Tuesday, November 12, 2013

Phishing attacks in Computer Networks and Internet

Phishing is a kind of amalgamation of web technology and social engineering in order to penetrate the network security by intruders. It is the act of attempting to collect information like as usernames, passwords , details about credit cards and other transaction related matters by disguising to the computer/internet users. The most popular phishing scams are carried out using phishing web pages usually by tricking users into leaking their sensitive information and private data by counterfeiting trustworthy web identities.

Wednesday, September 25, 2013

e-Governance Syllabus for B.Sc. (CSIT)

5th semester syllabus: E-Governance

Course Title: E-Governance
Course no: CSC-307                                                                       Full Marks: 70+10+20
Credit hours: 3                                                                                Pass Marks: 28+4+8

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Course Synopsis:      This course contains concepts of E-Governance policies and data warehousing / data mining.

Goal:  To provide the knowledge of good governance using information and communication technologies and case studies of different countries.

Course Contents:

Unit 1. Introduction                                                                                      4 Hrs.
E-Governance: Needs of E-Governance, Issues in E-Governance applications and the Digital Divide; Evolution of E-Governance, Its scope and content; Present global trends of growth in E-Governance: Other issues.

Unit 2. Models of E-Governance                                                              10 Hrs.
Introduction; Model of Digital Governance: Broadcasting/ Wilder Dissemination Model, Critical Flow Model, Comparative Analysis Model, Mobilization and Lobbying Model, Interactive-service Model/Government-to-Citizen-to-Government Model (G2C2G); Evolution in E-Governance and Maturity Models: Five Maturity Levels, Characteristics of Maturity Levels, Key areas, Towards Good Governance through E-Governance Models.

Unit 3. E-Governance Infrastructure and Strategies                              6 Hrs.
E-readiness: Digital System Infrastructure, Legal Infrastructural Preparedness, Institutional Infrastructural Preparedness, Human Infrastructural Preparedness, Technological Infrastructural Preparedness; Evolutionary Stages in E-Governance.

Unit 4. Data Warehousing and Data Mining in Government               5 Hrs.
Introduction; National Data Warehouses: Census Data, Prices of Essential Commodities; Other areas for Data Warehousing and Data Mining: Agriculture, Rural Development, Health, Planning, Education, Commerce and Trade, Other Sectors.

Unit 5. Case Studies                                                                                     20 Hrs.
Nepalese Context: Cyber Laws, Implementation in the Land Reform, Human Resource Management Software; India: NICNET, Collectorate, Computer-aided Administration of Registration Department (CARD),  Smart Nagarpalika, National Reservoir Level and Capacity Monitoring System, Computerization in Andra Pradesh, Ekal Seva Kentra, Sachivalaya Vahini, Bhoomi, IT in Judiciary, E-Khazana, DGFT, PRAJA, E-Seva, E-Panchyat, General Information Services of National Informatics Centre; E-Governance initiative in USA; E-Governance in China; E-Governance in Brazil and Sri Lanka.

Text / Reference books:

  1. E-Governance: Concepts and Case Studies, C.S.R. Prabhu, Prentice-Hall of India Private Limited, 2004.
  2. Backus, Michiel, e-Governance in Developing Countries, IICD Research Brief, No. 1, March 2001.