All Blogs
DIDP #32 On ICANN's Fellowship Program
In furtherance of its capacity building functions, ICANN selects Fellows for every public meeting. These are individuals from underserved and underrepresented communities who are trained to become active participants in the ICANN community.
Digital Native: One Selfie Does a Tragedy Make
The great find of this century – life’s worth just a selfie. Channeling the inner narcissus is now human hamartia.
Aditya 365
Telugu Wikimedian Aditya Pakide successfully completed 365 Wiki Commons Days. Aditya started contributing to project after a Facebook comment by A2K community advocate suggesting that the same picture would get more utilization in Commons and a brief training followed.
Clarification on the Information Security Practices of Aadhaar Report
We are issuing a second clarificatory statement on our report titled “Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar numbers with sensitive personal financial information” published on May 1, 2017.
Digital Native: Hashtag Fatigue
It is easy to hijack hashtags by coupling them with others. It is equally easy to make hashtags die.
Digital Native: Time to Walk the Talk
#MeToo has turned victims into survivors, but social media remains an unsafe space.
Lessons from US response to cyber attacks
Publicly attributing the attacks to a state or non-state actor is vital for building a credible cyber deterrence strategy.
History of Wikipedia Education programme at Christ (Deemed to be University)
This article gives the insight of Christ Wikipedia Education Program, how students are involved in different capacities in the program and shares the best practices of the Education Program.
Digital Technology Engaging Pedagogy through Hindi Wikipedia - A Case Study
We have published an article in International Journal of English Language, Literature in Humanities. The article is titled "Digital Technology Engaging Pedagogy through Hindi Wikipedia - A Case Study". The authors of the article are Hindi faculty members of Christ University and Ananth Subray from the Centre for Internet & Society provided research assistance.
Conceptualizing an International Security Regime for Cyberspace
This paper was published as part of the Briefings from the Research and Advisory Group (RAG) of the Global Commission on the Stability of Cyberspace (GCSC) for the Full Commission Meeting held at Bratislava in 2018.
Discrimination in the Age of Artificial Intelligence
The dawn of Artificial Intelligence (AI) has been celebrated by both government and industry across the globe. AI offers the potential to augment many existing bureaucratic processes and improve human capacity, if implemented in accordance with principles of the rule of law and international human rights norms. Unfortunately, AI-powered solutions have often been implemented in ways that have resulted in the automation, rather than mitigation, of existing societal inequalities.
South India Copyright Workshop
A workshop on Copyright was organized by CIS-A2K at Hotel Bhagini Icon in Bengaluru from 19th to 21st October 2018. Seventeen members from 5 language communities (Kannada, Tamil, Telugu, Malayalam and Tulu) participated in the workshop. Yann Forget was the master trainer for the workshop.
377 Bites the Dust: Unpacking the long and winding road to the judicial decriminalization of homosexuality in India
An informal case comment tracing the journey and assessing the societal implications the recent 377 (Navtej Johar v Union of India).
Why Data Localisation Might Lead To Unchecked Surveillance
In recent times, there has been a rash of policies and regulations that propose that the data that Indian entities handle be physically stored on servers in India, in some cases exclusively. In other cases, only a copy needs to be stored.
Comments to The Personal Data Protection Bill
CIS has conducted extensive research into the areas privacy, data protection, data security, and was also a member of the Committee of Experts constituted under Justice A P Shah. CIS has also been cited multiple times in the Report of the Committee of Experts led by Justice Srikrishna. CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS’ commitment to these values, the safeguarding of general public interest and the protection of individuals’ right to privacy and data protection. Accordingly, the comments in this submission aim to further these principles. We welcome the opportunity provided to our comments on the Bill and we hope that the final Bill will consider the interests of all the stakeholders to ensure a Bill that protects the privacy of the individual while encouraging a free and fair economy.
Call for Position - Programme Officer (Communication) - Access to Knowledge
We are inviting applications for the position of a Programme Officer (Communication) to join the Access to Knowledge (CIS-A2K) team at the Centre for Internet and Society. Please find below the description of the position, the eligibility criteria, and the application process.
Internet Researchers' Conference 2019 (IRC19): List - Call for Sessions
Who makes lists? How are lists made? Who can be on a list, and who is missing? What new subjectivities - indicative of different asymmetries of power/knowledge - do list-making, and being listed, engender? What makes lists legitimate information artifacts, and what makes their knowledge contentious? Much debate has emerged about specificities and implications of the list as an information artifact, especially in the case of #LoSHA and NRC - its role in creation and curation of information, in building solidarities and communities of practice, its dependencies on networked media infrastructures, its deployment by hegemonic entities and in turn for countering dominant discourses. For the fourth edition of the Internet Researchers’ Conference (IRC19), we invite sessions that engage critically with the form, imagination, and politics of the *list*.
Digital Native: Hardly Friends Like That
Individual effort is far from enough to fool Facebook’s grouping algorithm.
Cross-Border Data Sharing and India: A study in Processes, Content and Capacity
A majority of criminal investigations in the modern era necessitate law enforcement access to electronic evidence stored extra-territorially. The conventional methods of compelling the presentation of evidence available for investigative agencies often fail when the evidence is not present within the territorial boundaries of the state.
Document Actions