You are here: Home
102 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Budapest Convention and the Information Technology Act
by Vipul Kharbanda published Nov 20, 2018 last modified Nov 20, 2018 04:18 PM — filed under: ,
The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of internet and computer crimes.
Located in Internet Governance / Blog
Blog Entry Cyberspace and External Affairs:A Memorandum for India Summary
by Arindrajit Basu and Elonnai Hickok published Nov 30, 2018 last modified Dec 01, 2018 04:10 AM — filed under: , ,
This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides a set of recommendations for the MEA as they craft their cyber diplomacy strategy.
Located in Internet Governance / Blog
Blog Entry A Critical Look at the Visual Representation of Cybersecurity
by Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu published Dec 11, 2018 last modified Aug 21, 2019 08:00 AM — filed under: ,
The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual Representations of Cybersecurity. Images in the public sphere such as visuals in the media, Wikipedia commons, and stock images - play a vital role in the public’s perception of cybercrime and cybersecurity.
Located in Internet Governance / Blog
Blog Entry European E-Evidence Proposal and Indian Law
by Vipul Kharbanda published Dec 23, 2018 — filed under: ,
In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.
Located in Internet Governance / Blog
Blog Entry Mapping cybersecurity in India: An infographic
by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah published Dec 23, 2018 — filed under: ,
This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.
Located in Internet Governance / Blog
Blog Entry Private-public partnership for cyber security
by Arindrajit Basu published Dec 26, 2018 last modified Dec 26, 2018 03:02 PM — filed under: ,
Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.
Located in Internet Governance / Blog
India-China Tech Forum 2018
by Admin published Dec 26, 2018 — filed under: ,
Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.
Located in Internet Governance / News & Media
Blog Entry Is the new ‘interception’ order old wine in a new bottle?
by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare published Dec 29, 2018 — filed under: , , , ,
The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.
Located in Internet Governance / Blog
Blog Entry Economics of Cybersecurity: Literature Review Compendium
by Natalia Khaniejo published Dec 31, 2018 — filed under: ,
The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 6) - Lhadon Tethong
by Purba Sarkar published Jul 15, 2013 last modified Aug 01, 2013 09:54 AM — filed under: , , , ,
CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series
Located in Internet Governance