References:

  • Aceyman, C. Z. (2018). Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use. SAGE Publishing. https://journals-sagepub-com.ezproxy.carleton.edu/doi/full/10.1177/0018720818812586
  • Adida, B. (2008). Helios: Web-based Open-Audit Voting. 14.
  • Adida, B., de Marneffe, O., Pereira, O., & Quisquater, J.-J. (n.d.). Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios. https://www.usenix.org/legacy/event/evtwote09/tech/full_papers/adida-helios.pdf
  • Agawu, E. A. (n.d.). How to Think About Election Cybersecurity. https://d1y8sb8igg2f8e.cloudfront.net/documents/Cybersecurity_Elections_FINAL.pdf
  • Autry, M., Cugini, J., Killam, W., & Yen, J. (n.d.). Improving the Usability and Accessibility of Voting Systems and Products. https://user-centereddesign.com/files/NISTHFReport.pdf
  • Avgerou, C., Masiero, S., & Poulymenakou, A. (2019). Trusting e-voting amid experiences of electoral malpractice: The case of Indian elections. Journal of Information Technology, 34(3), 263–289. https://doi.org/http://dx.doi.org.ezproxy.carleton.edu/10.1177/0268396218816199 aviv.pdf. (n.d.).
  • Awad, M., & Leiss, E. L. (2010). Paper Records and Electronic Audits: A Step Towards Regaining Voter Trust. EJournal of EDemocracy and Open Government, 2(1), 69–78. https://doi.org/10.29379/jedem.v2i1.12
  • Bederson, B. B., Lee, B., Sherman, R. M., Herrnson, P. S., & Niemi, R. G. (2003). Electronic voting system usability issues. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 145–152. https://doi.org/10.1145/642611.642638
  • Bell, S., Benaloh, J., Byrne, M. D., DeBeauvoir, D., Eakin, B., Fisher, G., Kortum, P., McBurnett, N., Montoya, J., Parker, M., Pereira, O., Stark, P. B., Wallach, D. S., & Winn, M. (2013). STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. 1(1), 20.
  • Benaloh, J. (2006). Simple Verifiable Elections. Microsoft Research, 10. https://www.usenix.net/legacy/events/evt06/tech/full_papers/benaloh/benaloh.pdf
  • Boneh, D., Boyen, X., & Halevi, S. (2006). Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. In D. Pointcheval (Ed.), Topics in Cryptology – CT-RSA 2006 (Vol. 3860, pp. 226–243). Springer Berlin Heidelberg. https://doi.org/10.1007/11605805_15
  • Bushwick, S. (2020, November 3). An Expert on Voting Machines Explains How They Work. Scientific American. https://www.scientificamerican.com/article/an-expert-on-voting-machines-explains-how-they-work/
  • California Internet Voting Task Force. (2000). Internet Voting Report. California Secretary of State. https://elections.cdn.sos.ca.gov/ivote/final_report.pdf
  • Chaum, D. (2004). Secret-ballot receipts: true voter-verifiable elections. IEEE Security & Privacy Magazine, 2(1), 38–47. https://doi.org/10.1109/MSECP.2004.1264852
  • Chaum, David, Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., Ryan, P. Y. A., Sherman, A. T., & Shen, E. (n.d.). Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. 13.
