There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict, and respond accordingly.
The BIMSTEC region offers tremendous opportunities in the field of cyber space. However, the full scope of digital dividend can only be harnessed if the countries of the region are able to get their act together and work as a team at the earliest.
Paris Call could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes on the issue of cyber governance.
The distraction of Chabahar’s questionable economic rationale and the embellishment of a centuries-old fascination with Suez alternatives, whilst entirely logical from a Muscovite perspective, must cede priority to New Delhi’s immediate interests in its own strategic backyard
One understands that long term benefits of Aadhaar actually outweighs many concerns. However, adequate norms need to be laid down from collection to retention of biometric data, in addition to formulating strong data protection and privacy laws.
A strategic petroleum reserve offers India the leverage to be a serious player in the international oil market, as it will have the option to release supplies when prices spike and recharge the reserve when prices are low.
The Civilian Aviation Requirements for Unmanned Aircraft Systems, though fairly well drafted, constitute only a stop gap measure for regulating drone operations in the civil sector.
Mega data breaches of user’s private digital data in the last two years has drawn the world’s attention towards protection, safe custody and management of this extremely valuable commodity.
Xi Jinping’s Politics and What it Means for India
There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict, and respond accordingly.
BIMSTEC: An Unprecedented Opportunity for Collaboration and Cooperation in Cyberspace
The BIMSTEC region offers tremendous opportunities in the field of cyber space. However, the full scope of digital dividend can only be harnessed if the countries of the region are able to get their act together and work as a team at the earliest.
Paris Call: Another Missed Call?
Paris Call could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes on the issue of cyber governance.
Boko Haram Gathers Strength as Nigeria Prepares For Elections
Boko Haram’s resurgence might affect the holding of credible polls in parts of northeast Nigeria in the upcoming February 2019 general elections.
Renaissance and Reticence in India’s North-South Connectivity Platform
The distraction of Chabahar’s questionable economic rationale and the embellishment of a centuries-old fascination with Suez alternatives, whilst entirely logical from a Muscovite perspective, must cede priority to New Delhi’s immediate interests in its own strategic backyard
Another Capitulation and another Win for the TLYP in Pakistan
The challenge that the TLYP poses to Pakistan’s internal stability is even more dangerous than the threat of terrorism.
Revisiting Aadhaar System: Post the Supreme Court Verdict
One understands that long term benefits of Aadhaar actually outweighs many concerns. However, adequate norms need to be laid down from collection to retention of biometric data, in addition to formulating strong data protection and privacy laws.
Strategic Petroleum Reserves: Stocking Oil for Rainy Days
A strategic petroleum reserve offers India the leverage to be a serious player in the international oil market, as it will have the option to release supplies when prices spike and recharge the reserve when prices are low.
India’s First Step Towards Regulating Drones
The Civilian Aviation Requirements for Unmanned Aircraft Systems, though fairly well drafted, constitute only a stop gap measure for regulating drone operations in the civil sector.
Making Private Companies Accountable For Breach of User Private Data
Mega data breaches of user’s private digital data in the last two years has drawn the world’s attention towards protection, safe custody and management of this extremely valuable commodity.
Pages