Extending E-Democracy to Enhance Voter Registration and Identification: South Africa Elections Perspective
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 1
Abstract
The increase in information and communication technologies (ICTs), especially the Internet has been useful and yielded positive impacts in today’s e-society. With e-democracy in particular, ICT can help build trust by engaging citizen in the policy process, promote open and responsible government and aid in preventing corruption. In the same way, ICT can also help protect the integrity of the elections especially during registration and identification of voters. This will go a long way to promote transparency and trustworthiness of the system, and possibly eliminates all forms election frauds - multiple registrations, voting and impersonation. Therefore, the objective of this paper is to propose a new improved form of electoral process that aim at providing stronger security measures to protect and uphold its integrity. The approach requires the use of relevant ICTs tools to enhance both voter registration and identification processes on a real-time mode in order to fully guarantee that one person registers or votes only once. In this paper, we discuss in the perspective of South Africa (SA) elections. In addition, we developed a prototype called VOTEX to substantiate our idea, making use of biometric technology.
Authors and Affiliations
Isong Bassey , Ndwamato Netshipise
Analyze the impact of Transmission rate on the Performance of AODV and DSR Protocols in MANETs under Responsive and Non-responsive Traffic.
The massive boom in the wireless technology has led to heavy utilization. Due to the heavy utilization and shared nature of resources causes QoS problems in ad hoc networks. Providing QoS is a severe problem in mobile ad...
Simulation of Gray Hole Attack in Adhoc Network Using NS2
A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist...
A Symmetric FHE Scheme Based on Linear Algebra
FHE is considered to be Holy Grail of cloud computing. Many applications of cloud computing inherently need symmetric keys while very few FHE schemes have been proposed with symmetric keys. Even with the schemes based on...
A Survey on Underwater Sensor Network Architecture and Protocols
Underwater sensor networks (UWSNs) are becoming popular everyday due to their ability which makes them to be deployed under adverse environmental conditions. UWNs are the enabling technology for wide range of application...
Personalized Collaborative News Recommendation
With the evolution of World Wide Web many conveniences came to our way, but along with these facilities came some challenges like unlimited information resources and a large corpus of online data. Recommendation Systems...