<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 4261 to 4275.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/humlab-umea-university-d-coding-digital-natives"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/digital-natives/d-coding-digital-natives"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/D2E1.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/CyrusMistry.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cyfy-agenda"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/cyfy-2016-agenda"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/news/humlab-umea-university-d-coding-digital-natives">
    <title>D:coding Digital Natives - Seminar with Nishant Shah </title>
    <link>http://editors.cis-india.org/news/humlab-umea-university-d-coding-digital-natives</link>
    <description>
        &lt;b&gt;Nishant Shah gave a talk on D:coding Digital Natives at Samhällsvetarhuset on February 26, 2013, from 1.15 p.m. to 3.00 p.m. The event was organized by HUMlab. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.humlab.umu.se/en/events/calendar/?link=http%3A%2F%2Frss.kc.umu.se%2Fenglish%2Fhumlab%2Fcalendar%2Fcalendardisplay%2F%3FeventId%3D4318"&gt;published&lt;/a&gt; by HUMlab.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Abstract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discourse around youth-technology-change - digital natives, if you  will - has been shaped by self explanatory buzzwords like participation,  collaboration, mobilization etc. These words seem to hold a promise of  revolutions and change without actually acknowledging material practices  or complex relationships that young people have with technologies and  visions of change. Trying to decode these words through case-studies  from the Global South, this talk hopes to offer new frameworks through  which digital natives can be studied and understood in emerging ICT  contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bio: &lt;/b&gt;&lt;br /&gt; &lt;b&gt;Nishant Shah&lt;/b&gt; is the co-founder and director of  research at the Bangalore-based research organization Centre for  Internet and Society. He studies questions of governance, identity,  planning and body at the intersections of digital technologies, law and  everyday cultural practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is a visiting researcher at the Centre for Digital Cultures at  Leuphana University, Germany, and an International Knowledge Partner on  'Youth, Technology and Change' with Hivos, Netherlands. He recently  co-edited the four-volume book series "Digital AlterNatives with a  Cause?" that captures discourse, practice and policy as it shapes and is  shaped by youth driven, everyday practices of digital technologies and  is currently working on looking at civic action in networked societies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/humlab-umea-university-d-coding-digital-natives'&gt;http://editors.cis-india.org/news/humlab-umea-university-d-coding-digital-natives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2013-03-06T05:21:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/digital-natives/d-coding-digital-natives">
    <title>D:Coding Digital Natives</title>
    <link>http://editors.cis-india.org/digital-natives/d-coding-digital-natives</link>
    <description>
        &lt;b&gt;Nishant Shah was invited for a public talk at the University of California, Los Angeles. He presented the work done on Digital Natives and spoke about questions of participation and resistance. The talk has been featured in the YouTube channel.&lt;/b&gt;
        
&lt;p&gt;Nishant spoke about the ways by which technology revolution and change has been characterised through the question of voice (how technology has enabled for alternative voices to emerge as ways by which they can be heard), question of amplification (what 10 years ago might have been local phenomena are becoming global spectacles) and the question of power (what really happens when voice and amplification comes to an end).&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Nishant said that in the last three years of revolutions we have also now witnessed this extraordinary thing where lot of promises were made of different kinds of revolution but which never materialised in terms of what they intended to. Citizen action happens but it doesn’t lead into anything concrete. One of the examples from India was the Anna Hazare’s campaign or India’s fight against corruption. There was this immense amount of campaign on the corruption in Indian bureaucracy and political society... the only instance of mass mobilisation that we saw in India in recent times apart from the cricket series...and how the campaign in seven short months has totally disappeared from public discourse.&lt;/p&gt;
&lt;p&gt;For more, watch the &lt;strong&gt;video&lt;/strong&gt; now:&lt;/p&gt;
&lt;iframe src="http://www.youtube.com/embed/YvY__z3jN7M" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Date: March 9, 2012&lt;br /&gt;Time: 12 to 1 p.m.&lt;br /&gt;Venue: Library Conference Center Presentation Room, University of California&lt;/p&gt;
&lt;a class="external-link" href="http://www.youtube.com/watch?v=YvY__z3jN7M"&gt;Follow the video on YouTube&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/digital-natives/d-coding-digital-natives'&gt;http://editors.cis-india.org/digital-natives/d-coding-digital-natives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-08T12:30:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/D2E1.jpg">
    <title>D2E1</title>
    <link>http://editors.cis-india.org/home-images/D2E1.jpg</link>
    <description>
        &lt;b&gt;An opposition supporter holds up a laptop showing images of celebrations in Cairo's Tahrir Square, after Egypt's President Hosni Mubarak resigned (Photo: Reuters)&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/D2E1.jpg'&gt;http://editors.cis-india.org/home-images/D2E1.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-03-16T05:00:37Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/CyrusMistry.png">
    <title>Cyrus Mistry</title>
    <link>http://editors.cis-india.org/home-images/CyrusMistry.png</link>
    <description>
        &lt;b&gt;Cyrus Mistry&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/CyrusMistry.png'&gt;http://editors.cis-india.org/home-images/CyrusMistry.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-11-30T04:41:50Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cyfy-agenda">
    <title>CyFy Agenda</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cyfy-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cyfy-agenda'&gt;http://editors.cis-india.org/internet-governance/blog/cyfy-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-16T03:01:13Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/cyfy-2016-agenda">
    <title>CyFy 2016 Agenda</title>
    <link>http://editors.cis-india.org/internet-governance/files/cyfy-2016-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/cyfy-2016-agenda'&gt;http://editors.cis-india.org/internet-governance/files/cyfy-2016-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-09-13T15:06:16Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition">
    <title>CYFY 2016 - The India Conference on Cyber Security and Internet Governance</title>
    <link>http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition</link>
    <description>
        &lt;b&gt;Sunil Abraham will participate as a panelist at CYFY 2016 event organized by Observer Research Foundation in New Delhi from September 28 to 30, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Into  its  fourth  edition  this  year,  CyFy:  The  India  Conference  on  Cyber  Security  and  Internet Governance  has  emerged  as  a global platform to discuss, debate and  deliver digital policy solutions. CyFy  2015   featured  nearly   110  participants  from  over  33  countries,  with  nearly  800   delegates  in attendance.  Prominently,  the  conference  sessions  featured  several  experts  from Africa  and  the  Asia Pacific, who addressed  the  policy  priority of connecting  the next  billion. The 2016 iteration of CyFy will highlight the political, economic and strategic questions that underpin this imperative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2016-agenda/view"&gt;Download the Agenda &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the announcement on &lt;a class="external-link" href="http://cyfy.org/"&gt;CYFY website&lt;/a&gt; or write to Samir Saran at &lt;a class="mail-link" href="mailto:ssaran@orfonline.org?subject=CyFy 2016"&gt;ssaran@orfonline.org&lt;/a&gt; or Arun at &lt;a class="mail-link" href="mailto:arun.sukumar@orfonline.org?subject=CyFy 2016"&gt;arun.sukumar@orfonline.org&lt;/a&gt; for more details on the conference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition'&gt;http://editors.cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-13T15:23:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance">
    <title> Cyfy 2015: The India Conference on Cyber Security and Internet Governance</title>
    <link>http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance</link>
    <description>
        &lt;b&gt;In its third year, Cyfy; South Asia’s biggest internet policy conference is being held in New Delhi, from 14-16 October, 2015. The event is organized by Observer Research Foundation at Hotel Taj Mansingh. Sunil Abraham is a panelist in the session "Protection of Intellectual Property and Business Secrets in the Knowledge Economy".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Building on its scope and scale of the previous year — over 55 speakers, from 12 countries, with 350 attendees — the conference discusses issues that affect the emerging world and developed world alike. The conversations will further and widen the debate around internet governance, security, surveillance, freedom of expression, norms of state behaviour, technology and specific societal challenges that emerging and developing countries seek to address by the effective design and deployment on these technologies. In 2015, Cyfy will bring together more experts from South Asia, in order to present new thought on the specific challenges of internet access, policy and regulation, e-governance, financial inclusion, and bottom of the pyramid solutions.&lt;/p&gt;
&lt;p&gt;Along with its growing network of both Indian and international partners, ORF looking forward to hosting another thought-provoking and productive few days, and bridging some digital divides in contemporary internet cyber policy debates.&lt;/p&gt;
&lt;h3&gt;Protection of Intellectual Property and Business Secrets in the Knowledge Economy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past decade, there has been an exponential rise in cyber-enabled theft of intellectual property, and it has been recognized as an unfair predatory practice. With the rise of the globalized knowledge economy, the stability of open trading systems increasingly depends on cross-border IP protection. What is the relevance of the protection of intellectual property and business secrets for economic development and stability of the international trading system?&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/cyfy-agenda" class="internal-link"&gt;&lt;b&gt;Download the agenda&lt;/b&gt; &lt;/a&gt;For more info visit &lt;a class="external-link" href="http://cyfy.org/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance'&gt;http://editors.cis-india.org/internet-governance/news/cyfy-2015-india-conference-on-cyber-security-and-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-17T14:44:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf">
    <title>CYFY 2014 Event Programme</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-13T06:59:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf">
    <title>CYFY 2014 Brochure</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf</link>
    <description>
        &lt;b&gt;The brochure of the event.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-13T07:03:52Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance">
    <title>CYFY 2013: India Conference on Cyber Security and Cyber Governance</title>
    <link>http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;The Observer Research Foundation in collaboration with the Federation of Indian Chambers of Commerce and Industry is holding the India Conference on Cyber Security and Cyber Governance at the Oberoi Hotel in New Delhi on October 14 and 15, 2013. Sunil Abraham will participate in this event as a speaker.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the full details in the &lt;a href="http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf" class="internal-link"&gt;event brochure&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shri Kapil Sibal, Minister of Communications &amp;amp; Technology will give the inaugural address. Shri Shivshankar Menon, National Security Advisor, Government of India will give the keynote address. Shri Shashi Tharoor, Minister of State, Human Resource Development, Government of India will give the dinner table address on October 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the second day, October 15, Minister Jaak Aaviksoo will give the keynote address and Shri Nehchal Sandhu, Deputy National Advisor, Government of India will give the valedictory address.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Kapil Sibal, Minister for Communications and Information Technology, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shivshankar Menon, National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shashi Tharoor, Minister of State for Human Resource Development, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nehchal Sandhu, Deputy National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A.P. Shah, Former Chief Justice, Delhi High Court&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arvind Gupta, Director General, Institute for Defence Studies and Analyses, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ashish Chauhan, CEO, Bombay Stock Exchange&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;C. Raja Mohan, Distinguished Fellow, ORF&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Christopher Painter, Office of the Coordinator for Cyber Issues, Department Of State, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dirk Brengelmann, Commissioner for International Cyber Policy, Federal Foreign Office, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric H. Loeb, Vice President, International External Affairs, AT&amp;amp;T&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gabriel Siboni, Director, Cyber Warfare Program, Institute for National Security Studies, Tel Aviv University, Israel&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jaak Aaviksoo, Minister of Education and Research of the Republic of Estonia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joe Sullivan, CSO, Facebook&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;John Mallery, Research Scientist, MIT Computer Science &amp;amp; Artificial Intelligence Laboratory, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maurizio Martellini, Secretary General, Landau Network-Centro Volta and IWG Executive Secretary, Italy&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Cheatham, Head U.S. Representative Office, Indo-US Science and. Technology Forum, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.M.Oberoi, Indian Police Service, Joint commissioner of Police, Delhi Police, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oleg Demidov, The Russian Center for Policy Studies, Russia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Peter Grabosky, Researcher, Australian National University, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prakash Nagpal, Senior Vice President, Product Marketing and Marketing, Narus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rajan Mathews, Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ram Narain, Deputy Director General (Security), Department of Telecommunication (DoT), Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sandro Gaycken, Freie Universität Berlin, Institute of Computer Science, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vijay Madan, Chief Mentor, Tata Teleservices (former Director, C-DOT), India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vivke Lall, President &amp;amp; CEO, Reliance Industries Limited&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance'&gt;http://editors.cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T06:50:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf">
    <title>CYFY 2013 Event Brochure</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/cyfy-brochure.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-26T06:49:18Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town">
    <title>Cyberstalkers, the new bullies in town</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town</link>
    <description>
        &lt;b&gt;The advent of social media and an increase in accessibility has led to increasing concerns with regard to cyber safety.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by S. Poorvaja was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/cyberstalkers-the-new-bullies-in-town/article8806401.ece"&gt;published in the Hindu&lt;/a&gt; on July 4, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Bombarded with messages, poems and photographs from a cyber &lt;a href="http://www.thehindu.com/news/national/verma-committee-moots-severe-punishment-for-voyeurs-stalkers/article4369797.ece" target="_parent"&gt;&lt;b&gt;stalker&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;across  multiple social networking platforms, Shradha Muralidharan, a  consultant in the city, said that being curt and asking the stalker to  stop bothering was of no use.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I initially did not want to engage with him as I was afraid that it  would only provoke him more. But then ignoring him did not help as well  and I was forced to speak to him. He, however, went ahead and contacted a  host of my friends on these sites and asked them if they could  introduce me to him,” she recalled.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindu.com/news/cities/Kochi/beware-threeyear-term-in-jail-awaits-cyber-stalkers/article3417314.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;is  now on the increase with people being flooded with messages and having  their information online manipulated and used to threaten them with.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Vandhana,* an engineer from the city, says she thinks twice before  posting content online — be it on her Instagram or her Facebook profile.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Despite having adequate privacy tools, I later found that my photos and  other information were being shared by a colleague who was on my  friends’ list to his friend, who then proceeded to cyberstalk me,” she  said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;What to share? &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While multiple tools that social media sites offer do allow people to  mute, block or even report people, Pranesh Prakash, Policy Director for  the Centre for Internet and Society, said technical restrictions didn’t  play much of a part in a situation where information one posts to a  private audience is shared further, without their consent.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Trust plays a large role in what you share online since someone can  find a way to get around technological restrictions. While there are  some violations that can be addressed by the law, a few cannot be, and  it is important for people to be aware of the legal provisions that  exist,” he added.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Be it social media meet-ups, Facebook friends catching up outside of the  virtual world or web writers meeting to brainstorm ideas, the last five  years have seen a gradual increase in such socialising and new safety  concerns have cropped up.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Karthika, a chartered accountant from the city who went through an  unpleasant experience of being stalked on social media sites and  cyber-bullied, said that while the police were helpful when she sought  them out, she was also constantly questioned as to why she was  befriending people online in the first place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“I tried not to keep mum about what was happening to me but was also  simultaneously told by people that it would seem like I was drawing  unnecessary attention to myself if I made public what was happening to  me. More people should come forward and support the person who is  getting stalked, rather than be intimidated,” she said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of internet, email or any form of electronic communication to  contact and harrass a person who has expressed disinterest, and to cause  them trauma is what qualifies as &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/cyberstalkers-at-large-law-order/article1889616.ece" target="_parent"&gt;&lt;b&gt;Cyberstalking&lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To prevent misuse of information, social media users can use privacy  tools and settings that enable them have a control on who vies their  information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With smartphone apps for social media sites that have access to the  user's location, caution must be exercised by the user in knowing who is  privy to such information&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With children being active online as well, the use of parental control  softwares that helps monitor the content they share is necessary as they  are vulnerable victims to stalking and cyber bullying&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Knowledge about the cyber crime laws and where/whom to report incidences of the same to.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town'&gt;http://editors.cis-india.org/internet-governance/news/the-hindu-s-poorvaja-july-4-2016-cyberstalkers-the-new-bullies-in-town&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-04T02:44:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication">
    <title>Cyberspying: Government may ban Gmail for official communication</title>
    <link>http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication</link>
    <description>
        &lt;b&gt;The government will soon ask all its employees to stop using Google's Gmail for official communication, a move intended to increase security of confidential government information after revelations of widespread cyberspying by the US.
&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-employees-may-face-Gmail-ban/articleshow/22156529.cms"&gt;published in the Times of India &lt;/a&gt;on August 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India's National Informatics Centre.&lt;br /&gt;&lt;br /&gt;"Gmail data of Indian users resides in other countries as the servers are located outside. Currently, we are looking to address this in the government domain, where there are large amounts of critical data," said J Satyanarayana, secretary in the department of electronics and information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Snowden fallout&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;The move comes in the wake of revelations by former US  &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;National Security Agency&lt;/a&gt; contractor Edward  &lt;a href="http://timesofindia.indiatimes.com/topic/Snowden-%28musician%29"&gt;Snowden&lt;/a&gt; that the  &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; had direct access to large amounts of personal data on the internet  such as emails and chat messages from companies like Google, Facebook  and Apple through a programme called  &lt;a href="http://timesofindia.indiatimes.com/topic/PRISM"&gt;PRISM&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt; Documents leaked by Snowden showed that NSA may have accessed network  infrastructure in many countries, causing concerns of potential security  threats and data breaches. Even as the new policy is being formulated,  there has been no mention yet of how compliance will be ensured. &lt;br /&gt;&lt;br /&gt; Several senior government officials in India, including ministers of  state for communications &amp;amp; IT Milind Deora and Kruparani Killi, have  their Gmail IDs listed in government portals as their official email. &lt;br /&gt;&lt;br /&gt; A  &lt;a href="http://timesofindia.indiatimes.com/topic/Google-India"&gt;Google India&lt;/a&gt; spokeswoman said the company has not been informed about the ban, and  hence it cannot comment on speculation. "Nothing is documented so far,  so for us, it is still speculation," Google said in an email response. &lt;br /&gt;&lt;br /&gt; A senior official in the IT department admitted on condition of  anonymity that employees turn to service providers such as Gmail because  of the ease of use compared with official email services, as well as  the bureaucratic processes that govern creation of new accounts. &lt;br /&gt;&lt;br /&gt; "You can just go and create an account in Gmail easily, whereas for a  government account, you have to go through a process because we have to  ensure that he is a genuine government user." &lt;br /&gt;&lt;br /&gt; Last week, IT  Minister Kapil Sibal said the new policy would require all government  officials living abroad to use NIC servers that are directly linked to a  server in India while accessing government email services. Sibal said  there has been no evidence of the US accessing Internet data from India.  &lt;br /&gt;&lt;br /&gt; Sunil Abraham, executive director of Bangalore-based research  firm Centre for Internet and Society, said he agrees with the  government's decision to ban Gmail for official communication and that  any official violating this needs to be punished. &lt;br /&gt;&lt;br /&gt; "After  Snowden's revelations, we can never be sure to what extent foreign  governments are intercepting government emails," he said. Abraham,  however, called the government's decision a "late reaction", as the use  of Gmail and other free email services by bureaucrats has increased in  the past. &lt;br /&gt;&lt;br /&gt; "Use of official government email would also make it  easier to achieve greater transparency and anti-corruption initiatives.  Ministers, intelligence and law enforcement officials should not be  allowed to use alternate email providers under any circumstance." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication'&gt;http://editors.cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-02T04:19:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf">
    <title>CyberSecurityAgreements_Infographic_04.pdf</title>
    <link>http://editors.cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf'&gt;http://editors.cis-india.org/internet-governance/files/CyberSecurityAgreements_Infographic_04.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-04-27T14:57:45Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
