EconPapers    
Economics at your fingertips  
 

Peculiarities of cyber security management in the process of internet voting implementation

Tadas Limba, Konstantin Agafonov, Linas Paukštė, Martynas Damkus and Tomas Plėta
Additional contact information
Tadas Limba: Mykolas Romeris University
Konstantin Agafonov: Mykolas Romeris University
Linas Paukštė: Cognit consult JSC
Martynas Damkus: Mykolas Romeris University
Tomas Plėta: NATO Energy Security Center of Excellence

Post-Print from HAL

Abstract: The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.

Keywords: e-voting; cyber security; internet voting; cyber security model; cyber security management (search for similar items in EconPapers)
Date: 2017-12-29
New Economics Papers: this item is included in nep-cdm, nep-cis, nep-ict, nep-law, nep-pay and nep-pol
Note: View the original document on HAL open archive server: https://hal.science/hal-01706905
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)

Published in Entrepreneurship and Sustainability Issues, 2017, 5 (2), pp.368 - 402. ⟨10.9770/jesi.2017.5.2(15)⟩

Downloads: (external link)
https://hal.science/hal-01706905/document (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-01706905

DOI: 10.9770/jesi.2017.5.2(15)

Access Statistics for this paper

More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().

 
Page updated 2025-03-19
Handle: RePEc:hal:journl:hal-01706905