E-voting results: Trust, but verify
Computerworld - Technology and process improvements implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable, according to a recent report by the Caltech-MIT Voting Technology Project.
Even so, the only way to absolutely ensure the integrity of e-votes cast is to audit the results and all voting technologies used in an election, the 85-page report cautioned.
Rather than setting security standards for voting equipment, the best way to ensure ballot integrity is to hand-count a large and random sample of the paper records of votes cast electronically, the report said.
The Voting Technology Project was launched to investigate the causes of the voting problems in Florida in 2000 and to make recommendations based on its findings.
Some progress has been made since 2000, said Michael Alvarez, co-director of the Voting Technology Project. The antiquated, lever-activated punch-card voting systems that led to the infamous hanging-chad fiasco in Florida have been mostly replaced with more reliable optical-scan and electronic voting systems, he said.
This year, only a small number of voting districts will use purely hand-counted paper ballots; most will use some form of electronic system with a way of verifying e-votes with a paper record.
However, Alvarez said, few jurisdictions have further upgraded voting equipment in recent years. He said he hopes to see that situation "change as public finances improve."
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Hardware in Computerworld's Hardware Topic Center.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts