home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page665.pag < prev    next >
Portable Network Graphic  |  2008-10-03  |  140KB  |  817x1045  |  8-bit (256 colors)
Labels: book | comic book | daily | flower | hakham | person | potted plant
OCR: INFORMATION SYSTEMS ANALYSIS AND DESIGN 5 9 7 prevent votes from reaching tabulating center, alter and are checked against voter registration records votes or stuff electronic ballot boxes with thousands Registered voters are allowed to proceed to voting of fraudulent votes The report went on to say that booths where their votes are cast in secret. Nothing "Such attacks occur on alarge scale, and could allows that vote to be traced back to the individual be launched by anyone including disaffected lone who voted individuals to well- -financed enemy agents outside E-voting advocates note however, that traditional the reach of U.S law These attacks result r voting practices are also vulnerable to exploits such vote large franch -scale hisement, selective to privacy the voter of and violation ...