© 2003 Arnold B. Urken. All Rights Reserved. 1 Usability and Security Standards for Electronic Voting IEEE Electronic Voting Workshop Arnold B. Urken Professor.

Slides:



Advertisements
Similar presentations
Health Promotion.
Advertisements

On the Robustness of Preference Aggregation in Noisy Environments Ariel D. Procaccia, Jeffrey S. Rosenschein and Gal A. Kaminka.
Computational Democracy: Algorithms, Game Theory, and Elections Steven Wolfman 2011/10/27.
Involving the Public in Risk Communication Katherine A. McComas, Ph.D. University of Maryland.
 Our primary budget objective for the year is to resolve the dependency on reserves  Our carry forward (level services) budget will require double the.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
CS 589 Information Risk Management 23 January 2007.
Chapter 2 Health Care Information Systems: A Practical Approach for Health Care Management 2nd Edition Wager ~ Lee ~ Glaser.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer 2003.
© Steven Alter, 2010, all rights reserved Validating Work System Principles for Use in Systems Analysis and Design Steven Alter Ryan Wright
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
09/28/2007 CIS Dept., UMass Dartmouth 1 Trustworthy Agent-Based Online Auction Systems Prof. Haiping Xu Concurrent Software Systems Laboratory Computer.
1 Streamlined Sales Tax Governing Board. The Marketplace Fairness Act of 2015(MFA) Grants state and local jurisdictions the right to require the collection.
Software Quality Assurance For Software Engineering && Architecture and Design.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
Copyright © 2008 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. John W. Creswell Educational Research: Planning,
12/9-10/2009 TGDC Meeting TGDC Recommendations Research as requested by the EAC John P. Wack National Institute of Standards and Technology
CSC271 Database Systems Lecture # 20.
Political Participation Who Votes? And Who Do They Vote For?
How to Develop a Sustainable Community Health Information Infrastructure William A. Yasnoff, MD, PhD, FACMI Managing Partner, NHII Advisors Founder and.
Copyright © 2011 Pearson Education, Inc. Samples and Surveys Chapter 13.
Collecting Quantitative Data
Circulation of authentic instruments under Regulation 650/2012 speaker – Ivaylo Ivanov – Bulgarian Notary Chamber.
Copyright 2005 Welcome to The Great Lakes TL 9000 SIG TL 9000 Requirements Release 3.0 to Release 4.0 Differences Bob Clancy Vice President, BIZPHYX,
Information Systems Security Computer System Life Cycle Security.
An efficient distributed protocol for collective decision- making in combinatorial domains CMSS Feb , 2012 Minyi Li Intelligent Agent Technology.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
M2M Consolidation August 17-18, 2011 Washington D.C. 1 ARIB/TTC’s Feedback on Consolidation Issues M2MCons02_06.
Anual Workshop February 5th, Anonymous yet reliable ePoll application Italo Dacosta SecAnon-DistriNet.
Suffrage and Turnout POLS 4349 Dr. Brian William Smith.
NIST HAVA-Related Work: Status and Plans June 16, 2005 National Institute of Standards and Technology
Software Quality Assurance SE Software Quality Assurance What is “quality”?
Improving U.S. Voting Systems Security Breakout Session Improving U.S. Voting Systems Andrew Regenscheid National Institute.
12/9-10/2009 TGDC Meeting Auditing concepts David Flater National Institute of Standards and Technology
TGDC Meeting, Jan 2011 Auditability Working Group David Flater National Institute of Standards and Technology r4.
TGDC Meeting, July 2010 Report of the UOCAVA Working Group John Wack National Institute of Standards and Technology DRAFT.
FIT03.05 Explain features of network maintenance.
TGDC Meeting, Jan 2011 Help America Vote Act (HAVA) Roadmap Nelson Hastings National Institute of Standards and Technology
TGDC Meeting, July 2010 Report on Other Resolutions from Dec 2009 TGDC Meeting John Wack National Institute of Standards and Technology
Decisions How do we make choices?. Types of Decisions Individual—our opinion is our decision. Group—Individual opinions are expressed by voting(at least.
Part I Web Service Composition
Victor Farbman and Maxim Trosman Under guidance of Amichai Shulman.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Information Technology for Management Chapter 13: Project Management and SDLC Prepared by.
Requirements Management with Use Cases Module 4: Analyze the Problem Requirements Management with Use Cases Module 4: Analyze the Problem.
Bellevue, 26 July 2012 © ETSI All rights reserved1 PRESENCE & VOTING RIGHTS.
Briefing for the EAC Public Meeting Boston, Massachusetts April 26, 2005 Dr. Hratch Semerjian, Acting Director National Institute of Standards and Technology.
Copyright © 2014, 2011 Pearson Education, Inc. 1 Chapter 13 Samples and Surveys.
Doc.: IEEE /0858r0 Submission July 2008 Jesse Walker, Intel CorporationSlide 1 IEEE 802 Presentation for Xi’an Meeting Date: Authors:
Medical Hypothesis Testing July 27, 2006 Bill Bushey Emily Jenkins.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
12/9-10/2009 TGDC Meeting Alternatives to Software Independence Nelson Hastings National Institute of Standards and Technology
The VVSG 2005 Revision Overview EAC Standards Board Meeting February 26-27, 2009 John P. Wack NIST Voting Program National Institute.
Computer Security Introduction
Background Post-transplant outcomes in adult Fontan patients remain poorly defined. Available studies limited to sub-groups within published registry data.
Software Quality Assurance
Health Services Administration
Evaluating your Repository
CDF for Voting Systems: Human Factors Issues
Electronic voting – safe or not?
College of Public Health and Human Sciences
Data Quality By Suparna Kansakar.
Software Quality Assurance
eVoting System Proposal
Engineering design is the process of devising a system, component, or process to meet desired needs. It is a decision-making process in which the basic.
Decentralized Model-Based Testing of Distributed Systems
MODULE 7 Definitions Module 7 page 1.
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

© 2003 Arnold B. Urken. All Rights Reserved. 1 Usability and Security Standards for Electronic Voting IEEE Electronic Voting Workshop Arnold B. Urken Professor of Political Science Stevens Institute of Technology Castle Point on the Hudson Hoboken, New Jersey July 28, 2003

© 2003 Arnold B. Urken. All Rights Reserved. 2 Electronic Voting Standards Issues Usability Plug and play scoring of votes is not simple Partisan groups should not control the development of alternative scoring methods Security “Absolute” privacy is not trustworthy without active auditing Formal methods should be incorporated into voting standards

© 2003 Arnold B. Urken. All Rights Reserved. 3 Usability: Plug and Play Scoring Alternative scoring affects Auditing and verification Presentation of results Choice of aggregation criteria “Majority” is not magic The probability of a tied outcome will increase significantly under some methods Conflicting definitions of majority must be resolved (e.g., approval voting)

© 2003 Arnold B. Urken. All Rights Reserved. 4 Usability: Partisan Issues Scoring technology will enable communities to consider new options for organizing elections Partisan interest groups should not be allowed to determine what is feasible There is no “best” or optimal scoring method for elections

© 2003 Arnold B. Urken. All Rights Reserved. 5 Security: Privacy Technology should be developed to enable desirable social practices to be implemented Active auditing is needed to cope with benign and malicious error in data collection and server maintenance Voluntary sharing of vote data is not “unthinkable”

© 2003 Arnold B. Urken. All Rights Reserved. 6 Security: Formal Methods New ways of improving voting security Type-safe transactions Prevent malicious/benign error Open up new options for verification Model checking Create an election database: from registration to election outcome Use model verification to detect random and malicious errors in election processes