Adoption of Voting Technology


Book Description

Elections and technology are inseparable in today’s world. Technology is regarded as a technical instrument to attain certain electoral goals such as efficiency and effectiveness, as well as to ensure a high-quality process and integrity of results. However, in practice, the proposition of adopting technology in elections is often not accompanied by deep thinking and adequate preparations. Consequently, the use of technology often becomes a paradox: the intention being to solve a problem, but new problems are created instead. Based on this observation, this Guide has been written to provide a tool for election administrators or nations which, like Indonesia, are considering the use of technology in elections. In Indonesia, technology has been widely used since the 2014 general elections, especially to meet open data principles in elections. Despite this, the general elections of 1999, 2004, 2009 and 2014, and various regional elections, have used electoral technology for only two main objectives—data tabulation and transparency of the electoral process. At the time of writing, e-voting and e-recapitulation are being discussed for implementation in Indonesia’s future elections. As well as providing step-by-step guidance and points of consideration for various decision-makers, this Guide also features various types of voting technology that exist to date, accompanied by the experiences of several countries in using them. The Guide describes the various types of electoral technology that have been used in Indonesia, capturing their track records and the lessons learned—lessons that may be useful to other countries—demonstrating that voting technology does not need to be limited to e-voting.




Securing the Vote


Book Description

During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.




The History and Politics of Voting Technology


Book Description

Saltman traces the evolution of voting technology in the USA, from voice to digital, highlighting how the antiquated systems in use today are a legacy of the industrial revolution of the Nineteenth-century and the early computer revolution of the 1950s and analyses the current day situation.







How We Vote


Book Description

The idea of voting is simple, but the administration of elections in ways that ensure access and integrity is complex. In How We Vote, Kathleen Hale and Mitchell Brown explore what is at the heart of our democracy: how elections are run. Election administration determines how ballots are cast and counted, and how jurisdictions try to innovate while also protecting the security of the voting process, as well as how election officials work. Election officials must work in a difficult intergovernmental environment of constant change and intense partisanship. Voting practices and funding vary from state to state, and multiple government agencies, the judicial system, voting equipment vendors, nonprofit groups, and citizen activists also influence practices and limit change. Despite real challenges and pessimistic media assessments, Hale and Brown demonstrate that election officials are largely successful in their work to facilitate, protect, and evolve the voting process. Using original data gathered from state and local election officials and policymakers across the United States, Hale and Brown analyze innovations in voter registration, voting options, voter convenience, support for voting in languages other than English, the integrity of the voting process, and voting system technology. The result is a fascinating picture of how we vote now and will vote in the future.




Introducing Electronic Voting


Book Description

Electronic voting is often seen as a tool for making the electoral process more efficient and for increasing trust in its management. Properly implemented, e-voting solutions can increase the security of the ballot, speed up the processing of results and make voting easier. However, the challenges are considerable. If not carefully planned and designed, e-voting can undermine the confidence in the whole electoral process. Technology upgrades in elections are always challenging projects that require careful deliberation and planning. Introducing e-voting is probably the most difficult upgrade as this technology touches the core of the entire electoral process—the casting and counting of the votes. E-voting greatly reduces direct human control and influence in this process. This provides an opportunity for solving some old electoral problems, but also introduces a whole range of new concerns. Consequently, e-voting usually triggers more criticism and opposition and is more disputed than any other information technology application in elections. This Policy Paper outlines contextual factors that can influence the success of e-voting solutions and highlights the importance of considering these factors before choosing to introduce new voting technologies.




E-Adoption and Technologies for Empowering Developing Countries: Global Advances


Book Description

"This book reviews the impact technology has had on individuals and organizations whose access to media and resources is otherwise limited including topics such as electronic voting, electronic delivery systems, social Web applications, and online educational environments"--Provided by publisher.







Introducing Biometric Technology in Elections


Book Description

A credible voter register gives legitimacy to the electoral process and helps prevent electoral fraud. However, voter registration remains a complex and contested task. It is one of the most important activities that an electoral management body needs to conduct, but it is also one of the most costly in terms of both time and resources. Many countries that face challenges in creating an accurate voter register are considering reforming their voter registration systems through the introduction of biometric technologies. The drive towards biometrics has been facilitated by its largely apolitical nature. Investing in high-tech solutions allows stakeholders to demonstrate their commitment to resolving electoral problems. At the same time, expectations on biometric solutions may be exaggerated. This guide provides an overview of key concepts and considerations for all stakeholders involved in discussions about the application of biometrics in elections, both for voter registration before an election and for voter verification at polling stations on election day.




Hacking Elections Is Easy!


Book Description

The United States election process has been at risk since the widespread adoption of electronic voting systems in 2002-2006. Even though researchers have spent the past decade demonstrating that Direct Recording Electronic (DRE) and optical scanning systems from every manufacturer are vulnerable along numerous attack vectors, our Nation is still plagued with a lack of transparency on the part of electronic voting system manufacturers and poorly trained election officials and staff. Despite the recurring discussion on electronic voting vulnerabilities that occurs every four years, only limited attention is given to the systemic problem undermining American democracy. It is time for a complete overhaul in the electoral process' cyber, technical and physical security. In this publication, entitled "Hacking Elections is Easy! Preserving Democracy in the Digital Age," the Institute for Critical Infrastructure Technology, America's leading cybersecurity Think Tank, provides a comprehensive two-part analysis of this threat to our democracy: Part 1: Tactics, Techniques, and Procedures - The shocking ease of hacking virtually any voting machine's "black box" technology - The cyber, technical and physical attack methods that could be enlisted by Nation States, Hacktivists, and black hat hackers - Social Engineering attack vectors Part 2: PSST! Wanna Buy a National Voter Database? Hacking E-Voting Systems Was Just the Beginning - The risk of local and state-level election official and staff exploitation - Documented incidents of data breaches and attacks involving electronic voting systems - E-voting testing requirements by region - Vulnerabilities in electronic voting systems currently / previously in use in the united states (organized by manufacturer)