No law yet exists to implement solutions. The process is not
easy.
The solution involves balancing multiple inputs. Who is the end user? The voters? The election administrators? The poll workers?
Trained also as a system scientist and engineer, his
perspective is to find standards of procedure and use all resources.
Handling professionals and vendors comprises the final puzzle piece, he said. Perhaps use of iPads and COTS will be the answer. Perhaps even cellphones or computers. He reminded us of the nearly hundred million qualified citizens too indifferent to vote. If they could use cellphones or home computers without interrupting their daily routine, they might rejoin the mainstream and increase this country's poor showing on Election Day and move us closer to the democracy we aspire toward. We are way behind other developed countries in terms of numbers who show up to vote.
Returning to the subject of security, he asserted that
nothing is secure; even benign programs can be invaded, as when a function of
Excel was stolen by Skype inadvertently.
For Toregas, then, the bottom line is risk management.
*****
The next segment of the event involved discussion among the
panelists. Halderman said that the combination of a high level of integrity and
the secret ballot may not be possible. I-voting will approach a closer reality
if we give up the secret ballot.
What are the ramifications? he added later: the secret ballot prevents coercion, which can come about through voting at home or at the office.
Next Page 1 | 2 | 3 | 4 | 5 | 6 | 7
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).