IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-01706905.html
   My bibliography  Save this paper

Peculiarities of cyber security management in the process of internet voting implementation

Author

Listed:
  • Tadas Limba

    (Mykolas Romeris University)

  • Konstantin Agafonov

    (Mykolas Romeris University)

  • Linas Paukštė

    (Cognit consult JSC)

  • Martynas Damkus

    (Mykolas Romeris University)

  • Tomas Plėta

    (NATO Energy Security Center of Excellence)

Abstract

The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.

Suggested Citation

  • Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Post-Print hal-01706905, HAL.
  • Handle: RePEc:hal:journl:hal-01706905
    DOI: 10.9770/jesi.2017.5.2(15)
    Note: View the original document on HAL open archive server: https://hal.science/hal-01706905
    as

    Download full text from publisher

    File URL: https://hal.science/hal-01706905/document
    Download Restriction: no

    File URL: https://libkey.io/10.9770/jesi.2017.5.2(15)?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Tadas Limba & Tomas Plėta & Konstantin Agafonov & Martynas Damkus, 2017. "Cyber security management model for critical infrastructure," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 4(4), pages 559-573, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Rafail Prodani & Jozef Bushati & Aigars Andersons, 2019. "An assessment of impact of information and communication technology in enterprızes of Korça region," Insights into Regional Development, VsI Entrepreneurship and Sustainability Center, vol. 1(4), pages 334-342, December.
    2. Rafail Prodani & Jozef Bushati & Aigars Andersons, 2019. "An assessment of impact of information and communication technology in enterprızes of Korça region," Post-Print hal-02342717, HAL.
    3. Jurgita Raudeliūnienė & Vida Davidavičienė & Manuela Tvaronavičienė & Laimonas Jonuška, 2018. "Evaluation of Advertising Campaigns on Social Media Networks," Sustainability, MDPI, vol. 10(4), pages 1-14, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tomas Plėta & Manuela Tvaronavičienė & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Post-Print hal-02919624, HAL.
    2. Tomas PlÄ—ta & Manuela TvaronaviÄ ienÄ— & Manuela TvaronaviÄ ienÄ— & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Insights into Regional Development, VsI Entrepreneurship and Sustainability Center, vol. 2(2), pages 538-548, June.
    3. Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 5(2), pages 368-402, December.

    More about this item

    Keywords

    e-voting; cyber security; internet voting; cyber security model; cyber security management;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-01706905. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.