wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

Cloud Security: Trends and Innovations

Blog banner

TEAMWORK

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Beauty of indian railway

Blog banner

38_Exploring The Honeynet Project

Blog banner

File Sharing

Blog banner

Deadlock

Blog banner

Data Visualization

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

RAID and It's Levels

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

BrainGate Technology

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Basic Security For SOAP Services

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Linux VServer Architecture

Blog banner

Process in OS

Blog banner

Introduction my self

Blog banner

Uniprocessor Scheduling

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Asana

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Disk cache

Blog banner

Busted : Common Web Security Myths

Blog banner

What are Virtual Machines

Blog banner

Ambiguous

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Getting into Anime

Blog banner

MPL and how its effects?

Blog banner

Virtual Memory

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Google

Blog banner

Memory Management of Operating System(OS)

Blog banner

Virtual Memory

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

The most common internet security threats

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner