You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry The State is Snooping: Can You Escape?
by Snehashish Ghosh published Jun 27, 2013 last modified Apr 29, 2019 03:09 PM — filed under: ,
Blanket surveillance of the kind envisaged by India's Centralized Monitoring System achieves little, but blatantly violates the citizen's right to privacy; Snehashish Ghosh explores why it may be dangerous and looks at potential safeguards against such intrusion.
Located in Internet Governance / Blog
Blog Entry The Surveillance Industry in India – An Analysis of Indian Security Expos
by Divij Joshi published Feb 19, 2015 last modified Mar 08, 2015 12:25 PM — filed under: ,
The author talks about the surveillance industry in India and analyses Indian security expos.
Located in Internet Governance / Blog
Blog Entry The Technology behind Big Data
by Geethanjali Jujjavarapu and Udbhav Tiwari published Nov 30, 2016 last modified Dec 04, 2016 09:53 AM — filed under: , , , ,
The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.
Located in Internet Governance / Blog
The trouble with trolls
by Prasad Krishna published Jul 28, 2014 last modified Jul 28, 2014 05:42 AM — filed under: , , ,
Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.
Located in News & Media
The Walls Have Ears
by Prasad Krishna published Jul 06, 2011 last modified Jul 06, 2011 06:26 AM — filed under:
The proposed Privacy Bill seems skewed towards the state rather than the citizen, writes Saikat Datta. This news was published in the Outlook magazine, issue, July 11, 2011.
Located in News & Media
File The​ ​Fundamental​ ​Right​ ​to​ ​Privacy:​ ​Part​ ​III SCOPE
by Amber Sinha published Oct 02, 2017 — filed under: ,
This is the third paper in a series on the recent judgment on the right to privacy by the nine judge constitution bench of the Supreme Court in a reference matter in Puttaswamy and others v. Union of India. The first two papers on the Sources and Structure of the constitutional right to privacy are available here, and here, respectively. While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.
Located in Internet Governance
There's a Spy Behind Your Gadget Screen Tracking Data
by Prasad Krishna published Apr 25, 2015 last modified May 31, 2015 03:50 PM — filed under: ,
More people are becoming aware of the risks that come with online habits.
Located in Internet Governance / News & Media
They know where you are
by Admin published Jan 18, 2019 last modified Jan 18, 2019 02:14 AM — filed under: ,
With hotel-booking app routinely sharing real-time guest data with police and government, lives of those fleeing persecution is in danger, privacy advocates fear.
Located in Internet Governance / News & Media
Three Years Later, IPaidABribe.com Pays Off
by Prasad Krishna published Sep 25, 2013 — filed under: ,
After reporting a bribe on IPaidABribe.com, one Bangalore student has had the satisfaction of seeing action taken against a corrupt public official.
Located in News & Media
Blog Entry Through the looking glass: Analysing transparency reports
by Torsha Sarkar, Suhan S and Gurshabad Grover published Oct 30, 2019 last modified Nov 02, 2019 05:48 AM — filed under: , ,
An analysis of companies' transparency reports for government requests for user data and content removal
Located in Internet Governance / Blog