Secure Intranet Voting System for Students’ Union Elections inNigerian Tertiary Institutions
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: In virtually all tertiary institutions of Nigeria, electronic voting technologies for the conduct ofstudents’ union elections are yet to be implemented as a replacement for the existent manual votingtechnologies. Manual voting systems are primarily characterized by high incidences of electoral malpracticesand irregularities. In this era of rapid globalization, the impact of information and communications technology(ICT) advancement in Nigeria is having numerous positive implications on students and their communities. Inthat regard, we sampled the opinions of users of the latter technologies, as this is crucial for the structuring andacceptance of our proposed system: Secure Intranet Voting System (SIVS). Thus questionnaires were distributedamongst randomly-selected potential voters; interviews were conducted with a subset of students’ electoralcommissioners and electorates at some Nigerian tertiary institutions. From our findings, we reached aconsensus that the proposed system will aid in improving all electoral activities within Nigerian studentcommunities. This paper proposes the design, development and implementation of a Secure Intranet VotingSystem (SIVS). The proposed system (SIVS) harnesses and utilizes the immense power of ICT techniques tocreate a striking impact in the way electoral activities are been conducted in Nigerian institutions. The goal ofthe system is tailored at establishing an efficient and effective electronic voting system aimed at improvingstudents’ democracy, and reducing electoral irregularities and malpractices in students’ union elections, via acombination of robust voting technologies.
Authors and Affiliations
Bonaventure C. Molokwu , Monica N. Agu
A Hotel Recommendation System Based on Data Mining Techniques
The recommendation system is a software tool to recommend user about the quality of items or services to be use by the user. Due to increase of tourism industry as well as growth IT industry tourist or employee visiting...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Performance Evaluation of Different Data Mining Classification Algorithm and Predictive Analysis
Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information; data mining has become an essential component in various...
Gain Comparison between NIFTY and Selected Stocks identified by SOM using Technical Indicators
The main aim of every investor is to identify a stock that has potential to go up so that the investor can maximize possible returns on investment. After identification of stock the second important point of deci...
ASRMalNets: Acknowledgement Based Secure Routing Scheme for Malicious MANETs
Abstract: A m o b i l e ad hoc network is a wireless commu- nication network, where communicating nodes are notwithin direct transmission range of each other. Since the radio links between t h e nodes b r e a k fre...