Electronic Voting Systems

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Internet Voting)
(Internet Voting)
Line 33: Line 33:
==Internet Voting==
==Internet Voting==
-
Internet voting has been widely used in private elections where anonymity, data integrity and tempering assurance are handled with lower standards than private elections.
+
'''Internet voting''' has been widely used in private elections where anonymity, data integrity and tempering assurance are handled with lower standards than private elections.
<br> Voting over the internet can be done remotely (open network) or from a poll site. Implementation of e-voting has been recorded across the UK, US, Canada, France, Estonia & Switzerland.  
<br> Voting over the internet can be done remotely (open network) or from a poll site. Implementation of e-voting has been recorded across the UK, US, Canada, France, Estonia & Switzerland.  
<br> To improve voter authentication, secrecy and security, technologies such as Electronic Authentication and computer Security are used.
<br> To improve voter authentication, secrecy and security, technologies such as Electronic Authentication and computer Security are used.

Revision as of 18:03, 7 December 2007

An Electronic Voting System is an innovative new method of distributing, voting, collecting and tabulating ballots through the use of computer technology.

The software implementations which are input into this technology expand every day to improve
security and integrity of the results.


Contents


Electronic Voting Systems

DRE Machines


DRE (Direct Recording Electronic)


A DRE machine is a recent implementation of a fully self-operated computer voting system.

DRE's are user-friendly and time-efficient which makes them an attractive alternative to traditional pen-and-paper voting. A DRE machine consists of a user screen
for information and ballot display, a keypad involving buttons or a touchscreen, and other assisting tools such as head-phones for the handicapped.

Image:sequoia_dre.jpg


DRE's have been implemented worldwide but most frequently used in countries such as Brazil, India and United States.


To access a DRE machine, a voter must be provided with a Voter Authentication Card (SmartCard or another type of Memory Card) by an Election Official. The Voter card
becomes automatically deactivated by the DRE once a vote is fully cast.

Optical Scan

Optical Scanning machines were introduced shortly after the Punch Card system, incorporating paper ballots with computer technology. There are two common Optical Scanning Machines
used in todays elections, Marksense and the Digital Pen.

Marksense is a system originally developed in Australia. Using a dark marker, a voter shades in their selection on the paper ballot, once completed the paper ballot is run through an optical scanning
machine which uses 'dark mark' logic to select the correct vote. The votes are automatically tabulated using the machine but may also be tabulated manually using the hard copy ballots.

A Digital Pen is a similar version to Marksense except the pen communicates with the paper ballot and knows at all times its location on the ballot. A small camera may also be built within
the pen to keep track of the votes. At the end of the voting session, the pen is taken for vote tabulation and the hard copy ballots are kept for recounts.

Image:DigitalPen.jpg

Internet Voting

Internet voting has been widely used in private elections where anonymity, data integrity and tempering assurance are handled with lower standards than private elections.
Voting over the internet can be done remotely (open network) or from a poll site. Implementation of e-voting has been recorded across the UK, US, Canada, France, Estonia & Switzerland.
To improve voter authentication, secrecy and security, technologies such as Electronic Authentication and computer Security are used.

Electoral Fraud

Insider Attacks

Man-In-The-Middle Attacks

Reported Problems

Security Implementations and Certification

Links

  1. Piggybacking
  2. Phishing
  3. Biometrics_in_Information_Security
  4. Smart_Card_technology_to_prevent_fraud
  5. Information_security_awareness
Personal tools