The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 41 to 55.
Technology, Power, and Revolutions in the Arab Spring
http://editors.cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring
<b>The Centre for Internet and Society (CIS), Bangalore cordially invites you to a talk by Prof. Ramesh Srinivasan on technology, power and revolutions in the Arab Spring. The talk will be held in CIS office on July 2, 2013 from 6.00 p.m. onwards.</b>
<h2>Ramesh Srinivasan</h2>
<p style="text-align: justify; ">Ramesh Srinivasan, Associate Professor at UCLA in Design and Media/Information Studies, studies and participates in projects focused on how new media technologies impact political revolutions, economic development and poverty reduction, and the future of cultural heritage. He recently wrote <a href="http://www.washingtonpost.com/national/on-innovations/london-egypt-and-the-complex-role-of-social-media/2011/08/11/gIQAIoud8I_story.html">an op/ed at the Washington Post</a> explaining the complex nature of social media in revolutions and riots, such as those in Egypt and in London, and also a column for the Post’s Sunday Outlook section on the <a href="http://www.washingtonpost.com/national/on-innovations/five-myths-about-social-media/2011/09/15/gIQAr2BwAL_allComments.html#comments">5 Myths of Social Media</a>. Additionally, he has written multiple front page articles for the Huffington Post, including a <a href="http://www.huffingtonpost.com/ramesh-srinivasan/the-net-worth-of-open-net_b_823570.html">piece</a> on Internet Freedom for the Huffington Post. He has had his work featured on the front page of the UCLA and USC websites.</p>
<p style="text-align: justify; ">Recent public outreach has built on his response in the New Yorker (from his blog: <a href="http://rameshsrinivasan.org/">http://rameshsrinivasan.org</a>) to Malcolm Gladwell’s writings critiquing the power of social media in impacting revolutionary movements. He has worked with bloggers, pragmatically studying their strengths and limitations, who were involved in recent revolutions in Egypt and Kyrgyzstan, as discussed in a recent <a href="http://www.npr.org/2011/08/12/139570720/twitter-created-echo-chamber-during-egyptian-protests">NPR interview</a>. He has also collaborated with non-literate tribal populations in India to study how literacy emerges through uses of technology, and traditional Native American communities to study how non-Western understandings of the world can introduce new ways of looking at the future of the internet. His work has impacted contemporary understandings of media studies, anthropology and sociology, design, and economic and political development studies. He has given several major invited talks, including recently at LIFT in 2009 (<a href="http://vimeo.com/5520100">http://vimeo.com/5520100</a>). He holds an engineering degree from Stanford, a Masters degree from the MIT Media Lab, and a Doctorate from Harvard University. His full academic CV can be found at <a href="http://rameshsrinivasan.org/cv">http://rameshsrinivasan.org/cv</a></p>
<hr />
<p><b><a class="external-link" href="http://rameshsrinivasan.org/">See Prof. Ramesh Srinivasan's blog page</a></b></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring'>http://editors.cis-india.org/internet-governance/events/technology-power-and-revolutions-in-arab-spring</a>
</p>
No publisherpraskrishnaEventInternet Governance2013-07-01T08:36:57ZEventTechnology Culture and Events in South East Asia — A Presentation by Preetam Rai
http://editors.cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia
<b>Preetam Rai who works with nonprofits, startups and educational institutions will do a small presentation cum discussion at the Centre for Internet & Society, Bangalore on December 18, 2012, from 5.00 p.m. to 6.30 p.m.</b>
<p style="text-align: justify;">In 2012, Myanmar hosted one of the largest open technology event with over 5000 attendees joining the Barcamp Yangon. Every month, Cambodian youth put together dozens of self-initiated peer learning events and actively use social networks to recruit participants. Thais are creating physical spaces where social entrepreneurs and developers collaborate with each other.</p>
<p style="text-align: justify;">Join us to explore these trends and how they are helping change South East Asia. Learn how the technology enthusiasts are ignoring past national antagonism and traveling across borders to connect with peers.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">We will introduce you to events and spaces(coworking spaces, hackerspaces) that you can join in to explore this activity first hand when you are traveling through the region.</p>
<table class="listing">
<tbody>
<tr>
<th style="text-align: center;"><img src="http://editors.cis-india.org/home-images/Technology.png" alt="" class="image-inline" title="BlogFest2012" /></th>
</tr>
<tr>
<td style="text-align: center;"><em>Participants from several South East Asian countries at BlogFest 2012 in Cambodia</em>.</td>
</tr>
</tbody>
</table>
<h2 style="text-align: justify;">Preetam Rai</h2>
<p style="text-align: justify;">Preetam Rai helps put up technology and educational events in South East Asia. He works with nonprofits, startups and educational institutions helping them connect better with their audiences. He was the South East Asian Regional Editor at Global Voices Online, a social media aggregation project initiated by the Berkman Centre for Internet and Society. He is on twitter at @<a href="http://twitter.com/preetamrai">preetamrai</a>.</p>
<p style="text-align: justify;">VIDEO</p>
<p style="text-align: justify;"> </p>
<iframe src="http://blip.tv/play/AYOLxwQA.html?p=1" frameborder="0" height="250" width="250"></iframe><embed style="display:none" src="http://a.blip.tv/api.swf#AYOLxwQA" type="application/x-shockwave-flash"></embed>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia'>http://editors.cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia</a>
</p>
