Abstract

The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.

Highlights

  • 50 countries in the world allow their citizens to vote via the internet, but undoubtedly Estonia is the country that could be named as the leader in e-voting, being the first country to launch internet voting (Vegas, Barrat, 2017; Shahandasht, 2017)

  • Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems

  • It should be noted that the residents of Lithuania do not consider that it would negatively influence the transparency of the voting, and the statements of politicians and political parties, that citizens do not understand the security mechanisms used in the internet voting process and are not prepared for the introduction of this technology, are not well motivated

Read more

Summary

Introduction

50 countries (for example, Switzerland, the United States, Canada, Kazakhstan and others) in the world allow their citizens to vote via the internet, but undoubtedly Estonia is the country that could be named as the leader in e-voting, being the first country to launch internet voting (Vegas, Barrat, 2017; Shahandasht, 2017). Most states allow the usage of e-voting systems only in local (municipalities) elections, internet voting is available in all types of elections in Estonia since 2005. A successful cyber attack against a process as important to a country as elections, can be the reason for the election to be declared invalid, but can discredit the country and destroy its citizens’ trust in the state. This article will analyze the whole process of internet elections in the context of cyber security. The aim of this article is to investigate the properties of cyber security management, analyze the cyber security of certain e-voting systems and to present a model of cyber security management, which could be applied and used for internet voting

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call