Challenger App

No.1 PSC Learning App

1M+ Downloads
The Organizational Layer in NeGP focuses on:

AHardware, software, and networking.

BMaking services accessible and user-friendly for citizens.

CAdministrative and procedural changes to support e-governance.

DData storage and security.

Answer:

C. Administrative and procedural changes to support e-governance.

Read Explanation:

The Organizational Layer of the National e-Governance Plan (NeGP) focuses on administrative and procedural changes that are necessary to successfully implement e-governance. It's about reforming the government's internal processes to be compatible with technology.

  • Business Process Re-engineering (BPR): This is a core part of this layer. It involves redesigning existing government processes and procedures to remove bottlenecks, reduce paperwork, and increase efficiency. For example, instead of a citizen having to visit multiple offices to get a single certificate, the process is re-engineered so it can be completed online in a single transaction.

  • Capacity Building: This involves training government officials and employees to use new technologies and systems effectively. It ensures that the people who run the government machinery are equipped with the necessary skills to manage the new digital environment.

  • Legal and Institutional Reforms: To make e-governance effective, legal frameworks need to be updated. This includes creating laws for digital signatures, electronic transactions, and data security to provide a legal basis for digital governance.

In short, the Organizational Layer ensures that the human and structural aspects of government are aligned with the technological changes brought by e-governance, allowing the technology to function as intended and deliver services smoothly.


Related Questions:

What is the primary purpose of a Decision Support System (DSS)?
Expert Systems are generally considered a subfield of:

Identify the false statement regarding the security drawbacks of e-governance.

  1. Privilege escalation allows an attacker to gain higher-level access after initial basic access.
  2. Repudiation means a user can confirm a transaction they were involved in.
  3. Spoofing is a method used to gain unauthorized access by impersonation.
  4. Denial of Service (DoS) attacks make e-governance services unavailable to users.
    ⁠Which of the following is a component of MIS?
    ---- refers to the use of digital technology, particularly the internet, to deliver government services, engage with citizens, and streamline administrative processes.