<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2881 to 2895.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/maids-guards-get-fingerprinted"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/netizen-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/bio-diversity-informatics-workshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/blocking-content-google-gets-more-requests"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/learn-yourself"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/facing-up-to-moral-hazard"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/vanishing-fingerprints-put-uid-in-question"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/sixth-annual-meeting-igf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/media-economics-workshop"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-india-chronicles"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/innovation-and-public-interest"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/events/design-public-in-bangalore"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/making-difference-online-offline"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/maids-guards-get-fingerprinted">
    <title>‘Not mandatory’ but maids, guards get fingerprinted</title>
    <link>http://editors.cis-india.org/news/maids-guards-get-fingerprinted</link>
    <description>
        &lt;b&gt;The Cubbon Park police have begun profiling domestic help in their jurisdiction. Personal details will be stored in a database, which can be accessed by potential employers, writes Hemanth Kashyap in this article published in Bangalore Mirror on 9 November 2011. Sunil Abraham has been quoted in this article.&lt;/b&gt;
        
&lt;p&gt;It is the safety and security of the middle class versus individual rights of the 'lessers'. No guessing the victor in this battle. Recent crimes committed by household help seem to be enough justification for 'voluntary' profiling of maids, cooks, drivers, gardeners and watchmen. The brief of law-enforcing agencies is to keep the crime graph down, not get too involved in the procedural or sociological nitty-gritty. And in pursuit of this black-and-white objective, the city police have decided to go high-tech in this 'citizen-friendly' initiative.&lt;/p&gt;
&lt;p&gt;Though the police say it is a voluntary exercise, the job prospects of those who demur will obviously be affected. To start with, the Cubbon Park police — with the assistance of a tech firm which operates a website, the ‘us and them’-sounding hamarisuraksha.com — have visited a few buildings in their jurisdiction to profile the servants and security guards there. Personal details like the servant/guard's voter ID card, thumb impression and photograph have been fed into a database, which will be accessible to anyone. Cubbon Park inspector Badrinath is leading the exercise, which will be extended to other high-end localities in the central division.&lt;/p&gt;
&lt;p&gt;According to the cops, the background details on the website will make hiring a domestic help easy and risk-free. The cops feel such a system will also help servants with a clean record land a good job, not just in Bangalore but anywhere in the country. Employers will have to register with the website — one login ID will be given to one apartment complex — after which they can access details of existing or potential domestic help. Employers will also have to inform the cops after hiring a help.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;According to the police, the problem of hiring a reliable domestic help is particularly acute in a city like Bangalore, where thousands from all over the country land up every day in search of a job. There have been numerous cases of theft, robbery and even murder where the accused have fled the city or disguised their identity and continued to work in other households. In the absence of a database, tracking the accused in such cases becomes difficult, say the cops.&lt;/p&gt;
&lt;p&gt;Hamari Suraksha chief Ashwani Kumar Narula said, "It is a three-pronged effort involving the police, our website, and house, mall and security agency owners. The latter will give us the details of their employees and the info will be fed into a central database. A potential employer can, at the click of a mouse, do a background check before hiring a maid or watchman."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On Tuesday, a camp was held at Vasvani Apartments on St Mark's Road, and hundreds of housemaids, security guards and drivers came forward with their personal details. As it was very new to them, many were perturbed about giving their thumb impressions and photographs. But the police and the website volunteers explained the rationale of the exercise and assured them their details would not be misused.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This is the first time I am facing this situation. We are working here for years and have not done anything wrong. I feel bad. But the police explaint why they were doing it and I was relieved," said Leena, who works in Vaswani Apartments.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"I am not at all worried. Everything depends on our work. If I am in the right, there will be no problem. The police are doing this for our convenience," said Shobha, another housemaid.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"I am fine with this. I read in the newspapers about the thefts committed by servants, and this exercise by the police will be helpful even for us. I am from Meghalaya and people here don't know anything about me. If my details are on the website, it will be easier to hire me," said Vanmaan, a housemaid in Vaswani Apartments.&lt;/p&gt;
&lt;h3&gt;'Employers are also potential abusers'&lt;/h3&gt;
&lt;p&gt;"It is a voluntary move,” said a senior cop. But does refusal to be profiled immediately put a maid under suspicion or under the threat of unemployment, asked some. They were also worried about the leakage of such data.&lt;/p&gt;
&lt;p&gt;Vijay Menon of the Citizen's Action Forum, a major body of residents across the city, said, "You can collect fingerprints only under a specific law, and not demand fingerprints just because of their profession. It almost amounts to discrimination. I will definitely not be taking my maid for any kind of fingerprinting. Secondly, how safe is the privacy of this information? Why would I want to replicate that information with various stake-holders, increasing the risk of it being leaked?"&lt;/p&gt;
&lt;p class="callout"&gt;Sunil Abraham, executive director, Centre for Internet &amp;amp; Society, said, "I am worried more about the unrealistic power balance it will create. To begin with, the law does not permit this kind of profiling. The only exception to this rule is the National Population Registry, and now the UID. Second, we have had instances of maids being physically abused by their employers too. If you work on the principle that household help can be dangerous and potential thieves (so you want their fingerprints), then you should be collecting fingerprints of employers too because they also can be potential abusers."&lt;/p&gt;
&lt;p&gt;Residents’ welfare associations were almost unanimously positive about the move. N Mukund of the Jayanagar Welfare Association said, "It's a good beginning because security has become a major issue for residents. Despite maids having built a rapport with their employers in many homes, we have had instances of thefts. But it makes no sense to have electronic data in place if it cannot be accessed by my local police station, which doesn't even have an email address."&lt;/p&gt;
&lt;p&gt;Dr Radhakrishna of the Koramangala Residents’ Welfare Association said, "Most of these people do not have a permanent address. How do you address that problem? "&lt;/p&gt;
&lt;p&gt;Vivek Agarwal, of Mantri Sarovar Residents’ Welfare Association, Sarjapur, said, "Already, the household help has to be registered in the jurisdiction police station. If the police want to take it to the next level, I have no problem with it. We live in a huge apartment complex. Many of us are working professionals who need reliable and safe household help."&lt;/p&gt;
&lt;h3&gt;'Enact a law'&lt;/h3&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;C V Nagesh, expert in criminal law, said as per law (Criminal Procedure Code), police have no right to force a person or section to give their fingerprints to the police if they are not involved in crimes.&amp;nbsp;He said the Cubbon Park police’s effort may be a good cause, but police have no blanket permission to collect fingerprints of servants and others if they are not into any crimes.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;"Law should be enacted, making servant-profiling mandatory and then police or any other agency can collect these details. Then, it becomes legal. If somebody is giving details voluntarily, it is not illegal," said Nagesh.&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/nagesh.jpg/image_preview" alt="nagesh" class="image-inline image-inline" title="nagesh" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;T Sunil Kumar, Additional Commissioner of Police (Law and Order), said the police were not forcing anybody to give their fingerprints. "It’s absolutely voluntary on the part of servants, watchmen and others to part with their details. If somebody says he is not interested, we will not force that person."&lt;br /&gt;&lt;br /&gt;The officer said to check crimes involving these people, the police thought of having a database. So, they approached the resident welfare associations. "They (associations) are asking the servants to get the profile done. We are not asking anybody to come and mandatorily give details. But the law doesn’t stop people from voluntarily disclosing their details. The response is massive and there are not many complaints," he said.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_sunil.jpg/image_preview" alt="sunilkumar" class="image-inline image-inline" title="sunilkumar" /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Recent crimes involving domestic help&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;October 7, 2011&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Ashraf (26), a security guard killed Anasuya (42), a woman head cashier of a bank, by slitting her throat inside the lift of an apartment at Seshadripuram. He is absconding.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;July 25, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Senior High Court advocate S S Naganand’s house in Sadashiv Nagar burgled, gold and diamond jewellery worth over Rs 80 lakh stolen. Police arrest his Gurkha watchman, Deerendar Bahaddur Thapa, and a gang of six Nepali guards and bust 44 cases in Yelahanka and surrounding areas.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;June 26, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Jewellery worth Rs 18 lakh stolen from the house of former Infosys director and iGATE CEO Phaneesh Murthy’s upscale villa in Shobha-Lotus, a residential complex in Brooke fields area of Whitefield.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Police arrest his domestic help Shivalinge Gowda (24) and complex electrician Mohammed Ali (24) and recovred the goods from Ali’s sister’s house in Shimoga.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;February 16, 2009&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Retired IISc professor and mathematician Purushottam Lal Sachdev, 71, his wife Rita, 62, and their son Munna, 35, are found murdered in their house on 80 Feet Road, RT Nagar. Police arrest his domestic help Deepak (36) his wife Suchitra (29) from West Bengal.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original story published in Bangalore Mirror &lt;a class="external-link" href="http://www.bangaloremirror.com/article/1/20111108201111082250578833d1063b8/%E2%80%98Not-mandatory%E2%80%99-but-maids-guards-get-fingerprinted.html"&gt;here&lt;/a&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/maids-guards-get-fingerprinted'&gt;http://editors.cis-india.org/news/maids-guards-get-fingerprinted&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-09T05:16:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/netizen-report">
    <title>Netizen Report: Transparency Edition</title>
    <link>http://editors.cis-india.org/news/netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Online has carried a feature story, "Netizen Report: Transparency Edition". We at CIS had filed an RTI application about website blocking. This is reflected in this article by Rebecca MacKinnon which was posted online on 7 November 2011.&lt;/b&gt;
        
&lt;p&gt;Here at Global Voices Advocacy we believe that transparency by governments and companies about how and when censorship and surveillance takes place is a base-line requirement if the Internet is ever to be governed in a manner that is compatible with free expression, dissent, and citizens' right to organize and assemble. Thus we applaud Google's latest &lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Transparency Report &lt;/a&gt;- the company's fourth such report detailing government requests for user data and content removal, as well as the traffic flows (or lack thereof) to Google webistes across the world since July 2009. The new data for &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/#2011-06"&gt;January-June 2011 &lt;/a&gt;contains more detail than in the past, including data on how Google responded to the requests and whether they were honored. The data comes with a list of caveats including that automated content removal is not logged and that some data cannot be released due to local law. Nonetheless, we hope that Google's data will provide an interesting snap shot of the state of Internet affairs and the data could be used to hold governments accountable to their censorship activities. We believe that if all Internet companies disclosed similar data, the world would be further on its way to being a better place. Many articles have been written analyzing the data. A few of them include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;TechPresident: &lt;a class="external-link" href="http://techpresident.com/blog-entry/google-data-shows-government-internet-surveillance-far-outstrips-wiretap-requests"&gt;Google Data Shows Government Internet Surveillance Far Outstrips Wiretap Requests&lt;/a&gt;&lt;/li&gt;&lt;li&gt;WIRED: &lt;a class="external-link" href="http://www.wired.com/threatlevel/2011/10/google-data-requests"&gt;U.S. Requests for Google User Data Spike 29 Percent in Six Months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Huffington Post:The 13 Countries That Request The Most User Data From Google&lt;/li&gt;&lt;li&gt;CNet: &lt;a class="external-link" href="http://www.huffingtonpost.com/2011/11/01/google-user-data-countries-requests_n_1070313.html"&gt;Google: Governments seek more about you than ever&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Adding to the publicly available data about censorship around the world, the Open Net Initiative has &lt;a class="external-link" href="http://opennet.net/blog/2011/11/oni-summarized-global-internet-filtering-data-now-available-download"&gt;released its research data on global Internet filtering&lt;/a&gt;, covering seventy-four countries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thuggery&lt;/strong&gt;: Read the latest news on GVA about bloggers jailed in Egypt, Syria, and Kuwait and spread the word.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Surveillance&lt;/strong&gt;: As &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/"&gt;GVA&lt;/a&gt; and others have recently reported, 13 Internet filtering devices produced by the California-based company Blue Coat have made their way to &lt;strong&gt;Syria&lt;/strong&gt;.&amp;nbsp;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970203687504577001911398596328.html"&gt; According to the Wall Street Journal&lt;/a&gt;, Blue Coat executives say that the company will not sell the devices to countries that are under embargo by the United States, and that the devices found in Syria had been sold to a dealer who claimed they were destined for Iraq.&lt;/p&gt;
&lt;p&gt;The Wall Street Journal has had several other items related to the role of companies in global surveillance, including a report on how China's Huawei &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204644504576651503577823210.html"&gt;has been peddling &lt;/a&gt;its mobile phone tracking and censoring equipment to &lt;strong&gt;Iran&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, Research in Motion &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt;has set up a facility &lt;/a&gt;in Mumbai to help the Indian government carry out lawful surveillance of its BlackBerry services including the messenger chat service, but the WSJ reports that India still has no method to intercept and decode BlackBerry enterprise email.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;Russia&lt;/strong&gt;, bloggers' influence &lt;a class="external-link" href="http://www.rferl.org/content/russian_bloggers_gain_prominence_kremlin_takes_notice/24357352.html"&gt;has apparently made the Kremlin nervous&lt;/a&gt;. Reporters Without Borders has condemned plans by the Russian government to deploy new software to track “extremist” content on the web, highlighting concerns about an over-broad definition of “extremist,” and the arbitrary and disproportionate approach to punishment and sanctions against websites. For more on the Russian Internet be sure to follow Global Voices' &lt;a class="external-link" href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Runet Echo Project&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Moving on the &lt;strong&gt;United States&lt;/strong&gt;, The Guardian has a &lt;a class="external-link" href="http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniques-surveillance"&gt;fascinating report &lt;/a&gt;on the super-secret Intelligence Support Systems World Americas conference held recently in Washington DC, at which surveillance professionals shared the latest surveillance technologies and innovations that they don't want you to know about. Hacktivist and friend of GVA &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2009/12/14/interview-with-jacob-appelbaum-from-tor/"&gt;Jacob Appelbaum &lt;/a&gt;managed to get in, but was thrown out.&lt;/p&gt;
&lt;p&gt;On a more positive note in the &lt;strong&gt;United States&lt;/strong&gt;, the Washington Post reports that since 2009 many Internet companies &lt;a class="external-link" href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html?wpisrc=nl_headlines"&gt;have been more assertive &lt;/a&gt;about challenging “national security letters” from the FBI requesting information about users.&lt;/p&gt;
&lt;p&gt;The Guardian reports that Civil liberties and privacy groups in the &lt;strong&gt;United Kingdom&lt;/strong&gt; &lt;a class="external-link" href="http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance"&gt;have raised concerns &lt;/a&gt;about the deployment by the London Metropolitan Police of a "covert &lt;a class="external-link" href="http://www.guardian.co.uk/uk/surveillance"&gt;surveillance&lt;/a&gt; technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.techdirt.com/articles/20111021/11554216450/eu-politician-wants-internet-surveillance-built-into-every-operating-system.shtml"&gt;Techdirt reports &lt;/a&gt;on the &lt;strong&gt;European Union&lt;/strong&gt;'s desire to have a “black box' built in to operating systems that would store a record of all of the computer's internet usage. The EU argues that this ability would be useful in cracking down on child pornography.&amp;nbsp; The system that the EU is looking at as a possible candidate for role of ‘black box' is called LogBox. &lt;a class="external-link" href="http://www.fabioghioni.net/blog/2011/10/20/internet-e-l%E2%80%99arbitrio-assoluto-sui-dati-dei-service-provider-presentata-al-parlamento-l%E2%80%99iniziativa-per-un-sistema-di-controllo-sotto-garante/"&gt;The developer of LogBox &lt;/a&gt;claims that the device is for preserving the freedoms and privacy of internet users, although Techdirt points out the fact that this device does little to ‘protect' the privacy of online users, it in fact, would make anonymous actions on the internet much more difficult and would provide governments and law enforcement a huge set of data on every internet user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Censorship&lt;/strong&gt;: The chief executives of &lt;strong&gt;China&lt;/strong&gt;'s 39 top Internet, telecom, and computer companies &lt;a class="external-link" href="http://www.ft.com/cms/s/09d9a5ba-0886-11e1-9fe8-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F09d9a5ba-0886-11e1-9fe8-00144feabdc0.html&amp;amp;_i_referer=http%3A%2F%2Fadvocacy.globalvoicesonline.org%2F2011%2F11%2F07%2Fnetizenreport-transparency%2F#axzz1cxn3nQD5"&gt;have agreed to &lt;/a&gt;“strengthen self-control, self-restraint and strict self-discipline” in order to “contain the tendency of spreading online rumours, pornography, fraud and other illegal, harmful information on the internet.” The move comes amidst a &lt;a class="external-link" href="http://www.voanews.com/english/news/asia/China-to-Tighten-Controls-on-Internet-Social-Media-133062308.html"&gt;broader crackdown &lt;/a&gt;on &lt;a class="external-link" href="http://www.nytimes.com/2011/10/27/world/asia/china-imposes-new-limits-on-entertainment-and-bloggers.html?_r=1"&gt;the Internet and social media&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, the Bangalore-based Centre for Internet and Society &lt;a href="http://editors.cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" class="external-link"&gt;submitted a right to information request &lt;/a&gt;to the government's Department of Information Technology, asking for more information about website blocking. Based on &lt;a href="http://editors.cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="external-link"&gt;DIT's response &lt;/a&gt;the Centre observes that “The data provided by the government seemingly conflicts with the data released by the likes of Google." Their conclusion: "Either the DIT is not providing us all the relevant information on blocking, or is not following the law."&lt;/p&gt;
&lt;p&gt;Courts in &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.19/belgium-isp-blocking-pirate-bay"&gt;&lt;strong&gt;Belgium&lt;/strong&gt;&lt;/a&gt; and&lt;a class="external-link" href="https://torrentfreak.com/finnish-isp-ordered-to-block-the-pirate-bay-111026/"&gt; &lt;strong&gt;Finland&lt;/strong&gt; &lt;/a&gt;have ordered ISPs to block the Pirate Bay.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;U.S.&lt;/strong&gt; House Judiciary Committee has recently proposed a&lt;a class="external-link" href="http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf"&gt; bill &lt;/a&gt;aimed at protecting intellectual property online that some critics describe as the &lt;a class="external-link" href="http://censorshipinamerica.com/2011/10/26/internet-censorship-protect-ip-renamed-e-parasites-act-would-create-the-great-firewall-of-america/"&gt;beginning of a "Great Firewall of America"&lt;/a&gt;.&lt;a class="external-link" href="https://www.eff.org/deeplinks/2011/10/disastrous-ip-legislation-back-%E2%80%93-and-it%E2%80%99s-worse-ever"&gt; The Electronic Frontier Foundation &lt;/a&gt;and others have detailed the bill's problems, including lack of due process, near certainty of over-blocking and abuse, imposition of excessive liability on Internet intermediaries, global legitimization of DNS censorship and potential fragmentation of the Internet, among other things. It is considered even worse than its evil fraternal twin in the Senate, the &lt;a class="external-link" href="https://secure.wikimedia.org/wikipedia/en/wiki/Protect_IP_Act"&gt;PROTECT IP Act &lt;/a&gt;which is also opposed by many tech companies and non-profit groups. Despite such opposition, the bill draws relatively &lt;a class="external-link" href="http://opinion.latimes.com/opinionla/2011/10/technology-a-bipartisan-attempt-to-regulate-the-internet.html"&gt;broad support from lawmakers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Net Neutrality: South Africa&lt;/strong&gt;n technology journalist Jan Vermeulen ran the &lt;a class="external-link" href="http://mybroadband.co.za/news/broadband/36728-how-much-does-your-isp-shape-your-downloads.html"&gt;M-Lab's Glasnost Test on South African ISP's&lt;/a&gt; to see whether their stated bandwith shaping policies match up with reality.&lt;/p&gt;
&lt;p&gt;The growth of bandwidth intensive internet applications in South Korea has made Net Neutrality &lt;a class="external-link" href="http://koreajoongangdaily.joinsmsn.com/news/article/Article.aspx?aid=2943014"&gt;an important issue there&lt;/a&gt;. &lt;strong&gt;South Korea&lt;/strong&gt;n ISP's are reporting that it is becoming increasingly difficult to maintain neutral practices with content. The three largest telecommunications companies in Korea are worried by the rise of &lt;a class="external-link" href="http://www.samsung.com/us/smarttv/index.html?cid=ppc_smt_goo_Smart+TV+-+Awareness_Smart+TV_smart+tv&amp;amp;K_CLICKID=5b86c4c9-6936-eac8-bbe5-00004db65f45"&gt;Smart TV's&lt;/a&gt;, which use Internet connections as opposed to traditional cable or satellite links to provide content. The ISP's want to charge companies varying amounts depending on the type and amount of content sent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Governance&lt;/strong&gt;: ICANN held its &lt;a class="external-link" href="http://dakar42.icann.org/"&gt;42nd public meeting in Dakar, Senegal &lt;/a&gt;late last month. Wendy Seltzer &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/05/icann-why-the-registrar-accreditation-agreement-matters-for-free-speech/"&gt;reported here on GVA &lt;/a&gt;why the seemingly arcane debates about domain name registrar accreditation is important. Konstantinos Komaitis, an active member of ICANN's &lt;a class="external-link" href="https://community.icann.org/display/gnsononcomstake/Home"&gt;Non-Commercial Stakeholder Group &lt;/a&gt;(Global Voices is also a member),&lt;a class="external-link" href="http://www.komaitis.org/1/post/2011/10/icann-41-the-fight-over-multistakeholderism.html"&gt; describes the struggle &lt;/a&gt;that is taking place took place between governments and other ICANN stakeholders over whether some stakeholders are more equal than others within ICANN's multi-stakeholder governance model.&amp;nbsp; Kieren McCarthy at dotNext also has an&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/24/governments-registrars-fight"&gt; in-depth report and analysis &lt;/a&gt;on the clash between governments and registrars over law enforcement regarding domain names. Over at the Internet Governance Project Milton Mueller &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/11/6/4934244.html"&gt;takes an in-depth look &lt;/a&gt;at the politics surrounding the Non-Commercial Stakeholder Group and related constituencies, and the fight for civil society representation at ICANN.&lt;/p&gt;
&lt;p&gt;India has &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article2604526.ece"&gt;published a formal proposal &lt;/a&gt;to put the UN in charge of overseeing Internet governance. For different analyses by three Internet governance wonks see&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/27/india-proposes-government-control-internet"&gt; Kieren McCarthy&lt;/a&gt;, &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/10/29/4929042.html"&gt;Milton Mueller&lt;/a&gt;, and &lt;a class="external-link" href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp#mlYafW43YceAy1o6AicM_g"&gt;Jeremy Malcolm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The International Telecommunications Union has approved a new protocol for relaying biometric information. The protocol is intended to enable doctors to communicate data about patients safely and is geared towards developing countries where the access to medical care in rural areas is poor and communication between clinics and doctors would provide better patient care. You can read the full &lt;a class="external-link" href="http://www.itu.int/ITU-T/newslog/Using+Telecommunication+To+Transfer+Biometric+Information.aspx"&gt;press release here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netizen Power&lt;/strong&gt;: Lee Yoo Eun at Global Voices reports that the October 26th Seoul mayoral election was swayed by the use of twitter. Read the &lt;a class="external-link" href="http://globalvoicesonline.org/2011/10/27/south-korea-tweeting-elections-against-all-odds/"&gt;full article here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;African entrepreneur Herman Chinery-Hesse gave a speech at the Tech 4 Africa conference highlighting what the rise of Internet Communication Technologies has done for Africa.&amp;nbsp; A synopsis of his talk can be found on the Tech4Africa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sovereigns of Cyberspace&lt;/strong&gt;: Facebook has introduced a &lt;a class="external-link" href="https://threatpost.com/en_us/blogs/facebook-testing-guardian-angels-feature-getting-locked-accounts-102811"&gt;new “guardian angel” feature &lt;/a&gt;to help users restore locked accounts.&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.21/austrian-big-brother-awards-2011"&gt;13th Austrian Big Brother Awards &lt;/a&gt;were held on October 25th in Vienna. “Winners” included the CEO of Telekom Austria, the Ministers of Interior and Justice, and the head of the anti-terror police unit. Mark Zuckerberg received the “lifelong menace” award and a “Defender of Liberty” award went to the creators of the “&lt;a class="external-link" href="http://europe-v-facebook.org/"&gt;Europe versus Facebook&lt;/a&gt;” campaign.&lt;/p&gt;
&lt;p&gt;The&lt;a class="external-link" href="https://www.rightscon.org/"&gt; Silicon Valley Human Rights Conference &lt;/a&gt;was held in San Francisco in late October (see GVA's report, Jillian York's report, and The Economist's) and released the &lt;a class="external-link" href="http://www.rightscon.org/2011/10/silicon-valley-human-rights-standards/"&gt;Silicon Valley Standard&lt;/a&gt;, a set of 15 principles that technology companies should follow in order to protect human rights.&lt;/p&gt;
&lt;p&gt;China's Weibo &lt;a class="external-link" href="http://technode.com/2011/10/30/sina-weibo-launching-english-version-soon-with-the-partnership-of-flipboard-and-instagram/"&gt;plans to launch an English version &lt;/a&gt;in partnership with Flipboard and Instagram. Will they agree to follow the Silicon Valley Standard?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Alert&lt;/strong&gt;: The security researcher Barnaby Jack has found it possible to conduct a &lt;a class="external-link" href="http://www.infosecurity-magazine.com/view/21601/barnaby-jack-hacks-diabetes-insulin-pump-live-at-hacker-halted/"&gt;blind attack on insulin pumps&lt;/a&gt;.&amp;nbsp; While there have been no reports of anyone being harmed by such an attack, this highlights how far behind security technologies are when it comes to wireless devices that are embedded in critical infrastructure and medicine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Publications&lt;/strong&gt;:&lt;a class="external-link" href="http://themonkeycage.org/blog/2011/10/22/digital-cameras-reduce-electoral-corruption/"&gt; Digital Cameras Reduce Electoral Corruption &lt;/a&gt;by Michael Callen and James Long.&lt;/p&gt;
&lt;p&gt;Events: Check out this &lt;a class="external-link" href="https://www.google.com/calendar/embed?src=openinternetdigest%40gmail.com&amp;amp;ctz=America/New_York"&gt;handy calendar of Internet-related events&lt;/a&gt; around the world, courtesy of Internews!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;, by the OpenNet Initiative, to be officially released in December. Part I of the book (including a chapter by yours truly) can be read online or downloaded &lt;a class="external-link" href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: This report was compiled with considerable help from Ted Eby and Weiping Li.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/07/netizenreport-transparency/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/netizen-report'&gt;http://editors.cis-india.org/news/netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T04:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/bio-diversity-informatics-workshop">
    <title>Western Ghats Portal: Workshop on Biodiversity Informatics</title>
    <link>http://editors.cis-india.org/news/bio-diversity-informatics-workshop</link>
    <description>
        &lt;b&gt;The Western Ghats portal team is organising a one-day workshop to explore the contemporary state on biodiversity informatics on 25 November 2011 at Ashoka Trust for Research in Ecology and Environment (ATREE), Bangalore.&lt;/b&gt;
        
&lt;h2&gt;Schedule&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:00 – 09:20&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Registration of participants&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:20 – 09:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Welcome / Introduction&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;09:30 – 11:15&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Plenary talks - Technology behind biodiversity informatics (3 talks)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;11:15 – 11:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Tea break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;11:30 – 12:30&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Plenary talks - Scientific commons and policy (2 talks)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;12:30 – 13:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Discussion&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;13:00 – 14:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;Lunch break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;14:00 – 16:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Biodiversity portals in India - Presentations by different teams/panel discussion&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;16:00 – 16:15&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Tea break&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;16:15 – 17:00&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;Discussions and networking&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Spheres of the Workshop:&lt;/h2&gt;
