Peculiarities of cyber security management in the process of internet voting implementation
Tadas Limba (),
Konstantin Agafonov (),
Linas Paukštė (),
Martynas Damkus () and
Tomas Plėta ()
Additional contact information
Tadas Limba: Mykolas Romeris University, Lithuania
Konstantin Agafonov: Mykolas Romeris University, Lithuania
Linas Paukštė: Cognit consult JSC, Lithuania
Martynas Damkus: Mykolas Romeris University, Lithuania
Tomas Plėta: NATO Energy security center of excellence, Lithuania
Entrepreneurship and Sustainability Issues, 2017, vol. 5, issue 2, 368-402
Abstract:
The modern world could not be imagined without the information and communications technology. Today‘s society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world‘s Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident‘s direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.
Keywords: internet voting; e-voting; cyber security; cyber security management; cyber security model (search for similar items in EconPapers)
JEL-codes: D72 D80 H83 (search for similar items in EconPapers)
Date: 2017
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)
Downloads: (external link)
https://jssidoi.org/jesi/uploads/articles/18/Limba ... g_implementation.pdf (application/pdf)
https://jssidoi.org/jesi/article/156 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ssi:jouesi:v:5:y:2017:i:2:p:368-402
DOI: 10.9770/jesi.2017.5.2(15)
Access Statistics for this article
Entrepreneurship and Sustainability Issues is currently edited by Manuela Tvaronaviciene
More articles in Entrepreneurship and Sustainability Issues from VsI Entrepreneurship and Sustainability Center
Bibliographic data for series maintained by Manuela Tvaronaviciene ().