<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1391 to 1405.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/nama-the-future-of-indic-languages"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/article-sambad-odia-language.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/list-of-ip-institutes.xls"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/region-as-frame-politics-presence-practice"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/bombay-report.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;http://editors.cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works">
    <title>Indian Govt looks to provide free access to publicly-funded research works</title>
    <link>http://editors.cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works</link>
    <description>
        &lt;b&gt;Sunil Abraham gave his inputs to the blog entry published in Medianama on July 23, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Department of Biotechnology (DBT) and Department of Science and  Technology (DST), under the Ministry of Science and Technology recently &lt;a href="http://dbtindia.nic.in/docs/DST-DBT_Draft.pdf"&gt;released&lt;/a&gt; (pdf) the draft of what is termed as Open Access Policy and has invited comments from the public until July 25, reports &lt;a href="http://timesofindia.indiatimes.com/city/mumbai/India-to-create-free-access-to-scientific-work-online/articleshow/38818160.cms"&gt;The Times of India&lt;/a&gt;. Comments can be submitted to madhan@dbt.nic.in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of this policy is to provide unrestricted access to  research work funded by the departments. The draft states that since all  funds disbursed by DBT and DST are public funds, it is important that  the information and knowledge generated through the use of these funds  are made publicly available as soon as possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the draft, DBT/DST will be creating a central repository  wherein grantees can either publish their papers in an open-access  journal or post the final accepted manuscript to an online  repository. This includes papers funded by the two departments in  2012-13 as well as review articles invited by DBT/DST or author  initiated that received funding from these departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft suggests that the full text of the research paper and  metadata of all research projects fully or partially funded by DBT/DST  or the projects that utilised infrastructure built with the support of  DBT/DST will have to be made publicly available, failing which they  wouldn’t be considered for future grants or fellowship opportunities  among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department believes that providing free access to these  publications through gratis open access repository will enable  increasing the distribution of these publications and will ensure that  these research can be read and built upon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Copyright of research papers&lt;/b&gt;: The draft also sheds  light on copyright issues. It states that research work produced by a  scientist as an employee of a government body or private institution the  copyright would remain with the respective government body or private  institution. However, following the final acceptance of the paper by any  journal, it has to be deposited in an open access repository within a  period of one week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The author of the research paper will retain the right to reproduce,  distribute, publicly perform, and publicly display the article in any  medium for non-commercial purposes. They can also prepare derivative  works from the article, and authorise others to make any non-commercial  use of the article with credit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Implications&lt;/b&gt;: This is a godsend for students,  teachers and institutions that don’t have the means to purchase  expensive academic journals. Sunil Abraham, executive director of Centre  for Internet and Society (CIS) told TOI that the idea is that taxpayers  shouldn’t pay twice to access research funded by taxpayers’ money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Earlier developments in Open Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In August 2013 the Department of School Education and Literacy,  Ministry of Human Resource Development, the Central Institute of  Educational Technology (CIET), and National Council of Educational  Research and Training (NCERT) had &lt;a href="http://www.medianama.com/2013/08/223-indian-govt-launches-open-repository-for-school-education/"&gt;launched an initiative&lt;/a&gt; called &lt;a href="http://nroer.in/home/"&gt;National Repository of Open Educational Resources&lt;/a&gt; (NROER). The objective was to provide free educational resources to school students under the Creative Common license.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Union Cabinet had &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=80197"&gt;cleared&lt;/a&gt; the DST formulated &lt;a href="http://www.dst.gov.in/NDSAP.pdf"&gt;National Data Sharing and Accessibility Policy&lt;/a&gt; (NPDSA) back in February 2012. &lt;a href="http://dst.gov.in/nsdi.html"&gt;NPDSA&lt;/a&gt; was supposed to increase accessibility and ease sharing of  non-sensitive data amongst the registered users and their availability  for scientific, economic and social developmental purposes. However,  very little has been reported on how NPDSA was utilised since then.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the article &lt;a class="external-link" href="http://www.medianama.com/2014/07/223-government-open-access-policy/"&gt;published in Medianama here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works'&gt;http://editors.cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-28T05:34:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon">
