Journal articles on the topic 'E-voting protocols'

To see the other types of publications on this topic, follow the link: E-voting protocols.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 43 journal articles for your research on the topic 'E-voting protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Müller-Török, Robert, Domenica Bagnato, and Alexander Prosser. "Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design." Masaryk University Journal of Law and Technology 14, no. 2 (September 23, 2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.

Full text
Abstract:
The Corona pandemic has created a push towards digitization in a number of fields, not least in the public sector including democratic processes. This of course includes an increased interest in e-voting via the Internet. The Council of Europe has a long-standing history of work in the field including two Recommendations – (2004)11 and (2017)5 – which have become the de facto yardstick against which every e-voting system is measured. Rec(2017)5 builds on a decade of experience with e-voting and particularly strengthens two concepts important in any electronic voting system: Voting secrecy and auditability/verifiability. This has distinct implications for the design of e-voting protocols. The aim of this paper is to analyse the impact on what arguably are the most popular voting protocol families, envelope and token protocols. How does the modified Recommendation impact on the viability of protocols and protocol design? The paper first presents the Council of Europe Recommendation and the technical issues it addresses. Then a model is introduced to assess a voting protocol against the Recommendation; a typical envelope and a token protocol are assessed in view of the model and finally the two assessments are compared including policy recommendations for a path to e-voting implementation.
APA, Harvard, Vancouver, ISO, and other styles
2

George, Vinodu, and M. P. Sebastian. "A Secure and Efficient Scheme for Remote Poll Station Voting." International Journal of Electronic Government Research 9, no. 4 (October 2013): 75–91. http://dx.doi.org/10.4018/ijegr.2013100105.

Full text
Abstract:
Electronic voting has found wider acceptance both in developed and developing countries in the recent past. The current research focuses mainly in the area of privacy and security aspects of e-voting. In spite of the good security and privacy features, the existing e-voting protocols remain useful only to small elections or just to support the conventional voting, mainly because of their high computational overhead. Naturally, e-voting is not in wide use, even in the developed countries. Thus, there is a need for e-voting protocols which are secure and practical, but with less complexity. This paper proposes an efficient protocol and framework for the practical implementation of the electronic election process. An analysis on the largest election process in the world shows that the proposed protocol has the potential to serve as an efficient polling system with increased voter turnout. This protocol can be adopted easily in the developed world too.
APA, Harvard, Vancouver, ISO, and other styles
3

AbdulRahim, Abdulwasiu Kailani, Olusegun Folorunso, and Sushil Sharma. "An Improved Dynavote E-Voting Protocol Implementation." International Journal of E-Adoption 3, no. 3 (July 2011): 44–61. http://dx.doi.org/10.4018/ijea.2011070104.

Full text
Abstract:
Electronic voting—the use of computers or computerized voting equipment to cast and tabulate and tally ballots in an election in a trustable manner—is a pillar of e-Government. The DynaVote voting protocol system proposed by Cetinkaya and Koc (2007) is assumed secure and practicable on a network. However, the DynaVote e-Voting protocol does not completely protect the voting counter against impersonated votes, especially when the pseudo-Vote identities are known by the wrong voter or compromised by authorities. To address this problem, a prototype called improved DynaVote e-Vote protocol was designed to protect the counter from anomalies associated with counting impersonated votes (multiple votes) in the same election. This was achieved by introducing biometric fingerprint and pseudo voter identities (PVID) encryption for each voter during voter registration via online or data mining of population data containing fingerprint biometrics. Furthermore, fingerprint reader and RSA public key cryptography is used in PVID to eliminate counting impersonated votes. The performance results showed that improved DynaVote e-Vote protocol is more reliable, eligible, and accurate, and protects voter privacy against other e-Vote protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Mateu, Víctor, Francesc Sebé, and Magda Valls. "Constructing credential-based E-voting systems from offline E-coin protocols." Journal of Network and Computer Applications 42 (June 2014): 39–44. http://dx.doi.org/10.1016/j.jnca.2014.03.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (April 2021): 1–33. http://dx.doi.org/10.1145/3450144.

Full text
Abstract:
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims that are never formalized and are at best justified only against specific attacks. To address this, we propose the first formal security definitions for quantum e-voting protocols. With these at hand, we systematize and evaluate the security of previously proposed quantum e-voting protocols; we examine the claims of these works concerning privacy, correctness, and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identify specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and references to the existing cryptographic literature.
APA, Harvard, Vancouver, ISO, and other styles
6

Berrima, Mouhebeddine, Narjes Ben Rajeb, and Véronique Cortier. "Deciding knowledge in security protocols under some e-voting theories." RAIRO - Theoretical Informatics and Applications 45, no. 3 (July 2011): 269–99. http://dx.doi.org/10.1051/ita/2011119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chica, Ricardo. "Weaknesses in Centralized and Decentralized Internet Voting Protocols." INNOVA Research Journal 3, no. 1 (February 2, 2018): 55–70. http://dx.doi.org/10.33890/innova.v3.n1.2018.338.

Full text
Abstract:
The present document analyzes the weaknesses of the protocols regarding internet voting systems, either centralized or decentralized one, as a technology used for many countries around the world that may significantly increase the numbers of electors, offers transparency, delivery of results and reduces the costs of the whole electoral process, allowing an auditable way either for the citizen and public entities. The use of Remote Electronic Voting Systems (REV), had been opening a new way for e-government services, giving the community other tools for electoral purposes, and at the same time had create a long list of securities challenges which have allowed the development of new I-voting systems, among communities that focus on the research of different ways to minimize the risks of this process.
APA, Harvard, Vancouver, ISO, and other styles
8

Potdukhe, Hitesh. "Exploratory Review: Decentralized Voting System Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1082–86. http://dx.doi.org/10.22214/ijraset.2021.38948.

Full text
Abstract:
Abstract: Electronic voting, often known as e-voting, has been utilized in various forms since the 1970s, with basic advantages over paper-based systems such as improved efficiency and lower error rates. However, achieving widespread acceptance of such systems remains a problem, particularly in terms of strengthening their resistance to possible failures. Blockchain is a modernday disruptive technology that promises to enhance the overall robustness of electronic voting systems. This article describes an effort to use blockchain's features, such as cryptographic underpinnings and transparency, to create an effective e-voting mechanism. The suggested method meets the basic requirements for electronic voting systems and provides end-to-end verifiability. The proposed e-voting method is described in depth, as well as its implementation on the Multichain platform. The article provides an in-depth analysis of the scheme, demonstrating its efficacy in achieving an end-to-end verifiable e-voting system. Electronic trust services are becoming an integral part of the information space. With the reliable implementation of basic services as an electronic signature and electronic authentication, it is possible to build more complex systems that rely on them, particularly the electronic voting system. In the paper, the new concept for developing a decentralized electronic voting system using blockchain technology is proposed. The two-level architecture provides a secure voting process without redundancy of existing (not based on blockchain) systems. The presented blockchain-based voting protocol ensures all requirements that are put forward to such types of protocols including voting transparency and anonymity. This project is aimed to design a decentralized e-voting system. The core idea is to combine the blockchain technology with secret sharing scheme and homomorphic encryption to realize the decentralized e-voting application without a trusted third party. It provides a public and transparent voting process while protecting the anonymity of voter’s identity, the privacy of data transmission and verifiability of ballots during the billing phase. Keywords: Blockchain, Multichain, authentication, decentralized, anonymity
APA, Harvard, Vancouver, ISO, and other styles
9

Mousavi, Hamed, Babak Ahmadi, and Saeed Rahimi. "A new approach to decrease the computational complexity of e-voting protocols." Transactions on Emerging Telecommunications Technologies 28, no. 7 (December 23, 2016): e3140. http://dx.doi.org/10.1002/ett.3140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agustina, Esti Rahmawati, Magdalena Christine, and Irma Fitriani. "Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 1 (January 16, 2019): 107. http://dx.doi.org/10.25126/jtiik.2019611303.

Full text
Abstract:
<p>Pemilihan Umum (pemilu) di Indonesia merupakan peristiwa yang sangat penting mengingat Indonesia merupakan negara yang menganut paham demokrasi. Metode yang digunakan dalam pemilihan umum di Indonesia adalah dengan menggunakan kertas suara yang ditandai yaitu dicentang atau dicoblos. Banyak kelemahan dan kecurangan yang terjadi dalam sistem konvensional ini. Misalnya pemilih ganda, data pemilih tidak valid, surat suara rusak dan lain sebagainya. Salah satu solusi untuk menyelesaikan permasalahan pada sistem pemilu konvensional adalah dengan menerapkan <em>electronic voting </em>(<em>e-voting</em>). Berbagai penelitian dan pengembangan dilakukan dalam rangka membangun sistem <em>e-voting </em>yang aman<em>.</em> Salah satunya adalah dengan mengimplementasikan teknik kriptografi. Salah satu protokol <em>e-voting</em> yang menerapkan teknik kriptografi adalah protokol <em>CryptO-0N2.</em> Pada perkembangannya, protokol ini telah dianalisis dengan menggunakan verifikasi formal berbasis pendekatan logika yaitu <em>BAN Logic</em>. Verifikasi formal terhadap suatu protokol dapat dijamin obyektivitasnya dengan menggunakan <em>tools </em>tertentu. Pada paper ini disajikan analisis protokol <em>CryptO-0N2</em> dengan menggunakan <em>Scyther Tool</em>. <em>Tool </em>ini memeriksa klaim <em>secrecy</em> dan <em>authentication</em> dari protokol <em>CryptO-0N2.</em> Hasil menunjukkan dari 17 klaim (<em>secrecy</em> dan <em>authentication</em>) terdapat 10 klaim sukses dan 7 klaim gagal.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Elections in Indonesia is a very important event considering Indonesia is a democratic country. The method of the general election in Indonesia is use a marked ballot that is ticked or punched. Many weaknesses and frauds occur in this conventional system. For example multiple voters, invalid voter data, broken ballots and so forth. One solution to solve the problems in conventional electoral systems is to apply electronic voting (e-voting). Various research and development carried out in order to build a secure e-voting system. One of them is by implementing cryptographic techniques. One of the e-voting protocols employing cryptographic techniques is the CryptO-0N2 protocol. In its development, this protocol has been analyzed by using formal logic-approach based on logical verification that is BAN Logic. Formal verification of a protocol can be guaranteed objectivity by using certain tools. In this paper we present CryptO-0N2 protocol analysis using Scyther Tool. This tool examines the secrecy and authentication claims of the CryptO-0N2 protocol. The result shows from 17 claims (secrecy and authentication) there are 10 successful claims and 7 claims are failed.</em></p><p><strong><br /></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
11

Nasrin Taj Neishabouri, Afsaneh Madani, and Atefeh Torkaman. "Providing Solution for Neff and Chaum Protocols in E-Voting Machines Based on Security Analysis." International Journal of Digital Content Technology and its Applications 7, no. 11 (July 31, 2013): 173–81. http://dx.doi.org/10.4156/jdcta.vol7.issue11.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Treiblmaier, Horst, Abderahman Rejeb, and Andreas Strebinger. "Blockchain as a Driver for Smart City Development: Application Fields and a Comprehensive Research Agenda." Smart Cities 3, no. 3 (August 7, 2020): 853–72. http://dx.doi.org/10.3390/smartcities3030044.

Full text
Abstract:
The term “Smart City” denotes a comprehensive concept to alleviate pending problems of modern urban areas which have developed into an important work field for practitioners and scholars alike. However, the question remains as to how cities can become “smart”. The application of information technology is generally considered a key driver in the “smartization” of cities. Detailed frameworks and procedures are therefore needed to guide, operationalize, and measure the implementation process as well as the impact of the respective technologies. In this paper, we discuss blockchain technology, a novel driver of technological transformation that comprises a multitude of underlying technologies and protocols, and its potential impact on smart cities. We specifically address the question of how blockchain technology may benefit the development of urban areas. Based on a comprehensive literature review, we present a framework and research propositions. We identify nine application fields of blockchain technology in the smartization of cities: (1) healthcare, (2) logistics and supply chains, (3) mobility, (4) energy, (5) administration and services, (6) e-voting, (7) factory, (8) home and (9) education. We discuss current developments in these fields, illustrate how they are affected by blockchain technology and derive propositions to guide future research endeavors.
APA, Harvard, Vancouver, ISO, and other styles
13

Al Anie, Hayam K., Mohammad A. Alia, and Adnan A. Hnaif. "E-Voting Protocol Based On Public-Key Cryptography." International Journal of Network Security & Its Applications 3, no. 4 (July 31, 2011): 87–98. http://dx.doi.org/10.5121/ijnsa.2011.3408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cortier, Véronique, and Cyrille Wiedling. "A formal analysis of the Norwegian E-voting protocol." Journal of Computer Security 25, no. 1 (March 16, 2017): 21–57. http://dx.doi.org/10.3233/jcs-15777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Baiardi, Fabrizio, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, and Anna Vaccarelli. "SEAS, a secure e-voting protocol: Design and implementation." Computers & Security 24, no. 8 (November 2005): 642–52. http://dx.doi.org/10.1016/j.cose.2005.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lu, Ning, Xin Xu, Chang Choi, Tianlong Fei, and Wenbo Shi. "BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness." Security and Communication Networks 2021 (December 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/9988646.

Full text
Abstract:
When building the large-scale distributed decision control system based on mobile terminal devices (MTDs), electronic voting (E-voting) is a necessary technique to settle the dispute among parties. Due to the inherent insecurity of Internet, it is difficult for E-voting to attain complete fairness and robustness. In this study, we argue that Bitcoin blockchain offers better options for a more practical E-voting. We first present a coin mixing-based E-voting system model, which can cut off the relationship between the voter’s real identity and its Bitcoin address to achieve strong anonymity. Moreover, we devise a secret sharing-based E-voting protocol, which can prevent voting number from being leaked ahead and further realize strong robustness. We establish the probable security theory to prove its security. In addition, we use the experimental evaluation to demonstrate its efficiency.
APA, Harvard, Vancouver, ISO, and other styles
17

Rane, Lokesh. "Secure Digital E-Voting System using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 164–67. http://dx.doi.org/10.22214/ijraset.2021.36283.

Full text
Abstract:
Technology has great positive impacts on numerous aspects of our social life. Designing a globally connected architecture enables simple access to a range of resources and services. Furthermore, technology rather just like the internet has been a fertile ground for innovation and creativity. The blockchain technology is presented as a game-changer for several existing and emerging technologies. With its immutability property and decentralized architecture, it's taking center stage in many services as an equalization factor to the current parity between consumers and big corporations/governments. one among the fields during which blockchain application is used is E-voting. The target of such a scheme would be to produce a decentralized architecture to run and support a voting scheme that's open, fair, and independently verifiable. this might propose a possible new e-voting protocol that utilizes the blockchain as a transparent box. The protocol helps to attain fundamental e-voting properties additionally as offer a degree of decentralization.
APA, Harvard, Vancouver, ISO, and other styles
18

Bhuvaneshwari, V. Selva, D. Angeline Rangithamani, and K. Aathi Vignesh. "E-Voting with Hybrid Encryption RSA Algorithm." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 225–31. http://dx.doi.org/10.5121/ijci.2021.100225.

Full text
Abstract:
E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device records all voting transactions to prevent voter frauds.The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes.The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number.
APA, Harvard, Vancouver, ISO, and other styles
19

Mccorry, Patrick, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "On Secure E-Voting over Blockchain." Digital Threats: Research and Practice 2, no. 4 (December 31, 2021): 1–13. http://dx.doi.org/10.1145/3461461.

Full text
Abstract:
This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum’s blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a “preventive” measure to stop retrospective changes on previously published records as opposed to a “detective” measure like the use of mirror websites. CCS Concepts: • Security and privacy ;
APA, Harvard, Vancouver, ISO, and other styles
20

Kuppuswamy, Prakash. "Implementation of e-Voting system using new blinding signature protocol." IOSR Journal of Computer Engineering 8, no. 4 (2013): 36–40. http://dx.doi.org/10.9790/0661-0843640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rodríguez-Henríquez, F., Daniel Ortiz-Arroyo, and Claudia García-Zamora. "Yet another improvement over the Mu–Varadharajan e-voting protocol." Computer Standards & Interfaces 29, no. 4 (May 2007): 471–80. http://dx.doi.org/10.1016/j.csi.2006.11.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pandit, Anil. "E-Voting For Large Scale Elections Using Simple Network Management Protocol." International Journal for Research in Applied Science and Engineering Technology V, no. X (October 30, 2017): 1941–48. http://dx.doi.org/10.22214/ijraset.2017.10283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gao, Shiyao, Dong Zheng, Rui Guo, Chunming Jing, and Chencheng Hu. "An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function." IEEE Access 7 (2019): 115304–16. http://dx.doi.org/10.1109/access.2019.2935895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Saqib, Malik Najmus, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif ur Rehman Malik, Naveed Ahmad, and Atta ur Rehman Khan. "Anonymous and formally verified dual signature based online e-voting protocol." Cluster Computing 22, S1 (February 24, 2018): 1703–16. http://dx.doi.org/10.1007/s10586-018-2162-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Alaiz-Moreton, Hector, Luis Panizo-Alonso, Ramón A. Fernandez-Diaz, and Javier Alfonso-Cendon. "Technical Audit of an Electronic Polling Station." International Journal of E-Services and Mobile Applications 3, no. 3 (July 2011): 16–30. http://dx.doi.org/10.4018/jesma.2011070102.

Full text
Abstract:
This paper shows the lack of standard procedures to audit e-voting systems and also describes a practical process of auditing an e-voting experience based on a Direct-recording Electronic system (D.R.E). This system has been tested in a real situation, in the city council of Coahuila, Mexico, in November 2008. During the auditing, several things were kept in mind, in particular those critical in complex contexts, as democratic election processes are. The auditing process is divided into three main complementary stages: analysis of voting protocol, analysis of polling station hardware elements, and analysis of the software involved. Each stage contains several items which have to be analyzed at low level with the aim to detect and resolve possible security problems.
APA, Harvard, Vancouver, ISO, and other styles
26

Valsamidis, Stavros, Sotirios Kontogiannis, Theodosios G. Theodosiou, and Ioannis Petasakis. "A Web e-voting system with a data analysis component." Journal of Systems and Information Technology 20, no. 1 (March 12, 2018): 33–53. http://dx.doi.org/10.1108/jsit-01-2017-0002.

Full text
Abstract:
Purpose Currently, electronic election is one of the most popular issues of e-democracy. This has led to the development of applications and several security mechanisms to address such necessity. The problem that arises is that such applications are created either on demand for a specific election process, or experimentally for scientific purposes. The purpose of this study is to present a new e-voting system, called VOTAN. The VOTAN system involves a combination of new features with basic advantages, the implementation as open source software, its modular organization covering the functional requirements of a typical electronic voting system (EVS) and the capability of data analysis of candidates and voters. Design/methodology/approach VOTAN stands for VOTes Analyzer. It is a secure application for the conduct of electronic elections through the internet based on its own security protocol. It also includes a data analysis component which analyzes the election results and investigates the factors that play a crucial role. The major advantages of the system are that it is an open source and includes a data analysis module that can distinguish important variables from the elections and help make predictions for the outcome based on the selected variables. It is a practical solution to the existing e-voting applications and is ideal for small communities such as organizations, universities and chambers. Findings Its main advantage, compared to similar e-voting systems, is the integration of the data analysis component. The analysis of the data produced from elections is considered a critical process to fully comprehend the outcome of the elections and its correlation to specific attributes/variables of the election process. The data analysis module is a unique feature of VOTAN. It facilitates the selection of the most important attributes that influence the outcome of elections and creates a mathematical model to predict the outcome of an election based on the selected attributes. The method used in the module is the LDA. Originality/value The originality of the paper derives from the data analysis component and its security protocol/schema that fulfils several requirements.
APA, Harvard, Vancouver, ISO, and other styles
27

Pospiech, Piotr, Aleksander Marianski, and Michal Kedziora. "Secure Blockchain Decentralized Voting for Verified Users." International Journal of Network Security & Its Applications 13, no. 5 (September 30, 2021): 17–26. http://dx.doi.org/10.5121/ijnsa.2021.13502.

Full text
Abstract:
The paper focuses onintroducing a decentralized e-voting scheme that uses blockchain to achieve security and anonymity. A blockchain network based on Ethereum was applied, to provide a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, smart contractswere used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. The proof-of-conceptimplementation uses the blind signature protocol and encryption with the RSA algorithm. Presented in this paper scheme for blockchain decentralized voting is fully implemented and potential issues are analyzed and discussed.
APA, Harvard, Vancouver, ISO, and other styles
28

Caldelli, Roberto, Rudy Becarelli, Francesco Filippini, Francesco Picchioni, and Riccardo Giorgetti. "Electronic Voting by Means of Digital Terrestrial Television The Infrastructure, Security Issues and a Real Test-bed." International Journal of E-Adoption 2, no. 1 (January 2010): 1–12. http://dx.doi.org/10.4018/jea.2010010101.

Full text
Abstract:
In this paper a Digital Terrestrial Television (DTT) based voting system is presented. This electronic voting technology allows disabled users to cast their vote from home by using common well-known devices. The needed equipment are a TV set, a Set Top Box (STB) with its remote control and a telephone line. The complete infrastructure consists of an MHP (Multimedia Home Platform) application that acts as a client application, a server application that acts as a network/counting server for e-voting, and a security protocol based on asymmetric key encryption to ensure authentication and secrecy of the vote. The MHP application is broadcasted by a certified (e.g., national) TV channel that grants its originality. The user needs a smart card issued by a national authority and to sign the encrypted ballot. The voter can browse the application by acting on the STB remote control. The server application is in charge to verify user identity, to gather and store user’s encrypted ballots and finally to count votes. The communication between the client application and the server takes place by means of a secured channel (using HTTPS) while the voting operations are secured with the help of asymmetric keys encryption.
APA, Harvard, Vancouver, ISO, and other styles
29

Guo, Xiao Qiang, Yan Yan, Hong Wang, and Yi Shuo Shi. "Study on Quantum Oblivious Transfer." Applied Mechanics and Materials 263-266 (December 2012): 3079–82. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3079.

Full text
Abstract:
The Oblivious Transfer (OT) is a typical foundation agreement of secure multi-party computations. It can be used to solve the “ Millionaire” interesting question raised by the winner of the Turing Award in 1982, Mr. Yao , thus to build more complex secure multi-party computation protocol or to solve practical problems,such as electronic voting, elections, e-commerce. Using of the quantum channel and the principles of the quantum mechanics , Quantum Oblivious Transfer (QOT) can be solve the classic oblivious transfer problems. QOT can be achieved higher security and higher efficiency than the Classic Oblivious Transfer, while it also has a unique advantage in found eavesdropping. We had given a very novel QOT scheme based on three-particle entangled states. Although the use more particles , the process is better concise.
APA, Harvard, Vancouver, ISO, and other styles
30

Ríos-Sánchez, Belén, David Costa-da-Silva, Natalia Martín-Yuste, and Carmen Sánchez-Ávila. "Deep Learning for Facial Recognition on Single Sample per Person Scenarios with Varied Capturing Conditions." Applied Sciences 9, no. 24 (December 13, 2019): 5474. http://dx.doi.org/10.3390/app9245474.

Full text
Abstract:
Single sample per person verification has received considerable attention because of its relevance in security, surveillance and border crossing applications. Nowadays, e-voting and bank of the future solutions also join this scenario, opening this field of research to mobile and low resources devices. These scenarios are characterised by the availability of a single image during the enrolment of the users into the system, so they require a solution able to extract knowledge from previous experiences and similar environments. In this study, two deep learning models for face recognition, which were specially designed for applications on mobile devices and resources saving environments, were described and evaluated together with two publicly available models. This evaluation aimed not only to provide a fair comparison between the models but also to measure to what extent a progressive reduction of the model size influences the obtained results.The models were assessed in terms of accuracy and size with the aim of providing a detailed evaluation which covers as many environmental conditions and application requirements as possible. To this end, a well-defined evaluation protocol and a great number of varied databases, public and private, were used.
APA, Harvard, Vancouver, ISO, and other styles
31

Andersen, Harald. "Nu bli’r der ballade." Kuml 50, no. 50 (August 1, 2001): 7–32. http://dx.doi.org/10.7146/kuml.v50i50.103098.

Full text
Abstract:
We’ll have trouble now!The Archaeological Society of Jutland was founded on Sunday, 11 March 1951. As with most projects with which P.V Glob was involved, this did not pass off without drama. Museum people and amateur archaeologists in large numbers appeared at the Museum of Natural History in Aarhus, which had placed rooms at our disposal. The notable dentist Holger Friis, the uncrowned king of Hjørring, was present, as was Dr Balslev from Aidt, Mr and Mrs Overgaard from Holstebro Museum, and the temperamental leader of Aalborg Historical Museum, Peter Riismøller, with a number of his disciples. The staff of the newly-founded Prehistoric Museum functioned as the hosts, except that one of them was missing: the instigator of the whole enterprise, Mr Glob. As the time for the meeting approached, a cold sweat broke out on the foreheads of the people present. Finally, just one minute before the meeting was to start, he arrived and mounted the platform. Everything then went as expected. An executive committee was elected after some discussion, laws were passed, and then suddenly Glob vanished again, only to materialise later in the museum, where he confided to us that his family, which included four children, had been enlarged by a daughter.That’s how the society was founded, and there is not much to add about this. However, a few words concerning the background of the society and its place in a larger context may be appropriate. A small piece of museum history is about to be unfolded.The story begins at the National Museum in the years immediately after World War II, at a time when the German occupation and its incidents were still terribly fresh in everyone’s memory. Therkel Mathiassen was managing what was then called the First Department, which covered the prehistoric periods.Although not sparkling with humour, he was a reliable and benevolent person. Number two in the order of precedence was Hans Christian Broholm, a more colourful personality – awesome as he walked down the corridors, with his massive proportions and a voice that sounded like thunder when nothing seemed to be going his way, as quite often seemed to be the case. Glob, a relatively new museum keeper, was also quite loud at times – his hot-blooded artist’s nature manifested itself in peculiar ways, but his straight forward appearance made him popular with both the older and the younger generations. His somewhat younger colleague C.J. Becker was a scholar to his fingertips, and he sometimes acted as a welcome counterbalance to Glob. At the bottom of the hierarchy was the student group, to which I belonged. The older students handled various tasks, including periodic excavations. This was paid work, and although the salary was by no means princely, it did keep us alive. Student grants were non-existent at the time. Four of us made up a team: Olfert Voss, Mogens Ørsnes, Georg Kunwald and myself. Like young people in general, we were highly discontented with the way our profession was being run by its ”ruling” members, and we were full of ideas for improvement, some of which have later been – or are being – introduced.At the top of our wish list was a central register, of which Voss was the strongest advocate. During the well over one hundred years that archaeology had existed as a professional discipline, the number of artefacts had grown to enormous amounts. The picture was even worse if the collections of the provincial museums were taken into consideration. We imagined how it all could be registered in a card index and categorised according to groups to facilitate access to references in any particular situation. Electronic data processing was still unheard of in those days, but since the introduction of computers, such a comprehensive record has become more feasible.We were also sceptical of the excavation techniques used at the time – they were basically adequate, but they badly needed tightening up. As I mentioned before, we were often working in the field, and not just doing minor jobs but also more important tasks, so we had every opportunity to try out our ideas. Kunwald was the driving force in this respect, working with details, using sections – then a novelty – and proceeding as he did with a thoroughness that even his fellow students found a bit exaggerated at times, although we agreed with his principles. Therkel Mathiassen moaned that we youngsters were too expensive, but he put up with our excesses and so must have found us somewhat valuable. Very valuable indeed to everyon e was Ejnar Dyggve’s excavation of the Jelling mounds in the early 1940s. From a Danish point of view, it was way ahead of its time.Therkel Mathiassen justly complained about the economic situation of the National Museum. Following the German occupation, the country was impoverished and very little money was available for archaeological research: the total sum available for the year 1949 was 20,000 DKK, which corresponded to the annual income of a wealthy man, and was of course absolutely inadequate. Of course our small debating society wanted this sum to be increased, and for once we didn’t leave it at the theoretical level.Voss was lucky enough to know a member of the Folketing (parliament), and a party leader at that. He was brought into the picture, and between us we came up with a plan. An article was written – ”Preserve your heritage” (a quotation from Johannes V. Jensen’s Denmark Song) – which was sent to the newspaper Information. It was published, and with a little help on our part the rest of the media, including radio, picked up the story.We informed our superiors only at the last minute, when everything was arranged. They were taken by surprise but played their parts well, as expected, and everything went according to plan. The result was a considerable increase in excavation funds the following year.It should be added that our reform plans included the conduct of exhibitions. We found the traditional way of presenting the artefacts lined up in rows and series dull and outdated. However, we were not able to experiment within this field.Our visions expressed the natural collision with the established ways that comes with every new generation – almost as a law of nature, but most strongly when the time is ripe. And this was just after the war, when communication with foreign colleagues, having been discontinued for some years, was slowly picking up again. The Archaeological Society of Jutland was also a part of all this, so let us turn to what Hans Christian Andersen somewhat provocatively calls the ”main country”.Until 1949, only the University of Copenhagen provided a degree in prehistoric archaeology. However, in this year, the University of Aarhus founded a chair of archaeology, mainly at the instigation of the Lord Mayor, Svend Unmack Larsen, who was very in terested in archaeology. Glob applied for the position and obtained it, which encompassed responsibility for the old Aarhus Museum or, as it was to be renamed, the Prehistoric Museum (now Moesgaard Museum).These were landmark events to Glob – and to me, as it turned out. We had been working together for a number of years on the excavation of Galgebakken (”Callows Hill”) near Slots Bjergby, Glob as the excavation leader, and I as his assistant. He now offered me the job of museum curator at his new institution. This was somewhat surprising as I had not yet finished my education. The idea was that I was to finish my studies in remote Jutland – a plan that had to be given up rather quickly, though, for reasons which I will describe in the following. At the same time, Gunner Lange-Kornbak – also hand-picked from the National Museum – took up his office as a conservation officer.The three of us made up the permanent museum staff, quickly supplemented by Geoffrey Bibby, who turned out to be an invaluable colleague. He was English and had been stationed in the Faeroe Islands during the war, where he learned to speak Danish. After 1945 he worked for some years for an oil company in the Gulf of Persia, but after marrying Vibeke, he settled in her home town of Aarhus. As his academic background had involved prehistoric cultures he wanted to collaborate with the museum, which Glob readily permitted.This small initial flock governed by Glob was not permitted to indulge inidleness. Glob was a dynamic character, full of good and not so good ideas, but also possessing a good grasp of what was actually practicable. The boring but necessary daily work on the home front was not very interesting to him, so he willingly handed it over to others. He hardly noticed the lack of administrative machinery, a prerequisite for any scholarly museum. It was not easy to follow him on his flights of fancy and still build up the necessary support base. However, the fact that he in no way spared himself had an appeasing effect.Provincial museums at that time were of a mixed nature. A few had trained management, and the rest were run by interested locals. This was often excellently done, as in Esbjerg, where the master joiner Niels Thomsen and a staff of volunteers carried out excavations that were as good as professional investigations, and published them in well-written articles. Regrettably, there were also examples of the opposite. A museum curator in Jutland informed me that his predecessor had been an eager excavator but very rarely left any written documentation of his actions. The excavated items were left without labels in the museum store, often wrapped in newspapers. However, these gave a clue as to the time of unearthing, and with a bit of luck a look in the newspaper archive would then reveal where the excavation had taken place. Although somewhat exceptional, this is not the only such case.The Museum of Aarhus definitely belonged among the better ones in this respect. Founded in 1861, it was at first located at the then town hall, together with the local art collection. The rooms here soon became too cramped, and both collections were moved to a new building in the ”Mølleparken” park. There were skilful people here working as managers and assistants, such as Vilhelm Boye, who had received his archaeological training at the National Museum, and later the partners A. Reeh, a barrister, and G.V. Smith, a captain, who shared the honour of a number of skilfully performed excavations. Glob’s predecessor as curator was the librarian Ejler Haugsted, also a competent man of fine achievements. We did not, thus, take over a museum on its last legs. On the other hand, it did not meet the requirements of a modern scholarly museum. We were given the task of turning it into such a museum, as implied by the name change.The goal was to create a museum similar to the National Museum, but without the faults and shortcomings that that museum had developed over a period of time. In this respect our nightly conversations during our years in Copenhagen turned out to be useful, as our talk had focused on these imperfections and how to eradicate them.We now had the opportunity to put our theories into practice. We may not have succeeded in doing so, but two areas were essentially improved:The numerous independent numbering systems, which were familiar to us from the National Museum, were permeating archaeological excavation s not only in the field but also during later work at the museum. As far as possible this was boiled down to a single system, and a new type of report was born. (In this context, a ”report” is the paper following a field investigation, comprising drawings, photos etc. and describing the progress of the work and the observations made.) The instructions then followed by the National Museum staff regarding the conduct of excavations and report writing went back to a 19th-century protocol by the employee G.V. Blom. Although clear and rational – and a vast improvement at the time – this had become outdated. For instance, the excavation of a burial mound now involved not only the middle of the mound, containing the central grave and its surrounding artefacts, but the complete structure. A large number of details that no one had previously paid attention to thus had to be included in the report. It had become a comprehensive and time-consuming work to sum up the desultory notebook records in a clear and understandable description.The instructions resulting from the new approach determined a special records system that made it possible to transcribe the notebook almost directly into a report following the excavation. The transcription thus contained all the relevant information concerning the in vestigation, and included both relics and soil layers, the excavation method and practical matters, although in a random order. The report proper could then bereduced to a short account containing references to the numbers in the transcribed notebook, which gave more detailed information.As can be imagined, the work of reform was not a continuous process. On the contrary, it had to be done in our spare hours, which were few and far between with an employer like Glob. The assignments crowded in, and the large Jutland map that we had purchased was as studded with pins as a hedge hog’s spines. Each pin represented an inuninent survey, and many of these grew into small or large excavations. Glob himself had his lecture duties to perform, and although he by no means exaggerated his concern for the students, he rarely made it further than to the surveys. Bibby and I had to deal with the hard fieldwork. And the society, once it was established, did not make our lives any easier. Kuml demanded articles written at lightning speed. A perusal of my then diary has given me a vivid recollection of this hectic period, in which I had to make use of the evening and night hours, when the museum was quiet and I had a chance to collect my thoughts. Sometimes our faithful supporter, the Lord Mayor, popped in after an evening meeting. He was extremely interested in our problems, which were then solved according to our abilities over a cup of instant coffee.A large archaeological association already existed in Denmark. How ever, Glob found it necessary to establish another one which would be less oppressed by tradition. Det kongelige nordiske Oldsskriftselskab had been funded in 1825 and was still influenced by different peculiarities from back then. Membership was not open to everyone, as applications were subject to recommendation from two existing members and approval by a vote at one of the monthly lecture meetings. Most candidates were of course accepted, but unpopular persons were sometimes rejected. In addition, only men were admitted – women were banned – but after the war a proposal was brought forward to change this absurdity. It was rejected at first, so there was a considerable excitement at the January meeting in 1951, when the proposal was once again placed on the agenda. The poor lecturer (myself) did his best, although he was aware of the fact that just this once it was the present and not the past which was the focus of attention. The result of the voting was not very courteous as there were still many opponents, but the ladies were allowed in, even if they didn’t get the warmest welcome.In Glob’s society there were no such restrictions – everyone was welcome regardless of sex or age. If there was a model for the society, it was the younger and more progressive Norwegian Archaeological Society rather than the Danish one. The main purpose of both societies was to produce an annual publication, and from the start Glob’s Kuml had a closer resemblance to the Norwegian Viking than to the Danish Aarbøger for nordisk Oldkyndighed og Historie. The name of the publication caused careful consideration. For a long time I kept a slip of paper with different proposals, one of which was Kuml, which won after having been approved by the linguist Peter Skautrup.The name alone, however, was not enough, so now the task became to find so mething to fill Kuml with. To this end the finds came in handy, and as for those, Glob must have allied him self with the higher powers, since fortune smiled at him to a considerable extent. Just after entering upon his duties in Aarhus, an archaeological sensation landed at his feet. This happened in May 1950 when I was still living in the capital. A few of us had planned a trip to Aarhus, partly to look at the relics of th e past, and partly to visit our friend, the professor. He greeted us warmly and told us the exciting news that ten iron swords had been found during drainage work in the valley of lllerup Aadal north of the nearby town of Skanderborg. We took the news calmly as Glob rarely understated his affairs, but our scepticism was misplaced. When we visited the meadow the following day and carefully examined the dug-up soil, another sword appeared, as well as several spear and lance heads, and other iron artefacts. What the drainage trench diggers had found was nothing less than a place of sacrifice for war booty, like the four large finds from the 1800s. When I took up my post in Aarhus in September of that year I was granted responsibility for the lllerup excavation, which I worked on during the autumn and the following six summers. Some of my best memories are associated with this job – an interesting and happy time, with cheerful comradeship with a mixed bunch of helpers, who were mainly archaeology students. When we finished in 1956, it was not because the site had been fully investigated, but because the new owner of the bog plot had an aversion to archaeologists and their activities. Nineteen years later, in 1975, the work was resumed, this time under the leadership of Jørgen Ilkjær, and a large amount of weaponry was uncovered. The report from the find is presently being published.At short intervals, the year 1952 brought two finds of great importance: in Februar y the huge vessel from Braa near Horsens, and in April the Grauballe Man. The large Celtic bronze bowl with the bulls’ heads was found disassembled, buried in a hill and covered by a couple of large stones. Thanks to the finder, the farmer Søren Paaske, work was stopped early enough to leave areas untouched for the subsequent examination.The saga of the Grauballe Man, or the part of it that we know, began as a rumour on the 26th of April: a skeleton had been found in a bog near Silkeborg. On the following day, which happened to be a Sunday, Glob went off to have a look at the find. I had other business, but I arrived at the museum in the evening with an acquaintance. In my diary I wrote: ”When we came in we had a slight shock. On the floor was a peat block with a corpse – a proper, well-preserved bog body. Glob brought it. ”We’ll be in trouble now.” And so we were, and Glob was in high spirits. The find created a sensation, which was also thanks to the quick presentation that we mounted. I had purchased a tape recorder, which cost me a packet – not a small handy one like the ones you get nowadays, but a large monstrosity with a steel tape (it was, after all, early days for this device) – and assisted by several experts, we taped a number of short lectures for the benefit of the visitors. People flocked in; the queue meandered from the exhibition room, through the museum halls, and a long way down the street. It took a long wait to get there, but the visitors seemed to enjoy the experience. The bog man lay in his hastily – procured exhibition case, which people circled around while the talking machine repeatedly expressed its words of wisdom – unfortunately with quite a few interruptions as the tape broke and had to be assembled by hand. Luckily, the tape recorders now often used for exhibitions are more dependable than mine.When the waves had died down and the exhibition ended, the experts examined the bog man. He was x-rayed at several points, cut open, given a tooth inspection, even had his fingerprints taken. During the autopsy there was a small mishap, which we kept to ourselves. However, after almost fifty years I must be able to reveal it: Among the organs removed for investigation was the liver, which was supposedly suitable for a C-14 dating – which at the time was a new dating method, introduced to Denmark after the war. The liver was sent to the laboratory in Copenhagen, and from here we received a telephone call a few days later. What had been sent in for examination was not the liver, but the stomach. The unfortunate (and in all other respects highly competent) Aarhus doctor who had performed the dissection was cal1ed in again. During another visit to the bogman’s inner parts he brought out what he believed to be the real liver. None of us were capable of deciding th is question. It was sent to Copenhagen at great speed, and a while later the dating arrived: Roman Iron Age. This result was later revised as the dating method was improved. The Grauballe Man is now thought to have lived before the birth of Christ.The preservation of the Grauballe Man was to be conservation officer Kornbak’s masterpiece. There were no earlier cases available for reference, so he invented a new method, which was very successful. In the first volumes of Kuml, society members read about the exiting history of the bog body and of the glimpses of prehistoric sacrificial customs that this find gave. They also read about the Bahrain expeditions, which Glob initiated and which became the apple of his eye. Bibby played a central role in this, as it was he who – at an evening gathering at Glob’s and Harriet’s home in Risskov – described his stay on the Persian Gulf island and the numerous burial mounds there. Glob made a quick decision (one of his special abilities was to see possibilities that noone else did, and to carry them out successfully to everyone’s surprise) and in December 1952 he and Bibby left for the Gulf, unaware of the fact that they were thereby beginning a series of expeditions which would continue for decades. Again it was Glob’s special genius that was the decisive factor. He very quickly got on friendly terms with the rulers of the small sheikhdoms and interested them in their past. As everyone knows, oil is flowing plentifully in those parts. The rulers were thus financially powerful and some of this wealth was quickly diverted to the expeditions, which probably would not have survived for so long without this assistance. To those of us who took part in them from time to time, the Gulf expeditions were an unforgettable experience, not just because of the interesting work, but even more because of the contact with the local population, which gave us an insight into local manners and customs that helped to explain parts of our own country’s past which might otherwise be difficult to understand. For Glob and the rest of us did not just get close to the elite: in spite of language problems, our Arab workers became our good friends. Things livened up when we occasionally turned up in their palm huts.Still, co-operating with Glob was not always an easy task – the sparks sometimes flew. His talent of initiating things is of course undisputed, as are the lasting results. He was, however, most attractive when he was in luck. Attention normally focused on this magnificent person whose anecdotes were not taken too seriously, but if something went wrong or failed to work out, he could be grossly unreasonable and a little too willing to abdicate responsibility, even when it was in fact his. This might lead to violent arguments, but peace was always restored. In 1954, another museum curator was attached to the museum: Poul Kjærum, who was immediately given the important task of investigating the dolmen settlement near Tustrup on Northern Djursland. This gave important results, such as the discovery of a cult house, which was a new and hitherto unknown Stone Age feature.A task which had long been on our mind s was finally carried out in 1955: constructing a new display of the museum collections. The old exhibitio n type consisted of numerous artefacts lined up in cases, accompaied ony by a brief note of the place where it was found and the type – which was the standard then. This type of exhibition did not give much idea of life in prehistoric times.We wanted to allow the finds to speak for themselves via the way that they were arranged, and with the aid of models, photos and drawings. We couldn’t do without texts, but these could be short, as people would understand more by just looking at the exhibits. Glob was in the Gulf at the time, so Kjærum and I performed the task with little money but with competent practical help from conservator Kornbak. We shared the work, but in fairness I must add that my part, which included the new lllerup find, was more suitable for an untraditional display. In order to illustrate the confusion of the sacrificial site, the numerous bent swords and other weapons were scattered a.long the back wall of the exhibition hall, above a bog land scape painted by Emil Gregersen. A peat column with inlaid slides illustrated the gradual change from prehistoric lake to bog, while a free-standing exhibition case held a horse’s skeleton with a broken skull, accompanied by sacrificial offerings. A model of the Nydam boat with all its oars sticking out hung from the ceiling, as did the fine copy of the Gundestrup vessel, as the Braa vessel had not yet been preserved. The rich pictorial decoration of the vessel’s inner plates was exhibited in its own case underneath. This was an exhibition form that differed considerably from all other Danish exhibitions of the time, and it quickly set a fashion. We awaited Glob’s homecoming with anticipation – if it wasn’t his exhibition it was still made in his spirit. We hoped that he would be surprised – and he was.The museum was thus taking shape. Its few employees included Jytte Ræbild, who held a key position as a secretary, and a growing number of archaeology students who took part in the work in various ways during these first years. Later, the number of employees grew to include the aforementioned excavation pioneer Georg Kunwald, and Hellmuth Andersen and Hans Jørgen Madsen, whose research into the past of Aarhus, and later into Danevirke is known to many, and also the ethnographer Klaus Ferdinand. And now Moesgaard appeared on the horizon. It was of course Glob’s idea to move everything to a manor near Aarhus – he had been fantasising about this from his first Aarhus days, and no one had raised any objections. Now there was a chance of fulfilling the dream, although the actual realisation was still a difficult task.During all this, the Jutland Archaeological Society thrived and attracted more members than expected. Local branches were founded in several towns, summer trips were arranged and a ”Worsaae Medal” was occasionally donated to persons who had deserved it from an archaeological perspective. Kuml came out regularly with contributions from museum people and the like-minded. The publication had a form that appealed to an inner circle of people interested in archaeology. This was the intention, and this is how it should be. But in my opinion this was not quite enough. We also needed a publication that would cater to a wider public and that followed the same basic ideas as the new exhibition.I imagined a booklet, which – without over-popularsing – would address not only the professional and amateur archaeologist but also anyone else interested in the past. The result was Skalk, which (being a branch of the society) published its fir t issue in the spring of 1957. It was a somewhat daring venture, as the financial base was weak and I had no knowledge of how to run a magazine. However, both finances and experience grew with the number of subscribers – and faster than expected, too. Skalk must have met an unsatisfied need, and this we exploited to the best of our ability with various cheap advertisements. The original idea was to deal only with prehistoric and medieval archaeology, but the historians also wanted to contribute, and not just the digging kind. They were given permission, and so the topic of the magazine ended up being Denmark’s past from the time of its first inhabitant s until the times remembered by the oldest of us – with the odd sideways leap to other subjects. It would be impossible to claim that Skalk was at the top of Glob’s wish list, but he liked it and supported the idea in every way. The keeper of national antiquities, Johannes Brøndsted, did the same, and no doubt his unreserved approval of the magazine contributed to its quick growth. Not all authors found it easy to give up technical language and express themselves in everyday Danish, but the new style was quickly accepted. Ofcourse the obligations of the magazine work were also sometimes annoying. One example from the diary: ”S. had promised to write an article, but it was overdue. We agreed to a final deadline and when that was overdue I phoned again and was told that the author had gone to Switzerland. My hair turned grey overnight.” These things happened, but in this particular case there was a happy ending. Another academic promised me three pages about an excavation, but delivered ten. As it happened, I only shortened his production by a third.The 1960s brought great changes. After careful consideration, Glob left us to become the keeper of national antiquities. One important reason for his hesitation was of course Moesgaard, which he missed out on – the transfer was almost settled. This was a great loss to the Aarhus museum and perhaps to Glob, too, as life granted him much greater opportunities for development.” I am not the type to regret things,” he later stated, and hopefully this was true. And I had to choose between the museum and Skalk – the work with the magazine had become too timeconsuming for the two jobs to be combined. Skalk won, and I can truthfully say that I have never looked back. The magazine grew quickly, and happy years followed. My resignation from the museum also meant that Skalk was disengaged from the Jutland Archaeological Society, but a close connection remained with both the museum and the society.What has been described here all happened when the museum world was at the parting of the ways. It was a time of innovation, and it is my opinion that we at the Prehistoric Museum contributed to that change in various ways.The new Museum Act of 1958 gave impetus to the study of the past. The number of archaeology students in creased tremendously, and new techniques brought new possibilities that the discussion club of the 1940s had not even dreamt of, but which have helped to make some of the visions from back then come true. Public in terest in archaeology and history is still avid, although to my regret, the ahistorical 1960s and 1970s did put a damper on it.Glob is greatly missed; not many of his kind are born nowadays. He had, so to say, great virtues and great fault s, but could we have done without either? It is due to him that we have the Jutland Archaeological Society, which has no w existed for half a century. Congr tulat ion s to the Society, from your offspring Skalk.Harald AndersenSkalk MagazineTranslated by Annette Lerche Trolle
APA, Harvard, Vancouver, ISO, and other styles
32

"Secure Online E-voting Protocol Based on Voters Authentication." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 3268–70. http://dx.doi.org/10.35940/ijitee.a4653.119119.

Full text
Abstract:
Although there are many e-voting systems present by analysis it is found that they all are vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to implement the public key encryption e-voting system. The primary objective of this system is to make ensure reliability, privacy and security of the protocol and voting is convenience to users. As a result of the specification requirements, the system was summarized into three parts: access control process which limit access to a system or to any other resource. Secondly, voting process was done by encrypting voter's electronic ballot before submitting to the server. Finally, the final result was sorted through deciphering the received encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is generated using the OTP principle, is used by the voter for authentication purpose while casting the vote. These techniques provide a secure platform, thus exceeding vulnerabilities of the traditional voting system.
APA, Harvard, Vancouver, ISO, and other styles
33

Maletić, Marija, Dušan Barać, Vuk Rakočević, Tamara Naumović, and Artur Bjelica. "Scaffolding e-voting in developing countries." Management:Journal of Sustainable Business and Management Solutions in Emerging Economies, March 19, 2019. http://dx.doi.org/10.7595/management.fon.2019.0006.

Full text
Abstract:
Research question: This paper discusses e-voting as an integral part of e-government in developing countries. E-voting enables automation of casting and counting votes. Motivation: The main goal was to investigate the readiness of both the public sector and citizens for switching from common “paper” voting method to electronic system-based voting. In order to improve democracy and trust in the election process (IDEA, 2011), the e-voting system should be reliable, accurate and secure (Mauw, Verschuren, & de Vink, 2007). The example that should be followed is the Estonian e-voting system (Drechsler, 2004). Idea: We proposed a comprehensive e-voting model that includes five components: e-voting services, IT infrastructure, participants’ registration, components integration and a system for counting and reporting. Security is the most important issue that should be overcome by using the cryptographic protocols. Reliability and availability of the e-voting system should not be neglected, and it should be able to save all verified casted votes. Data: In order to examine the readiness and awareness of e-voting potentials in a developing country, we conducted a survey that included 152 persons from three different groups: individuals, legal entities and e-government employees. Tools: In order to establish relationships among opinions of the three groups of respondents to the survey that was conducted, a comparative analysis was performed. For this purpose the questions were divided into four categories. Findings: As it was expected, the study results have showed that survey participants find security, lack of qualified staff and mistrust of the older generations towards new technologies as the crucial issues in developing and implementing the e-voting model. Based on the responses the cost reduction, ease of use and efficiency improvement are recognized as categories that could be realized by implementation of the e-voting system. Contribution: The results show the respondents’ opinion regarding the e-voting system introduction as a legitimate voting tool. It can reduce abuse, voting costs and manual errors.
APA, Harvard, Vancouver, ISO, and other styles
34

Kamil, Mustofa, Ankur Singh Bist, Untung Rahardja, Nuke Puji Lestari Santoso, and Muhammad Iqbal. "Covid-19: Implementation e-voting Blockchain Concept." International Journal of Artificial Intelligence Research 5, no. 1 (January 5, 2021). http://dx.doi.org/10.29099/ijair.v5i1.173.

Full text
Abstract:
The current situation of the Covid-19 pandemic is currently increasing public concern about the community. The government has especially recommended Stay at Home and the implementation of PSBB in various regions. One of the concerns is when the election of regional leaders to the general chairman. Even though there is already a safeguard regulation, this is not considered safe in the current Covid-19 pandemic. The solution in this research is the use of a blockchain-based E-voting system to help tackle election unrest during Covid-19. Where e-voting with blockchain technology can be carried out anywhere through the device without the need to be present in the voting booth, reducing data fraud, accurate and decentralized voting results that can be accessed by the public in real-time. The use of cryptographic protocols is applied for data transfer between system components as well as valid system security. This research method uses SUS trial analysis in a significant system of the Covid-19 pandemic situation. The implication that the SUS Score analysis shows 90 shows an acceptable E-voting system, meaning that the community can accept it because it brings positive and significant impacts such as effectiveness and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
35

Masyhur, Zulkarnaim, Firmansyah Ibrahim, and Asep Indra Syahyadi. "Secured and Auditable Cryptography for Electronic Voting." Jurnal INSYPRO (Information System and Processing) 5, no. 2 (November 30, 2020). http://dx.doi.org/10.24252/insypro.v5i2.17797.

Full text
Abstract:
Dengan adanya Electronic Voting (e-voting) diharapkan dapat menggantikan sistem pemungutan suara konvensional yang telah ada sebelumnya. Pada sistem e-voting ini menggunakan konsep Pret a Voter yang menggunakan skema paper ballot e-voting. Skema ini menggunakan Public Key Infrastructure (PKI). Skema yang diusulkan menggunakan paper ballot e-voting dengan pertimbangan telah popular di kalangan masyarakat, tetapi didukung oleh protokol enkripsi yang kuat untuk menjamin vote secrecy dan anonymity dari pemilih. Aspek verifiability dari suatu system e-voting juga merupakan hal fundamental. Sistem e-voting menggunakan system protocol mixnets dengan kompleksitas security cukup baik.
APA, Harvard, Vancouver, ISO, and other styles
36

Singh, Aniket. "Secure E-Voting System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, no. 04 (April 25, 2022). http://dx.doi.org/10.55041/ijsrem12320.

Full text
Abstract:
Secure E-Voting System is a python-based project. It is an efficient and financially savvy way of leading a democratic method, which has the characteristics of being large-scale data and real- time, as well as requiring a high level of security. Nonetheless, they are concerns about the security of systems administration and protection of correspondence for e-casting a ballot have been developed. Here, the client establishes a connection with the server, this implies that the TCP protocol is being used. For each new arriving Client, the Server should create a new thread to accomplish this feature we took care of concurrent thread, that is, when the number of connections is made with the server, that time each thread doesn’t interfere with one another. Therefore, we synchronized the threads. Securing e-casting a ballot is very urgent and has turned into a famous theme in correspondences and systems administration. This system puts a lot of trust in the central authority. It manages the security of information during the enrolment of the electors while surveying on the final voting day and then some and examining the votes to guarantee an impartial democratic climate. It additionally guarantees that the citizen is an enlisted and interesting elector who is qualified to cast a ballot and its polling form for casting a ballot is customized and gotten. The execution result shows that it is a practical and secure e-casting ballot framework, which takes care of the issue of falsification of votes during e-casting a ballot.
APA, Harvard, Vancouver, ISO, and other styles
37

Spadafora, Chiara, Riccardo Longo, and Massimiliano Sala. "A coercion-resistant blockchain-based E-voting protocol with receipts." Advances in Mathematics of Communications, 2021, 0. http://dx.doi.org/10.3934/amc.2021005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Huilin, Yannan Li, Yong Yu, Baocang Wang, and Kefei Chen. "A Blockchain-based Traceable Self-tallying E-voting Protocol in AI Era." IEEE Transactions on Network Science and Engineering, 2020, 1. http://dx.doi.org/10.1109/tnse.2020.3011928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Prof. Shweta Wankhede, Ankita Poman, Diksha Navghane, Amruta Dhotre, and Priti Gogwale. "Decentralized Blockchain based Voting System." International Journal of Advanced Research in Science, Communication and Technology, April 15, 2022, 132–37. http://dx.doi.org/10.48175/ijarsct-3163.

Full text
Abstract:
The voting technique is the process for putting the people's opinion into action in order to better govern the system. However, the voting system in India, as well as in many other countries, has indeed been defective in recent years and may be easily manipulated and hampered by figures of authority for their own personal gain. They aren't fully secure because ballots are easy to tamper with. It also raises concerns about voter security and transparency. Furthermore, counting the votes takes an excessive amount of time. To address these issues, citizens in many nations use digital technology during the voting process. Digitalization would not be enough to solve every one of the problems. Digital technology can also be manipulated or altered in a number of ways. The foundation of our product is built on blockchain technology. This research work combines digitalization with blockchain technology to develop a voting mechanism by analyzing the aforementioned challenges. Our voting mechanism's key goals are to ensure voter integrity, anonymity, privacy, and security. The system can be used to highlight a number of popular block chain frameworks that provide blockchain as a service as well as an electronic E-voting system. Based on the results of this study, we propose a decentralized e voting protocol based on blockchain technology that removes a need for a trusted third party
APA, Harvard, Vancouver, ISO, and other styles
40

bindewari, Shantanu, and Jayesh Surana. "Design and Implementation a Smart E-Voting Model : Decentralization Using Blockchain." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 5, 2019, 109–14. http://dx.doi.org/10.32628/cseit1195424.

Full text
Abstract:
The transparency of the block-chain allows more auditing and considerate of elections. These attributes are particular of the necessities of a voting system. These features derive from decentralized network, and can bring additional democratic processes to elections, particularly to direct election systems. For e-voting to develop further open, transparent, and independently auditable, a possible resolution would be base it on blockchain technology. In this research work to proposed technique for voting system using blockchain. The blockchain will be publicly provable and distributed in a method that no one will be intelligent to corrupt it. In this research work proposed a blockchain-based model with Consensus Protocol and SHA256 hash algorithm related with the priorities of the ballot-privacy, veri?ability, suitability, extensiveness, uniqueness, sturdiness, and coercion- resistance.
APA, Harvard, Vancouver, ISO, and other styles
41

Verma, Sanjeev, and Ashutosh Sheel. "Blockchain for government organizations: past, present and future." Journal of Global Operations and Strategic Sourcing, January 21, 2022. http://dx.doi.org/10.1108/jgoss-08-2021-0063.

Full text
Abstract:
Purpose Blockchain is widely applied in e-voting, shared economy areas and other government functioning. Fragmented findings and distributed literature need consolidation for a holistic view of the research domain. The purpose of this study is to comprehensively reviews the blockchain applications for government organizations and presents the past, present and future trends of blockchain applications for government organizations. Design/methodology/approach Systematic review protocol instrumentalized the systematic review of research articles published from 2013 to 2021. Science mapping discerns scientific actors’ trends and performance analysis like most influential authors, documents and sources. Content analysis of selected data set unfolds the past, present and future of blockchain applications for government organizations. Findings Blockchain technology offers enormous potential for the transformation of government organizations and public services. The primary areas are cryptocurrency, e-voting, shared economy, smart contracts, financial and health services, tourism, logistics and water sustainability. Research limitations/implications This study reviewed only published research in journals and conference proceedings and excluded book reviews, book chapters and editorials from the review set. This study persuades governments and policymakers to invest in blockchain technology for transforming government organizations and public services. Practical implications This study highlights the importance of blockchain in government-controlled public departments, enhancing transparency and efficiency in public life. Social implications Blockchain technology enhances transparency, traceability and accountability of public records. Originality/value This study pioneers in chronologically highlighting the importance of blockchain in government-controlled public departments.
APA, Harvard, Vancouver, ISO, and other styles
42

Duncan, Pansy Kathleen. "The Uses of Hate: On Hate as a Political Category." M/C Journal 20, no. 1 (March 15, 2017). http://dx.doi.org/10.5204/mcj.1194.

Full text
Abstract:
I. First Brexit, then Trump: Has the past year or so ushered in a “wave” (Weisberg), a “barrage” (Desmond-Harris) or a “deluge” (Sidahmed) of that notoriously noxious affect, hate? It certainly feels that way to those of us identified with progressive social and political causes—those of us troubled, not just by Trump’s recent electoral victory, but by the far-right forces to which that victory has given voice. And yet the questions still hanging over efforts to quantify emotional or affective states leaves the claim that there has been a clear spike in hate moot (Ngai 26; Massumi 136-7; Ahmed, Promise 3-8). So let’s try asking a different question. Has this same period seen a rise, across liberal media platforms, in the rhetorical work of “hate-attribution”? Here, at least, an answer seems in readier reach. For no one given to scrolling distractedly through liberal Anglophone media outlets, from The New York Times, to The Guardian, to Slate, will be unfamiliar with a species of journalism that, in reporting the appalling activities associated with what has become known as the “alt-right” (Main; Wallace-Wells; Gourarie), articulates those activities in the rubric of a calculable uptick in hate itself.Before the U.S. Presidential election, this fledgling journalistic genre was already testing its wings, its first shudderings felt everywhere from Univision anchor Jorge Ramos’s widely publicized documentary, Hate Rising (2016), which explores the rise of white supremacist movements across the South-West U.S, to an edition of Slate’s Trumpcast entitled “The Alt-Right and a Deluge of Hate,” which broached the torment-by-Twitter of left-wing journalist David French. In the wake of the election, and the appalling acts of harassment and intimidation it seemed to authorize, the genre gained further momentum—leading to the New Yorker’s “Hate Is on the Rise After Trump’s Election,” to The Guardian’s “Trump’s Election led to Barrage of Hate,” and to Vox’s “The Wave of Post-Election Hate Reportedly Sweeping the Nation, Explained.” And it still has traction today, judging not just by James King’s recent year-in-review column, “The Year in Hate: From Donald Trump to the Rise of the Alt-Right,” but by Salon’s “A Short History of Hate” which tracks the alt-right’s meteoric 2016 rise to prominence, and the New York Times’ recently launched hate-speech aggregator, “This Week in Hate.”As should already be clear from these brisk, thumbnail accounts of the texts in question, the phenomena alluded to by the titular term “hate” are not instances of hate per se, but rather instances of “hate-speech.” The word “hate,” in other words, is being deployed here not literally, to refer to an emotional state, but metonymically, as a shorthand for “hate-speech”—a by-now widely conventionalized and legally codified parlance originating with the U.N. Declaration to describe “violent or violence-inciting speech or acts that “aim or intend to inflict injury, or incite prejudice or hatred, against persons of groups” because of their ethnic, religious, sexual or social affiliation. And there is no doubt that, beyond the headlines, these articles do incredibly important work, drawing connections between, and drawing attention to, a host of harmful activities associated with the so-called “alt-right”—from a pair of mangled, pretzel-shaped swastikas graffiti-ed in a children’s playground, to acts of harassment, intimidation and violence against women, African-Americans, Latinos, Muslims, Jews, and LGBTQ people, to Trump’s own racist, xenophobic and misogynistic tweets. Yet the fact that an emotion-term like hate is being mobilized across these texts as a metonym for the “alt-right” is no oratorical curio. Rather, it perpetuates a pervasive way of thinking about the relationship between the alt-right (a political phenomenon) and hate (an emotional phenomenon) that should give pause to those of us committed to mining that vein of cultural symptomatology now consigned, across the social sciences and critical humanities, to affect theory. Specifically, these headlines inscribe, in miniature, a kind of micro-assessment, a micro-geography and micro-theory of hate. First, they suggest that, even prior to its incarnation in specific, and dangerous, forms of speech or action, hate is in and of itself anathema, a phenomenon so unquestioningly dangerous that a putative “rise” or “spike” in its net presence provides ample pretext for a news headline. Second, they propose that hate may be localized to a particular social or political group—a group subsisting, unsurprisingly, on that peculiarly contested frontier between the ideological alt-right and the American Midwest. And third, they imply that hate is so indubitably the single most significant source of the xenophobic, racist and sexist activities they go on to describe that it may be casually used as these activities’ lexical proxy. What is crystallizing here, I suggest, is what scholars of rhetoric dub a rhetorical “constellation” (Campbell and Jamieson 332)—a constellation from which hate emerges as, a) inherently problematic, b) localizable to the “alt-right,” and, c) the primary engine of the various activities and expressions we associate with them. This constellation of conventions for thinking about hate and its relationship to the activities of right-wing extremist movement has coalesced into a “genre” we might dub the genre of “hate-attribution.” Yet while it’s far from clear that the genre is an effective one in a political landscape that’s fast becoming a political battleground, it hasn’t appeared by chance. Treating “hate,” then, less as a descriptive “grid of analysis” (Sedgwick 152), than as a rhetorical projectile, this essay opens by interrogating the “hate-attribution” genre’s logic and querying its efficacy. Having done so, it approaches the concept of “alternatives” by asking: how might calling time on the genre help us think differently about both hate itself and about the forces catalyzing, and catalyzed by, Trump’s presidential campaign? II.The rhetorical power of the genre of hate-attribution, of course, isn’t too difficult to pin down. An emotion so thoroughly discredited that its assignment is now in and of itself a term of abuse (see, for example, the O.E.D’s freshly-expanded definition of the noun “hater”), hate is an emotion the Judeo-Christian tradition deems not just responsible for but practically akin to murder (John 3:1). In part as a result of this tradition, hate has proven thoroughly resistant to efforts to elevate it from the status of an expression of a subject’s pestiferous inner life to the status of a polemical response to an object in the world. Indeed, while a great deal of the critical energy amassing under the rubric of “affect theory” has recently been put into recuperating the strategic or diagnostic value of emotions long scorned as irrelevant to oppositional struggle—from irritation and envy, to depression, anger and shame (Ngai; Cvetkovich; Gould; Love)—hate has notably not been among them. In fact, those rare scholarly accounts of affect that do address “hate,” notably Ahmed’s excellent work on right-wing extremist groups in the United Kingdom, display an understandable reluctance to rehabilitate it for progressive thought (Cultural Politics). It should come as no surprise, then, that the genre of “hate-attribution” has a rare rhetorical power. In identifying “hate” as the source of a particular position, gesture or speech-act, we effectively drain said position, gesture or speech-act of political agency or representational power—reducing it from an at-least-potentially polemical action in or response to the world, to the histrionic expression of a reprehensible personhood. Yet because hate’s near-taboo status holds across the ideological and political spectrum, what is less clear is why the genre of hate-attribution has achieved such cachet in the liberal media in particular. The answer, I would argue, lies in the fact that the work of hate-attribution dovetails all too neatly with liberal political theory’s longstanding tendency to laminate its social and civic ideals to affective ideals like “love,” “sympathy,” “compassion,” and, when in a less demonstrative humor, “tolerance”. As Martha Nussbaum’s Political Emotions has recently shown, this tradition has an impressive philosophical pedigree, running from Aristotle’s philia (16), John Locke’s “toleration” and David Hume’s “sympathy” (69-75), to the twentieth century’s Universal Declaration of Human Rights, with its promotion of “tolerance and friendship among all nations, racial or religious groups.” And while the labour of what Lauren Berlant calls “liberal sentimentality” (“Poor Eliza”, 636) has never quite died away, it does seem to have found new strength with the emergence of the “intimate public sphere” (Berlant, Queen)—from its recent popular apotheosis in the Clinton campaign’s notorious “Love Trumps Hate” (a slogan in which “love,” unfortunately, came to look a lot like resigned technocratic quietism in the face of ongoing economic and environmental crisis [Zizek]), to its revival as a philosophical project among progressive scholars, many of them under the sway of the so-called “affective turn” (Nussbaum; Hardt; Sandoval; hooks). No surprise, then, that liberalism’s struggle to yoke itself to “love” should have as its eerie double a struggle to locate among its ideological and political enemies an increasingly reified “hate”. And while the examples of this project we’ve touched on so far have hailed from popular media, this set of protocols for thinking about hate and its relationship to the activities of right-wing extremist movements is not unique to media circles. It’s there in political discourse, as in ex-DNC chair Debbie Wasserman Schultz’s announcement, on MSNBC, that “Americans will unite against [Trump’s] hatred.” And it’s there, too, in academic media studies, from FLOW journal’s November 2016 call for papers inviting respondents to comment, among other things, on “the violence and hatred epitomized by Trump and his supporters,” to the SCMS conference’s invitation to members to participate in a pop-up panel entitled “Responding to Hate, Disenfranchisement and the Loss of the Commons.” Yet while the labor of hate-attribution to which many progressive forces have become attached carries an indisputable rhetorical force, it also has some profound rhetorical flaws. The very same stigma, after all, that makes “hate” such a powerful explanatory grenade to throw also makes it an incredibly tough one to land. As Ahmed’s analysis of the online rhetoric of white supremacist organizations should remind us (Cultural Politics), most groups structured around inciting and promoting violence against women and minorities identify, perversely, not as hate groups, but as movements propelled by the love of race and nation. And while left-wing pundits pronounce “hate” the signature emotion of a racist, misogynist Trump-voting right, supporters of Trump ascribe it, just as routinely, to the so-called “liberal elite,” a group whose mythical avatars—from the so-called “Social Justice Warrior” or “SJW,” to the supercilious Washington politico—are said to brand “ordinary [white, male] Americans” indiscriminately as racist, misogynistic, homophobic buffoons. Thus, for example, The Washington Post’s uncanny, far-right journalistic alter-ego, The Washington Times, dubs the SPLC a “liberal hate group”; the Wikipedia mirror-site, Conservapedia, recasts liberal objections to gun violence as “liberal hate speech” driven by an “irrational aversion to weapons”; while one blood-curdling sub-genre of reportage on Steve Bannon’s crypto-fascist soapbox, Breitbart News, is devoted to denouncing what it calls “ ‘anti-White Racism.’” It’s easy enough, of course, to defend the hate-attribution genre’s liberal incarnations while dismissing its right-wing variants as cynical, opportunistic shams, as Ahmed does (Cultural Politics)—thereby re-establishing the wellspring of hate where we are most comfortable locating it: among our political others. Yet to do so seems, in some sense, to perpetuate a familiar volley of hate-attribution. And to the extent that, as many media scholars have shown (Philips; Reed; Tett; Turow), our digital, networked political landscape is in danger of being reduced to a silo-ed discursive battleground, the ritual exchange of terminological grenades that everyone seems eager to propel across ideological lines, but that no one, understandably, seems willing to pick up, seems counter-productive to say the least.Even beyond the genre’s ultimate ineffectiveness, what should strike anyone used to reflecting on affect is how little justice it does to the ubiquity and intricacy of “hate” as an affective phenomenon. Hate is not and cannot be the exclusive property or preserve of one side of the political spectrum. One doesn’t have to stretch one’s critical faculties too far to see the extent to which the genre of hate-attribution participates in the emotional ballistics it condemns or seeks to redress. While trafficking in a relatively simple hate-paradigm (as a subjective emotional state that may be isolated to a particular person or group), the genre itself incarnates a more complex, socially dynamic model of hate in which the emotion operates through logics of projection perhaps best outlined by Freud. In the “hate-attribution” genre, that is, hate—like those equally abjected categories “sentimentality,” “worldliness” or “knowingness” broached by Sedgwick in her bravura analyses of “scapegoating attribution” (150-158)—finds its clearest expression in and through the labor of its own adscription. And it should come as no surprise that an emotion so widely devalued, where it is not openly prohibited, might also find expression in less overt form.Yet to say as much is by no means to discredit the genre. As legal scholar Jeremy Waldron has recently pointed out, there’s no particular reason why “the passions and emotions that lie behind a particular speech act” (34)—even up to and including hate—should devalue the speech acts they rouse. On the contrary, to pin the despicable and damaging activities of the so-called “alt right” on “hate” is, if anything, to do an injustice to a rich and complex emotion that can be as generative as it can be destructive. As Freud suggests in “Group Psychology and the Analysis of the Ego,” for example, hate may be the very seed of love, since the forms of “social feeling” (121) celebrated under the liberal rubric of “tolerance,” “love,” and “compassion,” are grounded in “the reversal of what was first a hostile feeling into a positively-toned tie in the nature of an identification” (121; italics mine). Indeed, Freud projects this same argument across a larger, historical canvas in Civilization and its Discontents, which contends that it is in our very struggle to combat our “aggressive instincts” that human communities have developed “methods intended to incite people into identifications and aim-inhibited relationships of love” (31). For Freud, that is, the practice of love is a function of ongoing efforts to see hate harnessed, commuted and transformed. III.What might it mean, then, to call time on this round of hate-attribution? What sort of “alternatives” might emerge when we abandon the assumption that political engagement entails a “struggle over who has the right to declare themselves as acting out of love” (Ahmed, Cultural Politics 131), and thus, by that same token, a struggle over the exact location and source of hate? One boon, I suggest, is the license it gives those of us on the progressive left to simply own our own hate. There’s little doubt that reframing the dangerous and destructive forms of speech fomented by Trump’s campaign, not as eruptions of hate, or even as “hate-speech,” but as speech we hate would be more consistent with what once seemed affect theory’s first commandment: to take our own affective temperature before launching headlong into critical analysis. After all, when Lauren Berlant (“Trump”) takes a stab at economist Paul Krugman’s cautions against “the Danger of Political Emotions” with the timely reminder that “all the messages are emotional,” the “messages” she’s pointing to aren’t just those of our political others, they’re ours; and the “emotions” she’s pointing to aren’t just the evacuated, insouciant versions of love championed by the Clinton campaign, they’re of the messier, or as Ngai might put it, “uglier” (2) variety—from shame, depression and anger, to, yes, I want to insist, hate.By way of jump-starting this program of hate-avowal, then, let me just say it: this essay was animated, in part, by a certain kind of hate. The social critic in me hates the breathtaking simplification of the complex social, economic and emotional forces animating Trump voters that seem to actuate some liberal commentary; the psychologist in me hates the self-mystification palpable in the left’s insistence on projecting and thus disowning its own (often very well justified) aggressions; and the human being in me, hating the kind of toxic speech to which Trump’s campaign has given rise, wishes to be able to openly declare that hatred. Among its other effects, hate is characterized by hypervigilance for lapses or failings in an object it deems problematic, a hypervigilance that—sometimes—animates analysis (Zeki and Romoya). In this sense, “hate” seems entitled to a comfortable place in the ranks of what Nick Salvato has recently dubbed criticism’s creative “obstructions”—phenomena that, while “routinely identified as detriments” to critical inquiry, may also “form the basis for … critical thinking” (1).Yet while one boon associated with this disclosure might be a welcome intellectual honesty, a more significant boon, I’d argue, is what getting this disclosure out of the way might leave room for. Opting out of the game of hurling “hate” back and forth across a super-charged political arena, that is, we might devote our column inches and Facebook posts to the less sensational but more productive task of systematically challenging the specious claims, and documenting the damaging effects, of a species of utterance (Butler; Matsuda; Waldron) we’ve grown used to simply descrying as pure, distilled “hate”. And we also might do something else. Relieved of the confident conviction that we can track “Trumpism” to a spontaneous outbreak of a single, localizable emotion, we might be able to offer a fuller account of the economic, social, political and affective forces that energize it. Certainly, hate plays a part here—although the process by which, as Isabelle Stengers puts it, affect “make[s] present, vivid and mattering … a worldly world” (371) demands that we scrutinize that hate as a syndrome, rather than simply moralize it as a sin, addressing its mainsprings in a moment marked by the nerve-fraying and life-fraying effects of what has become known across the social sciences and critical humanities as conditions of social and economic “precarity” (Muehlebach; Neil and Rossiter; Stewart).But perhaps hate’s not the only emotion tucked away under the hood. Here’s something affect theory knows today: affect moves not, as more traditional theorists of political emotion have it, “unambiguously and predictably from one’s cognitive processing,” but in ways that are messy, muddled and indirect (Gould 24). That form of speech is speech we hate. But it may not be “hate speech.” That crime is a crime we hate. But it may not be a “hate-crime.” One of the critical tactics we might crib from Berlant’s work in Cruel Optimism is that of decoding and decrypting, in even the most hateful acts, an instance of what Berlant, herself optimistically, calls “optimism.” For Berlant, after all, optimism is very often cruel, attaching itself, as it seems to have done in 2016, to scenes, objects and people that, while ultimately destined to “imped[e] the aim that brought [it to them] initially,” nevertheless came to seem, to a good portion of the electorate, the only available exponent of that classic good-life genre, “the change that’s gonna come” (“Trump” 1-2) at a moment when the Democratic party’s primary campaign promise was more of the free-market same. And in a recent commentary on Trump’s rise in The New Inquiry (“Trump”), Berlant exemplified the kind of critical code-breaking this hypothesis might galvanize, deciphering a twisted, self-mutilating optimism in even the most troublesome acts, claims or positions. Here’s one translation: “Anti-P.C. means: I feel unfree.” And here’s another: “people react negatively, reactively and literally to Black Lives Matter, reeling off the other ‘lives’ that matter.” Berlant’s transcription? “They feel that they don’t matter, and they’re not wrong.”ReferencesAhmed, Sara. The Promise of Happiness. Durham, NC: Duke University Press, 2010.———. The Cultural Politics of Emotion. London: Routledge, 2004.Aristotle. Rhetoric. Trans. W. Rhys Roberts. New York: Cosimo Classics, 2010.———. Politics. Trans. Ernest Barker. Oxford: Oxford University Press, 1995.Berlant, Lauren. Cruel Optimism. Durham, NC: Duke University Press, 2011.———. “Trump, or Political Emotions.” The New Inquiry 5 Aug. 2016. <http://thenewinquiry.com/features/trump-or-political-emotions/>.———. “Poor Eliza.” American Literature 70.3 (1998): 635-668.———. The Queen of America Goes to Washington City. Durham, NC: Duke UP: 1998.Butler, Judith. Excitable Speech: A Politics of the Performative. New York and London: Routledge, 1997.Campbell, Karlyn Kohrs, and Kathleen Hall Jamieson. “Introduction to Form and Genre.” Methods of Rhetorical Criticism: A Twentieth Century Perspective. Eds. Bernard Brock, Robert L. Scott, and James W. Chesebro. Detroit: Wayne State University Press, 1990. 331-242.Conservapedia. “Liberal Hate Speech.” <http://www.conservapedia.com/Liberal_hate_speech>.Cvetkovich, Ann. Depression. Durham, NC: Duke University Press, 2012.Desmond-Harris, Jenna. “The Wave of Post-Election Hate Reportedly Sweeping the Nation, Explained.” Vox 17 Nov. 2016. <http://www.vox.com/2016/11/17/13639138/trump-hate-crimes-attacks-racism- xenophobia-islamophobia-schools>.Freud, Sigmund. “Group Psychology and the Analysis of the Ego.” Complete Psychological Works of Sigmund Freud Vol. XVIII: 1920-1922. Trans James Strachey. London: Vintage, 2001.———. Civilization and Its Discontents. Trans. James Strachey. 1930. <http://www.stephenhicks.org/wp-content/uploads/2015/10/FreudS-CIVILIZATION-AND-ITS-DISCONTENTS-text-final.pdf>.Gould, Deborah. “Affect and Protest.” Political Emotions. Eds. Janet Staiger, Anne Cvetkovich, Ann Reynolds. New York: Routledge, 2010.Gourarie, Chava. “How the Alt-Right Checkmated the Media.” Columbia Journalism Review 30 Aug. 2016. <http://www.cjr.org/analysis/alt_right_media_clinton_trump.php>.Hardt, Michael. “For Love or Money.” Cultural Anthropology 26. 4 (2011): 676-82.hooks, bell. All about Love: New Visions. New York: Harper Collins, 2001. Horowitz, David. “Anti-White Racism: The Hate That Dares Not Speak Its Name.” Breitbart News 26 Apr. 2016. <http://www.breitbart.com/big-journalism/2016/04/26/anti-white-racism-hate-dares-not-speak-name-2/>.Hume, David. A Treatise of Human Nature: Being an Attempt to Introduce the Experimental Method of Reasoning into Moral Subjects. London: Thomas and Joseph Allman, 1817.KCRW. “The Rise of Hate and the Right Wing.” <http://www.kcrw.com/news-culture/shows/press-play->.King, James. “This Year in Hate.” Vocativ 12 Dec. 2016. <http://www.vocativ.com/383234/hate-crime-donald-trump-alt-right-2016/>.Locke, John. A Letter Concerning Toleration. London: Huddersfield, 1796.Main, Thomas J. “What’s the Alt-Right?” Los Angeles Times 25 Aug. 2016. <http://www.latimes.com/opinion/op-ed/la-oe-main-alt-right-trump-20160825-snap-story.html>.Massumi, Brian. Parables for the Virtual: Movement, Affect, Sensation. Durham, NC: Duke University Press, 2002.Matsuda, Mari. Words That Wound: Critical Race Theory, Assaultive Speech, and the First Amendment. Westview Press 1993.Muehlebach, Andrea. “On Precariousness and the Ethical Imagination: The Year in Sociocultural Anthropology.” American Anthropologist 115. 2 (2013): 297-311.Neilson, Brett, and Ned Rossiter. “From Precarity to Precariousness and Back Again: Labour, Life and Unstable Networks.” Fibreculture 5 (2005). <http://five.fibreculturejournal.org/fcj-022-from-precarity-to-precariousness-and-back-again-labour-life-and-unstable-networks/1>.Ngai, Sianne. Ugly Feelings. Cambridge: Harvard University Press, 2005.Nussbaum, Martha. Political Emotions: Why Love Matters for Justice. Cambridge: Harvard University Press, 2013.Okeowo, Alexis. “Hate on the Rise after Trump’s Election.” New Yorker 17 Nov. 2016. <http://www.newyorker.com/news/news-desk/hate-on-the-rise-after-trumps-election>.Phillips, Angela. “Social Media Is Changing the Face of Politics—and It’s Not Good News.” The Conversation 9 Feb. 2016. <https://theconversation.com/social-media-is-changing-the-face-of-politics-and-its-not-goodnews-54266>.Reed, T.V. Digitized Lives: Culture, Power and Social Change in the Internet Era. New York: Routledge, 2014.Salvato, Nick. Obstructions. Durham, NC: Duke University Press, 2016.Sandoval, Chela. Methodology of the Oppressed. Minneapolis; Minnesota University Press, 2001. Sedgwick, Eve Kosofsky. Epistemology of the Closet. Berkeley: University of California Press, 1990.Sidahmed, Mazin. “Trump's Election Led to 'Barrage of Hate', Report Finds.” The Guardian 29 Nov. 2016. <https://www.theguardian.com/society/2016/nov/29/trump-related-hate-crimes-report-southern-poverty-law-center>.Stengers, Isabelle. “Wondering about Materialism.” The Speculative Turn: Continental Philosophy and Realism. Eds. Levi Bryant, Nick Srnicek, and Graham Harman. Melbourne: re.press, 2001. 368-380. Stewart, Kathleen. “Precarity’s Forms.” Cultural Anthropology 27.3 (2012): 518-525. Tett, Gillian. The Silo Effect: The Peril of Expertise and the Promise of Breaking. New York: Simon and Schuster, 2016.Turow, Joseph. The Daily You: How the New Advertising Industry Is Defining Your Identity and Your Worth. New Haven, CT: Yale University Press, 2011.Waldron, Jeremy. The Harm in Hate Speech. Cambridge: Harvard University Press. Wallace-Wells, Benjamin, “Is the Alt-Right for Real?” New Yorker 5 May 2016. <http://www.newyorker.com/news/benjamin-wallace-wells/is-the-alt-right-for-real>.Washington Times. “Editorial: The FBI Dumps a ‘Hate Group’.” 28 Mar. 2014. <http://www.washingtontimes.com/news/2014/mar/28/editorial-the-fbi-dumps-a-hate- group/>.Weisberg, Jacob. “The Alt-Right and a Deluge of Hate.” Slate 1 Nov. 2016. <http://www.slate.com/articles/podcasts/trumpcast/2016/11/how_the_alt_right_harassed_david_french_on_twitter_and_at_home.html>.Zeki, S., and J.P. Romaya. “Neural Correlates of Hate.” PLoS ONE 1.3 (2008). <http://dx.doi.org/10.1371/journal.pone.0003556>.Zizek, Slavoj. “Love as a Political Category.” Paper presented to the 6th Subversive Festival, 16 May 2013. <https://www.youtube.com/watch?v=b44IhiCuNw4>.
APA, Harvard, Vancouver, ISO, and other styles
43

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography