<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 3091 to 3105.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/wiki-world"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/social-media"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/blog/is-that-a-friend"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/skinputting-mobile-computing"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/brave-new-medium"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/myth-history-irreverence"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/unique-identity-crisis"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/civic-hackers-in-India"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/nel-suk"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/tweet-and-poke"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/about/newsletters/december-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/privacy-matters"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary">
    <title>Privacy Matters — Conference Report</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary</link>
    <description>
        &lt;b&gt;A one-day conference on Privacy Matters was held on Sunday, 23 January 2011 at the National University of Juridical Sciences (NUJS) Law School in Kolkata. This was the first of a series of eleven conferences on ‘privacy’ that Privacy India is scheduled to host in different Indian cities from January to June this year. Members of Parliament, Sri Manoj Bhattacharya from the Revolutionary Socialist Party (RSP) and Sri Nilotpal Basu from the Communist Party of India (Marxist) CPI (M) spoke in the conference. Students, the civil society and lawyers also participated in it.&lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The conference was held to discuss elements of the privacy legislation that has been proposed to the Parliament of India, and the UID Bill and project. The conference focused on the tensions between privacy and society that exist in India today, and acted as a space for opinion sharing and discussion. Privacy India which was formed under the auspices of&amp;nbsp; Privacy International, a UK based organization that works to protect the right of privacy around the world, the Centre for Internet and Society (CIS), an NGO based in Bangalore, and Society in Action Group (SAG), an NGO based in Delhi joined hands to host this event.&lt;/p&gt;
&lt;p&gt;Rajan Gandhi, founder of SAG opened the conference with an explanation of the mandate of Privacy India, the objective of which is of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. &amp;nbsp;One of Privacy India's goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, legislators and the legal and academic community.&lt;/p&gt;
&lt;h3&gt;Keynote&lt;/h3&gt;
&lt;p&gt;The keynote speech was delivered by Dr. Sudhir Krishnaswamy professor of law and governance. Dr. Krishnaswamy began by outlining the present situation of privacy in India. The right to privacy has been read into Sections 19 and 21 of the Constitution of India through case law, which has defined privacy — among other things — as the right to personal autonomy, the right against unreasonable search and seizure, and as a fundamental right that is critical to the person, but does not supersede public or national interest. Dr. Krishnaswamy also raised many intriguing questions including: &amp;nbsp;what does privacy mean to India — is it linked to a person’s dignity and their honour? Or is it purely concerned with misappropriation of information, and further is privacy in India an issue of the individual or an issue of the family and the community? He also described the philosophical groundings of privacy as being in the right to dignity, the right to autonomy, and the misappropriation of information. &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Privacy Challenges&lt;/h3&gt;
&lt;p&gt;The conference was spread into three sessions. In the first session Prashant Iyengar, head researcher of the project at Privacy India, spoke about the challenges that India specifically is facing in shaping a privacy legislation including: the need to balance the right to information/transparency and privacy, the need to create a definition of privacy that does not exclude lower classes and is not a negative right, but instead a positive right, and the problem of ubiquitous surveillance that is happening in society today. &amp;nbsp;Elonnai Hickok, policy analyst at Privacy India, spoke specifically on wire tapping, and the Nira Radia tapes. In her presentation she first outlined other countries definitions of privacy which include: the right to be left alone, the protection from unauthorized searches, and the right to control information about oneself through consent. &amp;nbsp;Using the case study of Nira Radia and Ratan Tata she spoke about the rising concern of wire tapping in the country as being indicative of a social change and relationship of the state and government. Elonnai also raised questions concerning whether privacy should be made inversely proportional to public figures, and if public interest will always supersede the private right of individuals.&lt;/p&gt;
&lt;h3&gt;UID and Privacy&lt;/h3&gt;
&lt;p&gt;The second session of the conference focused on the UID Bill and privacy. Presentations from NUJS student Amba Kak and Sai Vinod raised concerns about the UID project and privacy. Their presentation also compared and contrasted identity schemes of other countries with the UID. A few similarities that they found amongst all scheme were: the collection of data, the processing of data, and the storing of data. &amp;nbsp;Deva &amp;nbsp;Prasad from the National Law School of Bangalore presented on constitutional elements of the UID scheme ranging from loopholes in the Bill to connections that can be made when the UID Bill is placed in the larger picture. &amp;nbsp;Sri Manoj Bhattacharya (MP) from RSP voiced his concerns of the UID, and emphasized that by giving an individual a number which acts as their fundamental identity which they use to function in society, the government in fact is eroding an individual’s actual identity, and that is an invasion of privacy. &amp;nbsp;Sri Nilotpal Basu (MP) from CPI (M) spoke out strongly against the UID, voicing that his greatest concern with the UID is that it will be a way for corporate bodies to target individuals as consumers, and that privacy legislation could be used as a way for corporate bodies to hide from the public eye.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In the concluding session the floor was opened up to the public for questions and opinion sharing. Many participants shared what they believed needed to be included in privacy legislation, and what issues a privacy legislation needs to address. A few of these include: privacy rights and the media, privacy and the right to information, the privacy rights of minorities, and the privacy rights of the government. Also types of regulatory models for privacy were discussed. For instance, should privacy in India be represented and protected through a data protection law, or should privacy be seen as a fundamental right to privacy? Should privacy be represented through a broad framework, or through sector specific statutes? What should the redressal and enforcement mechanisms look like?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As seen from the presentations and the comments at the conference one thing which is clear is that privacy is an issue that concerns every person in India. Over the next six months Privacy India will be conducting ten more conferences in different Indian cities to engage the public in dialogues of privacy and raise awareness around the issues of privacy. &amp;nbsp;The next workshop will be held on 5 February 2011 in Bangalore.&lt;/p&gt;
&lt;p&gt;Download the conference summary &lt;a href="http://editors.cis-india.org/internet-governance/blog/privacy-kolkata-report" class="internal-link" title="Privacy India Calcutta Conference"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-01-27T10:22:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/wiki-world">
    <title>Wiki changes the world</title>
    <link>http://editors.cis-india.org/digital-natives/blog/wiki-world</link>
    <description>
        &lt;b&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from September 2010 onwards. This article was published in the Indian Express on January 23, 2011. In this Nishant Shah explains how Wiki changes the world by making the ordinary person the expert and knowledge free.&lt;/b&gt;
        
&lt;p&gt;If you have a question, where do you go? To books? To encyclopaedias? To knowledgeable friends? To experts in that field? The quest for knowledge is not easy. Often, we encounter false leads and reach dead ends. We often find ourselves dependent on vanguards and bearers of knowledge. The knowledge industry, which includes academia, schools, universities, libraries, archives, etc. have created labels that define consumers, producers and mediators of knowledge.&lt;/p&gt;
&lt;p&gt;What do you do with the answer of a question? You generally store it in your memory. If it is an answer that you are searching for collaboratively, you share it with the concerned people. If you are meticulous and like to archive information, you probably write it down in a big brown book. But for many of us, we see our relationship with knowledge as one of consumption. Books, and indeed columns like this one, are written by “experts”.&lt;/p&gt;
&lt;p&gt;If you have an answer, but nobody is asking you the question, what do you do with it? This was the question that Jimmy Wales, asked a decade ago. He then thought of starting a web-based, collaborative platform for knowledge production — now known as Wikipedia. Working on an open structure, Wikipedia invites anybody with internet access to start contributing and consolidating their knowledge through a process of discussion, consensus-building and collaboration. Unlike a regular encyclopaedia with its army of knowledge warriors, Wikipedia depends on everyday users who harness the power of information to bring together the “sum total of human knowledge”. In 10 years, Wikipedia has become the de facto global reference point for dynamic knowledge and boasts of more than 17 million articles with more than 365 million readers in 263 language editions.&lt;/p&gt;
&lt;p&gt;For digital natives, the growth of Wikipedia illustrates the changing ways in which digital natives are learning and engaging with knowledge, both inside and outside of formal education.&lt;/p&gt;
&lt;h3&gt;Knowledge is a process&lt;/h3&gt;
&lt;p&gt;Digital natives, who contribute to Wikipedia and learn from it, know that there is more to knowledge than what is on the surface. While the entries on Wikipedia serve as a fount of information, it is layered by discussions, edit-wars, and processes of mediation that produce objective content. For young users of Wikipedia, the ability to question the content, the protocols of producing neutral evidence, and the often intense discussions, establish an intimate relationship with knowledge.&lt;/p&gt;
&lt;p&gt;They look at knowledge as fluid, as open to contention and produced through multiple perspectives. In the world of user-generated content, knowledge is seen as a process of engagement rather than as an object to be mechanically consumed. Hence, it is not uncommon to see digital natives encountering information online — on platforms like Wikipedia, but also on blogs and discussion forums — expressing opinions and challenging the content when it does not fit their experience of that information.&lt;/p&gt;
&lt;h3&gt;Your experiences are also knowledge&lt;/h3&gt;
&lt;p&gt;One of the most important lessons that Wikipedia teaches a digital native, is that knowledge is not authored only by people with the backing of institutions. While there are some systems of knowledge which require formal training, there is a huge value in everyday and lived experiences. Encyclopaedias discriminate between different kinds of knowledge — Shakespeare’s work might find an entry in almost all of these, but the 16-year-old writer who has a larger readership than Shakespeare might easily be excluded. However, on Wikipedia, any realm of the cultural, political or social that is relevant and significantly affects our everyday life finds space and detailed research. This translation of lived experience into knowledge is new and opens up ways of producing alternative and plural knowledge systems around objects, people, events and ideas that shape the world.&lt;/p&gt;
&lt;h3&gt;It is open to all&lt;/h3&gt;
&lt;p&gt;Digital natives who have grown up in the Wikified world have also experienced information as something that belongs to a larger community. They don’t even espouse it as an ideology, but often think of knowledge as open and residing within digital public commons. In their multiple roles as bearers, producers, and consumers of knowledge, they are used to remixing, sharing and disseminating knowledge into a wider ecology. The analogue regimes of intellectual property and copyright do not make sense to them in a medium that is intuitively made for copying, sharing and owning knowledge collaboratively.&lt;/p&gt;
&lt;p&gt;In the largely Wikifying world that we live in, the notions of what constitutes knowledge, how one accesses knowledge and how people interact with it is undergoing radical change. And the digital natives are silently but significantly shaping new ways of imagining knowledge processes, proving to us that the pen might be mightier than the sword, but the click trumps them both.&lt;/p&gt;
&lt;p&gt;Original article was published by the &lt;a class="external-link" href="http://www.indianexpress.com/news/wiki-changes-the-world/740173/1"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/wiki-world'&gt;http://editors.cis-india.org/digital-natives/blog/wiki-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2012-01-03T10:23:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda">
    <title>Privacy Matters Conference Agenda</title>
    <link>http://editors.cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda</link>
    <description>
        &lt;b&gt;The "Privacy Matters" conference is taking place on Sunday January 23rd, at NUJS Law school at 10:30. It is a full day event that will discuss the challenges and concerns of privacy in India. Below is the agenda for the event. We look forward to your participation and attendance. &lt;/b&gt;
        
&lt;h2&gt;Privacy Matters agenda&lt;/h2&gt;
&lt;h3&gt;January 23, 2011 NUJS&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;10:30 – 4:30 P.M.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Time:&lt;br /&gt;&lt;br /&gt;&lt;em&gt;10:30 - 11:00 &lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Welcome &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;ol&gt;&lt;li&gt;Who is PI&lt;/li&gt;&lt;li&gt;What are our objectives&lt;/li&gt;&lt;li&gt;Why is privacy important in India &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;em&gt;&lt;strong&gt;11:00 - 11:30&amp;nbsp;&lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Keynote&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Sudhir Krishnaswamy&lt;/li&gt;&lt;/ol&gt;
&lt;strong&gt;&lt;em&gt;11:30 - 11: 45 &lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Tea Break &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;11:45 - 1:00 &lt;/strong&gt;&lt;/em&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session I&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;Personal privacy: violations and Indian legislation that addresses these violations &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Informational privacy: violations and Indian legislation that addresses these violations &lt;br /&gt;&lt;/li&gt;&lt;li&gt;What is the existing vacuum in Indian legislation in concern to privacy&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;strong&gt;&lt;em&gt;1:00 -2:00&lt;/em&gt;&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Lunch&amp;nbsp;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;2:00 - 3:30 &lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session II &lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;Identity and privacy: why does it matter &lt;br /&gt;&lt;/li&gt;&lt;li&gt;International approaches to identity&amp;nbsp;&lt;/li&gt;&lt;li&gt;The UID and Privacy &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;em&gt;&lt;strong&gt;3:30 - 3:45&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;Tea Break &lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;em&gt;&lt;strong&gt;3:45 - 4:30&lt;/strong&gt;&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Session III &lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;li&gt;&amp;nbsp;Open discussion and opinion sharing &lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda'&gt;http://editors.cis-india.org/internet-governance/blog/privacy/privacy-privacymattersagenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-01-14T11:45:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach">
    <title>Rising Voices Seeks Micro-Grant Proposals for Citizen Media Outreach </title>
    <link>http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach</link>
    <description>
        &lt;b&gt;Rising Voices is seeking project proposals from non-governmental organizations (NGOs) or individuals for funding of up to $4,000 USD for digital media outreach projects around the world. Application Deadline: Friday, February 4, 2011 at 11:59 PM GMT.&lt;/b&gt;
        
&lt;p&gt;It has been more than three years since Rising Voices began with a simple mandate: to help bring new voices from underrepresented communities to the global conversation through the use of citizen media. We have been accomplishing that by providing microgrant funding, as well as technical and mentoring support to our grantee communities. Ever since the first microgrant competition was announced in May 2007, we have provided seed funding to 24 projects from around the world to help turn their ideas into reality. The diversity of these grantee projects has made Rising Voices a unique place on the web to have a firsthand look at places around the world, such as &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/project-foko/"&gt;Tamatave, Madagascar&lt;/a&gt; and &lt;a class="external-link" href="http://rising.globalvoicesonline.org/projects/nomad-green-mongolia/"&gt;Ulaanbaatar, Mongolia&lt;/a&gt;, through the first-person accounts of these new bloggers.&lt;/p&gt;
&lt;p&gt;Beginning on January 11th, 2011, Rising Voices is launching the latest round of microgrant funding and is now accepting project proposals from non-governmental organizations (NGOs) or individuals for funding of &lt;strong&gt;up to $4,000 USD&lt;/strong&gt; for digital media outreach projects around the world. Ideal applicants will present innovative and detailed proposals to teach citizen media techniques to underrepresented communities that are poorly positioned to discover and take advantage of tools like blogging, video-blogging, or podcasting on their own.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Who is Eligible to Apply&lt;/h3&gt;
&lt;p&gt;This funding opportunity is open to both NGOs and private individuals. However, if an NGO does not have experienced citizen media trainers on their staff, it is extremely important that they seek collaboration with the local blogging community to find the right trainer(s) with the necessary skills. On the other hand, it would also be highly beneficial for individual applicants to partner with an existing NGO from the communities they plan to serve in order to strengthen the project's impact.&lt;/p&gt;
&lt;h3&gt;What Kind of Projects May be Funded&lt;/h3&gt;
&lt;p&gt;Rising Voices seeks project proposals that share our mission of bringing voices from new communities, as well as underrepresented language groups to the online global conversation through the use of citizen media. The projects' primary activities should be to provide citizen media training workshops to the target community, as well as ongoing support and mentoring to the participants. Please see our roster of current and alumni grantee projects for examples of previously funded projects.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Examples of potential projects include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Distributing flip video cameras to local residents to help map and document environmental issues affecting the area and to propose solutions.&lt;/li&gt;&lt;li&gt;Partnering with a local library with a computer lab to train youth how to record and document the history of their local neighborhood by using mp3 recorders to interview local elders.&lt;/li&gt;&lt;li&gt;Organizing blogging workshop for local artisans to help them market their work online, but also tell the story and history of their handicrafts.&lt;/li&gt;&lt;li&gt;Distributing $10 digital cameras to two different groups in different neighborhoods and create a Flickr group where they interact with each other's&amp;nbsp;&amp;nbsp; photographic perspectives of their city.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Application Process&lt;/h3&gt;
&lt;p&gt;Interested applicants should complete the online proposal application form (&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;link here&lt;/a&gt;), which should also include a detailed budget. If you would like to download the application questions to complete offline in order to upload later, please download the text document here (&lt;a class="external-link" href="http://rising.globalvoicesonline.org/files/2011/01/Rising-Voices-Grant-Application.pdf"&gt;PDF&lt;/a&gt; format). While we welcome and encourage projects from all corners of the global, all applications must be completed in English.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;pre&gt;&lt;a class="external-link" href="http://www.surveymonkey.com/s/risingvoicesmicrogrants"&gt;Online Application Form&lt;/a&gt;&lt;/pre&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;Rising Voices outreach grants will range from $2,000-4,000 USD. Please be as thoughtful, specific, and realistic as possible when drafting your budgets. Applicants are encouraged to submit budgets for less than the maximum $4,000 USD as smaller grants allow us to fund more projects.&lt;/p&gt;
&lt;p&gt;The application deadline is &lt;strong&gt;February 4th, 2011 at 11:59 PM GMT&lt;/strong&gt;. All applicants will receive a confirmation email indicating that we have received your proposal. The proposals will be reviewed by a committee of Global Voices staff and volunteers, as well as members of previous Rising Voices grantees. We will announce the grant recipients by February 28, 2011.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Expectations of Successful Grantees&lt;/h3&gt;
&lt;p&gt;Successful projects will be prominently featured on the Global Voices networks. Grantees will be required to sign a grant agreement, which will outline accounting, reporting, and other terms and conditions regarding how funds will be distributed. Grantees will also be required to post regular project updates to the Rising Voices website, be in regular communication with Rising Voices staff, as well as actively participate in the Rising Voices community.&lt;/p&gt;
&lt;p&gt;Feel free to ask questions in the comments section below or by sending an email to eddie [at] globalvoicesonline [dot] org.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This post is also available in:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://mg.globalvoicesonline.org/2011/01/11/11977/"&gt;Malagasy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://pt.globalvoicesonline.org/2011/01/11/rising-voices-abre-selecao-para-fundo-destinado-a-projetos-de-midia-cidada/"&gt;Português&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach'&gt;http://editors.cis-india.org/digital-natives/blog/proposals-for-citizen-media-outreach&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-04T10:36:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/social-media">
    <title>Getting Connected</title>
    <link>http://editors.cis-india.org/news/social-media</link>
    <description>
        &lt;b&gt;Nishant Shah of the Centre for Internet &amp; Society talks about the growing adoption of social media, and what can constitute a "social media network" &lt;/b&gt;
        
&lt;p&gt;See the video in livemint &lt;a class="external-link" href="http://videos.livemint.com/video/5223036-getting-connected"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/social-media'&gt;http://editors.cis-india.org/news/social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:03:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/blog/is-that-a-friend">
    <title>Is That a Friend on Your Wall?</title>
    <link>http://editors.cis-india.org/digital-natives/blog/is-that-a-friend</link>
    <description>
        &lt;b&gt;Before you start reading today’s column, have a look at the person sitting next to you. It might be a family member if you are at home, a friend in the club, a stranger in a cafe or a fellow commuter on the bus. Now take a moment to figure out how much you trust that person. The intensity of your trust would depend upon your familiarity, your social relationship and the time you’ve known that person.&lt;/b&gt;
        
&lt;p&gt;However, what remains constant in all these different equations is the process by which trust is established in physical spaces.&lt;/p&gt;
&lt;p&gt;How do we trust somebody? How do we know that we are safe with them? We rely on answers like “instincts”, “vibes” or “feelings”, which cannot be easily quantified or explained. The reason we do not have rational explanations for why and how we trust somebody is because we depend upon a social design of trust from the beginning of our social interactions. As young children, we were told not to speak with strangers or accept candy from them. As adults, we were taught that people who look like us and sound like us are probably safer for us. We learn, through signs and experience, on how to be safe in our daily life. Some signs are obvious, like “Beware of pickpockets”.&lt;/p&gt;
&lt;p&gt;Others are learned, the way somebody looks at us, warns us of impending danger. We have learned now to decode physical appearances, intonations, backgrounds and body language in order to develop relationships of trust with people we meet.&lt;/p&gt;
&lt;p&gt;Often, these relationships are mitigated by structures that we trust. We believe that students who study with our children are not going to cause them harm because their schools would have vetted out undesirable people. In public places, we are not paranoid that a gunman is going to start shooting at us because we believe that the law and order systems would have produced conditions of safety.&lt;/p&gt;
&lt;p&gt;However, when we go online, the instincts which we have been trained in to decode people’s social performances suddenly become inadequate. Social cues online are difficult to decipher.&lt;/p&gt;
&lt;p&gt;We no longer have the luxury of studying people “in-person”. Instead, we have to engage with them on interfaces, where their avatars become the faces that we talk to. As the famous cartoon goes, a dog on a laptop is telling another canine friend, “On the internet, nobody knows you are a dog!” For digital natives who populate these virtual worlds with great ease, this is perhaps one of the biggest challenges. Without having the social design that helps them evolve measures of safety or the advice of older generations (there are no older digital natives!), it becomes difficult for them to figure out how to trust somebody online. This lack of design often informs the paranoia about predators, about young users being exploited by those more skilled at navigating the environments, about bullying and exclusion that often happens in the online space. The digital immigrants or settlers look to the digital native for clues about how to trust somebody online.&lt;/p&gt;
&lt;p&gt;Economic structures like banks, corporates and governments advise people on how to trust transactions online. Your bank has probably sent you information about phishing scams. Companies like Facebook also warn you to check URLs and warn you when you navigate to a page outside the Facebook universe. Governments are investing in hi-tech encryption services which can protect citizen data against fraud or misuse.&lt;/p&gt;
&lt;p&gt;Browsers like Firefox have their own parsing techniques which warn you about the possible dubiousness of a webpage. All these measures, while they help to protect us online, still do not help us in determining how and why we trust somebody online.&lt;/p&gt;
&lt;p&gt;This is a question that needs to be emphasised because the solutions do not reside in technology implementations. Just like trust is not a technology problem, the answers to the questions are also not going to be within technologies.&lt;/p&gt;
&lt;p&gt;As we begin the second decade of the 21st century, it is time to start figuring out how we shall learn to identify elements of digital identities. Reminders and signposts about not sharing sensitive information online; a trust-based design system where users are empowered with credentials by their participation in the community and trust ratings provided by their peers will become an integral part of digital identities. We need to learn how to analyse online identities by making database searches, reading through the larger narratives of the avatars by using reference sites that can validate information about the user, and remember that online conversations also carry an element of risk. This will help decode digital behaviour and ensure that we make informed choices about trust online.&lt;/p&gt;
&lt;p&gt;Read the original in Indian Express &lt;a class="external-link" href="http://www.indianexpress.com/news/is-that-a-friend-on-your-wall/735110/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/blog/is-that-a-friend'&gt;http://editors.cis-india.org/digital-natives/blog/is-that-a-friend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-08-04T10:36:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/skinputting-mobile-computing">
    <title>Nishant Shah Quoted in Livemint 2011 Tweet-out</title>
    <link>http://editors.cis-india.org/news/skinputting-mobile-computing</link>
    <description>
        &lt;b&gt;Livemint, recently did a tweet-out which quoted people about what will be big in 2011. Nishant Shah was also quoted. &lt;/b&gt;
        
&lt;p&gt;#LM_2011 Nishant Shah: Skinputting – Mobile computing that uses human body as interface to net; data projected on skin to go truly mobile.&lt;/p&gt;
&lt;p&gt;Read the original tweet in Livemint &lt;a class="external-link" href="http://twitter.com/#!/livemint/status/21824111298748416"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/skinputting-mobile-computing'&gt;http://editors.cis-india.org/news/skinputting-mobile-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T00:58:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/brave-new-medium">
    <title>CIS to Screen Subasri’s film “Brave New Medium”</title>
    <link>http://editors.cis-india.org/events/brave-new-medium</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) will host a screening of a film “Brave New Medium,” at 6 p.m. on Monday, 10 January 2011. The film is directed by Subasri Krishnan. &lt;/b&gt;
        
&lt;p&gt;"Brave New Medium" documents the complicated dynamics of Internet and censorship across different parts of&amp;nbsp; South-East Asia. It looks at how human rights activists in the region use the Internet as a tool of resistance. The film also examines ways of understanding censorship beyond the lens of the banning and the banned.&lt;/p&gt;
&lt;h3&gt;Subasri Krishnan&lt;/h3&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/krishnan.jpg/image_preview" alt="Subasri Krishnan" class="image-inline image-inline" title="Subasri Krishnan" /&gt;&lt;/p&gt;
&lt;p&gt;Subasri Krishnan has been an independent film-maker for the past 6 years.&amp;nbsp; She has directed a number of commissioned non-fiction films on issues ranging from Gender, Micro-Finance, Governance, Farmer’s Suicides to NREGA and the Right to Freedom of Expression. She has just completed&amp;nbsp; a film on Internet Censorship in both democratic and non-democratic countries in South-East Asia. Currently she is working on a research/film project on the idea of official identity documents and the notion of personhood, especially in the context of UIDAI.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In 2008, Subasri was awarded the prestigious George Washington International Documentary Filmmaker Fellowship. Subasri graduated from the Mass Communication Research Centre at Jamia Millia Islamia.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/brave-new-medium'&gt;http://editors.cis-india.org/events/brave-new-medium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:21:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/myth-history-irreverence">
    <title>Myth/History/Irreverence: Flaneurs and Whores of Our Time</title>
    <link>http://editors.cis-india.org/events/myth-history-irreverence</link>
    <description>
        &lt;b&gt;As part of a longer discovery and reading of Walter Benjamin's work, Atreyee Majumder constructs an argument that the turgid notions of the new, the contemporary and the important are endless repetitions of nothing-new. Atreyee will give a lecture on this on 8 January 2011 at the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;Many epochs, many histories seem to collide in a transient yet euphoric sensation of the ‘new’, immediately turning into ash-like heap of nothing-new. This understanding of the historic contemporary as a shuffle of old cards, yields new lenses through which to interpret the turgidity of the 'new' and the 'novel' in our times — technologies, crises (climate change, political upheaval, etc.), Facebook. She revisits the notion of history as scaffolding — especially, through the Benjaminian point of view of the Flaneur and the Whore, albeit the ones of our time.&lt;/p&gt;
&lt;h3&gt;Atreyee Majumder&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/atreyee.jpg/image_preview" title="Aitreyee Majumder" height="374" width="249" alt="Aitreyee Majumder" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Atreyee graduated from the National Law School of India University in 2006 and is a PhD student of Socio-cultural Anthropology at the Yale University, with keen interests in political anthropology, spatiality, historicity, the interaction of many planes of history which constitute the historical residue of the contemporary. She is doing a dissertation research on the making of political subjects on the peri-urban terrain in Howrah, West Bengal, in the shadows of socialisms, and everyday dialog with metropolitan norms of civicness from neighbouring Kolkata. She has worked as an activist and researcher in the fields of law, environment and development in Delhi.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKojAcA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKoqHUA"&gt;&lt;/embed&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/myth-history-irreverence'&gt;http://editors.cis-india.org/events/myth-history-irreverence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-04-04T07:22:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/unique-identity-crisis">
    <title>Would it be a unique identity crisis ?</title>
    <link>http://editors.cis-india.org/news/unique-identity-crisis</link>
    <description>
        &lt;b&gt;The UID project will centralise a humongous amount of data but the fear is that it might fall into the wrong hands.&lt;/b&gt;
        
&lt;p&gt;The Unique Identification (UID) project is already up and running. It’s touted as a watershed in inclusive politics, of bringing people, who by virtue of physical remoteness, their station in society or other liabilities were excluded from the system, back into it. UID Chairman Nandan Nilekani recently said that the aadhaar number will not replace the passport, driving license or the voter identity card and that by 2014, 60 per cent of the country’s population will have the 12-digit UID number. The idea, though it has not been made explicit, is that Aadhaar will eventually become the key document for the common man to navigate the system, whether it is opening a bank account or making a rent agreement to booking a train ticket or applying for a job.&lt;/p&gt;
&lt;p&gt;In fact, there is the implicit danger that sooner than later the original idea of inclusiveness could be turned on its head by denying benefits to people who don’t have the Aadhaar! “There is nothing to ensure that you will continue to receive the same benefits like those who have the UID number. The claim that it is not mandatory is legally correct.&amp;nbsp; But in practice it would not be,” said Prof Sridhar Krishnaswamy of W B University for Juridical Sciences.&lt;/p&gt;
&lt;p&gt;It is a fundamental premise that data subjects ought to have “inalienable moral rights” about the “integrity” of the data collected about them. But even as UID is one of the best things that could have happened to deepen the democratic process in our society, the often un-remarked fact is that the project has also become the biggest industrial collector of personal information. Considering the size and heterogeneity of the Indian population, it becomes as big as Google, and the implications of this are quite frightening.&amp;nbsp; The UID draft bill, which has to be cleared by Parliament for it to become law, has only perfunctorily looked at the dangers posed by such huge and centralized collection of data. It glosses over the issue, content with making conservative noises about “the interlinking of databases”. This only shows how casual our policy makers, even the most enlightened of them, are towards the whole issue of safeguarding privacy.&lt;/p&gt;
&lt;p&gt;The Bangalore-based Centre for Internet and Society (CIS) has analyzed the draft UID bill in considerable depth. They have identified three main areas where the bill needs to be drastically reworked: (i) plugging all loopholes which would enable corporate organizations from accessing information from the Aadhar database for their own commercial or R &amp;amp; D purposes; (ii) stipulating a maximum period for the data to be stored; (iii) to be transparent about the methods it uses to collect, store and disseminate data.&lt;/p&gt;
&lt;p&gt;Prof Krishnaswamy agreed that the UID bill has not taken the corporate threat seriously enough. He contends that the UID authorities should take small, concrete steps that would act as effective safeguards. “In the mobile phone segment, user information is stored only for six months.&amp;nbsp; Now, the government is proposing a similar time cap for ISP too. But when it comes to UID there is no such time limit.&amp;nbsp; It means personal information could be held perpetually,” he explained. All that UID Assistant Director A K Pandey had to say to this was, “if that is it, then we have to live with it.”&lt;/p&gt;
&lt;p&gt;Another worrying aspect of the proposed bill, according to Usha Ramanathan, an activist and expert on identity and digital issues, is its failure to fix accountability on the main players including enrollers, outsourcing companies, and the UDAI authority itself. “The data collector and data controller should be equally held responsible for the protection of data,” she said.&amp;nbsp; However, UID authorities themselves are of the view that the apprehensions are being overplayed. Pandey maintained that there was nothing in the UID that would compromise the privacy of individuals.&amp;nbsp; “You go to a bank or the LIC office and you give whatever information they ask you. But when it comes to UID alone you say the information you give could be dangerous.&amp;nbsp; We don’t quite understand this,” he retorted. He played down the fears that in the central data storage vital information could go corrupt. “We have taken adequate measures to protect it. We will have a backup,” he said.&lt;/p&gt;
&lt;p&gt;The issue of transparency of data collection and storage remains. The CIS analysts feel that the UID should put out a synopsis of the algorithms it will use in collating and protecting data so that the public at large can be reassured of the firewalls that are in place. Then there is also the issue of not having concrete provisions in the UID bill to deal with special cases like whistleblowers and victims of abuse whose identities need to be protected even more carefully.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The UID authority also bypasses the question of whether it is confusing data protection with the larger issue of protection of privacy. A person’s identity is more than her date of birth, surname, religion, fingerprint or even the sum of these. Such information is basically data and allows governments or corporate bodies to provide a person a nominal identity, one that is indispensable if she is to be part of a socio-political system. The state and corporate entities conveniently deny a person her self, thereby reducing her to a subject instead of seeing each individual as a thinking, acting agency.&lt;/p&gt;
&lt;p&gt;Be that as it may, right now the concern of civil society is to make at least protection of data as foolproof as possible. Aadhaar is just one of the projects that pose a threat to the privacy of individual citizens. There is the broader problem of how the Internet and mobile phones, the popularity of social networking sites such as Facebook and Twitter, and the widespread use of credit and debit cards has led to blatant misuse of personal information gathered online, sharing of consumer data without consent and the state’s own Big Brother surveillance. The need for an effective privacy law in India is imperative.&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.bangaloremirror.com/index.aspx?page=article&amp;amp;sectid=81&amp;amp;contentid=20110102201101020220400536210faa"&gt;Bangalore Mirror&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/unique-identity-crisis'&gt;http://editors.cis-india.org/news/unique-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T17:10:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/civic-hackers-in-India">
    <title>Civic hackers seek to find their feet in India</title>
    <link>http://editors.cis-india.org/news/civic-hackers-in-India</link>
    <description>
        &lt;b&gt;In 2006, when Sushant Sinha,who holds a doctorate in Internet security from the University of Michigan, tried to use the Indian government’s judicial rulings website, Judis.nic.in, he found it difficult to get the data he was looking for. “Judis.nic.in didn’t have a good text search or ability to sort results by  relevance,” Sinha said. The lack of these two critical functions rendered the wealth of data on the site largely unusable.&lt;/b&gt;
        
&lt;p&gt;Sinha, who currently works at &lt;strong&gt;Yahoo India&lt;/strong&gt;, set about creating 
the legal search engine Indiankanoon. org, which now has a database of 
more than 1.4 million judgements. It tries to overcome the deficiencies 
of the government’s effort, indexing judgements by the Supreme Court, 
the high courts and various tribunals, and linking them to the 
underlying Acts.&lt;/p&gt;
&lt;p&gt;In November, the portal saw around one million unique visits. Sinha 
is a “civic hacker”, a programmer driven by the urge to create 
applications that will allow fellow citizens to help themselves and 
further the democratic process by using information, often from freely 
available government databases. (A “cracker”, on the other hand, uses 
similar tools to break into secure systems with malicious intent.)&lt;/p&gt;
&lt;p&gt;Nishant Shah, director, research, at the Centre for Internet and 
Society (CIS), Bangalore, offers a wider definition for civic hackers.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“In a Web 2.0 world, you needn’t have programming skills to be a 
civic hacker. When people have access to digital technologies, they are 
potentially civic hackers, because they have learned how to negotiate 
with oppression and injustice. In the West, the ubiquitousness of 
digital technologies has enabled a lot of people to engage with civic 
hacking—from subversive documentaries by the Yes Men group to parodic 
YouTube videos that critique state-market policies— all these qualify as
 civic hacking.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;WikiLeaks, said Shah, is the biggest example of such a civic hacker
 in recent times. “Civic hackers are always in grey territory,” he said.
 “Their legality is always being questioned, depending on how far they 
go. Remember, WikiLeaks was around for five years before they began 
talking about banning it.”&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Much of the online Indian information in the open domain, from the 
government or autonomous bodies such as the Election Commission (EC), 
isn’t always served up such that it can be sliced and diced in ways that
 citizens can digest, making the civic hacker a critical part of the 
democratic process in the digital age.&lt;/p&gt;
&lt;p&gt; A larger presence in the West, they are thin on the ground in the 
country. “Civic hackers, while present (in India), are not numerous, and
 it’s unclear to what extent they are conscious of the work that others 
are doing, although this could be easily remedied through networking 
efforts both online and offline,” according to a report by CIS.&lt;/p&gt;
&lt;div class="pullquote"&gt;One of the reasons for their sparse numbers CIS 
suggests is that the Indian government doesn’t engage yet with the 
hacking community,&lt;/div&gt;
&lt;p&gt;unlike countries such as the US. New York, Washington DC and San 
Francisco, for instance, have portals that share data with the intention
 of encouraging application development.&lt;/p&gt;
&lt;p&gt;The NYC BigApps competition has a cash prize of $20,000 (nearly `9 
lakh) for the best application using the City of New York’s NYC.gov data
 mine. Around 350 data sets including public safety data, buildings 
complaints, and real-time traffic numbers are thrown open to 
participants. In 2009, an application to let New Yorkers findmass 
transit routes, public school information, etc., based on their location
 won the prize.&lt;/p&gt;
&lt;p&gt;Despite the lack of incentives, some hackers are still mushrooming in
 the Indian space. In 2009, just ahead of the April-May general 
election, 25-year-old Akshay Surve, the founder of a think tank for 
social change called SocialSync.org Labs, was building a Web application
 to profile members of Parliament.&lt;/p&gt;
&lt;p&gt;The application was aimed at generating a snapshot of each legislator
 based on the debates they participated in, the number of Parliament 
sessions attended, and other such information that could help voters 
make an informed choice.&lt;/p&gt;
&lt;p&gt;The websites of the EC and the Lok Sabha had much of this data in 
Excel and Adobe PDF documents, but that didn’t necessarily make it 
usable. The formats changed every year, and some files didn’t allow text
 and numbers to be extracted. To build the mashup—an application that 
throws together data from more than one source, mashing everything up to
 create a new service—Surve had to parse and standardize the data.&lt;/p&gt;
&lt;p&gt;Realizing that the problem he faced was not an isolated one, Surve 
and his friend, Pavan Mishra, launched OpenCivic.in this year, a set of 
standards and APIs (application programming interface) that sift data 
from government websites and make them available in a machine-readable, 
remixable format.&lt;/p&gt;
&lt;p&gt;Surve’s API is the primary engine for Askneta.com and Gov-Check.net, 
which track the performance of elected representatives and use 
OpenCivic’s feed. He plans to keep the API free for non-commercial use. 
Now his team is at work to develop a mobile version of the API. Another 
example is RTINation. com, built in August 2009 by a group of graduates 
from the Kanpur and Delhi Indian Institutes of Technology.&lt;/p&gt;
&lt;p&gt;RTINation.com enables the online filing of Right to Information (RTI)
 applications. A 2009 PricewaterhouseCoopers report estimated that more 
than a quarter of those who file RTI applications have to visit a 
government office over three times to do so. RTINation.com generates its
 revenue by charging each user `125 for an application. It is now 
building a backoffice to handle marketing and promotion.&lt;/p&gt;
&lt;p&gt;“Since we launched, we have seen 200,000 unique visitors,” said Rahul
 Gupta, a cofounder of RTINation.com. Most civic hackers in India 
entered the field through work related to various e-governance 
initiatives and the RTI Act, which has put more government data in the 
public domain than ever before. This data, though, is dumped in a format
 that makes it difficult for citizens to use or understand. “Few of the 
publicly accessible databases are open in terms of data reusability (in 
terms of machine-readability and openness of formats), data reusability 
(legally), easily accessible (via search engines, for persons with 
disabilities, etc.), understandable (marked up with annotations&amp;nbsp; and&amp;nbsp; 
etadata),” according to CIS. Here is where civic hackers such as Sinha 
and Surve come in.&lt;/p&gt;
&lt;p&gt;CIS suggests that networking across civic hacking teams could 
strengthen this effort. OpenCivic.in has been proactive in its tie-ups. 
In February, it joined hands with Yes To Politics, a civic participation
 endeavour by Texas-based software engineer Murali M. Launched in 2009, 
Yes To Politics offers tools to help communities work on causes. Among 
these are analytics of previous elections and a tracker of ongoing 
campaigns. During its peak usage in the four weeks leading up to the 
2009 assembly elections in Andhra Pradesh, the website had on an average
 43,000 visitors a day, with a oneday surge of 97,457 visitors on 9 
April that year. Yes To Politics, inactive since last year’s polls, is 
going to launch a new version in January. “Once we do that, we 
contribute our own data feeds to OpenCivic,” said Murali.&lt;/p&gt;
&lt;p&gt;Talking about the challenges, Murali said, “The data sets from the Election Commission’s site were raw and not directly presentable to users. So we had to iteratively transform it and correct (it) on the way and make meaningful sets. It took me almost 
three-and-a-half weeks to get it ready. And when the EC releases any new
 data, they always release in PDF files that are hard to retrieve and 
mashup. So I wrote special apps (applications) to scan files, transform 
data, and automatically correct spelling mistakes in names.” The 
36-year-old software engineer works full-time for Alcatel-Lucent and 
develops the applications when he’s free. Yes To Politics has been 
steadily adding bells and whistles to its portal. Recently, it 
integrated Google Maps into an application called Vote2009, layering it 
with information such as when a constituency is scheduled to have 
elections. “Another example is, due to delimitation, about 77 assembly 
and eight parliamentary constituencies in AP (Andhra Pradesh) have been 
reorganized. We set up a section where users can look at what has 
changed and find their constituency based on mandal and district 
information,” Murali said.&lt;/p&gt;
&lt;p&gt;Read the original article in Livemint &lt;a class="external-link" href="http://epaper.livemint.com/Default.aspx?BMode=100#"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read it in IndiaInfoline &lt;a class="external-link" href="http://www.indiainfoline.com/Markets/News/Civic-hackers-seek-to-find-their-feet-in-India/5037582858"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/civic-hackers-in-India'&gt;http://editors.cis-india.org/news/civic-hackers-in-India&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-04T06:45:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/nel-suk">
    <title>Nel suk dei nativi digitali. Perché gli studenti 2.0 hanno bisogno di una bussola per orientarsi</title>
    <link>http://editors.cis-india.org/news/nel-suk</link>
    <description>
        &lt;b&gt;Addio al vecchio sapere lineare fondato sulla parola scritta e sulla trasmissione di conoscenza maestro-alunno: imparare oggi ha la forma di un suk arabo nell'ora di punta. Tra social network, video-racconti su YouTube, la musica di MySpace, il linguaggio sincopato delle chat e le bufale online, gli studenti di nuova generazione hanno bisogno di una bussola per orientarsi. Ma la scuola non c'è. O meglio, non ce la fa: a studenti 2.0 corrispondono spesso istituti scolastici da secolo scorso.&lt;/b&gt;
        
&lt;p&gt;Chi sono questi famigerati "nativi digitali" nati e cresciuti a rivoluzione Internet compiuta? Come ha scritto l'ex direttore del programma Comparative media studies dell' Mit di Boston, Henry Jenkins, la loro cultura è "partecipativa" e si fonda su "produzione e condivisione di creazioni digitali" e una "partnership informale" tra insegnanti e alunni che porta il bambino a sentirsi responsabile del progetto educativo. Il maestro non è più un trasmettitore di conoscenza ma un "facilitatore", che fa da filtro tra il caos della rete e il cervello del piccolo studente.&lt;/p&gt;
&lt;p&gt;"Frequentano gli schermi interattivi fin dalla nascita", spiega Paolo Ferri docente di tecnologie didattiche e teoria e tecnica dei nuovi media all'Università Bicocca di Milano, "e considerano Internet "il principale strumento di reperimento, condivisione e gestione dell'informazione". È la prima generazione (che oggi ha tra gli o e i 12 anni) veramente hi-tech che pensa, apprende e conosce in maniera differente dai suoi fratelli maggiori.&amp;nbsp; "Se per noi imparare significava leggere-studiare-ripetere, per i bambini cresciuti con i videogames vuol dire innanzitutto risolvere i problemi in maniera attiva", spiega Ferri che studia e promuove da anni il "digital learning".&lt;/p&gt;
&lt;p&gt;I bambini cresciuti con consolle e cellulare sono "abituati a vedere la risoluzione di compiti cognitivi come un problema pragmatico", aggiunge. Lynn Clark direttrice dell' Estlow International Center for Journalism and New Media dell'Università di Denver ha condotto un progetto di ricerca su 300 famiglie americane per capire come se la cavano con i media digitali.&lt;/p&gt;
&lt;p&gt;"Grazie ai videogiochi, il sapere dei bambini si nutre di simboli, sfide e modelli sempre diversi di narrazione", spiega Clark che aggiunge: "quando le modalità di apprendimento scolastico sono simili a quelle di un gioco ci sono maggiori chances che gli alunni apprendano volentieri e in fretta". "Se qualcosa può essere visto, ascoltato, suonato, perché dovrebbe essere raccontato a parole?", si chiede Paolo Ferri.&lt;/p&gt;
&lt;p&gt;Nishant Shah, che a 26 anni dirige il Center for Internet and Society di Bangalore in India, lo spiega così via Skype: "La tecnologia dei nostri padri è quella televisiva: un modello analogico che stabilisce ruoli, responsabilità e struttura della produzione, diffusione e consumo di conoscenza. Con l'esplosione del p2p - l'idea di una rete dove non esiste gerarchia e tutto viene condiviso- i ruoli sono messi in discussione dallo studente, che si considera parte attiva nella produzione di sapere e vede i libri come una fonte tra le tante".&lt;/p&gt;
&lt;p&gt;Se è vero che il "l'ha detto Internet" ha assunto tra i bambini l'autorevolezza di una sentenza della Cassazione, è innegabile che la rete sia la patria del vero-simile. "Internet sta ridisegnando i confini della verità - continua Shah - e questo pone grandi sfide per gli educatori del XXI secolo: come si fa a imparare utilizzando fonti che non hanno approvazione istituzionale? Come si può riconoscere un valido provider di conoscenza nel caos online?".&lt;/p&gt;
&lt;p&gt;Anche il professore della Bicocca ammette che "la cut-and-paste culture e la presunzione di veridicità della Rete" tendono ad abbassare la percezione critica degli utenti: "Internet diventa per i bambini "la fonte" a prescindere dall'autorevolezza del sito e da chi scrive", dice.&lt;/p&gt;
&lt;p&gt;Se passa il modello Wikipedia, crolla l'importanza dell'autore. O, come ha scritto l'antropologa Susan D. Blum sul New York Times, "se per lo studente non è fondamentale essere unico, va bene usare parole di altri. Dice cose a cui non crede? Allora è ok scrivere testi su argomenti sconosciuti con l'unico scopo di prendere un buon voto: conoscere è diventato un mezzo per ottenere consensi e socialità".&lt;/p&gt;
&lt;p&gt;Per il momento le iniziative più interessanti di digital learning riguardano i fratelli più grandi. Dal prossimo anno in 2500 campus universitari americani arriverà un software per pc, iPad e telefonini (il costo va dai 30 ai 70 dollari e il maggiore produttore è la Turning Technologies) chiamato "clickers", che permette all'insegnante di verificare il livello di attenzione dello studente - immerso nella navigazione internet - chiedendo feedback sulla tastiera ogni 15 minuti. Il professore di Harvard Charles Nesson ha tenuto un corso virtuale su Second Life, mentre il progetto di educazione civica "YouMedia", sponsorizzato dall'amministrazione di Chicago, promuove l'apprendimento attraverso video-racconti pubblici di libri.&lt;/p&gt;
&lt;p&gt;Nella Woodside High School, in California, gli studenti hanno borse di studio per comprare l'iPad, un centro multimediale da tre milioni di dollari e lezioni su come registrare la musica e usare Internet in maniera responsabile. Grazie ai computer economici del guru informatico Nicholas Negroponte, tutti i bambini uruguaiani delle elementari hanno un pc.&lt;/p&gt;
&lt;p&gt;In Europa - che ha messo la competenza digitale al quarto posto (dopo prima lingua, lingua straniera e matematica e scienze) tra le competenze chiave per l'educazione degli stati membri dell'Unione - il paese più "nativi digitali oriented" è l'Inghilterra, dove la riforma del sistema scolastico voluta dal governo Blair ha ridotto drasticamente il numero degli studenti per classi, favorendo così la personalizzazione dell'insegnamento, e tagliato il numero delle materie. "Sono passati- sottolinea Paolo Ferri - da un modello disciplinare basato sui contenuti a quello per competenze che si regge su un principio: imparare ad imparare". Ferri ricorda che la lavagna interattiva è presente nel 100% delle classi primarie e secondarie inglesi mentre in Italia si punta ad averne una su dieci entro il 2011. Qui la strada è ancora tutta in salita.&lt;/p&gt;
&lt;p&gt;Il ministero dell'Istruzione porta avanti il progetto LIM, che riguarda l'introduzione di lavagne interattive nelle aule, e quello Cl@ssi 2.0 che punta a finanziare con 30mila euro 156 classi (in Italia ci sono circa 25mila scuole) delle scuole medie inferiori per lo sviluppo di progetti innovativi. "C'è una grande carenza di investimenti dall'alto - denuncia Ferri - arginata da qualche dirigente di buona volontà". Per il professore della Bicocca è a livello territoriale, grazie all'autonomia scolastica e alle capacità manageriali e creative di qualche preside, che si vedono i migliori esperimenti.&lt;/p&gt;
&lt;p&gt;A Bollate, un comune di 37 mila abitanti alle porte di Milano, per imparare a usare l'iPad basta chiedere aiuto a un bambino. Nelle aule dell'Istituto di via Brianza - due scuole elementari e due medie inferiori - al posto di quadernetti e matite, da settembre gli alunni usano il tablet computer prodotto dalla Apple.&lt;/p&gt;
&lt;p&gt;Qualche centinaia di chilometri più a Sud, a Reggio Emilia - la città dove tutti vorrebbero avere 3 anni per quel "Reggio Approach", lodato dal New York Times (parole d'ordine: arte, assemblee di classe e respiro globale), che ha fatto guadagnare al capoluogo emiliano il titolo di capitale mondiale degli asili nido - software, dispositivi elettronici e lavagne interattive hanno ormai sostituito seggioloni e orsacchiotti.&lt;/p&gt;
&lt;p&gt;Bollate e Reggio non sono residui di una bizzarra avanguardia pedagogica, il cui simbolo cinematografico è ancora "Bianca" di Nanni Moretti, con le vicende della scuola "Marylin Monroe" dove al posto della foto del presidente della Repubblica c'e' Dino Zoff e i professori giocano alle slot machines e al flipper. Dimostrano piuttosto che ci sono, anche in Italia, presidi e maestri che hanno capito chi sono e come si educano i nativi digitali.&lt;/p&gt;
