Summary: | 碩士 === 萬能科技大學 === 資訊管理研究所在職專班 === 103 === "Democracy" is the common pursuit of universal values, and citizens (voters)
voting can be regarded as "direct democracy" of performance, and is become an
unmistakable global trends. Undere express our Constitution, "the people there is an election, recall, initiative and referendum the rights". In the case of the military internal governance policies and regulations to implement is the same.
The military implementation of the policies and regulations, which is the need
for policy, management and implementation between the three units, mutual
communication and coordination to develop common goals and vision, to reach to
promote national defense policies.
Taking into account any of the existing voter voting mechanism, experience and
results to design a voting mechanism with the military security of the network. We using the Internet and information technology environment, which taking into
account the various risk management and information security factors, then import
the design of network off-road voting mechanism to military units,. The voting
mechanism could provide military forces at all levels, cadres or the rank and file of a platform for exchange of views, to participate in major defense affairs timely decisions. In addition to the military personnel to enhance the effectiveness of the military directly involved in military affairs, but also produce the results provide the military policy unit to develop the military decision-making or regulatory compliance matters military units.
The results of this study mechanized whole as follows:
First, Voting Information Systems function regardless of how perfect the design,
how to facilitate the use, preservation of user data will affect the voting results of the authenticity of the certificate authority. It shall use secure encryption and decryption mechanism and build security operations.
Second, Use the Online electronic voting, hacker attacks and other threats shall
be effective prevention and control or eliminate. The Institute proposed risk
assessment model of the system to combat weighted index (SWP), can provide
design information systems unit in the voting system build, the effective assessment of information systems security, information security and the establishment of protective measures.
Third, Risk management is an important mechanism design and view information system threats and vulnerabilities, effective implementation of risk evaluation job. By a system weighted against the index of this study, we could in time to find the dangerous path to take prevention and control means to safeguard the
voting information system security.
|