No publisherpraskrishnaEventInternet Governance2012-12-19T12:25:29ZEventTech Talk: Landscape of Wireless Communications & Electromagnetic Spectrum
http://editors.cis-india.org/events/tech-talk-landscape-of-wireless-communications-and-electromagnetic-spectrum
<b>The Centre for Internet and Society (CIS) welcomes you to a talk by A. Radha Krishna on April 28, 2014, 2 p.m. to 5 p.m. at its office in Bangalore. </b>
<p>Radha Krishna's talk will focus on:</p>
<ol>
<li style="text-align: justify; ">The various wireless communication technologies like Bluetooth, Zigbee, Zwave, WiFi, IoT, HomeRF, RFid, NFC, RuBee, connected car, V2V, V2I, V2R, 2G, 3G, 4G, x10, Insteon, JenNetIP, Wireless USB, microwave communication, satellite communication, Iridium, ameture radio, DVB-T, H/NGH, SH, AM, FM, NTSC, TV-Band Devices, cordless phones, RC toys, remote door lock of cars, etc.</li>
<li style="text-align: justify; ">Touch upon lasers and fiber optic communications.</li>
<li style="text-align: justify; ">Discuss licensed/unlicensed/reserved bands of electromagnetic spectrum.</li>
<li style="text-align: justify; ">Some of the challenges to use other frequencies of electromagnetic spectrum.</li>
</ol>
<h3>A. Radha Krishna</h3>
<p style="text-align: justify; ">A. Radha Krishna is an Architect working in Alcatel-Lucent with 15 years of experience in embedded, consumer electronics, and telecom domains. He is also a long time Wikimedian and acted as Wikimedia Bangalore SIG chair for about 1.5 years. He is also part of NASSCOM initiative to reduce the gap of skills of Engineering students to Industry need. He is working on a Telecom course which could be part of curriculum in Engineering colleges all over India from 2015.</p>
<hr />
<h3>Presentation Material</h3>
<p><iframe frameborder="0" height="400" src="http://prezi.com/embed/3qp57ddr0fmw/?bgcolor=ffffff&lock_to_path=0&autoplay=0&autohide_ctrls=0&features=undefined&disabled_features=undefined" width="550"></iframe></p>
<p>View more presentations by Radha Krishna <a class="external-link" href="http://prezi.com/3qp57ddr0fmw/electromagnetic-spectrum/">here</a>.</p>
<hr />
<p><i>Snacks and high tea will be served at 5.00 p.m.<br /></i></p>
<p>
For more details visit <a href='http://editors.cis-india.org/events/tech-talk-landscape-of-wireless-communications-and-electromagnetic-spectrum'>http://editors.cis-india.org/events/tech-talk-landscape-of-wireless-communications-and-electromagnetic-spectrum</a>
</p>
No publisherpraskrishnaAccess to KnowledgeTelecomWikimediaWikipediaOpennessEvent2014-05-07T08:12:54ZEventTalks by Richard Abisla and Kaliya Young
http://editors.cis-india.org/openness/events/talks-by-richard-abisla-and-kaliya-young
<b>The Centre for Internet & Society will be hosting public talks by Richard Abisla and Kaliya Young, who are both 2019 India-U.S. Public Interest Technology Fellows at New America at its Bangalore office on March 4, 2019.</b>
<p>The event is over. <a class="external-link" href="https://twitter.com/cis_india/status/1102863819288666112">Pictures of the speakers were posted on Twitter</a>.</p>
<hr />
<h3>Agenda</h3>
<ul>
<li>4:30 - 5:10 p.m.: "Open Data from Below: Civil Society and Open Data" by Richard Abisla</li>
<li>5:10 - 5:50 p.m.: "Exploring the Domains of Identity and Emerging Open standards for Decentralized Identity" by Kaliya Young</li>
</ul>
<h2>The Talks</h2>
<h3>"Open Data from Below: Civil Society and Open Data" by Richard Abisla</h3>
<p style="text-align: justify; ">Often NGOs and Civil Society Organizations' roles in the Open Data movement are considered to be solely last mile training with citizens. This talk will give examples from the TechSoup Global Network of how NGOs act to prioritize, organize, and create open data sets that can exist alongside official data sources, or become official government data. The talk will explore barriers to opening up data, both from within government and civil society, and possible solutions. For more info <a class="external-link" href="https://meet.techsoup.org/about-us/techsoup-global-network">click here</a>.</p>
<h3 style="text-align: justify; ">"Exploring the Domains of Identity and Emerging Open standards for Decentralized Identity" by Kaliya Young</h3>
<p style="text-align: justify; ">In this seminar she will share two significant pieces of her work firstly the Domains of Identity that provides a clear picture of all the different domains individual's data ends up in databases. This can serve as the basis of a dialogue about the proper relationship between different domains. Secondly she has been at the heart of a community developing new Decentralized Identity Technology standards and will share more about them and how they can enable a many-to-many exchange of verifiable credentials between individuals and the institutions they interact with.</p>
<h2 style="text-align: justify; ">The Speakers</h2>
<h3>Richard Abisla</h3>
<p style="text-align: justify; ">Richard Abisla is a 2019 India-U.S. Fellow at New America. Abisla is currently the Portfolio Manager for the Americas at Caravan Studios, a division of TechSoup. Abisla has a long history of working alongside local communities to help them access digital information and education and integrate technology into both their work and lives. He has created and directed technology education and adoption programs in Honduras, Jamaica, Chicago, and San Francisco, all the while focusing on increasing access to digital resources for those who need them most. Most recently, Abisla has focused on working with librarians and library users in Brazil to create applications and processes that help solve local problems through open data resources, as well as training librarians to integrate human-centered design principles into their work in order to plan more impactful programming.</p>
<h3 style="text-align: justify; ">Kaliya Young</h3>
