This study examines the security challenges around the Student Representative Council (SRC)’s electronic voting systems at a public-funded university in the Western Cape province. Given the emergence of the global Corona Virus Disease (COVID-19) pandemic and South Africa’s national energy crisis, universities have reconfigured their business models including the SRC voting system. The objective of this paper was to conduct a credible and preserve the SRC voting process. In addition, the study examined the security challenges brought about by the electronic voting system with the aim of suggesting appropriate interventions that could deter would be perpetrators. A qualitative research methodology was used to gather data from members of the SRC, students and student administration. Data were collected through a semi-structured interview, in a face-to-face environment. The study established user mistakes, technical errors and unacceptable user behaviour as the root causes of security vulnerabilities in the e-Voting system. Furthermore, the paper revealed that students voted for the SRC using their student numbers, thus, exposing the identities of voters. The recommendations were to generate numbers, allocate them to registered voters, and use them for voting. Election Officers were required to attend Information Security awareness training programmes in order to exercise due handling of people’s information. The use of biometrics authentication was suggested to improve the security of information.
Cite this paper
Chigada, J. and Mazhawidza, D. S. T. (2024). Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape. Open Access Library Journal, 11, e2166. doi: http://dx.doi.org/10.4236/oalib.1112166.
Madheswari, N.S.A.N. (2016) Secured Authentication for Internet Voting in Corporate Companies to Prevent Phishing Attacks. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 22, 976-1353.
Birch, S., Cockshott, P. and Renaud, K. (2014) Putting Elec-tronic Voting under the Microscope. The Political Quarterly, 85, 187-194. https://doi.org/10.1111/1467-923x.12071
Matharu, G.S., Mishra, A. and Chaudhary, L. (2014). Integrated Election Voting System: A Model for Leveraging ICT in the Indian Election Scenario. Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, 14-16 November 2014, 1-7. https://doi.org/10.1145/2677855.2677944
Chigada, J.M. (2020) A Qual-itative Analysis of the Feasibility of Deploying Biometric Authentication Systems to Augment Security Protocols of Bank Card Transactions. SA Journal of Infor-mation Management, 22, a1194. https://doi.org/10.4102/sajim.v22i1.1194
Chigada, J. and Daniels, N. (2021) Exploring Information Systems Security Implications Posed by BYOD in a Financial Services Firm. Business Information Review, 2, 1-12.
Park, S., Specter, M., Narula, N. and Rivest, R.L. (2020) Going from Bad to Worse: From Internet Voting to Blockchain Voting. Oxford University Press, 2-12.
Jefferson, D., Rubin, A.D., Simons, B. and Wagner, D. (2004) Ana-lyzing Internet Voting Security. Communications of the ACM, 47, 59-64. https://doi.org/10.1145/1022594.1022624
Ajish, S. and AnilKumar, K.S. (2021) Secure Mobile Internet Voting System Using Biometric Authentica-tion and Wavelet Based AES. Journal of Information Security and Applications, 61, Article ID: 102908. https://doi.org/10.1016/j.jisa.2021.102908
Unt, T., Solvak, M. and Vass-il, K. (2017) Does Internet Voting Make Elections Less Social? Group Voting Pat-terns in Estonian E-Voting Log Files (2013-2015). PLOS ONE, 12, e0177864. https://doi.org/10.1371/journal.pone.0177864
Carter, L. and Bélanger, F. (2012) Internet Voting and Political Participation. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 43, 26-46. https://doi.org/10.1145/2351848.2351851
Khan, K.M., Arshad, J. and Khan, M.M. (2020) Investigating Performance Constraints for Blockchain Based Secure E-Voting System. Future Generation Computer Systems, 105, 13-26. https://doi.org/10.1016/j.future.2019.11.005
Yao, Y. and Murphy, L. (2007) Remote Electronic Voting Systems: An Exploration of Voters’ Perceptions and Intention to Use. European Journal of Information Systems, 16, 106-120. https://doi.org/10.1057/palgrave.ejis.3000672
Abu-Shanab, E., Khasawneh, R. and Alsmadi, I. (2013) Authentication Mechanisms for E-voting. In: Saeed, S. and Reddick, C.G., Eds., Human-Centered System Design for Electronic Governance, IGI Global, 71-86. https://doi.org/10.4018/978-1-4666-3640-8.ch006
Marcos del Blanco, D.Y., Panizo Alonso, L. and Hermida Alonso, J.A. (2018) Review of Crypto-graphic Schemes Applied to Remote Electronic Voting Systems: Remaining Challenges and the Upcoming Post-Quantum Paradigm. Open Mathematics, 16, 95-112. https://doi.org/10.1515/math-2018-0013
Kumar, V. and Kumra, S. (2016) Computer Systems Security and Support for Internet Voting System. International Journal of Engineering Applied Sciences and Technology, 1, 50-53. http://www.ijeast.com
Sausalito, C. (2020) Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybercrime Magazine. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
Mahr, J. (2021) What Are the Security Requirements for Online Voting? EDGE Elec-tions.https://medium.com/edge-elections/what-are-the-security-requirements-for-
online-voting-9fafa67892ab
Ravi, D. (2020) Part 1: Security Vulnerabilities of e-Voting—Keesing Platform. https://platform.keesingtechnologies.com/evoting-security-vulnerabilities/
Mallik, A. (2019) Man-in-the-Middle-Attack: Understanding in Simple Words. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2, 109-134. https://doi.org/10.22373/cj.v2i2.3453
Reshmi, T.R. (2021) Information Security Breaches Due to Ransomware Attacks—A Systematic Literature Re-view. International Journal of Information Management Data Insights, 1, Article ID: 100013. https://doi.org/10.1016/j.jjimei.2021.100013
Rodriguez-Perez, A. (2021) Five Common Attacks Against Online Voting. https://medium.com/edge-electi
ons/five-common-attacks-against-online-voting-599036eb3e80
Yaqoob, I., Ahmed, E., Rehman, M.H.U., Ahmed, A.I.A., Al-garadi, M.A., Imran, M., et al. (2017) The Rise of Ransomware and Emerging Security Challenges in the Internet of Things. Computer Networks, 129, 444-458. https://doi.org/10.1016/j.comnet.2017.09.003
Krombholz, K., Hobel, H., Huber, M. and Weippl, E. (2015) Advanced Social Engineering At-tacks. Journal of Information Security and Applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005
Halderman, J.A. (2019) Practical Attacks on Real-World E-Voting. University of Michigan. In: Hao, F. and Ryan, P.Y.A., (Eds.), Real-World Electronic Voting: Design, Analysis and De-ployment, Auerbach Publications, 143-170.
Nyasvisvo, B. and Chigada, J. (2023) Phishing Attacks: A security Challenge for University Students Studying Remotely. The African Journal of Information Systems, 15, 1-27.
Ben Ayed, A. (2017) A Conceptual Secure Blockchain Based Electronic Voting Sys-tem. International Journal of Network Security & Its Applications, 9, 1-9. https://doi.org/10.5121/ijnsa.2017.9301
Panja, S. and Roy, B. (2021) A Secure End-to-End Verifiable E-Voting System Using Blockchain and Cloud Server. Journal of Information Security and Applications, 59, Article ID: 102815. https://doi.org/10.1016/j.jisa.2021.102815
Bryman, A. (2016) Social Research Methods. 5th Edition, Oxford University Press. https://ktpu.kpi.ua/wp-content/uploads/2014/02/social-research-methods-alan-bryman.pdf
Yin, R.K. (2009) Case Study Research: Design and Methods (Fourth, vol. 5). SAGE Ltd. https://books.google.co.za/books?id=FzawIAdilHkC&printsec=frontco
ver&dq=yin case study 4th
edition&hl=en&sa=X&redir_esc=y#v=onepage&
;q=yin%20%20case%20study%204th%20edition&f=false
Sutton, J. and Austin, Z. (2015) Qualitative Research: Data Collection, Analysis, and Management. The Canadian Journal of Hospital Pharmacy, 68, 226-231. https://doi.org/10.4212/cjhp.v68i3.1456
Dandapani, A., Hartigan, B. and Kennedy, J. (2021) Fingerprint Protected Voting Machine. https://courses.grainger.illinois.edu/ece445/getfile.asp?id=18903