Peculiarities of cyber security management in the process of internet voting implementation - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Entrepreneurship and Sustainability Issues Année : 2017

Peculiarities of cyber security management in the process of internet voting implementation

Résumé

The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.
Fichier principal
Vignette du fichier
Limba_Peculiarities_of_cyber_security_management_in_the_process_of_internet_voting_implementation.pdf (1.34 Mo) Télécharger le fichier
Origine : Fichiers éditeurs autorisés sur une archive ouverte
Loading...

Dates et versions

hal-01706905 , version 1 (12-02-2018)

Identifiants

Citer

Tadas Limba, Konstantin Agafonov, Linas Paukštė, Martynas Damkus, Tomas Plėta. Peculiarities of cyber security management in the process of internet voting implementation. Entrepreneurship and Sustainability Issues, 2017, 5 (2), pp.368 - 402. ⟨10.9770/jesi.2017.5.2(15)⟩. ⟨hal-01706905⟩
222 Consultations
456 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More