We may earn an affiliate commission when you visit our partners.
Course image
J. Alex Halderman

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more.

Enroll now

What's inside

Syllabus

Voting as a Security Problem
Approaching voting problems with the security mindset
Computers at the Polls
Voting enters the computing age
Read more
Security Procedures and Voting Around the World
Methods for ensuring the security of democracy
Human Factors and Internet Voting
Users don't always behave as expected, even when voting
New Technology and Policy
Lessons learned

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides an overview of electronic and Internet voting systems and their security implications
Taught by a leading expert in the field of election security
Covers the human factors and policy considerations related to voting
Prepares learners to understand future developments in voting technology
May require learners to have a basic understanding of computer security and human factors
Does not provide hands-on experience with electronic or Internet voting systems

Save this course

Save Securing Digital Democracy to your list so you can find it easily later:
Save

Reviews summary

Democracy's voting security

Learners say this course is excellent and highly recommended. It's a non-technical course that covers the history of voting in the United States and abroad. It also covers various methods and weaknesses in current voting systems. Most students found that course material wasn't difficult, and students were not required to purchase the companion book. The course is made up of 40 video lectures and 5 quizzes and was considered interesting and engaging.
Provides a historical examination of voting methods.
"The course is both a voyage in the history of voting..."
Course material is interesting and accessible.
"Professor Halderman's course on voting security and history was quite interesting"
Course is accessible even to non-experts.
"This is an excellent, very interesting non-technical course."
Highlights vulnerabilities in current voting systems.
"The course is both a voyage in the history of voting, and a precise dissection of all methods that can be used (and generally was used) to trick voters."
Students highly recommend this course.
"I would highly recommend this course to anyone that has an interest in the subject material."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Securing Digital Democracy with these activities:
Review election principles
Reinforce knowledge of election principles relevant to the course topics
Browse courses on Voting Systems
Show steps
  • Review voting system basics, including plurality, majority, and runoff systems
  • Understand the mechanics of different voting systems, including paper-based and electronic voting
Review 'Black Box Voting' by Bev Harris
Gain insights into historical and potential issues with electronic voting systems
View Melania on Amazon
Show steps
  • Read the book and take notes on key arguments and evidence
  • Consider the implications for election security and integrity
  • Discuss findings with classmates or online communities
Explore online resources on voting technology
Expand knowledge of voting technology and its implications
Show steps
  • Identify and access reputable websites, academic papers, or videos on voting technology
  • Review materials and take notes on key concepts, advancements, and challenges
  • Summarize findings and discuss with classmates or online forums
Five other activities
Expand to see all activities and additional details
Show all eight activities
Analyze news articles on voting security
Sharpen analytical skills in assessing voting security issues
Show steps
  • Identify and select reputable news sources covering voting security
  • Read and critically analyze news articles, paying attention to claims, evidence, and biases
  • Summarize key findings and identify areas of vulnerability or best practices
Seek guidance from experts in voting security
Gain insights and advice from professionals in the field
Show steps
  • Identify potential mentors through professional networks, conferences, or online platforms
  • Reach out to selected mentors and request guidance on specific topics or career development
  • Attend meetings or video calls to discuss interests, challenges, and opportunities
Create infographics on voting methods
Enhance understanding of voting methods and improve communication skills
Browse courses on Voting Systems
Show steps
  • Research and gather information on different voting systems
  • Design and create visually appealing infographics that clearly explain the pros and cons of each system
  • Share infographics with peers or online communities for feedback and discussion
Attend workshops on election cybersecurity
Acquire specialized knowledge and practical skills in election cybersecurity
Show steps
  • Identify and register for workshops offered by academic institutions, government agencies, or industry organizations
  • Attend workshops and actively participate in discussions, demonstrations, and hands-on exercises
  • Network with experts and peers in the field
Organize notes and materials from the course
Consolidate and reinforce learning from the course
Show steps
  • Review and organize lecture notes, slides, and readings
  • Create summaries or mind maps to condense key concepts
  • Combine and categorize materials into a structured study guide

