Preview

Electronic Voting Systems

Good Essays
Open Document
Open Document
808 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Voting Systems
Electronic voting systems
Can they hack it, or can they be hacked? The incredible advances of technology and computing in our society over the last few decades has touched every aspect of our lives, from schools to businesses, from controlling traffic lights on the streets to keeping our airplanes from going bump in the night. Technology has managed to make the little tasks of life easier, while making the big picture so much more complex than ever before. We have sought to develop technology to improve and replace just about everything - email has taken over for the post office, blogs and webisodes are replacing television, and even books are more widely sold in electronic form. Is it any real surprise that those engineers and programmers are working to replace the old paper ballots and punchcards of voting as well? Electronic voting systems are quite varied in style, construction, and capabilites. One of the more prevalent systems in use today is called Direct Recording Electronic. DRE is an adaptation of the mechanical lever machines, and utilize a touch screen or pushbuttons for user interaction. An alphanumeric keypad is often available as well, allowing for write-in votes. In 1996, 7.7% of the registered voters in the United States used some type of direct recording electronic voting system. (Bellis) Other forms of electronic voting machine range from commercial, off-the-shelf laptops with simple programs to proprietary equipment with advanced security and identification systems. The biggest problem that most Americans have with all forms of electronic voting is that of security, of identification, and of accuracy and trustworthiness. One of the most prevalent threats in the world today is that of electronic security – any computer connected to a network can be hacked, can be controlled and tampered with, producing whatever information is desired. The vulnerability to hacking is often cited as the key concern in implementing electronic voting



References: Bellis, Mary. “The History of Voting Machines.” About.com 06 October 2012 党Voting Machines.・ ProCon.org 06 October 2012 0]> Scneier, Bruce. "The Problem with Electronic Voting Machines.・ 06 October 2012 1]> [->0] - http://votingmachines.procon.org/view.resource.php?resourceID=000265 [->1] - http://www.schneier.com/blog/archives/2004/11/the_problem_wit.html

You May Also Find These Documents Helpful

  • Good Essays

    The U.S. has 35 states that practice the voter id law, which requires some form of official identification in order for a person to register to vote, receive a ballot for an election, or to vote. Since these laws have been passed they have been the topic of debate during election time. There are many variables to consider when deciding if the positive benefits of the laws outweigh the negative benefits. Along with the voter id law being passed in several states in 2002, the federal government passed the Help America Vote Act, which mandates that all states and localities upgrade their election procedures, voting machines, and registration processes ext. Although, the Acts mandated by the states would help to mitigate voter fraud which is a…

    • 377 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Voting is the cornerstone of democracy. We have had men and women through the decades die for the right to vote. Many generations of Americans of every gender, race, religion, and ideology have marched and struggled and died to secure this fundamental freedom. Yet we have a system where the winner can lose (qtd. in “Pros and Cons of the Electoral College System” 25).…

    • 1202 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With more and more regularity, we learn about the loss of personal and financial information because of cybercrimes originating from around the world. Elections, power grids, movie productions companies, government agencies, and financial institutions are vulnerable to cybercriminals. Each time a breach occurs we hope that it will not reach our personal or business lives. However, the likelihood of staying cyber safe seems less and less likely to happen. One only has to look at the Equifax fiasco, which alone resulted in the loss of personal financial data for 143 million Americans.…

    • 92 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.…

    • 816 Words
    • 4 Pages
    Good Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    During the fifty odd years since 1960, the world has dramatically changed. The map of countries has changed entirely, the list of allies of various countries has changed. Dictatorships have come and gone, repeatedly in some areas. However, throughout all of the turmoil globally, one thing has remained constant, and that is the rapid advance in computer technology. Throughout history, we have come from computers as large as a warehouse to computers that fit on our wrists, from computers that are massive to launch a moon mission to having that same power in our smartphones.…

    • 748 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Voting in the United States is a right for every citizen, but when using paper ballots it takes that right away from many. That is why using EMVs is a better way to improve voting turn out. The more accessible it is to vote effects how many people can voice their opinion. It is also harder to tamper with than a paper ballot is.…

    • 375 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Another particularly common problem facing e-commerce and social network applications is the trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. This can be a significant risk since cyber terrorism can be easily carried out.…

    • 1233 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Ethical Hacking

    • 2861 Words
    • 12 Pages

    The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help.…

    • 2861 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Besides, privacy invasion is another sensitive issue caused by ICT. Ironically, computers, on which we rely excessively to store and save our private data, are the means of hackers to steal, destroy or even be exploited for their own selfish good. This hideous act could easily be done when…

    • 663 Words
    • 3 Pages
    Good Essays