Style Guide for Voting System Documentation: Why User-Centered Documentation Matters to Voting Security
نویسندگان
چکیده
In this paper, we assert that usability and security for poll workers are intimately linked in enabling free, fair, and secure elections. By focusing on these important but often neglected users of voting systems in designing voting systems, unintended security problems can be avoided. The overall goal of our research was to create a framework for voting system manufacturers to meet the requirements of the Voluntary Voting System Guidelines (VVSG) for the usability of voting system documentation. As part of our research, we tested voting system documentation with poll workers, which revealed troubling usability issues that could create security problems. The voting system documentation style guidelines we developed are based on research-based best practices for creating usable documentation. Each guideline includes direction for voting system manufacturers on how to implement the guideline and how to evaluate if it has been met. 1 This document describes research in support of test methods and materials for the Election Assistance Commission's next iteration of the Voluntary Voting System Guidelines (VVSG). It does not represent a consensus view or recommendation from National Institute of Standards and Technology (NIST), nor does it represent any policy positions of NIST. Certain commercial entities, equipment, or material may be identified in the document to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that these entities, materials, or equipment are necessarily the best available for the purpose. 1 Challenges: Serving an important but neglected audience and preventing security breaches due to usability issues While much research on elections has concentrated on voters and the voting process – usually emphasizing security concerns – usability for poll workers is equally important. Yet, little research has addressed the connections between usability and security. This paper focuses on how improving the usability of documentation can help to eliminate unintended security problems. (Note that usable documentation can improve other aspects of voting system operation as well, but security is a key area that needs examining.) To support security in elections, usability for poll workers is critical. Poll workers are temporary election officials whose task is to ensure secure and private voting in voting places in the United States. Poll workers set up voting stations, make sure the equipment is operating properly, assist voters, shut down voting stations when the polls close, and secure voting data – while working extremely long hours on Election Day, after minimal training and for very little pay. Election Day effectively means “live” usability testing in most jurisdictions, and when a poll worker makes a mistake on Election Day, there is often no simple, quick way to recover. 1.1 Poll workers may mistakenly prevent voters from voting Along the way, poll workers often encounter problems with voting systems that delay or even prevent voters from voting or cause votes to go uncounted. For example, poll workers who are not well trained might prevent voters from voting when they cannot open the polls, issue incorrect ballots, or prevent use of voting machines for people who have disabilities [1, 2]. 1.2 Lack of usability for poll workers can lead to compromised security Poll workers may also break the chain of custody or otherwise compromise security if usability of voting systems is lacking. For example, exceptional situations that are difficult to train for and are probably not well covered in system documentation may lead to security
منابع مشابه
Integrity Vulnerabilities in the Diebold TSX Voting Terminal
This report presents certain integrity vulnerabilities in the Diebold AV-TSx Voting Terminal1. We present two attacks based on these vulnerabilities: one attack swaps the votes of two candidates and another erases the name of one candidate from the slate. These attacks do not require the modification of the operating system of the voting terminal (as it was the case in a number of previous atta...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملM-UML: an extension to UML for the modeling of mobile agent-based software systems
The Unified Modeling Language (UML) is a language for the specification, visualization, and documentation of object-oriented software systems [The Unified Modeling Language User Guide, 1998]. However, UML cannot describe in an explicit manner the mobility requirements needed for modeling mobile agent-based software systems. In this paper, we present M-UML, our proposed extension to UML covering...
متن کاملVoting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems
some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...
متن کاملVoting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems
some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...
متن کامل