Remote electronic voting systems: an exploration of voters' perceptions and intention to use

Coupling telephone and web interfaces with computers for balloting outside the polling place, remote electronic voting systems (REVS) give the voter a choice: polling booth, absentee ballot, or remote voting. Not only does this e-Government technology raises issues such as security, voter participation, and accessibility, REVS technologies themselves differ in features and enabling conditions. How users (voters) perceive REVS's availability, mobility, accuracy, privacy protection, and ease of use, is likely to affect their use intention. Intention to use or not to use a voting technology can translate into a decision to vote or not – and there are no ‘do-overs’. We develop a model and report on a survey of potential voters – people waiting to be impaneled on a jury – in regard to the impact of REVS characteristics on voting intentions and how the two most discussed REVS technologies of telephone- and web-based interfaces are perceived.

[1]  Lorrie Faith Cranor,et al.  Electronic voting: computerized polls may save money, protect privacy , 1996, CROS.

[2]  Jennings Jt,et al.  Voting and registration in the election of November 1982. , 1982 .

[3]  Frederic I. Solop Digital Democracy Comes of Age: Internet Voting and the 2000 Arizona Democratic Primary Election , 2001, PS: Political Science & Politics.

[4]  Susan Henry Can remote Internet voting increase turnout? , 2003, Aslib Proc..

[5]  France Bélanger,et al.  The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..

[6]  Aviel D. Rubin,et al.  Security considerations for remote electronic voting , 2002, CACM.

[7]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[8]  Merle S. King,et al.  Implementing voting systems: the Georgia method , 2004, CACM.

[9]  J. Hair Multivariate data analysis , 1972 .

[10]  Makoto Yokoo,et al.  Socialware: multiagent systems for supporting network communities , 1999, CACM.

[11]  Wolter Pieters,et al.  Internet Voting Not Impossible , 2005 .

[12]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[13]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[14]  J. Sullivan,et al.  Rocking the Vote: Using Personalized Messages to Motivate Voting among Young Adults. , 2000, Public opinion quarterly.

[15]  Kai R. T. Larsen,et al.  Voting technology implementation , 1999, CACM.

[16]  H. Riebeek Brazil holds all-electronic national election , 2002 .

[17]  Ann Macintosh,et al.  Major Issues in Electronic Voting in the Context of the UK Pilots , 2004 .

[18]  Peter G. Neumann,et al.  Verification for Electronic Balloting Systems , 2003, Secure Electronic Voting.

[19]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[20]  Gregory A. Caldeira,et al.  Mailing In the Vote: Correlates and Consequences of Absentee Voting , 1985 .

[21]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[22]  Peter G. Neumann Responsibilities of technologists , 2005, CACM.

[23]  Joe Mohen,et al.  The case for internet voting , 2001, CACM.

[24]  Joan Borrell,et al.  Efficient construction of vote-tags to allow open objection to the tally in electronic elections , 2000, Inf. Process. Lett..

[25]  D. Rubinfeld,et al.  Econometric models and economic forecasts , 2002 .

[26]  R. Bennett The Senate of the United States , 1999 .

[27]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[28]  Dennis Leech,et al.  Computing Power Indices for Large Voting Games , 2003, Manag. Sci..

[29]  V. Bekkers Reinventing government in the information age. International practice in IT-enabled public sector reform , 2003 .

[30]  D. Jefferson,et al.  Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .

[31]  C. Kiesler The psychology of commitment : experiments linking behavior to belief , 1971 .

[32]  Richard Heeks Reinventing Government in the Information Age: International Practice in IT-Enabled Public Sector Reform , 2002 .

[33]  Ann E. Schlosser,et al.  The Evolution of the Digital Divide: How Gaps in Internet Access May Impact Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[34]  Lorrie Faith Cranor,et al.  Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[35]  W. Andrew Taylor,et al.  Computer-mediated knowledge sharing and individual user differences: an exploratory study , 2004, Eur. J. Inf. Syst..

[36]  Yujong Hwang,et al.  Investigating enterprise systems adoption: uncertainty avoidance, intrinsic motivation, and the technology acceptance model , 2005, Eur. J. Inf. Syst..