<p style="text-align: justify; ">Kaliya Young is a 2019 India-U.S. Fellow at New America. Young is one of the world’s leading experts on decentralized or self-sovereign identity technology. She is the author of A Comprehensive Guide to Self-Sovereign Identity and currently holds the position of adjunct professor at Merritt College where she is developing a curriculum about identity. For the last 15 years, she has worked within the industry to catalyze the formation of a new layer of the internet designed to serve individuals. She began sketching out distributed social networks in 2003 and co-founded the Internet Identity Workshop in 2005 with Doc Searls and Phil Windley. More details can be <a class="external-link" href="https://www.newamerica.org/our-people/kaliya-young/">found here</a>. She is also known as <a class="external-link" href="https://www.identitywoman.net/">Identity Woman</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/talks-by-richard-abisla-and-kaliya-young'>http://editors.cis-india.org/openness/events/talks-by-richard-abisla-and-kaliya-young</a>
</p>
No publisherAdminOpen DataEventOpenness2019-03-07T23:59:25ZEventTalk on Game Studies by Dr. Souvik Mukherjee, July 28, 6 pm
http://editors.cis-india.org/raw/talk-on-game-studies-souvik-mukherjee-july-28-6-pm
<b>This talk will explore the story-telling aspects of game studies and how it relates to discussions of other digital media, Internet cultures and also traditional Humanities. As an introduction, it also aims to open up discussions for Game Studies in India.</b>
<p> </p>
<img src="http://cis-india.org/home-images/call-of-duty-no-russian" alt="Call of Duty: Modern Warfare 2 - No Russian" />
<p> </p>
<h2>Abstract</h2>
<p><em>You are a CIA agent who has infiltrated the Russian mafia and the mafia bosses want you to shoot down innocent civilians in a crowded Moscow airport. What do you do - kill the civilians or blow your cover?</em></p>
<p>The above scenario is taken from the controversial ‘No Russian’ chapter in the videogame Call of Duty: Modern Warfare 2. Graphically realistic and often provoking us to explore deeper questions, videogames have changed from simplistic beat-em-ups to more thought-provoking media through which stories can be shaped and retold. Videogames are, therefore, storytelling media although traditional Humanities and Information Technology both struggle with this notion. This talk will explore how videogames tell stories and why traditional academia finds them problematic. It will also address how understanding this ‘new; storytelling could result in the creation of eminently more innovative and arguably, more marketable gaming software.</p>
<p>Coming back to the Call of Duty scenario, one notices a significant difference from most stories that we get in books or movies. The reader / player has a choice and this is a nontrivial choice that influences the furtherance of the story. The story therefore has multiple endings and is, in effect, constructed jointly by the affordances and mechanics created by the game designer and by the choices and the playing skill of the player. Further, the player can save and replay a game sequence over and over - each time the game plays out differently and the story changes, at least slightly. Moreover, the involvement of the player with the game environment can be very intense and create the feeling of being within the story-world. Finally, there is the issue of accepting that games, usually likened to the playful and the non-serious, can be instrumental in creating a thought-provoking narrative experience. Likewise, the idea of a computer program spinning out a story is equally unexpected and looked upon with suspicion.</p>
<p>For all the problems posed by game-narratives, the consideration that videogames tell stories and that some videogames tell very thought-provoking tales is an unavoidable one. Recent trends in Humanities criticism and in Computing recognise the synergy between the disciplines. Gaming is no longer all about creating Shooters such as Doom; videogames have changed in concept, have entered social networking platforms and are increasingly beginning to comment on real-world issues. In terms of software development, the storytelling game has made it imperative to study the player’s responses; how players interact with the game-world and how they innovate strategies are of key importance to designing successful gameplay sequences. As far as the Humanities are concerned, the game-narrative can provoke thought into philosophical problems such as the morality of killing civilians in the Call of Duty sequence; further the videogame-story also helps explore storytelling in a multiple and shared textual form and to think about inherent linkages between games, stories and machines.</p>
<p>The aim of this talk is to raise questions regarding the storytelling aspect of videogames rather than coming up with any set conclusions. Ultimately, such a discussion aims to lead to the development of some new pointers for rethinking the videogame industry, especially in terms of the global marketplace and in terms of how the story-experience in videogames is a key factor in shaping player interest. This talk is an introduction to the now slightly over a decade old field of Game Studies and how it relates to discussions of other digital media, Internet cultures and also traditional Humanities. As an introduction, it also aims to open discussions for Game Studies in India.</p>
<h2>Speaker</h2>
<p><strong>Souvik Mukherjee</strong> is currently employed as Assistant Professor of English Literature at Presidency University (earlier Presidency College), Calcutta. Souvik has been researching videogames as an emerging storytelling medium since 2002 and has completed his PhD on the subject from Nottingham Trent University in 2009. Souvik has done his postdoctoral research in the Humanities faculty of De Montfort University, UK and as a research associate at the Indian Institute of Technology in New Delhi, India where he worked on digital media as well as narrative analysis.</p>
