ESC

Clarivate

JCR Category: Business in ESCI edition

Entrepreneurship and Sustainability Issues Open access
Journal Impact FactorTM (2023) 1.2 Q4
Journal Citation IndicatorTM (2023) 0.33 Q3
Received: 2017-08-20  |  Accepted: 2017-11-14  |  Published: 2017-12-29

Title

Peculiarities of cyber security management in the process of internet voting implementation


Abstract

The modern world could not be imagined without the information and communications technology. Today‘s society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world‘s Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident‘s direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.


Keywords

internet voting, e-voting, cyber security, cyber security management, cyber security model


JEL classifications

D72 , D80 , H83


URI

http://jssidoi.org/jesi/article/156


DOI


HAL


Pages

368-402


This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Limba, Tadas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Agafonov, Konstantin
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Paukštė, Linas
Cognit consult JSC, Vilnius, Lithuania http://cognitconsult.net
Articles by this author in: CrossRef |  Google Scholar

Damkus, Martynas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Plėta, Tomas
NATO Energy security center of excellence, Vilnius, Lithuania https://www.enseccoe.org
Articles by this author in: CrossRef |  Google Scholar

Journal title

Entrepreneurship and Sustainability Issues

Volume

5


Number

2


Issue date

December 2017


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 6428  |  PDF downloads: 2341

References


Antonucci D. 2017. The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities.

Search via ReFindit


Association for Computing Machinery, (2006). Statewide Databases of Registered Voter: Study of Accuracy, Privacy, Usability, Security, and Reliability Issues commissioned by the U.S. Public Policy Committee of the Association for Computing Machinery. Available on the Internet: https://people.eecs.berkeley.edu/~daw/papers/vrd-acm06.pdf

Search via ReFindit


Baležentis A.; Žalimaitė M. 2011. Ekspertinių vertinimų taikymas inovacijų plėtros veiksnių analizėje: Lietuvos inovatyvių įmonių vertinimas. Available on the Internet: http://mts.asu.lt/mtsrbid/article/viewFile/269/298

Search via ReFindit


Barrat J.; Goldsmith B.; Turner J. 2012. International Experience with E-Voting. Norwegian E-Vote Project. Available on the Internet: https://www.parliament.uk/documents/speaker/digital-democracy/IFESIVreport.pdf

Search via ReFindit


Clarke D., Martens T. 2017. E-Voting in Estonia. Real-World Electronic Voting: Design, Analysis and Deployment, p. 129-141, CRC press.

Search via ReFindit


Cyber security law of Lithuania Republic, 2014.

Search via ReFindit


Cybernetica, 2015. For greater safety and security in the world. Available on the Internet: http://cyber.ee/en/about-us

Search via ReFindit


Dykstra J., 2017. Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems.

Search via ReFindit


Elections BC. A non-partisan Office of the Legislature, (2011). Discussion Paper: Internet Voting. Available on the Internet: http://www.elections.bc.ca/docs/Internet-Voting-Discussion-Paper.pdf

Search via ReFindit


Erbschloe M., 2017. Threat Level Red: Cybersecurity Research Programs of the U.S. Government, CRC press.

Search via ReFindit


Estonia.eu. 2015. Estonian Internet voting system.

Search via ReFindit


Fuschi, D.L. & Tvaronavičienė, M., 2014. Sustainable development, big data and supervisory control: service quality in banking sector. Journal of Security and Sustainability Issues, 3(3), 5–14. https://doi.org/10.9770/jssi.2014.3.3(1)

Search via ReFindit


General Lithuanian Police Commissioner Order No. 5-V-101 "On Approval of the Description of the Information Required for Cybercrime Investigations, Possessing, Police Instructions and Cybersecurity Investigation Procedures" (2015).

Search via ReFindit


Geneva State Chancellery, 2010. The Geneva internet voting system. Available on the Internet: https://www.coe.int/t/dgap/goodgovernance/Activities/E-voting/EVoting_Documentation/passport_evoting2010.pdf

Search via ReFindit


Goldsmith B., 2017. Guidelines for Trialling E-Voting in National Elections. Real-World Electronic Voting: Design, Analysis and Deployment, p. 19-47, CRC press.

Search via ReFindit


Halderman J. A., 2017. Practical Attacks on Real-World E-Voting. Real-World Electronic Voting: Design, Analysis and Deployment, p.143-170, CRC press.

Search via ReFindit


Hampson C. N., 2012. Hacktivism: A New Breed of Protest in a Networked World. Boston College Internwtional and comparitive Law Review, p. 511-542.

Search via ReFindit


Hao F., Ryan P. Y. A., 2017. Real-World Electronic Voting: Design, Analysis and Deployment, CRC press.

Search via ReFindit


Independent Panel on internet Voting, (2014). Recommendations Report the Legislative Assembly of British Columbia. Available on the Internet: https://www.verifiedvoting.org/wp-content/uploads/2014/10/CA-BC-2014-recommendations-final-report.pdf

Search via ReFindit


Jastiuginas S., 2011. Informacijos saugumo valdymas Lietuvos viešajame sektoriuje [Management of information security in public sector], Informacijos mokslai 57: p. 7-25.

Search via ReFindit


Jefferson D., Rubin A. D., Simons B., Wagner D., (2004). A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE).

Search via ReFindit


Kiškis M. et al., 2006. Teisės informatika ir informatikos teisė. Vilnius: Mykolo Romerio universitetas.

Search via ReFindit


Kohnke A., Shoemaker D., Sigler K., 2016. The complete guide to cybersecurity risks and controls, CRC press.

Search via ReFindit


Law on State and Service of Securities of the Republic of Lithuania, 1999.

Search via ReFindit


Limba T.; Agafonov K., 2012. Elektroninių rinkimų sistemų konstravimo principai, modeliai ir jų apsaugos užtikrinimas [Construction principles of electronic voting systems], Socialinės technologijos, 2(2): 376-389.

Search via ReFindit


Limba T.; Plėta T.; Agafonov K.; Damkus M. 2017. Cyber security management model for critical infrastructure, Entrepreneurship and Sustainability Issues 4(4): 559-573. https://doi.org/10.9770/jesi.2017.4.4(12)

Search via ReFindit


Lithuania state security department (2014). Kas, kaip ir kodėl šnipinėja Lietuvoje. Available on the Internet: https://www.vsd.lt/wp-content/uploads/2017/03/kaip-snipinejama-Lietuvoje.pdf

Search via ReFindit


Middleton B., 2017. A History of Cyber Security Attacks: 1980 to Present, CRC press.

Search via ReFindit


Ministry of the Interior of the Republic of Lithuania, (2005). Information security for employees of state institutions.

Search via ReFindit


Owen T.; Noble W.; Speed F. C., 2017. New Perspectives on Cybercrime.

Search via ReFindit


Parliamentary Research Department of the Parliament of the Republic of Lithuania, 2015. Online voting: foreign experience and perspectives in Lithuania. Available on the Internet: http://www.vrk.lt/documents/10180/556540/Balsification+internet.pdf/a5247fe6-d96e-437d-8135-5db76da1f66f

Search via ReFindit


Puiggalí J.; Cucurull J.; Guasch S.; Krimmer R., 2014. Verifiability Experiences in Government Online Voting Systems.

Search via ReFindit


Repečka G., 2007. Elektroninis parašas [Electronic signature], Naujoji komunikacija 16 (212): 22-24.

Search via ReFindit


Repečka G., 2007. Saugus duomenų perdavimas internetu: SSL/TLS. Naujoji komunikacija, 12 (208), p. 15-16.

Search via ReFindit


Resolution of Government of the Republic of Lithuania No. 796 "On the Approval of the Program of Electronic Information Security (Cybersecurity) Development in 2011-2019". 2011.

Search via ReFindit


SANS Institute InfoSec Reading Room, 2001. Understanding Intrusion Detection Systems. Available on the Internet: https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337

Search via ReFindit


Scytl Innovating Democracy, 2015. Scytl Voter Registration. Available on the Internet: http://www.scytl.com/en/products/pre-election/scytl-voter-registration

Search via ReFindit


Scytl.com, 2017. Online voting technology. Available on the Internet: https://www.scytl.com/wp-content/uploads/2015/09/DIGITAL_online-voting.pdf

Search via ReFindit


Shah N., 2013. On The Radar: Scytl. An end-to-end election modernization platform.

Search via ReFindit


Shahandasht S. F., 2017. Electoral Systems Used around the World. Real-World Electronic Voting: Design, Analysis and Deployment, p. 77-102, CRC press.

Search via ReFindit


Springall D. et. al., 2014. Security Analysis of the Estonian Internet Voting System. University of Michigan. Available on the Internet: https://jhalderm.com/pub/papers/ivoting-ccs14.pdf

Search via ReFindit


Štitilis D., 2011. Elektroniniai nusikaltimai [Electronic crime] (mokomasis leidinys). Vilnius: Mykolo Romerio universitetas.

Search via ReFindit


Štitilis D., 2013. Kibernetinio saugumo teisinis reguliavimas: kibernetinio saugumo strategijos [Legal regulation of cyber security: strategies of cyber security], Socialinės technologijos 3(1): 189-207.

Search via ReFindit


The Center for Internet Security, 2015. Critical Security Controls for Effective Cyber Defense.Available on the Internet: https://cybersecurity.idaho.gov/wp-content/uploads/sites/23/2016/10/CSCmaster.pdf

Search via ReFindit


The Government of the Republic of Lithuania resolution No. 716 "On the approval of the description of the guidelines for the determination of the general electronic information security requirements, the description of the guidelines for content of documental content documents and of the state information systems, registers and other information systems classification and electronic information". 2013.

Search via ReFindit


University of Tartu, 2015. E-voting. Available on the Internet: https://courses.cs.ut.ee/2015/infsec/fall/Main/E-voting

Search via ReFindit


Vegas C., Barrat J., 2017. Overview of Current State of E-Voting Worldwide. Real-World Electronic Voting: Design, Analysis and Deployment, p. 51-76, CRC press.

Search via ReFindit


Virbalienė A., 2011. Vidinė organizacijos komunikacija [Inner communication in organization]. Klaipėda: Socialinių mokslų kolegija. Available on the Internet: http://www.esparama.lt/es_parama_pletra/failai/ESFproduktai/2011_Vidine_organizacijos_komunikacija.pdf

Search via ReFindit


Wohlin C. et al., 2012. Experimentation in Software Engineering, Springer.

Search via ReFindit