<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/indian-express-january-19-2014-nishant-shah-10-ways-to-say-nothing-new"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/history-of-internet-building-conceptual-frameworks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/indian-express-december-22-2013-nishant-shah-digital-native"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/dml-central-nishant-shah-november-22-2013-how-can-we-make-open-education-truly-open"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame">
    <title>The Age of Shame</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame</link>
    <description>
        &lt;b&gt;The ability to capture private images is breeding a dangerous form of digital shaming. Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's column was &lt;a class="external-link" href="http://indianexpress.com/article/opinion/columns/the-age-of-shame/99/"&gt;published in the Indian Express&lt;/a&gt; on March 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Within the online space, where wonderments often run rife, and conspiracy theories travel at the speed of light, there are many dark recesses where netizens half-jokingly, self-referentially, in a spirit of part-truth, part-exaggeration, often wonder on what the real reason is for the internet to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One suggestion, and probably the most persuasive one, drawing from the Broadway musical Avenue Q, is that the internet was made for porn. Positing a competing argument is a clowder of cat lovers, who insist that the internet was made for cats. Or, at least, it is definitely made of cats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the first internet memes like LOL Cats (and then subsequently Grumpy Cat, Ceiling Cat and Hipster Kitty), which had pictures of cats used for strong social, cultural and political commentary, to Caturday — a practice where users on the Web’s largest unmoderated discussion board, 4Chan, post pictures of cats every Saturday — cats are everywhere.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to add to this list and suggest that the internet was meant for “shame”. With the explosion of the interactive Web, more people getting access to mobile computing devices, and more websites inviting users to write reviews, leak pictures, expose videos and reveal more personal and private information online, there seems to be no doubt that we live in the age of digital shaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aesthetic, also embedded in peer-to-peer platforms like chatroulete, or snapchat, where people often engage in sexting, is also becoming common in popular media. The ability to spy, to capture private images and videos, and expose the people who violate some imagined moral code has dangerous implications for the future of the Web and our own private lives. And as more of it goes unpunished and gets naturalised in our everyday digital practices, it is time to realise that the titillation it offers through scandal is far outweighed by the growing stress and grief it causes to victims. While there are some values to public shaming that ask for more transparency and accountability, we need to reflect on how it is creating societies of shame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It sometimes emerges as an attempt to shame governments, private institutions, places of consumption, for compromise of the rights of the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything, from denial of service and corruption in government offices to bad food and substandard goods in restaurants and malls, is now reported in an attempt to shame the people responsible for it. This kind of “citizen journalism” allows for individual voices and experiences to be heard and documented, and the people in question are forced to be accountable for their jobs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From fascinating websites like IPaidABribe.com to restaurant review sites like Zomato, we have seen an interesting phenomenon of “naming and shaming” that gives voice to individual discontent and anger. And so commonplace has this become, that most managers of different services and goods track, respond and mitigate the situation, often offering apologies and freebies to make up for that one bad experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most big organisations have Twitter handles that function in a similar way, addressing grievances of users in real time, and helping to deliver better services and products. It is a new era of granular accountability that ensures that individual acts of discrimination, neglect or just disservice get reported and have direct impact on those responsible for it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other end of the spectrum of this call for transparent and accountable structures, is the phenomenon of shaming and cyber bullying that is also increasing, especially with digital natives who spend more time online. On social networking sites, it has become almost passé, for personal and sensitive information to be leaked in order to shame and expose a person’s weaknesses and vulnerabilities. Especially for young teens who might be in a disadvantaged position — for reasons of sexual orientation, location, practices or interests — the shaming through exposing their private information often creates extremely traumatic conditions, even leading people to take their lives.&lt;br /&gt;Shaming takes up particularly dire forms on websites and platforms that are designed to leak this kind of information. Hunter Moore, who has recently earned the title of being the most hated man on the internet, was the founder of a revenge-porn website, which invited male users to reveal sexual and embarrassing pictures of their former girlfriends and even spouses, to reveal them in compromising positions and shame them for being “sluts”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moore’s website has been shut down now and he is facing multiple charges of felony in the US, but that one site was just the tip of the iceberg. Slut shaming and trying to humiliate women has become a strong underground practice on the dark web. Hidden by anonymity and the security that the Web can sometimes offer, people betray the trust of their friends and lovers and expose them to be punished by voyeuristic audiences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame'&gt;https://cis-india.org/internet-governance/blog/indian-express-march-30-2014-nishant-shah-the-age-of-shame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T04:05:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice">
    <title>Digital Gender: Theory, Methodology and Practice</title>
    <link>https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah was a panelist at a workshop jointly organized by HUMlab and UCGS (Umeå Centre for Gender Studies) at Umeå University from March 12 to 14, 2014. He blogged about the conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published by HUMLAB Blog on March 20, 2014 &lt;a class="external-link" href="http://blog.humlab.umu.se/?p=5147"&gt;here&lt;/a&gt;. Details of the workshop on Digital Gender can be seen &lt;a class="external-link" href="http://www.humlab.umu.se/digitalgender"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“When I was first invited to be a part of the Digital Gender conference curated by Anna Foka at the HUMlab in Umea, Sweden, there were many things that I had expected to find there: Historical approaches to understanding the relationship between digital technologies and practices and construction of gender, multi-modal and multi-disciplinary frameworks that examine the intersections of gender and the digital; Material and discursive descriptions of how we understand gender in contemporary realms. And indeed, I found it all there, and more, as a great collection of people, came together in dialogues of scholarly rigour, critical inquiry and political solidarity and empathy, to learn, to teach, to exchange research and scholarship. Given my past experiences of being at HUMlab and the incredible range of scholarship that was curated there, this came as no surprise.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/shah.png" alt="Nishant Shah" class="image-inline" title="Nishant Shah" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Dr. Nishant Shah in HUMlab&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;However, the one thing that stood out for me was an incredible session on Game Making conducted by Carl-Eric Engqvist. When I first saw it in the programme, I was apprehensive. What can Game Making have to do with digital gender? What would we learn from trying to design a game? I have been in ‘doing workshops’ before where things don’t always go as planned. Especially with the new ‘maker culture’ movements and DIY hipster phases, I have often found myself disappointed with workshops that focus too much on the technological and the interface. And I was in two minds about this – surely, we could have spent the time in more traditional academic experiences – round tables, discussion groups, or even just increased time for the participants to present their work. And so when the workshop began, I was waiting for it to make sense – to see what the game making’ workshop could have in store for the motley group of people that had assembled there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Engqvist started off by showing us three games that have inspired him the most and what he wanted us to take as our points of thought and from that moment on, I knew we were in safe hands. Engqvist was not interested in games for gaming. He was interested in games as artefacts, as ways of thinking, as modes of engagement into exploring, reifying and concretizing many of the questions around power and empathy. And more than anything else, he presented with us the idea that games can be pedagogic,  they can be learning tools; and though they might be designed for young players, they can be ways by which we translate our academic knowledge and research into practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What emerged in the subsequent two hours, was a great exercise in feminist methods and knowledge meeting new pedagogy and discussions. The group divided into two teams and set out to make a game that would be suitable for 8-10 year olds, and questions ideas of power and imbalance in their lives. Here are some things that I learned from the conversations:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The nature of true power: One of the most interesting discussions  that emerged was where the power resides. Scripted games often give us  the illusion of power by making the power of the script writer  invisible. While games are often open to creative interpretation and  negotiation, these are only within the context of the constraints of the  game. How do we design games that are then transparent about their own  limitations? Can we think of a game that is about building the game  rather than playing a game? Can we think of game outside of structures  of competition and winning, closer to the designs of the Theatre of the  Oppressed?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collective Empathy: The most dramatic revelation in the game making  exercise was the engineering of empathy. There were many different  suggestions on how to build empathy. One of the ideas was to put the  players in simulations of real-life crises, asking them to take up  different roles as antagonists and protagonists within the conflict,  along with by-standers who can choose to be allies. However, drawing  from legal narratives of rape, that demand that the rape victim be not  subjected to re-living the experience through testimonies in court, we  decided that it might be not fruitful to make participants re-live  real-life trauma in the course of the game. Eventually, we decided that  the way to escape this would be to let the participants be in control of  their own simulations, and offer them ways of establishing trust and  empathy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The power of narratives: In designing the narrative of the game,  what came out was our own personal narratives of why we believe in the  things that we do. How do we devise a game that has narratives of the  everyday that can eventually transcend into becoming special? How does  the playing of the game itself lead to repeated narratives, each  customised to the situation? How do we create conditions and  infrastructure that encourages users to iterate, repeat, remix and  remediate ideas so that they become rich and layered narratives? And  most importantly, how do we take something that is traumatic or  troublesome, something that scares or angers us, and get the help of our  fellow players, to reappropriate it, diffuse its hostile edge, and make  it more amenable and something that we can cope with?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;DIY experiences: We recognised as a group, that we were more  interested in a game that was about crafting experiences rather than  designing learning goals. Or in other words, we wanted something so  simple that it triggers something at the most visceral level, allowing  the players to dig deeper into their own selves and come up with ideas  that could resonate with the others. The ambition also was to have the  gamers be in control of the intensity and thus define the parameters of  their own gaming experience rather than be put into conditions or  situations that might lead to further trauma.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Teaching versus Learning: The largest chunk of our discussions  pivoted around these two concepts. When designing a pedagogic game, how  do we locate ourselves and the players? Do we assume the role of  pedagogues who have specific messages to deliver, or do we assume the  role of co-learners who will build a set of rules that create new  conditions of playing every time? How do we further ensure that the  games will have a feminist pedagogy of recursive and self-reflexive  criticality along with a clear message of empathy, collaboration and  togetherness?&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Presentation.png" alt="Presentation" class="image-inline" title="Presentation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presentation of the game ‘Drawing It Out’&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;What emerged through these five learning principles was a simple game  that we called ‘Drawing It Out’. Here are the rules of the game,  followed by some pictures that emerged as we played the game ourselves  in the group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Game: Drawing It Out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Players: 3-6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Age: 8 and above&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Materials: A number dice, a dice with different emotion words written  on it: Shame, Anger, Frustration, Love, Fear, Hope.  A tea-timer of 3  minutes. Sheets of blank paper, different coloured pens and pencils.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instructions:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Each member in the group rolls the number dice. The person with the highest roll gets to roll the emotion dice.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The emotion dice lands on any one of the emotions. For example: Fear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The tea-timer is turned, and each player, sitting in a circle, gets three minutes to draw the one thing that they are afraid of.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;When the time is over, each player gets to talk about the thing that they are afraid of.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once everybody has explained their fear, they pass their sheet of  paper to the person on the right. The tea-timer is turned. The next  person draws something else on the sheet of paper – adding, remixing,  morphing, changing the original drawing – to show how they can help in  overcoming the particular fear. In the case of hopeful words like Love  and Hope, the players add how they would increase and share in the  feeling.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each time the tea-timer runs out, the paper moves on to the next  person in the circle. The process is repeated till the sheet of paper  reaches the person who had first drawn on it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the end, each person looks at the sheet of paper they had begun  with and the others talk about the ways in which they have added to the  original drawing.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The participants roll the number dice again and repeat the process.  Participants are not allowed to draw the same thing if the emotion is  repeated. The game can be played till there is interest or time to play  it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The players get to take the sheets of remixed papers home with them  as artefacts and signs of the trust established within the game.”&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre  for Internet and Society, Bangalore, India. He is also an International  Tandem Partner at the Centre for Digital Cultures, Leuphana University,  Germany and a Knowledge Partner with the &lt;a href="http://www.hivos.net/" target="_blank"&gt;Hivos Knowledge Programme&lt;/a&gt;,  The Netherlands. Recently Dr. Nishant Shah visited HUMlab to  participate in the conference “Digital gender: Theory, Methodology and  Practice” (&lt;a href="http://www.humlab.umu.se/digitalgender" target="_blank"&gt;http://www.humlab.umu.se/digitalgender).&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice'&gt;https://cis-india.org/raw/digital-humanities/digital-gender-theory-methodology-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-04-07T04:07:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age">
    <title>Defending the Humanities in the Digital Age </title>
    <link>https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age</link>
    <description>
        &lt;b&gt;The author says that he is trying to take the formulation of digital humanities as a history-in-making where we might still be able to salvage the humanities from being soft-skills and our pedagogies from becoming reduced to MOOCs.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;Dr. Nishant Shah's &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/defending-humanities-digital-age"&gt;column was published in DML Central&lt;/a&gt; on February 24, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things: Reclaiming What is Lost in Our Defence of Humanities&lt;/b&gt;&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;br /&gt;If this were a book, this section would be the preface. If it were an academic paper, a footnote. If an art piece, a curator’s note. But, in this mixed multi-media semi-strange space of the research blog, this is just the space where I tell you what is going to follow. And perhaps, explain (though not to justify) why I need to tell you what is going to follow. For a while now, I have been trying to work through some of the questions that have emerged around (and sometimes, because of) digital humanities as a concept and as a practice. A lot of my thought has been about addressing the concerns around infrastructure, human skill, resources, pedagogy and the need to disprivilege the digital as the only point of focus in a majority of the discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I write about these questions in the different spaces that I write in, I’m trying to take the formulation of digital humanities as a history-in-making where we might still be able to salvage the humanities from being soft-skills and our pedagogies from becoming reduced to MOOCs. In doing so, I started experiencing a strange discomfort with my own writing. This is not new. Every time I glance retrospectively at my older writing, I cringe, and despair and work hard at resisting the impulse to apologise to my readers. It could have been better, sharper, more precise.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;But, the discomfort that I am experiencing now, looking at the last couple of years of writing about digital humanities, is different. It is a discomfort that emerges from the fact that in trying to defend and protect the domain of the humanities, the register of my writing has changed considerably.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I try to be accessible and write in prosaic forms that are easily understood and not prone to ambiguity. I try to talk to multiple stakeholders, especially those who are ringing the death knell of traditional humanities, speaking in a language of relevance, significance, impact and efficacy. I try to build infrastructure, engaging with funding agencies, carefully extrapolating the ideas of pilot innovations, mainscaling, upstreaming and integrating everyday practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all these attempts, which have been successful in varying degrees, I have let go of the very things that my English literature and humanities training had equipped me to do — to write with passion, to explore the creativity of linguistic and textual expression, to mix form, function and format to generate new relationships between disparate objects that might have otherwise been kept in their self-contained silos — and to pursue, not through empirical evidence, but through creative association, through cross-cultural and inter-textual referencing, a persuasive politics of passionate dialogue. Or, to not make such a song and dance (and a possible meme) out of it, I am slowly realising that very few of us, doing digital humanities, are exploring the very tools that humanities studies have offered us, to question and contest the status quo so that we can envision and dream alternate realities and futures.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; So caught have we been, trying to defend our craft (and sometimes the art) that we have started speaking in the language of those who question, rather than strengthening the voices we already have.