Received:
2017-08-20 | Accepted:
2017-11-14 | Published:
2017-12-29
Title
Peculiarities of cyber security management in the process of internet voting implementation
Abstract
The modern world could not be imagined without the information and communications technology. Today‘s society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world‘s Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident‘s direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.
Keywords
internet voting, e-voting, cyber security, cyber security management, cyber security model
JEL classifications
D72
, D80
, H83
URI
http://jssidoi.org/jesi/article/156
DOI
HAL
Pages
368-402
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
References
Antonucci D. 2017. The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities.
Search via ReFindit
Association for Computing Machinery, (2006). Statewide Databases of Registered Voter: Study of Accuracy, Privacy, Usability, Security, and Reliability Issues commissioned by the U.S. Public Policy Committee of the Association for Computing Machinery. Available on the Internet: https://people.eecs.berkeley.edu/~daw/papers/vrd-acm06.pdf
Search via ReFindit
Baležentis A.; Žalimaitė M. 2011. Ekspertinių vertinimų taikymas inovacijų plėtros veiksnių analizėje: Lietuvos inovatyvių įmonių vertinimas. Available on the Internet: http://mts.asu.lt/mtsrbid/article/viewFile/269/298
Search via ReFindit
Barrat J.; Goldsmith B.; Turner J. 2012. International Experience with E-Voting. Norwegian E-Vote Project. Available on the Internet: https://www.parliament.uk/documents/speaker/digital-democracy/IFESIVreport.pdf
Search via ReFindit
Clarke D., Martens T. 2017. E-Voting in Estonia. Real-World Electronic Voting: Design, Analysis and Deployment, p. 129-141, CRC press.
Search via ReFindit
Cyber security law of Lithuania Republic, 2014.
Search via ReFindit
Cybernetica, 2015. For greater safety and security in the world. Available on the Internet: http://cyber.ee/en/about-us
Search via ReFindit
Dykstra J., 2017. Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems.
Search via ReFindit
Elections BC. A non-partisan Office of the Legislature, (2011). Discussion Paper: Internet Voting. Available on the Internet: http://www.elections.bc.ca/docs/Internet-Voting-Discussion-Paper.pdf
Search via ReFindit
Erbschloe M., 2017. Threat Level Red: Cybersecurity Research Programs of the U.S. Government, CRC press.
Search via ReFindit
Estonia.eu. 2015. Estonian Internet voting system.
Search via ReFindit
Fuschi, D.L. & Tvaronavičienė, M., 2014. Sustainable development, big data and supervisory control: service quality in banking sector. Journal of Security and Sustainability Issues, 3(3), 5–14. https://doi.org/10.9770/jssi.2014.3.3(1)
Search via ReFindit
General Lithuanian Police Commissioner Order No. 5-V-101 "On Approval of the Description of the Information Required for Cybercrime Investigations, Possessing, Police Instructions and Cybersecurity Investigation Procedures" (2015).
Search via ReFindit
Geneva State Chancellery, 2010. The Geneva internet voting system. Available on the Internet: https://www.coe.int/t/dgap/goodgovernance/Activities/E-voting/EVoting_Documentation/passport_evoting2010.pdf
Search via ReFindit
Goldsmith B., 2017. Guidelines for Trialling E-Voting in National Elections. Real-World Electronic Voting: Design, Analysis and Deployment, p. 19-47, CRC press.
Search via ReFindit
Halderman J. A., 2017. Practical Attacks on Real-World E-Voting. Real-World Electronic Voting: Design, Analysis and Deployment, p.143-170, CRC press.
Search via ReFindit
Hampson C. N., 2012. Hacktivism: A New Breed of Protest in a Networked World. Boston College Internwtional and comparitive Law Review, p. 511-542.
Search via ReFindit
Hao F., Ryan P. Y. A., 2017. Real-World Electronic Voting: Design, Analysis and Deployment, CRC press.
Search via ReFindit
Independent Panel on internet Voting, (2014). Recommendations Report the Legislative Assembly of British Columbia. Available on the Internet: https://www.verifiedvoting.org/wp-content/uploads/2014/10/CA-BC-2014-recommendations-final-report.pdf
Search via ReFindit
Jastiuginas S., 2011. Informacijos saugumo valdymas Lietuvos viešajame sektoriuje [Management of information security in public sector], Informacijos mokslai 57: p. 7-25.
Search via ReFindit
Jefferson D., Rubin A. D., Simons B., Wagner D., (2004). A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE).
Search via ReFindit
Kiškis M. et al., 2006. Teisės informatika ir informatikos teisė. Vilnius: Mykolo Romerio universitetas.
Search via ReFindit
Kohnke A., Shoemaker D., Sigler K., 2016. The complete guide to cybersecurity risks and controls, CRC press.
Search via ReFindit
Law on State and Service of Securities of the Republic of Lithuania, 1999.
