Role of computer technology on 2018 midterm election
Open assertion
The applying of computer technology within the electoral course of has elicited each curiosity and concern among the many citizens, and professionals the world over. At the moment, a majority of the electoral physique managements across the globe make the most of computer applied sciences with the aim of enhancing the electoral course of (Bernhard et al. 34). The identical could be mentioned concerning the only in the near past concluded 2018 midterm elections. The elections revolved round computer technology starting from the use digital ballot books, geographic info techniques, election administration techniques, spreadsheets, and different software program and hardware to serve the citizens and the directors of the election. This paper seeks to discover the position of computer technology on 2018 midterm elections by describing the software program and the hardware used, the safety dangers related to the technology, and the moral and social implications.
Software program
Software program was primarily utilized to function the voting techniques within the midterm elections that occurred just a few weeks in the past. Notably, the software program was primarily proprietary that means that it was marketed underneath and guarded by a commerce title that’s registered. The software program which was put in within the voting techniques ran on an working system known as a business off-the-shelf OS, which can be proprietary (White 78). Folks tasked with the obligation of overseeing the operations of an election normally take quite a few components into consideration when shopping for voting techniques. As an example, jurisdictions usually enter into software program licensing and upkeep contracts with the suppliers. The provider maintains and provides software program help for the system of election. Within the simply concluded elections, business distributors who had been contracted to supply software program to facilitate e-voting additionally equipped the digital poll definitions that made it attainable for the voting tools to print, scan, and set up the election-specific ballots for voters (White 81). The elections additionally noticed some voters utilizing purposes put in of their telephones/laptops to vote for his or her favourite candidates. Sick folks and those that skilled difficulties travelling to their respective voting stations discovered voting by means of the apps to be extra handy.
The applying of software program within the numerous election processes has led to the rise of a motion by a number of election directors. The directors argue that software program supplied by personal firms prevents transparency within the election course of because it restricts public inspection. As such, they suggest the event or the adoption of licensed software program that’s owned by the general public and is obtainable in supply code kind, offering room for the supply code to be assessed, adjusted and disbursed with out restriction (Carr et al. 57).

The 2018 midterm elections made use of hardware as nicely. As such, it utilized the use of digital voting technology. As an example, direct recording digital voting machines had been utilized in numerous states throughout the nation. This machine works by recording votes utilizing poll show supplied with mechanical components that the voter can activate (utilizing buttons or the display screen). Optical scan voting machines had been utilized as nicely, and so they served the aim of counting paper ballots (White 56). Telephones and computer systems had been utilized to transmit ballots. Public community DRE voting techniques had been additionally used. They primarily utilized the utilization of digital ballots and broadcasted votes from one polling station to a different over a public community. The use of digital pollbooks (e-pollbook) was rampant throughout this election interval. The hardware helped the election officers to guage in addition to preserve the knowledge of voters.
Safety threats
Elections that apply the use of computer technology are normally vulnerable to cyberattacks; this additionally utilized to the midterm elections. There was at all times that threat of the contents of the voter registration database being modified. Assaults geared toward altering voter registration knowledge could possibly be utilized to instigate phony or unlawful voters, to take away official voters from the voter registration database (de Bruijn, and Marijn three). Even when the registration database was sensibly guarded, the use of on-line portals posed substantial cybersecurity threats; the portals which supplied the voters with the chance to revise their registration info supplied an entry level for knowledge alteration.
The use of computer technology within the midterm elections additionally uncovered the entire course of to an assault known as the Denial-of-service (DoS). This kind of assault disrupts or drags entry to computer techniques, interrupting voter tallying, or election audits being carried out by election officers (de Bruijn, and Marijn four). DoS assaults typically trigger loss of confidence in all the integrity of the election. Malware encompassing viruses, Trojan horses and spyware and adware had been maybe the largest safety risk to the simply concluded elections. Because the elections utilized the use of digital voting, there was at all times that threat of malware being launched at any juncture within the vote’s digital path. The malware additionally had the potential of interrupting e-pollbooks, interrupting right tallying by altering digital ballots, and making software program to rely bodily or digital ballots incorrectly. Sadly, malware can’t be detected simply, and due to this fact, it may simply be launched into the electoral system with out anybody detecting it leading to devastating penalties for all the election (Sehgal et al. 260). Since half of the citizens voted on on-line platforms, the election techniques had been extremely uncovered to safety threats. As such, the phone and the web networks had been vastly vulnerable to assaults by hackers.
Moral and social implications
Use of computer technology serves to affect belief within the election in a method or one other as evidenced within the mid-term elections. Belief is crucial for election techniques. Other than financial conditions, most conditions for digital voting frameworks are associated to belief. They’re presupposed to be protected (exact; solely legitimate voters participate, and vote solely as soon as; guarded in opposition to errors and fraud), guard voter privateness and be verifiable (a course of characterised by transparency, and votes could be recounted). Standard voting that’s primarily based on use of poll papers in polling stations normally meets these necessities, i.e., it permits transparency, and majority of the residents help it (Hollyer, Peter, and James 18).
Quite the opposite, utilizing computer technology akin to digital voting techniques erodes transparency for the consumer, because the phases concerned in info processing can’t be noticed. With these technology primarily based techniques, the boldness of the citizens on the elections relies on the belief they’ve within the election organizers and within the specialists of the technology options as an alternative on a process that’s clear. The boldness of the general public in the way in which during which poll counting is carried out is major to the authenticity of the electoral course of. Once more, e-voting doesn’t encourage a lot confidence and this may be attributed to the safety threats that mar the method. Furthermore, public confidence within the voting course of relies on the flexibility of the method to take care of secrecy. Digital and on-line voting doesn’t assure that secrecy (anonymity) can be maintained. It’s because there may be at all times that risk that voter databases can be attacked and the privateness of voter info breached (Hollyer, Peter, and James 18). As such, belief and confidence within the course of is eroded.
Just lately, there have been quite a bit of issues relating to the reliability of technology-based electoral processes because of the many reported incidences of electoral techniques being attacked by hackers. Due to this fact, the hackers are believed to tamper with the techniques to favor of their most popular candidates. For that reason, it’s not stunning that many US residents had been fearful that the 2018 midterm elections can be hacked; there have been at all times debates geared toward predicting if the elections can be focused by cyberattackers. In mild of these issues, technology-based elections ought to make investments extra assets in stopping safety breaches; doing so will serve to ensure belief among the many citizens, ultimately making it profitable.
Conclusion
Clearly, computer technology has revolutionized the way in which elections are carried out in the USA and different components of the world. This technology has supplied many avenues by means of which the citizens can train their democratic proper; this was evidenced by the 2018 midterm elections that occurred on sixth November. Some voters utilized Smartphone purposes to decide on their favourite candidates whereas others voted on-line. Despite the fact that these advances in technology are outstanding, they current numerous challenges to the election techniques. The voter registration databases are normally focused by hackers, and as such, the privateness of the voter info is breached. Cyberattacks additionally are inclined to affect election outcomes. These assaults, due to this fact, erode public belief and confidence in all the electoral course of.

References
Bernhard, Matthew, et al. “Public Proof from Secret Ballots.” Worldwide Joint Convention
on Digital Voting. Springer, Cham, 2017.
Carr III, LeRoy, Anthony Newtson, and James Joshi. “In the direction of Modernizing the Future of
American Voting.” 2018 IEEE 4th Worldwide Convention on Collaboration and Web Computing (CIC). IEEE, 2018.
de Bruijn, Hans, and Marijn Janssen. “Constructing cybersecurity consciousness: The necessity for evidence-
primarily based framing methods.” Authorities Info Quarterly 34.1 (2017): 1-7.
Hollyer, James R., B. Peter Rosendorff, and James Raymond Vreeland. “Transparency, protest
and democratic stability.” British Journal of Political Science (2018): 1-27.
Sehgal, Vivek Kumar, et al. “Good human safety framework utilizing web of issues, cloud
and fog computing.” Clever distributed computing. Springer, Cham, 2015. 251-263.
White, Jay D. Managing info within the public sector. Routledge, 2015.

Published by
Essays
View all posts