CSI Communications - CiteSeerX

52
CSI Communications Knowledge Digest for IT Community Information Security » Hardware and OS Security – Defense in Depth 31 IT Act 2000 » Types of Cyber Crimes & Cyber Law in India 33 ISSN 0970-647X | Volume No. 35 | Issue No. 8 | November 2011 ` 50/- www.csi-india.org ICT news briefs in October 2011 34 People centric BI and KM: Relationship and Integration 35 Personal Information Management 38 Thirty Years of e-Governance in CSI 6 e-Governance: Experiences from a few Indian States 11 Collaborative IT implementation for Better Governance 17 Security and Privacy Challenges in Telemedicine 20 Incidents of Cloud Computing Failure 24 Innovation.wizard() » iCon in Remembrance : Steve Paul Jobs 25 In remembrance: Dennis M. Ritchie, the father of C and co-creator of Unix 26 Programming.Learn(Perl) » Perl & Database Connectivity 27 IT Strategy Nuances » Hard Technology; Soft Social Underbelly!!! 28

Transcript of CSI Communications - CiteSeerX

CSI CommunicationsKnowledge Digest for IT Community

Information Security »

Hardware and OS Security –Defense in Depth 31

IT Act 2000 »

Types of Cyber Crimes & Cyber Law in India 33

ISSN

097

0-6

47X

| V

olum

e N

o. 3

5 |

Issu

e N

o. 8

| N

ovem

ber

2011

`

50

/-w

ww

.csi

-ind

ia.o

rg

Digital government

ICT news briefs in October 2011 3 4

People centric BI and KM: Relationship and Integration 35

Personal Information Management 3 8

Thirty Years of e-Governance in CSI 6

e-Governance: Experiences from a few Indian States 11

Collaborative IT implementation for Better Governance 17

Security and Privacy Challenges in Telemedicine 20

Incidents of Cloud Computing Failure 24

Innovation.wizard() »

iCon in Remembrance : Steve Paul Jobs 25

In remembrance: Dennis M. Ritchie, the father of C and co-creator of Unix 26

Programming.Learn(Perl) »

Perl & Database Connectivity 27

IT Strategy Nuances »

Hard Technology; Soft Social Underbelly!!! 28

Partnership Opportunities CSI  2011  welcomes  partnership  from  ICT  companies,  Institutes, Universities, Government / Semi Government departments, PSU etc.  All  contributions will be used directly  to ensure  greater quality of convention.   Various  partnership  schemes  are  available  on    www.csi‐2011.org/sponsors.htm  

      

       

     

Associated Organizations / Sponsors 

▪ Bhadra Kali Temple & Fort ▪ Gandhi Ashram ▪ Hatheesing Jain Temple ▪ ISCON Temple ▪ Kankaria Lake ▪ Calico Museum of Textile ▪ Adalaj Vav (Step Well) ▪ Dada Hari Vav (Step Well) 

Explore Ahmedabad and Gujarat ▪ Jumma Masjid ▪ Jhulta Minara ▪ Hotel Patang ▪ Kite Museum ▪ Tribal Museum ▪ Vishalla Museum ▪ Amar Dham ▪ Shahibaugh Palace 

▪ Thol Bird Sanctuary▪ Akshardham Temple ▪ Vaishnodevi Temple ▪ Tirupati Temple ▪ Indroda Park ▪ Ambaji Temple ▪ Gir Lion Sanctuary ▪ Sardar Sarovar 

Registration (Fees in INR) In  addition  to providing  entryto  the  entire  duration  of  theprogramme,  the  cost  alsoincludes  lunch  on  all  threedays  of  the  Conference,  andtwo‐three  tea breaks per day.You  will  also  be  provided  adelegate kit.  

▪ More than 900 Delegates ▪ Insight by more than 40 speakers in 5 tracks ▪ Focus on Innovation, Research & Development ▪ Representatives from State/Central Government ▪ Participation by CEOs, CIOs, CTOs & IT Management Personnel ▪ Thought leadership for transformation of business & society ▪ ICT Roadmap for India’s socio‐economic growth  ▪ Innovative solutions for cost‐effective organizational transformation ▪ Representatives from Indian / Foreign Universities  

Highlights of the Convention 

Write to us at: info@csi‐2011.org For details log on to: www.csi‐2011.org 

▪ Pre Convention International Conferences on 1. IT Security 2. Grid & Cloud Computing  

▪ Pre Convention Tutorials on 1. Sensor Networks: Design to Deployment  2. ICT for Education 3. Cloud Computing  

▪ Ph. D. Scholars’ Colloquium ▪ Patent & Innovation Presentation ▪ Paper Presentations during Convention ▪ Special Invited Talks / Sessions ▪ Panel Discussions ▪ Live Demonstrations 

▪ Tracks on VC Funding for ICT,     Societal Application,     Safety & Security    Enterprise Resource Planning     Education, Mobile Application    Advanced Technology ▪ Special Tracks on     eGovernance Awards,    IT Excellence Awards,    Young IT Professionals Awards

Key Events of the Convention 

For group registration call Convention Secretary.  For online/manual registration log on www.csi‐2011.org 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

   

Eminent Speakers

 

A K Aggarwal, VC Gujarat Technological  University   

A S Kiran Kumar  Associate Director SAC/ ISRO, Ahmedabad 

Ajit Narayan  Founder Chairman Invention Lab (Avaz) 

Arup Dasgupta Managing Editor GEOSPATIAL WORLD 

Gulshan Rai Director General, ICERT GOI   

Hemal Patel, CEO, Elitecore Technologies Ltd. 

James Thurston  Sr. Strategist ‐ Policy & Standards, Microsoft   

John William Walz President (Elect.) IEEE Computer Society 

 

K S Dasgupta Director, IIST  Thiruvananthapuram   

Lalit Sawhney  Vice President,  IFIP  

 

M M Saggi Nautical Advisory Government of India   

Nipam Shah,Founder and MD,  NRS Advisors Pvt. Ltd 

 

Nilay Yajnik, Professor & Chairman, IS NMIMS, Mumbai   

Niru Mehta Chief Executive Officer AttendByVideo 

 

P K SrivastavaManaging Director GSDL  

Paul Nicholas Director Global Security Strategy & Diplomacy, Microsoft

Pratap Reddy IGP, Karnataka   

Pratul Shroff,  Founder & CEO, eInfoChips 

Shri R Chandrashekhar Secretary, DIT and DoT Government of India 

 

R S Mani Sr. Technical Director, NKN 

R S Sharma DG &  Mission Director,  Aadhar   

Rajat Moona  Director General CDAC 

Rajendra Singh Pawar  Chairman,  NASSCOM   

Ranbir Singh  Group Director & Head Public Sector, Microsoft 

S Ramakrishanan Former Director General CDAC   

Sanjay Bahl  Chief Security Officer  Microsoft Corporation 

Sam Pitroda Chairman  National Knowledge Commission, GOI.  

Satish Babu  Vice President,   CSI  

Shankar Narayanan MD, Carlyle Group   

Sorel ReismanPresident IEEE Computer Society 

Subhash Bhatnagar  Distinguish Professor IIM Ahmedabad   

Sunil Kakkad,CMD,  SIS, Ahmedbad 

Uday Desai Director,  IIT, Hyderabad   

Vakul Sharma  Sr. Advocate Supreme Court of India 

Contact Convention Secretary, CSI‐2011Computer Society of India Ahmedabad Chapter 201, Centaur Bldg., Nr. Vijay Cross Roads, Navrangpura, Ahmedabad – 380 009 Email: cs@csi‐2011.org | Mobile: +91 96626 40500 

Computer Society of India 46th Annual National Convention 2011 Host: Ahmedabad Chapter  December 1–3, 2011Venue: Ahmedabad Mgmt Association, Ahmedabad

Register Now 

Computer  Society  of  India  invites  you  to  join  one  of  the  premier  IT‐Federation  meet  “CSI‐2011|  46th  Annual  National  Convention  of  CSI”.  It would be a unique platform for sharing of knowledge, challenges,  ideas and best practices amongst the various stakeholders driving ICT initiatives. 

Invitation for CSI‐2011: 46thAnnual National Convention

Its Now or Never

Categories  Up to 15 Nov  After 15 Nov Members CSI/GESIA  5000  6000 Non Members CSI/GESIA  6000  7000 Academician Researcher  4000  5000 Student  1500  2000 Accompanying Spouse  3000  3500 

CSI Communications | November 2011 | 1

ContentsVolume No. 35 • Issue No. 8 • November 2011

Cover Story

6 ThirtyYearsofe-GovernanceinCSI DVRVithal,RKBaggaandKSVijayaSekhar

11 e-Governance: ExperiencesfromafewIndianStates RajuNarayanaSwamy

Technical Trends

17 Collaborative IT implementation for Better Governance DebasisMullick

Research Front

16 Security and Privacy Challenges in Telemedicine SainiDasandArunabhaMukhopadhyay

Article

24 Incidents of Cloud Computing Failure KSudheerKrishna

CSI Communications

Editorial Board

Chief EditorDr. R M Sonar

EditorsDr. Debasish JanaDr. Achuthsankar Nair

Resident EditorMrs. Jayshree Dhere

AdvisorsDr. T V GopalMr. H R Mohan

Published byExecutive Secretary Mr. Suchit GogwekarFor Computer Society of India

Please note:CSI Communications is published by Computer Society of India, a non-profit organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions.

Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors’ content.

© 2011 CSI. All rights reserved.

Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited.

PLUSAGM Notice

32

Happenings@ICT: ICT news briefs in September 2011HRMohan

34

ICT@ Society : Personal Information ManagementAchuthsankarSNair

38

Brain Teaser DebasishJana

39

Ask an Expert DebasishJana

40

CSI Report : CSI e-Ratna Award to Shri. Narendra Modi, Chief Minister, GujaratBipinMehta

41

CSI News 45

Practitioner Workbench

25 Innovation.wizard() » iCon in Remembrance : Steve Paul Jobs

26 In remembrance: Dennis M. Ritchie, the father of C and co-creator of Unix Dr.DebasishJana

27 Programming.Learn(Perl) » Perl & Database Connectivity AchuthsankarS.Nair&KashyapChhatbar

Security Corner

31 Information Security » HardwareandOSSecurity– DefenseinDepth AvinashWKadam

33 IT Act 2000 » TypesofCyberCrimes&CyberLawinIndia PrashantMali

CIO Perspective

28 IT Strategy Nuances » Hard Technology; Soft Social Underbelly!!! AnilVVaidya

HR

35 PeoplecentricBIandKM: Relationship and Integration Dr.RMSonar

CSI Communications | November 2011 | 2 www.csi-india.org

Know Your CSI

Executive Committee (2011-12/13) »President Vice-President Hon.SecretaryMr. M D Agrawal Mr. Satish Babu Prof. H R Vishwakarma [email protected] [email protected] [email protected]

Hon.Treasurer Immd.PastPresidentMr. V L Mehta Prof. P [email protected] [email protected]

Nomination Committee Members (2011-2012)

Prof. (Dr.) A K Nayak Mr. P R Rangaswami Mr. Sanjay K Mohanty

Regional Vice-Presidents

Region-I Region-II Region-III Region-IVMr. R K Vyas Prof. Dipti Prasad Mukherjee Mr. Anil Srivastava Mr. Sanjay MohapatraDelhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh, Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas inUttar Pradesh, Uttaranchal and and other areas in in Western India Central & Southother areas in Northern India. East & North East India Eastern India

Region-V Region-VI Region-VII Region-VIIIProf. D B V Sarma Mr. C G Sahasarabudhe Mr. Ramasamy S Mr. Jayant KrishnaKarnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry, International Members Andaman and Nicobar, Kerala, Lakshadweep

Division Chairpersons

Division-I:Hardware(2011-13) Division-II:Software(2010-12) Division-III:Applications(2011-13)Dr. C R Chakravarthy Dr. T V Gopal Dr. S Subramanian [email protected] [email protected] [email protected]

Division-IV:Communications Division-V:EducationandResearch(2010-12) (2011-13)Mr. H R Mohan Dr. N L Sarda [email protected] [email protected]

Important links on CSI website »Structure&Organisation http://www.csi-india.org/web/csi/structureNational,Regional& http://www.csi-india.org/web/csi/structure/nscStateStudentsCoordinatorsStatutoryCommittees http://www.csi-india.org/web/csi/statutory-committeesCollaborations http://www.csi-india.org/web/csi/collaborationsJoinNow- http://www.csi-india.org/web/csi/joinRenewMembership http://www.csi-india.org/web/csi/renewMemberEligibility http://www.csi-india.org/web/csi/eligibilityMemberBenefits http://www.csi-india.org/web/csi/benifitsSubscriptionFees http://www.csi-india.org/web/csi/subscription-feesFormsDownload http://www.csi-india.org/web/csi/forms-downloadBABAScheme http://www.csi-india.org/web/csi/baba-schemePublications http://www.csi-india.org/web/csi/publicationsCSICommunications* http://www.csi-india.org/web/csi/info-center/communicationsAdhyayan* http://www.csi-india.org/web/csi/adhyayanR&DProjects http://www.csi-india.org/web/csi/47TechnicalPapers http://www.csi-india.org/web/csi/technical-papersTutorials http://www.csi-india.org/web/csi/tutorialsCourseCurriculum http://www.csi-india.org/web/csi/course-curriculumeNewsletter* http://www.csi-india.org/web/csi/enewsletterCurrentIssue http://www.csi-india.org/web/csi/current-issueArchives http://www.csi-india.org/web/csi/archivesPolicyGuidelines http://www.csi-india.org/web/csi/helpdeskEvents http://www.csi-india.org/web/csi/events1President’sDesk http://www.csi-india.org/web/csi/infocenter/president-s-deskExecComTransacts http://www.csi-india.org/web/csi/execcom-transacts1News&Announcementsarchivehttp://www.csi-india.org/web/csi/announcements

CSI Divisions and their respective web links Division-Hardware http://www.csi-india.org/web/csi/division1DivisionSoftware http://www.csi-india.org/web/csi/division2DivisionApplication http://www.csi-india.org/web/csi/division3DivisionCommunications http://www.csi-india.org/web/csi/division4DivisionEducationandResearchhttp://www.csi-india.org/web/csi/division5

List of SIGs and their respective web linksSIG-ArtificialIntelligence http://www.csi-india.org/web/csi/csi-sig-aiSIG-eGovernance http://www.csi-india.org/web/csi/csi-sig-egovSIG-FOSS http://www.csi-india.org/web/csi/csi-sig-fossSIG-SoftwareEngineering http://www.csi-india.org/web/csi/csi-sig-seSIG-DATA http://www.csi-india.org/web/csi/csi-sigdataSIG-DistributedSystems http://www.csi-india.org/web/csi/csi-sig-dsSIG-HumaneComputing http://www.csi-india.org/web/csi/csi-sig-humaneSIG-InformationSecurity http://www.csi-india.org/web/csi/csi-sig-isSIG-Web2.0andSNS http://www.csi-india.org/web/csi/sig-web-2.0SIG-BVIT http://www.csi-india.org/web/csi/sig-bvitSIG-WNs http://www.csi-india.org/web/csi/sig-fwnsSIG-GreenIT http://www.csi-india.org/web/csi/sig-green-itSIG-HPC http://www.csi-india.org/web/csi/sig-hpcSIG-TSSR http://www.csi-india.org/web/csi/sig-tssr

Other Links -Forums http://www.csi-india.org/web/csi/discuss-share/forumsBlogs http://www.csi-india.org/web/csi/discuss-share/blogsCommunities* http://www.csi-india.org/web/csi/discuss-share/communitiesCSIChapters http://www.csi-india.org/web/csi/chapters

* Access is for CSI members only.

Important Contact Details »For queries, announcements, correspondence regarding Membership, contact [email protected] any other queries, contact [email protected]

CSI Communications | November 2011 | 3

I welcome your participation in the technical deliberations and discourse at the 46th Annual National Convention at Ahmedabad, CSI 2011 – ict 4 u and Annual South East Asia Regional Confederation Conference in Mumbai SEARCC 2011 – i Growth

These conferences will provide excellent opportunity for technical updates and networking.

Through technical programs and events, abundant opportunities are being provided by CSI for sharing technical knowledge and providing rich platform of deliberations and debates on facets of IT, its implications and impact, thus weaving a networking bond among participants. CSI organizes over 100 technical workshops and seminars in a year in different parts of country, thanks to the endeavour of our passionate members.

CSI Promotion for best usage of ICT for Masses: CSI has embarked on recognition for excellence in IT and promoting mission of rightful use of ICT for betterment of society by motivating individuals and leaders in their pioneer role in deploying ICT for empowerment and transformation of society. CSI took great pride in conferring “CSI E Ratna“ award to Gujarat State Chief Minister, Mr. Narendra Modi at the inaugural function of E-Governance, twin E-governance International Conferences ICEG-2011 and KSS-2011, jointly held by Gujarat government and CSI at Ahmedabad on 17th Oct, 2011. Mr. Modi, in his speech, vividly presented his good knowledge about power of ICT and E-Governance and his leadership role in bringing about transformation in government administration through ICT and E- governance solutions. As in corporate, leadership at Top matters, so is the case for Government , matters for bringing good benefits for Business, Customers and Citizens. With introduction of CSI E Ratna award for implementation of ICT & E government projects for societal and administrative transformation especially with winning track of more than 2 CSI E-Nihilent award. Our appreciation of the pioneering role of Mr. Ravi Saxena, Additional Chief Secretary and team of Dr. Nita Shah, Dr. Ashok Agrawal & Dr. Bagga for organizing these twin international conferences.

Centre of Excellence of e-Governance : Government sector is a big implementer of ICT solutions. Proposals have to be considered to offer short-term and mid-term education programs related to subjects of e-Governance and ICT solutions for inclusive growth. CSI can play a major role in building knowledge repository and social networking chain on promoting standards and good practices of e-Governance projects being undertaken by different States and solution providers. I am pleased to inform you that our e-Governance SIG has started exploring idea of Centre of Excellence. Collaboration with National e-Governance – ngep plan of Ministry of IT and institutes like NISG can also be explored. My special thanks to Dr. Bagga and Mr. Mohan Datar for starting a working group. I foresee, with e-Government. programs, chapters will have opportunity of new type of programs targeting government segments. We need to form a dedicated expert group to work out a plan.

Innovation Impact : Scientific innovations and discoveries create new knowledge base for development of new products, solutions and services for transforming life of masses and providing a world of living in comfort with new technologies. Computer World recently lost two great scientists - Steve Jobs, and Dennis Ritchie - both known for their pioneer research and pursuits of

innovative product developments. Dennis Ritchie along with Ken Thomson developed operating system Unics (later Unix), kernel of which became base system for many other innovations and developments like Apple OS X distribution of Unix, built on Berkeley 4.3 BSD – the operating system that now powers every Apple product. Steve Jobs developed products right from ipods to ipad2, one of the finest embedded devices offering new meaning to using technology in business and personal life. Success of these great scientists is a result of individual genius and support from industry for their creativity. We salute to them for their grand motivation and the achievements . CSI programs shall promote research and innovation likings among youngsters.

During discussions in last ExecCom, it was decided to design special workshops to promote research as career. I suggest, success stories of these great scientists shall be part of these symposiums for motivation and mentoring to youngsters. Proposals may be invited for formation of a group of volunteers, who shall work for these programs. I would request Director Education setup to initiate this exercise. Already Director education is involved in providing assistance for selected mini research projects.

Organizing of Olympiad in collaboration with Government Research organization is another good avenue. DST proposal of drafting a white paper for development of research eco system in IT, shall address these aspects. I am hopeful of study started under guidance of Prof. Shyamsunder, Our Publication Committee chairman for drafting this report.

Industry Academia workshops : There is good opportunity of building alignment between industry and Academia. Industry experts shall be involved in teaching at education institutions and imparting technical programs on subjects of industry use, academicians shall be invited by Industry to impart quality education upgrades. Joint Phd Programs with industry by education institutions is also a good option.

Last year, we had commenced a special drive of organizing industry focus programs for students and faculty development programs for a section of faculty. A list of 15 nos. of technical workshops was finalized by Prof. Mini, convener of skill development cell at CSI. We had entered into MOUs with Microsoft Corporation, CDAC, DOEACC, PMI and with few other organizations for organizing joint programs and workshops. Implementation of these Industry academia interaction programs require meticulous planning and coordination. Director Education shall form plans with help of Student co-ordinators & Industry. Developing a pool of 1000 speakers will help this task.

First success news about industry academia interaction programs came from Karnataka state-level Student Co-ordinator, Mr. Sabapathy, who with the help of industry, meticulously planned and organized faculty development programs and technical workshops at each student branch. My hearty congratulations to Mr. Sabapathy and team in Karnataka for this

President’s Message M. D. Agrawal

From :[email protected] :President’sDeskDate :1stNovember,2011

Dear Friends

CSI Communications | November 2011 | 4 www.csi-india.org

dedication and focused. Already more than 12 no. of workshops have been organized and many more are in the pipeline. Role of all India student co-ordinator, Mr. Ranga Raj Gopal has also been very helpful. We shall get similar success stories from other student co-ordinators. Director Education holds an important role in this exercise of co-ordination and arranging back-office support for maintaining continuity and growth. In the forthcoming months, it is necessary to put in dedicated efforts in realizing better implementation of these schemes.

Start of CSI Certification Programs : Mumbai Chapter has initiated a study panel and formed academic council of seniors for designing CSI certification programs. Mr. Srinivas Eranki, project consultant, informed that first certification program will be based on Industry requirement for IT service management. A 5 day program capsule is being designed by a core team of Industry specialists under guidance of Mr. Venkat Rajaraman, Vice President of NSE.IT. The plan is to have certificate at stream level called CSICP-CSI Certified Professional with specialization in a particular stream. 8 IT and Business streams are being designed. To begin with team intends to start first IT Infrastructure Management Stream and the first module (out of total 7 modules and 60 hours of teaching) being piloted on subject of IT service management (8 hours teaching) which will cover providing IT Support to users effectively. First pilot workshop is likely to be conducted on 20th Nov, 2011.

There is no shortage of quality resources, it is just a matter of building an organization structure and development of a sustainable model based on industry needs. World wide Professional bodies like ACS, BCS, SCS offer similar kinds of certification programs. These are also good source of revenue and help professionals to upgrade their skills at affordable price. Similar exercise can be started at other chapters , where experts from local institutes and industry shall get involved in designing of CSI certification courses. There is a need to define CSI standards for these programs. A beginning is done by Mumbai Chapter. Many hearty good wishes to Chapter committee for supporting this initiative.

Membership to Professionals and Corporates : Offering kind of professional oriented certification courses and technical workshops, there is good scope of membership growth. A new scheme is being introduced whereby an attendee who is not CSI member, will be offered membership after attending CSI paid programs. This scheme will help for growth of membership and generate loyalty among participants for CSI.

Support from Past Presidents & research veterans: CSI is grateful for the continuous support from our Past Presidents. Recently Dr. F C Kohli (Chairman on the Board of Governors of COEP) devised a methodology for up-gradation of undergraduate engineering education for promoting IIT like standard education at other Tier I institutes of India. Three-tier approach involves comparison and gap analysis with IIT, Mumbai curriculum, training of faculty by faculty of IIT Bombay and live lectures by IIT Mumbai using 2 MBS leased link for 3rd and 4th year engineering students.

College of Engineering at Pune was chosen for the Pilot. Gratifying result that this year around 600 students graduating

at college of engineering, Pune, will be equivalent in knowledge and performance to that of IIT Bombay. Outcome of study is being shared at CSI web site. Pune Prototype is now ready and can be considered for implementation at other 50-60 colleges at State and National level, whereby the country can produce 30000 to 40000 world class undergraduates instead of 3000-4000 (at present) produced by IITs and some other similar institutions.

For helping education standards in India, CSI may get involved in promoting of this methodology with the help of industry and premier institutes. Our Student branches network will be a great help in execution. Dr. N L Sarda, Div. Chairman Education & Research has already written to IIT Bombay to make available their online lecturers to CSI student branches. We need to form a core committee to draft an approach paper and seek Dr. Kohli’s help for wider acceptance from Ministry and industry.

Dr. Rattan Datta, Past President is promoting IFIP Seminars; he has already motivated few individuals to organize IFIP seminars. Mr. Vineet Kumar, Crompton Greaves, Dr. Pardarsani, IFIP TC 5 chair, Dr. Swarnlata, DIT have written to me for initiating few workshops and seminars.

Our Research Committee Chairman, Prof. Rajeev Sangal has already initiated process to have collaboration of organizers of 8 no. research conferences of academic community and industrial research applications. I am quite hopeful of good impact of these initiatives. This calls for a good organization and back office support by CSI.

Soon we need to start appointing Regional Managers, who can be involved to support these initiatives in execution. We need to develop a good revenue model to sustain and grow. A class chapter shall attempt to organize a National level seminar on subject of importance and help to generate additional revenue for organization built-up. Surplus out of events and seminars from regions and chapters shall be used to support these additional expenses.

End of Year : November & December 2011 are high activity months for CSI. National Elections, Multiple National and International conferences (about 10 nos.) ,AGM, Awards and Recognitions. This calls for good synergy and effective governance. Some of the on-goings projects and plans elaborated in my last month’s message shall also see light of the day. I am hopeful that in the coming months, with your support and involvement, CSI will see good vibrancy and interests among stakeholders.

I welcome Mr. Deepak Aghinotri who has recently joined CSI HQ as Chief Operating Officer. He shall help for putting foundation of a good governance structure at HQ and help to build good membership base. We need to start dedicated plans for membership growth and to know our new members. It may be good idea to use principles of CRM.

Let us enjoy the journey of building CSI as a vibrant professional body with a strong mission and vision. Your support will be invaluable.

Jai hind!

