Date | May 2019 | Marks available | 8 | Reference code | 19M.1.SL.TZ0.3 |
Level | SL | Paper | 1 | Time zone | no time zone |
Command term | Evaluate | Question number | 3 | Adapted from | N/A |
Question
Electronic voting (e-voting)
E-voting is a form of voting that uses a computer instead of a printed ballot paper. Voters go to a polling station and cast their vote using an electronic voting machine (EVM), such as the one shown in Figure 3.
Voters must be authenticated by the system before casting their vote. The votes are then stored in an encrypted form in a relational database.
The graphical user interface (GUI) of the EVM can be adjusted for different voters. For example, the font size can be increased for voters who have limited vision.
Figure 3: Example of an electronic voting machine (EVM)
[Source: cmannphoto/iStock]
E-voting is already used for local elections in the towns and cities of several countries, such as Belgium, Canada and Estonia. Countries such as Finland are now considering whether to use e-voting for the whole population in their national elections.
In addition to adaptable font size, identify two features of the e-voting graphical user interface (GUI) that could be customized to make it accessible for all voters.
Identify two features of authentication.
Identify two features of encryption.
Elections using e-voting in countries such as Finland will create significant amounts of personal data. The government of Finland will have to ensure it has appropriate policies for the collection, storage and sharing of the data.
Explain why it is important to have an appropriate policy for the collection, storage and sharing of the data from elections that use e-voting.
Evaluate the advantages and disadvantages of e-voting.
Markscheme
Answers may include:
- Colour scheme, especially contrast in colour (e.g., white text on black background or dark-blue text on pastel background)
- Text to speech / audio instructions
- Voice commands
- Screen magnification (e.g., being able to magnify part of the screen)
- Language options for people who are voting and require an alternative language.
Award [1] for identifying each aspect of the GUI that could be customized, up to a maximum of [2].
Answers may include:
- Authentication is about verifying the identity of the user: it intends to prove that you are the person you claim to be.
- Authentication can be done by using a range of methods, such as username/password/PIN/biometric feature.
- Authentication is preceded by identification: identification is about giving one’s identity, but authentication goes further – it provides more evidence to confirm this.
- Authentication is usually followed by authorization: once your identity is confirmed, you then have access to some actions.
- Information provided by the user is compared with information stored in a user database.
Award [1] for identifying each feature of authentication up to a maximum of [2].
Answers may include:
- Encryption is the process of coding a message so that only authorized parties can decode it and read it.
- Encryption is made possible by an encryption algorithm (cipher) generating cipher text that needs to be decrypted (using a key) before it can be read.
- The two main types of encryption are “symmetric” (the encryption and decryption keys are the same) and “public/private key” (only the receiver has the decryption key).
Award [1] for identifying each feature of encryption up to a maximum of [2].
Answers may include:
Collection of data
- Policy – data must be collected anonymously.
- Explanation – so that nobody should be able to find out what someone voted.
- Policy – the voter’s ID must be accurately recorded.
- Explanation – so nobody can vote more than once.
Award [1] for identifying an appropriate policy for the collection of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
Storage of data
- Policy – data must be stored for x number of years.
- Explanation – in case of a need one day to check the data or do research on it.
- Policy – data must be stored securely (i.e., encrypted, database server in a secure location, etc.).
- Explanation – the data could be accessed illegally and altered.
- Policy – data must be backed up.
- Explanation – loss of data during the election would have serious consequences for the electoral process.
Award [1] for identifying an appropriate policy for the storage of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
Sharing of data
- Policy – the data should not be shared with the private sector, and only to organizations in the public sector, for the purpose of research.
- Explanation – so that there is no commercial value to the data, which may be perceived as being an unethical use of data.
- Policy – shared data must not be linked to a voter’s ID.
- Explanation – this could violate the voter’s privacy.
Award [1] for identifying an appropriate policy for the sharing of the data and [1] for an explanation for why it is appropriate up to a maximum of [2].
Mark as [2] + [2] + [2].
Answers may include:
Advantages of e-voting
- Some voters may like to interact with such technology, which may result in more people voting, especially younger people.
- Some voters may like the fact that the graphical user interface (GUI) can be adjusted for easier reading, unlike printed ballot papers.
- Voting may take less time than with a paper ballot.
- Counting votes may be faster and more reliable, as it is done electronically, without the risk of human error when counting thousands of ballot papers.
- The system of identification and authentication could reduce the risk of fraud, making the system more transparent.
- The government will be able to (automatically) analyse voting outcomes (e.g., demographics of how votes were cast).
Disadvantages of e-voting
- Some voters may not trust that their vote will be anonymized and remain confidential.
- Some voters may not know how to use the e-voting system and need to be trained / the system is not intuitive.
- Some people may believe that the system is rigged and that the EVMs have been dishonestly programmed (trust).
- It may be costly/expensive and difficult to put in place, if all polling stations must be equipped with EVMs.
- If there is any electronic glitch, the system will lose credibility, and the results will be less reliable.
- The system may be open to hacking/not secure, or open to hacking / unethical behaviour.
- Should the system not perform as expected, who is accountable?
In part (c) of this question it is expected there will be a balance between the terminology related to digital systems and the terminology related to social and ethical impacts.
Keywords: voting, reliability, transparency, accountability, trust, automation, intuitive, identification, authentication, security, cost, change, expression, power, systems, values
Refer to SL/HL paper 1, part c markbands when awarding marks. These can be found under the "Your tests" tab > supplemental materials > Digital society markbands and guidance document.