<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 4281 to 4295.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/files/cyber-security-newsletter-september-16.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/cyber-dialogue-conference-2014"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/cyber-appellate-tribunal-bengaluru"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/cyber-360"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/cv-booklet.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/rethinking-ipr-fourth-annual-national-workshop-for-law-students"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/CUSAT%20-%20Report%20and%20response%20to%20RTI%205.2.15.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015">
    <title>Cyber Security Summit 2015</title>
    <link>http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015</link>
    <description>
        &lt;b&gt;The Government of Karnataka in association with Biz Wingz Production House organized this Summit on November 27, 2015 at JW Marriott, Bangalore from 10.30 a.m. to 5.30 p.m. Sunil Abraham was a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cloud-based applications are often the darling of the CFO and the  nemesis of the CISO &amp;amp; CIOs. How can an organization migrate to the  cloud, thus relinquishing control, but still maintain &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt;? Are we sacrificing &lt;span class="highlightedSearchTerm"&gt;security&lt;/span&gt; and robustness in exchange for other priorities? How do ‘Snowden’  disclosures change the legal and risk nature of cloud decision making  and governance? What can proactive cloud providers do to capture the  opportunity in the disruption? The panel explored these topics and more  to provide the cutting edge thinking and perspectives you need to shape  your own cloud strategies in ways that balance multiple priorities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance &amp;amp; Chief Operational Risk Officer India&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Atul kumar, GM IT, Syndicate Bank&lt;/li&gt;
&lt;li&gt;Lopa Mudra Basu, AVP &amp;amp; Head of Enterprise &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; &amp;amp; Risk Governance, SLK Global&lt;/li&gt;
&lt;li&gt;Sagar Karan, Chief Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt; Officer, Fullerton India Credit Co. Ltd.&lt;/li&gt;
&lt;li&gt;R Vijay, CISO –Technology, Mahindra &amp;amp; Mahindra Financial Services Limited&lt;/li&gt;
&lt;li&gt;Sanjivan S Shirke, Senior Vice President-Information Technology, Head -Information &lt;span class="highlightedSearchTerm"&gt;Security&lt;/span&gt;, UTI Asset Management Company Limited.&lt;/li&gt;
&lt;li&gt;Sanjay Sahay, IPS, ADGP, Grievances &amp;amp; Human Rights, Police Dept, Govt of Karnataka (moderator).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="https://www.eventshigh.com/detail/Bangalore/f8cf8b1a68202dca7543ec973f7ae2c0-cyber-security-summit-2015"&gt;More information about this event&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015'&gt;http://editors.cis-india.org/internet-governance/news/cyber-security-summit-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-16T02:10:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research">
    <title>Cyber Security Policy Research</title>
    <link>http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research</link>
    <description>
        &lt;b&gt;Tim Maurer will give a presentation on cybersecurity policy research at the Centre for Internet &amp; Society's New Delhi office on October 18, 2015, from 2 p.m. to 5 p.m. Geetha Hariharan and Sunil Abraham will participate in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Tim Maurer's talk will give an outline of the definitional issues involved, the various threats to the confidentiality, integrity, and availability of information and underlying infrastructure, the actors involved and international efforts to address cybersecurity. The talk will also provide an overview of existing and ongoing cyber security policy research.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Tim Maurer&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/home-images/Tim.jpg/@@images/897b814d-5366-4da7-9270-b3c69b69020f.jpeg" alt="Tim" class="image-inline" title="Tim" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tim Maurer is an associate at the Carnegie Endowment for International Peace. His work focuses on cyberspace and international affairs, with a concentration on global cybersecurity norms, human rights online, Internet governance, and their interlinkages. He is writing a book on cybersecurity and proxy actors.&lt;br /&gt;&lt;br /&gt;Maurer serves as a member of the Research Advisory Network of the Global Commission on Internet Governance, the Freedom Online Coalition’s cybersecurity working group “An Internet Free and Secure,” and co-chaired the Civil Society Advisory Board of the Global Conference on CyberSpace. In 2014, he developed the Global Cyber Definitions Database for the chair of the OSCE to support the implementation of the OSCE’s cyber confidence-building measures. In 2013 and 2014, Maurer spoke about cybersecurity at the United Nations in New York and Geneva and co-authored “Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate,” published by the Global Commission on Internet Governance. His work has also been published by Jane’s Intelligence Review, TIME, Foreign Policy, CNN, Slate, and other academic and media venues.&lt;br /&gt;&lt;br /&gt;Prior to joining Carnegie, Maurer was the director of the Global Cybersecurity Norms and Resilience Project at New America and head of research of New America’s Cybersecurity Initiative. He also gained experience with the United Nations in Rwanda, Geneva, and New York focusing on humanitarian assistance and the coordination of the UN system.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research'&gt;http://editors.cis-india.org/internet-governance/events/cyber-security-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-16T16:47:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/files/cyber-security-newsletter-september-16.pdf">
    <title>Cyber Security Newsletter (September 2016 - June 2017)</title>
    <link>http://editors.cis-india.org/internet-governance/files/cyber-security-newsletter-september-16.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/files/cyber-security-newsletter-september-16.pdf'&gt;http://editors.cis-india.org/internet-governance/files/cyber-security-newsletter-september-16.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-07-20T13:45:18Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy">
    <title>Cyber experts suggest using open source software to protect privacy</title>
    <link>http://editors.cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy</link>
    <description>
        &lt;b&gt;Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-22/internet/40133453_1_source-software-cyanogenmod-encryption"&gt;published in the Times of India&lt;/a&gt; on June 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One enterprising netizen has compiled a list of services, from social &lt;a href="http://timesofindia.indiatimes.com/topic/Ne%28x%29tworks"&gt;networks&lt;/a&gt; to email clients, and even web browsers, that offer better protection  from surveillance. They are listed on a web page called prism-break.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked about steps that a digital native can take to protect his  privacy and online data, Sunil Abraham, executive director of  Bangalore-based non-profit Center for Internet and Society said, "Stop  using proprietary software, shift to free/open source software for your  operating system and applications on your computer and phone. &lt;a href="http://timesofindia.indiatimes.com/topic/Android"&gt;Android&lt;/a&gt; is not sufficiently free; shift to CyanogenMod. Encrypt all sensitive  Internet traffic and email using software like TOR and GNU Privacy  Guard. Use community based infrastructure such as Open Street Maps and  Wikipedia. Opt for alternatives to mainstream services. For example,  replace Google Search with DuckDuckGo."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Use of licensed or  proprietary software, which bind users legally when it comes to use and  distribution, seems to be losing favour among an informed niche. While  alternative software cannot offer absolute protection, it is being seen  as a "better-than-nothing" option. Anonymisers like TOR, though also not  entirely foolproof, are also a popular option among those who wish to  keep their web usage untraceable. Once installed on a browser,  anonymisers can hide the route that digital traffic takes when sent from  your computer over a network before emerging at an end node.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is one caveat, though. Some websites can deny service to users  operating on certain anonymising networks. Also, anonymisers are known  to reduce browsing speeds. In India, where broadband speeds are already  abysmally low, anything that slows one down even further would find  popularity hard to come by.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Computer and network security expert Aseem Jakhar too recommends  open source software since they offer the convenience of customization  to suit one's encryption needs and are able to verify the source code.  For laypersons, there are other tools. "One can use anonymisers like TOR  which encrypt your communication and hide your identity. With these it  becomes very difficult to exactly locate the source. For email clients,  it is best to use ones that offer end-to-end strong encryption," he  says. Jakhar, co-founder of open security community "null", also  recommends the use of customized and &lt;a href="http://timesofindia.indiatimes.com/topic/Linux"&gt;Linux&lt;/a&gt; systems for more advanced users. Default Linux distributions, he points  out, may have free online services which can again be analysed by the  governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The home-bred CMS programme seeks to directly  procure data pertaining to call records and internet usage for  intelligence purposes without going through telecom service providers.  There were fears of abuse when information about the programme, kept  under strict wraps by the government, trickled in. Department of Telecom  and Ministry of IT and Communication have been reticent about the state  of implementation of the 400-crore rupees programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PRISM, a similar, international monitoring programme mounted by the US  and revealed to the world by the US National Security Authority  whistleblower Edward &lt;a href="http://timesofindia.indiatimes.com/topic/Snowden-%28musician%29"&gt;Snowden&lt;/a&gt;, has raised concerns of safeguarding digital information the world over.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy'&gt;http://editors.cis-india.org/news/times-of-india-june-22-2013-kim-arora-cyber-experts-suggest-open-source-software-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-03T04:32:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/cyber-dialogue-conference-2014">
    <title>Cyber Dialogue Conference 2014</title>
    <link>http://editors.cis-india.org/news/cyber-dialogue-conference-2014</link>
    <description>
        &lt;b&gt;The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Malavika Jayaram is &lt;a class="external-link" href="http://www.cyberdialogue.ca/2014-participants/"&gt;participating in this event&lt;/a&gt; being held on March 30 and 31, 2014. Full event &lt;a class="external-link" href="http://www.cyberdialogue.ca/"&gt;details here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;After Snowden, Whither Internet Freedom?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A recent stream of documents leaked by former NSA contractor Edward Snowden has shed light on an otherwise highly secretive world of cyber surveillance. Among the revelations — which include details on mass domestic intercepts and covert efforts to shape and weaken global encryption standards — perhaps the most important for the future of global cyberspace are those concerning the way the U.S. government compelled the secret cooperation of American telecommunications, Internet, and social media companies with signals intelligence programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For American citizens, the NSA story has touched off soul-searching discussions about the legality of mass surveillance programs, whether they violate the Fourth and Fifth Amendments of the U.S. Constitution, and whether proper oversight and accountability exist to protect American citizens' rights. But for the rest of the world, they lay bare an enormous “homefield advantage” enjoyed by the United States — a function of the fact that AT&amp;amp;T, Verizon, Google, Facebook, Twitter, Yahoo!, and many other brand name giants are headquartered in the United States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the Snowden revelations, global governance of cyberspace was already at a breaking point. The vast majority of Internet users — now and into the future — are coming from the world’s global South, from regions like Africa, Asia, Latin America, and the Middle East. Of the six billion mobile phones on the planet, four billion of them are already located in the developing world. Notably, many of the fastest rates of connectivity to cyberspace are among the world’s most fragile states and/or autocratic regimes, or in countries where religion plays a major role in public life. Meanwhile, countries like Russia, China, Saudi Arabia, Indonesia, India, and others have been pushing for greater sovereign controls in cyberspace. While a US-led alliance of countries, known as the Freedom Online Coalition, was able to resist these pressures at the Dubai ITU summit and other forums like it, the Snowden revelations will certainly call into question the sincerity of this coalition. Already some world leaders, such as Brazil’s President Rousseff, have argued for a reordering of governance of global cyberspace away from U.S. controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the fourth annual Cyber Dialogue, we are inviting a selected group of participants to address the question, “After Snowden, Whither Internet Freedom?” What are the likely reactions to the Snowden revelations going to be among countries of the global South? How will the Freedom Online Coalition respond? What is the future of the “multi-stakeholder” model of Internet governance? Does the “Internet Freedom” agenda still carry any legitimacy? What do we know about “other NSA’s” out there? What are the likely implications for rights, security, and openness in cyberspace of post-Snowden nationalization efforts, like those of Brazil’s?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in previous Cyber Dialogues, participants will be drawn from a cross-section of government (including law enforcement, defence, and intelligence), the private sector, and civil society. In order to canvass worldwide reaction to the Snowden revelations, this year’s Cyber Dialogue will include an emphasis on thought leaders from the global South, including Africa, Asia, Latin America, and the Middle East.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/cyber-dialogue-conference-2014'&gt;http://editors.cis-india.org/news/cyber-dialogue-conference-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-08T05:09:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year">
    <title>Cyber crimes shoot up 52% in India over last year</title>
    <link>http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year</link>
    <description>
        &lt;b&gt;There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by K.V.Kurmanath was &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cyber-crimes-shoot-up-52-in-india-over-last-year/article6168812.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;published in the Hindu Businessline&lt;/a&gt; on July 2, 2014. Bhairav Acharya gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you add the cases registered under the IPC, the total number of cyber crime cases crosses the 5,500-mark. Police across the country arrested 3,301 persons in connection with these cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maharashtra and Andhra Pradesh (undivided) have topped the list with 681 and 635 cases respectively under the IT Act, both showing an almost 50 per cent growth in cyber crimes over the previous year. In the previous year, Maharashtra had registered 471 and Andhra Pradesh 429.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security experts have been cautioning people to be careful while using the Internet. Besides increasing the security of the networks they are using, users must be careful while engaging with strangers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent Microsoft report said many customer infections involve users tricked to install secondary offers, indicating a shift in malware proliferation. According to the latest data provided by the National Crime Records Bureau, the official chronicler of crime in the country, cyber crime registered under the Indian Penal Code (IPC) has shown a much higher growth rate of 122 per cent in 2013 over the previous year’s figure. IPC cases went up to 1,316 in 2013 from 595 in the previous year. Maharashtra topped the list here too with the cops booking 226 cases in this category.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wrong nomenclature?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya of the Centre for Internet and Society feels that the term cyber crime has not been defined well. “It is time we do away with the practice of calling any crime a ‘cyber crime’ just because the person who does it uses a computer,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Instead, I think the term ‘cyber crime’ should only be used in relation to offences that can only be committed by using information and communications technology (ICT) such as the internet (which is comprised of the world wide web, email protocols, file transfer protocols, and more) as well as network infrastructure that is not the internet,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, only if there is a direct causal link between the crime and ICT and network technology should a crime be called a cyber crime, Acharya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other States with a high number of cases booked under the IT Act include Karnataka (513), Kerala (349), Madhya Pradesh (282) and Rajasthan (239). Gujarat showed a decline with the number coming down to 61 from 68 in the previous year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year'&gt;http://editors.cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2014-07-03T10:14:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation">
    <title>Cyber bullying is a crime, but open to interpretation: Expert</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation</link>
    <description>
        &lt;b&gt;The social media attack on a Doordarshan anchor who made a series of gaffes at the recent Goa film festival would qualify as cyber bullying, experts say, but hasten to add there is not much that can be done to prevent such behaviour online, given the humungous size of the virtual universe.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-02/news/56649315_1_information-online-cyber-bullying-offline"&gt;published in the Times of India&lt;/a&gt; on December 2, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The anchor reportedly shut down all her online accounts following  the slew of unflattering and personal comments that she was bombarded  with after the video of the event went viral and was shared across &lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt;, among other such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 66 (A) of the IT Act, 2000, &lt;a href="http://economictimes.indiatimes.com/topic/cyber%20bullying"&gt;cyber bullying&lt;/a&gt; is a bailable offence, punishable with three years of imprisonment and  fine. However, the complainant and police can interpret what constitutes  offensive behaviour, said cyber law expert Pavan Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Just  as we don't regulate jeering and taunting of adults when it happens in  person, as opposed to a threat of violence, unless there is a special  case made out for the harm of online taunting, I don't think there is a  case for a legislative response," said Pranesh Prakash, policy director  at Bengaluru-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a recent report by &lt;a href="http://economictimes.indiatimes.com/topic/McAfee"&gt;McAfee&lt;/a&gt;, part of &lt;a href="http://economictimes.indiatimes.com/topic/Intel"&gt;Intel&lt;/a&gt; Security, half of Indian youths have had some experience with cyber  bullying and of these over a third (36%) have been bullied themselves  online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT and cybersecurity expert Rakshit Tandon recalled the  trauma a young professor at one of the top colleges underwent when an  old picture of her, from one of her social media accounts, went viral  and became the butt of unflattering comments by students. "Once it goes  viral, you can't track who is sharing or sending it," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We don't have one personality anymore," said Adhvith Dhuddu, founder  and CEO of digital marketing agency Alive-Now, which handles social and  digital for brands online. "We have an offline personality and we have  an online personality, and this is true for anyone —whether you are a  brand, person, book or a movie," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several schools, NGOs  and individuals are working towards educating children and young people  about the dangers of sharing information online, but often find  themselves at a loss when confronted with real situations every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The approach AliveNow's Dhuddu takes is to "engage first and ban  later". He said, "We try to reason with people. We always take any  grievance offline, we don't try to solve a grievance online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  individuals, however, the offline route may be impractical or  infeasible. Tandon believes the only way is to "sensitise people", while  CIS's Prakash says a person can "block abusive users, set one's account  in private mode and just get off such social networks for a while till  the situation cools off".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-07T10:54:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/cyber-appellate-tribunal-bengaluru">
    <title>Cyber Appellate Tribunal in Bengaluru</title>
    <link>http://editors.cis-india.org/news/cyber-appellate-tribunal-bengaluru</link>
    <description>
        &lt;b&gt;Bengaluru will be home to the southern chapter of the Cyber Appellate Tribunal (CAT), which will reach out to victims of cyber crime, the state government announced at the Cyber Security Summit here on Tuesday.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://goo.gl/v1Xw0"&gt;Pranesh Prakash is quoted in this article published in the Deccan Herald on May 9, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;But on the other hand, the IT Secretary, who is the state adjudicator, has held in all the cases that he has no jurisdiction to pass orders against the banks and that no complaint can be admitted under Section 43 of the IT Act against any corporate entity.&lt;/p&gt;
&lt;p&gt;"The state IT secretary has passed more than 80 orders. They include both cases of phishing and orders against cyber cafes for not adhering to rules under the IT Act. The Adjudicator has held that ‘section 43 of IT Act is not applicable to a body or Corporate’, after the amended IT Act came into force in 2008," said Pranesh Prakash of the Centre for Internet Society "I feel Section 43 has been mis used . The definition given in this section cannot be understood either by lawyers or technical people. If there is a genuine case of phishing and a user has suffered losses over the internet then there should be no ambiguity in passing the order," he said.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/cyber-appellate-tribunal-bengaluru'&gt;http://editors.cis-india.org/news/cyber-appellate-tribunal-bengaluru&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-30T05:47:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda">
    <title>Cyber 360 Agenda</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda'&gt;http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-02T15:41:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/cyber-360">
    <title>Cyber 360</title>
    <link>http://editors.cis-india.org/internet-governance/news/cyber-360</link>
    <description>
        &lt;b&gt;Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As part of Cyber 360 Degree, a two-day conference on cyber security continuing Wednesday in Bangalore, experts from around the world gathered to discuss global threats to information security, particularly focusing on open wifi, which poses a huge threat to information security. The conference aimed to bring together strategic security practitioners, policymakers, media and business enterprises on a single platform to obtain a 360o perspective on cybersecurity. It was an endeavour to create a holistic security strategy that will help to achieve resilience against modern cyber-threats. A range of keynote presentations and panel discussions will give participants a rare chance to interact and learn from leading cyber security experts and solution providers from around the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Participants&lt;/h3&gt;
&lt;p&gt; CEOs, Members of Board and CIOs of more than 60 companies&lt;br /&gt; Security practitioners&lt;br /&gt; Policy-makers&lt;br /&gt; Leading Academia&lt;br /&gt; International think tanks &amp;amp; media&lt;/p&gt;
&lt;p&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/cyber-360-agenda" class="internal-link"&gt;Download the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/cyber-360'&gt;http://editors.cis-india.org/internet-governance/news/cyber-360&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T02:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/cv-booklet.pdf">
    <title>CV Booklet</title>
    <link>http://editors.cis-india.org/internet-governance/blog/cv-booklet.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/cv-booklet.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/cv-booklet.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-20T04:34:46Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/rethinking-ipr-fourth-annual-national-workshop-for-law-students">
    <title>CUSAT Workshop: "Rethinking IPR: Fourth Annual National Workshop for Law Students"</title>
    <link>http://editors.cis-india.org/a2k/news/rethinking-ipr-fourth-annual-national-workshop-for-law-students</link>
    <description>
        &lt;b&gt;The workshop was organized by the Inter University Centre for IPR Studies in association with Cochin University of Science and Technology from February 8 to 10, 2017 in Cochin. Pranesh Prakash was the resource person for a copyright workshop for LL.M. students. &lt;/b&gt;
        &lt;p&gt;Pranesh led and guided student discussion on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; P2P File Sharing - Based on analysis of the Copyright Act I haven't  yet written about.&lt;/li&gt;
&lt;li&gt;Technological Protection Measures:  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/a2k/blogs/tpm-copyright-amendment"&gt;http://cis-india.org/a2k/blogs/tpm-copyright-amendment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Benefits of Piracy: &lt;a class="moz-txt-link-freetext" href="http://idl-bnc.idrc.ca/dspace/handle/10625/46491"&gt;http://idl-bnc.idrc.ca/dspace/handle/10625/46491&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Misrepresentations of copyright industry:  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates"&gt;http://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates&lt;/a&gt; +  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/a2k/blogs/calling-out-the-bsa-on-bs"&gt;http://cis-india.org/a2k/blogs/calling-out-the-bsa-on-bs&lt;/a&gt; +  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/a2k/blogs/2010-special-301"&gt;http://cis-india.org/a2k/blogs/2010-special-301&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;John Doe orders:  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-1"&gt;http://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-1&lt;/a&gt; (3-part series) +  &lt;a class="moz-txt-link-freetext" href="http://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"&gt;http://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt; See the &lt;a class="external-link" href="http://ciprs.cusat.ac.in/ripr/ripr2014.php"&gt;event brochure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;See the &lt;a class="external-link" href="http://cis-india.org/a2k/files/rethinking-intellectual-property-rights"&gt;programme agenda&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/rethinking-ipr-fourth-annual-national-workshop-for-law-students'&gt;http://editors.cis-india.org/a2k/news/rethinking-ipr-fourth-annual-national-workshop-for-law-students&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-03-29T10:59:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/CUSAT%20-%20Report%20and%20response%20to%20RTI%205.2.15.pdf">
    <title>CUSAT - Report and response to RTI 5.2.15.pdf</title>
    <link>http://editors.cis-india.org/a2k/blogs/CUSAT%20-%20Report%20and%20response%20to%20RTI%205.2.15.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/CUSAT%20-%20Report%20and%20response%20to%20RTI%205.2.15.pdf'&gt;http://editors.cis-india.org/a2k/blogs/CUSAT%20-%20Report%20and%20response%20to%20RTI%205.2.15.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-21T15:26:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open">
    <title>Cultural knowledge needs to be more open</title>
    <link>http://editors.cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open</link>
    <description>
        &lt;b&gt;Subhashish Panigrahi is an educator and open source activist based in Bangalore, India. He is currently working at the Centre for Internet and Society's Access To Knowledge program where he builds partnership with universities, language researchers, and GLAM organizations. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Jen Wike Huger was published on the website of OpenSource.com. It can be &lt;a class="external-link" href="https://opensource.com/community/15/2/contributor-spotlight-subhashish-panigrahi"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Their goal is to bring more scholarly and encyclopedic content under  free licenses. During his work at the Wikimedia Foundation's India  Program, Subha was involved in designing community sustaining and new  contributor cultivation models.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For his effort to share and spread open source far and wide, this year he was awarded a &lt;a href="https://opensource.com/community/15/1/winners-2015-community-awards" target="_blank"&gt;2015 Opensource.com People's Choice Award&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His most recent articles include: &lt;i&gt;&lt;a href="https://opensource.com/life/14/3/wikipedia-project-hindu-poetry" target="_blank"&gt;Digitize any book in the public domain&lt;/a&gt;&lt;/i&gt;, on his work to with Indian poetry important to the culture. &lt;i&gt;&lt;a href="https://opensource.com/education/14/5/odia-wikimedia" target="_blank"&gt;Books and more are relicensed to Creative Commons&lt;/a&gt;, &lt;/i&gt;about news from the Wikimedia Foundation. &lt;i&gt;&lt;a href="https://opensource.com/community/14/7/mozilla-brings-indian-communities-together" target="_blank"&gt;Mozilla brings Indian communities together&lt;/a&gt;&lt;/i&gt;, about the Indic FirefoxOS L10n Sprint 2014. And, &lt;i&gt;&lt;a href="https://opensource.com/education/14/10/open-access-platform-odia-language" target="_blank"&gt;Open access platform to save the Odia Indian language&lt;/a&gt;&lt;/i&gt;, on his work to preserve his native culture.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Basics&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Name&lt;/b&gt;: Subhashish Panigrahi ("Subha")&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Opensource.com username&lt;/b&gt;: &lt;a href="https://opensource.com/users/psubhashish" target="_blank"&gt;psubhashish&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Location&lt;/b&gt;: India (Bengaluru and Odisha)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Occupation/Employer/Position&lt;/b&gt;: Programme Officer, Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Favorite open source tool or application&lt;/b&gt;: Audacity&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Favorite Opensource.com channel&lt;/b&gt;: Education&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Open up to us&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;I was away from home for my studies and was longing to read and write  more in my native language of Odia. That led me to co-found  eOdissa.com, a portal to tell stories to the rest of the world about my  language, history, and cultural heritage. I was a sporadic editor on  Wikipedia; anonymously since 2006. Then, in 2011, I was introduced to  editing for Odia Wikipedia by my mentor Shiju Alex and friend Asutosh  Kar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That was my entry point to the free software movement. And it was a trap I could never get out of!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I thankfully began a full-time job with the Wikimedia Foundation in  2012 for its India Program. The program is now housed with their Indian  movement partner, Centre for Internet and Society, under the Access To  Knowledge program. I work in the Bengaluru office but mostly travel to  work with the communities. I work on building capacity for the Indian  language Wikimedia communities, building institutional partnerships for  long term outreach engagement, negotiating with publishers and copyright  holders to bring more content relicensed under Creative Commons  licenses, and taking part in policy level discourses around open access  and enforcing free software for governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What open tools and data help you get things done?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For my day job, I solely rely on Wikimedia Stats to collate data  related to Wikimedia projects. I use some Python programming, jQery.ime,  and JavaScript for other data-related work. But, I am a people's man  and my interaction is mostly with humans rather than tools.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What do you wish were more open?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;GLAM (galleries, libraries, archives and museums) and many other  cultural institutions have historically been the keepers of cultural  knowledge. But I see possessiveness in not opening up their archival for  public consumption. I wish more policy level negotiations and open  collaborations were happening to open up cultural data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the biggest challenges to openness that you encounter, either at work or in your life?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Community and its growth. Working in a developing nation with  historical, cultural, economic, and political hindrances pulls  volunteerism down. It's is a huge challenge for me. Tapping into many  existing networks and communities, and leveraging ongoing activities for  the betterment for the free and open source movement, is something I am  struggling for.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why choose the open source way?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;I would like to quote a good friend and activist Michelle Thorne who  says, "Human civilization has everything free and open from the  beginning, but slowly the problems of restriction start beginning."  Furthermore filmmaker Nina Paley says, "Knowledge is not created by us,  rather shared by us."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we are here to share knowledge, why to restrict its free flow?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open'&gt;http://editors.cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-03-12T16:41:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer">
    <title>Cultural institution AKA GLAM for more OER </title>
    <link>http://editors.cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer</link>
    <description>
        &lt;b&gt;The OER conference was held in Edinburgh, Scotland on April 19 and 20, 2016. Subhashish Panigrahi gave a talk at the event organised by the University of Edinburg. &lt;/b&gt;
        
&lt;p&gt;The vision for the conference was to focus&amp;nbsp;on the value proposition of embedding open culture in the context of institutional strategies for learning, teaching and research. The conference was chaired by&amp;nbsp;Melissa Highton, Director of Learning, Teaching and Web Services at the University of Edinburgh, and Lorna Campbell, OER Liaison at the University of Edinburgh and EDINA Digital Education Manager. The OER 16 conference primarily focused on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The strategic advantage of open and creating a culture of openness.&lt;/li&gt;
&lt;li&gt;Converging and competing cultures of open knowledge, open source, open content, open practice, open data and open access.&lt;/li&gt;
&lt;li&gt;Hacking, making and sharing.&lt;/li&gt;
&lt;li&gt;The reputational challenges of openwashing.&lt;/li&gt;
&lt;li&gt;Openness and public engagement.&lt;/li&gt;
&lt;li&gt;Innovative approaches to opening up cultural heritage collections for education.&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe src="http://www.slideshare.net/slideshow/embed_code/key/IwwO926qj1iFvX" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt; &lt;a title="Subhashish Panigrahi - Cultural Institution aka GLAM for More OER (OER16, 19-20.04.2016)" href="http://www.slideshare.net/CIS_India/subhashish-panigrahi-cultural-institution-aka-glam-for-more-oer-oer16-1920042016" target="_blank"&gt;Subhashish Panigrahi - Cultural Institution aka GLAM for More OER (OER16, 19-20.04.2016)&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="http://www.slideshare.net/CIS_India" target="_blank"&gt;The Centre for Internet and Society&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://commons.wikimedia.org/wiki/File:OER16_-_Presentation_slides_of_Subhashish_Panigrahi.pdf"&gt;Presentation slides of the talk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://media.ed.ac.uk/media/Cultural%20institution%20AKA%20GLAM%20for%20more%20OER/1_m28pkox9"&gt;Video of the talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://open.ed.ac.uk/event/oer16-conference-edinburgh/"&gt;More info on University of Edinburg website&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer'&gt;http://editors.cis-india.org/a2k/news/cultural-institution-aka-glam-for-more-oer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-09T12:51:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
