wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

Getting started with Android Studio

Blog banner

15 Interesting Facts about India

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Cross site scripting Attack

Blog banner

Operation system

Blog banner

Embaded operating system

Blog banner

Is Your Password Complex Enough?

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Benefits and drawback of web security.

Blog banner

Cache Memory(142)

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

OS assignment 3

Blog banner

Benefits of yoga and meditation

Blog banner

RAID

Blog banner

SQL Injection Techniques

Blog banner

differentiate thinking humanly and rationally

Blog banner

Starvation

Blog banner

Service transition principles

Blog banner

Article on different management system

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Creating Digitally Signed Document

Blog banner

What is Amazon?

Blog banner

File and File System Structure

Blog banner

Principles of Service Operation

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Photorec - media recovery tool

Blog banner

A book review

Blog banner

Busted : Common Web Security Myths

Blog banner

Drawing tips for a beginner

Blog banner

Man is free by the birth .

Blog banner

OLA

Blog banner

10 Reasons to date your best friend

Blog banner

Virtual Memory

Blog banner

Beatbox

Blog banner

USPS mail

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

SQL Injection

Blog banner

operating system

Blog banner

Race Condition

Blog banner

Cyber Security in Data Breaching

Blog banner

Harsh Rathod

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner