Advertisement

Trust in e-Voting Systems: A Case Study

  • João Palas Nogueira
  • Filipe de Sá-Soares
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 129)

Abstract

The act of voting is one of the most representative of Democracy, being widely recognized as a fundamental right of citizens. The method of voting has been the subject of many studies and improvements over time. The introduction of electronic voting or e-voting demands the fulfillment of several requirements in order to maintain the security levels of the paper ballot method and the degree of trust people place in the voting process. The ability to meet those requirements has been called into question by several authors. This exploratory research aims to identify what factors influence voters’ confidence in e-voting systems. A case study was conducted in an organization where such a system has been used in several elections. A total of 51 e-voters were interviewed. The factors that were found are presented and discussed, and proposals for future work are suggested.

Keywords

e-voting trust electronic voting systems e-voting requirements 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dill, D.L., Schneier, B., Simons, B.: Voting and Technology: Who Gets to Count Your Vote? Communications of the ACM 46(8), 29–31 (2003)CrossRefGoogle Scholar
  2. 2.
    Granneman, S.: Electronic Voting Debacle. Security (2003), http://www.securityfocus.com/columnists/198
  3. 3.
    Mercuri, R.: Electronic Vote Tabulation: Checks & Balances. PhD Thesis, University of Pennsylvania, USA (2001)Google Scholar
  4. 4.
    Schneier, B.: Getting Out the Vote: Why is it so hard to run an honest election? San Francisco Chronicle, October 31 (2004) Google Scholar
  5. 5.
    Schneier, B.: What’s wrong with electronic voting machines? OpenDemocracy (2004), http://www.opendemocracy.net/media-voting/article_2213.jsp
  6. 6.
    Schneier, B.: Did Your Vote Get Counted? (2006), http://www.schneier.com/essay-133.html
  7. 7.
    Antoniou, A., Korakas, C., Manolopoulos, C., Panagiotaki, A., Sofotassios, D., Spirakis, P., Stamatiou, Y.C.: A Trust-Centered Approach for Building E-Voting Systems. In: Wimmer, M.A., Scholl, J., Grönlund, Å. (eds.) EGOV. LNCS, vol. 4656, pp. 366–377. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Grove, J.: ACM Statement on Voting Systems. Communications of the ACM 7(10), 69–70 (2004)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Randell, B., Ryan, P.Y.A.: Voting Technologies and Trust. IEEE Security and Privacy 4(5), 50–56 (2006)CrossRefGoogle Scholar
  10. 10.
    Jones, B.: A Report on the Feasibility of Internet Voting, California Internet Voting Task Force, Sacramento, USA (2000)Google Scholar
  11. 11.
    McDaniel, P., Aviv, A., Balzarotti, D., Banks, G., Blaze, M., Butler, K.: EVEREST – Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007), http://www.patrickmcdaniel.org/pubs/everest.pdf
  12. 12.
    Jones, D.W.: Voting and Elections, The University of Iowa, USA (2001), http://www.divms.uiowa.edu/~jones/voting/
  13. 13.
    ACE: Opportunities, risks and challenges of e-voting. ACE Project, The Electoral Knowledge Network (2001), http://aceproject.org/
  14. 14.
    Antunes, P. (ed.): Voto Electrónico – Discussão técnica dos seus problemas e oportunidades, Edições Sílabo, Lisboa (2008)Google Scholar
  15. 15.
    CE: Legal, Operational and Technical Standards for e-Voting. Recommendation Rec. (2004) of the Council of Europe. Council of Europe Publishing (2005) Google Scholar
  16. 16.
    Crane, R.E., Keller, A.M., Dechert, A., Cherlin, E., Mertz, D.: A Deeper Look: Rebutting Shamos on e-Voting (2005), http://www.acm.org/crossroads/xrds2-4/voting.html
  17. 17.
    Cranor, L.F., Cytron, R.K.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Proceedings of the Hawai International Conference on System Sciences, Wailea (1997)Google Scholar
  18. 18.
    Frith, D.: E-voting security: hope or hype? Network Security 11, 14–16 (2007)CrossRefGoogle Scholar
  19. 19.
    Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Computers & Security 21(6), 539–556 (2002)CrossRefGoogle Scholar
  20. 20.
    Hall, J.L.: Policy Mechanisms for Increasing Transparency in Electronic Voting. PhD Dissertation. University of California at Berkeley, USA (2008)Google Scholar
  21. 21.
    Mercuri, R.: Questions for Voting System Vendors (2000), http://www.notablesoftware.com/checklists.html
  22. 22.
    Monteiro, A., Soares, N., Oliveira, R.M., Antunes, P.: Sistemas Electrónicos de Votação. Technical Report, Universidade de Lisboa, Portugal (2001)Google Scholar
  23. 23.
    Neumann, P.G.: Security Criteria for Electronic Voting. In: Proceedings of the 16th National Computer Security Conference, Baltimore (1993)Google Scholar
  24. 24.
    Shamos, I.: Electronic Voting – Evaluating the Threat. In: Proceedings of the Third Conference on Computers, Freedom and Privacy, Burlingame, pp. 3.18–3.25 (1993)Google Scholar
  25. 25.
    Strauss, C., Mertz, D., Dopp, K.: Electronic Voting System Best Practices (2005), http://electionmathematics.org/em-voting-systems/Best_Practices_US.pdf
  26. 26.
    Neumann, G.: Special Issue: The problems and potentials of voting systems. Communications of the ACM 47(10) (2004)Google Scholar
  27. 27.
    OpenRightsGroup: May 2007 Election Report – Findings of the Open Rights Group Election Observation Mission in Scotland an England (2007), http://www.openrightsgroup.org/wp-content/uploads/org_election_report.pdf
  28. 28.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review 20(3), 709–734 (1995)Google Scholar
  29. 29.
    Schlienger, T., Teufel, S.: Information Security Culture: The socio-cultural dimension in information security management. In: Ghonaimy, A., El-Hadidi, M.T., Aslan, H.K. (eds.) Proceedings of the IFIP TC11 International Conference on Information Security, pp. 191–202. Kluwer (2002)Google Scholar
  30. 30.
    Brei, V.A., Rossi, C.A.V.: Confiança, valor percebido e lealdade em trocas relacionais de serviço: um estudo com usuários de Internet Banking no Brasil. Revista de Administração Contemporânea 9, 145–168 (2005)CrossRefGoogle Scholar
  31. 31.
    Mercuri, R.: A better ballot box? IEEE Spectrum 39(10), 46–50 (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • João Palas Nogueira
    • 1
  • Filipe de Sá-Soares
    • 1
  1. 1.Centro AlgoritmiUniversidade do MinhoGuimarãesPortugal

Personalised recommendations