全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape

DOI: 10.4236/oalib.1112166, PP. 1-18

Subject Areas: Information Management

Keywords: Biometrics Authentication, Information Security, e-Voting, Student Representative Council, Security Vulnerabilities

Full-Text   Cite this paper   Add to My Lib

Abstract

This study examines the security challenges around the Student Representative Council (SRC)’s electronic voting systems at a public-funded university in the Western Cape province. Given the emergence of the global Corona Virus Disease (COVID-19) pandemic and South Africa’s national energy crisis, universities have reconfigured their business models including the SRC voting system. The objective of this paper was to conduct a credible and preserve the SRC voting process. In addition, the study examined the security challenges brought about by the electronic voting system with the aim of suggesting appropriate interventions that could deter would be perpetrators. A qualitative research methodology was used to gather data from members of the SRC, students and student administration. Data were collected through a semi-structured interview, in a face-to-face environment. The study established user mistakes, technical errors and unacceptable user behaviour as the root causes of security vulnerabilities in the e-Voting system. Furthermore, the paper revealed that students voted for the SRC using their student numbers, thus, exposing the identities of voters. The recommendations were to generate numbers, allocate them to registered voters, and use them for voting. Election Officers were required to attend Information Security awareness training programmes in order to exercise due handling of people’s information. The use of biometrics authentication was suggested to improve the security of information.

Cite this paper

Chigada, J. and Mazhawidza, D. S. T. (2024). Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape. Open Access Library Journal, 11, e2166. doi: http://dx.doi.org/10.4236/oalib.1112166.

References

[1]  Madheswari, N.S.A.N. (2016) Secured Authentication for Internet Voting in Corporate Companies to Prevent Phishing Attacks. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 22, 976-1353.
[2]  Birch, S., Cockshott, P. and Renaud, K. (2014) Putting Elec-tronic Voting under the Microscope. The Political Quarterly, 85, 187-194. https://doi.org/10.1111/1467-923x.12071
[3]  Batt, S. (2019) How Elec-tronic Voting Works: Pros and Cons vs. Paper Voting. https://www.makeuseof.com/tag/how-electronic-voting-works/
[4]  Buchsbaum, T.M. (2004) E-Voting: International Developments and Lessons Learnt. 31-42. http://dl.gi.de/handle/20.500.12116/29127
[5]  Matharu, G.S., Mishra, A. and Chaudhary, L. (2014). Integrated Election Voting System: A Model for Leveraging ICT in the Indian Election Scenario. Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, 14-16 November 2014, 1-7. https://doi.org/10.1145/2677855.2677944
[6]  Qadah, G.Z. and Taha, R. (2007) Electronic Voting Systems: Requirements, Design, and Implementation. Computer Standards & Interfaces, 29, 376-386. https://doi.org/10.1016/j.csi.2006.06.001
[7]  Chigada, J.M. (2020) A Qual-itative Analysis of the Feasibility of Deploying Biometric Authentication Systems to Augment Security Protocols of Bank Card Transactions. SA Journal of Infor-mation Management, 22, a1194. https://doi.org/10.4102/sajim.v22i1.1194
[8]  Chigada, J. and Daniels, N. (2021) Exploring Information Systems Security Implications Posed by BYOD in a Financial Services Firm. Business Information Review, 2, 1-12.
[9]  Park, S., Specter, M., Narula, N. and Rivest, R.L. (2020) Going from Bad to Worse: From Internet Voting to Blockchain Voting. Oxford University Press, 2-12.
[10]  Jefferson, D., Rubin, A.D., Simons, B. and Wagner, D. (2004) Ana-lyzing Internet Voting Security. Communications of the ACM, 47, 59-64. https://doi.org/10.1145/1022594.1022624
[11]  Ajish, S. and AnilKumar, K.S. (2021) Secure Mobile Internet Voting System Using Biometric Authentica-tion and Wavelet Based AES. Journal of Information Security and Applications, 61, Article ID: 102908. https://doi.org/10.1016/j.jisa.2021.102908
[12]  Tarasov, P. and Tewari, H. (2017) The Future of E-Voting. IADIS International Journal on Computer Sci-ence and Information Systems, 12, 148-165.
[13]  Unt, T., Solvak, M. and Vass-il, K. (2017) Does Internet Voting Make Elections Less Social? Group Voting Pat-terns in Estonian E-Voting Log Files (2013-2015). PLOS ONE, 12, e0177864. https://doi.org/10.1371/journal.pone.0177864
[14]  Carter, L. and Bélanger, F. (2012) Internet Voting and Political Participation. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 43, 26-46. https://doi.org/10.1145/2351848.2351851
[15]  Khan, K.M., Arshad, J. and Khan, M.M. (2020) Investigating Performance Constraints for Blockchain Based Secure E-Voting System. Future Generation Computer Systems, 105, 13-26. https://doi.org/10.1016/j.future.2019.11.005
[16]  Yao, Y. and Murphy, L. (2007) Remote Electronic Voting Systems: An Exploration of Voters’ Perceptions and Intention to Use. European Journal of Information Systems, 16, 106-120. https://doi.org/10.1057/palgrave.ejis.3000672
[17]  Mulliner, C., Borgaonkar, R., Stewin, P. and Seifert, J.P. (2013) SMS-Based One-Time Passwords: Attacks and Defense (Short Paper). 1-10. https://www.semanticscholar.org/paper/SMS-Based-One-T ime-Passwords%3A-Attacks-and-Defense-Mulliner-Bor gaonkar/a925a0f165c82b01c587215dcd66e06a7b10dcdf
[18]  Abu-Shanab, E., Khasawneh, R. and Alsmadi, I. (2013) Authentication Mechanisms for E-voting. In: Saeed, S. and Reddick, C.G., Eds., Human-Centered System Design for Electronic Governance, IGI Global, 71-86. https://doi.org/10.4018/978-1-4666-3640-8.ch006
[19]  Marcos del Blanco, D.Y., Panizo Alonso, L. and Hermida Alonso, J.A. (2018) Review of Crypto-graphic Schemes Applied to Remote Electronic Voting Systems: Remaining Challenges and the Upcoming Post-Quantum Paradigm. Open Mathematics, 16, 95-112. https://doi.org/10.1515/math-2018-0013
[20]  Kumar, V. and Kumra, S. (2016) Computer Systems Security and Support for Internet Voting System. International Journal of Engineering Applied Sciences and Technology, 1, 50-53. http://www.ijeast.com
[21]  Sausalito, C. (2020) Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybercrime Magazine. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
[22]  Mahr, J. (2021) What Are the Security Requirements for Online Voting? EDGE Elec-tions.https://medium.com/edge-elections/what-are-the-security-requirements-for- online-voting-9fafa67892ab
[23]  Chigada, J. (2023) Towards an Aligned South African National Cybersecurity Policy Framework. Ph.D. Thesis, Universi-ty of Cape Town.
[24]  Ravi, D. (2020) Part 1: Security Vulnerabilities of e-Voting—Keesing Platform. https://platform.keesingtechnologies.com/evoting-security-vulnerabilities/
[25]  Salahdine, F. and Kaabouch, N. (2019) Social Engineering Attacks: A Survey. Future Internet, 11, Article No. 89. https://doi.org/10.3390/fi11040089
[26]  Javaid, M.A. (2014) Electronic Voting System Security. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2393158
[27]  Zhong, F., Chen, Z., Xu, M., Zhang, G., Yu, D. and Cheng, X. (2023) Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification. IEEE Transactions on Computers, 72, 438-451. https://doi.org/10.1109/tc.2022.3160357
[28]  Mallik, A. (2019) Man-in-the-Middle-Attack: Understanding in Simple Words. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2, 109-134. https://doi.org/10.22373/cj.v2i2.3453
[29]  Reshmi, T.R. (2021) Information Security Breaches Due to Ransomware Attacks—A Systematic Literature Re-view. International Journal of Information Management Data Insights, 1, Article ID: 100013. https://doi.org/10.1016/j.jjimei.2021.100013
[30]  Rodriguez-Perez, A. (2021) Five Common Attacks Against Online Voting. https://medium.com/edge-electi ons/five-common-attacks-against-online-voting-599036eb3e80
[31]  Yaqoob, I., Ahmed, E., Rehman, M.H.U., Ahmed, A.I.A., Al-garadi, M.A., Imran, M., et al. (2017) The Rise of Ransomware and Emerging Security Challenges in the Internet of Things. Computer Networks, 129, 444-458. https://doi.org/10.1016/j.comnet.2017.09.003
[32]  Krombholz, K., Hobel, H., Huber, M. and Weippl, E. (2015) Advanced Social Engineering At-tacks. Journal of Information Security and Applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005
[33]  Halderman, J.A. (2019) Practical Attacks on Real-World E-Voting. University of Michigan. In: Hao, F. and Ryan, P.Y.A., (Eds.), Real-World Electronic Voting: Design, Analysis and De-ployment, Auerbach Publications, 143-170.
[34]  Nyasvisvo, B. and Chigada, J. (2023) Phishing Attacks: A security Challenge for University Students Studying Remotely. The African Journal of Information Systems, 15, 1-27.
[35]  Ben Ayed, A. (2017) A Conceptual Secure Blockchain Based Electronic Voting Sys-tem. International Journal of Network Security & Its Applications, 9, 1-9. https://doi.org/10.5121/ijnsa.2017.9301
[36]  Panja, S. and Roy, B. (2021) A Secure End-to-End Verifiable E-Voting System Using Blockchain and Cloud Server. Journal of Information Security and Applications, 59, Article ID: 102815. https://doi.org/10.1016/j.jisa.2021.102815
[37]  Bryman, A. (2016) Social Research Methods. 5th Edition, Oxford University Press. https://ktpu.kpi.ua/wp-content/uploads/2014/02/social-research-methods-alan-bryman.pdf
[38]  Creswell, J.W. and Creswell, J.D. (2018) Mixed Methods Procedures. In: Creswell, J.W., Ed., Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, SAGE Publications, Inc., 418.
[39]  Babbie, E. (2010). The Practice of Social Research. 12th Edition, Wadsworth.
[40]  Gill, S.L. (2020) Qualitative Sampling Methods. Journal of Human Lactation, 36, 579-581. https://doi.org/10.1177/0890334420949218
[41]  Yin, R.K. (2009) Case Study Research: Design and Methods (Fourth, vol. 5). SAGE Ltd. https://books.google.co.za/books?id=FzawIAdilHkC&printsec=frontco ver&dq=yin case study 4th edition&hl=en&sa=X&redir_esc=y#v=onepage& ;q=yin%20%20case%20study%204th%20edition&f=false
[42]  Arthur, P.B. (2018) Caregiving in Alzheimer’s Disease: Research Designs & Considerations. Advances in Alzheimer’s Disease, 7, 36-49. https://doi.org/10.4236/aad.2018.72003
[43]  Sutton, J. and Austin, Z. (2015) Qualitative Research: Data Collection, Analysis, and Management. The Canadian Journal of Hospital Pharmacy, 68, 226-231. https://doi.org/10.4212/cjhp.v68i3.1456
[44]  Dandapani, A., Hartigan, B. and Kennedy, J. (2021) Fingerprint Protected Voting Machine. https://courses.grainger.illinois.edu/ece445/getfile.asp?id=18903

Full-Text


Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133