skip to main content
article
Free access

Accuracy, integrity and security in computerized vote-tallying

Published: 01 October 1988 Publication History

Abstract

The following excerpts have been gleaned from a 130-page report of potential inaccuracies and fraud in computerized voting systems. Recent difficulties in automated vote-tallying, including specific legal cases, are detailed along with a summary of conclusions and recommendations.

References

[1]
Audit of Recount Detects Error. Restores Stark County. Ohio Commissioner Victor. Election Administration Reports 16, 5 (July 21, 1986), 2-4.
[2]
Burnham, D. "Computerized systems for voting seen as vulnerable to tampering." The New York Times (July 29, 1985}, 1.
[3]
Computer Data Authentication. Federal Information Processing Standards Publication 113, National Bureau of Standards, May 30, 1985.
[4]
Guy, C. "Election system under fire nationwide." Carroll County Times (July 11, 1985), 1.
[5]
Hetzel, W. The Complete Guide to Software Testing. QED Information Sciences, Wellesley, MA 1984.
[6]
Kelly, S. "Human error reversed school board election results." CarroU Sun (November 18, 1984), 2.
[7]
Lewis, T.W., Ensor, T.E., and Gosnell, J.S. "Certain factors which involved the Carroll County Board of Election Supervisors, Either Directly or Indirectly, in Producing the Numerical Results of the General Election in Carroll County, November 6th, 1984." (December 4, 1984).
[8]
Saltman, R.G. Effective Use of Computing Technology in Vote-TaUying. National Bureau of Standards, NBSIR 75-687, March, 1985.13. "Recounting," 91.
[9]
Van de Bussche, T.J. Letter to Dr. Thomas Lewis, November 26, 1984.
[10]
Wallace, D.R. An Overview of Computer Software Acceptance Testing. National Bureau of Standards Special Publication 500-136. {February, 1986).

Cited By

View all
  • (2024)Analyzing Privacy and Security in Cloud Computing EnvironmentsInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24JUN1024(1660-1665)Online publication date: 3-Jul-2024
  • (2024)Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00136(3458-3477)Online publication date: 19-May-2024
  • (2023)Voting Machines: Friend or Foe?SSRN Electronic Journal10.2139/ssrn.4609267Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 31, Issue 10
Oct. 1988
66 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/63039
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1988
Published in CACM Volume 31, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)154
  • Downloads (Last 6 weeks)47
Reflects downloads up to 30 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Analyzing Privacy and Security in Cloud Computing EnvironmentsInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24JUN1024(1660-1665)Online publication date: 3-Jul-2024
  • (2024)Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00136(3458-3477)Online publication date: 19-May-2024
  • (2023)Voting Machines: Friend or Foe?SSRN Electronic Journal10.2139/ssrn.4609267Online publication date: 2023
  • (2022)Spam Identification in Cloud Computing Based on Text Filtering SystemWireless Communications and Mobile Computing10.1155/2022/23099342022(1-7)Online publication date: 21-Aug-2022
  • (2019)An Experience in Testing the Security of Real-World Electronic Voting SystemsIEEE Transactions on Software Engineering10.1109/TSE.2009.5336:4(453-473)Online publication date: 3-Jan-2019
  • (2019)The design of a secure anonymous Internet voting systemComputers and Security10.1016/j.cose.2004.01.01523:4(330-337)Online publication date: 25-Nov-2019
  • (2019)A secure electronic voting protocol with IC cardsJournal of Systems and Software10.1016/S0164-1212(96)00166-539:2(93-101)Online publication date: 2-Jan-2019
  • (2018)Protecting the Integrity of Elections Using BiometricsBiometric-Based Physical and Cybersecurity Systems10.1007/978-3-319-98734-7_20(513-533)Online publication date: 25-Oct-2018
  • (2016)A Computer Simulator for Proportional Representation SystemsSocial Science Computer Review10.1177/08944393990170040317:4(435-444)Online publication date: 19-Aug-2016
  • (2011)Voting TechnologiesAnnual Review of Political Science10.1146/annurev.polisci.12.053007.14520514:1(353-378)Online publication date: 15-Jun-2011
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media