Internet Governance Blog
Response to GCSC on Request for Consultation: Norm Package Singapore
— by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok — last modified Jan 27, 2019 03:43 PMThe GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.
The DNA Bill has a sequence of problems that need to be resolved
— by Shweta Mohandas and Elonnai Hickok — last modified Jan 15, 2019 02:36 AMIn its current form, it’s far from comprehensive and fails to adequately address privacy and security concerns.
How to make EVMs hack-proof, and elections more trustworthy
— by Pranesh Prakash — last modified Jan 14, 2019 03:34 PMFree and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?
Registering for Aadhaar in 2019
— by Sunil Abraham — last modified Jan 03, 2019 02:59 PMIt is a lot less scary registering for Aadhaar in 2019 than it was in 2010, given how the authentication modalities have since evolved.
Economics of Cybersecurity: Literature Review Compendium
— by Natallia Khaniejo — last modified May 01, 2021 06:09 AMThe twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.

Is the new ‘interception’ order old wine in a new bottle?
— by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare — last modified Dec 29, 2018 04:02 PMThe government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.

Private-public partnership for cyber security
— by Arindrajit Basu — last modified Dec 26, 2018 03:02 PMGiven the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security.
Mapping cybersecurity in India: An infographic
— by Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah — last modified Dec 23, 2018 04:57 PMThis infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue through our cybersecurity work at CIS.
European E-Evidence Proposal and Indian Law
— by Vipul Kharbanda — last modified Dec 23, 2018 04:45 PMIn April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.
Feminist Methodology in Technology Research: A Literature Review
— by Ambika Tandon — last modified Dec 25, 2018 03:18 PMThis literature review has been authored by Ambika Tandon, with contributions from Mukta Joshi. Research assistance was provided by Kumarjeet Ray and Navya Sharma. The publication has been designed by Saumyaa Naidu.
Document Actions