Career center

Learners who complete Securing Digital Democracy will develop knowledge and skills that may be useful to these careers:
Computer Security Analyst
Computer Security Analysts are tasked with finding weaknesses in computer systems and networks. Their work helps to keep data safe from cyberattacks and ensures that systems are functioning as intended. The course on Securing Digital Democracy provides a solid foundation in computer security, which can be a valuable asset for anyone working in this field.
Information Security Analyst
Information Security Analysts are responsible for developing and implementing security measures to protect an organization's information assets. They work to identify and mitigate risks to information systems and data, and they ensure that the organization's information security policies are followed. The course on Securing Digital Democracy provides a comprehensive overview of information security, which can be helpful for anyone working in this field.
Security Engineer
Security Engineers design, implement, and maintain security systems for organizations. They work to protect networks, systems, and data from cyberattacks and other threats. The course on Securing Digital Democracy provides a strong foundation in security engineering, which can be beneficial for anyone working in this field.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems for networks. They work to protect networks from cyberattacks and other threats, and they ensure that networks are functioning as intended. The course on Securing Digital Democracy provides a solid foundation in network security, which can be beneficial for anyone working in this field.
IT Auditor
IT Auditors assess the security of an organization's information systems. They work to identify and mitigate risks to information systems and data, and they ensure that the organization's information security policies are followed. The course on Securing Digital Democracy provides a comprehensive overview of information security auditing, which can be helpful for anyone working in this field.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work to identify and mitigate risks to information systems and data, and they help organizations to develop and implement security policies. The course on Securing Digital Democracy provides a comprehensive overview of information security, which can be helpful for anyone working in this field.
Cybersecurity Analyst
Cybersecurity Analysts investigate and respond to cyberattacks. They work to identify and mitigate risks to information systems and data, and they ensure that the organization's information security policies are followed. The course on Securing Digital Democracy provides a solid foundation in cybersecurity, which can be beneficial for anyone working in this field.
Compliance Manager
Compliance Managers ensure that an organization is complying with all applicable laws and regulations. They work to identify and mitigate risks to the organization's compliance posture, and they help the organization to develop and implement compliance policies. The course on Securing Digital Democracy provides a comprehensive overview of compliance management, which can be helpful for anyone working in this field.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization. They work to ensure that the organization is taking appropriate steps to protect its assets and interests. The course on Securing Digital Democracy provides a solid foundation in risk management, which can be beneficial for anyone working in this field.
Information Governance Officer
Information Governance Officers are responsible for managing an organization's information assets. They work to ensure that the organization's information is accurate, complete, and accessible, and they help the organization to develop and implement information governance policies. The course on Securing Digital Democracy provides a solid foundation in information governance, which can be beneficial for anyone working in this field.
Privacy Officer
Privacy Officers are responsible for protecting the privacy of an organization's data. They work to ensure that the organization is complying with all applicable privacy laws and regulations, and they help the organization to develop and implement privacy policies. The course on Securing Digital Democracy provides a solid foundation in privacy management, which can be beneficial for anyone working in this field.
Data Protection Officer
Data Protection Officers are responsible for protecting the privacy and security of an organization's data. They work to ensure that the organization is complying with all applicable data protection laws and regulations, and they help the organization to develop and implement data protection policies. The course on Securing Digital Democracy provides a solid foundation in data protection, which can be beneficial for anyone working in this field.
Archivist
Archivists are responsible for managing and preserving an organization's historical records. They work to ensure that the organization's records are accurate, complete, and accessible, and they help the organization to develop and implement archival policies. The course on Securing Digital Democracy may be helpful for anyone working in this field, as it provides a solid foundation in information management.
Records Manager
Records Managers are responsible for managing an organization's records. They work to ensure that the organization's records are accurate, complete, and accessible, and they help the organization to develop and implement records management policies. The course on Securing Digital Democracy may be helpful for anyone working in this field, as it provides a solid foundation in information management.
Librarian
Librarians are responsible for managing and providing access to an organization's information resources. They work to ensure that the organization's information resources are accurate, complete, and accessible, and they help the organization to develop and implement library policies. The course on Securing Digital Democracy may be helpful for anyone working in this field, as it provides a solid foundation in information management.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Digital Democracy.
This comprehensive handbook provides a multidisciplinary perspective on the relationship between digital technology and society, offering insights into the social, political, and economic implications of digital democracy.
This handbook offers a comprehensive overview of cybersecurity, providing essential background knowledge on the technical and policy aspects of securing digital systems and networks.
Provides historical context for the challenges and opportunities of digital democracy, exploring the evolution of democratic ideals and practices in the United States.
Provides a comparative overview of electoral reform in different countries. It useful resource for anyone who wants to learn more about the different ways in which electoral systems can be designed and implemented.
Examines the impact of digital technology on the public sphere, exploring the ways in which it has transformed political discourse, citizen participation, and democratic processes.
Provides a historical and philosophical perspective on the relationship between technology and democracy, tracing the ways in which technology has both enabled and constrained democratic processes.
Explores the impact of the internet on politics. It discusses the different ways in which technology is changing the way that people participate in politics and the way that governments operate.
Explores the impact of social media on politics, society, and business. It discusses the different ways in which social media is changing the way that people communicate, organize, and act.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing Digital Democracy.
The Mathematics of Democracy, Politics and Manipulation
Mathematics and Democracy Teach Out
Game Theory II: Advanced Applications
Containerised app development with Azure Kubernetes...
Employing Ensemble Methods with scikit-learn
Forecasting US Presidential Elections with Mixed Models
Trust and Security with Google Cloud
Interview with Troy Hunt, Creator of Have I Been Pwned,...
Malaria parasite detection using ensemble learning in...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser