App Logo

No.1 PSC Learning App

1M+ Downloads
The Organizational Layer in NeGP focuses on:

AHardware, software, and networking.

BMaking services accessible and user-friendly for citizens.

CAdministrative and procedural changes to support e-governance.

DData storage and security.

Answer:

C. Administrative and procedural changes to support e-governance.

Read Explanation:

The Organizational Layer of the National e-Governance Plan (NeGP) focuses on administrative and procedural changes that are necessary to successfully implement e-governance. It's about reforming the government's internal processes to be compatible with technology.

  • Business Process Re-engineering (BPR): This is a core part of this layer. It involves redesigning existing government processes and procedures to remove bottlenecks, reduce paperwork, and increase efficiency. For example, instead of a citizen having to visit multiple offices to get a single certificate, the process is re-engineered so it can be completed online in a single transaction.

  • Capacity Building: This involves training government officials and employees to use new technologies and systems effectively. It ensures that the people who run the government machinery are equipped with the necessary skills to manage the new digital environment.

  • Legal and Institutional Reforms: To make e-governance effective, legal frameworks need to be updated. This includes creating laws for digital signatures, electronic transactions, and data security to provide a legal basis for digital governance.

In short, the Organizational Layer ensures that the human and structural aspects of government are aligned with the technological changes brought by e-governance, allowing the technology to function as intended and deliver services smoothly.


Related Questions:

How does E-governance contribute to transparency?
E-governance simplifies complex procedures by combining technology with what?

What are the key considerations for governments when developing e-governance technologies?

  1. Ensuring the security of user data and preventing fraudulent activities.
  2. Designing systems that are simple and easy for citizens to use.
  3. Balancing strong security measures with user convenience to encourage adoption.
  4. Implementing complex security protocols regardless of their impact on user experience.
    ⁠The database management system is a critical component of:
    ⁠Which of the following is an example of DSS application?