&lt;h3&gt;Plenary I: Technology behind biodiversity informatics - 0930 - 1115 hrs&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Development of Information System, Open Data standards, Archive and Geospatial solutions,&amp;nbsp;Visualization in Bhuvan - Arul Raj&lt;/strong&gt;, National Remote Sensing Centre (NRSC), Indian Space&amp;nbsp;Research Organisation (ISRO) - 20 mins + 10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Exploring the semantic web for species pages - M. Sravanthi&lt;/strong&gt;, Western Ghats Portal - 20 mins +&amp;nbsp;10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Challenges on the emerging discipline of Biodiversity Informatics - Donald Hobern&lt;/strong&gt;, Atlas of&amp;nbsp;Living Australia - 30mins + 10 mins discussion&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The objective of this session is to understand the global developments in biodiversity informatics in&amp;nbsp;relation with developments in India. The session will focus on:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;the evolution of the discipline of biodiversity informatics and its current status&lt;/li&gt;&lt;li&gt;the development of standards in Indian context&lt;/li&gt;&lt;li&gt;the technologies for biodiversity informatics&lt;/li&gt;&lt;li&gt;the challenges in biodiversity informatics&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Plenary II: Scientific commons and policy - 1130 - 1300 hrs&lt;/strong&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Commons in the context of Biodiversity Information - Danish Sheikh&lt;/strong&gt;, Alternative Law Forum - 20&amp;nbsp;mins + 10 mins&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Open data in the scientific realm - Sunil Abraham&lt;/strong&gt;, Centre for Internet and Society - 20 mins + 10&amp;nbsp;mins&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;Discussion on Scientific commons and Policy - 30 mins&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;br /&gt;
&lt;div&gt;The objective of the session is to understand the commons principle and its implications for scientific&amp;nbsp;research. The session will focus on:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;the experience of developing a creative commons policy in Indian scenario and the resulting impacts for scientific collaboration, open data and open access&lt;/li&gt;&lt;li&gt;policy and social implications of open data sharing&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Plenary III - Biodiversity portals in India - 1400 - 1700 hrs&lt;/h3&gt;
&lt;div&gt;&lt;strong&gt;Moderation&lt;/strong&gt;: R. Prabhakar/ MD Madhusudhan&lt;br /&gt;&lt;strong&gt;Panelists&lt;/strong&gt;: (Introductory note by each of the panelists - 10 minutes each)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Suhel Quader&lt;/strong&gt;, Season Watch (&lt;a class="external-link" href="http://www.seasonwatch.in"&gt;www.seasonwatch.in&lt;/a&gt;), Migrant Watch (&lt;a class="external-link" href="http://www.migrantwatch.in"&gt;www.migrantwatch.in&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Sanjay Molur&lt;/strong&gt;, Pterocount (&lt;a class="external-link" href="http://www.pterocount.org/"&gt;www.pterocount.org/&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;K.N.Ganeshaiah&lt;/strong&gt; - Indian Bioresource Information Network (www.ibin.co.in)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Ramesh BR&lt;/strong&gt; - Western Ghats Portal (&lt;a class="external-link" href="http://www.thewesternghats.in/"&gt;www.thewesternghats.in/&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Shwetank Verma&lt;/strong&gt;, Biodiversity of India, formerly Project Brahma (&lt;a class="external-link" href="http://www.biodiversityofindia.org"&gt;http://www.biodiversityofindia.org&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Krishnamegh Kunte&lt;/strong&gt;, ifoundbutterflies &lt;a class="external-link" href="http://ifoundbutterflies.org/"&gt;(http://ifoundbutterflies.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Vijay Barve&lt;/strong&gt;, DiversityIndia (&lt;a class="external-link" href="http://diversityindia.org/"&gt;http://diversityindia.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Deepak Menon&lt;/strong&gt;, India Water Portal (&lt;a class="external-link" href="http://www.indiawaterportal.org/"&gt;http://www.indiawaterportal.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Chitra Ravi&lt;/strong&gt;, India Biodiversity Portal (&lt;a class="external-link" href="http://indiabiodiversity.org/"&gt;http://indiabiodiversity.org/&lt;/a&gt;)&lt;br /&gt;&lt;strong&gt;Mr D.K Ved&lt;/strong&gt;, Foundation for Revitalisation of Local Health Traditions (&lt;a class="external-link" href="http://envis.frlht.org"&gt;http://envis.frlht.org&lt;/a&gt;)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Focus&lt;/strong&gt;:&lt;br /&gt;
&lt;div&gt;The objective of the session is to learn from each other’s experience and develop a combined vision&amp;nbsp;for the future of biodiversity informatics in India. The panelists will present a focused summary of the&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;key features available on their portals&lt;/li&gt;&lt;li&gt;the experience of building the portal&lt;/li&gt;&lt;li&gt;the key lessons learnt&lt;/li&gt;&lt;li&gt;future plans&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;We believe these four aspects will be of common interest to all participants and the presentations are&amp;nbsp;expected to stimulate discussion around these four aspects.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Summary of the Day&lt;/strong&gt;: R Prabhakar - Call for synergy/collaboration/Thank you!!&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Concept Note&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;Rapid advancements in the domains of computer Science and information technologies have allowed&amp;nbsp;integration of biodiversity information and analytical capabilities to collaborate on social networks,&amp;nbsp;leading to the emergence of a new discipline, Biodiversity Informatics. The dynamics in this discipline&amp;nbsp;are defined by integrating multiplicity with the semantic web and enabling of democratic social&amp;nbsp;networks focused on biodiversity. We are bound to see tremendous diversification in the scope of&amp;nbsp;biodiversity informatics globally and in India.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Harnessing technology for aggregating, storing, querying and analyzing biodiversity data has seen&amp;nbsp;major developments over the last decade. There has been a plethora of biodiversity information&amp;nbsp;resources that include mailing lists and discussions groups, occurrence records, geographical&amp;nbsp;databases, biodiversity image libraries, institutional databases, species description pages, specimen&amp;nbsp;records of herbaria and museum databases, and biodiversity focused Internet sites. The challenges&amp;nbsp;on the biodiversity informatics landscape are on two fronts: (1) A semantic web framework to link&amp;nbsp;these biodiversity information islands; and (2) Effective and flexible data exchange standards for&amp;nbsp;seamless information sharing among these sites.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The evolution of social networks and communities around biodiversity information systems has&amp;nbsp;been a unique factor in influencing the ways in which these information systems have developed.&amp;nbsp;The assimilation and aggregation of user-generated biodiversity data and dissemination under&amp;nbsp;the 'commons' principle has gained momentum globally. It has changed the way scientific&amp;nbsp;collaborations are being made, and created possibilities for effective citizen-science initiatives. It is&amp;nbsp;now possible to ask fresh questions, with more data, newer methods, better tools and for citizens to&amp;nbsp;participate and report data from different geographies. With this, local-level data can be integrated&amp;nbsp;with large-scale data leading to a better understanding of biodiversity.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;With the increased penetration of the Internet into developing economies, and the widespread&amp;nbsp;adoption of web technologies, biodiversity informatics has spawned an impressive variety of&amp;nbsp;initiatives. These initiatives range from global knowledge bases and networks, national initiatives,&amp;nbsp;eco-region based initiatives, as well as sharply focused initiatives which address a single species or&amp;nbsp;event. There have been tangible advantages for stakeholders from these initiatives which has inspired&amp;nbsp;many other endeavours. Success stories exist at both global and local level, and learning from these&amp;nbsp;experiences can help one understand the multi-faceted nature of this discipline.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;The Western Ghats Portal team is organising a one-day workshop to explore the contemporary state&amp;nbsp;of biodiversity informatics as expressed in three spheres: i) technology behind biodiversity informatics,&amp;nbsp;ii) scientific commons and policy and iii) biodiversity portals in India. With these objectives in mind,&amp;nbsp;we welcome your active participation during the workshop. It could provide an opportunity for us to&amp;nbsp;interact and learn from similar endeavors in this discipline.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Download the agenda &lt;a href="http://editors.cis-india.org/openness/wgp-agenda.pdf" class="internal-link" title="Western Ghats Portal Workshop in Bangalore"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 124 kb]&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/bio-diversity-informatics-workshop'&gt;http://editors.cis-india.org/news/bio-diversity-informatics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-11-08T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian">
    <title>e-Accessibility Policy Handbook for Persons with Disabilities (Russian Version)</title>
    <link>http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian</link>
    <description>
        &lt;b&gt;The e-Accessibility Policy Handbook for Persons with Disabilities is based upon the online ITU-G3ict e-Accessibility Policy Toolkit for Persons with Disabilities (www.e-accessibilitytoolkit.org) which was released in February 2010. This is the Russian translation of the same.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://g3ict.org/resource_center/e-Accessibility%20Policy%20Handbook"&gt;Toolkit&lt;/a&gt; and its companion handbook have contributions from more than 60 experts around the world on ICT accessibility and is a most valuable addition to policy makers and regulators, advocacy and research organisations and persons with disabilities on the implementation of the ICT dispositions of the CRPD.&lt;/p&gt;
&lt;p&gt;The handbook is a joint publication of ITU, G3ict and the Centre for Internet and Society, in cooperation with The Hans Foun­da­tion. The book is com­piled and edit­ed by Nir­mi­ta Narasimhan. Preface by Dr. Hamadoun I. Toure, Sec­re­tary-​Gen­er­al, In­ter­na­tion­al Telecom­mu­ni­ca­tion Union. Introduction by Dr. Sami Al-​Basheer, Di­rec­tor, ITU-D. Foreword by Axel Leblois, Ex­ec­u­tive Di­rec­tor, G3ict.&lt;/p&gt;
&lt;p&gt;UNIC Moscow (United Nations Information Centre - Moscow) has translated the English version of the kit to Russian. For more information on the translation initiative by UNIC Moscow,&lt;a class="external-link" href="http://www.unic.ru/news_inf/viewer.php?uid=164"&gt; click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Download the Russian version &lt;a href="http://editors.cis-india.org/accessibility/e-accessibility-russian-handbook.pdf" class="internal-link" title="e-Accessibility Policy Handbook (Russian Version)"&gt;here&lt;/a&gt;&amp;nbsp;(PDF, 1045 kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian'&gt;http://editors.cis-india.org/accessibility/e-accessibility-kit-in-russian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-04-26T10:04:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/blocking-content-google-gets-more-requests">
    <title>Blocking online content: Google gets more requests than govt</title>
    <link>http://editors.cis-india.org/news/blocking-content-google-gets-more-requests</link>
    <description>
        &lt;b&gt;Allowing a peek into what kind of information is requested to be blocked online and by who, the Department of Information Technology (DIT), in response to an RTI (Right to Information) query, has provided some intriguing details, says Pallavi Polanki in this article published in Firstpost.com on 2 November 2011.&lt;/b&gt;
        
&lt;p&gt;DIT lists names of bureaucrats, police officers and one politician who requested blocking content online as well as the websites they identified.&lt;/p&gt;
&lt;p&gt;In all, 68 individual items were requested to be blocked under the Information Technology (Procedure and Safeguards for Blocking Access of Information by Public) Rules 2009, to the DIT, which is the only authority mandated by the Information Technology Act 2000, to order blocking online content.&lt;/p&gt;
&lt;p&gt;Speaking to Firstpost, Pranesh Prakash, programme manager at the Centre for Internet and Society, Bangalore, who requested for the information under the RTI Act — and has posted it on a blog analysing the information received from DIT — said, "Information from a previous RTI application uncovered what all websites were officially blocked by the DIT, while this one uncovers what all website blocking requests the DIT received."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;No prizes for guessing; pornographic sites topped the list of websites requested to be blocked. Mumbai’s Joint Commissioner of Police (Crime) listed 60 adult content sites in his request. However, the DIT doesn’t seem to have accepted the officer’s request. The sites remain accessible.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_google380.jpg/image_preview" alt="Google's 380" class="image-inline image-inline" title="Google's 380" /&gt;&lt;/td&gt;
&lt;td&gt;Haneef Ali, Andhra Pradesh State President of the Bharatiya Janata Minority Morcha, is the only politician on the list. He requested the blocking of a&amp;nbsp;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;blogpost&lt;/a&gt;, the title of which translates to "insult against Islam".&lt;br /&gt;&lt;br /&gt;Up to four requests were made for blocking of political content, two of which came from Tamil Nadu.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The secretary, Public (Law and Order) Department requested for the website tamil.net.in to be blocked and the principal secretary, IT Department, requested a blog to be shut down. Only the first request seems to have been accepted.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, in the line of political fire was a Wikipedia entry for Sukhbir Singh Badal. The principal secretary, IT Department, Punjab, requested the Wikipedia entry with the address ‘en.wikipedia.org/Wiki/Sukhbir Singh Badal’ to be blocked. However, Wikipedia does have an entry for the deputy chief minister of Punjab with a slightly tweaked address.&lt;/p&gt;
&lt;p&gt;Not surprisingly, Mumbai’s Joint Commissioner of Police (Crime) wanted a YouTube video ( identified in Prakash’s blog as a video of Bal Thackeray’s speech) to be blocked. Click on the link and a message from YouTube reads: "This video has been removed because its content violated YouTube’s Terms of Service. Sorry about that."&lt;/p&gt;
&lt;p&gt;A betting site betfair.com was sought to be shut down by a senior inspector from Mumbai’s cyber crime cell. No luck. The site remains up and running.&lt;/p&gt;
&lt;p&gt;Finally, Maharashtra’s Commissioner sent in &lt;a class="external-link" href="http://www.topix.net/"&gt;two&lt;/a&gt; &lt;a class="external-link" href="http://www.exbii.com/"&gt;requests&lt;/a&gt;: &amp;nbsp;Both are running.&lt;/p&gt;
&lt;p&gt;Now for the interesting part: Prakash states that the data provided by the government "seemingly conflicts with the data released by the likes of Google (via its Transparency Report)."&lt;/p&gt;
&lt;p&gt;According to Google’s &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Transparency Report&lt;/a&gt;, released on 25 October, Google received requests for 358 individual items to be removed from its different services between January and June 2011. And 407 such requests were made in 2010.&lt;/p&gt;
&lt;p&gt;Information provided by DIT, however, shows that only requests for 68 items (64 websites, one blog, and three specific web-pages) from eight separate requests were made to it. Of these, only three were for Google’s services (two for Blogger and one for YouTube), points out Prakash.&lt;/p&gt;
&lt;p&gt;While only DIT has the authority to order blocks, Google data shows that requests to ‘remove content’ far outnumber the requests made to DIT, suggesting that Google is receiving these requests directly from law enforcement agencies.&lt;/p&gt;
&lt;p&gt;"The only explanation for this is that an order to ‘block for access… or cause to be blocked for access by the public’ is taken to be different from an order for removal of content… That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits,"states Prakash. (emphasis added).&lt;/p&gt;
&lt;p&gt;Prakash makes the case that when law enforcement agencies send requests to companies like Google to remove content they are "operating outside bounds set up by the Indian Penal Code and the Code of Criminal Procedure as also the Information Technology Act."&lt;br /&gt;&lt;br /&gt;He adds that companies tend to comply with such ‘requests’ even when they are not under legal obligation to do so because it might appear to them to "violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines."&lt;/p&gt;
&lt;p&gt;"This way, the intention of Parliament in enacting Section 69A of the IT Act — to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated," states Prakash.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This article has been republished from Firstpost.com. The original can be read &lt;a class="external-link" href="http://www.firstpost.com/india/google-indias-new-department-of-information-technology-121170.html"&gt;here&lt;/a&gt;.&amp;nbsp;You can read Firstpost’s continuing RTI coverage &lt;a class="external-link" href="http://goo.gl/SlCgT"&gt;here&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/blocking-content-google-gets-more-requests'&gt;http://editors.cis-india.org/news/blocking-content-google-gets-more-requests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-11-03T10:45:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/learn-yourself">
    <title>Learn It Yourself</title>
    <link>http://editors.cis-india.org/news/learn-yourself</link>
    <description>
        &lt;b&gt;The peer-to-peer world of online learning encourages conversations and reciprocal learning, writes Nishant Shah in an article published in the Indian Express on 30 October 2011. &lt;/b&gt;
        
&lt;p&gt;Technologies and learning have always had a close link. In the past, distance learning programmes of higher education through the postal service, remote education programmes using satellite TV and interactive learning projects using information and communication infrastructure, have all been deployed with varied results in promoting literacy and higher education. In the last two decades, the internet has also joined this technology ecology in trying to provide quality and affordable education to remotely located areas through “citizen service centres” envisioned to reach 6,40,000 Indian villages in the future.&lt;/p&gt;
&lt;p&gt;These technology-based information outreach programmes expand the ability of traditional formal learning centres like universities, to cater to the needs of those who might not have access to learning resources. This vision of networked education relies on existing systems of centralised syllabus making, teacher-to-student information transfer, grade-based evaluation and accreditation systems, and a degree-centred approach to learning.&lt;/p&gt;
&lt;p&gt;I was in New York last week, at an international summit on the future of learning, Mobility Shifts, organised by the New School, where more than 260 speakers from 21 countries discussed the possibility of learning beyond the bounds of the school and university system. Many discussions were around the declining public education system (with huge disinvestment moves from the government), privatisation of education, increasing tuition and fees, and the non-relevance of current education. However, along with this digital expansion of the traditional education system is an emerging trend that challenges the ways in which we understand education and learning – DIY Learning or Do It Yourself Learning.&lt;/p&gt;
&lt;p&gt;DIY Learning is a product of the networked condition. It recognises that as more people get onto digital information networks, there is a possibility of producing peer-to-peer learning conditions, which do not have to follow our accepted models of learning and education.&lt;/p&gt;
&lt;p&gt;We have seen the rise of various decentralised and democratised knowledge repositories like Wikipedia. The search based algorithms of search engines also take into consideration the idea that knowledge is personal. User generated content sites like eHow.com show that the individual learner is not merely a recipient of information and knowledge. Information seeking spaces like Quora have shown that knowledge-sharing communities can incite new conditions of learning. Our contexts, experiences, everyday practices, aspirations etc. equip us with valuable information, which not only shape how we learn but also what we find relevant to learn for ourselves. DIY Learning picks up on the idea that the infrastructure of education is not necessarily designed towards learning. Learning often happens outside the classrooms, in informal conversations.&lt;/p&gt;
&lt;p&gt;Thus DIY Learning offers a new model of learning. It destabilises the established hierarchy of knowledge production and pedagogy and creates an each-one-teach-one model with a twist. Instead of a centralised board of curriculum designer who shape syllabi for the “average” student, you have the possibility of customised, highly individual, interest-based learning curricula where the student is a part of deciding what s/he wants to learn. DIY Learning doesn’t recognise the distinctions between teachers and students, but recognises them as “peers” within a network, encouraging conversations and reciprocal learning rather than information transfer based classroom models. Instead of mass-produced education that caters only to an imagined average, the DIY Learning model recognises that within the same student group, there are different rates and scales of learning, thus offering environments suited to the aptitude of the students.&lt;/p&gt;
&lt;p&gt;Within the DIY Learning model, aspects of education, from the design of curriculum and learning methods, to grading and evaluation are geared towards individual preferences and aspirations.&lt;/p&gt;
&lt;p&gt;Many people think of DIY Learning as an alternative to mainstream learning processes and structures. However, it is perhaps more fruitful to think of DIY Learning as a way of figuring out the problems that beset our traditional educational system. It allows us to rethink the relationships between learning, education, teaching and technologies. It recalibrates the space of the classroom and reconfigures the role of the teacher and the student.&lt;/p&gt;
&lt;p&gt;DIY Learning emphasises that merely building schools and universities is not enough to assure that learning happens. Learning happens through experiences, practice, conversations, internalisations and through making mistakes. DIY Learning offers these possibilities in an education universe that is constantly refusing to take risks, innovate and adapt to the needs of the present. By itself it might not be able to take on the roles and functions of the existing education systems. But it does warn us that we are preparing our students for our pasts rather than their futures. And the time to change is now.&lt;/p&gt;
&lt;p&gt;The original story was published in the Indian Express, it can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/learn-it-yourself/867069/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/learn-yourself'&gt;http://editors.cis-india.org/news/learn-yourself&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-23T05:01:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/facing-up-to-moral-hazard">
    <title>Facing up to Moral Hazard</title>
    <link>http://editors.cis-india.org/telecom/facing-up-to-moral-hazard</link>
    <description>
        &lt;b&gt;Systems upholding the law and standards help navigate the grey areas of moral hazard and adverse selection writes Shyam Ponappa in this article published in the Business Standard on October 6, 2011.&lt;/b&gt;
        
&lt;p&gt;Amid the general sense of an ailing socio-economic environment in the country, consider these situations:&lt;/p&gt;
&lt;p&gt;Coal supplies for power generation are eight per cent short of generation capacity. Worse, nearly 42,000 Mw of additional generation capacity over the next five years is jeopardised because anticipated supplies are short by two-thirds of the requirement (100 million tonnes against demand for 313 million tonnes).&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The rural employment guarantee scheme, well intentioned and with some reported successes (as in Melghat in Vidarbha), shows few tangible results while distorting farm labour practices and pricing. The reasons are many: inadequate design and supervision (mud roads that are washed away every year), no integration with agricultural programmes, palliatives that deny real infrastructure and support, like extension schemes that build on successes leveraging ICT, no skill development for alternative (self) employment, and so on.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The telecommunications sector is buffeted by scandal, the downward spiral of public sector operators BSNL and MTNL, and pressures of intense competition with constrained resources and regulations.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Leaving aside venality, a common thread is of laws and rules not upheld, slack standards, contracts not honoured, an absence of hard decisions and the requisite effort, and a degradation of mindsets. These are the grey areas of “moral hazard” on the one hand – where protection from the consequences of irresponsible actions induces irresponsibility – and of adverse or negative selection on the other, avoiding the best feasible choices for easier, inferior alternatives. They are widespread, and need assiduous effort to identify and set right with systems, even as criminality is dealt with by the legal system. Good people do not game situations for self-gain, but everyone faces the hazard in making choices. The importance of devising and upholding credible systems, standard operating procedures and laws that are seen to work through incentives and penalties is that these perceptions uphold the social contract and protect one from moral hazard.&lt;/p&gt;
&lt;p&gt;Whatever the policies, they must have integrity and coherence; the hazard arises from not ensuring these conditions. The specific hazard is the change in behaviour for the worse. Absent this skein of expectations and constraints, there is no coherence to every individual’s uncoordinated wish list or gripes. This is the problem with well-intentioned social vigilantism, because it destroys the very fabric of order.&lt;/p&gt;
&lt;h3&gt;Down the Slippery Slope&lt;/h3&gt;
&lt;p&gt;The hazards in grey areas are manifested in several ways.&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Abdication of responsibility by the government:&lt;/strong&gt; The most prominent moral hazard may be the central government’s abdication of responsibility epitomised by the 2G scandal. A redeeming feature is that some alleged perpetrators are being prosecuted eventually — although how matters end will establish whether it is truly a redemption or a perpetuation of banditry with the state’s complicity (by abstaining from intervention). Similar scandals in mining and civil aviation are unravelling or are on the brink. It is these egregious developments added to the hassles in routine dealings with the government that have led to such public alienation.&lt;br /&gt;&lt;br /&gt;There are also many errors of government omission or inaction, such as initiatives not taken in infrastructure, like stalled efforts at power supply reforms, including the state governments’ reluctance to address sustainable electricity tariffs, or not reducing the extent of administered pricing and taxes in petroleum products (or state governments imposing non-uniform sales tax), the deterioration in the railways, and so on.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Taking to the streets:&lt;/strong&gt; Citizens who feel alienated can take to the streets when they are desperate or outraged. This seems to be the sentiment not only in the Arab spring, but also in varying degrees in established democracies in Europe, Israel and India. There are incipient signs even in America, with the amorphous “Occupy Wall Street” movement spreading from New York to other cities, protesting against various inequities.&lt;br /&gt;&lt;br /&gt;When both government and citizens are irresponsible, chaos follows. In India, absence of governance is an extenuating circumstance for activism. But equally, there are indefensible lapses by citizens: the unwillingness to be disciplined, to outgrow the anti-colonial paradigm of railing against the government-as-imperial-ruler, of fasting and civil disobedience as acceptable forms of protest, of not subscribing to order, whether in traffic, respecting queues, or managing garbage and sanitation. Yet, reports of queuing by Delhi Metro users suggest that we can perform if we must — as do all the IT professionals delivering services to international markets. But for the most part, we rail against other people’s transgressions, while being unwilling to observe discipline ourselves.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Corporate chicanery&lt;/strong&gt;: Apart from criminality such as in the mining and 2G scams, there is the grey area of bending the rules. Examples include the financial and operational performance of many real estate developers, or the poor automotive service quality that is an adjunct to the undeniably more refined automobiles themselves.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Media overreach&lt;/strong&gt;: The advent of 24x7 news channels is a boon for choice and sourcing. Tragically, many have morphed into whipping up a frenzy rather than delivering solid news and balanced views, given the battle for viewership with a lowest-common-denominator bias for sensationalism.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Stalled government decisions&lt;/strong&gt;: Government decisions in a number of areas were already stalled owing to problems in the approach to land acquisition, environmental effects, and in sectors such as nuclear energy. A combination of circumstances comprising all these and hyper-aggressive audits, a popular outcry stoked by frenzied media treatment relating to scams in land acquisition, 2G spectrum, and mines, has in effect created a gridlock, in which no forward-looking decisions seem possible, because of the risk of retribution for perceived missteps or errors of judgment, with hindsight.&lt;br /&gt;&lt;br /&gt;The grey areas occupy the space between what we want – superior standards – and what we have, which is a slackness of systems because of widespread shoddiness in the practice of leadership and citizenship, with neither inspiring confidence in the other. The way out is conceptually simple, though difficult to execute: take responsibility, devise coherent systems and practices in all areas, with incentives and penalties applied impartially, and live by them.&lt;br /&gt;&lt;br /&gt;Read the original article in the Business Standard &lt;a class="external-link" href="http://www.business-standard.com/india/news/shyam-ponappa-facingto-moral-hazard/451562/"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/facing-up-to-moral-hazard'&gt;http://editors.cis-india.org/telecom/facing-up-to-moral-hazard&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-10-26T12:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/vanishing-fingerprints-put-uid-in-question">
    <title>India’s vanishing fingerprints put UID in question</title>
    <link>http://editors.cis-india.org/news/vanishing-fingerprints-put-uid-in-question</link>
    <description>
        &lt;b&gt;A curious situation has come to light at the UID (unique identity) enrolment centres. Call it the phenomenon of vanishing fingerprints. You see, our unique fingerprints don’t necessarily last a lifetime and they can be damaged or destroyed and, in some cases, even non-existent. And that is not the best scenario for the first-of-its-kind project that endeavours to create a unique identity for India’s billion-plus population based on fingerprints and iris scans (or biometric data).&lt;/b&gt;
        
&lt;p&gt;To find out more,&lt;em&gt; Firstpost &lt;/em&gt;visited five UID centres in the North West district, which incidentally has the highest enrolments (619,571 and counting) among Delhi’s nine districts since the show hit the road in February 2011, and one centre in North Delhi.&lt;/p&gt;
&lt;p&gt;The officials at the Unique Identification Authority of India (UIDAI) will tell you that there is no overemphasising the importance of the quality of biometric data to the success of the super ambitious UID, now known as Aadhar project. If the quality of a person’s biometric data is poor, it automatically compromises the authentication of that data by him when he wants to access a service based on his UID.&lt;/p&gt;
&lt;p&gt;So what happens when the data – fingerprints, for instance – are inherently unreliable on account of various biological and socio-economic reasons, some of which are especially relevant to the Indian context.&lt;/p&gt;
&lt;p style="text-align: left;"&gt;&lt;img src="http://editors.cis-india.org/home-images/uid2.jpg/image_preview" alt="uid 2" class="image-inline" title="uid 2" /&gt;&lt;/p&gt;
&lt;p&gt;The UIDAI’s Committee on Biometrics in a December 2009 was rather forthright about its reservations on the fingerprint reliability. Titled Biometrics Design Standards For UID Applications (page 4, para 4), it stated, "….two factors however, raise uncertainty about the accuracy that can be achieved through fingerprints. First, retaining efficacy while scaling the database size from fifty million to a billion has not been adequately analysed. Second, fingerprint quality, the most important variable for determining de-duplication accuracy, has not been studied in depth in the Indian context." (Emphasis added).&lt;/p&gt;
