Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Go to shop › Computer Science - IT-Security

Analyzing Online Voting Systems for Flaw Detection

Title: Analyzing Online Voting Systems for Flaw Detection

Research Paper (postgraduate) , 2015 , 16 Pages , Grade: A

Autor:in: Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)

Computer Science - IT-Security

Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This research paper contains several case studies concerning online voting manipulation. Case studies data are analyzed to discover how computer technology is used to manipulate voting in Social Media.

The study found that there are many potential weaknesses that should be treated as highly hazardous for online voting. We believe that, if these weaknesses can be resolved then online voting will be more trustworthy as well widely acceptable.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Introduction
  • Background Study
  • Case Studies
    • Case 1: Photo Contest in Facebook
    • Case 2: Voting through Tweets on Twitter using Hashtag
    • Case 3: YouTube Video Contest
    • Case 4: Product Review in E-Commerce Sites
    • Case 5: Google Form's Poll Manipulation
  • Findings
  • Possible Characteristics of Futuristic Voting System

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This research paper analyzes the manipulation of online voting contests held on social media platforms like Facebook, Twitter, and YouTube. It examines case studies to identify vulnerabilities and potential weaknesses in existing systems.

  • The security and integrity of online voting systems
  • The use of social media platforms for online contests
  • Methods of vote manipulation, including fake accounts and bots
  • The need for more robust and secure online voting systems
  • The potential for online voting systems to be used in national elections

Zusammenfassung der Kapitel (Chapter Summaries)

  • Introduction: This chapter introduces the topic of online voting contests and highlights the concerns regarding the security and fairness of these systems. The paper argues that online voting systems need to be more secure to ensure accurate results and widespread acceptance.
  • Background Study: This chapter provides a general overview of online contests, social media features such as "Like" and "Hashtag", and the concept of fake accounts and internet bots.
  • Case Studies: This section presents five case studies that demonstrate how online voting can be manipulated. Each case study focuses on a different social media platform and type of online contest.

Schlüsselwörter (Keywords)

This research paper focuses on the security and integrity of online voting systems, particularly in the context of social media platforms. Key concepts explored include online voting contests, online election systems, social media manipulation, case studies, and vote manipulation.

Excerpt out of 16 pages  - scroll top

Details

Title
Analyzing Online Voting Systems for Flaw Detection
Grade
A
Authors
Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)
Publication Year
2015
Pages
16
Catalog Number
V307331
ISBN (eBook)
9783668057203
ISBN (Book)
9783668057210
Language
English
Tags
online voting voting manipulation onlineabstimmung wahlmanipulation wahlfälschung
Product Safety
GRIN Publishing GmbH
Quote paper
Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author), 2015, Analyzing Online Voting Systems for Flaw Detection, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/307331
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  16  pages
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Payment & Shipping
  • About us
  • Contact
  • Privacy
  • Terms
  • Imprint