9,791 research outputs found

    The Truth About Voter Fraud

    Get PDF
    Allegations of election-related fraud make for enticing press. Many Americans remember vivid stories of voting improprieties in Chicagoland, or the suspiciously sudden appearance of LBJ's alphabetized ballot box in Texas, or Governor Earl Long's quip: "When I die, I want to be buried in Louisiana, so I can stay active in politics." Voter fraud, in particular, has the feel of a bank heist caper: roundly condemned but technically fascinating, and sufficiently lurid to grab and hold headlines. Perhaps because these stories are dramatic, voter fraud makes a popular scapegoat. In the aftermath of a close election, losing candidates are often quick to blame voter fraud for the results. Legislators cite voter fraud as justification for various new restrictions on the exercise of the franchise. And pundits trot out the same few anecdotes time and again as proof that a wave of fraud is imminent.Allegations of widespread voter fraud, however, often prove greatly exaggerated. It is easy to grab headlines with a lurid claim ("Tens of thousands may be voting illegally!"); the follow-up -- when any exists -- is not usually deemed newsworthy. Yet on closer examination, many of the claims of voter fraud amount to a great deal of smoke without much fire. The allegations simply do not pan out

    Information Aggregation and Strategic Abstention in Large Laboratory Elections

    Get PDF
    [No abstract

    Vulnerability analysis of three remote voting methods

    Get PDF
    This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page

    Working Paper 65 - Governance in Africa: The Role for Information and Communication Technologies

    Get PDF
    The information and knowledge age is upon us due to rapid advances ininformation and communication technologies (ICTs). These new technologies arechanging the way we live and work, and they are transforming many aspects ofsocial and economic organization in ways we could have hardly imagined less thantwo decades ago. ICTs offer developing countries formidable and cost-effectivetools for accelerated development. This paper assesses the role that ICTs can playin Africa’s development with special emphasis on governance. The 21st centurychallenges for governance in Africa are reviewed. The paper summarizes the usesof ICTs in governance and discusses possible risks. It also attempts to offer ideasthat should be considered in employing ICTs for governance, and identifies keyareas for intervention by African countries and the African Development Bank. Thepaper stresses the importance of the human factor in realizing good governance,given that ICTs are only tools.

    E-VOTING SYSTEMS: A TOOL FOR E-DEMOCRACY

    Get PDF
    Using electronic voting systems is divisive as some countries used such systems and others did not. Electronic voting (e-voting) is relatively a new concept based on its application that aims at reducing errors and improving the convenience and integrity of election process. This paper tried to explore the factors that influence the adoption of such systems in a university environment. The study utilized a sample of 302 bachelor degree students in a public Jordanian university and in relation to students’ council election process. Results indicated that students were keen on the concepts of trust and usefulness of e-voting when adopting such systems. The study supported the findings of TAM in the area of technology acceptance. Conclusions are at the end of this paper.E-government, e-democracy, e-voting, students’ elections.

    Voting and Registration Technology Issues: Lessons from 2008

    Get PDF
    This chapter reviews the 2008 field performance and the scientific assessments of both voting systems and the statewide voter-registration databases. The federal Help America Vote Act (HAVA) mandated each of these technologies. Despite definitive scientific studies that documented grave security deficiencies that can cause voting systems to produce inaccurate vote tallies and “winners” who actually had fewer votes, these systems continue to be deployed. The Chapter traces the regrettable decisions on election technologies to a poorly designed regulatory structure and staffing, which continue to underweight and misunderstand security issues in election technologies

    JUDICIAL PERFORMANCE REVIEW: A BALANCE BETWEEN JUDICIAL INDEPENDENCE AND PUBLIC ACCOUNTABILITY

    Get PDF
    This article discusses judicial appointment and judicial independence in Colorado. The article argues that in Colorado, the independence of the judiciary needs to be protected, perhaps more than at any other time in the state’s history. While public accountability is important, it is achieved through the executive and legislative branches of the government. The courts function best if judges are free to decide each case without regard to how the general public might put a thumb on the scales of justice. To the degree that judicial performance commissions can protect judicial independence, while providing voters in retention elections with sufficient information to make a decision about whether a particular judge should be retained, Colorado’s model is one that can prove helpful to other states
    • …
    corecore