You are here: Home
2976 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry How to make EVMs hack-proof, and elections more trustworthy
by Pranesh Prakash published Jan 14, 2019 — filed under:
Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didn’t let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?
Located in Internet Governance / Blog
Civic activism over WhatsApp and stories of and from cab drivers are part of a new narrative in Bengaluru
by Admin published Jan 13, 2019 last modified Feb 02, 2019 02:48 PM — filed under:
Does a city have a pulse? And can that pulse be felt in its technological interactions?
Located in Internet Governance / News & Media
Creeped out by Netflix's 'You'? Here's how you can avoid online stalkers, data thieves
by Admin published Jan 12, 2019 — filed under:
Several social media users have no idea of how much of their information is stored on the Internet and what kind of information they are allowing the applications to access.
Located in Internet Governance / News & Media
Blog Entry Registering for Aadhaar in 2019
by Sunil Abraham published Jan 03, 2019 last modified Jan 03, 2019 02:59 PM — filed under: , ,
It is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.
Located in Internet Governance / Blog
The constitutionality of MHA surveillance order
by Nehaa Chaudhari published Dec 31, 2018 — filed under:
The rules require review committees to examine all surveillance orders issued under this section every couple of months.
Located in Internet Governance / News & Media
December 2018 Newsletter
by Prasad Krishna published Dec 31, 2018 last modified Jan 08, 2019 04:15 PM — filed under: , ,
We at the Centre for Internet & Society (CIS) wish you all a great year ahead and welcome you to the twelfth issue of its newsletter (December) for the year 2018:
Located in About Us / Newsletters
Blog Entry Economics of Cybersecurity: Literature Review Compendium
by Natallia Khaniejo published Dec 31, 2018 last modified May 01, 2021 06:09 AM — filed under: ,
The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.
Located in Internet Governance / Blog
MHA snoop order & bid to amend IT rules: China-like clampdown or tracking unlawful content?
by Admin published Dec 30, 2018 — filed under: ,
An MHA order last week authorised 10 government agencies to scan data on computers. This was followed by the Modi government’s proposal to amend the Information Technology rules for social media platforms like WhatsApp, Facebook and Twitter to “proactively identify, remove or disable access to unlawful information or content” in order to curb fake news online.
Located in Internet Governance / News & Media
The dark side of future tech: Where are we headed on privacy, security, truth?
by Admin published Dec 30, 2018 last modified Dec 30, 2018 09:24 AM — filed under: ,
#2018 Year-End Special: We now live in a time when devices listen, chips track your choices, and governments can watch from behind a barcode. How do we navigate this world?
Located in Internet Governance / News & Media
Blog Entry Is the new ‘interception’ order old wine in a new bottle?
by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare published Dec 29, 2018 — filed under: , , , ,
The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.
Located in Internet Governance / Blog