Extending E-Democracy to Enhance Voter Registration and Identification: South Africa Elections Perspective
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 1
Abstract
The increase in information and communication technologies (ICTs), especially the Internet has been useful and yielded positive impacts in today’s e-society. With e-democracy in particular, ICT can help build trust by engaging citizen in the policy process, promote open and responsible government and aid in preventing corruption. In the same way, ICT can also help protect the integrity of the elections especially during registration and identification of voters. This will go a long way to promote transparency and trustworthiness of the system, and possibly eliminates all forms election frauds - multiple registrations, voting and impersonation. Therefore, the objective of this paper is to propose a new improved form of electoral process that aim at providing stronger security measures to protect and uphold its integrity. The approach requires the use of relevant ICTs tools to enhance both voter registration and identification processes on a real-time mode in order to fully guarantee that one person registers or votes only once. In this paper, we discuss in the perspective of South Africa (SA) elections. In addition, we developed a prototype called VOTEX to substantiate our idea, making use of biometric technology.
Authors and Affiliations
Isong Bassey , Ndwamato Netshipise
Detection of Packet Dropping and Modification in Wireless Sensor Network
Security is crucial for wireless sensor networks deployed in hostile environments. The packet droppers and packet modifiers may be random. Identifying such attacks is very difficult and sometimes impossible. In this pape...
A Cluster Based Optimization Technique with Adoptive Framework for ZigBee WSN
ZigBee is a current wireless standard based on IEEE 802.15.4 used in Wireless Sensor Networks (WSNs) stimulates many interests. In a built WSN, the information about some part of interest may need further research such t...
Effort Reduction by Automatic Code Generation
The emergence of Unified Modelling Language (UML) as a standard for modelling systems has encouraged the use of automated software tools that facilitate the development process from analysis through coding. In our approa...
An effective cluster formation with security in mobile ad hoc network
Mobile ad hoc networks have attracted much attention due to their mobility and easy deployment. However, the wireless and dynamic nature of network renders them more vulnerable to various types of security attacks than t...
PATIENT HEALTH MONITORING SYSTEM (PHMS) USING IoT DEVICES
Internet of Things (IoT) is the emerging paradigm, which contains huge amount of smart object and smart devices connected to the internet for communicating with each other. IoT devices are used in many fields which make...