Electronic Voting Systems

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Electronic Voting Systems)
Line 1: Line 1:
-
<tt>An '''Electronic Voting System''' is an innovative new method of distributing, voting, collecting and tabulating ballots through the use of computer technology.</tt>
+
An '''Electronic Voting System''' is an innovative new method of distributing, voting, collecting and tabulating ballots through the use of computer technology.
<br><br> The software implementations which are input into this technology expand every day to improve <br>security and integrity of the results.  
<br><br> The software implementations which are input into this technology expand every day to improve <br>security and integrity of the results.  

Revision as of 18:39, 1 December 2007

An Electronic Voting System is an innovative new method of distributing, voting, collecting and tabulating ballots through the use of computer technology.

The software implementations which are input into this technology expand every day to improve
security and integrity of the results.


Contents


Electronic Voting Systems

DRE Machines


DRE (Direct Recording Electronic)


A DRE machine is a recent implementation of a fully self-operated computer voting system.

DRE's are user-friendly and time-efficient which makes them an attractive alternative to traditional pen-and-paper voting. A DRE machine consists of a user screen
for information and ballot display, a keypad involving buttons or a touchscreen, and other assisting tools such as head-phones for the handicapped.

Image:sequoia_dre.jpg


DRE's have been implemented worldwide but most frequently used in countries such as Brazil, India and United States.


To access a DRE machine, a voter must be provided with a Voter Authentication Card (SmartCard or another type of Memory Card) by an Election Official. The Voter card
becomes automatically deactivated by the DRE once a vote is fully cast.

Optical Scan

Internet Voting

Electoral Fraud

Insider Attacks

Man-In-The-Middle Attacks

Reported Problems

Security Implementations and Certification

Personal tools