The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - May (2012 vol.45)
pp: 74-80
Lars Hopland Nestås , Bouvet ASA, Norway
ABSTRACT
Voting codes, risk analysis, and election forensics can help the public build and maintain trust in an Internet voting system by assuring that it meets important security and privacy requirements.
INDEX TERMS
electronic voting, security and privacy, user trust, design forensics
CITATION
Lars Hopland Nestås, "Building and Maintaining Trust in Internet Voting", Computer, vol.45, no. 5, pp. 74-80, May 2012, doi:10.1109/MC.2012.35
REFERENCES
1. J. Elklit and P. Svensson, “What Makes Elections Free and Fair?,” J. Democracy, vol. 8, no. 3, 1997, pp. 32-46.
2. A.D. Rubin, Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Morgan Road Books, 2006.
3. S. Marsh and M.R. Dibben, “The Role of Trust in Information Science and Technology,” Ann. Rev. Information Science and Technology, vol. 37, no. 1, 2003, pp. 465-498.
4. S. Marsh and M.R. Dibben, “Trust, Untrust, Distrust and Mistrust—An Exploration of the Dark(er) Side,” LNCS 3477, Springer, 2005, pp. 17-33.
5. L. Loeber, “E-Voting in the Netherlands; from General Acceptance to General Doubt in Two Years,” LNI 131, 2008, pp. 21-30.
6. K. Vollan, “Observing Electronic Voting,” report 15, Norwegian Centre for Human Rights (NORDEM), 2005.
7. J. Nou, “Privatizing Democracy: Promoting Election Integrity through Procurement Contracts,” Yale Law J., 2009, pp. 744-793.
8. R. Oppliger, “Addressing the Secure Platform Problem for Remote Internet Voting in Geneva,” 2002; www.geneve.ch/evoting/english/doc/rapports rapport_oppliger_en.pdf.
9. M. Bishop et al., “E-Voting and Forensics: Prying Open the Black Box,” Proc. 2009 Usenix/Accurate Electronic Voting Technology Workshop (EVT 09), 2009; http://www.cs.ucdavis.edu/~peisert/research 2009-EVT-Forensics-BPHGJ.pdf.
40 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool