Electronic Government, an International Journal (5 papers in press)
Gender and Age Differences in Rural Farmers Intention to Use M-Government Services
by Herman Eliawaha Mandari, Yee-Lee Chong
Abstract: The purpose of this study is to determine: (1) the direct effect of the innovation diffusion theory (IDT) constructs and government support on rural farmers behavioural intention to use m-government service; and (2) how different categories of age and gender in Tanzania rural areas could moderate the effect generated by IDT constructs and government support on respondents behavioural intention. Structural equation modelling (SEM) was employed to analyse 407 completed questionnaires. Relative advantage, ease-of-use, compatibility; and government support were found to be significant determinants of rural farmers behavioural intention. Age and gender were found to moderate the effects of relative advantage and ease-of-use on behavioural intention while gender could moderate the effect of compatibility on behavioural intention partially. Tactical suggestions to policy makers are given. In general, different strategies and policies could be used to increase different cohorts behavioural intention to use m-government service.
Keywords: m-government; innovation; moderation; government-support; Tanzania.
Secure Online Voting System in Cloud
by Vijayalakshmi Subramani, G.R. Karpagam
Abstract: India is one of the most important democratic and developing countries on earth. A democratic form of government is run by the elected representatives of the common people. Voting is important because the people participate in elections to choose their representatives. Though there are several issues in implementing online voting system, security is one of the most important issues. Our objective is to design and develop a framework for a secure online voting system in a cloud environment by using digital certificate secure hash algorithm (SHA) and ElGamal encryption. The proposed system consists of three managers such as certification authority manager (CAM), Vote manager (VM), and vote tally manager (TM). In registration phase, the elector interacts with CAM to acquire a digital certificate. VM is responsible to authenticate the elector. TM finally tallies the votes. The assessment of the system is verified using properties called authenticity, verifiability, confidentiality, accuracy and non-reputation.
Keywords: cloud; online voting; authentication; digital certificate; ElGamal encryption; secure hash algorithm; SHA.
Vote identification and integrity of ballot in paper-based e-voting system
by Supeno Djanali, Hudan Studiawan, Danang Prawira Nugraha, Baskoro Adi Pratomo
Abstract: The paper-based e-voting system still utilizes ballot and then followed by computer-based voting tabulation. The previous research do not consider the integrity of the ballot paper and the vote on top of it. In this paper, we propose to scan and store the ballot into image file. We run a series of image processing techniques to identify the vote on the ballot image which is subsequently used in the recapitulation. We then design an automatic identification of user's vote in ballot and protecting its integrity using Whirlpool hash algorithm. The vote ballot from an image is recognized by performing the absolute difference between the image and the provided template. The parties participating in the general elections and their candidates are stored in separated files. Based on the intensive experiments, the proposed system successfully recognizes the vote with the highest accuracy at 85.71%.
Keywords: paper-based e-voting; automatic vote identification; ballot hashing; Whirlpool method.
The Acceptance of Electronic Voting Machines in India: A UTAUT approach
by Sumedha Chauhan, Mahadeo Jaiswal, Arpan Kumar Kar
Abstract: Electronic-voting (e-voting) using electronic voting machines (EVMs) is a popular way of voting in select countries, including India. Given their popularity, this research investigates its acceptance using the unified theory of acceptance and use of technology (UTAUT). This research extends the UTAUT model by integrating the concepts of perceived security (PS) and trust in technology (TR). It further examines the effects of moderating variables of age and gender on the relationships between predictor variables and behavioural intention to use EVMs (BI). The results reveal that performance expectancy (PE), social influence (SI), PS and TR positively impact BI, while effort expectancy (EE) does not impact BI. Age moderates the impact of EE on BI with a stronger relationship for females. Gender moderates the impacts of PE and EE on BI with stronger relationships for males and females, respectively. Unexpectedly, gender moderates the effect of SI on BI with a stronger relationship for males.
Keywords: E-Government; Electronic Voting Machine; E-Voting; UTAUT; Multivariate analysis; Technology Acceptance; India.
Special Issue on: New Developments in Electronics Cloud and IoT
Performance Analysis of Various Link Estimation Time Methods in Vehicular Ad hoc Network
by Karthikeyan F.A., S. Selva Kumar
Abstract: The primary work of vehicular ad hoc network (VANET) is to route the packets and to can handle a high mobility of vehicles in the frequently changing topology. The fast dynamic changing topology is the major problem in VANET, so it is necessary to compute the link estimation time (LET) of every relay node in the network. The LET is one of the recent research finding to solve VANET routing issues. This paper depicts the overall survey of different V2V (or) V2I link estimation techniques developed for VANET and also compare the Position based protocol, cross-layer and prediction based protocol. The objective of this paper is to analyse the performance of the different protocols by applying various types of LET in terms of speed, distance and signal and noise rate (SNR) using NS3. The results show that cross-layer protocol has significant performance than comparing to other routing protocols in VANET with the help of plotted graph.
Keywords: VANET; Routing; V2V; V2I; Link Estimation Time.