{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:09:02Z","timestamp":1754158142675,"version":"3.41.2"},"reference-count":31,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,10,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To provide practitioners of information management with an overview and framework to explore the various controversies associated with the methods of traditional methods of voting with electronically enhanced voting via the internet (I\u2010voting). The current paper is centered on the assumption that I\u2010voting is the next logical step in applying online information\u2010gathering and retrieval technologies to the field of e\u2010government.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A review of the applied literature on electronically enhanced voting methods with potentials associated with internet voting, as well as from practical experience, resulted in a basic model for discussion of the emergent nature of I\u2010voting.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>I\u2010voting would reduce the cost for staffing polling stations, and also the funds needed to pay for voting machines. I\u2010voting could also reduce the number of errors made by both the voters and the electoral administrators, and allow for easier adoption of uniform standards in the ballot format, since it could be transmitted via the internet from a central election agency to all local and regional polling places. Bridging the digital divide and internet security issues may be the most important barriers that must be overcome if I\u2010voting becomes a viable option in the USA.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>It may be years, if ever, before a truly secure, relatively risk\u2010free internet service, such as I\u2010voting, is developed. However, despite the controversies associated with election fraud, the numerous current voting systems that are in place suffer from the same problems associated with online informational exchanges; but, for the most part, nations still conduct their businesses and the political systems are still relatively stable.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Owing to recent voting d\u00e9b\u00e2cles in the USA, the public is demanding a more reliable and secure method of voting. Currently, many nations are moving more toward electronically enhanced voting methods with the long\u2010term goal being internet voting. Unfortunately, there are heated debates about the pros and cons of handing over the right to vote, using a system that is prone to security risks from outside sources.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>In the short term, there should be increased interest in establishing national and international standards for testing and certification of electronic and I\u2010voting systems and their IT\u2010infrastructure. It is a basic premise of the present study that voting online increases voter participation, which can only be viewed in a positive light.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520510628909","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T19:43:23Z","timestamp":1168890203000},"page":"513-530","source":"Crossref","is-referenced-by-count":16,"title":["Revolutionising the voting process through online strategies"],"prefix":"10.1108","volume":"29","author":[{"given":"Alan D.","family":"Smith","sequence":"first","affiliation":[]},{"given":"John S.","family":"Clark","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020119564949800_b1","unstructured":"Ansolabehere, S. and Stewart, C. (2002), \u201cVoting technology and uncounted votes in the United States\u201d, available at: www.vote.caltech.edu\/reports\/residual\u2010vote.pdf."},{"key":"key2022020119564949800_b2","unstructured":"Bergman, M. (2004), \u201cRecord numbers registered and voted in 2002 election\u201d, Census Bureau Reports, available at: www.census.gov\/Press\u2010Release\/www\/releases\/archives\/voting."},{"key":"key2022020119564949800_b3","unstructured":"Bhandari, A. (2004), \u201cIs the future in line or online?\u201d, available at: www.thestar.com\/NASApp\/cs\/ContentServer."},{"key":"key2022020119564949800_b4","unstructured":"Bonsor, K. (2004), \u201cHow e\u2010voting will work\u201d, available at: http:\/\/computer.howstuffworks.com\/e\u2010voting.htm\/."},{"key":"key2022020119564949800_b5","unstructured":"Boutin, P. (2004), \u201cIs e\u2010voting safe?\u201d, PC World, available at: www.pcworld.com\/resource\/printable\/article\/0,aid,115608,00.asp."},{"key":"key2022020119564949800_b6","unstructured":"Brace, K.W. (2004), \u201cOverview of voting equipment usage in the United States: Direct Recording Electronic (DRE) voting\u201d, available at: www.electiondataservices.com."},{"key":"key2022020119564949800_b7","unstructured":"CIO (1999), \u201cTechnology execs and consumers voice support for e\u2010voting, indifference to internet taxes: CIO magazine study \u2013 industry trend or event\u201d, EDP Weekly's IT Monitor, 27 December, available at: www.findarticles.com\/p\/articles\/mi_m0GZQ\/is_50_40\/ai_58447395."},{"key":"key2022020119564949800_b8","unstructured":"Clarke, R. (1999), \u201cA primer in diffusion of innovations theory\u201d, available at: www.anu.edu.au\/people\/Roger.Clarke\/SOS\/InnDiff.html."},{"key":"key2022020119564949800_b9","unstructured":"Fischer, E.A. (2001), \u201cVoting technologies in the United States: overview and issues for Congress\u201d, The Wilson Quarterly, Vol. 25 No. 3, p. 103, available at: http:\/\/usinfo.state.gov\/usa\/infousa\/politics\/voting\/rl30773.pdf."},{"key":"key2022020119564949800_b10","doi-asserted-by":"crossref","unstructured":"Gefen, D., Rose, G.M., Warkentin, M. and Pavlou, P.A. (2005), \u201cCultural diversity and trust in IT adoption: a comparison of potential e\u2010voters in the USA and South Africa\u201d, Journal of Global Information Management, Vol. 13 No. 1, pp. 54\u201078.","DOI":"10.4018\/jgim.2005010103"},{"key":"key2022020119564949800_b11","unstructured":"Gerck, E. (2000), \u201cFrom voting to internet voting\u201d, The Bell, Vol. 1 No. 1, pp. 1\u20109."},{"key":"key2022020119564949800_b12","doi-asserted-by":"crossref","unstructured":"Gibson, R. (2001), \u201cElections online: assessing internet voting in light of the Arizona Democratic Primary\u201d, Political Science Quarterly, Vol. 116 No. 4, pp. 561\u201083.","DOI":"10.2307\/798221"},{"key":"key2022020119564949800_b13","doi-asserted-by":"crossref","unstructured":"Grant, G. and Chau, D. (2005), \u201cDeveloping a generic framework for e\u2010government\u201d, Journal of Global Information Management, Vol. 13 No. 1, pp. 1\u201029.","DOI":"10.4018\/jgim.2005010101"},{"key":"key2022020119564949800_b14","unstructured":"Hunter, G.E. (2001), \u201cThe role of technology in the exercise of voting rights\u201d, Law Technology, Vol. 34 No. 4, pp. 1\u201014."},{"key":"key2022020119564949800_b15","unstructured":"Jefferson, D., Rubin, A., Simons, B. and Wagner, D. (2004), \u201cA security analysis of the secure electronic registration and voting experiment\u201d, available at: http:\/\/servesecurityreport.org."},{"key":"key2022020119564949800_b16","doi-asserted-by":"crossref","unstructured":"Kawalek, P. and Wastall, D. (2005), \u201cPursuing radical transformation in information age government: case studies using the SPRINT methodology\u201d, Journal of Global Information Management, Vol. 13 No. 1, pp. 79\u201091.","DOI":"10.4018\/jgim.2005010104"},{"key":"key2022020119564949800_b17","doi-asserted-by":"crossref","unstructured":"Manna, D.R. and Smith, A.D. (2003), \u201cMeasuring the theoretical paradigm shift from marketing mix to relational marketing\u201d, International Business and Economics Research Journal, Vol. 2 No. 11, pp. 1\u20108.","DOI":"10.19030\/iber.v2i11.3854"},{"key":"key2022020119564949800_b18","unstructured":"Mayor, T. (2004), \u201cUnlocking our future\u201d, available at: www.keepmedia.com\/jsp\/article."},{"key":"key2022020119564949800_b19","unstructured":"Morse, R. (2002), \u201cElectronic voting: progress over setbacks\u201d, Law Technology, Vol. 35 No. 4, pp. 1\u20106."},{"key":"key2022020119564949800_b20","doi-asserted-by":"crossref","unstructured":"Phillips, D.M. and von Spakovsky, H.A. (2001), \u201cGauging the risks of internet elections\u201d, Communications of the ACM, Vol. 44 No. 1, pp. 73\u201085.","DOI":"10.1145\/357489.357512"},{"key":"key2022020119564949800_b21","unstructured":"Rogers, E.M. (1986), Communication: The New Media in Society, The Free Press, New York, NY."},{"key":"key2022020119564949800_b22","unstructured":"Rogers, E.M. (1995), Diffusion of Innovations, 4th ed., The Free Press, New York, NY."},{"key":"key2022020119564949800_b23","doi-asserted-by":"crossref","unstructured":"Rubin, A. (2002), \u201cSecurity considerations for remote electronic voting over the internet\u201d, Communications of the ACM, Vol. 45 No. 12, pp. 39\u201043.","DOI":"10.1145\/585597.585599"},{"key":"key2022020119564949800_b24","unstructured":"Smith, A.D. (2002), \u201cLoyalty and e\u2010marketing issues: customer retention on the Web\u201d, Quarterly Journal of E\u2010commerce, Vol. 3 No. 2, pp. 149\u201061."},{"key":"key2022020119564949800_b25","doi-asserted-by":"crossref","unstructured":"Smith, A.D. (2004), \u201cOnline privacy policies and diffusion theory perspectives: security or chaos?\u201d, Services Marketing Quarterly, Vol. 25 No. 1, pp. 47\u201074.","DOI":"10.1300\/J396v25n03_04"},{"key":"key2022020119564949800_b26","unstructured":"Smith, A.D. and Manna, D.R. (2005), \u201cExploring why people love their jobs\u201d, Journal of Business & Economics Research, Vol. 3 No. 3, pp. 21\u20106."},{"key":"key2022020119564949800_b27","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2002a), \u201cApplication service providers (ASP's): moving downstream to enhance competitive advantage\u201d, Information Management and Computer Security, Vol. 10 No. 2, pp. 64\u201072.","DOI":"10.1108\/09685220210424113"},{"key":"key2022020119564949800_b28","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2002b), \u201cIssues in cyber\u2010security: understanding the potential risks associated with hackers\/crackers\u201d, Information Management & Computer Security, Vol. 10 No. 4, pp. 178\u201083.","DOI":"10.1108\/09685220210436976"},{"key":"key2022020119564949800_b29","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2003), \u201cInformation management leveraging in the case of e\u2010folios: mass customization approaches in an e\u2010commerce environment\u201d, Services Marketing Quarterly, Vol. 25 No. 1, pp. 47\u201074.","DOI":"10.1300\/J396v25n01_04"},{"key":"key2022020119564949800_b30","unstructured":"Smith, A.D., Rota, D.R. and Turchek, J.C. (2003), \u201cCombining automatic data capture systems: smart cards and biometrics\u201d, Journal of Contemporary Business, Vol. 11 No. 2, pp. 26\u201036."},{"key":"key2022020119564949800_b31","doi-asserted-by":"crossref","unstructured":"Tan, C.W., Pan, S.L. and Lim, E.T.K. (2005), \u201cManaging stakeholder interests in e\u2010government implementation: lessons learned from a Singapore e\u2010government project\u201d, Journal of Global Information Management, Vol. 13 No. 1, pp. 31\u201053.","DOI":"10.4018\/jgim.2005010102"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520510628909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520510628909\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520510628909\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:27Z","timestamp":1753404027000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/29\/5\/513-530\/314209"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,1]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,10,1]]}},"alternative-id":["10.1108\/14684520510628909"],"URL":"https:\/\/doi.org\/10.1108\/14684520510628909","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2005,10,1]]}}}