And so this is one challenge that social networking companies around the world are facing, is how to deal with this."<br /><br />Other points she outlined were:<br /><br />- <strong>Social network users are often not allowed to be anonymous</strong>. "There's at least one country where now anybody who uses a social networking site or Web service over a certain size has to register with their national ID number," she explained, "and many human rights groups have expressed concerns about some users who have been traced for political speech. At least one international social networking service decided to disable the local uploading of videos and comments onto its service, so people in that country have to use the international version of the service rather than the local service - so that this particular social networking site would not be in the position of handing people over for speech that might arguably be political."<br /><br />- <strong>Administrators of social networking sites will sometimes perceive that something is going against the terms of service when the content has a much different intent</strong>. "There are political activists from a range of countries who found their Facebook accounts frozen because their pattern of activity resembled spamming," she said, "and this had an impact on their ability to conduct political activities. And there have been situations where activists in various countries post images of abuse by authorities against citizens and these are quite graphic and are deemed to be against terms of service. And the people concerned feel that 'if these sites do not let me speak truth to power, then were can I go?' So that's another sort of human-rights issue."<br /><br />- <strong>A new multistakeholder group, the <a class="external-link" href="http://www.globalnetworkinitiative.org/">Global Network Initiative</a>, is being co-founded by MacKinnon</strong> and others to protect and advance freedom of expression and privacy in ICTs. "Our approach recognizes that a lot of these issues are difficult to legislate for because they involve very nuanced contextual situations that differ greatly," she said. "Companies do feel there is a need to have some kind of assistance in doing the right thing. How can social networks fulfill their potential and serve their users so they feel they can use these services without becoming victims of oppression in various ways? The Global Network Initiative combines companies who have signed on as well as human rights groups, socially responsible investment funds and some academics to help companies proactively figure out how to anticipate free-expression issues in order to avoid problems and assist in making choices about how to structure businesses."<br /><br /><strong>Pavan Duggal</strong> spoke from the floor of the session about the formation of a dynamic coalition on social networks, which came together after a session on legal issues and social media earlier in the day. "These issues not only relate to data protection and privacy," he said. "They also relate to the issue of jurisdiction and ownership, storage, retention and transmission of user-generated content. Do we have the right to be anonymous? Do we have a right to oblivion? Can there be a right to delete in the context of social media? Is there a right of purging children-generated content? Can there be a right to forget and to forgive in the context of information? We also discussed how the deadly cocktail mix of social media and cloud computing is venturing us into a wild, wild west as far as jurisprudential rules and principles are concerned. Which country, what data, which server, which law would apply, which would be effective remedy, which would be the relevant court and how would the ultimate adjudication be done?"<br /><br />He said it is expected that national governments will try to legislate in this area. "While the Internet has made geography history, the fact still remains that national governments will try to legislate," he said. "It is time that respective stakeholders must come together, not just the players, the users, but also the industry, the government, the lawmakers, law enforcement."</p>
<p>For the UN video, <a class="external-link" href="http://www.un.org/webcast/igf/ondemand.asp?mediaID=pl091118pm2">click here</a></p>
<p>For the UN transcript, <a class="external-link" href="http://www.intgovforum.org/cms/2009/sharm_el_Sheikh/Transcripts/Sharm%20El%20Sheikh%2018%20November%202009%20Emerging%20Issues.pdf">click here</a></p>
<p>For the original article, <a class="external-link" href="http://www.elon.edu/e-web/predictions/igf_egypt/social_networks.xhtml">click here</a></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/news/emerging-issues-social-networks'>https://cis-india.org/news/emerging-issues-social-networks</a>
</p>
No publisherpraskrishnaInternet Governance2011-04-02T13:46:50ZNews ItemWhen Whistle Blowers Unite
