Font Size: a A A

The Network Of The Government Participation And Government Function's Transformation

Posted on:2010-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:W S TanFull Text:PDF
GTID:2166360278970947Subject:Basic principles of Marxism
Abstract/Summary:PDF Full Text Request
With the development of globalization and information technology, it shortens the distance between the government and people, furthermore, by which more and more people can participate in political discussions through the network. The network tender of Government operation has become the important way to improve their function of government among the various countries and regions competing. Although the total number of Internet users in China has reached 221 million people, and 78 million are of online computers, ranking first in the world, but China's network-building and democratic development of the national government functions, have great gap while comparing with developed countries. The developed countries' achievement by using network construction for the Government's function improvement has given us many pressures and challenges. Accordingly, how the Chinese Government can catch up, and make good use of advantage of the network for political participation, with well understanding and solving the outstanding problems of the current economic and social development and combing the current status of economic development at home and abroad, grasp the inevitability of the transformation of government functions, explore how to get the more efficient pattern to improve the political participation through the network for the of government transformation functions, as well as address the question of how to avoid the negative impact of political participation of the government transformation by network, create a healthy, fast, good and harmonious environment for the network, which will be an important aspect of our government functions and the building.
Keywords/Search Tags:Network of political participation, Government function, Democratic process, Network Security
PDF Full Text Request
Related items