
This guide explains how cybersecurity issues can compromise traditional aspects of elections, such as maintaining voter lists, verifying voters, counting and casting votes and announcing results. It also describes how cybersecurity interacts with the broader electoral environment and new ways elections are being carried out, such as campaigns and data management by candidates and parties, online campaigns, social media, false or divisive information, and e-voting. Unless carefully managed, all these cybersecurity issues can present a critical threat to public confidence in election outcomes – which are the cornerstone of democracy.
LawArXiv|Law, bepress|Law|Privacy Law, bepress|Law, LawArXiv|Law|Privacy Law, LawArXiv|Law|Election Law, LawArXiv|Law|Internet Law, bepress|Law|Election Law, bepress|Law|Computer Law, bepress|Law|Internet Law, LawArXiv|Law|Computer Law
LawArXiv|Law, bepress|Law|Privacy Law, bepress|Law, LawArXiv|Law|Privacy Law, LawArXiv|Law|Election Law, LawArXiv|Law|Internet Law, bepress|Law|Election Law, bepress|Law|Computer Law, bepress|Law|Internet Law, LawArXiv|Law|Computer Law
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
