Cyber-securing our elections
Amy E. Pope
Journal of Cyber Policy, 2018, vol. 3, issue 1, 24-38
Abstract:
The 2016 U.S. Presidential election highlighted the cybersecurity threat of hostile state interference in democratic processes. A large body of evidence has emerged demonstrating how Russian operatives hacked the Democratic National Convention and leaked sensitive documents to undermine voter trust; spread disinformation and propaganda to polarise and divide American citizens; and suppressed voters with targeted advertisements and paid trolls. But hostile interference is a global threat and there are lessons to be learned from the U.S. election that could enable faster and more effective responses by governments around the world. This paper describes three preventative measures: the development of norms around influence operations – at a minimum, between like-minded states; internal government restructuring for improved real-time decision-making; and innovative mechanisms for public-private cooperation through trusted intermediaries. While there is no straightforward solution to protecting democratic processes, governments can begin taking steps to secure future elections from influence operations.
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/23738871.2018.1473887 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:rcybxx:v:3:y:2018:i:1:p:24-38
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/rcyb20
DOI: 10.1080/23738871.2018.1473887
Access Statistics for this article
Journal of Cyber Policy is currently edited by Emily Taylor
More articles in Journal of Cyber Policy from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().