E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Read original: arXiv:2404.12075 - Published 4/19/2024 by Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Gali~nanes, Bryan Ford
Total Score

0

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

• This paper examines public perceptions of coercion and vote buying in the context of online voting, as well as the potential for misuse of fake credentials to undermine the integrity of online voting systems.

Plain English Explanation

• The researchers wanted to understand how people feel about the risks of coercion (being forced to vote a certain way) and vote buying (being paid to vote a certain way) in online voting systems. They also looked at whether it would be easy for people to use fake credentials, like fake IDs, to cast multiple votes.

• The researchers conducted surveys and experiments to get a sense of people's views on these issues. They found that many people are worried about coercion and vote buying in online voting, and that it may be relatively easy for people to use fake credentials to vote multiple times.

• These findings suggest that online voting systems may need additional security measures to address concerns about coercion, vote buying, and the misuse of credentials. Ensuring the integrity and security of online voting is critical for maintaining public trust in the democratic process.

Technical Explanation

• The researchers conducted a series of surveys and experiments to investigate public perceptions of coercion and vote buying in online voting, as well as the usability of fake credentials in such systems.

• In the surveys, participants were asked about their concerns regarding coercion and vote buying in online voting, as well as their views on the security of online voting systems. The researchers found that many participants expressed significant concerns about these issues.

• To assess the usability of fake credentials, the researchers conducted experiments in which participants were asked to create fake voter IDs and use them to cast multiple votes in a simulated online voting system. The results showed that it was relatively easy for participants to create and use fake credentials to subvert the voting process.

• Overall, the findings suggest that online voting systems may be vulnerable to coercion, vote buying, and the misuse of credentials, which could undermine the integrity and security of the voting process. The researchers recommend that additional security measures be implemented to address these concerns and maintain public trust in online voting.

Critical Analysis

• The research findings highlight important concerns about the security and integrity of online voting systems. The potential for coercion, vote buying, and the misuse of credentials poses significant challenges that must be addressed in order to ensure the trustworthiness of online voting.

• However, the study is limited in scope, focusing only on public perceptions and the usability of fake credentials. It does not provide a comprehensive assessment of the actual security vulnerabilities in existing online voting systems, nor does it offer concrete solutions to address these issues.

• Additionally, the study does not consider the potential benefits of online voting, such as increased accessibility and convenience for voters. A more balanced analysis would weigh the pros and cons of online voting and explore ways to mitigate the identified risks while preserving the potential advantages.

• Further research is needed to better understand the technical and operational challenges of securing online voting systems, as well as the social and political factors that influence public trust in these systems. Interdisciplinary collaboration between computer scientists, election officials, and social scientists could provide a more holistic approach to addressing the challenges of online voting.

Conclusion

• This research highlights significant concerns about the security and integrity of online voting systems, particularly regarding the potential for coercion, vote buying, and the misuse of fake credentials. These findings suggest that additional security measures and safeguards may be necessary to ensure the trustworthiness of online voting and maintain public confidence in the democratic process.

• The research underscores the need for continued scrutiny and improvement of online voting systems to address these challenges and ensure that the benefits of increased accessibility and convenience are balanced with robust security and integrity measures. Addressing these issues will be crucial for the future of online voting and its role in upholding democratic principles.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Total Score

0

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Gali~nanes, Bryan Ford

Online voting is attractive for convenience and accessibility, but is more susceptible to voter coercion and vote buying than in-person voting. One mitigation is to give voters fake voting credentials that they can yield to a coercer. Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally. An important unanswered question is how ordinary voters perceive such a mitigation: whether they could understand and use fake credentials, and whether the coercion risks justify the costs of mitigation. We present the first systematic study of these questions, involving 150 diverse individuals in Boston, Massachusetts. All participants registered and voted in a mock election: 120 were exposed to coercion resistance via fake credentials, the rest forming a control group. Of the 120 participants exposed to fake credentials, 96% understood their use. 53% reported that they would create fake credentials in a real-world voting scenario, given the opportunity. 10% mistakenly voted with a fake credential, however. 22% reported either personal experience with or direct knowledge of coercion or vote-buying incidents. These latter participants rated the coercion-resistant system essentially as trustworthy as in-person voting via hand-marked paper ballots. Of the 150 total participants to use the system, 87% successfully created their credentials without assistance; 83% both successfully created and properly used their credentials. Participants give a System Usability Scale score of 70.4, which is slightly above the industry's average score of 68. Our findings appear to support the importance of the coercion problem in general, and the promise of fake credentials as a possible mitigation, but user error rates remain an important usability challenge for future work.

Read more

4/19/2024

🏅

Total Score

0

Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)

Marie-Laure Zollinger, Peter B. R{o}nne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga

Voting protocols seek to provide integrity and vote privacy in elections. To achieve integrity, procedures have been proposed allowing voters to verify their vote - however this impacts both the user experience and privacy. Especially, vote verification can lead to vote-buying or coercion, if an attacker can obtain documentation, i.e. a receipt, of the cast vote. Thus, some voting protocols go further and provide mechanisms to prevent such receipts. To be effective, this so-called receipt-freeness depends on voters being able to understand and use these mechanisms. In this paper, we present a study with 300 participants which aims to evaluate the voters' experience of the receipt-freeness procedures in the e-voting protocol Selene in the context of vote-buying. This actually constitutes the first user study dealing with vote-buying in e-voting. While the usability and trust factors were rated low in the experiments, we found a positive correlation between trust and understanding.

Read more

7/19/2024

Election Polls on Social Media: Prevalence, Biases, and Voter Fraud Beliefs
Total Score

0

Election Polls on Social Media: Prevalence, Biases, and Voter Fraud Beliefs

Stephen Scarano, Vijayalakshmi Vasudevan, Mattia Samory, Kai-Cheng Yang, JungHwan Yang, Przemyslaw A. Grabowicz

Social media platforms allow users to create polls to gather public opinion on diverse topics. However, we know little about what such polls are used for and how reliable they are, especially in significant contexts like elections. Focusing on the 2020 presidential elections in the U.S., this study shows that outcomes of election polls on Twitter deviate from election results despite their prevalence. Leveraging demographic inference and statistical analysis, we find that Twitter polls are disproportionately authored by older males and exhibit a large bias towards candidate Donald Trump relative to representative mainstream polls. We investigate potential sources of biased outcomes from the point of view of inauthentic, automated, and counter-normative behavior. Using social media experiments and interviews with poll authors, we identify inconsistencies between public vote counts and those privately visible to poll authors, with the gap potentially attributable to purchased votes. We also find that Twitter accounts participating in election polls are more likely to be bots, and election poll outcomes tend to be more biased, before the election day than after. Finally, we identify instances of polls spreading voter fraud conspiracy theories and estimate that a couple thousand of such polls were posted in 2020. The study discusses the implications of biased election polls in the context of transparency and accountability of social media platforms.

Read more

6/4/2024

👀

Total Score

0

Safe Voting: Resilience to Abstention and Sybils

Reshef Meir, Gal Shahaf, Ehud Shapiro, Nimrod Talmon

Voting rules may implement the will of the society when all eligible voters vote, and only them. However, they may fail to do so when sybil (fake or duplicate) votes are present and when only some honest (non sybil) voters actively participate. As, unfortunately, sometimes this is the case, our aim here is to address social choice in the presence of sybils and voter abstention. To do so we build upon the framework of Reality-aware Social Choice: we assume the status-quo as an ever-present distinguished alternative, and study Status-Quo Enforcing voting rules, which add virtual votes in support of the status-quo. We characterize the tradeoff between safety and liveness (the ability of active honest voters to maintain/change the status-quo, respectively) in several domains, and show that the Status-Quo Enforcing voting rules are often optimal. We comment on the applicability of our methods and analyses to the governance of digital communities.

Read more

4/9/2024