Results 81 to 90 of about 1,832,471 (333)

Identifying and Solving a Vulnerability in the Estonian Internet Voting Process: Subverting Ballot Integrity Without Detection

open access: yesIEEE Access
In Estonia, nationwide internet voting (i-voting) has been in use since 2005, with its popularity steadily rising. In the recent parliamentary election in March 2023, over half of the voters cast their ballots electronically.
Tarvo Treier, Kristjan Duuna
doaj   +1 more source

Institutional Drivers of Internet Voting Adoption in Ghana: A Qualitative Exploratory Studies

open access: yes, 2020
Internet voting system adoption in elections can bring enormous benefits to an electoral process. Though few countries have adopted it for their legally binding elections, others have discontinued its use because of perceived vulnerabilities.
Samuel Agbesi
semanticscholar   +1 more source

Internet voting: coming to a computer near you, though more research is needed to eliminate the risks [PDF]

open access: yes, 2014
Internet voting could represent an effective way to improve the accessibility of voting, and contribute to an increase in electoral turnout amongst the young.
Grewal, Gurchetan S., Ryan, Mark
core  

Efficient Vote Authorization in Coercion-Resistant Internet Voting [PDF]

open access: yes, 2012
Some years ago, Juels et al. introduced the first coercion-resistant Internet voting protocol. Its basic concept is still the most viable approach to address voter coercion and vote selling in Internet voting. However, one of the main open issues is its unrealistic computational requirements of the quadratic-time tallying procedure.
Schläpfer, Michael   +3 more
openaire   +2 more sources

Criteria to Evaluate Voting Indicators and a Recipe for a New One [PDF]

open access: yes
This paper is made up of two interrelated parts. The first part contains a critical evaluation of so called Voting Indicators, online internet applications that help and advise voters which political party to choose at parliamentary elections.
Loek Groot
core   +3 more sources

Legal Standards of New Technologies of Voting in Electoral Process of Estonia

open access: yesУправленческое консультирование, 2018
The article deals with innovative approaches to the study and implementation of the theory and practice of the electoral process of modern technologies of e-democracy and e-voting. The author analyzes legal aspects of e-voting as new technology of voting
Nickolas Sergeyevich Chimarov
doaj  

Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things

open access: yesIEEE Access, 2018
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core concepts of IoT are perception, control, transmission, and intelligence.
Aimin Yang   +4 more
doaj   +1 more source

Does ESG Investing Pay off? Comparing the Performance of ESG and Traditional ETFs Across European and US Markets

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Investors have long recognized the importance of firms in promoting sustainability, leading to the rise of socially responsible investment (SRI). Specifically, there is a growing preference for exchange‐traded funds (ETFs) that prioritize environmental, social, and governance (ESG) principles.
Sandra Tenorio‐Salgueiro   +3 more
wiley   +1 more source

Environmental Regulation at the Crossroads: A Review of Catalysts and Barriers in Circular Economy Transitions

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Amid growing resource pressures, environmental regulation plays a critical role in enabling the transition to a circular economy (CE). This study conducts a systematic literature review to synthesize how different regulatory approaches—command‐and‐control, market‐based, voluntary, and reflexive—affect CE transitions across economic and ...
Li Yuan
wiley   +1 more source

A Load Balancing Algorithm for Resource Allocation in IEEE 802.15.4e Networks

open access: yes, 2018
The recently created IETF 6TiSCH working group combines the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hopping with IPv6 for industrial Internet of Things. We propose a distributed link scheduling algorithm, called
Jiang, Yuming   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy