General-Studies Upsc 2020 Feb20 Sample 3
General-Studies Upsc 2020 Feb20 Sample 3
General-Studies Upsc 2020 Feb20 Sample 3
DISASTER MANAGEMENT
1. Introduction to Disaster Management
a. What is a Disaster?
b. What is a Hazard?
c. What is Vulnerability?
d. What is Risk?
e. What is Capacity?
f. Classification of Disasters
g. Disaster Management Cycle
5. Miscellaneous Topics
a. Disaster Insurance
b. Community Based Disaster Management.
c. Role of Social Media in Disaster Management
d. Retrofitting of Buildings- The Key is to Let it Swing
e. Climate Change and Disasters
f. Poverty and Disasters
g. Miscellaneous NDMA Guidelines
h. National Disaster Plan for Animals
ECONOMICS
1. Introduction
2. Evolution of Indian Industry
a. The Pre-Reform Regime
i. Industrial Policy Regime in the Pre-Reform Period
ii. Major Features of Pre-1991 Industrial Policy
iii. Assessment of Pre-1991 Industrial Policy
1
GENRAL STUDIES - 3
b. Beginning of Reforms in the 1980s
c. New Industrial Policy, 1991
i. Assessment of New Industrial Policy (NIP)
3. Initiatives Taken by the Government for Industrial Development
a. Disinvestment
b. Ease of Doing Business in India
c. E- Biz Project
d. Make in India Initiative
e. National Manufacturing Policy
f. Delhi-Mumbai Industrial Corridor (DMIC)
g. Steps Taken for Promotion and Development of MSMEs
GOVERNMENT BUDGETING
1. Budgeting: Meaning and Importance
2. The Union of India’s Budget
a. Components of the Government Budget
i. Revenue Account
ii. Capital Account
iii. Statistics as Given by the Union Budget
b. Stages in Enactment
i. Presentation of Budget
ii. General Discussion on Budget
iii. Scrutiny by Departmental Committees
iv. Demand for Grants
v. Appropriation Bill
vi. Finance Bill
3. Weaknesses in the Budgetary Process
a. Weaknesses in Resource Allocation and Use
b. Weaknesses in the Indian Budgetary System and Implementation
4. Budgetary Reforms
a. Medium Term Budget Frameworks
b. Prudent Economic Assumptions
c. Top-Down Budgeting Techniques
d. Relaxing Central Input Controls
e. An Increased Focus on Results
f. Budget Transparency
g. Modern Financial Management Practices
5. Recent Changes in Union Budgeting
6. Scrapping of Plan and Non-Plan classification
7. Merging of Railway and General Budget
8. Budget Advancement
9. Evolution of Budgeting
a. The Line Item Budget
b. Performance Budgeting
c. Outcome budgeting
d. Zero-based Budgeting
e. Gender Budgeting
2
GENRAL STUDIES - 3
f. E-Budgeting
INFRASTRUCTURE
1. Introduction
2. Relation between Infrastructure & Economic Development
3. Roads and Road Transport
a. Government Initiatives
b. Way Ahead
c. Additional Schemes/Initiatives
d. New Initiatives
e. Green Initiatives
f. E- Initiatives
g. Road Connectivity Projects with Neighbouring Countries
h. Recommendations of Rakesh Mohan Committee (National Transport Development
Policy
4. Committee (NTDPC))
5. Railways
a. Rolling Stock
b. Dedicated Freight Corridors (DFCs)
c. Commission of Railway Safety
d. Key Developments
e. Various Committees for Reforms
f. Challenges and Suggestions
g. Key Issues
6. Civil Aviation
a. Agencies related to Civil Aviation
b. Challenges & Recommendations
c. Recommendations of NTDPC
7. Ports and Shipping
a. National Maritime Development Programme (NMDP)
b. Shipping
c. Coastal Shipping
d. Inland Water Transport
e. Shipping Corporation of India
