SlideShare a Scribd company logo
1 of 42
Information and
E-democracy
George Cambourakis
Prof National Technical University of Athens
Electric and Computer Engineering School
European Communication Institute Governor
E-Voting Systems
House of Commons on November 11, 1947
 Many forms of government have been tried, and
will be tried in this world of sin and woe. No one
pretends that democracy is perfect or all-wise.
Indeed, it has been said that democracy is the
worst form of Government except all those other
forms that have been tried from time to time.
Winston Churchill
Average GDP
per capita
adjusted for price
changes over time
(inflation) and
price differences
between countries
– it is measured in
international-$ in
2011 prices.
Average
GDP per
capita 2016
Based on world bank 2019
Population & Poverty thresholds
(international dollars 2011)
Does Democracy proliferate?
 Today, for the first time in history, there
are more democratic states than non-
democratic states. Indeed, some view
the rise of democracy as perhaps the
most important event to have transpired
in the 20th century.
Sustainability of Democracy
 In consolidated democracies, there is a
growing trend of apathy and
disillusionment among voters, particularly
the young, with respect to politics whereas in
emerging democracies voter turnout tends to
be high and many democratic movements are
led by youth.
Is Democracy a façade?
 The iron law of oligarchy is a political
theory, first developed by the German
sociologist Robert Michels in his 1911
book, Political Parties. It asserts that rule
by an elite, or oligarchy, is inevitable as an
"iron law" within any democratic
organization as part of the "tactical and
technical necessities" of organization.
confidence
 At the turning of 21st
century a
survey by The Economist found that
in 11 of 12 established democracies,
public confidence in political
leaders and institutions has declined
steadily over the past few decades. It
is still valid…
Democracy and Growth
 While it is often claimed that authoritarian
regimes are better at bringing about economic
development, comprehensive statistical
analyses do not back up this hypothesis. First,
as Przeworski found, wide-ranging statistical
analyses confirm that no linkage can be
drawn between authoritarian regimes and
economic development.
E-elections
 cannot be considered as a pure
practice of e-democracy, since
there has been too little research
into e-voting to draw definitive
conclusions in terms of its actual
influence.
Use of different e-tools in EU Member States based on information collected from
The public sphere
 is for the state what the market is for the economy.
in the public sphere, the goods that are exchanged
and the currency that is traded are not of economic,
but of political nature. The main product of the
public sphere is public opinion, and ideas are the
“goods” that are exchanged. This view equates the
public sphere with a “free marketplace of ideas,” a
libertarian ideal where everyone is able to propose
ideas, and where the best idea (?) will win.
Public sphere constitutive elements
 Constitutionally guaranteed civil liberties
 Free, plural, and independent media system
not under state control
 Access to public information
 A vibrant civil society
 Sites of everyday talk about public affairs
 In human societies collective
decisions can be reached as a result of
three different mechanisms (or
combinations thereof): by talking, by
voting or by fighting.
An e-voting system should be
Secure. That is,
Democratic. Only eligible voters can cast votes, and
no voter can cast more than one vote.
Accurate. No vote can be altered, duplicated or
eliminated without being detected.
Private. All votes remain secret while the voting takes
place, and each individual vote cannot be linked to the
voter who cast it. For uncoercibility, no voter should be
able to prove the value of his/her vote to another party.
An e-voting system should be
 Universally verifiable. Any observer can be convinced
that the election is accurate and that the published tally
is correctly computed from votes that were correctly
cast.
 Robust. All security requirements are fully satisfied,
despite failure and/or malicious behavior by any
(reasonably sized) coalition of parties (voters,
authorities, outsiders).
• Practical. That is, convenient, compatible with a variety of
standard platforms and technologies, and accessible to the
disabled.
E-VOTING INCOERCIBILITY
 A system is incoercible if the voter
cannot prove his operations to a
coercer, i.e. a person who would
prescribe a voter to send a ballot of
some very specific kind and later check
that it is present in the results.
E-Voting. Blind signature protocol
 The major problem of this scheme is that a
failure of a single voter can disrupt the whole
election process. Specifically, to maintain a
secure election, even people who were not able
to vote must verify that no vote was counted for
them. Besides, the fact that the scheme requires
a communication that is both secret and
anonymous, it is impractical in real elections.
Schemes based on blind signatures ([Fujioka A., Okamoto T. & Ohta K.,
1992], [Sako, 1994], [Okamoto, 1997])
E- Voting. Mix-Nets protocol
 The Chaum voting scheme uses an
anonymous communication channel and
provides unconditional security against
tracing the votes but the failure of a single
voter can disrupt the election. This
approach is not practical for large-scale
elections because of the fact that the election
must be restarted when a failure is traced.
Schemes based on mix nets [Chaum, 1981], [Sako, Kilian, 1995], [Hirt, Sako,
2000]
E-Voting.
Homomorphic Encryption protocol
 Incoercibility is not satisfied because
the voter can decrypt his ballot and
present certificate for encryption
(randomness used) to the coercer.
Schemes based on homomorphic encryption [Benaloh, 1987], [Benaloh,
Tuinstra, 1994], [Sako, Kilian, 1994], [Cramer R., Franklin M. K.,
Schoenmakers, B. & Yung, M., 1996], [Cramer R. Gennaro R. &
Schoenmakers B., 1997]
Requirements for e-voting schemes
Voting Systems
Y: Yes; N: No; NK: Not Known; HE: Homomorphic Encryption; EBF: Encrypted
Bloom Filter; ZKP: Zero Knowledge Proof; CM: Commitment; HC: Hash Chaining;
SS: Secret Sharing; VM: Verification Module; Booth: Voting Booth
Commercial Voting Software
Survey Legend
VoxVote
eBallot
Election Runner
ezVote
secureVoting
 OpaVote
 AssociationVoting
 Balloteer
 BigPulse
 Electionbuddy
 EZ-VOTE Connect
Corporate oriented up to 1000+ voters
 Utmost coercibility can be
achieved by voting anytime
from anywhere…
Remember
 Technology solves problems and
simultaneously creates problems…
Bibliography on Voting Systems
 [1] R. Abdelkader and M. Youssef. Uvote: A ubiquitous e-voting system. In Mobile,
Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference
on, pages 72–77, 2012.
 [2] A. P. Adewole, A. S. Sodiya, and O. A. Arowolo. A receipt-free multiauthority e-voting
system. Int. Jour. of Comp. App., 30(6):15–23, Sep. 2011.
 [4] B. Adida. Helios: Web-based open-audit voting. In Proceedings of the 17th Conference on
Security Symposium, SS’08, pages 335–348, 2008.
 [8] J. Bohli, J. M¨uller-Quade, and S. R¨ohrich. Bingo voting: Secure and coercion-free
voting using a trusted random number generator. In Proceedings of the 1st International
Conference on E-voting and Identity, VOTE-ID’07, pages 111–124, 2007.
 [14] H. Chen and R. Deviani. A secure e-voting system based on rsa time-lock puzzle
mechanism. In The 7th International Conference on BWCCA, pages 596–601, 2012.
 [16] M. Clarkson, S. Chong, and A. Myers. Civitas: Toward a secure voting system. In
Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 354–368, 2008.
 [17] M. Clarkson, B. Hay, M. Inge, D. Wagner, and A. Yasinsac. Software review and
security analysis of scytl remote voting software, September 2008.
 [23] A. Essex, J. Clark, and U. Hengartner. Cobra: toward concurrent ballot authorization
for internet voting. In Proceedings of the 2012 international conference on Electronic
Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE’12, pages 3–3,
Berkeley, CA, USA, 2012. USENIX Association.
 [26] R.Haenni and O Spycher. Secure internet voting on limited devices with anonymized
dsa public keys. In Proceedings of the 2011 Conference on Electronic Voting
Technology/Workshop on Trustworthy Elections, EVT/WOTE’11, 2011.
 [32] A. Kiayias, M. Korman, and D. Walluck. An internet voting system supporting user
privacy. In Proceedings of the 22Nd Annual Computer Security Applications Conference,
ACSAC’06, pages 165–174, Washington, DC, USA, 2006. IEEE Computer Society
 [42] H. Pan, E. Hou, and N. Ansari. E-note: An e-voting system that ensures
voter confidentiality and voting accuracy. In IEEE International Conference on
Communications (ICC), pages 825–829, June 2012. .
 [48] P. Y. A. Ryan, D. Bismark, J. Heather, S. Schneider, and Z. Xia. Prˆ et ` a
voter: a voter-verifiable voting system. Information Forensics and Security, IEEE
Transactions on, 4(4):662–673, Dec 2009.
 [51] D. Sandler, K. Derr, and D. S. Wallach. Votebox: A tamper-evident,
verifiable electronic voting system. In Proceedings of the 17th Conference on
Security Symposium, SS’08, pages 349–364, 2008.
 [54] G.Tsoukalas,K.Papadimitriou,and P.Louridas. From helios to zeus. In Greek
Research and Education Network; Panayiotis Tsanakas, National Technical
University of Athens, 2013 Usenix EVT conference, pages 1– 10, 2013.
SECOND PART
Humanistic Communication
and mass Media
Existence axiom
Habeat confinium ergo est
It has boundary so it exists.
three types of boundaries:
material, energetic, and ITformational
Physical substances
Matter, energy, ITformation
Existence hyper-law
Two antagonistic parts:
Self preservation (no change)
entropy
Communication (change)
information
Situatedness
Situatedness is a theoretical position that posits
that the mind is ontologically and functionally
intertwined within environmental, social, and
cultural factors. As such, psychological
functions are best understood as constituted by
the close coupling between the agent and the
environment.
Situatedness is frequently understood in
contradistinction to a traditional cognitive science
approach that characterizes the mind as an
essentially interior entity, one that is conceptually
separated from the environment but can interact
with it through computational manipulations of
mental representations. In contrast, situatedness
argues against a strict dualism of mind and world.
In short, media regulation can address the following:
 licensing of public, privately owned and community
broadcasting services (goal: competition, system
administration);
 property transactions (goal: market pluralism,
diversity);
 abusive content (goal: protection of societal norms);
 content quotas (goal: protection of and promotion of
national culture);
 performance obligations (goal: public service,
programming requirements);
 rates for free-to-air, subscriber, pay-per-view services
(goal: consumer protection);
 access provisions (goal: equal opportunity for free
expression);
 relation between public and private services (goal:
system balance); and
 funding requirements (goal: promotion of priority
services).
 It is evident that a conflict exists between
the principles of democracy- particularly its
concept of the individual and the processes
of the propaganda.
 Global regulation of the media would
possibly drive to Humanistic
communication.
Thank you for your attention
gcamb@cs.ntua.gr

More Related Content

What's hot

Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONIJNSA Journal
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Blockchain based e voting recording system design
Blockchain based e voting recording system designBlockchain based e voting recording system design
Blockchain based e voting recording system designSanjay Arakan
 
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismSecure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismIJSRED
 
The effect of new technologies on civic participation models
The effect of new technologies on civic participation modelsThe effect of new technologies on civic participation models
The effect of new technologies on civic participation modelsPrzegląd Politologiczny
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologytangytangling
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e votingSmriti Rai
 
International Digital Direct Election
International Digital Direct ElectionInternational Digital Direct Election
International Digital Direct ElectionAngela Iara Zotti
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higherMorine Gakii
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Votingashevch
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 

What's hot (17)

Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Blockchain based e voting recording system design
Blockchain based e voting recording system designBlockchain based e voting recording system design
Blockchain based e voting recording system design
 
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismSecure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
 
The effect of new technologies on civic participation models
The effect of new technologies on civic participation modelsThe effect of new technologies on civic participation models
The effect of new technologies on civic participation models
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
International Digital Direct Election
International Digital Direct ElectionInternational Digital Direct Election
International Digital Direct Election
 
Votechain
VotechainVotechain
Votechain
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
E-voting
E-votingE-voting
E-voting
 
B03610507
B03610507B03610507
B03610507
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
 
INNOVATIA
INNOVATIAINNOVATIA
INNOVATIA
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 

Similar to E-Democracy and E-Voting Systems Explained

11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic votingAlexander Decker
 
A review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic votingA review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic votingAlexander Decker
 
Evaluating e voting-theory_and_practice
Evaluating e voting-theory_and_practiceEvaluating e voting-theory_and_practice
Evaluating e voting-theory_and_practiceVictor Dario Vera
 
Advantages And Disadvantages Of E-Voting The Estonian Experience
Advantages And Disadvantages Of E-Voting  The Estonian ExperienceAdvantages And Disadvantages Of E-Voting  The Estonian Experience
Advantages And Disadvantages Of E-Voting The Estonian ExperienceGina Rizzo
 
DEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hiresDEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hiresFelipe Prado
 
Public accountability pattern in plml format
Public accountability pattern in plml formatPublic accountability pattern in plml format
Public accountability pattern in plml formatJohn Thomas
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting systemLhakpa Yangji
 
Regular elections and multi party democracy elly twi may 2014
Regular elections and multi party democracy elly twi may 2014Regular elections and multi party democracy elly twi may 2014
Regular elections and multi party democracy elly twi may 2014Elly Twineyo Kamugisha
 
Towards a trusted e election in kuwait requirements and principles
Towards a trusted e election in kuwait  requirements and principlesTowards a trusted e election in kuwait  requirements and principles
Towards a trusted e election in kuwait requirements and principlesIJMIT JOURNAL
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...Center for Civic Design
 
IRJET- Securing Voting System using Blockchain and Fingerprint Verification
IRJET- Securing Voting System using Blockchain and Fingerprint VerificationIRJET- Securing Voting System using Blockchain and Fingerprint Verification
IRJET- Securing Voting System using Blockchain and Fingerprint VerificationIRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
Government Vs. Voting In The Court System
Government Vs. Voting In The Court SystemGovernment Vs. Voting In The Court System
Government Vs. Voting In The Court SystemTara Hardin
 

Similar to E-Democracy and E-Voting Systems Explained (20)

11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting11.a review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting
 
A review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic votingA review of the underlying concepts of electronic voting
A review of the underlying concepts of electronic voting
 
Evaluating e voting-theory_and_practice
Evaluating e voting-theory_and_practiceEvaluating e voting-theory_and_practice
Evaluating e voting-theory_and_practice
 
Sid
SidSid
Sid
 
Advantages And Disadvantages Of E-Voting The Estonian Experience
Advantages And Disadvantages Of E-Voting  The Estonian ExperienceAdvantages And Disadvantages Of E-Voting  The Estonian Experience
Advantages And Disadvantages Of E-Voting The Estonian Experience
 
E017222736
E017222736E017222736
E017222736
 
DEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hiresDEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hires
 
H1802025259
H1802025259H1802025259
H1802025259
 
Public accountability pattern in plml format
Public accountability pattern in plml formatPublic accountability pattern in plml format
Public accountability pattern in plml format
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 
Regular elections and multi party democracy elly twi may 2014
Regular elections and multi party democracy elly twi may 2014Regular elections and multi party democracy elly twi may 2014
Regular elections and multi party democracy elly twi may 2014
 
Towards a trusted e election in kuwait requirements and principles
Towards a trusted e election in kuwait  requirements and principlesTowards a trusted e election in kuwait  requirements and principles
Towards a trusted e election in kuwait requirements and principles
 
Political processes
Political processesPolitical processes
Political processes
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...
Making Elections Accessible to All is Still a Wicked Problem (or Curbcuts for...
 
IRJET- Securing Voting System using Blockchain and Fingerprint Verification
IRJET- Securing Voting System using Blockchain and Fingerprint VerificationIRJET- Securing Voting System using Blockchain and Fingerprint Verification
IRJET- Securing Voting System using Blockchain and Fingerprint Verification
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Government Vs. Voting In The Court System
Government Vs. Voting In The Court SystemGovernment Vs. Voting In The Court System
Government Vs. Voting In The Court System
 
Voting power point 112119-1
Voting power point 112119-1Voting power point 112119-1
Voting power point 112119-1
 

More from Samos2019Summit

A Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeA Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeSamos2019Summit
 
Electronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesElectronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesSamos2019Summit
 
A Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceA Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceSamos2019Summit
 
Digital Government Assessment Methods
Digital Government Assessment MethodsDigital Government Assessment Methods
Digital Government Assessment MethodsSamos2019Summit
 
Drafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformDrafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformSamos2019Summit
 
Legal Implications of data-driven decision making
Legal Implications of data-driven decision makingLegal Implications of data-driven decision making
Legal Implications of data-driven decision makingSamos2019Summit
 
Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Samos2019Summit
 
Digital Transformation of Public Administration
Digital Transformation of Public AdministrationDigital Transformation of Public Administration
Digital Transformation of Public AdministrationSamos2019Summit
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Samos2019Summit
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Samos2019Summit
 
Empowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationEmpowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationSamos2019Summit
 
Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AISamos2019Summit
 
9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital GovernanceSamos2019Summit
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only PrincipleSamos2019Summit
 
U4SSC: Blockchain for cities
U4SSC: Blockchain for citiesU4SSC: Blockchain for cities
U4SSC: Blockchain for citiesSamos2019Summit
 
Discussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentDiscussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentSamos2019Summit
 
Workshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentWorkshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentSamos2019Summit
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracySamos2019Summit
 

More from Samos2019Summit (20)

A Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeA Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data Exchange
 
Electronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesElectronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability Challenges
 
A Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceA Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in Greece
 
Digital Government Assessment Methods
Digital Government Assessment MethodsDigital Government Assessment Methods
Digital Government Assessment Methods
 
Drafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformDrafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws Platform
 
Legal Implications of data-driven decision making
Legal Implications of data-driven decision makingLegal Implications of data-driven decision making
Legal Implications of data-driven decision making
 
Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...
 
Digital Transformation of Public Administration
Digital Transformation of Public AdministrationDigital Transformation of Public Administration
Digital Transformation of Public Administration
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
 
Empowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationEmpowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance Classification
 
Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AI
 
9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only Principle
 
U4SSC: Blockchain for cities
U4SSC: Blockchain for citiesU4SSC: Blockchain for cities
U4SSC: Blockchain for cities
 
Discussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentDiscussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital government
 
Workshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentWorkshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future Government
 
Government 3.0 Roadmap
Government 3.0 RoadmapGovernment 3.0 Roadmap
Government 3.0 Roadmap
 
Big Policy Canvas
Big Policy CanvasBig Policy Canvas
Big Policy Canvas
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracy
 

Recently uploaded

Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayZachary Labe
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10ROLANARIBATO3
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 

Recently uploaded (20)

Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work Day
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10Gas_Laws_powerpoint_notes.ppt for grade 10
Gas_Laws_powerpoint_notes.ppt for grade 10
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 

E-Democracy and E-Voting Systems Explained

  • 1. Information and E-democracy George Cambourakis Prof National Technical University of Athens Electric and Computer Engineering School European Communication Institute Governor
  • 3. House of Commons on November 11, 1947  Many forms of government have been tried, and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of Government except all those other forms that have been tried from time to time. Winston Churchill
  • 4. Average GDP per capita adjusted for price changes over time (inflation) and price differences between countries – it is measured in international-$ in 2011 prices.
  • 6. Based on world bank 2019
  • 7. Population & Poverty thresholds (international dollars 2011)
  • 8. Does Democracy proliferate?  Today, for the first time in history, there are more democratic states than non- democratic states. Indeed, some view the rise of democracy as perhaps the most important event to have transpired in the 20th century.
  • 9. Sustainability of Democracy  In consolidated democracies, there is a growing trend of apathy and disillusionment among voters, particularly the young, with respect to politics whereas in emerging democracies voter turnout tends to be high and many democratic movements are led by youth.
  • 10. Is Democracy a façade?  The iron law of oligarchy is a political theory, first developed by the German sociologist Robert Michels in his 1911 book, Political Parties. It asserts that rule by an elite, or oligarchy, is inevitable as an "iron law" within any democratic organization as part of the "tactical and technical necessities" of organization.
  • 11. confidence  At the turning of 21st century a survey by The Economist found that in 11 of 12 established democracies, public confidence in political leaders and institutions has declined steadily over the past few decades. It is still valid…
  • 12. Democracy and Growth  While it is often claimed that authoritarian regimes are better at bringing about economic development, comprehensive statistical analyses do not back up this hypothesis. First, as Przeworski found, wide-ranging statistical analyses confirm that no linkage can be drawn between authoritarian regimes and economic development.
  • 13. E-elections  cannot be considered as a pure practice of e-democracy, since there has been too little research into e-voting to draw definitive conclusions in terms of its actual influence.
  • 14. Use of different e-tools in EU Member States based on information collected from
  • 15. The public sphere  is for the state what the market is for the economy. in the public sphere, the goods that are exchanged and the currency that is traded are not of economic, but of political nature. The main product of the public sphere is public opinion, and ideas are the “goods” that are exchanged. This view equates the public sphere with a “free marketplace of ideas,” a libertarian ideal where everyone is able to propose ideas, and where the best idea (?) will win.
  • 16. Public sphere constitutive elements  Constitutionally guaranteed civil liberties  Free, plural, and independent media system not under state control  Access to public information  A vibrant civil society  Sites of everyday talk about public affairs
  • 17.  In human societies collective decisions can be reached as a result of three different mechanisms (or combinations thereof): by talking, by voting or by fighting.
  • 18.
  • 19. An e-voting system should be Secure. That is, Democratic. Only eligible voters can cast votes, and no voter can cast more than one vote. Accurate. No vote can be altered, duplicated or eliminated without being detected. Private. All votes remain secret while the voting takes place, and each individual vote cannot be linked to the voter who cast it. For uncoercibility, no voter should be able to prove the value of his/her vote to another party.
  • 20. An e-voting system should be  Universally verifiable. Any observer can be convinced that the election is accurate and that the published tally is correctly computed from votes that were correctly cast.  Robust. All security requirements are fully satisfied, despite failure and/or malicious behavior by any (reasonably sized) coalition of parties (voters, authorities, outsiders). • Practical. That is, convenient, compatible with a variety of standard platforms and technologies, and accessible to the disabled.
  • 21. E-VOTING INCOERCIBILITY  A system is incoercible if the voter cannot prove his operations to a coercer, i.e. a person who would prescribe a voter to send a ballot of some very specific kind and later check that it is present in the results.
  • 22. E-Voting. Blind signature protocol  The major problem of this scheme is that a failure of a single voter can disrupt the whole election process. Specifically, to maintain a secure election, even people who were not able to vote must verify that no vote was counted for them. Besides, the fact that the scheme requires a communication that is both secret and anonymous, it is impractical in real elections. Schemes based on blind signatures ([Fujioka A., Okamoto T. & Ohta K., 1992], [Sako, 1994], [Okamoto, 1997])
  • 23. E- Voting. Mix-Nets protocol  The Chaum voting scheme uses an anonymous communication channel and provides unconditional security against tracing the votes but the failure of a single voter can disrupt the election. This approach is not practical for large-scale elections because of the fact that the election must be restarted when a failure is traced. Schemes based on mix nets [Chaum, 1981], [Sako, Kilian, 1995], [Hirt, Sako, 2000]
  • 24. E-Voting. Homomorphic Encryption protocol  Incoercibility is not satisfied because the voter can decrypt his ballot and present certificate for encryption (randomness used) to the coercer. Schemes based on homomorphic encryption [Benaloh, 1987], [Benaloh, Tuinstra, 1994], [Sako, Kilian, 1994], [Cramer R., Franklin M. K., Schoenmakers, B. & Yung, M., 1996], [Cramer R. Gennaro R. & Schoenmakers B., 1997]
  • 26. Voting Systems Y: Yes; N: No; NK: Not Known; HE: Homomorphic Encryption; EBF: Encrypted Bloom Filter; ZKP: Zero Knowledge Proof; CM: Commitment; HC: Hash Chaining; SS: Secret Sharing; VM: Verification Module; Booth: Voting Booth
  • 27. Commercial Voting Software Survey Legend VoxVote eBallot Election Runner ezVote secureVoting  OpaVote  AssociationVoting  Balloteer  BigPulse  Electionbuddy  EZ-VOTE Connect Corporate oriented up to 1000+ voters
  • 28.  Utmost coercibility can be achieved by voting anytime from anywhere…
  • 29. Remember  Technology solves problems and simultaneously creates problems…
  • 30. Bibliography on Voting Systems  [1] R. Abdelkader and M. Youssef. Uvote: A ubiquitous e-voting system. In Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on, pages 72–77, 2012.  [2] A. P. Adewole, A. S. Sodiya, and O. A. Arowolo. A receipt-free multiauthority e-voting system. Int. Jour. of Comp. App., 30(6):15–23, Sep. 2011.  [4] B. Adida. Helios: Web-based open-audit voting. In Proceedings of the 17th Conference on Security Symposium, SS’08, pages 335–348, 2008.  [8] J. Bohli, J. M¨uller-Quade, and S. R¨ohrich. Bingo voting: Secure and coercion-free voting using a trusted random number generator. In Proceedings of the 1st International Conference on E-voting and Identity, VOTE-ID’07, pages 111–124, 2007.
  • 31.  [14] H. Chen and R. Deviani. A secure e-voting system based on rsa time-lock puzzle mechanism. In The 7th International Conference on BWCCA, pages 596–601, 2012.  [16] M. Clarkson, S. Chong, and A. Myers. Civitas: Toward a secure voting system. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 354–368, 2008.  [17] M. Clarkson, B. Hay, M. Inge, D. Wagner, and A. Yasinsac. Software review and security analysis of scytl remote voting software, September 2008.  [23] A. Essex, J. Clark, and U. Hengartner. Cobra: toward concurrent ballot authorization for internet voting. In Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE’12, pages 3–3, Berkeley, CA, USA, 2012. USENIX Association.  [26] R.Haenni and O Spycher. Secure internet voting on limited devices with anonymized dsa public keys. In Proceedings of the 2011 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE’11, 2011.  [32] A. Kiayias, M. Korman, and D. Walluck. An internet voting system supporting user privacy. In Proceedings of the 22Nd Annual Computer Security Applications Conference, ACSAC’06, pages 165–174, Washington, DC, USA, 2006. IEEE Computer Society
  • 32.  [42] H. Pan, E. Hou, and N. Ansari. E-note: An e-voting system that ensures voter confidentiality and voting accuracy. In IEEE International Conference on Communications (ICC), pages 825–829, June 2012. .  [48] P. Y. A. Ryan, D. Bismark, J. Heather, S. Schneider, and Z. Xia. Prˆ et ` a voter: a voter-verifiable voting system. Information Forensics and Security, IEEE Transactions on, 4(4):662–673, Dec 2009.  [51] D. Sandler, K. Derr, and D. S. Wallach. Votebox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th Conference on Security Symposium, SS’08, pages 349–364, 2008.  [54] G.Tsoukalas,K.Papadimitriou,and P.Louridas. From helios to zeus. In Greek Research and Education Network; Panayiotis Tsanakas, National Technical University of Athens, 2013 Usenix EVT conference, pages 1– 10, 2013.
  • 34. Existence axiom Habeat confinium ergo est It has boundary so it exists.
  • 35. three types of boundaries: material, energetic, and ITformational Physical substances Matter, energy, ITformation
  • 36. Existence hyper-law Two antagonistic parts: Self preservation (no change) entropy Communication (change) information
  • 37. Situatedness Situatedness is a theoretical position that posits that the mind is ontologically and functionally intertwined within environmental, social, and cultural factors. As such, psychological functions are best understood as constituted by the close coupling between the agent and the environment.
  • 38. Situatedness is frequently understood in contradistinction to a traditional cognitive science approach that characterizes the mind as an essentially interior entity, one that is conceptually separated from the environment but can interact with it through computational manipulations of mental representations. In contrast, situatedness argues against a strict dualism of mind and world.
  • 39. In short, media regulation can address the following:  licensing of public, privately owned and community broadcasting services (goal: competition, system administration);  property transactions (goal: market pluralism, diversity);  abusive content (goal: protection of societal norms);  content quotas (goal: protection of and promotion of national culture);
  • 40.  performance obligations (goal: public service, programming requirements);  rates for free-to-air, subscriber, pay-per-view services (goal: consumer protection);  access provisions (goal: equal opportunity for free expression);  relation between public and private services (goal: system balance); and  funding requirements (goal: promotion of priority services).
  • 41.  It is evident that a conflict exists between the principles of democracy- particularly its concept of the individual and the processes of the propaganda.  Global regulation of the media would possibly drive to Humanistic communication.
  • 42. Thank you for your attention gcamb@cs.ntua.gr