“Balancing Growth and Bias: Most Indian Firms Concerned About AI Integrity”

“Explore India’s pivotal role in AI governance, addressing data bias, and fostering equitable advancements. Learn how businesses can balance innovation with responsibility to drive ethical AI leadership.”

In recent years, the world has rapidly embraced AI, transforming industries and reshaping everyday experiences. As one of the fastest-growing economies, India is emerging as a global leader in technology and AI adoption. The country’s AI market is projected to reach $17 billion by 2027, with an impressive annual growth rate of 25-30%. While many organizations view AI as a reliable driver of growth at both individual and organizational levels, others struggle with the challenges it poses, particularly data bias. A recent report suggested that 69% of the Indian companies are concerned about data bias while 55% trusting AI/ML and trying to increase their reliability on the AI market.

technology, business, analysis

Data bias is a significant challenge in any system, but in AI, it demands even greater attention and action. When data used in AI systems is biased, it results in outputs that are skewed, discriminatory, or misinterpreted—particularly in critical domains such as finance, healthcare, and recruitment. The impact of AI bias extends beyond technical issues, influencing societal concerns like gender inequality. In response to this challenge, India has partnered with NITI Aayog to address these biases and promote the development of responsible AI. However, the real test lies in how effectively organizations implement these guidelines to ensure fair and ethical AI practices.

Responsible AI practises

The responsibility for addressing AI bias largely rests with companies rather than individual users. Organizations must take proactive steps, such as investing in ethical and robust frameworks, and training data scientists to understand ethical considerations and mitigate risks associated with AI. Collaboration with stakeholders—including academia and industry peers—is crucial to staying informed about best practices and advancements in the field.

India’s NITI Aayog has outlined guidelines for responsible AI, emphasizing integrity, security, inclusivity, and alignment with international standards like the European GDPR (General Data Protection Regulation). Beyond adhering to these guidelines, companies must recognize the unique dynamics of the Indian market, balancing local and international standards to create equitable and trustworthy AI systems that not only meet requirements but also foster customer confidence.

Learning from other International Regulations

Addressing data bias transparently and committing to responsible AI practices are crucial for building public trust and confidence in technology. By 2026, Gartner predicts that 50% of global governments will mandate the implementation of responsible AI practices, reflecting the growing recognition of AI’s transformative impact and the need for ethical oversight.

In India, the regulatory landscape is evolving rapidly, with significant measures like the Digital Personal Data Protection Act (DPDP). This act underscores critical principles such as consent, accountability, and transparency in managing personal data. It aims to balance the protection of individual rights with the lawful processing needs of organizations, ensuring ethical and equitable data practices.

data, chart, graph

As these frameworks take shape, Indian organizations must not only comply with emerging regulations but also take proactive steps to integrate these values into their AI systems. This involves adopting robust mechanisms for consent management, establishing accountability measures, and maintaining transparency throughout the data lifecycle. By aligning with both domestic regulations and global standards, India can lead in fostering responsible AI development, paving the way for innovation that is both ethical and inclusive.

India’s role in shaping AI governance is pivotal, reflecting its proactive stance in past international negotiations. Much like its leadership in climate change discussions, India has the opportunity to champion equitable AI governance by advocating for inclusion and representation from the Global South. However, as the country experiences rapid AI-driven growth, it becomes imperative to address the pressing issue of data bias to ensure advancements are fair, inclusive, and beneficial for all.

To tackle these challenges, businesses must prioritize reliability checks to identify and mitigate AI data biases. They should also evaluate their AI practices to align with ethical standards and global best practices. By adopting a collaborative approach that balances innovation with responsibility, India can position itself as a global leader in AI governance, setting an example of how technology can drive progress while upholding ethical and inclusive values.

The Ongoing Debate on Multistakholderism

Last week, I had the opportunity to engage in a thought-provoking discussion about the widely debated concept of Multistakeholderism‘, a key topic within the Internet Governance community. The session, part of an ongoing program with the Internet Society, featured an open discussion where participants presented both pro and con arguments. The zoom virtual town hall format allowed for dynamic interaction between speakers and the audience, sparking insightful debates supported by facts and evidence on the strengths and challenges of the multistakeholder model.

During the discussion, I began to realize that while the multistakeholder model is often lauded for its emphasis on inclusivity, it does have its drawbacks. At its core, the model advocates for the involvement of a wide range of stakeholders—governments, private sector actors, civil society, technical experts, and others—in decision-making processes related to Internet governance. On the surface, this appears to be a democratic and inclusive approach. However, as the conversation progressed, it became clear that the model is not without its complexities. I’m reflecting on what I’ve learned personally from the discussion.

Why Multistakeholder Model?

The “multistakeholder model” is often portrayed as a single solution, but in reality, it’s not a one-size-fits-all approach. Instead, it’s a flexible framework that enables diverse individuals and organizations to come together, exchange ideas, and build consensus. It’s akin to a well-organized orchestra: while each instrument brings its own sound, they work together to create a harmonious performance. The multistakeholder approach thrives on collaboration, adaptability, and the ability to draw on various areas of expertise to address complex global issues.

For instance, consider the process of designing a public transportation system. A top-down, government-only approach might miss critical insights from local communities, engineers, and environmental experts. In contrast, a multistakeholder approach brings together city planners, citizens, transportation experts, and environmentalists to develop a system that meets the diverse needs of the population. This approach is most effective in situations where decisions affect a broad range of people, require expertise from different fields, and demand legitimacy to ensure successful implementation. Since the 2005 World Summit on the Information Society (WSIS), stakeholders have widely endorsed multistakeholderism as the preferred approach for addressing Internet governance and other complex global challenges.

Critiques of the Multistakeholder Model

The idea of “inclusivity” often implies a balance of power among all stakeholders, but in practice, this balance can be difficult to achieve. The Internet, as a global and decentralized entity, doesn’t belong to any single individual or organization, and no one stakeholder group has full control over its operation or development. However, despite the intention to ensure broad representation, certain groups—especially those with more financial, technical, or political power—can dominate discussions, potentially sidelining less powerful voices. This raises questions about the true level of inclusivity that the model offers, and whether it can truly capture the diverse interests and needs of all who are affected by the Internet, especially marginalized or underrepresented communities.

A key challenge in defining multistakeholderism is that no clear, agreed-upon definition exists for who qualifies as a “stakeholder.” While the concept suggests that anyone with an interest in an issue should have a voice, it doesn’t explain how we select stakeholders or what makes someone legitimately part of the conversation. This lack of clarity leads to different groups using various, sometimes conflicting, definitions of who counts as a stakeholder—despite the fact that the legitimacy of the entire governance process depends on this definition.

For example, in Internet governance, we could consider every user a stakeholder, but how do we actually represent these users? Additionally, one person may be seen as representing multiple identities, such as geographic region, gender, or other aspects, but does that mean they truly represent everyone within those categories? For instance, does the involvement of one woman in a multistakeholder setting truly reflect gender representation? Similarly, does having one civil society representative mean the full complexity of civil society is represented? These questions highlight the complexities and limitations of the multistakeholder model in practice.

In conclusion, while the multistakeholder model is designed to be a collaborative and inclusive framework, its implementation often requires balancing competing interests, addressing power imbalances, and ensuring that all voices are heard and valued equally. This remains a dynamic and ongoing debate that calls for continued dialogue, open forums, and active participation, particularly from younger generations. The future of multistakeholderism depends on our collective ability to engage in these discussions and work towards more inclusive, transparent, and effective governance structures.

“RBI’s Vision for Aatmanirbhar Bharat: Launching Local Cloud Services by 2025”

Addressing going concerns over data privacy and and the longstanding dominance of global IT giants in the cloud services domain, Bharat’s(India) central bank, Reserve bank of India(RBI), is reportedly gearing up to launch its own cloud services by 2025. The aim behind this excellent initiative is to enhance the country’s digital infrastructure and ensure the security of financial data as well. The project described as “first-of-its-kind initiative” objective is to decrease the reliance on the foreign cloud providers like the cloud platform will leverage solutions from domestic IT firms, offering alternatives to services like Amazon Web Services(AWS), Microsoft Azure, Google Cloud, and IBM Cloud and enhance control over critical financial infrastructure.

Indian map close-up with a flag and multiple colored pushpins.

The RBI’s public cloud service plans were first announced in December 2022. The initial development is being led by Indian Financial Technology and Allied Services (IFTAS) in collaboration with private tech companies, with consultancy firm EY appointed as an advisor.The initial funding, amounting to ₹229.74 billion ($2.72 billion), will be sourced from the central bank’s asset development fund. Over time, financial firms will be invited to invest and acquire equity in the cloud service. The RBI has restricted bidding for the project to companies incorporated in India with prior experience in developing cloud-related solutions, underscoring its focus on localizing digital infrastructure for payments and financial data storage and processing, according to the report.

The RBI’s initiative to launch its own cloud services comes with both significant opportunities and challenges, especially given the scale of providing cloud infrastructure to the world’s most populous nation.

The ‘PROS’ includes:
Enhanced Data Sovereignty:The platform would guarantee that critical financial data is stored and processed within India, minimizing the risks linked to foreign data management.

Being self-reliant: By providing a local alternative, the RBI could challenge the dominance of companies like Google, Amazon, and Microsoft in India’s financial ecosystem. Building in-house capabilities would also help mitigate the risks posed by geopolitical tensions affecting foreign tech providers.

Domestic IT Firms growth platform:The project would create opportunities for Indian IT companies, driving growth and innovation within the country.

Improved Security and Control with Innovation: A central bank-controlled platform could provide enhanced security and ensure better regulatory compliance for critical financial data. By fostering competition, this initiative could drive innovation among both domestic and global cloud service providers.

Cost Efficient: In the long term, localized cloud services could help lower operational costs for Indian financial institutions compared to using international providers.

The ‘CONS’ includes:
Major amount of Investment: The project requires a significant upfront investment, with initial funding of ₹229.74 billion ($2.72 billion).

Cloud Technology and the challenges: Building a scalable and secure cloud service that rivals the infrastructure and reliability of global giants like Amazon, Google, and Microsoft is a considerable challenge. Moreover, Indian IT firms may face difficulties in acquiring the advanced expertise necessary to manage a national-level cloud platform capable of supporting India’s expansive financial system.

Adoption Challenges and costs: Many financial institutions are already dependent on global cloud providers, which may make them hesitant to transition to a new, untested local platform. Additionally, continuous investment will be required to stay ahead in the rapidly evolving cloud technology landscape while maintaining high security and uptime standards.

Monopoly factors: The RBI-managed platform could dominate the market, potentially stifling competition and limiting innovation. This could create a centralized ecosystem where fewer players control the landscape, reducing the incentives for both domestic and global providers to innovate or offer competitive services. In the long run, this lack of competition could lead to inefficiencies and slower technological advancements.

Scalability and roll out challenge: Considering India’s vast size and diverse financial ecosystem, scaling the platform to meet the needs of the entire sector could take several years to fully achieve. The process would involve significant time and resources to ensure the platform is capable of handling the complexities of India’s financial institutions, varying regional requirements, and growing data demands. This gradual rollout could delay the widespread adoption and effectiveness of the platform, posing a challenge in meeting the rapidly evolving needs of the financial sector.

RBI’s initiative to develop a localized cloud platform offers promising benefits for data security and the growth of domestic IT, aligning with the vision of Aatmanirbhar Bharat. However, the project faces considerable challenges, particularly in terms of technical complexity, financial investment, and adoption by financial institutions. While this move can enhance self-reliance and reduce dependence on foreign providers, successfully launching such a large-scale initiative would be a monumental achievement. Yet, the obstacles it presents must not be underestimated, as it requires careful planning and execution to meet the diverse needs of India’s financial sector.

Person Using Laptop Computer during Daytime



“Balancing Screens and Minds for teens: The Challenge of Managing Social Media”

Concerns are rising over children spending too much time on social media and joining platforms at inappropriate ages. While India hasn’t addressed this issue yet, Australia is taking action by proposing a ban on social media for users under 16. This growing concern may prompt similar measures in India.

Australia is taking a bold step that few countries have dared to follow, proposing a ban on social media for those under 16. Not to be mistaken for a blanket internet restriction, this initiative specifically targets platforms like Instagram and Facebook due to their potential harmful effects on young people, including impacts on body image, social anxiety, and digital dependency. The question is whether this measure will truly “weather-proof” young Australians from these issues.

Prime Minister  Anthony Albanese stated “This one is for the mums and dads… who, like me, worry deeply about our kids’ online safety. Australian families, your government is on your side.” He also described the proposal, which is set to be introduced to parliament next week, as “world-leading” legislation to curb the “harm” social media inflicts on Australian children. While the specifics are still under discussion, it’s clear that if enacted, this legislation will have far-reaching implications, even for those young users already active on social media.

Some experts believe that banning apps like TikTok, Instagram, and Facebook only delays young people’s exposure to these platforms, rather than teaching them essential skills to safely navigate the online world. Previous efforts to restrict access, including those in the European Union, have largely been ineffective or met with pushback from tech companies. There’s also uncertainty around how such bans would be enforced, especially with the availability of tools to bypass age-verification.

In an open letter sent to the government in October, over 100 academics and 20 civil society organizations, led by the Australian Child Rights Taskforce, called on Prime Minister Albanese to prioritize “safety standards” for social media platforms instead of outright bans. They pointed to UN recommendations, which suggest that national policies should focus on providing children with safe opportunities to engage with digital spaces. At the same time, grassroots campaigners in Australia are pushing for these laws, arguing that bans are necessary to protect children from harmful content, misinformation, bullying, and other social pressures online.

Backlogs of Social Media

Facebook’s internal research, made public in 2021, revealed that Instagram was aware of its negative effects on teenage girls, especially around body image issues, self-esteem, and unrealistic standards of validation based on appearance. Studies indicate that children who spend over three hours daily on social media are twice as likely to experience mental health challenges like depression and anxiety, fueled by comparisons with others’ seemingly ideal lives. Social media usage can disrupt focus during school or homework, while browsing on mobile devices before bed is linked to poor sleep quality. Additionally, frequent social media exposure can impact brain areas related to emotions and learning—particularly significant as children and teens develop their sense of self between ages 10 and 19.

What can resistant bring as a challenge?

Young teens often resist restrictions, feeling entitled to the same access to technology as their peers. This resistance can lead to conflicts with parents, resulting in interpersonal stress and potential mistrust. Bans may not be effective; similar to alcohol restrictions, prohibiting access can sometimes increase desire. Tech-savvy teens are likely to find ways around limitations, which may also impact their ability to process online interactions in the future.Reducing social media time can also help lower risks of cyberbullying, online harassment, and body shaming. Furthermore, limiting app usage encourages children to spend more time outdoors, participate in physical activities, pursue hobbies, and adopt healthier habits overall. Excessive screen time often leads to a sedentary lifestyle, while balanced restrictions can promote a more active, engaged, and socially connected childhood.

But keeping the both sides in vision, challenge is what, how and when to educate young minds to divert and use their neural energy for their better future. Coming to a challenge in a country like India, ban and restrictions won’t change anything only, the real challenge of managing social media use among young people is complex. Simply imposing a ban or restrictions on platforms for those under a certain age might not have the desired impact, as enforcing these rules can be difficult given the sheer number of users and access points. Tech-savvy teens can find ways around restrictions, and blanket bans could push usage underground, making it harder for parents and educators to monitor online activities.

The real issue lies in determining the right approach, timing, and tools to educate young people on using digital platforms responsibly. With India’s vast youth population, the focus should ideally be on proactive digital education, helping young users understand the long-term impact of their online interactions and encouraging them to harness technology in ways that support their growth. Rather than a one-size-fits-all ban, developing age-appropriate digital literacy programs in schools, promoting open discussions at home, and setting practical boundaries can build a healthier digital culture. Empowering young users with the skills to navigate online spaces safely could be more effective and sustainable than enforcing restrictions that may lead to unintended consequences.

Like many other challenges, this issue requires ongoing discussion and a collaborative approach, particularly involving parents. A dedicated research team focused on understanding young minds and their digital behaviors is crucial. Australia has taken steps based on what they believe needs to be done, and now, it will be interesting to see what India contributes to this conversation in pursuit of meaningful change.

“SOCH Organisation: Bridging Mountain People with Happiness”

“Open hills, mountain thrills, friends to share, lessons to bear,  
Nature’s charm, village calm, bracelets worn, sun’s warm,  
Flowing streams, trees in bloom, kind souls, dreams to groom,  
Helping hands, striving high, a passion fierce, thoughts that fly…  
With all this grace, what more to chase?”


As I pondered ways to give back to the mountains, social media led me to the inspiring page of SOCH organization, where I saw the dreams of mountain communities being transformed into reality. I connected, followed, and reached out to express how deeply their vision resonated with my own and how eager I was to be a part of it. Joining SOCH and committing to this journey for a lifetime has been one of my best decisions. Now, as a member of this beautiful SOCH family, I proudly say “we” instead of “I.”

At SOCH, we pursue dreams—those of the younger generations, the elders, women seeking empowerment, and passionate individuals who have talent but lack basic resources. SOCH supports impactful projects that transform the lives of disadvantaged children and youth across various regions of Uttarakhand. We are a team of change makers who believe that every helping hand can uplift a child and pave the way for a brighter future.

Our journey began with extending support to underprivileged children and youth eager to learn and strive for a better life. This mission grew stronger as we realized just how many children needed assistance with essentials like food, shelter, and education. Our team expanded, reaching out to more regions to help as many children as possible. Today, we operate shelter homes, schools, and accessible dining facilities that support these young individuals. We’ve also established helpline offices nationwide so anyone in need can reach us anytime.

Our mission is to ensure that all children and young people receive the support they need, whenever they need it—whether it’s a supportive conversation, financial aid, education, job training, or simply knowing they’re not alone. We aim to build a world where no child or youth feels isolated, where everyone struggling can easily reach out for help with education, employment, and more. Our goal is to expand across every region to ensure we’re accessible to all in need.

Our numbers inspire us to give our best and continually break our own records. We’re thrilled to be growing and helping more people every day: with over 1,000K members worldwide, we’ve raised more than $300M in funds, helped 950,000+ children, and provided 50,000T of food. 

We operate shelter homes, schools, and an affordable community kitchen that serves young people in need. Additionally, we have helpline offices accessible at any time. Our goal is to empower the next generation with essential skills, especially around Digital Bharat, ensuring they can fully benefit from the opportunities of the growing digital era.

As the song goes, “Jahaan Pawan bahaye Sankalp liye, Jahaan parvat garv sikhate hai, Jahaan uchche neeche sab raste, bhakti ki dhun mein gatte hai,” meaning, “Where the wind flows with determination, the towering mountains instill pride, where all paths—high and low—unite in a melody of devotion.”

With that same spirit of determination, SOCH is committed to achieving success, prosperity, and happiness for the mountains, honoring the motherland, and creating pathways for all generations. 

By blending the innovative skills of the youth with the wisdom of the older generations, we aim to foster growth and development. SOCH brings joy, purpose, and dedication to the mountain communities, helping them find both pace and peace in their lives. 

For more information, visit the official SOCH website at [sochorganization.com](https://sochorganization.com/), or connect with us on Instagram, Facebook, LinkedIn, and Twitter.

You are under surveillance!

You search for a pair of shoes on a search engine, and suddenly, every ad you see is about shoes. You browse a housing site, and before you know it, your phone is buzzing with calls and messages about properties. You search for a nearby restaurant or explore a business idea, and bam! Your screen is overflowing with ads instead of the information you actually wanted. It feels like a hidden camera is always watching, anticipating your every move, doesn’t it? It’s like having a personal assistant—except you never asked for one! And this assistant? It’s so efficient, it even seems to work ahead of your own thoughts. Welcome to the digital world!

This type of constant surveillance is what we call surveillance capitalism. Big tech companies—let’s say the big four—use this model to turn your data into a resource, treating your searches and interests as their products. Whether you’re intentionally seeking information or just satisfying a passing curiosity, the moment you enter your data, it’s no longer just yours. Even if a website says it’s “encrypted,” that data is fuelling the encryption of their own massive datasets, which they use to craft algorithms that steer your next online experience. Search for anything, and in the background, those algorithms are quietly deciding what to show you next.

It’s not just that you’re searching the web—the web is also searching YOU. And while it may seem convenient to have such personalized suggestions, it’s important to realize that this is really about influence. These companies aren’t just catering to your needs; they’re shaping what you’ll do next.

Surveillance capitalism refers to the practice of monetizing data collected by tracking people’s online and real-world behaviors. This type of consumer surveillance is primarily used to tailor marketing and advertising strategies. The term **surveillance capitalism** was first introduced by John Bellamy Foster and Robert W. McChesney in a July 2014 article in *Monthly Review*, a socialist magazine based in New York. Their original concept centered on the U.S. military’s surveillance of citizens.

The term surveillance capitalism is more closely associated with the economic theory proposed by Harvard Business School Professor Emerita Shoshana Zuboff in September 2014. It describes the large-scale monetization of individuals’ raw personal data, used to predict and influence their behavior. Surveillance capitalism operates through steps like data collection, prediction, and the creation of behavioral markets. While it’s not tied to any specific tech or business process, it represents a business philosophy driving the massive data economy. Most people don’t realize the extent of this data collection until their privacy is breached, revealing that their confidential information has been commercialized and turned into profits—often to the tune of billions—by other companies.

There are no serious proposals for regulating the data collecting abilities of technology companies. However, Google did pay a large data privacy settlement in November 2022.

In her book, Zuboff predicted that data collection will continue to grow as it becomes increasingly central to the market and as technology becomes more embedded in daily life. She highlighted the rising use of IoT devices, like fitness trackers, which provide new opportunities for sharing user data with marketers and advertisers. Zuboff also referenced a 2016 Microsoft patent for software designed to detect users’ mental states. She warned that this type of technology could lead to a new level of privacy violations, as it would activate sensors to capture voice, speech, videos, images, and movement.

The question now is, can we regain control over our data in this system that’s so deeply ingrained in our digital lives? Or is this just the new normal? It’s something worth thinking about as we continue to navigate this always-connected world.

ICANN Issues Breach Notice to .TOP Registry

In a recent development, ICANN has issued a Notice of Breach to the .TOP Registry Operator after URLAbuse highlighted multiple compliance failures. The breaches include neglecting abuse reports, not adhering to internet safety protocols, and failing to pay required fees. ICANN has mandated corrective actions to be completed by August 15, 2024. URLAbuse continues to play a crucial role in identifying and reporting internet abuses, ensuring a safer online environment.

URLAbuse successfully triggered action against the .TOP Registry Operator, prompting ICANN to issue a Notice of Breach on July 16, 2024. The notice outlines several compliance failures by the .TOP Registry Operator, including neglecting abuse reports and failing to follow essential internet safety protocols.

ICANN has set an August 15, 2024, deadline for the .TOP Registry Operator to implement corrective actions. These actions include creating a plan for Uniform Rapid Suspension (URS) compliance, updating their website with abuse contact information, confirming receipt of abuse reports, and enhancing DNS abuse mitigation efforts. If these requirements are not met, ICANN may initiate termination proceedings under the Registry Agreement.

The question remains: when will the .TOP Registry Operator take strict action, and why is such negligence occurring in a highly interconnected internet world where DNS is a fundamental root?

References:
  • https://www.icann.org/uploads/compliance_notice/attachment/1225/hedlund-to-wenxia-16jul24.pdf
  • https://news.urlabuse.com/ICANN-Issued-Breach-Notice-to-TOP-Registry-After-URLAbuse-Complaint

NetMission.Asia Ambassador: A journey of Exploring Internet Governance through an Asia Pacific Perspective”

Initially, my encounter with the term “internet governance” left me with a vague understanding, as Google’s explanation provided only a basic overview. However, my curiosity was piqued, prompting me to delve deeper into the subject. This journey into the realm of internet governance commenced last year, around mid-April, with my involvement in ‘Youth Internet Governance-INDIA’ (https://youthigf.in/). Through YIGF-India, I gained valuable insights into Internet governance, particularly from the perspective of my home country, India. Expanding my horizons to encompass the Asia Pacific region, I embarked on a new path with NetMission.Asia (https://netmission.asia/). NetMission.Asia is described as a network comprising passionate young individuals from Asia, committed to engaging and empowering youth in internet governance discourse. Their goal is to foster youth mobility and effect positive change within Asia through impactful initiatives in Internet governance.

The journey as an Ambassador and eager learner commenced in December 2023. Being selected and introduced to our supportive buddies by the NetMission team marked a warm and engaging beginning to our experience. The orientation day provided us with invaluable insights into how NetMission.Asia is actively contributing to fortifying the role of the Asia Pacific region in shaping and comprehending Internet Governance. Throughout this journey, we underwent significant learning experiences, delving into diverse topics such as the essence of Internet Governance, the pivotal role of the Asia Pacific in this domain, and nuanced concepts like Diversity, Inclusivity, Green Tech, Web 3.0, and the Digital Economy. Our exploration extended to encompass emerging technologies, cybersecurity, privacy, and fostering a safer internet, among other crucial aspects.

Participating in virtual meetings with professionals actively engaged in various levels of the Internet Governance (IG) platform, such as UNIGF, ICANN, APNIC, IETF, and ITU, proved to be highly informative, enriching, and interactive. Engaging in breakout groups for each session provided ample opportunity for brainstorming and exchanging ideas. Documenting our learnings in worksheets, summarizing viewpoints from a visionary perspective, and collaborating in diverse groups under the banner of different organizations were all integral components of this journey. However, the highlight undoubtedly was the opportunity to showcase our achievements through case studies with our respective groups, an aspect of the experience that I found particularly rewarding.