<p>Souvik's monograph <a href="http://www.palgrave.com/us/book/9781137525048"><em>Videogames and Storytelling: Reading Games and Playing Books</em></a> was published by Palgrave Macmillan in 2015. His research examines their relationship to canonical ideas of narrative and also how videogames inform and challenge current conceptions of technicity, identity and culture, in general. His current interests involve the analysis of paratexts of videogames such as walkthroughs and after-action reports as well as the concept of time and telos in videogames. Besides Game Studies, his other interests are (the) Digital Humanities and Early Modern Literature. He also blogs about videogames research on <a href="http://readinggamesandplayingbooks.blogspot.in/">Ludus ex Machina</a>.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/talk-on-game-studies-souvik-mukherjee-july-28-6-pm'>http://editors.cis-india.org/raw/talk-on-game-studies-souvik-mukherjee-july-28-6-pm</a>
</p>
No publishersneha-ppGamingWeb CulturesDigital KnowledgeGame StudiesDigital MediaResearchers at WorkEvent2016-09-16T13:21:58ZEventSymposium on India’s Cyber Strategy
http://editors.cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy
<b>CIS organised a Symposium on India’s Cyber Strategy.</b>
<p style="text-align: justify; ">The event saw a total of around 30 participants from industry, academia, law/policy, media, and civil society, and had a panel comprised of Asoke Mukerji, Madhulika Srikumar, and Parminder Jeet Singh.</p>
<h3 style="text-align: justify; ">Presentations</h3>
<ul>
<li style="text-align: justify; "><a class="external-link" href="http://cis-india.org/internet-governance/files/cis-presentation-on-cyber-security">India’s Strategic Interests in the Norms Setting Process in Cyberspace</a> (Presentation by Ambassador Asoke Kumar Mukerji, Former Permanent Representative of India to the United Nations)</li>
<li><a class="external-link" href="http://cis-india.org/internet-governance/files/arindrajit-presentation">The Potential for the Normative Regulation of Cyberspace</a> (Presentation by Arindrajit Basu)</li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy'>http://editors.cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy</a>
</p>
No publisherAdminCyber SecurityEventInternet Governance2018-10-02T06:02:59ZEventSurveillance and Privacy Law Roundtable
http://editors.cis-india.org/events/surveillance-privacy-roundtable
<b>The Centre for Internet and Society, COAI and Vahura invite you to a privacy roundtable at the India International Centre in New Delhi on September 1, 2014.</b>
<hr />
<p><a href="http://editors.cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf" class="internal-link">Download the Invite </a>(PDF, 1207 Kb)</p>
<hr />
<p style="text-align: justify; "><b>Recent legislative developments regarding privacy law in India</b><br />In 2010, the European Union commissioned an assessment of the adequacy of Indian data protection laws in light of the transfer of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian privacy law to safeguard personal data. Consequently, in 2011, the Department of Personnel and Training (DoPT) proposed draft privacy legislation called the ‘Right to Privacy Bill, 2011’. The DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. Simultaneously, the Ministry of Communications and Information Technology issued the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 to give effect to section 43A of the Information Technology Act, 2000.</p>
<p style="text-align: justify; "><b>The Justice Shah Group of Experts on Privacy and the National Privacy Principles</b><br />Aware of the need for privacy laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah to make specific proposals for future Indian privacy law. The Group of Experts submitted its Report to the Planning Commission in October 2012 wherein it proposed the adoption of nine National Privacy Principles. These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in future privacy law.</p>
<p style="text-align: justify; "><b>Surveillance law in India</b><br />The cases of <i>Kharak Singh</i> v. <i>State of Uttar Pradesh</i> (1963) and <i>Gobind</i> v. <i>State of Madhya Pradesh</i> (1975) first brought the questions of permissibility and limits of surveillance to the Supreme Court for judicial review. The regime governing the interception of telecommunications is contained in section 5(2) of the Indian Telegraph Act, 1885 read with rule 419A of the Indian Telegraph Rules, 1951. The Telegraph Rules were twice amended to give effect to certain procedural safeguards laid down by the Supreme Court in <i>PUCL</i> v. <i>Union of India</i> (1996). In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the Information Technology Act permit the interception and monitoring of electronic communications to collect traffic data and to intercept, monitor, and decrypt such communications.</p>
<p style="text-align: justify; "><b>About these roundtable consultations</b><br />These roundtable consultations are hosted by the Centre for Internet & Society (CIS), COAI and Vahura. They are a series of national roundtables to focus on surveillance regulation and interception of communications in relation to telecom service providers, internet service providers, internet access providers, and internet-based service providers. These roundtables are designed to elicit comments on legal proposals to regulate surveillance. The text of these legal proposals has been drafted at CIS and continues to be modified to reflect the opinions and consensus at each roundtable consultation. The objective of these meetings is gain a stakeholder-based, participatory, and democratic consensus on the future of Indian surveillance and privacy law.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/events/surveillance-privacy-roundtable'>http://editors.cis-india.org/events/surveillance-privacy-roundtable</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2014-08-25T15:08:33ZEventStand up for Digital Rights
http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights
<b>The Centre for Internet & Society (CIS) invites you to a discussion on a set of recommendations for Ethical Tech, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The event will be held at CIS office in Bangalore on June 15, 2016 from 5 p.m. to 7 p.m.</b>
<p style="text-align: justify; ">The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of recommendations for Ethical Tech. This work is the culmination of a year long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:</p>
<div id="_mcePaste">
<ul>
<li><span>General Human Rights Responsibilities and Private Online Intermediaries</span></li>
<li><span>Expanding Access</span></li>
<li><span>Net Neutrality</span></li>
<li><span>Content Moderation</span></li>
<li><span>Privacy</span></li>
<li><span>Transparency and Informed Consent</span></li>
<li><span>Responding to State Interferences</span></li>
</ul>
</div>
<p>We look forward to meeting you and making this forum for knowledge exchange a success.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights'>http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights</a>
</p>
No publisherelonnaiEventInternet GovernanceDigital Rights2016-06-13T15:30:12ZEventStand up for Digital Rights
http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights-1
<b>The Centre for Internet & Society (CIS) invites you to a discussion on a set of Recommendations for Ethical Research, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The discussion is on coming Friday, July 29, 2016 at the Centre for Internet & Society's Delhi office from 3.00 p.m. to 5.00 p.m.</b>
<p style="text-align: justify; ">The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of Recommendations for Ethical Tech. This work is the culmination of a year-long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:</p>
<ul>
<li>General Human Rights Responsibilities and Private Online Intermediaries</li>
<li>Expanding Access</li>
<li>Net Neutrality</li>
<li>Content Moderation</li>
<li>Privacy</li>
<li>Transparency and Informed Consent</li>
<li>Responding to State Interferences</li>
</ul>
<p>We look forward to meeting you and making this a forum for knowledge exchange a success.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights-1'>http://editors.cis-india.org/internet-governance/events/stand-up-for-digital-rights-1</a>
</p>
No publisherpraskrishnaEventInternet Governance2016-07-25T15:29:41ZEventSOTM Asia 2018
http://editors.cis-india.org/internet-governance/events/sotm-asia-2018
<b>Saumyaa Naidu, Aayush Rathi and Ambika Tandon attend State of the Map 2018 conference co-organized by the Centre for Internet & Society and Indian Institute of Management in Bangalore on November 17 and 18, 2018.</b>
<p style="text-align: justify; ">State of the Map Asia 2018 featured two full days of talks, workshops, an opening and closing keynote. It was an exciting two days! The program was created by curating proposals from the community and through a scoring process by the committee.</p>
<p style="text-align: justify; ">The program was held at the Indian Institude of Management campus in Bangalore. Much of the program was between two auditoriums. We also had plenty of space set aside for breakout sessions and birds of a feather meetups. (Click <a href="https://stateofthemap.asia/program/program.pdf"><span style="text-decoration: underline;">here</span></a> to download the program.)</p>
<p style="text-align: justify; "><a class="external-link" href="https://stateofthemap.asia/program/">Click here to see the agenda</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/sotm-asia-2018'>http://editors.cis-india.org/internet-governance/events/sotm-asia-2018</a>
</p>
No publisherAdminEventInternet Governance2018-11-28T01:22:44ZEventSoftware Freedom Pledge
http://editors.cis-india.org/openness/software-freedom-pledge-2015
<b>On September 19, 2015, celebrated globally as Software Freedom Day, a number of enthusiasts got together and collectively took a pledge.</b>
<br />
<p>We, who have gathered together for <a href="http://softwarefreedomday.org/">Software Freedom Day 2015</a>, believe that software freedom is both a matter of ethical principle as well as a matter of pragmatism, and is necessary for a democratic, open society.</p>
<p>We believe that it is desirable that all people, but especially governments, use, contribute to, and spread open standards, free/libre/open source software, open APIs, openly-licensed content (including open data, open access, and open education resources), leading to a vibrant public domain, and ensure that all of the above are accessible for all, including persons with disabilities and other marginalised sections of society.</p>
<p>Given that, we pledge to:</p>
<ul>
<li>use and spread free software amongst our family, friends, and neighbours, both in person and virtually.</li>
<li>demand that services we use in turn use open standards and open APIs, and thus be available for all using free/libre/open source software, without the payment of any royalties.</li>
<li>raise the issue of software freedom with our democratic representatives, to seek that they in turn respect and promote these principles.</li>
<li>as far as possible, making our own work openly available, and seek to convince our employers, publishers, producers, and other persons who might be in a position to restrict </li>
<li>work against any laws, policies — corporate or governmental — or technical restrictions that seek to prevent people from full exercise of their rights, and which are contrary to the above principles.</li>
</ul>
<br />
<br />
<p>Signed by:</p>
<p>Abhaya Agarwal <br />
Ananth Subray <br />
Asutosha Sarangi <br />
Chirag Sarthi J <br />
Prakash Hebballi <br />
Pranesh Prakash <br />
Ralph Andrade <br />
Subhashish Panigrahi <br />
Tito Dutta <br />
Veethika Mishra</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/software-freedom-pledge-2015'>http://editors.cis-india.org/openness/software-freedom-pledge-2015</a>
</p>
No publisherpraneshOpen StandardsOpen SourceAccess to KnowledgeFLOSSOpen ContentFOSSEventTechnological Protection Measures2015-09-25T12:26:09ZBlog EntrySeminar on Open Access in Research Area: A Strategic Approach
http://editors.cis-india.org/openness/teri-seminar-on-open-access-in-research
