Advertisement

Acceptance of Voting Technology: Between Confidence and Trust

  • Wolter Pieters
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3986)

Abstract

Social aspects of security of information systems are often discussed in terms of “actual security” and “perceived security”. This may lead to the hypothesis that e-voting is controversial because in paper voting, actual and perceived security coincide, whereas they do not in electronic systems. In this paper, we argue that the distinction between actual and perceived security is problematic from a philosophical perspective, and we develop an alternative approach, based on the notion of trust. We investigate the different meanings of this notion in computer science, and link these to the philosophical work of Luhmann, who distinguishes between familiarity, confidence and trust. This analysis yields several useful distinctions for discussing trust relations with respect to information technology. We apply our framework to electronic voting, and propose some hypotheses that can possibly explain the smooth introduction of electronic voting machines in the Netherlands in the early nineties.

Keywords

Election System Vote System Security Protocol Trust Relation Actual Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alvarez, R.M., Hall, T.E.: Point, click & vote: the future of Internet voting. Brookings Institution Press, Washington D.C (2004)Google Scholar
  2. 2.
    Avižienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing 1(1), 11–33 (2004)CrossRefGoogle Scholar
  3. 3.
    Berlin, I.: Four concepts of liberty. Oxford University Press, Oxford (1969) [1958]Google Scholar
  4. 4.
    Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Security & Privacy 2(1), 38–47 (2004)CrossRefGoogle Scholar
  5. 5.
    Chopra, K., Wallace, W.A.: Trust in electronic environments. In: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS 2003) (2002)Google Scholar
  6. 6.
    Cunningham, F.: Theories of democracy: a critical introduction. Routledge, London (2002)CrossRefGoogle Scholar
  7. 7.
    Dewey, J.: The public and its problems. Swallow Press / Ohio University Press, Athens (1991) [1927]Google Scholar
  8. 8.
    Evans, D., Paul, N.: Election security: perception and reality. IEEE Security & Privacy 2(1), 24–31 (2004)CrossRefGoogle Scholar
  9. 9.
    Fahrenholtz, D., Bartelt, A.: Towards a sociological view of trust in computer science. In: Schoop, M., Walczuch, R. (eds.) Proceedings of the eighth research symposium on emerging electronic markets (RSEEM 2001) (2001)Google Scholar
  10. 10.
    Hubbers, E.-M.G.M., Jacobs, B.P.F., Pieters, W.: RIES – Internet voting in action. In: Bilof, R. (ed.) Proc. 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, pp. 417–424. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  11. 11.
    Ihde, D.: Technology and the lifeworld. Indiana University Press, Bloomington (1990)Google Scholar
  12. 12.
    Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: Analyzing internet voting security. Communications of the ACM 47(10), 59–64 (2004)CrossRefGoogle Scholar
  13. 13.
    Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: a systems perspective. In: Proceedings of the 14th USENIX Security Symposium, pp. 33–50 (2005)Google Scholar
  14. 14.
    Keulartz, J., Korthals, M., Schermer, M., Swierstra, T.: Ethics in a technological culture: A proposal for a pragmatist approach. In: Keulartz, J., Korthals, M., Schermer, M., Swierstra, T. (eds.) Pragmatist ethics for a technological culture, ch.1, pp. 3–21. Kluwer Academic Publishers, Dordrecht (2002)CrossRefGoogle Scholar
  15. 15.
    Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy (2004)Google Scholar
  16. 16.
    Lowe, G.: Breaking and fixing the Needham-Schroeder public key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  17. 17.
    Luhmann, N.: Trust and power: two works by Niklas Luhmann. Wiley, Chichester (1979)Google Scholar
  18. 18.
    Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and breaking of cooperative relations. Basil Blackwell, Oxford (1988)Google Scholar
  19. 19.
    Moynihan, D.P.: Building secure elections: E-voting, security and systems theory. Public administration review 64(5) (2004)Google Scholar
  20. 20.
    Nikander, P.: Users and trust in cyberspace (transcript of discussion). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 36–42. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  21. 21.
    Nikander, P., Karvonen, K.: Users and trust in cyberspace. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 24–35. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  22. 22.
    Oostveen, A.M., Van den Besselaar, P.: Security as belief: user’s perceptions on the security of electronic voting systems. In: Prosser, A., Krimmer, R. (eds.) Electronic Voting in Europe: Technology, Law, Politics and Society, Lecture Notes in Informatics, vol. P-47, pp. 73–82. Gesellschaft für Informatik, Bonn (2004)Google Scholar
  23. 23.
    Pieters, W., Becker, M.: Ethics of e-voting: An essay on requirements and values in Internet elections. In: Brey, P., Grodzinsky, F., Introna, L. (eds.) Ethics of New Information Technology: Proc. Sixth International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2005), Enschede. Center for Telematics and Information Technology, pp. 307–318 (2005)Google Scholar
  24. 24.
    Randell, B., Ryan, P.Y.A.: Voting technologies and trust. Technical Report CS-TR-911, School of Computing Science, University of Newcastle upon Tyne (2005)Google Scholar
  25. 25.
    Riedl, R.: Rethinking trust and confidence in european e-government: Linking the public sector with post-modern society. In: Proceedings of I3E 2004 (2004)Google Scholar
  26. 26.
    Riera, A., Brown, P.: Bringing confidence to electronic voting. Electronic Journal of e-Government 1(1), 43–50 (2003)Google Scholar
  27. 27.
    Rubin, A.D.: Security considerations for remote electronic voting. Communications of the ACM 45(12), 39–44 (2002)CrossRefGoogle Scholar
  28. 28.
    Shneiderman, B.: Designing trust into online experiences. Communications of the ACM 43(12), 57–59 (2000)CrossRefGoogle Scholar
  29. 29.
    Verbeek, P.P.C.C.: What things do: Philosophical Reflections on Technology, Agency, and Design. Pennsylvania State University Press (2005)Google Scholar
  30. 30.
    Xenakis, A., Macintosh, A.: Procedural security and social acceptance in e-voting. In: Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS 2005) (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wolter Pieters
    • 1
  1. 1.Institute for Computing and Information SciencesRadboud University NijmegenNijmegenThe Netherlands

Personalised recommendations