Search

Advanced Search

Mobile e-Governance Initiative of Bihar Bags "Award of Excellence" in CSI-Nihilent e-Governance Awards

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Dec 7, 2015
Sh. Rajesh Kumar Singh, SIO Bihar and Sh. Shailesh Kr. Shrivastava, TD receiving award
Sh. Rajesh Kumar Singh, SIO Bihar and Sh. Shailesh Kr. Shrivastava, TD receiving award

Bihar has won "Award of Excellence" in CSI Nihilent e-Governance Awards 2014-15 for Mobile e-Governance Project "Mobile based Digital Asset Register". The award was presented on Thursday, 3rd December 2015 at New Delhi as part of Computer Society of India 50th Golden Jubilee Annual Convention (CSI 2015).  
The Project is a joint initiative of Information Technology Department, Govt. of Bihar and National Informatics Centre, Bihar. The project allows capturing geo-tagged time stamped photograph along with physical and financial progress details from work-site. The m-Governance framework of Government of Bihar aims to utilize the massive reach of mobile phones and harness the potential of mobile applications to enable easy and round-the-clock access to public services, especially in the rural area.
This project has been conceived to establish mobile framework for monitoring of the building projects, road projects, plantations, nursery, health facilities, electricity network, to strengthen asset management, project management and other related functions for improved planning & execution mechanism. It has been envisaged deploying a software solution using I-pad/ tablet/ Mobile phones so that requisite information / photos / videos from work site can be captured and populated in the centralized system as well as the existing MIS software.
The MIS reporting solution envisages a centralized computer/ server system, which is capable to be used for collection of various data from field units either through the use of web application or using the medium of mobile SMS/GPRS/ 3G.  
The application is capable of generating the compiled MIS reports with detailed analytics.  It provides Analytical Dashboards with various types of graphs, charts & diagrams from the real time data, display of vital information in the form of Tickers on the portal for top management.  Senior officers’ can view summary daily/ weekly/ monthly reports, State-wise/ Project-wise/ Location wise reports etc. on their desktop or mobile phone.  
The project has been completed under active guidance of Dr. S. Siddharth, IAS, Secretary, Information Technology, Govt. of Bihar and  NIC team involving Sh. Rajesh Kumar Singh, State Informatics Officer and Sh. Shailesh Kumar Shrivastava, Technical Director & Project Co-ordinator & team members.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...