Managing security issues of electronic voting to protect the resiliency of the electoral process

2018 ◽  
Vol 10 (6) ◽  
pp. 405
Author(s):  
Avery M. Blank, JD

The purpose of this article is to heighten the awareness among homeland security and emergency management professionals to the significant role they can play in protecting electronic voting from the very real potential of cyberattacks. It is important for these professionals to understand electronic voting and its advantages and disadvantages at this point in time because the number of cybersecurity attacks is increasing, electronic voting usage is increasing, and the media have overlooked this aspect of the voting system. Homeland security professionals and, in particular, emergency management professionals need to be involved because electronic voting is intimately connected with the nation’s critical infrastructure, voting is a local activity, and the principles of emergency management professionals suggest that they have the relevant skills to help solve the security issues related to electronic voting.

2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


Author(s):  
Ю. А. Данько ◽  
Н. Г. Білоцерківська Білоцерківська

The article considers the advantages and disadvantages of implementing and applying the electronic voting system in different countries of the world and the prospects for the introduction of electronic voting in Ukraine. It is noted that e-democracy is a direct tool of democratization and development of the society in the information direction. One of the mechanisms of e-democracy is e-voting. Electronic voting is considered as a procedure for the implementation of the expression of will with the use of electronic means and as an automated process of counting votes, which simplifies the voting procedure and contributes to raising the level of electoral activity. It has been determined that e-voting, although it is one of the most complex forms of e-democracy, can still increase the interest of citizens, namely, the young people in the political life of the country, reduce the cost of the election process, enable citizens with disabilities to carry out a process of expression of will, improve the reliability of the procedure for counting election results. The author also examines the forms of e-voting that are used in world practice, namely: voting through the Internet, voting in the booth using "electronic ballot boxes" and e-voting with the help of a mobile phone. The experience of using e-voting system in different countries of the world, such as USA, Brazil, Estonia, Austria, Finland, Switzerland, France, Great Britain, the Netherlands, Germany, Norway, etc., is analyzed. Identified problems faced by countries in elections when using the e-voting system. The author also considers the measures that Ukraine is developing to implement the e-voting system. In particular, it was noted that the first attempts to establish on the legislative level the introduction of electronic voting in Ukraine were recorded as early as 2011. At present, the use of electronic voting in Ukraine is only in the stage of active discussion. Based on the experience of other countries, it has been determined that electronic voting should be used in parallel with the traditional expression of will.


Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


2010 ◽  
Vol 2 (1) ◽  
pp. 1-12 ◽  
Author(s):  
Roberto Caldelli ◽  
Rudy Becarelli ◽  
Francesco Filippini ◽  
Francesco Picchioni ◽  
Riccardo Giorgetti

In this paper a Digital Terrestrial Television (DTT) based voting system is presented. This electronic voting technology allows disabled users to cast their vote from home by using common well-known devices. The needed equipment are a TV set, a Set Top Box (STB) with its remote control and a telephone line. The complete infrastructure consists of an MHP (Multimedia Home Platform) application that acts as a client application, a server application that acts as a network/counting server for e-voting, and a security protocol based on asymmetric key encryption to ensure authentication and secrecy of the vote. The MHP application is broadcasted by a certified (e.g., national) TV channel that grants its originality. The user needs a smart card issued by a national authority and to sign the encrypted ballot. The voter can browse the application by acting on the STB remote control. The server application is in charge to verify user identity, to gather and store user’s encrypted ballots and finally to count votes. The communication between the client application and the server takes place by means of a secured channel (using HTTPS) while the voting operations are secured with the help of asymmetric keys encryption.


Author(s):  
Demid Migal ◽  
Kateryna Isirova

The work examines the phenomenon of electronic voting and advantages and disadvantages of such systems. Particular attention is paid to the electronic voting systems that use block chain technologies in their scheme. The purpose of the publication is to create a theoretical model of the electronic voting system, which will include all stages of the elections. In this work, a study and analysis of the existing electronic voting systems were carried out, the requirements for the creation of electronic voting systems were substantiated. Possible attacks on both conventional electronic voting systems and options using the block chain were given. The advantages of the work include theoretical and practical models, comparison and study of possible attacks on various types of electronic voting systems.


2019 ◽  
Vol 4 (22) ◽  
pp. 268-273
Author(s):  
Irina Akimova ◽  
Shapiev Siyabshakh ◽  
Olga Blinova ◽  
Vera Mankovskaya ◽  
Olga Kitnovskaia

We discussed the increasing interest in the use of technical means for voting in elections and referendums with a gradual transition to electronic voting. Our article deals with the peculiarities of the experiment on the organization and conduct of remote electronic voting in the elections of deputies of the Moscow City Duma of the seventh convocation, scheduled for September 8, 2019. In addition, the article analyzes the advantages and disadvantages of electronic voting, offers recommendations on eliminating some risks associated with the use of this type of electronic voting. The received results of the experiment will allow to define directions of the further work on perfection of legal regulation of introduction in selective process of modern digital technologies. In case of positive results, practical and technological solutions can be developed, which will ensure further development of the remote electronic voting system in Russia.


2008 ◽  
Vol 6 (4) ◽  
pp. 17
Author(s):  
Kelly L. Brown, PhD ◽  
Christina Scheungrab, BS

This research examines the use of the Internet to educate the public on emergency management and homeland security issues. Despite the fact that disasters, when they occur, happen at the local level and directly impact the general public, the public is conspicuously absent from emergency management planning and training activities at all levels. This is true despite research which suggests that the public, given accurate and relevant information, can respond well to disasters. Educating the public on possible disasters, response scenarios, and other key emergency management issues is a critical first step to engaging the public in emergency management. The current research investigates the use of one means of educating the public, the Internet, on emergency management and homeland security issues. Content analysis of the 50 largest cities in one Midwestern state was conducted to determine the following: if the Internet is used to educate the public, the types of homeland security and emergency management information available to the public on city web sites, and how difficult the existing information is to access. Results show that few cities are using the Internet as a means of educating the public on emergency management issues. Future research should investigate other means by which the general public should be educated and engaged in emergency management and how the public is using the emergency management information available to them.


2017 ◽  
Vol 5 (6) ◽  
pp. 9
Author(s):  
Richard White

As the Department of Homeland Security begins its 2018 Quadrennial Homeland Security Review, it will certainly address the question “what is homeland security?”. This article is meant to provide a concise overview. It begins with a definition and relates it back to the origins of homeland security. It then takes that same definition and projects it onto the DHS mission sets. It then takes a closer look at DHS missions in border and transportation security, counterterrorism, emergency management, countering weapons of mass destruction, critical infrastructure protection, and cybersecurity. It concludes with a unique argument that homeland security may be only a transient concern, and that technological change may offer a brighter future.


2007 ◽  
Vol 5 (5) ◽  
pp. 33 ◽  
Author(s):  
Thomas E. Drabek, PhD

During the past three decades, emergency management has become more professionalized. An important part of this transformation has been the explosive growth in higher education of programs designed to provide the fundamental knowledge and skills required of emergency managers. Following the September 11, 2001, attacks, however, curricula reflecting homeland security issues and competencies also have been established. Some have proposed that these program areas should be better integrated. Following a brief summary of the historical context in which these developments occurred, key points of culture clash are identified. It is concluded that future faculty and administrative initiatives will be constrained by these cultural differences and deflected by future governmental policies, disaster events, and other external factors.


Sign in / Sign up

Export Citation Format

Share Document