Search via ReFindit
Limba T.; Agafonov K., 2012. Elektroninių rinkimų sistemų konstravimo principai, modeliai ir jų apsaugos užtikrinimas [Construction principles of electronic voting systems], Socialinės technologijos, 2(2): 376-389.
Search via ReFindit
Limba T.; Plėta T.; Agafonov K.; Damkus M. 2017. Cyber security management model for critical infrastructure, Entrepreneurship and Sustainability Issues 4(4): 559-573. https://doi.org/10.9770/jesi.2017.4.4(12)
Search via ReFindit
Lithuania state security department (2014). Kas, kaip ir kodėl šnipinėja Lietuvoje. Available on the Internet: https://www.vsd.lt/wp-content/uploads/2017/03/kaip-snipinejama-Lietuvoje.pdf
Search via ReFindit
Middleton B., 2017. A History of Cyber Security Attacks: 1980 to Present, CRC press.
Search via ReFindit
Ministry of the Interior of the Republic of Lithuania, (2005). Information security for employees of state institutions.
Search via ReFindit
Owen T.; Noble W.; Speed F. C., 2017. New Perspectives on Cybercrime.
Search via ReFindit
Parliamentary Research Department of the Parliament of the Republic of Lithuania, 2015. Online voting: foreign experience and perspectives in Lithuania. Available on the Internet: http://www.vrk.lt/documents/10180/556540/Balsification+internet.pdf/a5247fe6-d96e-437d-8135-5db76da1f66f
Search via ReFindit
Puiggalí J.; Cucurull J.; Guasch S.; Krimmer R., 2014. Verifiability Experiences in Government Online Voting Systems.
Search via ReFindit
Repečka G., 2007. Elektroninis parašas [Electronic signature], Naujoji komunikacija 16 (212): 22-24.
Search via ReFindit
Repečka G., 2007. Saugus duomenų perdavimas internetu: SSL/TLS. Naujoji komunikacija, 12 (208), p. 15-16.
Search via ReFindit
Resolution of Government of the Republic of Lithuania No. 796 "On the Approval of the Program of Electronic Information Security (Cybersecurity) Development in 2011-2019". 2011.
Search via ReFindit
SANS Institute InfoSec Reading Room, 2001. Understanding Intrusion Detection Systems. Available on the Internet: https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337
Search via ReFindit
Scytl Innovating Democracy, 2015. Scytl Voter Registration. Available on the Internet: http://www.scytl.com/en/products/pre-election/scytl-voter-registration
Search via ReFindit
Scytl.com, 2017. Online voting technology. Available on the Internet: https://www.scytl.com/wp-content/uploads/2015/09/DIGITAL_online-voting.pdf
Search via ReFindit
Shah N., 2013. On The Radar: Scytl. An end-to-end election modernization platform.
Search via ReFindit
Shahandasht S. F., 2017. Electoral Systems Used around the World. Real-World Electronic Voting: Design, Analysis and Deployment, p. 77-102, CRC press.
Search via ReFindit
Springall D. et. al., 2014. Security Analysis of the Estonian Internet Voting System. University of Michigan. Available on the Internet: https://jhalderm.com/pub/papers/ivoting-ccs14.pdf
Search via ReFindit
Štitilis D., 2011. Elektroniniai nusikaltimai [Electronic crime] (mokomasis leidinys). Vilnius: Mykolo Romerio universitetas.
Search via ReFindit
Štitilis D., 2013. Kibernetinio saugumo teisinis reguliavimas: kibernetinio saugumo strategijos [Legal regulation of cyber security: strategies of cyber security], Socialinės technologijos 3(1): 189-207.
Search via ReFindit
The Center for Internet Security, 2015. Critical Security Controls for Effective Cyber Defense.Available on the Internet: https://cybersecurity.idaho.gov/wp-content/uploads/sites/23/2016/10/CSCmaster.pdf
Search via ReFindit
The Government of the Republic of Lithuania resolution No. 716 "On the approval of the description of the guidelines for the determination of the general electronic information security requirements, the description of the guidelines for content of documental content documents and of the state information systems, registers and other information systems classification and electronic information". 2013.
Search via ReFindit
University of Tartu, 2015. E-voting. Available on the Internet: https://courses.cs.ut.ee/2015/infsec/fall/Main/E-voting
Search via ReFindit
Vegas C., Barrat J., 2017. Overview of Current State of E-Voting Worldwide. Real-World Electronic Voting: Design, Analysis and Deployment, p. 51-76, CRC press.
Search via ReFindit
Virbalienė A., 2011. Vidinė organizacijos komunikacija [Inner communication in organization]. Klaipėda: Socialinių mokslų kolegija. Available on the Internet: http://www.esparama.lt/es_parama_pletra/failai/ESFproduktai/2011_Vidine_organizacijos_komunikacija.pdf
Search via ReFindit
Wohlin C. et al., 2012. Experimentation in Software Engineering, Springer.
Search via ReFindit