<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2031 to 2045.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/odia-wikipedia-workshop-at-vssut-coverage-in-sambad"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/coverage-of-odia-wikipedia-workshop-in-sambad-july-26-27-2013"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-kings-school-july-26-2013-whats-and-hows-of-wiki"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/free-software"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/resources/jammu-kashmir-notifications"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/resources/himachal-pradesh-govt-notifications"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-2.zip"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-1.zip"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/odia-wikipedia-workshop-at-vssut-coverage-in-sambad">
    <title>Odia Wikipedia Workshop at VSSUT, Burla (Coverage in the Sambad)</title>
    <link>http://editors.cis-india.org/news/odia-wikipedia-workshop-at-vssut-coverage-in-sambad</link>
    <description>
        &lt;b&gt;An Odia Wikipedia workshop was organized on July 26 and 27, 2013 at Veer Surendra Sai University of Technology, Burla. The Sambad (Sambalpur edition) covered the event.&lt;/b&gt;
        &lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Below is a scanned version of the news published in the Sambad on July 27, 2013:&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/OdiaWikipediaCoverage.jpg" alt="Sambad Article" class="image-inline" title="Sambad Article" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Click below for more details:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Link to event page: &lt;a class="external-link" href="http://bit.ly/14VdEdG"&gt;http://bit.ly/14VdEdG &lt;/a&gt;(CIS has been credited for financial support).&lt;/li&gt;
&lt;li&gt;Link to the report on mailing lists: &lt;a class="external-link" href="http://bit.ly/1eWsKyl"&gt;http://bit.ly/1eWsKyl&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/odia-wikipedia-workshop-at-vssut-coverage-in-sambad'&gt;http://editors.cis-india.org/news/odia-wikipedia-workshop-at-vssut-coverage-in-sambad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-19T08:51:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/coverage-of-odia-wikipedia-workshop-in-sambad-july-26-27-2013">
    <title>ଉଇକିପିଡ଼ିଆ:ମେଳଣ/ବୁର୍ଲା (ସମ୍ବଲପୁର)</title>
    <link>http://editors.cis-india.org/news/coverage-of-odia-wikipedia-workshop-in-sambad-july-26-27-2013</link>
    <description>
        &lt;b&gt;There was a news coverage on The Sambad, Sambalpur edition about the Odia Wikipedia workshop organized on July 26 and 27, 2013 at Veer Surendra Sai University of Technology, Burla. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Centre for Internet and Society &lt;a class="external-link" href="http://or.wikipedia.org/s/gqw"&gt;has been credited for financial support&lt;/a&gt;. Click to &lt;a class="external-link" href="http://lists.wikimedia.org/pipermail/wikipedia-or/2013-August/000435.html"&gt;see the report&lt;/a&gt; on the mailing list.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;ସମ୍ବଲପୁରର ବୁର୍ଲାଠାରେ ଥିବା "ବୀର ସୁରେନ୍ଦ୍ରସାଏ ବୈଷୟିକ ବିଶ୍ୱବିଦ୍ୟାଳୟ"ରେ ୨୬ ଓ  ୨୭ ଜୁଲାଇ ୨୦୧୩ (ଶୁକ୍ରବାର, ଶନିବାର) ଦିନ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ଏକ କର୍ମଶାଳା  ଅନୁଷ୍ଠିତ ହୋଇଯାଇଛି ।&lt;/p&gt;
&lt;h2&gt;&lt;span class="mw-headline" id=".E0.AC.95.E0.AC.B0.E0.AD.8D.E0.AC.AE.E0.AC.B6.E0.AC.BE.E0.AC.B3.E0.AC.BE.E0.AC.B0_.E0.AC.AC.E0.AC.BF.E0.AC.B7.E0.AD.9F.E0.AC.AC.E0.AC.B8.E0.AD.8D.E0.AC.A4.E0.AD.81"&gt;କର୍ମଶାଳାର ବିଷୟବସ୍ତୁ&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ଉପ‌ଯୋଗିତା&lt;/li&gt;
&lt;li&gt;ଓଡ଼ିଆ ଉଇକିପଡ଼ିଆରେ ସାଧାରଣ ସମ୍ପାଦନା&lt;/li&gt;
&lt;li&gt;ମୁକ୍ତ ଜ୍ଞାନ ବିତରଣର ଉପାଦେୟତା&lt;/li&gt;
&lt;li&gt;&lt;a class="mw-redirect" href="http://or.wikipedia.org/wiki/%E0%AC%89%E0%AC%87%E0%AC%95%E0%AC%BF%E0%AC%AA%E0%AC%BF%E0%AC%A1%E0%AC%BC%E0%AC%BF%E0%AC%86:WPOP" title="ଉଇକିପିଡ଼ିଆ:WPOP"&gt;"ଉଇକିପ୍ରକଳ୍ପ ଓଡ଼ିଶାର ସ୍ଥାନ"&lt;/a&gt; ଗଣ-ସମ୍ପାଦନା&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span class="mw-headline" id=".E0.AC.95.E0.AC.B0.E0.AD.8D.E0.AC.AE.E0.AC.B6.E0.AC.BE.E0.AC.B3.E0.AC.BE_.E0.AC.AC.E0.AC.BF.E0.AC.AC.E0.AC.B0.E0.AC.A3.E0.AD.80"&gt;କର୍ମଶାଳା ବିବରଣୀ&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;ସମ୍ବଲପୁରର ବୁର୍ଲାଠାରେ ଥିବା ‘ବୀର ସୁରେନ୍ଦ୍ରସାଏ ବୈଷୟିକ ବିଶ୍ୱବିଦ୍ୟାଳୟ(ଭିସୁଟ)’  ର ଗୋଲ୍ଡ଼େନ ଜୁବୁଲୀ ସେମିନାର ହଲ ପରିସରରେ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆ ସମ୍ବନ୍ଧରେ ଏକ  କର୍ମଶାଳା ଅନୁଷ୍ଠିତ ହୋଇଯାଇଛି । ବିଶ୍ୱବିଦ୍ୟାଳୟର ୧୦୦ରୁ ଉର୍ଦ୍ଧ୍ୱ ଛାତ୍ରଛାତ୍ରୀ  ଏହି କର୍ମଶାଳାରେ ଭାଗ ନେଇ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆ ବ୍ୟବହାର ସଂପର୍କରେ ଜ୍ଞାନ ଅର୍ଜନ  କରିଥିଲେ । ବିଶ୍ୱବିଦ୍ୟାଳୟର ପୁରାତନ ଛାତ୍ର ତଥା ସକ୍ରିୟ ଓଡ଼ିଆ ଉଇକିଆଳି ଗୋର୍ବାଚୋଭ  ପୋଥାଳଙ୍କ ତତ୍ୱାବଧାନରେ ଏହି କର୍ମଶାଳା ଆୟୋଜିତ ହୋଇଥିଲା ଏବଂ ଉପସ୍ଥିତ ସମସ୍ତଙ୍କୁ  ଉଇକିପିଡ଼ିଆ ସଂପର୍କରେ ସବିଶେଷ ବିବରଣୀ ପ୍ରଦାନ କରାଯାଇଥିଲା । ସେ କହିଥିଲେ ଯେ,  ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆ ଓଡ଼ିଆ ଭାଷାରେ ଇଣ୍ଟରନେଟ୍‌ରେ ଉପଲବ୍ଧ ଏକ ଖୋଲା ଜ୍ଞାନକୋଷ ।  ଏହାକୁ ବ୍ୟବହାର କରି ଜଣେ କିପରି ନିଜର ଗବେଷଣା ଦକ୍ଷତା ବିକାଶ ଓ ମାଗଣା ଜ୍ଞାନର  ବିତରଣ କରିପାରିବ, ସେହି ବିଷୟରେ ଆଲୋଚନା କରିଥିଲେ । ଏହା ବ୍ୟତୀତ ଓଡ଼ିଆ  ଉଇକିପିଡ଼ିଆର ଇତିହାସ, ଆଭିମୁଖ୍ୟ, ଉଇକିପିଡ଼ିଆରେ ବର୍ତ୍ତମାନ ଚାଲୁଥିବା ବିଭିନ୍ନ  ପ୍ରକଳ୍ପ ବିଷୟରେ ସବିଶେଷ ଆଲୋଚନା କରିଥିଲେ ଓ କହିଥିଲେ ଓଡ଼ିଆରୁ ଦୂରେଇ ଯାଉଥିବା  ଲୋକଙ୍କୁ ଓଡ଼ିଆମୁଖୀ କରାଇବାର ଏହା ଅନ୍ୟତମ ପ୍ରଚେଷ୍ଟା । ଶ୍ରୀ ପୋଥାଳ ନିଜର ବକ୍ତବ୍ୟ  ଦେଇ ସାରିବା ପରେ ଉଇକିପିଡ଼ିଆ ସମ୍ବନ୍ଧରେ ଛାତ୍ରଛାତ୍ରୀଙ୍କର ବିଭିନ୍ନ ପ୍ରଶ୍ନର  ଉତ୍ତର ଦେଇଥିଲେ । ଏହା ପରେ କର୍ମଶାଳରେ ସେ ଉଇକିପିଡିଆରେ ନୂତନ ପ୍ରସଙ୍ଗ ଲେଖିବା,  ସମ୍ପାଦନା କରିବା, ଆଧାର ଦେବା ଇତ୍ୟାଦିର ପ୍ରଶିକ୍ଷଣ ଦେଇ ଏକ ଗଣ-ସମ୍ପାଦନା ଆୟୋଜନ  କରିଥିଲେ । କର୍ମଶାଳାରେ ବିଶ୍ୱବିଦ୍ୟାଳୟର ପ୍ରାଧ୍ୟାପକ ଡ. ଅମରନାଥ ନାୟକ, ଡ଼ ବିଭୂତି  ଭୂଷଣ ପାଣି, ଡ଼. ଅକ୍ଷୟ କୁମାର ପଟ୍ଟନାୟକ, ଡ. ଜ୍ୟୋତି ରଞ୍ଜନ ମହାନ୍ତି ପ୍ରମୁଖ  ଉପସ୍ଥିତ ଥିଲେ । କର୍ମଶାଳାର ସଫଳ ପରିଚାଳନା ପାଇଁ ଛାତ୍ର ପ୍ରତିନିଧି ଅବିନାଶ କୁମାର  ପୁହାଣ, ସୁପ୍ରଜ୍ଞାନ ପଟ୍ଟନାୟକ, ସୁଭମ ସାହୁ, ସୋମ୍ୟଶ୍ରୀ ଋତୁପର୍ଣ୍ଣୋ ସାହୁ, ଅନନ୍ୟା  ସୃଷ୍ଟି ଶତପଥୀ ସାହାଯ୍ୟ କରିଥିଲେ ।&lt;/p&gt;
&lt;h2&gt;&lt;span class="mw-headline" id=".E0.AC.86.E0.AC.B0.E0.AD.8D.E0.AC.A5.E0.AC.BF.E0.AC.95_.E0.AC.B8.E0.AC.B9.E0.AC.BE.E0.AD.9F.E0.AC.A4.E0.AC.BE"&gt;ଆର୍ଥିକ ସହାୟତା&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;କାର୍ଯ୍ୟକ୍ରମର ସଫଳ ପରିଚାଳନା ନିମନ୍ତେ "ସେଣ୍ଟର ଫର ଇଣ୍ଟରନେଟ ଏଣ୍ଡ ସୋସାଇଟି -  ଆକ୍ସେସ ଟୁ ନଲେଜ" ତରଫରୁ ଟ.୨,୦୦୦/- ର ଆର୍ଥିକ ସହାୟତା ପ୍ରଦାନ କରାଯାଇଥିଲା ।&lt;/p&gt;
&lt;h2&gt;&lt;span class="mw-headline" id=".E0.AC.AF.E0.AD.8B.E0.AC.97.E0.AC.A6.E0.AD.87.E0.AC.87.E0.AC.A5.E0.AC.BF.E0.AC.AC.E0.AC.BE_.E0.AC.AA.E0.AD.81.E0.AC.B0.E0.AD.81.E0.AC.96.E0.AC.BE_.E0.AC.89.E0.AC.87.E0.AC.95.E0.AC.BF.E0.AC.86.E0.AC.B3.E0.AC.BF"&gt;ଯୋଗଦେଇଥିବା ପୁରୁଖା ଉଇକିଆଳି&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://or.wikipedia.org/wiki/%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Gorvachove" title="ବ୍ୟବହାରକାରୀ:Gorvachove"&gt;ଗୋର୍ବାଚୋଭ ପୋଥାଳ&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Chetana_pradhan&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Chetana pradhan (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଚେତନା ପ୍ରଧାନ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Nianmeshi&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Nianmeshi (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ନିଆନ ମେଶି&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Pratik921&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Pratik921 (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ପ୍ରତୀକ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Srinandan124&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Srinandan124 (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଶ୍ରୀନନ୍ଦନ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Ksmohanty&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Ksmohanty (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;କୁମାର ସୌରଭ ମହାନ୍ତି&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Debasis.panda&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Debasis.panda (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଦେବାସିସ ପଣ୍ଡା&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Ashishkchoudhury&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Ashishkchoudhury (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଆଶିଷ କୁମାର ଚୌଧୁରୀ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Debrajoram143&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Debrajoram143 (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଦେବରାଜ ଓରାମ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Abinash_kumar_puhan&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Abinash kumar puhan (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଅବିନାଶ କୁମାର ପୁହାଣ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Abinash.srichandan&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Abinash.srichandan (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଅନିନାଶ ଶ୍ରୀଚନ୍ଦନ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Chicku.1994&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Chicku.1994 (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ଗୁରୁକଲ୍ୟାଣ ମହାନ୍ତି&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Sameer9437&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Sameer9437 (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ସମୀର ରଞ୍ଜନ ସାହୁ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="new" href="http://or.wikipedia.org/w/index.php?title=%E0%AC%AC%E0%AD%8D%E0%AD%9F%E0%AC%AC%E0%AC%B9%E0%AC%BE%E0%AC%B0%E0%AC%95%E0%AC%BE%E0%AC%B0%E0%AD%80:Hitenbehera&amp;amp;action=edit&amp;amp;redlink=1" title=" ବ୍ୟବହାରକାରୀ:Hitenbehera (ପୃଷ୍ଠାଟି ନାହିଁ)"&gt;ହିତେନ କୁମାର ବେହେରା&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/coverage-of-odia-wikipedia-workshop-in-sambad-july-26-27-2013'&gt;http://editors.cis-india.org/news/coverage-of-odia-wikipedia-workshop-in-sambad-july-26-27-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-05T08:04:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013">
    <title>Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act  in India</title>
    <link>http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013</link>
    <description>
        &lt;b&gt;The Research Center of Media and Communication at the University of Hamburg organized the Summer School 2013 at Hamburg, Germany from July 29 to August 2, 2013. Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act  in India".&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Summer School Book of Abstracts/Information brochure can be &lt;a class="external-link" href="http://repeatremixremediate.files.wordpress.com/2013/06/rrremediate_brochure_web.pdf"&gt;downloaded here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This year’s Summer School offered by the Research Center of Media and  Communication at the University of Hamburg picked up upon a crucial  issue for current media development – a topic relevant to academia,  media practice and media policy. In the age of digitisation, the  landscape of media and communications is being increasingly influenced  by phenomena that can be viewed as reappropriations of previously  published media communications. The Summer School pursued central  questions about the kinds of reappropriated media communications that were being developed and the relationship between ‘old’ and ‘new’ shaping  them. This repurposing was analysed from four different  perspectives: repurposing as recombination, as reactualisation, as  piracy and as plagiarism.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013'&gt;http://editors.cis-india.org/news/repeat-remix-remediate-summer-school-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T10:19:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-kings-school-july-26-2013-whats-and-hows-of-wiki">
    <title>Whats &amp; Hows of Wiki </title>
    <link>http://editors.cis-india.org/news/the-kings-school-july-26-2013-whats-and-hows-of-wiki</link>
    <description>
        &lt;b&gt;The Kings School students of class 10 were blessed to have Nitika Tandon &amp; Subhashish Panigrahi of Wikipedia Foundation to conduct a workshop on the whats &amp; hows of Wiki, creating &amp; editing Wiki pages, etc. Our students also got a hands on experience, and they edited the Bibinca page on Wiki. &lt;/b&gt;
        &lt;p&gt;This was published in the &lt;a class="external-link" href="http://thekingschool.in/links/LatestNews.aspx"&gt;King's School Portal&lt;/a&gt; on July 26, 2013. Nitika Tandon and Subhashish Panigrahi are quoted.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-kings-school-july-26-2013-whats-and-hows-of-wiki'&gt;http://editors.cis-india.org/news/the-kings-school-july-26-2013-whats-and-hows-of-wiki&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-10-25T07:00:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights">
    <title>Connaught Summer Institute on Monitoring Internet Openness and Rights</title>
    <link>http://editors.cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights</link>
    <description>
        &lt;b&gt;Malavika Jayaram is a speaker at this event being held at the Munk School of Global Affairs, Bloor Street West.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://citizenlab.org/summerinstitute/program.html"&gt;Click to read the original posted on Citizen Lab website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Monday, July 22, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Munk School of Global Affairs (Observatory Site), 315 Bloor Street West (&lt;a href="https://maps.google.ca/maps?q=315+bloor+stret+west&amp;amp;hl=en&amp;amp;ll=43.668027,-79.398386&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.664674,-79.39667&amp;amp;sspn=0.009127,0.021329&amp;amp;gl=ca&amp;amp;hnear=315+Bloor+St+W,+Toronto,+Ontario+M5S+1W7&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A"&gt;map)&lt;/a&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;b&gt;14:00 - 17:00&lt;/b&gt;&lt;/th&gt;
&lt;td&gt;&lt;b&gt;Meet and Greet at the Citizen Lab&lt;/b&gt;
&lt;p style="text-align: justify; "&gt;Participants are free to drop by the Lab between 2:00-5:00 pm to see the  space and meet with Citizen Lab researchers. Participants should go to  the reception desk on the first floor and have the receptionist call the  Lab.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Tuesday, July 23, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 09:15&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Opening Remarks&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:15 - 10:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Tutorial&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="http://citizenlab.org/summerinstitute/abstracts.html#budish"&gt;Welcome to Oz: Beyond a Black and White Debate on Internet Regulation (and Control)&lt;/a&gt;" &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– Jon Penney (Berkman Centre/Oxford Internet Institute/Citizen Lab) and Ryan Budish (Berkman Centre/Herdict)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:45 - 11:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;11:00 - 12:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Commercialization of Information Controls&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#parsons"&gt;Regulators, Politicians, and Deep Packet Inspection: Who's Driving What and Why&lt;/a&gt;" – Chris Parsons (University of Victoria)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"Fingerprinting Internet Filtering Products" – Jakub Dalek (Citizen Lab)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#marczak"&gt;Cash Rules Everything Around Me: The Commercialization of Online Spying&lt;/a&gt;" – Bill Marczak &lt;br /&gt;(UC Berkeley)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:00 - 13:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;13:45 - 14:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Circumvention / Attacks 1&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#robinson"&gt;Collateral Freedom&lt;/a&gt;" – David Robinson (Robinson + Yu)&lt;/li&gt;
&lt;li&gt;﻿﻿"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#KheOps"&gt;Remedy: Relays Monitoring and Deployment&lt;/a&gt;" – KheOps (Telecomix)&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#carbone"&gt;Fake Domain Attacks on Civil Society Groups&lt;/a&gt;" – Michael Carbone (Access)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:45 - 15:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Characterization / Measurement 1&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#anderson"&gt;Iran through the Eyes of Big Data&lt;/a&gt;" – Collin Anderson (Independent Researcher)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"Measurement, Detection, and Comparison of Surveillance Data" – Praveen Selvasekaran (Simple Tech Life)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#Filbaan"&gt;Filbaan: What is Filtered Today?&lt;/a&gt;"&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:45 - 16:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;16:00 - 16:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Identity Systems and Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#Jia"&gt;Desperately Seeking the Names: Examining the Historical Progression of Real Name Policies on the Chinese Internet&lt;/a&gt;" – Lianrui Jia (Carleton University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#jayaram"&gt;India's Civil Liberties Crisis: Digital Free Will in Free Fall&lt;/a&gt;" – Malavika Jayaram (Centre for Internet and Society, Bangalore)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;17:00 - 18:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Poster and Demo Session&lt;br /&gt;&lt;/b&gt;&lt;i&gt;Light refreshments will be served&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#aceto"&gt;User-side Approach for Censorship Detection: Home-router and Client-based Platforms&lt;/a&gt;" – Giuseppe Aceto (University of Naples Federico II)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#brantly"&gt;The Cyber Losers&lt;/a&gt;" – Aaron Brantly and Katrin Verclas (National Democratic Institute)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#james"&gt;What is the Impact of Internet Censorship in China?&lt;/a&gt;" – Carlotta James (Psiphon Inc.)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#matsushita"&gt;Open Integrity Index&lt;/a&gt;" – Jun Matsushita&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#soltesz"&gt;M-Lab: Exploring the Possibilities for Open, Global Censorship and Surveillance Detection&lt;/a&gt;" – Stephen Soltesz (Open Technology Institute) and Meredith Whittaker (Google Research)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#stevenson"&gt;Mapping Google:  Global Business Infrastructure and Implications for Openness &lt;/a&gt;" – John Harris Stevenson (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#wiseman"&gt;Chat Program Censorship and Surveillance in China: Tracking TOM-Skype and Sina UC&lt;/a&gt;" – Greg Wiseman (Citizen Lab)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#zaiser"&gt;The Growth and Spread of Cyberspace Controls&lt;/a&gt;" – Benjamin Zaiser (Free University of Berlin)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Wednesday, July 24, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 10:20&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Characterization / Methodology 2&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#burnett"&gt;Refining the Tor Censorship Detector&lt;/a&gt;" – Sam Burnett (Georgia Tech)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#goldberg"&gt;From Internet Security to Internet Freedom: The case of the RPKI&lt;/a&gt;" – Sharon Goldberg (Boston University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#knockel"&gt;Running Software in Albuquerque to Measure Censorship Anywhere&lt;/a&gt;" – Jeffrey Knockel (University of New Mexico)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#ng"&gt;Social Media as Labratory: What We Can Learn about Chinese Politics from Sina Weibo Censorship and Online Discussion&lt;/a&gt;" – Jason Q. Ng (Citizen Lab)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;﻿&lt;b&gt;10:20 - 11:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;11:00 - 12:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Circumvention 2&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"VPNthnography: Hacking the Great Firewall for Fun and Profit"&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#haselton"&gt;Economics of Web Proxy Networks&lt;/a&gt;" – Bennett Haselton (Peace Fire/Citizen Lab)&lt;/li&gt;
&lt;li&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#kathuria"&gt;Censors Working Overtime&lt;/a&gt;" – Karl Kathuria (Psiphon Inc.)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:00 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:00 - 15:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Tutorial&lt;br /&gt;&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#weaver"&gt;Network Censorship Techniques, Detection, and Localization&lt;/a&gt;" – Nick Weaver (ICSI)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:30 - 16:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;16:00 - 17:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Panel: Bridging Activism and Research&lt;/b&gt; (5 minute talks + discussion)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ali Bangi (ASL19 / Citizen Lab)&lt;/li&gt;
&lt;li&gt;Stefania Milan (Tillburg University)&lt;/li&gt;
&lt;li&gt;Deji Olukotun (PEN)&lt;/li&gt;
&lt;li&gt;John Scott-Railton (Citizen Lab / UCLA)&lt;/li&gt;
&lt;li&gt;'Gbenga Sesan (Paradigm Initiative Nigeria)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Thursday, July 25, 2013&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Location:&lt;/b&gt; Campbell Conference Room, South House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;08:00 - 09:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakfast&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;09:00 - 10:20&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdictions and Borders Online&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#ashraf"&gt;Cyberconflict and the Legal-Territorial Paradox&lt;/a&gt;" – Cameran Ashraf (UCLA)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#goh"&gt;Beyond Borders: Legislative Challenges to the Management of Records in the Cloud&lt;/a&gt;" – Elaine Goh (University of British Columbia)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#hussain"&gt;Civil Society 2.0: The Global Struggle to Govern the Democratic Impacts of ICTs&lt;/a&gt;" – Muzammil M. Hussain (University of Michigan)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#losey"&gt;The Anti-Counterfeiting Trade Agreement and the Networked Public Sphere: How to avoid a Convergent Crisis&lt;/a&gt;" – James Losey (Open Technology Institute) &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:20 - 10:40&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:40 - 12:10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Tutorial&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#mackinnon"&gt;Ranking Companies on Digital Rights: Challenges and Synergies&lt;/a&gt;" – Rebecca MacKinnon (New America Foundation)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;12:10 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;14:00 - 15:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#bronk"&gt;Revisiting Webtapping: Learning From Five Years’ of U.S. Cyber and Intel Policy&lt;/a&gt;" – Chris Bronk (Rice University)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#saint-louis"&gt;Who Watches the Watchmen?: Detecting Stealth and Unattributed Information Controls&lt;/a&gt;" – Herve Saint Louis (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"IX Maps" – Andrew Clement (University of Toronto)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"&lt;a href="https://citizenlab.org/summerinstitute/abstracts.html#gutteridge"&gt;Technologies of Control, ‘National Security’ and Systemic Abuse of Minorities in the East and Horn of Africa&lt;/a&gt;" –  Clara Gutteridge (Equal Justice Forum) &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:30 - 15:45&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;15:45 - 16:30&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Closing Discussion on Interdisciplinary Research and Information Controls&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Friday, July 26, 2013&lt;/h2&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Location:&lt;/b&gt; Rooms 108, 208 and Basement, North House, Munk School of Global Affairs (Trinity site), 1 Devonshire Place (&lt;a href="https://maps.google.ca/maps?q=1+devonshire+place&amp;amp;hl=en&amp;amp;ll=43.664674,-79.39667&amp;amp;spn=0.009127,0.021329&amp;amp;sll=43.661244,-79.400897&amp;amp;sspn=0.009128,0.021329&amp;amp;gl=ca&amp;amp;hnear=1+Devonshire+Pl,+Toronto,+Ontario+M5S+3K7&amp;amp;t=m&amp;amp;z=16"&gt;map&lt;/a&gt;)&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10:00 - 14:00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Breakout Sessions&lt;/b&gt; &lt;br /&gt;
&lt;p&gt;&lt;i&gt;Light refreshments will be served&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The half day will be dedicated to giving participants the opportunity to  break into small groups to further discuss, share, and hack on topics  raised during the workshop.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Sponsor&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The workshop is sponsored by University of Toronto's &lt;a href="http://www.research.utoronto.ca/connaught/"&gt;Connaught Fund&lt;/a&gt;. Since it was founded in 1972, the fund has invested more than $1 million in projects that span across the disciplines.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights'&gt;http://editors.cis-india.org/news/citizenlab-summer-institute-on-monitoring-internet-openness-and-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-26T09:17:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook">
    <title>Your life's an open Facebook</title>
    <link>http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook</link>
    <description>
        &lt;b&gt;The jury's out on Facebook's newly introduced Graph Search. While some argue that it's a stalker's dream come true, others say it's a great tool for social research. Shikha Kumar jumps right into the debate.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.dnaindia.com/lifestyle/1863603/report-your-life-s-an-open-facebook"&gt;Shikha Kumar's article was published in DNA on July 21, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Do this little exercise. Log on to Facebook and type ‘friends of  friends who are single’ or ‘friends of friends who like dancing’ in the  search bar on the top left hand of the screen. A long list of names with  photographs of people you may have never seen in your life will pop up  in front of you. Better still (or worse, depending on perspective), you  can refine this search further with the drop down menu on the right hand  side of the screen; you can filter the results on the basis of gender,  employer, current city, hometown and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, depending on whether you are paranoid about your privacy, or don’t  give a damn (since the government is snooping on us anyway), you will  either view this feature as a stalker’s dream come true or just another  irritant to rant about for a day and then forget.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever your reaction, Graph Search, an upgrade on Facebook’s  rudimentary ‘search’, is here to stay and it holds the potential to  forever change the ‘search’ behaviour of its members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HOW DOES IT WORK?&lt;br /&gt; Put simply, Graph Search is the Google search of Facebook. It indexes  every little detail you have shared on Facebook — every drunken ‘like’,  every status update, every unflattering photograph you are tagged in,  every joke you’ve shared — so that a simple search can throw up pretty  specific answers. A beta version was unveiled to a select audience in  January but it went live for all English (US) users early last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A look at a Tumblr blog called ‘Actual Facebook Graph Searches’ gives  an indication of how specific the results can get. Ranging from humorous  to downright outrageous, some queries posted included ‘Single women who  live nearby and who are interested in men and like Getting Drunk’ and  ‘Married people who like Prostitutes.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is exactly why people like Adarsh Matham, a 29-year-old tech  writer, cite as reason for never having been on Facebook. While he does  admit the new feature can be very useful in finding jobs, dates, new  friends and local businesses, he says the downsides trump the benefits.  “Imagine if some pervert searches for ‘girls who like Fifty Shades of  Grey in Mumbai’… It will make it easier for him to stalk them,” says  Matham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you use your imagination, the list won’t end. Imagine what perverts  at your workplace and in your apartment complex who are not ‘friends’  with you on Facebook can do with information they glean about you thanks  to Graph Search.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matham is particularly concerned with Graph Search’s misuse in India  because of our social attitudes and tendency to slot people into types  and judge them immediately. “One of the first things that people do when  they go for a job or on a date is a Google search. Soon they will do a  Graph Search too. This is a complete intrusion of one’s privacy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director at the Bangalore-based Centre for Internet and  Society, thinks the privacy implications are worrying because the  average Indian user is not a ‘power’ user who fully exploits the site’s  advanced features and is thus unclear about what personal information is  public or private. “People need to be very cautious as they’re leaving  behind a digital trail that is always searchable unlike on other  platforms like Twitter. It’s like tattooing yourself, it’s permanent but  you may not be comfortable with it in the future,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A brilliant format&lt;/b&gt;&lt;br /&gt; Privacy concerns aside, many have warmed up to the benefits of Graph  Search. Raghu Mohan, a Bangalore-based writer with YourStory.in, has  used it for over six months and has only good things to say about it. “I  think it’s a remarkable engineering feat. Any platform with a user data  of over a billion people needs to come up with such a search facility,”  says Mohan, adding that the tool has been very useful in finding  work-related data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chetan Asher, founder and CEO of Tonic Media, a social media agency,  agrees with him, saying the new feature is “very exciting” purely  because of its ability to index information that was always there, but  was buried somewhere. “The simple phrase-like format is brilliant… It  completely changes the way you network and mine for information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mohan adds that start-ups can benefit with what the feature offers.  “Though not a complete marketing tool, Graph Search patterns can also  provide more targeted behaviour for advertisers.” Mohan also looks at  the feature as a social influencer. “If I’m looking to buy a new car,  I’d rather use Graph Search to find out opinions based on my friends’  recommendations than a web search involving strangers,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From his experience, Asher says that the site doesn’t compromise the  privacy settings that the user has set. But Ankit Tuteja, a 23-year-old  technology expert in Delhi, would beg to differ with this. Tuteja has  experimented with random searches to gauge how the feature worked with  different privacy settings and found that Facebook tends to override  certain security settings. “The security of your photographs are a major  cause for concern,” he cautions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those concerned about privacy, it’s best to think carefully before  ‘liking’ or uploading anything as it will remain in the digital realm  forever, says Abraham. Mohan shrugs off privacy concerns as overrated.  “You lost your personal life when you went online. Stalking can happen  otherwise too.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This innovation is clearly important to the company. While Asher says  it is part of Facebook’s long-term plans to move beyond networking,  Abraham says that faced with slow overall growth globally (except in  markets like India), such innovations are just an attempt to keep its  user base intact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The more things change...&lt;/b&gt;&lt;br /&gt; Whatever the reaction, Facebook is probably banking on the fact that  after initial protests and social media debates, people will come around  to accepting this intrusion into their private lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The American news satire website The Onion pretty much nailed this  when, in a satirical piece, it ‘quoted’ Zuckerberg as saying: “Facebook  will introduce a bunch of new features that everyone will hate, that  will make your experience worse, you will complain about it, and then  you will realize you are utterly powerless to do anything about these  new features, at which point you will move on and continue to use our  product every single day. Any users who strongly disagree with their  policy should feel free to deactivate their accounts and reactivate them  two days later.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admit it, you’ll probably be one of them.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook'&gt;http://editors.cis-india.org/news/dna-july-21-2013-shikha-kumar-your-life-is-an-open-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-26T04:53:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill">
    <title>Meeting of a Sub-committee on DNA Profiling Bill in Hyderabad</title>
    <link>http://editors.cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill</link>
    <description>
        &lt;b&gt;A sub-committee has been constituted as per the recommendations of the Expert Committee of DNA Profiling Bill. The sub-committee will have a meeting in Hyderabad on August 6, 2013.&lt;/b&gt;
        &lt;p&gt;The sub-committee was constituted with the following members:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Dr. Raghbir Singh, Former Secretary, Legislative Department, Ministry of Law, New Delhi&lt;/li&gt;
&lt;li&gt;Shri. Kamal Kumar, IPS, (Retd.), Director General of Police, Hyderabad&lt;/li&gt;
&lt;li&gt;Mr. Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;Dr. Alka Sharma, Director, DBT&lt;/li&gt;
&lt;li&gt;Dr. Madhusudan Reddy, Staff Scientist and Group Leader, CDFD, Hyderabad&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The meeting has been scheduled for August 6, 2013, 10.30 a.m. at CDFD, Hyderabad to incorporate the ipunts/suggestions of the  members of the Expert Committee appropriately in the draft Human Profiling Bill. The comments/inputs on the draft Bill have been requested from all the members of the Expert Committee. Once received, the same will be forwarded to you for further discussion in the sub-committee meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The information was communicated by Dr. Alka Sharma, Director/Scientist F, Medical Biotechnology Division, R. No. 713, Department of Biotechnology, Ministry of Science &amp;amp; Technology, Government of India&lt;/i&gt;,&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill'&gt;http://editors.cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-21T06:21:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/free-software">
    <title>Free Software </title>
    <link>http://editors.cis-india.org/news/free-software</link>
    <description>
        &lt;b&gt;To spread awareness on free software and its philosophy, Free Software Movement of Karnataka (FSMK) in partnership with Jnana Vikas Institute of Technology, Bidadi, organized a 9-days workshop between July 20 and 28 at the Institute campus near Bidadi to focus on free software is real freedom to compute.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/free-software/speednewsbytopic/keyid-925632.cms"&gt;Click to read the news by M.K. Madhusoodan published in the Times of India on July 20, 2013&lt;/a&gt;. For more pictures,&lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Category:FMSK-Wiki-Presentation-JNVIT-Bidadi"&gt; click here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Dr. U.B. Pavanaja participated in the workshop and made a presentation about Wikipedia for the participants on July 24, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/free-software'&gt;http://editors.cis-india.org/news/free-software&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-07-31T08:50:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/resources/jammu-kashmir-notifications">
    <title>Jammu &amp; Kashmir (Govt) Notifications</title>
    <link>http://editors.cis-india.org/accessibility/resources/jammu-kashmir-notifications</link>
    <description>
        &lt;b&gt;List of notifications published by the government of Jammu and Kashmir can be downloaded below:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The zip folder (PDF and Word) contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Reservation for Disabled/Handicapped in Government Services&lt;/li&gt;
&lt;li&gt;The Jammu &amp;amp; Kashmir Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Rules, 2003&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Jammu &amp;amp; Kashmir Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1998&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;PDF&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip" class="internal-link"&gt;Word&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/resources/jammu-kashmir-notifications'&gt;http://editors.cis-india.org/accessibility/resources/jammu-kashmir-notifications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-07-23T15:02:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip">
    <title>Jammu &amp; Kashmir Notifications</title>
    <link>http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip'&gt;http://editors.cis-india.org/accessibility/blog/jammu-and-kashmir-notifications.zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-23T13:08:36Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/resources/himachal-pradesh-govt-notifications">
    <title>Himachal Pradesh (Govt) Notifications </title>
    <link>http://editors.cis-india.org/accessibility/resources/himachal-pradesh-govt-notifications</link>
    <description>
        &lt;b&gt;List of notifications published by the state government of Himachal Pradesh can be viewed below:&lt;/b&gt;
        &lt;h3&gt;Contents&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/tmp/Government%20of%20Himachal%20Pradesh%20Department%20of%20Social%20Justice%20-%20Empowerment-2.pdf/view" class="external-link"&gt;Integrated Schemes for Persons with Disabilities Act, 2008&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://editors.cis-india.org/tmp/State%20Policy%20for%20Persons%20with%20Disabilities%20Himachal%20Pradesh.pdf/view" class="external-link"&gt;State Policy for Persons with Disabilities&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/resources/himachal-pradesh-govt-notifications'&gt;http://editors.cis-india.org/accessibility/resources/himachal-pradesh-govt-notifications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-23T16:05:11Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology">
    <title>Snooping technology: Will CMS work in India?</title>
    <link>http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology</link>
    <description>
        &lt;b&gt;The Indian government plans to spend $132 million on setting up its brand new Central Monitoring System this year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pierre Fitter's article was &lt;a class="external-link" href="http://www.firstpost.com/india/snooping-technology-will-cms-work-in-india-962545.html"&gt;published in FirstPost on July 17, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several articles have raised valid questions about privacy violations, including &lt;a href="http://www.firstpost.com/india/indias-central-monitoring-system-security-cant-come-at-cost-of-privacy-944475.html" target="_blank"&gt;this one by Danish Raza&lt;/a&gt;. Elsewhere, &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/" rel="nofollow" target="_blank"&gt;Pranesh Prakash has raised important points&lt;/a&gt; about how CMS may actually violate several laws and at least one Supreme Court verdict.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I ask a much more basic question: will CMS work? Can it really help  security agencies eavesdrop on criminals and terrorists, despite several  known technical hurdles?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="http://editors.cis-india.org/home-images/Daniel.png" title="Daniel" height="250" width="332" alt="Daniel" class="image-inline" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Encryption&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a prominent Brazilian banker and investor named Daniel Dantas  was arrested and charged with money laundering and tax evasion along  with a former mayor of Sao Paulo. For five months, the Brazilian  National Institute of Criminology tried to read the contents of his hard  drive but failed to crack it. Dantas had encrypted his data using a  free program called &lt;a href="https://en.wikipedia.org/wiki/TrueCrypt" rel="nofollow" target="_blank"&gt;Truecrypt&lt;/a&gt;. The &lt;a href="http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/" rel="nofollow" target="_blank"&gt;INC sent the hard drive to the FBI in the US&lt;/a&gt;,  which spent a whole year trying to crack it; it too failed. Dantas’s  use of encryption likely helped him escape the money laundering and tax  evasion charges. He was ultimately &lt;a href="http://news.bbc.co.uk/2/hi/americas/7761823.stm" rel="nofollow" target="_blank"&gt;convicted of attempting to bribe a police officer&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This story illustrates a fundamental loophole at the heart of CMS. A  criminal, using free and easy-to-use software, can protect his data from  even the most advanced surveillance tools available in law enforcement.  NSA whistle blower Edward Snowden himself used encrypted email to  communicate with journalists at the &lt;i&gt;Guardian&lt;/i&gt;. In an &lt;a href="http://discussion.guardian.co.uk/comment-permalink/24384968" rel="nofollow" target="_blank"&gt;online chat where he took questions from the public&lt;/a&gt;, Snowden noted that encryption was “one of the few things that you can rely on” to protect you from the &lt;a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/" rel="nofollow" target="_blank"&gt;eavesdropping behemoth created of the NSA&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should hardly be surprising then, that terror groups have been  encrypting their emails and data for at least the last five years. In  fact &lt;a href="http://intelwire.egoplex.com/2008_02_02_exclusives.html" rel="nofollow" target="_blank"&gt;Al Qaeda developed its own encryption software called ‘Mujahideen Secrets’&lt;/a&gt;,  to encrypt emails, chat sessions and files. Version two of Mujahideen  Secrets even included a tool to delete files securely so that they could  not be recovered using special software if the computer was captured.  Al Qaeda’s links to several terror groups operating in India has been  widely reported in the past. It is not inconceivable that they have  shared their encryption software with their comrades-in-arms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years it has become easier to encrypt one’s communication. &lt;a href="https://www.youtube.com/watch?v=MKehyXaY2XM" rel="nofollow" target="_blank"&gt;YouTube tutorials&lt;/a&gt; train even novice users to set up email encryption within minutes. &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;Phone calls&lt;/a&gt;, &lt;a href="https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&amp;amp;hl=en" rel="nofollow" target="_blank"&gt;text messages&lt;/a&gt; and &lt;a href="http://www.cypherpunks.ca/otr/" rel="nofollow" target="_blank"&gt;online chats&lt;/a&gt; can also be encrypted with free, easy-to-install apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biggest problem with encryption is that it is virtually impossible  to break the code in a time frame that’s useful for law-enforcement  purposes. Without getting too technical, modern encryption relies  calculating the prime factors of very, very large integers. In 2009, a  group of some of the world’s best-known mathematicians and  cryptographers reported that &lt;a href="http://security.stackexchange.com/questions/4518/how-to-estimate-the-time-needed-to-crack-rsa-encryption" rel="nofollow" target="_blank"&gt;it took them four years to factor a 768-bit integer&lt;/a&gt;. They estimated &lt;a href="https://www.digicert.com/TimeTravel/math.htm" rel="nofollow" target="_blank"&gt;it would take 1,000 times longer to factorise a 1024-bit integer&lt;/a&gt;.  GPG, which is the most widely-used email encryption software, allows  users up to 4096-bit encryption. Unless you have the password to the  encrypted files, it would take you a very long time to crack the  encryption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here’s an example to help you understand why encryption makes CMS  redundant. Let’s say the system intercepts an encrypted email sent by a  LeT handler in Karachi to a sleeper cell in Mumbai. The email contains  instructions to detonate a bomb in a specific market at a specific time  four days from now. Even if India’s intelligence agencies managed to  link up every computer they had available to process the encryption,  they would still not be able to crack it in time to learn the details  and stop the attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What about ‘Metadata’?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that encryption only protects the body of the email. The metadata, including the sender’s and receiver’s email addresses remain unencrypted, else the service provider would be unable to send the email to its destination. Law enforcement agencies often partner with email providers to track down the exact computer on which tell-tale emails were read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this method of tracing criminals has a limitation. Programs such as &lt;a href="https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29" rel="nofollow" target="_blank"&gt;TOR&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Hotspot_Shield" rel="nofollow" target="_blank"&gt;Hotspot Shield&lt;/a&gt; disguise the IP address of a user’s PC. For example, when I use TOR,  Facebook will often ask me to confirm my identity as it sees me as  logging in from an unfamiliar location. TOR has thousands of servers  around the world through which it bounces your data before sending it to  its destination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is another limitation to using metadata. Due to obvious legal  hurdles, CMS will only be deployed to capture communication within  India. If terrorists were planning an attack from elsewhere in India’s  neighbourhood (as happened with 26/11), we would have to rely on that  country’s intelligence services for an alert. Good luck with that!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make untraceable phone calls, terrorists have been known to use &lt;a href="https://en.wikipedia.org/wiki/Burner_phone#Privacy_rights_and_prepaid_mobile_phones" rel="nofollow" target="_blank"&gt;“burner” phones&lt;/a&gt;.  These are pre-paid phones that are easily available in the US and other  countries that do not require an ID for such mobile connections. They  can be topped up using cash, which makes their prolonged using even more  untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if CMS allowed spooks to listen to these calls, it would not be  able to tell who was talking to whom. From details that emerged  following the Abbottabad operation that killed Osama bin Laden, we also  know that terrorists have been trained to &lt;a href="http://www.foxnews.com/tech/2011/05/03/bin-laden-grid-govt-help-expert-says/" rel="nofollow" target="_blank"&gt;turn off their phones and remove the battery&lt;/a&gt; to prevent being tracked even while not on a call.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So what is CMS good for?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If terrorist communications can easily be hidden from CMS, you have  to wonder why the government is going through all the effort and expense  to set up such a system. What good can come off the mass hoovering of  data of ordinary citizens’?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if CMS intercepted a ‘BBM chat’ between two businessmen, who  were discussing a contract that could affect the business interests of a  government MP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine the government getting access to emails exchanged between a  journalist and a source in the IAS who wants to expose a major  corruption scandal involving a cabinet minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine if the government had access to phone calls between two opposition politicians discussing election strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if CMS tracks a PhD candidate who is researching Naxal terror  and has downloaded Naxal pamphlets? What if this researcher has been  able to establish contact with Naxals for an interview. Can the  government use such data to charge him with participating in a Naxal  conspiracy, even if his only intention was to research their  motivations? In a country where chief ministers label their critics as  “Naxals” for merely raising questions, are we certain we want such  unmitigated power in the government’s hands?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are all questions well worth asking, especially since the  ostensible reason for setting up the CMS—monitoring terrorists and  criminals—is a fool’s errand at best.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology'&gt;http://editors.cis-india.org/news/firstpost-pierre-fitter-july-17-2013-snooping-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T07:19:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring">
    <title>सावधान आपके प्रोफ़ाइल पर है पुलिस की नज़र!</title>
    <link>http://editors.cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring</link>
    <description>
        &lt;b&gt;जन लोकपाल, दिल्ली रेप केस और बाबा रामदेव के आंदोलनों में उमड़ी भीड़ से घबराई सरकारी एजेंसियां अब सोशल मीडिया पर कड़ी नज़र रखने के लिए मैदान में उतरी हैं.&lt;/b&gt;
        &lt;p&gt;This blog post by Parul Aggarwal was &lt;a class="external-link" href="http://www.bbc.co.uk/hindi/india/2013/07/130715_social_media_monitoring_pa.shtml"&gt;published by BBC&lt;/a&gt; on July 18, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;अपनी तरह के एक पहले मामले में मुंबई पुलिस ने &lt;a class="page" href="http://www.bbc.co.uk/hindi/international/2013/05/130530_social_media_office_tb.shtml"&gt;&lt;span class="label"&gt;क्लिक करें &lt;/span&gt;&lt;span class="link-title"&gt; फ़ेसबुक-ट्विटर &lt;/span&gt;&lt;/a&gt;और दूसरे सोशल मीडिया पर आम लोगों की राय और उनकी भावनाओं पर निगरानी रखने की शुरुआत की है.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;साइबर अपराधियों और इंटरनेट पर &lt;a class="page" href="http://www.bbc.co.uk/hindi/india/2013/05/130513_facebook_comment_leads_to_jail_rd.shtml"&gt;&lt;span class="label"&gt;क्लिक करें &lt;/span&gt;&lt;span class="link-title"&gt; गड़बड़ियां फैलाने वालों &lt;/span&gt;&lt;/a&gt;के अलावा अब पुलिस की नज़र उन लोगों पर भी रहेगी जो राजनीतिक-सामाजिक मुद्दों पर सोशल मीडिया में जमकर बोलते हैं.&lt;/p&gt;
&lt;h2&gt;आम लोग बने मुसीबत?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;पुलिस की मंशा है समय रहते ये जानना कि जनता किन मुद्दो पर लामबंद हो  रही है और विरोध प्रदर्शनों के दौरान बड़े स्तर पर लोगों का रुझान किस तरफ़  है.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;सोशल मीडिया मॉनिटरिंग का ये काम मार्च 2013 में  शुरु किए गए मुंबई पुलिस के सोशल मीडिया लैब के ज़रिए किया जाएगा. मुंबई  पुलिस के एक वरिष्ठ अधिकारी ने बीबीसी से हुई बातचीत में कहा, ''नौजवान  आजकल फ़ेसबुक पर ख़ासे एक्टिव हैं, ये लोग नासमझ हैं और बात-बात पर उग्र हो  जाते हैं. सोशल मीडिया लैब के ज़रिए हम ये देखते हैं कि कौन किस मुद्दे पर  ज़्यादा से ज़्यादा लिख रहा है और किस तरह की प्रतिक्रिया दे रहा है.''&lt;/p&gt;
&lt;blockquote class="pullquote"&gt;दिल्ली रेप केस हो या इस तरह के दूसरे पब्लिक मूवमेंट,  पिछले दिनों ऐसे कई मामले हुए हैं जब पुलिस ये नहीं जान पाई कि लोग क्या  सोच रहे हैं या कितनी हद तक और कितनी बड़ी संख्या में लामबंद हो रहे हैं.  हमारा काम है सोशल मीडिया पर नज़र रखते हुए पुलिस को ये बताना कि लोग किन  चीज़ों के बारे में बात कर रहे हैं किस तरह के मुद्दे ज़ोर पकड़ रहे हैं.&lt;span class="end-quote"&gt;"&lt;/span&gt;&lt;br /&gt;रजत गर्ग, सीईओ सोशलऐप्सएचक्यू&lt;/blockquote&gt;
&lt;div class="person"&gt;
&lt;div class="person-info"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;इस काम में पुलिस को तकनीकी मदद मिल रही है नैसकॉम और तकनीकी क्षेत्र की एक निजी कंपनी ‘सोशलऐप्सएचक्यू’ से.&lt;/p&gt;
&lt;h2&gt;सोशल मीडिया पर लामबंदी&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;सोशलऐप्सएचक्यू के सीईओ रजत गर्ग ने बीबीसी से हुई बातचीत में कहा,  ''दिल्ली रेप केस हो या इस तरह के दूसरे पब्लिक मूवमेंट, पिछले दिनों ऐसे  कई मामले हुए हैं जब पुलिस ये नहीं जान पाई कि लोग क्या सोच रहे हैं या  कितनी हद तक और कितनी बड़ी संख्या में लामबंद हो रहे हैं. हमारा काम है  सोशल मीडिया पर नज़र रखते हुए पुलिस को ये बताना कि लोग किन चीज़ों के बारे  में बात कर रहे हैं किस तरह के मुद्दे ज़ोर पकड़ रहे हैं. ''&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;फ़ेसबुक-ट्विटर पर &lt;a class="page" href="http://www.bbc.co.uk/hindi/science/2013/02/130211_facebook_sued_like_aa.shtml"&gt;&lt;span class="label"&gt;क्लिक करें &lt;/span&gt;&lt;span class="link-title"&gt; निगरानी&lt;/span&gt;&lt;/a&gt; कोई नई बात नहीं लेकिन अब तक ये काम ज्यादातर  मार्केटिंग कंपनियां ही करती आई हैं. लेकिन सोशलऐप्सएचक्यू जैसी कंपनियां  जो कर रही हैं वो 'ओपन सोर्स इंटेलिजेंस' यानी सार्वजनिक स्रोतों से मिली  संवेदनशील जानिकारियों को इकट्ठा करना है.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2&gt;विशेष सॉफ्टवेयर्स की मदद&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;रजत गर्ग के मुताबिक़, “इंटरनेट को खंगालने और जानकारियां जुटाने का काम  सॉफ्टवेयर करते हैं और जानकारियों को समझने और इन पर निगरानी का काम तकनीकी  विशेषज्ञों की टीम. इससे ये देखा जा सकता है कि कि कौन से मुद्दे ज़ोर  पकड़ रहे हैं और कौन लोग इन्हें लेकर सबसे ज़्यादा एक्टिव हैं. इन लोगों के  सोशल नेटवर्क के ज़रिए ये जाना जा सकता है कि किसकी पहुंच कितने लोगों तक  है और कोई भी गतिविधिति क्या रुप ले सकती है.’’&lt;/p&gt;
&lt;p&gt;सरकार की दलील है कि जो जानकारियां सोशल मीडिया पर &lt;a class="page" href="http://www.bbc.co.uk/hindi/india/2013/01/130129_social_networking_sites_comment_job_fma.shtml"&gt;&lt;span class="label"&gt;क्लिक करें &lt;/span&gt;&lt;span class="link-title"&gt; सार्वजनिक&lt;/span&gt;&lt;/a&gt; रुप से मौजूद हैं केवल उन्हीं की निगरानी की जाती है.  हालांकि तकनीक के जानकार कहते हैं कि भारत में प्राइवेसी से जुड़े क़ानून  बेहद लचर हैं और फ़ेसबुक-ट्विटर का इस्तेमाल करने वाले ज्यादातर लोग अपनी  निजी जानकारियां छिपाने जैसी तकनीकों से अनजान हैं.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/AseemTrivedi.png" style="float: right; " title="Aseem Trivedi" class="image-inline" alt="Aseem Trivedi" /&gt;&lt;/p&gt;
&lt;p style="text-align: right; "&gt;अपनी वेबसाइट पर आपत्तिजनक सामग्री डालने को लेकर कार्टूनिस्ट असीम त्रिवेदी को भी गिरफ्तार किया गया था.&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;पारदर्शिता की कमी&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;ऐसे में सार्वजनिक मंच पर कई ऐसी जानकारियां उपलब्ध हो सकती हैं जो उन्हें पुलिस की आंख की किरकिरी बना दें.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;साल 2012 में पूर्व शिवसेना प्रमुख बाला साहब  ठाकरे की निधन के मौक़े पर बुलाए गए मुंबई बंद के ख़िलाफ़ फ़ेसबुक पर  टिप्पणी करने वाली एक लड़की और उसकी पोस्ट को लाइक करने वाली उसकी दोस्त को  रातोंरात गिरफ्तार कर लिया गया. पुलिस ने ये कार्रवाई एक स्थानीय शिवसेना  नेता की शिकायत पर की थी.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;कथित तौर पर संविधान का मज़ाक उड़ाने और अपनी  वेबसाइट पर आपत्तिजनक सामग्री डालने को लेकर कार्टूनिस्ट असीम त्रिवेदी को  भी गिरफ्तार किया गया. मीडिया में हुए हंगामे के बाद सभी लोगों को छोड़  दिया गया लेकिन भारत में अब तक इस तरह के कई ऐसे मामले सामने आ चुके हैं.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;सूचना प्रौद्योगिकी क़ानून की धारा 66 कहती है कि  इस तरह की कार्रवाई बेहद संवेदनशील और राष्ट्रहित से जुड़े मामलों में ही  की जानी चाहिए. हालांकि धारा 66 की आड़ में सरकार और नेताओं के ख़िलाफ़  बोलने वालों की गिरफ्तारी सरकार की मंशा पर कई सवाल खड़े करती है.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;इंटरनेट से जुड़े मुद्दों पर काम करने वाली  संस्थाएं मानती हैं कि भारत में इंटरनेट और आम लोगों पर निगरानी रखने के  मामले में सरकार की ओर से पारदर्शिता की बेहद कमी है.&lt;/p&gt;
&lt;h2&gt;'दुरुपयोग की संभावना'&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;द सेंटर फ़ॉर इंटरनेट एंड सोसाएटी से जुड़े प्रनेश प्रकाश कहते हैं, ''भारत  में सूचना प्रौद्योगिकी और इंटरनेट से जुड़े क़ानूनों को अगर पढ़ें तो समझ  आता है कि वो कितने ख़राब तरीक़े से लिखे गए हैं. इन क़ानूनों में  स्पष्टता और जवाबदेही की गुंजाइश न होने के कारण ही उनका इस्तेमाल  तोड़-मरोड़ कर किया जाता है.''&lt;/p&gt;
&lt;blockquote class="pullquote"&gt;सोशल मीडिया के ज़रिए इंटरनेट पर सार्वजनिक रुप से बहुत कुछ हो रहा है.  कुच्छेक मामलों को छोड़कर चीन जैसे देशों के मुकाबले अभिव्यक्ति की  स्वतंत्रता को लेकर भारत सरकार ने अबतक कोई दमनकारी नीति नहीं अपनाई है.  लेकिन समस्या ये है कि तकनीक की मदद से अगर दिन-रात निगरानी होगी और  जानकारियां सामने आएंगी तो उनके दुरुपयोग की संभावना बढ़ जाती है. &lt;span class="end-quote"&gt;"&lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;प्रनेश कहते हैं, ''साल 2011 में सरकार ने केंद्रीय मंत्रालयों और विभागों  के लिए सोशल मीडिया से जुड़े दिशा-निर्देश जारी किए. इसका मक़सद था सरकारी  विभागों को ये बताना कि सोशल मीडिया पर आम लोगों से कैसे जुड़ें. यही वजह  है कि जब सरकार और पुलिस से जुड़े विभागों ने सोशल मीडिया लैब बनाए तो  ज्यादातर लोगों ने समझा कि इनका मक़सद जनता की निगरानी नहीं बल्कि आम लोगों  से जुड़ना है.''&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;तो मुंबई पुलिस का ये क़दम क्या आम लोगों और मानवाधिकार संगठनों के लिए ख़तरे की घंटी है ?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;प्रनेश कहते हैं, “सोशल मीडिया के ज़रिए इंटरनेट पर सार्वजनिक रुप से बहुत  कुछ हो रहा है. कुछ एक मामलों को छोड़कर चीन जैसे देशों के मुक़ाबले  अभिव्यक्ति की स्वतंत्रता को लेकर भारत सरकार ने अब तक कोई दमनकारी नीति  नहीं अपनाई है. लेकिन समस्या ये है कि तकनीक की मदद से अगर दिन-रात निगरानी  होगी और जानकारियां सामने आएंगी तो उनके दुरुपयोग की संभावना बढ़ जाती  है.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring'&gt;http://editors.cis-india.org/news/bbc-uk-july-18-2013-parul-aggarwal-social-media-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-31T04:10:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-2.zip">
    <title>Goa (Govt) Notifications Word Files</title>
    <link>http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-2.zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-2.zip'&gt;http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-2.zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-16T06:11:18Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-1.zip">
    <title>Goa (Govt) Notifications PDF Files</title>
    <link>http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-1.zip</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-1.zip'&gt;http://editors.cis-india.org/accessibility/blog/goa-govt-notifications-1.zip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-16T06:09:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