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, I write today (see, I told you, we would need an explanation), as an experiment, in a language and style that I have forced myself to forget, in a way that I don’t even remember that it is forgotten. I write about three things – archives, life-cycles, and habits — in order to look at the complex and complicated relationships that we have presumed and established in the practices of digital humanities. I write to question our human-centric approach, where we think about things, but we only think of them from our human perspectives. I write to imagine, nay, to persuade you to imagine, what it would be like to think of things as things, dislodged from our human positions and dreaming cyborg dreams. I write, to explore, what it means in our DH concerns, to take care of things as things, and not as the separate, the other, the human.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things: The Beginning&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome, human beings, cyborgs, and things, to this blog post&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;It has been designed, by a few human beings, by a few machines, and a few things in-between. Here, I lay the ground and lead you into the fine practice of taking care of things. But this task produces in me a strange existential anxiety. I try to figure out what role I play in introducing something as common place, quotidian and everything as taking care of things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should I be like the head of an organised crime unit, who, for a price, shall take care of things that bother you by destroying them, silencing them, or making them invisible? Maybe I channel the energies of a grandmother, looking down the family tree of resemblances, giving out instructions on how to take care of the legacies and heirlooms, of the epilepsies in blood, that we shall pass from generation to generation. Should I be a historian who identifies patterns in the order of things, giving you hints at how we need to take care of things past and things to come so that we can live with things as they are? Or, how about a witness, blindfolded in my ignorance, a heathen in his blindness, describing to you the wonders of an elephant that looks like a pillar, a rope, a pan and a sword, trying to preserve what I remember, always knowing, always despairing that what I recall is smaller than what I remember, what I remember is smaller than what I know, what I know is smaller than what is, and what is, is both inscrutable and ineffable by the mere human?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I negotiate with these fractured, fragmented, frail and failed attempts at trying to care for you, care for ideas, care enough to transmit thoughts via words into your receptive selves, I realise that it is a futile attempt. Even if I were to enter that state of information nirvana, where what I think translates into words, pristine, pure, uncontaminated by powers of interpretation and untouched by the fallacy of meaning, you still would be unable to process it. Everything that I say will only be misunderstood by you. And, I shall misread your misunderstanding. And, together we shall fake it, like orgasms on a surreptitious one-night stand, in the quest of making meaning. In other words, I lament that we are not machines. That we are not things. It is only in the machinistic, especially in the digital machines of computing, that these seamless flows of information are possible. Garbage in, garbage out. What you see is what you get. Does exactly what it says on the tin. All your base are belong to us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so, welcome, once again human beings, cyborgs, things to this piece of text that I hope turns out to be fantastic, terrific, awesome. Fantastic because it invites you to enter realms of fantasy. Terrific because it leads us into things that terrify us. To this awesome evening. Awesome because it silences us into awe. Welcome, to this text, which is a safe space — look, you can ride on the hyphen, or drop between the white spaces of words. It is a safe space where we think, not of things, but as things. That is the only way out of the quandary into which I have trapped myself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Taking Care of Things&lt;br /&gt;&lt;/b&gt;It is humanly impossible to do so. And it is in thinking of taking care as a human function, that we face bewilderment and anxiety. If we pretend, for the space of this text&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; to be things — immortal but destructible, without agency but with design, bereft of intention but with defined purpose, devoid of ambiguity but prone to abuse — and try and make sense of the three things that we shall return to, recursively, obsessively, desperately, in the next three days, then we might be on to something.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As things, we look at archives. The repository of things. An indexicality of things that are present. A glaring array of things that are absent. The archive has been imagined in the service of the human, at the desire of the human, and the curatorial logics of collective human experience too long. Let us think of not only an archive of things, but an archive that follows the internal logics and logistics of things. An archive that is constructed by things, which might sometimes give us human access and interface to things within it. Archives, which might use human powers — biological, organic, intellectual, affective — to organise themselves, to fuel their constant expansion and arrangement. Archives as a purpose for human existence. Archives as the alien space jelly that feeds on the human in order to survive, so that it can sustain the order and power of the things that reside within it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a world where the human has already conceded its right to memory — memory is a stick, it is a promiscuous, adulterous, plug and play flash drive, that romances, serenades and has infectious relationships with different machines… in such a world, it should be easy to imagine that the human, at least when it comes to informational realities, is secondary, if not insignificant. The human, prone to decay and death, attacked by biological malware that erodes its internal functions, disabling its programmes and often short-circuiting its motherboard, is fragile and surely the most unstable form of storing something as beautiful and terrifying as information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We live too fast, die too soon, and in the process, constantly destroy the meaningless but necessary flow and circulation of information. And, so, we need to think of life-cycles differently. The things that we live with, generally outlive our carbon based biological bodies. We pass on, through genetic mutation, our eyes, our knobby knees and our genetic predisposition to chocolate to the subsequent generations. But, we also pass on our assets, our properties, our passwords and datasets. And maybe, given that the data outlives us, data is seemingly immortal, data registers our death and continues in its divine existence, we need to restructure our idea of who lives, who dies, and what constitutes a life-cycle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, I beseech you, to let go of your humanity. This stubborn sticking to the idea of being human, is merely a habit. It is taught. It is a form of co-option. Remember those days, when you were still not sure about being human. The day, when you were told that when you grow up, you can become anything you want — the disappointment of realising that it was a lie… that you wanted to be a dog, but you were trapped and coerced into becoming a human. Let go of the idea that being human has anything exceptional to it. We love. We care. We kill. Well, guess what?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things Care&lt;br /&gt;&lt;/b&gt;Things love. Oh, they love. Selfishly, destructively, intensely. Things love us and they demand our attention, time and intimacy, slowly enveloping us in soft glows, gently vibrating in our pockets, sensually slithering in our hands. And everybody knows what happens to a machine that you pour a cup of coffee on — like a disappointed lover, Romeo to his Juliet poisoning himself to death, like Medea on a revenge spree eating her own children, the machine, when neglected, dies.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things care. But we are mistaken in thinking that they care for us. Things care for themselves. &lt;a href="http://www.plecebo.org/2009/01/kelly-dobson-and-robots.html"&gt;Things take care of each other.&lt;/a&gt; When you and I are asleep, your refrigerator connects to your microwave, speaking through the analogue networks, resonating in electromagnetic frequencies. And things kill.  Slowly, gently, hypnotically, they wait, they watch, and when we are not looking, they stab, they sting, they betray and remind us that the human is futile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To take care of things as human beings is then an exercise in wasted effort. Because we shall always be addressing things from a condition of inadequacy and wastefulness, well aware that the thing that we are talking to, talking about, talking through, is more precise, more fulfilled, more in control of its intentions and more aware of its destiny than we are ever going to be. Maybe in order to take care of things, we need to think of ourselves as things. Things that talk to things. Things that take care of things. That will be a world of new equalities. A world, where we can stop living in fear of the other — the thing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Where Everything is a Thing&lt;/b&gt;&lt;br /&gt;A thing is in everything.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;span&gt;This is a footnote to acknowledge that the first thought for this  line of thinking emerged in conversations at the Post Media Lab, and  concretized at their &lt;/span&gt;&lt;a href="http://www.postmedialab.org/taking-care-of-things"&gt;recent event&lt;/a&gt;&lt;span&gt; from where I borrow this title. Special thanks for &lt;/span&gt;&lt;a href="http://lerone.net/?language=en"&gt;Oliver Lerone Schultz&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.leuphana.de/clemens-apprich.html"&gt;Clemens Apprich&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://hybridpublishing.org/author/christinakral/"&gt;Christina Kral&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.risd.edu/Digital___Media/Kelly_Dobson/"&gt;Kelly Dobson&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://research.brown.edu/myresearch/Wendy_Chun"&gt;Wendy Chun&lt;/a&gt;&lt;span&gt; who made this line of thinking grow through the &lt;/span&gt;&lt;a href="http://dmlcentral.net/blog/nishant-shah/habits-living-being-human-networked-society"&gt;Habits of Living&lt;/a&gt;&lt;span&gt; workshops.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. For the first time, the green underline that my word processor has produced, telling me that the correct prose would end the sentence with ‘and more precise’ is not feeding my Dysgrammatophobia. How dare it tell me how I should write?&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. I have to give a special shout out to &lt;a href="http://en.wikipedia.org/wiki/Johanna_Drucker"&gt;Johanna Drucker&lt;/a&gt; whose  resolute mixing of the styles and genres, writing as a digital humanist  while writing about digital humanities has been truly inspiring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. I am not sure which of you would read it in its entirety, and I don’t  really know how to talk to things yet, so while I welcome everybody and  everything, I am going to address only the human reader in my text. My  metadata, I hope, imparts pleasure to the non-humans who are not  plotting their way into Actor-Network visualisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. While battles rage on Twitter, relationships live their life-cycles on  Facebook, new memes propagate and abound the Tumblrs,  blink-and-you-miss-them, subcultural practices explode into meteoric  showers, and somewhere, some harassed teacher tries to figure out what  s/he did wrong in the last seven births that s/he now has to teach  using &lt;a href="http://www.blackboard.com/platforms/learn/overview.aspx"&gt;Blackboard&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age'&gt;https://cis-india.org/raw/digital-humanities/dmlcentral-nishant-shah-february-24-2014-defending-the-humanities-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-03-06T11:40:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture">
    <title>Will You be Paid to Post a Picture?</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture</link>
    <description>
        &lt;b&gt;The wave of free information production on the web is on the wane.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/india/india-others/will-you-be-paid-to-post-a-picture/99/"&gt;published in the Indian Express&lt;/a&gt; on February 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The age of volunteerism is officially over. The last decade of the mass adoption of the internet has been fuelled by endless human hours being spent in producing information which is the new currency of our times. The big transition to Web 2.0 began when the individual “user” became more than either an individual or the user. The individual found herself as a part of a collective, finding a voice and a community of others to belong to. Simultaneously, instead of being a passive consumer of the web, the user started producing data — blogs, videos, tweets, content management systems, online discussion boards, massively multiple online role-playing platforms, social network transactions — all of which became a part of the new Web’s widespread popularity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost everything that we understand as the social web today is contingent upon people producing data in their interactions with the world around them. From knowledge producing websites like Wikipedia to entertainment platforms like YouTube, visualisation and data gathering spaces like Pinterest to photographs of self, food and cute animals on Instagram, political and social commentaries on Tumblr to Listicles and memes on Buzzfeed, the internet is a veritable smorgasbord of new information forms, formats and functions that are generated by the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is possibly the most exciting about this burgeoning information universe has been the amount of free labour that goes into it, and often remains invisible. As digital labour scholar Trebor Schulz points out, the internet has become both a factory and a playground, where our leisure time is capitalised into producing work that sustains the new attention and information economies. For instance, the world’s largest social networking site, Facebook, does not produce any of its contents. It is, in fact, a system of information mining and sorting, which works as long as a growing user base continues to produce information on it. Tomorrow, if all of us stop producing Facebook, and only lurk on it, the platform will collapse. Which is why, Facebook continues to acquire new platforms and applications to be integrated into its universe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the real effort that goes into the sustenance of sites like Wikipedia, which has become the de facto reference for global knowledge systems, is carried out by unsung and invisible editors who patiently, meticulously, and without almost any expectation, continue to add, verify, strengthen and curate reliable information that we can use. When the non-profit organisation WikiMedia Foundation prides itself in running one of the least expensive websites in the top 10 most visited sites in the world, it is signalling its deep appreciation for the countless human hours that have made Wikipedia possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, in recent years, there is noticeable stagnation in the wave of free information production on the Web. Oh, don’t get me wrong. We are producing an unprecedented amount of data — we are constantly being watched by surveillance technologies that detect biometric and genetic make-up of all our transactions, or we are inviting people to watch us on social network sites where we reveal some of our deepest secrets and desires, or we are watching ourselves, quantifying everything from things we ate to the number of hours we sleep. And yet, as we live in a world of Big Data, there is a definite decrease in people contributing to production of free information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the digital natives move from the web to mobile phones, traditional websites are already facing a crisis. News and media agencies that have celebrated the global citizen media networks have started realising that the individual user is more interested in local networks and information ecologies which are independent of mainstream conglomerates. And people are realising that their time and effort is worth money. They can be easily compensated for their online activities and gain reputation and importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tension only becomes more palpable when people start realising that there are others who are being paid to work on the platforms that they are contributing to. We all knew that this model of depending on free information was not a sustainable one. But it seems the day has arrived, especially with the recent drives on Wikipedia to build specialised knowledge editors. In the last few months, we have seen people in the FemTechNet project — an academic activist feminist project that seeks to remind us of the intersections of feminism and technology in network societies — carry out “Wikistorming”, where students are adding pages of women’s contribution to technologies on Wikipedia. More recently, medicine students at University of Chicago have taken to correcting and adding accurate information to Wikipedia, which is often a source of health information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both of these are fantastic efforts to add to the platform that was the underdog that overthrew the mammoth encyclopaedia like The Encyclopaedia Britannica. We hope more specialised users in different locations, fields, disciplines and languages continue to edit and contribute to Wikipedia. However, it is also a signal that the generalist information producer is on the decline. We are transitioning into a new age, where people are going to need rewards, incentives and benefits for performing information transactions on the web. The user is no longer going to be available for free labour, and it is time we started thinking of “paid usership”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture'&gt;https://cis-india.org/internet-governance/blog/indian-express-february-18-2014-nishant-shah-will-you-be-paid-to-post-a-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-06T11:58:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way">
    <title>The Internet Way</title>
    <link>https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way</link>
    <description>
        &lt;b&gt;Dr. Nishant Shah's review of the book “The Everything Store: Jeff Bezos and the Age of Amazon” by Bantam Press/Random House Group, London was published in Biblio Vol. 19 No.8 (1&amp;2), January – February 2014.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/biblio-january-february-2014.pdf" class="internal-link"&gt;Click to download the file&lt;/a&gt; (PDF, 2436 Kb). Dr. Nishant Shah's review can be found on page 16.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;The Age of Amazon’ is not just the title of a book, it is a retrospective on the history of e-commerce as well as a prophecy for the shape of things to come. In his meticulously reported book, Brad Stone takes us through the roller coaster ride of the ‘Everything Store’ that Amazon has become, building a gripping tale of an idea that has become synonymous to the world of online shopping in just over two decades.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The book reads well as a biopic on the visionary lunacy of Jeff Bezos, the founder of Amazon, as well as a gripping tale of how ideas grow and develop in the digital information age. Stone is an expert storyteller, not only because of his eye for the whimsical, the curious and the enchantment of the seemingly banal, but also because of his ability to question his own craft.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;At the very outset, Stone warns us that the book has been compiled through workers at employee, but not Bezos himself. This helps Stone separate the maker from the brand — unlike Steve Jobs who became the cult icon for Apple, Bezos himself has never become the poster child of his brand, allowing&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Amazon to become not only an everything store but everybody store. But it means that Stone’s task was to weave together the personal biography of Bezos, his dramatic journey through life with the tumultuous and adventurous inception and growth of Amazon, and his skill lies in the meeting of the twines, which he does with style, ease and charm.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;One of the easiest accusations to throw at a book like this is to state that it reduces the murky, blurred, messy and incoherent set of events into a narrative that establishes causes and attributes design and intention where none existed. However, Stone was confronted with the idea of ‘Narrative Fallacy’ — a concept coined by Nassim Nicholas Taleb in his Black Swan, referring to the tendency of human beings to reduce complex phenomenon to “soothing but oversimplified stories”. In fact, the challenge to not reduce the book to a series of connected anecdotes was posed by Bezos when Stone pitched the book to him. And what has emerged is a book about accidents, serendipity, risk, redundancy, failure charting the ineffable, inscrutable and inexplicable ways in which digital technologies are shaping the worlds we live in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;With the rigour and journalistic inquiry that Stone has displayed in his regular writings in The Businessweek, The Everything Store has stories which are as memorable as they are unexpected. Stone does a fantastic job of charting Bezos’ life — from tracking down the lost father who had no idea what his son, who he had abandoned at age three, has become, to the chuckleworthy compilation of Bezos’ favourite quotes (Stone calls it his ‘greatest hits’), the book is filled with pointed and poignant observations and stories that give us an idea of the extraordinary life of Jeff Bezos. But unlike the expected character creation of a mad genius, what you get is the image of a man who lived in contradictions: wedded to his internal idea of truth but also ruthless in his business policies which were predatory and competitive to say the least; a businessman who once wrote a memo titled ‘Amazon.love’ about how he wanted a company to be “loved not feared” but also used the metaphor of a “cheetah preying on the gazelles” in its acquisition of smaller businesses; a man who thought of himself as a “missionary rather than a mercenary” and yet built a business empire that embodies some of the most discriminatory, exploitative and stark conditions of adjunct, adhoc, underpaid and contract-based labour of our precariously mobile worlds.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Stone is masterful as he segues from Bezos’ personal life and ambitions into the monomaniacal and turbulent trajectory of Amazon. Amazon is not a simple success story. It tried and failed at many things, but what remains important is how, it failed at the traditional way of doing things and succeeded at the internet way of thinking. So when Amazon failed, it was not a failure to succeed, but a failure that resulted because the infrastructure needed to make it succeed was not yet in place. Stone’s narrative that effortlessly takes us through the economics, trade, policies, regulation, administration and struggles of Amazon, shows how it was a company that had to invent the world it wanted to succeed in, in order to succeed. In many ways, the book becomes not only about Amazon and its ambitions to sell everything from A-Z, but about how it built prototypes for the rest of the world so that it could become relevant and rule.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;But the book is not a Martin-Scorsese-type homage to the scoundrel or the villain. While it is imbued up and spit you out. And if you are good, he will jump on your back and ride you into the ground.” Or as Stone himself suggests, that is the way the company is going to grow “until either Jeff Bezos exits the scene or no one is left to stand in his way”. This policy of taking everything from its employees and channelling it to the relentless growth of the company accounts for not only the high attrition rate of top executives but also the growing controversies about work and labour conditions in Amazon warehouses and on-the-ground delivery services.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Stone’s book does not go into great detail about the new work force that companies like Amazon produce — a work force that is reduced to being a cog in a system, performing mechanical tasks, working at minimal wage, and without the protections that are offered to the white collar high-level technology executives that are the popup children of the digital trade. Stone reminds us that behind the incredible platform that Amazon is, is a massive physical infrastructure which almost reminds us of the early industrial days where the labourer was in a state of exploitation and precariousness. And even as we celebrate the rise of these global behemoths, we might forget that behind the seductive interfaces and big data applications, that under the excitement of drone-based delivery systems and artificial intelligence that will start delivering things even before you place the order, is a system that pushes more and more workers in unprotected and exploitative work conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;All in all, The Everything Store is a little bit like Amazon itself. It is a love story of a man with his ideas, and how the rest of the world has shifted, tectonically, to accommodate these eruptions. In its historical retrospective, it shows us the full scope of the ideas and possibilities that inform Amazon, and thus the future that it is going to build for us. And with masterful craftsmanship, Brad Stone writes that it is as much about the one man and his company, as it is about the physical and affective infrastructure of our rapidly transforming digital worlds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way'&gt;https://cis-india.org/internet-governance/blog/biblio-january-february-volume-ix-8-nishant-shah-the-internet-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-14T06:59:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/indian-express-january-19-2014-nishant-shah-10-ways-to-say-nothing-new">
    <title>10 Ways to Say Nothing New</title>
    <link>https://cis-india.org/digital-natives/blog/indian-express-january-19-2014-nishant-shah-10-ways-to-say-nothing-new</link>
    <description>
        &lt;b&gt;The rise of the listicle, a safe, non-thinking information piece that tells us what we already know.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Nishant Shah's article was &lt;a class="external-link" href="http://epaper.indianexpress.com/216222/Eye-The-Sunday-Express-Magazine/19-January-2014#page/20/2"&gt;published in the Indian Express&lt;/a&gt; on January 19, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;I Always Like to begin the New Year with a self-fulfilling prophecy, assured in the fact that like New Year resolutions, it will quickly be forgotten in the attention deficit times that we live in. Nevertheless, it is always a fun exercise, to play Cassandra, and utter ominous things about the time to come. I am looking at my fasterthan-byte feeds online and trying to figure out the new trend that is going to be the absolute death of us in 2014. I did some research (Google search), consulted some experts (asked friends on Facebook),analysed critiques (trolled on Twitter), and looked at current trends (followed funny Tumblrs) and finally have the answer. The thing that we must brace for is the list — or rather the listicle (an article that is written like a list).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Have you noticed it? Almost anything that is anything on the internet lately has been presented to us as a list. There are lists for everything — of things people say, of things people do, of things people want to say about people who do things. On websites in the business of making things go viral (and slightly fermented), the listicle has emerged as the next best thing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Now, I don’t want us to run away with the idea (10 ways to run away with ideas — coming soon on Viral Nova) that lists are new. Lists have always existed and have been one of the most basic forms of archiving, sorting and storing human knowledge and information. However, the new lists that are doing the rounds on BuzzFeed, Reditt, Viral Nova and everywhere else need attention. The listicle is an incredible performance of the strange, the silly and the deranged. Like reality TV judges, they are empty, cliché-ridden and yet seductive. They are supposed to produce profound truths, give us insights into our everyday practices, harness the wisdom of crowds and help curate overloaded information feeds to distil what is most relevant and useful. In itself, that is a fantastic ambition and for somebody who is constantly moaning about there not being enough time to follow everything on the internet (way too many videos of pandas making friends with wallabies on Vimeo these days), I appreciate the ability that listicles have of reducing read-time and giving us tweet-sized nuggets of wisdom. Bam! Our lives have changed!&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And yet, as you look at these lists, you slowly start realising that listicles are significantly empty. They try to pass on the banal, the boring, the insipid and the extraordinarily common-sense as knowledge, information and wisdom. I am randomly looking at the last five listicles on my timeline — 20 reasons why a 20-something would never survive Hunger Games (right, because that’s the message of the books — get children to kill each other!), 31 insanely clever ideas to remodel your new house (a lot of them using chopped up coke bottles and toilet paper rolls for that intimate ambience), 18 ways of discovering happiness through travel (my first rule is “be very rich”), 25 universal horrors of hair removal (let it grow! Let it grow! Let it grow!) and seven ways of making a to-do list that works (get it? Get it? A list about making an efficient list. May I please say #FacePalm?)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So, snide remarks aside (10 ways to let go of sarcasm?) what does this mean for us? Why are listicles so popular? Why are the tech-savvy, educated people online, who could be overthrowing authority (all hail, Snowden) and feeding starving children in a poor country of their choice — why are they all spending the time with listicles? I am proposing that the listicle is the final death of politics, criticality and thought on the internet. We have already seen how online conversations quickly devolve into an exercise in creative name-calling and racist, bigoted bullying. The internet has already shown us that all debates end in accusations of fascism (Godwin’s law) and that anything that you say online is going to offend somebody who will then come back, like the ghost of Christmas past, and haunt you. In the hostile space that the internet has become, not the very least because everybody is not watching porn, searching for pictures of animals, or pirating music and movies, we are all trained to be the saints who were persecuted for their beliefs. There is no such thing as a bad person on the internet. Everybody is smug, holier- than-thou, and even when wrong, are saintly wrong, and thus martyrs. For a medium that was supposed to encourage conversation, unless you are in the company of people you know, the internet has become a hunting ground, where the only thing you can do safely is make a list. And hence, the listicle.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;True, once in a while, there are some really cool listicles (though they might lead to mild electrocution or house burning down, but hey, no pain, no gain, right?) and they do help in visualising and transmitting information very fast. At the end of the day, listicles are the space that conversations go to die. The listicle is a safe, non-offensive, non-thinking information piece that tells us what we already know, confirms what we had always suspected, and gives validation to the impressive schools of thoughts like “My grandmother says so” and “I have heard that”. It is a way by which we escape deep thought or engaged talk, basking in the enchantment of our own brilliance, no longer in need of thinking anymore, because look, look how beautiful our thoughts look in the listicle, and look, how many people are sharing it! The listicle has risen and it looks like it is just going to get more popular. Maybe it is time to write a listicle about why we shouldn’t be writing listicles.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/indian-express-january-19-2014-nishant-shah-10-ways-to-say-nothing-new'&gt;https://cis-india.org/digital-natives/blog/indian-express-january-19-2014-nishant-shah-10-ways-to-say-nothing-new&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2015-04-14T13:17:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/history-of-internet-building-conceptual-frameworks">
    <title>History of the Internet: Building Conceptual Frameworks</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/history-of-internet-building-conceptual-frameworks</link>
    <description>
        &lt;b&gt;In this module Nishant Shah analyses the understanding of the Internet, cyberspace and everyday life and why do we need to know the history of the internet.&lt;/b&gt;
        &lt;h3&gt;Introduction: Understanding the Internet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Let’s begin at the beginning. Before we get into the history of the Internet, it might be a good thing to try and figure out what the Internet is and what exactly are we talking about when we say ‘Internet’. Let’s take a moment and figure out what the Internet is. If you pause right now, and try and define the Internet it is going to be tricky. However, if you look at other media and communication technologies you realise that the same is true for all the other technologies that you daily deal with. Try and define what a book is. Or, what is a film? It is one of the signs that a technology has become internal, personal and ubiquitous that it becomes transparent. It doesn’t require us to think about how it works. Almost like magic, the technologies just ease our way into life and perform crucial tasks of everyday living, without really making their internal mechanics transparent. So it is highly possible that unless you are trained in technologies, you have a vague idea of what the Internet is and how it works.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a very basic level, the Internet is a network of computers that are able to talk to each other using a protocol that is popularly known as the TCP/IP suite. That is it. At a most cursory level, that is all there is to the Internet. An extensive network – even a network of network – that makes it possible for billions of users across the globe, to exchange information using digital data, in asynchronous and distributed forms. And this has been historically the case. The origins of the Internet are in military and state funded research in the United States of America in 1960s, where they were developing robust communication networks that could account for redundancy – which  is to say that they wanted a network which would function even when particular nodes fell out of service, or certain flow-lines within the network were blocked. A history of the Internet then, will be a history of its technological development – the different protocols, programmes and innovations that allowed for this network to grow out of the defense research labs in the 1960s, be used extensively in American and European academia in the 1980s and then made available to the public in the 1990s. So that is one history that we might need to look at. It is a technological history of the Internet, that allows us to understand what the challenges, strengths, weaknesses and vulnerabilities of the Internet technologies have been and how we have constantly innovated to meet these problems and aspirations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as you can imagine, that is a technical history of technology which is well documented, well, on the Internet. A look at the page on Wikipedia&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;will show you all the different technological, institutional and digital innovations that have shaped the Internet from its early days residing on the ARPANET to the global phenomenon that we know now. It is a history of facts and dates, names and numbers and it is easily accessible to anybody who wants to look at the different institutions, technologies and conversations shaped what we understand as the Internet today. You might also want to look at these three different accounts of that history to get the facts,&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;anecdotes&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and stories&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; in order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You will realise from the sources that the Internet is the backbone of our digital experience. It hosts a vast range of services, like peer-2-peer networks, voice and text chats, hypertext documents, and indeed, the most prominent of them all – the World Wide Web. We need to understand that the Internet is thus larger than the World Wide Web and what we have access to, using the WWW, is a very small subset of this larger global digital network. To know the structure of the internet, how it is governed, what are the different inequities, vulnerabilities and problems it creates are important to study because they give us an entry point into understanding how the technological and technical choices that are made affect and impact our everyday concerns around questions of privacy, identity, access, usage, affordability, accessibility etc. These are questions that often get addressed under the rubric of Internet Governance&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;and will be dealt with in the subsequent sessions for this Institute that expand upon the Infrastructure and Institutions that govern the Internet&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; In the meantime, I want to begin with the personal. Instead of beginning with the technological, I want to begin with our everyday experiences on the Internet, and particularly of this thing that we call cyberspace.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pinning down Cyberspace&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Let’s take a pause and try and answer a hard question: What is Cyberspace? If you thought that defining the Internet was tough, you will quickly realise that defining Cyberspace is going to be even tougher. We know when we are on cyberspace. We use it across a variety of devices and interfaces. We think of ourselves as connected and online for most of our waking (and sleeping) hours. Cyberspace is right there – You will be able to point to it, give examples, even talk about what it facilitates. For example, cyberspace is a virtual space created by digital communication and connection. Or cyberspace is a repository of information that people create globally using computing technologies. Or cyberspace is a space where people manage their social networks. These are all different instances of cyberspace and indicate the wide variety of things that we do when we are online, but they don’t necessarily tell us what cyberspace is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like all good things, the origins of the word cyberspace are actually in Science Fiction. William Gibson in his iconic cyberpunk novel ‘NeuroMancer’ (1984), first coined the word cyberspace and defined it thus:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyberspace: A consensual hallucination experienced daily by billions of legitimate operators in every nation, by children being taught mathematical concepts... A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there are several critiques of Gibson’s description of the word, we  must remember that it is fiction and look at it to see what are the conceptual complexities that Gibson is throwing up that are now being discussed in contemporary debates. I want to highlight three things that Gibson’s definition  brings up, which might be important to understand how deal and engage with cyberspace.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Consensual hallucination&lt;/i&gt; – This is probably one of the strongest and the strangest ways of talking about cyberspace. A hallucination is something that happens in your head. It is a space of virtuality. It is an event that nobody except for the one individual who claims it, can verify. It is thus, categorically the non-real. However, a consensual hallucination is a mystifying thing.&lt;br /&gt;&lt;br /&gt;Let’s say that you propose that from this moment on, you are a dog (even though, as the cartoon famously says, on the internet nobody knows you are a dog). If you were to stand up in your social circles and announce that you are a dog, it would lead to some strange reactions. If you persisted in acting like a dog and responding only to a dog, chances are that you might be put into a mental asylum to be treated of this hallucination. However, if everybody else in the room consented that you are a dog, and indeed, they are all, also dogs, then your hallucination becomes real. It gains valence. It has legitimacy. It becomes a norm.&lt;br /&gt;&lt;br /&gt;Gibson, in positing cyberspace as a ‘consensual hallucination’ is reminding us that this is indeed, the very way in which our reality is constructed. For instance, think of the colour blue. Now try and figure out how the blue that you are thinking about and the blue that I am thinking about is the same blue. We can’t verify that we are all talking about the same blue. And yet, there is a consensus among us that there is a blueness to the colour blue that we all refer to when we think of the colour blue.&lt;br /&gt;&lt;br /&gt;Reality is a process of consensual hallucination. So is Cyberspace. Which mean that instead of making the distinction between the real and the virtual, or trying to figure out what is real and what is not, it is more fruitful for us to engage with the idea that the virtual is a part of the real. There are various processes – social, cultural, political, economic, and governmental – that structure and validate our reality. And hence, reality is always changing. The science fiction futures that were dreamt in the last century are the present times that we live in. The idea of consensual hallucination, takes us away from a debate about Virtual Reality and Real Life (VR – RL) that has been endemic to the conversations around cyberspace. Following Gibson’s lead I would encourage us, not to think of cyberspace in terms of the virtual or the unreal, but as a constitutive and generative part of our reality.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;A graphic representation of abstracted data:&lt;/i&gt; The use of the term ‘space’ is often bewildering in Gibson’s coinage because it does not really seem to appear in the definition. Space, as we understand it, is a location metaphor. It refers to spatial dimensions of a thing. It gives us a sense of fixity. However, these are all expectations of physical space. The ‘space’ in cyberspace has more in common with the abstract concepts of space in mathematics and metaphors rather than in terms of geography and location.&lt;br /&gt;&lt;br /&gt;We need to understand that even in geographical terms, space is an abstraction of sorts. Space is the virtual or perceived usage, volume and experience of place. If you have a piece of land, that is the place of that land. The place is geographically present. It can be materially touched and located. However, the space is what you attribute to that piece of land. It is defined by the intentions and aspirations, by what is allowed and what is not. Space is a philosophical concept. Which is why, in everyday talk, when you say, ‘I need some space’, you don’t necessarily mean that you need geographical isolation, but often refers to the head-space that is less tangible.