11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

176 e-maillanguages. However this cost may be <strong>of</strong>fset by not having todevelop or validate the more complicated s<strong>of</strong>tware neededfor all-electronic systems.Whatever system is used, federal law requires that visuallyor otherwise disabled persons be given the opportunity,wherever possible, to cast their own vote in privacy.With optical-scan ballots, this is accommodated with a specialdevice that plays an audio file listing the c<strong>and</strong>idatesfor each race, with the voter pressing a button to markthe choice. However, disability rights advocates have complainedthat existing systems still require that another personphysically insert the marked ballot into the scanner.Touchscreen systems, however, with the aid <strong>of</strong> audio cues,can be used by visually disabled persons without the needfor another person to be present. They are thus preferred bysome advocates for the disabled.Reforms <strong>and</strong> IssuesIn response to the problems with the 2000 election, Congresspassed the Help America Vote Act in 2002. Since then,the federal government has spent more than $3 billion tohelp states replace older voting systems—in many caseswith touchscreen systems.The biggest concern raised about electronic voting systemsis that they, like other computer systems, may be susceptibleto hacking or manipulation by dishonest <strong>of</strong>ficials.In 2007 teams <strong>of</strong> researchers at the University <strong>of</strong> California–Daviswere invited by the state to try to hack into itsvoting systems. For the test, the researchers were providedwith full access to the source code <strong>and</strong> documentation forthe systems, as well as physical access. The hacking teamswere able to break into <strong>and</strong> compromise every type <strong>of</strong> votingsystem tested. In their report, the researchers outlinedwhat they claimed to be surprisingly weak electronic <strong>and</strong>physical security, including flaws that could allow hackersto introduce computer viruses <strong>and</strong> take over control <strong>of</strong> thesystems.Manufacturers <strong>and</strong> other defenders <strong>of</strong> the technologyhave argued that the testing was unrealistic <strong>and</strong> that realworldhackers would not have had nearly as much informationabout or access to the systems. (This may underestimatethe resourcefulness <strong>of</strong> hackers, as shown with other systems,such as the phone system <strong>and</strong> computer networks.)Another issue is who will be responsible for independentlyreviewing the programming (source) code for eachsystem to verify that it does not contain flaws. Manufacturersgenerally resist such review, considering the source codeto be proprietary. (A possible alternative might be an opensourcevoting system. Advocates <strong>of</strong> open-source s<strong>of</strong>twareargue that it is safer precisely because it is open to scrutiny<strong>and</strong> testing—see open-source movement.)One common response to these security concerns is torequire that all systems generate paper records that can beverified <strong>and</strong> audited. Some defenders <strong>of</strong> existing technologysay that adding a parallel paper system is unnecessarilyexpensive <strong>and</strong> introduces other problems such as printerfailures. They argue that all-electronic systems can be madesafer <strong>and</strong> more secure, such as through the use <strong>of</strong> encryption.(A proposed compromise would be for the machine toprint out a simple receipt with a code that the voter coulduse to verify online that the vote was tabulated.)As <strong>of</strong> 2007, 28 states had passed laws requiring that votingsystems produce some sort <strong>of</strong> paper receipt or recordthat shows the voter what has been voted <strong>and</strong> that can beused later for an independent audit or recount,Although control <strong>of</strong> elections is primarily a state or localresponsibility, the federal government does have jurisdictionover elections for federal <strong>of</strong>fice. As a practical matter,any changes in voting technology or procedures m<strong>and</strong>atedby Congress for federal elections will end up being used inlocal elections as well.In 2007, congressional leaders decided not to require amajor overhaul <strong>of</strong> the nation’s election systems until at least2012. However, the inclusion <strong>of</strong> some sort <strong>of</strong> paper record isbeing m<strong>and</strong>ated for the 2008 election. For users <strong>of</strong> touchscreensystems, the simplest way to accommodate this is toadd small paper-spool printers, but some states have complainedthat their systems would require more-expensiveaccommodations.Meanwhile, a lively debate continues in many states <strong>and</strong>other jurisdictions about how to meet the need for accessiblebut secure voting systems without breaking the budget.Further ReadingDrew, Christopher. “Accessibility Isn’t Only Hurdle in VotingSystem Overhaul.” New York Times, July 21, 2007. Availableonline. URL: http://www.nytimes.com/2007/07/21/washington/21vote.html. Accessed September 20, 2007.Open Voting Consortium. Available online. URL: http://www.openvotingconsortium.org/. Accessed September 20, 2007.Rubin, Aviel. Brave New Ballot: The Battle to Safeguard Democracyin the Age <strong>of</strong> Electronic Voting. New York: Morgan Road Books,2006.Saltman, Roy G. The History <strong>and</strong> Politics <strong>of</strong> Voting <strong>Technology</strong>: InQuest <strong>of</strong> Integrity <strong>and</strong> Public Confidence. New York: PalgraveMacmillan, 2006.United States Election Assistance Commission. “2005 VoluntaryVoting System Guidelines.” Available online. URL: http://www.eac.gov/voting%20systems/voting-system-certification/2005-vvsg. Accessed September 20, 2007.“Verified Voting: M<strong>and</strong>atory Manual Audits <strong>of</strong> Voter-VerifiedPaper Records.” Available online. URL: http://www.verifiedvoting.org/. Accessed September 20, 2007.Wildemuth, John. “State Vote Machines Lose Test to Hackers.”San Francisco Chronicle, July 28, 2007, p. A-1. Availableonline. URL: http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/07/28/MNGP6R8TJO1.DTL. Accessed September 20,2007.e-mailElectronic mail is perhaps the most ubiquitous computerapplication in use today. E-mail can be defined as the sending<strong>of</strong> a message to one or more individuals via a computerconnection.Development <strong>and</strong> ArchitectureThe simplest form <strong>of</strong> e-mail began in the 1960s as a way thatusers on a time-sharing computer system could post <strong>and</strong>read messages. The messages consisted <strong>of</strong> text in a file thatwas accessible to all users. A user could simply log into the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!