With love,

M D Agrawal

CSI Communications | November 2011 | 5

Editorial Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree DhereEditors

Dear Fellow CSI Members,

Diwali festive season is just over and it’s pleasure to bring to you one more issue of November 2011 with cover story on e-Governance continued. We already informed you earlier about the enthusiastic response to our requests for contributions on the topic of e-Governance, from members as well as from SIG– e-Governance. This overwhelming response prompted us to extend the cover story topic to this month as well.

While continuing to bring to you different aspects of the e-governance topic, we are glad to bring to you a cover story by Dr. DVR Vithal, Dr. R K Bagga and Dr. K S Vijaya Sekhar titled ‘Thirty Years of e-Governance in CSI’ detailing CSI’s own story. The long article tells in depth evolutionary steps in the history of CSI staring from its formation way back in 1965 till today. Initial 15 years are termed as awareness era and activities in later 30 years are detailed out in depth. The article concludes with suggestive future steps indicating where to go from here and winds up with a note on professionalism in CSI.

The other cover story is about ‘e-Governance: Experiences from Few Indian States’ by Mr Raju Narayana Swamy, Secretary to Government of Kerala. It provides results of assessment of e-Governance projects implemented in three states viz. Gujrat, Madhya Pradesh and Tamil Nadu and concludes with suggestions for making such implementations successful.

Technology Trends features an article on “Collaborative IT Implementation for Better Governance” written by Mr. Debasis Mullick. While identifying the importance of addressing change management requests as integral part of IT enabled systems, the article suggests a collaborative implementation approach with holistic focus which touches various operational boundaries.

Research Front section presents you an article by Ms. Saini Das and Dr. Arunabha Mukhopadhyay of IIM, Lucknow, on “Security and Privacy Challenges in Telemedicine”. While it is important to preserve the confidentiality, integrity and availability of electronically stored medical records of patients in order to make it available when required, the article explores various

…Recently we witnessed demise of two revolutionary computer visionaries of our times viz. Steve Paul Jobs and Dennis M. Ritchie. Practitioner Workbench has a section titled Innovation.Wizard(), where we memorise these two stalwarts whom the computer world will miss for ever.

Identification of threats is an important initial step in designing the control measures for preserving the electronically stored data and hence the article concludes with suggestive control measures and vulnerabilities which continue to exist.

threats to such data. Identification of threats is an important initial step in designing the control measures for preserving the electronically stored data and hence the article concludes with suggestive control measures and vulnerabilities which continue to exist.

A short article by K Sudheer Krishna highlights certain vulnerabilities of cloud computing by highlighting some recent ‘Incidents of Cloud Computing Failure’. Under CIO Perspective, Dr. Anil Vaidya, in his series of articles on IT strategy, writes in this issue on “Hard Technology: Soft Social Underbelly!!!” His

article stresses upon the reciprocity between technology and social factors and the artificial duality.

In HR section, Dr. Sonar’s article focuses on how BI and KM are both people centric and people are the key. He explains how these two are related by defining intelligence and advocates integrated view rather treating them separately. In the column titled ‘Security Corner’, Mr. Avinash Kadam writes about Information security with special emphasis on security of Hardware and Operating Systems. In the IT Act 2000 section of the Security Corner, Advocate Prashant Mali writes about The IT Act 2000, wherein he gives details of various cybercrimes and their respective legal aspects and punishment.

Recently we witnessed demise of two revolutionary computer visionaries of our times viz. Steve Paul Jobs and Dennis M. Ritchie. Practitioner Workbench has a section titled Innovation.Wizard(), where we memorise these two stalwarts whom the computer world will miss for ever. In fact, by the time we have finished content preparation for this issue of CSIC, we heard another sad demise of John McCarthy who had invented the programming language Lisp and coined the term ‘artificial intelligence’ (AI). Programming.Learn(Perl) section of the Practitioners Workbench column deals with Perl and database connectivity.

As usual, there are regular features such as Brain Teaser, ICT@Society, Ask an Expert, Happenings@ICT and CSI News. This time we are not bringing out ‘On the Shelf!’ feature and also the new feature called ‘Quiz’ due to shortage of space. Answers to October 2011 quiz qill be provided in the December 2011 issue along with a new quiz. In the meantime, you may send your answers to October 2011 Quiz to [email protected].

We thank all those, who have sent contributions for the issue as well as those, who have sent their valuable feedback on the previous issues. Please note we welcome your feedback and suggestions at [email protected]. And last, but not the least, we welcome your contributions in various columns and sections for CSI Communications. A fresh call for contributions which highlights the cover topics of future issues is published in this issue.

With warm regards,

Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree DhereEditors

CSI Communications | November 2011 | 6 www.csi-india.org

Cover Story

Thirty Years of e-Governance in CSI

DVR Vithal*, R K Bagga** and K S Vijaya Sekhar**** CSI Fellow e-mail: [email protected]** Advisor, Outreach Division, IIIT-Hyderabad e-mail: [email protected]*** Research Associate, IIIT-Hyderabad e-mail: [email protected]

Forefathers’ Dream of IndiaOur forefathers gave their all to win

political freedom for our country. Their dream of an India in which the poorest of the poor shall feel it is their country and in whose making they have an effective voice; women will have the same rights as man; neither exploiting nor being exploited; will have the smallest army and no police but only santhi sainiks, remains largely a dream. Unemployment, corruption gender and caste insensitivity are major problems that beset our country. People in rural areas waste their energies as they have no regular and fulltime work. The land problem is fundamental. The unemployment and underemployment bring about physical deterioration and undermine mental and physical capacities. The absence of the village communities having opportunities to develop their social, economic, political, cultural life in accordance with their own ideas and aspirations, results in the increasing authority of the state. Ineffective governance breeds corruption. Strong Jan Shakti will keep government in balance. To think everything will be done by the government is very wrong and even dangerous. Recent agitations on Lok Pal Bill by Anna Hazare brought to light the weakness of our present political dispensation. The effort of our legal and parliamentary democracy in starting serious investigations against the powerful political/corporate lobby is yet to yield results. In such a scenario, the question to our nearly 50 years old professional society, the Computer Society of India (CSI) is what is its contribution to Governance in general and eGovernance in particular in using Information and Communication Technology (ICT) for the populace?

Information and Communication Technology (ICT) for India’s transformation

The social and geographical distance between sections of the populations is being rendered meaningless by the new Information and Communication Technologies (ICTs). The old dichotomies

of north and south are being replaced by fast and slow and empowered and unempowered. The opportunities arising out of ICTs are immense and in convergence with a visionary approach, political stimulant and right value framework can secure considerable gains toward a sustainable human development. The danger is, countries that fail to use technologies to their advantage will fall further behind, what is popularly termed by Gartner Group as Digital Divide. The political negative impacts of not using ICTs - upon economies, economic decision making, networking, advocacy and empowerment potential to civil society groups - are the major areas of serious concern to CSI.

With enactment of IT Act, Right to Information Act, the necessary framework has been set up in India for supporting use of ICT for improving quality of life of common citizens. The freedom of Media and press enables free expression to be encouraged at all levels. Deregulation can help free and fair information flows effectively to civil society. Support to enhancing such flows to the most vulnerable and marginalized groups should be given priority. NGOs, CSOs, CDOs and social society can effectively get their voices heard and share knowledge and experience in managing affairs of governance. The convergence of internet, radio and TV offers new opportunities for strategic donor support to key intermediaries that develop pro-poor content and who inform civil society. Support to developing content on new ICTs should not be allowed to erode, due to their exclusivity support for developing pro-poor media content. Poverty excludes poor people from the most basic of ICTs. Governments and donors must support the development of pro-poor strategies that actively promote social inclusion and social equity.

CSI Role: 1965-1980 Computer Awareness Era - the early years

CSI formed in 1965 was the sole professional body in Computers, due to the vision of stalwarts like R Narasimhan (first President) and A Balasubramanian (first

Secretary). CSI was always in forefront of spreading computer awareness among users community, through its members. All Chapter and Student Branches were duty bound to conduct professional activities in spreading computer culture among the professionals. Computer Science Departments in IITs and Universities played a major role in ensuring that this essential knowledge of first generation computers is not missed in India, in spite of high cost and difficulty in importing. There were regular CSI Courses for Banking, Insurance and other private sectors, as prerequisite for their in house competence building. CSI Directorate of Education at Chennai played a major role in conducting regular examinations to encourage the computer professional to upgrade their skills in system analysis and design of computer based systems using upcoming programming languages.

The last 30 years

1980-90 Computer Education EraDepartment of Electronics (DOE),

the prime agency in Government of India was made responsible for spread of Computerization in early 80’s. One of the major handicaps was non-availability of computer trained manpower to undertake various projects for utilization of computers in the Government sector. CSI was called upon to come up with a scheme utilizing the expertise available in private sector for training working level people, both in Government and private agencies. CSI conceived a unique scheme called ‘Department of Electronics Accreditation of Computer Courses (DOEACC), which made tremendous impact in initial computerization of all agencies in India, under the leadership of Late Brig V M Sundaram, one of the past Presidents.

In 1988 a Working Group of DOE with representatives from CSI was set up, which went through the details of the manpower requirements in computer area and made the following major recommendations:a. The existing Government/aided

CSI Communications | Nobember 2011 | 6 www.csi-india.org

CSI Communications | November 2011 | 7

institutions, through formal channel will not meet large manpower requirements, due to shortage of qualified teachers, financial constraints and limited resources.

b. The private sector can play a major role in Computer Training to fill this gap, as it has the necessary competence, financial resources and adaptability to undertake changes in the curriculum, based on the job requirements.

c. The following four levels of courses to be started for all category of computer manpower required:i. ‘O’ Level Foundation course for

programmers at assistant levelii. ‘A’ Level Advanced Diploma

Course for programmersiii. ‘B’ Level Course for System

Analyst/Software Engineersiv. ‘C’ Level Master’s course for

System Managers

Founder President Late Prof. R Narasimhan unveiling plaque on 6th March 1991 at DRDL, Hyderabad (CSI Regd Office) to mark Silver Jubilee of CSI.

These recommendations were duly accepted by DOEACC scheme under the aegis of All India Council of Technical Education (AICTE) and DOE was started in 1990, for conduct of these examinations in consultation with the professional bodies. Computer Society of India (CSI) and Institution of Electronics and Telecommunication Engineers (IETE) were selected to conduct various examinations for these courses, once the students have undergone the necessary training. CSI looked after O,A,B levels where as IETE(I) helped in C level courses.DOE also approved a scheme where, various Private Institutions were accredited, based on their competence for conducting computer based training for various levels of courses. For this a Screening Committee of Senior Computer Professionals from CSI carried out a

thorough inspection, before giving provisional accreditation. Over 1000 institutions in all states in the country took part in this innovative scheme of generating trained manpower, utilizing the hardware and software available with CSI providing the main faculty from its large pool of members in various chapters. The DOEACC scheme is still being maintained by Department of IT , Government of India under DOEACC Society.

1990-2000 Computer in Government Era

The Government of India formed a special committee under Late Dr PP Gupta, Past President, CSI and Secretary of DOE to recommend suitable actions for spreading computer culture in India. The policy was framed in 1994 and the committee recommended undertaking Project INTENT – Information Technology for National Transformation. The policy focused on application development, infrastructure development and manpower development and made specific following recommendations for Government, Industry as well as CSI.

Actions by Government � Support setting up, funding for

COMPITANT (Commission for Promotion of IT for National Transformation).

� Treat IT on par with infrastructure industries

� Creation of telecommunications infrastructure – to begin with this could be accessible from all district headquarter towns and industrial growth centres

� Remove constraints on interconnection of public/private networks

� Promote use of project management/monitoring tools, electronic mail, work-flow automation, computing in Local languages

� Setup national body to oversee IT education, evolve standard courses, expert groups to set syllabi, liaise with industry to fund training facilities, ‘canning’ of training material, get case studies prepared – perhaps part of COMPITANT

� Promote Venture Capital funds for software development

� Fund and sponsor technology development projects

Actions by Industry Associations: CII, FICCI, ASSOCHAM, Chamber of Commerce, MAIT, NASSCOM, IETE, IE (I), NACT etc

� Re-examine role of in-house IT departments – departments to have business mission

� Support setting up, funding for COMPITANT

� Cooperate with CSI for instituting National IT Application Awards

� Development of IT Awareness programmes for telecasting, arranging sponsorships, conducting seminars

� Sponsor the effort of setting up National Database for electronic access

Actions by Computer Society of India � Setup COMPITANT – This could be

funded by the industry, government, CSI

� Institute National IT Application Awards

� Setup inter-disciplinary group to prepare Annual Technology Forecast

� Setup technical committees to identify IT standards to be followed

� Also, standards for Electronic Data Interchange (EDI) etc

� Development of IT Awareness programmes for telecasting, and arranging sponsorships for conducting seminars Conferences and Tutorials

� Liaise with Government and funding agencies to fund technology development projects

� Setup National body to oversee IT education, evolve standard courses, expert groups to set syllabi, liaise with industry to fund training facilities, ‘canning’ of training material, get case studies prepared – perhaps part of COMPITANT

CSI 1995 – Issue Process Action Agenda

Advancement in Information and Communication Technology (ICT) had started impacting all aspects of life worldwide. It was changing the way of functioning of Governments and its interface with citizens. In spite of all the efforts, the digital divide worldwide started appearing, especially in the developing countries. e-Governance aimed at transparent, smart with seamless access, secure and authentic flow of information

DVR Vithal R K Bagga K S Vijaya Sekhar

CSI Communications | November 2011 | 8 www.csi-india.org

crossing the inter-department barriers and providing a fair and unbiased service to the citizens. ICT was increasingly being used by governments to deliver services to citizens at convenient geographical locations. Computer Society of India was the most popular platform during this decade, where thousands of computer professionals from all walks of life would participate in its annual convention and contribute in sharing of their expertise for improving computer applications in all areas including the Government sector. In one of its annual conventions in 1995 held at Hyderabad (CSI-1995), a special effort was made to discuss the issues facing computerization of the country under the following three selected heads:1. Will software growth and exports

continue?2. Will hardware industry survive?3. Manpower in IT: Is quantity the

answer?4. Link every village to Internet5. Start National Identity Card Project6. Automate Land Record Registrations7. Implement FAST transit systems8. Consolidate National database of all

IT initiativesEven in 2011, we see how important

these policy directions are for Indian Government. These policy guidelines were regularly reviewed by Computer Society of India in various forums to make suitable corrections depending on the availability of resources and trained computer manpower. Somehow in later part of decade, CSI remained in back ground and newer bodies like NASSCOM, MAIT and CII took the lead in Government Sector computerization leading to formation of National Task Force on Information Technology and Software Development in 1998. Its 108 point Action Agenda, mostly based on CSI policy recommendation set the trend for IT revolution in India!

2000-2010 Internet and e-Governance Era

With rapid computerization, particularly in major centres in Bangalore, Mumbai, Delhi, Chennai, Kolkata and Hyderabad, the computer industry was transformed in to Information Technology Hubs for undertaking major International projects meeting the requirements of multi-nationals by extensive outsourcing. It was during this period that a number of State Governments came forward

with their IT policies to attract Foreign Direct Investment (FDI), thereby bringing in much needed foreign exchange. The Government of India’s liberalization policy launched by Mr Manmohan Singh, then Finance Minister set the trend for explosive growth of IT sector in the country. With availability of Internet, e-Commerce applications started taking shape even in India and required a National Policy Framework in the form of IT Act 2000 (amended in 2008) to ensure proper nurturing of this important technology in India. Right to Information (RTI-2005) Act gave the common man a long pending tool for finding out the progress of various cases in Government domain. CSI with its over 50 chapters , 200 student branches and over 20,000 members played a major role to ensure that their voice was heard and IT Revolution was not missed by India like industrial revolution! Many CSI Chapters conducted regular e-Governance events to benefit professionals working in Government sector and bridging the gap between industry and Government.

CSI Special Interest Group on e-Governance

CSI under its revised Constitution set up a Special Interest Group on e-Governance (CSI SIGeGOV) in 2007, to address some of the major issues, which still remained unsolved in later half of the last decade. The objective of e-Governance initiatives was to improve the reach, make services more transparent and reduce response time by reducing costs. In developing country like India,

one of the important result of ICT Enabled SMART (Simple, Moral, Accountable, Responsible and Transparent) Government was to reduce corruption. e-Governance empowers citizens and increases transparency. ICT applications in e-Governance define a major share of IT spending worldwide and it is crucial to address the key issues of reducing digital divide, as well as corruption. A key focus area of this SIG was to consolidate the e-Gov initiative in different States and ensure that the experiences and best practices are shared to benefit all, with its regular events.

Major Activities of CSI SIGeGOV � The website for the Special Interest

Group (www.csi-sigegov.org) was launched to act as knowledge sharing portal for all e-Governance initiatives in India. All major activities including e-Governance Awards database is maintained and updated.

� Based on inputs from Executive Committee, research work was undertaken with NISG and IIIT-H on Methodology for Evaluation for e-Governance projects, to be used for e-Governance Awards.

� Concept of Field visits and Analytical Hierarchy Process (AHP) was implemented to make the Awards process transparent unbiased and thus acceptable to Government officials for sharing their project.

� Conducted CSI Nihilent e-Governance Awards (started since 2002) on yearly basis with

Leading specialists including Dr PP Gupta, CMC; Shri N Vittal, Secretary, DOE; Shri Dewang Mehta, NASSCOM; Ashok Agarwal, CSI; Thadani, NIIT; Shridhar Mitta, WIPRO; Prof PVS Rao TIFR: Dr Gopal Rao, ECIL; Shri FC Kohli, TCS and JA Chowdary, STPI participated in Action Agenda sessions and made the following major recommendations for implementation of Government policy by all.

CSI Communications | November 2011 | 9

financial support from M/s Nihilent Technologies, Pune and extended from State, Industry and Projects, to cover Departments and Districts also. Since Industry was covered by other CSI Awards, these were dropped for e-Governance Awards list.

� Major efforts on knowledge sharing was initiated with States of Andhra Pradesh (2009) , Madhya Pradesh (2010) and Gujarat (2011) for encouraging knowledge sharing of e-Governance Initiatives at grass-root level, by organizing Knowledge Sharing Summits.

� International research taken with University of Tampa, Florida, USA for comparison of Citizen Services in US and India (eSeva of Andhra Pradesh) in 2009-2010.

� Interaction with International Conference on e-Governance (ICEG) since 2007 by holding joint conferences at University of Hyderabad (2008) and IIT, Delhi (2009) at IIM, Bangalore (2010) and current year at Nirma University Ahmedabad (2011).

CSI Nihilent eGovernance Awards -Documentation of Case Studies

CSI, along with Nihilent Technologies started a series of Awards at national level to encourage government departments by giving annual awards. In this process, all the nominations, which were shortlisted for final phase are documented and published every year since 2006. The idea of this publication is to share the best practices among various government agencies by providing them a good resource. From 2011 onwards, SIGeGOV has started a new award called ‘Sustainability Award’ for those Projects which had already won awards in earlier years.

The following SIGeGov six Publications covering case studies were released during Annual convention of CSI and are available for free download for use by all:- 1. Enablers of Change: Selected

e-Governance Initiatives in India (eds) Piyush Gupta, R K Bagga and Ayaluri Sridevi by ICFAI University Press (2010).

2. Fostering e-Governance: Compen-dium of Selected Indian Initiatives (eds) Piyush Gupta, R K Bagga and Ayaluri Sridevi Published by ICFAI

University Press (2009).3. Transforming Government:

e-Governance Initiatives in India (eds) by Dr R K Bagga and Piyush Gupta Published by ICFAI University Press (2008).

4. Compendium of eGovernance Initiatives in India (eds) by Dr. R K Bagga and Piyush Gupta by University Press (2007).

5. eGovernance Case Studies (eds) Dr Ashok Agarwal Published by Universities Press (2006).

6. The State, IT and Development (eds) R K Bagga, Kenneth Keniston and R R Mathur by SAGE Publications (2005)

5th ICEG in 2007 at HyderabadInternational Conference on

e-governance (ICEG) was founded at IIT Delhi in 2003 to address the growing need for furthering our knowledge in e-governance by inviting researchers to share their work. It is organized under the umbrella of International Congress of e-government (ICEG) (www.iceg.net) which is a forum for the advancement of knowledge in the discipline of e-governance and promotion of the same at various levels of governments, across the globe. The event held in Hyderabad ensured that structured methodology of issue process was followed in the area of eGovernance, in particular, sociopolitical areas. 5th ICEG was hosted by CSI SIGeGOV at the University of Hyderabad in Dec 2007. It was inaugurated by then Chief Minister of Andhra Pradesh Late Mr YS Rajasekhar Reddy.

The main highlight of this conference was the release of a document containing ‘Issues’ that require immediate attention of the policy makers. This was made by taking inputs from various stake holders. A set of recommendations and action plan emerged and which was shared with all stake holders. A structured Issue Process Methodology was followed for this purpose. A set of four critical Issues were identified and specific recommendations were made for each of the following issue:-

� Building Capacity for implementation � Management of the Complete

Project Lifecycle � Enterprise Architecture Model,

Integration and Interoperability � Socio-Political Implications of

e-Governance

SIGeGOV Knowledge Sharing Summit, Hyderabad (June 2009)

The first Knowledge Sharing Summit (KSS) was made possible with major support from Principal Secretary Shri Ajai Mishra, IAS and Additional Secretary Shri Suresh Chanda, IAS Department of IT&C, Andhra Pradesh. The Presidential address was delivered by Shri S Mahalingam, President CSI. In his address he elucidated the evolution of CSI and objectives of establishing its SIGeGov head quarter in Hyderabad. He also set tone for the CSI for supporting National e-Governance Plan.

Two day programme was organized as 4 sessions on e-Governance Applications and a special session on ‘e-Governance-Appropriate Technology’ followed by Panel discussion on “e-Governance initiatives: Implementation Issues”. During the four sessions on e-Governance Application, many State Government leaders shared the e-Gov initiatives taken up by their respective States. State project heads had come forward to share their knowledge and experience for the replication of their respective projects with the participants of other states. During the summit, the knowledge on a number of e-Governance Projects were shared by the respective state Governments for the benefit of the delegates, who all are invited at the host States’ cost.

SIGeGOV Knowledge Sharing Summit, Bhopal (June 2010)

CSI SIGeGOV, in collaboration with Department of Information Technology, and MAP_IT, Government of Madhya Pradesh, conducted the second successful Knowledge Sharing Summit on e-Governance in June 2010 at Bhopal, Madhya Pradesh. The inaugural session was presided over by Hon’ble Minister IT, Shri Kailash Vijayavargheya, where Prof P Thrimurthy, the then President, CSI; Dr Ashok Agarwal, the then Chairman, CSI SIGeGov took part in the deliberation, including inaugurating an exhibition of e-Governance Solutions from Government and Private organizations. The Summit was attended by a large number of participants from different States, including some of the IT Secretaries with the theme ‘Transforming Government and Enabling Citizen’. Shri S S Mantha, Chairman, AICTE, as well

CSI Communications | November 2011 | 10 www.csi-india.org

as Hon’ble Justice Shri Rajesh Tandon, Chairperson of CAT also shared their views on ICT in e-Governance. Mr Anurag Jain, Secretary IT, GoMP shared the status of e-Governance initiatives in Madhya Pradesh. The Knowledge Sharing Summit concluded with a special IT Awards ceremony conducted by Government of Madhya Pradesh, where all award winning projects leaders were honored by Shri Avani Vaish, Chief Secretary GoMP and Hon’ble Justice Rajesh Tandon.

2011 Updates

Knowledge Sharing Summit (KSS) & ICEG held at Ahmedabad (17-18 Oct 2011)

In a unique experiment, an integrated program of Knowledge Sharing Summit and International Conference on e-Governance was launched at Ahmedabad on 17 Oct 2011 by

Shri Narendra Modi, Hon’ble Chief Minister of Gujarat. In the Inaugural session, Shri R Chandrasekhar, IAS delivered the keynote address stressing the need for innovative approach in India to derive maximum benefit from Telecom Growth and ICT applications in e-Governance. He also highlighted the recent Government regulations including NTP-2011 and updated IT Policy, apart from Delivery of Services Rules being released shortly. Chief Guest Shri Narendra Modi in his usual style covered the meteoric rise of state of Gujarat by using ICT for providing efficient services to all its citizens. He shared his experiences of last decade in applying ICT in improving e-Governance scenario in state of Gujarat. As a recognition, CSI President Shri MD Agarwal and Past President Prof P Thrimurthy honored Shri Narendra Modi with citation and plaque of the newly instituted ‘CSI-eRatna’ Award. Chief Secretary Shri A K Joti welcomed the guests including President, CSI and Chief Minister. Shri Ravi S Saxena’s effort in ensuring high quality of participation from Government, Academia and Industry was highlighted by R K Bagga, CSI-SIGeGov Chair.

With the theme, Government Transformation: Agenda for eGov 2.0, four plenary sessions covered Inclusive Growth, Restructuring Governance, Citizen Empowerment and Technology Management during the two days KSS-

ICEG-2011. Over 400 delegates from Government Sector, Private organizations and Academia participated in the deliberations of this unique event held at Ahmedabad. In 4 parallel tracks, ICEG contributed papers from over 60 participants from 9 countries were presented in implementation, emerging technologies and policy practices chaired by Distinguished professionals from CSI. In parallel Knowledge Sharing Sessions, IT Secretaries from a number of states including Maharashtra, Tamil Nadu shared their best practices for the benefits of all. In a special session exclusively devoted to the practices being followed in Gujarat chaired by Dr Viresh Sinha, Addl Chief Secretary moderated by Dr Neeta Shah, the unique experiments in various departments including Healthcare, Commercial Taxes, PDS and Education were shared. In the concluding session, Drs Ashok Agarwal and R K Bagga highlighted the need for strengthening electronics, hardware industry by making affordable tablet like Akash for use by common citizen. In the valedictory session of the conference, recommendation was made for CSI to undertake a special study for Inclusive Growth and Restructuring of eGov 2.0 era involving Govt of Gujarat.

