This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Building and Maintaining Trust in Internet Voting
May 2012 (vol. 45 no. 5)
pp. 74-80
Lars Hopland Nestås, Bouvet ASA, Norway
Kjell J. Hole, University of Bergen, Norway
Voting codes, risk analysis, and election forensics can help the public build and maintain trust in an Internet voting system by assuring that it meets important security and privacy requirements.

1. J. Elklit and P. Svensson, “What Makes Elections Free and Fair?,” J. Democracy, vol. 8, no. 3, 1997, pp. 32-46.
2. A.D. Rubin, Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Morgan Road Books, 2006.
3. S. Marsh and M.R. Dibben, “The Role of Trust in Information Science and Technology,” Ann. Rev. Information Science and Technology, vol. 37, no. 1, 2003, pp. 465-498.
4. S. Marsh and M.R. Dibben, “Trust, Untrust, Distrust and Mistrust—An Exploration of the Dark(er) Side,” LNCS 3477, Springer, 2005, pp. 17-33.
5. L. Loeber, “E-Voting in the Netherlands; from General Acceptance to General Doubt in Two Years,” LNI 131, 2008, pp. 21-30.
6. K. Vollan, “Observing Electronic Voting,” report 15, Norwegian Centre for Human Rights (NORDEM), 2005.
7. J. Nou, “Privatizing Democracy: Promoting Election Integrity through Procurement Contracts,” Yale Law J., 2009, pp. 744-793.
8. R. Oppliger, “Addressing the Secure Platform Problem for Remote Internet Voting in Geneva,” 2002; www.geneve.ch/evoting/english/doc/rapports rapport_oppliger_en.pdf.
9. M. Bishop et al., “E-Voting and Forensics: Prying Open the Black Box,” Proc. 2009 Usenix/Accurate Electronic Voting Technology Workshop (EVT 09), 2009; http://www.cs.ucdavis.edu/~peisert/research 2009-EVT-Forensics-BPHGJ.pdf.
1. M. Volkamer, Evaluation of Electronic Voting, Springer, 2009.
2. R. Celeste, D. Thornburgh, and H. Lin, Asking the Right Questions about Electronic Voting, National Academies Press, 2006.

Index Terms:
electronic voting, security and privacy, user trust, design forensics
Citation:
Lars Hopland Nestås, Kjell J. Hole, "Building and Maintaining Trust in Internet Voting," Computer, vol. 45, no. 5, pp. 74-80, May 2012, doi:10.1109/MC.2012.35
Usage of this product signifies your acceptance of the Terms of Use.