You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Regulatory Perspectives on Net Neutrality
by Pranesh Prakash published Jul 08, 2015 last modified Jul 18, 2015 02:46 AM — filed under: , , ,
In this paper Pranesh Prakash gives an overview on why India needs to put in place net neutrality regulations, and the form that those regulations must take to avoid being over-regulation.
Located in Internet Governance / Blog
Blog Entry India’s digital check
by Sunil Abraham published Jul 08, 2015 last modified Sep 15, 2015 02:55 PM — filed under: , ,
All nine pillars of Digital India directly correlate with policy research conducted at the Centre for Internet and Society, where I have worked for the last seven years. This allows our research outputs to speak directly to the priorities of the government when it comes to digital transformation.
Located in Internet Governance / Blog
'IRCTC’s Aadhaar play can violate SC order and derail National Security'
by Prasad Krishna published Jul 07, 2015 — filed under: ,
Your online railway bookings are going to become a wee bit more difficult if they aren’t already so.
Located in Internet Governance / News & Media
The Digital Divide: pros and cons of Modi's latest big initiative
by Prasad Krishna published Jul 06, 2015 — filed under: ,
Prime Minister Narendra Modi inaugurated the Digital India (DI) initiative on 1 July, at an event attended by scores of government officials as well as industry leaders.
Located in Internet Governance / News & Media
Blog Entry Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis
by Rakshanda Deka published Jul 02, 2015 — filed under: ,
This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.
Located in Internet Governance / Blog
Five Nations, One Future?
by Prasad Krishna published Jul 01, 2015 last modified Jul 18, 2015 02:34 AM — filed under:
The Silicon Valley model for success - what Bangalore, Chile, London and Rwanda want to learn from California.
Located in Internet Governance / News & Media
Most emerging firms low on cyber security: Experts
by Prasad Krishna published Jun 29, 2015 — filed under: ,
When Pavitra Badrinath saw that the upgrade to a shopping application on her smartphone asked access to her contacts and messages, she decided against it. "Laws on privacy are not clear in India. So I am doing what I can to protect my information," the 26-year-old technology firm employee said.
Located in Internet Governance / News & Media
Government's stand on internet governance draws applause from civil society organisations
by Prasad Krishna published Jun 29, 2015 — filed under:
India's decision to support the multistakeholder model of internet governance has drawn mostly applause from civil society organisations and individuals who have been following the issue, even as they cautioned that implementation will determine the success of the model.
Located in Internet Governance / News & Media
Blog Entry The generation of e-Emergency
by Sunil Abraham published Jun 22, 2015 last modified Jun 29, 2015 04:40 PM — filed under: , ,
The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies.
Located in Internet Governance / Blog
Blog Entry IANA Transition Stewardship & ICANN Accountability (II)
by Jyoti Panday published Jun 21, 2015 last modified Jul 31, 2015 03:47 PM — filed under: , ,
This paper is the second in a multi-part series, in which we provide an overview of submitted proposals and highlight areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.
Located in Internet Governance / Blog