scholarly journals Threats to Electronic Voting Systems in Canada

2019 ◽  
Vol 1 (3) ◽  
pp. 6
Author(s):  
CASIS Vancouver

Electoral voting systems have been the subject of several cybersecurity reviews, and speculation about them being vulnerable. In 2017, Communications Security Establishment noted that electronic voting tabulation may be vulnerable to third party cyberattacks (CSE, 2017). In March 2018, a report from Brazil demonstrated it was possible to attack the voting machine (Aranha et. al., 2018). Moreover, a 2018 report by Elections BC includes reference to the requirement that voting machines must maintain an internet connection, thus creating a vulnerability for a potential cyber-attack (Archer, 2018).

2011 ◽  
pp. 1234-1239 ◽  
Author(s):  
Paulo Roberto Santhias ◽  
Regis Cabral

Electronic voting, as well as Internet voting, is in the process of being incorporated into most democracies in the world. The literature on the topic is abundant as well as the technologies offered. Most of the work, nevertheless, seems to bypass the actual origins of the modern (and current) electronic voting systems (Oudenhove et al., 2001).


2013 ◽  
Vol 5 (1) ◽  
pp. 15-21 ◽  
Author(s):  
M. Mesbahuddin Sarker ◽  
M Nazrul Islam

Abstract In this modern age countries worldwide evince a growing interest in electronic voting (e-Voting), which brings the idea of modernizing elections through electronic systems and provides many advantages such as efficiency, disseminating results more quickly, and in a cost-effective way. The paper gives a brief overview on recent developments of electronic voting systems in Bangladesh by using electronic voting machine (EVM) and addresses some strategies and principles in order to improve accessibility, easiness, accuracy, and security of election for better democratic process.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 338
Author(s):  
Arif Uzzaman ◽  
. .

The ability of the healthcare industry to keep abreast with the evolving trends in endpoint information security depends on combinations of measures. In the current literature, some of these measures include the development of analytics capable of spotting intruders on time, embracing quick reactions to potential or detected intrusions, and the decision to employ robust system defenses. In this paper, the main aim was to review the current literature regarding the subject of endpoint information security, with critical insights gained from the case of the healthcare industry. Findings suggest that the healthcare industry forms one of the most attractive arenas for security attackers. Some of the healthcare organizations that have been victims of recent security attacks include the Californian Hollywood Presbyterian Medical Center that experienced a data breach in February 2016 and MedStar Health Inc. (in the same month). In the following month, San Diego’s Alvaro Hospital Medical Center was also targeted for cyber attack. Hence, some algorithms have been proposed to counter these attacks; including the use of SOA-based EHRs, the implementation of the RBAC model, the use of k-anonymity, k-unlinkability, and the SQL searching mechanisms that target the patients’ encrypted data. Also, some strategies have been proposed as best practices in endpoint information security. These strategies include the management of identity lifecycles, the establishment of risk-aware cultures, the management of third-party security compliance, and securing healthcare firms’ devices in terms of design. Overall, it is evident that the complexity of endpoint information security in the healthcare industry (due to the evolution of applications such as virtualization and cloud computing) implies that the ability to survive from future security attacks will depend on the firms’ ability to keep abreast with industry demands. 


2021 ◽  
Vol Volume 33 - 2020 - Special... ◽  
Author(s):  
Léonie Tamo Mamtio ◽  
Gilbert Tindo

Electronic voting systems have become a powerful technology for the improvement of democracy by reducing the cost of elections, increasing voter turnout and even allowing voters to directly check the entire electoral process. End-to-end (E2E) verifiability has been widely identified as a critical property for the adoption of such voting systems for electoral procedures. Moreover, one of the pillars of any vote, apart from the secret of the vote and the integrity of the result, lies in the transparency of the process, the possibility for the voters "to understand the underlying system" without resorting to the competences techniques. The end-to-end verifiable electronic voting systems proposed in the literature do not always guarantee it because they require additional configuration hypotheses, for example the existence of a trusted third party as a random source or the existence of a random beacon. Hence, building a reliable verifiable end-to-end voting system offering confidentiality and integrity remains an open research problem. In this work, we are presenting a new verifiable end-to-end electronic voting system requiring only the existence of a coherent voting board, fault-tolerant, which stores all election-related information and allows any party as well as voters to read and verify the entire election process. The property of our system is information guaranteed given the existence of the bulletin board, the involvement of the voters and the political parties in the process. This involvement does not compromise the confidentiality nor integrity of the elections and does not require cryptographic operations on the voters account. Les systèmes de vote électronique sont devenus une technologie puissante pour amé-liorer la démocratie en réduisant le coût des élections, en augmentant la participation des électeurs et en permettant même aux électeurs de vérifier directement l'ensemble de la procédure électorale. Cependant, la vérification de bout en bout (E2E) a été largement identifiée comme une propriété critique pour l'adoption de tels systèmes de vote en réel pour des procédures électorales. Par ailleurs, l'un des piliers de tout scrutin, outre le secret du vote et l'intégrité du résultat, réside dans la trans-parence du processus, la possibilité pour les électeurs "de comprendre le système sous-jacent" sans avoir recours aux compétences techniques. Les systèmes de vote électronique vérifiables de bout en bout proposés dans la littérature ne le garantissent pas toujours car ils nécessitent des hypothèses de configuration supplémentaires par exemple l'existence d'un tiers de confiance comme source de hasard, l'existence d'une balise aléatoire. Ainsi, construire un système de vote vérifiable de bout en bout fiable offrant la confidentialité et l'intégrité reste un problème de recherche ouvert. Dans ce tra-vail, nous présentons un nouveau système de vote électronique vérifiable de bout en bout nécessitant uniquement l'existence d'un babillard de vote cohérent, tolérant aux pannes, qui stocke toutes les in-formations relatives aux élections et permet à tout parti ainsi qu'aux électeurs de lire et vérifier le processus d'élection complet. La propriété de vérification de bout en bout de notre système est une information garantie compte tenu de l'existence du babillard, de l'implication des électeurs et des par-tis politique dans le processus. Cette implication ne compromet ni la confidentialité ni l'intégrité des élections et ne nécessite pas d'opérations cryptographiques pour le compte de l'électeur.


