Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Modelling of a Multifaceted Electronic Card-Based Secure E-Governance System

Data Modelling of a Multifaceted Electronic Card-Based Secure E-Governance System
View Sample PDF
Author(s): Abhishek Roy (The University of Burdwan, India)and Sunil Karforma (The University of Burdwan, India)
Copyright: 2014
Pages: 20
Source title: Emerging Mobile and Web 2.0 Technologies for Connected E-Government
Source Author(s)/Editor(s): Zaigham Mahmood (University of Derby, UK & North West University Potchefstroom, South Africa)
DOI: 10.4018/978-1-4666-6082-3.ch012


View Data Modelling of a Multifaceted Electronic Card-Based Secure E-Governance System on the publisher's website for pricing and purchasing information.


In the current climate of global economic decline, the developing countries are facing severe challenges in maintaining an efficient administration within an affordable budget. If this economic slowdown continues, there will be serious difficulties which will hamper the socio-economic development of the entire region. To respond to the situation, the governments must reduce budget expenses and still maintain efficiency and openness. To do so, the administration must deploy ICT-based mechanisms to fulfil the desired objectives. In this chapter, the authors present the development of a multifaceted electronic card-based secured e-governance mechanism to attempt to redress the inherent issues and explore new dimensions of interdisciplinary research. The proposed system will also act as the all-purpose electronic identity of the Citizen and hopefully replace the existing identity instruments such as Voter Card, Permanent Account Number Card, Driving License, Ration Card, Below Poverty-Line Card, Employment Card, Health Card, Insurance Card, etc. Moreover, this electronic instrument will also enable Citizen to perform financial transactions. Clearly, the authentication procedure of the proposed mechanism must also exist otherwise the intruders will be able to breach the system and execute their ill intentions. To ensure appropriateness of security features of the mechanism, the authors have also implemented a user authentication technique using object-oriented modelling of RSA digital signature algorithm for a Government-Citizen (G2C) type of e-governance. For better management of such a huge amount of sensitive information, the authors also discuss data modelling techniques used during user authentication of the proposed model.

Related Content

Serpil Kır Elitaş. © 2023. 11 pages.
Sami Kiraz. © 2023. 14 pages.
Kadir Bendaş. © 2023. 10 pages.
Fatih Değirmenci. © 2023. 15 pages.
Elifnur Terzioğlu. © 2023. 14 pages.
Türker Elitaş. © 2023. 16 pages.
Sudeep Uprety. © 2023. 14 pages.
Body Bottom