You are here: Home
2974 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Private Sector and the cultivation of cyber norms in India
by Arindrajit Basu published Aug 07, 2019 — filed under: ,
Information Communication Technologies (ICTs) have become a regular facet of modern existence. The growth of cyberspace has challenged traditional notions of global order and uprooted the notion of governance itself. All over the world, the private sector has become a critical player, both in framing cyber regulations and in implementing them.
Located in Internet Governance / Blog
Blog Entry Comments to the ID4D Practitioners’ Guide
by Yesha Tshering Paul, Prakriti Singh, and Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:25 AM — filed under: , , , ,
Located in Internet Governance / Blog
Blog Entry The Appropriate Use of Digital Identity
by Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:24 AM — filed under: , , , ,
Located in Internet Governance / Blog
Blog Entry Holding ID Issuers Accountable, What Works?
by Shruti Trikanad and Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:23 AM — filed under: , , , ,
Located in Internet Governance / Blog
Why the Madras HC case on WhatsApp traceability could have wider ramifications
by Haripirya Suresh published Aug 09, 2019 — filed under:
While traceability will make law enforcement easier, it could also undermine voices of dissent, say experts.
Located in Internet Governance / News & Media
Abuse linked to Net fixation
by Nina C. George published Aug 15, 2019 — filed under:
Addiction to surfing for explicit content and loss of privacy are big concerns when it comes to children, say counsellors.
Located in Internet Governance / News & Media
Blog Entry Design and Uses of Digital Identities - Research Plan
by Amber Sinha and Pooja Saxena published Aug 08, 2019 last modified Aug 17, 2019 07:58 AM — filed under: , , , ,
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Located in Internet Governance / Blog
Emergence of Chinese Technology:Rising stakes for innovation, competition and governance
by Admin published Aug 19, 2019 — filed under: ,
Omidyar Network in partnership with the Esya Centre organized a private discussion on the theme “Emergence of Chinese technology - rising stakes for innovation, competition and governance” on Monday, 12 August 2019 in New Delhi. Arindrajit Basu attended the event.
Located in Internet Governance / News & Media
Cyber Policy 2.0
by Admin published Aug 19, 2019 — filed under: , ,
National Law University organized an executive education program in Bangalore on August 17, 2019. Arindrajit Basu was a speaker. He spoke on Deconstructing the India regulatory approach to data governance and cyber security.
Located in Internet Governance / News & Media
Best Bits 2012
by Prasad Krishna published Nov 06, 2012 last modified Dec 06, 2012 06:46 AM — filed under: ,
Best Bits organized a workshop at the IGF. It was held on November 3 and 4, 2012. Pranesh Prakash and Elonnai Hickok participated in the event.
Located in News & Media