    <title>ICT Awareness Program for Myanmar Parliamentarians in Yangon</title>
    <link>http://editors.cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon</link>
    <description>
        &lt;b&gt;Myanmar ICT for Development Organization-MIDO conducted ICT policy training for multi- party parliamentarian representatives in Yangon on July 26 and 27, 2014. Sunil Abraham presented on Innovation Ecosystem and Thinking about Internet Regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;h2&gt;Sunil's Presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/thinking-about-internet-regulation.pdf" class="external-link"&gt;Thinking about Internet Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/innovation-ecosystem.pdf" class="external-link"&gt;Innovation Ecosystem&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;div&gt;
&lt;h3&gt;Schedule&lt;/h3&gt;
&lt;/div&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Topic&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Resource Person&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;0930-1030&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What is the significance of ICTs to legislators?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rohan Samarajiva (RS)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1030-1115&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stories from the field: What do poor people do with ICTs?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Helani Galpaya (HG)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1115-1145&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Break&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1145-1245&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Legislation, policies, plans, strategies, regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1245-1330&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Modalities of making and implementing ICT policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS and HG&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1330-1430&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Videos&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1430-1530&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What is independent regulation? Why is it needed for sector growth&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1530-1600&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Break&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1600-1700&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Panel discussion: How social media can be used in public life&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sunil Abraham (SA), RS &amp;amp; Charitha Herath (CH)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;930-1030&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Regulation of online speech&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nay Phone Latt (NPL)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1030-1100&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Break&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1100-1200&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;How to think about Internet policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SA; counterpoint by CH&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1200-1300&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Hope in the heart and money in the pocket: Results of effective policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1300-1400&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Videos&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;We plan to have simultaneous interpretation. There will be time for discussion within each session.&lt;/p&gt;
&lt;h2&gt;Brief descriptions of sessions&lt;/h2&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;What is the significance of ICTs to legislators?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rohan Samarajiva&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is the introduction, wherein we bring out the economic, social and political significance of ICTs. Why legislators should pay attention to the     subject.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Stories from the field: What do poor people do with ICTs?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Helani Galpaya&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Here we present the findings of how the poor use ICTs, using demand-side data (both quant and quality) from Myanmar and countries in similar circumstances.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Legislation, policies, plans, strategies, regulation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In this session, a former policy advisor/regulator will present a perspective on the important distinctions between legislation, policies, plans,     strategies, and regulation.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Modalities of making and implementing ICT policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS and HG&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Here we will delve into the practical details of making policy and of implementing policy, using examples.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;What is independent regulation? Why is it needed for sector growth&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Progress in electronic connectivity is the foundation that will reduce the frictions in the Myanmar economy, create jobs and exports and enable social,     political and economic innovations. This requires massive investments, most of which will be private and most of which will come from outside the country.     What legislators need to know about creating an environment that will attract and retain foreign investment in a globalized economy will be discussed.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;How social media can be used in public life&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sunil Abraham, RS and Charitha Herath&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In the panel discussion, SA will pose questions to a policy advisor who has used social media in a political campaign and a social media savvy current     government official.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;How to think about Internet policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SA; counterpoint by CH&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;A leading advocate of enlightened Internet policy, Sunil Abraham of the Center for Internet and Society in Bangalore, India, will present his ideas,     highlighting the international dimension of Internet policy. CH will share his perspectives as a serving government official.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Regulation of online speech&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Nay Phone Latt&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Here, Myanmar’s leading blogger and founder of MIDO will discuss the current concerns with legislation that seeks to control online speech.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Hope in the heart and money in the pocket: Results of effective policy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;RS&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Results of effective policy implementation will be discussed with reference to specific country experiences.&lt;/p&gt;
&lt;h2&gt;Resource persons&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rohan Samarajiva, PhD, (program director) &lt;/b&gt; is founding Chair of LIRNEasia, an ICT policy and regulation think tank active across emerging Asian and Pacific economies. He was Team Leader at the Sri     Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the     USD 83 million e-Sri Lanka Initiative. He was Director General of Telecommunications in Sri Lanka (1998-99). In this capacity, he established the Telecom     Regulatory Commission of Sri Lanka; conducted the first public hearing and public notice proceedings; successfully concluded a license-violation     proceeding; and laid the foundation for a competitive market. He was also a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor     at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the     Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000). Dr. Samarajiva was     also Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham &lt;/b&gt; is the Executive Director of Bangalore based research organization, the Centre for Internet and Society. He founded Mahiti in 1998, a company committed to     creating high impact technology and communications solutions. Today, Mahiti employs more than 50 engineers. Sunil continues to serve on the board. Sunil     was elected an Ashoka fellow in 1999 to 'explore the democratic potential of the Internet' and was also granted a Sarai FLOSS fellowship in 2003. Between     June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific     Development Information Programme serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Helani Galpaya&lt;/b&gt; is LIRNEasia’s Chief Executive Officer. Helani leads LIRNEasia’s 2012-2014 IDRC funded research on improving customer life cycle management practices in     the delivery of electricity and e-government services using ICTs. She recently completed an assessment of how the poor in Bangladesh and Sri Lanka use     telecenters to access government services. For UNCTAD and GTZ she authored a report on how government procurement practices can be used to promote a     country’s ICT sector and for the World Bank/InfoDev Broadband Toolkit, a report on broadband strategies in Sri Lanka. She has been an invited speaker at     various international forums on topics ranging from m-Government to ICT indicators to communicating research to policy makers. Prior to LIRNEasia, Helani     worked at the ICT Agency of Sri Lanka, implementing the World-Bank funded e-Sri Lanka initiative. Prior to her return to Sri Lanka, she worked in the     United States at Booz &amp;amp; Co., Marengo Research, Citibank, and Merrill Lynch. Helani holds a Masters in Technology and Policy from the Massachusetts     Institute of Technology, and a Bachelor’s in Computer Science from Mount Holyoke College, USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Charitha Herath&lt;/b&gt; has served as Secretary, Ministry of Mass Media and Information in the Government of Sri Lanka since 2012. Prior to his present appointment, he was the     Chairman of the Central Environment Authority. Currently on secondment for national services from his permanent academic position as a Senior Lecturer in     the Department of Philosophy and Psychology at the University of Peradeniya in Sri Lanka, he continues to work on his academic research, specializing in     governments and politics in Asia, ethnic studies, cultural psychology, social and political philosophy, with his main focus on political psychology. More     detail at &lt;a href="http://charithaherath.wordpress.com/about-2/"&gt;http://charithaherath.wordpress.com/about-2/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Nay Phone Latt&lt;/b&gt; is the Co-founder and Executive Director of Myanmar ICT Development Organization (MIDO). He graduated from Yangon Technological University with a civil     engineering degree in 2004. He co-founded the Myanmar Blogger Society in 2007. Award winner of PEN Barbara Goldsmith Award and RFS’s Cyber Dissidents     Award. Former Political Prisoner. CEC Member of Myanmar Journalists Association(MJA) Chief Editor of ThanLwinAinMat Online Magazine (www.thanlwin.com).     Member of Board of Directors of House of Media &amp;amp; Entertainment (HOME).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon'&gt;http://editors.cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-07-29T09:37:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf">
    <title>Asia in the Edges</title>
    <link>http://editors.cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf'&gt;http://editors.cis-india.org/raw/digital-humanities/asia-in-the-edges.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-25T10:08:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia">
    <title>Font problem hits Odia</title>
    <link>http://editors.cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia</link>
    <description>
        &lt;b&gt;Focus on search for solution to lack of compatibility. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Bibhuti Barik was &lt;a class="external-link" href="http://www.telegraphindia.com/1140707/jsp/odisha/story_18587707.jsp#.U9IESqgu5R8"&gt;published in the Telegraph&lt;/a&gt; on July 7, 2014. Subhashish Panigrahi gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The available Odia fonts that could be used for digital publications have compatibility problems. The fonts, which number around 10, have been developed for specific purposes and cannot be used in all applications.&lt;br /&gt;&lt;br /&gt;Computer application researchers, linguistics, information technology experts and educationists, who met at a workshop here today, urged the state government and the IT industry to ensure the smooth use of Odia fonts.&lt;br /&gt;&lt;br /&gt;These fonts are available on different software tools, but if one purchases one of them to install on his or her computer, it fails to open in another system. Since this happens due to lack of compatibility, it also discourages users to use Odia fonts in official work and day-to-day life.&lt;br /&gt;&lt;br /&gt;“I think the use of Odia language in computers is restricted only to desktop publication (DTP). As the compatibility factor has come as a major handicap, the use is becoming more restricted in day-to-day life. The state government should come forward to facilitate a software so that the fonts can be used through a uniform system,’’ said linguist and founding director of the Mysore-based Central Institute of Indian Languages, Debi Prasanna Pattanayak.&lt;br /&gt;&lt;br /&gt;Subhashish Panigrahi, a Bangalore-based IT professional who is now working on a project for Wikipedia Foundation, said: “Different fonts in Odia came to existence quite late and all were based on the skeleton of Latin fonts so that when one types an English font on the keyboard, the screen shows an Odia font. Later, unicode fonts were developed, which were not only compatible to the Internet, but had elements common with other Indian languages as well.”&lt;br /&gt;&lt;br /&gt;Odia publishers did not agree to use the unicode fonts as they were using customised softwares. For this reason, the published books and literature fails to reach the Internet.&lt;br /&gt;&lt;br /&gt;In 2011, Srujanika, a city-based organisation, developed a converter to use fonts from other categories to unicode type.&lt;br /&gt;&lt;br /&gt;Sujata Patel, chief operating officer of Pune -based Tech Z Solution, said: “The affordability of Odia tools and fonts is a major concern. As they are developed by non-Odia professionals, the aesthetic aspect of Odia fonts and characters are not being taken into consideration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subrat Prusty, member secretary Institute of Odia Studies and Research, said: “Odia is yet to come to the computer screen on different software tools which are used for tables, Internet applications, medical, engineering and business applications.”&lt;br /&gt;&lt;br /&gt;“Despite having hundreds of engineering colleges, two technical universities and 10 universities we are yet to use Odia in computers,” Prusty added.&lt;br /&gt;&lt;br /&gt;Researchers from US, Singapore, IITs, central universities, IT professionals, linguists, artistes, educationists and students of computer applications took part in the workshop that was organised at the computer science department of the Institute of Technical and Education and Research of Sikhya O Anusandhan University.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia'&gt;http://editors.cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-25T08:04:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research">
    <title>Plan for open access to science research</title>
    <link>http://editors.cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research</link>
    <description>
        &lt;b&gt;The policy is open to comments from the public till July 25.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Renuka Phadnis was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/plan-for-open-access-to-science-research/article6235389.ece"&gt;published in the Hindu&lt;/a&gt; on July 22, 2014. T. Vishnu Vardhan gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever felt frustrated while reading a science research journal online,  only to see the message “to continue reading, subscribe now”? That may  soon change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Department of Science and Technology and the Department of  Biotechnology (DBt) under the Ministry of Science and Technology have  drafted a policy that says publicly-funded scientific work published in  science journals must adhere to open access (OA) norms, enabling anyone  to read online content on science research for free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OA is an initiative of Open Archives Initiative (OAI), an organisation  which works for greater reach and free access to online science research  funded by public money.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;T. Vishnu Vardhan, Programme Director, Access to  Knowledge, Centre for Internet and Society, Bangalore, which assisted  DST in drawing up the draft policy, said that in the absence of OA  norms, commercial publishers were making money with content generated by  scientists who used public funds for research.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, those sceptical of the DST initiative are asking whether availability on the Net is equivalent to “public domain”. Concerns have also been raised about the quality of content provided through OA, as honing raw research material into scholarly journals requires rigour that commands a cost. Ramakrishna Ramaswamy, Fellow of the Indian Academy of Sciences, Hyderabad, said it was much more important to make reliable information available to the public, at a reasonable charge, because “the price of keeping it free has a cost”. The draft of the DBT-DST Open Access Policy is open to comments from the public till July 25.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research'&gt;http://editors.cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-25T07:07:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/nama-the-future-of-indic-languages">
    <title>#NAMA: The Future of Indic Languages</title>
    <link>http://editors.cis-india.org/news/nama-the-future-of-indic-languages</link>
    <description>
        &lt;b&gt;Medianama is hosting an  open house session on "The Digital Future of Indic Languages" at the Oberoi in Bangalore on Thursday, July 24, 2014. The event will begin at 4.30pm and be followed by cocktails and dinner. Subhashish Panigrahi will participate in the event.&lt;/b&gt;
        &lt;p&gt;The following will be discussed in the event:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Growth of consumption of content in Indic languages in India.&lt;/li&gt;
&lt;li&gt;Impact of mobile on Indic languages consumption.&lt;/li&gt;
&lt;li&gt;Challenges of discovery of Indic language content: role of social and search.&lt;/li&gt;
&lt;li&gt;Defining standards and the role of tools and translation.&lt;/li&gt;
&lt;li&gt;Driving user generated Indic language content creation.&lt;/li&gt;
&lt;li&gt;Video versus Text in Indic languages.&lt;/li&gt;
&lt;li&gt;The role of government policy in supporting Indic language content.&lt;/li&gt;
&lt;li&gt;The role of mobile devices and touch screens.&lt;/li&gt;
&lt;li&gt;Beyond content: service delivery in Indic languages.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/nama-the-future-of-indic-languages'&gt;http://editors.cis-india.org/news/nama-the-future-of-indic-languages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-24T07:40:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip">
    <title>Open Knowledge Day in Mysore (Media Coverage)</title>
    <link>http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip'&gt;http://editors.cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-24T07:01:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/article-sambad-odia-language.pdf">
    <title>Odia Language Development</title>
    <link>http://editors.cis-india.org/openness/blog-old/article-sambad-odia-language.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/article-sambad-odia-language.pdf'&gt;http://editors.cis-india.org/openness/blog-old/article-sambad-odia-language.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-23T08:28:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/list-of-ip-institutes.xls">
    <title>List of IP Institutes</title>
    <link>http://editors.cis-india.org/a2k/blogs/list-of-ip-institutes.xls</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/list-of-ip-institutes.xls'&gt;http://editors.cis-india.org/a2k/blogs/list-of-ip-institutes.xls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-22T04:13:21Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology">
    <title>Information &amp; Communication Technology in Making a Healthy Information Society with special reference to use of ICTS in Educational Technology</title>
    <link>http://editors.cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology</link>
    <description>
        &lt;b&gt;The Department of Computer Science, Andhra Loyola College in collaboration with the Department of Computer Science, Krishna University will be organizing a UGC-sponsored National Seminar on August 11 and 12, 2014 at Andhra Loyola College in Vijayawada. &lt;/b&gt;
        &lt;p&gt;T. Vishnu Vardhan, Programme Director, Access to Knowledge from the Centre for Internet and Society will be giving a key note address at this event.&lt;/p&gt;
&lt;p&gt;See the invitation below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/AndhraLoyolaCollegeInvite.png/@@images/d9beb902-d34e-4f42-93fd-b75528cc9da8.png" alt="Andhra Loyola College Invite" class="image-inline" title="Andhra Loyola College Invite" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology'&gt;http://editors.cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-07-18T09:06:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/region-as-frame-politics-presence-practice">