<b>The Energy and Resources Institute (TERI), Delhi, is organising a seminar on open access in research on Tuesday, December 22, 2015. The seminar will focus on: 1) wider access to scientific publications and research data, 2) access to scientific information, and 3) challenges and opportunities of research data. The Centre for Internet and Society is supporting the event as a Knowledge Partner.</b>
<p> </p>
<h2>Background</h2>
<p>Open Access has become central importance to advancing the interests of researchers, scholars, students, business, and the public as well as librarians. Increasingly, research institutions require researchers to publish articles that report research findings openly accessible in open domain.</p>
<p>Open Access pursues to yield scholarly publishing to spread knowledge and allow that knowledge to be built upon. Price barriers should not stop researchers from getting access to research data. Open Access, and the open availability and search ability of scholarly research that it entails, will have a significant positive impact on everything from education to the research practice in various fields.</p>
<p>To explore why Open Access is so important to a number of groups, TERI Library along with The Centre for Internet & Society (CIS) as Knowledge Partner is organizing a half day seminar on <em>Open Access in Research Areas: a Strategic Approach</em> on December 22, 2015 at TERI Seminar Hall, IHC, Lodhi Road, New Delhi.</p>
<p>The Seminar will focus on:</p>
<ul>
<li>
<p>wider access to scientific publications and research data</p>
</li>
<li>
<p>access to scientific information, and</p>
</li>
<li>
<p>challenges and opportunities of research data.</p>
</li></ul>
<p> </p>
<h2>Schedule</h2>
<p>No registration is required to attend the seminar. Seats are limited, and will be provided on first-come-first-served basis.</p>
<p> </p>
<table>
<tbody>
<tr>
<td>13:45 - 14:00</td>
<td><br /></td>
<td><strong>Registration and Networking</strong></td>
</tr>
<tr>
<td>14:00 - 14:10</td>
<td><br /></td>
<td>Welcome Address - <strong>Mr. Prabir Sengupta</strong>, Distinguished Fellow and Director, Knowledge Management Division, TERI</td>
</tr>
<tr>
<td>14:10 - 14:20</td>
<td><br /></td>
<td>Special Address - <strong>Sumandro Chattapadhyay</strong>, Research Director, The Centre for Internet and Society</td>
</tr>
<tr>
<td>14:20 - 14:35</td>
<td><br /></td>
<td>Keynote Address - <strong>Dr. K.R. Murali Mohan</strong>, Advisor, Big Data Initiatives Division, Department of Science and Technology</td>
</tr>
<tr>
<td>14:35 - 14:50</td>
<td><br /></td>
<td>Inaugural Address - <strong>Dr. Chandrima Shaha</strong>, Director, National Institute of Immunology, New Delhi</td>
</tr>
<tr>
<td>14:50 - 15:00</td>
<td><br /></td>
<td>Setting the Theme and Vote of Thanks - <strong>Dr. P.K. Bhattacharya</strong>, Fellow and Area Convenor, Knowledge Management Division, TERI</td>
</tr>
<tr>
<td>15:00 - 15:30</td>
<td><br /></td>
<td><strong>Tea and Refreshments</strong></td>
</tr>
<tr>
<td>15:30 - 17:15</td>
<td><br /></td>
<td><strong>Plenary Session</strong><br />
Chair: <strong>Dr. Ramesh Sharma</strong>, Director, CEMCA<br />
<ul>
<li><strong>Puneet Kishor</strong>, Researcher and Independent Consultant - "Science, Data, and Creative Commons"</li>
<li><strong>Dr. Beth Sandore Namachchivaya</strong>, Associate Dean of Libraries and Professor University of Illinois - "Developing Services, Infrastructure, and Best Practices to Conserve and Provide Access to Research Data: Challenges and Opportunities"</li>
<li><strong>Dr. Usha Mujoo Munshi</strong>, Librarian, Indian institute of Public Administration</li></ul>
</td>
</tr>
</tbody>
</table>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/teri-seminar-on-open-access-in-research'>http://editors.cis-india.org/openness/teri-seminar-on-open-access-in-research</a>
</p>
No publishersumandroOpen DataFeaturedOpen ResearchOpen AccessOpennessEvent2015-12-22T05:37:44ZEventSecurity, Governments, and Data: Technology and Policy
http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy
<b>The Centre for Internet & Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. </b>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; ">About the Conference</h3>
<p style="text-align: justify; ">The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.</p>
<h3 align="left" class="western"><strong>Conference </strong><strong>Context</strong></h3>
<p align="justify"><span>Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with. Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws & policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.</span></p>
<h3 align="left" class="western">Panel Descriptions</h3>
<p align="left"> </p>
<p align="left"><strong>Challenges & Present Scenario</strong></p>
<p align="left"><strong> </strong><span>Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities. The Government of India has taken numerous steps to address and resolve such challenges. In July 2013, the National Cyber Security Policy was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52</span><sup>nd</sup><span> Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre. CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.</span></p>
<p align="justify"><strong>Law & Policy</strong></p>
<p align="justify"><span>India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things, mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.</span></p>
<p align="justify"><strong>Architecture & Technology</strong></p>
<p align="justify"><span>India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.</span></p>
<p align="justify"><strong>International and Domestic Markets</strong></p>
<p align="justify"><strong> </strong><span>Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015. Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised. Towards this end, the Government of India has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment. Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the </span><span>Wassenaar agreement, they have yet to be accepted.</span></p>
<h3 style="text-align: justify; ">Agenda</h3>
<table class="plain">
<tbody>
<tr>
<td>11.00</td>
<td>Registration & Tea</td>
</tr>
<tr>
<td>11.30</td>
<td>Key Note Speech</td>
</tr>
<tr>
<td>12.00</td>
<td>Challenges & Present Scenario</td>
</tr>
<tr>
<td>13.00</td>
<td>Law & Policy</td>
</tr>
<tr>
<td>14.00</td>
<td>Lunch</td>
</tr>
<tr>
<td>15.00</td>
<td>Architecture & Technology</td>
</tr>
<tr>
<td>16.00</td>
<td>International & Domestic Markets</td>
</tr>
<tr>
<td>17.00</td>
<td>Tea</td>
</tr>
<tr>
<td>17.30</td>
<td>Conclusion & Closing Remarks</td>
</tr>
</tbody>
</table>
<h3></h3>
<ol> </ol>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy'>http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy</a>
</p>
No publisherelonnaiEventInternet Governance2014-12-24T08:06:59ZEventSecurity and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights
http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights
<b>The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.</b>
<p> </p>
<p>The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.</p>
<p><span>Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.</span></p>
<p><span>Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.</span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'>http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</a>
</p>
No publisherpraskrishnaSurveillanceEventInternet GovernancePrivacy2014-12-19T08:46:34ZEventSecond Maps for Making Change Workshop: Using Geographical Mapping Techniques to Support Struggles for Social Justice in India
http://editors.cis-india.org/events/second-maps-for-making-change-workshop-using-geographical-mapping-techniques-to-support-struggles-for-social-justice-in-india
<b>The second workshop of the Maps for Making Change project will take place at the National Institute of Design in Ahmedabad, from 1 until 3 February 2010. The workshop will allow a select group of activists and supporters of social movements and campaigns in India to start developing digital maps that they can use in their advocacy work, under the expert guidance of international digital mapping rights activists, Indian mapping experts, design professionals and techies with an interest in activism. The workshop is organised by the Centre for Internet and Society and Tactical Tech, in cooperation with MediaShala at NID. </b>
<p>
<strong>The
aims of the workshop are to: </strong></p>
<p align="LEFT"> </p>
<ul><li>
<p align="LEFT">explore
in depth tools and techniques for mapping</p>
</li><li>
<p align="LEFT">assist
participants in starting to develop their own maps in the context of
the projects that they have suggested</p>
</li><li>
<p align="LEFT">help
participants identify important design concerns and elements of
their project that require attention at an early stage if they are
to communicate effectively</p>
</li></ul>
<p align="LEFT"> </p>
<p align="LEFT"><strong>By
the end of the workshop, the participants will be able to:</strong></p>
<ul><li>
<p align="LEFT">identify
which mapping tools best suit their project</p>
</li><li>
<p align="LEFT">identify
additional data required to complete their mapping project</p>
</li><li>
<p align="LEFT">make
informed choices about issues relating to privacy, licensing, etc</p>
</li><li>independently continue to develop their own maps using the tools they have explored during the workshop<br /></li><li>
<p align="LEFT">
apply
core concerns of information design to their mapping project to
maximise its effectiveness and impact</p>
</li></ul>
<p> </p>
<p><strong>The provisional programme of the workshop is as follows:</strong></p>
<p><strong>Monday 1
February </strong></p>
<table>
<tbody>
<tr>
<td>
<p align="LEFT"><strong>Time</strong></p>
</td>
<td>
<p align="LEFT"><strong>Session</strong></p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT">8.00–10.00</p>
</td>
<td>
<p align="LEFT">Breakfast
and registration at NID</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">10.00–10.45</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Welcome
and introductions (icebreaker) - Anja Kovacs & Kate Morioka</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">10.45–11.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Opening
plenary - Lars Bromley:</p>
<p align="LEFT">“Mapping
the truth: how geo-technologies are uncovering human rights
violations and injustice”</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">11.30
– 1.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Morning
Session - MediaShala team:</p>
<p align="LEFT">“Information
Design: the art of making campaigning messages visually
compelling”</p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">1.00
– 2.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Lunch</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT">2.15
– 3.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Project
Time - All:</p>
<p align="LEFT">revising
project scope based on morning sessions (audience, purpose,
objectives)</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT">3.15
– 4.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Afternoon
'Lab' Sessions (choose ONE)</p>
<p align="LEFT">Elective
1. Using Google Maps for Social Activism - Henry Addo</p>
<p align="LEFT">Elective
2. Mapping with Open Layers- Alagesa Pandian</p>
<p align="LEFT"> </p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT">4.30
– 5.00</p>
</td>
<td>
<p align="LEFT">Break</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT">5.00
– 6.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Elective
1. Advanced GIS- Lars Bromley</p>
<p align="LEFT"> Elective
2. GPS Basics - Hardeep Singh Rai, with Arky and Sajjad</p>
<p align="LEFT"> </p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT">6.15-6.30</p>
</td>
<td>
<p align="LEFT">Evening
Circle - Anja Kovacs</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">6.30
– 7.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Free
Time / Knowledge Sharing @ Speakers' Green</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">7.30
