wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Bharat Maps

Blog banner

Self managing devices

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Embedded Operating System

Blog banner

File system

Blog banner

SQL Injection

Blog banner

Teenagers of Today

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

A Short History of GIS

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Major achievement

Blog banner

PYTHON

Blog banner

Old age lifestyle

Blog banner

Ethical Hacking

Blog banner

APACHE KAFKA

Blog banner

MAILFENCE

Blog banner

RAID

Blog banner

Data carving - using hex editor

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Indian Culture and Tradition

Blog banner

Direct Memory Access

Blog banner

Routers

Blog banner

IOT Hacking Techniques

Blog banner

Caching windows

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Note Taker App

Blog banner

RAID

Blog banner

Buffer overflow

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Modern Operating system

Blog banner

Explain Multiprocessors

Blog banner

GIS

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

virtual machine

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

COMMUNICATION

Blog banner

Security issues

Blog banner

STARVATION

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

HUBSPOT

Blog banner