The purpose of this study is to provide a LAN Based Voting System, Web Base Voting System and an Android mobile Voting Application for Immaculate Conception International (ICI). ICI has so far been using a paper voting system, which is the classic, and dragging way and made it difficult for students to give their full participation. the computer voting system, web base voting system and android application will help improve these difficulties by providing automated systems through any web browser , computer and through mobile application by means of that the students can vote on a particular subject and view the current poll updates. The administrator can edit the updates from the database. The system will provide up to date results of the poll while providing a simple Interface for both administrator and users. It will provide an easier system for ICI than the traditional ballot and it will introduce the proponents and the students to a new way of innovation. Microsoft Visual Basic.NET, PHP and android programming and scripting language will be used to produce these system and application.
University researchers criticize electronic voting machines as security risk By Ellen Messmer, NetworkWorld.com
July 25, 2003 08:47
Computer-science researchers from Johns Hopkins University and Rice University are heaping criticism on electronic voting machines built by Diebold Election Systems, based on software code for the machine said to have been posted publicly to the Internet by an activist. Avi Rubin, technical director of the Information Security Institute at John Hopkins, along with computer science doctoral students Adam Stubblefield and Toshi Kohno, say their research of the code from the Internet shows a voter could find it very easy to trick the Diebold Election Systems into accepting more than one ballot per voter. Another researcher, Dan Wallach, assistant professor of computer science at Rice University, echoed the findings, which have been issued in a technical report, saying the country needs to have extensive independent security evaluation of all electronic voting machines on the market. In response, Diebold indicated that the released code was not a current version of the voting machine's software. "The work we've released is part of a dialog nationally we want to have," said Wallach, who reviewed the findings of the Johns Hopkins team’s two-week security evaluation of the Diebold software code that had been posted to the Internet. "My opinion is that the code we looked at is deeply unsuitable for an election." According to the university researchers, the tens of thousands lines of code for the Diebold Elections Systems voting machine obtained from the Internet had several serious and irremediable flaws. For one thing, the electronic voting system could be easily exploited by an individual or group intent on tampering with election results. The researchers pointed to the smart card necessary to use the machine to cast a single ballot. The researchers said it would be easy to program a counterfeit card, hide it in a pocket and then use it inside the booth to cast multiple votes. "A 15-year-old computer enthusiast could make these counterfeit cards in a garage and sell them," said Johns Hopkins’ Rubin. Rubin has conducted other research in the area that makes him feel high-tech balloting should not be conducted in haste. "People are rushing too quickly to computerize our method of voting before we know how to do it securely," he stated. Rice’s Wallach noted that the Diebold system doesn't use encryption to conceal results and prevent tampering. Wallach added that he has similar concerns about voting machines marketed by Hart-Inter-Civic, but that the firm has rebuffed any overtures to do a security check on the machines without a nondisclosure agreement that would prevent any publicizing of spotted flaws. The strained interaction between voting machine manufacturers and academic researchers...