&lt;p&gt;The findings on the ground were revelatory. Operators and technical experts at the UID enrolment centres confirmed to Firstpost that they routinely came across cases where fingerprints had been damaged/destroyed/underdeveloped. And such cases, they said, were more common among senior citizens, those involved in manual labour (who handle rough objects, for instance) and children (mostly below 10 years of age).&lt;/p&gt;
&lt;p&gt;Here is an example that &lt;em&gt;Firstpost &lt;/em&gt;observed.&lt;/p&gt;
&lt;p&gt;Batuli, 72, arrived at around noon at the Basti Vikas Kendra, now also a UID centre, in Mangol Puri to get herself a ‘smart card’ everyone has been talking about. (The 'Aadhar' brand name hasn’t caught on in these parts of Delhi, with everyone insisting on calling it the 'smart card'.)&lt;/p&gt;
&lt;p&gt;The helpful operator with the fancy gadgets helps Batuli to her seat. After her photo is taken, Batuli is asked to place four fingers — one hand at a time — on a green-lit device. Right hand, then left hand.&lt;/p&gt;
&lt;p&gt;She is, however, asked to repeat the exercise a second time for the left hand. The operator explains. "In some case, we have to scan the fingerprints and Iris multiple times. If it doesn’t pass the required quality percentage of 70 per cent (the quality is indicated in percentage terms on the computer screen that is connected to the fingerprint machine, see pic), we repeat the exercise up to four times."&lt;/p&gt;
&lt;p&gt;Batuli’s hands are then wiped using a cloth and placed back on the device. The exercise is repeated a fourth and final time. But still the same result. 'Fail', declares the reading on the operator’s computer.&lt;/p&gt;
&lt;p&gt;An operator at the next station, says, "In the case of senior citizens, Iris scans also sometime fail. It registers weakly when the retina is damaged."&lt;/p&gt;
&lt;p&gt;(Enrolment centres are run by private companies on contracts given by registrars chosen by the UIDAI. Strategic Outsourcing is one such company and it runs many of centres in the North West and South West districts of Delhi.)&lt;/p&gt;
&lt;p&gt;The project coordinator of the UID enrolment centre working out of the Destitute Welfare Trust, an NGO in Sultanpuri, too, confirmed that he was aware of the problem of damaged fingerprints and the challenge it posed in getting good quality fingerprint data.&lt;/p&gt;
&lt;p&gt;"The hands of children are very soft and in some cases fingerprints are not yet fully developed. Also, children tend to have sweaty hands and this can interfere with the quality of fingerprints. Extremely dry hands also pose problems. We have to often, wipe the hands or provide lotion to improve the quality of fingerprints," said a technical expert working with Strategic Outsourcing.&lt;/p&gt;
&lt;p&gt;While the number of attempts, as prescribed by the UIDAI, to get a stronger finger print when the result reads 'fail' is four, operators report that sometimes attempts go up to 10 to 15. (The machine picks up the strongest impression of the attempts made). They say they didn’t anticipate such a problem and it was only when they started enrolments in January that they were confronted with such a scenario. “Now, of course, everybody knows about it."&lt;/p&gt;
&lt;p&gt;'Everybody' implies those who are directly involved in collecting biometric data. An operator from another private company Smartchip working in a JJ (slum) colony in the North Delhi district of Model town, revealed similar problems on being probed. &amp;nbsp;"A fingerprint strength of 70 percent or more is pass. About 10 per cent of the cases we get every day register the 'fail' reading. What can we do? In the case of stone cutters, for instance, the fingers are completely smooth, the fingerprints are completely wiped out."&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy6_of_copy5_of_copy4_of_copy3_of_copy2_of_copy_of_uid3.jpg/image_preview" alt="uid 3" class="image-inline image-inline" title="uid 3" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;So what are the implications of poor quality fingerprints for the UID project? The UIDAI admitted that it could provide challenges to authentication.&lt;br /&gt;&lt;br /&gt;In an email response to Firstpost, Sujata Chaturvedi, UIDAI’s Deputy Director General for the Delhi region said, "It could provide some challenges in de-duplication although that has been mitigated to a large extent by the decision of the UIDAI to go in for iris an additional de-duplication factor… Also to be noted is the fact that normally not all fingers are equally de-graded. So UIDAI is evolving a protocol to inform the residents about their good quality fingerprints as part of the Aadhaar letter so that they are aware of the finger to use for authentication."&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;But not everyone is convinced. Sunil Abraham is the executive director of Centre for Internet and Society (CIS), which has written seven open letters to the Standing Committee on the Finance Branch (before which is the National Identification Authority of India Bill, 2010) asking the committee to consider their research on the UID project and change aspects of the Bill and the project.&lt;/p&gt;
&lt;p&gt;The seventh letter sent last week, says Abraham, provides statistical analysis that demonstrates how the UID will never be able to create a unique database.&lt;/p&gt;
&lt;div class="pullquote"&gt;"In CIS’s seventh open letter to the finance committee, statistical analysis reveals that UIDAI tender specification is 1,000 times less accurate than it should be to have a reasonable chance of building a truly unique database. This analysis depends on high quality biometrics. With poor biometric quality the problem of de-duplication is compounded."&lt;/div&gt;
&lt;p&gt;When UIDAI was asked what the percentage of the population enrolled (all India and Delhi) had recorded below-standard fingerprint quality, no specific data was forthcoming.&lt;/p&gt;
&lt;p&gt;Chaturvedi wrote, "Currently the population with very poor quality fingerprints is a very small percentage. It must also be remembered that this population is scattered all over the country."&lt;/p&gt;
&lt;p&gt;In India, even a small percentage translates to millions of people. "Small percentage could mean absolutely anything. Why can’t they be more specific? One percent in the Indian context is 12 million people," said Abraham.&lt;/p&gt;
&lt;p&gt;On how the UIDAI was dealing with challenge of poor fingerprint quality, Chaturvedi said, "Even amongst the populace that has damaged/destroyed/underdeveloped fingerprints, chances are very high that they would have at least one good fingerprint that could be used for authentication. Second, UIDAI is also starting to actively develop iris authentication ecosystem. Fingerprint authentication and iris authentication could supplement each other to ensure a universal coverage."&lt;/p&gt;
&lt;p&gt;She added that Aadhaar authentication will supplement and work in conjunction with existing authentication systems to strengthen the overall authentication rather than replace completely the existing authentication systems.&lt;/p&gt;
&lt;p&gt;That begs the question, as Abraham puts it, "If the UIDAI is not going to replace existing forms of authentication it is not clear why the government is spending all this money on unproven biometric technology."&lt;/p&gt;
&lt;p&gt;Chaturvedi, however, maintained that the initial PoC (proof of concept) study that was taken up in Andhra Pradesh, Karnataka and Jharkhand collected about 60,000 enrolments indicated that the biometric accuracy levels necessary for de-duplication of all residents of India are achievable.&lt;/p&gt;
&lt;p&gt;"The PoC results also indicated the time needed for capture of biometrics in typical rural conditions is small enough to support large scale enrolment. Over and above the initial PoC, the UIDAI has currently completed over 5 crore enrolments for which Aadhaars have been generated. This experience reinforces the initial PoC results that the de-duplication accuracy is sufficient and sustainable to enrol the rest of the population."&lt;/p&gt;
&lt;p&gt;The original article is written by Pallavi Polanki. It was published in Firstpost on October 24, 2011 and can be read &lt;a class="external-link" href="http://www.firstpost.com/politics/aadhar-indias-vanishing-fingerprints-put-unique-identity-in-question-115144.html/2"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/vanishing-fingerprints-put-uid-in-question'&gt;http://editors.cis-india.org/news/vanishing-fingerprints-put-uid-in-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-26T10:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/sixth-annual-meeting-igf">
    <title>Sixth Annual Meeting of the Internet Governance Forum, Nairobi: A Summary</title>
    <link>http://editors.cis-india.org/internet-governance/blog/sixth-annual-meeting-igf</link>
    <description>
        &lt;b&gt;The sixth annual meeting of the Internet Governance Forum was held from 27 to 30 September 2011 at the United Nations Office in Nairobi, Kenya. Sunil Abraham participated in six workshops: Privacy, Security, and Access to Rights: A Technical and Policy Analyses, Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward, The Impact of Regulation: FOSS and Enterprise, Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards, Access and Diversity of Broadband Internet Access and Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/b&gt;
        
&lt;h3&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 219&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Kim Pham, Expression Technologies, Civil Society (United States). The panel members included Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil), Christopher Soghoian, Indiana University (United States), Karen Reilly, Tor Project, Technical/Civil Society (United States) and Sunil Abraham, Centre for Internet and Society (India).&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Use of Digital Technologies for Civic Engagement and Political Change: Lessons Learned and Way Forward&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 184&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Katim S Touray Council Vice Chair, Free Software and Open Source Foundation for Africa and Member, ICANN Board of Directors. Fouad Bajwa of Gerry Morgan Foundation (Pakistan) was the remote moderator. Nnenna Nwakanma of Nnenna.org, Simeon Oriko of @TheKuyuProject &amp;amp;@StorySpaces, Wael Khalil, Activist and Sunil Abraham of the Centre for Internet &amp;amp; Society were the panel members. Nishant Shah from the Centre for Internet &amp;amp; Society participated remotely from Bangalore.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=184"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/873-ei-workshop-80184-use-of-digital-technologies-for-civic-engagement-and-political-change-lessons-learned-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;The Impact of Regulation: FOSS and Enterprise&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 211&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Dorothy Gordon, Director General, AITI-KACE, Judy Okite was the remote moderator. The panel members were Satish Babu, ICFOSS, India, Yves Miezan Ezo, Smile Training, Manager, (France), Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society, Bangalore, Evans Ikua, FOSS Certification Manager, ict@innovation program.&amp;nbsp;&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/842-28-september-2011-ad-workshop-73211-foss-as-an-instrument-for-accessible-development-the-impact-of-regulation-open-source-and-enterprise"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Proprietary Influences in Free and Open Source Software: Lessons to Open and Universal Internet Standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 201&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by Alejandro Pisanty, Director General for Academic Computing Services of the National University of Mexico (UNAM), Mexico. Tracy Hackshaw, Computer Society of Trinadad and Tobago, Trinadad and Tobago, Venkatesh Hariharan, Head of Public Policy and Government Affairs at Google, India and Scott O Bradner, University Technology Security Officer, Harvard University, USA were the panel members.&lt;br /&gt;See the workshop details &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=201"&gt;here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/835-28-september-2011-other-201-proprietary-influences-in-free-and-open-source-software-lessons-to-open-and-universal-internet-standards"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Access and Diversity of Broadband Internet Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 113&lt;/strong&gt;&lt;br /&gt;The workshop was moderated by N Ravi Shanker, Addl Secy, Department of Information Technology, Ministry of Information Technology, Government of India (Chair). Abhishek Singh, Director, Department of Information Technology, Ministry of Information Technology, Government of India, Venkatesh Hariharan, Head of Public Policy and Government &amp;nbsp;Relations, Google India and Sunil Abraham, Executive Director, The Centre for Internet and Society, India were the panel members.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=113"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/71-transcripts-/811-ad-feeder-workshop-113-access-and-diversity-of-broadband-internet-access-"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Putting users First: How can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Workshop No. 75&lt;/strong&gt;&lt;br /&gt;This workshop was moderated by Ambassador David Gross, Partner, Wiley Rein LLP, Yiannis Theodorou, Regulatory Policy Manager, GSMA was the remote moderator. The panel members included Pat Walshe, Director of Privacy-GSMA), Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T), Patrick Ryan, Policy Counsel, Open Internet for Google Inc, Ms Juliana Rotich, Executive Director of Ushahidi Inc, Sunil Abraham, Executive Director, The Centre for Internet and Society (India) and Ian Brown, co-director of Oxford University's Information Security and Privacy Programme.&lt;br /&gt;See the workshop details&lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt; here&lt;/a&gt;&lt;br /&gt;See the entire transcription &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/content/article/108-transcripts/870-sop-75-putting-users-first-how-can-privacy-"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/sixth-annual-meeting-igf'&gt;http://editors.cis-india.org/internet-governance/blog/sixth-annual-meeting-igf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-24T09:09:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/media-economics-workshop">
    <title>Ninth Workshop on Media Economics</title>
    <link>http://editors.cis-india.org/news/media-economics-workshop</link>
    <description>
        &lt;b&gt;The Higher School of Economics and the New Economic School have joined hands to organize the ninth workshop on media economics in Moscow on October 28 and 29, 2011. All events are scheduled to take place in Marriott Courtyard, a hotel in the centre of Moscow within 10-minute walking distance from the Kremlin, the Red Square, and the Bolshoi Theatre.&lt;/b&gt;
        
&lt;h2&gt;Workshop Program&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Friday, October 28, 2011&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning coffee&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;8:45 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Opening remarks&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Media markets - 1: Newspapers, Mergers, and Diversity&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Michal MASIKA, University of Munich&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Free commuter newspapers and the market for paid-for daily newspapers&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergey V. Popov, Higher School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lapo FILISTRUCCHI, Tilburg University and University of Florence&lt;/div&gt;
&lt;div&gt;Tobias J. Klein, Tilburg University&lt;/div&gt;
&lt;div&gt;Thomas Michielsen, Tilburg University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Merger Simulation in a Two-Sided Market: The Case of the Dutch Daily &amp;nbsp; Newspapers&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;Felix Oberholzer-Gee, Harvard Business School&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Diversity in Local Television News&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: François Keslair, Paris School of Economics&amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:00 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Media markets and Internet - 1: Advertising and Search Engines&lt;/h3&gt;
&lt;div&gt;11:30 a.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexandre de CORNIÈRE, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Search advertising&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Simon Anderson, University of Virginia&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Alexander WHITE, Tsinghua University School of Economics and Management&lt;/div&gt;
&lt;div&gt;Kamal Jain, Microsoft Research&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;The Attention Economy of Search and Web Advertisement&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Izmalkov, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:50 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Lunch&lt;/em&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;Political Economy - 1: Media, Elites, and the Groups of Influence&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Leopoldo FERGUSSON, Universidad de Los Andes&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media Markets, Special Interests, and Voters&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Alexei V. Zakharov, Higher School of Economics &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Ben Qin, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;Yanhui Wu, USC Marshall School of Business&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Determinants of Media Capture in China&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Maria Petrova, New Economic School&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Daniel STONE, Oregon State University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media and Gridlock&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Elena Panova, Academy of National Economy and Gaidar Institute&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;4:00 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets and Internet - 2: Internet Effects and Offline Media Markets&lt;/h3&gt;
&lt;div&gt;4:30 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Joel WALDFOGEL, University of Minnesota&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Bye, Bye, Miss American Pie? The Supply of New Recorded Music since Napster&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Enikolopov, New Economic School&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:10 p.m.&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Ignacio FRANCESCHELLI, Northwestern University&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;When the Ink is Gone: The Impact of Internet on News Coverage&lt;/em&gt;"&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Discussant: Ruben Durante, Sciences Po Paris &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;5:50 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Adjourn&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;7:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Dinner&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Saturday October 29th&lt;/h2&gt;
&lt;div&gt;8:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Morning Coffee&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 2: Interactions in Traditional and Digital Media Industry&lt;/h3&gt;
&lt;div&gt;9:00 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Harald Nygård Bergh, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Hans Jarle KIND, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Bjørn-Atle Reme, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;Lars Sørgard, Norwegian School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Competition between Content Distributors in Two-Sided Markets&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Guido Friebel, Goethe University Frankfurt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;9:40 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Larbi Alaoui, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;Fabrizio GERMANO, Universitat Pompeu Fabra&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Time Scarcity and the Market for News&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Sergei Guriev, New Economic School &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;10:20 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Coffee break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Political Economy - 2: Media Effects&lt;/h3&gt;
&lt;div&gt;10:50 a.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Francesco Drago, University of Naples&lt;/div&gt;
&lt;div&gt;Tommaso Nannicini, Bocconi University&lt;/div&gt;
&lt;div&gt;Francesco SOBBRIO, IMT Lucca&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Newspapers, Local News and Electoral Politics&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Ekaterina Zhuravskaya, Paris School of Economics &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;11:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Julia CAGÉ, Harvard University&lt;/div&gt;
&lt;div&gt;François Keslair, Paris School of Economics&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Trash Media and the Decline of Turnout: Theory and Evidence from Local Media Competition in France, 1944-2010&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Francesco Sobbrio, IMT Lucca &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;12:10 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Parallel events (choose your favorite):&lt;/div&gt;
&lt;div&gt;Lunch &amp;nbsp;- or -&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Global New Media Policy&lt;/h3&gt;
&lt;div&gt;Roundtable (with refreshments, RSVP required, more details here)&lt;/div&gt;
&lt;div&gt;Pedro MIZUKAMI, FGV Center for Technology and Society, Rio de Janeiro, Brazil&lt;/div&gt;
&lt;div&gt;Sunil ABRAHAM, Centre for Internet and Society, Bangalore, India&lt;/div&gt;
&lt;div&gt;Bruce ETLING and Robert FARIS, Berkman Center for Internet and Society, Harvard University, United States&lt;/div&gt;
&lt;div&gt;Marina ZHUNICH, Google Russia&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Media markets - 3: Media Bias&lt;/h3&gt;
&lt;div&gt;2:00 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Alec Kennedy, San Francisco Federal Reserve Bank&lt;/div&gt;
&lt;div&gt;“Does Media Concentration Lead to Biased Coverage? Evidence from Movie Reviews”&lt;/div&gt;
&lt;div&gt;Discussant: Joel Waldfogel, University of Minnesota &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;2:40 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Matthias HEINZ, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;Guido Friebel, Goethe University Frankfurt&lt;/div&gt;
&lt;div&gt;"&lt;em&gt;Media bias against foreign owners: Downsizing&lt;/em&gt;"&lt;/div&gt;
&lt;div&gt;Discussant: Olga Kuzmina, New Economic School &amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;div&gt;3:20 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Break&lt;/em&gt;&lt;/div&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;Future Directions of Research in Media Economics&lt;/h3&gt;
&lt;div&gt;3:30 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Roundtable&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;Simon ANDERSON, University of Virginia&lt;/div&gt;
&lt;div&gt;Stefano DELLAVIGNA, UC Berkeley&lt;/div&gt;
&lt;div&gt;Lisa GEORGE, Hunter College, City University of New York&lt;/div&gt;
&lt;div&gt;David STRÖMBERG, IIES at Stockholm University&lt;/div&gt;
&lt;div&gt;4:45 p.m.&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;em&gt;Farewell reception&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;The above agenda was published in Higher School of Economics website, &lt;a class="external-link" href="http://www.hse.ru/mew/program"&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/div&gt;
&lt;iframe src="http://www.youtube.com/embed/WUL21Zc8UnU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/media-economics-workshop'&gt;http://editors.cis-india.org/news/media-economics-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-28T09:12:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-india-chronicles">
    <title>Growing Wikipedia: The India Chronicles</title>
    <link>http://editors.cis-india.org/news/the-india-chronicles</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Tory Read, a professional researcher, writer and journalist was commissioned by the Wikimedia Foundation to create a vivid description of its work in India. This was done in the interest of transparency and to ensure that it captured lessons from this new approach. Tory travelled for a couple of weeks across Mumbai, Pune, Bangalore and some towns in Kerala — attending community meet-ups speaking with a host of individual community members in these cities. Tory has given a journalistic account and analysis, based on document review, interviews and observations conducted between November 2010 and June 2011, including 16 days in India in June 2011.The views expressed herein are his own and do not necessarily reflect the views of Wikimedia Foundation.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Centre for Internet and Society has been quoted in this report. The following are some direct quotes extracted out from this report:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Feuding and flaming is an integral part of free software culture.” “You can’t imagine a mailing list without flaming." [The Chapter and the Community Tangle, page 16]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The crisis on the mailing list was ultimately a great thing.” “There was conflict, dozens of offline conversations, private and public negotiation and airing of views and doubts, followed by a public commitment to work together for a shared purpose." [Necessity Breeds Collaboration, page 19]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Foundation’s job is having meetings and growing and holding the consensus." "It should&amp;nbsp;be creating situations in which trust is gained, and you do this through radical transparency and participation. The point of the Foundation’s work is to build the community." [For the Foundation, page 24]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Download the entire report &lt;a href="http://editors.cis-india.org/internet-governance/india-chronicles.pdf" class="internal-link" title="The India Chronicles"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 2.9 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-india-chronicles'&gt;http://editors.cis-india.org/news/the-india-chronicles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-10-14T09:17:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers">
    <title>Seventh Open Letter to the Finance Committee: A Note on the Deduplication of Unique Identifiers </title>
    <link>http://editors.cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers</link>
    <description>
        &lt;b&gt;Sahana Sarkar on behalf of the Centre for Internet and Society (CIS) had sent in a Right to Information application on 30 June 2011 to Ashish Kumar, Central Public Information Officer, UIDAI. The UIDAI sent in its reply. Through the seventh open letter, Hans attempts to characterize in an abstract way the replies that CIS managed to elicit and makes some elementary observations.&lt;/b&gt;
        The UIDAI records one or more biometric &lt;em&gt;signatures&lt;/em&gt; of those individuals to whom it assigns its &lt;em&gt;unique identity&lt;/em&gt; or &lt;em&gt;identifier&lt;/em&gt; ; and for convenience let us call this the process of &lt;em&gt;registering an applicant&lt;/em&gt;. In the normal course of registration the signatures of an applicant will be compared to those already recorded; and the outcomes of this exercise of comparing suites of biometric signatures — fingerprints and iris-scans, say — may be regarded as the values of a binary variable:
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h1.jpg/image_preview" alt="h1" class="image-inline image-inline" title="h1" /&gt;&lt;/p&gt;
&lt;p&gt;With more than one signature, we have Y = 1 only when those of the applicant match the signatures in some other suite of such item by item; and Y = 0 then if at least one of his or her signatures fails to match any already recorded one.&lt;/p&gt;
&lt;p&gt;Though the circumstance should be unlikely, a person who has already been registered may apply again to be registered: with fraudulent intent maybe: or simply because he or she has lost the document – some identity card, perhaps – which bears the identifier assigned to him or her by the UIDAI. And the possibilities here may be regarded as the values of a binary variable:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h2.jpg/image_preview" alt="h2" class="image-inline image-inline" title="h2" /&gt;&lt;/p&gt;
&lt;p&gt;Though we are regarding X and Y as variables equally, and taking them for&lt;em&gt; jointly distributed&lt;/em&gt; ones, there is an evident asymmetry between them. The exercise of trying to match a given suite of signatures to some set of other suites can be performed so long as the signatures remain available; but for a given applicant the values of X refer to events already past. Faced with an applicant of whom they may suppose no more than what he or she may disclose, the personnel of the UIDAI &lt;em&gt;cannot directly estimate&lt;/em&gt; either of the two quantities:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h3.jpg/image_preview" alt="h3" class="image-inline image-inline" title="h3" /&gt;&lt;/p&gt;
&lt;p&gt;We have &lt;em&gt;p[X = 0] + p[X = 1] = 1&lt;/em&gt; here, needless to say, so there is only one quantity that needs estimating. But it is worth emphasizing that even when an applicant declares himself to have been registered already— and has come, say, to have a lost card newly issued — the personnel of the UIDAI are obliged to remain agnostic about &lt;em&gt;p[X = 1]&lt;/em&gt; : no matter how ready they are to believe him.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;That no individual should be assigned more than one identifier is an entirely evident desideratum: so the process of comparing the signatures of a fresh applicant to those already recorded must be a strict one. But the process of comparison should also make it very likely that, when a match of signatures does occur, the applicant is someone who has in fact been registered already. The chance that a genuinely new applicant’s signatures will match some already recorded suite should be very small: the proportion of such mistaken matches, among all matches, should be as low as possible. This proportion is usually denoted by &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : the &lt;em&gt;conditional probability&lt;/em&gt; that &lt;em&gt;X = 0&lt;/em&gt; given that &lt;em&gt;Y = 1&lt;/em&gt; : the chance that, despite a match of signatures, the applicant has not in fact been registered already. The defining formula:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h4.jpg/image_preview" alt="h4" class="image-inline image-inline" title="h4" /&gt;&lt;/p&gt;
&lt;p&gt;relates this conditional probability to the ‘absolute’ or ‘raw’ probabilities of the events &lt;em&gt;[Y = 1]&lt;/em&gt; and&lt;em&gt; [X = 0 and Y = 1]&lt;/em&gt; ; the second of which is sometimes said to be &lt;em&gt;contained&lt;/em&gt; in the first.&lt;/p&gt;
&lt;p&gt;Suppose that there have been N applicants thus far. It is usual to say N trials of X and Y have occurred; but only the outcomes for Y are known. Suppose that matches have been found some m times out of these N ; then N − m applicants will have been registered. With regard to these trials, set&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h5.jpg/image_preview" alt="h5" class="image-inline image-inline" title="h5" /&gt;&lt;/p&gt;
&lt;p&gt;Note that these numbers are not individually known; but as the specified events exhaust the possibilities, we have &lt;em&gt;c 00 +c 01 +c 10 +c 11 = N&lt;/em&gt; ; and we do know that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h6.jpg/image_preview" alt="h6" class="image-inline image-inline" title="h6" /&gt;&lt;/p&gt;
&lt;p&gt;The ratio &lt;em&gt;m/N&lt;/em&gt; would be a reasonable estimate of &lt;em&gt;p[Y = 1]&lt;/em&gt; ; and &lt;em&gt;(N − m)/N&lt;/em&gt; a reasonable estimate of &lt;em&gt;p[Y = 0] = 1 − p[Y = 1]&lt;/em&gt; likewise. The quantity we are seeking is &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; however: of which the ratio &lt;em&gt;c 01/m&lt;/em&gt; would be a natural estimate. But unless we have some sense of the relative magnitudes of&lt;em&gt; c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; the quantity&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h7.jpg/image_preview" alt="h7" class="image-inline image-inline" title="h7" /&gt;&lt;/p&gt;
&lt;p&gt;could be anything between 0 and 1 now. To estimate the relative magnitudes of &lt;em&gt;c 01&lt;/em&gt; and &lt;em&gt;c 11&lt;/em&gt; in any direct way would be difficult, because one has no purchase on how likely the events &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; or &lt;em&gt;[X = 1 &amp;amp; Y = 1]&lt;/em&gt; are. So &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; must be estimated directly, it would seem; and we shall come back to the question.&lt;/p&gt;
&lt;p&gt;The reply we have received from the UIDAI indicates that 2.59 × 107 registrations — or successful ‘enrolments’, as they have put it — had been effected by 17.08.2011;while the ‘enrolments rejected’ came to 2.005 × 103 they say. Enrolments were rejected when ‘residents were duplicates’: if we take this to mean that an applicant was refused registry on account of his signatures matching some suite of signatures already recorded, then we may suppose that&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h8.jpg/image_preview" alt="h8" class="image-inline image-inline" title="h8" /&gt;&lt;/p&gt;
&lt;p&gt;The False Positive Identification Rate, or FPIR, is defined in that reply as the ratio of the number of the number of false positive identification decisions to the total number of enrolment transactions by unenrolled individuals : if by “unenrolled individual” we understand an applicant of whom [X = 0] actually obtains, then in our notation we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h9.jpg/image_preview" alt="h9" class="image-inline image-inline" title="h9" /&gt;&lt;/p&gt;
&lt;p&gt;rather: which would be a natural estimate of p[X = 0 &amp;amp; Y = 1] now, and since&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h10.jpg/image_preview" alt="h10" class="image-inline image-inline" title="h10" /&gt;&lt;/p&gt;
&lt;p&gt;the ‘false postive identification rate’ thus construed could be bound, at least, if &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; itself could be. At any rate, this latter proportion seems to be the most pertinent one here: &lt;em&gt;p[X = 0 | Y = 1] &lt;/em&gt;is the conditional probability, of mistaken matches, that the UIDAI must strive to keep as low as possible.&lt;/p&gt;
&lt;p&gt;The reply from the UIDAI defines a false negative identification as an incorrect decision of a biometric system that an applicant for a UID, making no attempt to avoid recognition, has not been previously enrolled in the system, when in fact they have. One is at a loss to understand how the personnel of the UIDAI are to determine when an applicant is making no attempt to avoid recognition. Putting that aside, the False Negative Identification Rate or FNIR would now appear to be p[X = 1 | Y = 0] : the probability that, despite his or her signatures not matching any already recorded suite, an applicant has in fact already been registered: and with our notation&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h11.jpg/image_preview" alt="h11" class="image-inline image-inline" title="h11" /&gt;&lt;/p&gt;
&lt;p&gt;now. But &lt;em&gt;c 10&lt;/em&gt; cannot be reliably estimated, again, because one has no purchase on how likely &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; is; and the conditional probability &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; will have to be estimated or bound in some direct way as well.&lt;/p&gt;
&lt;p&gt;The preceding paragraphs have asserted that, in order to estimate or effectively bound the identification rates being sought by the UIDAI, the conditional probabilities p[X = 0 | Y = 1] and p[X = 1 | Y = 0] will have to be addressed in some direct way: without any attempt to estimate the likelihoods of &lt;em&gt;[X = 0 &amp;amp; Y = 1]&lt;/em&gt; and &lt;em&gt;[X = 1 &amp;amp; Y = 0]&lt;/em&gt; by themselves, that is to say. There might be ways of reliably estimating these conditional probabilities; and the manufacturers of the devices that produce the signatures may have provided tight bounds on what they would be — when the devices are working properly, at least. But let us now consider how the UIDAI has elaborated on these rates.&lt;/p&gt;
&lt;p&gt;Their reply to our second question states that &lt;em&gt;the biometric service providers have to meet the following accuracy&lt;/em&gt; SLA’s for FPIR and FNIR:&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h12.jpg/image_preview" alt="h 12" class="image-inline image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;The condition of ‘non-duplication’ in the requirement (P) implies that the FPIR is being understood now as the formula in (†) above computes it: as an estimate of the conditional probability &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt;: since one already knows that &lt;em&gt;[X = 0]&lt;/em&gt; for each enrolment here. Such an estimate could be made if one had obtained a sample of suites of signatures from distinct individuals — where no two suites in the sample could have come from the same individual — and compared each suite to every other: the proportion of matches found would be an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; now.[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The ‘biometric service providers’ the UIDAI has contracted with are presumably able to perform such experiments accurately. But an estimate of &lt;em&gt;p[Y = 1 |X = 0]&lt;/em&gt; will not, as we shall momentarily see, by itself readily yield a usable bound on &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt; : on the crucial likelihood that, despite his or her suite of signatures matching a suite already recorded, an applicant has not in fact been registered.&lt;/p&gt;
&lt;p&gt;The condition “ONLY duplicate enrolments” in the requirement (N) implies that the FNIR is being understood as an estimate of the conditional probability &lt;em&gt;p[Y = 0 |X = 1]&lt;/em&gt; now: as one already knows that [X = 1] for each enrolment here. The biometric service providers should be able to estimate this probability as well. The FNIR as (‡) construes it is an estimate of &lt;em&gt;p[X = 1 | Y = 0]&lt;/em&gt; rather; but a usable bound for this likelihood is readily got from &lt;em&gt;p[Y = 0 |X = 1] &lt;/em&gt;now, for we may surely expect &lt;em&gt;p[X = 1] &amp;lt; p[Y = 0]&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Let us see if the requirement (P) will yield any usable upper bound on the crucial likelihood &lt;em&gt;p[X = 0 | Y = 1]&lt;/em&gt;: which, to note it again, is what the UIDAI must seek to minimise. Consider the consequences when the FPIR is understood as (P) envisages. Taken together with formula (1) above we have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h13.jpg/image_preview" alt="h13" class="image-inline image-inline" title="h13" /&gt;&lt;/p&gt;
&lt;p&gt;If we are not willing to wager on any upper limit appreciably less than 1 for p[X = 0] , we obtain&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/copy_of_h12.jpg/image_preview" alt="h 12" class="image-inline" title="h 12" /&gt;&lt;/p&gt;
&lt;p&gt;now.[&lt;a href="#3"&gt;3&lt;/a&gt;] Unless one can reasonably suppose that the event&lt;em&gt; [Y = 1]&lt;/em&gt; never occurs, one must grant that &lt;em&gt;p[Y = 1] &amp;gt; 0&lt;/em&gt; . We have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h15.jpg/image_preview" alt="h15" class="image-inline image-inline" title="h15" /&gt;&lt;/p&gt;
&lt;p&gt;But this inequality yields a usable upper bound only when K &amp;lt; 3: only when K is 1 or 2 that is. In either case, only by supposing that p[Y = 1] &amp;gt; 10−2 will the accuracy mandated for the FPIR by the UIDAI yield a usable upper bound on p[X = 0 | Y = 1] . Since the UIDAI expects that p[Y = 1] &amp;lt; 10−2 surely, we must conclude now that the requirements it has imposed on its ‘biometric service providers’ will not help its personnel estimate an upper limit for the crucial likelihood that, despite his or her suite signatures matching some already recorded suite, an applicant for a UID has not in fact been registered already: which likelihood, to insist again, is what the UIDAI must seek to minimise.&lt;/p&gt;
&lt;p&gt;The argument just made will seem perverse: but the calculation is perfectly general. Suppose an FPIR limit of 10−J is mandated; then, unless one is willing to wager an upper limit on p[X = 0] , one cannot get a usable upper bound on p[X = 0 | Y = 1] from this limit on the FPIR, used all by itself, unless one supposes that p[Y = 1] &amp;gt; 10−J+1.&lt;/p&gt;
&lt;p&gt;To save writing, denote by L01 the crucial likelihood p[X = 0 | Y = 1] ; and suppose that&amp;nbsp;&amp;nbsp; is some desired upper bound on L01 now. Assume that the FPIR achieved by a service provider is an accurate estimate of p[Y = 1 |X = 0] ; then from (1) we get&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h16.jpg/image_preview" alt="h16" class="image-inline image-inline" title="h16" /&gt;&lt;/p&gt;
&lt;p&gt;Now [X = 0] should not be a rare event at all, and, conversely, [Y = 1] should be a rare event.[&lt;a href="#4"&gt;4&lt;/a&gt;] So one should be able to set some reasonable upper limit to the ratio p[Y = 1]/ p[X = 0] : but without attempting any precise estimate, at all, of either individual probability. One may reasonably expect, for instance, that no more than one in a thousand applicants for a uid will already have been registered; and when p[X = 1] &amp;lt; 10−3 we will have&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h17.jpg/image_preview" alt="h17" class="image-inline image-inline" title="h17" /&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h18.jpg/image_preview" alt="h18" class="image-inline image-inline" title="h18" /&gt;&lt;/p&gt;
&lt;p align="center" class="discreet"&gt;&lt;img src="http://editors.cis-india.org/home-images/h19.jpg/image_preview" alt="h19" class="image-inline image-inline" title="h19" /&gt;&lt;/p&gt;
&lt;p&gt;from (3) above. This calculation can be repeated with any number m in place of 3 here, of course, provided p[X = 1] &amp;lt; 10−m and p[Y = 1] &amp;lt; 10−m are both likely; and it seems entirely reasonable, now, for the UIDAI to insist that its biometric service providers meet the requirement.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="http://editors.cis-india.org/home-images/h20.jpg/image_preview" alt="h20" class="image-inline image-inline" title="h20" /&gt;&lt;/p&gt;
&lt;p&gt;for some appropriate upper bound X on L01 . The considerations leading to (4) make it reasonable to insist on m _ 3 now; and recalling what L01 is — the crucial likelihood that, despite his or her signatures matching some already recorded suite of signatures, an applicant has not in fact been registered — the UIDAI will have to insist on some quite small bound X: for it would not want, too often, to refuse anyone a UID on account of a mistaken match of biometric signatures.[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;It would be foolish to speculate on what the authorities regard as acceptable error here; but if the UIDAI is of a mind that such mistakes should happen less than one in a thousand times say, then, taking the minimal value of 3 for m in the suggested requirement (R), it should demand an FPIR less than 10−6 : a ‘false positive identification rate’ a thousand-fold less than the limit currently imposed.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Should it seem entirely odd to talk of probability when one of the events in question — either&lt;em&gt; [X = 0]&lt;/em&gt; or&lt;em&gt; [X = 1]&lt;/em&gt; — will already have occurred, we may regard the probabilities we assign them as measures of our uncertainty only: but no practical question hinges on probabilities being understood ‘subjectively’ rather than ‘objectively’.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]It might be well to note, however, that the size of the sample must be manageable: for a sample of size K a total of K • (K − 1)/2 comparisons will have to be performed.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]Wagering an upper limit on p[X = 0] would require one to reasonably estimate the probability of finding already-registered individuals among applicants.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]The event [Y = 1] must be just as rare, one supposes, as [X = 0] is frequent.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]We are supposing, that is to say, that matches of biometic signatures are very rarely mistaken matches.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]A small _ is consistent with supposing that p[X = 1] and p[Y = 1] are commensurate probabilites. If p[X = 0 | Y = 1] &amp;lt; 10−3 for instance, then p[X = 1 | Y = 1] _ (103 − 1)/103 ; one may suppose, that is, that [X = 1] will be the case 999 out of a 1000 times that [Y = 1] obtains; and, of course, to suppose that [X = 1] will be appreciably more frquent than [Y = 1] is to grant that biometric signatures will fail appreciably often to distinguish individuals.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;strong&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/rti-application-june-2011.pdf" class="internal-link" title="RTI Application, 30 June 2011"&gt;See the RTI application of 30/06/2011&lt;/a&gt;&amp;nbsp;[PDF, 15 kb].&lt;/strong&gt;&lt;a name="6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the Seventh Open Letter &lt;a href="http://editors.cis-india.org/internet-governance/blog/seventh-open-letter.pdf" class="internal-link" title="Seventh Open Letter to the Finance Committee"&gt;here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers'&gt;http://editors.cis-india.org/internet-governance/blog/de-duplication-of-unique-identifiers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T07:28:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/innovation-and-public-interest">
    <title>Can Innovation Solve the Grand Challenges of Indian Society?</title>
    <link>http://editors.cis-india.org/news/innovation-and-public-interest</link>
    <description>
        &lt;b&gt;It’s nearly time again for Design Public the event, a high-level conclave on design, innovation, and the public interest. Our up-coming event will be in Bangalore on the 14th of October, and will be held at the National Gallery of Modern Art, which is housed in a century-old Manikyavelu mansion, which was once the property of the Mysore royal family.&lt;/b&gt;
        
&lt;ul&gt;&lt;li&gt;Aditya Dev Sood (Center for Knowledge Societies&amp;nbsp;)&lt;/li&gt;&lt;li&gt;Sunil Abraham (Center for Internet and Society)&lt;/li&gt;&lt;li&gt;Harsh Shrivastava&amp;nbsp;(National Planning Commission)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Zackery Denfield&amp;nbsp;(Pacific Northwest College of Art)&lt;/li&gt;&lt;li&gt;Aditya Mishra&amp;nbsp;(Headstart Foundation)&lt;/li&gt;&lt;li&gt;Sudhir Krishnaswamy (CLPR)&lt;/li&gt;&lt;li&gt;Naresh Narasimhan (VA Group)&lt;/li&gt;&lt;li&gt;Amit Garg (MXV Consulting)&lt;/li&gt;&lt;li&gt;Samar Halankar (MINT)&lt;/li&gt;&lt;li&gt;Rajeev Chandrashekhar (Member of Parliament)&lt;/li&gt;&lt;li&gt;Mahesh Murthy (Pinstorm)&lt;/li&gt;&lt;li&gt;Rohini Nilekani (Arghyam Foundation)&lt;/li&gt;&lt;li&gt;Ramesh Ramanathan (Janaagraha)&lt;/li&gt;&lt;li&gt;Reto Wettach (Interaction Design Studios Berlin)&lt;/li&gt;&lt;li&gt;Shiv Vishwanathan (Sociologist of Science)&lt;/li&gt;&lt;li&gt;Rishekesha T. Krishnan (IIM, Bangalore)&lt;/li&gt;&lt;li&gt;M. P. Ranjan (Design for India)&lt;/li&gt;&lt;li&gt;H. P. Khincha (Karnataka State Innovation Council)&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Participation by arrangement only. Interested? designpublic@cks.in +91.9343787505&lt;/div&gt;
&lt;div&gt;For more information, &lt;a class="external-link" href="http://designpublic.in/blog/"&gt;click here&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;Download the brochure &lt;a href="http://editors.cis-india.org/openness/innovation-and-public-interest.pdf" class="internal-link" title="Innovation and Public Interest"&gt;here&lt;/a&gt;&amp;nbsp;[PDF, 388 kb]&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/innovation-and-public-interest'&gt;http://editors.cis-india.org/news/innovation-and-public-interest&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-10-07T12:45:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/events/design-public-in-bangalore">
    <title>Design!publiC - II</title>
    <link>http://editors.cis-india.org/events/design-public-in-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society in partnership with the Center for Knowledge Societies, Venkataramanan Associates, Center for Law and Policy Research, Headstart Foundation, Chaia Innovation Accelerator, MXV Consulting, Mint Newspaper and Confederation of Indian Industry is organising the second edition of Design Public on October 14, 2011 at the National Gallery of Modern Art in Bangalore. There will be a series of pre-conference research outings on October 13, for which participants may register in advance.&lt;/b&gt;
        
&lt;h3&gt;Innovation and the Public Interest&lt;/h3&gt;
&lt;p&gt;Design Public is a series of conversations about whether and how Innovation can serve the&amp;nbsp;Public Interest.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;At our inaugural event, in New Delhi on March 18th earlier this year, we focused on the question of whether innovation in governance is needed and how it can be achieved. An excellent overview of the event can be found in a Mint Newspaper &lt;a class="external-link" href="http://www.livemint.com/2011/03/24204727/Using-design-principles-for-go.html"&gt;article&lt;/a&gt; by Aparna Piramal Raje. While we discovered wide agreement in principle as to the need for innovation in India, there was much uncertainty about how government systems relate to innovation, and some doubt as to whether governments are in fact capable of innovation. At our upcoming event, we aim to widen the ambit of the discussion, to ask how innovation serves the public interest, thereby opening up the question of innovation to the social sector, to corporations, to venture capitalists, designers, students, academics and more.&lt;/p&gt;
&lt;p&gt;Following Schumpeter, we understand
innovation to be a fundamental part of modern economic and social life -- in
fact the very source of the momentum that drives us forward into the future.
However, we have also found that innovation need not be limited to entrepreneurs in
the private sector, but can also be accomplished, in various ways, in
government, in the public sector, and by social and developmental agencies.
Moreover, if the specific components of innovation can be identified and
learned, it would be possible for many more&amp;nbsp;organizations and individuals to successfully drive beneficial social and technical change.&lt;/p&gt;
&lt;p&gt;If the term Innovation describes the business or economic dimension of the forward movement of society under capitalism, then the immanent, cognitive or mental aspect of this forward movement can be captured by the term Design. It is the multivariate, parallel, sometimes collaborative process of finding solutions to problems that have no obvious and available answer. Whereas the language of design gained prominence in the Industrial Age as a means for the rendering of surfaces and finishes for the more effective marketing of consumer products (posters and toasters), the concept has far wider application in the present. Design and Innovation are by definition the strategies through which the most intractable, complex, and multivariate challenges encountered by individuals or groups.&lt;/p&gt;
&lt;p&gt;At our event, therefore, we seek to articulate exactly how these strategies can be brought to bear on the Grand Challenges facing our society, in areas such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Complete and Effective Healthcare for Mothers and Children&lt;/li&gt;&lt;li&gt;Increased Use and Acceptance for Toilets&lt;/li&gt;&lt;li&gt;Broad-based Higher Education&lt;/li&gt;&lt;li&gt;Participatory and Responsive Civic Administration&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Over the course of the day-long event, we will consider different approaches and paradigms of innovation and how they may be applicable to these grand challenges. We will break out into sessions in order to apply these perspectives and approaches to specific challenge areas. At the end of the day we will seek to expand the circle of innovation in order establish new ways of collaborating and sharing knowledge such that we are able to accelerate and intensify the application of innovation to addressing these and other grand challenges facing the public.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;img src="http://editors.cis-india.org/home-images/panchayatmeeting.jpg/image_preview" alt="Panchayat Meeting" class="image-inline image-inline" title="Panchayat Meeting" /&gt;&lt;/div&gt;
&lt;div&gt;Panchayat meeting on Village Sanitation in Khera village, Budaun District, UP&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;Agenda&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;09.00 &lt;strong&gt;Word of Welcome and Mutual Introductions&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;10.00 &lt;strong&gt;Innovation and the Indian Corporation&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;nbsp;Samar Halankar, &lt;em&gt;Hindustan Times&lt;/em&gt; (moderator)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Anil Narayan Sondur, &lt;em&gt;TATA Elxsi&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Harish Bijoor, &lt;em&gt;HB Consults&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Ekta Ohri, Center for Knowledge Societies (respondent)&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;11.00 &lt;strong&gt;Is Innovation in the Public and Social Sectors Possible?&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;nbsp;Sunil Abraham, &lt;em&gt;Center for Internet and Society&lt;/em&gt; (moderator)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Rohini Nilekani, &lt;em&gt;Arghyam Foundation&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Ramesh Ramanathan, &lt;em&gt;Janaagraha&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Ashwin Mahesh, &lt;em&gt;Mapunity&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Sneha Raman, &lt;em&gt;Center for Knowledge Societies&lt;/em&gt; (respondent)&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;12.00 The Challenge of Start Up Innovation&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; -&amp;nbsp;Amit Garg, &lt;em&gt;MXV Consulting&lt;/em&gt; (moderator)&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Mahesh Murthy, &lt;em&gt;Pinstorm&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Zackery Denfeld, &lt;em&gt;Pacific Northwest College of Art&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Naresh Narasimhan, &lt;em&gt;VA Group&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Aditya Dev Sood, &lt;em&gt;Center for Knowledge Societies &lt;/em&gt;(respondent)&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;13.00 &lt;strong&gt;Lunch: Regional Cuisines of Karnataka prepared with Local Ingredients&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;14.00 &lt;strong&gt;The Theory and Practice of Innovation&lt;br /&gt;&lt;/strong&gt;- Aditya Dev Sood, &lt;em&gt;Center for Knowledge Societies&lt;/em&gt; (moderator)&lt;br /&gt;- Reto Wettach, &lt;em&gt;Interaction Design Studios&lt;/em&gt; Berlin&lt;br /&gt;- Shiv Vishwanathan, &lt;em&gt;Sociologist of Science&lt;/em&gt;&lt;br /&gt;- M. P. Ranjan,&amp;nbsp;&lt;em&gt;Design for India&lt;/em&gt;&lt;/li&gt;&lt;li&gt;15.00&amp;nbsp;&lt;strong&gt;Grand Challenge Breakout Sessions&lt;br /&gt;&lt;span class="Apple-style-span"&gt;A: Online Higher Education&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Moderator: Sunil Abraham, &lt;em&gt;Center for Internet and Society&lt;/em&gt;&lt;br /&gt;Innovation Expert: Sneha Raman, &lt;em&gt;Center for Knowledge Societies&lt;/em&gt;&lt;br /&gt;Domain Expert: Udhay Shankar, &lt;em&gt;Intel&lt;/em&gt;&lt;br /&gt;&lt;strong&gt;B: Quality Maternal and Child Healthcare&lt;/strong&gt;&lt;br /&gt;Moderator: Jayna Kothari, &lt;em&gt;Center for Law and Policy Research&lt;/em&gt;&lt;br /&gt;Innovation Expert: Shehla Hussain, &lt;em&gt;Center for Knowledge&lt;br /&gt;Societies&lt;/em&gt;&lt;br /&gt;Domain Expert: Lakshmi Menon, &lt;em&gt;G.E. Healthcare&lt;/em&gt;&lt;br /&gt;&lt;strong&gt;C: Toilet-training for All!&lt;/strong&gt;&lt;br /&gt;Moderator: Sudhir Krishnaswamy, &lt;em&gt;Center for Law and Policy&amp;nbsp;Research&lt;/em&gt;&lt;br /&gt;Innovation Expert: Namrata Mehta, &lt;em&gt;Center for Knowledge Societies&lt;/em&gt;&lt;br /&gt;Domain Expert: Sunita Nadhamuni, &lt;em&gt;Arghyam&lt;/em&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Tea Served During Breakout Sessions&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;16.30 &lt;strong&gt;Reports Back from Breakouts&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;17.30&amp;nbsp;&lt;strong&gt;Conclusion: Planning and Policy for Innovation and the&amp;nbsp;Grand Challenges of Society&lt;br /&gt;&lt;/strong&gt;- Sudhir Krishnaswamy, &lt;em&gt;Center for Law and Policy Research&lt;/em&gt;&amp;nbsp;(moderator)&lt;br /&gt;- Harsh Shrivastava, &lt;em&gt;National Planning Commission&amp;nbsp;&lt;/em&gt;&lt;br /&gt;- Anant Shah, &lt;em&gt;Bill and Melinda Gates Foundation&lt;/em&gt;&lt;br /&gt;- Jamuna Ramakrishna, &lt;em&gt;Hivos Foundation&lt;/em&gt;&lt;br /&gt;- Dilini Wijeweera, &lt;em&gt;LIRNEasia&lt;/em&gt;&lt;br /&gt;- Gaurav Gupta, &lt;em&gt;Dalberg&lt;/em&gt;&lt;br /&gt;- Riku Mäkelä, &lt;em&gt;Finnode&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;
&lt;p&gt;Individual Participation&lt;/p&gt;
&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;In order to make each voice count, entry to the conclave will be by arrangement only. Others who are truly interested, should please drop us a few lines on how they would like to contribute and we will be glad to get back in touch. There are no registration fees. However, we would like to see participants take their own initiative in covering their own travel costs and making their own arrangements for stay so far as possible. If specific needs are perceived, please communicate them to the organizers. If you are interested in participating in this conversation on innovation, design thinking, and the public interest please contact Anand Vijayan at &lt;a class="external-link" href="mailto:anand@cks.in"&gt;anand@cks.in&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Institutional Participation&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;Confederations of industry, associations of management, departments of government and diverse development sector and civil society organizations are invited to express their interest in supporting this event.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Organizers&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Center for Knowledge Societies (CKS)&lt;/li&gt;&lt;li&gt;Center for Internet and Society (CIS)&lt;/li&gt;&lt;li&gt;Venkatramanan Associates (VA)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Center for Law and Policy Research (CLPR)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Headstart Foundation (HF)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Chaia Innovation Accelerator (ChIA)&amp;nbsp;&lt;/li&gt;&lt;li&gt;MXV Consulting (MXV)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Mint Newspaper (MN)&lt;/li&gt;&lt;li&gt;Confederation of Indian Industry (CII)&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;For participation: contact Anand Vijayan, Innovation Planning, CKS&lt;/li&gt;&lt;li&gt;For media: contact Ayesha Vemuri, Innovation Research, CKS (&lt;a class="external-link" href="mailto:ayesha@cks.in"&gt;ayesha@cks.in&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;For more info, &lt;a href="http://editors.cis-india.org/openness/design-public-bangalore.pdf" class="internal-link" title="Design!publiC - II - Event in Bangalore"&gt;click here&lt;/a&gt;&amp;nbsp;[PDF, 496 kb]&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/events/design-public-in-bangalore'&gt;http://editors.cis-india.org/events/design-public-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    

   <dc:date>2011-10-13T07:00:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/making-difference-online-offline">
    <title>Making a difference, online and offline</title>
    <link>http://editors.cis-india.org/news/making-difference-online-offline</link>
    <description>
        &lt;b&gt;A new collection examines how technology and issues of connectivity are shaping the lives of ‘digital natives’—and how the Net can influence social change, writes Gopal Sathe in an article published in LiveMint on September 27, 2011.&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society, Bangalore, and The Hague, Netherlands-based Hivos Knowledge Programme recently launched a four- book collection, Digital AlterNatives with a Cause?, edited by Nishant Shah and Fieke Jansen. Jansen is the knowledge officer for the Digital AlterNatives with a Cause? Programme at Hivos. In the book, researchers look at the identities, networks, actions and role of the “digital” generation. The researchers talked to people identified as “digital natives” about the way in which the Internet has shaped the way they interact with the world. We spoke to Nishant Shah, co-founder and director-research for the Centre for Internet and Society, about the collection. Edited excerpts:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The research this book talks about is based mostly in other countries, such as Chile, Taiwan and South Africa. How does this connect to the situation in India?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The researchers looked at young people’s use of digital technologies to make changes in their immediate environments within the information landscape of the “Global South” (countries with low to medium rankings in the human development index). We were interested in looking at macro structures that would help us understand what is happening globally.&lt;/p&gt;
&lt;p&gt;We did not impose our frameworks and concepts on the communities we were working with. Hence, we did not have the expected discussions of digital divides and digital access. What they found interesting across locations was the question of connectivity and dis-connectivity. In the ubiquitous, unforgetting world of the Internet, we leave traces all the time. This incessant connectivity can come with its own pressures, problems and repercussions, and hence there were discussions around “right to disconnect”, “right to be forgotten” and “right to be non-digital”.&lt;/p&gt;
&lt;p&gt;In the early 1990s, there were people who did not have phones, could not make national and international phone calls and had poor communication infrastructure—that changed in less than 10 years. Instead of focusing on access and infrastructure, it became more important to look at the ways in which they shape people’s usage, behaviour, engagement with technology, and with their larger physical realities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;When we consider the “digital landscape” of India, whom are we really discussing?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Popular definitions—somebody who is born with technologies, who did not have to make a transition to digital—are inadequate to account for the realities we experience every day. We made a more inclusive identity, which gets inflected by questions of age, sex, location, class and politics, et al.&lt;/p&gt;
&lt;p&gt;The way we understand a digital native now is somebody whose life has been significantly restructured because of their relationship with digital technologies and their ability to see the potentials of change in these technologies. Just having access to digital technologies is not enough. Their purposes, causes, ambitions, intentions are what is going to change the way they use technologies. People are not “born digital” but they “become digital” and the processes of becoming digital are more complex than merely getting access.&lt;/p&gt;
&lt;p&gt;New devices and cheaper connections have granted access to a huge number of people—what impact has this had on people’s choices?&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;img src="http://editors.cis-india.org/home-images/Nishant.jpg/image_preview" alt="Ns" class="image-inline image-inline" title="Ns" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The “natives” belong to different communities, families and regions. They are influenced by the cultural practices in their everyday life.&amp;nbsp;They depend on different structures of work for their economic survival.&amp;nbsp;They live in differently marked political regimes—from the extreme liberal to the highly authoritarian. Their ways of thinking and engagement, influenced by their practices online, change the larger realities within which they live. For example, digital natives who are used to the peer-to-peer processes of knowledge production online are already changing the ways in which classroom learning is happening in schools around the country.&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div&gt;At the same time, the larger structures of education, literacy, economic choices, cultural productions like TV and cinema, all influence the content and expectations from the Internet as well. What really matters is how the capacities and capabilities of one medium, the digital, for example, influence and are influenced by the experiences and knowledge in the other—the physical, for instance.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Would the addition of more Indian-language content on the Internet make a difference to the digital landscape in India? Would it spur greater engagement and therefore have a bigger impact? Is this what’s holding back technologies like telemedicine and distance education?&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;There are many user-generated content platforms like Wikipedia and other blogging platforms like WordPress that are promoting the localization of content. It is good that we are offering some resistance to the very quick “Englification” of the online world. But with the current flow of globalization, there is no denying the fact that English is a language with the highest currency and that in our physical realities, it is getting a stronghold in our everyday practices.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The Internet is a tool, a process, a technology but not a solution. The mere presence of the Internet is not going to lead to social change. Just introducing the Internet to existing structures is only going to lead to a more flawed model of development.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;For example, telemedicine has exciting possibilities but the basic problem of healthcare is not the unavailability of medical resources. What is missing is a universal health Bill to make it affordable to all.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;This is why in this book, we pay specific attention to how and why people engage in processes of change. We have been trying to address the questions of how people see themselves as agents of social change and what are the ways in which digital and Internet technologies enable them to make changes in their immediate environments.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Digital AlterNatives with a Cause? is available as a free download at&amp;nbsp;&lt;a class="external-link" href="http://www.cis-india.org/digital-natives/blog/dnbook"&gt;http://www.cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;Read the original story published in LiveMint &lt;a class="external-link" href="http://www.livemint.com/2011/09/27210021/Making-a-difference-online-an.html"&gt;here&lt;/a&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/making-difference-online-offline'&gt;http://editors.cis-india.org/news/making-difference-online-offline&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-09-28T07:09:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