&lt;p&gt;"Ma il risultato è quella di una cartina dell'innovazione a macchia di leopardo", dichiara Ferri, che tuttavia si dice ottimista. Da un lato perché "nel 2013 andrà in pensione la metà degli insegnanti italiani", dall'altro perché crede nel contagio positivo: "In 10 anni le scuole al passo con le trasformazioni sociali e tecnologiche, e per questo premiate con finanziamenti e alto numero di iscrizioni, avranno costretto le altre ad adeguarsi". Una speranza? No, un dovere. Perché "innovare innovare innovare", il famoso mantra di Hal Varian di Google News, è l'unica chance di sopravvivenza anche per la scuola italiana.&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://www.ilsole24ore.com/art/cultura/2011-01-01/nativi-digitali-151924.shtml?uuid=AYcB4RwC"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/nel-suk'&gt;http://editors.cis-india.org/news/nel-suk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:31:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/tweet-and-poke">
    <title>A Tweet and a poke from the CEO</title>
    <link>http://editors.cis-india.org/news/tweet-and-poke</link>
    <description>
        &lt;b&gt;The official grapevine has moved online, and Twitter is the new water-cooler.&lt;/b&gt;
        
&lt;p&gt;The office grapevine has moved online, and Twitter is the new water cooler.&amp;nbsp; Social media may be all the rage, and every company may want in, but for the majority of Indian companies grappling with the phenomenon, it is proving too tempestuous a beast to control.&lt;/p&gt;
&lt;p&gt;From India alone, for instance, 18 million unique visitors logged on to Facebook in May, each of them posting multiple status messages that often dealt with their places of work. Ban these practices all you like, experts say, but employees will still find ways to log on to social media. Better, then, to ride the wave rather than risk going down with it.&lt;/p&gt;
&lt;p&gt;Some Indian companies have already begun to learn this the hard way. When Infosys Technologies Ltd announced its IRace (Infosys Role and Career Enchancement) programme in April, changing the company’s hierarchy drastically, disgruntled employees lashed out at their company on blogs and Facebook.&lt;/p&gt;
&lt;p&gt;“The company couldn’t do much then, because they didn’t have a social media policy in place,” says Mahesh Murthy, CEO of Pinstorm Consulting and a social media expert. Murthy mentions another large financial services firm that fired employees for commenting on Orkut about internal incentive programmes.&lt;/p&gt;
&lt;p&gt;The time has arrived, then, for companies to institute social media policies—to define, in a sense, what sort of tweet is appropriate and what will earn a black mark. But Indian firms trying to do just this are emerging with very mixed results.&lt;/p&gt;
&lt;p&gt;There are, on the one hand, the fast adopters. Technology and media companies that were the first to run head-on into social media were also, not surprisingly, the first to put basic guidelines in place.&lt;/p&gt;
&lt;p&gt;Wipro Ltd and HCL Technologies Ltd not only have social media policies, they also promote communication and events for their employees on these media. A couple of months ago, the Spirit of Wipro run was promoted in real-time on Twitter and on its official Facebook page. “Wipro became one of the first companies to hold a Twitter conference, for our joint CEO to discuss our diversity initiatives,” says Rajan Kohli, Wipro’s chief marketing officer.&lt;/p&gt;
&lt;p&gt;Also Read The Future of the Internet (&lt;a class="external-link" href="http://www.livemint.com/articles/keywords.aspx?kw=India%20Internet"&gt;Complete Series&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;HCL has named digital ambassadors who use their social networks and online personas to share ideas and help the company reach out. In HCL’s annual exercise to articulate the company’s vision, employees communicate with the CEO through Facebook. Infosys has formulated its own social media policy now, and is preparing to roll it out over the next six months.&lt;/p&gt;
&lt;p&gt;The other early adopter has been the media sector. As traditional media houses have started to build digital presences, conglomerates such as HT Media Ltd and Bennet, Coleman and Co. Ltd specify what a journalist’s digital avatar can and cannot say online. (Mint has an extensive social media policy for its employees.) Print journalists typically cannot reveal their employer on their Facebook or Twitter pages, or post original opinions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;But here’s the catch with such a strategy: The Internet is a hard place to be anonymous. “If you are a well-known writer, even if you don’t identify yourself, people can easily put two and two together,” says Nishant Shah, of the Centre for Internet and Society (CIS). “Policies like that are hard to implement and don’t really make sense.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To be sure, there are exceptions; Open, the weekly magazine, looks at Facebook and Twitter as channels to direct traffic to its online content. “We have no policy of employees not identifying themselves on social media or associating themselves with the magazine,” says Rajesh Jha, a deputy editor at &lt;em&gt;Open&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Another surprisingly prompt responder to social media trends has been the education sector. While most institutions don’t have restrictive policies for public platforms such as Facebook, Twitter and blogs, some have gone in a different direction and created closed networks. Shah argues that a closed network has the same features—and issues—as open social media.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“These are again peer-to-peer platforms, where teachers and students interact with each other, and any communication has a large audience and gets recorded for posterity,” he says. “This makes it as much of a social medium as Facebook or Twitter.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Bangalore’s Christ University has created an institutional repository for every single submission made by students and faculty. Test grades and lesson plans are posted online, and students and teachers communicate through the system. The Indian Institute of Management, Bangalore, has completely digitized its classrooms, so that write-ups on every lesson are available online. Students and teachers co-develop curricula through its platform as well.&lt;/p&gt;
&lt;p&gt;One sector that has been slow to respond to these trends is the outsourcing sector. With annual attrition rates of 50-60%, these firms focus more on turnaround than on investment. Social media websites are typically banned altogether in call centres.&lt;/p&gt;
&lt;p&gt;As social media evolves, ways to leverage it do as well. Large telecom firms such as Bharti Airtel Ltd, Tata Teleservices Ltd and Alcatel-Lucent use Facebook for research and development. Supriya Dhanda, Alcatel-Lucent’s head of human resources, says that her firm encourages “senior leaders...to keep blogs active and use them to promote key messages on strategy, people and operating mechanisms”.&lt;/p&gt;
&lt;p&gt;In the US, a couple of smaller firms have been able to harness social media in innovative ways. Best Buy, an electronics retail chain, aggregates employee activity online, whether on blogs or Twitter, onto a platform called Best Buy Connect. Zappos, which sells shoes and bags online, has a similar Twitter aggregation tool that pulls any tweet mentioning the company. Employees are encouraged to post on the firm’s Facebook and YouTube pages, and its CEO, Tony Hsieh, has at least a million followers on Twitter.&lt;/p&gt;
&lt;p&gt;But Murthy doesn’t necessarily think that Indian firms need to follow in the wake of US firms such as Intel, IBM and CNN, which have clearly defined social media policies. “First, the US is a litigious country and most social media policies there are circumscribed by what corporate lawyers allow employees to say and not say,” he says. “Two, Indian firms can actively use social media as a global marketing tool, especially because it involves no media costs. In the US, firms still look at it largely as a...customer-service function.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Shah adds that India doesn’t have a clearly installed legal privacy framework, unlike the US or Australia. “What is public space and what is private is still largely a subject of interpretation,” Shah says. “So we will evolve our own path.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in Livemint &lt;a class="external-link" href="http://www.livemint.com/2010/12/30212513/A-Tweet-and-a-poke-from-the-CE.html?h=B"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/tweet-and-poke'&gt;http://editors.cis-india.org/news/tweet-and-poke&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:30:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/about/newsletters/december-2010-bulletin">
    <title>December 2010 Bulletin</title>
    <link>http://editors.cis-india.org/about/newsletters/december-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! It gives us immense pleasure to present regular updates on the progress of our research on the mainstream Internet media. In this issue of we bring our latest project updates, news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs arising from these projects are now online for public review:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pornography &amp;amp; the Law&lt;/b&gt;&lt;br /&gt;This monograph attempts to unravel the relations between pornography, technology and the law in the shifting context of the contemporary. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/f1sQsi"&gt;&lt;br /&gt;http://bit.ly/f1sQsi&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Re:wiring Bodies&lt;br /&gt;&lt;/b&gt;Dr. Asha Achutan historicises the attitudes, imaginations and policies that have shaped the Science-Technology debates in India, to particularly address the ways in which emergence of Internet Technologies have shaped notions of gender and body in India. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/gYCP1C"&gt;&lt;br /&gt;http://bit.ly/gYCP1C&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Leap of Rhodes or, How India Dealt with the Last Mile Problem — An Inquiry into Technology and Governance&lt;/b&gt;&lt;br /&gt;The project has fed into many different activities in teaching, in examining processes of governance and in looking at user behaviour. The deadline for peer review expires on 15 Jan 2011.&lt;a href="http://bit.ly/iiYJp1"&gt;&lt;br /&gt;http://bit.ly/iiYJp1&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Internet, Society and Space in Indian Cities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h3lWzS"&gt;From the Stock Market to Neighbourhood Mohalla&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hU6GTL"&gt;Transforming Urbanscapes: ATM in cities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Queer Histories of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hqrjqc"&gt;A Detour: The Internet and Forms of Narration: A Short Note&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity.&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following articles were published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/ig08Dr"&gt;Make a Wish&lt;/a&gt; [published on 19 December 2010]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hRHUYu"&gt;Play Station&lt;/a&gt; [published on 5 December 2010]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. Open Call and FAQs for the workshop are online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/emKslL"&gt;Digital Natives with a Cause? Workshop in Santiago – An Open Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eCu2it"&gt;Digital Natives with a Cause? Workshop in Santiago – Some FAQs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Publication&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Position papers from the Thinkathon conference held at Hague from 6 to 8 December have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eVYR2h"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;National Award&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nirmita Narasimhan got a National Award for Empowerment of Persons with Disabilities from the Government of India on 3 December 2010. The award was presented by Smt. Pratibha Patil, President of India under the Role Model category. The event was telecast live on Doordarshan.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fKG9MH"&gt;Nirmita Narasimhan wins National Award&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Conference Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An international conference on Enabling Access to Education through ICT was held in New Delhi from 27 to 29 October 2010. The full report of the conference is published online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eDHXyq"&gt;Enabling Access to Education through ICT - Conference Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://goo.gl/ddMBN"&gt;Accessibility at CIS – Looking back at 2010&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/igUi8H"&gt;G3ict-GW Global Policy Forum: "ICT Accessibility: A New Frontier for Disability Rights"&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Copyright, patents and trademarks are the most important components on the Internet. CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/glBYTS"&gt;Problems Remain with Standing Committee's Report on Copyright Amendments&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hq9OZO"&gt;CIS Submission on Draft Patent Manual 2010&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software, its latest involvement have yielded these results:&lt;/p&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eKUKIY"&gt;Call for Comments for Report on the Online Video Environment in India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://goo.gl/wr8Td"&gt;Call for Comments for Report on Open Government Data in India&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hQAUkg"&gt;Wikipedia Meetup in Bangalore, This time in TERI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a couple of projects, one Privacy in Asia which is supported by Privacy International, UK and the other on Privacy and Identity which is funded by Ford Foundation and managed by the Centre for Study of Culture and Society. The project is a research inquiry into the history of privacy in India and how it shapes the contemporary debates around technology mediated identity projects like &lt;i&gt;Aadhar&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hYUmVK"&gt;The Privacy Rights of Whistleblowers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hcP9lI"&gt;UID &amp;amp; Privacy - A Call for Papers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/esjtL7"&gt;Should Ratan Tata be Afforded the Right to Privacy?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h0Vdz3"&gt;DSCI Information Security Summit 2010 – A Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fNADQo"&gt;Take 'Model T' for Telecom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/h8TJwF"&gt;An online community platform for people with different needs&lt;/a&gt; (Sify News, 12 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fF3Y6V"&gt;Self-regulation in media and society meet to gain legal perspectives&lt;/a&gt; (Indiantelevision.com, 13 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/e3gZGz"&gt;This Is All India Radia&lt;/a&gt; (Outlook, 6 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gYrF7h"&gt;'Pakistan' hackers target India's top police agency&lt;/a&gt; (Google News, 4 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gBMFzY"&gt;Intellectual Property Rights as seen in a graphic novel&lt;/a&gt; (TimeOut Bengaluru, 1 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fa4qcy"&gt;The Niira Radia Tapes: Scrutinizing the Snoopers&lt;/a&gt; (The Wall Street Journal, 29 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gWEkKw"&gt;Mobile banking set to get a boost from IMPS&lt;/a&gt; (The Hindu, 28 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gjyNbF"&gt;UID elicits mixed response&lt;/a&gt; (Deccan Herald, 23 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hcrAd2"&gt;Time to bury e-mail?&lt;/a&gt; (DNA, 21 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/about/newsletters/december-2010-bulletin'&gt;http://editors.cis-india.org/about/newsletters/december-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T11:28:02Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/privacy-matters">
    <title>Privacy matters</title>
    <link>http://editors.cis-india.org/events/privacy-matters</link>
    <description>
        &lt;b&gt;Privacy India invites individuals to attend “Privacy Matters”, a one-day conference on 23 January 2011 at the WB National University of Juridical Sciences (NUJS) Law School in Kolkata.  Privacy India, Society in Action Group and the Centre for Internet &amp; Society have joined hands to organize this.&lt;/b&gt;
        
&lt;p&gt;The conference will focus on discussing the challenges to privacy that India is currently facing. The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, e.g., the TRAI Act for telephony or RBI Guidelines for Banks, India does not as yet have a &lt;em&gt;horizontal&lt;/em&gt; legislation that deals comprehensively with privacy across all contexts. This lack of uniformity has led to ironically imbalanced results. In India today one has a stronger right to privacy over telephone records than over one’s own medical records.&amp;nbsp; The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. – people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;The emergence of information and communications technologies over the past two decades has radically transformed the speed and costs of access to information. However, this enhanced climate of access to information has been a mixed blessing. Whilst augmenting our access to knowledge, this new networked information economy has also now made it much easier, quicker, and cheaper to gain access to intimate personal information about individuals than ever before. As people expose more and more of their lives to others through the use of social networks, reliance on mobile phones, global trade, etc., there has emerged a heightened risk of privacy violations in India.&amp;nbsp; As privacy continues to be a growing concern for individuals, nations, and the international community, it is critical that India understands and addresses the questions, challenges, implications and dilemmas that violations of privacy pose.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt;Privacy India was set up in collaboration with the Centre for Internet &amp;amp; Society (CIS), Bangalore and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International’.&amp;nbsp; Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies and the media and the public in a number of countries (see www.privacyinternational.org).&amp;nbsp; Its Advisory Board is made up of distinguished intellectuals, academicians, thinkers and activists such as Noam Chomsky, the late Harold Pinter, and others, and it has collaborated with organizations such as the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="http://editors.cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;poster&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;" Privacy Matters" Conference Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time &lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Item&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:30 &lt;br /&gt;11:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome: Rajan Gandhi&lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Who is PI &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;What are our objectives &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;Why is privacy important in India &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 &lt;br /&gt;11:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote: Sudhir Krishnaswamy&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30&amp;nbsp; 11:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 &lt;br /&gt;1:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Session I: Prashant Iyengar and Elonnai Hickok &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Personal privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Case study: Nira Radia and wiretapping &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
b.&amp;nbsp;&amp;nbsp; &amp;nbsp;Informational privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Case study: The proposed data protection legislation in India &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
c.&amp;nbsp;&amp;nbsp; &amp;nbsp;What is the existing vacuum in Indian legislation&amp;nbsp; concerning&amp;nbsp; privacy &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00&amp;nbsp; &lt;br /&gt;2:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;br /&gt;3:30&lt;/td&gt;
&lt;td&gt;Session II: Prashant Iyengar, Deva Prasad, Amba Kak &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Identity and privacy: why does it matter &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;International approaches to identity &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;The UID and privacy &amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30 &lt;br /&gt;3:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 &lt;br /&gt;4:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Open discussion and opinion sharing&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://editors.cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;VIDEOS&lt;br /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkt04A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkukgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKmo38A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKm4S0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn3R8A"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/privacy-matters'&gt;http://editors.cis-india.org/events/privacy-matters&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:22:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