Over two months, juggling regular Thursday sessions alongside daily tasks posed a significant challenge. However, despite its demanding nature, the experience proved to be immensely rewarding. I sincerely hope that more individuals get the chance to engage with NetMission, enabling young minds to contribute their unique perspectives on Internet governance in their respective countries and across the Asia Pacific region. In summary, if I were to describe this journey in a few words, I would call it “wonderful, amazing, and transformational.

Geo-fencing: Location On Work

In the world of technology, tracking is not a strenuous task, which will require meticulous efforts. Geo-fencing is one of the technology blessings we are working with. But what is this geo-fencing, how has it developed, in what ways it works, how is it useful and where is it used? Let’s discuss all these answers one by one via this article.

GEO-FENCING

In the word Geo-fencing, the Prefix “Geo” is a Greek word meaning “earth or land” and “fencing” means “drawing an imaginary border” Thus, Geo-fencing defines as setting up fencing or a virtual perimeter boundary to know whenever an object enters within the marked fencing zone.

As the definition explained above, defines Geo-fencing technology as a location-based service (LBS). In this, the app or any other medium by which the service is in use depends on GPS (Global Positioning System), Wi-Fi or cellular data and RFID(Radio-Frequency Identification) to activate the organized action which is based on whenever a device enters or exits the set virtual boundary locations or Geo-fence. The alert can be sent in many ways set up by the developer, it can be in a trigger form of text, pop-up, push notifications, track alert messages etcetera. 

How the Geofencing Work?

The developer set up the virtual boundary using GPS or RFID services or even an IP address in some cases to set up the fencing zone and then set up a per-planned alert system for the device which is going to enter or exit from the fencing zone. As soon as you enter the fence, will be tracked by the developer in case of tracking; you will get a push notification, if the fencing is set up for some marketing or business deals, you will get a message if the fencing is set up for any other purposes related to work personal or professional. So, therefore we can say that Geo-fencing has made life easy for everyone except those who are in the adversary zone. The fence in the Geo-fencing can vary in the perimeter zone, i.e., they can be changed,  reduced or increased depending upon the user and developer. 

Example: If you are running a salon and you want the customers in closer proximity to your location to know about the venue, you can set up the fencing perimeter and send the alerts in whatever format you want to give. 

Geo-fencing Application

In this era of digitization, Geo-fencing has become a crucial way for every sector whether it is a public or private one; whether it is in the security zone or marketing world; whether it is in IT or business firms. Once geographic fencing is set, the opportunities and usage are seemingly endless and that’s one of the reasons that it has become especially popular in marketing and social media lines.

Some of the common Geo-fencing Applications are as follows:

Security: Geo-fencing can be used to make your devices more secure. Like you can set your own Geo-fencing for your device for a specific area like your home, to get push-up notifications whenever someone enters your home.

Social networking: With Geo-fencing development comes its usage in one of the most popular platforms of the last decade called social media. Geo-fencing is the social media app network that gives the application of location status, location sending, and location-based stories to other devices and all these are all made possible with Geo-fencing. 

Human resources: For fencing the on-field employees, and workers and to track the employees, companies nowadays use Geo-fencing to keep a record of employees. Geo-fencing is also useful as a way to automate time cards, employee clocking means keeping track of when they go in and out, within the premises.

Marketing: Geo-fencing is a popular way for business firms to promote themselves by an alert pop-up whenever you are within the fencing range of the company. One of the best use of Geo-fencing is that it helps businesses in targeted ads to a specific audience instead of mass-adherence to figure out the right set of strategies with the right set of people based on the user’s location data.

Telematics: Telematics, the process of merging telecommunications and informatics via any device- Geo-fencing plays a very useful role here as well by allowing companies to set virtual zones around sites, work premises and secure zones. 

Smart appliances: Smart appliances have made us enter the smart world and Geo-fencing is one of the smartest use of these smart appliances  With the capability of smart work of appliances, it’s easier than ever before like reminding you of some household chores, reminding you some office-related files, kids assignments and all. 

The use of Geo-fencing in handling Pandemic COVID19:

When the entire nation is struggling for survival from the pandemic coronavirus, people in technology are working to tackle this problem via the use of technology. Developers from different zones of the country have developed a geo-fencing-based app for COVID-19 to track the people who are on the fence about getting affected by the Coronavirus.

Ministry of Electronics and information technology (MEITY)-GOI has developed an app called ‘AAROGYA SETU’ for citizens to know the risk of contracting COVID-19 by Geo-fencing tracking service. The tracking is done via Bluetooth & location-generated social graphs, which can show your interaction with anyone who has tested positive-All you have to do after the installation is to switch on the Bluetooth and location. By switching on the following you will be in the line of sight of developers and once you crossed paths with the red zone area you will get an alert message based on the information. Thus, Geo-fencing is playing a crucial role in handling this pandemic.

Geo-fencing Future

In this world of data-privacy where everyone is concerned about their data getting stolen, Geo-fencing faces the same criticism of possibilities of a data breach but as said by Nasscom chief R. Chandrasekhar, ‘There is nothing called fully perfect security in IT’, thus we can’t play the data-breach game with Geo-fencing anymore. According to a press release from Markets and Markets (https://www.marketsandmarkets.com/), the Geo-fencing industry is expected to grow by over 27% by 2022, citing “technological advancements in the use of spatial data and increasing applications in numerous industry verticals.”

References:

https://en.wiktionary.org/wiki/Wiktionary

https://meity.gov.in

https://en.wikipedia.org/wiki/Geo-fence

HTTP V/S HTTPS

HTTP (HTTP://)– Hyper Text Transfer Protocol is a Protocol designed for communication between client (Web browser) and server(Web server). It was projected in 1989 by the world wide web. It operates on Port 80 and transfers data in plain text. There were a few revisions in HTTP until http1.1 released in 1996.Then after finding so many loopholes, There was a mega release of HTTP/2 in 2015. Later, HTTP/3 as the proposed successor to HTTP/2 came out, which is already in use on the web, using UDP instead of TCP for the underlying transport protocol. 

Advantages of HTTP:-

  1. HTTP can be implemented with other networks as well as protocols.
  2. HTTP pages are stored on computers as internet caches.
  3. The platform of HTTP is independent, thus allowing cross-platform porting.
  4. It can be used over Firewalls.

Issues with HTTP:-

  1. HTTP is a stateless protocol, which means it does not require the HTTP server to retain information or status about each user for the duration of multiple requests. Each time the requests will be treated unique or new irrespective whether it is new or old.
  2. No privacy, as open for all, and anyone can see the content.
  3. Data Integrity is 0, here as security and privacy are absent here and anyone can alter the content.
  4. Anybody irrespective of a genuine user or not, can intercept the request and can get the username and password.

HTTPS (HTTPS://)– Hyper Text Transfer Protocol Secure, an advanced as well as the secured version of HTTP. It allows secured transference with the help of SSL (Secure Sockets Layer). HTTPS is a combination of SSL/TLS with HTTP. It provides encrypted data and secured transference with the help of key-based encryption algorithms, in which key is generally 40 or 128 bits in strength. It operates on port 443 and transfers data in Cipher (encrypted) format.

Advantages of HTTPS:-

  1. Sites running over HTTPS are redirected, which means even if you type in HTTP:// by mistake, it will redirect to an HTTPS over a secured connection.
  2. Secured with SSL/TLS and provide full encryption over data.
  3. Each SSL Certificate contains unique, authenticated information about the certificate owner.

Issues with HTTPS:-

  1. HTTPS protocol can’t stop stealing confidential information from the pages if they are saved as cache memories on the browser.
  2. SSL data can be encrypted only during transmission via a network, thus the text in the browser memory is still not cleared with SSL.

Difference between HTTP and HTTPS :-

                 HTTP

               HTTPS

-Hyper Text Transfer Protocol

-Hyper Text Transfer Protocol Secure

-Less secure and encryption is absent.

-Secure and encrypted with SSL/TLS.

-Uses Port 80.

-Uses Port 443.

-Doesn’t scramble data before transmission, thus vulnerable to hackers.

-Scramble Data before transmission, thus secure.

-It operates on TCP/IP level protocol.

-It operates on the same HTTP protocol but with SSL/TLS.

-No SSL and data encryption.

-SSL and data encryption are required.

-Fast in procession.

-Slow in processing in comparison to HTTP.

-It operates on an Application layer.

-It operates on the Transport layer.

-It transports plain text information.

-It transports cipher text information.