    <title>Region as Frame: Politics, Presence, Practice</title>
    <link>http://editors.cis-india.org/news/region-as-frame-politics-presence-practice</link>
    <description>
        &lt;b&gt;IAMCR's 2014 conference will take place in Hyderabad, India from 15-19 July. The conference theme is Region as Frame: Politics, Presence, Practice. The event is organized by International Association for Media and Communication Research.&lt;/b&gt;
        &lt;p&gt;Sunil Abraham is a speaker in the following panels:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Governing Digital Spaces: Issues of Access, Privacy and Freedom (Friday, July 18, 2014, 11.00 - 12.30)&lt;/li&gt;
&lt;li&gt;UNESCO panel debate (Friday, July 18, 2014, 12.30 - 14.00)&lt;/li&gt;
&lt;li&gt;Special Session on Research Paths In and Outside of the Academy (Friday, July 18, 2014, 14.00 - 15.30)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/iamcr-conference-2014.pdf" class="external-link"&gt;Click to download the brochure of the event here&lt;/a&gt; (PDF 7.33 Mb)&lt;/p&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/WcfkSYxEOW0" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/region-as-frame-politics-presence-practice'&gt;http://editors.cis-india.org/news/region-as-frame-politics-presence-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    

   <dc:date>2014-09-09T09:26:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet">
    <title>Terror recruiters target Indians on internet</title>
    <link>http://editors.cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet</link>
    <description>
        &lt;b&gt;What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Terror-recruiters-target-Indians-on-internet/articleshow/38565102.cms"&gt;published in the Times of India&lt;/a&gt; on July 18, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet'&gt;http://editors.cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-18T06:57:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students">
    <title>150 Rare Books Get New Lease of Life Online, Courtesy Students </title>
    <link>http://editors.cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students</link>
    <description>
        &lt;b&gt;You might have heard about Samkshepa Vedartham by Clement Pianius, the first book printed in Malayalam but might not have got a chance to read it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anila Backer was &lt;a class="external-link" href="http://www.newindianexpress.com/states/kerala/150-Rare-Books-Get-New-Lease-of-Life-Online-Courtesy-Students/2014/07/15/article2331073.ece"&gt;published in the New Indian Express&lt;/a&gt; on July 15, 2014. The Access to Knowledge team at the Centre for Internet and Society (CIS-A2K) supported this Malayalam community event.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, you can read the book published in 1772 online through the  Malayalam Wiki library (Wiki grandhasala). More than 150 such rare books  have been digitised and uploaded by the school students across the  state and a few members of the  public as part of the digitisation  contest jointly hosted by Malayalam Wikipedia community, IT@School,  Kerala Sahitya Akademi , Centre for Internet and Society and Swathanthra  Malayalam computing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than 1,000 students from 137 schools and 234 participants from the  public uploaded more than 13,000 pages of rare books such as  Hasthalakshana Deepika (1892) by Kadathanattu Udayavarma Thampuran,  Madamahee Shashathakam Manipravalam (1908) by Kottaratil Shankunni,  Malayazhmayude Vyakaranam (1863) by Rev George Mathan and Divan  Shankunni Menon (1922) by C Achutha Menon  as part of the competition  held during January and February.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, you can also acquire information on the social scenario during  different time periods, like the matrilineal system of inheritance,  ‘Marumakkathayam’ through the  various volumes of old magazines  digitised by the students. Magazines such as Mangalodayam and  Rasikaranjini are also available in the wiki library. “Books that were  not available in Malayalam and those existed only in the German and  French libraries were digitised with the contest. The contest was  organised to provide the public access to these rare collections,” says  IT@School Wayanad district coordinator V J Thomas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It also allows one to search for a particular word or topic as well as  to copy the content of the book for a research work or other purposes  that cannot be done with a scanned copy of a book,” he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Moreover, it also aims at developing an interest among the students  towards Malayalam computing and to make them effectively utilise the  scope of Internet, besides improving their reading habit,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has also improved the typing speed of the students and they get familiar with the old fonts in the language also,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students'&gt;http://editors.cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Malayalam Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-07-18T06:12:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/bombay-report.pdf">
    <title>Bombay Report</title>
    <link>http://editors.cis-india.org/internet-governance/blog/bombay-report.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/bombay-report.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/bombay-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-18T06:03:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
