ArticlePDF Available

E-voting in Jordan: Assessing readiness and developing a system

Authors:

Abstract and Figures

The aim of this paper to outline the E-voting system readiness and design in Jordan, the researcher's illustrate the guideline for developing and designing E-voting system in Jordan election. Moreover the paper used TAM model to test the Acceptance of the proposed system from voter's perspective and the readiness of the system to be used.
Content may be subject to copyright.
Review
E-voting in Jordan: Assessing readiness and developing a system
Emran Aljarrah
a
,
1
, Hamzah Elrehail
a
,
*
,
2
, Bashar Aababneh
b
,
3
a
Girne American University, North Cyprus, Cyprus
b
Eradeh Est., Amman, Jordan
article info
Article history:
Received 10 April 2016
Received in revised form
16 May 2016
Accepted 26 May 2016
Keywords:
E-voting
Jordan
Readiness
Government
M-government
abstract
The aim of this paper to outline the E-voting system readiness and design in Jordan, the researchers
illustrate the guideline for developing and designing E-voting system in Jordan election. Moreover the
paper used TAM model to test the Acceptance of the proposed system from voters perspective and the
readiness of the system to be used.
©2016 Elsevier Ltd. All rights reserved.
Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....................... 860
2. E-voting system in practice: scanning the landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....................... 861
2.1. Electronic voting in USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................862
2.2. Electronic voting in Ireland . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................862
3. Theoretical foundations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....................... 862
3.1. Technology acceptance model (TAM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................862
3.2. Diffusion of Innovation theory (DOI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................863
3.3. Webtrustmodel .......................................................... ..................................................863
4. Research design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....................... 863
4.1. Readiness conceptual model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................865
5. System development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ......... .............. 865
5.1. The Rapid Application Development (RAD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ......................................865
5.2. Proposed e voting system framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..........................................865
5.3. The entity-relational model of E-voting system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ......................................866
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....................... 866
References.................................................................... . ....................................................867
1. Introduction
Governments in many countries around the world try to utilize
the information and communication technologies to transform
traditional government services to electronic government or digital
government. In Jordan, The government has started implementing
a program of an e-Government in 2002, which aims to improve its
*Corresponding author.
E-mail addresses: cshamzah@gmail.com (E. Aljarrah), cs-hamzah@hotmail.com
(H. Elrehail), Bashar4real@hotmail.com (B. Aababneh).
1
He is doing PhD in Management Information System, his research focus on
system design and readiness.
2
He is doing PhD In Business Management. His research area Innovation,
Leadership, Knowledge Management and MIS in general.
3
His Research interests include innovation and entrepreneurship through tech-
nological advancements.
Contents lists available at ScienceDirect
Computers in Human Behavior
journal homepage: www.elsevier.com/locate/comphumbeh
http://dx.doi.org/10.1016/j.chb.2016.05.076
0747-5632/©2016 Elsevier Ltd. All rights reserved.
Computers in Human Behavior 63 (2016) 860e867
service delivery and increase the involvement of citizens through
the penetration of technology. A voting system which is one of the
signicant services which has been conducted and controlled by a
government still very old, which can call legacy systems.
The current traditional paper-basedvoting system which has
been used in Jordan is encountering many problems and compli-
cations which we will present major of them later. However, the
successive governments have tried to conduct the democratic ap-
proaches through several practices which have been executed to
improve the variety of life aspects (Ilieva, 2011), but with the rapid
advances in information technology and information transfer
speed, it is still the parliamentary election system in Jordan, which
is one of the democratic approaches in Jordan relies on traditional
methods of implementation.
In Jordan, it undergoes democratic elections periodically. It
holds parliament elections every four years to elect its legislative
body. Municipal elections in Jordan also take place once every four
years to elect the governing boards for the various Jordanian
municipalities.
And often times due to technical limitations, in cases of fraud in
some areas because of the inuence of politicians on people. In
addition, unreliability of the performance of the election because of
political money, the results of the voting are not announced until an
audit takes place, or where a re-count is placed in order. Intro-
ducing irregularities in the nal count results.
Consequently, it is should be a signicant research work to deal
with these problems and complications by building an electronic
voting system (e-voting) which should be able to control the entire
processes of elections.
2. E-voting system in practice: scanning the landscape
Currently, E-voting systems face a number of obstacles to be
overcome before they could be used as a successor to the current
paper-based voting system. A new proposed e-voting system
should match different requirements; functional and non
functional.
According to the recommendation report by election moni-
toring program and the performance of the elected councils in
Jordan (Monitor: December 2015), that said there is a need for a
mechanism to vote through the house of representatives and
Senatemeeting is better than the current which requires
amendments to the rules of procedure of the Senate so that the
adoption of the electronic voting system means more efcient to
ensure the accuracy of the vote.
The importance and the requirements of the application of an
electronic voting system in elections, whether parliamentary, local
municipality, trade union, chambers of commerce and industry
elections with a statement of applied procedures of this system and
the benets to be derived by the application of a strategic alter-
native to traditional systems under which the elections are held
(Kohno, Stubbleeld, Rubin, &Wallach, 2004), which hovers
around some cast doubt on the integrity, accuracy and validity of
their procedures, decreasing show transparency procedures, pro-
cesses and their results in front of the concerned public opinion.
According to (Alomari, Elrehail, &Al Shibly, 2013) the govern-
ment in Jordan developed SMS gateway that make communication
between government and citizen more effective and easier. Abu-
Shanab et al. (2010) in his study for E-voting conducted in Jordan,
the researcher applied his study in University student voting for
their representative in their departments, the study reveals that
factors inuence the convenience and integrity of election process.
Moreover the study tries to emphasize the factors that are adopting
the e-voting system in Jordan Universitys.
Moreover about more scenarios in E-voting Pan, Hou, &Ansari
(2013) the researcher focused on three items related to voters
and candidates, are privacy, verication and condentiality which
are the most important elements in the e-voting election. In addi-
tion Pan et al. (2013) add new security schema which called RE-
NOTEfor continuous research on E-voting system which used the
previous schema E-NOTE, the ring schema allow group of users to
sing massages without information provided about the user
(Voter). Moreover this schema increased the security of E-voting
system using the previous mentioned schema.
According to (Pan, Hou, &Ansari, 2015)M-NOTEschema
provide more functionality for voters that can cast and audit their
votes, M-NOTEshould provide more security that prevent hacker
using clash attacks to access the voters choices, manipulate it.
Kusters, Truderung, &Vogt (2012) in their paper introduce the
term of Veriabilitywhich means there is an authority for users
of E-voting system (i.e. Voters) to check the results of voting pro-
cess, is their votes counted, affect the voting results and no
manipulation to their votes happened. Moreover the effect of clash
attack does it affect the results, the ballots changed by new ballots.
The tested systems mentioned by Kusters et al. (2012) are the
Wombat Voting systemand a variant of the Helios voting
system.
The Wombat Voting system its an academic project which try to
make the voting process clear to voters, which provide a clear
process and veriable to voters, the system developed by Alon
Rosenwhich used a method cryptographically-based system
(Wombat Voting system website).
Adida (2008) Helios voting systemintroduce as the rst voting
system using web and open-audit system, the most feature is that
any one (i.e. users) can run the election in a simple way, the Helios
is suited for small group of voters, prevent any manipulation of
ballots and decrease the authority of open-audit election.
Obviously, through reviewing some of the current electronic
voting systems and even studies on this topic, which tended to the
technical side in solving information security problems, and
through several models to encrypt data to deal with secure infor-
mation, although it is very possible through the availability of data
encryption which is supported by, database servers and Unix
servers.
There are a variety of private and public e-voting applications
available (MotionVoter, 2011). and (Vote-Now n.d.) Offer a private
election service. Source Forge includes a project which promises an
open-source electronic voting system for download (Electronic
Voting System, 2009). Though when the researcher checked, the
project had no les available.
The US Department of Defenses Federal Voting Assistance
Program (FVAP) proposed an Internet based voting system for the
2004 primary and general elections named Secure Electronic
Registration and Voting Experiment (SERVE) (D. D. Jefferson, Rubin,
Simons, &Wagner, 2004). The FVAP assembled a Security Peer
Review Group (SPRG) to evaluate SERVE. Their report very strongly
recommended against deploying SERVE and SERVE was withdrawn
from use (Defense, 2007, p 11).
The SPRG report lists many security concerns regarding elec-
tronic voting in general and Internet voting in particular. These
areas of interest include:
PC-centric application versus Server-centric application.
Security of the intermediate network.
Voter-veried audit trail.
Control of the voting environment.
Spoong and man in the middle attacks.
Denial of service attacks.
The ultimate objective of SERVE is to enable voting from any PC
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867 861
from anywhere in the world. I do not expect that to be accom-
plished anytime soon. But, I expect improvements toward that
objective can be made.
2.1. Electronic voting in USA
Initially introduced in 1975, the concept of e-voting would allow
voters to cast their ballots using computer based equipment as
opposed to traditional punch card or paper ballot options. Origi-
nally, the National Bureau of Standards and the Ofce of the Federal
Elections released a report citing the major problems with e-voting.
The lack of appropriate technical skills to develop and implement
the Standards needed to test the hardware and software and
technical and managerial problems associated with the integrity of
the vote counting process were the primary issues. While skill has
certainly increased, the basic integrity issues still remain.
Between 1984 and 1990, the Federal Election Committee (FEC)
developed, revised, and eventually published the Performance and
Test Standards for Punchcard, Marksense, and Direct Recording Elec-
tronic Voting Systems. This document outlined voluntary, national
standards for computer-based voting systems. Implementation of
the Standards was begun by the National Association of State
Election Directors (NASED) in 1994. They created a process by
which vendors can present their systems to be evaluated against
the hardware and software Standards. Since that time, the equip-
ment of 30 companies has passed the requirements set forth in the
Standards.
Due to ever-changing technology, the FEC has approved re-
visions to the original Standards to stay abreast with those changes.
The primary goal of the Standards has, and continues to be, to
provide a mechanism for state and local election ofcial to assure
the public of the integrity of computer-based election systems.
2.2. Electronic voting in Ireland
The introduction of electronic voting is the biggest change to the
Irish electoral system since the establishment of the state over 80
years ago. The idea was introduced by the Fianna F
ail/PD govern-
ment in 1999 with an Act to allow the use of actual ballot papers for
research into voting methods. In 2000 a public tender was issued
and it was won by the Power vote/Nedap/Groenendaal consortium.
Later in 2001 an amendment to the Electoral Act was passed
allowing the Minister to approve machines for electronic voting.
Remarkably, no objective or legal criteria were set for the machines
or the software.
The rst enabling legislation was brought in as part of a broad,
controversial bill. Debate on this bill was guillotined by the Gov-
ernment. Several members voiced their concerns about the system
at the time. They were assured that the introduction of electronic
voting would not go ahead without all-party consensus.
The system was then used in three constituencies in the June
2002 General Election. The Government said the trial was suc-
cessful, but others - including the authors - have grave reservations.
The formal reports from the Returning Ofcers indicate many faults
occurred [Fit02]. The results were declared without any external
audit of the votes.
Without further consultation, either with the Opposition or
with the public, the Government decided in October 2002 to
implement the system countrywide for the June 2004 local and
European elections.
In 2003 a series of reports [Mcg03, Mcc03] were published
questioning the integrity of the system and the process used to
introduce it. A Parliamentary committee examined the matter, but
on December 18th, 2003, the government parties applied the whip
to close the debate just after the authors raised many technical
questions. A publicity campaign was launched by the Government
in February 2004 costing some V5million.
3. Theoretical foundations
3.1. Technology acceptance model (TAM)
The Technology Acceptance Model (TAM) has been used in
research to explore the acceptance of new e-technology or new e-
services (Davis, 1989; Davis &Venkatesh, 1996). TAM is one of the
most effective contribution of Ajzen and Fishbeins theory of
reasoned action (TRA). Daviss technology acceptance model (Davis,
1989; Davis, Bagozzi, &Warshaw, 1989) is the most widely utilized
models of acceptance and usage of innovated technology by users.
A relationship has been found between the beliefs of users about
a technologys usefulness and the attitude and the intention to use
the technology. A perceived usefulness shows more harmonious
relationship with usage than did other models variables. Therefore,
the researcher decides to use PU and PEOU in building new
research model.
Perceived usefulness (PU): Is dened as the degree to which a
user believes that using a specic system would enhance the job
performance.
Perceived ease-of-use (PEOU) - Is dened as the degree to which
a user believes that using a particular system would be effort-free.
Fig. 1. Technology acceptance model.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867862
3.2. Diffusion of Innovation theory (DOI)
Diffusion of Innovation (DOI) theory describes a model which is
used in IS research to explain users adoption of new technology,
RogersEverett (1995). Rogers denes diffusion as the process by
which an innovation is communicated through certain channels
over time amongst the members of a social society(Rogers Everett,
1995). An innovation represents an idea or an object that is
perceived to be new (Rogers Everett, 1995).
According to this theory, the diffusion rate is affected by a
relative advantage of an innovation, complexity, compatibility,
trial-ability and observability.
Relative advantage was dened as the degree to which an
innovation is seen as being better than its predecessor. Compati-
bility refers to the degree to which the new innovation is
compatible with existing values, beliefs and needs of adopters
(Rogers Everett, 1995).
3.3. Web trust model
Trust in the government and the internet. The E-voting system is
an e-government initiative that requires a trust to facilitate adop-
tion. The effective diffusion of e-voting in Jordan requires voters
condence in the interest, integrity, and competence of e-voting
service providers, like the government ofcials, politicians, legis-
lators, and systems developers that enable and implement e-voting
services (Mayer, Davis, &Schoorman, 1995). Internet voting adop-
tion is dependent upon voters trust in both the government and the
technology that enables e-voting services such as internet (Carter
and B
elanger, 2005; Lee &Turban, 2001).
4. Research design
Research design reported here provides a guideline for action
for investigating E-voting in Jordan. The objectives of the study are
determined which leads the research question formulation. To
Fig. 2. Research procedures.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867 863
Fig. 3. Conceptual research model.
Fig. 4. Rapid Application Development (RAD) life cycle.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867864
ensure that the information collected is appropriate for solving the
problem, the researcher also must determine the e-voting readi-
ness questionnaire, the sampling methodology, and the schedule.
This section covers research questions, hypotheses and data
collection and analysis for answering them. The research proposed
here employs a positivist method that is explained by a deductive
approach to research. Hence, the starting point is a theory that is
developed into testable theoretical propositions using empirical
data. Once the readiness is assessed the researcher will start
developing a prototype of a functional system.
4.1. Readiness conceptual model
The research model proposed in Fig. 3 below explains how this
research aims to approach e-voting readiness in Jordan. This
research model employs three theoretical perspectives through
which a theoretical laden understanding is developed. Such
grounding in theoretical foundations makes the research model a
better representation of reality as it exists or as it is perceived to
exist (see Fig. 2).
5. System development
The Design is implemented in this phase. The techniques for
implementation will of course vary depending on the artifact to be
constructed. This project is a web-based system which detailed
requirements and suggestion are already looked into in the previ-
ous stages (see Figs. 4e6).
At this stage, rstly, we should understand the proposed system
behavior by using the use case modeling, which is the best way to
determine the processes ow. As shown in Fig. 1, the general e-
voting processes involve:
- Voter as an actor in the system.
- There are three main processes (Registration, Authentication&
Authorization, Voting and Tallying)
The system will be implemented based on the Rapid Application
Development (RAD) life cycle.
5.1. The Rapid Application Development (RAD)
RAD (Fig. 3) is a development lifecycle designed to give much
faster development and higher-quality results than those achieved
with the traditional lifecycle. It is designed to take the maximum
advantage of powerful development software that has evolved
recently.
5.2. Proposed e voting system framework
As illustrated in Fig. 3, the voter can login to the system by
several way, using his/her appropriate and available
Fig. 5. The general framework of our proposed e-voting system.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867 865
communication media, voting server which is an application server
with fully supported by Unix as operating system, this server will
connect with Database server to authenticate a user data which are
stored in Database or a warehouse database (Ikonomopoulos,
Lambrinoudakis, Gritzalis, Kokolakis, &Vassiliou, 2002).
Warehouse database should be controlled by a warehouse
management system (WMS), Database server includes Database
Management System (DBMS), The DBMS consists of various func-
tions that provide entry, storage and retrieval of large information
and provides ability to manage information which was organizedin
Database warehouse.
5.3. The entity-relational model of E-voting system
We use commercial package (Smart draw) to build entity rela-
tional model, which consists of six main entity as shown at g. 3.
$Candidates of type person.
$Voter is of type person.
$Candidate is a weak entity generated from adding a person in a
vote form.
$Voter is a weak entity generated from the person registration in
a vote.
$Candidate may refer to a list or not.
$Candidate List contains one or more candidates.
$Vote has one or more vote forms.
$Vote form has many candidates.
Voter vote is a weak entity depends on the voting process, when
voter votes for a specic candidate in a specic vote form.
6. Conclusion
In this paper researcher tries to outline a conceptual framework
for E-voting system to apply it in Jordan, the paper goes with
literature, then system design to make it more applicable in Jordan.
Moreover the paper discussed the readiness for applying E-voting
system in Jordan Based on TAM model.
The researchers propose a solution to this issue by proposing an
e-voting system for Jordanian elections. In order to so, the research
is of two folds: rstly to study the readiness of the Jordanian voters
for an e-voting system and secondly propose an actual system e-
Fig. 6. ER diagram of E-voting system.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867866
voting system development.
References
Abu-Shanab, E., Knight, M., & Refai, H. (2010). E-Voting systems: A tool for e-de-
mocracy. Management Research and Practice, 2(3), 264e275.
Adida, B. (2008, July). Helios: Web-based open-audit voting. In USENIX security
symposium (Vol. 17, pp. 335e348).
Alomari, M., Elrehail, H., & Al Shibly, H. (2013). Mobile-Government: Challenges and
opportunities, Jordan as case study. Journal of Business and Social Science, 4(12).
Carter, L., & B
elanger, F. (2005). The utilization of e-government services: Citizen
trust, innovation and acceptance factors
*
.Information Systems Journal, 15(1),
5e25.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance
of information technology. MIS Quarterly,319e340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer
technology: A comparison of two theoretical models. Management Science,
35(8), 982e100 3.
Davis, F. D., & Venkatesh, V. (1996). A critical assessment of potential measurement
biases in the technology acceptance model: Three experiments. International
Journal of Human-Computer Studies, 45(1), 19e45.
Defense. (2007). Department of. Expanding the use of electronic voting technology for
UOCAVA citizens. Department of Defense.
Electronic Voting System. (2009) Accessed 06.03.15 http://evotingsys.sourceforge.
net/.
Ikonomopoulos, S., Lambrinoudakis, C., Gritzalis, D., Kokolakis, S., & Vassiliou, K.
(2002). Functional requirements for a secure electronic voting system. In Se-
curity in the information society (pp. 507e519). Springer.
Ilieva, R. (2011). eVoting system &information modeling approach (Paper presented
at the Conference for E-Democracy and Open Government).
Jefferson, D. R., Rubin, A. D., Simons, B., & Wagner, D. A. (2004). A security analysis of
the secure electronic registration and voting experiment (SERVE).
Kohno, T., Stubbleeld, A., Rubin, A. D., & Wallach, D. S. (2004). Analysis of an
electronic voting system. Security and privacy. In Proceedings. 2004 IEEE sym-
posium on (pp. 27e40).
Kusters, R., Truderung, T., & Vogt, A. (2012, May). Clash attacks on the veriability of
e-voting systems. In Security and privacy (SP), 2012 IEEE symposium on (pp.
395e409). IEEE.
Lee, M. K., & Turban, E. (2001). A trust model for consumer internet shopping. In-
ternational Journal of Electronic Commerce, 6(1), 75e91.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of orga-
nizational trust. Academy of Management Review, 20(3), 709e734.
Monitor. (December 2015) Accessed 06.03.16 http://www.hayatcenter.org/
programs/related/electoral-monitoring.
MotionVoter. (2011) Accessed 06.03.16 http://www.motionvoter.com/.
Pan, H., Hou, E., & Ansari, N. (2013, December). RE-NOTE: An E-voting scheme based
on ring signature and clash attack protection. In Global communications con-
ference (GLOBECOM), 2013 IEEE (pp. 867e871). IEEE.
Pan, H., Hou, E., & Ansari, N. (2015, June). M-NOTE: A multi-part ballot based e-
voting system with clash attack protection. In Communications (ICC), 2015 IEEE
international conference on (pp. 7433e7437). IEEE.
Rogers Everett, M. (1995). Diffusion of innovations. New York, 12.
E. Aljarrah et al. / Computers in Human Behavior 63 (2016) 860e867 867
... As promising as it seems, online voting could not become pervasive in many countries [7,8]. A growing body of literature has examined a broad set of factors, usability, security, privacy and trust, affecting online voting acceptance and adoption over the years (for example [6,[9][10][11][12][13][14]), and platforms, such as the E-vote-ID 1 Conference, have provided an excellent rearing grounds for the dissemination of information as well as discussion. Several studies proposed principles, schemes, and solutions for security and privacy in online voting and addressed usability issues of different online voting systems (for example, check [15,16]; Garcia, 2016; [17]). ...
... To this end, researchers have examined and addressed trust-related technology-focused concerns, such as authentication, message integrity, and data confidentiality [22]. Others have examined the role of trust in technology (for example [6,10,12]), and trust in an agency managing the voting process (mostly a governmental body) [5,6,10,12,23]. ...
... To this end, researchers have examined and addressed trust-related technology-focused concerns, such as authentication, message integrity, and data confidentiality [22]. Others have examined the role of trust in technology (for example [6,10,12]), and trust in an agency managing the voting process (mostly a governmental body) [5,6,10,12,23]. ...
Article
Full-text available
This study examined the impact of shared identity and agency trust, governmental vs. third party, on Finnish citizens' intention to vote online. Using the integrated model of shared identity and trust as a theoretical lens, a within-subject quasi-experiment was conducted to understand the impact of agency trust on intention to vote online. The model was tested using data from 248 Finnish citizens using PLS-SEM. We found that citizens' perceptions of shared identity with online voting agencies significantly contribute to agency trust. This trust in agencies, then directly and indirectly through perceived usefulness, affects online voting intention. Perceived usefulness directly and perceived ease of use indirectly increase the intention to vote online. However, the perceived usefulness of online voting is contingent upon the voting administering agency being the government. This study contributes to the understanding of agency trust in online voting adoption in the Finnish context and highlights the role of shared identity in building citizen trust in online voting. It also emphasizes the effect of voting agency type on the perceived usefulness of online voting.
... Perceived usefulness (PU) is defined as the degree to which the user believes that using a specific system that will improve the performance of the job. Whereas Perceived easeof-use (PEOU) is defined as a condition when a user uses a particular system, it would be effort-free [13]. ...
... The DOI theory consists of five main characteristics of innovation, which are relative advantage, complexity, compatibility, trialability, and observability. According to previous studies [13], we use two constructs relative advantage and complexity, which were a critical factor in the implementation of the e-voting system. Relative advantage is the degree to which an innovation is seen as better than the idea it supersedes, and complexity is the degree to which an innovation is perceived as challenging to understand and use. ...
Conference Paper
Full-text available
Some countries have adopted the technology of electronic voting into their democratic processes. Some of them successfully implemented e-voting in their elections, but some countries failed to transform traditional paper-based voting into a technology-based automated voting system. Indonesia is a developing country that carries out general elections every five years. The vote was conducted to elect presidential and vice-presidential candidates, national and regional legislatures, and members of the local representative council. Reducing errors and speed up the counting process are some of the electronic voting benefits. Electronic voting also eliminates the root cause of the controversies in every election, which is a vote that is deemed invalid or doubted, thus it still raises doubts, especially on the security, confidentiality of voter data, and ease of use of the system. This research aims to discover the readiness of the implementation of the e-voting system in Indonesia by conducting a quantitative survey and propose state-of-the-art electronic voting system architecture that is suitable for application in Indonesia. Our investigation shows that most of the respondents are ready to use the e-voting system.
... With the rapid development of the Internet and information technologies, many conventional offline services Correspondence: haiboyi@szpt.edu.cn School of Computer Engineering, Shenzhen Polytechnic, 518055, Shenzhen, China such as voting, mail, payment, are migrating to online ones [6]. The online voting is known as electronic voting (e-voting). ...
... (5) Voters send their public keys to the PKI in a secure way. (6) Miners are elected randomly. (7) The first block is generated. ...
Article
Full-text available
Abstract Electronic voting (e-voting) is an electronic means for casting and counting votes. It is an efficient and cost-effective way for conducting a voting procedure, which has characteristic of being magnanimous data and real time and requesting high safety. However, concerns on security of networking and privacy of communication for e-voting have been grown. Securing e-voting is very urgent and has becoming a popular topic in the area of communications and networking. We present techniques to exploit blockchain in P2P network to improve the security of e-voting. First, we design a synchronized model of voting records based on distributed ledger technology (DLT) to avoid forgery of votes. Second, we design a user credential model based on elliptic curve cryptography (ECC) to provide authentication and non-repudiation. Third, we design a withdrawal model that allows voters to change their vote before a preset deadline. By integrating the above designs, a blockchain-based e-voting scheme in P2P network is proposed for essential requirements of e-voting process. To prove and verify the scheme, a blockchain-based e-voting system for multiple candidates has been designed on Linux platforms in P2P network. The system involves electronic voting theory, cryptography, and software engineering theory. The implementation result shows that it is a practical and secure e-voting system, which solves the problem on forgery of votes during e-voting. The blockchain-based e-voting system can be applied to a variety of networking applications directly.
... TRA asserts that performing a particular behavior depends upon the individual's experience of performing particular behavior (Fishbein and Ajzen, 1975). While investigating the readiness of the people in the Jordan to adopt E-voting system Aljarrah et al (2016) complemented both TAM and TRA models for being most widely used models for identifying the acceptance and usage of technology by the users. The core assumption of the TRA model is that behavioral intentions to use technology can be determined by the two cognitive factors such as attitude and perception. ...
Thesis
Full-text available
E-Government readiness is recognised as the government’s method of using information and communication technologies as a way to exchange data and provide business and citizens with services; indeed, E-Readiness is the government’s strength to transfer its services and tasks into the new context. In the context of Jordan, E-Government implementation within local governments (i.e., municipalities) has been comparatively limited and inactive, and so it is within this current research that E-Government practices within countries surrounding Jordan (e.g., the Arab Gulf) are studied. This should, indeed, result in the establishment of the success factors potentially constraining Jordanian E-Government implementation—particularly Jordanian municipalities. Whilst incorporating a perspective geared toward developing an E-Readiness model for such municipalities based on the TOE framework (Tornatzky & Fleisher, 1990), the aim of this research is to explore and examine the variables influencing the E-Readiness of municipalities within Jordan; indeed, this can provide guidance for Jordanian government decision-makers when it comes to formulating decisions for E-Government implementation by municipalities. This is achieved through the exploration of chosen completed and successful initiatives, as well as by focusing on the critical success factors of these initiatives. As a result, the critical success factors impacting Jordanian E-Government implementation were identified. Within the study, a set of research methodological approaches were utilised, the first of which is a comprehensive review of a literature carried out with the aim of summarising and formulating arguments about the main models of E-Government, as well as of assessing the critical success factors of earlier developed models in the context of municipalities within the Middle East, etc. Secondly, a qualitative method focused on case studies—including an explanatory inquiry in ten instances—was selected as a suitable methodology for this study; furthermore, open-ended and semi-structured interviews were conducted with the aim of gathering data from selected municipalities, the results of which showcasing the fact that technological, organisational, and environmental factors are the main critical success factors for Jordanian municipality E-Government implementation. The collected data was accordingly analysed, content and thematic analysis being undertaken so as to identify the critical success factors, and it was on the grounds of these findings that an E-Readiness framework was 4 developed to assess E-Government implementation within the local government of Jordan. From a practical viewpoint, this research provides realistic implications for the official policymakers within the Jordan local government in the fact that it helps and guides them on how to make the right decisions in the method of planning, developing, and implementing E�Government initiatives.
... Several past academicians have noted that the e-Voting system has influenced the voters' capability to gain their right to vote and their willingness to receive the unaffected election results and outcomes (Aljarrah, Elrehail, & Aababneh, 2016;Singh, & Roy, 2014;Winchester et al., 2015). In a study by Norazah and Norbayah (2017), it is revealed that the young voters' commitment to vote was the strongest factor of the students' decision-making and satisfaction in the campus's e-Voting system. ...
Article
Full-text available
This paper identifies the respondents’ views towards e-Voting (electronic technology voting) such as the process, users’ satisfaction, and relevancy, and to determine the usability criteria of e- voting’s interface, in which it employs a quantitative method, using self-administered adapted questionnaires. The survey involves 250 respondents (voters), who immediately completed five Likert scales survey after they had voted for the committee members in two general elections: a social club for the university’s staff (using Internet) and an organization for the female staff of the university (using the Intranet). The respondents were of different demographic backgrounds and they casted their online votes at two different periods (two years difference). The data were analysed using the SPSS software. The study found positive responses from most of the voters in which they expressed their satisfaction that e-Voting was convenient and easy to be used in the voting process, where the system illustrated relevant content and generated adequate procedures. Notably, the usability criteria of the interface of e-Voting as indicated by most respondents are between good to very good scales (navigation, graphic, user-friendliness andconsistency, content, and transparency).
... The advancement of Information and Communication Technology (ICT) results in development of many software application systems in various disciplines, such as telemedicine systems [1], electronic commerce systems [2] and e-voting [3]. These modern techniques have helped to provide good and accurate services to citizens and customers. ...
Article
Full-text available
Locating files in an exact time is considered one of the greatest problems and the tedious process in universities nowadays. This problem becomes greater when the university has a large number of departments and transactions, as well as the documents are moving from one department to another. Especially, developing countries that have many problems and unstable environment and that may lead to lost or damage the important documents that influence on the decision making. Furthermore, the traditional manner not only wasted the time and energy, but also the paper cost for printing copies of required file. And with the advancement of technology and the increase of Internet users, documents are still being sent in Iraqi universities manually between departments. Although the higher education and scientific research ministry was recommended the public universities for using modern technologies during the daily transactions between the departments or amongst the units. Therefore, this study sought to design and evaluate the prototype system which tracks movements of the documents from one department to another as well as check the completion rate for each department. For providing opportunities to assess how well the use of e-file tracking system meets the needs of management units in universities. The systems implementation research notes the need to fit between tasks, technologies and users. Thus, this empirical study utilized the task technology fit model for this purpose. The results from selected participants indicated that all the factors significant effect on the employee’s performance in E-file Tracking System, excepted, task characteristics. This study will be contributed to reduce the corruption and enhance the transparency and help the decision-makers make the right decision at the right time.
... The advancement of Information and Communication Technology (ICT) results in development of many software application systems in various disciplines, such as telemedicine systems [1], electronic commerce systems [2] and e-voting [3]. These modern techniques have helped to provide good and accurate services to citizens and customers. ...
... In a blind signature scheme, a signee could get a message's digital signature signed by a signer without revealing any information about the message. This is vital in some applications such as electronic payment systems and secure voting systems [31][32][33][34][35], because the requester's messages may be sensitive. Nayak et al. [8] also proposed a blind signature scheme based on an elliptic curve discrete logarithm problem. ...
Article
Full-text available
Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server). We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.
Conference Paper
Full-text available
Educational institutions, information and knowledge givers in Nigeria are faced with numerous challenges of carrying everyone on the same page through the lack of proper digital learning and knowledge preservation tools simply regarded as a digital library. In any learning institution, digital libraries and institutional repositories are the keys to a qualitative knowledge stockpiling and delivery. The main aim of the paper is to propose a viable means of effective digital learning for the Polytechnics in Northern Nigeria. This paper also attempted to highlight the major information system components needed to develop a digital learning that will fit the Institutions with an approach through Multimedia data mining and suggests an Institutional Knowledge repository for proper academic data storage such as journals, thesis, lecture notes, dissertations, undergraduate student projects etc. The proposed system is expected to serve as a step towards bridging the gap between the polytechnics learning system and the tertiary institutions in the developed nations.
Article
Full-text available
The e-government program aims to provide government services to citizens through different channels. One of these channels is mobile government that develops on the basis of traditional e-government. Mobile government affords a new method to improve government effectiveness and economy of public services. In the context of Jordan, mobile service is the most prevalent among the various segments of the society and powerful way for the deployment of government services with ease. Therefore, there is a real need for the transformation from e-government to mobile government services. This paper will review mobile government application in Jordan which includes; the concept of mobile government, challenges of mobile government implementation, advantages of mobile government, and provide different cases of m-government applications applied in the globe scale.
Conference Paper
In this paper, we will discuss an E-voting procedure by utilizing ring signature. The proposed scheme, RE-NOTE, is based on our previous work E-NOTE and has the benefit of reducing the risk of leaking voters' identities during the ballot distribution procedure. In addition, we will consider the “Clash Attack” which is a simple attack on the verification procedure during an election. Either authority or hackers may use the receipt to manipulate the voting results. We will show how our proposed scheme can mitigate such an attack. Our proposed scheme addresses issues related to both voter's and candidate's confidentiality and verification, and thus provides a framework for fair elections.
Article
Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means that voters can check that their votes were actually counted and that the published result of the election is correct, even if the voting machines/authorities are (partially) untrusted. In this paper, we raise awareness of a simple attack, which we call a clash attack, on the verifiability of e-voting systems. The main idea behind this attack is that voting machines manage to provide different voters with the same receipt. As a result, the voting authorities can safely replace ballots by new ballots, and by this, manipulate the election without being detected. This attack does not seem to have attracted much attention in the literature. Even though the attack is quite simple, we show that, under reasonable trust assumptions, it applies to several e-voting systems that have been designed to provide verifiability. In particular, we show that it applies to the prominent Three Ballot and VAV voting systems as well as to two e-voting systems that have been deployed in real elections: the Wombat Voting system and a variant of the Helios voting system. We discuss countermeasures for each of these systems and for (various variants of) Helios provide a formal analysis based on a rigorous definition of verifiability. More precisely, our analysis of Helios is with respect to the more general and in the area of e-voting often overlooked notion of accountability.
Book
Getting an innovation adopted is difficult; a common problem is increasing the rate of its diffusion. Diffusion is the communication of an innovation through certain channels over time among members of a social system. It is a communication whose messages are concerned with new ideas; it is a process where participants create and share information to achieve a mutual understanding. Initial chapters of the book discuss the history of diffusion research, some major criticisms of diffusion research, and the meta-research procedures used in the book. This text is the third edition of this well-respected work. The first edition was published in 1962, and the fifth edition in 2003. The book's theoretical framework relies on the concepts of information and uncertainty. Uncertainty is the degree to which alternatives are perceived with respect to an event and the relative probabilities of these alternatives; uncertainty implies a lack of predictability and motivates an individual to seek information. A technological innovation embodies information, thus reducing uncertainty. Information affects uncertainty in a situation where a choice exists among alternatives; information about a technological innovation can be software information or innovation-evaluation information. An innovation is an idea, practice, or object that is perceived as new by an individual or an other unit of adoption; innovation presents an individual or organization with a new alternative(s) or new means of solving problems. Whether new alternatives are superior is not precisely known by problem solvers. Thus people seek new information. Information about new ideas is exchanged through a process of convergence involving interpersonal networks. Thus, diffusion of innovations is a social process that communicates perceived information about a new idea; it produces an alteration in the structure and function of a social system, producing social consequences. Diffusion has four elements: (1) an innovation that is perceived as new, (2) communication channels, (3) time, and (4) a social system (members jointly solving to accomplish a common goal). Diffusion systems can be centralized or decentralized. The innovation-development process has five steps passing from recognition of a need, through R&D, commercialization, diffusions and adoption, to consequences. Time enters the diffusion process in three ways: (1) innovation-decision process, (2) innovativeness, and (3) rate of the innovation's adoption. The innovation-decision process is an information-seeking and information-processing activity that motivates an individual to reduce uncertainty about the (dis)advantages of the innovation. There are five steps in the process: (1) knowledge for an adoption/rejection/implementation decision; (2) persuasion to form an attitude, (3) decision, (4) implementation, and (5) confirmation (reinforcement or rejection). Innovations can also be re-invented (changed or modified) by the user. The innovation-decision period is the time required to pass through the innovation-decision process. Rates of adoption of an innovation depend on (and can be predicted by) how its characteristics are perceived in terms of relative advantage, compatibility, complexity, trialability, and observability. The diffusion effect is the increasing, cumulative pressure from interpersonal networks to adopt (or reject) an innovation. Overadoption is an innovation's adoption when experts suggest its rejection. Diffusion networks convey innovation-evaluation information to decrease uncertainty about an idea's use. The heart of the diffusion process is the modeling and imitation by potential adopters of their network partners who have adopted already. Change agents influence innovation decisions in a direction deemed desirable. Opinion leadership is the degree individuals influence others' attitudes
Article
Scholars in various disciplines have considered the causes, nature, and effects of trust. Prior approaches to studying trust are considered, including characteristics of the trustor, the trustee, and the role of risk. A definition of trust and a model of its antecedents and outcomes are presented, which integrate research from multiple disciplines and differentiate trust from similar constructs. Several research propositions based on the model are presented.