Results 271 to 280 of about 1,832,471 (333)
Some of the next articles are maybe not open access.
2002
Through time, electoral processes have been incorporating more and more technology. The voting methods in the U.S., for example, have evolved from lever machines to punch cards, optical scanning and Direct Recording Electronic (DRE) machines. (A good survey of different voting technologies currently used in the U.S.
Andru Riera, Jordi Sanchez, Laia Torras
openaire +1 more source
Through time, electoral processes have been incorporating more and more technology. The voting methods in the U.S., for example, have evolved from lever machines to punch cards, optical scanning and Direct Recording Electronic (DRE) machines. (A good survey of different voting technologies currently used in the U.S.
Andru Riera, Jordi Sanchez, Laia Torras
openaire +1 more source
Journal of Organizational and End User Computing, 2012
Opportunities for Internet use in the political process are constantly emerging. The use of the Internet to obtain political news and share political information is gaining momentum. Remote Internet voting initiatives are also growing in popularity. This study presents a model of Internet voting adoption that explores the predictors of the perceived ...
Lemuria Carter, Ronald Campbell
openaire +1 more source
Opportunities for Internet use in the political process are constantly emerging. The use of the Internet to obtain political news and share political information is gaining momentum. Remote Internet voting initiatives are also growing in popularity. This study presents a model of Internet voting adoption that explores the predictors of the perceived ...
Lemuria Carter, Ronald Campbell
openaire +1 more source
A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature
IEEE Systems Journal, 2020The end-to-end (E2E) verification enables a voter to check if his ballot is recorded as he intended and the public to check if the system has correctly counted all of the recorded ballots.
Mahender Kumar, S. Chand, C. P. Katti
semanticscholar +1 more source
2004
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment, hearing impairment, or color-blindness. This is especially important for designing Websites. It takes time and money to create or redesign Websites for easy access for users with disabilities.
Trisha Woolley, Craig Fisher
openaire +1 more source
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment, hearing impairment, or color-blindness. This is especially important for designing Websites. It takes time and money to create or redesign Websites for easy access for users with disabilities.
Trisha Woolley, Craig Fisher
openaire +1 more source
International Journal of Electrical and Computer Engineering (IJECE)
The pursuit of effective models with high detection accuracy has sparked great interest in anomaly detection of internet traffic. The issue still lies in creating a trustworthy and effective anomaly detection system that can handle massive data volumes ...
Alhamza Munther +3 more
semanticscholar +1 more source
The pursuit of effective models with high detection accuracy has sparked great interest in anomaly detection of internet traffic. The issue still lies in creating a trustworthy and effective anomaly detection system that can handle massive data volumes ...
Alhamza Munther +3 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics
Industry 4.0 integrates industrial Internet of Things (IIoT), artificial intelligence, and cloud computing. The advent of the 5G era has undoubtedly provided a new impetus for the development of many Industry 4.0 applications, but it also presents some ...
Peiying Zhang +5 more
semanticscholar +1 more source
Industry 4.0 integrates industrial Internet of Things (IIoT), artificial intelligence, and cloud computing. The advent of the 5G era has undoubtedly provided a new impetus for the development of many Industry 4.0 applications, but it also presents some ...
Peiying Zhang +5 more
semanticscholar +1 more source
Improving the Usability and UX of the Swiss Internet Voting Interface
International Conference on Human Factors in Computing Systems, 2020Up to 20% of residential votes and up to 70% of absentee votes in Switzerland are cast online. The Swiss system aims to provide individual verifiability by different verification codes.
Karola Marky +5 more
semanticscholar +1 more source
2007
Internet voting denotes electronic voting (e-voting) systems that allow votes to be cast using the Internet. There are, however, other types of e-voting, like those based on optical ballots, those using computers without remote connection or those sent by phone (Kersting, 2004; Tula, 2005).
J. B.I. Esteve, J. Domingo-Ferrer
openaire +1 more source
Internet voting denotes electronic voting (e-voting) systems that allow votes to be cast using the Internet. There are, however, other types of e-voting, like those based on optical ballots, those using computers without remote connection or those sent by phone (Kersting, 2004; Tula, 2005).
J. B.I. Esteve, J. Domingo-Ferrer
openaire +1 more source
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, 2010
In Europe, the U.S., and Asia, political and market forces seek expanded use of the Internet for voting and election administrative functions. Governmental responses have differed, but commonly governments omit qualified computer security experts from exercising decisive weight in policy decisions.
openaire +1 more source
In Europe, the U.S., and Asia, political and market forces seek expanded use of the Internet for voting and election administrative functions. Governmental responses have differed, but commonly governments omit qualified computer security experts from exercising decisive weight in policy decisions.
openaire +1 more source
2022
In the country of Switzerland, there have been numerous attempts to introduce internet voting in the past two decades. Current approaches rely on purpose-specific complex cryptography to resolve the seemingly contradictory security requirements of verifiability and privacy.
openaire +1 more source
In the country of Switzerland, there have been numerous attempts to introduce internet voting in the past two decades. Current approaches rely on purpose-specific complex cryptography to resolve the seemingly contradictory security requirements of verifiability and privacy.
openaire +1 more source

