1. Algorithmic Government for the New Intelligent IndiaSaibal K. Pal, Rajan Gupta, 2020, unpublished conference contribution Abstract: Algorithmic Government or Government by Algorithm is an emerging concept introduced around the world. It involves the usage of Data Science and Artificial Intelligence for automation of decision-making by the Government for various services and processes. In some nations, even digitization of governance has not happened, while machines are ready to make decisions on behalf of humans in others. On one hand, many governments struggle to score high on E-Governance Development Index by the United Nations, while on the other hand, some countries are even approving the electoral candidature of AI bots. This brings us to understand how automated decision making is taking place worldwide and how countries can think about achieving it. This research work has three essential things to offer – Introduction to Algorithmic Government, various Algorithmic Government applications, and potential use-cases of Algorithmic Government in India. India is moving towards a new age with the Technology revolution and massive digitization level, so implementing an Algorithmic Government would be apt under different Ministries and schemes. This study would benefit the Government departments, Administrative persons, Technology Enthusiasts, Researchers, Policymakers, Academicians, and Students. Found in: osebi Keywords: Algorithmic Government, Algorithmic Governance, Artificial Intelligence, E-Governance Published: 02.04.2021; Views: 1220; Downloads: 0
Fulltext (669,62 KB) |
2. Impact of Social Media on E-Participation of Citizens towards E-Governance Services in Developing Nations like IndiaSaibal K. Pal, Rajan Gupta, 2019, published scientific conference contribution abstract Abstract: The governments from all around the world are using social media as a platform to engage with the citizens to inform and encourage about the usage of various government services and E-Government portals, as it is fast and cost effective mode reaching to a wide segment of citizens. India, a developing country has also witnessed a rapid rise in social media users over the past few years and therefore the current research study assesses the usage of social media by government departments and their impact on the performance of E-Governance in the country. For this purpose, this study has conducted an exploratory data analysis to assess the impact of various government departments’ number of followers on social networking sites like Facebook and Twitter on number of electronic transactions, using the statistical techniques of trend lines, regression and correlation. It was found that social media and E-transactions are positively correlated to each other up to a moderate extent, and the former significantly affects the latter. The study also suggests the government to use social media as a medium to promote government services and recommends future research works to conduct an extensive study by including other parameters such as the level of interaction between government and citizens on social platform to better understand the concept. This study will be useful for government departments, social media management companies, and various other stakeholders in E-Governance. Found in: osebi Keywords: E-Governance, E-Participation, Social Media, Citizen Engagement, E-TAAL Published: 02.04.2021; Views: 1322; Downloads: 0
Fulltext (734,61 KB) |
3. Data Analytics based Techniques for Improvement of E-Governance in Developing NationsRajan Gupta, 2019, unpublished conference contribution Abstract: United Nation’s E-Governance Development Index is a development assessment index for all the nations around on the E-Governance front. Every country is ranked on the basis of a quantitative parameter derived out of few important components. But such development assessment index is missing at regional level in a country so that regional development can be assessed and work can be monitored. Few countries have local assessment models but are not exhaustive enough which can be used for development assessment and further development plan formation. Therefore, there is a need for this study to develop such assessment framework and develop approaches to have a meaningful contribution in improvement of E-Governance in the country at regional level. After the assessment of the regions on the development front of E-Governance, the improvement techniques must be defined for the weak parameters, so that regional development can be enhanced.
For the experiment purpose, India has been chosen as the experiment country for which datasets has been used from Indian E-Governance transactions. This problem is important to be addressed because an overall quantitative measure of E-Governance development of the country will help in improving overall E-Governance rankings at world level, attract better investors, and will help the government to prepare a more inclusive plan on the development front. Most of the studies in literature are citizen centric and thus are not fit for development assessment. The current study has not only developed a framework but has also analyzed various components related to it in detail and suggested the way ahead for E-Governance in the country Found in: osebi Keywords: E-Governance, Development Assessment, Location Allocation, Intrusion Detection Published: 02.04.2021; Views: 1339; Downloads: 0
Fulltext (932,80 KB) |
4. Fuzzy C-means clustering and particle swarm optimization based scheme for common service center location allocationRajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, original scientific article Abstract: Common Service Centers (CSCs), which are also known as Tele-centers and Rural Kiosks, are important infrastructural options for any country aiming to provide E-Governance services in rural regions. Their main objective is to provide adequate information and services to a country’s rural areas, thereby increasing government-citizen connectivity. Within developing nations, such as India, many CSC allocations are being planned. This study proposes a solution for allocating a CSC for villages in a country according to their E-Governance plan. The Fuzzy C-Means (FCM) algorithm was used for clustering the village dataset and finding a cluster center for CSC allocation, and the Particle Swarm Optimization (PSO) algorithm was used for further optimizing the results obtained from the FCM algorithm based on population. In the context of other studies addressing similar issues, this study highlights the practical implementation of location modeling and analysis. An extensive analysis of the results obtained using a village dataset from India including four prominent states shows that the proposed solution reduces the average traveling costs of villagers by an average of 33 % compared with those of allocating these CSCs randomly in a sorted order and by an average of 11 % relative to centroid allocation using the FCM-based approach only. As compared to traditional approaches like P-Center and P-Median, the proposed scheme is better by 31 % and 14 %, respectively. Therefore, the proposed algorithm yields better results than classical FCM and other types of computing techniques, such as random search & linear programming. This scheme could be useful for government departments managing the allocation of CSCs in various regions. This work should also be useful for researchers optimizing the location allocation schemes used for various applications worldwide. Found in: osebi Keywords: common service centers, tele-centers, e-governance, location allocation, fuzzy C-means clustering, particle swarm optimization Published: 17.02.2021; Views: 1634; Downloads: 0
Fulltext (2,67 MB) |
5. Efficient and secured video encryption scheme for lightweight devicesRajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, original scientific article Abstract: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices. Found in: osebi Keywords: video processing, multimedia encryption, chaotic maps, lightweight device security Published: 01.04.2021; Views: 1302; Downloads: 0
Fulltext (787,85 KB) |
6. Design and analysis of new shuffle encryption schemes for multimediaRajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy. Found in: osebi Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis Published: 01.04.2021; Views: 1270; Downloads: 0
Fulltext (1,06 MB) |
7. Cyber security assessment education for e-governance systemsSunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2020, independent scientific component part or a chapter in a monograph Abstract: Electronic Governance is being rapidly adopted across the world for providing seamless services to citizens. With rising digitization of information resources, the threats to the infrastructure and digital data are also growing. For developed nations, the security parameters and optimization processes are well tested and placed, but for developing nations these are yet to be addressed strongly. There is also a need for imparting awareness and educating personnel involved in the development and operations of E-Governance Systems.
This study proposes a framework for security assessment amongst the departments of E-Governance, based on Information Systems principles. The major areas of security covered in the framework are related to the Hardware, Network, Software, Server & Data security, Physical Environment Security, and various policies for security of Information Systems at the organizational level. The suggestive framework has also been tested for an organization in India. It was found that, given the functionality & magnitude of the organization, the assessment framework was able to analyze the strength and weakness of an organization in an exhaustive manner. The coverage of technological and organizational measure was found to be 69% and 53% respectively and the organization was placed in top two zones of the proposed grid. This study will be useful for security assessment of various organizations operating under E-Governance. Found in: osebi Keywords: e-governance, cyber security education, information systems security, developing nations, security framework Published: 31.03.2021; Views: 1416; Downloads: 9
Fulltext (0,00 KB) This document has many files! More...
|
8. Data analytics for better branding of e-governance and e-business systemsSunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2020, independent scientific component part or a chapter in a monograph Abstract: Efficient e-governance leads to stronger democracy which can be achieved through higher trust, visibility, and transparency in the system, which can be acquired through effective branding. Various techniques of data analytics can help in achieving trust
and transparency in the system. The objective of the study is to resolve various issues in the public sector through analytics-based improvement of different parameters of branding, namely, communication, consistency, clarity, and competition. The research design of the study is a combination of both qualitative and quantitative techniques like descriptive statistics. The main techniques emerged for data analysis includes rating and ranking analysis of government apps, social media analytics, text and
speech analytics, media analytics, statistical analytics and data mining, telecom analytics, and people demographics for government programs. It was found that the “Digital India” campaign under e-governance initiative was highly successful based on different kinds of analytical methods found in the study. Found in: osebi Keywords: e-governance, data analytics, e-business, business systems, information systems, government campaigns, branding Published: 31.03.2021; Views: 1388; Downloads: 10
Fulltext (0,00 KB) This document has many files! More...
|
9. Learning and developing with each otherRajan Gupta, Saibal K. Pal, 2020, independent scientific component part or a chapter in a monograph Abstract: ICT is a powerful tool which can be used by both India and Canada to harness the growth and development in the respective regions. Researchers and practitioners can come together from Indo-Canadian communities and take the association to a more meaningful level. The current research discusses the ICT tools that can be adopted from Canada by India to improve the education quality and knowledge transmission. On the other hand, Canada government can make efforts to enhance knowledge transfer and translation through ICT by adopting tools like best practices
repository, communities of practice, corporate intranet/extranet, corporate yellow pages, expertise locator, online chat/instant messaging, knowledge portals, groupware-workflow and tracking system, and document/content management that are already used in India. ICT has the potential to develop the country politically,
socially, and economically. Found in: osebi Keywords: e-governance, information technology, communication technology, India, Canada, innovation, knowledge transfer Published: 31.03.2021; Views: 1566; Downloads: 7
Fulltext (0,00 KB) This document has many files! More...
|
10. Citizen relationship management by the Government of India through social media channelsSunil K. Muttoo, Saibal K. Pal, 2018, independent scientific component part or a chapter in a monograph Abstract: This chapter outlines how Citizen Relationship Management (CRM), a concept derived from the more commonly known Customer Relationship Management, can enable a government to create awareness among citizens about the myriad of services provided by the public sector. The system also helps in attracting and recording responses from the citizens, thereby enabling government employees in responding to citizens’ concerns via social media. Found in: osebi Keywords: citizen relationship management, e-governance, social media, politics, data science Published: 31.03.2021; Views: 1422; Downloads: 0
Fulltext (1001,38 KB) |