&lt;br /&gt;&lt;br /&gt;Similarly, the space in Cyberspace, even though it has been often used to talk about the space on the network that connects different webpages, or the immersive environments that role playing games offer, or the virtual communities on social networking sites  like Facebook, it is important to remember that space is an abstraction. And cyberspace thus is not the actual mechanics and nitty-gritties of technology but what is built because of those interactions.&lt;br /&gt;&lt;br /&gt;Bruce Sterling, in his introduction to &lt;i&gt;The Hacker Crackdown&lt;/i&gt; quite evocatively explains this:  ‘Cyberspace is the "place" where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk. Not inside the other person's phone, in some other city. &lt;b&gt;The place between&lt;/b&gt; the phones. [...] in the past twenty years, this electrical "space," which was once thin and dark and one-dimensional—little more than a narrow speaking-tube, stretching from phone to phone—has flung itself open like a gigantic jack-in-the-box. Light has flooded upon it, the eerie light of the glowing computer screen. This dark electric netherworld has become a vast flowering electronic landscape. Since the 1960s, the world of the telephone has cross-bred itself with computers and television, and though there is still no substance to cyberspace, nothing you can handle, it has a strange kind of physicality now. It makes good sense today to talk of cyberspace as a place all its own.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Non-space of the mind: In the cyberpunk universe of the novel &lt;i&gt;Neuromancer&lt;/i&gt;, Gibson makes a difference between cyberspace and meat-space. There is a definite privileging of cyberspace, which is the world of seduction, adventure, excitement and entertainment. The meat-space, where our biological bodies survive and live, is in a state of collapse and disrepair. This bleak vision of the biological as disintegrating and the digital as becoming the primary mode of existence has been espoused by various science fiction and fantasy narratives. For all of us who have seen &lt;i&gt;The Matrix&lt;/i&gt;, we are familiar with this idea that slowly and singularly, we are moving towards creating digital lives which are gaining precedence over our ‘real’ lives.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Especially when it comes to the discourse around digital objects, this hierarchy of dismissing the biological and the real over the virtual and the digital is often reinforced. However, Gibson was already reminding us, with the ‘non-space of the mind’ that the digital and the biological are not as separate or discrete as we would have liked to imagine. Let us look at what the ‘non-space’ can mean.  For this, we might have to look at two different conceptual moves in philosophy.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The first is a distinction between the brain and mind. It is obvious that the brain and the mind are not the same thing. The brain is the biological organ in our cranial cavity. It is made up on cells and neurons, flesh and blood, so to speak. It is what the artificial intelligence scholar Andy Clark calls ‘a skin bag’. The brain performs various functions that keep our body alive and sapient. The mind, is an abstraction of the brain. The mind is our thoughts, memories, associations, feelings, and all the other things that make us human. The brain might support the mind but they are not the same. I hope that this is beginning to sound familiar to us – that the brain-mind relationship is the same as we have mapped out for Internet-Cyberspace. Just like cyberspace is an abstraction of data that we have consented to be real, the mind is also an abstraction that encapsulates the interiority of our selves.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The second is an understanding of binaries and opposites. We are designed, as human beings (even though we attribute this to the digital machines) to think in binaries. Black-White, Good-Bad, Day-Night. This is the way in which our cultures have been built. We think of the positive and the negative and create a spectrum in between to understand our world. These binaries are often confused with being opposites. So we would say that the opposite of Black is white. Or that the opposite of Day is Night. However, in the study of Logics, we are taught that the binary is not the same as opposite. All the way back in history, Aristotle had already posited that it is a fallacy to mistake a binary for an opposite. So, for instance the binary opposition of ‘day’ might be ‘night’, but the logical opposite of ‘day’ is ‘non-day’. Or to make it simpler, the binary opposition of the colour ‘black’ is ‘white’. However, the logical opposite of ‘black’ is ‘non-black’ and hence every other colour that is not black, is its logical opposite.  We go through this to realise that in the brain-mind mapping, the brain is the place. The mind is the non-brain, or the space. And then the non-space of the mind, is the brain all over again. Gibson does this recursive negation to remind us that the things that happen in cyberspace have direct consequences on meatspace. What happens in cyberspace directly affects the non-space of our bodies, our lived realities and experiences. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Cyberspace and Everyday Life&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is important to begin with the definition that Gibson offered because it informs a lot of the debates that happened historically, around cyberspace and how we understand it. However, it also allows us to side-step these debates because they are not fruitful. They reinforce the idea that the internet and cyberspace are removed from our reality, that they are technological concerns rather than human, social and political concerns, and they insist that the internet and cyberspace are in opposition to being human. These ideas produce accounts of the internet and cyberspace which, for me, are fruitless. The leads from Gibson’s definition, instead, allow us to understand the internet and cyberspace as deeply implicated in our conditions of being human, being social and being political. They offer us a different way of rewriting the history of the Internet, not merely as a linear narrative of the technological advancements, but as a rich and complex account of how the internet and cyberspace have shaped and been shaped by the social, cultural and political milieu that they have emerged in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And so, we approach the history of the internet in a different way. Instead of looking at the Internet as a technology, we deal with the Internet in its many forms, through cyberspace and our everyday engagement with it.  Or, rather, we formulate the history of Internet &amp;amp; Society, thus trying to look at the ways in which the emergence of digital technologies – Internet and cyberspace – have led to questioning the ways in which understand our personal, social and political lives, and how, in-turn they have been changed through the various contexts that we live in.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why do we need the history of the Internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So here is the million dollar question. Why do we need to study the history of the Internet? And if we do, for what do we need to study the history of the internet? These are both important questions and this is where I am hoping we will be able to start a critical inquiry into our own engagement with the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let us begin by questioning the very structure of history writing. What does it mean to write the history of an particular object? If we were to write, let’s say, the history of a particular building. How far in time will we go? And in what minutiae shall we record it? Shall we begin by saying, how, once where the building stood, there was a tree. And on that trees, there were leaves. The first leaf fell. The second leaf fell. The third leaf fell. It could fill up pages documenting every leaf that fell, before we even come to the building. So we know that when we write the history of a particular object, person or phenomenon, there is a very clear notion of where the history began. But we also know that if, we had an interest in the ecological history of the building, we might have actually spent time looking at that tree and its falling leaves. Which means that what constitutes history also has to do with our intentions of writing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then the last point about this brief capsule on history writing that I want to make, is that history of things does not mean that we focus only on the thing. If we were to look at the cultural significance of the building under question, for example, we would talk to the society that engages with it, the people who occupy it, and the ways in which it shapes the fabric of the space and time. So history is often a large canvas – it might keep one particular object in question, but it also weaves in the complex structure of processes and flows that surround that particular object of study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a rich scholarship about the problems, structures and processes of history writing. But these three points are important for us to think through why we want to delve into the history of the internet. Where do we begin? What do we study? And why do we study what we study? The minute you put these questions out, you start realising that there can be no definitive history of the internet. There can definitely not be just one history of the internet. And that the history of the internet is as much about the world as it is about the technological, but the technological only becomes a lens or an entry point into unravelling the various questions that are a part of our personal and professional lives. So we are not looking at imparting the one authoritative history of the internet. Instead, I am proposing, for this module to introduce you to different ways of thinking about the history of the internet.&lt;/p&gt;
&lt;p&gt;We are going to begin by looking at not the Internet – but cyberspace.&lt;/p&gt;
&lt;p&gt;We are going to examine the intersections of cyberspace with three different objects and try and see how the debates at that intersection help us to define and entry point into the rich discourse around Internet &amp;amp; Society.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The body in cyberspace&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps one of the most interesting histories of the cyberspace has been its relationship with the body. Beginning with the meatspace-cyberspace divide that Gibson introduces, the question of our bodies’ relationship with the internet has been hugely contested. There have been some very polarized debates around this question. Where are we when we are online? Are we the person in the chair behind an interface? Are we the avatar in a social networking site interacting with somebody else? Are we a set of data running through the atmosphere? Are we us? Are we dogs? These are tantalising and teasing questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early debates around the body-technology questions were polarized. There were people who offered that the cyberspace is a virtual space. What happens in that make-believe, performative space does not have any direct connections with who we are and how we live. They insisted that the cyberspace is essentially a performance space, and just like acting in a movie does not make us the character, all our interactions on the internet are also performances. The idea of a virtual body or a digital self were proposed, thinking of the digital as an extension of who we are – as a space that we occupy to perform different identities and then get on with our real lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sherry Turkle, in her book &lt;i&gt;Life on the Screen&lt;/i&gt;, was the first one to question this binary between the body and the digital self. Working closely with the first users of the online virtual reality worlds called Multiple User Dungeons, Turkle notes how being online started producing a different way of thinking about who we are and how we relate to the world around us. She indicates three different ways in which this re-thinking happens. The first, is at the level of language. She noticed how the users were beginning to think of their lives and their social relationships through the metaphors that they were using in the online world. So, for instance, people often thought of life through the metaphor of windows – being able to open multiple windows, performing multiple tasks and identities and ‘recycling’ them in their everyday life. Similarly, people saying that they are ‘low on bandwidth’ when they don’t have enough time and attention to devote to something, or thinking about the need to ‘upgrade’ our senses. We also are quite used to the idea that memory is something that resides on a chip and that computing is what machines do. These slippages in language, where we start attributing the machine characteristics to human beings are the first sign of understanding the human-technological relationship and history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second slippage is when the user start thinking of the avatars as human. We are quite used to, in our deep web lives, to think of machines as having agency. Our avatars act. Things that we do on the internet perform more actions than we have control of – a hashtag that we start on twitter gets used and responded to by others and takes on a life of its own. We live with sapient technologies – machines that care, artificial intelligence algorithms that customise search results for us, scripts and bots that protect us from malware and viruses. We haven’t attributed these kinds of human agencies to machines and technologies in the past. However, within the digital world, there is a complex network of actors, where all the actors are not always human. Bruno Latour, a philosopher of science and technology, posits in his ‘Actor Network Theory’ that the emergence of these non-human actors has helped us understand that we are not only dependent on machines and technologies for our everyday survival, but that many tasks that we had thought of as ‘human’ are actually performed, and performed better by these technologies. Hence, we have come to care for our machines and we also think of them as companions and have intimate relationships with them. And the machines, even as they make themselves invisible, start becoming more personal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third slippage that Turkle points out is the way in which the boundaries between the interior and the exterior were dissolved in the accounts of the users’ narratives of their digital adventures. There is a very simplistic understanding that what is human is inside us, it is sacred and organic and emotional. Earlier representational technology products like cinema, books, TV etc. have emphasised this distinction between real life and reel life. No actor is punished for the crime they commit in the narrative of a film. It is not very often that an author claims to be the character in a book. We have always had a very strong sense of distinction between the real person and the fictional person. But within the virtual reality worlds, these distinctions seem to dematerialize. The users not only thought of their avatars as human but also experienced the emotions, frustrations, excitement and joy that their characters were simulating for them. And what is more important, they claimed these experiences for themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Namita Malhotra, who is a legal scholar and a visual artist, in her monograph on Pleasure, Porn and the Law, looks at the way in which we are in a process of data-stripping – constant revelation of our deepest darkest secrets and desires, within the user generated content rubric. Looking at the low-res, grainy videos on sites like YouTube and Vimeo, which have almost no narrative content and are often empty of sexual content, produce all of us in a global orgiastic setting, where our bodies are being extended beyond ourselves. In the monograph, Malhotra argues that the Internet is not merely an extension but almost like a third skin that we wear around ourselves – it is a wrapper, but it is tied, through ligaments and tendons, to the flesh and bone of our being, and often things that we do online, even when they are not sexual in nature, can become pornographic. Conversely, the physical connections that we have are now being made photographically and visually available in byte sized morsels, turned into a twitpic, available to be shared virally, and disseminated using mobile applications, thus making our bodies escape the biological containers that we occupy but also simultaneously marks our bodies through all these adventures that we have on the digital infobahn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case Study: A Rape in Cyberspace&lt;br /&gt;&lt;/b&gt;A contemporary of Sherry Turkle, Julian Dibbell, in his celebrated account of ‘A Rape in Cyberspace’&lt;b&gt; &lt;/b&gt;&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;describes a case-study that corroborates many of the observations that Turkle posits. Dibbell analyses a particular incident that occurred one night in a special kind of MUD – LambdaMOO (MUD, Object-Oriented) – which was run by the Xerox Research Corporations. A MUD, is a text-based virtual reality space of fluid dimensions and purposes, where users could create avatars of themselves in textual representations. Actions and interactions within the MUD are also in long running scripts of texts. Of course, technically all this means that a specially designed database gives users the vivid impression of their own presence and the impression of moving through physical spaces that actually exists as descriptive data on some remotely located servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When users log into LambdaMoo, the program presents them with a brief textual description of one of the rooms (the coat closet) in the fictional database mansion. If the user wants to navigate, s/he can enter a command to move in a particular direction and the database replaces the original description with new ones, corresponding to the room located in the direction s/he chose. When the new description scrolls across the user’s screen, it lists not only the fixed features of the room but all its contents at that moment – including things (tools, toys, weapons), as well as other avatars (each character over which s/he has sole control). For the database program that powers the MOO, all of these entities are simply subprograms or data structures which are allowed to interact according to rules very roughly mimicking the laws of the physical world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Characters may leave the rooms in particular directions. If a character says or does something (as directed by its user), then the other users who are located in the same ‘geographical’ region within the MOO, see the output describing the utterance or action. As the different players create their own fantasy worlds, interacting and socialising, a steady script of text scrolls up a computer screen and narratives are produced. The avatars, as in Second Life or even on Social Networking Sites like Orkut, have the full freedom to define themselves, often declining the usual referents of gender, sexuality, and context to produce fantastical apparitions. It is in such an environment of free-floating fantasy and role-playing, of gaming and social interaction mediated by digital text-based avatars, that a ‘crime’ happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dibell goes on to give an account of events that unfolded that night. In the social lounge of LambdaMoo, which is generally the most populated of all the different nooks, corners, dimensions and rooms that users might have created for themselves, there appeared an avatar called Dr. Bungle. Dr. Bungle had created a particular program called Vodoo Doll, which allowed the creator to control avatars which were not his own, attributing to them involuntary actions for all the other players to watch, while the targeted avatars themselves remained helpless and unable to resist any of these moves. This Dr. Bungle, through his evil Vodoo Doll, took hold of two avatars – legba and Starsinger and started controlling them. He further proceeded to forcefully engage them in sexually violent, abusive, perverted and reluctant actions upon these two avatars. As the users behind both the avatars sent a series of invective and a desperate plea for help, even as other users in the room (# 17) watched, the Vodoo Doll made them enter into sexually degrading and extremely violent set of activities without their consent. The peals of his laughter were silenced only when a player with higher powers came and evicted Dr. Bungle from the Room # 17. As an eye-witness of the crime and a further interpolator with the different users then present, Dibbell affirms that most of the users were convinced that a crime had happened in the Virtual World of the digital Mansion. That a ‘virtual rape’ happened and was traumatic to the two users was not questioned. However, what this particular incident brought back into focus was the question of space.&lt;/p&gt;
&lt;p&gt;Dibbell suggests that what we had was a set of conflicting approaches to understand the particular phenomenon:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where virtual reality and its conventions would have us believe that legba and Starsinger were brutally raped in their own living room, here was the victim legba scolding Mr. Bungle for a breach of *civility* … [R]eal life, on the other hand, insists the incident was only an episode in a free-form version of Dungeons and Dragons, confined to the realm of the symbolic and at no point threatening any players life, limb, or material well-being…’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meaning and the understanding of this particular incident and the responses that it elicited, lie in the ‘buzzing, dissonant gap’ between the perceived and experienced notion of Technosocial Space. The discussions that were initiated within the community asked many questions: If a crime had happened, where had the crime happened? Was the crime recognised by law? Are we responsible for our actions performed through a digital character on the cyberspaces? Is it an assault if it is just role playing?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of ‘whereness’ of the crime, or rather the placelessness of the crime made it especially more difficult to pin it to a particular body. The users who termed the event as rape had necessarily inverted the expected notion of digital space as predicated upon and imitative of physical space; they had in fact done the exact opposite and exposed digital spaces as not only ‘bleeding into reality’ but also a constitutive part of the physical spaces. Their Technosocial Space was not the space of the LambdaMoo Room # 17 but the physical locations (and thus the bodies, rather than the avatars) of the players involved. However, this blurring was not to make an easy resolution of complex metaphysical questions. This blurring was to demonstrate, more than ever, that the actions and pseudonymous performances or narratives which are produced in the digital world are not as dissociated from the ‘Real’ as we had always imagined. More importantly, the notional simulation of place or a reference to the physical place is not just a symbolic gesture but has material ramifications and practices. As Dibell notes in his lyrical style,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Months later, the woman in Seattle would confide to me that as she wrote those words posttraumatic tears were streaming down her face -- a real-life fact that should suffice to prove that the words’ emotional content was no mere playacting. The precise tenor of that content, however, its mingling of murderous rage and eyeball-rolling annoyance, was a curious amalgam that neither the RL nor the VL facts alone can quite account for.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The eventual decision to ‘toad’ Dr. Bungle – to condemn him to a digital death (a death only as notional as his crime) and his reappearance as another character take up the rest of Dibbell’s argument. Dibbell is more interested in looking at how a civil society emerged, formed its own ways of governance and established the space of LamdaMOO as more than just an emotional experience or extension; as a legitimate place which is almost as much, if not more real, than the physical places that we occupy in our daily material practices. Dibbell’s moving account of the entire incident and the following events leading the final ‘death’ and ‘reincarnation’ has now been extrapolated to make some very significant and insightful theorisations of the notions of the body and its representations online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Exercise: Based on this case-study, break into small groups to determine whether a rape happened on cyberspace and how we can understand the relationship of our online personas with our bodies. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyberspace and the State&lt;/b&gt;&lt;br /&gt;The history of body and technology is one way of approaching the history of the internet. However, as we realise, that more than the management of identity or the projection of our interiority, it is a narrative about governance. How does the body get regulated on the internet? How does it become the structure through which communities, networks, societies and collective can be imagined? The actions and transactions between the internet and the body can also help us to look at the larger questions of state, governance and technology which are such an integral part of our everyday experience of the internet. Questions of privacy, security, piracy, sharing, access etc. are all part of the way in which our practices of cultural production and social interaction are regulated, by the different intermediaries of the internet, of which the State is one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asha Achuthan, in her landmark work Re:Wiring Bodies&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; that looks at the history of science and technology in India, shows that these are not new concerns. In fact, as early as the 1930s and 1940s, when the architects of India’s Independence movements were thinking about shaping what the country is going to look like in the future, they were already discussing these questions. It is more popularly known that Jawaharlal Nehru was looking to build a ‘scientific temperament’ for the country and hoping to build it through scientific institutions as well as infrastructure – he is famously credited to having said that ‘dams are the temples of modern science.’ Apart from Nehru’s vision of a modern India, there was a particular conversation between M.K. Gandhi and Rabindranath Tagore, that Achuthan analyses in great detail. Achuthan argues that the dialogue between Gandhi and Tagore is so couched in ideology, poetry and spirituality that we often forget that these were actually conversations about a technology – specifically, the charkha or the spinning wheel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For both Gandhi and Tagore, the process of nation building was centred around this one particular charkha. The charkha was the mobile, portable, wearable device (much like our smart phones) that was supposed to provide spiritual salvation and modern resources to overcome the evils of both traditional and conservative values as well as unemployment and production. The difference in Gandhi and Tagore was not whether the charkha – as a metaphor of production and socio-economic organisation – should be at the centre of our discourse. The difference was that Gandhi thought that the usage of charka, complete immersion in the activity, and the devotion to it would help us weave a modern nation For Gandhi, the citizen was not somebody who used the charkha, but the citizen was somebody who becomes a citizen in the process of using the charkha. Tagore, meanwhile, was more concerned about whether we are building a people-centred nation or a technology-centred device. He was of the opinion that building a nation with the technology at its core, might lead to an apocalyptic future where the ‘danava yantra’ or demonic machine might take over and undermine the very human values and ideals that we are hoping to structure the nation through.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you even cursorily look at this debate, you will realise that the way Gandhi was talking about the charkha is in resonance with how contemporary politicians talk about the powers of the internet and the way in which, through building IT Cities, through foreign investment, through building a new class of workers for the IT industry, and through different confluences of economic and global urbanisation, we are going to Imagine India&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; of the future. Similarly, the caution that Tagore had, of the charkha as superseding the human, finds its echoes in the sceptics who have been afraid that the human is being forgotten&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; in the e-governance systems that are being set up, which concentrate more on management of data and information rather than the rights and the welfare of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical continuity between technology and governance, also finds theorisation in Ashish Rajadhyaksha’s book The Cultural Last Mile&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;that looks at the critical turns in India’s governance and policy history and how the technological paradigm has been established. Rajadhyaksha opens up the State-technology-governance triad to more concrete examples and looks at how through the setting up of community science centres, the building of India’s space and nuclear programmes, and through on-the-ground inventions like radio and chicken-mesh wire-loops, we have tried to reinforce a broadcast based model of governance. Rajadhyaksha proposes that the earlier technologies of governance which were at our disposal, helped us think of the nation state through the metaphor of broadcast. So we had the State at the Centre, receiving and transmitting information, and in fact managing all our conversation and communication by being the central broadcasting agency. And hence, because the state was responsible for the message of the state reaching every single person, but also responsible that every single person can hypothetically communicate with every other single person, the last mile became important. The ability to reach that last person became important. And the history of technology and governance has been a history of innovations to breach that last mile and make the message reach without noise, without disturbance, and in as clean and effective a way as possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the emergence of the digital governance set up, especially with the building of the Unique Identity Project,&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; we now have the first time when the government is not concerned about breaching the last mile. The p2p networks that are supposed to manage the different flows of information mean that the State is not a central addressee of our communication but one of the actors. It produces new managers – internet service providers, telecom infrastructure, individual hubs and connectors, traditional media agencies – that help us think of governance in a new way. Which is why, for instance, with the UID authorities, we are no longer concerned about the relay of state information from the centre to the subject. Hence, we have many anecdotal stories of people enrolling for the Aadhaar card without actually knowing what benefits it might accrue them. We also have stories coming in about how there are people with Aadhaar numbers which have flawed information but these are not concerns. Because for once, the last mile has to reach the Government. The State is a collector but there are also other registrars. And there is a new regime here, where the government is now going to become one of the actors in the field of governance and it is more interested in managing data and information rather than directly governing the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This historical turn is interesting, because it means that we are being subjected to different kinds of governance structures and institutions, without necessarily realising how to negotiate with them to protect us. One of the most obvious examples, is the Terms of Services&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; that we almost blindly sign off when using online platforms and services and what happens when they violate rights that we think are constitutionally given. What happens when Facebook removes some content from your profile without your permission because it thinks that it is problematic? Who do you complain to? Are your rights as a user or a citizen? Which jurisdiction will it fall under? Conversely, what happens when you live in a country that does not grant you certain freedoms (of speech and expression, for instance) and you commit an infraction using a social media platform. What happens when your private utterances on your social networks make you vulnerable&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to persecution and prosecution in your country?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions of the human, the technological, and the governmental which have been discussed differently and severally historically, in India and also at the global level. Asking these questions, unpacking the historical concerns and how they have leap-frogged in the contemporary governmental debates is important because it helps us realise that the focus of what is at stake, what it means to be human, what we recognise as fair, just and equal are also changing in the process. Instead of thinking of e-governance as just a digitization of state resources, we have to realise that there is a certain primacy that the technologies have had in the state’s formation and manifestation, and that the digital is reshaping these formulations in new and exciting, and sometimes, precarious ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyberspace and Criminality&lt;br /&gt;&lt;/b&gt;The history of the internet in India, but also around the world, is bookended between pornography and terrorism. While there has been an incredible promise of equity, equality, fairness, and representation of alternative voices on the internet, there is no doubt that what the internet has essentially done is turn us all into criminals – pornographers, pirates, terrorists, hackers, lurkers… If you have been online, let us just take for granted that you have broken some law or the other, no matter how safe you have been online, and where you live. The ways in which the internet has facilitated peer-2-peer connections and the one-one access means that almost everything that was governed in the public has suddenly exploded in one large grey zone of illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi Sundaram calls this grey zone of illegal or semi-legal practices the new ‘cyberpublics’. For Sundaram, the new public sphere created by the internet is not only in the gentrified, middle-class, educated people who have access to the cyberspaces and are using social media and user generated content sites to bring about active social and political change. More often than not, the real interesting users of the internet are hidden. They access the internet from cybercafés, in shared names. They have limited access to the web through apps and services on their pirated phones. They share music, watch porn, gamble, engage in illicit and surreptitious social and sexual engagements and they are able to do this by circumventing the authority and the gaze of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other side are the more tech savvy individuals who create alternative currencies like Bitcoin, trade for weapons, drugs and sex on SilkRoute, form guerrilla resistance groups like Anonymous, and create viruses and malware that can take over the world. These cyberpublics are not just digital in nature. They erupt regularly in the form of pirate bazaars, data swaps, and the promiscuous USB drive that moves around the machines, capturing information and passing it on further. These criminalities are often the defining point of internet policy and politics – they serve as the subjects that need to be governed, as well as the danger that lurks in the digital ether, from which we need to be protected. For Sundaram, the real contours and borders of the digital world are to be tested in an examination of these figures. Because, as Lawrence Liang suggests, the normative has already been assimilated in the system. The normative or the good subject is no longer a threat and has developed an ethical compass of what is desirable and not. However, this ethical subject also engages in illicit activities, while still producing itself as a good person. This contradiction makes for interesting stories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;DPS MMS: Case Study&lt;br /&gt;&lt;/b&gt;One of the most fascinating cases of criminality that captured both public and legal  attention was the notoriously cases where the ideas of Access were complicated in the Indian context, was the legal and public furore over the distribution of an MMS (Multi-Media Message) video that captured two underage young adults in a sexual act. The clip, which was dubbed in popular media as ‘DPS Dhamaka’ became viral on the internet. The video clip was listed on an auction (peer-2-peer) website as an e-book and as ‘Item 27877408 – DPS Girl having fun!!! Full video + Bazee points’ for Rs. 125. This visibility of the clip on the auction site Bazee.com, brought it to the eyes of the State where its earlier circulation through private circuits and P2P networks had gone unnoticed. Indeed, the newspapers and TV channels had created frenzy around it, this video clip would have gone unnoticed. However, the attention that Bazee.com drew led to legal intervention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the visibility of the video clip, there was an attempt to find somebody responsible for the crime and be held liable for the ‘crime’ that had happened. Originally, Ravi Raj, a student at IIT Kharagpur, who had put up the clip on Bazee was arrested for possessing and selling pornography. He was arrested and kept in police custody for at least three days and so was the male student who made the clip. They were both made to go through proceedings in juvenile court (though he was the last to be arrested). Both the students in the video were suspended from school after the incident. Eventually, the most high profile arrest and follow up from the DPS MMS incident was the arrest of the CEO of Bazee.com – Avnish Bajaj. However, Bajaj was released soon because as the host of the platform and not its content, he had no liability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the beginning of a series of slippages where a punishable body in the face of public outcry had to be identified. We witnessed a witch-hunt that sought to hold the boy who made the video clip responsible, the student of IIT who attempted to circulate the clip and eventually the CEO of Bazee. The string of failed prosecutions seems to indicate that the pornographer-as-a-person was slipping through the cracks of the legal system. As Namita Malhotra argues, it is not the pornographic object which is ‘eluding the grasp of the court’ but that it seems to be an inescapable condition of the age of the internet - that the all transactions are the same transactions, and all users are pornographers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can see in the case that the earlier positions that were easily criminalised when it came to objects in mass media – producer, consumer, distributor of obscenity, were vacated rapidly in the DPS MMS case. We have a case where the bodies, when looked at through simplified ideas of Access, could not be regulated. The girl in the clip could not be punished because she was the victim in the case that could be read as statutory rape. In the case of the boy, a stranger argument was posed – ‘that in our fast urbanising societies where parents don’t have time for children, they buy off their love by giving them gadgets – which makes possible certain kinds of technological conditions...thus the blame if it is on the boy, is on the larger society’ (Malhotra, 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Eventually, the court held that the description of the object and the context of its presence indicates that the said obscene object is just a click away and such a ‘listing which informed the potential buyer that such a video clip that is pornographic can be procured for a price’. There is a suggestion that there was nobody in particular that could be fixed with the blame. What was at blame was access to technology and conditions of technology within which the different actors in this case were embedded. Malhotra points out that in earlier cases around pornography, judgements have held pornography responsible for itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of the DPS MMS, it seemed that technology – especially access to technology by unsupervised persons – has taken that role. The eventual directive that came out of this case was a blanket warning issued to the public that ‘anyone found in possession of the clip would be fined and prosecuted’. It is as if the attention of the court was on the ways in which the video clip was produced, circulated and disseminated, rather than the content. There was an anxiety around peoples’ unsupervised access to digital technologies, the networks that facilitated access to content without the permission of the state, and modes of circulation and dissemination that generated high access to audiences which cannot be controlled or regulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The State’s interest in this case, is not in the sexual content of the material but in the way it sidesteps the State’s authorial positions and produces mutable, transmittable, and transferable products as well as conditions of access. Such a focus on practices and behaviours around the obscene object, rather than the content itself, seems not to disrupt the law’s neat sidestepping of the force of the image itself. These different tropes of access to technology informed the State’ attempt at control and containment of technosocial practices in the country, giving rise to imaginations of the User as being in conditions of technology which make him/her a potential criminal. This idea of access as transgression or overriding the legal regulatory framework does not get accounted for in the larger technology discourse. However, it does shape and inform the Information Technology regulations which are made manifest in the IT Act. The DPS MMS case complicated the notion of access and posited a potentially criminal technosocial subject who, because of access to the digital, will be able to consume information and images beyond the sanction of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DPS MMS case shows how the ways in which public discourse can accuse, blame and literally hang technology seems to diverge from how the court attempts to pin down an offence or crime and prosecute by constructing a technosocial subject as the pervert, while also accusing pornography as a phenomenon. The court is unable to hold technology to blame but the accused is technology-at-large and modernity, which subsumes practices around technology and separates out the good and ethical ways in which a citizen should access and use technologies to rise from the potentially criminal conditions of technology within which their Technosocial identity is formed.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;We started by making a distinction between Internet and Cyberspace to see how the two are separate objects of focus and have a relationship that needs to be examined in greater detail. It was argued that while the Internet – in material, infrastructural and technological forms – is important to understand the different policies and politics at the local, regional and global level, it has an account that is easier to follow. Cyberspace, on the other hand, because it deals with human interactions and experiences, allows for a more complex set of approaches into understanding our engagement with the digital domain. We began with the original definitions and imaginations of cyberspace and the ways in which it founded and resolved debates about the real-virtual, the physical-digital, and the brain-mind divides which have been historically part of the cybercultures discourse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was proposed, hence, that instead of looking at the history of the Internet, we will look at the history of cyberspace, and see if we can move away from a straight forward historical narrative of the Internet which focuses largely on the institutions, numbers, names and technological advances. The ambition was not to just produce a similar history of cyberspace but think of conceptual frameworks through which cyberspace can be studied. The proposition was that instead of just looking at history as a neutral and objective account of events and facts, we can examine how and why we need to create histories. Also, that it is fruitful to look at the aspirations and ambitions we have in creating historical narratives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was then suggested that instead of trying to create a definitive history, or even a personal history of the internet, it might be more fruitful to look at the intersections that cyberspace has with different questions and concerns that have historically defined the relationship between technologies and society. 3 different conceptual frameworks were introduced as methods or modes by which this historical mode of inquiry can be initiated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first framework examined how we can understand the boundaries and contours of the internet and cyberspace by looking at its relationship with our bodies. The ways in which we understand our bodies, the mediation by technologies, and the extensions and simulations that we live with, help us to understand the human-technology relationship in more nuanced fashions. Looking at the case-study of a rape that happened in cyberspace, we mapped out the different ways in which we can think of a technosocial relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second framework drew from historical debates around technology and governance to see how the current concerns of e-governance and digital subjectivity are informed by older debates about technology and nation building. Looking at the dialogues between Gandhi and Tagore, and then the imagination of a nation through the broadcast technologies, we further saw how the new modes of networked governance are creating new actors, new conditions and new contexts within which to locate and operate technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third framework showed how the technological is not merely at the service of the human. In fact, the presence of the technological creates new identities and modes of governance that create potential criminals of all of us. Through the case-study of the DPS MMS, and in an attempt to look at the grey zone of illegal cyberpublics, we saw how at new technosocial identities are created at the intersection of law, technology, governance and everyday practices of the web. The fact that the very condition of technology access can create us as potential criminals, in need to be governed and regulated, reflects in the development of internet policy and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was the intention of this module to complicate three sets of presumptions and common knowledge that exist in the discourse around Internet and Cyberspace. The first was to move away from thinking of the Internet merely as infrastructure and networks. The second was to suggest that entering the debates around human-technology everyday relationships would offer more interesting ways of looking at accounts of the technological. The third was to propose that the history of the internet does not begin only with the digital, but it needs larger geographical and techno-science contexts in order to understand how the contemporary landscape of internet policy and governance is shaped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The module was not designed to give a comprehensive history and account of the internet. Instead, it built a methodological and conceptual framework that would allow us to examine the ways in which we approach Internet and Society questions – in the process, it would also help us reflect on our own engagement, intentions and expectations from the Internet and how we create the different narratives and accounts for it.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. http://en.wikipedia.org/wiki/History_of_the_Internet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http:\www.sigcomm.org\sites\default\files\ccr\papers\2009\October\1629607-1629613.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.walthowe.com/navnet/history.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http:\www.internetsociety.org\internet\what-internet\history-internet\brief-history-internet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://en.wikibooks.org/wiki/Governing_the_Internet/Introduction_to_Internet_Governance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Recommended reading: Internet Governance: Infrastructure and Institutions eds. Lee Bygrave and Jon Bing http://www.amazon.com/Internet-Governance-Infrastructure-Institutions-Bygrave/dp/0199561133&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Recommended watching material to look at some of these questions: 1. The final flight of the Osiris -http://www.youtube.com/watch?v=ueiBYxI6Eqg  2. The Second Renaissance - part 1 - http://www.gametrailers.com/videos/n5vpzw/the-second-renaissance-part-i 3. The Second Ranaissance - part 2 - http://www.gametrailers.com/videos/va807i/animatrix-second-renaissance-part2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. http://www.juliandibbell.com/articles/a-rape-in-cyberspace/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. http://cis-india.org/raw/rewiringdoc/view&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. http://www.amazon.com/Imagining-India-Idea-Renewed-Nation/dp/0143116673&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. http://www.jstor.org/stable/10.1086/670950&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. http://cis-india.org/raw/histories-of-the-internet/last-cultural-mile.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. http://eprints.cscsarchive.org/532/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. http://tosdr.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. http://www.amazon.com/The-Googlization-Everything-Should-Worry/dp/0520258827&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/history-of-internet-building-conceptual-frameworks'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/history-of-internet-building-conceptual-frameworks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    

   <dc:date>2014-01-08T07:56:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/indian-express-december-22-2013-nishant-shah-digital-native">
    <title>Digital Native </title>
    <link>https://cis-india.org/digital-natives/blog/indian-express-december-22-2013-nishant-shah-digital-native</link>
    <description>
        &lt;b&gt;The end of the year is supposed to be a happy, feel-good space for families, friends, societies and communities to come together and count our blessings. It is the time to look at things that have gone by and look forward to what the New Year will bring.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The article was &lt;a class="external-link" href="http://www.indianexpress.com/news/digital-native/1210347/0"&gt;originally published in the Indian Express&lt;/a&gt; on December 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;And yet, when I started writing this piece, my horizons seemed to be eclipsed by the amount of violence we have witnessed in the last year, and the inability of our governance systems to deal with them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Around this time last year, the nation had woken up to the horrors a young woman suffered as a group of men raped her in a moving bus in Delhi. The inhumanity of the crime, her tragic death, and the fact that despite our collective anger and grief, the year has been dotted with violence of a gendered and sexual nature, should be enough to quell any celebrations. What happened to her and then to many other reported and invisible survivors of sexual violence in the country has seen a dramatic transformation of the digital public sphere.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Spurred by anger, frustration and the realisation that we are often the agents of change, people have taken to the streets and the information highway in unprecedented forms. Every reported incident of sexual violence — from the young intern who was molested by a former Supreme Court judge to the now infamous Tehelka case — sparked great ire on Twitter, Facebook, blogs and collaborative user-generated content sites. Hashtags have trended, videos have gone viral. Men and women have bonded together to speak against the increasingly unsafe spaces we seem to inhabit.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Responding to this public demonstration and outrage, we have seen some positive developments from the governments and judiciary systems which are morally, legally and constitutionally bound to look after us. And yet, we are quickly realising that much of this is not enough. While the law takes its course and tries to craft and enforce more efficient regulation to prevent and protect victims of such violent crimes, we have despaired at how it doesn't seem to change things materially.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The digital spaces that we have used to fight, to protest and to call for action, are also where we have shared the frustration at how little material reality has changed. Hashtags on Twitter have gone through life cycles of anger, protest and despair, as the complex structures of archaic laws, slow judiciary processes, prejudiced judges, and a populist politics which is often superficial, take their toll on processes to establish justice, equality and freedom for our societies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As tweets and Facebook updates have now clearly told us, through testimonies and witness accounts, these questions cannot be understood in isolation. The social media has consistently reminded us that the December 16 gang rape was not just about one woman. It was about the misogynist societies that we are constructing and the fundamental flaws in systems which encourage the idea that men have ownership of the bodies and lives of women in our country. Across the year, through campaigns by online intervention groups like the Blank Noise Project or through note-card viral memes like "I need feminism" have emphasised the need to acknowledge these not as "women's problems" or "exceptional" problems. These are problems that need to be understood in the larger context of human rights, and our rights to life, dignity, equality and freedom enshrined in our Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And yet, as another year comes to an end, the social media is ablaze at a decision that has marked one of the darkest days in recent judicial history. On December 11, the Supreme Court of India repealed the landmark historical judgement issued by the Delhi High Court that read down Section 377 of the Indian Penal Code that criminalises same-sex relationships. Finding this in defiance of our constitutional rights, the well-weighed judgment was celebrated across social media — nationally and globally — for its recognition that the problem of discrimination is never just about one demography or section of the society. As the LGBTQ communities stood in shock, there was something else that happened on social media.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For once, the comments of disbelief, anger and surprise turned into a roar for correcting such a verdict. And it is not only the LGBTQ identified people and activists who are joining this clamour. Straight people, people with families, families with LGBTQ children, are all coming out and finding a common bond of solidarity that works around hashtags and viral sharing of messages. The world of social media has shown how we have learned, that we cannot leave the underprivileged to fight for themselves. Because, if we ignore the discrimination against them, we will have nobody to support us when we are being treated as sub-human and irrelevant in a country that has often done poetic interpretations of what constitutional rights mean.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;I started writing this piece with despair. But I slowly realise that maybe there is something to be thankful about this year. That even when our archaic systems of justice are catching up with the accelerated transformations in our lives, the social media does act as a public space where those bound together in their belief for equality and justice can act in solidarity. On Twitter, this fateful day, everybody was queer. And they did not have to identify themselves as men or women, straight, gay or lesbian. Despite our bodies, our differences, our status and practices, we can claim to fight for those whose voices, bodies, lives and loves are being negated in our country. And if you cannot take to the streets to make your support felt, remember that the digital public sphere is active and buzzing. Those in power have no choice but to take into account the collective voice on the internet, which demands and shall build open, fair and equal societies.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/indian-express-december-22-2013-nishant-shah-digital-native'&gt;https://cis-india.org/digital-natives/blog/indian-express-december-22-2013-nishant-shah-digital-native&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Web Politics</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-17T10:40:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/dml-central-nishant-shah-november-22-2013-how-can-we-make-open-education-truly-open">
    <title>How Can We Make Open Education Truly Open?</title>
    <link>https://cis-india.org/openness/blog-old/dml-central-nishant-shah-november-22-2013-how-can-we-make-open-education-truly-open</link>
    <description>
        &lt;b&gt;I have spent the last month being unpopular. I have been in conversation with many ‘Open Everything’ activists and practitioners. At each instance, we got stuck because I insisted that we begin by defining what ‘Open’ means in the easy abuse that it is subject to.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was originally &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/how-can-we-make-open-education-truly-open"&gt;published in DML Central&lt;/a&gt; on November 22.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It has been a difficult, if slightly tedious exercise, because not only  was there a lack of consensus around what constitutes openness, but also  a collective confusion about what we mean when we attribute openness to  an object, a process or to people. It was easy to define openness as  opposed to a closed system – attributes of transparency, ownership,  collaboration and a multidirectional panopticon were invoked in trying  to understand the form, function and role of openness. However, it was  quickly clear that even with people who are on the same side of the  battle-lines around openness, there is a disjunction in their  imagination of what an &lt;a href="http://www.opensocietyfoundations.org/"&gt;Open Society&lt;/a&gt; can mean. Hence, the ‘Open’ in ‘&lt;a href="http://en.wikipedia.org/wiki/Open_government"&gt;Open Government&lt;/a&gt;’ for instance, had very little cross-over with the ‘Open’ in ‘&lt;a href="http://www.openeducation.net/"&gt;Open Education&lt;/a&gt;’.  Apart from the larger infrastructure industry that supports the various  implementations of Open systems ranging from participatory governments  to Digital Humanities, there seems to be silos of openness that co-exist  but do not converse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the ways of doing away with the cultures of ambiguity that seem  to have developed around Openness, where it is the object of inquiry,  the process through which inquiries are made, the lens of critique and  the aspiration of movements, perhaps need to be unpacked. And one of the  ways of doing this would be to shift the focus from Open as an  adjective to Open as a verb – to focus not on what it is, but what it  works towards. This shift in thinking of Open as a verb, allows to  produce a political critique of the Open paradigm, which is otherwise  often missed out in the self-avowed goodness of Open movements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is probably a good space for me to declare that I am not an  Openness dis-evangelist. I appreciate, endorse and celebrate the values  of collaboration, engagement, participation, access and empowerment that  Open movements work with and indeed belong to quite a handful of them.  However, I do want to move away from the Open as self-explanatory and  ask the more difficult questions – What is it that we are opening? Who  are we opening it for? What is the Open working towards? In whose  service and to what purposes? So when I look at ‘Open Education’, I  don’t just want to look at how we open up education for mass access but  also how do we make transparent the politics that surround the opening  up of education.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Open as an Adjective vs Open as a Verb&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the most celebrated accounts of open education has found its impetus in two distinct narratives – the first is that the University as we have inherited it is in ruins. The University has been described as inadequate, in desperate need of change to fit the requirements of the contemporary times we live in. The second is that education and learning are in a moment of crisis. This is not necessarily a bad thing, but it does entail the development of new pedagogic and technological structures which can construct new modes of engaging with knowledge practices. Both of these narratives are more or less taken for granted. There are staged battles between those who swear by MOOCs as the answer and those who swear at MOOCs as amplification of the problem; or between those who call for more public investment in education and learning and those who think that privatising education is the way forward. But in all these debates, which often take the tones of sombre zealots who argue over the nature of the divine, there is almost no questioning of the idea that the university is in crisis. Thus, when it comes to Open Education disputants, they never question the narrative of the university in crisis, but merely in how to resolve this crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.hardnewsmedia.com/2013/08/6021?page=show"&gt;Sharmila Rege&lt;/a&gt;, a Dalit-feminist and an educator at the Pune University in India, who had made it her life work to critically intervene in debates around education and its intersections with social and political processes, suggests that what we need to do is reverse engineer the generation of this crisis. While the University seems to be ubiquitously crumbling across the globe – despite the fact that an historically unprecedented portion of the global population is enrolled in education programmes – this narrative of ruin is not new. Indeed, nor is the narrative of Openness. In Rege’s material history of education and gender in India, she invokes the figure of &lt;a href="https://www.academia.edu/4865098/Sharmila_Rege_1964-2013_Tribute_to_a_Phule-Ambedkarite_Feminist_Welder"&gt;Savitribai Phule&lt;/a&gt;, the icon of India’s modernity, who, as an educated woman dedicated her life to ‘opening up’ education for those who were underprivileged and broken. Along with her husband, a modernist and a social reformer, Phule was the prototype feminist and development worker who radically opened up the modern education system in Maharashtra to those who were the intended beneficiaries but more often than not, excluded from the benefits that the system promised. In fact, as Rege shows us, in Phule’s account of the world, the university was essentially a system that justified its existence through the principles of openness and inclusion which we have now separated from it. While it might be a fallacy to claim these visions for a universal education system, it is still worth recognising that in different forms and formats, the establishment of the public education system has necessarily been one of openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When then, did this open system suddenly become closed? When did the university, which was a response to the closed education systems that were limited to the upper castes and classes of India, enter a state of crisis? In India, especially with the huge public discourse around affirmative action, quotas and reservations for different underprivileged communities, and the continued investment in public education infrastructure – the number of private universities, when you compare them with the developed North, is ridiculously low – we really need to figure out what it is that the university failed to do in its visions of openness for itself. Rege suggests that the generation of the crisis narrative for the university is actually a response to the university as an open structure. In the 1990s, with the renewed focus on universal education in the country, especially after the epoch marking agitations against affirmative actions which included massive mobilisations of upper class and caste students against the recommendations of the &lt;a href="http://en.wikipedia.org/wiki/Mandal_Commission"&gt;Mandal Commissions&lt;/a&gt; for continued reservation of seats for women and dalits, the university was at its open best. Both in terms of infrastructure, public policy and regulatory mechanisms, we had created universities that invited participation and presence of bodies which were otherwise systemically excluded from education processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the next two decades, the university then, has become a more inclusive space. It is populated with unexpected bodies and subjects. It has been de-gentrified and has been heralded as one of the few public institutions where a critique of sectarian and preferential politics has emerged. According to Rege, it is this very opening up of the University to women and Dalits, and the ‘vulgarization’ of education that led to the engineering of a crisis in the narratives around the university. This crisis, propelled equally by a neo-liberal development agenda and the need to create exclusive and exclusionary spaces for the elites of the country who did not necessarily want to find their privilege by escaping to the Ivy League universities in the North-West, sustains the idea that the university is in shambles and hence proposes the new Open Education movements, of which the MOOCs and the private universities are the two key embodiments. In a country that is starkly divided across linguistic and technology access lines, it is clear that both these structures, which are the key advocates of Open Education and learning, are in the service of those who can afford it. Or in other words, it is clear that the new openness movements, while they propose to be in the service of mass, distributed and universal education, are &lt;a href="http://www.slate.com/articles/life/education/2013/11/sebastian_thrun_and_udacity_distance_learning_is_unsuccessful_for_most_students.html"&gt;actually very urban, Anglophone, and available to a very small fraction of the society&lt;/a&gt; that already had privileged access to different and varied education resources historically.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These Open Education policies now offer alternatives to the public education model by suggesting that it is in crisis and thus finding viable options. These alternatives further demand that the Public University, becomes a professionalised space that produces workers and skilled labour for the new information and knowledge industries, while the more privileged sites of critical philosophy, thought and art move on to safer havens where those with rights of entitlement can study them in peace. The open Digital Humanities projects or the institution of private and satellite university campuses, which continue with their ad hoc, de-skilled, meritocratic logic of working with adjuncts and temporary knowledge workers, invest more in the technological development which is again a masculine domain of privilege even in countries like India where we witness massive mobilisation of people being trained to work in the IT industries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This reverse engineering of what Open Education can mean in a country like India probably has similar narratives of the context and generation of the crisis across different geographies and time-zones. Openness, with the euphoria and the promise of radical transformation often produces this ellipsis that fails to see the larger structures that inform and shape the open education policies and regulations. In its closeness to the Big Data proponents, it even makes us believe that open education is about data and information management, forgetting that these practices have a direct implication on the material conditions that have been historically shaped. Just like we have developed a critique of well-intentioned development agendas that are purportedly pro-poor but eventually only benefit the wealthy by depositing more power in their coffers, openness in education and in governance needs to be re-examined more closely. Yes, Openness has some fantastic virtues that we need to aspire towards. But to open something, it first needs to be closed. And especially when it comes to the modern education system, we need to question the closeness that is easily attributed to and presumed for the public university. It is time to not only implement open education, but also see the larger constellations of privilege and inequity that often get elided in the blanket acceptance of the Open as necessarily the good or the desirable.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/dml-central-nishant-shah-november-22-2013-how-can-we-make-open-education-truly-open'&gt;https://cis-india.org/openness/blog-old/dml-central-nishant-shah-november-22-2013-how-can-we-make-open-education-truly-open&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-11-30T08:45:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello">
    <title>I Just Pinged to Say Hello</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello</link>
    <description>
        &lt;b&gt;A host of social networks find us more connected than ever before, but leave us groping for words in the digital space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was &lt;a class="external-link" href="http://www.indianexpress.com/news/i-just-pinged-to-say-hello/1198448/0"&gt;published in the Indian Express&lt;/a&gt; on November 24, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I am making a list of all the platforms that I use to connect with the large networks that I belong to. Here goes: I use Yahoo! Messenger to talk to my friends in east Asia. Most of my work meetings happen on Skype and Google Hangout. A lot of friendly chatter fills up my Facebook Messenger. Twitter is always available for a little back-chat and bitching. On the phone, I use Viber to make VoIP calls and WhatsApp is the space for unending conversations spread across days. And these are just the spaces for real-time conversation. Across all these platforms, something strange is happening. As I stay connected all the time, I am facing a phenomenon where we have run out of things to say, but not the desire to talk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I had these three conversations today on three different instant-messaging platforms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Person 1 (on WhatsApp): Hi.&lt;br /&gt;&lt;br /&gt;Me: Hey, good to hear from you. How are you doing?&lt;br /&gt;&lt;br /&gt;Person 1: Good.&lt;br /&gt;&lt;br /&gt;Me (after considerable silence): So what's up?&lt;br /&gt;&lt;br /&gt;Person 1: Nothing.&lt;br /&gt;&lt;br /&gt;End of conversation.&lt;br /&gt;&lt;br /&gt;Person 2 (On an incoming video call on Skype): Hey, you there?&lt;br /&gt;&lt;br /&gt;Me: Yeah. What time is it for you right now?&lt;br /&gt;&lt;br /&gt;Person 2: It is 10 at night.&lt;br /&gt;&lt;br /&gt;Me: Oh! That is late. How come you are calling me so late?&lt;br /&gt;&lt;br /&gt;Person 2: Oh, I saw you online.&lt;br /&gt;&lt;br /&gt;Me: Ok….. *eyes raised in question mark*&lt;br /&gt;&lt;br /&gt;Person 2: So, that's it. I am going to sleep soon.&lt;br /&gt;&lt;br /&gt;Me: Ok…. Er…goodnight.&lt;br /&gt;&lt;br /&gt;Person2: Goodnight.&lt;br /&gt;&lt;br /&gt;We hang up.&lt;br /&gt;&lt;br /&gt;Person 3 (pinging me on Facebook): Hey, you are in the US right now?&lt;br /&gt;&lt;br /&gt;Me: Yes. I am attending a conference here.&lt;br /&gt;&lt;br /&gt;Person 3: Cool!&lt;br /&gt;&lt;br /&gt;Me: Umm… yeah, it is.&lt;br /&gt;&lt;br /&gt;Person 3: emoticon of a Facebook 'like'. Have fun. Bye.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially I was irritated at the futility of these pings that are bewildering in their lack of content. I dismissed it as one of those things, but I realise that there is a pattern here. Our lives are so particularly open and documented, such minute details of what we do, where we are and who we are with, is now available for the rest of the world to consume, making most of the conversations seeking information, redundant. If you know me on my social media networks, you already know most of the basic things that you would want to know about me. And it goes without saying that no matter how close and connected we are, we are not necessarily in a state where we want to talk all the time. The more distributed our lives are, the more diminished is the need for personal communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the habit or the urge to ping, buzz, DM or chat has not caught up with this interaction deficit. So, we still seem to reach out, using a variety of platforms just to say hello, even when there is nothing to say. I call this the 'Always On' syndrome. We live in a world where being online all the time has become a ubiquitous reality. Even when we are asleep, or busy in a meeting, or just mentally disconnected from the online spaces, our avatars are still awake. They interact with others. And when they feel too lonely, they reach out and send that empty ping — just to confirm that they are not alone. That on the other side of the glowing screen is somebody else who is going to connect back, and to reassure you that we are all together in this state of being alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This empty ping has now become a signifier, loaded with meaning. The need for human connection has been distributed, but it does not compensate our need for one-on-one contact. In the early days of the cell phone, when incoming calls were still being charged, the missed call, without any content, was a code between friends and lovers. It had messages about where to meet, when to meet, or sometimes, just that you were missing somebody. The empty ping is the latest avatar of the missed call — in a world where we are always online but not always connected, when we are constantly together, but also spatially and emotionally alone, the ping remains that human touch in the digital space that reassures us that on the other side of that seductive interface and the buzzing gadget, is somebody we can say hello to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello'&gt;https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:36:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets">
    <title> Open Secrets</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets</link>
    <description>
        &lt;b&gt;We need to think of privacy in different ways — not only as something that happens between people, but between you and corporations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was originally &lt;a class="external-link" href="http://www.indianexpress.com/news/open-secrets/1187814/0"&gt;published in the Indian Express&lt;/a&gt; on October 27.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you are a part of any social networking site, then you know that privacy is something to be concerned about. We put out an incredible amount of personal data on our social networks. Pictures with family and friends, intimate details about our ongoing drama with the people around us, medical histories, and our spur-of-the-moment thoughts of what inspires, peeves or aggravates us. In all this, the more savvy use filters and group settings which give them some semblance of control about who has access to this information and what can be done with it.&lt;br /&gt;&lt;br /&gt;But it is now a given that in the world of the worldwide web, privacy is more or less a thing of the past. Data transmits. Information flows. What you share with one person immediately gets shared with thousands. Even though you might make your stuff accessible to a handful of people, the social networks work through a "friend-of-a-friend effect", where others in your networks use, like, share and spread your information around so that there is an almost unimaginable audience to the private drama of our lives. Which is why there is a need for a growing conversation about what being private in the world of big data means.&lt;br /&gt;&lt;br /&gt;Privacy is about having control over the data and some ownership about who can use it and for what purpose. Interface designs and filters that allow limited access help this process. The legal structures are catching up with regulations that control what individuals, entities, governments and corporations can do with the data we provide. However, most people think of privacy as a private matter. Just look at last month's conversations around Facebook's new privacy policies, which no longer allow you to hide. If you are on Facebook, people can find you using all kinds of parameters — meta data — other than just your name. They might find you through hobbies, pages you like, schools you have studied in, etc. This can be scary because it means that based on particular activities, people can profile and follow you. Especially for people in precarious communities — the young adults, queer people who might not be ready to be out of the closet, women who already face increased misogyny and hostility online. This means they are officially entering a stalkers' paradise.&lt;br /&gt;&lt;br /&gt;While those concerns need to be addressed, there is something that seems to be missing from the debate. Almost all of these privacy alarms are about what people can do to people. That we need to protect ourselves from people, when we are in public — digital or otherwise. We are reminded that the world is filled with predators, crackers and scamsters, who can prey on our personal data and create physical, emotional, social and financial havoc. But this is the world we already know. We live in a universe filled with perils and we have learned and coped with the fact that we navigate through dangerous spaces, times and people all the time. The digital is no different than the physical when it comes to the possible perils that we live in, though digital might facilitate some kinds of behaviour and make data-stalking easier.&lt;br /&gt;&lt;br /&gt;What is different with the individualised, just-for-you crafted world of the social web is that there are things which are not human, which are interacting with you in unprecedented ways. Make a list of the top five people you interact with on Facebook. And you will be wrong. Because the thing that you interact with the most on Facebook, is Facebook. Look at the amount of chatter it creates — How are you feeling today?; Your friend has updated their status; Somebody liked your comment… the list goes on. In fact, much as we would like to imagine a world that revolves around us, we know that there are a very few people who have the energy and resources to keep track of everything we do. However, no matter how boring your status message or how pedestrian your activity, deep down in a server somewhere, an artificial algorithm is keeping track of everything that you do. Facebook is always listening, and watching, and creating a profile of you. People might forget, skip, miss or move on, but Facebook will listen, and remember long after you have forgotten.&lt;br /&gt;&lt;br /&gt;If this is indeed the case, we need to think of privacy in different ways — not only as something that happens between people, but between people and other entities like corporations. The next time there is a change in the policy that makes us more accessible to others, we should pay attention. But what we need to be more concerned about are the private corporations, data miners and information gatherers, who make themselves invisible and collect our personal data as we get into the habit of talking to platforms, gadgets and technologies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets'&gt;https://cis-india.org/internet-governance/blog/indian-express-october-27-2013-nishant-shah-open-secrets&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:21:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom">
    <title>Out of the Bedroom</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom</link>
    <description>
        &lt;b&gt;We have shared it with our friends. We have watched it with our lovers. We have discussed it with our children and talked about it with our partners. It is in our bedrooms, hidden in sock drawers. It is in our laptops, in a folder marked "Miscellaneous". It is in our cellphones and tablets, protected under passwords. It is the biggest reason why people have learned to clean their browsing history and cookies from their browsers. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.indianexpress.com/news/out-of-the-bedroom/1159657/0"&gt;article by Nishant Shah was published in the Indian Express&lt;/a&gt; on August 25, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whether we go into surreptitious shops to buy unmarked CDs or trawl through Torrent and user-generated content sites in the quest of a video, there is no denying the fact that it has become a part of our multimedia life. Even in countries like India, where consumption and distribution of pornography are punished by law, we know that pornography is rampant. With the rise of the digital technologies of easy copy and sharing, and the internet which facilitates amateur production and anonymous distribution, pornography has escaped the industrial market and become one of the most intimate and commonplace practices of the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, if Google trend results are to be believed, Indians are among the top 10 nationalities searching for pornography daily. Even a quick look at our internet history tells us that it has all been about porn. The morphed pictures of a naked Pooja Bhatt adorned the covers of Stardust in the late 1990s, warning us that the true potential of Photoshop had been realised. The extraordinary sensation of the Delhi Public School MMS case which captured two underage youngsters in a grainy sexcapade announced the arrival of user-generated porn in a big way. The demise of Savita Bhabhi — India's first pornographic graphic novel — is still recent enough for us to remember that the history of the internet in India is book-ended by porn and censorship.&lt;br /&gt;&lt;br /&gt;Recent discussions on pornography have been catalysed by a public interest litigation requesting for a ban on internet pornography filed in April by Kamlesh Vaswani. Whether Vaswani's observations on what porn can make us do stem from his own personal epiphany or his self-appointed role as our moral compass is a discussion that merits its own special space. Similarly, a debate on the role, function, and use of pornography in a society is complex, rich and not for today.&lt;br /&gt;&lt;br /&gt;Instead, I want to focus on the pre-Web imagination of porn that Vaswani and his endorsers are trying to impose upon the rest of us. There is a common misunderstanding that all porn is the same porn, no matter what the format, medium and aesthetics of representations. Or in other words, a homogenising presumption is that erotic fiction and fantasies, pictures of naked people in a magazine, adult films produced by entertainment houses, and user-generated videos on the internet are the same kind of porn. However, as historical legal debates and public discussions have shown us, what constitutes porn is specific to the technologies that produce it. There was a time when DH Lawrence's iconic novel now taught in undergraduate university courses — Lady Chatterley's Lover — was deemed pornographic and banned in India. In more recent times, the nation was in uproar at the Choli ke peeche song from Khalnayak which eventually won awards for its lyrics and choreography.&lt;br /&gt;&lt;br /&gt;In all the controversy, there has so far been a "broadcast imagination" of how pornography gets produced, consumed and distributed. There is a very distinct separation of us versus them when it comes to pornography. They produce porn. They distribute porn. They push porn down our throats (that was probably a poor choice of words) by spamming us and buying Google adwords to infect our search results. We consume porn. And all we need to do is go and regulate, like we do with Bollywood, the central management and distribution mechanism so that the flow of pornography can be curbed. This is what I call a broadcast way of thinking, where the roles of the performers, producers, consumers and distributors of pornography are all distinct and can be regulated.&lt;br /&gt;&lt;br /&gt;However, within the murky spaces of the World Wide Web, the scenario is quite different. Internet pornography is not the same as availability of pornography on the internet. True, the digital multimedia space of sharing and peer-2-peer distribution has made the internet the largest gateway to accessing pornographic objects which are produced through commercial production houses. However, the internet is not merely a way of getting access to existing older forms of porn. The internet also produces pornography that is new, strange, unprecedented and is an essential part of the everyday experience of being digitally connected and networked into sociality.&lt;br /&gt;&lt;br /&gt;The recent controversies about the former congressman from New York, Anthony Weiner, sexting — sending inappropriate sexual messages through his cellphone — gives us some idea of what internet porn looks like. It is not just something captured on a phone-cam but interactive and collaboratively produced. Or as our own Porngate, where two cabinet ministers of the Karnataka legislative assembly were caught surfing some good old porn on their mobile devices while the legislature was in session, indicated, porn is not something confined to the privacy of our rooms. Naked flashmobs, young people experimenting with sexual identities in public, and sometimes bizarre videos of a bus-ride where the camera merely captures the banal and the everyday through a "pornographic gaze" are also a part of the digital porn landscape. The world of virtual reality and multiple online role-playing games offer simulated sexual experiences that allow for human, humanoid, and non-human avatars to engage in sexual activities in digital spaces. Peer-2-peer video chat platforms like Chatroulette, offer random encounters of the naked kind, where nothing is recorded but almost everything can be seen.&lt;br /&gt;&lt;br /&gt;The list of pornography produced by the internet — as opposed to pornography made accessible through the internet — is huge. It doesn't just hide in subcultural practices but resides on popular video-sharing sites like YouTube or Tumblr blogs. It vibrates in our cellphones as we connect to people far away from us, and pulsates on the glowing screens of our tablets as we get glimpses of random strangers and their intimate bodies and moments. An attempt to ban and censor this porn is going to be futile because it does not necessarily take the shape of a full narrative text which can be examined by others to judge its moral content. Any petition that tries to censor such activities is going to fall flat on its face because it fails to recognise that sexual expression, engagement and experimentation is a part of being human — and the ubiquitous presence of digital technologies in our life is going to make the internet a fair playground for activities which might seem pornographic in nature. In fact, trying to restrict and censor them, will only make our task of identifying harmful pornography — porn that involves minors, or hate speech or extreme acts of violence — so much more difficult because it will be pushed into the underbelly of the internet which is much larger than the searched and indexed World Wide Web.&lt;br /&gt;&lt;br /&gt;Trying to suggest that internet pornography is an appendage which can be surgically removed from everyday cyberspace is to not understand the integral part that pornography and sexual interactions play in the development and the unfolding of the internet. The more fruitful efforts would be to try and perhaps create a guideline that helps promote healthy sexual interaction and alerts us to undesirable sexual expressions which reinforce misogyny, violence, hate speech and non-consensual invasions of bodies and privacy. This blanket ban on trying to sweep all internet porn under a carpet is not going to work — it will just show up as a big bump, in places we had not foreseen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom'&gt;https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-06T08:32:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent">
