<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 791 to 805.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Figure3.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/bilski-case"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/awesom-contracts-project"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/gaming-and-gold/attention-economy"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/iacs-summer-school-2012"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/ept-award-for-individuals-in-developing-countries-working-for-open-access"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/tezpur-forwarded-response-1"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/tezpur-annual-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/Figure3.jpg">
    <title>The Binary: City and Nature</title>
    <link>http://editors.cis-india.org/home-images/Figure3.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Figure3.jpg'&gt;http://editors.cis-india.org/home-images/Figure3.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-20T10:27:38Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/bilski-case">
    <title>The Bilski Case - Impact on Software Patents</title>
    <link>http://editors.cis-india.org/a2k/blogs/bilski-case</link>
    <description>
        &lt;b&gt;The Supreme Court of the United States gave its decision in Bilski v Kappos on 28 June, 2010. In this case the petitioners’ patent application sought protection for a claimed invention that explains how commodities buyers and sellers in the energy market can protect, or hedge, against the risk of price changes. The Court in affirming the rejection by the Court of Appeals for the Federal Circuit also held that the machine- or-transformation test is not necessarily the sole test of patentability.  The Court’s ruling of abstract ideas as unpatentable and its admission that patents do not necessarily promote innovation and may sometimes limit competition and stifle innovation have provided a ray of hope. In the light of the developments, the Bilski decision as far as patentability of software is concerned may not be totally insignificant, says Krithika Dutta Narayana.&lt;/b&gt;
        
&lt;p&gt;The United States Supreme Court’s much awaited decision of last month in &lt;em&gt;Bilski v. Kappos&lt;/em&gt; (2010) (Bilski), a case that was touted as a potential watershed in the debate surrounding patentability of software, was disappointing, even though it was not without any impact. While the Supreme Court affirmed the rejection by the Court of Appeals for the Federal Circuit (CAFC) of a patent claim for a business method, it failed to define with clarity, any test for patentability which might have constituted a precedent for future cases involving patentability of software or business method. At the same time, it held that the “machine- or- transformation” test which was the test followed by the CAFC in rejecting the claim, was not the sole test to determine patentability, thus effectively providing no guideline to determine patentability of software or business methods in future cases.&lt;/p&gt;
&lt;p&gt;The Supreme Court in Bilski, affirmed the rejection by the CAFC in &lt;em&gt;In&lt;/em&gt; &lt;em&gt;re Bilski&lt;/em&gt; (2008) of a patent claim involving a method of providing insurance against fluctuating energy prices due to changes in weather. The applicants, Bernard L. Bilski and Rand Warsaw filed a patent application for such a method of hedging risks – essentially a claim for a business method – under Section 101 of US Patent Act before the United States Patent and Trademark Office (USPTO). The examiner at the USPTO rejected the claim on the ground that the claim was not for patentable subject matter and that “the invention is not implemented on a specific apparatus and merely manipulates (an) abstract idea and solves a purely mathematical problem without any limitation to a practical application, therefore, the invention is not directed to the technological arts”. The Board of Patent Appeals and Interferences (BPAI) took a re-look at the examiner’s decision and held that the “machine or apparatus” test was in itself insufficient to determine patentability since a claim that included transformation of a physical object from one state to another would also be patent eligible subject matter. The BPAI also struck down the requirement of the invention to be a “technological art”. Thus, it rejected the Bilski claim on the ground that it did not cause transformation of a physical object from one state to another, since transformation of financial liabilities and risks does not constitute transformation of physical matter.&lt;/p&gt;
&lt;p&gt;In its decision on October 30, 2008, the CAFC affirmed the ruling of the BPAI and laid down the machine or transformation test for patentability and held that Bilski’s claim was neither tied to any machine or apparatus to derive the result nor did it cause transformation of any physical object from one state to another and is hence, unpatentable subject matter. The Court reasoned that the “machine or transformation” test was crucial for determining patentability as it ensured that the claim based on a fundamental principle did not preempt all other uses of the principle. This test was the first test since the US Supreme Court’s decision in Diamond v. Diehr (1981) – which held that laws of nature, mathematical formulae and algorithms are not patentable – that had a huge potential for laying down definitive rules for patentability including declaring software and business methods to be outside the realm of patentable subject matter. If this test was upheld in the Supreme Court, that would effectively put an end to the rise of software patents since software, in most cases, did not cause transformation of physical object from one state to another. Thus, the decision of the Supreme Court had huge stakes for both sides of the software patent debate.&lt;/p&gt;
&lt;p&gt;In light of the same, the Supreme Court’s ruling holding that the machine or transformation test is not the sole test for determining patentability and at the same time, failing to provide any other test on which to determine patentability, was a sore disappointment. Though, it affirmed the rejection of Bilski’s patent claim on the ground that the subject matter claimed was abstract and thus not a patentable “process” under section 101, its core decision was only limited to this particular claim and it did not lay down a concrete and definitive guideline for future claims. However, one must not be too quick to dismiss this decision as either going against the interests of open society and free software or as a completely inconsequential case that simply maintains status quo. There are important takeaways for the patentability of software in the Bilski decision – The Court did not totally reject the machine or transformation test relied on by the CAFC. It only held that the machine or transformation test is not the sole test on basis of which the patentability of a subject matter of a claim can be decided. The Court, in fact, held that the “machine or transformation test” was a “useful and important clue, an investigative tool for determining whether some claimed inventions are processes under section 101.”&amp;nbsp; This leaves open the possibility of using the test to determine patentability in future cases and this is good news for opponents of software patents since software (an algorithm designed to be operated upon by a computer) is merely an abstract idea which, in most cases, does not involve transformation of a physical object from one state to another.&lt;/p&gt;
&lt;p&gt;Bilski’s claim was essentially interpreted to be a patent for a business method. The Supreme Court was completely silent on the issue of patentability of software in its decision and stuck to only the narrow issue in hand – that of the patentability of a particular business method. This means that the “machine or transformation test”, whose applicability was ruled out in this particular case, may still be applicable for software patents. Nothing in this case precludes an opponent of a software patent from urging the courts to use the “machine or transformation test” to rule on patentability. Thus, the very fact that the Supreme Court only dealt with the narrow issue in hand ensures that the “machine or transformation test” is not altogether dismissed.&lt;/p&gt;
&lt;p&gt;The main ground on which Bilski’s claim was rejected was that the patent claim was for an overly abstract idea which was not patent-eligible. The Court held that the basic concept on which the claim was based – the concept of hedging risks against risk is an unpatentable abstract idea. Further, some of the claims are constituted by equations and are purely mathematical in nature and are abstract and thus not patentable. This means that basic concepts and use of mathematical formulae constitute abstract ideas which are unpatentable. This test can strike down many software patents as these are simply algorithms executed by a computer and incorporate very fundamental and basic concepts which are abstract in nature and are thus, not patentable. This test for determining patentability on the basis of the claim being abstract as laid down in Bilski reaffirms the patentability test laid down in Diamond v. Deihr which kept laws of nature, mathematical formulae and algorithms outside the scope of patentable subject matter. This may serve as an important test to determine and especially, limit the patentability of software in coming years.&lt;/p&gt;
&lt;p&gt;Notwithstanding the fact that Bilski’s claim has been interpreted to be one of a business method patent, when examined in detail, the claims indicate that the ‘method’ cannot be implemented without a computer. Certain claims for calculating probability (and risk), although mathematical or algorithmic in nature, have too many variables to be executed in any way other than by using a computer.&lt;strong&gt;1&lt;/strong&gt; Such algorithms which can be executed only by a computer fall under the category of software and the patent is thus, also, a software patent. That being said, the ruling of the Court that the claim is for an overly abstract idea and thus not patentable lends credence and indicates that software patents can be validly claimed to be abstract ideas not falling under the scope of patentable subject matter.&lt;/p&gt;
&lt;p&gt;Another important outcome of the Supreme Court’s ruling was the invalidation of the 1998 CAFC decision in &lt;em&gt;State Street Bank v. Signature Financial Group&lt;/em&gt;&lt;strong&gt;2&lt;/strong&gt; which opened the floodgates for software patents by holding that a practical application of an algorithm or formula to produce “useful, concrete and tangible result” was sufficient to constitute patentable subject matter. The State Street test was too broad and afforded an opportunity for many frivolous patent applications to be admitted. In fact, Justice Stevens, in his concurring opinion, has stated that it would be a “grave mistake” to follow the test. By clearly striking down and dismissing such a test to determine patentable subject matter, the Court in Bilski has precluded future software patent claims for taking recourse to this test and has effectively, to an extent, made it that much harder for a software to be granted patent. The test in &lt;em&gt;State Street Bank&lt;/em&gt; which opened the floodgates for software patents was definitively dismissed.&lt;/p&gt;
&lt;p&gt;The Court in the 1978 case of &lt;em&gt;Parker v. Flook&lt;/em&gt;, had rejected patent for a mathematical algorithm on the ground that an algorithm was a law of nature although its use was limited to a specific field in this case (the “field of use” test) and added an insignificant post solution activity (“post solution activity” test). The test laid down in Flook had been subsequently questioned and thus, subtly dismissed by the Court in &lt;em&gt;Diehr &lt;/em&gt;in 1991. The Court in Bilski emphasized on the test for patentability laid down in &lt;em&gt;Flook&lt;/em&gt; and opined that the two tests may well come in handy in future challenges or oppositions to a patent claim while determining if the claim pertained to an idea that was abstract and hence, not patentable. Thus, this test can be used in future for invalidating software patents which are characterized by broad claims adding insignificant post solution activity.&lt;/p&gt;
&lt;p&gt;It is heartening to note that the Court looked at the importance of patent law while recognizing that patents are not always necessary to encourage innovation. It noted that patents could also limit competition and stifle innovation. They can have ill effects such as increasing prices while slowing progress and could actually be deterrent to free flow of information within society. By recognizing and validating this, the ruling not only helped increase awareness about the debate surrounding software patents but also showed that the Courts are open to such an approach to patent law in future. This can only be good news for busting software patents.&lt;/p&gt;
&lt;p&gt;For &lt;a class="external-link" href="http://www.supremecourt.gov/opinions/09pdf/08-964.pdf"&gt;further reading&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Claim 4 of Bliski's claims is as follows -&amp;nbsp; “perform a Monte Carlo simulation across all deals at all locations ... over the last 20 years of weather patterns and establish the payoffs from each deal under each historical weather pattern “ Such a simulation would involve multiple parameters such as deals, locations, weather patterns, to establish a payoff.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;149 F.3d. 1368.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/bilski-case'&gt;http://editors.cis-india.org/a2k/blogs/bilski-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-08-23T03:24:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach">
    <title>The Big Debit Card Breach: Three Things Card Holders Need To Understand</title>
    <link>http://editors.cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach</link>
    <description>
        &lt;b&gt;A total of 32 lakh debit cards across 19 banks could have been compromised on account of a purported fraud, the National Payment Corporation of India said in a statement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alex Mathew was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2016/10/20/indias-biggest-security-breach-32-lakh-debit-cards-across-19-banks-may-have-been-compromised"&gt;published by Bloomberg&lt;/a&gt; on October 20, 2016. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  issue was brought to light when State Bank of India blocked the debit  cards of 6 lakh customers on October 14. This was done after the bank  was alerted to a possible fraud by the National Payment Corporation of  India, MasterCard and Visa, said Managing Director Rajnish Kumar in a  telephonic interview with BloombergQuint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a statement released  on Thursday evening, the NPCI clarified that the problem was brought to  their attention when they received complaints from a few banks that  customers’ cards were used fraudulently, mainly in China and the U.S.,  while those cardholders were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The complaints of  fraudulent withdrawal are limited to cards of 19 banks and 641  customers. The total amount involved is Rs 1.3 crore as reported by  various affected banks to NPCI,” the payments corporation said.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__image story__element"&gt;&lt;figure&gt; &lt;img src="http://editors.cis-india.org/home-images/Card.png" alt="Card" class="image-inline" title="Card" /&gt;&lt;br /&gt; &lt;/figure&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p style="text-align: justify; "&gt;SISA Security, a Bengaluru-based company is currently undertaking  a forensic study to identify the extent of the problem and will submit a  final report in November.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-blockquote"&gt;
&lt;div&gt;
&lt;blockquote&gt;Based on the advisory issued by NPCI and other schemes, it is gathered  that banks have advised their customers to change their debit card PIN.  In situations where customers could not be contacted, the cards have  been blocked and fresh cards are being issued by member banks.&lt;/blockquote&gt;
&lt;span class="attribution"&gt;NPCI statement&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p style="text-align: justify; "&gt;State Bank of India has blocked 6 lakh cards, while other banks  have sent notifications to customers advising them to change their  personal identification numbers.&lt;/p&gt;
&lt;h3&gt;How The Breach Could Have Occured&lt;/h3&gt;
&lt;p&gt;The breach that has apparently given hackers access to the PIN codes  of several bank customers is likely to be on account of a malware  attack. This attack is believed to have originated at an ATM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  actual modus operandi of the hackers will only become clear once the  forensic audit is released in November, but BloombergQuint spoke to  cyber security expert Udbhav Tiwari to find out how the attack could  have been orchestrated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, the hacker would have had to gain  physical access to an ATM. The malware was then likely injected by  connecting a laptop or another special device to a port on the cash  disbursing machine, said Tiwari, a consultant at Centre For Internet  &amp;amp; Society in Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the malware is injected, it  automatically spreads across the network and infects other devices that  are not protected against it. In this case, the malware could have  infected a payment switch provider’s network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A payment switch  provider is an entity that facilitates a transaction either from an ATM  or an online payment gateway. The service provider decides to whom the  request for authorisation will be sent and then transmits the request  back to the merchant or the ATM where the transaction originated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  this case, one payment switch provider, Hitachi Payment Services, which  manages close to 50,000 ATMs across the country, was asked by banks to  investigate 30 of its ATMs on account of around 400 suspicious  transactions that took place outside India, Managing Director Loney  Antony told BloombergQuint in a telephonic interview.&lt;/p&gt;
&lt;p&gt;The company  had earlier said in a statement that an interim report by the audit  agency does not suggest any breach or compromise in its systems.&lt;/p&gt;
&lt;h3&gt;The Scale Of The Breach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According  to a study conducted by NPCI in collaboration with the banks, the  number of debit cards that were infected by the malware has been set at  32 lakh. But Tiwari said this number could be higher.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div&gt;
&lt;blockquote&gt;The hypothetical limit to how much the malware can spread is dependent  on the vulnerability of the systems, and if one of the payment switch  provider’s systems was vulnerable and they still haven’t decided how  many systems are vulnerable, it is quite possible that the malware is  spreading at this point.&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="attribution"&gt;Udbhav Tiwari, Consultant, Centre For Internet &amp;amp; Society&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="attribution"&gt;What A Customer Should Do&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The first, and most important step a customer should take is to immediately change their debit card PIN, Tiwari pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;State  Bank of India has said that its customers can opt to restrict the usage  of their debit cards, for example whether it can be used both  internationally and domestically or only domestically. Also, the daily  limit of the debit card can be changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once these steps have been  taken, according to Tiwari, it is most important that customers stay  vigilant and keep monitoring their bank statements. If an unauthorised  transaction takes place, a customer should immediately contact their  bank and block their card.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach'&gt;http://editors.cis-india.org/internet-governance/news/bloomberg-alex-mathew-october-20-2016-the-big-debit-card-breach&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-21T13:43:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data">
    <title>The Benefits and Challenges of the “Free Flow” of Data</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. Sunil Abraham is a panelist in this workshop organized by Public Knowledge on November 12, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Internet was designed so that global data flows would be dictated by efficiency, rather than centralized control or oversight. This engineering principle has provided businesses and consumers with access to the best available technology, information, and services, wherever those resources may be located around the world. It has benefitted virtually all industry sectors, from manufacturing to financial services, education, health care, and beyond. The “free flow” of data is what has allowed the Internet flourish into what it is today.&lt;br /&gt;&lt;br /&gt;Yet governments, corporations, and non-state actors around the world are increasingly employing a variety of technical, legal, and administrative tools to restrict data flows, limiting routing and data storage to particular jurisdictions and restricting the kinds of content and data types that are permitted online. Some of these restrictions have been put in place for legitimate purposes, designed to further privacy protections, network security, and fair commerce, and have been justified within the bounds of international law and norms. Others, however, are less defensible, and are intended to unfairly support preferred commercial interests or to quell domestic political dissent.&lt;br /&gt;&lt;br /&gt;This panel will discuss the many benefits and challenges of the free flow of data. It will foster a discussion of the ways in which stakeholders can address the underlying reasons for data flow restrictions (such as the need for law enforcement access to data or the desire to nurture local ICT industry development, etc.) without subverting the Internet’s core potential for innovation, economic growth, and public welfare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Name, stakeholder group, and organizational affiliation of workshop proposal co-organizer(s)&lt;/b&gt;&lt;br /&gt;Carolina Rossini&lt;br /&gt;Civil Society&lt;br /&gt;Public Knowledge&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proposer, or any of the co-organizers, organized an IGF workshop before?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;no&lt;br /&gt;&lt;br /&gt;Subject matter #tags that describe the workshop&lt;br /&gt;&lt;br /&gt;#innovation #barriers #policy #cross-boarder flow #privacy&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Description of the plan to facilitate discussion amongst speakers, audience members and remote participants&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;Each panelist will be given approximately 3 minutes for opening remarks, followed by a moderated discussion, and then audience question and answer. Remote participants will be given the opportunity to ask questions over an online forum, such as Webx and Twitter.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Names and affiliations (stakeholder group, organization) of the participants in the proposed workshop&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr class="even"&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; Name Carolina Rossini&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Public Knowledge&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: She is a  world-renowned expert on Internet policy and law, a Brazilian national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Name Vint Cerf&lt;/li&gt;
&lt;li&gt;Stakeholder group: Private Sector/Technical Community&lt;/li&gt;
&lt;li&gt;Organization: Google&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He has been involved  in Internet issues for many years and currently serving in influential  vice president and “chief evangelist” role at Google.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Lawrence Strickling&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: U.S. Department of Commerce, NTIA&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He is the head of one  of the United States government’s principal Internet policy agencies.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;li&gt;Name Richard Leaning&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: European Cyber Crime Centre (EC3), Europol&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He understands the  needs of the law enforcement community from a European perspective, a  British national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Marietje Schaake&lt;/li&gt;
&lt;li&gt;Stakeholder group: Government&lt;/li&gt;
&lt;li&gt;Organization: European Parliament&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: She is a prominent  privacy advocate within the European Parliament, a Netherlands national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Name Nasser Kettani&lt;/li&gt;
&lt;li&gt;Stakeholder group: Private Sector&lt;/li&gt;
&lt;li&gt;Organization: Microsoft&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He helps build and  design data centers for Microsoft in Africa, a Moroccan national.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? Yes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Sunil Abraham&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: He is the executive  director of one of India’s most influential Internet policy think tanks  and advocacy groups.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? No, but know him well.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Name Zahra Rose&lt;/li&gt;
&lt;li&gt;Stakeholder group: Civil Society&lt;/li&gt;
&lt;li&gt;Organization: Developing Countries' Centre for Cyber Crime Law&lt;/li&gt;
&lt;li&gt;Describe why this speaker has been selected: A lawyer, she  understands the needs of the law enforcement community from a civil  society perspective in Pakistan.&lt;/li&gt;
&lt;li&gt;Have you contacted the speaker? No&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of in-person Moderator(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Jonah Force Hill&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of Remote Moderator(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Winter Casey, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;&lt;b&gt;Name of Rapporteur(s)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seth Bouvier, U.S. Department of State&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="title"&gt;Description of the proposer's plans for remote participation&lt;/p&gt;
&lt;p&gt;We intend to utilize the IGF’s WebX system to include remote  participants in the question and answer portion of the panel. The remote  participants will be afforded equal/proportional representation in the  discussion. The remote moderator will facilitate the Q&amp;amp;A with the  moderator. We’ll need a screen in the room to display the remote  comments.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;For more info visit &lt;a class="external-link" href="https://www.intgovforum.org/cms/wks2015/index.php/proposal/view_public/65"&gt;IGF website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data'&gt;http://editors.cis-india.org/internet-governance/news/the-benefits-and-challenges-of-the-201cfree-flow201d-of-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T02:09:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures">
    <title>The Bapsybanoo Marchioness of Winchester Lectures</title>
    <link>http://editors.cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures</link>
    <description>
        &lt;b&gt;Chinmayi Arun was a speaker at the Bapsybanoo Marchioness of Winchester Lectures on 'India's Politics of Free Expression' in the University of Oxford on May 31 2013, in the session on 'media and security'. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Asian Studies Centre, Free Speech Debate, the Oxford India Society and Ideas for India Oxbridge Exchange were the co-sponsors for this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Theme: India's Politics of Free Expression&lt;br /&gt;Date: May 31, 2013&lt;br /&gt;Time: 10.00 a.m. to 6.15 p.m.&lt;br /&gt;Venue: Nissan Lecture Theatre, St. Antony's College, Oxford&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;More details can be found &lt;a class="external-link" href="http://www.sant.ox.ac.uk/asian/indlects.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures'&gt;http://editors.cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-09T03:35:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/awesom-contracts-project">
    <title>The Awesome Contracts Project (Geekup @ CIS)</title>
    <link>http://editors.cis-india.org/internet-governance/awesom-contracts-project</link>
    <description>
        &lt;b&gt;Vivek Durai, co-founder at Awesome Contracts, a Singapore-India startup will give a public lecture on May 18, 2012 at the Centre for Internet &amp; Society in Bangalore. Lawyer, musician, legal recruiter and entrepreneur, Amith Narayan will also participate through Skype!&lt;/b&gt;
        
&lt;h2&gt;The Awesome Contracts Project&lt;/h2&gt;
&lt;p&gt;Contracts are ubiquitous in our everyday life. They are also a nuisance. And they typically come attached with a bigger nuisance - lawyers! Interestingly though, contracts are a lot like code. Geek-lawyers, a very small, minuscule tribe on this planet, tend to notice a lot of similarities between the two. If this is true, it opens up a lot of possibilities, including changing the way we do business and in particular generate contracts, negotiate and seal deals.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We'll talk about some of the technology and some of the products we're working on that we think can provide power to a lot of folks.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;17:00 - 17:05&lt;/td&gt;
&lt;td&gt;Welcome with Tea, Coffee, and Snacks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:05 - 17:15&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lightning Talks&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:15 - 18:00&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;The Awesome Contracts Project&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div class="time"&gt;18:00 - 18:30&lt;/div&gt;
&lt;/td&gt;
&lt;td&gt;Q &amp;amp; A&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Vivek Durai&lt;/h2&gt;
&lt;p&gt;Vivek Durai is a co-founder at Awesome Contracts, a Singapore-India startup that is working on interesting problems in the field of law and contracts. As with just about everyone else, he and co-founder Amith Narayan would like to change the world. Preferably, for the better. Vivek and Amith are both alumnus of the National Law School of India University.&lt;br /&gt;&lt;br /&gt;Vivek is a lawyer by training, a geek by nature, and generally human. Most of the time. As far as ideologies go, Vivek is a Pythonista currently flirting with Node and other things. He is also incidentally a Partner at Atman Law Partners, a young three office boutique law firm.&lt;/p&gt;
&lt;h2&gt;Amith Narayan&lt;/h2&gt;
&lt;p&gt;Amith Narayan loves hats. He likes them so much in fact, he's been wearing all kinds. He has been a corporate lawyer, a musician, a record producer, a legal recruiter, and now an entrepreneur running this crazy little startup. Amith grew up in Calicut (Kozhikode) Kerala, trained in law at NLSIU, worked in the grand dame of the Indian legal world - Crawford Bayley - before moving to Singapore where he's been living for the past 10 years. Amith will join us over Skype during the talk.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/awesom-contracts-project'&gt;http://editors.cis-india.org/internet-governance/awesom-contracts-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-05-11T12:17:09Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/raw/histories-of-the-internet/blogs/gaming-and-gold/attention-economy">
    <title>The Attention Economy - A Brief Introduction</title>
    <link>http://editors.cis-india.org/raw/histories-of-the-internet/blogs/gaming-and-gold/attention-economy</link>
    <description>
        &lt;b&gt;This post examines attention economy as a brief prelude to a paper and monograph to be published on it. It examines the current theses on attention economy and a few approaches to reading attention economy in gaming besides foregrounding the attention economy and its functions and influence in MMORPGs.&lt;/b&gt;
        
&lt;h3&gt;What is attention economy?&lt;/h3&gt;
&lt;p&gt;Attention economy was made prominent through the writings of Thomas Davenport&lt;strong&gt;1&lt;/strong&gt;and Micheal Goldhaber&lt;strong&gt;2&lt;/strong&gt;, who examine 'attention' as a scarce commodity in an information rich environment and divulge into examining exchanges and investments of attention and their results. Not particularly a new concept, attention economy focuses on the examination of attention as a scarce commodity in the information-rich societies influenced by the Internet and new digital technologies. The concept was first noted and written about by the political scientist Herbert Simon (1971), who notes “What information consumes is rather obvious: it consumes the attention of its recipients… [and thus arises] the need to allocate that attention efficiently among the over-abundance of information sources that might consume it.” In the abundance of information and access to information, the consumption or the ‘prosumption’ of information relies on the investment of attention, which becomes a scarce commodity – expended in the act of consumption. For the expended resource is no longer information or its scarcity in terms of availability – which has been the classical concerns in the industrialized market economy – but the amount of attention that is expended on the consumption of information. Economics is governed by what is scarce and the abundance of information is not a measurable function, rather what is expended in its consumption, namely human attention. From a cognitive science perspective, attention can be read as the investment of focused cognitive faculties in a particular ‘prioritized’ activity. In this way attention becomes an essential factor in capital production activities, in that the investment of attention generates capital through the direction of work (labour) and time in any particular activity. Derek Lomas (2008) and Peter Hughes&lt;strong&gt;3&lt;/strong&gt; treat media objects as artificial organisms that need attention for sustenance and energy for reproduction, somewhat in the nature of a Darwinian struggle where the most ‘able’ and ‘fit’ organism survives. All media organisms need one crucial element to survival, sustenance and reproduction – ‘attention’. In viral spreads and reproduction of a media organism the possibility of its procreation and viral distribution is realized through the investment of attention – the amount which enables survival and reproduction. By extension, virtual products are essentially media (artificial) organisms, and by extrapolation virtual goods and (possibly) even identities are organisms that thrive on the attention it receives for survival and reproduction.&lt;/p&gt;
&lt;h3&gt;The Economy and the Currency&lt;/h3&gt;
&lt;p&gt;Goldhaber (1997) notes that attention economy does not indeed have a market and operates unlike post-industrial markets. Although there is considerable material influence in terms of the investments of labour, time, and real money, often there is no direct means to measure it. Concepts of property, dichotomies of production, work, leisure and play require reformulation in light of this economy thriving on attention and its monetization. Davenport and Beck (2001) reinforces a measure of Goldhaber's arguments by stating that telecommunications bandwidth is not a problem but human bandwidth is. Goldhaber proceeds to say that a transfer of information must always be accompanied by a transfer of attention – measurable by the amount of time that is invested in the process. Even though both Goldhaber and Davenport seem to agree that examining time investment is a poor measure of the attention that is expended.&lt;/p&gt;
&lt;p&gt;Attention economics in earlier discourses and theses are connected with examining the failures and shortcomings of ‘the design’ of informational systems that locate, falsely, informational scarcity as the root of the problem leading to a deficit in attention, whereas the problem lies in the flow of attention itself and not information. The theories on ‘attention’ deal with a multitude of perspectives – from examining the psychological aspects, on the one hand, to economics, politics and sociology (including a measure of anthropology) of online networks on the other. A recent research on attention economy has largely been towards attention:&lt;/p&gt;
&lt;p&gt;a) as a scarce resource that was incentivized [providing an incentive to invest]&lt;strong&gt;4&lt;/strong&gt; in some manner and thus the attention currency – which is one reading of the attention currency; and&lt;/p&gt;
&lt;p&gt;b) as non-material capital, termed most appropriately as attentional capital and as measurable as wealth is to income, assuming that income can be measured and wealth and holdings are diverse and often immeasurable. Other studies focus on incorporating attention into design such that it captures user’s attention and rewards the time spent on the consumption of that information – so that the prioritization is the gambit of the&amp;nbsp; providers of information and the subsequent hierarchies (such as Google and Yahoo) rather than the users. Prioritization of avatar information is also prominent in the representations in the achievement hierarchy – a system common to how search engines prioritize information – only in gaming this system systematically categorizes information pertaining to the avatar and its achievements and growth. This is both internal to the game world in question as well as external in that external tools outside of the game gather and prioritize avatar information. Such practices have been termed as metagaming.&lt;strong&gt;5&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Defining metagaming becomes problematic in that it is not a concept peripheral to the absent centre of gaming rather – metagaming or activities and processes associated with metagaming become multiple centres by itself. Applying this to the secondary/goldfarming market may lead to interesting readings but here I digress. Attention and the flows of attention are connected to the ways in which information is structured into hierarchies and channelled, such that ranking systems and the achievement hierarchy moderates attention flows and shifts – players and gamers who grow in short spans of time through strategic and organizational excellence get more visibility in these hierarchies.&lt;/p&gt;
&lt;p&gt;Attention economies are largely read and identified in online economies and ecosystems. Davenport and Beck (2001) switch this dichotomy around and attempt a reading of organizational systems and how the offline attention economy affects organization and concepts of productivity and production. However, for the purposes of this study – online gaming economies take a central focus and a generic reading of multiple MMORPG economies is attempted.&lt;/p&gt;
&lt;p&gt;Before Castronova (2003), Castronova et al (2007), and much later Consalvo (2009) engaged with questions on Virtual Economies and Gaming Worlds (for the sake of argument –&amp;nbsp; Castronova’s term, Synthetic Worlds is used interchangeably with Virtual Worlds), Goldhaber and his contemporaries engaged with questions of production of informational goods – those that would in a primitive fashion address virtual production, consumption and exchange of digital informational goods and the relevance of attention expended within these economies. A colloquial reading of attention is that it is always translated as the investment of labour and time in different measures. Furthermore, the investment of time and labour on the consumption of any particular information&lt;strong&gt;6&lt;/strong&gt; is is incentivized and thus prioritized based on its position in the hierarchy. The higher its visibility, lower its incentives and vice versa. The writers on gaming cultures and economies do not directly engage with questions of attention flows and shifts but by using their concepts on the investment of time, activities of production, cultural, avatarial, and gaming capital, as well as virtual currencies – I engage with the concept of attention as a currency necessary to survival in virtual worlds particularly in MMORPGs, where there are elements of progress, exploration, conquest, warfare and constant struggle.&lt;/p&gt;
&lt;h3&gt;Reciprocal Attention and Survival&lt;/h3&gt;
&lt;p&gt;An investment in attention always ‘seeks’ a reciprocity in attention, such that an investment ensures a positive net gain either directly or indirectly owing to a growth in the attention repositories or collection of attention capital. This need not be manifest in the service–provider–user relationship but the user–user relationship. This enables reading the production of attention and the systematic means by which attention is channelled through a complex system of hierarchies in society as well as in the Virtual Gaming Worlds&lt;strong&gt;7&lt;/strong&gt; more accessible.&lt;/p&gt;
&lt;p&gt;Attention can also be approached as the necessity for survival in human society in much the same manner as human society is dependent on the flows of attention for the development of the individual or group in a society or community. It can be argued that attention inevitably forms a basic necessity that indirectly influences survival, sustenance, and reproduction. Production of attention, production of virtual goods, and the production of attentional capital&lt;strong&gt;8&lt;/strong&gt; are dependent on the minimal and pre-requisite investment in attention. The focus of this paper is to pitch attention as a currency, a currency that can be examined as one only when certain thresholds of attention have been achieved and relevant to the survival in MMORPG gaming worlds— worlds that are capable of viable social and economic interaction.&lt;/p&gt;
&lt;p&gt;Questions on the attention economy is inevitably connected to questions of production and consumption and more recently prod-usage and pro-sumption (hyphenated for emphasis) in digital technology mediated environments, whether graphically represented complex virtual worlds or text based MUDs.&lt;/p&gt;
&lt;p&gt;Although irrelevant to this trajectory, attention economy has also been approached from a systems and organizational perspective, which is what Davenport and Beck (2001) focus on. Similar studies revolve around examining attention flows in Social Network Systems (SNS) – Lomas (2008) and maximizing user value – Huberman and Wu (2008).&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Davenport has explored the implication so of the attention economy from an organizational perspective and the impact on human life – so to speak – particularly in Davenport and Beck 2001 – 'The Attention Economy', the primitive precursor of which was Davenport 1997 – 'Information Ecology'.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Micheal Goldhaber has written and spoken in considerable detail on The Attention Economy – most prominent and seminal of which is 'The Attention Economy – The Natural Economy of the Net' 1997 in the Journal First Monday.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;I quote directly from Peter Hughes who posits: “Artificial organisms might live on attention--they 'sleep' when no one is looking at them and gain energy (cycles) when someone is. Since energy could be used to reproduce, the most attention-grabbing forms would be selected.” - Italics imposed for Emphasis.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Some discourses focus on the means by which attention can be converted into currency – one of those means would be to provide incentives to invest attention in a particular action, this incentive then moves its priority higher in the informational hierarchy and in a limited focus, reading the achievement hierarchy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;I believe the term to be conceptually unanchored and nearly meaningless in its vast array of usages and applications – but to locate some of these practices using metagaming might provide an interesting insight into the very nature of these practices and the way in which they are encapsulated and epitomized in other terms.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Informational goods and virtual goods are read side by side and are not differentiated in this article, for the purposes of this argument – 'informational goods' as a term is a larger concept of which virtual goods may form a subset.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;Termed the Achievement Hierarchy – The Achievement Hierarchy represents the complex internal and metaverse rankings in an online game. This includes the game’s internal achievement ranking system that categorises players’ and gamers on different growth patterns and achievements as well as external tools not part of the game which assists in a detailed ranking system. Often players themselves subscribe to external ranking mechanisms, to keep track of others and their own progress. Wowprogress is one such external achievement hierarchy that ranks players in multiple realms. Travian World Analyzer, Traviandope and many other external resources support gameplay but are not in essence a part of intended gameplay. Metagaming can prove to be a usable and relevant term to define these practices. I have intentionally avoided linking them as some of these sites employ hostile scripts.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p class="discreet"&gt;I consistently use attentional capital as an extended concept which includes avatarial capital – avatar capital is a term proposed by Castronova (2005) and cited by Consalvo (2007).&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/raw/histories-of-the-internet/blogs/gaming-and-gold/attention-economy'&gt;http://editors.cis-india.org/raw/histories-of-the-internet/blogs/gaming-and-gold/attention-economy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gaming</dc:subject>
    
    
        <dc:subject>Gaming Economy</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Histories of Internet</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-03T10:48:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/iacs-summer-school-2012">
    <title>The Asian Edge: 2012 Inter-Asia Cultural Studies Society Summer School </title>
    <link>http://editors.cis-india.org/internet-governance/iacs-summer-school-2012</link>
    <description>
        &lt;b&gt;The 2nd Biannual Inter Asia Cultural Studies (IACS) Summer School will be hosted in Bangalore, India by the Centre for the Study of Culture and Society (CSCS) and the Centre for Internet and Society (CIS) with the Inter Asia Cultural Studies Consortium. The event will be held in the first and second week of August 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The  IACS Summer School brings together South and East Asian experts from  different disciplines as faculty for graduate and advanced research  students to engage with key issues of larger social, cultural and  political concerns in Cultural Studies in Asia. Any student registered  in a post-graduate degree program is eligible for the IACS Summer  School. There are limited seats and students will be selected based on  their applications. Students registered at universities participating in  the Consortium of Inter Asia Cultural Studies Institutions will be  given first preference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Summer School 2012 proposes to integrate the teaching with core IACS  faculty with the larger realities of change in South and East Asia. It  proposes a 10 + 4 day structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Core&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Course: Methodologies for Cultural Studies in Asia:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;The  Summer School offers a 10 day core course that works through seminars,  taught classrooms, tutorials, open spaces, field trips and workshops.  The core course shall address questions of Cultural Identity, Modernity,  Nationalism, Gender, Class, Revolution and Asianism to frame an  argument about relocating methods, concepts and ideas in contemporary  Cultural Studies in Asia.&lt;/p&gt;
&lt;table class="listing grid"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Day/Date&lt;/th&gt;&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Session&lt;/th&gt;&lt;th&gt;Instructors&lt;/th&gt;&lt;th&gt;Readings&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 02&lt;br /&gt;(Thu)&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;09:30-10:00&lt;/td&gt;
&lt;td&gt;Introduction to Course/Orientation&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;Session 1: The Question of Knowledge&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Instructors: Daniel PS Goh Nithin Manayath&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;The Epistemological Value of East Asian Perspective – Sun Ge&lt;br /&gt;&lt;br /&gt;Knowledge Production in the Era of Neo-Liberal Globalisation – Kuan-Hsing Chen&lt;br /&gt;&lt;br /&gt;Teaching versus Research? – Meaghan Morris&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Student Presentations&lt;/td&gt;
&lt;td&gt;Choi, Ji Yeon&lt;br /&gt;Ajinkya Shenava&lt;br /&gt;Khetrimayum M Singh&lt;br /&gt;Vincent Chung&lt;br /&gt;Jaime Fang-Tze Hsu&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 03&lt;br /&gt;(Fri)&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Culture Industries workshop&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Workshop party&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 04&lt;br /&gt;(Sat)&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10:00-1:00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Session 2: The Question of Culture&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Instructors: &lt;br /&gt;Asha Achuthan&lt;br /&gt;Ratheesh Radhakrishnan&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Hind Swaraj – Chs IV, VI, XII, XIII – MK Gandhi&lt;br /&gt;&lt;br /&gt;Value Typology of Chinese Peasants and Its Transformation in Contemporary China – He Xuefeng&lt;br /&gt;&lt;br /&gt;An Elaborative Argumentation of a Nong-Country – Zhang Shi Zhao&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Student Presentations&lt;/td&gt;
&lt;td&gt;Annisa Beta&lt;br /&gt;Ying-Tzu, Liu (Eva)&lt;br /&gt;Li, Yen-Chieh&lt;br /&gt;Sharib Aqleem Ali&lt;br /&gt;Li, Cho Kiu (Joseph)&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Venue: 1 Shanti Road&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;6:00-8:00&lt;/td&gt;
&lt;td&gt;EVENING SALON&lt;/td&gt;
&lt;td&gt;Tejaswini Niranjana and Kuan-Hsing Chen&lt;/td&gt;
&lt;td&gt;Venue: 1 Shanti Road&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 05&lt;br /&gt;(Sun)&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;HOLIDAY&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 06&lt;br /&gt;(Mon)&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;Session 3: Nationalism and Modernity&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Instructor: Milind Wakankar&lt;/p&gt;
&lt;p&gt;Student Presentations: &lt;br /&gt;Mai Thi Thu&lt;br /&gt;Baidurya Chakrabarti&lt;br /&gt;Zhang, Bing&lt;br /&gt;Musab Iqbal&lt;br /&gt;Meng Hsien Lu&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;On Nation – Zhang Tai Yan&lt;br /&gt;&lt;br /&gt;Nationalism in India – &lt;br /&gt;Rabindranath Tagore&lt;br /&gt;&lt;br /&gt;New Dominant Ideology and Changes of Urban Space in Today's Shanghai – Wang Xiaoming&lt;br /&gt;&lt;br /&gt;The Twilight of Certitudes: Secularism, Hindu Nationalism and Other Masks of Deculturation – Ashis Nandy&lt;/p&gt;
&lt;p&gt;A National Culture for Pakistan: the political economy of a debate – Saadia Toor&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Instructor: Madhuja M&lt;br /&gt;Student Presentations:&lt;br /&gt;Pan Yifan&lt;br /&gt;Zhang Zhihui&lt;br /&gt;Se Young Oh&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;EVENING SALON&lt;/td&gt;
&lt;td&gt;Stephen Chah and Ashish Rajadhyaksha&lt;/td&gt;
&lt;td&gt;Venue: Centre for Internet and Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 07&lt;br /&gt;(Tue)&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;Session 4: Culture and Economy&lt;/td&gt;
&lt;td&gt;Instructors: &lt;br /&gt;Radhika P&lt;br /&gt;Raghu Tenkayala&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In the Margin of the Capital: From ‘Tjerita Boedjang Bingoeng’ to ‘Si Doel anak sekolahan’&lt;/p&gt;
&lt;p&gt;The Emergent Culture of Consumption – Chua Beng Huat&lt;/p&gt;
&lt;p&gt;‘Bollywood’ 2004; When Was Bollywood – Ashish Rajadhyaksha&lt;/p&gt;
&lt;p&gt;Peasant Cultures of the 21st Century – Partha Chatterjee&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00&lt;/td&gt;
&lt;td&gt;Student Presentations&lt;/td&gt;
&lt;td&gt;Chan Ka Yi&lt;br /&gt;Kim Yoon Young&lt;br /&gt;Tanna Shilpa Shirishkumar&lt;br /&gt;Ruchi Jaggi&lt;br /&gt;Haesook Yong&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 08&lt;br /&gt;(Wed)&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;Session 5: Gender and Culture&lt;/td&gt;
&lt;td&gt;Instructors: &lt;br /&gt;Navaneetha Mokkil &lt;br /&gt;Nitya Vasudevan&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Why Culture Matters – Tejaswini Niranjana&lt;br /&gt;&lt;br /&gt;Prostitutes Parasites and the house of state feminism – Naifei Ding&lt;br /&gt;&lt;br /&gt;Women and Freedom – Firdous Azim&lt;br /&gt;&lt;br /&gt;Letters to the Editor: The domestic violence act and conflict&lt;br /&gt;&lt;br /&gt;Spectralization of the Rural: Reinterpreting the labour mobility of rural young women in post-Mao China – Yan Hairong&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00&lt;/td&gt;
&lt;td&gt;Student Presentations&lt;/td&gt;
&lt;td&gt;Elmo I-Che Hsu&lt;br /&gt;Pang Ka Wei (Janet)&lt;br /&gt;Li-Fang Lai&lt;br /&gt;Kris Yu-Shiuan Chi&lt;br /&gt;Samia Vasa&lt;br /&gt;Shwetha D&lt;br /&gt;Ryu M-Rye&lt;br /&gt;Sabreena Ahmed&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;6:00-8:00&lt;/td&gt;
&lt;td&gt;EVENING SALON&lt;/td&gt;
&lt;td&gt;Firdous Azim and Naifei Ding/Siddharth/Arvind in conversation&lt;/td&gt;
&lt;td&gt;Venue: Alternative Law Forum&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 09&lt;br /&gt;(Thurs)&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;FIELD TRIP&lt;/td&gt;
&lt;td&gt;SURESH JAYARAM – Pettai Tour&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 10&lt;br /&gt;(Fri)&lt;/td&gt;
&lt;td&gt;10:00-1:00&lt;/td&gt;
&lt;td&gt;Session 6: Understanding Popular Cultural Practice&lt;/td&gt;
&lt;td&gt;Instructors: &lt;br /&gt;Namita Malhotra&lt;br /&gt;Nishant Shah&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Hong Kong Action film in the Indian B Circuit – SV Srinivas&lt;br /&gt;&lt;br /&gt;Inter-Asia Comparative Framework: Postcolonial Film Historiography in Taiwan and South Korea Kim Soyoung&lt;br /&gt;&lt;br /&gt;Fan Bhakti and Subaltern Sovereignty – Madhava Prasad&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3:00-5:00&lt;/td&gt;
&lt;td&gt;Student Presentations&lt;/td&gt;
&lt;td&gt;Samhita Sunya&lt;br /&gt;Khatija Sana Khader&lt;br /&gt;Ayesha Maria Mualla&lt;br /&gt;Antoreep Sengupta&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Aug 11&lt;br /&gt;(Sat)&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;UNWORKSHOP DAY (Writing)&lt;/td&gt;
&lt;td&gt;Evening: Final Party&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Optional &lt;/b&gt;&lt;b&gt;Courses:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;2 Additional 4-days parallel  Courses shall be offered to participants interested in specialised  inquiries of their research practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Course&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;A.&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;The&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Digital&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Subject:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Science,&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Technology&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;and&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Society&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;in&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Asia&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Course Coordinator: Nishant Shah&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Course Instructors: Nishant Shah, Lawrence Liang and Ashish Rajadhyaksha&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Course&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;B.&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Research&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Seminar&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;on&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Technology, Culture &amp;amp; the Body&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Course Coordinator: Nitya Vasudevan&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Course Instructors: Tejaswini Niranjana, DING Naifei, Audrey Yue, Wing-Kwong Wong, Hsing-Wen Chang, Nitya Vasudevan&lt;/li&gt;
&lt;/ul&gt;
&lt;div id="_mcePaste"&gt;
&lt;p class="TableContents"&gt;&lt;span&gt;Nandy&lt;/span&gt;&lt;/p&gt;
&lt;p class="TableContents"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;span&gt;A National Culture for Pakistan: the political economy of a debate – Saadia Toor&lt;/span&gt;&lt;/div&gt;
&lt;p class="TableContents"&gt;&lt;span&gt;Nandy&lt;/span&gt;&lt;/p&gt;
&lt;p class="TableContents"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;A National Culture for Pakistan: the political economy of a debate – Saadia Toor&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/iacs-summer-school-2012'&gt;http://editors.cis-india.org/internet-governance/iacs-summer-school-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2012-08-02T13:23:14Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things">
    <title>The Aadhaar of all things</title>
    <link>http://editors.cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things</link>
    <description>
        &lt;b&gt;From a severely critical stand against Aadhaar in 2014, the Modi-led BJP in power has made a sharp U-turn to bulldoze its way into having every Indian scanned, tagged and labelled. A timeline of the country’s chequered date with the unique identification project.&lt;/b&gt;
        &lt;p&gt;The article by Shriya Mohan was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/cover/the-aadhaar-of-all-things/article9609603.ece"&gt;Hindu Businessline &lt;/a&gt;on March 31, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;You’ve probably read the WhatsApp joke about a post-Aadhaar scenario in  2020 India. A man orders pizza over phone. He is asked for his Aadhaar  number first. He then orders a family-size seafood pizza, only to be  reminded by the attendant about his high blood pressure and cholesterol  levels (thanks to his Aadhaar history visible to everybody “on the  system”) and is advised to order the low-fat Hokkien Mee pizza instead,  based on his recent search history on Hokkien cuisine. As if this isn’t  creepy enough, the pizza guy refuses a card payment, citing the man’s  maxed-out credit cards, advises against ATM withdrawal owing to his  massive overdraft and even decides to hold off the free cola offer given  his dire health situation. When the man turns livid, he is told to mind  his language, given that in 2007 he was already imprisoned for verbally  abusing a policeman!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;2020 is two and a half years away, and the WhatsApp scenario appears less incredulous by the day.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By the government’s latest estimate, 112,01,12,468 Aadhaar cards have  been issued since January 2009, when the Unique Identification Authority  of India (UIDAI) was set up under the Planning Commission. So if you  are an adult Indian resident without an Aadhaar card, you are in a two  per cent minority (98 per cent adults are covered).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Last week, Finance Minister Arun Jaitley said the 12-digit number would  be the single monolith identity for all Indians in the coming years,  replacing every other identity card. The government is serious because  each week a new scheme is added to the three dozen schemes in which  Aadhaar has been made mandatory. All the 84 schemes under the direct  subsidy benefit transfer programme are expected to follow suit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here are just a few instances in which you should be ready to whip out  your Aadhaar card — a free midday meal at a government school, access to  Sarv Shiksha Abhiyan, LPG subsidy and foodgrains under the public  distribution system, six scholarship schemes for students with  disabilities, getting your EPF pensions, booking a train ticket online,  getting a backward caste quota or benefit, and, according to the most  recent directive in the Finance Bill, filing your tax returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why did a dispensation so critical of Aadhaar in 2014 make a sharp  U-turn to bulldoze its way into having every single Indian citizen  scanned, tagged and labelled?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The earliest felt need for an identification project can be traced to  the Kargil Review Committee, instituted by the Vajpayee Government in  1999, in the wake of the Indo-Pak war. The Krishnaswamy Subrahmanyam-led  panel had recommended a citizenship database for the identification of  legitimate Indian citizens living in border areas.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As outlined in a Scroll article, this quickly expanded to include all  Indians under the Multipurpose National Identity Card project, which was  pilot tested in a few villages. The Citizenship Act was also amended to  give a legislative backing to the scheme, which built on the Bharatiya  Janata Party’s general stance against illegal immigrants.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The search for identity&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Citizenship Act was amended in 2004 by the incumbent Congress  government to make way for the National Population Register (NPR), a  database of the identities of all Indian residents, maintained by the  Registrar General and Census Commissioner of India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Eventually, in 2009, Aadhaar, or UIDAI, surfaced as a 12-digit  identification number that served as proof of identity and address —  meaning, it applies to all residents whether they are citizens or not,  unlike with the NPR. Aadhaar, which means ‘basis’ in Hindi, is intended  to be an all-encompassing substratum of identities that can provide  “instant access to services like banking, mobile phone connections and  other government and non-government services”. The United Progressive  Alliance government managed to link it to its Direct Benefit Transfer  (DBT) system for subsidies provided to targeted groups.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the main Opposition party, the BJP had felt that the Aadhaar number  ought to have been given only to Indian citizens, and not all residents,  which, in its view, would include millions of illegal immigrants.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Nandan Nilekani, the former CEO of IT giant Infosys, was appointed UIDAI  chairman in July 2009. The first Aadhaar number was issued in September  2010, and then the pace accelerated: 100 million by November 2011, 200  million by February 2012 and 500 million by end of 2013. “We felt speed  was strategic. Doing and scaling things quickly was critical. If you  move very quickly it doesn’t give opposition the time to consolidate,”  Nilekani told Forbes India in a 2013 interview.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here’s the part most of us forget: The largest opposition that Nilekani was referring to at that time was the BJP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The people who thought of themselves as having given birth to IT in  this country refused to listen to a common man like me. Even the SC has  demanded answers,” Narendra Modi, then Gujarat chief minister, had said  and alleged that the Aadhaar programme was a bundle of lies to loot the  country’s treasury.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the BJP’s prime ministerial candidate for the 2014 Lok Sabha  elections, days ahead of delivering the party’s biggest-ever victory, he  had tweeted: “On Aadhaar, neither the Team that I met nor PM could  answer my Qs on security threat it can pose. There is no vision, only  political gimmick.” Recently, when Aadhaar enrolments had crossed the  billion mark, this tweet was dug out prominently.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The U-turn&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So, what changed? How did the Aadhaar’s primary opposition become it’s key crusader?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There were two meetings that supposedly changed the destiny of the  Aadhaar project. In the first week of June 2014, as Nilekani was  vacating his government-allotted Lutyen’s bungalow as UIDAI chief, he  met Modi and Jaitley and persuaded the new regime to persist with  Aadhaar. The more important meeting was with Vijay Madan, the UIDAI  director general and mission director. According to a Governance Now  article, when the UID team spoke of the potential savings from plugging  subsidy leakages, and weeding out “ghost beneficiaries”, Modi asked them  to give a precise estimate. The figure was “up to ₹50,000 crore a year”  or a good 9.4 per cent of India’s ₹5,31,177-crore fiscal deficit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Modi in his keenness to showcase the arrival of “acche din” immediately  sought a 100-crore enrolment target at the ‘earliest’, putting paid to  speculations that the new government would shelve the UIDAI project. A  funding of ₹2,039.64 crore was formalised in the 2014-2015 Budget  presented a week later, to create the infrastructure to enrol 30 crore  people to add to the 70 crore already enrolled. The UIDAI targeted the  1-billion mark by the end of that fiscal.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Money bill to beat legal hurdles&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It was in November 2012 that the SC admitted a PIL filed by retired  Karnataka High Court judge KS Puttaswamy and advocate Parvesh Khanna,  questioning the government’s decision to issue Aadhaar even as the  National Identification Authority of India Bill 2010 was pending before  the Rajya Sabha since December 3, 2010. They argued that there was no  legislative backing for obtaining personal information. Also, the  proposed law was rejected by the Parliamentary Standing Committee on  Finance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PIL argued that linking the Aadhaar number with food security, LPG  subsidy, the Employees’ Provident Fund and other direct benefit  transfers made the enrolment mandatory, thereby falsifying the  government’s claim that it was voluntary. Several other PILs too voiced  similar privacy concerns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently, there are two legal strictures governing the validity of  Aadhaar: the apex court order of October 15, 2015, limiting the card’s  voluntary use to six schemes (PDS, MGNREGA, LPG, NEPS and social  assistance programmes) and prohibiting the government from making it  mandatory for receiving any benefits or services; and the Aadhaar  (Targeted Delivery of Financial and Other Subsidies, Benefits and  Services) Act, 2016, which is under challenge today. Both strictures  have distinct operational status, but petitioners argue that recent  government directives making Aadhaar mandatory are leading them to  wonder whether the SC’s interim order is overshadowed by the Aadhaar Act  or if the government is defying the court.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;On March 3, 2016, in a surprise move, to put all dissent to rest, the  Aadhaar Act was introduced as a Money Bill in Parliament to give it  legislative backing. Things moved pretty fast thereon. On March 11, the  Aadhaar Act 2016 was passed in the Lok Sabha. On March 26, the Act was  notified. Accusing the BJP-led NDA government of showing “utter  contempt” for the Rajya Sabha by taking the Money Bill route, senior  Congress leader Jairam Ramesh challenged it in the Supreme Court in  April. He likened the use of the Money Bill, which was passed overruling  amendments moved in the Rajya Sabha, to “knocking a nail in the coffin  of the Upper House”.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The government’s move took many, including Aadhaar advocates, by  surprise. “We need to separate Aadhaar as identity from its specific  functionality for which it’s used,” says Praveen Chakravarty, a senior  fellow at the IDFC institute and a former member of Nilekani’s core  team. He believes that just as a voter ID alone isn’t enough to vote,  seeing the ownership of an Aadhaar card as key for any transaction is  “fear-mongering”. Its use will still involve a process of checks and  balances.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;But can’t thumb prints be replicated with Fevicol?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Sure, there could be failures, as there are with any system. But this  is a far more foolproof method than any we’ve had before.  Internationally also, biometric is to authenticate a higher level of  security.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The argument for privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar has the potential to improve welfare service delivery. But it  has to be achieved in an inclusive manner befitting a truly liberal  society and not through coercion,” says Chakravarty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;His only misgiving is with the use of the Money Bill to introduce the  Aadhaar, without any right to privacy. “It should have gone through the  process of debate in Parliament. Then it wouldn’t have been passed  without a strong right to privacy safeguard,” he says, pointing that  even a junior UIDAI officer can access the data of anybody he/she  chooses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Aadhaar inverts the idea of transparency. It makes people transparent  but the State opaque,” says legal expert Usha Ramanathan, a legal expert  and anti-Aadhaar crusader.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The use of Aadhar as verification at every instance can help piece  together very detailed information about citizens. These include banking  transactions, online purchases, travel itineraries, mobile phone usage,  location history and practically anything that can be electronically  recorded and verified with an Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, the UIDAI filed a police case against Axis Bank  and others for alleged unauthorised authentication and impersonation  attempts by illegally storing Aadhaar biometrics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The latest outcry over breached privacy involved a screenshot of  cricketer Mahendra Singh Dhoni’s personal details that went viral on  Twitter. The UIDAI blacklisted the agency that revealed Dhoni’s Aadhaar  details after his wife complained to the IT Minister. A recent Scroll  report shows the UIDAI received 1,390 similar complaints but took no  action.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There are legitimate fears such an information database might eventually  be misused, for instance in racial profiling or revealing voting  preferences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In January this year, Hyderabad-based ECIL developed a biometric-enabled  mobile terminal for instant authentication of a voter “to prevent  rigging of votes”. Till August 2015, the Election Commission was working  on seeding Aadhaar data with that of voter ID card, in an attempt to  weed out fake voters. However, the poll panel stopped this exercise  after the SC ruled that Aadhaar be made compulsory only for PDS and LPG  distribution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;a href="http://www.thehindubusinessline.com/blink/cover/nandan-nilekani-demonising-of-aadhaar-is-irresponsible/article9608232.ece" target="_blank"&gt;Nilekani, in an interview to BLink&lt;/a&gt;,  insisted that the Aadhaar has more privacy regulations than any other  service in the world. He also pointed out that all election commission  data is already online, and anyone can look up any voter’s name, date of  birth, gender and address.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Additionally, social media profiles too are shared publicly of our own volition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Concurring with this view, Chakravarty says, “It is surprising that  we’re perfectly okay with giving all our life information to a  32-year-old named Mark Zuckerberg. However, this is voluntary. Whether  we fully know consequences or not is another matter altogether.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With the Finance Bill requiring all PAN cards to be linked to Aadhaar,  there is added concern over privacy. Sunil Abraham, founder of the  Centre for Internet and Society, says Aadhaar runs the risk of being  used fraudulently. “If I want to get you in trouble, I can make a large  purchase of gold against your Aadhaar number, which is linked to your  PAN,” he explains.