Author(s):  
Shakya Chakrabarti ◽  
Neelanjan Acharya

Purpose of the study: The paper proposes a secure system of voting using UIDAI Data and implementing IoT to save a copy of the voting statistics via VMAC encryption. Methodology: The paper proposes a secure system which will utilize the Aadhar database along with the Electronic Voting Machine units, to authenticate voters by bio-metric means which will be synchronized by Internet of Things. After successful casting of vote, two sets of voting statistics will be stored in the local polling station as well as a centralized register respectively; through a cascade of servers. These will be secured from virtual third-party vulnerability by VMAC encryption. Finally, an impenetrable system of voting can be established by the above method. Applications of this study: If the proposed system of voting is practically implemented, then a proper consensus can be obtained by avoiding poll-day violence. Furthermore, if UIDAI data is used then the voter’s authenticity is also verified. Novelty/Originality of this study: The use of biometric data, as well as storage of a second set of data using VMAC encryption to a secondary storage site.


Author(s):  
P. R. Santhias ◽  
R. Cabral

Electronic voting, as well as Internet voting, is in the process of being incorporated into most democracies in the world. The literature on the topic is abundant as well as the technologies offered. Most of the work, nevertheless, seems to bypass the actual origins of the modern (and current) electronic voting systems (Oudenhove et al., 2001).


2020 ◽  
Vol 7 (1) ◽  
pp. 29-40
Author(s):  
Nur Syafiqah Hussin ◽  
Naqiah Awang ◽  
Farah Husna Mohd Fatzel

Covid-19 is an unprecedented crisis that has affected almost all industry players including education. It has transformed our way of life and introduced a new normal to how things are done. As an effort to contain the outbreak of pandemic Covid-19, universities have shifted to online learning. In line with this, Universiti Teknologi MARA (UiTM) has decided to execute open and distance learning (ODL) for the current semester until 31 December 2020. ODL introduces a different learning environment as compared to the traditional classroom that requires students to be self-reliant in learning new things. Hence, the purpose of the study is to explore students’ experiences in the process of knowledge transfer through ODL specifically for accounting subjects. A questionnaire was distributed to students who were taking the subject of Introduction to Financial Accounting and Introduction to Cost Accounting in UiTM Pahang Kampus Raub and a total of 206 responses were received. The study found over half of the students enjoy learning through ODL but only one-third were looking forward to having ODL for the next semester. Poor internet connection is the main reason found in the study that makes ODL not preferred by the students. At the same time, few features were highlighted by the students about ODL such as the advantage of pre-recorded video to catch up the new material and flexibility for them to learn at their own pace.


2018 ◽  
Vol 9 (3) ◽  
pp. 30 ◽  
Author(s):  
Nnaeto Japhet Olusadum ◽  
Ndoh Juliet Anulika

The study is basically to examine electronic-voting in Nigeria elections as an improvement on the traditional paper voting with a focus on Owerri Senatorial Zone, Imo State. Worried by the frequent and debilitating incidences of electoral fraud and disenfranchisement of voters for unsubstantiated reasons, the study tended to sample opinion of respondents in Owerri on the subject as a way of strengthening democracy. Martin Hagen theory of e-democracy was adopted as theoretical framework. Hagen construes e-democracy as a strategic tool to strengthen democratic practices using the information and computer technology (ICT). The study is a survey attempt which made use of structured questionnaire to elicit information from respondents. Simple per centage was used for data analysis. It is our finding among others that e-voting will reduce incidences of election fraud especially in the areas of voting and counting of votes, and also the physically challenged qualified voters and citizens living and working abroad will have opportunity to cast their votes. The study concludes that Nigeria must cash in on flourishing (ICT) to fight endemic electoral irregularities in Nigeria through firm belief in and avowed adoption of e-voting. The study recommended among others institutionalization of legal frameworks and structures that will formidably support the practice of e-voting in Owerri senatorial zone in particular and Nigeria in general.


2013 ◽  
Vol 20 (3) ◽  
pp. 194-206
Author(s):  
Juan Gilbert ◽  
Jerone Dunbar ◽  
Alvitta Ottley ◽  
John Mark Smotherman

Sign in / Sign up

Export Citation Format

Share Document