NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies (GTIP '10)
  2. Internet voting: structural governance principles for election cyber security in democratic nations
Loading...

Please wait, while we are loading the content...

Insider threats to voting systems
A biomedical research permissions ontology: cognitive and knowledge representation considerations
Building a chain of trust: using policy and practice to enhance trustworthy clinical data discovery and sharing
Developing foundations for accountability systems: informational norms and context-sensitive judgments
ENDORSE: a legal technical framework for privacy preserving data management
Information security governance: integrating security into the organizational culture
Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region
Managing the last eights: three ways forward for IPv6
Internet voting: structural governance principles for election cyber security in democratic nations
Optimizing resources in cloud, a SOA governance view

Similar Documents

...
Vulnerabilities, equities, and progress

Article

...
India needs to review its 2013 cyber security policy

Article

...
Interrogating the future of digital democracies

Article

...
US Voting Systems Security Working Paper : “ Revisioning the U . S . Elections Process : Voting Security and Election Integrity

Article

...
High Integrity Elections

Article

...
Using AI and blockchain tech for transparency in urban governance

Article

...
Are All Types of Internet Voting Unsafe?

Article

...
Insider threats to voting systems

Article

...
Cybersecurity challenges for Bhutan

Article

Internet voting: structural governance principles for election cyber security in democratic nations

Content Provider ACM Digital Library
Author Hoke, Candice
Abstract In Europe, the U.S., and Asia, political and market forces seek expanded use of the Internet for voting and election administrative functions. Governmental responses have differed, but commonly governments omit qualified computer security experts from exercising decisive weight in policy decisions. Given its current architecture and engineering, however, the Internet generally provides neither high assurance data security and integrity, nor reliable information transmission protected from denial of service and other attacks. Nevertheless, pressures to expand Internet-based election functions have intensified. This paper explores the foundational questions and features of a governance system that has the capacity to safeguard democratic elections where Internet-facing technologies will be deployed. The paper recommends that each nation include a policy board with appropriate computer and network security expertise, election administrative knowledge, and public accountability and transparency structures that mandate end-to-end auditability. It further recommends that the national regulatory apparatus not rely predominantly on issuance of rules and technical standards to be met, or particular product design. Owing to dynamic cyber threat environments, the board---whose majority should consist of computer and network security professionals---should issue particularized decisions. They should assess whether an election office proposal for using Internet transmissions for a specified election task is prudent in light of all factors relevant to security based on layered defense. Democratic nations should collaborate in alerting one other to election information system threats and attacks, for mutual aid and maximally robust mitigations.
Starting Page 61
Ending Page 70
Page Count 10
File Format PDF
ISBN 9781450304467
DOI 10.1145/1920320.1920329
Language English
Publisher Association for Computing Machinery (ACM)
Publisher Date 2010-12-07
Publisher Place New York
Access Restriction Subscribed
Subject Keyword Elections Threats Assurance Transparency Voting Mitigations Cybersecurity Internet Governance Security Integrity
Content Type Text
Resource Type Article
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...