  • Chaum, David, Jakobsson, M., Rivest, R. L., Ryan, P. Y. A., Benaloh, J., Kutylowski, M., & Adida, B. (2010). Towards Trustworthy Elections: New Directions in Electronic Voting. Springer Berlin / Heidelberg. https://link.springer.com/book/10.1007%2F978-3-642-12980-3
  • Chevallier-Mames, B., Fouque, P.-A., Pointcheval, D., Stern, J., & Traoré, J. (2010). On Some Incompatible Properties of Voting Schemes. In David Chaum, M. Jakobsson, R. L. Rivest, P. Y. A. Ryan, J. Benaloh, M. Kutylowski, & B. Adida (Eds.), Towards Trustworthy Elections: New Directions in Electronic Voting (pp. 191–199). Springer. https://doi.org/10.1007/978-3-642-12980-3_11
  • Cortier, V., & Smyth, B. (2013). Attacking and fixing Helios: An analysis of ballot secrecy. Journal of Computer Security, 21(1), 89–148. https://doi.org/10.3233/JCS-2012-0458
  • CS Tea - Josh Benaloh - How to Run Elections in which Voters can Verify that their Votes are Correctly Counted. (n.d.). https://carleton.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=dc9f6306-0696-4caa-962e-ac6400d4c58a
  • Davtyan, S., Kiayias, A., Michel, L., Russell, A., & Shvartsman, A. A. (2012). Integrity of electronic voting systems: fallacious use of cryptography. Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1486–1493. https://doi.org/10.1145/2245276.2232013
  • Dawkins, S., Sullivan, T., Rogers, G., Cross, E. V., Hamilton, L., & Gilbert, J. E. (2009). Prime III: an innovative electronic voting interface. Proceedings of the 14th International Conference on Intelligent User Interfaces, 485–486. https://doi.org/10.1145/1502650.1502727
  • DDoS Attacks on Election Infrastructure Can Hinder Access to Voting Information, Would Not Prevent Voting. (n.d.). 2.
  • de Jong, M., van Hoof, J., & Gosselt, J. (2008). Voters’ Perceptions of Voting Technology: Paper Ballots Versus Voting Machine With and Without Paper Audit Trail. Social Science Computer Review, 26(4), 399–410. https://doi.org/10.1177/0894439307312482
  • Dimitriou, T. (2020). Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. Computer Networks, 174, 107234. https://doi.org/10.1016/j.comnet.2020.107234
  • Distler, V., Zollinger, M.-L., Lallemand, C., Roenne, P. B., Ryan, P. Y. A., & Koenig, V. (2019). Security - Visible, Yet Unseen? Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–13. https://doi.org/10.1145/3290605.3300835
  • Election Infrastructure Cyber Risk Assessment. (n.d.-a). CISA. https://www.cisa.gov/sites/default/files/publications/cisa-election-infrastructure-cyber-risk-assessment_508.pdf Election Infrastructure Cyber Risk Assessment. (n.d.-b). 16.
  • Election Infrastructure Subsector Government Coordinating Council, & United States Cybersecurity & Infrastructure Security Agency. (2020). Election infrastructure security funding considerations. USDepartment of Homeland Security, CISA.
  • Estehghari, S., & Desmedt, Y. (n.d.). Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example. 13.
  • Four falsehoods Giuliani spread about Dominion. (n.d.). https://www.nytimes.com/2021/01/25/technology/rudy-giuliani-dominion-election.html
  • Geller, E. (2020, December 27). Forget the conspiracy theories — here are the real election security lessons of 2020. Politico. https://www.politico.com/news/2020/12/27/election-security-lessons-2020-450356
  • Gibson, R. (2001). Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary. Political Science Quarterly, 116(4), 561–583. https://doi.org/10.2307/798221
  • HAVA41.pdf. (n.d.). Retrieved April 11, 2021, from https://www.eac.gov/sites/default/files/eac_assets/1/6/HAVA41.PDF
  • Hirt, M., & Sako, K. (2000). Efficient Receipt-Free Voting Based on Homomorphic Encryption. In B. Preneel (Ed.), Advances in Cryptology — EUROCRYPT 2000 (pp. 539–556). Springer. https://doi.org/10.1007/3-540-45539-6_38
  • Is It Possible to Have a Meaningful Recount from an Electronic Voting Machine? (n.d.). https://votingmachines.procon.org/questions/is-it-possible-to-have-a-meaningful-recount-from-an-electronic-voting-machine/
  • Jones, D. W. (n.d.). Perspective | Five myths about voting machines. Washington Post. Retrieved January 12, 2021, from https://www.washingtonpost.com/outlook/five-myths/five-myths-about-voting-machines/2020/12/24/ac2e02a2-453f-11eb-b0e4-0f182923a025_story.html
  • Jones, D. W. (2003, November 12). Building Trust and Confidence: Why trustworthy voting systems require institutionalized distrust. http://homepage.divms.uiowa.edu/~jones/voting/nist2003.html
  • Jones, D. W. (2004). Auditing elections. Communications of the ACM, 47(10), 46–50. https://doi.org/10.1145/1022594.1022622
  • Karayumak, F., Olembo, M. M., Kauer, M., & Volkamer, M. (n.d.). Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System. https://www.usenix.org/legacy/event/evtwote11/tech/final_files/Karayumak.pdf
  • Keller, A. M., Mertz, D., Hall, J. L., & Urken, A. (2004). Privacy issues in an electronic voting machine. Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 33–34. https://doi.org/10.1145/1029179.1029189
  • Kumar, D. A., & Begum, T. U. S. (n.d.). Electronic Voting Machine – A Review. International Conference on Pattern Recognition, 9.
  • Lofgren, Z., Raskin, J., Davis, S. A., Butterfield, G. K., Carolina, N., Fudge, M. L., Aguilar, P., & Daivs, R. (n.d.). COMMITTEE ON HOUSE ADMINSTRATION. 87.
  • Marks, J. (2020, January 8). The Cybersecurity 202: Voting machines touted as secure option are actually vulnerable to hacking, study finds. The Washington Post. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2020/01/08/the-cybersecurity-202-voting-machines-touted-as-secure-option-are-actually-vulnerable-to-hacking-study-finds/5e14cc6e602ff125ce5bd747/
  • Michel, G., & Klein, M. (2008). Utilisabilité et discrimination: étude préliminaire des machines à voter françaises. Proceedings of the 20th Conference on l’Interaction Homme-Machine, 85–92. https://doi.org/10.1145/1512714.1512731
  • Mitchell, G. E., & Wlezien, C. (1995). The Impact of Legal Constraints on Voter Registration, Turnout, and the Composition of the American Electorate. Political Behavior, 17(2), 179–202. https://www.jstor.org/stable/586535
  • Miura, T., Kitagami, A., Fujinawa, Y., & Nagoya, T. (2016). Accessibility, efficacy, and improvements in voting methodology for visually impaired persons using a web-based electronic ballot system. Proceedings of the 8th Indian Conference on Human Computer Interaction, 75–83. https://doi.org/10.1145/3014362.3014370
  • Moynihan, D. P. (2004). Building Secure Elections: E-Voting, Security, and Systems Theory. Public Administration Review, 64(5), 515–528. https://doi.org/10.1111/j.1540-6210.2004.00400.x
  • No Lines Online. (n.d.). Retrieved April 1, 2021, from https://www.ncsl.org/research/elections-and-campaigns/no-lines-online.aspx
  • Norris, P. (2017). Why American Elections Are Flawed (And How to Fix Them). Cornell University Press,. https://doi.org/10.7591/9781501712753
  • Otsuka, A., & Imai, H. (2010). Unconditionally Secure Electronic Voting. In David Chaum, M. Jakobsson, R. L. Rivest, P. Y. A. Ryan, J. Benaloh, M. Kutylowski, & B. Adida (Eds.), Towards Trustworthy Elections: New Directions in Electronic Voting (pp. 107–123). Springer. https://doi.org/10.1007/978-3-642-12980-3_6
  • Paul, N., & Tanenbaum, A. S. (2009). Trustworthy Voting: From Machine to System. Computer, 42(5), 23–29. https://doi.org/10.1109/MC.2009.169
  • Read “Asking the Right Questions About Electronic Voting” at NAP.edu. (n.d.). https://doi.org/10.17226/11449
  • Redish, J., Chisnell, D., Newby, E., Laskowski, S., & Lowry, S. (n.d.). Report of Findings: Use of Language in Ballot Instructions. https://www.nist.gov/system/files/documents/itl/vote/NISTIR-7556.pdf
  • Rezende, P. A. D. (2010). Electronic Elections: A Balancing Act. In David Chaum, M. Jakobsson, R. L. Rivest, P. Y. A. Ryan, J. Benaloh, M. Kutylowski, & B. Adida (Eds.), Towards Trustworthy Elections: New Directions in Electronic Voting (pp. 124–140). Springer. https://doi.org/10.1007/978-3-642-12980-3_7
  • Robinson, D. G., & Halderman, J. A. (n.d.). Ethical Issues in E-Voting Security Analysis. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29889-9_10
  • Rudy Giuliani Sued by Dominion Voting Systems Over False Election Claims. (n.d.). https://www.nytimes.com/2021/01/25/us/politics/rudy-giuliani-dominion-trump.html
  • Ryan L Claassen, David B Magleby, J Quin Monson, & Kelly D Patterson. (2013). Voter Confidence and the Election-Day Voting Experience. Political Behavior, 35(2), 215–235. https://doi.org/10.1007/s11109-012-9202-4
  • Sadia, K., Paul, R. K., & Islam, A. (n.d.). Blockchain Based Secured E-voting by Using the Assistance of Smart Contract. 15.
  • Sarah J. Eckman. (2019). Election Security: Voter Registration System Policy Issues. Election Security: Voter Registration System Policy Issues, 1, 1–3. https://heinonline.org/HOL/P?h=hein.crs/govbarp0001&i=1
  • Security Analysis of the Diebold AccuVote-TS Voting Machine. (n.d.). Retrieved January 14, 2021, from https://www.usenix.org/legacy/event/evt07/tech/full_papers/feldman/feldman_html/index.html
  • Sen, A., Sen, M., & Ambekar, A. (2016). Improved Electronic Voting Machine with Real Time Data Analysis. Communications on Applied Electronics, 6(1), 47–49. https://doi.org/10.5120/cae2016652420
  • Summary of the Problem with Electronic Voting. (n.d.).
  • Swierenga, S. J., Zantjer, R. S., Jackson, J. E., Ismirle, J., Blosser, S. R., & Pierce, G. L. (2015). Security Implications for Personal Assistive Technology in Voting. In T. Tryfonas & I. Askoxylakis (Eds.), Human Aspects of Information Security, Privacy, and Trust (pp. 582–591). Springer International Publishing. https://doi.org/10.1007/978-3-319-20376-8_52
  • Thornburgh, D., Lin, H., National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on a Framework for Understanding Electronic Voting, Celeste, R., & Lin, H. (2006). Asking the Right Questions about Electronic Voting. National Academies Press. http://ebookcentral.proquest.com/lib/carleton-ebooks/detail.action?docID=3378067
  • United States Congress House Committee on House Administration. (2020). Election security: hearing before the Committee on House Administration, House of Representatives, One Hundred Sixteenth Congress, first session, May 8, 2019. USGovernment Publishing Office.
  • Voting Machine: Report on the History, Use and Advantages of Mechanical Means for Casting and Counting Ballots. (1925).
  • Weldemariam, K., Kemmerer, R. A., & Villafiorita, A. (2011). Formal analysis of an electronic voting system: An experience report. Elsevier, 84(10), 1618–1637. https://www.sciencedirect.com/science/article/pii/S0164121211000756
  • Whitman, R., Sebastian Seung, H., & Pickard, G. (2006). Neural voting machines. Elsevier, 19(8), 1161–1167. https://www.sciencedirect.com/science/article/pii/S0893608006001511
  • Ziad, M. T. I., Al-Anwar, A., Alkabani, Y., El-Kharashi, M. W., & Bedour, H. (2014). E-Voting Attacks and Countermeasures. 2014 28th International Conference on Advanced Information Networking and Applications Workshops, 269–274. https://doi.org/10.1109/WAINA.2014.53