E-Voting System for National Association of Computer Science Students Modibboadama University of Technology Yola, Adamawa State, Nigeria

Abstract

This research is on e-voting system for National Association of Computer Science Students Modibbo Adama University of Technology, Yola, Adamawa State, Nigeria. The main objective is to highlight the advantages of e-voting system over the manual approach of voting in National Association of Computer Science Student (NACOSS), MAUTECH, YOLA. Interview method and Focus Group Discussion was used for qualitative data collection, RAD system analysis and design was applied for the implementation of the proposed system. From the result of the focus group discussion and the interview conducted, which emphasized the disadvantages of the manual approach of voting in the department for years, the response from the interview made us suggest that an e-voting system for the department will be better suited for the departmental elections if implemented.

Country : Nigeria

1 H.C.Celestine2 C.K.Okeke3 Dr.N.D.Oye

  1. Department of Computer Science, Modibbo Adama University of Technology, Yola, Nigeria
  2. Department of Computer Science, Modibbo Adama University of Technology, Yola, Nigeria
  3. Department of Computer Science, Modibbo Adama University of Technology, Yola, Nigeria

IRJIET, Volume 2, Issue 5, July 2018 pp. 12-20

References

  1. Alexander, P., Robert, K., Martin, K. (2004). Security Assets in E-Voting In proceeding of Information Processing, information Business and Process Management. 127:234.
  2. Aviel, D. R. (2002). Security considerations for remote electronic voting. In Communications of the ACM. Vol 45. 39-44.
  3. Cal Tech-MIT. (2001). Voting: what is, what could be. Cal Tech-MIT Voting technology Project Report.www.vote.caltech.edu/Reports
  4. Cansell, D., Gibson, J. P. and Mery, D. (2007). “Formal verification of tamper-evident storage for e-voting”, In Proceedings of the 5th IEEE International Conference on Software Engineering and Formal Methods (SEFM’07,), London, UK, pp. 329-338.www.ejeg.com/issue/download.html?idArticle=94.
  5. Cetinkaya, O. and Cetinkaya, D. (2007). “Towards Secure E-Elections in Turkey: Requirements and Principles”, International Workshop on Dependability and Security in c-Government (DeSeGov O7 - In Proceedings of ARES ‘07, Vienna, Austria, pp. 903-907.
  6. Chaum, D. (1981). “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Communications of the A CM, Vol. 24-2, pp. 84-90.  https://en.wikipedia.org/wiki/David_Chaum
  7. Council of Europe (2010). E-voting Handbook. Key steps in the implementation of e-enabled elections. Council of Europe Publishing.
  8. Cranoir, L. and Cytron, R. (1997). “Sensus: A Security-Conscious Electronic Polling System for the Internet”, In Proceedings of the 30th Annual Hawaii International Conference on System Sciences, Wailea, Hawaii.
  9. Delaune, S., Kremer, S. and Ryan, M. D. (2006). “Verifying Properties of Electronic Voting Protocols”, In Proceedings of hAVoSS Workshop On Trustworthy Elections (WOTE ‘O6, Cambridge, UK, pp. 45-52. dl.acm.org/citation.cfm?id=585599.
  10. Fujioka, A., Okamoto, T. and Ohta, K. (1992). “A Practical Secret Voting Scheme for Large Scale Elections”, Workshop on the Theory andApplication of Cryptographic Techniques - In Proceedings of Auscrypt ‘92, Gold Coast Australia, pp. 244-251.www.iosrjournals.org/iosrjce/papers/Vol18-issue6/Version-3/E1806033033.pdf.
  11. Gritzalis, D. E. (2002). Secure electronic voting. Advances in information security, vol. 7. Kluwer Academic Publishers; a.link.springer.com/chapter/10.1007%2F978-1-4615-0239-5_7.
  12. Karlof, C., Sastry, N. and Wagner, D. (2005). “Cryptographic Voting Protocols: A Systems Perspective”, In Proceedings of the 14th Conference on USENIX Security Symposium, Baltimore, MD.
  13. Kohno, T., Stubblefield, A., Rubin, A.D. and Wallach, D.S. (2004). Analysis of an electronic voting system. IEEE symposium on security and privacy. avirubin.com/vote.pdf.
  14. Mercuri, R. (2000b). Rebecca Mercuri’s Statement on Electronic Voting, [Online], Available: http://www.notablesoftware.com/RMstatement.htm1[25 Oct 2007].
  15. Nurmi, H., Salomaa, A. and Santean, L. (1991). Secret ballot elections in computer networks. Computers and Security, 36, 10 pp. 553-560. citeseerx.ist.psu.edu/viewdoc/download?doi=101.1.297.3557&rep=rep1...pdf  Retrieved on march, 13- 2008.
  16. Rec (2004)11 – Council of Europe,https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2004)11&Language=lanEnglish
  17. Sako, K. and Kilian, J. (1995). “Receipt-Free Mix-Type Voting Scheme: A Practical Solution to the Implementation of A Voting Booth”, In Proceedings of Advances in Cryptology EUROCRYPT’95, Malo, France, pp. 393-403. https://issuu.com/academicconferences.org/docs/ejeg-volume5-issue2-article94
  18. Sampigethaya, K. and Poovendran, R. (2006). “A framework and taxonomy for comparison of electronic voting schemes”, Elsevier Computers & Security, Vol. 25-2, pp. 137-153.
  19. The Punch (2012). Political parties doubtful of e voting in 2015. From http://www.punchng.com/category/news/Political_parties_doubtful_of_e-voting_in_2015-The_Punch-Nigeria's_Most_Widely_Read_Newspaper.htm (Retrieved 22nd August, 2012).
  20. Ullman, L. (2003). PHP andMySQL for Dynamic Web Site (1stEdition). London: Peachpit Press.www.larryullman.com › Larry Ullman’s Books.