 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
v |
Phase IIIa:
Taylored responses (Not Secure)
|
|
|
|
Ø |
Create
web-pages “on the fly”
|
|
|
|
Ø |
Database
queries, but requires database.
|
|
|
|
Ø |
GIS maps.
|
|
|
v |
Phase IIIb:
Secure Credit Card Ordering
|
|
|
|
Ø |
Probably
outsourced or state provided function.
|
|
|
|
Ø |
Database
queries.
|
|
|
v |
Phase IVa:
electronic data interchange (Secure!)
|
|
|
|
Ø |
100%
automated application-to-application exchange of
|
|
business
information with known partners
|
|
|
v |
Phase IVb:
Taylored responses (Secure!)
|
|
|
|
Ø |
Known business
partners
|
|
|
v |
Phase V:
Taylored responses (Secure!)
|
|
|
|
Ø |
Unknown
business partners & citizens
|
|