Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Inside risks: risks in computerized elections

Published: 01 November 1990 Publication History

Abstract

Background: Errors and alleged fraud in computer-based elections have been recurring Risks Forum themes. The state of the computing art continues to be primitive. Punch-card systems are seriously flawed and easily tampered with, and still in widespread use. Direct recording equipment is also suspect, with no ballots, no guaranteed audit trails, and no real assurances that votes cast are properly recorded and processed.

References

[1]
New Yorker (Nov. 7, 1988). See article by Ronnie Dugger.
[2]
Sahman, R.G. Accuracy, integrity, and security. Computerized Vote-Tallying, NIST (NBS) Special publication, 1988.
[3]
SEN. 15, I (Jan. 1990), 10-I3, Virginia, Durham, Rome, Yonkers, and Michigan cases. Additional cases were discussed in earlier issues.

Cited By

View all
  • (2014)An Analysis of Security Threats of Electronic Election SystemsJournal of Information Privacy and Security10.1080/15536548.2006.108557952:3(3-24)Online publication date: 10-Sep-2014
  • (2008)Analysis of a Distributed e-Voting System Architecture against Quality of Service RequirementsProceedings of the 2008 The Third International Conference on Software Engineering Advances10.1109/ICSEA.2008.18(58-64)Online publication date: 26-Oct-2008
  • (2007)Formal verification of tamper-evident storage for e-votingProceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods10.1109/SEFM.2007.21(329-338)Online publication date: 10-Sep-2007
  • Show More Cited By

Index Terms

  1. Inside risks: risks in computerized elections

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 33, Issue 11
    Nov. 1990
    123 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/92755
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1990
    Published in CACM Volume 33, Issue 11

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)65
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 11 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)An Analysis of Security Threats of Electronic Election SystemsJournal of Information Privacy and Security10.1080/15536548.2006.108557952:3(3-24)Online publication date: 10-Sep-2014
    • (2008)Analysis of a Distributed e-Voting System Architecture against Quality of Service RequirementsProceedings of the 2008 The Third International Conference on Software Engineering Advances10.1109/ICSEA.2008.18(58-64)Online publication date: 26-Oct-2008
    • (2007)Formal verification of tamper-evident storage for e-votingProceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods10.1109/SEFM.2007.21(329-338)Online publication date: 10-Sep-2007
    • (2005)Why use an open source e-voting system?ACM SIGCSE Bulletin10.1145/1151954.106761637:3(412-412)Online publication date: 27-Jun-2005
    • (2005)Why use an open source e-voting system?Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education10.1145/1067445.1067616(412-412)Online publication date: 27-Jun-2005
    • (2003)Get out the E-voteIEEE Circuits and Devices Magazine10.1109/MCD.2003.120317619:3(32-38)Online publication date: May-2003
    • (1994)The use and impact of computer technology on political electionsACM SIGCAS Computers and Society10.1145/181878.18188224:1(21-27)Online publication date: 1-Mar-1994

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media