E-voting technology provides an alternative to traditional paper-based voting through online and electronic means. It allows voters to cast ballots over the internet from any location. E-voting aims to provide instant results, make voting more convenient, and help increase voter turnout. However, some security and reliability concerns remain regarding online voting and ensuring the integrity of election results. Further encryption, verification methods, and testing of different e-voting systems is still needed.
www.electionproject.ajce.ind.in
online election managment system is for automate tasks of an election.
web application was developed using cakephp.
full report and code is available .
for more details contact chikkujoseph50@gmail.com
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
www.electionproject.ajce.ind.in
online election managment system is for automate tasks of an election.
web application was developed using cakephp.
full report and code is available .
for more details contact chikkujoseph50@gmail.com
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
The republic of Kenya comprises of eight (8) provinces now forty-seven counties. The country is located in East Africa and shares land borders with the Republics of Somalia in the East, Uganda in the West, Tanzania in the South and Ethiopia and Sudan (now South Sudan) in the North. The three largest and most influential ethnic groups in Kenya are the kikuyu, Luhya, and Kalenjins. In terms of religion Kenya is roughly split into 80% Christians while the rest are Muslims.
In Kenya, general elections are carried out every after five years where a head of state the President and The National Assembly representatives are elected. They are elected by the people. The national Assembly has about 220 members representing respective constituencies.
In the Local Governments they have the chairman and the Counselor. The counselors are all elected by the people of the state in the respective wards.
That is to say, in any given general elections, Kenyans vote for the president, the members of the National Assembly and the counselors.
Most African Electoral bodies IEBC not an exception right from their inception to date, even with latest advancements in technology, still use a primitive paper based methods during voting; this system is characterized by manual form filling to chose leaders and transfer of the information from manual data capture forms to computerized datasheets, this has led to an excessive number of mistakes making their way into the final vote counts hence leading to confusion at the time of announcing the results. The main advantage of paper-based systems is that ballot papers are easily human auditable. The disadvantages outweigh the advantages for instance the need to print ballot papers is a slow, expensive, inflexible, environmentally hostile process, visual impairments, or literacy limitations and also last minute changes to the voter register are difficult to accommodate among others.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
The republic of Kenya comprises of eight (8) provinces now forty-seven counties. The country is located in East Africa and shares land borders with the Republics of Somalia in the East, Uganda in the West, Tanzania in the South and Ethiopia and Sudan (now South Sudan) in the North. The three largest and most influential ethnic groups in Kenya are the kikuyu, Luhya, and Kalenjins. In terms of religion Kenya is roughly split into 80% Christians while the rest are Muslims.
In Kenya, general elections are carried out every after five years where a head of state the President and The National Assembly representatives are elected. They are elected by the people. The national Assembly has about 220 members representing respective constituencies.
In the Local Governments they have the chairman and the Counselor. The counselors are all elected by the people of the state in the respective wards.
That is to say, in any given general elections, Kenyans vote for the president, the members of the National Assembly and the counselors.
Most African Electoral bodies IEBC not an exception right from their inception to date, even with latest advancements in technology, still use a primitive paper based methods during voting; this system is characterized by manual form filling to chose leaders and transfer of the information from manual data capture forms to computerized datasheets, this has led to an excessive number of mistakes making their way into the final vote counts hence leading to confusion at the time of announcing the results. The main advantage of paper-based systems is that ballot papers are easily human auditable. The disadvantages outweigh the advantages for instance the need to print ballot papers is a slow, expensive, inflexible, environmentally hostile process, visual impairments, or literacy limitations and also last minute changes to the voter register are difficult to accommodate among others.
The last population census in Nigeria was conducted in 2006; which puts our population figure at approximately 140million. According to our law, another census will hold in 2 years time, since we practise democracy, which is a game of number, our population counts for who would like to govern at each level of government.
Equally important is the participation of Nigerians in the electioneering process. In order to vote and be voted for, 18years is the minimum, how have we fared in terms of awareness and participating in the process that elect those who govern us – local, state and federal governments?
This study takes a look at Nigeria population, political participation since the start of Democracy in 1999 and an estimate of the 2014 projected population, and hopefully to create awareness on the need to be more involved in the electioneering process.
The Digital Voter Experience. Adam Froman's presentation at a policy workshop at Carleton University put on the Canada-Europe Transatlantic Dialogue, a strategic knowledge cluster. The workshop was titled, “Internet Voting: What can Canada Learn”.
The Top Skills That Can Get You Hired in 2017LinkedIn
We analyzed all the recruiting activity on LinkedIn this year and identified the Top Skills employers seek. Starting Oct 24, learn these skills and much more for free during the Week of Learning.
#AlwaysBeLearning https://learning.linkedin.com/week-of-learning
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This presentation is on online voting that is not present in India. with the advancement of technology it may possible that Indian Government start online voting system
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
One basic feature of democracy is that it cuts across all divides of people in the act of election. It also encourages individual freedom according to the rule of law; hence people may behave and express themselves as they choose. This paper examines the development and implementation of and Electronic Voting System (EVS) that enables voters to cast their votes online and also enables the officials to register voters and print out the results of the votes casted. It equally provides security such that voters can only vote once with their identification details. The system therefore eliminates common fraud, speed up the processing of results, increase accessibility and make voting more convenient for the citizenry.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
2. Introduction
• Choosing Leaders is one activity that is carried out in every society. In today’s
world, most leaders are chosen not by appointment but usually by election.
• Voting is a method for a group such as a meeting or an electorate to make a
decision or express an opinion—often following discussions, debates, or election
campaigns. It is often found in Democracies and Republics.
• So how do we vote?
Basically We have two types of voting systems
1. Traditional voting system
inefficient
Takes time and human resources.
Does not give an instant Poll result.
Hard to track who voted and who don’t
2. Online or E-Voting System
Instant Poll result
Easy to keep track of voters
Use of Internet
3. What Is E-Voting Technology?
• To understand E-Voting Technology, first of all we should understand what
is e-voting?
SO WHAT IS E-VOTING?
Electronic voting (also known as e-voting) is a term encompassing several different types of voting,
embracing both electronic means of casting a vote and electronic means of counting votes.
E-Voting Technology
• E-Voting technology is a web based application in which voter can use hisher voting right online without
any difficulty.
• HeShe has to fill a registration form to register himselfherself. All the entries is checked by the DATABASE
which has already all information about the voter.
• If all the entries are correct then a USER ID and PASSWORD is given to the voter, by using that ID and
PASSWORD heshe can use hisher vote.
• If conditions are wrong then that entry will be discarded
4. Types Of E-Voting
• E-voting which is physically supervised by representatives of governmental or
independent electoral authorities (e.g. electronic voting machines located at
polling stations);
• Remote E-Voting where voting is performed within the voter's sole influence, and
is not physically supervised by representatives of governmental authorities (e.g.
voting from one's personal computer, mobile phone, television via the internet) i.e
I-Voting.
Different Types Of E-Voting System:
In 21st century many different types of E-Voting System have evolved:
They are as follows:
Paper-based electronic voting system
Direct-recording electronic (DRE) voting system
Public network DRE voting system
5. How It is Performed?
Phases Of Online Voting
Voters’ registration
Authentication
Voting and votes’ saving
Votes’ managing
Votes’ counting
Election Result
6. 1. A poll worker hands you a Personal Electronic Ballot that contains a chip storing the ballot
you need. Machines by other companies put the ballot on a smart card.
2. You take the PEB to a voting booth and slide it into a slot in an IVotronic machine, activating it
for voting.
3. The IVotronic steps you through the electronic ballot, letting you make your choices in each
race and review your votes.
4. You press the big red Vote button, storing your votes in triplicate in the IVotronic's internal
NVRAM (Non-Volatile Random Access Memory) banks.
Many states will require a voter-verified paper trail in future elections. You'll look at a printout of
your vote behind a glass or plastic barrier; then you'll press a button to accept it, or reject it and
start over.
5. Every hour or so, election judges manually add the totals from each machine to make sure the
number of votes matches the number of voters who have come in.
6. At the close of polls, election judges print out final tallies from each machine and load them
into a master PEB unit.
7. Election judges post a printout of the local results, transmit them to a special PC at election
headquarters over an encrypted telephone line, and later deliver the master PEB and printouts in
person.
8. In case of a recount or dispute, your vote is stored in several places: in triplicate on the voting
machine, on the printout from the voting machine, on the master PEB, and on computers at your
local precinct and at election headquarters.
9. All records are destroyed according to state or local law after a specified number of days.
Destruction is the final security check--it prevents the vote from being tampered with while it's in
storage.
7. Technologies Used:
• A Voting machine is the combination of electromechanical, mechanical or electronic
equipment which includes its software, firmware and the required documentation to program
control and support equipment which is used to count and cast votes, defined ballots, to
display or report election result and to produce and maintain audit trail information. This
machine is able to provide the voter immediate feedback such possible problem as
overvoting or undervoting which will result in a spoiled ballot. This machine has different
levels of security, usability, accuracy and efficiency.
• Most e-voting machines use similar procedures, with variations in the secure media used to
activate the machines and the procedures for retrieving votes. All e-voting machines include
backup batteries, so they can run for a few hours during a power outage. Votes stay in
nonvolatile RAM, so they aren't lost if the batteries die. See "E-Voting Machine Spec
Check" for information on the guts of different machines.
• To report results, most systems collect votes onto one voting machine or PC at the polling
place. That machine then dials in to a PC at election headquarters and transfers that
precinct's tallies over an encrypted modem-to-modem connection. Later, poll workers
deliver the memory cards along with a printout of the results.
• The PCs used to collect and transmit results aren't supposed to be connected to the Internet
while tallying results.
8. How To Do It Better?
Biometrics can be sorted into two classes:
Physiological: Examples - face, fingerprints, hand geometry and iris Recognition, dna.
Behavioral: Examples-signature and voice.
Prior to the use of Internet or other forms of biometrics, there exists other means of carrying
out a voting process, namely
Manual Voting: This is the type of voting whereby voters get registered, be authenticated, obtain
and mark their ballot papers, and deliver them to a ballot box. The use of VIN is applied here.
Electronic Voting: Here the use of a microcontroller-based device is applied. Below is a typical
example of an electronic voting device.
Online Voting: This employs the use of internet to carry out voting in real time.
Cryptographic verification
The concept of election verifiability through cryptographic solutions has emerged in the
academic literature to introduce transparency and trust in electronic voting systems. It allows
voters and election observers to verify that votes have been recorded, tallied and declared
correctly, in a manner independent from the hardware and software running the election. Three
aspects of verifiability are considered: individual, universal, and eligibility. Individual verifiability
allows a voter to check that her own vote is included in the election outcome, universal
verifiability allows voters or election observers to check that the election outcome corresponds
to the votes cast, and eligibility verifiability allows voters and observers to check that each vote
in the election outcome was cast by a uniquely registered voter.
9. Hardware and software requirement
Minimum Software Requirement
Operating System : Windows
Technology : Java/J2EE (JDBC,
servlets,jsp)
Web Technologies : Html, JavaScript, CSS
IDE : Netbeans IDE
Web Server : Tomcat
Database : Oracle
Software’s : J2SDK1.5, Tomcat 5.5
Hardware requirements:
Hardware : Pentium based systems with a
minimum of P5
RAM : 256MB (minimum)
12. Advantages Of E-Voting Technology
• Saved Ballot Templates eliminate the need to configure elections from scratch. Just do it once, then
save that ballot configuration, and in subsequent years, specify only the names of the candidates.
• Reduced costs are enjoyed when the expenses of printing, mailing and tabulating paper ballots are
lessened or even eliminated entirely from the election process.
• Email Solicitation adds value by soliciting an email address from voters without one already on record
and then notifying you about the newly-acquired email so it may be added to your master records.
• Email Reminders help increase voter participation by sending reminders to voters who’ve not voted
and providing them with a link straight to the online ballot.
• Email Validation brings added value to your online election by inspecting your voters’ email addresses
and notifying you of any that are not properly formatted.
• Ballot Scrubbing ensures no ballot is spoiled due to anything not in compliance with your voting rules
by notifying voters, in plain-language, about how to ensure their ballot conforms to those rules.
• Ballot Shuffling randomly orders the candidates’ names on each request of the ballot so all candidates
get a fair chance at prime name placement on the ballot.
• On-demand Paper Ballots simplify hybrid elections by allowing an election administrator to generate a
voter-specific paper ballot that honors all the election settings just as web ballots do.
• Automated Tallying removes human fallibility from the tabulation process and makes your election
results available within seconds of the close of the election.
• Comprehensive Reporting instantly provides you with informative day-by-day statistics about your
election beyond just who won, demonstrated at the Sample Election Results page.
• Archived Election Results means all previous election results are readily available at your account
which saves you from having to dig through a file cabinet to find results from previous elections.
• Ability to correct mistakes allows voters to go back and correct any mistakes before final submission of
their ballot. Once a ballot has been submitted however, it is final and can not be altered.
13. • Disadvantages
• Vulnerability to hacking: According to the Congressional Research Service of Election Reform
and Electronic Voting Systems, vendors and election jurisdictions generally state that they do
not transmit election results from precincts via the internet, but they may transmit them via a
direct modem connection or Virtual Private Network (VPN).
• Voter verified paper audit trails: All fully-electronic (touch screen, DRE, internet) voting
systems are subject to the limitations and risks of computer technology. This includes the
inability to detect the presence of hardware and/or software that could be used,
deliberately or inadvertently, to alter election outcomes.
• Susceptibility to fraud: Voting fraud is not either present everywhere or absent everywhere.
Especially in our country, there have always been allegations of fraud by all the losing
political parties. Fraud comes in degrees and increments. A malicious voting system created
and distributed by one vendor to hundreds of thousands of polling booths, can systematically
falsify millions of votes.
• Malicious software programming: Any computer software is basically generated
from software programming and coding. And all these softwares could be tampered
with by a computer programmer who knows the source code. Testing electronic
voting systems for security problems, especially if they were intentionally
introduced and concealed, is basically impossible. If malicious coding is inserted by
programmers into commercial software that are triggered by obscure combinations
of commands and keystrokes via the computer keyboard, then election results can
change completely.
• Physical security of machines: Regarding physical hardware controls, many of the DRE
(direct recording electronic voting machine) models under examination contained
weaknesses in controls designed to protect the system.
• Secure storage of cast votes: The votes that are cast using the electronic voting machines,
are stored in a safe storage or space in the computer machine memory.
14. Conclusion
Polls are the biggest festival of democracy. It is the need of the hour to increase more and
more people’s participation in our polls. E-Voting is the technology through which we can
achieve it. It is seen that in countries where voting is done through electronic means have
larger voting percentage than the countries where voting is done through ballot. For example,
India’s voting percentage has increased after the introduction of ELECTRONIC VOTING
MACHINES. It can further be increased if we become more technically sound and promote
voting through internet via mobile, laptops etc.
I believe that a transition to new technologies, especially in a country which is particularly
cautious towards new technologies in the polling stations requires a multi-disciplinary
approach that allows taking into account not only the usability requirements of the voters, but
also those non-functional requirements that help guaranteeing security and build trust on the
new voting machines.
With E-Voting we can decrease man power, military movement for security purpose, transport
expenses, counting time and most importantly we can save lots and lots of time. We can
ensure that the right person represent us at the grandest stage of them all i.e. at the
parliament.
However, Initial cost of installation and cyber threats are some of the disadvantages of E-Voting.
But given the advantage it will give us nullify these issues.
So finally I would conclude on this note that BREAK THE LINE AND ENTER ONLINE.
That’s why; I believe that E-Voting Technology is the future of democracy.
Lastly, I would like to mention this quote by Abraham Lincoln “The ballot is stronger than the
bullet.”
DO PRACTICE YOUR VOTING RIGHT IN ELECTIONS.