60 likes | 181 Vues
This document reviews the shortcomings of computerized voting processes, with a focus on voter registration, vote casting, storage, tabulation, and reporting. The audit log is stored in an unencrypted MS Access database, lacking password protection, and the tabulation software utilizes outdated encryption, raising serious security concerns. Additionally, touch screen voting systems are criticized for being overly sensitive and technically complex for users. The paper urges for a reevaluation of the computerization in voting systems to safeguard democracy.
E N D
Poor Design in Computer Voting Jim Macaraeg December 1, 2008COMP 450 Lingard
Voting Process & Computerization • Voter Registration • Vote Casting • Vote Storage • Vote Tabulation • Vote Reporting
Computerization of Vote Tabulation • Audit log is stored in MS Access database. • Audit log is unencrypted . • Audit Log is not password protected. • Tabulation software uses outdated encryption on source code.
Computerization of Vote Casting • DRE Touch Screen systems designed to be too sensitive. • Computerized Vote Casting systems are technically complex for a simple task.
References 1. Democracy at Risk The New York Times http://www.commondreams.org/views04/0123-03.htm 2. Herrin, Chuck HackTheVoteDemohttp://www.chuckherrin.com/hackthevotedemo.htm 3. Blackboxvoting.org