Voter Intention to Use E-Voting Technologies: Security, Technology Acceptance, Election Type, and Political Ideology

ABSTRACT This study integrates characteristics of e-voting technologies, political contexts, and behaviors with the technology acceptance model (TAM) to empirically examine how security principles, election types, and political ideology influence overall user intention to use an e-voting system. Structural equation analysis and Ordinary Least Squares (OLS) regression used on estimates of 228 surveys reveal that perceived usefulness, perceived ease of use, accuracy, and confidentiality have direct and indirect impacts on intention to use e-voting. While usefulness has statistically positive effects on voters' intention to use e-voting in different effects of political election types, political ideology does not drive user's adoption of the e-voting system.

[1]  S. Jasanoff Technologies of Humility: Citizen Participation in Governing Science , 2003 .

[2]  Frederic I. Solop Digital Democracy Comes of Age: Internet Voting and the 2000 Arizona Democratic Primary Election , 2001, PS: Political Science & Politics.

[3]  Charles Perrow,et al.  The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters , 2007 .

[4]  Kai R. T. Larsen,et al.  Voting technology implementation , 1999, CACM.

[5]  Paul Virilio,et al.  The Information Bomb , 2000 .

[6]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[7]  R. Michael Alvarez,et al.  Point, Click, and Vote - The Future of Internet Voting , 2003 .

[8]  H. Riebeek Brazil holds all-electronic national election , 2002 .

[9]  John H. Grant,et al.  Construct Measurement in Organizational Strategy Research: A Critique and Proposal , 1986 .

[10]  Peter G. Neumann Responsibilities of technologists , 2005, CACM.

[11]  S. Bowler,et al.  Democracy, Institutions and Attitudes about Citizen Influence on Government , 2002, British Journal of Political Science.

[12]  Bruce Schneier,et al.  Beyond fear - thinking sensibly about security in an uncertain world , 2003 .

[13]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[14]  Wolter Pieters,et al.  Internet Voting Not Impossible , 2005 .

[15]  R. Michael Alvarez,et al.  The Likely Consequences of Internet Voting for Political Representation , 2001 .

[16]  Jonathan N. Wand,et al.  The Butterfly Did It: The Aberrant Vote for Buchanan in Palm Beach County, Florida , 2001, American Political Science Review.

[17]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[18]  France Bélanger,et al.  The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..

[19]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[20]  France Bélanger,et al.  Trust and Risk in eGovernment Adoption , 2008, AMCIS.

[21]  M. Hilbert,et al.  The Maturing Concept of E-Democracy: From E-Voting and Online Consultations to Democratic Value Out of Jumbled Online Chatter , 2009 .

[22]  J. C. Thomas,et al.  The New Face of Government: Citizen-Initiated Contacts in the Era of E-Government , 2003 .

[23]  R. Michael Alvarez,et al.  Electronic elections - the perils and promises of digital democracy , 2008 .

[24]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[25]  Anish Bhimani,et al.  Securing the commercial Internet , 1996, CACM.

[26]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[27]  Young-Gul Kim,et al.  Extending the TAM for a World-Wide-Web context , 2000, Inf. Manag..

[28]  E. Frank Stephenson,et al.  The Effect of Voting Technology on Voter Turnout: Do Computers Scare the Elderly? , 2005 .

[29]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[30]  Carol L. Silva,et al.  The Administrators of Democracy: A Research Note on Local Election Officials , 2008 .

[31]  Kirsten Nussbaumer Help America Vote Act of 2002 , 2008 .

[32]  Aphra Kerr,et al.  Conceptualising Trust: A Literature Review , 2008 .

[33]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[34]  Richard F. Elmore,et al.  Backward Mapping: Implementation Research and Policy Decisions , 1979 .

[35]  Tabitha L. James,et al.  Determining the antecedents of digital security practices in the general public dimension , 2013, Information Technology and Management.

[36]  Helen Nissenbaum,et al.  Will Security Enhance Trust Online, or Supplant It? , 2004 .

[37]  W. Lazarus,et al.  Online Content for Low-Income and Underserved Americans: The Digital Divide's New Frontier. A Strategic Audit of Activities and Opportunities. , 2000 .

[38]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[39]  Donald P. Moynihan,et al.  Building Secure Elections: E-Voting, Security, and Systems Theory , 2004 .

[40]  Jane E. Fountain,et al.  Electronic Government and Electronic Civics , 2003 .

[41]  R. Michael Alvarez,et al.  Election Fraud: Detecting and Deterring Electoral Manipulation , 2009 .

[42]  Stephen Ansolabehere,et al.  Residual Votes Attributable to Technology , 2005, The Journal of Politics.

[43]  J. G. Payne,et al.  Celebrity Spectacle Influence on Young Voters in the 2004 Presidential Campaign , 2007 .

[44]  L. Atkeson,et al.  The Effect of Election Administration on Voter Confidence: A Local Matter? , 2007, PS: Political Science & Politics.

[45]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[46]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[47]  Brian F. Schaffner,et al.  Digital Divide or Just Another Absentee Ballot? , 2008 .

[48]  Martha Kropf,et al.  Voided Ballots in the 1996 Presidential Election: A County-Level Analysis , 2003, The Journal of Politics.

[49]  S. Dawes The Evolution and Continuing Challenges of E-Governance , 2008 .

[50]  Alexandros Xenakis Using Business Process Re-engineering ( BPR ) for the Effective Administration of Electronic Voting , 2005 .

[51]  Kelly D. Edmiston State And Local E-Government , 2003 .

[52]  Dan S. Wallach,et al.  Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.

[53]  M. Wattenberg,et al.  Parties without partisans : political change in advanced industrial democracies , 2000 .

[54]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[55]  More evidence of the effects of voting technology on election outcomes , 2009 .

[56]  Karl G. Jöreskog,et al.  Lisrel 8: User's Reference Guide , 1997 .

[57]  R. Gibson,et al.  Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary , 2001 .

[58]  H. John Heinz,et al.  Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots , 2004 .

[59]  E RoskosJ,et al.  A taxonomy of integrity models, implementations and mechanisms. , 1990 .

[60]  R. Alvarez,et al.  Are Americans Confident Their Ballots Are Counted? , 2008, The Journal of Politics.

[61]  Yurong Yao,et al.  Remote electronic voting systems: an exploration of voters' perceptions and intention to use , 2007, Eur. J. Inf. Syst..

[62]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[63]  Charles Press,et al.  Election Assistance Commission , 2012 .

[64]  Justin Zhijun Zhan,et al.  Privacy-Preserving Collaborative E-Voting , 2008, ISI Workshops.

[65]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[66]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..

[67]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[68]  Ingoo Han,et al.  The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce , 2003, Int. J. Electron. Commer..

[69]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..