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He advocates for a system where different government departments don’t  store Aadhaar numbers in their databases but instead use a token issued  by UIADI kiosks. This would prevent proliferation of the number.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Technical glitches&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In February this year, Modi claimed in the Lok Sabha that plugging  leakages through Aadhaar had saved the government ₹14,000 crore. And  that nearly four crore fake ration cards have been seized till date.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One method of establishing a fake ration card is if the owner has not  availed himself of his ration. Ever since Aadhaar’s biometric  identification has been linked to point-of-sale (POS) machines at ration  shops, residents have had to queue up with a prayer on their lips. A  lot could go wrong — the biometric might not recognise them or, worse,  there could be a network failure, forcing everyone to return home  empty-handed. In both instances, while ration shop owners should ideally  mark such transactions under ‘Transactions with “N” response from  Aadhaar’, they invariably mark them under “Household yet to take  ration”, implying that the beneficiary has chosen not to take home her  share.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The February 2017 data for 22 ration shops across Delhi, accessed on the  Department of Food &amp;amp; Supplies website, shows that none have a  single beneficiary marked under “N”. At a Delhi Cantonment outlet, of  the 1,038 registered beneficiaries only 168 have been marked “Y”, or  ‘Yes’, showing they have taken their rations. Another 871 have been  marked “Household yet to take ration” and none have been marked ‘N’ to  indicate glitches in the Aadhaar authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As Amrita Johri of citizens’ action group Satark Nagrik Sangathan  explains, “Aadhaar relies on internet and electricity. This might seem  like a problem only of rural areas. But we don’t have to go far. In  South Delhi’s East Mehraam Nagar, there is a ration shop with no mobile  signal and no network. Officials said we have to show that Aadhaar is a  success, so the shop’s POS machine was finally hung on a jamun tree to  get it to work.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;She questions the government’s reluctance to acknowledge the many instances of failure in the project.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Frighteningly, three consecutive failed attempts could lead to the card  being placed in an abeyance list and possibly invalidated.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Top performers and laggards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Delhi is rated one of the better performing States/union territories,  while Rajasthan has one of the worst records with the maximum number of  biometric and network failures.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to the government’s 2017 monthly estimates, 27 per cent of the  residents whose Aadhaar cards have been seeded to the PDS were denied  rations owing to biometric or network failure. This figure would be  higher if the unseeded cards are also taken into account.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nikhil Dey, founder of Rajasthan’s Mazdoor Kisan Shakti Sangathan (MKSS)  says his organisation is fighting with its back against a wall.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Nearly 73 lakh households get their monthly rations in this State,  where a little over a crore households are eligible to receive them.  We’re not even talking about exclusions here,” says Dey. Besides network  failure, there are many instances of the old and sick who are unable to  visit the shop to physically verify themselves.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Back-up options such as OTP (one-time password) or facial recognition  only work in theory,” says Dey. He alleges that shop owners often fudge  the OTP system by punching in their own numbers and stealing the quotas  of genuine beneficiaries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He too believes that several names have been struck off as dead to  project that the Aadhaar has weeded out a high number of fake social  security pension ers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Nilekani applauds Andhra Pradesh for its progress in the Aadhaar project  by investing in infrastructure to eliminate technical glitches. J  Satyanarayana, the UIDAI’s part-time chairperson, told BLink in an email  interview that Aadhaar has led to transparency and efficiency in nearly  all government schemes in AP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;During March 2017, 42.29 lakh (93.02 per cent) pensioners received their  payment through Aadhaar-based biometric authentication, he says, adding  that real-time monitoring systems are in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The entire PDS (rations) is linked to Aadhaar,” he says. As many as  1.21 crore (87.39 per cent) card holders collected their ration this  month, and 95.94 lakh received wages (totalling ₹5,283 crore under  MNREGA through Aadhaar-enabled systems, he informs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neighbouring Telangana too is known for its 99 per cent Aadhaar  enrollment, leading to an impressive 80 per cent of its population  accessing the PDS.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;BP Acharya, special chief secretary in Telangana’s planning department  says, “Aadhaar’s use can perhaps be most seen in Telangana’s speedy  clearances, investment promotion, creating licences and clearances for  shops and establishments.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Telangana took the Aadhaar database project one step further through its  Citizen 360 programme. In August 2014, months after the State was newly  formed, it conducted one of the largest household surveys in a single  day, covering one crore households. This data was integrated with the  Aadhaar database and now links different benefits on the same platform.  Now the Aadhaar identity is linked to other details such as the holder’s  driving licence and even crime record.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The UIDAI holds out AP and Telangana as shining examples of Aadhaar’s  efficiency when backed by the right network and infrastructure. But for  the lakhs of biometric factory rejects who are denied their rights,  Aadhaar can only mean a mass experiment gone horribly wrong.&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="body"&gt;&lt;b&gt;&lt;i&gt;Aadhaar Timeline&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2006&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ministry of communications and information technology approves the  ‘Unique ID for Below Poverty Line (BPL) families’ project under the  chairmanship of Arvind Virmani, then principal advisor, Planning  Commission&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2008&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Empowered group of ministers formed by former Prime Minister Manmohan  Singh decides to collate two schemes — the National Population Register  under the Citizenship Act, 1955 and the UID project — to conceive  Aadhaar.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2009&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Planning Commission issues a notification to constitute the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government appoints Infosys co-founder Nandan Nilekani as the first  chairman of UIDAI, with the rank and status of a cabinet minister.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Former Karnataka high court judge justice K Puttaswamy files a public  interest litigation before the Supreme Court (SC) declaring that Aadhaar  violates an individual’s right to privacy and that the scheme lacks  legislative backing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2014&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In an interim order, the SC restrains the UIDAI from transferring  biometric information with an Aadhaar number to any other agency without  the individual’s consent in writing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2015&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Three-judge bench of the apex court rules the unique identity number is  not mandatory to avail of benefits from government programmes,  restricting the use of Aadhaar to beneficiaries of the public  distribution system and subsidies on cooking gas and kerosene, and  refers the question on privacy to a larger constitution bench.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Centre moves SC seeking a review and modification of the August 11  interim order. A five-judge constitution bench modifies the same and  extends the use of Aadhaar to Mahatma Gandhi National Rural Employment  Guarantee Scheme, Jan Dhan Yojana, pensions and the Employees’ Provident  Fund scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2016&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Finance minister Arun Jaitley announces in the budget speech that the  government will offer statutory backing for Aadhaar. The Lok Sabha  passes the Aadhaar (Targeted Delivery of Financial and Other Subsidies,  Benefits and Services) Bill, 2016 as a Money Bill, rejecting Rajya Sabha  recommendations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2017&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar is made mandatory for three dozen schemes with 84 more expected  under direct benefit transfers, including midday meal scheme and  universal education.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC again rules that Aadhaar cannot be made mandatory for welfare schemes.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things'&gt;http://editors.cis-india.org/internet-governance/news/hindu-businessline-shriya-mohan-the-aadhaar-of-all-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-03T15:46:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/ept-award-for-individuals-in-developing-countries-working-for-open-access">
    <title>The 2013 EPT Award for Individuals in Developing Countries Working for Open Access</title>
    <link>http://editors.cis-india.org/news/ept-award-for-individuals-in-developing-countries-working-for-open-access</link>
    <description>
        &lt;b&gt;Below is the press release announcing the 3rd Annual Award for individuals in the developing world who have made a significant contribution to Open Access. The application form for nominations follows the announcement. The EPT hopes to receive a similarly large number of representations as were received for the award in its first two years.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;Please send your proposal by 30/11/2013 to: EPT Chair, Derek Law&lt;/i&gt;, at &lt;a class="mail-link" href="mailto:d.law@strath.ac.uk"&gt;d.law@strath.ac.uk&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Open Access Week arrives again this October, and is a time to celebrate all that has been achieved in the previous twelve months. The Electronic Publishing Trust is a long standing advocate of OA and the difference it can make. As our contribution to this year’s OA Week, we are offering our third annual international award to recognise the impact that individuals can make. The huge interest in and success of the first two awards makes it clear that such international recognition acknowledges the very real efforts being made by many individuals throughout the world, and accelerates the development of models for achieving the open and free transfer of essential information for the progress of research.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Announcement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Electronic Publishing Trust&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; is pleased to announce that it is offering its third annual award for individuals in developing and transition countries&lt;a href="#fn**" name="fr**"&gt;[**]&lt;/a&gt; who have made significant advances to the cause of open access and the free exchange of research findings. Information on previous winners can be found on our website at http://epublishingtrust.net/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nominations are sought for the award. Individuals may be nominated by themselves or others or by organisations, sending a statement using the attached form to the chair of the EPT Board, (d.law@strath.ac.uk) outlining the achievements of the individual. Please find the nominations form below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nominations should be received by 30th November 2013. Selection of a winner will be made by a panel of EPT Board Members which will be chaired by Dr Patrick Corran, and will include Leslie Chan, Subbiah Arunachalam,  Barbara Kirsop, co-founder of the charity, and Judy Ugonna.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The result will be announced in January 2014 and it is intended that a presentation will be made at a location convenient to the winner. The award recipient will be publicly recognised through the presentation of a certificate and an engraved award. It is also hoped to have a “side” event at future OA meetings to celebrate the work of the winner.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;EPT Award submission form for nominations&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;The EPT Award is for individuals who have made an impact on the progress of open access to research findings.&lt;/li&gt;
&lt;li&gt;Nominations may be made by individuals or organisations.&lt;/li&gt;
&lt;li&gt;Please supply the following information:&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;Name of nominee:&lt;/li&gt;
&lt;li&gt;Affiliation of nominee:&lt;/li&gt;
&lt;li&gt;Position or role of nominee:&lt;/li&gt;
&lt;li&gt;Contact address and email of nominee:&lt;/li&gt;
&lt;li&gt;Contact address and email of proposer:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please provide a brief statement to describe the ACTIVITIES of the nominee in support of Open Access (no more than 250 words).&lt;/p&gt;
&lt;p&gt;Please describe the RESULTS  AND SIGNIFICANCE of these activities (not more than 500 words).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. The Electronic Publishing Trust for Development (EPT) was established in 1996 to facilitate open access to the world’s scholarly literature and to support the electronic publication of reviewed bioscience journals from countries experiencing difficulties with traditional publication.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr**" name="fn**"&gt;**&lt;/a&gt;]. As defined by the UN at &lt;a class="external-link" href="http://unstats.un.org/unsd/methods/m49/m49regin.htm#transition"&gt;http://unstats.un.org/unsd/methods/m49/m49regin.htm#transition&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/ept-award-for-individuals-in-developing-countries-working-for-open-access'&gt;http://editors.cis-india.org/news/ept-award-for-individuals-in-developing-countries-working-for-open-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-10-29T07:30:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum">
    <title>The 12-digit conundrum</title>
    <link>http://editors.cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum</link>
    <description>
        &lt;b&gt;Even as the Centre plans to link as many as 500 schemes to Aadhaar, concerns over data safety are rising. Richa Mishra reports.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Richa Mishra was published in the       &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece"&gt;Hindu         Businessline&lt;/a&gt; on March 13, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The developments of last few weeks       seem to have made real some of the worst fears about Aadhaar. In       February, UIDAI (Unique Identification Authority of India) filed a       police complaint alleging attempts of unauthorised authentication       and impersonation of data related to Aadhaar. Since then, each and       every machinery within the government has been trying to convince       otherwise, that Aadhaar database is safe and secure, and that the       data is protected both by the best available advanced technology       as well as by the stringent legal provisions in the Aadhaar Act.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Not everyone is convinced. Critics       say, biometrics only make the citizen transparent to the State, it       does not make the State transparent to citizens. “We warned the       government six years ago, but they ignored us,” said Sunil       Abraham, Executive Director of Bengaluru-based research       organisation, Centre for Internet and Society. According to him,       the legislation implementing Aadhaar has almost no data protection       guarantees for citizens. He also believes that by opting for       biometrics instead of smart cards the government is using       surveillance technology instead of e-governance technology.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Biometrics is remote, covert and       non-consensual identification technology. It is totally       inappropriate for authentication. This has only increased the       fragility of Indian cyber security,” he stresses.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, officials associated with       UIDAI dismiss these arguments. Collecting biometrics does not pose       any threat to the right to privacy because people have been giving       their thumb impression for ages, they say. “The biometrics are       encrypted at source and kept safe and secure. Unauthorised sharing       and leakage of the data does not happen. Fears related to       collection of biometrics are not justified,” an official at the       helm of affairs said. He requested anonymity.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“However, as and when we find that       some suspicious activity or misuse is happening, we will strike at       the very beginning itself. UIDAI has full authentication       regulation under the Aadhaar Act that has to be followed. It       specifies in what manner authorities can use Aadhaar,” the       official pointed out.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;On the ground&lt;/b&gt;&lt;/div&gt;
&lt;p class="body" style="text-align: justify; "&gt;Even as the debate over data       security rages, the &lt;i&gt;aam aadmi &lt;/i&gt; seem to be little       perturbed about the alleged risks involved. For Padmini, who works       as a domestic help in East Delhi and is the sole bread earner for       her family of four, the Aadhaar card meant access to all       government benefits.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“&lt;i&gt;Koi farak nahi padta, kaun         dekhta hai mera card. Mujhko &lt;/i&gt;LPG cylinder &lt;i&gt;ka paisa bank         mein mil jata hai,”&lt;/i&gt; (It doesn’t matter to me who sees my       card. The subsidy for LPG gets transferred to my account) she       says. “&lt;i&gt;Baccho ke school admission mein bhi zaroorat pada,&lt;/i&gt;”       (I needed it to get my children’s admission in school), she added.       Sukh, a cab driver also uses it to get the LPG subsidy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While everyone &lt;i&gt;BusinessLine &lt;/i&gt;talked       to were convinced that Aadhaar was not a citizenship card, the       more aware ones saw it as a door that gave access to government       schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While they had a point, government       officials are careful to make it clear that Aadhaar is not       mandatory. But the popular perception increasingly points to the       opposite view, especially after it emerged that Aadhaar might be       made mandatory for children to receive midday meals at schools.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Another senior government official       said, “Aadhaar is not mandatory under any welfare scheme of the       government and no one is being deprived of a service or benefit       for the want of Aadhaar…it’s required for availing a       service/subsidy/benefit that accrues through the Consolidated Fund       of India.” He added that those who do not have the 12-digit number       would be provided with the facility to enrol by the Requiring       Agency. “And till the time Aadhaar is assigned, alternative IDs       would be allowed,” he said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If a school which has to get Aadhaar       enrolment done for its students puts the Aadhaar numbers of its       students on its site and the same is used by someone, you can’t       blame us, the official argues. Then, who is accountable?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Pushing for Aadhaar, the UIDAI       officials cite the example of Kerala’s Department of General       Education (DGE), which has integrated Aadhaar with the student       databases and has thereby optimised the teacher-student ratio and       identified the schools with excess teachers. In a single academic       year, 3,892 excess teacher posts were identified.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Due to this exercise,       no new posts have been sanctioned for the last two years,       resulting in notional savings of ₹540 crore per annum,” said a       UIDAI official. After student enrolment in the state was linked to       Aadhaar since 2012-2013, the head count of pupils have fallen by 5       lakh. Similar trends have been reported in Haryana. Critics have       also pointed out the possible security risk in using AadhaarPay,       the Andriod-based app. Merchants can download the app in their       phone and install a fingerprint scanner linked to the phone.       Customers with Aadhaar numbers can use their fingerprints (like       the secret PIN in case of debit cards) to do a transaction. While       doubts have been raised about the safety of fingerprint data,       officials in the know blame the controversy on the “card lobbies.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Thirty crore Indians have no       mobiles. They find it difficult to handle password, pin or card,       this is where AadhaarPay will come handy,” the official added.       “They don’t need a smart phone or feature phone. They don’t need a       debit card.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;“Today more than 112       crore people have the Aadhaar card. Approximately, 52.95 crore       people have linked their Aadhaar numbers to their bank accounts.       We already have a system of Aadhaar authentication in place,” the       official added.&lt;/p&gt;
&lt;p class="_hoverrDone body" style="text-align: justify; "&gt;Government officials are       at pain to point out the larger benefits of Aadhaar, including       savings of more than ₹49,000 crore by plugging leakages in       government schemes like PDS. Government plans to increase the       number of welfare schemes linked to Aadhaar from 36 to over 500.       While the intent is good, concerns remain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum'&gt;http://editors.cis-india.org/internet-governance/news/richa-mishra-hindu-businessline-march-13-2017-the-12-digit-conundrum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-14T13:50:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report">
    <title>The 2nd IJLT-CIS Lecture Series — A Post-event Report</title>
    <link>http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology (IJLT) and the Centre for Internet and Society (CIS), organised the 2nd IJLT-CIS Lecture Series on the 21st and 22nd of May 2011 at the National Law School of India University, Nagarbhavi, Bangalore. The main theme for this year was Emerging Issues in Privacy Law: Law, Policy and Practice.&lt;/b&gt;
        
&lt;h3&gt;Speakers and Topics&lt;/h3&gt;
&lt;p&gt;Spread over two days, the National Law School hosted six speakers who held forth on the different aspects of privacy law, speaking from perspectives that were grounded in theory and actual practice and some that were India-centric while others applied equally to any jurisdiction.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Vivek Durai&lt;/strong&gt;, Partner, Atman Law Partners, addressed the gathering and gave the general introduction to the need for a discussion relating to privacy and the law. He spoke of technology and certain current events, including technological advances, have made privacy an issue with which serious engagement of the law has become imperative. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Usha Ramanathan&lt;/strong&gt;, an independent law researcher, spoke of the Unique Identity Project (Aadhar) launched by the Government of India and its implications on the privacy and data relating to the citizens. Ms. Ramanathan was critical of the Government’s plans on the basis that an ill-planned and executed project that sought to collect data such as this could provide easy fodder for data-mining. The latest 2011 rules that outline the relationship between the citizen and the state and the extent of privacy the citizen has in respect of this relationship.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hamish Fraser&lt;/strong&gt;, a leading Australian practitioner in the field of technology law, addressed the gathering via video conference and spoke about cloud computing and privacy of parties using such facilities. He highlighted how technology such as cloud computing where the storage of data is almost fully virtual, with only the weakest of links to any physical storage space, were being increasingly widely used. He helped provide a practitioners perspective to the lecture as well by discussing how companies and individuals seeking to utilise cloud computing facilities, particularly for business purposes, must check for some essential legal provisions that would allow them to retain control over their data and prevent their data from being misappropriated by the provider of the virtual storage space in the cloud. He briefly also discussed the draft Australian privacy legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sean Blagsvedt&lt;/strong&gt;, founder of Baba Jobs, discussed the interplay between privacy and transparency and argued convincingly that under certain circumstances, transparency holds greater value than blind protection of privacy. He spoke of his experience in setting up Baba Jobs that seeks to act as a job portal-cum-social networking site for persons providing essential services such as plumbers, electricians, carpenters, house painters, etc. Rather than seeking to strictly protect the details and identity of these persons, Blagsvedt found that one of the most important factors for future employers while considering hiring such service personnel were the details of their previous assignments and testimonials from previous employers – the transparency that Baba Jobs offered became its USP. Blagsvedt talked of how a misplaced over-emphasis on privacy could often lead to greater detriments than benefits and prevent trust due to a lack of information. He concluded by predicting that as people increasingly shifted social and commercial transactions to the online world, the demands for privacy online would soon be offset by demands for greater transparency. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sudhir Krishnaswamy&lt;/strong&gt;, Professor of Law at the Azim Premji University, Bangalore delivered a lecture on the state and privacy in India illustrating the development of the law on the matter. He also discussed about the balance that needs to be struck between the individual’s requirement for privacy and the state’s desire for secrecy. He also spoke about two manners in which to conceptualise privacy — recognising privacy as an inherent right that may be at times restricted to a certain extent, vis-a-vis seeing privacy as a right that the state grants to a citizen.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abhayraj Naik&lt;/strong&gt;, Assistant Professor, Jindal Global Law School, Sonepat, gave a lecture on informational privacy in comparative contexts. The discussion centred on information surveillance in different jurisdictions and how the values attached to the attribution of information reflects in the laws relating to privacy in those different jurisdictions. His approach included mathematical modelling of information attribution and provided an interdisciplinary approach.&lt;/p&gt;
&lt;h3&gt;Participation&lt;/h3&gt;
&lt;p&gt;The lecture series saw registration from over 50 people, including students from law schools all over the country, practitioners, and even educators. Since the lectures were streamed live online, and this was only the second event in NLS to use this facility apart from the Annual Convocation, many more people listened to the lectures online. The lectures were available online for a period of one week after the conclusion of the lecture series.&lt;/p&gt;
&lt;h2&gt;IJLT-CIS Lecture Series 2011 Registration&lt;/h2&gt;
&lt;p&gt;The following people participated in the event:&lt;/p&gt;
&lt;p&gt;Adithya Banavar, Akanksha Arora, Anand VJ, Aniket Singhania, Ankit 
Verma, Anupama Kumar, Aparna Gokhale, Arjun Krishnamoorthy, Arjun 
Sharma, Arun Menon, Asif Ayaz, B. N. Vivek, Batool, Chirag Tanna, 
Deepakar Livingston.P., Deepthi R, Dheer Bhatnagar, Dinesh Subramany, 
Esha Goel, Gopalakrishnan R., J Suresh, Jamshed Ansari, Kanti Jadia, 
Khadeeja Nadeem, Khumtiya Debbarma, Mani Bhushan, Manish, Nayan Jain, 
Neha Baglani, Panduranga Acharya, Partha Chakravarty, Parul Bali, 
Prashanth Ramdas, Prateek Rath, Preyanka Sapru, Prianca Ravichander, 
Priytosh Singh, Purushotham.G, Ralph A, Ruhi Chanda, S. Badrinath, S. 
Bhushan, S. K. Mohanty, Sahana Manjesh, Sanjana Chappalli, Santosh 
Dindima, Shalini Iyengar, Shalini S, Sibani Saxena, Spoorthy M. S., 
Tarang Shashishekar, Tarun Kovvali, Tejaswini Rajkumar, Vaishali Kant, 
and Y. Shiva Santosh Kumar.&lt;/p&gt;
&lt;p&gt;See the &lt;a href="http://editors.cis-india.org/internet-governance/letter-of-agreement.pdf" class="internal-link" title="Letter of Agreement"&gt;Letter of Agreement&lt;/a&gt; [PDF, 1 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report'&gt;http://editors.cis-india.org/internet-governance/ijlt-cis-lecture-series-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-17T10:25:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors">
    <title>Thank You To Our 2014 Sponsors</title>
    <link>http://editors.cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors</link>
    <description>
        &lt;b&gt;Today’s the last day of work in 2014 for the editorial team at MediaNama, though we’ll run a Holiday Wire update intermittently this week, we’ll have a brief year end review for each major segment. Thank you for reading us in 2014, and have a great Christmas and New Year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was &lt;a class="external-link" href="http://www.medianama.com/2014/12/223-thank-you-to-our-2014-sponsors-spice-digital-antfarm-astro-vision-bruceclay-buongiorno-ccavenue-cis-e2e-fortumo-getit-google-india-com-info-edge-onmobile-qualcomm-times-internet/"&gt;published in Medianama&lt;/a&gt; on December 22, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From the business side, it’s been a great 2015 for us, and we really  appreciate the support we received in 2014 from all our sponsors,  especially Spice Digital, our annual sponsor, and Antfarm,  which supported us for almost the entire year. We’re still working, for  an idea of our 2015 plans and editorial calendar, please see the  presentation &lt;a href="http://www.medianama.com/advertise/" target="_blank" title="advertise on medianama"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Sponsor:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/2011/08/223-thank-you-sponsors-one97-spice-digital/spice-logo-3/" rel="attachment wp-att-34993"&gt;&lt;/a&gt;-&lt;a href="http://www.spicedigital.in/" title="Spice Digital "&gt; Spice Digital Ltd&lt;/a&gt;:  a part of Spice Global Group – US$2 Billion conglomerate promoted by  Dr. BK Modi, is one of India’s leading Mobile Value Added Services  company and offers innovative solutions for Telecom Operators,  Enterprises and Government using mobile connectivity media – Voice, SMS,  USSD, WAP &amp;amp; 3G. We are preferred partner of all major telecom  service providers in India and providing services to international  telecom players in over 20 countries across the globe. We are pioneers  in innovation and technology and committed to deliver excellent Award  winning products and services to the customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have exclusive tie-ups with Hungama and PPL for music streaming services.&lt;br /&gt; We have acquired two leading international VAS players, MMS (Indonesia) and Beoworld (Malaysia).&lt;br /&gt; Recently, we had a major financial investment from MediaTek (Taiwan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our sponsors during 2014:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://antfarm.in/" title="Antfarm"&gt;Antfarm&lt;/a&gt; is  an innovation sandbox based out of Mumbai. It is led by a team of blue  sky thinkers, entrepreneurs and professionals. The company takes great  ideas with disruptive potential, puts together all the key ingredients  of people, technology, strategy, marketing and capital to build these  into scalable companies. The ultimate aim is to create global businesses  that are ideated and built out of India. The first set of companies  launched are &lt;a href="http://stylista.com/"&gt;Stylista.com&lt;/a&gt;, &lt;a href="http://arrive.com/signin"&gt;Arrive.com&lt;/a&gt;, Fork Media, and the farm is currently scaling up ideas in education, travel &amp;amp; leisure, retail, ad-tech and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.clickastro.com/"&gt;Astro-Vision&lt;/a&gt; is a name easily recognized and held in great esteem in the world of  astrology services. Its products range from software that run on the  latest operating systems to web based solutions for major portals and  the latest range of mobile phones. Astro-Vision’s focus has always been  on providing innovative astrology solutions using the latest  technologies in the field of IT and communications. From Desktop PCs to  internet portals and mobiles phones, Astro- Vision’s range of solutions  includes stand alone applications, online apps and astro content  services. The company has strategic tie-ups with major IT enabled  service networks like Suvidhaa, Reliance world, One stop shop and many  networks under the Government of India’s CSC scheme, including Spanco  and GNG. Many popular Indian websites today are powered by  Astro-Vision’s web based astrology solutions and astrology content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.bruceclay.com/in/" title="Bruceclay"&gt;Bruce Clay&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.buongiorno.com/" title="Buongiorno"&gt;Buongiorno&lt;/a&gt;, founded  in 1999, is known in the worldwide mobile commerce ecosystem for  developing and managing paid apps and content that help consumers get  greater enjoyment from mobile devices. On July 2012, after the  settlement of a successful public tender offer, Buongiorno became a  wholly-owned subsidiary of NTT DOCOMO – a global leader in mobile  telecommunications technologies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With direct connections to more than 130 telecom operators in 25  countries, over 10 years’ experience and a team of 600 professionals,  Buongiorno makes the mobile internet experience happen for consumers  globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/wp-content/uploads/ccavenue_highres.jpg"&gt;&lt;/a&gt;- &lt;a href="http://www.ccavenue.com/" title="CCAvenue"&gt;CCAvenue&lt;/a&gt; is India’s largest payment gateway solution powering 85% of the  eMerchants in India across all verticals &amp;amp; has played the role of a  catalyst to the growth of ecommerce with real time, multi-currency,  multiple payment options online payment processing services. The  solution is powered by proprietary technology that integrates  transaction-processing, advance shopping cart, Invoicing, mobile page,  risk assessment and fraud control, smart analytical dashboards, live  monitoring of bank gateways, financial reporting etc. CCAvenue is the  only complete PG solution in the country that has the unique ability to  offer the full spectrum of 100+ Internet payment options.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;5 Credit Cards&lt;/li&gt;
&lt;li&gt;50 Debit Cards&lt;/li&gt;
&lt;li&gt;6 ATM cum Debit Cards&lt;/li&gt;
&lt;li&gt;50+ Netbankings&lt;/li&gt;
&lt;li&gt;Mobile Payments&lt;/li&gt;
&lt;li&gt;4 Cash Cards&lt;/li&gt;
&lt;li&gt;CCAvenue PhonePay IVRS Based Payment Systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; (CIS)  is a non-profit research organization that works on policy issues  relating to freedom of expression, privacy, accessibility for persons  with disabilities, access to knowledge and IPR reform, and openness  (including open government data, free/open source software, open  standards, open access to scholarly literature, open educational  resources, and open video), and engages in academic research on digital  natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS critically engages with concerns of &lt;a href="http://cis-india.org/about/substantive-areas/digital-pluralism" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="http://cis-india.org/about/substantive-areas/public-accountability"&gt;public accountability&lt;/a&gt; and &lt;a href="http://cis-india.org/publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hosting and Support&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.e2enetworks.com" rel="nofollow" title="E2E Networks"&gt;E2E Networks&lt;/a&gt;:  India’s most clued in dedicated hosting company founded by geeks. E2E  Networks Private Limited has been into the business of providing Low  latency Dedicated Servers and VPS Servers in India since 2009. E2E  Networks goes way beyond merely provisioning servers/cloud  infrastructure. Our expertise includes strategies and managed services  help for implementing the most suitable cloud architecture based on  public, private or hybrid cloud platforms for your web facing or  enterprise applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://fortumo.com/" title="Fortumo"&gt;Fortumo&lt;/a&gt; allows any developer to set up payment processing for web and mobile  services, games or apps using carrier billing. Payments work for PC  applications, web services and HTML5, Android, Windows Phone &amp;amp;  Windows 8 apps. Fortumo supports payments in 81 countries through 300  mobile operators. Get started with our self-service setup (no monthly  fees or minimum volume commitments) at &lt;a href="http://fortumo.com/"&gt;http://fortumo.com&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.freeads.in/" title="FreeAds"&gt;Getit Infomedia&lt;/a&gt; is India’s digital supermarket for SMEs  to get relevant business leads. We seamlessly deliver excellent value  across all media platforms be it Voice, Mobile Applications, Online,  WAP, Web chat, Print etc. The services provide presence, enquiries and  leads to its advertisers while ensuring end users (consumers) have  access to the best information, benefits and offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Sponsor&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.google.com" title="Google"&gt;Google&lt;/a&gt; is a global technology leader focused on improving the ways people  connect with information. Google’s innovations in web search and  advertising have made its website a top internet property and its brand  one of the most recognized in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.india.com/" title="India.com"&gt;India.com&lt;/a&gt; is a joint venture between two media giants – Zee Entertainment Enterprise Ltd (ZEEL) and www.&lt;a href="http://pmc.india.com/"&gt;PMC.com&lt;/a&gt; is  all about the new India that is funny, witty, shocking. It shows the  new age Indian in their language. India.com provides a perspective that  is reflective of the changing dynamic of the role media plays in India.  Find out what the new India is saying only at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;. Discover India and Indians at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt; for  no one covers the new India as &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;! Get the latest updates follow @indiacom on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.infoedge.in/"&gt;Info Edge (India) Limited&lt;/a&gt; is among the leading internet companies in India. Info Edge runs leading  internet businesses – Naukri.com -India’s no. 1 job site,  Jeevansathi.com – one of the leading matrimonial portal,99acres.com –  India’s No.1 real estate portal and Shiksha.com – India’s leading  education portal. The company also owns Quadrangle – an offline  executive search business, and Naukri Gulf (a leading jobsite in the  Middle East market). Info Edge also owns Brijj.com, a professional  networking site and Allcheckdeals.com, an online real estate brokerage  firm which is run as a subsidiary company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.onmobile.com/"&gt;OnMobile Global Ltd&lt;/a&gt;.  is a pioneer in white-labelled, Value Added Products and Services [VAS]  for mobile, landline and media service providers. The #1 VAS specialist  in emerging and high-growth markets, OnMobile touches the lives of over  1500 million mobile users across 55 countries each month. With our  diverse product portfolio of Mobile Music, multi-screen Video Gateway  and delivery solutions, Phone Backup and Personal Cloud Management  solutions, Voice and Video portals, M-Commerce products and services, we  generate 2 – 5% contribution for top customers and top line revenues of  over US $800 million for over 92 customers globally. We deliver our  products by the best combination of a hosted Cloud with on-site  operations at the customer premises or through products deployed in  customer networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Founded in 2000, OnMobile has business spread across India, U.S.,  LATAM, Africa, Australia, Middle East and Europe. The company was  publicly listed in India in 2008. Recent acquisitions include Voxmobili  (2007), Telisma (2008), Dilithium Networks (2010) and LiveWire (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OnMobile is the first Indian telecom VAS Company to go public. The  company’s shares are listed on the Bombay Stock Exchange (BSE) and the  National Stock Exchange (NSE) as on March 31, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://qualcommventures.com/" title="Qualcomm Ventures"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.qualcommventures.com/" title="Qualcomm Ventures"&gt;Qualcomm Ventures&lt;/a&gt; is the investment arm of Qualcomm Inc. (NASDAQ: QCOM), a Fortune 500  company with operations across the globe.As the Venture Capital  investment arm of Qualcomm, the world leader in next-generation mobile  technologies, Qualcomm Ventures has been making strategic investments in  early-stage technology companies since 2000. With a $500 million fund  commitment, Qualcomm Ventures seeks to make strategic investments in  early stage high-technology companies that have the potential to  dramatically transform our world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;QPRIZE (&lt;a href="http://www.qprize.com/"&gt;www.qprize.com&lt;/a&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;QPrize™ is Qualcomm Venture’s Seed investment competition. It’s  designed to provide entrepreneurs their first level of funding so they  can launch their idea into a successful start-up business. The QPRIZE  competition was first launched in 2009 to promote innovation in the  technology industry and is designed to identify the industry’s most  promising early-stage technology companies. We are looking for bright,  energetic and resourceful entrepreneurs who have a passion for bringing  new technologies and services to market. Our goal is to have QPrize act  as a catalyst for our winners, providing the initial capital to launch  their great ideas and support the company to its first institutional  funding round.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.timesinternet.in/"&gt;Times Internet (TIL)&lt;/a&gt; is a premier digital product company and the digital arm of The Times  of India Group. It reaches over 100m visitors and serves 2 billion  pageviews every month across web and mobile, with businesses across  news, entertainment, sports, local, ecommerce, classifieds, startup  investments, local partnerships, and more.TIL’s key properties in the  news category include&lt;a href="http://t.signauxtrois.com/link?url=http://timesofindia.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=9862a753-3036-4fb0-d995-d0f039be5863"&gt;timesofindia.com&lt;/a&gt;, &lt;a href="http://t.signauxtrois.com/link?url=http://economictimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=ad63a5e6-eeea-4036-a025-091733356fe5"&gt;economictimes.com&lt;/a&gt; and &lt;a href="http://t.signauxtrois.com/link?url=http://navbharattimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=deefd481-21fd-4574-f85e-bd03ecd42c23"&gt;navbharattimes.com&lt;/a&gt;.  Under its fold are topmost internet entertainment portals in India —  Gaana.com – the music broadcasting service and BoxTV.com – the video  streaming site. Indiatimes Shopping emerges as one of the top five  e-commerce companies in India &amp;amp; TimesCity, a lifestyle destination  covering recommendations across Restaurants, Movies, Events, Nightlife  in your city. Times Internet has also entered into partnerships with  global companies offering them its tremendous reach through online media  platforms under its initiative called &lt;a href="http://timesofindia.indiatimes.com/topic/TLP"&gt;Times Global Partners(TGP)&lt;/a&gt;.  The TGP portfolio ranges from licensing partnerships to investments and  acquisition. In the last year, TGP has made four acquisitions, twelve  global partnerships, four minority investments and over 20 investments  into start-ups through TLabs in the Indian ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors'&gt;http://editors.cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T14:27:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/tezpur-forwarded-response-1">
    <title>Tezpur Forwarded Response</title>
    <link>http://editors.cis-india.org/a2k/blogs/tezpur-forwarded-response-1</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/tezpur-forwarded-response-1'&gt;http://editors.cis-india.org/a2k/blogs/tezpur-forwarded-response-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-04-26T15:45:46Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/tezpur-annual-report">
    <title>Tezpur Annual Report</title>
    <link>http://editors.cis-india.org/a2k/blogs/tezpur-annual-report</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/tezpur-annual-report'&gt;http://editors.cis-india.org/a2k/blogs/tezpur-annual-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-04-26T16:05:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
