Internet Voting: Weighing the Pros and Cons By: Forest Marie “The Case for Internet Voting” By: Joe Mohen and Julia Glidden “Gauging the Risks of Internet.

Slides:



Advertisements
Similar presentations
Gregg McGilvray Chief Technical Strategist election.com.
Advertisements

Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Internet Voting Technology and policy issues. Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret.
Foundations of Democracy Pages 12-16
Unit Quiz Crisis and Resurgence. The New Millennium  George W. Bush Presidency  Election of 2000  September 11  Changes to our society after the attack.
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Internet Voting Technology and policy issues David Wagner UC Berkeley.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Voting Naked: A Feasible Election System or Just a Recurring Nightmare Presented by: Danita McRae Daniel Bramell.
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
Cloud Usability Framework
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Social Media. Lesson Objectives I will have the opportunity to investigate how political parties operate online I will have the opportunity to explain.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
A First Course in Information Security
Social Media Tools Project Group #2: Shanaveia Banks, Katie Callahan, James Hamilton, Hannah Hocutt, Danielle Ivy, Tracey Kendrick.
Formation of Governments. Government Systems Unitary system- All key powers given to a national or central governments Federal system- power is divided.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
Chapter 7: The Electoral Process Section 2
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
CHAPTER 10 Technology Issues.
The best way for citizens to participate in their government is by voting. Voting can take many forms. Citizens can vote directly for their leader and.
THIRD PARTIES. IN THE PAST Third Parties had been centralized in issues Free Soil Party Prohibitionist Party The Green Party.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Chapter 8: Political Participation
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
The Progressive Movement: Political Issues. Imperfect Democracy Progressive Era political reforms came about in order to bring America closer to the ideal.
Copyright © Allyn & Bacon 2007 Power Point Presentations for Each Chapter of SuperVision and Instructional Leadership: A Developmental Approach Carl D.
 Governments can be classified based on who governs the state  Autocracy  Oligarchy  Democracy.
Characteristics of Democracy A true democratic government has characteristics that distinguish it from other forms of government.
Managing Security Risks in the Federal Reserve System Marianne Emerson, Deputy Director Information Technology Division Board of Governors of the Federal.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
1 The Evolution of Voting Systems Paul DeGregorio Vice Chairman Donetta Davidson Commissioner The U.S. Election Assistance Commission.
The Internet of Things and Consumer Protection
Social 10-1 Mr. Bauer The following are prerequisites of democracy: 1.The people must have the ability and power to remove and replace their leaders.
Comparative Politics Different democracies. Monarchy Image used under Creative Commons from Eddo via Wikimedia Commons.
FIRMA National Risk Management Training Conference – Orlando, FL Wednesday April 9, 2008 Third Party / SAS 70 Reports A Regulatory and Standards Update.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
United States Government: Democracy in Action. To win elections, a party must first offer appealing candidates and conduct expensive campaigns. Nomination.
Trend Micro call helpline is available at Smart Snake offers quick Trend Micro Antivirus support through Microsoft certified technicians.
Network Security and Security in Industry Paul Curtis.
Chapter One The Study of American Government. Copyright © Houghton Mifflin Company. All rights reserved.1 | 2 American Government, Chapter 1 The view.
Highlights on the UN Convention on the rights of persons with disabilities Simão Campos ITU Telecommunications Standardization Bureau ITU and WHO Regional.
Domestic Election Observation and Reporting
Cyber Security – An Existential Threat? (IIC, Singapore)
MGMT 452 Corporate Social Responsibility
Internet Voting Resources and Reports
AP Government & Politics
E-BANKING RISK MANAGEMENT
Chapter 17 Risks, Security and Disaster Recovery
IS4680 Security Auditing for Compliance
UNIT THREE| U.S. ELECTIONS
Why are elections important to democracy?
Consumer Empowerment through Education
INFORMATION SYSTEMS SECURITY and CONTROL
Shaping Society Together
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
The Voter’s Choice Act: You choose how, when, and where you vote
Chapter 7: The Electoral Process Section 2
Progressive Reforms at the State and Local Levels of Government
Presentation transcript:

Internet Voting: Weighing the Pros and Cons By: Forest Marie “The Case for Internet Voting” By: Joe Mohen and Julia Glidden “Gauging the Risks of Internet Voting” By: Deborah H. Phillips and Hans A. Von Spakovsky

Background Information Arizona Democratic Party( March 2000 ) used as case study. Arizona Democratic Party( March 2000 ) used as case study. Policy makes and politicians investigate the issue Policy makes and politicians investigate the issue ADP appoints election.com to implement a “virtual voting” system over the Internet ADP appoints election.com to implement a “virtual voting” system over the Internet No Internet voting laws No Internet voting laws

Election.com issues  Increase voter access and participation  Oversight and security Voter authentication Ballot protection Wholesale fraud DOS attacks and Virus attacks Application security

Lessons Learned ► Help lines ► Updated browsers needed ► Macintosh problems (resolved now) ► Opportunities for disabled

Conclusion As computers grow, democracy will receive changes. As computers grow, democracy will receive changes. But When? Where? How?But When? Where? How? Article discussion. Article discussion.

Free and Fair Security California voting task force says threats are significant Open architecture hampers security DOS, viruses, theft are a problem Secret Ballot

Equity Digital Divide is growing  Whites are accelerating at Internet access White males making 20K or less are five times more likely to have Internet access Internet Access: African-Americans- 19%, Hispanics-16%, Whites-38%.

2000 Arizona Primary People could not get through help lines Disabled people couldn’t use service.

Other issues Why bother? Convenience More voter interaction Improve traditional methods Who wants Internet voting? Vendors and election supervisions

Conclusion Framework in progress Framework in progress Assess benefits before implementation Assess benefits before implementation Know which vendors the state works with Know which vendors the state works with Monitor the whole process Monitor the whole process Set standards to ensure security, privacy and equity. Set standards to ensure security, privacy and equity. Article discussion Article discussion