The document discusses personal data protection in electronic voting in Indonesia. It provides background on legal regulations related to personal data protection and issues with previous elections. It also discusses criteria and indicators for effective implementation of electronic voting, including robustness against fraud, consistency, security, privacy measures, and transparency. The document calls for simplified legal requirements and new technical solutions to design effective personal data protection in electronic voting.
Tracking legislation enables organizations to limit their
exposure to such costs. With early notification of
emerging measures, organizations can have an impact
on the legislative process well before those measures
become law and related rules are adopted.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
Supreme Court issues notice to Centre, Election Commission about making polit...Newslaundry
The petition, which was filed by Association of Democratic Reforms [ADR] and Centre for Public Interest Litigation [CPIL], challenges various amendments made through Finance Act 2017 and Finance Act 2016 in Companies Act, Income Tax Act, Representation of People’s Act, Reserve Bank of India Act and Foreign Contribution Regulations Act.
Identity and trust are two important elements that surround any service-providing system. They become more critical when such systems operate in distributed environments and deal with sensitive details. This paper explains how a government-trusted digital infrastructure would address both identification and trust requirements and would support the development of citizen-centric government services. The main contribution of the paper is the presentation of a framework adopted by the government of the United Arab Emirates (UAE) that provides a systematic approach to creating a robust information-sharing system within a secure environment. A model is also presented to explain how synergy among institutions is planned to be achieved and how online users would access web-based government services with a single login using a universal smart identity card.
Back in 2001, there were a lot of Internet Law issues that were just beginning to be explored which is what gave rise to the title "Internet Law: An Expedition" -- what we did not realize back then was that many of those issues would still be evolving 15 years later! For example, this presentation discusses use of email and whether it is safe and appropriate for confidential information; Internet or computer use policies, something that I still discuss frequently, and privacy issues in the employment context. It was fascinating to take a look back down memory lane with these presentation slides.
The revolutionary progresses in information technology have a deep rooted impact in
global communication and that’s also having a great impact in the national as well as
the global business environment.
.Along with its growing importance it also has challenges due to technological issues
and their legal consequences.
In this study the key elements of e-contract (in light of the Indian Contract Act, 1872)
has been discussed. Its various issues related to Evidence Act, IT Act, Stamping laws,
consumer disputes has been covered.
E-contract is new phenomenon in modern business, so there are some ambiguities in
technical and legal issues but will be solved
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
Electronic businesses are witnessing enormous growth as more and more people are switching to online platforms. The widespread use of Internet has opened new channels to operate trade for many businesses. Also electronic marketing has become a proven channel of passing on the word to the customers. Legal and ethical issues quickly become an area of concern. In this research recommendations are made to harmonize IT and Internet Laws. A novel approach is proposed to promote legal risk management culture in organizations. It begins with revising current state of regulations surrounding e-Businesses and electronic marketing. The proposed approach offers risk management by considering risk mitigation strategy, educating people and use of information technology. Monitoring compliance requirements are met by reviewing the latest changes in regulations and rewarding the employees who ensures the successful implementation of the strategy.
In this session we'll provide a quick roundup of the latest issues involved in sales tax compliance including new developments with Amazon Laws and Nexus, US Congressional Action, mobile Commerce, e-Filing and VAT.
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...IJECEIAES
Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts.
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
In general, electronic voting as the technology advancement offers the opportunities to reduce the
time and budget of implementation which present the greater advantages than traditional approach. It
seeks establish the privacy framework in the context of electronic voting that aligns with the mutual
comprehension of relevant factors and measures. The result found that privacy concern and perceived
benefit have influenced personal data protection significantly. The success and failure of electronic voting
implementation depend on the fulfilment of the voter needs on privacy and personal data protection.
Tracking legislation enables organizations to limit their
exposure to such costs. With early notification of
emerging measures, organizations can have an impact
on the legislative process well before those measures
become law and related rules are adopted.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
Supreme Court issues notice to Centre, Election Commission about making polit...Newslaundry
The petition, which was filed by Association of Democratic Reforms [ADR] and Centre for Public Interest Litigation [CPIL], challenges various amendments made through Finance Act 2017 and Finance Act 2016 in Companies Act, Income Tax Act, Representation of People’s Act, Reserve Bank of India Act and Foreign Contribution Regulations Act.
Identity and trust are two important elements that surround any service-providing system. They become more critical when such systems operate in distributed environments and deal with sensitive details. This paper explains how a government-trusted digital infrastructure would address both identification and trust requirements and would support the development of citizen-centric government services. The main contribution of the paper is the presentation of a framework adopted by the government of the United Arab Emirates (UAE) that provides a systematic approach to creating a robust information-sharing system within a secure environment. A model is also presented to explain how synergy among institutions is planned to be achieved and how online users would access web-based government services with a single login using a universal smart identity card.
Back in 2001, there were a lot of Internet Law issues that were just beginning to be explored which is what gave rise to the title "Internet Law: An Expedition" -- what we did not realize back then was that many of those issues would still be evolving 15 years later! For example, this presentation discusses use of email and whether it is safe and appropriate for confidential information; Internet or computer use policies, something that I still discuss frequently, and privacy issues in the employment context. It was fascinating to take a look back down memory lane with these presentation slides.
The revolutionary progresses in information technology have a deep rooted impact in
global communication and that’s also having a great impact in the national as well as
the global business environment.
.Along with its growing importance it also has challenges due to technological issues
and their legal consequences.
In this study the key elements of e-contract (in light of the Indian Contract Act, 1872)
has been discussed. Its various issues related to Evidence Act, IT Act, Stamping laws,
consumer disputes has been covered.
E-contract is new phenomenon in modern business, so there are some ambiguities in
technical and legal issues but will be solved
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...IJMIT JOURNAL
Electronic businesses are witnessing enormous growth as more and more people are switching to online platforms. The widespread use of Internet has opened new channels to operate trade for many businesses. Also electronic marketing has become a proven channel of passing on the word to the customers. Legal and ethical issues quickly become an area of concern. In this research recommendations are made to harmonize IT and Internet Laws. A novel approach is proposed to promote legal risk management culture in organizations. It begins with revising current state of regulations surrounding e-Businesses and electronic marketing. The proposed approach offers risk management by considering risk mitigation strategy, educating people and use of information technology. Monitoring compliance requirements are met by reviewing the latest changes in regulations and rewarding the employees who ensures the successful implementation of the strategy.
In this session we'll provide a quick roundup of the latest issues involved in sales tax compliance including new developments with Amazon Laws and Nexus, US Congressional Action, mobile Commerce, e-Filing and VAT.
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...IJECEIAES
Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts.
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
In general, electronic voting as the technology advancement offers the opportunities to reduce the
time and budget of implementation which present the greater advantages than traditional approach. It
seeks establish the privacy framework in the context of electronic voting that aligns with the mutual
comprehension of relevant factors and measures. The result found that privacy concern and perceived
benefit have influenced personal data protection significantly. The success and failure of electronic voting
implementation depend on the fulfilment of the voter needs on privacy and personal data protection.
New criminal laws— Future of criminal justice system in Indiaaakash malhotra
The three new criminal laws, the Bharatiya Nyaya Sanhita, the Bharatiya Nagarik Suraksha Sanhita, and the Bharatiya Sakshya Adhiniyam, which replace the Indian Penal Code (IPC), the Code of Criminal Procedure (CrPC), and the Indian Evidence Act respectively, will come into force from 1 July this year
SAAS BASED E-COURT APPLICATIONS IN EGOVERNANCE IN INDIAijmpict
Delays in court procedures are observed as potential source of problems to much arbitration and settlements of legal cases now days in India. Corrupt officials and greedy lawyers may instead of speeding up, actually can cause administrative delays in which they have no effect on outcomes but transfer apparent responsibility for decision from elected political officials to agencies or courts. So reformation in administrative procedure in the form of promoting e-government can provide a net benefit to citizens. Developing countries usually face problem of having insufficient infrastructure in fulfilling the needs of providing citizen centric or user centric e-services in various domains such as Judiciary Administration. SaaS based Cloud computing model has a potential to offer solutions in the form of automated useroriented legal case management system while addressing the capital expenditure and it’s Return on Investment. It provides service oriented access to end users without compromising on security. It reduces total cost of ownership, facilitates easy deployment and maintenance services by standardizing services and increases end user satisfaction levels. When properly applied to the development of E-Governance Applications, SaaS based Cloud computing architecture models can transform the nation into an Information Society. This paper attempts (i) to highlight the issue of delay happening in the judicial administration process most importantly at the operational level, (ii) mitigating the problems of delay in terms of bringing administration reforms through adopting e-governance applications such as automated
legal case management system by using SaaS based Cloud computing e-Governance Portals.
SAAS BASED E-COURT APPLICATIONS IN EGOVERNANCE IN INDIAijmpict
Delays in court procedures are observed as potential source of problems to much arbitration and settlements of legal cases now days in India. Corrupt officials and greedy lawyers may instead of speeding up, actually can cause administrative delays in which they have no effect on outcomes but transfer apparent responsibility for decision from elected political officials to agencies or courts. So reformation in administrative procedure in the form of promoting e-government can provide a net benefit to citizens. Developing countries usually face problem of having insufficient infrastructure in fulfilling the needs of providing citizen centric or user centric e-services in various domains such as Judiciary Administration. SaaS based Cloud computing model has a potential to offer solutions in the form of automated useroriented legal case management system while addressing the capital expenditure and it’s Return on Investment. It provides service oriented access to end users without compromising on security. It reduces total cost of ownership, facilitates easy deployment and maintenance services by standardizing services and increases end user satisfaction levels. When properly applied to the development of E-Governance Applications, SaaS based Cloud computing architecture models can transform the nation into an Information Society. This paper attempts (i) to highlight the issue of delay happening in the judicial administration process most importantly at the operational level, (ii) mitigating the problems of delay in terms of bringing administration reforms through adopting e-governance applications such as automated legal case management system by using SaaS based Cloud computing e-Governance Portals.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
LEGAL PROTECTION FOR CONSUMERS OF ELECTRONIC TRANSACTIONS (E-COMMERCE) BY PRE...AJHSSR Journal
ABSTRACT : This research reviewed the validity of the electronic transaction conducted by a business actor
with costumer by the pre-order system via online sites or sale and purchase platforms. The problems formulation
were how the validity of electronically sale and purchase based on the pre-order system and how the legal
protection for the customer of lousy faith from business actor related to the pre-order purchasing system? The
method of this research was normative and literature study based on law material, secondary material (scientific
work, journal, books, documents, and other literature), and tertiary law (law dictionary). The result was that
electronic trading by the pre-order system was presumed valid by positive law, based on Civil Code article 1332
regarding the future objects as objects in the contract allowed. The customer suffered a loss due to the pre-order
system before the transaction happened. It is an understanding of the law related to e-commerce or after the
transaction in the form of a request to the Consumer Dispute Settlement Agency (BPSK), which is forwarded to
litigation or non-litigation.
KEYWORDS :Legal protection for consumers, Electronic transactions, The validity of the contract,Pre-order
system
Research on Legal Protection of Personal Data Privacy of E Commerce Platform ...YogeshIJTSRD
As a product of the information age, e commerce platform not only changes peoples daily life, but also brings unprecedented impact and infection to users personal data privacy. Under the influence of various factors, the phenomenon of data privacy infringement emerges in endlessly and becomes more and more common. Strengthening the protection of data privacy has become an urgent problem to be solved. At present, China has initially established laws and systems on the protection of personal data privacy, but they are not enough to effectively deal with many problems that have emerged. There is still a lack of comprehensive and systematic legal provisions and specific and effective implementation measures in legislation, law enforcement and justice. How to further control the violation of users personal data privacy has become a new challenge we need to face. Based on the relevant laws and regulations such as the e commerce law and the civil code, this paper analyzes the value, current situation, problems and other specific contents of the personal data privacy right of the users of e commerce platform, points out the current situation of the legal protection of the rights and interests of the users of e commerce platform, and further analyzes its shortcomings, Based on this, this paper leads to the e commerce platform users personal privacy, so as to put forward countermeasures and measures, and put forward the path to improve the legal system construction. The author thinks that we should innovate the concept of data privacy protection, learn from foreign advanced experience, strengthen domestic legal protection, improve the law enforcement means and the internal governance mechanism of the platform, so as to improve the legal system of personal data privacy of e commerce platform users in China, maintain the order of e commerce platform, and promote the sustainable and healthy development of data economy. Changjun Wu | Xinru Wang "Research on Legal Protection of Personal Data Privacy of E-Commerce Platform Users" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44956.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44956/research-on-legal-protection-of-personal-data-privacy-of-ecommerce-platform-users/changjun-wu
Philosophy of Personal Data Protection in Electronic WalletsAJHSSR Journal
ABSTRACT:Electronic wallet comes with a system device that is connected to the internet, making it very
easy for consumers to operate it. Electronic wallets have the same function as physical wallets in general,
namely as aplace to store a number of information such as digit numbers, e-money cards, personal identity,
contact records, delivery history or billing information, customer sites and other things used when checking out
on e-sites. commerce. This condition needs to be responded to by protecting personal data. This research aims to
analyze personal data protection in electronic wallets in the context of legal objectives and personal data
protection for electronic wallet users as a human right. Protection of personal data in electronic wallets in the
context of legal objectives aims to provide justice, benefit and legal certainty for electronic wallet users.
Protection of personal data for electronic wallet users is a right to privacy that is recognized as a human right.
This right to personal protection is also a constitutional protection.
Keywords: Electronic wallet, personal data protection, philosophy
e-Governance Implementation In Ebonyi State Nigeria: Challenges and ProspectsEditor IJCATR
The deployment of Information and Communication Technology (ICT) in different facets of the world’s economy has yielded very reasonable results. ICT has blured the barriers of hinderances in tourism, trade, healthcare, education and training. In governance and administration, ICT applications have enhanced the delivery of public services to citizens and clients not only by improving the process and management of government, but also by redefining the traditional concepts of citizenship. This paper examined the challenges facing the implementation of e-Governance in Ebonyi State – Nigeria and highlights the prospects. The research used a primary source of data by distributing, collecting and analysing a total of 500 questionnaires administered to respondents in the research area (Ebonyi State). The research found that the most difficult challenges facing the deployment of e-governance in Ebonyi State were lack of steady power supply, poor communication infrastructure and high cost of computer and internet equipments. The survey also revealed that the use of e-governance would bring improved efficiency in government operations without necessarily increasing the cost of state governance. e-Governance would strengthen democratic principles and ideologies which inturn brings good governance to the people.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
LEGAL AND REGULATORY STRUCTURE PREVAILING IN THE UK RELATED TO DATA PRIVACY A...DamaineFranklinMScBE
Privacy ideas have had a long tradition within the UK and can be tracked prior to the common law and their recent appearance within the General Data Protection Regulation (GDPR)(Garcia-Alfaro et al., 2014). At the moment, Article 8 of the European Convention on Human Rights (ECHR) points out the right to privacy, which is also integrated into UK law owing to the Human Rights Act (HRA) of 1998 and also incorporated in the General Data Protection Regulation (Cornock, 2018). Despite the European Court of Human Rights, which is located in Strasbourg and not part of the European Union, it upholds privacy rights and data protection laws through its enforcement of the European Convention on Human Rights and Convention 108 and has also considered the question of the safeguards of personal data from the viewpoint of rights of access to such data (Zaeem and Barber, 2020).
Running head OPTIMIZATION OF TAX ADMINISTRATION1OPTIMIZAT.docxglendar3
Running head: OPTIMIZATION OF TAX ADMINISTRATION 1
OPTIMIZATION OF TAX ADMINISTRATION 21
Optimization of Tax Administration: Comment by 作者:
Add A Subtitle to Clarify the Focus of the Study – is there a focus on e government?
George Chu
University of Southern California
Abstract
Thise research proposal provides for the reviews of the current situation and previous literature on the problem challenges of tax administration. The discovered issues include problems with communication between public authorities and citizens, lack of relevant information about the allocation and use of funds. The review of the previous studies considered the approaches to the optimization of tax administration. Within the behavioral concept, the implementation of the e-government programs deems reasonable and well grounded. The advanced digitalization and widespread use of the social media require integration of these tools to the public services. Among the benefits of such measures are increased transparency, effective communication, and cooperation between government and taxpayers, motivation and empowerment of the citizens. The research should be conducted with the help of online data collection. The methods include the online questionnaire and content analyses of social media posts. Comment by 作者: Connect e government with tax administration more clearly
Keywords: tax administration, e-government, social media.
Optimization of Tax Administration
Introduction
The issue of taxation is essential for any society as it constitutes a basis of a state and enables a government to perform its primary functions. The citizens should provide a part of their income to receive security, healthcare, education, and other related services. The history of American taxation system traces back its origin to the times of the Civil War when Congress introduced the Revenue Act in 1861 ("U.S. Senate: The Civil War: The Senate's Story", 2018). There was a considerable scarcity of resources preventing the fight for national values and ideals. It was necessary to impose obligations on people to put the all the possible efforts together and win the democracy. Some citizens opposed the taxation policy, but the majority supported it with patriotic spirit. The same happened during the period of the Great Depression and the Second World War when most Americans voluntarily agreed to pay high taxes and unite their efforts for the common purpose (King, 2017).
Currently, the taxation administration features some problems, including the just proportion of income tax, debates about progressive and regressive systems, overall compliance and due payment. People often complain about high tax rates and inefficient application of the collected resources. The United States has one of the most significant state debt (Chantrill, 2018). One of the main contentious issues relates to the transparency of the information about taxpayers and the use of t.
Running head OPTIMIZATION OF TAX ADMINISTRATION1OPTIMIZAT.docxtodd581
Running head: OPTIMIZATION OF TAX ADMINISTRATION 1
OPTIMIZATION OF TAX ADMINISTRATION 21
Optimization of Tax Administration: Comment by 作者:
Add A Subtitle to Clarify the Focus of the Study – is there a focus on e government?
George Chu
University of Southern California
Abstract
Thise research proposal provides for the reviews of the current situation and previous literature on the problem challenges of tax administration. The discovered issues include problems with communication between public authorities and citizens, lack of relevant information about the allocation and use of funds. The review of the previous studies considered the approaches to the optimization of tax administration. Within the behavioral concept, the implementation of the e-government programs deems reasonable and well grounded. The advanced digitalization and widespread use of the social media require integration of these tools to the public services. Among the benefits of such measures are increased transparency, effective communication, and cooperation between government and taxpayers, motivation and empowerment of the citizens. The research should be conducted with the help of online data collection. The methods include the online questionnaire and content analyses of social media posts. Comment by 作者: Connect e government with tax administration more clearly
Keywords: tax administration, e-government, social media.
Optimization of Tax Administration
Introduction
The issue of taxation is essential for any society as it constitutes a basis of a state and enables a government to perform its primary functions. The citizens should provide a part of their income to receive security, healthcare, education, and other related services. The history of American taxation system traces back its origin to the times of the Civil War when Congress introduced the Revenue Act in 1861 ("U.S. Senate: The Civil War: The Senate's Story", 2018). There was a considerable scarcity of resources preventing the fight for national values and ideals. It was necessary to impose obligations on people to put the all the possible efforts together and win the democracy. Some citizens opposed the taxation policy, but the majority supported it with patriotic spirit. The same happened during the period of the Great Depression and the Second World War when most Americans voluntarily agreed to pay high taxes and unite their efforts for the common purpose (King, 2017).
Currently, the taxation administration features some problems, including the just proportion of income tax, debates about progressive and regressive systems, overall compliance and due payment. People often complain about high tax rates and inefficient application of the collected resources. The United States has one of the most significant state debt (Chantrill, 2018). One of the main contentious issues relates to the transparency of the information about taxpayers and the use of t.
Bayesian Analysis as a Method to determine the Limitations and Advances of e-...ijtsrd
In the process of modernization of the Public Administration, which reaches the justice systems of the region, in order to solve a de-legitimized system, with bureaucratic procedures, where there is discretion, violation of the rights of the accused and victims, And non-transparency, non-access to files by stakeholders and deprivation of liberty without sentences. Faced with this problem, Information and Communication Technologies are an instrument that has the potential to comply with the principles of publicity and transparency, streamline procedures, allow access to information and ensure prompt and expeditious justice, respecting the rights of Involved, as intended by the new Mexican criminal accusatory system. This paper aims to know the implementation of Information and Communication Technologies in the administration of justice in the State of Oaxaca, to determine their progress and limitations. The study is mixed, with the application of semi-structured interviews to judges and litigation lawyers, to know their knowledge of ICT and the use they give to their processes of formalities; As well as the documentary analysis that allows to know the legal advance and of the web pages on implantation of the TIC in the new adversarial accusatory system. In order to know the progress of the implementation of the new adversarial system, the databases on these advances will be analyzed and will determine if the use of ICT is being used in the processes that the law contemplates. MarÃa Esther Hernández-RÃos | Joselito Fernández Tapia | Guillermo Alfonso De la Torre-Gea"Bayesian Analysis as a Method to determine the Limitations and Advances of e-Justice" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd2402.pdf http://www.ijtsrd.com/other-scientific-research-area/other/2402/bayesian-analysis-as-a-method-to-determine--the-limitations-and-advances-of-e-justice/marÃa-esther-hernández-rÃos
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Shreedeep Rayamajhi
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principles-for-Human-Rights-in-the-Digital-Age by Shreedeep Rayamajhi.
Call for Submissions to the FOC 'Donor Principles for Human Rights in the Digital Age'
In 2023, under the United States’ Chairship of the Freedom Online Coalition (FOC) and in line with the activities outlined in the 2023 Program of Action, the FOC aims to increase ties between FOC multilateral policy development and country-level development activities. In pursuit of this effort, the United States and Canada have revitalised the FOC Funding Coordination Group (FCG) - a multinational and multistakeholder coordination, strategic planning, and global norms setting mechanism focused on bridging foreign policymaking and international development.
Recognising the need for a clear normative framework to guide donors to help ensure that foreign assistance in the digital space advances, rather than undermines, democratic values and respect for human rights, the ‘Donor Principles for Human Rights in the Digital Age’ will fill this gap by establishing the normative basis for foreign assistance in the digital realm.
Similar to Current State of Personal Data Protection in Electronic Voting: Criteria and Indicator for Effective Implementation (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. TELKOMNIKA ISSN: 1693-6930
Current State of Personal Data Protection in Electronic Voting: Criteria and… (Muharman Lubis)
291
implementation. Sound laws and regulations are the foundation of law enforcement and the
criminal justice system [4]. Another important point with regard to the prevalence of fraud
concerns its relationship to financial crises [5]. Thus, this study want to explore the typical legal
issues and its demand for personal data protection based on people perception and the
importance of legal literacy among them on how they view the current legal for preventing fraud
that might occur in the election.
2. Current State of Legal Regulation
There is no single law that provides a comprehensive protection of privacy or personal
data in Indonesia but there are certain regulations concerning the use of electronic data of
individual for the commercial purpose. The primary sources of electronic information and
transaction management are Act No. 11/2008 as amended by Act No. 19/2016 regarding the
Amendment of Electronic Information Transaction law, Government Regulation No. 82/2012
regarding Provisions of Electronic system and Transaction and its implementing regulation,
Minister of Communications and Informatics Regulation No. 20/2016 regarding the Protection of
Personal Data in Electronic System. However, a new draft bill on the Personal Data Protection
is being discussed intensively and we can expect single comprehensive regulation can come in
2018 or so, though the exact date remains uncertain and the bill still to be considered by the
house of representative in which pressure and socialization from society become essential.
There are several serious issues, which cyber law should cover namely cybercrime, digital
evidence, intellectual property, standardization, legislation synchronization, privacy protection,
e-service and jurisdiction [31]. Meanwhile, the rapid changes of technology might shift the
definition of certain terminology and the approach of certain procedure. Furthermore, there are
number of regulation with specific issues have been enacted by legislative over decades, which
might have different principles, attributes and consideration lead to different interpretation in the
court. These aspects complicate the citizen even certain legal experts to understand the
regulation.
The legal certainty represents a requirement, which decisions is made according to
legal rules linking to the individual autonomy in national jurisprudence. The legal system
protects the subject from arbitrary use of state power. In the civil law tradition, legal certainty is
defined in terms of maximum predictability of officials' behaviour. Based on establishment of
legislation No. 11/2011, verse 96 mentions that citizen can give suggestion either verbal and/or
written in establishment of law and regulation through several channels namely public opinion
meeting, work visit, socialization and seminar. However, many citizens have no knowledge
about this opportunity, as there is a huge gap in education in various cities in Indonesia and less
socialization in legal by related institution. The maintenance of law and order is prerequisite to
the enjoyment of freedom and happiness in the society. To assure the law enforcement takes
place, it requires the mutual respect and understanding between government agency body and
citizen of the community. However, there is exists a communication gap between the theory and
the practices for it is, either, restrictively protected by reactionary legislation or it is rampantly
abused by profit-driven businesses [6, 32].
The engagement of citizen improves the quality of policy being developed, then making
it more practical and relevant, also helping the services are delivered in a more effective and
efficient way. It is also a way for government to maintain of its relationship with citizens by
checking its reputation and status. In contrast, the lack of legal exposure might increase the
resistance from the citizen to accept new adopted technology compare remaining in the
traditional way. By providing opportunities for a diversity of suggestion and criticism enables
citizens to identify priorities. It leads to inspire more ownership of solutions and more
responsibility for policy implementation and fosters a sense of mutuality, belonging and a sense
of empowerment, which all of them can strengthen resilience. There is no doubt that the role of
regulation critical to maintain the public trust and confidence in e-voting system. In the Freedom
Act No. 14/2008 chapter 6, verse 21 and 22 mention the mechanism to obtain public information
based on principle of speed, timely and costly. The Electronic Transaction Act No. 11/2008
(verse 29, 30, 31 & 32) mentions the importance of privacy as human right and the obligation of
related organization to protect the integrity, dignity and confidentiality of consumer and
individual personal data, while the National Registration Act No. 23/2006 (verse 84) defined the
kind of personal data that should be protected. The Banking Act No. 10/1998 (verse 40)
3. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 290 – 301
292
mentions that bank has the obligation to protect the confidentiality of its client personal data and
secure his savings besides the exemption purpose stated by the regulation while Bank
Indonesia Regulation No. 7/15/PBI/2007 instructs the implementation of risk management in the
utilization of information technology in the bank. On the other hand, the Capital Market Act No.
8/1995 (verse 68, 89, 97) mention the procedure for the submissions of confidential and
sensitive information while based on Financial Services Authority Regulation No.
1/PJOK.07/2013 instructs the protection of consumers personal data by prohibiting the financial
service actor to provide data to third party except when the consumer has provided written
consent or when law requires such disclosure. Election is a process in which voters choose their
representatives and express their preferences for the way that they will be governed. Thus, the
election commissioner should accommodate election requirements namely robustness to
fraudulent behaviours, consistency of scheme and mechanism, security and privacy measure
and transparency of process. Constitutional Court gave the green light for electronic voting with
its verdict No. 147/PUU-VII/2009 as legal basis.
Government introduced SIAK (Residence Administration Information System) based on
National Registration Act No. 23/2006 to anticipate common failures in previous election. The
system has purpose to increase the accuracy of data population and adjust with government
policy such as list of voters data through one integral basis data. Then, the second issue relate
to the disfranchisement by the government that prohibit military and police to casting vote as a
matter of protecting their neutrality while others argued that every person has same right and
responsibility based on constitution. To intercede this issue, constitutional court grant the judicial
review in judicial verdict no. 22/PUU-XII/2014 that state military and police have no right to vote
in 2014 election due their role of responsibility as country apparatus. Besides that, there are
many other issues attached to the previous election such as money politics, children
involvement in campaign, election committee neutrality, optimized monitoring process, political
violence, etc. that increase the doubt of people in believing the government competency to
implement good quality of election while some of them also worry that political interest get
involved. Nevertheless, the regulations in the form of content should be constantly updated and
adjusted to the latest technology and based on elaborate discussions between the regulators,
organizations and stakeholders [7]. But, privacy protection as a social issue has strong need to
be simplified by bringing down legislative requirements into technological reality and to design
new technical solutions [8]. It is not solely a technical or policy issue rather it depends on
behaviour as it is an on-going initiative, not a short-term project or goal [9]. Strong impression
might advance the privacy law-related as the regulator perceived its benefits in recognition of
privacy rights but the threats and incursions are developing more quickly and in many areas
citizen's privacy may be slipping away, particularly disorderly and politicised development of
amendments [10].
In Australia, casting a vote for citizen is compulsory by section 245(1) of the
Commonwealth Electoral Act 1918, which states: ‘it shall be the duty of every elector to vote at
each election’. The Act requires Australian citizens aged 18 years and over to cast a vote
except persons who prove to be crazy, prisoners serving more than three years and persons
who have been convicted of treason or treachery. Meanwhile, Sweden is generally considered a
good democratic example in terms of having well-informed, interested citizens and a high
degree of public participation in elections, which at over thirty percent use postal votes.
Furthermore, as postal votes must be distributed and placed in return mail before the scheduled
Election Day, it is sometimes referred to as a form of early voting and can be used as absentee
ballots. There is also allegation that postal votes have been used by the ruling party to secure
seats in certain constituencies, which it is more amenable to both fraud and manipulation than
voting at polling places. Despite the controversy arises, there has been a strong reluctance by
governments to move away from the system as they claim to be proven and secure traditional
paper-based methods, while it can also weaken the weight, dignity and symbolic importance of
the traditional election day [11]. In order to make electoral commissions able to ascertain the
suitability of systems for use in elections, certification procedure are commonly adopted that
was begin with the definition of precise characteristics a system should exhibit and must define
methods to measure conformance of the system to the reference model [17]. The lack of a
coherent and concrete concept of privacy can also hinder the development of technologies,
legislations, public policies and practices pertaining to consumers, employees and citizens in
both local and global sector [18].
4. TELKOMNIKA ISSN: 1693-6930
Current State of Personal Data Protection in Electronic Voting: Criteria and… (Muharman Lubis)
293
The Philippines Commission on Elections began efforts to automate the electoral
process in 1992. Various pilot projects of mixed success eventually saw the 2010 local and
national elections employ technology to record ballots and count the vote but there were
numerous hitches and allegations of irregularities in which about 465 of 76,000 machines had
problems and most of them were replaced [12]. Despite glitches with the new computerized
counting machines and violence that claimed at least nine lives, election officials hailed the vote
as a success in a country. From the early introduction of voting machines in the Netherlands,
which become the reference of Indonesian legal framework, the regulation about electronic
machines is remained limited. In 1989, the Electoral Code was revised thoroughly with a few
references to e-voting. The code explicitly stated local authorities could decide if voting means
other than ballot papers are used, that this was only allowed with technical appliances approved
by the Home Affairs Ministry and other rules would be determined in the Electoral Decree,
although never elaborated further [13]. The Dutch legal framework was inadequate to effectively
regulate the development and the utilization of voting machines, especially regarding security
safeguards, the certification process and tabulation software. In anticipating the failures of
implementation, agencies' best defense against the risk is to pay more attention to their privacy
practices and improve their standards of protection [19].
In general, there are numerous studies indicated that IS project management still show
its high failure rate, which major issues related to uncertainty of legal concept and lack of focus
in the policy [20]. In Great Britain, there were 232 cases of alleged electoral malpractice (38% to
voting offences and 34% related to false statement) reported by the police during the election,
which one case had resulted in prosecution and conviction but over half of the cases (137 in
total) required no further police action [4]. Meanwhile, in US, approximately 24 million voter
registrations are no longer valid or significantly inaccurate, which 1.8 million decease individuals
are listed as voters and 2.75 million people have registrations in more than one state while
researchers estimate at least 51 million (24% of population) eligible US citizens are unregistered
[5]. By recognizing the benefits of IT governance and investment are essential for a competitive
advantages and to reducing the failure rate of IT projects [21]. Thus, it is better to detect the
fraud prior to election either through ecological information of political structure or return sheets
on the reported number of electoral violation [6].
3. Research Methodology
The use of ordinal logistic regression is necessary to reveal the hidden fact among the
citizen in the sense of their motivation in casting votes decision. Regression coefficient is more
informative because it presents by how much the dependent variable changes as the
independent variable changes, whereas the correlation coefficient presents only whether or not
the two variables move in the same or opposite directions and the degree of linear association
[15]. Meanwhile, the standard error measures how sensitive the estimate of the parameter is to
changes in a few observations in the sample [16]. The scale that were used for this study
consisted six pointer which are (1) strongly disagree/SRD, (2) disagree/D, (3) slightly
disagree/SLD, (4) slightly agree/SA, (5) agree/A; and (6) strongly agree/SA. Before run ordinal
regression, those scales were changed to three pointers, disagree, neutral and agree to narrow
down the result and to have in depth analysis of the direction. There are 12 (twelve) statements
to represent legal demand in the context of personal data protection attributes namely
complexity, comprehensive, principles, certification, timeframe, security, verification, monitoring,
remedies, data type, benchmark and implementation.
1. LR1: In the issue of privacy, the respected regulation in Indonesia is complicated to
be understood.
2. LR2: DPR should aware the importance to enact single regulation for personal data
protection comprehensively.
3. LR3: Privacy principles are required in voting regulation as the guarantee for
successes of implementation.
4. LR4: There must be trusted certification procedures for hardware and software by
independent expert stated by voting regulation.
5. LR5: DPR should enact all correspondent regulation at least two-year before the
election to see the effectiveness.
5. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 290 – 301
294
6. LR6: Personal data protection regulation should accommodate the secure
techniques and methods to be proof secured transparency.
7. LR7: Personal data protection regulation is needed to allow verification process.
8. LR8: Personal data protection regulation is required for monitoring purposes in whole
voting activities.
9. LR9: Severe penalties should be applied for any misuse of voters’ data.
10.LR10: It should be stated in regulation about the type of data to be used for election
purposes.
11.LR11: KPU should learn the other country regulation regard to privacy and data
protection.
12.LR12: KPU should learn on how the other countries implement electronic voting.
Table 1. Frequency Distribution of Legal Regulation
Items (%) SRD (1) D (2) SLD (3) SLA (4) A (5) SRA (6)
LR1 21 (2.7%) 32 (4.1%) 72 (9.2%) 156 (20%) 334 (42.9%) 164 (21.1%)
LR2 11 (1.4%) 20 (2.6%) 24 (3.1%) 65 (8.3%) 366 (47%) 293 (37.6%)
LR3 11 (1.4%) 10 (1.3%) 35 (4.5%) 88 (11.3%) 412 (52.9%) 223 (28.6%)
LR4 11 (1.4%) 21 (2.7%) 26 (3.3%) 95 (12.2%) 374 (48%) 252 (32.3%)
LR5 9 (1.2%) 21 (2.7%) 33 (4.2%) 111
(14.2%)
381 (48.9%) 224 (28.8%)
LR6 16 (2.1%) 11 (1.4%) 27 (3.5%) 83 (10.7%) 382 (49%) 260 (33.4%)
LR7 15 (1.9%) 13 (1.7%) 29 (3.7%) 107
(13.7%)
416 (53.4%) 199 (25.5%)
LR8 17 (2.2%) 16 (2.1%) 28 (3.6%) 104
(13.4%)
396 (50.8%) 218 (28%)
LR9 31 (4%) 26 (3.3%) 34 (4.4%) 77 (9.9%) 235 (30.2%) 376 (48.3%)
LR10 11 (1.4%) 23 (3%) 36 (4.6%) 115
(14.8%)
409 (52.5%) 185 (23.7%)
LR11 15 (1.9%) 31 (4%) 48 (6.2%) 136
(17.5%)
334 (42.9%) 215 (27.6%)
LR12 14 (1.8%) 16 (2.1%) 32 (4.1%) 95 (12.2%) 321 (41.2%) 301 (38.6%)
This study has four kind of results, the first one is the pilot study that has 44 samples to
see first the reliability and validity of each items, while the hand to hand survey have done in two
biggest city in Indonesia, which are Medan and Jakarta that has 336 and 308 samples
respectively. In addition, there are 102 samples from online contributor, in which comprises on
total of 790 samples. Due to several criteria, 11 data was eliminated which relate to missing
data and invalid data. The missing value in the demographic data except for gender will be
predicted based on age, election, education, working and earnings through the code number of
survey that reflect the location and field of participants. Meanwhile, for the invalid data, caused
by multiple answer, it will be used the median value of total samples in the survey. Meanwhile,
the strict number of pieces survey was printed and delivered to avoid snowball effect, which has
high return reach 86% with 800 paper delivered offline and reach 51% with 200 invitation online.
Most respondent have kind of agreement level with each legal statement in the survey as high
indication of their demand as they increasingly become more aware about the importance. From
the Table 1, it show the result of LR7 (53.4%), LR3 (52.9%) and LR10 (52.5%) are the highest
percentage of agreement (normal) above the other legal demand with more than half of
population while, LR2 (8.3%), LR9 (9.9%) and LR6 (10.7%) are the lowest percentage of
agreement (slight). Meanwhile, based on table II, the education, age and legal literacy became
the most frequent demographic factors, which have significant value compare with the others.
By having this result, it could predict the tendency of certain eligible voters based on their
characteristics and circumstances and provides the general idea of legal demand.
7. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 290 – 301
296
Education background shows the significant value (0.000) to all LR items except LR5. It
explains that educational institution play critical role to shape people mind to support or reject
the bill proposed by DPR and to evaluate the effectiveness of certain regulation and its
enforcement. Even though, the decision to approve the bill or to amend the legislation
completely in the DPR authority, people can give pressure against DPR. Furthermore, being a
bachelor student decreases the ordered logit of being in the lower levels of the LR2 category by
-19.194 lower than diploma student while the other variables in the model are held constant.
The bachelor student is more likely to disagree that DPR should enact supportive legislation for
e-voting initiative. The DPR should take measured and appropriate steps to evaluate the bill
proposed carefully and openly consider any valuable feedback from practitioner and citizens,
which is not necessary on single comprehensive act. Also, a decrease by bachelor student with
-17.252 (LR10) and -17.459 (LR12) of ordered logit of being lower levels and the other variables
in the model are held constant. Based on OLR result, education becomes the highest
relationship and solely category, which give the strongest effect on LR2, LR10 and LR12. The
reason related to the technical terms and confusing jargon used in the process of enactment,
database management and benchmarking only can be understood properly through learning
process in educational institution. On the other hand, the second category of age (21-25) and
entrepreneur shows sig. value of 0.002 and 0.037 in LR3, which show high relationship and
strong effect to realize that privacy principles are important elements in the regulation. They
want government to discuss privacy concept and principles carefully before enacting the
regulation to avoid misconception among citizen. Essentially, the privacy concept authorized by
regulation is the most important part to set the basis in executing the plan and useful element to
counter the problem in each implementation phase [22].
4. Factors Influence Privacy Protection Measures
Most privacy protection approach could be improved through the active involvement
and participation from users, commissioner and legislative member. People feel that the long
vote count can create segregation among community, which might lead to greater scale of
conflict. Thus, the use of e-voting could prevent this worst possibility by quick and accurate
tabulation process so the announcement of election result will be less than a day. Meanwhile, e-
voting also could save APBN largely into other allocation slot for national growth and poverty
eradication. Classic problem from previous election was related to data duplication and
manipulation can be solved through this type of voting system. By perceiving benefit from
electronic mechanism in casting and tabulating the votes, mostly the people proven to feel
confidence and exciting to contribute to the success of e-voting. They are also eager to help and
look out on the other way to enhance the process to the further level so it can bring more benefit
to the nation. People have specific reason, perception and motives to performing their best of
practice and action according to their ability to secure the election and its personal data
protection.
Table 3. Percentage of Legal Illiteracy from Survey
D/A L1: In
learning
Process
L2: Legal
Awareness
L3: Political
Participation
L4: Public
Education on
Law
L5: Legal
Academician
L6:
Legislating
the Act
Complexity 15/85 18/82 11/81 24/76 44/56 3/97
Inconclusive 9/91 3/97 4/96 13/87 4/96 3/97
Principles 8/92 6/94 0/100 13/87 4/96 8/92
Certification 9/91 5/95 0/100 13/87 8/92 5/95
Speed 9/91 6/94 4/96 11/89 16/84 3/97
Technicality 7/93 6/94 7/93 7/93 0/100 14/86
Verification 8/92 4/96 0/100 15/85 12/88 16/84
Monitoring 8/92 8/92 11/89 9/81 8/92 8/91
Remedies 13/87 8/92 7/93 16/84 16/84 8/91
Terminology 10/90 8/92 4/96 13/87 0/100 11/89
Literature 12/88 14/86 7/93 15/85 12/88 5/95
Benchmark 8/92 8/92 4/96 16/84 8/92 8/91
8. TELKOMNIKA ISSN: 1693-6930
Current State of Personal Data Protection in Electronic Voting: Criteria and… (Muharman Lubis)
297
In this study, the researcher classifies the citizen based on his/her legal literacy skill into
six categories namely in learning process, legal awareness, political participation, public
education on law, legal academician and legislating the act. The first number indicated
percentage while the next number indicated number of participants. According to the result, L3
have definite agreement upon the privacy principles are required in the related election law.
Also, they want to have specific verse about certification procedure for software and hardware
and standard verification for vote content in the e-voting system. Meanwhile, L5 emphasizes the
legal definition and proven technique to be more important compare to the other issues in the e-
voting system. Interestingly, majority L6 feel the related privacy law are complex to be
understood, whereas they involve directly in the parliament drafting process. Majority citizen see
the parliament and government respond very slowly to the privacy issue, especially to draft and
enact the regulation. The other categories also feel the complexity of the current legal regulation
while there is around 44% (56) of L5 say the otherwise. Majority citizen also think that current
regulation have not specified the hard punishment to the illegal actor. On the other hand, they
want to have comprehensive privacy related law, which has been through comparison study
with other relevant country, either its concept or its practice as the important requirement to
have national e-voting. The enactment of legal regulation can raise the concern of privacy
protection from eligible voters but it has no specific effect or relationship to shape the perception
of eligible voters upon e-voting benefits.
There has been substantial effort to characterize or categorize users according to their
privacy concern such as Altman [35], which made significant contributions by initiating a theory
of privacy processes with a focus on social interaction, Meanwhile, Staddon, et al., [36]
investigate concern, control and sharing and explore on how they are connected to difference
behavior and attributes. Most people agreed with the concepts of privacy as a human right but
they had more diverse viewpoints on privacy as a right not to be annoyed and they also
revealed contradiction between privacy right and privacy norms [38]. However, even with the
best attempts at education, many users will be left unqualified to make their own privacy
decisions for every scenario because of the problem complexity [34]. The source of information
and intensity of communication between citizens can determine the reaction and perception of
the importance and objective of e-voting, especially the procedure and policy of privacy
protection. Designing any privacy protection means the construction of a set of protocols that
will satisfy the privacy requirements for the system without compromising the privacy of the
individual datasets of the participants [37]. Measuring elections against a free and fair standard
suggests a dichotomy when elections are actually political processes more realistically judged
along a continuum and placed in context. This focus on the free and fair determination has
encouraged international election assessments to make categorical, “bottom-line” judgments
that fail to take nuances and context into account. Such judgments imply, inaccurately, that
elections in democratic countries are beyond reproach [27]. Incorporating a duty of care into the
definition allows for segmentation of malpractice by level of responsibility such as a senior
election management official will have a heightened duty relative to the responsibilities of a
temporary poll worker [28].
By extracting combining other result from similar project to align with the necessity of
regulation, this study develop criteria and indicator [14, 22], which showed privacy protection
could be improved through the active involvement and participation from users, committee and
legislative member. There are 11 criteria with its indicator to strengthen the process of personal
data protection in electronic voting. Mostly, citizens want to know the tabulation result quickly as
possible to avoid segregation among community that can lead to greater scale of conflict.
Meanwhile, citizen perceived that the implementation of electronic voting could save large
national budget into other allocation for national growth. They also aware that classic problem
from previous election which is data duplication and manipulation can be solved through
electronic adoption. By perceiving benefit from electronic mechanism in casting and tabulating
the votes, the citizen feels confidence and exciting to participate in electronic election and look
out on how the implementation can bring the nation to further level. These criterions have
positive direct influence towards personal data protection significantly. Thus, the citizens have
specific reason, perception and motives to performing best of their action according to their
ability to secure the general election and its personal data protection.
9. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 290 – 301
298
Table 4. Criteria and Indicator for Personal Data Protection Measures
Criterion Indicator
Expectation to have quick result through e-voting Tabulation results are produced and validated at least 24 hours
after election has ended
The use of e-voting will increase the accuracy of
personal information to prevent data duplication on
voter's list and vote content
Eligible voters can cast vote wherever they are free without being
bound by their address when the authentication take place
The use of e-voting will save government budget a
lot
Accountability budget report of election implementation shows the
savings more than a quarter than previous one.
Confidence to cast vote freely if the machine was
proved in its credibility and eligibility through
international standard
Testing, checking and certification result of the voting machine is
published online that allowed public to look them at
Excitement to see own country to be one step
closer in implementing e-voting like other country
Frequent news broadcasts on the progress e-voting
implementation
Wonder to know the mechanism to report the
privacy violation
Online publication and document provided by election
commissioner on operational standard of electronic election in
their formal website
The encryption of vote content from plain text to
cyphertext will prevent unauthorized party to gain
advantages
Comparison test of various encryption methods with different
given context
The e-voting system should have simplified its
user interface
GUI and accessibility test to ensure they meet specification,
sequence and objective
The candidate or party that voters will choose is
confidential
All ballot papers have to be sealed in the supreme court under
strict condition and safeguards based constitution authorization,
while they can only be retrieved by court order
Information on whether voters have casted vote or
how they casted vote is secured and have not
been published
The voting room/space should not be under surveillance camera
Disconnecting ballots content and identity of
voters should preserve secrecy
The principle must be mandated by regulation
There are at least three important concerns from society towards privacy protection in
the electronic voting, which are the reporting mechanism, encryption system and graphical user
interface. Through decade, some people might witness the privacy infringement occurred next
to them but they were reluctant to report to the authorized body. The reason behind it could be
varied such as the complexity of channel and procedure for reporting, extreme responsibility
being burdened to the one who reported or no further follow-up from election watchdog.
Meanwhile, challenges remain with the data encryption security and safety such as modification,
corruption and data theft. The concern has been growth among society that quite possible has
been triggered by the fear of vandalism, terrorism and infringement. Initially, encryption comes
out as double edge sword, which provides protection from malicious access in one side while it
also can be used for dangerous reason. Furthermore, citizen also concern on the various aspect
of graphical user interface such as component, configuration and features. Considering the
multi-ethnic, diverse culture and different education background from nation, the GUI design
development must take important note of accessibility, usability and simplicity. Interestingly,
technical aspects also gain important spot based on citizen perspective, as they became more
knowledgeable due to massive information from media. Citizen want the electronic voting
procedure and mechanism value privacy of the user more than anything else, such as the
protection of time of votes casted, voter's expression, right fulfilment, etc. All of these criterions
became the most important aspect from the responsible committee to define privacy concept
and determine privacy requirement into the election system.
In effect, differences in the privacy values of the two parties led to differences in their
expectations of the appropriate community because they are not articulated but remain below
the surface [28]. Meanwhile, users more often demand quality enhancements (by approximately
threefold) than privacy enhancements but privacy features determine their satisfaction with the
products [29]. In addition, strong privacy guarantees necessarily obscure information, when the
intentional introduction of randomness into published outcomes may require adjustments to
specific implementations of scientific replication [30]. In addition, voters' background
characteristics have a significant impact on their ability to vote without error, both voters
unintentionally cast for the wrong candidate and unintentional undervotes [33]. However, it is
important to understand how user privacy concern have evolved over time that increase the
intensity of data usage, wherein older people are much less likely to reveal information than
younger people and refusals to reveal information have risen over time [39]. The lack of a
10. TELKOMNIKA ISSN: 1693-6930
Current State of Personal Data Protection in Electronic Voting: Criteria and… (Muharman Lubis)
299
coherent and concrete concept of privacy can also hinder the development of technologies,
legislations, public policies and practices pertaining to consumers, employees and citizens in
both local and global sector [23]. Fundamental changes in information systems and the heavy
dependence on computers increased significantly the risk of fraud. While no genuinely new
frauds are expected, electronic variations of traditional frauds will be carried out with greater
efficiency and effectiveness, will have potentially greater impact and will be more difficult to
investigate [24]. According to Brenner [25], someone commits fraud if the following four
elements are proved beyond a reasonable doubt, which are Actus reus (the perpetrator
communicates false statements to the victim), Mens rea (the perpetrator communicates what
she knows are false statements with the purpose of defrauding the victim), Attendant
circumstances (the perpetrator's statements are false) and Harm (the victim is defrauded out of
property or something of value). There are several serious issues, which cyber law should cover
namely cybercrime, digital evidence, intellectual property, standardization, legislation
synchronization, privacy protection, e-service and jurisdiction [26].
The complexities of legal regulation to be understood by citizen have been directed by
the lack of accessibility of specific law information to be learnt properly by relevant agency lead
to failure of principle practices and awareness in personal data protection. Therefore, the lack of
public participation and discussion in drafting the legislation before regulation enactment
resulted to an increase of citizen passiveness towards government attempt in enhance personal
data protection in election. Moreover, the lacks of synergize and coherent idea between public
interest and government concept implicated to vague and uncertain of verse definition and
context. More cooperative and courteous of legal institution to convey the message in creating
uniformity of best election practice have positive influence to help citizen better understanding of
legal product implication and function. The high risk of exposure to the family might be as the
crucial key for the citizen to resist in helping privacy violation precaution as government attempt
to protect personal data in electronic election. Less interaction and communication among
community increase the opportunities of privacy violation or possibility of privacy incident
occurs, and vice versa. By establishing meaningful relationship with the society wherein the
leading edge technologies provide high expectation as fortress to block serious threat internally
and externally to privacy protection.
5. Conclusion
In the context of election, based on the user perspective through survey, the legal
framework was inadequate to effectively regulate the development and use of voting machines,
especially regarding security safeguards, the certification process and tabulation software.
Meanwhile, people have viewed that current regulation is complicated to understand, which
occur because various reasons such as the lack of accessibility, education and awareness. It
leads creating misconception and misunderstanding among people of e-voting objective and
intention. Thus, the election committee should engage people in determining their policy and
direction especially related to their legal demands by coordinating them with relevant institution.
To ensure the personal data protection, the compliance enforcement towards the guidelines
became the critical factor. It has to be capable of extracting relevant security needs from social
requirements and determining an acceptable level of residual risk to the community. It also
needs to maintain documentation, which provides evidence of the decision maker’s due
diligence and demonstrates informed risk based decision-making. Thus, the parliament and
government should recognize both the rights of individuals to protect their personal data,
including rights of access and correction, and the needs of election commission to collect, use
or disclose personal data for legitimate and reasonable purposes in e-voting. Then, they should
discuss and enact the comprehensive privacy regulation, as it is an essential requirement in the
following initiative.
References
[1] Burstein A, Dang S, Hancock G, Lerner J. Legal issues facing election officials in an electronic-voting
world. Social Science Research Network. 2007.
[2] Azhari R. E-voting. Fakultas Ilmu Komputer Universitas Indonesia 2005. Available at:
http://staf.cs.ui.ac.id/WebKuliah/riset/hibah-B/VVCS/pdf/e-Voting.pdf.
11. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 290 – 301
300
[3] Priyono E, Dihan FN. E-voting: Urgency of transparency and accountability. Seminal Nasional
Informatika. UPN Yogyakarta. 2010.
[4] Spink J, Moyer DC. Defining the Public Health Threat of Food Fraud. Journal of Food Science. 2011;
76(9).
[5] Reurink A. Financial Fraud: A Literature Review. MPIfG Discussion Paper. 2016; 16(5).
[6] Leemann L, Bochsler D. A systematic approach to study electoral fraud. Electoral Studies. 35; 33-47.
[7] Pearson S, Benameur A. Privacy, Security and Trust Issues Arising from Cloud Computing. Proc.
IEEE CloudCom. 2010: 693-702.
[8] Bekara K, Laurent M, Nguyen TH. Technical enforcement of European Privacy Legislation: an access
control approach. Proc. NTMS. 2012: 1-7.
[9] Power EM. Developing a Culture of Privacy: A Case Study. IEEE Security & Privacy. 2007; 5(6):
58-60.
[10] Dixon T. Valuing Privacy: An Overview and Introduction. UNSW Law Journal. 2001; 24(1): 239-246.
[11] Olsen J, Astrom J. Electronic voting in Sweden: hare or tortoise? In: N Kersting, H Baldersheim.
Editors. Electronic voting and democracy: a comparative analysis. Basingstoke: Palgrave Macmillan;
2004: 149.
[12] Gomez J. Philippine Election 2010: Filipinos vote amid violence, computer glitches. Retrieved June
25, 2012 from The Huffington Post: http://www.huffingtonpost.com/2010/05/10/philippine-election-
2010-_n_569800.html.
[13] Goldsmith B, Ruthfauff H. Case Study Report on Electronic Voting in the Netherlands. National
Democratic Institute, IFES. USAID. 2008: 259.
[14] Lubis M, Kartiwi M, Zulhuda S. Decision to casting a vote: an ordinal regression statistical analysis.
Proc. ICT4M. 2014.
[15] Eboli L, Mazzulla G. An Ordinal Logistic Regression Model for Analysing Airport Passenger
Satisfaction. EuroMed Journal of Business. 2009; 4(1): 40-57.
[16] Schroeder LD, Sjoquist DL, Stephan PE. Understanding Regression Analysis: An Introductory Guide.
Sage Publications, The International Professional Publishers. 1986.
[17] Prandini M, Ramilli M. A Model for E-voting Systems Evaluation Based on International Standards:
Definition and Experimental Validation. e-Service Journal JSTOR. 2012; 8(3): 42-72.
[18] Dinev T. Why would we care about privacy. European Journal of Information Systems. 2014; 23(2):
97-102.
[19] Evans K. Vidal-Hall and Risk Management for Privacy Breaches. Security & Privacy. 2015; 13(5):
80-84.
[20] Putra SJ, Subiyakto A, Ahlan AR, Kartiwi M. A Coherent Framework for Understanding the Success
of an Information System Project. TELKOMNIKA Telecommunication Computing Electronics and
Control. 2016; 14(1): 302-308.
[21] Amali LN, Mahmuddin M, Ahmad M. Information Technology Governance Framework in the Public
Sector Organizations. TELKOMNIKA Telecommunication Computing Electronics and Control. 2014;
12(2): 429-436.
[22] Lubis M, Kartiwi M, Zulhuda S. Privacy and Personal Data Protection in Electronic Voting: Factors
and Measures. TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1):
512-521.
[23] Dinev T. Why would we care about privacy. European Journal of Information Systems. 2014; 23(2):
97-102.
[24] Lucian V, Warren M, Mackay D. Defining Fraud: Issues for Organizations from an Information
Systems Perspective. 7th Pacific Asia Conference on Information Systems. Adelaide, South
Australia. 2003: 971-979.
[25] Brenner SW. Is There Such a Thing as Virtual Crime?. California Criminal Law Review. 2001: 1.
[26] Makarim E. Pengantar Hukum Telematika: Suatu Kompilasi Kajian. 1st Edition. Jakarta, Indonesia:
RajaGrafindo Persada. 2005.
[27] Alvarez RM, Hall TE, Hyde SD. Election Fraud: Detecting and Deterring Electoral Manipulation,
Brookings Institution Press. 2008.
[28] Codio S, Kafura D, Quiñones MP, Kavanaugh A, Gracanin D. Identifying Critical Factors of
Community Privacy. ASE International Conference on Privacy, Security, Risk and Trust. Amsterdam.
2012: 666-675.
[29] Preibusch S. The Value of Web Search Privacy. Computer and Reliability Societies. 2015: 24-32.
[30] Heffetz O, Ligett K. Privacy and Data-Based Research. The Journal of Economic Perspectives. 2014;
28(2): 75-98.
[31] White I, Johnston N. Electoral fraud since 2010. Briefing Paper Number 6255. House of Commons
Library. UK. 2017.
[32] pewcenteronthestates. Inaccurate, Costly and Inefficient. Election Initiative. 2012 Issue Brief.
[33] Herrnson PS, Hanmer MJ, Niemi RG. The Impact of Ballot Type on Voter Errors. American Journal of
Political Science. 2012; 56(3): 716-730.
12. TELKOMNIKA ISSN: 1693-6930
Current State of Personal Data Protection in Electronic Voting: Criteria and… (Muharman Lubis)
301
[34] Allison DS, Capretz MA, Tazi S. A Privacy Manager for Collaborative Working Environments.
Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 2013: 110-116.
[35] Altman I. Privacy Regulation: Culturally Universal or Culturally Specific. Journal of Social Issues.
2010; 33(3): 66-84.
[36] Staddon J, Huffaker D, Brown L, Sedley A. Are privacy concerns a turn-off? Engagement and privacy
in social networks. Symposium on Usable Privacy and Security. 2012: 1-13.
[37] Qusa H. Does a privacy risk impose a real threat in collaborative environments?. Palestinian
International Conference on Information and Communication Technology. Gaza. 2013: 66-70.
[38] Huang HY, Bashir M. Is Privacy a Human Right? An Empirical Examination in a Global Context.
Annual Conference on Privacy, Security and Trust. 2015: 77-84.
[39] Goldfarb A, Tucker C. Shifts in Privacy Concerns. The American Economic Review. 2012; 102(3):
349-353.