E-voting systems vulnerabilities

Abdalla Al-Ameen, Samani A. Talab

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In the digital age, democratic systems increasingly resort to technology to support, compliment and even transform political processes. The growing use of various electronic means in elections reflects the general tendency of increased digitalization, greater outreach, and enhanced mobility in our societies. However, the challenges are considerable. If not carefully planned and designed, E-voting can undermine the confidence in the whole electoral process. The main task of this paper is to introduce the idea of electronic voting systems. This paper outlines the different ways in which voters can vote. We summarize the different phases and the main actors of E-voting systems. We discuss the importance of security in E-Voting systems. We identify the reasons for the growing interest in E-voting in some countries. This paper observes the requirements and the concepts of E-voting systems. The focus of this paper leans on the vulnerabilities that may affect E-voting systems. We end with our opinion about technical feasibility of electronic voting systems.

Original languageEnglish
Title of host publicationProceedings - ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology
Pages67-73
Number of pages7
StatePublished - 2012
Externally publishedYes
Event8th International Conference on Information Science and Digital Content Technology, ICIDT 2012 - Jeju, Korea, Republic of
Duration: 26 Jun 201228 Jun 2012

Publication series

NameProceedings - ICIDT 2012, 8th International Conference on Information Science and Digital Content Technology
Volume1

Conference

Conference8th International Conference on Information Science and Digital Content Technology, ICIDT 2012
Country/TerritoryKorea, Republic of
CityJeju
Period26/06/1228/06/12

Keywords

  • attack
  • E-voting system
  • security

Fingerprint

Dive into the research topics of 'E-voting systems vulnerabilities'. Together they form a unique fingerprint.

Cite this