f. Shipbuilding Industry in India
g. Key Developments
h. Challenges
i. Recommendations of NTDPC
8. Energy
a. Projected Energy Demand
b. Energy Efficiency
c. Energy Pricing
d. Oil and Gas Production
9. Power
a. Power Availability in India
b. Key Developments in Power Sector
c. Coal
10. Renewable Energy
a. Policy Initiatives
3
GENRAL STUDIES - 3
b. Key Developments
11. Telecommunications
a. Present Status
b. Tele-Density
c. Composition of the Market
d. Broadband
e. National Telecom Policy
f. Manufacturing of Telecom Equipment
g. Universal Service Obligation Fund
h. National Optical Fiber Network (NOFN)
i. Transition to New Internet Protocol
j. Regulatory Framework
k. Research & Development
l. Public Sector Undertakings (PSUs)
12. Kelkar Committee Report: Revisiting & Revitalizing the PPP Model of Infrastructure
13. Development
4
GENRAL STUDIES - 3
i. Direct Subsidies
ii. Indirect Subsidies
c. Issues related to Agriculture Subsidies and their Possible Resolution
d. Agriculture Subsidies and WTO
i. Historical Background
ii. Indian Agriculture Subsidies and WTO
4. Agriculture Pricing Policies
a. Minimum Support Price
i. Need of MSP Policy
ii. Critical Evaluation of Minimum Support Price
5
GENRAL STUDIES - 3
6
GENRAL STUDIES - 3
ii. Qualitative Dimension of Food Security in India
c. Why Securing Food is a Challenge?
i. Integrated Child Development Scheme (ICDS)
ii. Mid-Day Meal (MDM) Scheme
iii. Critical Appraisal of ICDS and MDM
d. National Food Security Act
i. Key Features of the Act
ii. Critical Evaluation of NFSA
e. WTO and Food Security
i. Recent debates in WTO meets over Food Security
TECHNOLOGY MISSIONS
1. Introduction
2. Mission for Integrated Development of Horticulture (MIDH)
3. National Mission on Agriculture Extension and Technology (NMAET)
4. National Mission on Oilseeds and Oil Palm (NMOOP)
5. National Saffron Mission
6. Technology Mission on Citrus
7. Technology Mission on Coconut
8. Technology Mission on Oilseeds, Pulses and Maize (TMOP)
9. Jute Technology Mission
10. Technology Mission on Cotton (TMC)
11. Sugar Technology Mission
12. National Mission on Bio Diesel
13. National Mission on Food Processing
14. National Food Security Mission
15. National Mission on Medicinal Plants
16. National Mission on Micro-Irrigation
17. National Mission for Sustainable Agriculture (NMSA)
18. Green Revolution – Krishonnati Yojana
7
GENRAL STUDIES - 3
ii. Based on Seasons
c. Cropping Patterns in India
4. Major Agricultural Regions or Zones of India
INVESTMENT MODELS
INFRASTRUCTURE
1. Models Used in the Planning Process
a. Harrod – Domar Growth Model
b. Mahalanobis Strategy of Economic Growth
c. Planning Model Adopted in India
2. Infrastructure Investment Models
a. Financing of Infrastructure: Need, Issue and Challenges
b. Issues in Infrastructure Financing
c. Measures Taken by the Government
d. Public-Private Partnership (PPP) in Infrastructure
e. EPC MODEL
f. Swiss Challenge Model
g. Hybrid Annuity Model
3. Models of Foreign Investment
a. Why the Need for Foreign investment
b. Forms of Foreign Investment
c. Foreign Direct Investment
d. Foreign Institutional Investors
e. Recent Initiatives to promote Foreign Investment
SECURITY
8
GENRAL STUDIES - 3
9
GENRAL STUDIES - 3
MONEY LAUNDERING
1. Introduction
a. Why is Money Laundered?
b. How is Money Laundered?
c. Various Techniques Used for Money Laundering
d. Hawala and Money Laundering
i. Cryptocurrency: The New Hawala
2. Impact of Money Laundering on Nation
3. Prevention of Money Laundering
a. Indian Mechanisms to Combat Money Laundering
i. Prevention of Money Laundering Act
ii. Financial Intelligence Unit - India (FIU-IND)
iii. Enforcement Directorate
b. Global mechanisms to Combat Money Laundering:
i. Vienna convention
ii. The Council of Europe Convention
iii. Basel Committee’s Statement of Principles
iv. The Financial Action Task Force (FATF)
v. United Nations Global Programme Against Money Laundering (GPML)
vi. Other Organization and Initiatives against Anti-Money-Laundering (AML)
4. Challenges in Prevention of Money Laundering
5. Way forward
10
GENRAL STUDIES - 3
11
GENRAL STUDIES - 3
8. Way Forward
CYBER SECURITY
1. Introduction to Cyber Security
a. Cyberspace
b. Cyberthreats
i. Cyber Crime/ Cyber Attacks
ii. Cyber terrorism
iii. Cyberwarfare
iv. Cyber Espionage
c. Importance of Cyberspace
d. Challenges in defending cyberspace
2. Cybersecurity in India
a. Current situation
b. Steps taken by Government in Cybersecurity
c. Legal Framework
i. National Cybersecurity Policy
ii. Information Technology Act
iii. Criticisms of the Information Technology Act
iv. National Telecom Policy
d. Institutional Framework
i. National Cybersecurity Coordination Centre (NCCC)
ii. India’s Computer Emergency Respose Team (CERT-In)
iii. National critical information infrastructure protection centre (NCIIPC)
iv. Indian cyber-crime coordination centre (I4C) and Cyber Warrior Police force
v. Cyber Swachchta Kendra (CSK)
12
GENERAL STUDIES - 3
SECURITY
CYBER SECURITY
As per Information Technology Act, 2000, “Cyber security means protecting
information, equipment, devices computer, computer resource, communication
device and information stored therein from un authorized access, use, disclosure,
disruption, modification or destruction.”
Cyberspace
India’s Cyber Security Policy 2013 defines cyberspace as a complex environment
comprising interaction between people, software and services, supported by
worldwide distribution of information and communication technology devices and
networks.
Cyber threats
Cyber threats can be disaggregated into four baskets based on the perpetrators and
their motives - Cyber Espionage, Cyber Crime, Cyber Terrorism, Cyber Warfare.
Cyber Crime/ Cyber Attacks
Cyber-attack is “any type of offensive maneuver employed by individuals or whole
organizations that targets computer information systems, infrastructures, computer
networks with an intention to damage or destroy targeted computer network or
system.”
These attacks can be labeled either as Cyber-campaign, Cyber-warfare or Cyber-
terrorism depending upon the context, scale and severity of attacks. Cyber-attacks
can range from installing spyware on a PC to attempts to destroy the critical
infrastructure of entire nations.
Cyber terrorism
Acts of Terrorism related to cyber space or act of terrorism executed using Cyber
technologies is popularly known as 'cyber terrorism'.
“Cyber terrorism is the convergence of terrorism and cyber space. It is
generally understood to mean unlawful attacks and threats of attacks against
computers, networks, and information stored therein when done to intimidate
or coerce a government or its people in furtherance of political or social
objectives, Further, to qualify as cyber terrorism, an attack should result in
GENERAL STUDIES - 3
violence against persons or property or at least cause enough harm to
generate fear, Serious attacks against critical infrastructures could be acts of
cyber terrorism depending upon their impact.”
It should be noted here that if they create panic by attacking critical
systems/infrastructure, there is no need for it to lead to violence. In fact such
attacks can be more dangerous.
Besides, terrorists also use cyberspace for purposes like planning terrorist attacks,
recruiting sympathizers, communication purposes, command and control,
spreading propaganda in form of malicious content online to brain wash, funding
purposes etc. It is also used as a new arena for attacks in pursuit of the terrorists’
political and social objectives.
Cyber warfare
“The use of computer technology to disrupt the activities of a state or
organization, especially the deliberate attacking of information systems for
strategic or military purposes.” These hostile actions against a computer system or
network can take any form. On one hand, it may be conducted with the smallest
possible intervention that allows extraction of the information sought without
disturbing the normal functioning of a computer system or network. This type of
intervention is never notice by user and is continuing.
Other type may be destructive in nature which alters, disrupts, degrades, or destroy
an adversary’s computer systems.
Cyber Espionage
As per Oxford dictionary, Cyber espionage is “The use of computer networks to
gain illicit access to confidential information, typically that held by a government
or other organization.” It is generally associated with intelligence gathering, data
theft and, more recently, with analysis of public activity on social networking sites
like Facebook and Twitter. These activities could be by criminals, terrorists or
nations as part of normal information gathering or security monitoring.
Examples of Cyber Espionage include- 2014 hacking of major US companies to
steal trade secrets by Chinese officials; Titan Rain; Moonlight Maze; NSA
surveillance Program as revealed by Edward Snowden in USA.
GENERAL STUDIES - 3
Importance of Cyberspace
Cyber Security has assumed strategic and critical importance because of following
reasons:
• Cyberspace has become key component in the formulation and execution of
public policies.
• It is used by government to process and store sensitive and critical data which if
compromised can have devastating impact.
• Taking down cyberspace will result into disruption of many critical public
services like railways, defense systems, communication system, banking and other
financial system etc.
• Several states are developing the capabilities in the area of cyberattacks which
can alter outcomes in the battlefield.
• Individuals are using internet based services at a growing pace making them
vulnerable to cybercrimes, such as- online bank frauds, surveillance, profiling,
violation of privacy etc.
Challenges in defending cyberspace
The task of tackling cyber-attacks is more difficult than conventional threats due to
following reasons
• Diffused and intangible threat in the absence of tangible perpetrators coupled
with low costs of mounting an attack makes it difficult to frame an adequate
response.
• Difficult to locate the attacker who can even mislead the target into believing that
the attack has come from somewhere else.
• Absence of any geographical constraints enabling attackers to launch attack
anywhere on the globe
• Need of international cooperation - Cyberspace are inherently international even
from the perspective of national interest. It is not possible for a country to ignore
what is happening in any part of this space if it is to protect the functionality of the
cyberspace relevant for its own nationals.
GENERAL STUDIES - 3
• Rapidly evolving technology needs investment, manpower and an ecosystem to
keep track of global developments, developing countermeasures and staying ahead
of the competition.
• Non-existence of foolproof security architecture due to low resources
requirement for attacker to launch attack coupled with potential bugs in any system
• Human element in cyber security – Target users, themselves, make mistakes and
fall prey to cyber attack. Most sophisticated cyberattacks have all involved a
human element: Stux net needed the physical introduction of infected USB devices
into Iran’s nuclear facilities; the 2016 cyber-heist of $950 million from Bangladesh
involved gullible (or complicit) bankers handing over SWIFT codes to hackers.
GENERAL STUDIES - 3
MONEY LAUNDERING
Money laundering is the process of taking money earned from illicit activities,
such as drug trafficking or tax evasion, and making the money appeared to be
earnings from legal business activity.
Why is Money Laundered?
Illegal arms sales, smuggling, and other organized crime, including drug
trafficking and prostitution rings, can generate huge amounts of money.
Corruption, embezzlement, insider trading, bribery and computer fraud schemes
can also produce large profits. The money generated from such illicit activities is
considered dirty and needs to be laundered to make it look ‘clean’. The criminals
need a way to deposit the money in financial institutions. Yet they can do so if the
money appears to come from legitimate sources. By successfully laundering the
proceeds, the proceeds can be made to appear ‘clean’ and the illicit gains may be
enjoyed without fear of being confiscated or being penalized
How is Money Laundered?
Traditionally money laundering has been described as a process which takes place
in three distinct stages.
Placement Stage – At this stage criminally derived funds are introduced in the
financial system. This is the riskiest stage because of large amounts of cash
involved which can catch the eyes of law enforcement agencies. So the launderer
breaks large amounts of cash into less conspicuous smaller sums that are then
deposited directly into a bank account, or is used to purchase monetary instruments
such as cheques, money orders etc.
Layering stage - It is the stage at which complex financial transactions are carried
out in order to camouflage the illegal source. In other words, the money is sent
through various financial transactions so as to change its form and make it difficult
to follow. Layering may be done by below mentioned ways:
• Several bank-to-bank transfers which may be in small amounts.
• Wire transfers between different accounts in different names in different
countries.
• Making deposits and withdrawals to continually vary the amount of money in the
accounts.
GENERAL STUDIES - 3
• Changing the money's currency.
Various Techniques Used for Money Laundering
1. Structuring Deposits: This is a method of placement whereby cash is broken
into smaller deposits of money which is then exchanged by many individuals
(known as “smurfs”) to avoid anti-money laundering reporting requirements. This
is also known as smurfing because many individuals (the “smurfs”) are involved.
2. Shell companies: These are companies without active business operations. They
take in dirty money as "payment" for supposed goods or services but actually
provide no goods or services; they simply create the appearance of legitimate
transactions through fake invoices and balance sheets.
3. Third-Party Cheques: Counter cheques or banker’s drafts drawn on different
institutions are utilized and cleared via various third-party accounts. Since these
are negotiable in many countries, the nexus with the source money is difficult to
establish.
4. Bulk cash smuggling: This involves physically smuggling cash to another
jurisdiction and depositing it in a financial institution, such as an offshore bank,
with greater bank secrecy or less rigorous money laundering enforcement.
GENERAL STUDIES - 3
SECURITY
SECURITY CHALLENGES AND THEIR MANAGEMENT IN BORDER
AREAS
India has 15,106.7 km of land border and a coastline of 7,516.6 km including
island territories. Securing the country’s borders against interests hostile to the
country and putting in place systems that are able to interdict such elements while
facilitating legitimate trade and commerce are among the principal objectives of
border management. The proper management of borders, which is vitally important
for national security, presents many challenges and includes coordination and
concerted action by administrative, diplomatic, security, intelligence, legal,
regulatory and economic agencies of the country to secure the frontiers and
subserve its best interests.
BORDER MANAGEMENT
While Border Security Approach deals only with defending the borders, the Border
management is a broader term which involves not only defending the borders but
also the protections of interests of the country on aligning borders.
The Department of Border Management in the Ministry of Home Affairs focuses
on management of the international land & coastal borders, strengthening of border
policing & guarding, creation of infrastructure such as roads, fencing & flood
lighting of the borders and implementation of the Border Area Development
Programme (BADP). Some problems currently afflicting the management of our
borders including maritime boundaries are:
• Hostile elements have access to latest technology, unprecedented use of money
power, organisational strength, maneuverability, wide choice available for
selecting theatre of action for surprise strikes and strategic alliances with other
like-minded groups.
• No proper demarcation of maritime and land borders at many places leading to
conflicts.
• Artificial boundaries having difficult terrains like deserts, swampy marshes etc.
which are not based on natural features thus making them extremely porous and
easy to infiltrate.
GENERAL STUDIES - 3
• Multiplicity of forces on the same borders leading to problems of coordination,
command and control.
• Border Guarding Forces like Border Security Force etc. lack infrastructure. They
need to be appropriately strengthened both in terms of equipment and manpower.
• Problems faced by local people due to tough measures taken during anti-terrorism
and anti-insurgency operations generate discontent which should be addressed
prudently otherwise hostile elements try to leverage this discontent to their benefit.
• Cross-border terrorism targeted to destabilise India
• Illegal migration in eastern region causing socio-economic stress as well as
demographic changes
• Sporadic aggression on China border
• Cross border safe houses for insurgent in north eastern neighbours
• Smuggling of arms and explosives, narcotics and counterfeit currency
• Enhanced instances of smuggling, piracy, breach of coastal security
In light of above stated problems, there is need of utmost vigilance on the borders
and strengthening the border guarding forces. However, it should also be taken
care that the security of borders does not impede cross-border interactions and is
beneficial to mutual economic and cultural relationship. A detailed discussion on
border management with
GENERAL STUDIES - 3
ECONOMICS
INFRASTRUCTURE
Infrastructure Investment Models
Financing of Infrastructure: Need, Issue and Challenges The relationship
between infrastructure development and economic growth is well established in the
literature. While infrastructure development facilitates economic growth; economic
growth increases demand for more infrastructure. Thus, development of adequate
and quality infrastructure is a necessary if not sufficient condition to maintain
growth momentum in any economy. However, infrastructure development is an
arduous job for any country as it involves huge investments, long gestation
periods, procedural delays and returns spread over a long period of time. These
unique features of infrastructure development raise some issues which are specific
to the financing of infrastructure.
