{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T17:32:30Z","timestamp":1706031150948},"reference-count":24,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>eVoting is considered to be one of the most challenging domains of modern eGovernment and one of the main vehicles for increasing eParticipation among citizens. One of the main obstacles for its wide adoptionis the reluctance of citizens to participate in electronic voting procedures. This reluctance can be partially attributed to the low penetration of technology among citizens. However, the main reason behind this reluctance is the lack of trust which stems from the belief of citizens that systems implementing an eVoting process will violate their privacy. The departure point of this approach is that the emergence of such a belief can be considerably facilitated by designing and building systems in a way that evidence about the system\u2019s properties is produced during the design process. In this way, the designers can demonstrate the respect in privacy using this evidence that can be understood and checked by the specialist and the informed layman. These tools and models should provide sufficient evidence that the target system handles privacy concerns and requirements that can remove enough of the fears towards eVoting. This paper presents the efforts of the authors\u2018 organization, the Computer Technology Institute and Press \u201cDiophantus\u201d (CTI), towards the design and implementation of an eVoting system, called PNYKA, with demonstrable security properties. This system was based on a trust-centered engineering approach for building general security critical systems. The authors\u2018 approach is pragmatic rather than theoretical in that it sidesteps the controversy that besets the nature of trust in information systems and starts with a working definition of trust as people\u2019s positive attitude towards a system that transparently and demonstrably performs its operations, respecting their privacy. The authors also discuss the social side of eVoting, i.e. how one can help boost its acceptance by large social groups targeting the whole population of the country. The authors view eVoting as an innovation that must be diffused to a population and then employ a theoretical model that studies diffusion of innovation in social network, delineating structural properties of the network that help diffuse the innovation fast. Furthermore, the authors explain how CTI\u2019s current situation empowers CTI to realize its vision to implement a privacy preserving, discussion and public consultation forum in Greece. This forum will link, together, all Greek educational institutes in order to provide a privacy preserving discussion and opinion gathering tool useful in decision making within the Greek educational system.<\/p>","DOI":"10.4018\/jcit.2013040101","type":"journal-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T17:34:21Z","timestamp":1380648861000},"page":"1-33","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for Protecting Voters\u2019 Privacy In Electronic Voting Procedures"],"prefix":"10.4018","volume":"15","author":[{"given":"C.","family":"Manolopoulos","sequence":"first","affiliation":[{"name":"Computer Technology Institute and Press \u201cDIOPHANTUS\u201d, University of Patras, Patras, Greece"}]},{"given":"D.","family":"Sofotassios","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press \u201cDIOPHANTUS\u201d, University of Patras, Patras, Greece"}]},{"given":"P.","family":"Spirakis","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press \u201cDIOPHANTUS\u201d, Computer Engineering and Informatics Department, University of Patras, Patras, Greece"}]},{"given":"Y.C.","family":"Stamatiou","sequence":"additional","affiliation":[{"name":"Computer Technology Institute and Press \u201cDIOPHANTUS\u201d, Business Administration Department, University of Patras, Patras, Greece"}]}],"member":"2432","reference":[{"key":"jcit.2013040101-0","doi-asserted-by":"crossref","unstructured":"Antoniou, A., Korakas, C., Manolopoulos, C., & Panagiotaki, A. Sofotassios, D., Spirakis, P., &. Stamatiou, Y. C. (2007). A trust-centered approach for building e-voting systems. In Proc. 6th International Conference on eGovernment (EGOV 2007) (pp. 366-377). Lecture Notes in Computer Science, Springer-Verlag.","DOI":"10.1007\/978-3-540-74444-3_31"},{"key":"jcit.2013040101-1","first-page":"1589","article-title":"The use of the CCTA risk analysis and management methodology CRAMM in health information systems","author":"B.Barber","year":"1992","journal-title":"MEDINFO 92"},{"key":"jcit.2013040101-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.013"},{"key":"jcit.2013040101-3","doi-asserted-by":"publisher","DOI":"10.1016\/S0736-5853(03)00017-0"},{"key":"jcit.2013040101-4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539394000362"},{"key":"jcit.2013040101-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.03.009"},{"key":"jcit.2013040101-6","author":"J. S.Coleman","year":"1990","journal-title":"Foundations of social theory"},{"key":"jcit.2013040101-7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0239-5"},{"key":"jcit.2013040101-8","author":"T. J.Grose","year":"2002","journal-title":"Mastering XMI: Java programming with XMI, XML, and UML"},{"key":"jcit.2013040101-9","author":"T.Kletz","year":"1999","journal-title":"Hazop and hazan: Identifying and assessing process industry hazards"},{"key":"jcit.2013040101-10","doi-asserted-by":"crossref","unstructured":"Konstantinou, E., Liagkou, V., Spirakis, P., Stamatiou, Y. C., & Yung, M. (2004). Electronic national lotteries. In Proc. Financial Cryptography (FC 2004, LNCS 3110) (pp.147-163). Springer Verlag.","DOI":"10.1007\/978-3-540-27809-2_18"},{"key":"jcit.2013040101-11","doi-asserted-by":"crossref","unstructured":"Konstantinou, E., Liagkou, V., Spirakis, P., Stamatiou, Y. C., & Yung, M. (2005). Trust engineering: From requirements to system design and maintenance \u2013 a working national lottery system experience. In Proc. Information Security Conference (ISC 2005, LNCS 3650) (pp. 44-58). Springer Verlag.","DOI":"10.1007\/11556992_4"},{"key":"jcit.2013040101-12","author":"P.Krutchten","year":"1999","journal-title":"The rational unified process. An introduction"},{"key":"jcit.2013040101-13","doi-asserted-by":"crossref","unstructured":"Lenstra, A. K., & Lenstra, H. W., Jr. (1990). Algorithms in number theory. In J. van Leeuwen (Ed.), Handbook of theoretical computer science (pp. 673-715). A North-Holland, Amsterdam.","DOI":"10.1016\/B978-0-444-88071-0.50017-5"},{"key":"jcit.2013040101-14","first-page":"94","article-title":"Familiarity, confidence, trust: Problems and alternatives","author":"N.Luhmann","year":"2000","journal-title":"Trust: Making and breaking cooperative relations"},{"key":"jcit.2013040101-15","unstructured":"Manolopoulos, C., Panagiotaki, A., Sofotasios, D., Spirakis, P., & Stamatiou, Y. C. (2008). Experiences and benefits from the application of a formal risk assessment framework in the evoting domain. In Proceedings of the 7th International Conference on eGovernment (EGOV 2008)."},{"key":"jcit.2013040101-16","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(04)00039-9"},{"key":"jcit.2013040101-17","author":"J. R.Putman","year":"2000","journal-title":"Architecting with RM-ODP"},{"key":"jcit.2013040101-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2007.04.007"},{"key":"jcit.2013040101-19","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(94)90095-7"},{"key":"jcit.2013040101-20","unstructured":"Smith, W. D. (2005). Cryptography meets voting, September."},{"key":"jcit.2013040101-21","doi-asserted-by":"crossref","unstructured":"St\u00f8len, K., den Braber, F., Dimitrakos, T., Fredriksen, R., Gran, B. A., Houmb, S.-H., et al. (2003). Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks. In F. Barbier (Ed.), Business component-based software engineering, Kluwer, pp. 189-207). The CORAS framework is freely. Retrieved from http:\/\/coras.sourceforge.net\/","DOI":"10.1007\/978-1-4615-1175-5_11"},{"key":"jcit.2013040101-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2011.11.005"},{"key":"jcit.2013040101-23","article-title":"The diffusion of innovations in social network","volume":"Vol. III","author":"P.Young","year":"2003","journal-title":"The economy as a complex evolving system"}],"container-title":["Journal of Cases on Information Technology"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=88124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:29:16Z","timestamp":1654108156000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jcit.2013040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jcit.2013040101","relation":{},"ISSN":["1548-7717","1548-7725"],"issn-type":[{"value":"1548-7717","type":"print"},{"value":"1548-7725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}