All Blogs
Setting International Norms of Cyber Conflict is Hard, But that Doesn't Mean that We Should Stop Trying
Last month, cyber-defense analyst and geostrategist Pukhraj Singh penned a stinging epitaph, published by MWI, for global norms-formulation processes that are attempting to foster cyber stability and regulate cyber conflict—specifically, the Tallinn Manual.
Comparison of the Manila Principles to Draft of The Information Technology [Intermediary Guidelines(Amendment) Rules], 2018
This paper looks at the Manila Principles intermediary liability framework in comparison to the amended draft Information Technology [Intermediaries Guidelines (Amendment)] Rules, 2018 introduced by the Ministry of Electronics and Information Technology (MeitY) in December, 2018.
Examining the Constitutionality of the Ban on Broadcast of News by Private FM and Community Radio Stations
Gurshabad Grover and Torsha Sarkar along with Rajashri Seal and Neil Trivedi co-authored a paper that examined the constitutionality of the government prohibition on the broadcast of news against private and community FM channels.
Capturing Gender and Class Inequities: The CCTVisation of Delhi
Ambika Tandon and Aayush Rathi generated empirical evidence about the CCTV programme well underway in Delhi. The case study was published by Centre for Development Informatics, Global Development Institute, SEED, in the Development Informatics working paper series housed at the University of Manchester.
Kashmir’s digital blackout marks a period darker than the dark side of the moon
While we mourn the loss of connection with the moon, remembering a digital blackout closer home.
Traffic Rules, Mindset and On-Time Payments
There's no alternative to following the rules and working together with discipline for our common interests.
Core Concepts and Processes
When we embarked on this research project, we began with the primary questions of what constitutes a digital identity system. In the last few years, with the rise in national digital identity projects, there has been significant academic and media attention to the idea, benefits and risks of a digital identity system.
Submission to Global Commission on Stability of Cyberspace on the definition of Cyber Stability
"The Global Commission on the Stability of Cyberspace released a public consultation process that sought to solicit comments and obtain feedback on the definition of “Stability of Cyberspace”, as developed by the Global Commission on the Stability of Cyberspace (GCSC).
Essays on #List — Selected Abstracts
In response to a recent call for essays that social, economic, cultural, political, infrastructural, or aesthetic dimensions of the #List, we received 11 abstracts. Out of these, we have selected 4 pieces to be published as part of a series titled #List on the r@w blog. Please find below the details of the selected abstracts. The call for essays on #List remains open, and we are accepting and assessing the incoming abstracts on a rolling basis.
Doing Standpoint Theory
Feminist research methodology has evolved from different epistemologies, with several different schools of thought. Some of the more popular ones are feminist standpoint theory, feminist empiricism, and feminist relativism.
Future of Work in the ASEAN
A literature review of the future of work in automotive manufacturing and IT services in the ASEAN region, authored by Aayush Rathi, Vedika Pareek, Divij Joshi, and Pranav M B.
Kashmir’s information vacuum
Legislative backing is being appropriated to normalise communication shutdowns.
Analysis on the strategies of Mozilla and Wiki communities on gender gap aspects
There is a need for research on how Open Source communities are trying to balance the gender ratio and how they provide the safe space environment to its contributors. With this in mind I have come up with this blog as I am an active contributor of Mozilla since 5 years and also got myself recently introduced to Wikimedia and its sister projects, have interacted with few Indian women contributors in both of these communities and came out with a few observations on how I see them in India and what could be improved in both communities.
Linking Aadhaar with social media or ending encryption is counterproductive
Should Aadhaar be used as KYC for social media accounts? We have recently seen a debate on this question with even the courts hearing arguments in favour and against such a move.
A judicial overreach into matters of regulation
A PIL on Aadhaar sheds light on some problematic trends
Call for joining the Free Knowledge movement #Wikipedia #Wikimedia
Every little drop makes a Mighty ocean! Join us in this Free Knowledge movement where your contributions will be used world-wide.
Digital Native: How free is the internet?
It is contradictory and confusing as it amplifies as well as destabilises the order of things.
Rethinking the intermediary liability regime in India
The article consolidates some of our broad thematic concerns with the draft amendments to the intermediary liability rules, published by MeitY last December.
Design and Uses of Digital Identities - Research Plan
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Holding ID Issuers Accountable, What Works?
Together with the Institute of Technology & Society (ITS), Brazil, and the Centre for Intellectual Property and Information Technology Law (CIPIT), Kenya, CIS participated at a side event in RightsCon 2019 held in Tunisia, titled Holding ID Issuers Accountable, What Works?, organised by the Omidyar Network. The event was attended by researchers and advocates from nearly 20 countries. Read the event report here.
Document Actions