You are here: Home
1026 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Deep Packet Inspection: How it Works and its Impact on Privacy
by Amber Sinha published Dec 16, 2016 — filed under: ,
In the last few years, there has been extensive debate and discussion around network neutrality in India. The online campaign in favor of Network Neutrality was led by Savetheinternet.in in India. The campaign was a spectacular success and facilitated sending over a million emails supporting the cause of network neutrality, eventually leading to ban on differential pricing. Following in the footsteps of the Shreya Singhal judgement, the fact that the issue of net neutrality has managed to attract wide public attention is an encouraging sign for a free and open Internet in India. Since the debate has been focused largely on zero rating, other kinds of network practices impacting network neutrality have yet to be comprehensively explored in the Indian context, nor their impact on other values. In this article, the author focuses on network management, in general, and deep packet inspection, in particular and how it impacts the privacy of users.
Located in Internet Governance / Blog
Blog Entry Demonetisation Survey Limits the Range of Feedback that can be Provided by the User
by tiwari published Nov 24, 2016 last modified Nov 24, 2016 02:50 PM — filed under: , ,
The government has faced increasingly targeted attacks by the Opposition and the public on the merits of the demonetisation move carried out a fortnight ago. In an attempt to placate this ire and to create a feedback loop that directly engages with the public, the government has decided to conduct a mass survey to gauge public perception. The survey is hosted on the Narendra Modi mobile application that can be found on the Android and iOS app stores. This article will attempt to analyse the mobile application by looking at the design principles followed in the survey and the scope given to survey takers to express their true opinion of the demonetisation move.
Located in Internet Governance / Blog
Blog Entry Demystifying Data Breaches in India
by Pawan Singh published Oct 17, 2022 — filed under: , , , ,
Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.
Located in Internet Governance / Blog
Blog Entry Deployment of Digital Health Policies and Technologies: During Covid-19
by Pallavi Bedi published Jul 21, 2022 — filed under: , , , , , , ,
In the last twenty years or so, the Indian government has adopted several digital mechanisms to deliver services to its citizens.
Located in Internet Governance / Blog
Blog Entry Design and Uses of Digital Identities - Research Plan
by Amber Sinha and Pooja Saxena published Aug 08, 2019 last modified Aug 17, 2019 07:58 AM — filed under: , , , ,
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Located in Internet Governance / Blog
Blog Entry Design Concerns in Creating Privacy Notices
by Saumyaa Naidu published May 29, 2018 last modified Jun 06, 2018 01:45 PM — filed under: ,
The purpose of privacy notices and choice mechanisms is to notify users of the data practices of a system, so they can make informed privacy decisions.
Located in Internet Governance / Blog
Blog Entry DesiSec: Cybersecurity and Civil Society in India
by Laird Brown published Jun 20, 2015 last modified Jun 29, 2015 04:25 PM — filed under: , , , , , , , , ,
As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet & Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.
Located in Internet Governance / Blog
DesiSec: Episode 1 - Film Release and Screening
by Purba Sarkar published Nov 28, 2013 last modified Dec 17, 2013 08:13 AM — filed under: , , , , , , ,
The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!
Located in Internet Governance
Despite apex court order, IOC proceeds with Aadhaar-linked DBT
by Prasad Krishna published Jan 06, 2014 last modified Jan 31, 2014 06:50 AM — filed under: , ,
Once DBT starts, there is no other method to avail of subsidy: IOC official.
Located in News & Media
Details of 135 million Aadhaar card holders may have leaked, claims CIS report
by Prasad Krishna published May 02, 2017 last modified May 20, 2017 08:42 AM — filed under: , ,
The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.
Located in Internet Governance / News & Media