Grin logo
de en es fr
Boutique
GRIN Website
Publier des textes, profitez du service complet
Aller à la page d’accueil de la boutique › Informatique - Sécurité des Données

Analyzing Online Voting Systems for Flaw Detection

Titre: Analyzing Online Voting Systems for Flaw Detection

Travail de Recherche , 2015 , 16 Pages , Note: A

Autor:in: Md. Shamsur Rahim (Auteur), AZM Ehtesham Chowdhury (Auteur)

Informatique - Sécurité des Données
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

This research paper contains several case studies concerning online voting manipulation. Case studies data are analyzed to discover how computer technology is used to manipulate voting in Social Media.

The study found that there are many potential weaknesses that should be treated as highly hazardous for online voting. We believe that, if these weaknesses can be resolved then online voting will be more trustworthy as well widely acceptable.

Extrait


Table of Contents

1. Introduction

2. Background Study

3. Case Studies

3.1. Case 1: Photo Contest in Facebook

3.2. Case 2: Voting through Tweets on Twitter using Hashtag

3.3. Case 3: YouTube Video Contest

3.4. Case 4: Product Review in E-Commerce Sites

3.5. Case 5: Google Form’s Poll Manipulation

4. Findings

5. Possible Characteristics of Futuristic Voting System

6. Conclusion

Research Objectives and Core Themes

The primary objective of this research is to identify, analyze, and document the various security flaws and manipulation techniques present in modern online voting and contest systems. By examining real-world case studies across social media and e-commerce platforms, the study seeks to propose potential solutions and architectural requirements to foster a more secure, trustworthy, and fair environment for future online voting and electoral processes.

  • Identification of common vulnerabilities in online voting platforms.
  • Analysis of manipulation techniques involving bots and fake accounts.
  • Evaluation of impact on user trust and contest integrity.
  • Development of potential security mechanisms for future voting systems.

Excerpt from the Book

3.5. Case 5: Google Form’s Poll Manipulation

Because of the user friendly feature, Google form [23] is an excellent way to collect survey or poll result vastly around the World. Sometimes, voting for different contest are held with the help of Google Form. With the help of Software Bot, it’s possible to cast thousands of votes just in an hour. Although, in Google Form “one vote per person” restriction can be implied by mandating login, but the security of Google form is not enough to prevent voting manipulation. For an experiment, we have created a Google Form. In that form, users are required to answer a question and submit it with their Name.

In the next step, we have implemented a script using Selenium [25] that can cast vote with fake names and desired answer. To develop a reliable polling system, a system should detect multiple vote casting.

Summary of Chapters

1. Introduction: This chapter highlights the rapid advancement of digitization and introduces the critical problem of security vulnerabilities in online voting contests.

2. Background Study: This chapter provides essential definitions and technical context regarding social media features, online contests, fake accounts, and the role of internet bots.

3. Case Studies: This chapter presents a detailed investigation into five specific real-world scenarios where online voting systems are susceptible to manipulation.

4. Findings: This chapter summarizes the observed vulnerabilities, confirming that current systems lack efficient mechanisms to prevent automated tampering.

5. Possible Characteristics of Futuristic Voting System: This chapter proposes potential security solutions, including device tracking, captcha integration, and protocol updates like IPv6, to improve voting integrity.

6. Conclusion: This chapter reflects on the necessity of addressing security without sacrificing user-friendliness, emphasizing the path toward secure online national elections.

Keywords

Online Voting Contest, Online Election System, Social Media, Case Studies, Vote Manipulation, Internet Bot, Fake Accounts, Security, Digitization, Privacy, Selenium, IPv6, Authentication, Data Integrity, User Authentication.

Frequently Asked Questions

What is the core focus of this research?

The research focuses on investigating security flaws and manipulation tactics within online voting systems and digital contests across various social media platforms.

What are the primary areas covered in the study?

The study examines Facebook photo contests, Twitter hashtag voting, YouTube video contests, e-commerce product reviews, and Google Form polls.

What is the main goal of this research paper?

The goal is to analyze how online voting is currently compromised and to suggest technical improvements for developing more secure and reliable electronic voting systems.

Which methodology is employed in this study?

The authors utilize a case study-based methodology, performing technical experiments to demonstrate how simple scripts can manipulate online voting outcomes.

What does the main body of the paper cover?

The main body details the mechanics of how bots and fake accounts exploit existing social media features to artificially inflate results, followed by a discussion on proposed security countermeasures.

What key terms best describe the work?

The paper is best defined by keywords such as Online Voting Contest, Vote Manipulation, Internet Bot, and Security.

How is the "Google Form" experiment conducted?

The researchers created a sample Google Form and used a Selenium-based automation script to prove that one can submit thousands of votes with fake names, bypassing standard security.

What are the proposed solutions for future voting systems?

The authors suggest implementing IP/MAC address tracking, intelligent captcha challenges, and transitioning to more secure protocols like IPv6 to uniquely identify and verify voters.

Does the paper advocate for or against online elections?

The paper argues that while current systems are flawed, establishing a secure, reliable framework could eventually make online national elections possible and fair.

Fin de l'extrait de 16 pages  - haut de page

Résumé des informations

Titre
Analyzing Online Voting Systems for Flaw Detection
Note
A
Auteurs
Md. Shamsur Rahim (Auteur), AZM Ehtesham Chowdhury (Auteur)
Année de publication
2015
Pages
16
N° de catalogue
V307331
ISBN (ebook)
9783668057203
ISBN (Livre)
9783668057210
Langue
anglais
mots-clé
online voting voting manipulation onlineabstimmung wahlmanipulation wahlfälschung
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Md. Shamsur Rahim (Auteur), AZM Ehtesham Chowdhury (Auteur), 2015, Analyzing Online Voting Systems for Flaw Detection, Munich, GRIN Verlag, https://www.grin.com/document/307331
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  16  pages
Grin logo
  • Grin.com
  • Expédition
  • Contact
  • Prot. des données
  • CGV
  • Imprint