Skip to main content

Home/ Centre for Internet and Society/ Group items tagged information

Rss Feed Group items tagged

Pranesh Prakash

The IFLA Internet Manifesto - 0 views

  •  
    * Intellectual freedom is the right of every individual both to hold and express opinions and to seek and receive information; it is the basis of democracy; and it is at the core of library service. * Freedom of access to information, regardless of medium and frontiers, is a central responsibility of the library and information profession. * The provision of unhindered access to the Internet by libraries and information services supports communities and individuals to attain freedom, prosperity and development. * Barriers to the flow of information should be removed, especially those that promote inequality, poverty, and despair.
Pranesh Prakash

Panel on the Political Economy of A2K - 0 views

  •  
    "As the world economy increasingly centers on "memes, genes, and bits," new technologies permit new production models that threaten entrenched interests. As a consequence, we face a looming political battle that could reshape the information society. There are three main barriers to democratic participation in setting the rules of the information economy that bias the playing field in favor of entrenched interests and old models. The first is that the harms of bad A2K policy often take a long time to manifest themselves, making it difficult to instill a sense of urgency in the body politic and among policy elites. The current experience of "information overload" obscures increasing regulation of the use of knowledge. The second is that information policy issues tend to be highly technical and esoteric to the uninitiated, and difficult even for the initiated to analyze effectively. The third is that the promises of a world where knowledge is free as the air we breathe seems ephemeral in the face of the concrete harms claimed by those who would fence off the information commons."
Pranesh Prakash

Learning to think in a digital world - The Boston Globe - 0 views

  •  
    How many children today are becoming Socrates' nightmare, decoders of information who have neither the time nor the motivation to think beneath or beyond their googled universes? Will they become so accustomed to immediate access to escalating on-screen information that they will fail to probe beyond the information given to the deeper layers of insight, imagination, and knowledge that have led us to this stage of human thought? Or, will the new demands of information technologies to multitask, integrate, and prioritize vast amounts of information help to develop equally, if not more valuable, skills that will increase human intellectual capacities, quality of life, and collective wisdom as a species?
Pranesh Prakash

Peter Suber, Open Access News - 0 views

  •  
    In general, discussions at the conference covered four main points. The first is that official free access to law is not enough. Full free access requires a range of different providers and competitive republishing by third parties, which in turn requires an anti-monopoly policy on the part of the creator of legal information.... Second, countries must find a balance between the potential for commercial exploitation of information and the needs of the public. This is particularly relevant to open access to publicly funded research. The third point concerns effective access to, and re-usability of, legal information. Effective access requires that most governments promote the use of technologies that improve access to law, abandoning past approaches such as technical restrictions on the reuse of legal information. It is important that governments not only allow, but also help others to reproduce and re-use their legal materials, continually removing any impediments to re-publication. Finally, international cooperation is essential to providing free access to law. One week before the Florence event, the LII community participated in a meeting of experts organised by the Hague Conference on Private International Law's Permanent Bureau; a meeting entitled "Global Co-operation on the Provision of On-line Legal Information." Among other things, participants discussed how free, on-line resources can contribute to resolving trans-border disputes. At this meeting, a general consensus was reached on the need for countries to preserve their legal materials in order to make them available....
Pranesh Prakash

The Socioeconomic Effects of Public Sector Information on Digital Networks: Toward a Be... - 0 views

  •  
    "While governments throughout the world have different approaches to how they make their public sector information (PSI) available and the terms under which the information may be reused, there appears to be a broad recognition of the importance of digital networks and PSI to the economy and to society. However, despite the huge investments in PSI and the even larger estimated effects, surprisingly little is known about the costs and benefits of different information policies on the information society and the knowledge economy. By understanding the strengths and weaknesses of the current assessment methods and their underlying criteria, it should be possible to improve and apply such tools to help rationalize the policies and to clarify the role of the internet in disseminating PSI. This in turn can help promote the efficiency and effectiveness of PSI investments and management, and to improve their downstream economic and social results. The workshop that is summarized in this volume was intended to review the state of the art in assessment methods and to improve the understanding of what is known and what needs to be known about the effects of PSI activities."
Pranesh Prakash

Information Access and Transparency « Kafila - 0 views

  •  
    Zainab Bawa: "It is presumed that providing such information will encourage people to engage with the state and participate in monitoring its activities. My aim in this post is to dissect this logic somewhat further and to highlight some of the political dynamics which complicate any simple understandings of transparency and information access. I will conclude this post by making some tentative remarks on the possible ways in which information access can be configured in order to serve certain local needs."
Pranesh Prakash

Draft Rules under IT (Amendment) Act - 0 views

  •  
    The Information Technology (Amendment) Act, 2008 was passed by both the Houses of Parliament on 23.12.08. The Act was notified after the assent of the Hon'ble President on 5.2.2009. The Depertment has prepared following draft rules under the IT(Amendment) Act., 2009 : 1. Section 52 - Salary, allowances and other terms and conditions of service of Chairperson and Members. 2. Section 54 - Procedure for investigation of misbehaviour or incapacity of Chairperson and Members. 3. Section 69 - Directions for Interception, Monitoring and Decryption of Information 4. Section 69A - Blocking for public access of any information generated, transmitted, received, stored or hosted in a computer resource 5. Section 69B - Monitoring and Collecting Traffic Data or information 6. Section 70B(1) - Appoint an agency of the Government to be called the Indian Computer Emergency Response Team 7. Section 70B(5) - The manner in which the functions and duties of agency shall be performed. Your comments/feedback may be forwarded to Dr. Gulshan Rai at grai@mit.gov.in
Pranesh Prakash

GoogleSharing :: A Special Kind Of Proxy - 0 views

  •  
    "Where GoogleSharing Comes In GoogleSharing is a system that mixes the requests of many different users together, such that Google is not capable of telling what is coming from whom. GoogleSharing aims to do a few very specific things: Provide a system that will prevent Google from collecting information about you from services which don't require a login. Make this system completely transparent to the user. No special websites, no change to your work flow. Leave your non-Google traffic completely untouched, unredirected, and unaffected. The GoogleSharing system consists of a custom proxy and a Firefox Addon. The proxy works by generating a pool of GoogleSharing "identities," each of which contains a cookie issued by Google and an arbitrary User-Agent for one of several popular browsers. The Firefox Addon watches for requests to Google services from your browser, and when enabled will transparently redirect all of them (except for things like Gmail) to a GoogleSharing proxy. There your request is stripped of all identifying information and replaced with the information from a GoogleSharing identity. This "GoogleShared" request is then forwarded on to Google, and the response is proxied back to you. Your next request will get a different identity, and the one you were using before will be assigned to someone else. By "sharing" these identities, all of our traffic gets mixed together and is very difficult to analyze. The result is that you can transparently use Google search, images, maps, products, news, etc... without Google being able to track you by IP address, Cookie, or any other identifying HTTP headers. And only your Google traffic is redirected. Everything else from your browser goes directly to its destination. "
Pranesh Prakash

Pitroda now sets sights on creating public information infrastructure | ET - 0 views

  •  
    "The country's existing information framework is scattered, with each state establishing its own data centre for automating land records, transport and municipal applications, among others. The PII plans to host all software applications on a cloud (internet), increasing efficiency and speed as well as slashing costs. "Government schemes costing about Rs 130,000 crore annually exist in silos. There is no single delivery point for citizens," said a presentation highlighting the PII's need. "The PII will consolidate about 100 schemes of India, spread across 75 departments and 35 states into a single information infrastructure." Mr Pitroda said duplicity in data will thus be removed. "Each department in the country wants to make its own software, even if it does exactly the same thing," he said. "
Pranesh Prakash

LAPSI Project | Legal Aspects of Public Sector Information - 0 views

  •  
    Information generated and collected by public sector entities represents a veritable minefield; it might make a much greater contribution to EU economies and societies, if current legal barriers to access and re-use were removed. The LAPSI (Legal Aspects of Public Sector Information) project intends to build a network apt to become the main European point of reference for high-level policy discussions and strategic action on all legal issues related to the access and the re-use of the PSI namely in the digital environment. The debate is to be organized around four focal points: (1) implementation and deployment issues; (2) design of the incentives for public bodies and private players, both in the for-profit and non-profit sectors, to make available and, respectively, to re-use public data; (3) special consideration of infra- and supra-national levels of access and re-use policies and practices, intended to enlist the dynamic forces of regulatory competition and to bring out the full potential of cross-border, EU-wide services; and crucially (4) strategic vision and occasions for out-of-the box thinking for the next steps ahead in policy making.
Pranesh Prakash

541 Aruna Roy & Nikhil Dey, The redistribution of power - 0 views

  •  
    "In fact, more than combating corruption, the RTI campaign can serve as an effective tool to control the arbitrary use of power, and combat the failure of regulatory mechanisms in maintaining the rule of law. In all arenas - whether in economic policy or human rights - the need to make the matter public can act as a constraint on misgovernance. In this framework, the right to information is both a basic principle and a tool to enhance the political participation of ordinary citizens, where ethics and accountability work both ways - for the government to inform and people themselves to be more ethical in public life. By reinserting public ethics into our political discourse, it reinforces a position that no real alternative politics is possible without firmly establishing public ethics."
Pranesh Prakash

No Ban on Chinese Mobiles | PIB Press Release - 0 views

  •  
    "Telecom Regulatory Authority of India (TRAI) has not issued any orders/guidelines in respect of ban of mobiles manufactured in China and operating in the country for want of valid International Mobile Equipment Identity (IMEI) number. However, Department of Telecom (DOT) has issued instructions to Telecom Service Providers that calls from mobile handsets with any IMEI number which is not available in the latest updated IMEI database of Global System for Mobile Association (GSMA) alongwith without IMEI or all zeroes IMEI are not processed and rejected with effect from 24 Hrs. of 30th November 2009. This information was given by the Minister of State for Communications & Information Technology, Shri Sachin Pilot in written reply to a question in Rajya Sabha today. "
Pranesh Prakash

DMCA Rules Regarding Access-Control Technology Exemptions - The Library Today (Library ... - 0 views

  •  
    "The six classes of works are: (1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: (i) Educational uses by college and university professors and by college and university film and media studies students; (ii) Documentary filmmaking; (iii) Noncommercial videos (2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: (i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and (ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation
Pranesh Prakash

United States' 2010 Joint Strategic Plan on Intellectual Property Enforcement - 0 views

  •  
    The strategy contains more than thirty concrete recommendations for improvement, falling into six main categories. First, we will lead by example. Specifically, we will work to ensure that we do not mistakenly purchase or use illegal products. Second, the strategy underscores that this Administration supports transparency. That includes transparency in our development of enforcement policy, information sharing, and reporting of law enforcement activities at home and abroad. Third, we will improve coordination and thereby increase efficiency and effectiveness of law enforcement efforts at the Federal, state and local level, of personnel stationed overseas and of our international training efforts. Fourth, we will work with our trading partners and within international organizations to better enforce American intellectual property rights in the global economy. In that regard, we will initiate a comprehensive review of current efforts in support of U.S. businesses that have difficulty enforcing their intellectual property rights in overseas markets, with a particular focus on China. Fifth, we must secure our supply chain. To achieve this most important goal, we will take a close look at the unique problems posed by foreign-based websites and other entities that provide access to counterfeit or pirated products, and develop a coordinated and comprehensive plan to address them. We will make sure our law enforcement has the authority it needs to secure the supply chain and also encourage industry to work collaboratively to address unlawful activity on the internet, such as illegal downloading and illegal internet pharmacies. Sixth, and finally, we will make sure we spend your money wisely, a process we have already begun. To do that, we have, and will continue to collect and track the amount of money we spend on intellectual property enforcement per year. We will use this information to map out the most effective way to fight this theft.
Pranesh Prakash

SSRN-Reviving Telecommunications Surveillance Law by Paul Schwartz - 0 views

  •  
    Consider three questions. How would one decide if there was too much telecommunications surveillance in the United States, or too little? How would one know if law enforcement was using its surveillance capabilities in the most effective fashion? How would one assess the impact of this collection of information on civil liberties? In answering these questions, a necessary step, the logical first move, would be to examine existing data about governmental surveillance practices and their results. One would also need to examine and understand how the legal system generated these statistics about telecommunications surveillance. Ideally, the information structure would generate data sets that would allow the three questions posed above to be answered. Light might also be shed on other basic issues, such as whether or not the amount of telecommunications surveillance was increasing or decreasing.
Pranesh Prakash

Google Street View cleared of breaking Data Protection Act | Technology | guardian.co.uk - 0 views

  •  
    Google Street View, the controversial website that shows 360-degree street views of many of Britain's cities does not breach the Data Protection Act, the information commissioner ruled today. Hundreds of people complained that their privacy was breached by the service, which launched last month for 25 cities and towns. Today the Information Commissioner's Office rejected those complaints but said it would watch Google closely to ensure that it responded quickly to requests for the removal of images that identified individuals.
Pranesh Prakash

SpotlightOnSpend - Royal Borough of Windsor & Maidenhead - Overview - 0 views

  •  
    Expenditure and procurement information.
Pranesh Prakash

FT Press: Welcome to Commodity Hell: The Perils of the Copycat Economy > Faster, Bigger... - 0 views

  •  
    "First of all, keep in mind that it's not only stickers-or, for that matter, PCs and dishwashers and insurance policies and designer coffee-that become commodities. Every organization faces the challenge. IBM is discovering that even its traditional discrete consulting services are slowly becoming commoditized, a term IBM itself uses. Companies like Wipro-based in Bangalore, India-are replicating some of IBM's consultative offerings at much lower prices, which is why, to IBM's chagrin, companies like Louis Vuitton and Target are turning to Wipro for basic information technology and data-management expertise."
Pranesh Prakash

Confidentiality - American FactFinder - 0 views

  •  
    "The Census Bureau has modified or suppressed some data on this site to protect confidentiality. Title 13 United States Code, Section 9, prohibits the Census Bureau from publishing results in which an individual's or business' data can be identified. The Census Bureau's internal Disclosure Review Board sets the confidentiality rules for all data releases. A checklist approach is used to ensure that all potential risks to the confidentiality of the data are considered and addressed. For more information on how the Census Bureau protects the confidentiality of data, please explore the following links."
1 - 20 of 37 Next ›
Showing 20 items per page