– 9.00</p>
<p align="LEFT">(open
invite)</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Film screening: “10 Tactics: Turning Information into
Action” - Kate Morioka.</p>
<p align="LEFT">This film produced by Tactical Tech explores how rights advocates around the world have used information and digital technologies to create change. </p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.00
– 10.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Dinner </p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
</tbody>
</table>
<p> </p>
<p><strong>Tuesday 2
February</strong></p>
<table>
<tbody>
<tr>
<td>
<p align="LEFT"><strong>Time</strong></p>
</td>
<td>
<p align="LEFT"><strong>Session</strong></p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT">7.30
– 9.00</p>
</td>
<td>
<p align="LEFT">Breakfast
(Hotel)</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.00-9.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Morning
Circle - Anja Kovacs</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.30
– 11.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Guest
Speakers</p>
<p align="LEFT">“The
experiences of Ushahidi” - Henry Addo</p>
<p align="LEFT">“An
Introduction to Open Street Maps for Activism” - Mikel Maron (online)</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">11.30
– 1.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Participatory
mapping process and techniques - Kate Morioka</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">1.00
– 2.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Lunch</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td><br /></td>
<td><br /></td>
<td><br /></td>
</tr>
<tr>
<td>
<p align="LEFT">2.15
– 4.00</p>
</td>
<td>
<p align="LEFT">Project
Time - All:</p>
<p align="LEFT">identifying methodology and technical implementation of
participants' mapping projects</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">4.00
– 5.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Break/
Knowledge Sharing @ Speakers' Green</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">5.00-6.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Elective
1. Google Earth for Advocacy - Henry Addo</p>
<p align="LEFT">Elective
2. An Introduction to Open Street Maps - Hardeep Singh Rai</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">6.15-6.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Evening
Circle - Anja Kovacs</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">6.30
– 7.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Free
time</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">7.30
– 9.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Exploring
the Ahmedabad Markets</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.00
– 10.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Dinner
at Vishala</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
</tbody>
</table>
<p><strong><br /></strong></p>
<p><strong>Wednesday 3
February</strong></p>
<table>
<tbody>
<tr>
<td>
<p align="LEFT"><strong>Time</strong></p>
</td>
<td>
<p align="LEFT"><strong>Session</strong></p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT">7.30
– 9.00</p>
</td>
<td>
<p align="LEFT">Breakfast
(Hotel)</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.00-9.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Morning
Circle - Anja Kovacs</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">9.30
– 11.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Panel
Discussion</p>
<p align="LEFT">“To
Map or Not to Map: Issues of privacy, licensing and other
rights-related concerns”</p>
<p align="LEFT">Followed
by a group discussion</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">11.15
– 11.45</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Break</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">11.45
– 1.00</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Introduction
to GIS and remote sensing for human rights advocacy - Lars Bromley</p>
</td>
<td>
<br /></td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">1.00
– 2.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Lunch</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">2.15
– 3.45</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Project
Time - All</p>
<p align="LEFT">time to work on individual projects and obtain feedback from
fellow participants and facilitators</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">3.45-4.15</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Break</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">4.15
– 4.45</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Closing
Plenary - Pratyush Shankar</p>
<p align="LEFT">“Reflection”</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
<tr>
<td>
<p align="LEFT"> </p>
<p align="LEFT">4.45
– 5.30</p>
</td>
<td>
<p align="LEFT"> </p>
<p align="LEFT">Evaluation - Madhuresh Kumar</p>
<p align="LEFT">Briefing
on the next workshop - Anja Kovacs</p>
<p align="LEFT">Close - Anja Kovacs and Kate Morioka</p>
</td>
<td>
<p align="LEFT"> </p>
</td>
</tr>
</tbody>
</table>
<p align="LEFT"> </p>
<p align="LEFT">Assistant
Facilitators: Arky Ambati and Sajjad Anwar</p>
<p align="LEFT">Technical
Assistance: Kiran (Jace) Jonnalagadda</p>
<p align="LEFT"> </p>
<p align="LEFT"><strong>VIDEO</strong></p>
<p align="LEFT"> </p>
<p align="LEFT"> </p>
<iframe src="http://blip.tv/play/AYLW3hkA.html" frameborder="0" height="250" width="250"></iframe><embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYLW3hkA" style="display:none"></embed>
<p>
For more details visit <a href='http://editors.cis-india.org/events/second-maps-for-making-change-workshop-using-geographical-mapping-techniques-to-support-struggles-for-social-justice-in-india'>http://editors.cis-india.org/events/second-maps-for-making-change-workshop-using-geographical-mapping-techniques-to-support-struggles-for-social-justice-in-india</a>
</p>
No publisheranjaRAW EventsPracticeWorkshopResearchers at WorkEventMaps for Making Change2015-10-05T15:09:51ZEvent