The Feasibility of Adopting a Secure E-voting Based Biometrics Authenticity: The Jordanian Parliamentary Elections

被引:0
|
作者
Al-Ashoush, Amer [1 ]
Altarawneh, Khalid [2 ]
Lasaasmeh, Omar [2 ]
机构
[1] Mutah Univ, Sch Business, MIS Dept, Mutah, Jordan
[2] Mutah Univ, Fac Informat Technol, Data Sci Dept, Mutah, Jordan
关键词
-; E-voting; Jordan parliamentarians; E-election; Biometrics; Delphi; TAM;
D O I
10.18421/TEM121-08
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
- This paper aims at investigating the feasibility of adopting a secure e-voting based on the authenticity of biometrics in conducting the election of Jordan parliamentarians consol. It firstly investigates the Jordanian citizens' acceptance level of an e-voting system based on biometric credentials as a supportive solution to their attitude, intention, and trust in actual participation. The successor phases are directed to validate the feasibility of adopting a biometric-based e -voting system by involving the Delphi method of three rounds for collecting and analysing data. The initial use case diagram, interview questions, and resultant queries are all mapped to construct the proposed conceptual framework. The results of multi phases methodology allow for development and recommend a conceptual framework for implementing an e-voting system with all acting schemas that represent the different stages of the election process. Moreover, the proposed conceptual framework was developed with thematic regulations that align with the experts' consensuses and the current Jordan parliament election law.
引用
收藏
页码:59 / 65
页数:7
相关论文
共 50 条
  • [21] A practical, secure, and auditable e-voting system
    AboSamra, Kareem M.
    AbdelHafez, Ahmed A.
    Assassa, Ghazy M. R.
    Mursi, Mona F. M.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 69 - 89
  • [22] Protection Profile for Secure E-Voting Systems
    Lee, Kwangwoo
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 386 - 397
  • [23] Seven principles for secure e-voting [2]
    Dill, David L.
    Communications of the ACM, 2009, 52 (02)
  • [24] VOTUM: Secure and Transparent E-Voting System
    Egocheaga, Joaquin
    Angulo, William
    Salas, Cesar
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 1, ICICT 2024, 2024, 1011 : 89 - 99
  • [25] Development of remotely secure E-voting system
    Keshk, A. E.
    Abdul-Kader, H. M.
    MEDIA CONVERGENCE: MOVING TO THE NEXT GENERATION, 2007, : 235 - 243
  • [26] SEAS: A Secure E-voting Applet System
    Baiardi, F
    Falleni, A
    Granchi, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 318 - 329
  • [27] Anonymous secure E-voting over a network
    Yi, M
    Varadharajan, V
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 293 - 299
  • [28] Intelligent anonymous secure E-voting scheme
    Park, Hee-Un
    Shin, Dong-Myung
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 726 - 736
  • [29] Design and Build A Secure E-voting Infrastructure
    Hassan, Ahmed
    Zhang, Xiaowen
    2013 NINTH ANNUAL CONFERENCE ON LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY (LISAT 2013), 2013,
  • [30] EtherVote: a secure smart contract-based e-voting system
    Spanos, Achilleas
    Kantzavelou, Ioanna
    WIRELESS NETWORKS, 2025, 31 (02) : 1279 - 1299