Where Do We Go from Here? � CSI can introduce courses on

e-Governance at National level for various management colleges. There is an urgent need to set up a Centre of Excellence in e-Governance for undertaking curriculum standardization for Government sector.

� CSI can also play an advisory role to bridge the gap between Central and State Governments in implementing various citizen centric services.

� Governments should offer consultancy for senior CSI Fellows to look after various welfare programs in implementation phases at National Level (like Nandan Nilekani).

� A roadmap to be designed for every 10 years of e-Governance activities under CSI banner

� Any government policy matter includes some kind of evaluation or pilot study, which CSI can take up with the help of its student members. Then CSI can come out with a final plan for implementation at National level. 3-tier architecture be maintained for any policy related matters and society members be involved.

� Provide both moral and financial support to the e-Governance professionals at Chapter and Student Branch level.

Role of Professionals in CSIThe CSI professionals must monitor

the development of technology and its use and if necessary influence it. Radio and TV were hailed to be a boon for education and culture; instead became a boon for marketing. Web and networking, if allowed, will follow suit. Professionals need education that includes not only technology and its uses but also its history and social effects. Authority will press for benefits in property. Professionals must press for benefits in personality. The willingness to part voluntarily with

Chairman, SIGeGOV highlighting KSS-2011 & ICEG program during 3rd Knowlede Sharing Summit and 8th International Conference on e-Governance during Inauguration on 17 Ot 2011 at NIRMA University, Ahmedabad. Hon’ble hief Minister Narendra Modi Inaugurated the Conference and seated on the dias.

Contd. on pg.17

CSI Communications | November 2011 | 11

Cover Story

e-Governance: Experiences from a few Indian States

Raju Narayana Swamy I.A.S.SecretarytoGovernmentofKerala

IntroductionIn the existing period, one of

the most significant contextual phenomena affecting public governance is the revolution in information and communication technology. The ICT has facilitated and accelerated the globalization of economy, business, finance and culture at the international level. Now ICT constitutes the highest rising element of the worldwide financial system. In reply to this shift the government has taken essential initiatives to restructure administrative institutions by adopting ICT in order to augment electronic communication and service delivery in almost all the states. This is now the latest buzzword, for, the government is trying to involve its people in administration, address transparency in bureaucracy and make it more responsive to the citizens.

E-Governance is viewed as a vehicle to initiate and sustain reforms by focussing on three broad areas: (i) Governance for enhancing transparency and promoting a democratic society, (ii)

Making public services1 more efficient, cost-effective, responsive and also providing convenient services to citizens and businesses. Besides it ensures greater citizen access to public information and accountability in the delivery of services. (iii) Management for ensuring simplicity and competence, greater responsibility in managing voluminous information and data successfully by providing information services through safe and sound communication. e-Governance

in this context is defined as a change of governance processes resulting from the persistent and exponential opening into society of more advanced digital technologies. This includes all levels of government (country, municipal, state, regional, tribal and federal) and also the private sector. These technologies can supply a variety of different ends: improved delivery of government services to citizens, enhanced relations with business and trade, citizen’s empowerment through access to information, or more proficient government administration (Louis, Fourie, 2008).

e-Governance Evolution in IndiaThe concept of e-Governance had

its origin in India during the seventies. The focus was on in-house government applications in the areas of defence, economic monitoring, planning and the use of IT to manage data intensive functions connected to elections, census,

tax administration etc. The efforts of the National Informatics Centre (NIC) to connect all the district headquarters during the eighties was a very noteworthy advance in India. From the early nineties, IT technologies were supplemented by ICT technologies to expand its use for wider sector applications with policy importance on reaching out to rural areas.

To accelerate e-Governance, a programme approach needs to be adopted with a common apparition and approach. This approach should enable savings in costs, maintain infrastructure and enable interoperability through standards and present a faultless outlook of ‘government to citizens’. Gartner Group has formulated a four-phase e-government (figure 1) which can serve as a model for India to position where it fits in the overall evolution of an e-government strategy. The four phases in the model offer a conceptual framework. But it is not necessary that one phase is to be completed before

CSI Communications | November 2011 | 11 www.csi-india.org

We cannot ignore the fact that Information Technology has emerged and developed in to a key dominant segment in the Indian economy. The fundamental motivation for the implementation of e-governance in India is to provide an efficient government, the government which is simple, accountable, responsive and transparent. A demand driven ‘citizen interface’ e-governance implemented in India would enhance the success of ICT ventures, especially in rural areas. Although e-governance is of main concern for all state governments, some have taken a front and developed successful models from which others can take a lead. The study assesses the significant projects implemented by three states of India in the direction of e-governance.

Phase 1 Phase2 Phase3 Phase4

Information Interaction Transactions Transformation

Presence Intake process Complete Transaction

Integration & Organisational Changes

Numerous websites with static content links to other sites-brochure ware

More sophisticated sites with citizen interaction-Email and downloadable forms available

Integrated sites for enabling complete and secure transactions

Seamless integration of sites for e-democracy on transformation

Source:e-GovernanceMaturityModel(Gartner,2000)

Fig. 1 Four Phase e-Governance Model

CSI Communications | November 2011 | 12 www.csi-india.org

another one begins. In the first phase the agencies provide

a website to post basic information to public. The interaction stage enables the users to contact agencies through web sites or do self-services. The transaction stage will complete entire transactions online such as the payment of accounts, balances and receiving licenses etc. The forth phase, transformation is the stage where governments transform the current operational processes to provide more efficient, integrated, unified and personalized service. This phase is seen at the regional and national levels, consisting of integration among internal and external applications, in order to provide full communication between the governmental offices and non-governmental organizations ( Hala, Al-Khatib, 2009). India with new Internet law to enable digital signatures has framed rules and appointed an official structure under its e-Commerce law to enable digital signatures and transactions. The act will enable paperless transactions with legal certification. With this law the legal transfer and use of electronic documents in Indian governance has been enabled (Michiel, Backus, 2001).

National e-Governance plan (NeGP)India’s emerging experience in ICT

initiatives has established significant success in improving accessibility, cutting down costs, reducing corruption, extending help and also increasing access to un-served groups. In this phase of experimentation, e-Government venture has reached millions of citizens belonging to various sections of society. Improved access to information and services has provided economic and social development opportunities, facilitated contribution and communication in policy, thereby attaining decision-making capability and hence empowerment of the weakest group. This has led to fostering a sense of possession of social capital, which constitutes a foundation for local revitalization. In order to promote e-Governance on a massive scale the Department of Information and Technology has formulated the

National e-Governance Plan (NeGP)2. It aims at making all government services accessible to the common man in his locality, throughout his life through a One-

Stop-Shop (integrated service delivery) ensuring efficiency, transparency and reliability at affordable cost to meet the basic needs of the common man(Kailash Nath, 2008). The important features of NeGP’s mission are shown in the table below.

Report of the working group on ‘Convergence and E-Governance’ for the Tenth Five Year Plan has suggested the following pre-requisites for successful e-Governance in India.

� Large-scale computerisation � Capability of use of local languages in

the IT systems � Changing the mindset of government

functionaries � Creation of Adequate and

Appropriate infrastructure � Standardisation in data encoding,

application logic, user interface etc � Knowledge Networking for better

governance � Creation of Public key Infrastructure

and Certification Authorities

Almost all governmental organisations in India are still hovering around the first stage of cataloguing activities with just a cosmetic presence and only a bare minimum of information and few achievements. Several state government sites such as Madhya Pradesh, Karnataka and Andhra Pradesh have progressed further with detailed information systems. Still, online transaction processing, complaints records and tax filing have yet to be introduced. Further steps to integrate horizontally and vertically across local systems, which in turn are linked to higher level systems within a similar functionality and across different functions by becoming a real one step shopping for citizens is still a tall order(Gupta & Jana, 2003). Due to centralized data systems, as well as the case of data retrieval and proper documentation, the quality of decisions have improved. India in this regard has achieved third level. The Government of India, at various forums, has indicated its commitment to provide efficiency and

Central Govt. Projects State Govt. Projects (Sub Programme)

Integrated Projects

National ID Land Records EDI

Central Excise Property Registration eBiz

Income Tax Transport Common Service Centres

DCA 21 Agriculture India Portal

Passports/Visa/Immigration Muncipalities EG Gate way

Pensions Gram Panchayats e-Procurement

Commercial Taxes e-Courts

Treasuries

Police

Employment Exchange

Programme Components

Core PoliciesIntegrated Services

Awareness & Assessment

Core Infrastructure Technical Assistance Organisation Structures

Support Infrastructure HRD & Training R&D

Source:Kailash,Nath,(2008),‘e-Governance:Strategy,Policy,PrescriptionandProspectforthe‘CommonMan’…ACaseStudyofGovernmentofOrissavis-à-visIndia’,Paperpresentedinthe17thBiennialConferenceofInternationalTelecommunicationsSociety,Montreal,Canada.

Fig. 2 : NeGP mission to promote e-governance

CSI Communications | November 2011 | 13

transparency to all strata of society3. It can generate possibilities to resolve rural poverty and generate a better future for citizens. The picture of e-Governance in India presents an extensive disparity in the level of computerization and the use of IT applications in and outside the government. Inspite of continued efforts, the government machinery, particularly in the States has not yet become fully accessible for the use of computerization and IT applications. Some of the state governments like Kerala, Tamil Nadu, Andhra Pradesh, Karnataka, Maharashtra, Madhya Pradesh etc. have advanced where as some others lagged behind for various reasons (Convergence and E-Governance, 2001). It is in this context that we are analyzing the projects of e-Governance in three selected states in India.

Significant Projects in Selected States

GujaratGujarat is one of the most prosperous

states in India. It has excellent physical infrastructure and has made rapid strides in the field of Information Technology (IT) and IT enabled sectors (ITES). Companies like M/S.TCS, M/S. Patni Computers Ltd, M/S Mphasis are already functioning in the state. The state has one of the highest tele-density in the country (Harnessing IT for Growth). The government has framed a comprehensive IT policy 2006-11. Under this policy the state government will initiate steps to enhance the supply of skilled man power for IT/ITes. The government will collaborate with NASSCOM for conducting NAC test for facilitating benchmarking of BPO manpower. It will promote IT parks/SEZs for enhancing availability of eady built up space for IT/ITeS sector etc(IT Policy).The e-Governance initiatives of the state mainly include:

e-City- This is to facilitate delivery of municipal services like birth and death registration, building plan, primary health and education, water supply etc. through e-Governance.

E-Dhara provides copies of land records with Gujarat State Wide Area Network and Storage Area Network system.

Educational e-Governance-The state governments in India have undertaken

massive initiatives to transform their governance systems based on IT. More specifically, the Gujarat government took the initiative of educational e-Governance which has four parts; Computer Literacy Education, E-Learning – Centralized teaching through BISAG (multimedia teaching), On-line transactions by students, teachers and parents and Better management of schools and colleges and Universities through IT4. The IT in Gujarat stresses on the following programmes.

All examinations from SCC are taken online. Facility for feedback of a teacher is to be made available on online. The students give monthly feedback on teacher’s performance through school computer lab, which is accessed by districts and state level authority instantly. Parents can access performance record of their children every week through internet. This is applicable even for the students of primary classes in rural areas. The GramMitra is equipped for taking printout of student’s performance and interpret results. The central server automatically sends SMS alerts to parents of those children whose performance is not up to a particular grade. A student’s marks applying for a job, his performance etc can be accessed by a unique student’s ID number. The attendance of all students and teacher’s can be taken on Bio-Metrics. The final tally of the attendance is made available at state level within fifteen minutes of start of school/college time.

Mahiti Shakti- It operates like a single window through which the citizens can access information related to all aspects of the government’s functioning, various schemes and services ranging from obtaining ration cards to getting sanction for old age pension. Citizens are required to submit the necessary documents at the Info Kiosk and fill the required form online to obtain desired service (Sushil Kumar Singla & Himanshu Agarwal, 2009).

State Wide Attention on Public Grievances by Application of Technology (SWAGAT)- This was established for having a direct communication between citizens and Chief Minister. The grievances are logged online, transmitted and made available online to the officers concerned. The information sent by the department is also reviewed online in the presence of the complainant and the officials concerned. Attempts are made to

offer a fair and acceptable solution on the same day. The record is then preserved in the ‘SWAGAT’ database (Sushil Kumar Singla & Himanshu Agarwal, 2009) .

Madhya PradeshMadhya Pradesh, India’s second

largest state has set up its IT policy in 1999. The objectives mainly includes; to improve the life of the common man leveraging the strengths of –governance, attracting investments in the sector so that the educated youth is able to contribute to the development of the state, create a pool of highly skilled professionals who are at par with the best in the country, Transforming Resource Based Economy to Knowledge Based Economy etc. Government in Madhya Pradesh has implemented several e-Governance projects. The existing IT scenario of the state is characterized by the following characteristics (Department of Information Technology, Madhya Pradesh):i. Presence of First Software

Technology Park in Indoreii. CSC contributes biggest share to the

total IT output of the stateiii. Crystal IT Park, at Indore ready for

accommodating potential investorsiv. Huge market available for ITES/BPO

operations in the statev. Upcoming sites for Software

Technology Parks-Bhopal and Gwalior on the anvil

vi. Investor friendly IT policy rolled out for attracting investors to the state.The state also strongly believes

that information and communication technology can yield significant outcomes in improving the quality of education (Anurag, Jain, 2010). The state has provided Broad Band Connection through State Wide Area Network (SWAN) in 2008. The state plans to have in position over 9200 IT Kiosks to provide all kinds of citizen Centric Services made possible by IT to the rural areas. IT magazine, Dataquest in its study on e-Governance initiatives in 15 major Indian states have ranked Madhya Pradesh in the fourth position. The findings of the study reveal that the state is leading in terms of perceived improvement in delivering of government services through e-Governance initiatives. Some of the projects implemented by the state are discussed below.

Headstart - This is a computer

CSI Communications | November 2011 | 14 www.csi-india.org

aided learning program for students and teachers. Under the district primary education programme, the state in year 2000 initiated a computer-enabled education programme. This uses computer as a teaching/learning tool at elementary education level.

Result Processing System for Rajya Siksha Kendra - The project is designed and developed to computerize basic student’s information, processing of results followed by subsequent dissemination of information on internet and generation of analysis reports. This was successfully implemented in 38 districts of Madhya Pradesh since September 2006.

For enhancing e-learning the government has given stress through e-Governance on the following. The results are captured school-wise, class-wise and teacher-wise. Focus on children and teachers with poor performance are identified. This can help in improving their performance. Accountability of teachers is set by tracking the performance of teachers in monthly tests. A village education register is kept and household assessment is conducted for more than 1 lakh habitats of the state for identifying children for enrolment. Enrolled students are identified class-wise, category-wise and gender-wise. A complete profile of dropouts and never enrolled students are identified. This data can be used for the evaluation of impact of education programs of the government. In Madhya Pradesh more than 1.5 lakh children have already been registered.

Gyandoot - This was implemented in January 2000 in Dhar district of Madhya Pradesh. The aim of the scheme is to create a cost-effective replicable, economically self-reliant and financially viable model for taking the benefits of Information and Communication Technology to the rural masses (fig. 3). The project is managed by a society called ‘Gyandoot Samiti’(Centre for Electronic Governance, 2002). 1. Forms of various government

schemes2. New Khasra Nakal Avedan3. Rural Hindi e-mail4. Landholder’s passbook of lands and

loans (Bhoodhikar evam rinpustika)5. Castle certificate6. Domicile certificate (mool niwaci)7. Income certificate8. Commodity/Mandi Information

system9. Employment News10. Rural Market (Gaon ka Bazaar)11. Advisory Module (Salahkar)12. New Driving License13. New Varmi Compost Khad Booking 14. E-education15. Rural Matrimonial (Vivah Sambandh)16. Public Grierana Redressal (Shikayat

Nivaran)17. Below Poverty line family list18. Rural News Paper (Gram Samachar)

Fig. 3 : Gyandoot Services

Tamil Nadu According to national e-Governance

survey, the state has emerged among the top five e-governed states in India in 2008-09. The state has climbed three spots over their last year’s ranking to emerge as the first as per the survey conducted for the year 2008-09(Asia Pacific Future eGov, 2009).

TN e-Governance Mission, is formed which will explore the best e-Governance practices world over for adoption in the e-Governance project initiatives of the Government

to provide electronic delivery of services to the citizen at a reasonable cost and for improvement of Government - Citizen Interface. There will be a State e-Governance. The SeG will function as a permanent advisory body to develop and implement processes for management of programmes like conflict management, audits, knowledge management, financial management, risk management, and project planning and monitoring, besides institutionalizing e-Governance processes and tools.Some of the important e-Governance projects in Tamil Nadu includes: TamilNadu InfoSystem on Land Administration and Management (Tamil NILAM): This is an important e-Governance initiative of Government of TamilNadu. All the taluk offices in TamilNadu have been provided with computers under this programme. The major applications on these systems include Land Records, Old Age Pension, Management Certificates, Public Grievances etc. At present twenty nine taluks were provided with the touch screen for the public use. The services offered by it mainly include:(i) Land owners can view their own Land

ownership and can also obtain a copy of Chitta Exact.

(ii) Birth and Death certificate particulars can be viewed and a copy of the certificate can also be obtained.

(iii) Old age pension details can also be maintained in it.

(iv) The welfare Scheme of the Revenue Department are explained with the details for availing these services and the benefits.Simplified and Transparent

Administration of Registration (STAR): Simplified and Transparent Administration of Registration is a Citizen-centric application which has been implemented at 300 sub registrar office in TamilNadu. With the computerized system the issue of Encumbrance certificate has become quicker and easier. The documents are scanned and archived. The Data will be maintained in Tamil. The Daily transaction is captured in batch mode at sub treasuries and consolidated at the district treasuries. The monthly account prepared using the system by the district treasuries, pay and accounts department are submitted to the AG’s office.

Treasury Computerization : The Treasury computerization is one of the earliest e-Governance projects developed for the Government of TamilNadu. Now the system is used in 29 District treasuries, 205 sub treasuries, 7 pay and accounts office and Chennai Pension Pay office.

Computer Assisted Learning Centre (CALC): This was undertaken in Tamil Nadu with the objective of attracting more children to schools, simplifying difficult concepts thereby making learning exciting and creating sound foundation of IT literacy. The efforts in Tamil Nadu have been quite effective in creating scalable models significantly improving the quality of learning in the schools and in ensuring satisfactory ownership by the community in the management of the schools (Indrajit Bhattacharya & Kunal Sharma, 2007).

The government is focussing on smart schools and developing multimedia content that would redefine the way subjects are taught at schools. On a piloting, it has already set up three smart schools in three villages (Tamil Nadu’s e-Governance Initiatives, 2010). (ICT has also enabled Remote Education in Tamil Nadu mainly to overcome the shortage

CSI Communications | November 2011 | 15

of teachers in schools5. The teachers in many of the government schools are not attending the classes regularly. There is lack of refresher training programs for the teachers. More often the teachers are not ready to go to rural areas. A solution for the above problem is a low cost setup (VSAT) or high bandwidth. For this the teachers and remote classrooms need PC, webcam, microphone, internet connectivity, projector and digital pen. The teacher can be at one school and his lecture will be heard by students in other schools miles away.

Challenges of e-Governance in IndiaThe public administration in India is

undergoing a change. This is a gradual, long term process which requires immense firmness and ingenuity. A decision about relative performances of states based on the existing information on e-Governance projects is a complicated one. In India states like Andhra Pradesh, Karnataka and Madhya Pradesh seem to have more thought-out policies and many initiatives on the ground. Most of the states are using the zit based applications for improving service delivery to their citizens. They are moving from manual process to on-line delivery by using conveniently located service centres in public places. Counters at these service centres are manned by public/private agencies and multiple services are provided on-line at each location. (Anil, Monga, 2008).

The study on Mahiti-Shakti in Gujarat reveals that there is not much change in the process as was originally envisaged to reduce time and cost of transactions for citizens. Decentralization has happened only at the Mahiti-Shakti kendras where internet based information is available (Kumar, T., & Hare Krishna, Misra). The failure factors in Computer Assisted Learning Centre (CALC): as outlined by Dileep, K. Raniekar & Sunitha, Amencherla (2008) includes lack of quantity and quality infrastructure such as workable computers, keyboards, projectors etc. There is lack of usuable computers, teacher’s inadequacy to use the available technology including developing local digital learning resources etc. Offering services that are relevant to poor people and conducting awareness-raising campaigns are also key ingredients to benefit the poor. Analysis of Gyandoot

experiment in Madhya Pradesh6 reveals that it failed to reach the poor. Although low-cost technology is a catalyst for change, it does not guarantee that the poor will make meaningful use of ICT. Community participation and ownership, as well as organizations that have the appropriate incentives to work with marginalized groups, are equally important (Simone, Cecchini & Monica, Raina, 2004).

Now e-Governance projects in India are run only in certain departments. This should change and it should expand to all departments leveraging the challenge of IT to modernize administrative functions and augment transparency. Its impact should reach down to the villages and promise relief from corrupt officials and politicians and give confinement to a web-based economy. The future of e-Governance is poised on how efforts can meet the potential and demand; how governments are able to satisfy the needs of citizens, particularly the disadvantaged, how the civil society organizations need to work towards this; and the huge challenge in up scaling successes. Another two major concerns in the IT implementation are security and privacy. Steps must be initiated to generate confidence among the individuals and organizations to conduct on-line transactions and communications.

ConclusionThe stakeholders for any

e-Governance project are the citizens, the government officials and the entrepreneurs. Lack of plan and contribution from the government officials can slow-down the schemes. The bureaucratic inefficiencies and indifferent attitude of the government department further intensify the problem. If the projects are top-down driven the local stakeholders are neither involved nor have satisfaction. To make a project self-sustaining it is important to identify and manage the stakeholders’ involvement and a scalable framework of working is laid down followed by appropriate technology provided to take it forward(Raghunath Mahapatra& Sinnakkrishnan, 2004-06) .

References1. ‘Advantage Tamil Nadu’, Good Governance

Magazine, Vol.4, Issue.5, March, 2010, p.23.2. Al-Khatib, Hala (2009), A Citizen

Oriented E-government Maturity Model, www.

brunel.ac.uk, Accessed on 20th September 2010.3. Backus, Michiel (2001), E-Governance and

Developing Countries: Introduction and examples, Research Report No.3, www.iicd.org/files/report3.doc, Accessed on 20th September 2010.

4. Balaram & Bibhav Adhikari, ‘E-Governance: A Medium for Moving towards Good Governance’, Administration and Management Review, Vol.21, No.1, January, 2009.

5. Bhattacharya Indrajit, & Kunal, Sharma (2007), ‘India in the Knowledge Economy: An Electronic Paradigm’, Asian Journal of Distance Education, 5(1), pp.40-53.

6. Cecchini, Simone, & Monica, Raina, (2004), ‘Electronic Government and the Rural Poor: The Case of Gyandoot’, Information Technologies and International Development, 2(2).

7. ‘Convergence and E-Governance (2002-07)’, The Tenth Five Year Plan, 2002-2007, Planning Commission, Govt. of India, November, 2001.

8. Fourie, Louis (2008), ‘Enhancing the Livelihoods of the Rural Poor through ICT: A Knowledge Map’, Working Paper No. 13, infoDev, South Africa Country Report.

9. ‘Harnessing IT for Growth’, Department of Science and Technology, Government of Gujarat, dst.gujarat.gov.in, Accessed on 25th September 2010.

10. ‘ICT for Homeland Security’, e-gov, Vol.6, Issue.3, March 2010, p.14.

11. ‘IT Policy’, Department of Science and Technology, Government of Gujarat, India, dst.gujarat.gov.in/it-policy.shtm, Accessed on 20th September 2010.

12. Jain, Anurag (2010), ‘e-Governance Initiatives in Madhya Pradesh’, egov, September.

13. Kalsi, N.S., Ravi Kiran & S.C.Vaidya, ‘Effective e-Governance for Good Governance in India’, International Review of Business Research Papers, Vol.5, No.1, January 2009, p.217.

14. Kumar, T., & Hare Krishna Misra, ‘Decentralization and E-Government Services: Case Based Study in Gujarat’, www.csi-sigegov.org, Accessed on 20th September 2011.

15. Madhya Pradesh: A Strategic Destination for I.T., Department of Information Technology, Government of Madhya Pradesh, www.dit.mp.gov.in/advmp.htm, accessed on 1st September, 2010.

16. Mahapatra, Raghunath & Sinnakkrishnan (2004-06), ‘e-Governance in India: A Strategic Framework’, International Journal for Infonomics, Centre for Infonomics, IIM, Calcutta.

17. Monga, Anil (2008), ‘E-government in India: Opportunities and Challenges’, JOAAG, 3(2).

18. Nath, Kailash (2008), e-Governance: Strategy, Policy, Prescription and Prospect for the ‘Common Man’ … A Case Study of Government of Orissa vis-à-vis India, Paper presented in the 17th Biennial Conference of International Telecommunications Society, Montreal, Canada.

19. Pankaj Sharma, e-Governance, APH Publishing Corporation, New Delhi, 2004, p.74.

20. Parminder Jeet Singh, Recommendations for Meaningful and Successful e-Governance in India, Paper submitted to the second Administrative Reforms Commission, Bangalore, June, 2008.

21. Raniekar, Dileep, K. & Sunitha, Amencherla (2008), ‘Consultation on ‘National Policy on ICTs in School Education’’, Azim Premji Foundation, Bangalore.

22. ‘Rural Cybercafés in Intranet, Dhar, Madhya Pradesh, India’, Centre for Electronic Governance (2002), Indian Institute of Management,

CSI Communications | November 2011 | 16 www.csi-india.org

Ahmedabad. 23. Shirin Medon, ‘Evaluating the Development

Impact of E-Governance Initiatives: An Exploratory Framework, EJISDC, Vol. 20, No.5, 2004, p.6.

24. Singla, Sushil Kumar & Himanshu Agarwal (2009), ‘Significant E-Governance Projects in Indian States’, International Journal of Recent Trends in Engineering, 2(4), November.

25. ‘Taking India Ahead’, Good Governance, Vol.4, Issue 5, March 15, 2010, p.10.

26. ‘Tamil Nadu-Best E-Governed States in India’ (2009), Asia Pacific Future eGov, www.futuregov.asia, Accessed on 1st September 2010.

27. ‘Tamil nadu’s e-Governance Initiatives’ (2010), Information and Communication Technology, www.cii.in, Accessed on 28th September 2010.

(Endnotes)1. Realizing the need for having an integrated

approach towards policing, the Ministry of Home Affairs has come up with Rs.2000 crore project-Crime and Criminal Tracking Network and Systems (CCTNS) that is scheduled to be in place by 2011-12. CCTNS, a Mission Mode Project under National e-Governance Plan, will facilitate storage, collation, analysis and transmission/sharing of crime and criminals related information at the police station, District, State and Central levels. See also ‘ICT

for Homeland Security’, e-gov, Vol.6, Issue.3, March 2010, p.14.

2. The challenge for India as in other countries is the extent to which applications that are useful to, and usable by, the poor can be developed. If appropriate applications are not developed, then poorer and more marginalized communities will not benefit. The digital divide will remain a major problem limiting human development, as a result. See also Labelle, Richard (2005), ICT Policy Formulation and e-strategy Development: A Comprehensive Guidebook, UNDP-APDIP, New Delhi, p.26.

3. The Union Budget of India for the year 2010-11 has come up with the several policies focusing on the issues of both present and the future. The budget has given enough importance to the issues of agriculture, rural development, school education, urban development and housing, micro and medium enterprises, unorganized sector also to accomplish inclusive growth in the coming years. See also ‘Taking India Ahead’, Good Governance, Vol.4, Issue 5, March 15, 2010, p.10.

4. The ICT@Schools scheme was launched in 2004 by the Government of India with a view to provide opportunities to students to develop their ICT skills as well as use ICTs to aid the teaching learning process. Under this scheme, support is provided for procurement of computers, peripherals, software, connectivity

etc. The scheme is currently being implemented in all states and union territories of India in government and government-aided secondary and higher secondary schools. The scheme also aims to set up SMART schools to act as ‘Technology Demonstrators’ and to lead in diffusing ICT among students of neighbouring schools. See also ‘India (2010)’, Survey of ICTs for Education in India and South Asia, Country Studies, www.infodev.org/en/Document.879.pdf, Accessed on 20th September 2010.

5. In India 54 per cent of 800,000 schools have less than two teachers.

6. The success of Gyandoot services as reported by Raghunath Mahapatra& Sinnakkrishnan (2004-06) is due to the establishment of single window facility for the citizens to avail the information. The model is a public-private partnership one which provides the e-Governance services to the citizens. It also facilitated entrepreneurship among the rural mass through ownership of the information kiosks. Moreover it helped in reducing the digital divide and social exclusion. See also Mahapatra, Raghunath & Sinnakkrishnan (2004-06), ‘e-Governance in India: A Strategic Framework’, International Journal for Infonomics, Centre for Infonomics, IIM, Calcutta. n

About the AuthorDr. Raju Narayana Swamy is an IAS and a Ph.D. and works as Secretary to Government of Kerala.

About the Authors

DVR Vithal is a Life Fellow of CSI and a recipient of its Distinguished Service award. He is also a Life member of ISTE and IEEE. He organized several national and international activities. He was associated with APTS and DOEACC and AICTE, NBA and UGC. He assisted in the formulation of IT programs and staff selection for institutions/ IT organizations. He initiated ECE and CSE disciplines and augmented Computing facilities at Osmania University etc. He has traveled widely and is consulted for IT education in particular and engineering education in general.

Maj. Gen. Dr. R K Bagga is the Advisor (Outreach Division) at IIIT, Hyderabad, since July 2004. He is responsible for International Programs, Research and Resources Generation by international and national collaborations for IIIT-H. He joined Army in 1958 and superannuated as Director Computer and Information Centre & Associate Director, DRDL, Kanchanbagh, Hyderabad in 1997 after 40 years in uniform. While in service, he obtained M Tech (CS) IIT Kanpur, PhD Osmania University and MA,LLB from Agra University. He is guiding a number of Researchers for their PhD from JNTU and Osmania Universities.

K S Vijaya Sekhar is presently working in Outreach Division at IIIT, Hyderabad. He is responsible for organizing middle level executive programs and international/national level conferences, seminars with a focus on filling the gap between academia and industry with support from Government. He completed his Masters of Commerce, Master of Computer Applications and currently Master of Business Administration (HR). He is also pursuing his PhD and working on eGovernance and eParticipation as a core.

expertise, time and money for a social cause has great moral and psychological value. e-Governance provides an opportunity to CSI professionals to use their expertise for betterment of the citizens It should not be that the hearts of

the haves are poor. We are in the business of creating future. ICT has provided a quantum jump in affordable broad band connectivity using mobile devices. We must pursue with both hope and fear - hope that it will be used for public good

and fear that it will be for destruction of all

that we cherish. Sarva Udaya, empowering

all, will ensure Desh Udaya, empowering

of our country to rise to dizzy heights in

fulfilling the dreams of our forefathers. n

Contd. from pg.11

CSI Communications | November 2011 | 17

Technical Trends

Debasis MullickDirector,SemaphoreComputersPvt.Ltd.,KolkataEmail:[email protected]

Collaborative IT implementation for Better Governance

IntroductionBetter governance and information

availability at fingertips can be achieved by entering data at its lowest operational granularity and at the same time being interoperable with homogenous view over heterogeneous data sources. The synergy of right dissemination of computing knowledge and its effective implementation is the goal for improved governance. On supply side of knowledge workers, IT as a career started since late 1980s when formal study of computing emerged as a discipline and computer science and its variants got popularized slowly but steadily across the nation. India, having a huge reserve of human resources took the center stage, and now within odd thirty years, Indian IT industry contributes significantly to Indian economy. During this period of IT growth, Indian economy got exposed to globalization policy and free market economy. As a result, the citizens of the entire population also saw an uncontrolled growth, putting a heavy pressure on performance of citizen centric services and governance at large. We try to address the positive correlation that exits between IT and better governance, the relevant issues that are pivotal in ensuring a successful implementation of e-Governance projects. One major problem most of the eGov project faces is the gap between the information dissemination added with the authenticity and availability of precise information at right time. One stop government and the avoidance or annihilation of the practice of unwarranted paperwork and dreary red tapism are always sought for. To cite an example, the eGovernment action plan for 2011-2015 formulated by the European Commission aims for open, flexible and collaborative services as empowerment of citizens and businesses with transparency

of public services serving needs of every citizen across the nation. European eGov plan proposes to emphasize the digital market with single point interaction for easier delivery of eGov services for citizens and businesses not necessarily confined within borders. Citizen centric services cater to health, education, amenities, facilities and every need of every citizen across nation and beyond.

eGov-busAdvanced eGovernment Service

Bus (eGov-Bus) was conceptualized in European Union. The project initiated in 2006 and was run for two years. The eGOV-Bus is essentially a collaborative system that caters all public services through a single virtual agency. Integration of process and content management across government and other agencies is the main focus. Virtual services can be dynamically combined with existing national eGovernment services. In this way, a comprehensive workflow process is set up with requisite service-level agreements (SLA) and audit trail for detailed transactions for the process. The core of the engine has a virtual repository providing an abstraction for information retrieved from diverse sources. Also, the security aspects as well as the service oriented architecture (SOA) with web services and services bus provide service facilitation for corporate and governmental agencies including government itself joining the bus. Adoption of digital signature in establishing trust and non-repudiation is one important security goal. The backbone of the architecture is scalable, adaptable, available and distributed providing an easy abstraction of the data access. The eGov-Bus is basically a dynamically adaptable information system framework

with appropriate open interfaces for the governments. The results are targeted to have cost-effective metrics and efficient methods available for reuse. This can enhance experiences faced by the citizen or business as serviced by government organizations. The e-Gov Bus project is at present underway in European Commission, at national, federal and local level so they can easily link-up to.

E-enabled Information Management Vs Governance

Software applications can be looked upon as a vehicle that enables well-versed decision process within the governance framework. This multi-dimensional vehicle can be perceived as a (a) Tool to encourage the process of informed decision making, (b) Methodology as a mechanism to integrated audit and control with the information repository, (c) Framework as a mechanism that ensure authenticity, accuracy with the speed of processing, and (d) Process as a system that imitates the manual laid down procedure, ensuring data being captured at the point of origin, and it’s impact being reflected in real time scale. Depending on the perception, IT initiatives can be classified as:[a] Event Recorder, which just implements

primary data capture as a counter based transaction with citizen interface, enabling fast disposal. In reality, this is mostly application software that just replaces the traditional register.

[b] Creation of a data bank or electronic repository, mostly in batch process using offline data capture from manual records – the sole objective is to ensure fast searching and sorting of data, which supports ad-hoc query.

[c] Implementing an OLTP (On-Line Transaction Processing System) as part of an application software working in real time, to establish integrated work flow and process flow of the business rules, to ensure that the administrative control are

...stable, functional and dependable IT-infrastructure is still a far cry. In government parlance, we invest high quality hardware but lack of maintenance and attitude give virtually no return.

CSI Communications | November 2011 | 18 www.csi-india.org

preserved, input data are validated at the time of capture, all transaction are duly authenticated, that ensures 100% data accuracy and also reflect the exception conditions. Almost synonymous with OLTP is

the need of data warehouse and data mining, where the large volume of data generated by OLTP is properly maintained to support ad-hoc query and MIS in the form of information dashboard. Each of the above perceived implementation, involve larger investment, bigger IT resources in-terms of computing network infrastructure and increasing scope slowly converging to Enterprise Resource Planning (ERP), encompassing all the stakeholders of the enterprise. So, naturally we see Government IT plans are initially targeted to address commercial revenue collection Govt. to citizen (G2C) services. Financial transactions are always the focus as it enables easy auditing and accounting. Issues of Information Management that can be addressed using a well thought information systems are ensuring authenticity, avoiding duplicity of information and avoiding contradictory information.

In this context, MIT (Ministry of Information Technology) has initiated NeGP (National e-Governance Projects) since 2008 to ensure an uniform coverage across country, huge funds are allocated to be spend over 7-10 yrs time scale. It’s needless to mention that most of the government initiatives that have taken place pre-2008 are through local funds arranged from other projects with IT as secondary or tertiary objectives are mostly learning experience and these legacy systems are building blocks to future well conceived Enterprise e-Governance projects.Issues with eGovernance and projects in India

There is a gap of perception among myth and reality of computerization

afflicting the planner. Here are few:Essential question to ask ourselves

is that are we eReady? First and foremost issue is, stable, functional and dependable IT-infrastructure is still a far cry. In government parlance, we invest high quality hardware but lack of maintenance and attitude give virtually no return. Crores are spent in SWAN (State Wide area Network) but do we consider what the average uptime of the WAN is? No application software can be sustained in such a poor functional network, a crying need especially in the rural belt. Secondly, data accuracy, completeness and dependence is a concern. Most of the initiatives starts with generating new set of Numbers as identifiers. Buzzword now is Aadhar (Unique Identification Number) of all citizens of India, along with figure print and retinal image, to weed out duplicity of data. Now let us pause and think, how colossal will be the project to collect all these data from scratch from the citizen vides data collection operators. We know with progress of time, we have data bank of citizen reflected under various projects like voter ID card, ration card, PAN card, bank account, driving license, passport and DIN (Director Identification No). Before going in for an all India Drive to create another No (UID) is it not a worth while project to reconcile electronically and create a smaller manageable subset of consistent target group, inconsistent of 1st order, 2nd order and like so that the problem could have been more manageably addressed. Thirdly, initiatives to use the data across the enterprise and at each government department define its own data islands. Reconciling these is near impossible. An example can be cited from Public Health scenario. Ministry of Health and Family

Myth Reality

� Investment is synonymous with computerization

� The Magic Factor � The Blame Syndrome � Passing the Fault � Rules for Others � Transparency is selective

� Garbage In – Garbage out � Burden of Data � Importance of Consistency � Handling Accepting Transparency/

Embracing a rule based system/ Exception handling flexibility

� Responsiveness and Commitment

Welfare, GOI promotes vertical health programs under National Rural Health Mission (NRHM) like Reproductive & Child Health Program (RCH), National Anti-Malaria Program (MCP), National Leprosy Eradication Program (NLEP), Revised National Tuberculosis Program (RNTCP), National Program for control of Blindness (NPCB) and National AIDS and STD Control Program (NACO). Each one of these programs has its own set of identifier, encompassing them though a Unique no like a health card no may be a good step to identify the beneficiary. Fourthly, accepting transparency and embracing a rule based system with exception handling flexibility. This is most important in ensuring data accuracy, but due to operational ease, many vital validations are compromised leading to data corruption, which is very difficult to identify and eliminate at latter stage.Challenges in Adoption of IT in Government Process

In Government business process, the most critical is to define the need, identification of the stake holder, the data source, the validation rules, the exception condition, etc. Carrying out a Business Process Re-Engineering (BPR) is next to impossible, the rules and the usual practice are many a times cross each other. So store – reproduce – leave all option of updation is the best philosophy in designing an information system that will be acceptable to Government Staff, resulting in low data accuracy. Thus, the problems usually faced in Government Paradigm can be summarized as: incapability to quantify the need, “Wishful Thinking” syndrome, fighting the obsolesce factor and maintaining productivity, low data accuracy, administration seldom can accept transparency and menace of information hiding, that is mostly prevalent in manual system, continues to be the biggest threat. Inner Contradiction of Business Process and Governance

In government paradigm, data value and reference to statistics is so rampant, that give rises to many data set that are sacrosanct, any modality to cross verify

Bigger the enterprise, the complex is the model, so no one application software can address the entire gamut.

CSI Communications | November 2011 | 19

such figures are highly looked down upon, no matter what the merit of the process is. A manual process with in-build checks and balance is the ideal scenario of an IT enabled business process implementation that will deliver acceptable results. Mindset that poses a stumbling block in designing / defining a business process is reflected in the following observation:

� Many data and practices are sacrosanct

� Computerization process are looked down upon as mere exercise towards sophisticated office

� Perception of Computers as Office Furniture are not un-common

� Huge volumes of documentation that each of our government office generates vide consultants, NGO, Research Projects, IT Initiatives are colossal are all stand alone effort.

� Estimating the government willingness or compulsion to institutionalize is essential.

� Is IT been looked upon as a vehicle of Reforms?

� Are we using IT as a cover-up? Carefully mapping the right mix of

mindset is essential in defining the right business process.Issues and relevance of eGov-bus in Indian context

Bigger the enterprise, the complex is the model, so no one application software can address the entire gamut. When we think a state as an enterprise, 26 state applications can lead us to country wide application. So, if we ever dream of integrating all the e-Gov applications, what we get is essentially an eGov-Bus. The eGov bus is presently underway in European Community at national, federal and local level so the stakeholders can easily link up to. The concept of eGov bus leads to an interoperable future architecture for collaboration of IT implementations across businesses and

government agencies. A similar approach like EU eGov Bus is critically needed for standardization and exception processing for Indian e-Governance scenario. Where to start that to ensure convergence? We suggest any manual process with check and balance is the right choice to convert the same to an IT Enabled business process. Defining a reformed business rule and exception handling for such process are easy and yield tangible results. One must keep in mind that there is a need of sustained effort to generate any tangible outcome. So learning from mistakes from previous IT projects is very essential, scrapping an existing application and starting afresh without a critical study of the gaps of the earlier efforts may many a time land us in repeating the same mistakes. Capacity building not only in terms of IT Infrastructure, but human skill set, new enhanced workflow, a revised system of monitoring and evaluation is absolutely essential to ensure a success in any IT projects.Towards better governance

It is evident that slow change management is required for sustenance of information system. Addressing to change management request is an integral component of any IT enabled application system. We suggest a practical approach to change management that assures low intensity conflict management. The practical cycle in the design phase is to address, as-is process and to-be process through the System Design Document (SDD) an overall understanding of the MIS need and the non-compromising validation rules. During the deployment phase, the practical approach is to remove most of the validation except for the non-compromising ones and make the system naïve as possible to infuse confidence among the users (Government Employee) ensuring that they understand that their flexibility are not lost.

Once the users adapt to the IT – enabled system, and the practice is institutionalized we must endure that all the validation rules are reverted back and the system is as close as the design definition. But during this roll over administrative protection are needed which are seldom present, so the software takes all the blame.

So,the fate is that in reality, the most obvious conclusion, what has been going on is inadequate or less performing, in effect spurious. We need to overhaul and change but not as that now come in a new project and start overall again. IT has the power to achieve positive correlation with better governance when deployed with holistic approach across organizational operational boundaries. We strive for the right synergy with collaborative IT implementation for better governance.References1. Advanced eGovenment Service Bus

(eGov-Bus): http://www.egov-bus.org2. eGov-Bus: Advanced eGovernment

Information Service Bus, http://cordis.europa.eu/fetch?CALLER=PROJ_ICT& ACTION = D&CAT=PROJ&RCN=93608

3. Soha Maad and Frank Bannister, “An overview of egovernment research in the EU arena”, Proceedings of tGov Workshop 11 (tGOV11), Mar 17–18m 2011, Brunel University, West London, UK

4. Michal Gajewski, Witold Staniszkis, and Jakub Strychowski, OfficeObjects Service Broker — An Intelligent Service Integration Platform, Proceedings of the 10th International Conference on Web Information Systems Engineering (WISE ‘09), Gottfried Vossen, Darrell D. Long, and Jeffrey Xu Yu (Eds.). Springer-Verlag, Berlin, Heidelberg, pp.57-58, 2009.

5. eGov-Bus 1st year review Advanced eGovernment Information Service Bus eGov-Bus, FP6-IST-4-026727-STP, 1st Formal Review Meeting 28.02.2007, Brussels eGov-Bus Witold Staniszkis Rodan Systems S.A [email protected]

n

About the AuthorDebasis Mullick is the founder Director of Semaphore Computers Pvt Ltd at Kolkata. Earlier, he worked with Bethlehem Steel, GTE – Reston Virginia and IBM-Dallas As/400 Support Center in USA. He received BSc(Hons) in Physics from Presidency College, Kolkata and BE in Computer Science from Indian Institute of Science, Bangalore. He has over two decades of extensive experience in several IT implementations including Manufacturing Activity Control System, Health Care Management Software. He is a consultant to several Government departments of the state of West Bengal and has implemented several governance projects in the state.

CSI Communications | November 2011 | 20 www.csi-india.org

Research Front Saini Das* and Arunabha Mukhopadhyay*** PHDStudent,IndianInstituteofManagement,Lucknow** AssistantProfessor,IndianInstituteofManagement,Lucknow

Security and Privacy Challenges in Telemedicine

1. IntroductionIn April, 2004, stolen health records

containing sensitive medical information about hundreds of U.S. patients were discovered on a computer server in Malaysia controlled by cyber criminals. The stolen files included names of health care providers, medical history summaries, diagnoses, prescriptions, insurance details and other personal information, such as Social Security numbers, birthdates and addresses of the patients[1]. In July 2010, an unknown virus hit the information system of the Kern Medical Centre (KMC). No patient records were stolen. But the online services of KMC were disrupted for three consecutive days forcing the entire hospital to work on paper and pencil [2]. In May 2009, California regulators fined Kaiser Permanente $250,000 for failing to prevent healthcare workers from accessing the electronic health records (EHR) of a woman who had given birth to octuplets. Cyber attacks on patients’ Electronic Medical Records (EMR) and health information systems (HIS) can lead to severe consequences like patient identity disclosure, embarrassment, privacy violation and in the worst case, integrity violation resulting in patient’s death.

Similar incidents will lead to disastrous consequences on HIS and other telemedicine initiatives listed below. International MedioNet of China (IMNC) network initiative connects 300 hospitals (i.e., 3000 specialists) to remote patients through telephone lines and the internet[3]. Emergency Room Link (ER-LINK) in Tucson, Arizona, USA is a telemedicine projects that uses mesh wireless technology to improve the

Telemedicine networks are susceptible to cyber breaches that pose an immense threat to the C-I-A (confidentiality, integrity and availability) of patients’ electronic medical records. Patient’s medical records contain very sensitive information which should not be made accessible to unauthorized persons in order to protect patient privacy, integrity and confidentiality. At the same time patient information should be readily available whenever required by authorised users for authentic purpose. In this paper we explore the various security and privacy threats that can affect e-governance telemedicine projects.

Fig. 1 : Schematic diagram of telemedicine project

management of trauma[4].In India too, telemedicine has been

transforming lives of the rural population. DakNet, an e-Governance initiative, is an ad hoc network that uses wireless technology to provide cost–effective healthcare in rural areas[5].

Another telemedicine project, called the AirJaldi network, was implemented in Dharamsala in northern India. It uses wireless mesh network

to provide Internet access and VoIP services for teleconsultation to about 10,000 users within a radius of 70 km in rural mountainous terrain[4]. In another initiative, Indian Space Research Organization (ISRO) in collaboration with various state governments, has provided a telemedicine network that stretches to around 100 hospitals all over the country with 78 remote/rural/district hospitals connected to

Saini Das is a final year PHD student of the Information Technology & Systems area at Indian Institute of Management, Lucknow. Prior to this, she has worked at Infosys Technologies Ltd. for 3 years as a software developer. Her research interests include assessing Information security risks in networks, security risks in e-governance and e-commerce, cyber risk insurance and piracy.

CSI Communications | November 2011 | 21

22 speciality hospitals located in major cities. Another telemedicine project has been implemented in Andhra Pradesh on a public-private partnership (PPP). The district hospitals serve as Telemedicine Consulting Centre (TCC) and a private Hospital serves as Telemedicine Specialist Centre (TSC) [6]. Another example of a successful telemedicine project in India, is the Aravind Eye Care System, the largest private eye-care provider in the world by volume. It has deployed a rural wireless telemedicine system in southern India, enabling patients from remote rural areas to get eye check-ups and treatment at a minimal rate from their locality. In 2006-2007 alone, Aravind saw 2.3 million patients and was able to perform 270,000 eye surgeries [7]. Such high profile wireless telemedicine systems run high risk of being attacked by cyber hackers.

Telemedicine is the use of electronic information and communication technologies to provide healthcare to participants who are separated by distance[8]. This is an area where medicine, information and telecommunication meet to provide an effective solution for speciality healthcare to rural patients in the form of easy access and low cost. Figure1 shows a schematic diagram of a telemedicine project. Telemedicine is an important and perhaps the most challenging sector of e-governance. Telemedicine projects have to face challenges like (i) integration with the medical practice and the healthcare system, (ii) identification with the e-governance vision and policies of the nation, (iii)it’s economic implication and (iv) it’s social impact[9]. Apart from these there are several other challenges like (v) sustainability, (vi) security, (vii)legal and ethical issues still related to telemedicine[10].

In the following sections we discuss the security issues that might adversely affect e-governance telemedicine projects of a nation.

Table 1 : Security services and their applications to telemedicine

Security Service Description

Confidentiality � Most fundamental functionality of security � Ensures that the information is disclosed only to authorized

individuals. � A person should be granted access to a patient information

only after proper identification and authentication � Each individual should know only the amount of information

needed to perform their job. However, this should not interfere with proper care of the patient

Integrity � Information should be accurate while being used or transmitted electronically

� There should be a system that provides evidence against unauthorised modification of patient information

Availability � Patient information should be readily available even when there are unpredicted power outages or hardware/software failure.

� An effort should be made to prevent disasters (natural, machine faults, etc.)

Arunabha Mukhopadhyay is an Assistant Professor of Information Technology & Systems Group at Indian Institute of Management Lucknow. He is a PhD from IIM Calcutta, in the area of Management Information Systems. He was awarded the Infosys scholarship during his PhD. Prior to it he has done his Post Graduate Diploma in Business Management (PGDBM) majoring in Finance, from IIMC.

2. Implications of cyber attacks on telemedicine network

Patients using telemedicine are worried about the privacy of their transmitted electronic medical record(EMR) from which their identities could be revealed. Patients’ medical records contain very sensitive and confidential information which should not be made accessible to unauthorized persons in order to protect patient privacy, integrity and confidentiality. For example, there was an incident where an individual publicly displayed a confidential list of all Florida residents having AIDS. This list contained approximately 4000 names and raised a huge concern about the handling of personal medical information[11]. While the actuality (preciseness of information at a given instant) and reliability (authentication of origin and integrity) of patient information is of utmost importance, it is also to be ensured that the patient information is readily available to all authorised health-care providers, in order to enable the proper treatment of the patient.

Any tampering with the integrity of

an EMR can result in consequences as severe as the death of a patient. Thus the requirements of C-I-A (confidentiality, integrity and availability) of patient health data have to be met in any e-healthcare network[12]. Table 1 describes how the security services of confidentiality, integrity and availability(C-I-A) are applicable to healthcare.

The already known security challenges to telemedicine and e-healthcare have become even more complex in the presence of newer trends like wireless networking[13]. Hence, impact assessment of a cyber attack on any network has gained importance to analyse the security risk to it.

3. Security and Privacy ThreatsAttacks can be grouped into four

categories depending upon the kind of hindrance to normal information flow as shown in figure 2.[14]. (a) Interruption: This is an attack on

availability(A) of information. Information becomes unavailable or gets destroyed.

(b) Interception: This is an attack on confidentiality(C) of information. An unauthorized third party gets access to information.

(c) Modification: This is an attack on the integrity(I) of information. An unauthorized third party not only accesses the information but also tampers with it.

(d) Fabrication: This is an attack on authenticity of information. An

CSI Communications | November 2011 | 22 www.csi-india.org

unauthorised third party enters fabricated message into the information.Attacks on telemedicine network

can be grouped into two broad categories depending on their type:

Active attacks: These attacks include modification, interruption or fabrication of patient information and are of three kinds:(a) Masquerade : This can affect both

confidentiality(C) and integrity(I) of information. In this case an entity attempts to fool a system by misrepresenting oneself and pretending to be another entity.

(b) Modification of messages: This affects the integrity(I) of information. This occurs when a portion of a legitimate message is altered or messages are withheld and reproduced later to produce an unauthorised effect.

(c) Denial of service: This attack affects the availability of information. In this attack, an attacker makes some computing or memory resource too busy to handle legitimate requests and denies legitimate use or management of communication facilities[15].Passive attacks : These attacks

include interception of information but not alteration. These attacks are accomplished by monitoring a system performing its tasks and collecting information. These

include eavesdropping, sniffing or traffic analysis kind of activities. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user. Such attacks are broadly grouped into two categories:(a) Release of message content: A

telephone conversation, an E-mail message or patient data transfer can be easily accessed without effecting the message[16].

(b) Traffic Analysis: All incoming and outgoing traffic of the network is analyzed but not altered by an unauthorised third party to gain information required to understand the nature of communication.

4. Control MeasuresVarious preventive, deterrent,

detective and corrective measures have been employed to minimise the damage caused to telemedicine projects due to privacy and security attacks.

One such deterrent measure was the creation and enactment of the Health Insurance Portability and Accountability act (HIPAA) in1996. This was aimed at developing standards and requirements for the transmission and maintenance of health information electronically. Apart from such regulatory measures, several technological and financial measures have also been taken to reduce the impact

of security and privacy breaches on telemedicine networks.

However, we all know that “a system is only as secure as its weakest link”. Hence, a weak link or a vulnerability that might develop at any point in a telemedicine network could be exploited by a security threat. Thus, it is extremely important to assess the risk of privacy and security breaches on a telemedicine network to be able to take appropriate relevant measures to prevent potential damages.

5. ConclusionTelemedicine, the most challenging

sector of e-governance, provides cheap and effective healthcare to rural patients. However, information privacy and security issues continue to plague telemedicine projects, especially due to the extensive use of new communication technologies like wireless network. Patient’s medical records contain very sensitive information which should not be made accessible to unauthorized persons in order to protect patient privacy, integrity and confidentiality. At the same time patient information should be readily available whenever required by authorised users for authentic purposes.

Attacks like interruption, interception, modification and fabrication of information threaten the security services of confidentiality, integrity and availability(C-I-A) of information. These attacks can also be categorized as either active or passive depending on whether they modify, fabricate or intercept the information.

Though various preventive, deterrent and control measures have been employed, a small vulnerability might be exploited by a security or privacy threat to cause immense damage. Hence the risk of privacy and security breaches on a telemedicine network should be assessed to be able to take appropriate measures to reduce potential damages.

References[1] Brewin. B (2008). URL: Cyber criminals

overseas steal U.S. electronic health records. Available at: http://www.nextgov.com/nextgov/ng_20080516_ 2203.php. Accessed July 19, 2011.

[2] Burger. J(2010). URL: Kern Medical Center battling virus. Available at: http://www.bakersfield.com/news/local/x534570019/Kern-Medical-Center-

Fig. 2 : Categories of security threats

CSI Communications | November 2011 | 23

Disclaimer

The article titled “Revisiting NeGP: eBharath 2020: the proposed future NeGP 2.0” by C S R Prabhu, published in October 2011 issue of CSIC, is contribution of the Author in his personal capacity. The NeGP 2.0 described in the Paper is to be considered only as a suggested approach for e-governance in future by the author C S R Prabhu. The suggested approach and the views expressed are entirely personal and in no way to be construed to represent the views of the Government and of the Organization to which the Author is Affiliated.

battling-virus. Accessed July 19, 2011.[3] Wang. Z and Gu. H. (2009). “A Review of

Telemedicine in China”. Online Journal of Space Communication. Issue No. 14

[4] Wang. X. (2008) “Wireless Mesh Networks”. Journal of Telemedicine and Telecare. Vol 14, pp 401–403

[5] Pentland. A, Fletcher. R, and Amir Hasson, “DakNet: Rethinking Connectivity in Developing Nations”.Computer, IEEE Publishing Society.

[6] Ramani. K V (2004). “IT Enabled Applications in Government Hospitals in India: Illustrations of telemedicine, e-governance, and BPR”. Proceedings of the 37th Hawaii International Conference on System Sciences.

[7] Surana. S., Patra. R., Nedevschi. S. and Brewer.E. (2008). “Deploying a Rural Wireless Telemedicine System: Experiences in Sustainability”. Computer. Vol 41 No. 6. pp 48-56.

[8] Liqiong. D. and Marshall. S. (2002). “Learning Through Telemedicine Networks”. Hawaii International Conference on System Sciences.

[9] Solaiman. B., Cauvin. J.M., Puentes. J., Le Guillou. C., Brunet. G., Debon. R. and Roux. C. (2001) “Enabling Technology for Telemedicine and Telehealth”. Proceedings of the 23rd Annual International Conference on Engineering in Medicine and Biology Society.

[10] Johnston. M. (2000). “DSL (Defending Someone’s Lair) in the ‘Always-On’ World of High-Speed Internet from the Home”. Global Information Assurance Certification Paper. SANS Institute.

[11] Ashley. R.C. (2002). “Telemedicine: Legal, Ethical and Liability considerations.” Jounal of the American Dietetic Association. Vol 102. No.2

[12] Kovacevic. S., Kovac. M. and Knezovic. J. (2007) “System for Secure Data Exchange

in Telemedicine” 9th International Conference on Telecommunications

[13] Puentes. J., Bali. R. K., Wickramasinghe. N., Naguib. R.N.G. (2007). “Telemedicine trends and challenges: a technology management perspective” International Journal of Biomedical Engineering and Technology. Vol. 1, No.1 pp. 59 - 72.

[14] Zain .J. and Clarke. M. (2005). “Security In Telemedicine: Issues In Watermarking Medical Images”. 3rd International Conference: Sciences of Electronic

[15] Kendall. K. A. Database of computer attacks for the evaluation of intrusion detection systems. Master’s thesis, MIT, USA, June 1999.

[16] Zhang. Y., Lee. W. and Huang. Y. (2003) “Intrusion Detection Techniques for Mobile Wireless Networks”. Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, pp. 545-556.

n

Spoken Tutorial Project - IIT Bombay

The Spoken Tutorials Project-IIT Bombay makes this possible...and you don’t have to leave your campus!

Organise Workshops in your campusSpread awareness in your community

Spoken Tutorial IIT Bombay

National Mission on Education through Information and Communication Technology (NMEICT)http://www.sakshat.ac.in

Learn Open Source Software for Free(Linux, LaTeX, Scilab, Python, PHP & MySQL, etc.)

Become a Campus Ambassador

For more information go to http://spoken-tutorial.orgEmail: [email protected] [email protected] No.: 022 2576 4229

What are Spoken Tutorials?10 minute video tutorials to teach a softwareUseful to learn Open SourceSoftware independently

Talk To A Teacher

Do well in Exams!Get good jobs!

Get involved and help develop our Nation!

Help Bridge the Digital Divide!

CSI Communications | November 2011 | 24 www.csi-india.org

Article K Sudheer Krishna FinalyearB.Tech.student

“Cloud failures are as complex as the underlying software that powers them.”

People sometimes say that clouds aren’t built to enterprise standards. In one sense, they aren’t — most aren’t intended to meet enterprise requirements in terms of feature-sets. However, in another sense, they are engineered to far exceed anything that the enterprises would ever think of attempting themselves. Every day, within these clouds, a whole host of small errors occur, that would be outages if they occurred within the enterprise — server hardware failures, storage failures, network failures, even some software failures — and these are handled invisibly at the back-end. Most of the time, self-healing works the way it is supposed to work but sometimes it doesn’t.

Mostly, to run infrastructure on a massive scale, one should utterly depend upon automation. Automation, in turn, depends on software, and no matter how intensively you do quality testing and quality assurance of your software, you will have bugs. It is extremely hard to test complex multi-factor failures, in advance.

Some of the major outages are listed below in chronological order, with the date of occurrence mentioned in parentheses. Note that this is not an exhaustive list but one that records the most recent incidents that have adversely affected public opinion of cloud computing. 1. Hosting.com (June 1, 2010) Hosting.

com, in their words, “offers managed dedicated hosting solutions, including domain name sales, to businesses.” However, their claim of providing “always-on” service suffered a blow, when their data center at New Jersey went down for two hours. The company attributed the cause to a software bug in a Cisco switch.

2. Twitter (June 11, 2010) Twitter

needs no introduction. Also, sporadic failures, usually lasting a few minutes, are nothing new for this site that made “microblogging” part of the popular lexicon. However, in June last year, this problem became increasingly acute, because of what the company described as the Soccer World Cup phenomenon, when traffic was much higher than normal. Again, this raised questions about cloud computing’s scalability attribute.

3. Skype (December 22, 2010) The problem is best described by what the company posted on its official blog: “Skype isn’t a network like a conventional phone or IM network — instead, it relies on millions of individual connections between computers and phones to keep things up and running. Some of these computers are what we call ‘supernodes’ – they act a bit like phone directories for Skype. If you want to talk to someone, and your Skype app can’t find them immediately (for example, because they’re connecting from a different location or from a different device) your computer or phone will first try to find a supernode to figure out how to reach them. Under normal circumstances, there are a large number of supernodes available. Unfortunately, today, many of them were taken offline by a problem affecting some versions of Skype. As Skype relies on being able to maintain contact with supernodes, it may appear offline for some of you.”

4. Hotmail (December 30, 2010) This was a precursor to the bigger outage that was to happen to its biggest competitor two months later. Information from around 17,000 user accounts was suddenly deleted, and it took Microsoft two days to restore

normalcy. Improper load balancing between servers was blamed. (I enquired about this issue, and was informed that it had really created such a server imbalance factor).

5. Gmail (February 27, 2011) When the most popular email service in the world goes down, even if for only a few hours, lots of people are affected and the news spreads fast.

6. Intuit (March 28, 2011) Intuit is a company that develops financial and tax preparation software and related services for small businesses, accountants and individuals. Four months ago, several of its popular services like QuickBooks Online, QuickBooks Online Payroll and Intuit Payments Solutions went down in a cloud computing outage that the company blamed on faulty maintenance, effectively human error, much like Amazon. Unfortunately for Intuit, this was the second such issue within a year, a similar problem having occurred in June 2010.

7. Epsilon (April 1, 2011) Epsilon, a personal mailman of big companies (which in other words means one who managed their email communications), communicated that there had been a data breach, where emails and names of their customers’ customers were compromised.In conclusion, it can be said that

there is no denying that errors occur, equipment goes down and technology fails. However, cloud computing as a technology is still in the growing stage; consequently, some problems are to be expected. The best way to react is to use them as learning experiences and come up with industry best practices to prevent such occurrences in future. n

Incidents of Cloud Computing Failure

Sudheer Krishna is a final year student of B.Tech (CSE) class at Bapatla Engineering College, Bapatla. His

subjects of interest are Data Structures, Computer Networks and Operating Systems. He takes part in various

extra-curricular activities and has attended conferences and seminars on subjects like high performance

computing, networking, ethical hacking etc. respectively.

CSI Communications | November 2011 | 25

Practitioner Workbench

Dr. Debasish JanaEditor, CSI Communications Vice Chairman, CSI Kolkata Chapter

Innovation.wizard() »

iCon in Remembrance : Steve Paul Jobs

October 5, 2011, changed the world. Steven Paul Jobs is no more with us. “Three apples have changed the world. One seduced Eve,

second awakened Newton, the third one was in the hands of Jobs”, this was a message widespread like anything over web and social networking sites on the news of his demise. “We’re gambling on our vision, and we would rather do that than make ‘me too’ products.” – once told by Steve, the greatest pacesetter, the leader who understood innovation, a great visionary man of modern times with full of imagination. Steve Jobs, who didn’t sell products, but sold dreams, passions, through creativity and revelation. At the age of 27, as Chairman of Apple Computer, he could boldly say, “I get my jollies building good computers”. He introduced innovative yet ergonomically appealing products in the market from apple Mac, then iMac, iPod, iPhone and iPad tablet. Sleek and beautiful, yet complete power packed with all kinds of fun and technology were the key drivers to his products.

He was a dropout at birth by his biological parents Abdulfattah Jandali, a Syrian Muslim and Joanne Schieble, an American. His life started as an adoptee by Armenian couple Paul and Clara Jobs. Later, he joined college studies but didn’t like studies in formal way. Being a dropout from Reed College, a calligraphy class aroused the innovator to bring the typography of computers, came Apple Mac with multiple typefaces and probably first time beautifully spaced fonts in right proportions. While continuing his favourite classes for audit, not for credit at Reed, he used to sleep on his friends’ room floor, manage money by returning empty Coke bottles and getting free meals at the local Hare Krishna temple at Orgeon.

As told by Patricia Sellers, Editor at Large@Fortune, “Steve Jobs didn’t have an engineering degree, and he was no programming wizard. He let his innovative brain flow freely”.

However, he had the eye of an artist for innovation in design combined with the engineering brain. He was an incredible bequest of art in technology. Way back in 1984, Macintosh became the first ever profitably triumphant small computer having a graphical user interface and that too spectacularly beautiful – all came from emotional Steve. Ironically, in 1985, Steve had to depart from Apple, his dream, later he told “The heaviness of being successful was replaced by the lightness of being a beginner again, less sure about everything. It freed me to enter one of the most creative periods of my life.” And truly so, Next, Pixar were born and all with flying colors and Pixar was later partnered by Walt Disney. In 1996, Jobs was back in Apple as Next was bought back. Technology migration took place because of the merger, NeXTSTEP evolved into Mac OS X, the operating system of Mac systems.

Later, iMac was introduced with appealing designs and powerful branding. Jobs became the permanent CEO of Apple in 2000. Jokingly, he used to be called iCEO. In 2001, Steve Jobs introduced the very first iPod. The rest is history. The iPod claasic was a hard drive-based device carrying tons of music, yet sleek and small, above all the beautiful ergonomics grabbed the market. Later models used flash memory, touchscreens and became smaller and smaller.

Steve Wozniak, Apple co-founder and engineering aficionado wrote interpreter for Integer BASIC, a variation of BASIC on the Apple I and later Apple II computers. This was available on cassette, later included in ROM on Apple II in 1977, was an amazing fun to many proud early owners of home computers keeping their pride at their cozy corners of their dwellings. It was so easy to learn and loaded with full of fun to appeal creativity, to program the machine to follow instructions. Post 1983, emerged Apple IIe with display in lower-case characters, earlier was all

* Image used with permission from imissstevetshirt.com, Copyright 2011 This image may not be reproduced without express written permission by the owner.

*

*

CSI Communications | November 2011 | 25

CSI Communications | November 2011 | 26 www.csi-india.org

Innovation.wizard() »

In remembrance: Dennis M. Ritchie, the father of C and co-creator of Unix

capital letters. A breakthrough again.“Innovation distinguishes between a leader and

a follower”, told by Steve Jobs and the greatest innovator remained always ahead of time by mixing art in technology. “Being the richest man in the cemetery doesn’t matter to me”, once told by Steve, “Going to bed at night saying, I’ve done something wonderful. That’s what matters.” He always followed his heart and advised others too. His passion for typography gave us first Mac with beautiful fonts, his passion for music gave us the tiniest MP3 player, his passion for animation gave us Toy Story, his passion for slender portable phone gave us iPhone and what not. All of his creations show great creativity and all are simply splendid yet splendidly simple (to use)!

Jobs were very much obsessive towards perfection, but he also admitted that “Part of what made the Macintosh great was that the people working on it were musicians, and poets, and artists, and zoologists, and historians who also happened to be the best computer scientists in the world.” “Do you want to sell sugar water for the rest of your life, or do you want to come with me and change the world?” told by Steve to make Pepsi executive John Sculley consider Apple to join.

Steve had some interesting connection to India. In his teens in early 70s, he traveled around India in search for spiritual illumination. Jobs tried to meet Neem Karoli Baba, the guru

along with his college friend Dan. Reports establish that Neem Baba was dead before they met and after meeting several ‘Sadhu’s, Jobs got disillusioned amidst extreme poverty. He commented, “We weren’t going to find a place where we could go for a month to be enlightened. It was one of

the first times that I started to realize that maybe Thomas Edison did a lot more to improve the world than Karl Marx and Neem Karoli Baba put together”. Later, Dan joined as the first employee of Apple. Steve became a Buddhist during his India visit and remained so. He was a vegetarian who ate fish but no meat. His wedding was deified by a Zen Buddhist monk. Much later in 2006, Apple’s plan to have a centre in Bangalore did not turn up and as India was not considered as cost-effective as thought.

Whatever he might have been called, an iCon, an iCEO, iconoclast, dreamer, creative genius, his powerful inventions that had shaken the world are all his famous iMac, iPod, iPhone, iPad – all from this iGenius.

While he is no more, a hard reality, eternal truth of demise taking him physically away, his words remain and endure.... his final words from his commencement speech delivered to the graduates of Stanford University in 2005 – “Stay Hungry, Stay Foolish”. n

CSI Communications | November 2011 | 26

The silent demise of Dennis M. Ritchie (b. September 9, 1941) on October 12, 2011 is a sure disconcert. He is the creator of C programming language and the co-creator of Unix Operating System. In a popular social networking site, Twitter, James Grimmelman commented that “His pointer has been cast to void *; his process has terminated with exit code 0”. Someone else posted on social networking site as:

//R.I.P. Dennis Ritchie#include<stdio.h>int main(){ printf(“Goodbye, World.\n”); return 0;}Kerninghan wrote to USENIX, “Dennis changed the world and

we are all indebted to him”. Born in Bronxville, New York to a scientific family, Ritchie

attended Harvard, where he earned Bachelor’s degree in physics in 1963 and a doctorate in applied mathematics in 1968. In a biography, he wrote “My undergraduate experience convinced me that I was not smart enough to be a physicist, and that computers were quite neat....my graduate school experience convinced me that I was not smart enough to be an expert in the theory of algorithms and also that I liked procedural languages better than functional ones.”

Dr. Ritchie had worked at Bell Laboratories for four decades, from being a Harvard doctoral student until retirement in 2007. In an age of obscure programming, Dr. Ritchie started working on a simple yet very classy programming language, C was born. Dr. Ritchie developed the operating system Unix with his colleague Kenneth Thompson at Bell Labs and the C language was the foundation for Unix. Recipient of the Turing Award from the Association for Computing Machinery in 1983, Dr. Ritche is the man behind modern computing, among almost everywhere, from personal to cloud computing, from operating systems running on desktops to smart phones and tablets, we see variant of C and Unix, if not directly.

Ritchie and Thompson were awarded the National Medal of Technology and Innovation “for their invention of UNIX operating system and the C programming language, which together have led to enormous growth of an entire industry, thereby enhancing American leadership in the Information Age.”

A silent departure of this pioneer computer scientist is of extreme despair to all of us.

CSI Communications | November 2011 | 27

Practitioner Workbench

Achuthsankar S. Nair* & Kashyap Chhatbar*** Editor, CSI Communications** Centre for Bioinformatics, University of Kerala

We have seen how Perl handles flat file databases. Most real life applications of course require MySQL or Oracle kind of databases. We will see how the Perl DBI (database interface) can be used to achieve this. We need to install MySQL server before demonstrating this. For this, download MySQL Community Server from the website: http://dev.mysql.com/downloads/mysql/. Install MySQL Server and configure it with a password.

Now, we will consider a toy table with attributes ID numbers, Names and Age as follows:

ID Name Age201 Maalu 10202 Meera 36203 Mary 18204 Manu 40

Let us see how we can create this table in MySQL using Perl DBI. Of course we can make the table with MySQL commands.

Let us give our toy database a name, say ‘BioData’. To create this database, use the snippet described below.use DBI;$bridge=DBI -> connect(‘dbi:mysql:’,’user’,’password’,) or die;$query=qq{CREATE DATABASE BioData};$bridge -> do($query);

The above variable $bridge is a Database Handle to MySQL database ‘BioData’ which enables Perl to access and modify data. Now we can add tables to this database and enter records in the tables. Select the database ‘BioData’ and create table ‘test’ in the database. Here’s how it is achieved.use DBI;$bridge = DBI -> connect(‘dbi:mysql:BioData’,’user’,’password’,) or die;$sql=qq{CREATE TABLE test (ID INT(3), Name VARCHAR(9), Age INT(2))};$return=$bridge->do($sql);if ($return) { print “Table added”; } else { print “Failed”; }

After the successful creation of the table, values are to be entered. The successful execution of the following snippet ensures that the database is saved and the records are updated. $query = “INSERT INTO test VALUES(‘201’,’Maalu’,’10’),(‘202’,’Meera’,’36’),(‘203’,’Mary’,’18’),(‘204’,’Manu’,’40’)”;$bridge->do($query);

The ALTER TABLE syntax helps us to perform many modifications and additions to the table. For example, to add new columns to the table:$query=”ALTER TABLE test ADD Gender VARCHAR(1)”;$bridge->do($query);

The above snippet will add a new field to our table. As there is no data entered in Gender field, let us delete that field. Here’s how we can remove a field from table.

$query=”ALTER TABLE test DROP Gender”;$bridge->do($query);

Perl can take data from the MySQL database as simple text and convert them to different formats. Take an example of our database ‘BioData’.

The following snippet allows you to print the data.use DBI; $bridge = DBI -> connect (‘dbi:mysql:BioData’, ‘user’, ‘password’,) or die;$query = $bridge->prepare(‘select * from test’);$query->execute;while (@row=$query->fetchrow_array) {print “@row”; print “\n”; }$query->finish;$bridge->disconnect;

Here, Perl script selects all the columns from table ‘test’ and iterates data row by row. The intuitive extraction of data may include filtering similar data from large datasets.

How about extracting only Name and Age from the table?use DBI; $bridge = DBI -> connect (‘dbi:mysql:BioData’, ‘user’, ‘password’,) or die;$query = $bridge -> prepare(‘select Name, Age from test’);$query -> execute;while (@row=$query -> fetchrow_array) { print “@row”; print “\n”; }

In the above snippet, the script describes specifically which columns to be selected.

What if we want to extract information about people aged more than 20?use DBI; $bridge = DBI -> connect (‘dbi:mysql:BioData’, ‘user’, ‘password’,) or die;$query = $bridge -> prepare(‘select * from test where Age>20’);$query -> execute;while (@row=$query -> fetchrow_array) { print “@row”; print “\n”; }

The extraction of data from the database is the first step towards data processing. Perl’s intuitive text processing capabilities acting on extracted data, work as a powerhouse.

The client may want to save the obtained result into a CSV file.use DBI;open(A,”>data.csv”);$bridge = DBI -> connect(‘dbi:mysql:DataBase’, ‘user’, ‘password’,) or die;$query = $bridge -> prepare(‘select Name, Age from test’);$query -> execute;while (@row=$query -> fetchrow_array) { print A join(‘,’,@row),”\n”;}

CSI Communications | November 2011 | 27

Programming.Learn(Perl) »

Perl & Database Connectivity

CSI Communications | November 2011 | 28 www.csi-india.org

CIO Perspective

IT Strategy Nuances »

Hard Technology; Soft Social Underbelly!!!

Anil V. VaidyaAdjunctProfessor,S.P.JainInstituteofManagement&ResearchDoctorofBusinessAdministration(UK),MBA(USA),B.Sc.(Tech),B.Sc.,CISA,CISMEmail:[email protected]

Hard Technology; Soft Social Underbelly!!!

Technology has had a major impact on human lives, be in enterprises or in family setting. Conversely the social requirements and expectations affect technology deployment. This article visits the reciprocity of technology and social factors and the artificial duality. This social factor strengthens the earlier seven aspects of ‘IT Strategy Nuances’. The article proposes approach to adopt social factors in technology implementations.

The implementations of identical systems and standard applications have been known to result in varying outcomes for organizations. The expected result of standardization is rarely standard. The ‘one size fits all’ does not work in real world. The ‘best practice’ deployment through software does not appear ‘best’ in practice. The answer probably lies in the advice given by a CFO. He said MNCs needed to ‘harmonize’ their processes, while refraining from saying ‘standardize’ them. There was a subtle message here. The standardization forces people to do things as stipulated and to act as expected; the harmonization allows some latitude. Many technology implementers believe in decision-making school forgetting that the people do not follow every mandate blindly. People have their own interests and viewpoints. The employees rarely challenge mandates but they do cleverly interpret them to suit their own needs.

The impact of technology on organizational processes and structures and their reciprocal effect is developing into Social Studies of Technology (SST) focusing on construction of sociotechnologies. The reciprocity of

technology and organizational context has been well recognized. It is almost a cyclical development of technology changing the organization and in return, the organizational context affecting technologies. At the crux the effect is a mix of contextuality, rationality and complexity. Technology-in-practice was the term coined by Orlikowski to represent actual usage.

Corporate World - How do social forces affect intended technology deployment?

An Indian modern retailer planned an automated replenishment system connecting to the inventory and the suppliers. The aim was to reduce ordering lead time, simultaneously reducing inventory on racks and have fewer stock-outs. The manual intervention was significantly reduced through automation and interfaces with other systems. One of the side effects was the reduction of procurement manpower deployed in the back-office. Though it was rational that the company would have reaped quick benefits, the full implementation lagged behind the schedule in the face of employee resistance. They felt loss of importance and power. Steps had to be taken to convince employees about the gains from the new system. It also took some time till ‘now redundant’ employees were offered alternate acceptable roles.

An interactive response system was introduced by an Indian manufacturer to minimize phone call disturbance to the procurement department personnel. Information on orders, goods receipts, invoices and payment was made available through phone. The idea was to make enough information accessible to the

Technology has had a major impact on human lives, be in enterprises or in family setting. Conversely the social requirements and expectations affect technology deployment. This article visits the reciprocity of technology and social factors and the artificial duality. This social factor strengthens the earlier seven aspects of ‘IT Strategy Nuances’. The article proposes approach to adopt social factors in technology implementations.

vendors through the system so that the buyers would have to spend less time on answering standard queries. Vendors did not mind using the system but a passive opposition surfaced from unexpected quarters, from the same people who were supposed to be helped by the system. The buyers realized that their opportunities to chat with vendors dwindled; earlier such calls allowed them to gather more information. They resented not being able to connect to vendors on phone. The substitution of personal interaction by automated system was not received with enthusiasm. The personal touch used to help the buyers to build social capital that was missing in arms-length automated system. The new system usage turned out to be pretty low and did not justify the investment made. The implementation had to be tweaked to allow personal interaction.

On the ‘Social’ frontThe e-Government initiatives are

changing the way individuals work in society. The income tax website of Government of India that shows all deductions made earlier and advance tax paid has changed the mode of filing tax returns. People do not have to line up at the IT offices to file their returns. The display of records by PAN number has brought in transparency. The property tax records of municipal corporations are available on their websites. The downloaded bill can be paid, via netbanking, simplifying the process. The queues at the municipal office counters are shorter. Netbanking has almost eliminated visits to banks; as a side effect the customers have lost touch with the friendly banker. Meeting familiar customers at the bank is becoming rarer. The bank used to be a place to make friends while waiting for the cashier to offer the withdrawal. Besides, outsourcing at banks had led to another experience. Whoever visits the bank has to interact with unfamiliar outsourced service personnel across counters. While outsourcing and automation may seem to be two different activities one has to recognize that the automation has helped

CSI Communications | November 2011 | 29

outsourcing. The change in social setting is much

visible in family settings. The time spent on mobile devices, tablets and computers means less time for family gatherings. The so called ‘social networking’ happens to be all virtual, eating away the traditional family dinner time. The opportunities to be together have reduced; at the same time completing transactions through computers has become a lot easier avoiding waiting in queues. It is a trade-off between social interactions and the transaction processing times. Such changes have made researchers believe that the technology implementations need to be studied in light of social aspects. It should be part of social science studies instead of being included in ICT or computational arena.

technology implementations need to be studied in light of social aspects.

Institutional context, Reciprocity and the Outcome

Institutions establish their own norms, which in most cases are unwritten. People behave within this framework of norms, regulations and expectations. Such a mix is often called ‘culture’. To include all possible demonstrated behaviour that reflects the use of technological artefacts, ‘culture’ may be a misnomer. Usage of systems depends on the materiality of technology and on what people do with technology i.e. practice. Every practice is shaped by technological and institutional conditions and consequences (Orlikowski and Yates, 2006). Social scientists and researchers advocate that the strong interaction of social factors and technology requires that this subject be studied under the umbrella of social sciences and not be viewed in binary terms. Information technology is required to be viewed as an ingredient in a more complex process of social change, in which forces for transformation are frequently offset by forces for persistence (Robey and Boudreau, 1999 p. 182).

Structural changes are often undertaken as an important strategy for transformation. The management exercises its power to force new ways-of-working. The employees perceive loss

of power when they do not change their approaches or styles to accommodate changes in the organizational environment (Daniel, 1993). The ICT development and the organization imperatives have a reciprocal effect. The management intentions of improvement sought through IT implementations impact the social ordering of the organization, while social systems in the organizations affect the implementation. Such reciprocity has been noted by researchers like Constantinides and Barrett (2006). It is also argued that people’s ability to gain power over others undergoes significant changes as they get access to more resources. In effect, ICT implementations bring about changes in the social structure of organization as well.

The management intentions of improvement sought through IT implementations impact the social ordering of the organization, while social systems in the organizations affect the implementation.

Information systems may take institutional character themselves instead of changing them, in spite of the clear advantages new technologies may offer. A technology implementer needs to be aware of deeply embedded institutional practices in structure and bureaucratic notions. Schultze and Orlikowski (2004 p. 105) declared that challenges and unintended consequences are likely to emerge whenever firms deploy IT without considering micro-level practices and social interactions that enact their macro-level business strategies and network relations. Such implementation could seriously affect a firm’s viability where one or more vital character of the firm’s operations undergoes changes under IT implementations, without due consideration of underlying benefits of existing work practices.

Adopting social factors in technology implementations

From the previous discussion it is quite apparent that the social context needs to be factored in to technology implementation. This entails including definite actions and activities in the

project plan and taking the techno-change route instead of standard technology project management approach. These are some of suggestions: 1. There is a need to consider the pre-

adoption and post-adoption mental maps of the employees involved. The beliefs, attitudes and actions may change post-implementation of technical solution. The experiences gained during and after deployment form the basis for perceptions that have significant impact on usage of the system. The beliefs and attitudes also have temporal characteristics, means that they change over time. The situational considerations shape the behaviour as well. A study found that the change agents can be very effectively used at the pre-adoption stage, however in the long run the experiences shape the system usage.

2. The recursive nature of technology and social effects points to the concept of iterative review, planning and correction. It will never be a one-point plan that will set the relationship between technology and social aspects. The dynamics of environment and business will lead to continuous changes in social structures and processes which will in turn modify technology solutions. In the post-deployment period, the understanding of how people actually put technology to use will give rise to negotiated practices, as they get rooted. The post-implementation experimentation and learning is important to ensure that changes are not forced but negotiated and practices are recast and evolved.

the social context needs to be factored in to technology implementation. This entails including definite actions and activities in the project plan and taking the techno-change route instead of standard technology project management approach.

3. Social identities like professional, organizational and departmental identities influence the use of technology (Lin, 2010); Organizations

CSI Communications | November 2011 | 30 www.csi-india.org

Mr. Deepak Agnihotri, the new COO of CSI, has more than thirty years of experience, at a senior level with proven ability to combine technology, business and financial expertise, in developing and implementing corporate-wide short and long term technology solutions. In his previous assignments he has worked for Taj group, Times group, L&T Infotech Limited, Johnson & Johnson and Eureka Forbes Limited. The experience in working with varied industries like Manufacturing, Pharmaceutical, Consumer Goods, Heallthcare, Hospitality, Financial

services and Software services for many years managing Hardware, Software and technology, allows him to develop tactical plans determining the priorities and aligning the requirements with the business needs. Having successfully handled major operational challenges with high growth, high energy and customer oriented corporations in his earlier assignments, he has proven leadership skills and is strong customer support advocate.

Deepak Agnihotri ChiefOperatingOfficer

CSI

Welcome Aboard

need to identify such social identities that impact the use or non-use of technology. These social agents legitimize the new implementation by granting formal and informal approval if the new technology implementation conforms to their social and personal norms.

4. The separation between technology and social aspects has been dealt with in great detail by many researchers. In recent times many have realized that the dichotomy between them is somewhat artificial and needs to be resolved. It is time to merge the technology and the social part, constructing technology-embedded practices instead of technology-enabled practices.

5. The social impact of technology also has an ally, in the form of political fallout. The political face of the social impact is much more pronounced in large corporations, especially those spread in far off places around the globe. The response of technological impact on social structure takes a form of political reaction. In day-to-day life many find the socio-political nature of organizations as a deterrent and hindrance to their progress. One often hears about the politics in the companies they work for. There also a strong belief that the organizational politics may be used very fruitfully to gain advantage and be seen as an opportunity rather than threat (Marques, 2009).Fig. 1 depicts interdependence of

technology and social aspects and the suggested actions. Technology sponsors, owners and users are three types of groups directly involved in the success

Interlocked Technology & Social factors

User experiences and perceptions

+Legitimizers

Change agents +

Social identities

Recursive nature of technology and

social effects

One drives other

Reviews and negotiations

Technology Solutions

Post-adoption Changes Pre-adoption

Changes

Result:Technology-embedded

Negotiated practices

Fig. 1

of deployment. They have their own interests in success or failure of the new implementation. The legitimizers and opinion leaders build perceptions about usefulness or otherwise. Engaging and convincing the influencers in the pre-adoption stage helps in spreading positive message earlier in the process. The post-adoption stage necessitates superior user experiences.

BibliographyConstantinides, P. and Barrett, M. (2006)

Large-scale ICT Innovation, Power, and Organizational Change: The Case of a Regional Health Information Network The Journal of Applied Behavioral Science 42(1)

Daniel, J. (1993) Book Reviews – Managing with Power: Politics and Influence Administrative Science Quarterly 38(2)

Lin, C. (2010) Structuring interactions

with technology: A social identity approach Journal of Information Technology Case and Applied Research 12(3)

Marques, J. (2009) Organizational politics : Problem or opportunity? Strategies for success in workplace Human Resource Management 17(6)

Orlikowski, W. and Yates, J. (2006) ICT and Organizational Change, A Commentary The Journal of Applied Behavioral Science 42(1)

Robey, D. and Boudreau, M. (1999) Accounting for Contradictory Organizational Consequences of Information Technology: Theoretical Directions and Methodological Implications Information Systems Research 10(2)

Schultze, U. and Orlikowski, W. (2004) A practice perspective of technology-mediated network relations: The use of internet-based self-service technologies Information Systems

Research 15(1) n

Quiz : Answers to the October 2011 Quiz will appear in December 2011 issue along with the new Quiz.

CSI Communications | November 2011 | 31

Security Corner

Hardware is the most tangible part of a computer system. You can

touch and feel it. Operating System (OS) is the unseen component which makes the hardware usable. OS creates an abstraction of the hardware. So you do not need to know how the disk drive physically reads and writes data. OS gives you a neat interface. You just have to send a command to the OS and it gets the information from the disk in no time. You do not have to know from which track or segment or sector the data was read.

How can hardware be made secure? The most obvious answer is to make it physically secure. But chaining the hardware or putting it behind locked door is only a delay mechanism. A determined information thief is not going to be deterred by these devices. You may put a cable lock and tie up your laptop to a table. That does not prevent someone from just removing the hard disk drive, walking away with it and then read it at leisure. And today you cannot tie down your tablet PCs and smart phones which have huge memory and very little protection.

The first barrier that you may create is, of course, the use of strong passwords to make the task of breaking into the information as difficult as possible. You may even choose a password scheme which limits the number of password attempts. After the predefined number of attempts, the information on the device could even be deleted irrecoverably. You can also choose an application for your mobile device which will remotely wipe information on receiving a command or an SMS from you. However, an orphaned or stolen device could itself be manipulated not to respond to such commands. So you cannot totally depend on a remote ‘wipe’ application to provide you with all the protection.

Probably a stronger protection could be provided by encrypting all the critical information. This would be a good defense, provided you use a strong encryption

algorithm and a stronger key. The keys are usually generated from a password. So a weak password will generate a weak key. Also if you do not change the password often, it would be easier for the thief to guess your password by brute-force method. You will have to take utmost care of protecting the key. You should of course never store the key on the same computer where you have kept the encrypted data. You should scrupulously encrypt data on the hard drives, each of your mobile devices, tablets, and do not forget to encrypt all the USB drives that you use, including those which you use for copying and transferring temporary files. The deleted files from USBs as well as other devices can be easily recovered. You need to use utilities to cleanly wipe the stored data. And the most important and often neglected item is encrypting all the backup data. There are numerous cases of backup tapes getting lost in transit.

Finally, if your information security needs are very strong, you may use a computer which provides TPM (Trusted Platform Module)(1) chip. Each TPM chip has a unique and secret RSA key burned in as it is produced. It is capable of performing platform authentication. For example, it can be used to verify that a system seeking access is the expected system. The TPM will also assure the integrity of the hardware and software used on the computer. It does this by creating hash-key summary of the hardware and software configurations and storing in the secure key storage on the TPM chip. So if the hardware or software is tampered with, the hash will not match. TPM chip contains the cryptographic processor, key storage in persistent memory and platform configuration registers all in a tamper proof container. Together with the BIOS, the TPM forms a ‘Root of Trust’ which could assure the users that they can rely on the security characteristics such as secure I/O, uncompromised keyboard entries, memory and storage operations.

The next item to be secured is the omnipresent and omniscient Operating System. The OS was not always an integral part of the computer system. The older generation computers depended on a skilled operator to do all the jobs of scheduling, providing required resources and monitoring the performance. Today every computing device has an operating system, from large mainframes to mobile phones.

Operating system essentially consists of large, intricate programs which are capable of doing multiple jobs simultaneously - memory management, scheduling numerous processes/ tasks/threads, handling interrupts, controlling input/output from devices which can be as slow as a keyboard or mouse click or as fast as a fast disk transferring giga-bits of data per second. All modern operating systems also provide excellent graphical user interfaces where you just drag and drop icons instead of giving cryptic keyboard commands. Operating system creates an abstract view for the end user. Just clicking on the disk icon or touching the screen or swiping the finger is all that one has to do to save a file. Behind this simple action there is a sequence of activities performed by the operating system which finally invokes the appropriate device driver which is another complex program. Your file will be automatically stored at the right cylinder, track, sector and segment and will also be retrieved from the same location whenever you wish.

The operating system has a number of functions which could be logically divided into four layers. The kernel is the innermost layer 0 which controls the lowest level of activities of, directly communicating with the hardware. The layer 1 consists of the various input / output routines which handle the input devices from a mouse to an output device like printer. The layer 2 consists of utilities which are the frequently used routines

Information Security »

Hardware and OS Security – Defense in Depth

Avinash W KadamDirector,MIELe-SecurityPvt.Ltd.

CSI Communications | November 2011 | 32 www.csi-india.org

that every application program needs to access for getting the services from the operating system. These could be standard utilities and standard libraries. Finally, the layer 3 which is occupied by the application programs which are accessed by the end users. The operating system could work securely if each layer performs its operations in a secure manner. The programs occupying the lower privileged layers (higher numbered layers) should not access the higher privileged layers (lower numbered layers) unless they have the right privileges. The complex handling of a multitude of user level processes, all requiring the attention of kernel and other sensitive processes is the responsibility of operating system. A secure operating system ensures that there is no possibility of a process exceeding its permission and doing something which it is not permitted to do.

This ideal scenario of securing the operating system is not easy. Operating system comprises of a very large number of programs with millions of lines of code. Even with every possible precaution taken by the OS development team, there is a possibility of some errors getting in unnoticed. The only way to keep your operating system up-to-date is to keep applying all the patches announced by the vendor. Whenever a new version of the OS is announced, there is a good likelihood of the old problems having been fixed in the new version, so try to upgrade to the latest version. Of course, there is no

guarantee that the new version does not have any vulnerabilities. So, start the cycle of patching all over with the new version.

The quest of vulnerability-free operating system does not end only with the vulnerabilities of OS. We constantly keep downloading numerous software including freeware, shareware, trial-ware and so on. The lure of something new is always attractive, especially if it is also free. The operating systems usually do not trust any software which has not been written by the OS vendor. However, the OS cannot force you to only use ‘official’ software. At the most it may insist that you should have administrative privileges before you install new software. The assumption is that the administrators have more knowledge and are more responsible. In a normal PC, the end user is the de-facto administrator and would accept the responsibility without knowing the consequences. This leads to infecting the computers with viruses, worms, Trojans and rootkits. So, one has not only to patch the OS regularly, one has also to get a good antivirus software which is constantly watching the activities of various softwares. If any software tries to do something which it is not supposed to do, the antivirus software should prevent it.

The most dangerous malware an operating system can get infected with is the rootkit. The rootkit is a software which replaces the utilities which have privileged accesses. Kernel-mode rootkits run with the highest operating system privileges

(Ring 0) by adding code or replacing portions of the core operating system, including both the kernel and associated device drivers.(2) For example, if you want to list down all the running processes, a rootkit might hide its own presence and you will never even suspect that the operating system is infected by a rootkit.The only way one can get rid of a rootkit is to format the hard disk and reinstall the operating system from the original CDs.

Our quest of multiplexing, i.e. using everything in multiple ways, has provided us with the tool of allowing the same hardware being used for more than one operating system. This is accomplished by having a software called ‘hypervisor’. The hypervisor allows a ‘host operating system’ to have multiple ‘guest operating systems’. Each of the guest operating system have full access to the entire hardware. Thus we are now able to create multiple virtual machines on a single physical machine. This virtualization provides us immense flexibility as well as saves hardware cost. But if the guest operating system or the hypervisor gets infected, we have the danger of multiple virtual computers being down at the same time. This means we not only need to patch each and every OS but also have to patch the hypervisor. The race never ends.(1) http://en.wikipedia.org/wiki/Trusted_

Platform_Module(2) http://en.wikipedia.org/wiki/Rootkit n

Computer Society of IndiaAGM Notice

The 47th Annual General Meeting of the Computer Society of India will be held at 2.00 p.m. on Thursday 1st December, 2011 at Ahmedabad Management Association, Vikram Sarabhai Marg, Opp. IIM, Vastrapur, Ahmedabad.

A g e n d aItem 1 : To confirm the minutes of the 46th Annual General Meeting held on 25th November, 2010 at Hotel Taj Lands End,

Bandra, MumbaiItem 2 : To receive and adopt the Annual Report for the Financial Year 2010-11Item 3 : To receive and adopt the Audited Accounts for the Financial year 2010-11Item 4 : To Appoint the Auditors for FY 2011-12 and to fix their remunerationItem 5 : To ratify the establishment of Chapters and Student Branches approved during year 2010-11Item 6 : To decide the venue of Annual Convention and names of OC and PC ChairpersonsItem 7 : To ratify the decision of (a) formation of ‘D’ Category Chapters at Districts level with a minimum 30 voting membersItem 8 : Any other business with the permission of the Chair

H R VishwakarmaHon. Secretary, CSI October 28, 2011

CSI Communications | November 2011 | 33

Security Corner

What is a cyber crime?Cyber crime is a generic term that

refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.

There isn’t really a fixed definition for cyber crime. The Indian Law has not given any definition to the term ‘cyber crime’. In fact, the Indian Penal Code does not use the term ‘cyber crime’ at any point even after its amendment by the Information Technology (amendment) Act 2008, the Indian Cyber law. But “Cyber Security” is defined under Section (2) (b) means protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.What is Cyber Law?

Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet. It is less of a distinct field of law in the way that property or contract are, as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet. In India, The IT Act, 2000 as amended by The IT (Amendment) Act, 2008 is known as the Cyber law. It has a separate chapter XI entitled “Offences” in which various cyber crimes have been declared as penal offences punishable with imprisonment and fine.1. Hacking What is Hacking?

Hacking is not defined in The amended IT Act, 2000.

According to wiktionary, Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. (The term “hacker” originally meant a very gifted

programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both. Hacking offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.2. Data Theft What is Data Theft?

According to Wikipedia, Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and hand-held devices, capable of storing digital information such as flash drives, iPods and even digital cameras. The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices. According to Information Technology (Amendment) Act, 2008, crime of data theft under Section 43 (b) is stated as - If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable. Data Theft offence is cognizable, bailable, compoundable with permission of the court before which

the prosecution of such offence is pending and triable by any magistrate.

3. Spreading Virus or WormsWhat is spreading of Virus or Worms?In most cases, viruses can do any

amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. Most have not done this much damage in the past, but could easily do this in the future. Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. It will then attempt to replicate itself by sending itself to other potential victims.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.4. Identity Theft What is Identity Theft?

According to wikipedia Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. Information Technology (Amendment) Act, 2008, crime of identity theft under Section 66-C, whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft.

Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else. The term is relatively new

IT Act 2000 »

Types of Cyber Crimes & Cyber Law in India(Part-I)

Adv. Prashant Mali, B.Sc.(Physics),M.Sc.(Comp.Science),LLB

CyberLaw&CyberSecurityExpert.Email:[email protected]

Contd. on pg.34

CSI Communications | November 2011 | 34 www.csi-india.org

Happenings@ICT H R MohanChairman,Div.IVCSI,AVP(Systems),TheHindu,Chnenai.Email:[email protected]

ICT news briefs in October 2011The following are the India specific ICT news and headlines in

Oct 2011. They have been compiled from various news & Internet sources including the financial dailies – The Hindu Business Line, Economic Times.

Voices & Views � The tablet market to touch 2.75 lakh units in year 2011,

according to CyberMedia Research, � “The continued political unrest in AP is affecting the business

sentiments of the IT companies and its customers based in the region,” – Nasscom.

� Nasscom estimates 16-18% annual growth in the IT sector and terms the industry outlook positive.

� Nasscom forecasts independent testing services in India to grow to $13-15 b by 2020 at a CAGR of over 20%.

� The sales of PCs - desktops, notebooks and Netbooks – to cross 12.6 m units during 2011-12 -- MAIT.

� Smartphone users spend more time on content than voice, SMS. -- Nielsen Informate Mobile.

� Cybercriminals exploit Steve Jobs’ death by offering free iPads & MacBook Pros in memory of Jobs.

� ‘Worms’ is the single biggest problem in the country affecting 38.3% of all infected computers - over three times the worldwide average. -- Microsoft.

� India has climbed 10 positions in the global ranking of IT competitiveness and stands at 34 while China is ranked at 39.

� eBay census: Delhi is No.1 e-commerce hub closely followed by Mumbai, Bangalore, Jaipur and Chennai.

� Indian corporate data highly susceptible to ‘Duqu-like malware’ – Symantec.

Telecom, Govt, Policy, Compliance � The EU has raised concerns against the proposed telecom

manufacturing policy on grounds that it may flout WTO norms.

� BSNL offers to surrender broadband spectrum; seeks refund of Rs. 9000 cr. paid as fee

� The draft national policy on electronics proposes creation of a “Electronic Development Fund” (of size Rs. 5000 cr) to promote innovation and R&D (aiming for 2,500 PhDs annually by 2020.) in the electronics systems design and manufacturing space.

� The proposed draft IT policy aims big — it wants to increase revenue from the IT and BPO industry to $300 b by 2020 from $88 b now, and raise the export turnover to $200 b, from the current $59 b. It targets the creation of 10 m skilled tech hands by 2020 compared to 2.5 m employed currently.

� Draft telecom policy allows free roaming, unrestricted Net telephony. Telcos to lose $500 m.

� The world’s cheapest tablet PC named Aakash, priced at just Rs 2,276, was launched by the Indian Govt.

� The Electronic Service Delivery Bill – which mandates all govt. orgns to deliver public services through electronic mode – will be sent for Cabinet approval soon.

� 2G: Charges framed against Raja, Kanimozhi and 15 others. � Cabinet approves scheme for National Optical Fibre Network

n

and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions. At one time the only way for someone to steal somebody else’s identity was by killing that person and taking his place. It was typically a violent crime. However, since then, the crime has evolved and today’s white collared criminals are a lot less brutal. But the ramifications of an identity theft are still scary.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable. Identity Theft offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

5. E-Mail Spoofing

What is Email Spoofing?According to wikipedia, e-mail

spoofing is e-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else. A spoof email is one that appears to originate from one source but actually has been sent from another source. Spoofing is the act of electronically disguising one computer as another for gaining as the password system. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.

Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and

other parts of the email header are altered to appear as though the email originated from a source other than its actual source. Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 66-D and Section417, 419 & 465of Indian Penal Code, 1860 also applicable. Email spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

Bibliography:Author’s upcoming book on Cyber Law and Cyber Crimes

…To be continued in Part II, which will be published in the next CSIC issue.

Contd. from pg.33

CSI Communications | November 2011 | 35

HR

IntroductionKnowledge management (KM)

and business intelligence (BI) systems have been around. KM systems are people centric. People create, share, disseminate, use and apply knowledge. Although BI includes various tools and technologies, the most decisions and actions are taken and implemented by people. Analysis includes tasks like querying, searching, exploring, drill-down, visualizing, modelling and mining. The analysis and subsequent decisions and actions based on the same are not automated in many cases but are analyst driven. Various tools like OLAP (online analytical processing), dash-boards, score cards, ad-hoc queries etc. are used. Gartner report on BI platforms, 2010 [1] shows most of the BI users today use (or consume) various reports (simple, static and parameterized), dash-boards, score cards and ad-hoc queries. According to this report, data mining has been used by 9% of the users. It means most of the BI happening today where people are the key. Although people play crucial role in both the systems, the distinguishing fact is: in KM systems people use knowledge from various knowledge sources and apply them to address the problems while in BI systems the insights and decisions are mostly data driven (see figure 1).

Relationship between BI and KMConventionally KM and BI systems

are treated separately however they complement and are related to each other. The definition of intelligence can be used to relate and connect them together. Oxford dictionary defines intelligence as “the ability to acquire and apply

Dr. R M SonarChiefEditor,CSICommunications

PeoplecentricBIandKM: Relationship and Integration

Structured data

sources

Unstructured knowledge sources

KM tools

BI tools

PeopleKnowledge

driven insights

Data driven insights

Fig. 1 : People centric BI and KM

processes, technologies, customers, suppliers and various resources. However, most of what they posses is in tacit form. One of the major tasks in KM is to make it explicit so that it can be disseminated and reused on a larger scale. Figure 2 shows how BI, KM and people are interconnected.

Knowledge is an integral part of intelligence although most of the time knowledge is derived from data and information. Knowledge differs from information because knowledge is actionable, while information needs to be interpreted. Some literatures refer knowledge as information plus know-how. If know-how is not available, there is possibility of misinterpretation or can be subjective based individual’s expertise. For example, spreadsheet packages like MS-Excel provide data analysis utilities like regression analysis. The outcome of regression analysis is summary report: a sort of information about regression model built by the utility. This report contains general regression statistics, ANOVA and also t stat, p-value, etc. for every independent variable. However, one

Business’s

Intelligence

Business Intelligence

Ability to acquire andapply the knowledge

Knowledge Management

Is all about managing

Defined as the

What is crucial?

Knowledge is about what?

Who has this knowledge?

Knowledge

Customers, suppliers, employees, processes, technologies, various

types of resources, market, etc.

