subject: - isee · subject: - isee unit-3 ... please visit:-...

16
Subject: - ISEE Unit-3 Leveraging Information Systems Information System and Project Management Refer:- What is Data and Information? What is Information system and its definition etcWhat is Project? How to Manage Project? LifeCycle of Project Phases? Etc. Managing data Resources: Please visit:- grail.cba.csuohio.edu/~sanchita/ist305/classnotes/Ch3a.ppt Business Process Integration and Enterprise System Please visit:- http://www.ijcce.org/papers/89-T0047.pdf Case Study- UIDAI Unique Identification Authority of India. The case focuses on the Aadhaar project that was initiated by the United Progressive Alliance (UPA), a coalition of central-political left parties heading the Government of India (GoI), under the guidance of Prime Minister of India, Manmohan Singh (Singh), to provide identity to the 1.2 billion citizens of India. The project aimed to plug loopholes in welfare programs where checking leakages and identifying beneficiaries was a major challenge. With an Aadhaar, there was an absolute guarantee that no two people would have the same Aadhaar, and it could not be duplicated either.

Upload: phamtuyen

Post on 26-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Subject: - ISEE Unit-3

Leveraging Information Systems

Information System and Project Management Refer:- What is Data and Information? What is Information system and its definition etc… What is Project? How to Manage Project? LifeCycle of Project Phases? Etc. Refer

Managing data Resources:

Please visit:- grail.cba.csuohio.edu/~sanchita/ist305/classnotes/Ch3a.ppt

Business Process Integration and Enterprise System

Please visit:- http://www.ijcce.org/papers/89-T0047.pdf

Case Study- UIDAI Unique Identification Authority of India.

The case focuses on the Aadhaar project that was initiated by the United Progressive Alliance (UPA), a coalition of central-political left parties heading the Government of India (GoI), under the guidance of Prime Minister of India, Manmohan Singh (Singh), to provide identity to the 1.2 billion citizens of India. The project aimed to plug loopholes in welfare programs where checking leakages and identifying beneficiaries was a major challenge. With an Aadhaar, there was an absolute guarantee that no two people would have the same Aadhaar, and it could not be duplicated either.

Aadhaar previously called as the Unique identification (UID) project was the 12 digit identification number provided by the Unique Identification Authority of India (UIDAI) on behalf of the GoI. The number served as proof of address and identity for citizens anywhere in India. In June 2009, Nandan Nilekani (Nilekani), former CEO of Infosys Technologies Limited was invited by Singh to head the Aadhaar project and was roped in with the rank of a union cabinet minister as the Chairperson of the UIDAI. In September 2010, the Aadhaar project was launched by Singh and UPA Chairperson, Sonia Gandhi (Gandhi) in Tembhali village in Maharashtra. The launch signified UIDAI's core initiative of giving the poor and marginalized in India an easily verifiable and mobile identity. Having invited Nilekani, Singh had given him full autonomy during the implementation of the Aadhaar project. Nilekani was also given a free hand by Singh to recruit good talent and form his core team. Nilekani initiated the Aadhaar project by launching a pilot project in Karnataka, in October 2010. The success of the pilot project prompted the UIDAI to roll out the Aadhaar project in other states of India. Since the initiation of the Aadhaar, Nilekani received opposition from several quarters - mainly from cabinet colleagues, bureaucrats, policy experts, activists, and a few state governments. The Finance Ministry of India opposed that the Aadhaar would result in duplication of expenditure since the National Population Register (NPR) led by the Home Ministry was also responsible for making a comprehensive identity database. The Home Ministry questioned the security of biometrics and expressed concerns over how the confidential data would be protected. The Planning Commission said that the UIDAI structure was against government procedures. On the positive side, some policy makers felt that Singh's decision to recruit Nilekani proved to be appropriate since Nilekani had retained immense goodwill amongst the stakeholders involved. Moreover, the autonomy given to Nilekani by Singh led him to prove the viability of the project. The divided views over the Aadhaar project raised doubts whether the project would be trashed and Nilekani would step down from the post of the Chairman of the UIDAI. The debate over duplication of data and security concerns raised by the Home Ministry came to an end after Singh intervened. In January 2012, Singh in a meeting with Planning Commission Chairman, Montek Singh Ahluwalia (Ahluwalia), Home Minister, P Chidambaram, and Nilekani concluded that the Aadhaar would be given an extended mandate of collecting biometric data of another 400 million residents in India. While the UIDAI was instructed to enroll 600 million residents across 16 states and Union Territories, the remaining 600 million residents would be recorded by the Registrar General as part of the NPR. The NPR and the UIDAI would then share the biometric data and de-duplicate the data to form a comprehensive biometric database. Nilekani's performance in successfully steering this challenging project was being keenly watched as it was one of the rare instances where the Government had entrusted a project of this magnitude to a corporate leader. Having achieved the initial breakthrough and scored early successes it was to be seen how he would overcome the new challenges and scale up the project.

Issues:

» Analyze the efforts by UPA and Singh in launching the Aadhaar project » Understand the initiatives undertaken by Nilekani in launching the Aadhaar project and making it a success » Understand the issues and challenges faced by Nilekani during the implementation of the Aadhaar project » Understand the dilemma faced by the GoI in taking the Aadhaar project forward

The Unique Identification Authority of India (UIDAI) is a statutory authority established under the provisions of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (“Aadhaar Act 2016”) on 12 July 2016 by the Government of India, under the Ministry of Electronics and Information Technology (MeitY).

Prior to its establishment as a statutory authority, UIDAI was functioning as an attached office of the then Planning Commission (now NITI Aayog) vide its Gazette Notification No.-A-43011/02/2009-Admn.I) dated 28th January, 2009. Later, on 12 September 2015, the Government revised the Allocation of Business Rules to attach the UIDAI to the Department of Electronics & Information Technology (DeitY) of the then Ministry of Communications and Information Technology.

UIDAI was created with the objective to issue Unique Identification numbers (UID), named as "Aadhaar", to all residents of India that is (a) robust enough to eliminate duplicate and fake identities, and (b) can be verified and authenticated in an easy, cost-effective way. The first UID number was issued on 29 September 2010 to a resident of Nandurbar, Maharashtra. The Authority has so far issued more than 111 crore Aadhaar numbers to the residents of India.

Under the Aadhaar Act 2016, UIDAI is responsible for Aadhaar enrolment and authentication, including operation and management of all stages of Aadhaar life cycle, developing the policy, procedure and system for issuing Aadhaar numbers to individuals and perform authentication and also required to ensure the security of identity information and authentication records of individuals.

To learn more about UIDAI, please visit the Background and Organizational Structure sections of the website.

Headquarters (HQ)

At the HQ, the CEO is assisted by seven Deputy Directors General (DDGs), Joint Secretary level

Officers of Government of India, as in-charge of various wings of UIDAI. The DDGs are

supported by Assistant Directors General (ADGs), Deputy Directors, Section Officers and

Assistant Section Officers. The HQ has a total sanctioned strength of 127 officers and staff

members, including the Accounts and IT branches.

Regional Offices (ROs)

Each of the eight Regional Offices of UIDAI is headed by a Deputy Director General (DDG) and

the support structure comprises of Assistant Directors General, Deputy Directors, Section

Officers, Assistant Section Officers, Senior Accounts Officer, Accountant and personal staff

Regional Offices with the covering States and UTs under their jurisdiction are listed below:

Regional Offices

(ROs) States and Union Territories covered by the RO

RO Bengaluru Karnataka, Kerala, Tamil Naidu, Pondicherry, Lakshadweep

RO Chandigarh Jammu & Kashmir, Punjab, Haryana, Himachal Pradesh and UT of

Chandigarh

RO Delhi Uttarakhand, Madhya Pradesh, Delhi and Rajasthan

RO Guwahati Assam, Arunachal Pradesh, Meghalaya, Manipur, Nagaland, Mizoram,

Tripura and Sikkim

RO Hyderabad Andhra Pradesh, Telangana, Orissa, Chhattisgarh, Andaman and Nicobar

RO Lucknow Uttar Pradesh

RO Mumbai Gujarat, Maharashtra, Goa, Dadar & Nagar Haveli, Daman & Diu

RO Ranchi Bihar, Jharkhand and West Bengal

Enrolment & Update Ecosystem

Enrolment Ecosystem consists of Registrars and Enrolment Agencies. Registrar is an entity authorised or recognized by UIDAI for the purpose of enrolling individuals. Enrolment Agencies are appointed by Registrars and are responsible for collecting demographic and biometric information of individuals during the enrolment process by engaging certified Operators/Supervisors.

In co-ordination with the Registrars, the Enrolment Agencies set up Enrolment Centres, where residents can enrol for Aadhaar. Multiple fingerprint scanners, iris scanners, and cameras used for enrolment are certified by STQC and UIDAI, and all connect to the UIDAI designed standard Application Programming Interface (API). Appointment of multiple registrars, multiple enrolment agencies, and multiple technology providers has created an environment of healthy competition within.

Authentication Ecosystem

The UIDAI has set up a scalable ecosystem for the purpose of instant authentication of residents. The Aadhaar authentication ecosystem is capable of handling tens of millions of authentications on a daily basis, and can be scaled up further as per the demand. The UIDAI has appointed a number of Authentication Service Agencies (ASAs) and Authentication User Agencies (AUAs) from various Government and non-Government organisations. The UIDAI, in partnership with STQC, has also laid down the technical standards for biometric devices, and certified a number of them.

Since the authentication service is provided online and in real-time, the UIDAI has also established two data centres where authentication and other online services such as e-KYC are deployed in active-active mode to ensure high availability. Banks and payment network operators have embedded Aadhaar authentication into micro-ATMs in order to provide branch-less banking anywhere in the country in a real-time, scalable and interoperable manner.

What is Aadhaar Authentication?

Aadhaar Authentication means the process by which the Aadhaar number along with the

demographic information or biometric information of a Aadhaar number holder is submitted to

the Central Identities Data Repository (CIDR) for its verification and such repository verifies the

correctness, or the lack thereof, on the basis of the information available with it.

Overview

The Aadhaar number or the authentication thereof shall not, by itself, confer any right of, or be

proof of, citizenship or domicile in respect of an Aadhaar number holder.

Several requesting entities (or service providers) require individuals to submit their identity

proofs that serve as an enabler for providing consumer services, subsidies or benefits. While

collecting such identity proofs, these service providers face challenges in verifying/validating

the correctness of identity information documents or proofs submitted by individuals.

The purpose of Aadhaar Authentication is to provide a digital, online identity platform so that

the identity of Aadhaar number holders can be validated instantly anytime, anywhere.

UIDAI offers Aadhaar-based authentication as a service that can be availed by requesting

entities (government / public and private entities/agencies). This service from UIDAI can be

utilized by the requesting entities to authenticate the identity of their customers / employees /

other associates (based on the match of their personal identity information) before providing

them access to their consumer services / subsidies/ benefits / business functions / premises.

Modes of Authentication. —

An authentication request shall be entertained by the Authority only upon a request

sent by a requesting entity electronically in accordance with these regulations and

conforming to the specifications laid down by the Authority.

Authentication may be carried out through the following modes:

o Demographic authentication: The Aadhaar number and demographic

information of the Aadhaar number holder obtained from the Aadhaar number

holder is matched with the demographic information of the Aadhaar number

holder in the CIDR.

o One-time pin based authentication: A One Time Pin (OTP), with limited time

validity, is sent to the mobile number and/ or e-mail address of the Aadhaar

number holder registered with the Authority, or generated by other appropriate

means. The Aadhaar number holder shall provide this OTP along with his

Aadhaar number during authentication and the same shall be matched with the

OTP generated by the Authority.

o Biometric-based authentication: The Aadhaar number and biometric information

submitted by an Aadhaar number holder are matched with the biometric

information of the said Aadhaar number holder stored in the CIDR. This may be

fingerprints-based or iris-based authentication or other biometric modalities

based on biometric information stored in the CIDR.

o Multi-factor authentication: A combination of two or more of the above modes

may be used for authentication.

A requesting entity may choose suitable mode(s) of authentication from the modes

specified in sub-regulation (2) for a particular service or business function as per its

requirement, including multiple factor of authentication for enhancing security. For the

avoidance of doubt, it is clarified that e-KYC authentication shall only be carried out

using OTP and/ or biometric authentication.

Obtaining Aadhaar number holder’s Consent for Authentication

The Central / State Government may, for the purpose of establishing the identity of individual

as a condition for receipt of subsidy, benefit or service require that such individual undergo

authentication, or furnish proof of possession of Aadhaar number or in the case of an individual

to whom no Aadhaar number has been assigned, such individual makes an application for

enrolment of Aadhaar.

If an Aadhaar number is not assigned to an individual, the individual shall be offered alternate

and viable means of identification for delivery of subsidy, benefit or service.

In compliance with Aadhaar Act, all requesting entities or service providers shall

unless otherwise provided in the Act, obtain the consent of an individual before

collecting his/her identity information for the purpose of authentication in such manner

as mandated by UIDAI’s policy and regulations.

ensure that the identity information of an individual is only used for submission to the

CIDR for authentication.

Nothing contained in this Aadhaar Act shall prevent the use of Aadhaar number for establishing

the identity of an individual for any purpose, whether by the State or anybody corporate or

person, pursuant by law, for the time being in force, or any contract to this effect.

Provided that the use of Aadhaar number shall be subject to the procedure and obligations

under section 8 and Chapter VI of the Act.

Authentication Services

The authentication service is provided in online and real-time manner by UIDAI through its two

data centres i.e. Hebbal Data Centre (HDC) and Manesar Data Centre (MDC) where online

services for authentication and other services such as e-KYC are deployed in active-active mode

to ensure high availability of services.

The UIDAI’s Central Identities Data Repositotry (CIDR) is currently capable of handling tens of

millions of authentications on a daily basis, and can be scaled up further as demand increases.

Many requesting entities that provide services to Aadhaar number holders have integrated

Aadhaar into their domain applications for improved service delivery anywhere in the country

in a real-time, scalable, interoperable manner.

Case Study-Cloud based ERP(SaaS Platform)

What is Cloud ERP Software?

Cloud-based computing (“the Cloud”) is one of the leading technology topics in the world.

Cloud computing, sometimes called on-demand computing, uses the Internet to provide shared

computing resources and storage of records or documents. The term covers everything from

emailing or photo sharing on a commercial service like Google to hosting the entire computing

infrastructure of a global corporation from remote data centers. For more insight, a formal US

government definition of cloud computing is provided from the National Institute of Standards

(NIST).

Cloud ERP, often called Cloud-based ERP, enables a company’s accounting, operations

management and reporting to run in the cloud. As one would expect, Cloud ERP vendors vary

significantly in their technology, functionality, and service. After researching ERP Cloud vendors,

it becomes clear that they have few things in common beyond hosting of an application and

utilizing the internet to provide connectivity. Acumatica is one of the few vendors that offer a

true ERP Cloud solution.

The Cloud is particularly valuable to small and medium-size businesses (SMB’s) because it

provides access to full-function applications at a reasonable price without substantial operating

expenditure for hardware and software. Using the correct cloud provider, a company can

rapidly scale as their business grows or a new company is added.

The Benefits of Cloud Computing

Cloud ERP has been proven to reduce costs in many ways because it

Avoids upfront costs for all computing infrastructure such as hardware and data servers

Reduces IT support services because IT is in the cloud

Eliminates paying upfront for application software licenses

Shrinks the cost of maintaining and supporting those applications since the cloud vendor

handles the updates and upgrades

The most important benefits of Cloud ERP go beyond cost-savings and include

Paying only for the computing resources needed

A fixed monthly rate so companies can use their cash on other business initiatives

Taking advantage of Cloud ERP applications faster since installation of hardware and

software on servers or user devices is not required

The ability to adjust the amount of cloud service as a company’s computing or storage

needs fluctuate

Enjoying the confidence that the data has been backed up and there is a disaster

recovery plan

Avoiding attacks on the company’s server because the data in not stored locally, but in

the cloud

Accessing the system from anywhere makes it easy for a company to expand

geographically since the Internet is everywhere and there is no need to implement

hardware and software at remote locations

Learn more about the benefits of cloud computing by reading this report from the Aberdeen

Group, a highly respected industry analyst firm, entitled “Improve Your Midmarket Business

Operations with Cloud Applications”. It provides statistics on improvements that have been

achieved by using the Cloud.

At its most basic, cloud computing is all about renting processing resources and storage rather

than buying and maintaining them in-house (on-premise). It may come as a surprise to some,

but this is not a new concept. In the 1970’s, service firms used large mainframes to run

applications and provide data storage for other companies that would rent those computer

resources and storage space. This was called “time-sharing”.

Time-sharing was expensive and fell out of favor once the price of computers dropped and

companies could afford to buy and maintain their own systems. For the last few decades,

companies have been buying, installing and maintaining their hardware and software in their

own facilities.

Fortunately, new technologies have been introduced such as widespread Internet availability,

low cost of mobile devices, expansion of computing power and massive storage availability.

Technology has improved so much that very high functioning applications can safely and

securely run remotely on somebody else’s hardware. This eliminates the need for individual

companies to deal with hardware issues and allows their employees to work anywhere at any

time.

IDC, a premier global provider of market intelligence, recent wrote about the “IT Industry’s 3rd

Platform for Innovation and Growth”. In their eBook, “True Cloud Applications for Agile and

Fast-Growing Businesses”, IDC discusses the “explosion of innovation” that we are witnessing.

Clearing the confusion from buzzwords around the cloud

Talk about the Cloud is everywhere, but so are cloud buzzwords, which result in confusion and

misconceptions. Here is a brief discussion of the more common terms:

Licensing options: Purchase or Subscription

Perpetual or Purchase: These terms refer to when a company BUYS a software license.

The company pays to owns the license and also pays an annual maintenance fee for

upgrades.

Subscription: The company pays an annual or monthly charge to use the software

license. Upgrades to the software is usually included in the subscription price.

Deployment options: On-premise, Hosted, or SaaS

On-premise or in-house: The company is responsible for the infrastructure (hardware,

system software, communication hardware, software on user devices, etc.) and the

deployment of the application software (implementation, support, upgrading, etc.)

Hosted: The company or hoster buys a license for the software. The hoster manages all,

or most, of the infrastructure and software deployment as described above. The hoster

can be an independent company or a division of the company itself. Hosting is a way to

outsource IT operations.

Software as a Service (SaaS): This newest method of deployment is a combined software

licensing and delivery model in which software is licensed on a subscription basis and

hosted by the software provider, all for a single price that is typically a fixed amount. In

many cases the software provider uses a Public Cloud for the hosting.

Private Cloud and Public Cloud

Private cloud is privately owned and maintained by the company or a hoster. Based on

business requirements or regulations, sometimes this may be the only option (view

datasheet).

Public cloud is owned by a service company, such as Microsoft, IBM or Amazon. The

service provides all the hardware, load balancing, backup and security.

Hybrid cloud is a blended approach with a mix of on-premises, private cloud and third-

party, public cloud services.

Multi-tenancy

Multi-tenancy is where the Cloud software provider has single instance (version) of

software on a server and serves multiple tenants (customers) simultaneously.

Single-tenancy is where each customer has their own application and data base.

Cost Savings

o It is believed that multi-tenancy reduces the cost for the software provider,

which is absolutely true for cloud apps that are quickly purchased and

downloaded like Pandora, Facebook, etc.

o For Cloud ERP, the cost savings is insignificant compared to: providing the server

hardware, operating system and database; development of the very

sophisticated ERP programs; sales and marketing required; as well as on-going

support.

Flexibility is reduced when you share the same program with many others. The impact

may be loss of control in:

o Customization and tailoring

o Upgrading schedules

Note: Acumatica can run either multi-tenancy or single-tenancy depending on the customers’

needs.

Thin client & Web services

Thin client in cloud terms is a device (PC, tablet or phone) that requires NO application

or communication software to be downloaded. Any thin client can access the

application from anywhere, similar to a web page.

Web services are simply application components. They are designed for and used on the

Web. Common examples are the widgets on a phone, such a weather. Business

applications may include zip code look up, sales tax calculation or much more

sophisticated applications.

The Benefits of Acumatica's Cloud ERP

Acumatica Cloud ERP is a flexible and cost-effective option for small and medium-sized

businesses.

More importantly, it is designed to respond to and overcome the inflexibility of many existing

ERP solutions. This is done by allowing CHOICE of:

Functionality you wish to license with the Acumatica standard suites as well as optional

add-on features

Computing power and data storage size needed now and when the business changes

Deployment options ranging from SaaS, hosted in a private cloud or on-premise, which

can be switched as needs change

Licensing models of annual subscription or perpetual license

Data access to copy or move the data at any time, unlike many systems

Device mobility to easily switch between desired mobile device such as an Apple iPad,

iPhone and Google Android or use a Windows, Mac or Linux desktop computer.

All the flexibility above, plus the safety and security of a hosting provider such as Amazon Web

Services and Microsoft Azure public clouds.

Acumatica was founded in 2009 when our founders saw the opportunity to do things

differently. From the ground up, Acumatica was built for the cloud. This is written into the

company’s DNA and allows our customers to benefit from having a True Cloud solution.

Information and Communication Technologies (ICTs) & E-Governance

Information and Communication Technologies (ICTs) play a key role in development & Economic growth of Rural India. Political, Cultural, Socio-economic Developmental & Behavioral

decisions today rests on the ability to access, gather, analyze and utilize Information and Knowledge. ICT is the conduits that transmit information and knowledge to individual to widen their choices for Economic and social empowerment. In near future people will be carrying a handheld computer connected to the Web to get the information about the World at their fingertips. Government of India is having an ambitious objective of transforming the citizen-government interaction at all levels to by the electronic mode (e-Governance) by 2020.

A successful ICT application in e-Governance giving one-stop solutions for rural community is the need of the hour. ICT is crafted to enable the Electronic Governance through wireless communication, thus it’s integrally interlinked and knitted.

India is a country of villages and to improve and sustain the overall prosperity, growth and development in the global competitive regime, National E-governance plan (NEGP) seeks to lay the foundation with various projects, starting from the grass-root levels, and provide impetus for long-term e-governance within the country. In this direction rural e-Governance applications implemented in the recent few years have been demonstrating the importance of Information and Communication Technologies (ICT) in the concerned areas of rural development. Indeed, some of the schemes introduced in rural India have improved the government services immensely.

Instances like Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA), Warana Project in Maharashtra, Online Income Tax, Online Central Excise, Unique ID and E-office has accelerated growth of respective areas and contributing to country’s economic development. Similarly, at state level the various rural E-governance projects such as SETU Project in Maharashtra etc, projects that have been providing excellent services and saving time and money of people as well as of government and are contributing their might to the socio-economic development of rural India. Being ICT a significant instrument in E-Governance and Rural Development, appropriate infrastructure/design is mandatory for proper functioning as follows:-

• As designed of citizen centric services, and dependable service delivery mechanisms.

• Selection of appropriate (dependable, maintainable, cost effective) technologies for rural connectivity, and information processing solutions.

• As designed of cost effective delivery stations (kiosks) to build new services.

• Demonstration of transparency and efficiency to remove distrust and build confidence among the citizens on functioning of service delivery mechanisms.

• Invite private participation to reduce the burden on the central servicing agency, bring in the expertise, enhance the speed of implementation, and offer better value proposition to the citizens.

The term e-governance focuses on the use of new ICTs by governments as applied to the full range of government functions. Thus e-governance is the application of information and communication technology for delivering government services, exchange of information, communication, transactions, integration, various stand-alone systems, and services between government and citizens, government and business as well as back office processes and interactions within the entire government frame work. The government being the service

provider it is important to motivate the employees for delivering the services through ICT. E-governance seek to achieve Efficiency, Transparency, and Citizen’s Participation. Enabling E-governance through ICT contributes to Good Governance, Trust and Accountability, Citizen’s Awareness, and empowerment, Citizen’s Welfare, Democracy, Nation’s Economic growth. ICT is the biggest enabler of change and process reforms fade in face of what ICT has achieved in few years.

E-governance services through ICT refer to transactional services that involve local, state or national government. ICTs acts in speeding up the flow of information and knowledge between government and citizens and transforming the way in which governments and citizens interact. According to the United Nations Development Program (UNDP) the challenge for all countries is to create and develop a system of governance that promotes supports and sustains human development. Governments in many parts of the world have made huge ICT investments aimed at improving governance processes.

In the present century, the advancements in Information and Communication Technologies (ICTs) are changing the various components of human life. The changes in the ICTs have brought a positive impact in the process of public service delivery and socio-economic structure of communities.

In India, e-Governance applications in the recent past have demonstrated their positive impact in minimizing the processing costs, increase transparency and support economic development by income generating ventures, increase in agricultural production, and improvements in health and education sectors, all of which promote the overall quality of life of rural people. ICT contributes in providing the transactional services for the rural people with the benefit of time and cost savings in obtaining the public services with efficiency and effectiveness and it also examines changes in agricultural productivity and improved quality of life due to the ICT services. In addition to the above AEPS, GPS etc. are pivotal in ICT services.

The rural ICT applications attempt to offer the services of central agencies (like district administration, cooperative union, and state and central government departments) to the citizens at their village door steps. These applications utilize the ICT in offering improved and affordable connectivity and processing solutions. Several Government-Citizen (G-C) e-Government pilot projects have attempted to adopt these technologies to improve the reach, enhance the base, minimize the processing costs, increase transparency, and reduce the cycle times to half.

A large number of rural E-Government applications, developed as pilot projects, were aimed at

offering easy access to citizen services and improved processing of government-to-citizen transactions. The idea that the primary and the sheer object of ICT in e-governance and rural development is individual’s motivation to collective mobilization for an integrated rural development.

Information and Communication Technologies (ICTs) can play a critical role in sustainable human development and poverty eradication[1]. ICT is a powerful enabler of development goals because of the way in which it improves communication and the exchange of knowledge

and information necessary for development processes. ICT is pervasive and cross-cutting, impacts the full range of human activity and will become one of the main enablers in the pursuit of poverty alleviation and wealth creation in developed and developing countries. As accelerator, driver, multiplier and innovator, ICTs are powerful if not indispensable tools in the massive scaling up and interlinkage of development interventions and outcomes.[2] ICTs also play a critical role in speeding up the flow of information and knowledge between government and citizens and transforming the way in which governments and citizens interact. According to the United Nations Development Programme (UNDP) the challenge for all countries is to create and develop a system of governance that promotes, supports and sustains human development[3]. Governments in many parts of the world have made huge ICT investments aimed at improving governance processes. E-governance is regarded as the ICT-enabled route to achieving good governance since it integrates people, processes, information, and technology in the service of governance initiatives. The expected benefits of such public sector reforms have been identified as an increase in the efficiency of government operations, strengthening democracy, enhancing transparency, and providing better services to citizens and businesses[4]. Defined broadly, e-government is the use of ICT to promote more efficient and effective government, facilitate more accessible government services, allow greater public access to information, and make government more accountable to citizens. E-government has emerged beyond electronic service delivery and is part of the ongoing reform and transformation of government enabling participatory governance and partnerships to improve efficiency and effectiveness[5]. E-government is about transforming government to be more citizen-centred. Technology is a tool in this effort. E-government successes require changing how government works, how it deals with information, how officials view their jobs and interact with the public. E-government is also within the South African context split up into different sectoral areas such as e-health, e-education, SMME (Small and Medium Enterprises) and local content. Achieving e-government success also requires active partnerships between government, citizens and the private sector. The e-government process needs continuous input and feedback from the “customers”— the public, businesses and officials who use e-government services. Their voices and ideas are essential to making e-government work. E-government, when implemented well, is a participatory process. E-government and ICT are seen as elements of a larger government modernization program. It is well understood that simply adding computers or modems will not improve government, nor will only automating the same old procedures and practices. Making unhelpful procedures more efficient is not productive. Focusing only on the computers will not make officials more service-oriented toward government’s “customers” and partners. Leaders should think about

how to harness technology to achieve objectives for reform. ICT is an instrument to enable and empower government reform. In South Africa, the Vision 2014 describes an inclusive Information Society, one in which the use of ICTs will be harnessed to ensure that everyone has fast, reliable and affordable access to information and knowledge that will enable them to participate meaningfully in the community and economy[6]. The Vision further aspires to move the country from being a consumer of ICT products and services to being a major player in the production and innovation of these products and services. The cornerstones of this Inclusive Information Society are a vibrant and thriving ICT sector, an enabling policy and regulatory environment, accessible ICT infrastructure and broadband connectivity, and an appropriately skilled and knowledgeable citizenry. The vision for e-Government expressed in the approved E-Government Discussion document entitled, “Electronic Government, The Digital Future: A Public Service IT Policy Framework”, published in 2001 by the Department of Public Service and Administration recommended that an e-Government initiative should address three main domains:

E-government : the application of IT intra-governmental operations (Government to government or G2G)

E-service : the application of IT to transform the delivery of public services (Government to Citizens or G2C)

E-business : the application of IT to operations performed by government in the manner of G2B transactions (e.g. procurement)

The vision for achieving e-Government in South Africa is to render services around life episodes of the

citizens that follow a series of events, from cradle to grave. Such services must be accessible to all

citizens anytime, anywhere and through different access devices and media. All stakeholders –

government and nongovernment - were invited to participate in defining the vision. Continuous buy-in

and participation from critical role-players is recognized as a key priority. This is achieved through a

series of intergovernmental consultative workshops and working together with the Government Chief

Information Officer Council.

The vision of e-government is the optimization of services so that government can achieve its goals. One

especially sensitive issue, which may prevent or delay service delivery, is the issue of fraud. Within the e-

government policy and strategic framework, there is no particular focus at how government will address

the issue on non-delivery of services or inefficient service delivery to citizens.

Although there is no explicit reference to corruption in the South African E-government vision, a number

of important strategies are in place. To address the specific problems of corruption, Government

launched South Africa’s National Anti-Corruption Programme followed by Public Service and National

Anti-Corruption Summits. Late in 1999, Government also co-hosted the 9th International Anti-

Corruption Conference. At the beginning of 2002, Government adopted the Public Service Anti-

Corruption Strategy.

The e-government vision is informed by the growth and development priorities expressed in Vision 2014

as well as the Millennium Development Goals whereby ICT’s are regarded as an enabler for the

achievement of these goals within a broad and integrated developmental approach, rather than just as

an infrastructure. E-government is firmly seen as an integral pillar for developing a South African

Information Society and within this, e-education, e-health, and the development of small and medium

enterprises within the ICT sector.

****************************************THE END ***************************