You are here: Home / All Blogs

All Blogs

by admin last modified Dec 07, 2012 06:49 AM

You Have the Right to Remain Silent

Reflecting upon the state of freedom of speech and expression in India, in the wake of the shut-down of the political satire website narendramodiplans.com.

Read More…

Parsing the Cyber Security Policy

Parsing the Cyber Security Policy

Posted by Chinmayi Arun at Jul 22, 2013 06:37 AM |

An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.

Read More…

CII Conference on "ACT": Achieve Cyber Security Together"

Posted by Kovey Coles at Jul 22, 2013 06:15 AM |

The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.

Read More…

The ASSOCHAM International Conference on the "Interface between Intellectual Property and Competition Law"

Posted by Nehaa Chaudhari at Jul 22, 2013 05:55 AM |

An international conference on interface between intellectual property and competition law was organized by ASSOCHAM on July 12, 2013 in New Delhi. In this post, Nehaa Chaudhari shares select notes from the conference.

Read More…

DSCI Best Practices Meet 2013

Posted by Kovey Coles at Jul 22, 2013 05:55 AM |

The DSCI Best Practices Meet 2013 was organized on July 12, 2013 at Hyatt Regency, Anna Salai in Chennai. Kovey Coles attended the meet and shares a summary of the happenings in this blog post.

Read More…

Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman

Interview with Mr. Reijo Aarnio - Finnish Data Protection Ombudsman

Posted by Maria Xynou at Jul 19, 2013 01:02 PM |

Maria Xynou recently interviewed Mr. Reijo Aarnio, the Finnish Data Protection Ombudsman, at the CIS' 5th Privacy Round Table. View this interview and gain an insight on recommendations for better data protection in India!

Read More…

Digital Humanities for Indian Higher Education

Digital Humanities for Indian Higher Education

Posted by Sara Morais and Subhashish Panigrahi at Jul 18, 2013 07:50 AM |

The digital age has had a huge impact on higher education in the last decade transforming the modalities of both teaching and research. To discuss these changes and what it means for research work, a multidisciplinary consultation was held at the Indian Institute of Science in Bangalore on July 13, 2013.

Read More…

CIS Cybersecurity Series (Part 7) - Jochem de Groot

Posted by Purba Sarkar at Jul 18, 2013 05:55 AM |

CIS interviews Jochem de Groot, former policy advisor to the Netherlands government, as part of the Cybersecurity Series

Read More…

Can India Trust Its Government on Privacy?

Can India Trust Its Government on Privacy?

In response to criticisms of the Centralized Monitoring System, India’s new surveillance program, the government could contend that merely having the capability to engage in mass surveillance won’t mean that it will. Officials will argue that they will still abide by the law and will ensure that each instance of interception will be authorized.

Read More…

How Surveillance Works in India

How Surveillance Works in India

Posted by Pranesh Prakash at Jul 15, 2013 10:20 AM |

When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention.

Read More…

CIS Cybersecurity Series (Part 6) - Lhadon Tethong

CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series

Read More…

Moving Towards a Surveillance State

Posted by Srinivas Atreya at Jul 15, 2013 05:57 AM |

The cyberspace is a modern construct of communication and today, a large part of human activity takes place in cyberspace. It has become the universal platform where business is executed, discourse is conducted and personal information is exchanged. However, the underbelly of the internet is also seen to host activities and persons who are motivated by nefarious intent.

Read More…

India:Privacy in Peril

India:Privacy in Peril

Posted by Bhairav Acharya at Jul 12, 2013 05:00 PM |

The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.

Read More…

Towards Critical Tool-building

Posted by Sara Morais at Jul 12, 2013 09:35 AM |

The last blogpost focused on the importance of design for digital humanities research and on the concept of universal design to make research work more inclusive as well as more accessible, the visual being something that digital humanities stress the importance of in their work. But research work has always been put into form, so aesthetics have played a role in traditional humanities work. What has changed and why is there a self-proclaimed shift towards design in the digital humanities?

Read More…

Telugu Wiki Academy at Centre for Good Governance

Telugu Wiki Academy at Centre for Good Governance

Posted by T. Vishnu Vardhan at Jul 12, 2013 05:45 AM |

An account of the Telugu Wiki Academy organized for the staff of Centre for Good Governance, Hyderabad on April 9, 2013 at their Jubilee Hills premises.

Read More…

CIS Cybersecurity Series (Part 5) - Amelia Andersdotter

CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series

Read More…

CIS Cybersecurity Series (Part 4) - Marietje Schaake

Posted by Purba Sarkar at Jul 11, 2013 07:10 AM |

CIS interviews Marietje Schaake, member of the European parliament, as part of the Cybersecurity Series

Read More…

CIS Cybersecurity Series (Part 3) - Eva Galperin

CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).

Read More…

The Difficult Balance of Transparent Surveillance

Posted by Kovey Coles at Jul 10, 2013 05:50 AM |

Is it too much to ask for transparency in data surveillance? On occasion, companies like Microsoft, Facebook, and the other silicon valley giants would say no. When customers join these services, each company provides their own privacy statement which assures customers of the safety and transparency that accompanies their personal data.

Read More…

Building Up vs Tearing Down

Posted by Shyam Ponappa at Jul 08, 2013 03:00 AM |
Filed under:

We have to find ways to deal with corruption without subverting our developmental aims.

Read More…

Document Actions

banner
ASPI-CIS Partnership

 

Donate to support our works.

 

In Flux: a technology and policy podcast by the Centre for Internet and Society