Temptations of turnout and modernisation

Journal of Information, Communication and Ethics in Society 5 (4):276-292 (2007)
  Copy   BIBTEX

Abstract

PurposeThe aim of the research described was to identify reasons for differences between discourses on electronic voting in the UK and The Netherlands, from a qualitative point of view.Design/methodology/approachFrom both countries, eight e‐voting experts were interviewed on their expectations, risk estimations, cooperation and learning experiences. The design was based on the theory of strategic niche management. A qualitative analysis of the data was performed to refine the main variables and identify connections.FindingsThe results show that differences in these variables can partly explain the variations in the embedding of e‐voting in the two countries, from a qualitative point of view. Key differences include the goals of introducing e‐voting, concerns in relation to verifiability and authenticity, the role of the Electoral Commissions and a focus on learning versus a focus on phased introduction.Research limitations/implicationsThe current study was limited to two countries. More empirical data can reveal other relevant subvariables, and contribute to a framework that can improve our understanding of the challenges of electronic voting.Originality/valueThis study shows the context‐dependent character of discussions on information security. It can be informative for actors involved in e‐voting in the UK and The Netherlands, and other countries using or considering electronic voting.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,505

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Suitable properties for any electronic voting system.Jean-Luc Koning & Didier Dubois - 2006 - Artificial Intelligence and Law 14 (4):251-260.
Goverment and ICT standards: An electronic voting case study.Jason Kitcat - 2004 - Journal of Information, Communication and Ethics in Society 2 (3):143-158.
Learning to Manipulate under Limited Information.Wesley H. Holliday, Alexander Kristoffersen & Eric Pacuit - forthcoming - Proceedings of the 39Th Annual Aaai Conference on Artificial Intelligence (Aaai-25).
Strategic Voting Under Uncertainty About the Voting Method.Wesley H. Holliday & Eric Pacuit - 2019 - Electronic Proceedings in Theoretical Computer Science 297:252–272.
Compulsory voting: a critical perspective.Annabelle Lever - 2010 - British Journal of Political Science 40:897-915.

Analytics

Added to PP
2014-02-19

Downloads
25 (#884,004)

6 months
11 (#352,895)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.

Add more citations

References found in this work

No references found.

Add more references