{"title":"Towards Identifying Social Factors behind (In)Efficiency of Voting Security Measures","authors":"J. Willemson","doi":"10.29379/jedem.v14i1.673","DOIUrl":null,"url":null,"abstract":"Abstract: In this paper, we take a look at some standard requirements set to voting, and measures to achieve them. We argue that while the measures themselves are typically technical or organizational, their (in)efficiency is often determined by social factors. As the requirements set to voting are contradictory, every society will have to make trade-offs between them. Our analysis shows that one reason why some potential vulnerabilities are perceived as acceptable residual risks in some societies may be that, there simply is no tradition of abusing these vulnerabilities in this particular society. We identify a number of societal parameters, categorize them and study their effect on the (perceived) security of the respective measures.","PeriodicalId":36678,"journal":{"name":"eJournal of eDemocracy and Open Government","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"eJournal of eDemocracy and Open Government","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29379/jedem.v14i1.673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 1
Abstract
Abstract: In this paper, we take a look at some standard requirements set to voting, and measures to achieve them. We argue that while the measures themselves are typically technical or organizational, their (in)efficiency is often determined by social factors. As the requirements set to voting are contradictory, every society will have to make trade-offs between them. Our analysis shows that one reason why some potential vulnerabilities are perceived as acceptable residual risks in some societies may be that, there simply is no tradition of abusing these vulnerabilities in this particular society. We identify a number of societal parameters, categorize them and study their effect on the (perceived) security of the respective measures.