Social mechanisms for causal explanation in social theory based IS research

C Avgerou - Journal of the Association for Information systems, 2013 - aisel.aisnet.org
In this paper, I argue for the development of explanatory theory in IS research. I critically
examine ways of explaining IS phenomena, identify alternative epistemological approaches …

Explaining trust in IT-mediated elections: A case study of e-voting in Brazil

C Avgerou - Journal of the Association for Information Systems, 2013 - aisel.aisnet.org
In this paper, I trace social mechanisms for the development and continuation of citizens'
trust in e-voting. My research focuses on the processes that give rise to trust-related …

An enhanced security mechanism through blockchain for E-polling/counting process using IoT devices

R Krishnamurthy, G Rathee, N Jaglan - Wireless Networks, 2020 - Springer
One of the biggest challenges in political mayhem is visible during the election process
where no stone is kept unturned in order to gain the power. Further, due to poll violence and …

An experience in testing the security of real-world electronic voting systems

D Balzarotti, G Banks, M Cova… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Voting is the process through which a democratic society determines its government.
Therefore, voting systems are as important as other well-known critical systems, such as air …

[BOOK][B] Rethinking American electoral democracy

MJ Streb - 2015 - taylorfrancis.com
While frustration with various aspects of American democracy abound in the United States,
there is little agreement over—or even understanding of—what kinds of changes would …

[PDF][PDF] Source code review of the Diebold voting system

JA Calandrino, AJ Feldman, JA Halderman… - University of California …, 2007 - jhalderm.com
This report is a security analysis of the Diebold voting system, which consists primarily of the
AccuVote-TSX (AV-TSX) DRE, the AccuVote-OS (AV-OS) optical scanner, and the GEMS …

Insider attack identification and prevention using a declarative approach

A Sarkar, S Köhler, S Riddle… - 2014 IEEE Security …, 2014 - ieeexplore.ieee.org
A process is a collection of steps, carried out using data, by either human or automated
agents, to achieve a specific goal. The agents in our process are insiders, they have access …

E-voting system security optimization

B Ondrisek - 2009 42nd Hawaii International Conference on …, 2009 - ieeexplore.ieee.org
Security of e-voting systems does not only depend on the voting protocol or the software
used but concerns the whole system with all its components. To guarantee security a holistic …

[PDF][PDF] Modeling and analyzing faults to improve election process robustness

BI Simidchieva, SJ Engle, M Clifford, AC Jones… - 2010 Electronic Voting …, 2010 - usenix.org
This paper presents an approach for continuous process improvement and illustrates its
application to improving the robustness of election processes. In this approach, the Little-JIL …

Are your votes really counted? testing the security of real-world electronic voting systems

D Balzarotti, G Banks, M Cova, V Felmetsger… - Proceedings of the …, 2008 - dl.acm.org
Electronic voting systems play a critical role in today's democratic societies, as they are
responsible for recording and counting the citizens' votes. Unfortunately, there is an …