People

Fig. 2 : Connecting KM and BI by defining intelligence

knowledge and skills” and knowledge “as facts, information, and skills acquired through experience or education” [2]. Definition of knowledge makes “skill” as subset of knowledge. The intelligence can be defined as the ability to acquire and apply knowledge. Business intelligence combines words business and intelligence, it reflects the ability of business to acquire and apply knowledge. KM is all about managing knowledge: creating, codifying, storing, sharing, disseminating, using and applying knowledge. So “knowledge” connects BI and KM, KM facilitates and enables organization to acquire and apply knowledge. People in the organization are treated as knowledge assets. They posses lot of knowledge about the culture,

CSI Communications | November 2011 | 36 www.csi-india.org

needs to have know-how about regression models and various terms used such as r-square. Know-how is required to interpret those results, what are their possible values, what is significance of each in order to understand the accuracy and reliability of the model created. However, the final equation in the form of Y=F(X) derived out of analysis may be treated as some kind of knowledge expressing relationship between independent and dependent variables. The model subsequently used for prediction by the managers.

Integrating BI and KMFig. 3 shows an integrated view of

KM and BI. People acquire knowledge from various sources. Content and document management systems are major knowledge sources. Knowledge sources do not mean they always contain actionable knowledge, they may have data, information and contents from which knowledge can be derived. Some of these knowledge sources may be the reports, results and outcomes generated through BI tools. Integrated approach can help to get better insight. For example, in churn analytics, typically analytics team uses BI tools to predict propensity of customer to churn out, often analysing the demographic profiles and transactions

he or she has done. This is data driven approach. However, there may be other factors that may cause the customer to decide to quit. A more accurate and meaningful insight about whether a customer is likely to churn or not can be arrived at by analysing interactions the customer has done with the firm and on social networks as well as based on happenings in the market. Interactions may include feedback, number of calls to call centres, number of friends on the network and complaints registered by the customer. Market information may contain various offerings and campaigns by competitors, regulatory compliance announcements, reviews by the customers on public forums etc. This needs to integrate information from various sources internal as well as external. All these interactions and market information will be part of KM systems and experts are required to analyse the same for example to understand complaints by the consumer. This means integrated approach can help in better business intelligence which is data and knowledge driven.

Organization, knowledge creation and application

The acquisition and application

of knowledge by the people within the organization depends upon various factors. Most important one is the culture of creating, sharing and application knowledge especially the tacit one. Some of the important factors that can contribute are summarized below.1. Organizational support and

processes to encourage knowledge creation, sharing and application by all stakeholders including customers. This may include motivating them, having proper incentive structure, appreciation and awarding, recognizing the right people based on type of knowledge required and so on.

2. Automation can be a key, more and more automation means data, contents, interactions are available in digital form. Automation of touch points makes it possible to collect as much as data and information at the source. For example, if feedback system is automated through interfaces like IVR (interactive voice response) where the caller has to select from available options, the responses are available in structured and consistent format. These responses can be analysed in real time and actions can be taken quickly.

3. Availability of technology and processes for knowledge creation, sharing and application. Bringing in standardization, structure and semantics across the organization in collecting and sharing data and contents has lot of advantages. Everybody in the organization use common vocabulary, it not only saves issues of integration but rescues analytics team from subsequent steps required such cleansing, pre-processing, transforming before analysis using various tools. Web 2.0 and semantic web tools, technologies and standards can be adopted within the organization. Most of these are open standard, universally accepted and widely used, lot of open source tools are available and can help in seamless integration of internal systems with external ones such as social networking websites.

4. The type of knowledge created greatly impacts the reuse and thereby its application. It should be created in more explicit form (actionable)

Fig. 3: Integrating BI and KM

Organisational culture and support and processes to encourage creation, sharing and application of knowledge

Ability to acquire and apply knowledge depends upon

Where do they apply knowledge?

How do they acquire knowledge?

Which kind of sources?

Managed using what tools?

They comprehend, observe, experience, investigate, practice, learn, understand, etc.

To address and solve the issues, business problem and taking appropriate decision/actionExtent of automation

and standardisation, technology and processes available

Individual’s willingness, ability and expertise

Type of knowledge

Documents, product brochures, manuals, reviews, feedbacks, audio and video recordings, emails, forums.

Content and document management tools, Web 2.0 tools, etc.

MIS and BI Tools such as reporting, dash-boards, OLAP, and ad-hoc queries

Decision support, modelling, data mining, visualization and intelligent tools

Distance learning, training, chat, audio and video conferencing tools

Building and experimenting models, understanding patterns, relationships etc. from the data sources

People

Reports generated by automated systems, drill-down analysis, database queries, dash-boards etc.

People

CSI Communications | November 2011 | 37

such as business rules, manuals, FAQs, video recordings so that individuals can quickly go through them, understand and take decisions based. Websites like eHow.com contain more actionable knowledge compared to websites like Wikipedia. Contents in Wikipedia are more of descriptive form can be referred as implicit knowledge source. One needs to understand and comprehend. Figure 4 shows knowledge types and conversion. Converting tacit knowledge into explicit form is called as externalization while converting from explicit to tacit is called as internalization. Socialization means tacit to tacit conversion while explicit to explicit is called as combination. Figure 5 illustrates how BI, KM and Web 2.0 are integrated together to get more information about customers and improve customer service. It shows various people involved in and roles they play. Use of meta-knowledge such as

keywords, moods, tags, taxonomies, folksonomies (tags, book marks, etc. create by people) and ontologies value add to existing data, contents and knowledge. It helps not only to search data and contents efficiently and meaningfully but also to make more abstraction and

generalization. For example, product taxonomies (like categorization) makes it easier to understand what a customer likes in general, any specific interests and possibly look for more cross-selling opportunities across the different types of products.

ConclusionAutomation has greatly helped the

organizations in automating manual function and people centric business processes. Enterprise systems such as

Technology (knowledge automation)

Exte

rnal

izat

ion

Internalization

People (human intelligence)

Defining and codifying business rules

Structuring and documenting slved problems

Copying profiles

Implicit

Tacit

Explicit

Generating rules to score customers using rule induction algorithm

Combination: copying

business rules

Solving problems by applying rules

Reading and comprehending solved problems Reading and

understanding business rulesSocialization:

giving training on underwrting

Fig. 4 : Types of knowledge and conversion [3]

ERPs and CBS (core banking solution) make it possible to have seamless business processes spanning across various functional areas. These systems facilitate various delivery channels: Web, SMS, IVR and having more customer touch points and customer interactions. Huge amount of data and contents are generated by these systems. As many and many business are becoming e-businesses, the competitive and sustainable advantage lies in how fast organizations get insights from what they have as well as from external knowledge resources such as Web 2.0. Organizations get better ROI on existing IT investments by having proper KM and BI systems in place. However, these systems are people centric. People play very vital role. If they are knowledgeable, they can possibly take advantage of every opportunity they come across and proactively look for more opportunities. Employees can serve the customers well if they have right knowledge about them, products and services, processes and various resources. Organizational culture and support for knowledge creation and use, having right people and knowledge, right technology and processes in place can give competitive advantage.

References[1] Rita Sallam and Kurt Schlegel. Using Gartner BI

Platform MQ to Standardize Your BI Capabilities. Available at https://www.gartner.com/it/page.jsp?id=1332842 access in October 2011

[2] h t t p : / / w w w . o x f o r d d i c t i o n a r i e s . c o m /definition/intelligence accessed in October 11.

[3] R M Sonar (2011). Next Generation Business Intelligence: A knowledge-based approach, Vikas Publishing House, New Delhi. n

Social websites (e.g.

Web usersRelationship

managers

Customer database

BI tools

Share information

Combination: subscribe to RSS feeds

Externalization: add any other specific information (e.g. user groups, friends, etc.

Externalization: share details about interactions (with keywords, tags etc.)

Externalization: generic business rules and as well as customer specific (like preferences, choices and constraints)

Socialization: discuss, share, brain-storm internally

Socialization: Interacting through face to face meetings, through call centre

Combination: Implicit & meta-knowledge acquisiting (RDF, OWL)

Domain experts, knowledge engineers, analysts

Sales, relationship & customer executives

Customers

BI and KM framework

Improved customer service and value

Internalization: interpret blogs and get insights

Search users who are customers: get their public profiles

Update (or cross-check) based on changes in profiles (e.g. change in job profiles)

Social websites (e.g. public profiles)

Internal customer blog

Fig. 5 : Using BI, KM and Web 2.0 to improve customer service [3]

CSI Communications | November 2011 | 38 www.csi-india.org

ICT@Society Achuthsankar S NairEditor,CSICommunications

While a great body of knowledge exists on how to manage information

efficiently and effectively, these are by and large restricted to

structured situations and problems and typically address businesses. When it comes to managing information that we continue to handle every day, many of these theories and techniques may not

be seen in great use. From managing the files on our

personal computer to managing our contacts information (both on

email and otherwise) and CDs and paper files, we find that there is a real need for some practical wisdom. Personal Information Management is the word that comes close to the idea, but however as it is understood now, it talks mostly about managing our files and folders on the desktop. Many of us also get bogged down by paper files, magazines, CDs, books and diaries which do not organise themselves at the click of a mouse and require real physical work coupled with information management principles.

Think of old days in which people used to have hard copy phone books. What a weird idea it was to have alphabetical listing of people ! What if we wanted to pick out couple of names that we could suggest as speakers in a meeting of CSI ? Do those names occur to us in alphabetical order ? Category and Subcategory tags in first and second columns of the phone book would have been a better structure in view of information management. Categories like work, school, university, relatives, home, resource persons, services etc with subcategories, each sorted alphabetically would lighten the search burden. Under work category, we could have subcategories which indicate different institutions we worked with. Under services, subcategories such as telephone, electricity, plumbing, gardening, printing etc. could be parked. Putting such a table in a spread sheet and keeping it sorted would make life simpler. When new numbers are jotted down, we can enter it at the end of the table with category and subcategory tag and occasionally sorting the table would take the numbers to the right place. In the age of the mobile phonebook, perhaps we are in a different mind set.

CDs are a wonderful example of information deluge. I have seen many a professional struggling and scrambling in CD piles hoping against hope to pick the CD with the file they want. The beautiful and flashy CD shells and pouches all of a sudden become cursed. They eat away your time and space. Sometimes you find the wrong CD in the right shell. Well those who have experienced it know very well what I am trying to express. My contention is that, if you are a busy person and you have a growing pile of CDs, then

you need to adopt some simple strategies to face the situation. Any CD with no writing on it indicating content, is a clear violation of object orientation and is sure to worsen the handling complexity. Have a permanent marker near the CD storage area. Make sure you scribble directly on the CD what its contents are. If you are a person who has been groomed to keep books and gadgets “neat and clean”, you may not wish to dirty the CD, but let me tell you – it is not a wise idea to spare the CD from writings on it indicating the content. At a later stage a CD with clean blank top surface demands time and effort – you will need to put it in the CD drive and wait (we all know how fast a CD loads !) and then watch it play or check the folders to recall what the CD is all about. If someone is giving you a CD, be sure to ask them to write informative description on the top surface before handing over. Another wise step is to discard the CD case however much you fancy it. Great amount of saving of space and time would result from “de-shelling”. If the detailed info on the CD case is too important for you, you can pull out the printed paper from the case and paste it in an old diary and keep it in the CD storage area, for any detailed reference.

Trying to match the CD and its shell will no longer be an issue and your life will become much simpler ! Now that all CDs don’t have specific cases or shells, we can just stack them in the CD stack spindle that comes with blank CDs. To ensure that they do not scratch, transparent plastic covers with sponge layer can be used (so that you don’t need to open them to inspect the writing on the CD). You can cut a hole in the middle of the cover so that the CD with the plastic cover can be held in the spindle. Different categories of CDs can then be held in different spindles. They can be moved around without slipping and spilling. The saving of space and handling convenience is remarkable.

With paper files too, many concepts of information processing can be used. Indexing and text tagging files and holding the index and tags in a searchable format will ensure better handing of paper files. I personally find that paper file office can be run 10 times more efficiently if efficient information management principles are applied. File routing, one of the most crucial activities is

done in many paper office organisations with no major protocol in place. This is where the chaos are born.

Categorisation of files are done with cryptic codes like Branch-Admin, Section-Transfer. A more

detailed text tagging which is searchable on a computer would be a good add on to paper file offices.

Tail Piece:Experiments with File Structure are not unknown in Paper File officesHere we see the rotary filing cabinet which

was used till recent times in Indian banks.

Courtesyhttp://www.saltcityrecords.com/

Personal Information Management

CSI Communications | November 2011 | 39

My dear friend e-Governance will curtail corruption to a great extent but who will go on fast onto death for rampant file corruption?

CLUES

Brain Teaser Debasish JanaEditor,CSICommunications

Crossword »Test your Knowledge on a visionary and creative genius: Steve Paul Jobs (February 24, 1955 – October 5, 2011)Solution to the crossword with name of first all correct solution provider will appear in the next issue. Send your answers to CSI Communications at email address [email protected]. with subject: Crossword Solution - CSIC Nov 2011.

ACROSS1. Steve’s religion (8)7. in 1985, National Medal of Technology was awarded to

Steve and his partner by this person (12)8. Steve was co-founder of this Animation Studio (5)9. Steve’s sister and a famous novelist (4)11. Operating system of iPhone (3)12. Job’s partner and cofounder of Apple (7)13. Steve became largest individual shareholder of this

company (6)14. By birth, he was citizen of this country (3)16. Eldest son of Steve (4)19. An Apple PC designed during the early 1980s (4)21. Steve dropped out from this college in in Portland,

Oregon (11)23. The family that adopted Steve (8)25. Official salary of Steve as the CEO of Apple (9)26. Early logo of Apple was dedicated to this personality

(6)27. Jobs acted as executive producer of this famous

animation film (8)29. The medical procedure that Steve had undergone to try

and remove his cancer (7)30. Name of Steve’s wife (6)

DOWN2. Birth place of Steve (12)3. The person behind the design of iPod (11)4. Color of Apple’s initial logo (7)5. Steve’s Nationality (8)6. Steve’s adoptive father (8)10. Name of CEO of Apple when Steve left the company in

1985 (11)15. In 1976, Steve Jobs co-found this company (5)17. Jobs created a circuit board for this game (8)18. CEO of Apple when Steve returned to Apple in 1996 (9)20. Apple Computer was founded on the day of the year

that is also known as which day (9)22. The initial features of Mac got motivated from this

company (5)24. Jobs founded this company in 1985 after departing from

Apple (4)28. Number of semesters Steve attended his college (3)

Solution for October 2011

Congratulations to Prof. L. Jaba Sheela (Dept. of MCA, Panimalar Engineering College, Chennai)

for getting near all correct answer to October month’s crossword.

1I

2C E G A T E

3S U G A M C

T4 O E G P

5 E

6A A R O G Y A M

7I T

8D M S

M S9R

10T I E E

11C I C

12S E V V

N13U

14P A N L

15S B A

16E A

17U C T I O N R E W H

S B D A S A O18P A C

19K A R N A T A K A G O

A N C I H M A M22N C I

20A A S T H I

C H D

H A21E K R I S H I

22A

23 T I R U V

24A R U R A G

25T

A A26W B S W

27A N R W

N D P28L I T E S

T H29E N T E S S L

R A W N V

A A A E E

R30G Y A N D O O T

1 2 3

4 5

6 7

8

9

10

11 12

13

14 15

16

17

18 19 20

21

22

23 24

25

26

27 28

29 30

AnnA

CSI Communications | November 2011 | 40 www.csi-india.org

Ask an Expert Dr. Debasish JanaEditor,CSICommunications

Your Question, Our Answer“Logic will get you from A to B. Imagination will take you everywhere.”

~ Albert Einstein

Subject: A program in turbo c++

Dear Sir/Madam:Please tell me how to write a program in turbo c++ on the

topic to display three analog and digital clock on the screen containing time zone of three different countries.Thanks in anticipation.

Sanjay Sonker, ITIltd.MankapurGonda(U.P.)

A This column is meant for discussing and mentoring about technical solutions, and not for providing readymade solutions. There are many solutions available on the net on differemt technology and platforms, but you need to understand the basic algorithm and technique driving to these kind of solutions. Better to try on your own to write the program yourself and not to use ready-made solution on the fly. Let’s try to find out the basic building blocks required to make the program. Before we describe the building blocks, let me tell you that Turbo C++ is kind of obsolete. You can check out yourself by seeing the choosing ‘About’ in the IDE and see the year of release of this software. It’s pretty old. This was very popular in DOS operating system days on PCs. But, today, when we have so many variants of powerful graphical user interfaces embedded in the operating systems, it’s no point to draw something graphically on DOS-based screen. Use some modern compilers instead. There are many commercial and opensource variants available.

Now, there are few things to know before we try to draw a clock (analog or digital) on the screen. In GUI environment, the screen is not the area where you draw things. Rather, you draw on the window area. First thing first is to create a window on the operating system environment you use. Any introductory book on creation of Windows (or on the net) can guide you how to write code to draw a simple window. For example, on WindowsTM environment, there is an API called CreateWindow to create an window on the screen. You may refer to chapter one from the book Computer Graphics: Algorithms and Implementations, authored by Mukherjee and Jana published by PHI Learning Private Limited, ISBN: 978-81-203-4089-3 for an example and guideline how to create a simple window on the screen and then how to draw a character or draw a circle on the window canvas area.

Once you draw the window, then you need to draw a circle or rectangle as you choose the shape of the clock and draw the static (fixed) part of the analog clock or the digital clock i.e. the layout

of the clock. The dynamic part of the analog clock are the hour, minute and second hand, whereas in digital clock in hour, minute and may be seconds and the ticks (:) in between that may blink per second. So, in the smallest granular level, you need a timer to be create by StartTimer kind of API. This will create the timer for the desired duration and desired event notification. Say, you choose the time event to be notified every second. In that case you get an WM_TIMER kind of event every one second. You need to handle this event in your message handling part to respond to the event by moving the hour hand, minute hand and second hand. An hour hand covers 360 degrees (full cycle) in 12 hours, a minute hand covers 360 degrees in 1 hour and a second hand covers 360 degrees in 1 minute. So, in 1 sec, the angular progress of hour hand is (360.0)/(12.0*60.0*60.0) degrees. Similarly, the angular progress of minute hand is (360.0)/(60.0*60.0) i.e. 1.0/10.0 degrees, and that of second hand is (360.0)/(60.0) i.e. 6.0 degrees. Given a movement of clockwise angular degree θ, and say, the original starting point of the hand is at P(0,y1) at 12-hour position, the new position is at R(x2,y2). The values of x2 and y2 can be given as: x2 = y1*sin(θ) and y2 = y1*cos(θ). This is simple to prove, as in the diagram, |OR| = |OP| = y1

R(x2,y2)Q(0, y2)

0

P(0,y1)

Once you are able to draw one clock, you will be able to draw three clocks, each clock with a time shift for showing different time zones.

Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]

CSI e-Ratna Award to Shri. Narendra Modi, Chief Minister, Gujarat

ICEG-2011, 8th International Conference on e-Governance and KSS-2011, 3rd Regional e-Governance Knowledge Sharing Summit with a theme “Government Transformation-Agenda for eGov 2.0” was organized by Department of Science & Technology, Government of Gujarat; CSI and IIT, Delhi on 17th and 18th October,2011 at Nirma University, Ahmedabad.

Shri M D Agrawal, President, CSI told the invitees and delegates that Shri. Narendra Modi, Hon’ble Chief Minister of Gujarat is a man with a mission, a leader with conviction and a manager with vision. He has the distinction of being the longest serving and the most successful Chief Minister of the state of Gujarat. Assuming this responsibility in October 2001, he has transformed Gujarat and made it a global hub of development and progress. He said that Shri. Narendra Modi ,who is passionate and tech-savvy, is one of the most responsive political leaders in India. He is widely regarded as a youthful and energetic leader with innovative thoughts and determination to implement them. Gujarat is now popularly known as “Vibrant Gujarat”. Shri. Modi’s model of good governance is being applauded within the country and beyond.

Shri. Agrawal also said that number of awards have been bagged by the State for its various e-governance initiatives including ‘CSI-Nihilent e-Governance Award for best e-governed state’ for three years. He announced that Computer Society of India is proud to confer upon Shri. Narendra Modi the “CSI e - RATNA” Award in recognition of his services to State and citizens at large through e-Governance and ICT projects, on the occasion of e-Governance Knowledge Summit and International Conference on e-Governance.

Prof. P Thrimurthy, Chairman, Awards Committee, CSI presented a citation and Shri. M D Agarwal presented “CSI e-Ratna Award” to Shri. Narendra Modi.

While accepting the “CSI e-Ratna Award”, Shri. Narendra Modi thanked CSI and dedicated this award to the officials of

Gujarat responsible for successful implementation of various e-Governance projects in Gujarat.

Inaugurating the ICEG-2011 and KSS-2011, Shri. Modi defined e-governance as easy-effective-economic governance with a view to applying the technology in everyday life for the welfare of the common man. He said that Gujarat has laid an ICT network to redress people’s grievances down to the village level. Shri. Modi ended his speech by making mentions of ‘Apple’, how it synonymized with the evolution of technology from Newton to Steve Jobs.

Prominent speakers in the inauguration included Shri R. Chandrashekhar, Secretary, Dept. of IT, Ministry of Communication & IT, Govt. of India; Shri. A K Joti, Chief Secretary, Govt. of Gujarat; Shri Ravi Saxena, Additional Chief Secretary, Dept. of Science & Technology, Govt. of Gujarat; Dr. R K Bagga, Chairman, SIG-eGov,CSI and Prof. Akshay Agrawal, Vice Chancellor, Gujarat Technological University. n

CSI Report Bipin MehtaFellow,CSI

Shri. M D Agarwal, President, CSI handing over ‘CSI eRatna’ Award to Hon’ble Chief Minister of Gujarat, Shri Narendra Modi. Prof. P Thrimurthy, Past President, CSI is also seen.

CSI Communications | November 2011 | 41

For more details and registration log on to: www.csi‐2011.org

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Computer Society of India 46th Annual National Convention 2011

Host: Ahmedabad Chapter  December 1–3, 2011

    Venue: Indian Institute of Management (IIMA) &     Ahmedabad Management Association (AMA), Vastrapur,  Ahmedabad 

CSI Communications | November 2011 | 42 www.csi-india.org

Call for Articles

Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree DhereCSICEditors

CSI Communications - Call for Articles for forthcoming issues

The cover themes for forthcoming issues of CSI Communications are:

� December 2011 - Bio-inspired Computing � January 2012 - Geographic Information System � February 2012 - Data Compression � March 2012 - Web 2.0 � April 2012 - Embedded Systems � May 2012 - Knowledge management

(Future topics will be announced on an ongoing basis)The Editorial Board of CSI Communications is looking for high quality technical articles for different columns pertaining to the above themes or emerging and current interests. The articles should cover all aspects of computing, information and communication technologies that should be of interests to the reader’s at large fraternity of CSI and around. The articles may be long (2500-3000 words) or short (1000-1500 words) authored in as the original text (plagiarism is strictly prohibited). The articles shall be peer reviewed by experts decided by the Editorial board and the selected ones shall be published. Both theoretical and practice based articles are welcome. The articles and contributions may be submitted in the following categories: Cover Story, Research Front, Technical Trends, Article.CIOs/Senior IT/IS personnel/consultants of the companies managing technologies/projects related to the cover themes are welcome to contribute under the CIO (Managing Technology) section. Similarly, HR Senior Managers/Personnel/Consultants are invited to contribute under HR section. Also, Letters to the Editors, questions to be answered in Ask an Expert, your experience to share some Programming Tips under the Practitioner Workbench: Programming.Tips() are welcome.

How to submit the contributions: The articles may be sent to the CSI Editorial Board via email [email protected].

Article Submission guidelines: � All manuscripts should be written at the level of the general

audience of varied level of members. � Equations and mathematical expressions within articles

are not recommended, however, if absolutely necessary, should be minimum.

� List of references is preferred. List not more than 10 references at the end of your manuscript. Please don’t include any embedded reference numbers within the text of your article. If you would to like to refer, you may state names in the text and provide full reference at the end. The reference must state the names of the authors, title, publisher’s name, complete publication reference with month and year. Web URLs should be there for website references with accessed date.

� Figures and Images used should be limited to maximum of three (only high resolution images need to be sent, and the image needs to be sent separately also).

� Only MS-Word and PDF submissions are allowed. � Include a brief biography of four to six lines for each author

with author picture (high resolution) � Editors will edit the contents as felt necessary � Authors of selected articles will be notified by the editorial

board and copyright transfer form needs to be filled up by the authors.

� Only original contributions are requested and no plagiarism is allowed.

(Issued on behalf of the Editors of CSI Communications)

Plagiarism Alert for Prospective AuthorsThe Editorial Team of CSI Communications is appalled by

the large number of cases of plagiarism in articles submitted to it, for consideration of publication. A number of rejections had to be done in recent months wherein cases of verbatim copy of published material with author list alone changed, has been noted. This alert is being published in view of the highly concerning situation.

Plagiarism in the present context is - use in part or whole of other published articles with or without citing. Even with citation, pasting huge chunks of text authored by others is not admissible (the only exception being demarcated quotes when situation warrants). Plagiarism is against professional ethics and the editorial team has no option but to recommend black listing for lifetime of the authors, committing plagiarism.

It is very surprising that those, who commit such

unprofessional act, seem to be unaware that it is an extremely simple matter for the editors (or anyone) to verify plagiarism. In most cases, a deft Googling will reveal the sources instantaneously. Plagiarism is easy to do and also easy to detect.

Prospective authors are requested to take extreme care in avoiding intentional and non-intentional forms of plagiarism, thereby saving time for them as well as for the editors. CSI Communications is committed to upholding ethical practices in publishing and hence would continue to take serious view of plagiarism.

CSI-C Editorial Team

CSI Communications | November 2011 | 43

17th International Conference on Management of Data (COMAD 2011) 19-21 Dec 2011

http://2011.comad.in/

For close to two decades, the International Conference on Management of Data (COMAD), modeled along the lines of ACM SIGMOD, has been the premier international database conference hosted in India. The first COMAD was held in 1989, and it has been held on a nearly annual basis since then (except for a few breaks such as in the years when VLDB and ICDE were held in India). COMAD has always had a significant international participation, with about 30% of the papers being from outside India, including Europe, USA and East/South-East Asia. As of 2010, the conference runs as an event of the newly formed Computer Society of India (CSI) Special Interest Group on Data (SIGDATA).

Keynote talks Tutorials

Records Retention : Addressing Insider Threats to Data IntegrityProf. Marianne Winslett. Univ. of Illinois – Urbana Champaign (UIUC) and Advanced Digital Sciences Center, Singapore

Probabilistic Topic ModelsProf. Indrajit Bhattacharya (IISc, Bangalore)

The State of Data PrivacyDr. Srivatsan Laxman (Microsoft Research India)

Information Management in the Cloud - Parallel Dataflow Programming Beyond Map/ReduceProf. Volker Markl. Technical University Berlin (TU-Berlin)

Ranking Mechanisms for Interaction NetworksDr. Sameep Mehta, Dr. Ramasuri Narayanam and Dr. Vinayaka Pandit (IBM Research)

Clustering Data StreamsProf. Vasudha Bhatnagar, Prof. Sharanjit Kaur(Dept. of Computer Sc., University of Delhi)

Challenges in High Dimensional Data VisualizationProf. Kamal Karlapalem. International Institute of Information Technology, Hyderabad, India (IIITH)

Text Mining of Biomedical Literature RepositoriesProf. Ashish Tendulkar (IIT Madras)

Presentations6 papers in Research Track and 3 papers in Industry Track

Registration FeeEarly Registration (Till 1st Dec. 2011) Standard Registration (After 1st Dec. 2011)

Indian (Regular) INR 4000 INR 5000

Indian (Academic) INR 1500 INR 2000

Indian (Students) INR 1000 INR 1500

International (Regular) US$ 100 US$ 150

International (Student) US$ 50 US$ 100

Conference Program, registration and other information at: http://2011.comad.in/General Chair Jayant Haritsa, IISc, India Publicity Chair Vishwas Bondade, Condor, India

Program Chairs Umeshwar Dayal, HP, U.S.A Prasad M Deshpande, IBM, India

Organizing Chairs Karin Murthy, IBM, India Vinayaka Pandit, IBM, India

Industry Chair Animesh Nandi, Bell Labs, India CSI Liaison Chair Gopal T V, CSI Division II Chair, India

Tutorial Chairs Sharma Chakravarthy, U.T. Arlington, U.S.A Srinivasan H Sengamedu, Yahoo, India

Workshop Chair BalasubbaRaman Guruswamy, Kathir CoE, India

Demo & Posters Chair Srinath Srinivasa, IIIT Bangalore, India

Government Liaison Chair Iqbal Ahmed, A.I.T, India

Panels Chair Srikanta Bedathur, IIIT Delhi, India Transport & Tourism Chair Satish B.G., IT Dept, GoK, Bangalore, India

Publication Chair Vaishali Sadaphal, TRRDC, India Registration Chair Suresh Thiagarajan, Start Run Academy, India

Venue: IIIT-Bangalore, Electronics City, Hosur Road, Bangalore 560 100

Contact for details: Mr. Sridhar, CSI-BC, Infantry Road, Bangalore 560001 Phone: +91-80-22860461

Call for Participation

CSI Communications | November 2011 | 44 www.csi-india.org

Announcement Prof. M N Hoda

ChiefConvener,INDIACom–2012

Announcement and Call For Papers

Information and communication technology plays a dramatic impact on effectiveness, efficiency, growth and development in various areas such as education, health-care & modernization. Foreseeing the importance and impact of the above and encouraged by the resounding success met with the past four editions of INDIAComs since its inception in 2007; we hereby announce INDIACom – 2012 which aims to develop a strategic plan for balanced growth of our economy through IT in critical areas like E-Governance, E-Commerce, Disaster Management, GIS, Nano-Technology, Intellectual Property Rights, AI and Expert Systems, Networking, Software Engineering and other emerging technologies.

Instruction for Authors: Original papers based on theoretical or experimental works related to the above mentioned sub themes are solicited for presentation in the conference. The paper should begin with a title, a short abstract, and a list of key words. The total length of the paper must not exceed Six A4 size pages including bibliography and appendices.

Important dates:Submission of Full Paper 30th November, 2011Paper Acceptance Notification 12th December, 2011

Detailed guidelines are available at www.bvicam.ac.in/indiacom for download. All the submissions will be online at www.bvicam.ac.in/indiacom. All correspondences, related to INDIACom-2012 must be addressed to:Prof. M N HodaChief Convener, INDIACom-2012,Director, Bharati Vidyapeeth’s Institute of Computer Applications and Management,A-4, Paschim Vihar, Rohtak Road, New Delhi – 63.E-mails: [email protected], [email protected], [email protected] Tel.: 011-25275055 Tel. / Fax: 011-25255056Mobile : 09212022066

INDIACom-20126th National Conference on

Computing for Nation DevelopmentOrganized by Bharati Vidyapeeth’s (February 23 - 24, 2012)

Institute of Computer Applications and Management, New DelhiJointly with CSI Region - I and IEEE Computer Society, Delhi Section Institutions of Electronics and Telecommunications Engineers (IETE), Delhi CentreIndian Society for Technical Education (ISTE), Delhi Section and Guru Gobind Singh Indraprastha University, Delhi.

For further details, Visit us at: www.bvicam.ac.in

Membership Promotion SchemeWith a view to enhance CSI memberships we announce a new scheme wherein the Participants and Delegates of CSI Workshops, Seminars and Conferences, who are not Members of CSI, will be offered CSI membership for financial year without making any additional payments.This will be applicable only for Workshop Seminars and Conferences where the participation fee is ` 2,000 or more.Full scheme is available at www.csi-india.orgFor Queries contact CSI Membership team at HQ [Ms. Shruti “[email protected]”]

* Scheme Valid till March 31, 2012.

Please visit http://www.csi-india.org/web/csi/csi-eventcalendar for detailed calendar of all future events

and http://www.csi-india.org/web/csi/execcom-transacts1 for ExecCom Transacts.

CSI Communications | November 2011 | 45

CSI News

From CSI Chapters »Please check detailed news at: http://www.csi-india.org/web/csi/chapternews-November2011

SPEAKER(S) TOPIC AND GIST

HYDERABAD (REGION V)

Dr. C R Muthukrishnan, Mr. MGPL Narayana, Mr. Hirdesh Singhal and Dr. T V Gopal

30 April 2011 : One-day National Symposium on “Software 2.0 – Emerging Competencies”Topics such as Complexity Sciences adopted to Enterprise Applications, Integrating Business Risks, Usability engineering, Real-Time Transaction Lifecycle Management, Human ware & Systems Thinking, Neuro-Cybernetics, Biological Cybernetics, Software Aesthetics, Web Intelligence were covered during the symposium.

Mr. D K Jain, Mr. Raju L Kanchibhotia, Dr. K Lal Kishore, Mr. Gautam Mahapatra

18 June 2011 : One-day Workshop FOSS Forward-2011 on “Open Source Technologies – The Present Scenario”

The workshop had many discussions on trends and technologies of FOSS, demo on Bharat Operating System Solutions (BOSS) an Indian operating system,e-learning technologies in open source such as Learning Management System (LMS), Content Management System (CMS), Learning Content Management System (LCMS) with web based technologies. Participanta showed interest in mobile e-learning and also audio, video streaming applications in open source.

Mr. I L Narasimha Rao 25 June 2011 : Expert Lecture on “Database Design using ER Models”

Mr Rao discussed at length the importance of Database design. He highlighted several critical issues, while using ER model.

Mr. Rajeev Ranjan Kumar, WIPRO 24 July 2011 : Seminar on “Platform Independent C++ Application Development using QT4.7”

The speaker covered topics such as Why QT4.7 for C++, QT4.7 features, Install QT on Windows and Linux, QT creator IDE feature and configuration, Widget, Layouts and Styles, Custom Widget creation, Signal and Slots, Create window, MDI based Application, Create Dialog based Application, Meta Object and Memory Management.

Mr. S Chandra Girish 21 August 2011 : Workshop on “Android Application Development”

The speaker covered topics such as available mobile operating systems and their development languages and IDE’s, Anatomy of Android Application Development, Overview of android development environment with a demo, Overview of other android development tools, Signing and packaging the Android Native Mobile Application, Debugging the android application, Deployment in phone and so on.

AURANGABAD (REGION VI)

Mr. Sandeep Deshmukh, Persistent Systems 26 August 2011 : Workshop on “World of Cloud Computing”

The speaker explained cloud computing concept very lucidly. The major topics covered were;

- How Cloud works?

- Real life case studies on cloud selection, deployment and security

- Cloud adoption, migration and TCO

ç Mr. Prashant Deshpande, Chairman of Aurangabad Chapter, welcoming the speaker – Mr. Sandeep Deshmukh

CSI Communications | November 2011 | 46 www.csi-india.org

GOA (REGION VI)

Mr. Manguirish Pai Raikar, Mr. Shekhar Sahasrabuddhe 17-18 September 2011 : Computer Exhibition on “ECAP”

Mr. Raikar called upon CSI to work along with Goa Chamber of Commerce to increase IT penetration in Goa. He also expressed hope that new IT policy will promote further IT growth.

Mr. Sahasrabuddhe gave an account of activities of national CSI.

ç Mr. Manguirish Pai Raikar, releasing IT Directory. Also seen are Santosh Kamat, Shekhar Sahasrabudhe and Shripad Khedekar.

PUNE (REGION VI)

Dr. Anand Deshpande, Rajesh Makhija, Abhijit Sharma, Monish Darda, Kalpak Shah, Ashwin Waknis and panelists

27 August 2011 : Annual Event on “InCSIghts”

Mr. Anand dived deep into the business reasons and implementations of cloud computing, underlying a conviction that Cloud Computing is here to stay. Mr. Makhija brought out benefits of cloud computing using Windows Azure, Microsoft’s Platform as a Service offering in the cloud.

Mr. Sharma explored one of the applications of cloud computing - BigData and rising importance of NOSQL. Mr. Darda and Mr. Shah provided further insights in cloud. Mr. Waknis spoke about how cloud can be utilized by colleges and academicians.

ç Dr. Anand Deshpande delivering inaugural address. Also seen are Arun Tavildar, Monish Darda, Shekhar Sahasrabudhe and Shubhangi Kelkar.

COCHIN (REGION VII)

Mr. Murali V and Mr.Manu Zacharia 25 August 2011 : Seminar on “Web Technology and Standard”

This talk gave a good overview of Cyber Security, High Tech Crimes, Cyber Forensics, and Information Security in day-to-day banking etc.

ç Dr. Gopinath Ganapathy, Director/BUTP, Vice Chairman delivered the Inaugural Address

TIRUCHIRAPALLI (REGION VII)

Dr. Gopinath Ganapathy 3 October 2011 : First Technical Feast on “Spark 2011”

Dr. Ganapathy emphasized on soft skill and hard skill development and insisted that participants should answer three questions like Are you a programmer? Are you a Professional? and Am I employable?

The feast witnessed events like Mathwiz, Innovate, Mimer Mania, Geek Quiz, Group discussion, impromptu, creative writing, webweave and seek me out.

ç Dr.Gopinath Ganapathy, Director/BUTP, Vice Chairman delivered the Inaugural Address

SPEAKER(S) TOPIC AND GIST

CSI Communications | November 2011 | 47

From Student Branches »http://www.csi-india.org/web/csi/chapternews-November2011SPEAKER(S) TOPIC AND GIST

L & T INSTITUTE OF TECHNOLOGY, POWAI, MUMBAI (REGION-VI)

Mr. Amol Patil, Senior Web Designer, Reality Premedia 8 August 2011 : One-day Workshop on “Web Designing”

The sessions covered topics such as image editing, simple animation, creating banners, slicing images & converting designs to web page using XHTML & CSS.

ç LTIT Students Attending the Web Designing Workshop

MAHARASHTRA INSTITUTE OF TECHNOLOGY (MIT), PUNE (REGION-VI)

Microsoft Professionals & Microsoft MVP 30 June - 2 July 2011 : Faculty Development Programme on “Microsoft Future Technologies”

Following topics were covered during the programme -

� Embedded development,

� Cloud Computing/Windows Azure,

� Mobile development and

� Microsoft .NET application platforms.

ç FDP on Microsoft Future Technologies

Mr. Sanjay Wamja, Mr. Vaibhav Gupta, Mr. Shekhar Sahasrabuddhe, Mr. Anay Tamhankar

2011 : One-day Seminar called “Technovision 2011”

The inaugural speech by Mr. Anay Tamhankar provided information about evolution in mobile computing. He highlighted the tremendous potential that lies in the domain of Android application development.

After this session, hands-on experiment on Android application development was conducted by Maxbohr Team.

ç L to R: Prof. Mrs Kulkarni, Dr. Kshirsahgar, Shekhar Sahasrabudhe and experts   from MaxBhor

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI (REGION-VII)

Mr. Vidit Baksi, TechDefence 21 August 2011 : Workshop called “Hacksec”

The workshop trained students about Google hacking, Cyber ethics and laws, Information scanning, E-mail hacking, Network hacking, Mobile hacking, Wireless hacking, Cyber crime investigation, Web application hacking, finding loopholes in SMS and call forging in mobile networks and finding loop holes like cross site scripting and session hijacking in Orkut, Yahoo and Facebook.

ç Mr. Vidit Baksi conducting the session

2 October 2011 : Workshop on “Animation”

The i-workshop on Animation was on Maya and Adobe photo shop after effects.

ç I-Workshop in progress

CSI Communications | November 2011 | 48 www.csi-india.org

Please send your event news to [email protected]. Low resolution photos and news without description of gist will not be published. Please send only 1 photo per event, not more. Kindly note that news received on or before 20th of a month will only be considered for publishing in CSIC issue of the following month.

SPEAKER(S) TOPIC AND GIST

NARASU’S SARATHY INSTITUTE OF TECHNOLOGY, SALEM (REGION-VII)

Dr. L Arockiam, Mr. V Arul Kumar and Mr. S Charles 17 September 2011 : Workshop on “Knowledge Discovery - WEKA”

Dr. L. Arockiam gave lectures on concepts of data mining and KDD (Knowledge Discovery in Database) and also gave hands-on training on data mining using WEKA toolkits.

Dr. Arockiam further listed possible analytical jobs that can be done with WEKA. He informed that WEKA is Java based Machine Learning Software created for knowledge analysis and data mining.

ç (L to R) Dr. L Arockiam, Mr. B NitishHarihar, Thiru G Prabakaran, Dr. K Raja,   Mr. V Arul Kumar

NATIONAL ENGINEERING COLLEGE (NEC), KOVILPATTI (REGION-VII)

Mr. S Arunkumar, Mr. N Siva and Mr. J Thangamuthu 23 August 2011 : One-day Workshop on “Animation and Design Software”

Resource persons for the workshop were IV year students and they gave students hands on training in Photoshop, Power Director and Flash.

ç Mr. N Siva speaking at the workshop

Dr. K S K Chockalingam, Dr. D Manimegalai, Mr. R Chandrasekaran and others

24 August 2011 : National Level Technical Symposium “NECSI 2K11”

Mr. R. Chandrasekaran stressed the importance of choosing right field in accordance with one’s aptitude.

Paper presentation, Debugging, Web Designing and Image Hunting were the variety of events organized in the technical symposium.

ç L to R : Ms. E Siva Sankari, Dr. D Manimegalai, Dr. Kn. K S K Chockalingam,   Mr. P Subburaj, Mr. N Balasubramanian

VALLIAMMAI ENGINEERING COLLEGE, KATTANKULATHUR (REGION-VII)

Dr. M Balasubramanian, Mr. M Sathymurthi, Mr. Muthuswamy Ramachandran and others

18-19 August 2011 : Two-days National Level Technical Symposium “XploITs 2K11”

Mr. Muthuswamy Ramachandran explained real situation in IT industry and helped the students to prepare for professional life.

Mr. P Lingesh Ananth gave inspirational speech for students regarding social activities & services apart from the profession. He shared his experience about leading balanced life.

ç Inaugural Function - (L to R) Dr. M. Balasubramanian, Mr. Muthuswamy   Ramachandran, Mr. M Sathyamurthi and Prof. R S Vijay Ravikumaran

ASIA PACIFIC CONFERENCE

HOTEL INTERCONTINENTAL, THE LALITSahar Airport Road, Andheri (E), MUMBAI. INDIA

th th12 -13 December 2011

SOUTH EAST ASIA REGIONALCOMPUTER CONFEDERATIONwww.searcc-2011.org

INCLUSIVE GROWTHGROWTH

DAY 1 ( 12 / 12 / 2011 )

• Bridging the diversity• Technology Infrastructure

• Policy framework• IT Vendors eco system across country

• CIOs perspective for effective implementation • Local issues and cultural aspects

INAUGURATION Mr. Kapil Sibal*, Hon. Minister of MHRD and ITC, Govt. of India

Mr. Shanker Annaswamy*, MD, IBM India.

Mr. Jimmy Miringtoro, Hon. Minister of Communication and Information, PNG

Mr. Lim Guan Eng, Hon. Chief Minister, State of Penang, Malaysia.

Mr. FC Kohli, Patron, SEARCC 2011 and Founder member of SEARCC

PLENARY-I; ICT Foster Business and Transformation

PLENARY-II; Collaboration Technologies and Applications

IT SECRETARIAL CONCLAVE Role and Importance of Collaboration for delivering high impact citizen services within and across countries - special reference to SEARCC countries

Drivers for Deliberations & presentations

TEA BREAK

Chair: � Mr. Shankar Aggarwal, Addl. Secretary to GOI Department of Information Technology Ministry of Communication & Information Technology

� Mr. M N Vidyashankar, Principal Secretary, e-Governance Department & Principal Secretary (I/c.), IT, BT and S&T Dept. Karanatka � Mr. Henao Iduhu, Secretary, Department of Communication and Information, Papua New Guinea� Mr. Rajesh , Secretary DIT, Maharashtra

� Mr. C N Ram*, Group CIO, ESSAR Group � Mr. VVR Babu*, Group CIO, ITC� Mr S Mahalingam, CFO, TCS � Mr. Arun Kumar Singh*, Secretary, Information Technology, Bihar

Aggarwal

LUNCH

� Mr. Kora Nou, Secretary, Deputy Secretary (Policy) Depart. of Communication & Information, PNG

� Mr. Santosh Babu*, Secretary Department of ICT, Tamilnadu

� Mr. PH Kurian*, Principal Secretary, Department of ICT, Kerala

� Mr. Anurag Jain*, Secretary to Dept of IT, MP

� Arun Kumar Singh, Secretary to Dept of IT, Bihar

Two Senior CIOs from Corporate

� YOUNG IT PROFESSIONAL AWARD FUNCTION � Networking Dinner

TRACK 2e-Governance

Track Chair: Mr. Piyush Gupta, NISG

Session 1e Governance: Design and Implementation

Session 2Creating an Environment for outcome based e Governance

Session 3Dynamics of Project Management in e- Governance

Speakers:

Mr. Anurag Srivastava, SPI, Govt. Secy, MP

Mr. D Krishnan, Indian Revenue Service, GOI.

Mr. Ajay Sawhney, Jt.Secy, DIT, Govt. of India

Prof. Subhash Bhatnagar, Indian Institute of Management, Ahmadabad

Mr. Prakash Kumar, Director at Cisco Systems

Mr. Shashank Ojha, Global ICT Department, World Bank

Mr.Osama Manzar, Founder, Digital Empowerment Foundation DEF

TRACK 1Technologies for collaborative knowledge

management and framework Track Chair : Dr. Sunita Sane, VJTI

( Drivers and Enablers of ICT for inclusive growth )

• Knowledge Society• Telecom• Shared and Cloud Infra structure• Security and Privacy• Discipline of ICT application: impact of varieties and

heterogeneities• Impact of new devices • Green ICT• Digital Divide• Localisation• Skills and Education

Speakers: Collaboration and knowledge management

Dr. Basant Rajan, CEO, Coriolis Technologies Strategies for business collaboration through ICT

Dr. D. B. Phatak, Indian Institute of Technology, BombayStrategies of knowledge sharing bottom of Pyramid

Mr. Dileep Ranjekar, CEO, Azim Premji Foundation Information and Knowledge frameworkProf. Kannan M. Moudgalya, Head, Centre for Distance Engineering Education Programme, IIT, Bombay

Case Study Paper Presentation:

Selected papers on the following verticals would be presented

Education and Knowledge Society

Healthcare and Tele Medicine

Agriculture and PDS Systems

Social Upliftment and Rural Development

Banking and Financial Systems

Media and Entertainment

Business Model - Effective and Affordable

Various e-Governance aspects

HIGH POWER CIO SUMMIT: Drivers : • Key learning of CIOs for effective implementation of ICT Solutions

• The key differentiating factor of ICT implementation at state level learning for corporate CIOs.• Holistic approach for solution sharing across Corporates and Government • Strengthening the IT Governance framework

Convener: James Joseph, Director, Executive Engagements, Microsoft, India Co- Convener: Mr. Ishvar Jha, Founder and CEO, Avani TV solution

Power key notes for CIOs : Dr. Sam Pitroda*, Adviser to Prime Minister of India on Public Information Infrastructures and Innovations

Dr. R. Chidambaram, Principal Scientific Advisor, Government of India

Panel Discussion on “Role of CIO’s of Government and Industries for Inclusive Growth“

DAY 2 ( 13 / 12 / 2011 )SEARCC-2011 BUISNESS SUMMIT

Convener- Mr. Manak Singh, Executive Director, TiE, Mumbai

Opening remarks by Mr. MD Agrawal, President, CSI

Session-1, Government and Policy Perspective

Session Moderator: Mr. Kumar Parakala, Partner and Chief Operating Officer, KPMG

Ministerial Conclave

GUEST OF HONOUR Hon. Milind Deora Minister of State for Communication and Information Technology, Govt. of India.

(Subject- Cross border collaboration for ICT Industry)

AUSTRALIA: Hon. Stephen Conroy, Minister for Broadband, Communications and the Digital Economy

MALAYSIA: Rt. Hon. Lim Guan Eng: Chief Minister, State of Penang, Malaysia.

Hon. Prof Dr P. Ramasamy, Deputy Chief Minister of the State of Penang, Malaysia.

PAPUA NEW GUINEA : Hon. Jimmy Miringtoro, Minister of Communication and Information, Papua New Guinea

Session 2; Business and Entrepreneurs Perspective

Session Moderator- Mr. Ashank Desai, Former Chairman, Mastek

Invited Panellists

Mr. N Chandrasekaran*, CEO and MD,TCS

Mr. Ajit Balkrihnan*, Founder and chairman, Rediff.com

VALEDICTORY

� Higher education for sustainable growth through Innovation and Research � Cross disciplinary education for research and innovator in ICT � Training and skill development for industry � Common Services framework for implementation� Sharing higher level courses among the SEARCC Countries� Roadmap and Plan

Invited Panel- Mr. N. Ravi Shankar, Jt. Secretary, Ministry of Communications & IT, DIT, GoI

Prof. R.K. Shyamasundar, Tata Institute of Fundamental Research (TIFR)

Dr. Rattan K. Datta, Honorary CEO and Director, Merit

Mr. Alphonsus Pang, President, Singapore Computer Society

Dr. P. Ramasamy, Deputy C M, Penang, Malaysia

Mr. Dilip Chenoy, CEO & MD Designate, NSDC

Presidents from SEARCC Computer Societies

TRACK 3CLOUD COMPUTING: PLATFORM FOR

INCLUSIVE GROWTH Track Chair:

Mr. Anthony Wong, Australian Computer Society.

Speakers :Prof. Umesh Bellur, Indinan Institute of Technology, Bombay

Mr. Anthony Wong: President SEARCC and ACS

Ms. Heather Tropman, General Counsel, Macquarie Telecom

TRACK 4 ICT STRATEGIES FOR INCLUSIVE GROWTH

Track Chair:

Dr. Atanu Rakshit, Indian Institute of Management, Rohtak, India

Subject; ICT Strategies for economic and societal transformation

(Key Points of Coverage; key imperatives, policies, collaborations, partnerships, IT industry eco system , IT industry academia eco system)

Speakers:

Mr. N. Ravi Shankar, Jt Secretary, Ministry of Communications & Information technology, DIT, Govt. of India

Prof. S. Parasuraman, Director, Tata Institute of Social Sciences (TISS) Mumbai

Dr. Sudhir Dixit, Director, HP Labs India Bangalore, India

Dr. Sartaj Sahni, University of Florida, USA

REGISTRATIONCSI Members/

SEARCC MembersNon CSI / SEARCC

MembersStudents / Academicians /

Govt. Employees

Two Days Conference ` 10,000 $ 350 ` 12,500 $ 400 ` 9,000 $ 335

One Day Conference ` 6,000 $ 250 ` 7,000 $ 275 ` 5,000 $ 235

INR ` US $ US $INR ` INR ` US $

Early Bird Discount for individuals

only: *Registration before 20

November ̀ 2000/- or $ 50 less

Group Discount for organizations only: 5 & above – 10 %

Day

Note: Payment is to be made in favour of 'CSI Mumbai Chapter, SEARCC-2011' A/c No. 054401002586 payable at ICICI Bank, MIDC, Andheri (E), Branch, Mumbai-400 093, RTGS/NEFT Code: ICIC0000544 ( All Major VISA / Master Credit / Debit Cards will be accepted )

Conference Secretariat : CSI Mumbai Chapter, E-217, Floral Deck Plaza, MIDC, Andheri(E), Mumbai-400093. INDIA Tel: +91 22 28235476 / 28235548, Fax: 22-28235546 Email: [email protected] / [email protected] URL : http://www.searcc-2011.org•

LUNCH BREAKSESSION CONTINUED

TEA BREAKPanel Discussion; Strategies and Roadmap for ICT for inclusive Growth and education

* subject to confirmation

Registered with Registrar of News Papers If undelivered return to : for India - RNI 31668/78 Samruddhi Venture Park, Unit No.3, Regd. No. MH/MR/WEST-76-2009-11 4th floor, MIDC, Andheri (E). Mumbai-400 093

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.