{"id":5308,"date":"2017-07-06T13:34:09","date_gmt":"2017-07-06T11:34:09","guid":{"rendered":"https:\/\/www.polyas.de\/blog\/?p=5308"},"modified":"2017-07-07T11:38:25","modified_gmt":"2017-07-07T09:38:25","slug":"online-election-security","status":"publish","type":"post","link":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security","title":{"rendered":"Online Election Security and Election Interference"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">The controversy surrounding alleged Russian interference in the recent US presidential election has brought security in elections to the fore. In previous blogs on the topic, we\u2019ve looked at some of the theory and practice of foreign intervention in elections. This week we turn our attention to online election security in our fourth and final post in this series. <\/span><!--more--><\/p>\n<p class=\"p1\"><span class=\"s1\">So far in this series, <a href=\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/foreign-intervention\" target=\"_blank\">we\u2019ve seen<\/a> some of the tactics foreign election interveners have used to favor certain\u00a0candidates. Such tactics seek to influence electorates\u2019 opinion of certain candidates in the hope that their voting behavior will be affected. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">But what about outright tampering with the election itself? As digitalization continues, online elections are becoming closer to becoming a reality. At the moment we trust the technology which allows online\u00a0banking, shopping and even the extremely personal data for online dating! However, there still reservations about security in online elections.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Critics argue that, despite the manifold benefits that online voting brings &#8211; environmentally friendliness, quicker and cheaper to carry out, and increased voter turnout (to name just a few) &#8211; that the bedrock of democracies is too fragile to entrust to digital technology. Indeed, while the technology for some of the world&#8217;s largest elections is still under development, there have been incredible strides made already. Estonia, for example, has been voting online since 2005 and some of the world&#8217;s largest institutions are making the switch to online elections for their boards and supervisory councils.\u00a0<\/span><\/p>\n<h4 class=\"p1\">POLYAS and online election security<\/h4>\n<p class=\"p1\"><span class=\"s1\">POLYAS is working towards changing the perception of online election security. Working with thousands of clients across the globe have helped us to understand the complex needs of many institutions. Online voting has become a reality in many\u00a0organizations. Millions of people have cast their votes with POLYAS from corporations, associations, schools, churches and copyright institutions. Even political parties trust our software to deliver secure and reliable results for their internal elections.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">POLYAS\u2019 cutting edge technology simultaneously maintains the secrecy of the ballot and ensures that only authorized voters can participate in elections. By doing so, we deliver secure and legally valid elections for the growing number of organizations with whom we work. We are also continually investing in improving our services. When the political world catches up with the digital times &#8211; we\u2019ll be waiting!<\/span><\/p>\n<p class=\"p1\">Many will remain skeptical about the safety of online voting in political elections. Because of this, paper ballots will not be disappearing anytime soon. Trusted, older voting procedures will provide a constant to compare the trustworthiness of online voting. The nature of democracy is in our collective commitment to tackling any issues in a transparent manner for the benefit of the people.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.polyas.com\/security\" target=\"_blank\"><span class=\"s1\">Learn more about secure online elections with POLYAS now!<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The controversy surrounding alleged Russian interference in the recent US presidential election has brought security in elections to the fore. In previous blogs on the topic, we\u2019ve looked at some of the theory and practice of foreign intervention in elections. This week we turn our attention to online election security in our fourth and final [&hellip;]<\/p>\n","protected":false},"author":274,"featured_media":5312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ub_ctt_via":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[893],"tags":[75,1589,1591],"featured_image_src":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/07\/Polyas-Security.jpg","author_info":{"display_name":"Charles Harding","author_link":"https:\/\/www.polyas.de\/blog\/author\/c-harding"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Election Security and Tampering in Elections<\/title>\n<meta name=\"description\" content=\"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Election Security and Tampering in Elections\" \/>\n<meta property=\"og:description\" content=\"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-06T11:34:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-07T09:38:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/07\/Polyas-Security.jpg?fit=860%2C280&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Charles Harding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charles Harding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security\",\"url\":\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security\",\"name\":\"Online Election Security and Tampering in Elections\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\"},\"datePublished\":\"2017-07-06T11:34:09+00:00\",\"dateModified\":\"2017-07-07T09:38:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/3b9240fa164074e2fc773e7fcd238148\"},\"description\":\"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/blog\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Election Security and Election Interference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\",\"url\":\"https:\/\/www.polyas.de\/blog\/\",\"name\":\"POLYAS\",\"description\":\"the blog for secure online voting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/3b9240fa164074e2fc773e7fcd238148\",\"name\":\"Charles Harding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a9eee54a942871db9227087900a40d73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a9eee54a942871db9227087900a40d73?s=96&d=mm&r=g\",\"caption\":\"Charles Harding\"},\"sameAs\":[\"http:\/\/www.polyas.com\"],\"url\":\"https:\/\/www.polyas.de\/blog\/author\/c-harding\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Election Security and Tampering in Elections","description":"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security","og_locale":"de_DE","og_type":"article","og_title":"Online Election Security and Tampering in Elections","og_description":"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.","og_url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security","og_site_name":"POLYAS","article_published_time":"2017-07-06T11:34:09+00:00","article_modified_time":"2017-07-07T09:38:25+00:00","og_image":[{"width":860,"height":280,"url":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/07\/Polyas-Security.jpg?fit=860%2C280&ssl=1","type":"image\/jpeg"}],"author":"Charles Harding","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Charles Harding","Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security","url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security","name":"Online Election Security and Tampering in Elections","isPartOf":{"@id":"https:\/\/www.polyas.de\/blog\/#website"},"datePublished":"2017-07-06T11:34:09+00:00","dateModified":"2017-07-07T09:38:25+00:00","author":{"@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/3b9240fa164074e2fc773e7fcd238148"},"description":"Online election security is a hot topic in any debate about digital democracy. Here we run through the security aspects involved in online voting.","breadcrumb":{"@id":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/online-election-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/blog\/de"},{"@type":"ListItem","position":2,"name":"Online Election Security and Election Interference"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/blog\/#website","url":"https:\/\/www.polyas.de\/blog\/","name":"POLYAS","description":"the blog for secure online voting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/3b9240fa164074e2fc773e7fcd238148","name":"Charles Harding","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a9eee54a942871db9227087900a40d73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9eee54a942871db9227087900a40d73?s=96&d=mm&r=g","caption":"Charles Harding"},"sameAs":["http:\/\/www.polyas.com"],"url":"https:\/\/www.polyas.de\/blog\/author\/c-harding"}]}},"jetpack_featured_media_url":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/07\/Polyas-Security.jpg","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/p72Pnr-1nC","jetpack-related-posts":[{"id":5268,"url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/alleged-russian-interference-how-did-they-do-it","url_meta":{"origin":5308,"position":0},"title":"Alleged Russian Interference &#8211; How did they do it and did it work?","date":"29\/06\/2017","format":false,"excerpt":"Meddling in foreign elections is a major topic as investigations continue into potential Russian interference in the 2016 US election and collusion with the Trump campaign. In this edition of our blog series on foreign election interference, we look at the allegations made against Russia. In December 2016, outgoing President\u2026","rel":"","context":"In &quot;Electoral research&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5226,"url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/foreign-election-interference","url_meta":{"origin":5308,"position":1},"title":"Foreign Election Interference and International Law","date":"22\/06\/2017","format":false,"excerpt":"The allegations of Russian interference in the 2016 US elections have led to a series of investigations into potential collusion between the Trump campaign and Russian officials. In this installment of our blog series on foreign election interference, we examine the international law surrounding the issue. In the last installment\u2026","rel":"","context":"In &quot;Electoral research&quot;","img":{"alt_text":"Foreign Election Interference","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/06\/UNflag.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5101,"url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/foreign-intervention","url_meta":{"origin":5308,"position":2},"title":"Foreign Intervention in Elections &#8211; How does it work?","date":"06\/06\/2017","format":false,"excerpt":"Foreign intervention in democratic elections is a hot political topic in the US and the West in general. Allegations of collusion between Russia and the Trump campaign during the lead-up to the 2016 presidential election have overshadowed the start of 45th president\u2019s first term in office, leading to the appointment\u2026","rel":"","context":"In &quot;Electoral research&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9419,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/virtual-elections-in-parties-legal-basics","url_meta":{"origin":5308,"position":3},"title":"Virtual elections in parties: Legal basics","date":"07\/04\/2021","format":false,"excerpt":"Postal elections are experiencing a breakthrough. The pandemic means that growing numbers of people are in favor of postal voting. However, there is an alternative: Virtual elections such as digital membership polling in parties. In this blog post, we outline the legal situation with virtual elections and the opportunities that\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"Virtual elections in parties","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/07\/virtual-elections-in-parties.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5753,"url":"https:\/\/www.polyas.de\/blog\/en\/digital-trends\/digital-national-elections-soon","url_meta":{"origin":5308,"position":4},"title":"Why Digital National Elections are Only a Matter of Time","date":"04\/10\/2017","format":false,"excerpt":"Digital national elections and E-voting is the future despite recent negative press surrounding the German national elections. Read about how half measures are endangering democracy and the impact of online voting. Digital National Elections? Elections are traditionally the realm of pen and paper. Recently, however, the counting of ballot papers\u2026","rel":"","context":"In &quot;Digital Trends&quot;","img":{"alt_text":"Online Election Security","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/07\/Polyas-Security.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5072,"url":"https:\/\/www.polyas.de\/blog\/en\/increasing-voter-turnout\/online-voting-political-elections","url_meta":{"origin":5308,"position":5},"title":"Voter Participation: Online Voting in Political Elections","date":"31\/05\/2017","format":false,"excerpt":"Voter participation and political engagement make up the lifeblood of our democracies. A general lack of participation can call into question the very legitimacy of our leaders and the decisions they make. Throughout this blog series on voter participation, we've looked at lowering the voting age, mandatory voting, as well\u2026","rel":"","context":"In &quot;Voter-turnout&quot;","img":{"alt_text":"Online Voting Political Elections","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/05\/Voting-Age.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/5308"}],"collection":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/users\/274"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/comments?post=5308"}],"version-history":[{"count":5,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/5308\/revisions"}],"predecessor-version":[{"id":5322,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/5308\/revisions\/5322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media\/5312"}],"wp:attachment":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media?parent=5308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/categories?post=5308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/tags?post=5308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}