Search

Advanced Search

DG, NIC highlighted the need for enhanced User Experience Design during a webinar on Design Thinking

Shashi Kant Pandey, Delhi sk[dot]pandey[at]nic[dot]in
  |   Jun 12, 2020
DG, NIC chairing the webinar on  Designing Products with Accelerated Adoption
DG, NIC chairing the webinar on Designing Products with Accelerated Adoption

Mr. Arun Jain, CMD of Intellect Design Arena Limited discussing various aspects of Design Thinking
Mr. Arun Jain, CMD of Intellect Design Arena Limited discussing various aspects of Design Thinking

Dr. Neeta Verma, Director General, NIC highlighted the need for user-centered design in the development of all eGov applications. She was chairing the webinar on  “Designing Products with Accelerated Adoption” organized by NIC on 12th June 2020.

Stressing upon the need for enhanced User Experience Design requirements for better adoption of eGov applications, she informed that recently a dedicated division namely “User Experience Design and Technology” has been formed at NIC to ensure the adoption and proliferation of best practices related to User Experience Design in the organization. 

Mr. Arun Jain, CMD of Intellect Design Arena Limited discussed the various aspects of Design Thinking and elaborated on the need for its adoption in eGov applications. Mr. Jain was also an invited speaker at the TechConclave2020, an event organized by National Informatics centre at Pravasi Bhartiya Kendra, Chanakyapuri, New Delhi on 22nd January 2020.

The Webinar was attended by NICians across the country. The welcome address was given by Dr. Savita Dawar, DDG, and the Vote of Thanks was delivered by Dr. RK Mishra, DDG.

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...