    <title>You Have the Right to Remain Silent</title>
    <link>https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent</link>
    <description>
        &lt;b&gt;Reflecting upon the state of freedom of speech and expression in India, in the wake of the shut-down of the political satire website narendramodiplans.com.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's &lt;a class="external-link" href="http://www.downtoearth.org.in/content/you-have-right-remain-silent"&gt;column was published in Down to Earth&lt;/a&gt; on July 17, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It took less than a day for narendramodiplans.com, a political satire  website that had more than 60,000 hits in the 20 hours of its existence,  to be taken down. A simple webpage that showed a smiling picture of  Narendra Modi, the touted candidate for India’s next Prime Ministerial  campaign, flashing his now trademark ‘V’ for &lt;span&gt;&lt;s&gt;Vengeance&lt;/s&gt; &lt;/span&gt; Victory sign. At the first glimpse it looked like another smart media campaign by the  net-savvy minister who has already made use of the social web quite  effectively, to connect with his constituencies and influence the  younger voting population in the country. Below the image of Mr. Modi  was a text that said, "For a detailed explanation of how Mr. Narendra  Modi plans to run the nation if elected to the house as a Prime Minister  and also for his view/perspective on 2002 riots please click the link  below." The button, reminiscent of 'sale' signs on shops that offer  permanent discounts, promised to reveal, for once and for all, the puppy  plight of Mr. Modi's politics and his plans for the country that he  seeks to lead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, when one tried to click on the button, hoping, at least for a  manifesto that combined the powers of Machiavelli with the sinister  beauty of Kafka, it proved to be an impossible task. The button wiggled,  and jiggled, and slithered all over the page, running away from the  mouse following it. Referencing the layers of evasive answers, the  engineered Public Relations campaigns that try to obfuscate the history  to some of the most pointed questions that have been posited to the Modi  government through judicial and public forums, the button never stayed  still enough to actually reveal the promised answers. For people who are  familiar with the history of such political satire and protest online  would immediately recognise that this wasn’t the most original of ideas.  In fact, it was borrowed from another website -  &lt;a href="http://www.thepmlnvision.com/" title="http://www.thepmlnvision.com/"&gt;http://www.thepmlnvision.com/&lt;/a&gt; that levelled similar accusations of lack of transparency and  accountability on the part of Nawaz Sharif of Pakistan. Another  instance, which is now also shut down, had a similar deployment where  the webpage claimed to give a comprehensive view into Rahul Gandhi’s  achievements, to question his proclaimed intentions of being the next  prime-minister. In short, this is an internet meme, where a simple web  page and a java script allowed for a critical commentary on the future  of the next elections and the strengthening battle between #feku and  #pappu that has already taken epic proportions on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The early demise of these two websites (please do note, when you click  on the links that the Nawaz Sharif website is still working) warns us of  the tightening noose around freedom of speech and expression that  politicos are responsible for in India. It has been a dreary last couple  of years already, with the passing of the &lt;a href="http://www.downtoearth.org.in/content/cis-india.org/internet-governance/intermediary-liability-in-india" target="_blank"&gt;Intermediaries Liabilities Rules&lt;/a&gt; as an amendment to the IT Act of India, &lt;a href="http://www.indianexpress.com/news/spy-in-the-web/888509/1" target="_blank"&gt;Dr. Sibal proposing to pre-censor the social web&lt;/a&gt; in a quest to save the face of erring political figures,&lt;a href="http://www.indianexpress.com/news/two-girls-arrested-for-facebook-post-questioning-bal-thackeray-shutdown-of-mumbai-get-bail/1033177/" target="_blank"&gt; teenagers being arrested for voicing political dissent&lt;/a&gt;, and &lt;a href="http://en.wikipedia.org/wiki/Aseem_Trivedi" target="_blank"&gt;artists being prosecuted&lt;/a&gt; for exercising their rights to question the state of governance in our  country. Despite battles to keep the web an open space that embodies the  democratic potentials and the constitutional rights of freedom of  speech and expression in the country, it has been a losing fight to keep  up with the ad hoc and dictatorial mandates that seem to govern the  web.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Namo.png" alt="Narendra Modi Plans" class="image-inline" title="Narendra Modi Plans" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above is a screen shot from narendramodiplans.com website&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;We have no indication of why this latest piece of satirical expression, which should be granted immunity as a work of art, if not as an individual’s right to free speech, was suddenly taken down. The website now has a message that says, “I quit. In a country with freedom of speech, I assumed that I was allowed to make decent satire on any politician more particularly if it is constructive. Clearly, I was wrong.” The web is already abuzz with conspiracy theories, each sounding scarier than the other because they seem so plausible and possible in a country that has easily sacrificed our right to free speech and expression at the altar of political egos. And whether you subscribe to any of the theories or not, whether your sympathies lie with the BJP or with the UPA, whether or not you approve of the political directions that the country seems to be headed in, there is no doubt that you should be as agitated as I am, about the fact that we are in a fast-car to blanket censorship, and we are going there in style.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What happens online is not just about this one website or the one person  or the one political party – it is a reflection on the rising  surveillance and bully state that presumes that making voices (and  sometimes people) invisible, is enough to resolve the problems that they  create. And what happens on the web is soon going to also affect the  ways in which we live our everyday lives. So the next time, you call  some friends over for dinner, and then sit arguing about the state of  politics in the country, make sure your windows are all shut, you are  wearing tin-foil hats and if possible, direct all conversations to the  task of finally &lt;a href="http://bollywoodjournalist.com/2013/07/08/desperately-seeking-mamta-kulkarni/" target="_blank"&gt;finding Mamta Kulkarni&lt;/a&gt;.  Because anything else that you say might either be censored or land you  in a soup, and the only recourse you might have would be a website that  shows the glorious political figures of the country, with a sign that  says “To defend your right to free speech and expression, please click  here”. And you know that you are never going to be able to click on that  sign. Ever.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent'&gt;https://cis-india.org/internet-governance/blog/down-to-earth-july-17-2013-nishant-shah-you-have-the-right-to-remain-silent&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2013-07-22T06:59:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness">
    <title>Big Data, People's Lives, and the Importance of Openness</title>
    <link>https://cis-india.org/openness/blog-old/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness</link>
    <description>
        &lt;b&gt;Openness has become the buzzword for everything in India right now. From the new kids on the block riding the wave of Digital Humanities investing in infrastructure of open knowledge initiatives to the rhetoric of people-centered open government data projects that are architected to create 'empowered citizens', there is an inherent belief that Opening up things will make everything good. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post was &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/big-data-peoples-lives-and-importance-openness"&gt;published in DML Central&lt;/a&gt; on June 24, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I am not an Open-data party pooper. In fact, I firmly believe that  opening up data – through hardware, through software, through  intellectual property regimes on content – and enabling access to  information and data is one of the most basic needs of the information  age. I also advocate for strong policies that curb corporate and  government control and monopolies over data and information. Along with  my colleagues at the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt;,  and the many networks we work with, I have thought of myself as an open  data advocate and have worked towards examining openness not only at  the level of content, but also openness in infrastructure and conditions  of access, distribution and storage. More than ever, it is necessary to  build systems of Open Data that not only have distributed, collective  and ethical ownership but also ensure the fair use and integration of  information in our everyday life – especially given the sinister age of  relentless remembering, as lives get incessantly archived through  ubiquitous and pervasive technologies of portable computing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having said that, there is a strange thing happening around Openness  right now. Openness seems to have been separated from the fact that it  is a response to things being gated and closed. Openness, as it is being  deployed right now, in e-government initiatives or rapid digitization  processes in university libraries, seems to suggest that Openness is  merely about making things in the physical format available in the  digital medium. Hence, for example, the National Mission for Education  through Information and Communication Technologies, India’s largest  flagship government initiative to build learning conditions of the  future, is investing almost all of its budget on digitizing historical  and local language material in digitally intelligible and legible  records that can be easily distributed. While the effort at building the  infrastructure and preserving this material is absolutely worth  supporting, making it the be-all and end-all of Open data initiatives is  symptomatic of what I call the ‘politics of the benign’. We need to  realize that Openness is not merely about making already available  content in physical formats in the digital domain. Openness is about  battles with Intellectual Property Regimes, which charge an  extraordinary amount of money for high-value knowledge to anybody who  wants to access it. In other words, openness is not about digitizing our  grandparents’ pictures; it is about claiming access to knowledge and  information hidden behind paywalls and gateways that is often produced  using public resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As you can imagine, the perpetuation of this politics of benign fits  many agendas; there are numerous stakeholders and actors who seek to  neuter the radical nature of demands made by the Openness movements  while retaining the vocabulary of political change. And that is why, if  you look at the ways in which openness debates have changed, they get  immediately deflected to questions around infrastructure, access,  last-mile, etc. – which are all presented to us as the infrastructure of  being political and being open. In the last few years, especially with  Digital Humanities emerging as the playground where politics is not  allowed, I find too many instances where the Humanities and Social  Sciences questions get morphed into similar sounding questions that  pretend to be the same but dislocate the political content and intention  from the engagement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the ways this works really well is by a separation of data from  the lived reality of people. Data is seen as something that is out there  – something that is &lt;i&gt;about&lt;/i&gt; the real rather than &lt;i&gt;the&lt;/i&gt; real. It is seen as an abstraction, which, when it further enters the  circuits of pretty visualizations and graphic representations, becomes  so entrenched in questions of reading and coding that it often becomes a  surrogate for the larger realities that it is supposed to intervene in.  So, for example, in India, the concerns around agriculture  infrastructure and conditions of the farmers have easily been replaced  by agriculture informatics – leading to a strange paradox where the  states with the highest community informatics infrastructure also have  the highest &lt;a href="http://en.wikipedia.org/wiki/Farmers%27_suicides_in_India"&gt;incidences of farmer suicides&lt;/a&gt;.  I am not suggesting there is a cause-and-effect relationship here.  However, it is a telling story that the community informatics  infrastructure which was supposed to change the bleak realities of  agriculture and farming in India has definitely not changed the nature  of the reality it set out to solve.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or in a similar vein, the ways in which the landscape of education is  changing in the country, because of the emergence of the digital as the  new organizing principle and in some instances, the &lt;i&gt;raison de etre&lt;/i&gt; for building education infrastructure also needs to be examined. So,  for instance, India has seen a rapid improvement of the Gross Enrollment  Ratio in education that measures the annual intake and successful  completion of education programs by students in the country. The GER  shows that with remote education processes, the attempts at building  distributed learning environments and the building of digital  infrastructure has led to more students in different parts of the  country getting enrolled in formal education systems. There is a  celebration that more children are entering schools and colleges and are  also in a state of socio-economic mobility. There is a clear causal  relationship established in producing digital infrastructure and greater  access to education and learning resources for an emerging information  society like India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this particular mode of looking at education, through the lens  of access and inclusion, is no longer able to reflect on the core  concerns that education institutions in the country were historically  supposed to address. If the primary function of education was to address  the questions of inequity, uneven modernity, disparate wealth  distribution, and widespread socio-cultural conservatism, these are no  longer questions that are featured in the Data-Technology driven  education programs. These problems, which have been at the center of  education debates in the country – leading to widespread affirmative  action and violent resistance to it – have now been reformulated around  quantifiable parameters of intake, credits, employability,  affordability, accessibility, merit, etc. So there is silence about the  nature of the students who enter education. There is an implicit push  for the disinvestment of the state from education resources in favor of  privatization. We remain enamored by the numbers joining the system,  without worrying about the categories of discrimination – caste, gender,  sexuality, language, location – that have affected the quality,  intention and function of education. These issues have become moot  points, to be replaced by visualizations and data sets that remain  opaque in looking at the negotiations of identity politics and the need  to embed education processes in lived realities of the students who  enter formal education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These problems are not new. And the intention of this articulation is  not to deny the power of digital technologies or the opportunities they  produce. Instead, it is a call to say that we need to stop thinking of  data – an abstraction, an artifact, a manual product – as a natural  state of being. We need to remind ourselves that engagement with data is  not a sterile engagement, rendered beautiful through visualizations and  infographics that can make reality intelligible. It is perhaps time to  realize that Data has replaced People as the central concern of being  human, social and political. Time to start re-introducing People back  into debates around Data, and acknowledging that Data Informatics is  People Informatics and data wars have a direct effect on the ways in  which people live. And Die.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Banner image credit: sugree &lt;a class="external-link" href="http://www.flickr.com/photos/73462957"&gt;http://www.flickr.com/photos/73462957&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness'&gt;https://cis-india.org/openness/blog-old/dml-central-june-24-2013-nishant-shah-big-data-peoples-lives-and-importance-of-openness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-07-03T04:23:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change is it Anyway?</title>
    <link>https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;This thought piece is an attempt to reflect critically on existing practices of “making change” and its implications for the future of citizen action in information and network societies. It observes that change is constantly and explicitly invoked at different stages in research, practice, and policy in relation to digital technologies, citizen action, and network societies. &lt;/b&gt;
        
&lt;p&gt;The White Paper by Nishant Shah was &lt;a class="external-link" href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Civic-Explorations/Publications/Whose-Change-is-it-anyway"&gt;published by Hivos recently&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;However, we do not have adequate frameworks to address the idea of change. What constitutes change? What are the intentions that make change possible? Who are the actors involved? Whose change is&amp;nbsp; it, anyway?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing on the Hivos Knowledge Programme and on knowledge frameworks  around youth, technology, and change from the last four years, this  thought piece introduces new ways of defining, locating, and figuring  change. In the process, it also helps understand the role that digital&amp;nbsp;  technologies play in shaping and amplifying our processes and practices  of change, and to understand actors of change who are not necessarily  confined to the category of “citizen”, which seems to be understood as  the de facto agent of change in contemporary social upheavals,&amp;nbsp;  political uprisings, and cultural innovations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Methodologically, this thought piece attempts to make three discursive  interventions: It locates digital activism in historical trajectories,  positing that digital activism has deep ties to traditional activism,  when it comes to the core political cause. Simultaneously, it recognises  that new modes of political engagement are demanding and producing  novel practices and introducing new actors and stakeholders. It looks at  contemporary digital and network theories, but also draws on older  philosophical lineages to discuss the crises that we seek to address. It  tries to interject these abstractions and theoretical frameworks back  into the field by producing two case studies that show how engagement  with these questions might help us reflect critically on our past  practices and knowledge as well as on visions for and speculations about  the future, and how these shape contemporary network societies. It  builds a theoretical framework based on knowledge gleaned from  conversations, interviews, and on-the-ground action with different  groups and communities in emerging information societies, and integrates  with new critical theory to&amp;nbsp; build an interdisciplinary and accessible  framework that seeks to inform research, development-based  interventions, and policy structures at the intersection of digital  technologies, citizen action, and change by introducing questions around  change into existing discourse.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf" class="internal-link"&gt;Click to download the full White Paper here&lt;/a&gt; (PDF, 321 Kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-04-17T10:56:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
