wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

Principles of Concurrency

Blog banner

Zomato (Income Sources)

Blog banner

Understanding the 'Ambiverts'

Blog banner

Big Data

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

City of Mumbai (Bombay):

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

Memory management

Blog banner

What is service level Agreement?

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

E-learning

Blog banner

Online Education

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

What is Internet

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

Top 10 Logos and their meanings

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Study of Sniffing Tools

Blog banner

Internet of Things

Blog banner

ADIDAS

Blog banner

Virtual Memory

Blog banner

Traveling

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Data Mapping

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Service Strategy In ITSM

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Virtual memory

Blog banner

Interrupts in operating system.

Blog banner

NETWORK SECURITY RISKS

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Deadlock

Blog banner

MEMORY HIERARCHY

Blog banner

Business-to-Business

Blog banner

Malware

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

MYNTRA

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Ubiquitous Computing

Blog banner

The seven-step improvement process

Blog banner