wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

The Importance of Data Quality Management in Data Science

Blog banner

INSTAGRAM

Blog banner

GUIDE TO GIS

Blog banner

Introduction to GIS

Blog banner

1.1 basic elements

Blog banner

Cache Memory in Operating Systems

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Concurrency and memory

Blog banner

RAID

Blog banner

Big Data

Blog banner

Supervised and Unsupervised Learning

Blog banner

What is hydration pack/ hydration bladder?

Blog banner

PHISHING

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

NETSUITE

Blog banner

Riddhi Miyani 53003220140

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

A book review

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Iphone or Android which is the best smartphone?

Blog banner

How To Secure Operating Systems ?

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Remote Work in 2026

Blog banner

What is metaverse?

Blog banner

Deadlock

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Child labour

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

URL vs Domain

Blog banner

ProofHub

Blog banner

Types of Threads

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

How to Build an Effective Digital Campaign

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Study of Sniffing Tools

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

PYTHON

Blog banner

Save Girl Child

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner