E-Voting in an Ubicomp World

The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and also socially. Ubicomp evokes a near future in which humans will be surrounded by “always-on,” unobtrusive, interconnected intelligent objects where information is exchanged seamlessly. This seamless exchange of information has vast social implications, in particular the protection and management of personal information. This research project investigates the concepts of trust and privacy issues specifically related to the exchange of e-voting information when using a ubicomp type system.

[1]  Martin C. Maguire,et al.  A review of user-interface design guidelines for public information kiosk systems , 1999, Int. J. Hum. Comput. Stud..

[2]  Elizabeth Sillence,et al.  Trust and mistrust of online health sites , 2004, CHI.

[3]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[4]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[5]  Alfred Kobsa,et al.  Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.

[6]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[7]  Clare-Marie Karat,et al.  Designing personalized user experiences for eCommerce: theory, methods, and research , 2003, CHI Extended Abstracts.

[8]  Tim Storer,et al.  Polsterless Remote Electronic Voting , 2004 .

[9]  David C. Kimball,et al.  Unrecorded Votes in the 2000 Presidential Election , 2002 .

[10]  Mahesh S. Raisinghani,et al.  Ambient Intelligence: Changing Forms of Human-Computer Interaction and their Social Implications , 2006, J. Digit. Inf..

[11]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[12]  Dahlia Malkhi,et al.  E-Voting Without 'Cryptography' , 2002, Financial Cryptography.

[13]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[14]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[15]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[16]  Michael Friedewald,et al.  Perspectives of ambient intelligence in the home environment , 2005 .

[17]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[18]  Rebecca T. Mercuri,et al.  Electronic vote tabulation checks and balances , 2001 .

[19]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[20]  Norbert A. Streitz,et al.  The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.

[21]  Bongshin Lee,et al.  Electronic voting system usability issues , 2003, CHI '03.

[22]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[23]  Mark Weiser The computer for the 21st century , 1991 .