Abstract
The paper outlines the use of Internet-based services which support the citizen’s participation in democratic decision making. This may concern electronic voting as well as electronic petitions and initiatives.
-
Existing or proposed system variants were analyzed in regards to their adherence to democratic principles. The findings show that hardly any of them were able to fulfil the standards required in regards to democratic voting procedures.
-
The paper proposes an alternative system for electronic voting via the Internet and discusses its implementation.
-
Electronic voting as well as electronic initiatives create new opportunities for the participation of the individual in political decision making due to considerable decreases in transaction costs.
Similar content being viewed by others
Literatur
Beutelspacher, Albrecht; Schwenk, Jörg; Wolfenstetter, Klaus-Dieter: Moderne Verfahren der Kryptographie. 4. Aufl., Vieweg-Verlag, Wiesbaden 2001.
Chaum, David: Blind Signatures for Untraceable Payments. In: Chaum, David; Rivest, Ron L.; Sherman, Alan T. (Hrsg.): Advances in Cryptology, Proceedings of Crypto 82. S. 199–203.
Chaum, David: Blinding for Unanticipated Signatures. In: Chaum, David; Price, Wyn L. (Hrsg.: Advances in Cryptology, EUROCRYPT ’87. Springer-Verlag, Berlin 1987, S. 227–233.
CNN: Election 2000. http://www.cnn.com/2000/ALLPOLITICS/storys/11/21/president.election/index.html, Abruf am 2001-11-20.
Cranor, Lorrie F.; Cytron, Ron K.: Sen-sus: A Security-Conscious Electronic Polling System for the Internet. In: Proceedings of the Hawai International Conference on System Sciences (HICSS-97). Hawai 1997. http://lorrie.cranor.org/pubs/hicss/hicss.html, Abruf am 2001-02-04.
Eichberger, Jürgen: Game Theory for Economists. Academic Press, San Diego 1993.
Gemeinde Fellbach.: Jugendgemeinderat Fellbach. http://www.fellbach.de/wahlen, Abruf am 2001-11-20.
Fiat, Amos; Shamir, Adi.: How to prove yourself: Practical Solutions to identifications and signature problems. In: Odlyzko, Andrew M. (Hrsg.): Advances in Cryptology — CRYPTO ’86, Lecture Notes in Computer Science. Springer-Verlag, Berlin 1987, S. 186–194.
Feghhi, Jalal; Feghhi, Jalil; Williams, Peter: Digital Certificates — Applied Internet Security. Addison-Wesley, Reading 1999.
Fish, Eric A.; White, Gregory B.: Secure Computers and Networks — Analysis, Design and Implementation. CRC Press, Boca Raton 2000.
Fujioka, Atsushi; Okamoto, Tatsuaki; Ohta, Kazuo: A Practical Secret Voting Scheme for Large Scale Elections. In: Advances in Cryp-tology — AUSCRYPT92. Springer-Verlag, Berlin 1993, S. 244–251.
Hansen, Hans R., Neumann, Gustaf: Wirtschaftsinformatik I. 8. Aufl., UTB, Lucius & Lucius, Stuttgart 2001.
Holler, Manfred J.; Illing, Gerhard: Ein-fü hrung in die Spieltheorie. 3. Aufl. Springer, Berlin 1996.
Internet Policy Institute: Report on the National Workshop on Internet Voting, Issues and Research Agenda. The Internet Policy Institute, Washington (DC), 2001. http://www.internetpolicy.org/research/e_voting_re-port.pdf, Abruf am 2001-11-20.
Jarass, Hans D.; Pieroth, Bodo: Grundgesetz für die Bundesrepublik Deutschland — Kommentar. 5. Aufl., Verlag Beck, München 2000.
Malone, Thomas W.; Yates, JoAnn; Benjamin, Robert I.: Electronic Markets and Electronic Hierarchies. In: Communications of the ACM 30 (1987) 6, S. 484–497.
Nurmi, Hanno; Salomaa, Arto; Santean, Lila: Secret ballot elections in computer networks. In: Computers and Security 36 (1991) 10, S. 553–560.
Newman, Ron: Computerized Voting — No Standards and a Lot of Questions. Risk Digest 2 (1986) 42. http://catless.ncl.ac.uk/Risks/2.42.html#subj4, Abruf am 2000-11-29.
Philippsen, Michael: Internetwahlen — Demokratische Wahlen über das Internet? In: Informatik Spektrum 25 (2002) 2, S. 138–150.
Prosser, Alexander; Müller-Török, Robert: Electronic Voting via The Internet. In: 3rd International Conference on Enterprise Information Systems ICEIS-2001. Setubal 2001, S. 1061–1066.
Prosser, Alexander; Nickl, Alexander: The Impact of EDI on Interorganizational Integration. In: International Journal of Production Economics 52 (1997) 3, S. 269–281.
Salomaa, Arto: Verifying and Recasting Secret Ballots in Computer Networks. In: Maurer, Hermann A. (Hrsg.): New Results and New Trends in Computer Science. Springer-Verlag, Berlin 1991, S. 283–289.
Soundcode VoteHere Inc.; Compaq Computer Corp.; Cisco Systems Inc.; Entrust Inc.: VoteHere Platinum. Bellevue (WA) 2001. http://www.soundcode.com/votehereplatinum.html, Abruf am 2001-07-20.
Soundcode VoteHere Inc.; Compaq Computer Corp.; Cisco Systems Inc.; Entrust Inc.: VoteHere Gold. Soundcode Inc., Bellevue (WA) 2001. http://www.soundcode.com/voteheregold.html, Abruf am 2001-07-20.
Schnorr, Claus-Peter: Efficient signature generation by smart cards. Journal of Cryptology 4 (1991), S. 161–174.
Tilborg van, Henk C.A.: Fundamentals of Cryptology. Kluwers Academic Publishers, Boston 2000.
Compaq Computer Corp.; Hewlett-Packard Company; Intel Corp.; Lucent Technologies Inc.; Microsoft Corp.; NEC Corp.; Koninklijke Philips Electronics N.V.: Universal Serial Bus Specification Revision 2.0, Released 27.4.2000. http://www.usb.org/developers/data/usb_20.-zip, Abruf am 2002-02-01.
Walter, Robert; Meyer, Heinz: Grundriß des österreichischen Bundesverfassungsrechts. 9. Aufl., Manz Verlag, Wien 2000.
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Prosser, A., Müller-Török, R. E-Democracy: Eine neue Qualität im demokratischen Entscheidungsprozess. Wirtschaftsinf 44, 545–556 (2002). https://doi.org/10.1007/BF03250873
Issue Date:
DOI: https://doi.org/10.1007/BF03250873