20,881 Hits in 4.6 sec

Trust, Identity, and the Effects of Voting Technologies on Voting Behavior

Anne-Marie Oostveen, Peter van den Besselaar
2005 Social science computer review  
A model is described to explain the effect of e-voting technology on voting behavior and the outcome of a ballot. In the model, social identity and trust play a central role.  ...  After an initial and partial test, the article discusses directions for further research.  ...  Internet-based voting enables individuals to vote from many places and at different moments and, therefore, in different social contexts.  ... 
doi:10.1177/0894439305275852 fatcat:bc7ydknynzekhgacgljkqyci6m

Sybil Attacks and Their Defenses in the Internet of Things

Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen
2014 IEEE Internet of Things Journal  
We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive  ...  The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate  ...  In SumUp, a trusted node computes a set of max-flow paths on the trusted graph and then aggregates the votes.  ... 
doi:10.1109/jiot.2014.2344013 fatcat:lvq4u25hnzewnfvuf6nxqzu4oa

Digital Trust: Trust Management in Cyberspace

Elena Ferrari, Bhavani Thuraisingham
2020 IEEE Internet Computing  
Trust management has an increasing number of applications, being pervasive in several heterogeneous domains, such as e-voting, social media, cloud computing, IoT, emergency management, and e-commerce.  ...  As a result, we are now immersed in the socalled cyberspace, where millions of electronic devices of various types and computational capacities are connected via the Internet.  ...  Trust management has an increasing number of applications, being pervasive in several heterogeneous domains, such as e-voting, social media, cloud computing, IoT, emergency management, and e-commerce.  ... 
doi:10.1109/mic.2020.3028898 fatcat:grvyjky7dnavdjuykx2fubawge

Smart Accounts for Decentralized Governance on Smart Cities

Vitor N. Coelho, Thays A. Oliveira, Wellington Tavares, Igor M. Coelho
2021 Smart Cities  
The core mechanism of this study lies within the scope of smart accounts and digital identities.  ...  These topics enclose smart cities trends that seek to increase citizens' participation in the social decision making process, in a transparent way that is usually managed throughout decentralized systems  ...  Thays Oliveira finished her PhD with focus on Technologies and Citizens in the scope of Smart Cities. Wellington finished his PhD with awards on the topic of online governance.  ... 
doi:10.3390/smartcities4020045 fatcat:v7ilrpvis5fcvhsahdokv2n7pu

Implementation of a Reputation System for Pervasive Social Networking

Yu Chen, Zheng Yan, Valtteri Niemi
2011 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications  
How to help mobile users to build up trust in such an environment is becoming an important issue. We develop a reputation system for pervasive social networking.  ...  It also provides detailed reputation information and supports on-chat voting and afterwards voting. This demo paper introduces the system design and its principal functionalities.  ...  However, trust and reputation aspects in social networking are not considered in these projects.  ... 
doi:10.1109/trustcom.2011.115 dblp:conf/trustcom/ChenYN11 fatcat:2ekvjnjgoza4laboxivhjhrpha

E-Voting Solutions for Digital Democracy in Knowledge Society

2016 Informatică economică  
Even more, the context of electronic voting in digital democracy involves aspects regarding globalization, technical challenges concerning interoperability, data standardization and security.  ...  The current context encompasses technological, legislative, political, economic and social aspects.  ...  In parallel, other US states adopt various systems based on optical scanning.  ... 
doi:10.12948/issn14531305/20.3.2016.06 fatcat:nbdulz5j6bgstf5qg65vcqem2q

The diffusion of internet voting. Usage patterns of internet voting in Estonia between 2005 and 2015

Kristjan Vassil, Mihkel Solvak, Priit Vinkel, Alexander H. Trechsel, R. Michael Alvarez
2016 Government Information Quarterly  
Data from eight e-enabled elections between 2005 and 2015 in Estonia, were used to investigate changes to the profile of e-voters and contrast them to those voting by conventional means.  ...  Thus, internet voting has the potential to be used by a wide range of voter types, bridge societal divisions, and emerge as an inclusive innovative voting technology.  ...  Evoters used to be Estonian-speakers from a distinct age group, who have good computer literacy and trust in the system of internet voting.  ... 
doi:10.1016/j.giq.2016.06.007 fatcat:kh3yipktrfapvdfevgwh7ndfeq

VoteTrust: A System to Defend against Social Network Sybils in Facebook

Priyanka P, Deepthi K.
2016 International Journal of Computer Applications  
Facebook operates a leading real-name social networking internet platform, which enables users to connect and communicate with each other, share information, and to enjoy a wide range of other features  ...  Online social networks(OSN) suffers from the creation of fake accounts that introduce fake product reviews, malware and spam, existing defenses focus on using the social graph structure to isolate fakes  ...  Trust based vote assignment The main aim of trust-based Votes assignment is to assign low vote capacity to fake users that can be useful to limit the number of votes that fake users could cast for each  ... 
doi:10.5120/ijca2016909854 fatcat:gokbvuipj5gbtc35amzvvjqp2y

Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks

Ali Alharbi, Mohamed Zohdy, Debatosh Debnath, Richard Olawoyin, George Corser
2018 Zenodo  
Sybil attacks present a unique threat in the context of Mobile Social Networks and the Internet of Things.  ...  ; fabricated and stolen identity attacks; and simultaneous and nonsimultaneous attacks.  ...  All identity attacks present a significant security risk in distributed networks and a major challenge in the context of the Internet of Things (IoT) and Mobile Social Networks.  ... 
doi:10.5281/zenodo.2544624 fatcat:6t3z5wwnerb3zntjuw2y7t3hsi

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols

Divya Siddarth, Sergey Ivliev, Santiago Siri, Paula Berman
2020 Frontiers in Blockchain  
Inspired by the progress in cryptocurrencies and blockchain technology, there has recently been a surge in networked protocols that make use of subjective inputs such as voting, vouching, and interpreting  ...  Most self-sovereign identity systems consist of strictly objective claims, cryptographically signed by trusted third-party attestors.  ...  ACKNOWLEDGMENTS We would like to express our sincere gratitude to Adam Stallard, Clément Lesaege, Peter Porobov, Rich McAteer, Vinay Taylor, and Hugo Trentesaux for sharing their work with us and contributing  ... 
doi:10.3389/fbloc.2020.590171 fatcat:e72zwsczqjbdfldfqgh7odlwfm

Institutional Drivers of Internet Voting Adoption in Ghana: A Qualitative Exploratory Studies

Samuel Agbesi
2020 Nordic and Baltic Journal of Information and Communications Technologies  
Internet voting system adoption in elections can bring enormous benefits to an electoral process.  ...  The discussion of the findings and the implication of the results were discussed in the study.  ...  The results of Carter et al. (2011a) were also confirmed by the work of , in which the authors examine how social identity and trust and technological factors influence user's intention to adopt the  ... 
doi:10.13052/nbjict1902-097x.2020.003 fatcat:nt2gak66ubdhpkwptd5kgtyz6y


Ashwajit Ramteke .
2014 International Journal of Research in Engineering and Technology  
In recent year, most popular websites are social media, it has tremendous growth take in consideration as a fast network to connect a people and thus it's give idea of overload of millions of internet  ...  These social network offer to carry out desirable means for digital social inter connection and information involvement, but also come again a number of security and privacy problems.  ...  In this identity base management system, solution is based upon the social services. Structure of the social network are having access right.  ... 
doi:10.15623/ijret.2014.0304056 fatcat:qqgexlp6cbdajbfgihgjusk46q

The Decision to Adopt Electronic Voting in South Africa

2018 Muma Case Review  
His goal was then to advise whether South Africa was in a position to adopt e-voting.  ...  The IEC had commissioned him to undertake a neutral comprehensive international study of e-voting implementations and experimentation.  ...  Studies of e-voting in different countries highlighted the need for countries that adopted e-voting to have a voting populace with inherent trust in the e-voting process and systems.  ... 
doi:10.28945/4216 fatcat:ynwee2sd5vdrbblo6o6rrv34ai

I-voting – opportunities and threats. Conditions for the effective implementation of Internet voting on the example of Switzerland and Estonia

Maciej Górny
2021 Przegląd Politologiczny  
The aim of the article is to present the opportunities and threats resulting from the implementation of voting via the Internet (i-voting) and to discuss the conditions for effective implementation of  ...  The key conclusion is that the implementation of i-voting must be preceded by many years of political, legal, infrastructural and social activities, and that the created system must be as transparent as  ...  According to Priit Vinkel, the Estonian Internet voting system is based on three pillars embedded in the foundation of trust: -An open and willing society to e-government solutions; -Secure remote electronic  ... 
doi:10.14746/pp.2021.26.1.9 fatcat:ttkreayinrhpfjpor7frfxsk5u

A distributed reputation approach to cooperative Internet routing protection

Harlan Yu, J. Rexford, E.W. Felten
2005 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec).  
Frequently, this trust has been misguided, resulting in wide-spread outages and significant concerns about future attacks.  ...  Instead, we argue that the existing trust relationships between network operators (and the institutions they represent) are a powerful force for improving the security of BGP, without changing the underlying  ...  Acknowledgment We thank Nick Feamster and the anonymous reviewers for their many detailed and insightful comments.  ... 
doi:10.1109/npsec.2005.1532057 fatcat:svwijsmizjcs7ncagpjmjgtc64
« Previous Showing results 1 — 15 out of 20,881 results