IDG Network:    Login   Register
   








Go to Advanced Search


Computerworld Home











Click here to find out more!

Knowledge Centers

Security
Storage
Mobile & Wireless
Hardware
Business Intelligence
Networking
Software

Jump to any
Knowledge Center


Partner Zones

Collaboration
Convergence
CRM OnDemand
Features

Latest Headlines
This Week's Issue
Shark Tank
Research
Webcasts
White Papers
Software Downloads
Buyer's Guides
E-mail Newsletters
News Feeds
Home > Browse Topics > Security


Public, security experts' e-voting views differ sharply
Experts worry more about errors in e-voting than does the public




Related to this topic

E-voting debate shifts focus to reliability, accessibility
E-voting rejected in Ohio
Calif. E-voting Ban Challenged
ISS: Critical Netscape flaw could be widespread
HP shelves virus-throttling product
Indiana man charged with hacking into former employer's systems
Big German banks hit by phishing attacks
Sidebar: Security Log


Computer Associates

Other resources

Enterprise Security Center: - Exclusive collection of information for securing your business


News Story by Sharon Machlis

AUGUST 06, 2004 (COMPUTERWORLD) - Security experts are substantially more skeptical about e-voting than the public, but their greatest worry is system and programming errors, not malicious hacker attacks, according to a survey released this week by the Ponemon Institute.

The study, conducted in July and early August, aimed to measure public opinion about electronic voting systems and then compare the results with those of security experts -- both IT pros and hackers.

"The degree of difference was just startling," said Larry Ponemon, adjunct professor of ethics and privacy at Carnegie Mellon University and director of the independent institute bearing his name.

The Tucson, Ariz.-based institute collected 2,933 usable responses nationwide from the public, both online and by postal mail, and surveyed 100 attendees at the Black Hat and Defcon hacking/security conferences.

Six out of 10 Black Hat/Defcon attendees had an unfavorable view of e-voting, while only 17% of the public did (22% of experts and 28% of the public were undecided).

Ponemon expected the public to be less concerned about e-voting problems than the hackers. However, in all the studies he has conducted comparing views of experts in various fields with those of the public at large, "I have not really seen differences of this magnitude before," he said.

Twenty percent of the experts cited system and programming errors as their top concern, followed by attempts to influence the outcome of an election (17%). A potential breach of security by hackers and cybercriminals ranked third (15%) as a potential e-voting worry among the Black Hat/Defcon attendees.

Among the public, the top worry was a decline in voter turnout because of fear or distrust of e-voting systems (18%), followed by human errors and privacy violations (15% each).

A number of citizen and political groups as well as security experts have criticized electronic voting systems, charging that they are unreliable and insecure. Many have called for a "paper trail" so that results can be recounted via hard-copy backups. System vendors insist that their machines are reliable and argue that critics are touting unlikely worst-case scenarios as probabilities (see our e-voting special coverage page). The president of the Information Technology Association of America, Harris Miller, told Computerworld that some of the criticism is less about electronic voting machines than "a religious war about open-source software vs. proprietary software" (see story).

In the Ponemon Institute survey, 83% of the experts said e-voting is either less or much less secure against election tampering than traditional paper ballot machines, compared with just 19% of the general public. Almost half (49%) of the experts said electronic voting systems were less likely to record and report their votes accurately, vs. 21% of the public.

"Most people are fairly trusting of this technology," Ponemon said. But among the security experts he spoke with, the feeling was quite different. "They think a lot of this technology is pretty crummy," he said.

What would you worry about the most if you used e-voting in the next Presidential election?



Source: The Ponemon Institute


Subscribe to our Security e-mail newsletter:
E-mail ZIP Code


Also in the Security Knowledge Center

News  |  Discussions  |  Buyers' Guides  |  Resource Links  |  White Papers  |  Mobile Channel  |  E-mail newsletters
  > Security XML Feed    > XML Feed FAQ






Additional Content
Security White Papers

Computerworld White Papers

Read up on the latest ideas and technologies from companies that sell hardware, software and services.

>FDC White Paper: “Flexible Database Clusters with IBM eServer
>Protecting Your Business From the Outside In
>Visible Ops Handbook: Starting ITIL in 4 Practical Steps
>Realizing the Mobile Enterprise with 2.5G Wireless Solutions
>DELIVER EMPLOYEE SELF-SERVICE PORTALS

>View Security whitepapers
Computerworld Zones

Collaboration Zone Oracle Collaboration Suite offers customers a suite of enterprise-class messaging and collaboration applications that enables organizations to increase user productivity and service levels while reducing total cost of ownership. Please take a look at this exclusive content from the Oracle Collaboration Zone.

White Paper: Spend Less, Collaborate More
Case Study: EPL, Inc. Builds Software Products Seven Times Faster
Video: Customers Benefiting from Oracle Collaboration Suite

View the Oracle Collaboration Zone
Computerworld Briefings

Get this research report... Security: The Security Imperative
Our new report, "The Security Imperative," offers dozens of tips and strategies for protecting your business from internal and external threats. IT managers tell you how to (safely) outsource security functions, implement identity management, plug instant-messaging gaps and even get a bigger security budget from the CFO! Plus, you'll get tactics for securing telecommuters, who could be your company's weakest security link! Get this $195 value free for a limited time, compliments of Citrix.

Download this report free.
Purchase this report.





Sponsored Links

GET THE MESSAGE.   Excerpt from a new email security book.

Mobilize Your Enterprise For Success   New Webcast

Free Guide   How to web-enable BPM apps in just weeks, not months

Forrester Webcast   Addressing Web App Delivery Challenges

HP workstations at PC prices   Xtreme machines for Xtreme users. Click here or Call 1-888-367-2402

Answers to real IT questions.   Remedy. Ask a question today.

Remedy. More than just Help Desk, Asset Management, Change Management, and SLA.   Remedy. More. Get More from a Free Whitepaper.

Improve IT Efficiency.   Windows Server System makes it possible.

The IP migration   A wake-up call

Got ITIL?   Tripwire can help you implement ITIL best practices.

Trend Micro   The Fight Against Viruse Isn’t the Only Thing We’re Winning.

Securing Your Website for Business   Looking for mission-critical server security?

Click for cost-effective   Intel® enterprise solutions

Looking for service desk software   that can save you money?

EnvoyWorldWide White Paper:   'Shattering the Myths of Automated Notifications'

Enterprise Grid Alliance   Helping make grid computing work for you

Scalable. Affordable. Reliable.   IBM eServer xSeries systems with Intel® XEON™ processors.

Dell has everything you need   to Build a Scalable Enterprise Now.

Click here to share your thoughts on I.T.   Chance to win a $50 cash

HP workstations:   the power to propel innovation.

HP Workstation Solutions for Financial Experts.   Learn more.

Stop Worms!   Learn how view demo—NOW! Proactive endpoint security from Zone Labs.

HP digital projectors.   Superior digital imaging technology. Buy now.

Enterprise Security Center:   Exclusive collection of information for securing your business.

Retailers see opportunity in new technology investments   Tune in to this new webcast to hear what’s in store for 2004




   
 

Copyright © 2004 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc.