wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Governance

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
128 Reads

Electronic governance or e-governance is the application of information technology for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems between government to citizen (G2C), government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as well as back-office processes and interactions within the entire governance framework. Through e-governance, government services are made available to citizens through IT. The three main target groups that can be distinguished in governance concepts are government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries, finance and support.

Objective

Edit: The objective of G2B is to reduce difficulties for business, provide immediate information and enable digital communication by e-business (XML). In addition, the government should re-use the data in the report proper, and take advantage of commercial electronic transaction protocol.

Disadvantages

The government site does not consider about "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes."

Difference between G2B and B2G

Government to business (G2B) – Refers to the conducting of transactions between government bodies and business via the internet.

Business to the government (B2G) – Professional affairs conducted between companies and regional, municipal, or federal governing bodies. B2G typically encompasses the determination and evaluation of proposal and completion of the contract.


Comments ()


Sign in

Read Next

IT Service Continuity Management

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Go Daddy

Blog banner

EFT

Blog banner

TAILS OS

Blog banner

Risk factors in service transistion

Blog banner

The Peephole

Blog banner

I/O Management and Disk Scheduling

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Direct Memory Access

Blog banner

PYTHON

Blog banner

Emerging threats in cyber Forensics

Blog banner

Yahoo! mail

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Types of Threads

Blog banner

Paginng In OS

Blog banner

EdTech (Education Technology)

Blog banner

Memory Partitioning

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Raid

Blog banner

Deadlock in Operating System

Blog banner

Visualization in Data Science

Blog banner

MySQL

Blog banner

Spotify

Blog banner

CyberSecurity Color Wheel

Blog banner

IP ADDRESS

Blog banner

Data carving - using hex editor

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Importance of internet

Blog banner

Security Breaches in Stock market trading

Blog banner

Multithreading in Operating System

Blog banner

american greatines

Blog banner

Every body is beautiful

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

De-Coding Love

Blog banner

undefined

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Data Science & AI

Blog banner

Operating system

Blog banner

MODERN OPERATING SYSTEM

Blog banner