https://cis-india.org/internet-governance/blog/whistle-blowers-unite
<b>Leaking corporate or government information in public interest through popular Web service providers is risky but Wikileaks.org is one option that you could try out.</b>
<p>Leaking corporate or government information in public interest in the age of Satyam has new challenges. You couldn't just upload it to a blog, social networking website or even a document management system like <a class="external-link" href="http://www.google.co.in/">Google</a> documents. <a class="external-link" href="http://www.google.co.in/">Google</a>, <a class="external-link" href="http://m.in.yahoo.com/?p=us">Yahoo</a> and most other Web service providers nearly always comply with the national law and cooperate with enforcement agencies. In India there have been several arrests in connection with alleged illegal email messages and content on social networking websites. It did not take court order – just a request from the local police station. Furthermore, you would have to undertake additional risky activity online to draw media attention to your documents. Also those who stand to lose from the leak can send a couple of copyright take down notices which will lead to deletion. So your only real option is <a class="external-link" href="http://www.wikileaks.org/">Wikileaks.org</a>, where they boast: Every source protected. No documents censored. All legal attacks defeated.</p>
<p>Launched in December 2006, <a class="external-link" href="http://www.wikileaks.org/">Wikileaks.org</a> stands alone on the Internet as the last refuge for the truth. Even though the promoters are European and US academic organisations, journalists and NGOs – a near neutral point of view is realised by sparing no one across the political and ideological spectrum. It is the archive of the whistle-blowers of the world and it is ugly: login information and private emails of a holocaust denier, secret documents from the Church of Scientology, Internet block-lists from Thailand and standard operating procedures for US guards at Guantanamo Bay, et cetera. One could safely assume that these guys have very few friends. Unlike Wikipedia.org whose technology it employs, <a class="external-link" href="http://www.wikileaks.org/">Wikileaks</a> does not have an open and participatory editorial policy. It accepts documents through a trusted journalist–source system. </p>
<p>Leaking controversial documents can result in loss of job, limb and life, so extreme caution is always advised. Remember that India still does not have laws protecting whistle blowers, in spite of a bill being introduced in 2006. What follows is only a very rough guide to digital whistle blowing, so please get expert advice before you try these at home:</p>
<ul><li>Download and install military grade encryption software like Pretty Good Privacy. Generate a pair of keys – a public and a private one. Use your private key in combination to a journalist's public key to send him or her, a 'for your eyes only message' email. Only the journalist will be able to decrypt the message using your public key and his private key. Note however, that an Indian court under the 2008 amendment of the IT Act can ask you to disclose your key-pair. </li><li>Step outside. Working from home is a bad idea since DOT mandates that all ISPs retain logs for all users and for all services utilized for an indeterminate time-period. Office is still worse as your network administrator might be also logging your activities. </li><li>Find an anonymous public access point. Cyber-cafes, especially in New Delhi, Maharashtra, Karnataka and Tamil Nadu are asking users to provide identity cards and record contact details and in some cases web-cam photographs as well. Using your laptop in a coffee shop may work but DOT is considering cracking down on open wifi networks. </li><li>Use an anonymizing service so that the chain of digital evidence leading up to <a class="external-link" href="http://www.wikileaks.org/">Wikileaks</a> is obliterated. TOR is the anonymizing solution of choice. Several TOR servers that provide private tunnels across the Internet work in unison, to form a cloud of anonymity. </li></ul>
<p>If you were leaking large amounts of data, uploading it may be too risky. Burn the data on DVDs and mail them to <a class="external-link" href="http://www.wikileaks.org/">Wikileaks</a>. However, do ensure that all digital files have been purged of personal information. For word files this can be done by converting to PDF. Also you may not want to leave any finger-prints on the package. India will soon have a database of finger prints thanks to the National Unique Identity (NUID) project. We know this thanks to the leaked NUID project document on <a class="external-link" href="http://www.wikileaks.org/">Wikileaks.org</a>, days before the consultation.</p>
<p>
For more details visit <a href='https://cis-india.org/internet-governance/blog/whistle-blowers-unite'>https://cis-india.org/internet-governance/blog/whistle-blowers-unite</a>
</p>
No publishersunilDigital ActivismInternet Governance2012-03-21T10:17:48ZBlog EntryDrawing maps for change
https://cis-india.org/news/drawing-maps-for-change
<b>Digital maps can hold immense academic value – an article by Deepa Kurup, The Hindu, 3rd Jan, 2010.</b>
<p>BANGALORE: The mash-up story is an old but compelling one, particularly when used for advocacy as in Tunisia where exile Sami Ben Gharbiais used a GoogleMaps mash-up to paint a different kind of landscape. <br />So random net surfers were startled to find the Tunisian map dotted with a string of prisoner’s names, their biographies, and videos of their family members telling the story of the human rights situation in the country. <br />Closer home, rights activist K. Ramnarayan is trying to do something similar. Using GPS and simple mapping technologies, Mr. Ramnarayan maps the location and extent of damage that will be created by proposed hydro-electric projects in Uttarakhand.</p>
<p>“We knew that many projects were announced. But it was only when we began mapping, we found that the 550-odd projects were concentrated in three valleys, and could potentially ruin all the State’s rivers,” he says.</p>
<h3>Detailed perspectives</h3>
<p>Mr. Ramnarayan believes that mapping technology can provide detailed perspectives, enable analysis — GPS devices are easy to use and collated data can be simply added as layers to existing maps — and create better awareness by sharing data online. Using the more accurate GIS mapping can also hold immense academic value.</p>
<p>It is this potential that “Maps for Change,” a collaborative project hosted by Bangalore-based Centre for Internet and Society (CIS) and Tactical Tech, endeavours to tap into. Anja Kovacs, a CIS fellow, believes maps are powerful, as they provide the larger picture. For instance, she says, news reports lead one to believe that protests against SEZs are isolated today. Now, put all those protests on a map, and you get the real picture! “Maps for Change” participants are involved in a slew of fascinating projects such as mapping land acquisition patterns in Bangalore, tribal displacement issues and dissident sexualities in Delhi.</p>
<h3>Layer of information</h3>
<p>So mapping is not a complex cartographer’s job anymore. With cheaper and more efficient GPS devices, in the market and on your cellphones, anybody can map. Pradeep B.V. of MapUnity.org, a site that lets you create your own map, says that ‘neogeographers’ are redefining online maps.</p>
<p>Neogeographers use available online maps such as Google MyMaps or Open Street Maps to add layers of information to a typical mashup.</p>
<p>GIS adds that critical layer of accuracy, and is essential in remote areas which are not mapped by these services. So you collect data (typically latitude, longitude and altitude information), mark your points of interest and upload this on a map, Mr. Pradeep explains.</p>
<p>Using attributes these simple maps can be used, accurately, to tell a story and document several layers of information.</p>
<p>Tracking changes <br />Say you wish to record access to health facilities in a backward district. A GPS device helps you collate info and create a ‘schema’ of data that can be uploaded directly to any mashup. Open source tools such as JUMP or UDIG can help you work easily with GIS datasets. The map can be interactive, you can track changes and can be as dynamic as you want it to be — for instance, you upload videos of health care facilities or highlight patches of social exclusion.</p>
<p><a class="external-link" href="http://www.hindu.com/2010/01/03/stories/2010010360601200.htm">Link to the original article</a></p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/news/drawing-maps-for-change'>https://cis-india.org/news/drawing-maps-for-change</a>
</p>
No publisherradhaInternet Governance2011-04-04T06:49:53ZNews ItemWired state of mind
https://cis-india.org/news/wired-state-of-mind
<b>Information technology is the driver of society today — the basic block of innovation and growth in organisations, the mainstay of the 21st century. The decade bygone was only an indicator of the things to come. Whether its ideas or friendships, the future indubitably belongs to linking-up on the web, writes Malvika Tegta , DNA - Digital Edition, Monday - 28th December, 2009.</b>
<p>Did cyberscape make us cogs on a new machinery or liberate us, empower us or make us vulnerable, enrich us with cultural diversity or homogenise us? There isnt a simple answer. Not in a diverse world digitally sewn into a remarkably new pattern. Here what is certain is what is manifest — the emergence of an information society witness to changes in organisation structure, work cultures, community life, lifestyles, medicine, governance, activism, political participation, commercial business, conventional media, spaces for those on the social fringes, emergence of support systems. And a new connected state of mind.</p>
