Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - IT-Security

Analyzing Online Voting Systems for Flaw Detection

Titel: Analyzing Online Voting Systems for Flaw Detection

Forschungsarbeit , 2015 , 16 Seiten , Note: A

Autor:in: Md. Shamsur Rahim (Autor:in), AZM Ehtesham Chowdhury (Autor:in)

Informatik - IT-Security
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

This research paper contains several case studies concerning online voting manipulation. Case studies data are analyzed to discover how computer technology is used to manipulate voting in Social Media.

The study found that there are many potential weaknesses that should be treated as highly hazardous for online voting. We believe that, if these weaknesses can be resolved then online voting will be more trustworthy as well widely acceptable.

Leseprobe


Table of Contents

1. Introduction

2. Background Study

3. Case Studies

3.1. Case 1: Photo Contest in Facebook

3.2. Case 2: Voting through Tweets on Twitter using Hashtag

3.3. Case 3: YouTube Video Contest

3.4. Case 4: Product Review in E-Commerce Sites

3.5. Case 5: Google Form’s Poll Manipulation

4. Findings

5. Possible Characteristics of Futuristic Voting System

6. Conclusion

Research Objectives and Core Themes

The primary objective of this research is to identify, analyze, and document the various security flaws and manipulation techniques present in modern online voting and contest systems. By examining real-world case studies across social media and e-commerce platforms, the study seeks to propose potential solutions and architectural requirements to foster a more secure, trustworthy, and fair environment for future online voting and electoral processes.

  • Identification of common vulnerabilities in online voting platforms.
  • Analysis of manipulation techniques involving bots and fake accounts.
  • Evaluation of impact on user trust and contest integrity.
  • Development of potential security mechanisms for future voting systems.

Excerpt from the Book

3.5. Case 5: Google Form’s Poll Manipulation

Because of the user friendly feature, Google form [23] is an excellent way to collect survey or poll result vastly around the World. Sometimes, voting for different contest are held with the help of Google Form. With the help of Software Bot, it’s possible to cast thousands of votes just in an hour. Although, in Google Form “one vote per person” restriction can be implied by mandating login, but the security of Google form is not enough to prevent voting manipulation. For an experiment, we have created a Google Form. In that form, users are required to answer a question and submit it with their Name.

In the next step, we have implemented a script using Selenium [25] that can cast vote with fake names and desired answer. To develop a reliable polling system, a system should detect multiple vote casting.

Summary of Chapters

1. Introduction: This chapter highlights the rapid advancement of digitization and introduces the critical problem of security vulnerabilities in online voting contests.

2. Background Study: This chapter provides essential definitions and technical context regarding social media features, online contests, fake accounts, and the role of internet bots.

3. Case Studies: This chapter presents a detailed investigation into five specific real-world scenarios where online voting systems are susceptible to manipulation.

4. Findings: This chapter summarizes the observed vulnerabilities, confirming that current systems lack efficient mechanisms to prevent automated tampering.

5. Possible Characteristics of Futuristic Voting System: This chapter proposes potential security solutions, including device tracking, captcha integration, and protocol updates like IPv6, to improve voting integrity.

6. Conclusion: This chapter reflects on the necessity of addressing security without sacrificing user-friendliness, emphasizing the path toward secure online national elections.

Keywords

Online Voting Contest, Online Election System, Social Media, Case Studies, Vote Manipulation, Internet Bot, Fake Accounts, Security, Digitization, Privacy, Selenium, IPv6, Authentication, Data Integrity, User Authentication.

Frequently Asked Questions

What is the core focus of this research?

The research focuses on investigating security flaws and manipulation tactics within online voting systems and digital contests across various social media platforms.

What are the primary areas covered in the study?

The study examines Facebook photo contests, Twitter hashtag voting, YouTube video contests, e-commerce product reviews, and Google Form polls.

What is the main goal of this research paper?

The goal is to analyze how online voting is currently compromised and to suggest technical improvements for developing more secure and reliable electronic voting systems.

Which methodology is employed in this study?

The authors utilize a case study-based methodology, performing technical experiments to demonstrate how simple scripts can manipulate online voting outcomes.

What does the main body of the paper cover?

The main body details the mechanics of how bots and fake accounts exploit existing social media features to artificially inflate results, followed by a discussion on proposed security countermeasures.

What key terms best describe the work?

The paper is best defined by keywords such as Online Voting Contest, Vote Manipulation, Internet Bot, and Security.

How is the "Google Form" experiment conducted?

The researchers created a sample Google Form and used a Selenium-based automation script to prove that one can submit thousands of votes with fake names, bypassing standard security.

What are the proposed solutions for future voting systems?

The authors suggest implementing IP/MAC address tracking, intelligent captcha challenges, and transitioning to more secure protocols like IPv6 to uniquely identify and verify voters.

Does the paper advocate for or against online elections?

The paper argues that while current systems are flawed, establishing a secure, reliable framework could eventually make online national elections possible and fair.

Ende der Leseprobe aus 16 Seiten  - nach oben

Details

Titel
Analyzing Online Voting Systems for Flaw Detection
Note
A
Autoren
Md. Shamsur Rahim (Autor:in), AZM Ehtesham Chowdhury (Autor:in)
Erscheinungsjahr
2015
Seiten
16
Katalognummer
V307331
ISBN (eBook)
9783668057203
ISBN (Buch)
9783668057210
Sprache
Englisch
Schlagworte
online voting voting manipulation onlineabstimmung wahlmanipulation wahlfälschung
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Md. Shamsur Rahim (Autor:in), AZM Ehtesham Chowdhury (Autor:in), 2015, Analyzing Online Voting Systems for Flaw Detection, München, GRIN Verlag, https://www.grin.com/document/307331
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  16  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum