{"id":4872,"date":"2017-10-31T17:59:10","date_gmt":"2017-10-31T21:59:10","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4872"},"modified":"2017-10-31T18:00:02","modified_gmt":"2017-10-31T22:00:02","slug":"voting-vulnerability","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/10\/31\/voting-vulnerability\/","title":{"rendered":"Voting vulnerability"},"content":{"rendered":"<p style=\"margin: 0in 0in .25in 0in\"><span style=\"font-family: 'Arial',sans-serif;color: #222222\">Dubbed \u201cvoter identity theft\u201d by study authors Latanya Sweeney, Professor of Government and Technology in Residence, research analyst Ji Su Yoo and graduate student Jinyan Zang, the vulnerability could be exploited by attackers to attempt to disenfranchise many voters where voter registration information can be changed online. Armed with personal information obtained through legitimate or illegitimate sources, hackers could know enough to impersonate voters and change key information using online voter registration systems.<\/span><\/p>\n<p style=\"margin: 0in 0in .25in 0in\"><span style=\"font-family: 'Arial',sans-serif;color: #222222\">One tactic, researchers said, would be to simply change voters\u2019 addresses, making it appear \u2014 to poll workers at least \u2014 as though they were voting at the wrong location. Those voters might be forced to cast provisional ballots, which in many circumstances are not counted. The study is described in a September 6 paper published in the Journal of Technology Science.<\/span><\/p>\n<p style=\"margin: 0in 0in .25in 0in\"><span style=\"font-family: 'Arial',sans-serif;color: #222222\">Though the researchers don\u2019t report evidence of attackers exploiting the vulnerability, Sweeney, Yoo and Zang said the fear is that it might be used to either undermine confidence in elections or even to swing the result in favor of a particular candidate.<\/span><\/p>\n<p style=\"margin: 0in 0in .25in 0in\"><span style=\"font-family: 'Arial',sans-serif;color: #222222\"><a style=\"background-color: inherit\" href=\"https:\/\/www.sciencedaily.com\/releases\/2017\/09\/170906103803.htm\"><span style=\"color: #222222;text-decoration: none\">https:\/\/www.sciencedaily.com\/releases\/2017\/09\/170906103803.htm<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dubbed \u201cvoter identity theft\u201d by study authors Latanya Sweeney, Professor of Government and Technology in Residence, research analyst Ji Su Yoo and graduate student Jinyan Zang, the vulnerability could be exploited by attackers to attempt to disenfranchise many voters where voter registration information can be changed online. Armed with personal information obtained through legitimate or [&hellip;]<\/p>\n","protected":false},"author":15894,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715345],"tags":[],"class_list":{"0":"post-4872","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-04-enterprise-architecture","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/15894"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4872"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4872\/revisions"}],"predecessor-version":[{"id":4873,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4872\/revisions\/4873"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}