poor design in computer voting n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Poor Design in Computer Voting PowerPoint Presentation
Download Presentation
Poor Design in Computer Voting

Loading in 2 Seconds...

play fullscreen
1 / 6

Poor Design in Computer Voting - PowerPoint PPT Presentation


  • 90 Views
  • Uploaded on

Poor Design in Computer Voting. Jim Macaraeg December 1, 2008 COMP 450 Lingard. Voting Process & Computerization. Voter Registration Vote Casting Vote Storage Vote Tabulation Vote Reporting. Computerization of Vote Tabulation. Audit log is stored in MS Access database.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Poor Design in Computer Voting' - anson


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
poor design in computer voting

Poor Design in Computer Voting

Jim Macaraeg

December 1, 2008COMP 450

Lingard

voting process computerization
Voting Process & Computerization
  • Voter Registration
  • Vote Casting
  • Vote Storage
  • Vote Tabulation
  • Vote Reporting
computerization of vote tabulation
Computerization of Vote Tabulation
  • Audit log is stored in MS Access database.
  • Audit log is unencrypted .
  • Audit Log is not password protected.
  • Tabulation software uses outdated encryption on source code.
computerization of vote casting
Computerization of Vote Casting
  • DRE Touch Screen systems designed to be too sensitive.
  • Computerized Vote Casting systems are technically complex for a simple task.
references
References

1. Democracy at Risk The New York Times http://www.commondreams.org/views04/0123-03.htm

2. Herrin, Chuck HackTheVoteDemohttp://www.chuckherrin.com/hackthevotedemo.htm

3. Blackboxvoting.org