<p>Increased spread of the web and an exponential increase in internet platforms and applications unleashed a world of possibility for the user like never before. You could collaboratively edit a dynamic encyclopedia, collectively write a book on an idea seeded in the US and source ideas for your art project from perfect strangers from across the globe. There were endless ways of connecting with people we never knew existed — an increased consumption of global culture.</p>
<p>A phenomenon that enabled linking up like never before was social networking, invented in a Harvard dorm room in 2004. The Facebook culture that it spawned was drastically going to change our world as we knew it.</p>
<p>Consider how your life changed. A regular college evening in 2000, which was spent on chai, sutta and long walks, was invested in collecting updates about friends living on the same hostel wing on Facebook or Twitter. You were poked if you were being lazy about parting with your current mood update. When you spread out after college, these platforms kept you perpetually in the loop. You knew whod put on weight, whose relationship status had changed, that xyz was feeling crabby today. You, in turn, made sure that you posted one good picture of you in the Jaisalmer deserts for your 369 Facebook buddies to see. </p>
<p>And, all that upload and download of continuous information was negotiated on multiple browser windows, deftly juggled at work, while you waited for your strawberry crop on Farmville to mature.</p>
<p>In short, social lives of the 15% of us (Indians) with internet access were, if not fundamentally altered, certainly uploaded and impacted over the last 10 years. We became comfortable with the idea of trading identities and data about ourselves with companies like Orkut, Facebook or Google in return for the opportunity to realise the last connection on our six degrees of separation map.</p>
<p>Factors that made 24*7 wired lifestyle possible were miniaturisation, therefore portability computers; the smartening up of mobile phones; better broadband and Wi-Fi connectivity, and social media boom. Laptops made way for notebooks, notebooks for netbooks, and cell phone companies rolled out browser-based phones like the Blackberry and Android handsets.</p>
<p>To grasp the changes in the backdrop of the colossal exchange of data was to revisit Canadian philosopher Marshall McLuhans line, made famous way before the Internet got big, “The medium is the message”.</p>
<p>Cultural evolution<br />The Internet grew up fast over the past 10 years, both embodying social values like connectivity, participation, creating, collaborating and self-sufficiency, and in turn affecting them. It went from read-only sites to being driven by user generated content. The user became the creative dynamo, armed with tools like blogs, review forums, and sites like WordPress, Blogspot, Flickr and YouTube.</p>
<p>Then came social media: Orkut, LinkedIn, Facebook, Friendster, Twitter. Peer-2-peer file sharing application BitTorrent and music sharing sites like Napster came to represent the new philosophy. Here, the user became an active supplier of movies or music without the need for an intermediary server, as was generally the case before.</p>
<p>“The three cultural turns that social networking has introduced have been peer-2-peer networking, collaborations and new processes of publication and dissemination. These have changed our notion of history, cultural production and consumption, and knowledge production,” says <a href="https://cis-india.org/about/people/staff/nishant-shah" class="internal-link" title="Nishant Shah">Nishant Shah</a>, director, research, Centre for Internet and Society, Bangalore. “Sites like Wikipedia have dismantled the processes of knowledge production and learning and introduced new forms of knowledge-sharing, like crowd sourcing. Collaborations have managed new forms of emotional bonding, creative production and interaction which propel the blogosphere and public opinion. These have an impact on questions of consumption, lifestyle patterns, etc.”</p>
<p>24x7 connectivity<br />The Internet speeded up time and we “drew gratification from speed”. You wanted to look up a breakfast place, a word meaning or answer to the first thing off the top of your head like why are men the way they are? You wanted Google to turn up an answer, and fast.</p>
<p>Since free social working sites became a landmine of data on consumer behaviour, trends, likes and dislikes, they needed to attract and keep the numbers. A few sites maintained a near monopoly; search was to Google, social networking meant Facebook and realtime synonymous with Twitter. Apart from constant re-invention, the sheer potential for large-scale networking was the reason. “My friends stick to Gmail, Facebook and Twitter because we dont want to manage information on too many sites,” says Saurabh Shrivastava, an MBA student.</p>
<p>It was reported that Facebook users woke up to water virtual crops at 4am just to stay ahead on Farmville, or sign into Twitter to see how far the world had come. Instant feedback was the expectation. The experiences and satisfactions were on multiple windows; to be out of that pattern caused anxiety. That was also in part because people fell back upon structures of social support online, which were earlier unavailable; BlackBerry/smartphones to the rescue.</p>
<p>Though the network grew stronger, it essentially comprised weak ties. Technology consultant Atul Chitnis feels that wider reach… reduced real-world interactions are unnatural in the social perspective, and have made social interactions more competitive. “Its more about getting more comments and reactions.”</p>
<p>What writer James Harkin portrayed as the new crack cocaine, professor Clay Shirky saw as not the case of information overload but of “filter failure”.</p>
<p>Virtual & physical<br />While we became human nodes spending a large part of the day on the network, the physical fed into the virtual world and vice-versa. Shortened attention spans created an attention economy, leading conventional media to get increasingly visual and in some cases sensational.</p>
<p>The response to crisis speeded up and social mobilisation became easier. In Tsunami-hit South and Southeast Asia, people mobilised resources for the disaster-affected. A pub attack on women in Mangalore snowballed into the nationwide Pink Chaddi campaign.</p>
<p>While its constantly said that the Internet connects us virtually and isolates physically, <a href="https://cis-india.org/about/people/staff/nishant-shah" class="internal-link" title="Nishant Shah">Shah</a> says: “Contrary to popular perception, studies have shown that interface time increases peoples face time because new friendships, alliances and interests are anchored in the physical world.” The quality of interaction, however, will go down, says Chitnis, “due to current social patterns created by loss of cultural distinctiveness, and reduced real-world interaction”. This will especially be true for young adults “who will grow up not knowing a world without social networking”.</p>
<p>Language blends<br /><a href="https://cis-india.org/about/people/staff/nishant-shah" class="internal-link" title="Nishant Shah">Shah</a> sites the change in language as the most visible and dramatic. “Easy access to writing and publishing tools has led to the development of new forms of speech and articulation. In countries, where English is not the majority first language, new blends like Singlish (Singapore), Hinglish (India) and Chinglish (China) have emerged as Western contexts, cultural products and ideas proliferated in new vocabularies on the information superhighway. These changes are associated with other changes in terms of new linguistic identities and nationalities,” he says.</p>
<p>Niche goes pop<br />The growth of the Internet revolutionised the economics of distribution of the media and the entertainment industry, a trend Chris Anderson tracked in his book, The Long Tail. Once it would have been unthinkable to get a copy of a Skinny Puppy CD in the music store because it simply wasnt worth the stocking cost — it wasnt popular enough. And if it wasnt stocked, it was as good as non-existent for a buyer who had never heard of it. That was the era of the blockbuster: what was profitable sold. The Internet changed this: with virtually no space constraints, and the low manufacturing and distribution cost of digital content, a hit became just as good as a miss. Both constituted sales: larger the number the better. Today, Google, Rhapsody, Apple iTunes and Amazon, all operate on that business model. The result: niche worlds have become much more visible and mainstream.</p>
<p>So, as we slow-waltz to the buzz of information, an online etiquette evolves. We gradually learn to turn noise into substance, come to terms with the blurring of private and public, mobilise in crisis, hone the skill of swimming through information to come up with the right find, and learn to direct at least some part of leisure time spent surfing and chatting to tap into the Internets true potential.</p>
<p><a class="external-link" href="http://epaper.dnaindia.com/showstory.aspx?queryed=9&querypage=9&boxid=30712386&parentid=107305&eddate=Dec%2028%202009%2012:00AM">Link to the original article</a></p>
<p> </p>
<p> </p>
<p>
For more details visit <a href='https://cis-india.org/news/wired-state-of-mind'>https://cis-india.org/news/wired-state-of-mind</a>
</p>
No publisherradhaInternet Governance2011-04-02T13:56:55ZNews Item