Temptations of turnout and modernisation

Journal of Information, Communication and Ethics in Society 5 (4):276-292 (2007)
  Copy   BIBTEX

Abstract

PurposeThe aim of the research described was to identify reasons for differences between discourses on electronic voting in the UK and The Netherlands, from a qualitative point of view.Design/methodology/approachFrom both countries, eight e‐voting experts were interviewed on their expectations, risk estimations, cooperation and learning experiences. The design was based on the theory of strategic niche management. A qualitative analysis of the data was performed to refine the main variables and identify connections.FindingsThe results show that differences in these variables can partly explain the variations in the embedding of e‐voting in the two countries, from a qualitative point of view. Key differences include the goals of introducing e‐voting, concerns in relation to verifiability and authenticity, the role of the Electoral Commissions and a focus on learning versus a focus on phased introduction.Research limitations/implicationsThe current study was limited to two countries. More empirical data can reveal other relevant subvariables, and contribute to a framework that can improve our understanding of the challenges of electronic voting.Originality/valueThis study shows the context‐dependent character of discussions on information security. It can be informative for actors involved in e‐voting in the UK and The Netherlands, and other countries using or considering electronic voting.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Compulsory voting: a critical perspective.Annabelle Lever - 2010 - British Journal of Political Science 40:897-915.
On this page.A. Structural Model Of Turnout & In Voting - 2011 - Emergence: Complexity and Organization 9 (4).
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.

Analytics

Added to PP
2014-02-19

Downloads
13 (#1,013,785)

6 months
5 (#638,139)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.

Add more citations

References found in this work

No references found.

Add more references