65,078 research outputs found

    Electronic Voting: the Devil is in the Details

    Get PDF
    Observing electronic voting from an international point of view gives some perspective about its genesis and evolution. An analysis of the voting process through its cultural, ontological, legal and political dimensions explains the difficulty to normalize this process. It appears that international organizations are not capable to properly defend the fundamental rights of the citizens. The approach that was taken when DRE voting computers appeared seems to have reoccured with VVAT voting computers and the european e-poll project.Comment: 9 page

    Combatting electoral traces: the Dutch tempest discussion and beyond

    Get PDF
    In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. We introduce the term electoral traces to denote any physical, digital or social evidence of a voter's choices in an election. From this perspective, we provide guidelines for risk analysis as well as an overview of countermeasures

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Get PDF
    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud \ud Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud \ud Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud \ud Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud \ud Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud \ud Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk

    Corporate governance in Turkey: implications for investments and growth

    Get PDF
    Background Paper for Turkey’s Investment Climate Assessment 200

    E-voting discourses in the UK and the Netherlands

    Get PDF
    A qualitative case study of the e-voting discourses in the UK and the Netherlands was performed based on the theory of strategic niche management. In both countries, eight e-voting experts were interviewed on their expectations, risk estimations, cooperation and learning experiences. The results show that differences in these variables can partly explain the variations in the embedding of e-voting in the two countries, from a qualitative point of view

    Between a Rock and a Hard Place

    Get PDF
    The perception of the WTO is currently one of an organisation in crisis. Yet, appraisal varies regarding its extent and seriousness: Is it merely a rough time or are we standing on the edge of destruction? The article will trace developments inside as well as outside the WTO in order to assess the magnitude of the crisis. It will be argued that while certain developments inside the organisation, when seen in accumulation would already warrant serious attention, only together with developments taking place outside of the WTO, the two strands of developments unfold their full potential for the crisis. The overall situation renders the WTO in a difficult position, as it is currently unable to adapt to these challenges, while keeping calm and carrying on might similarly further the crisis. While States might improve and further develop their trade relations in bi- and plurilateral agreements, it is only the WTO that reflects and stands for the multilateral post (cold) war order
    • …
    corecore