You are here: Home
27 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry A provisional definition for the Cultural Last Mile
by Nishant Shah published Dec 10, 2009 last modified Aug 02, 2011 08:57 AM — filed under: , , , , ,
In the first of his entries, Ashish Rajadhyaksha gives his own spin on the 'Last Mile' problem that has been at the crux of all public technologies. Shifting the terms of debate away from broadcast problems of distance and access, he re-purposes the 'last mile' which is a communications problem, to make a cultural argument about the role and imagination of technology in India, and the specific ways in which this problem features in talking about Internet Technologies in contemporary India.
Located in RAW / / Blogs / The Last Cultural Mile
Blog Entry An Evidence based Intermediary Liability Policy Framework: Workshop at IGF
by Jyoti Panday published Jun 30, 2014 last modified Jul 04, 2014 06:41 AM — filed under: , , , , , , , ,
CIS is organising a workshop at the Internet Governance Forum 2014. The workshop will be an opportunity to present and discuss ongoing research on the changing definition of intermediaries and their responsibilities across jurisdictions and technologies and contribute to a comprehensible framework for liability that is consistent with the capacity of the intermediary and with international human-rights standards.
Located in Internet Governance / Blog
Beyond Scale: How to make your digital development program sustainable
by Admin published Feb 26, 2018 — filed under: ,
A dissemination workshop was organized by BBC Media Action, with support from the Digital Impact Alliance and the Bill & Melinda Gates Foundation on February 21, 2018 in Bangalore. Sunil Abraham participated in the workshop.
Located in Internet Governance / News & Media
Blog Entry Civic Hacking Workshop
by Pranesh Prakash published Jul 28, 2010 last modified Aug 23, 2011 03:14 AM — filed under: , , ,
CIS, with the UK Government's Foreign Office and the Cabinet Office Team for Digital Engagement, and Google India, is organizing a workshop on open data (or the lack thereof) and 'civic hacking'.
Located in Openness / Blog
CPOV : Wikipedia Research Initiative
by Nishant Shah published Mar 16, 2010 last modified Aug 23, 2011 02:52 AM — filed under: , , , , , , ,
The Second event, towards building the Critical Point of View Reader on Wikipedia, brings a range of scholars, practitioners, theorists and activists to critically reflect on the state of Wikipedia in our contemporary Information Societies. Organised in Amsterdam, Netherlands, by the Institute of Network Cultures, in collaboration with the Centre for Internet and Society, Bangalore, the event builds on the debates and discussions initiated at the WikiWars that launched off the knowledge network in Bangalore in January 2010. Follow the Live Tweets at #CPOV
Located in Research / Conferences & Workshops / Conference Blogs
Blog Entry Electoral Databases – Privacy and Security Concerns
by Snehashish Ghosh published Jan 16, 2014 last modified Jan 16, 2014 11:07 AM — filed under: , , , , , , , , , , ,
In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.
Located in Internet Governance / Blog
Blog Entry Engaging on the Digital Commons
by Pranesh Prakash published Feb 25, 2011 last modified Aug 20, 2011 12:56 PM — filed under: , , ,
We at the Centre for Internet and Society are very glad to be able to participate in the 13th Biennial Conference of the International Association for the Study of the Commons (IASC). Our interest in the conference arises mainly from our work in the areas of intellectual property rights reform and promotion of different forms of ‘opennesses’ that have cropped up as a response to perceived problems with our present-day regime of intellectual property rights, including open content, open standards, free and open source software, open government data, open access to scholarly research and data, open access to law, etc., our emerging work on telecom policy with respect to open/shared spectrum, and the very important questions around Internet governance. The article by Sunil Abraham and Pranesh Prakash was published in the journal Common Voices, Issue 4.
Located in Openness / Blog
Fake Narendra Modi apps aplenty, but it’s up to users to protect themselves
by Prasad Krishna published Dec 10, 2016 last modified Dec 10, 2016 04:24 AM — filed under: , , ,
The app, hosted on Google Play store, automatically gets excessive permission including full network access and ability to take pictures and videos once downloaded.
Located in Internet Governance / News & Media
Fill The Gap: Global Discussion on Digital Natives
by Nishant Shah published Jan 15, 2010 last modified Jan 22, 2010 10:54 AM — filed under: , , , , , , , , , ,
More often than not people don't understand the new practices inspired by Internet and digital technologies. As such a series of accusations have been leveled against the Digital Natives. Educators, policy makers, scholars, and parents have all raised their worries without hearing out from the people they are concerned about. Hivos has initiated an online global discussion about Digital Natives. So, to voice your opinion, start tweeting with us now #DigitalNatives.
Located in Research / Collaborative Projects Programme / Digital Natives With a Cause?
IT Act and Commerce
by Pranesh Prakash published Aug 11, 2009 last modified Aug 02, 2011 07:41 AM — filed under: , , , ,
This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India. In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.
Located in Internet Governance / Blog