To revert back to the high economic growth rate (8-9%), the rate of investment has
to increase substantially (We need 1 Trillion Dollars of investment in infrastructure
in next two to three years- National Investment and Infrastructure Fund). This is
evidenced by the decline of growth rate and investment rate in last couple of years.
Let us look at the broad pattern of financing of infrastructure in our country before
highlighting some of the issues involved in it.
Issues in Infrastructure Financing
• Funding Gap - Funding Gap is the most important issue that we face on this front.
The slowdown in the economy has further aggravated this funding gap in the
infrastructure sector.
• Fiscal Burden - Almost half of the total investment in the infrastructure sector
was done by the Government through budget allocations. But the Government
funds have competing demands, such as, education, health, employment
generation, among others.
• Asset-Liability Mismatch of Commercial Banks - After the budgetary support,
next in line for financing infrastructure were funds from the commercial banking
sector. However, it is a well-known fact that these are institutions that primarily
leverage on short-term liabilities and, as such, their ability to extend long-term
loans to the infrastructure sector is limited.
GENERAL STUDIES - 3
This is because, by doing so they get into serious asset-liability mismatches.
• Investment Obligations of Insurance and Pension Funds - From the point of view
of asset liability mismatches, insurance and pension funds are one of the best
suited institutions to invest in the infrastructure sector. This is because, in contrast
to the commercial banking sector, these institutions leverage on long-term
liabilities. However, they are constrained by their obligation to invest a substantial
portion of their funds in Government securities. Of course, in a way, this facilitates
the financing of gross fiscal deficit of the Central Government and hence enables
the Central Government to make more investments.
However, this limits the direct investment of these institutions in the
infrastructure sector
• Need for an Efficient and Vibrant Corporate Bond Market - An active corporate
bond market can facilitate long-term funding for the infrastructure sector.
However, despite the various initiatives taken by the Reserve Bank, Securities &
Exchange Board of India and Government of India, the corporate bond market is
still a long way to go in providing adequate financing to the infrastructure sector in
India.
• Developing Municipal Bond Market for Financing Urban Infrastructure -For
large scale financing urban infrastructure which is assuming critical importance in
the context of rapid urbanization, conventional fiscal transfers to the urban local
bodies or municipals from governments are no longer considered sufficient.
As a result, there have been some earnest experimentations by these bodies to tap
unconventional methods of financing such as public private partnerships (PPPs),
utilizing urban assets more productively, accessing carbon credits, etc. but then
these do not address the financing needs. One possible way of addressing the
problem is developing a municipal bond market.
• Insufficiency of User Charges - It is a well-known fact that a large part of the
infrastructure sector in India (especially irrigation, water supply, urban sanitation,
and state road transport) is not amenable to commercialization for various reasons,
such as, regulatory, political and legal constraints in the real sector. Due to this,
Government is not in a position to levy sufficient user charges on these services.
GENERAL STUDIES - 3
The insufficiency of user charges on infrastructure projects negatively affect the
servicing of the infrastructure loans. Generally, such loans are taken on a non-
recourse basis and are highly dependent on cash flows.
Hence, levy and collection of appropriate user charges becomes essential for
financial viability of the projects.
• Legal and Procedural Issues - Infrastructure development involves long gestation
periods, and also many legal and procedural issues. The problems related to
infrastructure development range from those relating to land acquisition for the
infrastructure project to environmental clearances for the project. Many a times
there are legal issues involved in it and these increase procedural delays.
GENERAL STUDIES - 3
TECHNOLOGY MISSIONS
Technology Missions are mission-mode projects aiming towards rejuvenating
agriculture sector & its sub-sectors via technological enhancements. Techniques
adopted for such purposes are generally scientific and mechanized, and support is
provided by the Government to procure such advancements by ways of subsidy,
promotion, credit-linked subsidy, soft loans, etc.
Mission for Integrated Development of Horticulture (MIDH)
• The mission was approved in 2013
• It was targeted to achieve a growth rate of 7.2% in the horticulture in Twelfth
Plan.
• MIDH is a Centrally Sponsored Scheme for the holistic growth of the horticulture
sector covering fruits, vegetables, root & tuber crops, mushrooms, spices, flowers,
aromatic plants, coconut, cashew, cocoa and bamboo.
• While Government of India (GOI) contributes 85% of total outlay for
developmental programmes in all the states except the states in North East and
Himalayas, 15% share is contributed by state governments. In the case of North
Eastern States and Himalayan States, GoI contribution is 100%.
• Similarly, for development of bamboo and programmes of National Horticulture
Board (NHB), Coconut Development Board (CDB), Central Institute for
Horticulture (CIH), Nagaland and the National Level Agencies (NLA), GoI
contribution is 100%.
The strategy of the MIDH will be on production of quality seeds and planting
material, production enhancement through productivity improvement measures
along with support for creation of infrastructure to reduce post harvest losses and
improved marketing of produce with active participation of all stake holders,
particularly farmer groups and farmer producer organisations. The interventions
under MIDH will have a blend of technological adaptation supported with fiscal
incentives for attracting farmers as well as entrepreneurs involved in the
horticulture sector. It has subsumed 6 ongoing schemes:
1. National Horticulture Mission (NHM): applied in all states and UTs except NE
and Himalayan Region. It targets small and marginal farmer.
GENERAL STUDIES - 3
2. Horticulture Mission in NE and Himalayan Region (HMNEH): Targets small
and marginal farmers of NE and other Himalayan states.
3. National Bamboo Mission: applied in all states and UTs to address
developmental issues of Bamboo. It mainly emphasized on propagation and
cultivation of bamboo, with limited efforts on processing, product development
and value addition. There was weak linkage between the producers (farmers) and
the industry.
• Restructured National Bamboo Mission: The Cabinet Committee on Economic
Affairs (chaired by the Prime Minister) approved Centrally Sponsored Scheme of
National Bamboo Mission (NBM) under National Mission for Sustainable
Agriculture (NMSA) for remaining period of Fourteenth Finance Commission
(2018-19 & 2019-20).
• An outlay of Rs. 1290 crore (with Rs. 950 crore as Central share) is provisioned
for implementation of the Mission.
The restructured NBM strives:
• To increase the area under bamboo plantation in non-forest Government and
private lands to supplement farm income and contribute towards resilience to
climate change.
• To improve post-harvest management through establishment of innovative
primary processing units, treatment and seasoning plants, primary treatment and
seasoning plants, preservation technologies and market infrastructure.
• To promote product development at micro, small and medium levels and feed
bigger industry.
• To rejuvenate the under developed bamboo industry in India.
• To promote skill development, capacity building, awareness generation for
development of bamboo sector.
4. National Horticulture Board (NHB) schemes: will address developmental issues
on commercial horticulture through entrepreneurs involving institutional financing.
Applied in all States and UTs
5. Coconut Development Board (CDB) schemes: applied in States and UTs
producing Coconut
GENERAL STUDIES - 3
6. Central Institute of Horticulture (CIH), Nagaland schemes: in NE states,
focusing on HRD and capacity building MIDH works closely with National
Mission on Sustainable Agriculture (NMSA) and also provides technical advice
and administrative support to the Saffron Mission, and other horticulture related
activities like Vegetable Initiative for Urban Clusters (VIUC) funded by
RKVY/NMSA. It encourages aggregation of farmers into farmer groups like
FIGs/FPOs (Farmer Interest Groups/Farmer Producer Organisations) and FPCs
(Farmer Producer Companies) to bring economy of scale and scope. The overall
objective of the scheme is to strengthen nutritional security through enhanced
horticulture production and augmenting farmers’ income.
GENERAL STUDIES - 3