The Law of Cyber-Space
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt
American University in Cairo AUC Knowledge Fountain Theses and Dissertations Student Research Summer 6-15-2021 The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt Moustafa Ahmad Kamal Mahmoud Ahmad [email protected] Follow this and additional works at: https://fount.aucegypt.edu/etds Part of the Courts Commons, and the Litigation Commons Recommended Citation APA Citation Ahmad Kamal Mahmoud Ahmad, M. (2021).The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt [Master's Thesis, the American University in Cairo]. AUC Knowledge Fountain. https://fount.aucegypt.edu/etds/1637 MLA Citation Ahmad Kamal Mahmoud Ahmad, Moustafa. The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt. 2021. American University in Cairo, Master's Thesis. AUC Knowledge Fountain. https://fount.aucegypt.edu/etds/1637 This Master's Thesis is brought to you for free and open access by the Student Research at AUC Knowledge Fountain. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AUC Knowledge Fountain. For more information, please contact [email protected]. The American University in Cairo School of Global Affairs and Public Policy THE CHALLENGES AND ASPIRATIONS OF THE DIGITAL TRANSFORMATION OF THE STATE COUNCIL OF EGYPT A Thesis Submitted to The Department of Law In partial fulfillment of the requirement for LL.M. Degree in International and Comparative Law By Moustafa Ahmad Kamal Mahmoud Ahmad Spring 2021 The American University in Cairo School of Global Affairs and Public Policy Department of Law THE CHALLENGES AND ASPIRATIONS OF THE DIGITAL TRANSFORMATION OF THE STATE COUNCIL OF EGYPT A Thesis Submitted by Moustafa Ahmad Kamal Mahmoud Ahmad to the Department of Law Spring 2021 in partial fulfillment of the requirements for the LL.M. -
Introduction Voting In-Person Through Physical Secret Ballot
CL 166/13 – Information Note 1 – April 2021 Alternative Voting Modalities for Election by Secret Ballot Introduction 1. This note presents an update on the options for alternative voting modalities for conducting a Secret Ballot at the 42nd Session of the Conference. At the Informal Meeting of the Independent Chairperson with the Chairpersons and Vice-Chairpersons of the Regional Groups on 18 March 2021, Members identified two possible, viable options to conduct a Secret Ballot while holding the 42nd Conference in virtual modality. Namely, physical in-person voting and an online voting system. A third option of voting by postal correspondence was also presented to the Chairpersons and Vice- chairpersons for their consideration. 2. These options have since been further elaborated in Appendix B of document CL 166/13 Arrangements for the 42nd Session of the Conference, for Council’s consideration at its 166th Session under item 13 of its Agenda. During discussions under item 13, Members not only sought further information on the practicalities of adopting one of the aforementioned options but also introduced a further alternative voting option: a hybrid of in-person and online voting. 3. In aiming to facilitate a more informed decision by Members, this note provides additional information on the previously identified voting options on which Members have already received preliminary information, and introduces the possibility of a hybrid voting option by combining in- person and online voting to create a hybrid option. 4. This Information Note further adds information on the conduct of a roll call vote through the Zoom system. Such a vote will be required at the beginning of the Conference for the endorsement of the special procedures outlined in Appendix A under item 3, Adoption of the Agenda and Arrangements for the Session, following their consideration by the General Committee of the Conference at its first meeting. -
The Effects of Secret Voting Procedures on Political Behavior
UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................ -
Open-Secret Voting
ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance. -
Adapting Helios for Provable Ballot Privacy
Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting. -
Union Elections by Secret Ballot Protect Workers' Rights
February 27, 2007 Union Elections by Secret Ballot Protect Workers’ Rights Executive Summary • The United States has a rich tradition of Americans choosing their elected representatives by secret ballot. The secret ballot election process in deciding union representation (administered by the National Labor Relations Board (NLRB)) ensures that a worker can freely express his or her desire to join a union, without intimidation or fear. • In the face of declining union membership, Democrats have made elimination of the secret-ballot election in union representation one of their top legislative priorities. In the House, H.R. 800, the “Employee Free Choice Act,” has been reported out of committee and has over 230 cosponsors. • Support for the secret ballot, one of the cornerstones of democracy, is strong: o In 2002, Congress reaffirmed these rights in the passage of the Help America Vote Act (HAVA). In setting requirements for voting and voter-registration system, HAVA required that systems must maintain voter privacy and ballot confidentiality. o The AFL-CIO supports secret-ballot elections when it comes to decertification of a union. It argued before the NLRB that in decertification petitions, secret- ballot elections provide the surest means of avoiding decisions that are the result of coercion. o Some House Democrats who support card-check authorization (the acceptance of signed cards for union representation rights in lieu of a secret-ballot election) in the U.S. support the use of the secret ballot in other countries. o Both the NLRB and the Supreme Court have long recognized that a Board- conducted, secret-ballot election is the most satisfactory, preferred method of ascertaining employee support for a union. -
The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy
! The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy Employees should have the right to voluntarily choose—or not choose—union representation. This decision should be without intimidation or coercion by union organizers or employers. T he most widely accepted method to insure a fair outcome is for employees to vote by secret ballot. However, labor unions have increasingly sought to organize through a “card check” process which is characterized by union organizers using strong-arm tactics. In the last Congress, labor unions attempted to permanently deprive employees of a secret ballot through the deceptively-named “Employee Free Choice Act” (“EFCA”). To protect against ongoing and future attempts to rob employees of their ability to vote in private, Rep. Phil Roe (R-TN) and Sen. Jim DeMint (R-SC) recently introduced the Secret Ballot Protection Act (H.R. 972, S. 217) (“SBPA”). The SBPA will guarantee that employees can cast a vote in private regarding the critical decision of whether to choose or not choose union representation. I. Why is Secret Ballot Voting in Union Elections Important? The annals of NLRB case law are packed full of examples where the use of card check has been challenged because of coercion, misrepresentation, forgery, fraud, peer pressure, and promised benefits.1 In testimony before the House Subcommittee on Workforce Protections, an employee described the various misrepresentations and coercive tactics used by union organizers utilizing card check. The tactics included threats of termination, deportation, and loss of 401(k) and health benefits for not signing a card; and promises of green cards, termination of supervisors, and free turkeys for employees who did sign cards.2 It is no wonder then that federal courts have questioned the reliability of card check procedures. -
Policies and Models for Planning the Economic Development of the Non-Oil Sector in Saudi Arabia Ahmad Kamal Katanani Iowa State University
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1971 Policies and models for planning the economic development of the non-oil sector in Saudi Arabia Ahmad Kamal Katanani Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Agricultural and Resource Economics Commons, and the Agricultural Economics Commons Recommended Citation Katanani, Ahmad Kamal, "Policies and models for planning the economic development of the non-oil sector in Saudi Arabia " (1971). Retrospective Theses and Dissertations. 4551. https://lib.dr.iastate.edu/rtd/4551 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. 72-12,562 KATMANI, Ahmad Kamal, 1939- POLICIES AND MODELS FOR PLANNING THE ECONOMIC DEVELOPMENT OF .ffi NON-OIL SECTOR IN SAUDI ARABIA. Iowa State University, Ph.D., 1971 Economics, agricultural I University Microfilms, A XERDK Company, Ann Arbor. Michigan I THIS DISSERTATION HAS BEEN MICROFILMED EXACTLY AS RECEIVED Policies and models for planning the economic development of the non-oil sector in Saudi Arabia by Ahmad Kamal Katanani A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of The Requirements for the Degree of DOCTOR OF PHILOSOPHY Major Subject: Economics Approved: Signature was redacted for privacy. In Charge of Major Work Signature was redacted for privacy. For the Major Department Signature was redacted for privacy. -
General Agreement on Tariffs and Trade Accord
RESTRICTED GENERAL AGREEMENT ON TARIFFS AND TRADE Spec(92)18 ACCORD GENERAL SUR LES TARIFS DOUANIERS ET LE COMMERCE 9 June 1992 ACUERDO GENERAL SOBRE ARANCELES ADUANEROS Y COMERCIO COUNCIL CONSEIL C0NSEJ0 Trade Policy Review Mechanism Mécanisme d'examen Mecanismo de examen de las Bangladesh 9-10 June 1992 des politiques commerciales polîticas comerciales Bangladesh 9-10 juin 1992 Bangladesh 9-10 de junio de 1992 LIST OF REPRESENTATIVES/LISTE DES REPRESENTANTS/ LISTA DE REPRESENTANTES Chairman; Président: H.E. Mr. B.K. Zutshi (India) Présidente: ARGENTINA Représentante Sr. Alberto A. Alvarez Secretario, Misiôn Permanente ante la Oficina de las Naciones Unidas en Ginebra AUSTRALIA Representative Dr. Meredith Anne Borthwick Counsellor, Permanent Mission to the United Nations Office at Geneva AUSTRIA Representative Mr. Richard HochOrtler Minister, Deputy Permanent Representative to GATT BANGLADESH Representative Dr. M. Ishaq Talukdar Minister (Economic Affairs), Permanent Mission to the United Nations Office at Geneva BARBADOS (list not received) 92-0774 Spec(92)18 Page 2 BOLIVIA (no se ha recibido la lista) BRAZIL Repre s entative Ms. Renata Saint-Clair Pimentel Third Secretary, Permanent Mission to the United Nations Office at Geneva CAMEROUN Représentant M. Victorine Mbette Conseiller, Mission permanente auprès de l'Office des Nations Unies à Genève CANADA Representatives Mr. Mark E. Bailey Counsellor, Permanent Mission to the United Nations Office at Geneva Mr. Wray Koepke Counsellor, Department of External Affairs and International Trade REPUBLIQUE CENTRAFRICAINE (liste non reçue) CHILE (no se ha recibido la lista) COLOMBIA (no se ha recibido la lista) Spec(92)18 Page 3 COMMUNAUTES EUROPEENNES COMMISSION Représentants M. Ivan Klaric Conseiller, Délégation permanente à Genève M. -
UNDERSTANDING CHINA a Diplomatic and Cultural Monograph of Fairleigh Dickinson University
UNDERSTANDING CHINA a Diplomatic and Cultural Monograph of Fairleigh Dickinson University by Amanuel Ajawin Ahmed Al-Muharraqi Talah Hamad Alyaqoobi Hamad Alzaabi Molor-Erdene Amarsanaa Baya Bensmail Lorena Gimenez Zina Ibrahem Haig Kuplian Jose Mendoza-Nasser Abdelghani Merabet Alice Mungwa Seddiq Rasuli Fabrizio Trezza Editor Ahmad Kamal Published by: Fairleigh Dickinson University 1000 River Road Teaneck, NJ 07666 USA April 2011 ISBN: 978-1-457-6945-7 The opinions expressed in this book are those of the authors alone, and should not be taken as necessarily reflecting the views of Fairleigh Dickinson University, or of any other institution or entity. © All rights reserved by the authors No part of the material in this book may be reproduced without due attribution to its specific author. THE AUTHORS Amanuel Ajawin is a diplomat from Sudan Ahmed Al-Muharraqi is a graduate student from Bahrain Talah Hamad Alyaqoobi is a diplomat from Oman Hamad Alzaabi a diplomat from the UAE Molor Amarsanaa is a graduate student from Mongolia Baya Bensmail is a graduate student from Algeria Lorena Gimenez is a diplomat from Venezuela Zina Ibrahem is a graduate student from Iraq Ahmad Kamal is a Senior Fellow at the United Nations Haig Kuplian is a graduate student from the United States Jose Mendoza-Nasser is a graduate student from Honduras Abdelghani Merabet is a graduate student from Algeria Alice Mungwa is a graduate student from Cameroon Seddiq Rasuli is a graduate student from Afghanistan Fabrizio Trezza is a graduate student from Italy INDEX OF -
American Secret Ballot Decisions
THE AMERICAN LAW REGISTER AND REVIEW. FEBRUARY, 1893. AMERICAN SECRET BALLOT DECISIONS. By -CHARLES CHAUNCEY BINNEY, Es. THAT the ballot, which for years has been used in every election district in this country, except for general elections in Kentucky, was employed in order to secure secrecy, and that its use implied secrecy, has been repeatedly decided by our courts, 2 while the benefit which this secrecy conferred upon the individual voter and the community at large has often been dwelt upon by text-writers.3 The theory of the old form of ballot was that the voter prepared or By the new constitution of Kentucky viva voce voting at general elections is abolished, and all elections are by ballot. It is in curious contrast to the conservatism which retained viva voce voting for so long that the first American secret ballot law, a very effective adaptation of the Australian system, was the Louisville election law of February 24, 1883, under which the first American election by secret ballot took place December 4, 1888. 2 See Jones z'. Glidewell, 53 Ark., 16r; Williams v. Stein, 38 Ind., 89; People v. Cicott, 16 Mich., 283; Common Council v. Rush, 82 Id.; 532; Brisbin z. Cleary, 26 Minn., 1o; Commonwealth v. Wcelper, 3 S. & R. (Pa.), 29, 37; Kneass' Case, 2 Pars. Eq. (Pa.), 553, 585: Temple v. Mead, 4 Vt., 535, 541; State v. Hilmantel, 23 Wis., 422. 3 See Cooley's Const. Lims. (6th Ed.), 76o. 102 AMERICAN SECRET BALLOT DECISIONS. provided it himself, so that he alone knew its contents, but the inevitable assumption by party organizations of the task of preparing and distributing the printed ballots used has for many decades done away with almost every vestige of actual secrecy, all legal theory to the contrary notwith- standing. -
Negative Vote Buying and the Secret Ballot"
Negative Vote Buying and the Secret Ballot John Morgan Haas School of Business and Department of Economics University of California, Berkeley Felix Várdyy International Monetary Fund Washington, DC June 2008 Abstract We o¤er a model of “negative vote buying”—paying voters to abstain. While negative vote buying is feasible under the open ballot, it is never opti- mal. In contrast, a combination of positive and negative vote buying is optimal under the secret ballot: Lukewarm supporters are paid to show up at the polls, while lukewarm opponents are paid to stay home. Surprisingly, the imposition of the secret ballot increases the amount of vote buying— a greater fraction of the electorate votes insincerely than under the open ballot. Moreover, the secret ballot may reduce the costs of buying an election. JEL #s: D71, D72, D78. Keywords: Negative vote buying, lobbying, abstention, secret ballot, elec- tions. The …rst author thanks the International Monetary Fund Institute for its generous hospitality and inspiration during the …rst draft of this paper. Morgan also gratefully acknowledges the …nancial support of the National Science Foundation. The opinions expressed in this paper are those of the authors and should not be attributed to the International Monetary Fund, its Executive Board, or its Management. yCorresponding author. Email: [email protected] 1 1 Introduction The use of voting to make collective decisions inevitably brings with it the possibility of vote buying. Thus, a crucial aspect of designing voting procedures is to ensure that election outcomes re‡ect the will of the electorate, rather than the wallets of interest groups.