摘要(英) |
With the advent of the digital era and an increasingly more mature network environment, the services that require physical presence in the past have gradually been replaced by services on the Internet. Among them, government services have gradually turned to E-services, but the communication voting has been delayed. There are very few academic studies in the related topics, and the studies mainly focus only on technology development There still lack a comprehensive planning for the voting process and recommendations for implementation.
The purposes of this study are to propose how to introduce the communication voting process in a phased and strategic manner and how to improve the confidence of voters, and then perform a cost-benefit analysis from the political, economic, social, and technical aspects. The results of the study should provide some guidelines for future legislation or amendments in promoting communication voting.
|
參考文獻 |
<中文文獻>
1.中央選舉委員會(2018),「107年地方公職人員選舉及全國性公民投票投開票所工作人員講習」。
2.王淳(2008),「NCKU電子投票系統之安全性分析」,成功大學工學院工程管理專班碩士論文。
3.丘昌泰(2004),「從各國電子投票經驗看我國選務的改革方向」,研考雙月刊;28卷4期,頁 25 – 35
4.付小青、阮鸥(2005),「基于PKI的安全电子投票方案」,信息安全与通信保密,頁 57 - 58
5.李品涵(2014),「使用NFC應用於電子投票之探討」,義守大學資訊工程研究所碩士論文。
6.杜宏毅、宋倬榮,「區塊鏈之書」。
7.孫偉哲(2011),「可證明安全之隨機化盲簽章機制與應用」,國立中山大學資訊工程學系博士論文。
8.張成銘(2008),「可驗證選舉結果之電子投票機制研究」,真理大學管理科學研究所碩士論文。
9.郭建邦(2011),「適用於我國電子投票之機制設計與研究」,國立成功大學電機工程學系碩士論文。
10.陳俊名(2013),「基於模糊簽章之可多選電子投票系統」,長庚大學電機工程所碩士班學位論文。
11.陳淵順(2011),「基於模糊簽章之電子投票系統」,國立政治大學資訊科學系碩士論文。
12.陳智揚(2001),「電子投票機制之實務研究」,世新大學資訊管理學系。
13.黃俊傑(2015),「適用於網路電子投票之安全機制設計—以軍人不在籍投票為例」,國防大學管理學院資訊管理學系碩士班碩士論文。
14.葉昱宗(2015),「新型態之電子投票機制」,國防大學管理學院資訊管理學系碩士班碩士論文。
15.詹中原、王俊元、許耿銘 (2005),「數位民主與電子投票:台灣實踐過程之初探」,中國行政評論, 頁 53 - 75.
16.盧耀辰、陳君豪(2007),「小規模試用E-voting Tool 逢甲大學資訊工程學系專題研究報告。
17.蕭人和(2017),「利用智能合約實現分散式電子投票與電子投標系統」,國立政治大學資訊科學系碩士論文。
18.賴溪松(2010),「電子投票機制與系統之規劃設計與實現」,行政院國家科學委員會專題研究計畫。
<英文文獻>
1.Hjálmarsson, Friðrik Þ. And Hreiðarsson, Gunnlaugur K. “Block chain-Based E-Voting System”, School of Computer Science Reykjavik University, Iceland
2.Ibrahim, Subariah And Kamat, Maznah And Salleh, Mazleena And Aziz, Shah Rizan Abdul “Secure E-Voting With Blind Signature”, Faculty Of Computer Science & Information Technology University Technology Of Malaysia
3.Kshetri, Nir And Voas, Jeffrey (2018),“Block chain-Enabled E-Voting”
4.Al-Rawy, Mahmoud And Elçi, Attila (2018), “A Design for Block chain-Based Digital Voting System”,
5.Liu, Yi And Wang, Qi “ An E-voting Protocol Based on Block chain”, Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China Andrychowicz, M. et al, (2014) “Secure multiparty computations on Bitcoin”, Security and Privacy (SP), IEEE Symposium on. IEEE.
6.Electronic Voting Committee (2016), “General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia”
7.Everett, Sarah P. And Greene, Kristen K. And Byrne, Michael D. And Wallach, Dan S. And Derr, Kyle And Sandler, Daniel And Torous, Ted(2008), “Electronic Voting Machines versus Traditional Methods: Improved Preference, Similar Performance,” Department of Psychology Department of Computer Science Rice University 6100 Main St. Houston, TX 77005 USA
8.Barnes, Andrew And Brake, Christopher And Perry, Thomas “Digital Voting with the use of Block chain Technology,” Team Plymouth Pioneers-Plymouth University.
9.O′Meara, Mark (2013), “Survey & Analysis of E-Voting Solutions,” Master in Computer Science Trinity College Dublin.
10.Johnson, N. And Jones, BM. And Clendenon, K. (2017) “e-Voting in America: Current Realities and Future Directions, ” International Conference on Social Computing and Social Media. Springer, Cham,
11.Tang, C. (2010) “Verifiable oblivious transfer protocol, ” Journal of Guangzhou University (Natural Science Edition)
12.Yap, Reuben (2018). “Learning from the Web,”
13.Mohammad Malkawi And Mohammed Khasawneh And Omar Al-Jarrah.(2009). Modeling and Simulation of a Robust e-Voting System. Communications of the IBIMA, P198 - 206.
14.Kalaichelvi Visvalingam、R. M. Chandrasekaran. (2011). “Secured Electronic Voting Protocol Using Biometric Authentication”, Advances in Internet of Things. P38 - 50
|