Trust in e-Voting Systems: A Case Study
- 1 Citations
- 784 Downloads
Abstract
The act of voting is one of the most representative of Democracy, being widely recognized as a fundamental right of citizens. The method of voting has been the subject of many studies and improvements over time. The introduction of electronic voting or e-voting demands the fulfillment of several requirements in order to maintain the security levels of the paper ballot method and the degree of trust people place in the voting process. The ability to meet those requirements has been called into question by several authors. This exploratory research aims to identify what factors influence voters’ confidence in e-voting systems. A case study was conducted in an organization where such a system has been used in several elections. A total of 51 e-voters were interviewed. The factors that were found are presented and discussed, and proposals for future work are suggested.
Keywords
e-voting trust electronic voting systems e-voting requirementsPreview
Unable to display preview. Download preview PDF.
References
- 1.Dill, D.L., Schneier, B., Simons, B.: Voting and Technology: Who Gets to Count Your Vote? Communications of the ACM 46(8), 29–31 (2003)CrossRefGoogle Scholar
- 2.Granneman, S.: Electronic Voting Debacle. Security (2003), http://www.securityfocus.com/columnists/198
- 3.Mercuri, R.: Electronic Vote Tabulation: Checks & Balances. PhD Thesis, University of Pennsylvania, USA (2001)Google Scholar
- 4.Schneier, B.: Getting Out the Vote: Why is it so hard to run an honest election? San Francisco Chronicle, October 31 (2004) Google Scholar
- 5.Schneier, B.: What’s wrong with electronic voting machines? OpenDemocracy (2004), http://www.opendemocracy.net/media-voting/article_2213.jsp
- 6.Schneier, B.: Did Your Vote Get Counted? (2006), http://www.schneier.com/essay-133.html
- 7.Antoniou, A., Korakas, C., Manolopoulos, C., Panagiotaki, A., Sofotassios, D., Spirakis, P., Stamatiou, Y.C.: A Trust-Centered Approach for Building E-Voting Systems. In: Wimmer, M.A., Scholl, J., Grönlund, Å. (eds.) EGOV. LNCS, vol. 4656, pp. 366–377. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 8.Grove, J.: ACM Statement on Voting Systems. Communications of the ACM 7(10), 69–70 (2004)MathSciNetCrossRefGoogle Scholar
- 9.Randell, B., Ryan, P.Y.A.: Voting Technologies and Trust. IEEE Security and Privacy 4(5), 50–56 (2006)CrossRefGoogle Scholar
- 10.Jones, B.: A Report on the Feasibility of Internet Voting, California Internet Voting Task Force, Sacramento, USA (2000)Google Scholar
- 11.McDaniel, P., Aviv, A., Balzarotti, D., Banks, G., Blaze, M., Butler, K.: EVEREST – Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007), http://www.patrickmcdaniel.org/pubs/everest.pdf
- 12.Jones, D.W.: Voting and Elections, The University of Iowa, USA (2001), http://www.divms.uiowa.edu/~jones/voting/
- 13.ACE: Opportunities, risks and challenges of e-voting. ACE Project, The Electoral Knowledge Network (2001), http://aceproject.org/
- 14.Antunes, P. (ed.): Voto Electrónico – Discussão técnica dos seus problemas e oportunidades, Edições Sílabo, Lisboa (2008)Google Scholar
- 15.CE: Legal, Operational and Technical Standards for e-Voting. Recommendation Rec. (2004) of the Council of Europe. Council of Europe Publishing (2005) Google Scholar
- 16.Crane, R.E., Keller, A.M., Dechert, A., Cherlin, E., Mertz, D.: A Deeper Look: Rebutting Shamos on e-Voting (2005), http://www.acm.org/crossroads/xrds2-4/voting.html
- 17.Cranor, L.F., Cytron, R.K.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Proceedings of the Hawai International Conference on System Sciences, Wailea (1997)Google Scholar
- 18.Frith, D.: E-voting security: hope or hype? Network Security 11, 14–16 (2007)CrossRefGoogle Scholar
- 19.Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Computers & Security 21(6), 539–556 (2002)CrossRefGoogle Scholar
- 20.Hall, J.L.: Policy Mechanisms for Increasing Transparency in Electronic Voting. PhD Dissertation. University of California at Berkeley, USA (2008)Google Scholar
- 21.Mercuri, R.: Questions for Voting System Vendors (2000), http://www.notablesoftware.com/checklists.html
- 22.Monteiro, A., Soares, N., Oliveira, R.M., Antunes, P.: Sistemas Electrónicos de Votação. Technical Report, Universidade de Lisboa, Portugal (2001)Google Scholar
- 23.Neumann, P.G.: Security Criteria for Electronic Voting. In: Proceedings of the 16th National Computer Security Conference, Baltimore (1993)Google Scholar
- 24.Shamos, I.: Electronic Voting – Evaluating the Threat. In: Proceedings of the Third Conference on Computers, Freedom and Privacy, Burlingame, pp. 3.18–3.25 (1993)Google Scholar
- 25.Strauss, C., Mertz, D., Dopp, K.: Electronic Voting System Best Practices (2005), http://electionmathematics.org/em-voting-systems/Best_Practices_US.pdf
- 26.Neumann, G.: Special Issue: The problems and potentials of voting systems. Communications of the ACM 47(10) (2004)Google Scholar
- 27.OpenRightsGroup: May 2007 Election Report – Findings of the Open Rights Group Election Observation Mission in Scotland an England (2007), http://www.openrightsgroup.org/wp-content/uploads/org_election_report.pdf
- 28.Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review 20(3), 709–734 (1995)Google Scholar
- 29.Schlienger, T., Teufel, S.: Information Security Culture: The socio-cultural dimension in information security management. In: Ghonaimy, A., El-Hadidi, M.T., Aslan, H.K. (eds.) Proceedings of the IFIP TC11 International Conference on Information Security, pp. 191–202. Kluwer (2002)Google Scholar
- 30.Brei, V.A., Rossi, C.A.V.: Confiança, valor percebido e lealdade em trocas relacionais de serviço: um estudo com usuários de Internet Banking no Brasil. Revista de Administração Contemporânea 9, 145–168 (2005)CrossRefGoogle Scholar
- 31.Mercuri, R.: A better ballot box? IEEE Spectrum 39(10), 46–50 (2002)CrossRefGoogle Scholar