| | |
| | @inproceedings{kattamuri@debate, |
| | - author={Kattamuri, Kishore and Silaghi, Marius and Kaner, Cem and Stansifer, Ryan and Zanker, Markus}, |
| | title={Supporting Debates over Citizen Initiatives}, |
| | + author={Kattamuri, Kishore and Silaghi, Marius and Kaner, Cem and Stansifer, Ryan and Zanker, Markus}, |
| | booktitle={Proceedings of the 2005 National Conference on Digital Government Research}, |
| | year={2005}, |
 |
| | |
| | @inproceedings{kremer@verify, |
| | - address={Athens, Greece}, |
| | + title={Election verifiability in electronic voting protocols}, |
| | author={Kremer, Steve and Ryan, Mark D. and Smyth, Ben}, |
| | + address={Athens, Greece}, |
| | booktitle={{P}roceedings of the 15th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity}, |
| | DOI={10.1007/978-3-642-15497-3_24}, |
| | pages={389-404}, |
| | publisher={Springer}, |
| | series={Lecture Notes in Computer Science}, |
| | - title={Election verifiability in electronic voting protocols}, |
| | volume={6345}, |
| | year={2010}, |
 |
| | |
| | @article{zbmath0homomorphic, |
| | - author={Andrea {Huszti}}, |
| | title={A homomorphic encryption-based secure electronic voting scheme}, |
| | + author={Andrea {Huszti}}, |
| | journal={Publicationes Mathematicae}, |
| | ISSN={0033-3883}, |
 |
| | |
| | @inproceedings{peng@homomorphic, |
| | - author={Kun Peng and Riza Aditya and Colin Boyd and Byoungcheon Lee}, |
| | title={Multiplicative homomorphic e-voting}, |
| | + author={Kun Peng and Riza Aditya and Colin Boyd and Byoungcheon Lee}, |
| | booktitle={In Advances in Cryptology}, |
| | year={2004}, |
| | pages={61--72}, |
| | url={https://eprints.qut.edu.au/24434/1/}, |
| | } |
| | |
| | @article{acquisti@homomorphic, |
| | + title={Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots}, |
| | author={Alessandro Acquisti}, |
| | journal={IACR Cryptology ePrint Archive}, |
| | pages={105}, |
| | - title={Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots}, |
| | volume={2004}, |
| | year={2004}, |
 |
| | |
| | @inproceedings{estehghari0exploiting, |
| | - title={Exploiting the client vulnerabilities in Internet e-voting systems: Hacking Helios 2.0 as an example}, |
| | + title={Exploiting the client vulnerabilities in Internet e-voting systems: Hacking {H}elios 2.0 as an example}, |
| | author={Estehghari, Saghar and Desmedt, Yvo}, |
| | booktitle={Electronic Voting Technology Workship/Workshop on Trustworthy Elections}, |
 |
| | |
| | @inproceedings{movshovitz@stackoverflow, |
| | - title={Analysis of the reputation system and user contributions on a question answering website: StackOverflow}, |
| | + title={Analysis of the reputation system and user contributions on a question answering website: {S}tack{O}verflow}, |
| | author={Movshovitz-Attias, Dana and Movshovitz-Attias, Yair and Steenkiste, Peter and Faloutsos, Christos}, |
| | booktitle={Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining}, |
| | pages={886--893}, |
| | year={2013}, |
| | organization={ACM}, |
| | url={http://www.cs.cmu.edu/~dmovshov/papers/asonam_2013.pdf}, |
| | } |
| | |
| | @inproceedings{stanley@tags, |
| | - title={Predicting Tags for StackOverflow Posts}, |
| | + title={Predicting Tags for {S}tack{O}verflow Posts}, |
| | author={Stanley, Clayton and Byrne, Michael D.}, |
| | booktitle={Proceedings of the 2013 ICCM International Conference on Cognitive Modelling}, |
 |
| | url={http://epub.uni-regensburg.de/21293/}, |
| | } |
| | + |
| | +@article{allahbakhsh@crowdsourcing, |
| | + author = {Mohammad Allahbakhsh and |
| | + Aleksandar Ignjatovic and |
| | + Boualem Benatallah and |
| | + Seyed{-}Mehdi{-}Reza Beheshti and |
| | + Norman Foo and |
| | + Elisa Bertino}, |
| | + title = {An Analytic Approach to People Evaluation in Crowdsourcing Systems}, |
| | + journal = {CoRR}, |
| | + year = {2012}, |
| | + volume = {abs/1211.3200}, |
| | + timestamp = {Tue, 16 Sep 2014 19:27:03 +0200}, |
| | + biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1211-3200}, |
| | + bibsource = {dblp computer science bibliography, http://dblp.org}, |
| | + url = {http://arxiv.org/abs/1211.3200}, |
| | +} |
| | + |
| | +@incollection{adler@wikipedia, |
| | + title={Wikipedia vandalism detection: Combining natural language, metadata, and reputation features}, |
| | + author={Adler, B Thomas and De Alfaro, Luca and Mola-Velasco, Santiago M and Rosso, Paolo and West, Andrew G}, |
| | + booktitle={Computational Linguistics and Intelligent Text Processing}, |
| | + pages={277--288}, |
| | + year={2011}, |
| | + publisher={Springer}, |
| | + url={http://repository.upenn.edu/cis_papers/457/}, |
| | +} |
| | + |
| | +@article{mistry@empirical, |
| | + title={An empirical analysis of the relationship between e-government and corruption}, |
| | + author={Mistry, Jamshed J and Jalal, Abu}, |
| | + journal={The International journal of digital accounting research}, |
| | + volume={12}, |
| | + pages={6}, |
| | + year={2012}, |
| | + url={http://www.uhu.es/ijdar/10.4192/1577-8517-v12_6.pdf}, |
| | +} |
| | + |
| | +@article{ayoola@corruption, |
| | + title={The Effect of Cashless Policy of Government on Corruption in {N}igeria}, |
| | + author={Ayoola, Tajudeen John}, |
| | + journal={International Review of Management and Business Research}, |
| | + volume={2}, |
| | + number={3}, |
| | + year={2013}, |
| | + url={http://www.irmbrjournal.com/papers/1379412891.pdf}, |
| | +} |
| | + |
| | +@article{andersen@corruption, |
| | + title={Does E-Government Reduce Corruption?}, |
| | + author={Andersen, Thomas Barnebeck and Rand, John}, |
| | + journal={Department of Economics, University of Copenhagen}, |
| | + year={2006}, |
| | + url={http://www.econ.ku.dk/okotand/images/EGOV.pdf}, |
| | +} |
| | + |
| | +@techreport{bhatnagar@corruption, |
| | + title={Transparency and Corruption: Does E-Government Help?}, |
| | + author={Bhatnagar, Prof and others}, |
| | + year={2010}, |
| | + institution={eSocialSciences}, |
| | +} |
| | + |
| | +@article{gronlund@corruption, |
| | + title={Using {I}{C}{T} to combat corruption}, |
| | + author={Gr{\"o}nlund, {\AA}ke}, |
| | + journal={Increasing Transparency \& Fighting Corruption Through ICT}, |
| | + year={2010}, |
| | + url={http://npan1.un.org/intradoc/groups/public/documents/Other/UNPAN047999.pdf}, |
| | +} |
| | + |
| | +@article{gronlund@transparency, |
| | + title={Increasing transparency and fighting corruption through {I}{C}{T}}, |
| | + author={{\AA}ke Gr{\"o}nlund and Rebekah Heacock and David Sasaki and Johan Hellstr{\"o}m and Walid Al-Saqa}, |
| | + journal={SPIDER ICT4D Series}, |
| | + year={2010}, |
| | + url={http://spidercenter.org/polopoly_fs/1.146034.1378747668!/menu/standard/file/Increasing\%20transparency\%20and\%20fighting\%20corruption\%20through\%20ICT.pdf}, |
| | +} |
| | + |
| | +@article{bertot@transparency, |
| | + title={Using {I}{C}{T}s to create a culture of transparency: {E}-government and social media as openness and anti-corruption tools for societies}, |
| | + author={Bertot, John C and Jaeger, Paul T and Grimes, Justin M}, |
| | + journal={Government Information Quarterly}, |
| | + volume={27}, |
| | + number={3}, |
| | + pages={264--271}, |
| | + year={2010}, |
| | + publisher={Elsevier}, |
| | + url={http://www.isca.in/IJMS/Archive/v1i1/8.ISCA-RJMgtS-2012-001.pdf}, |
| | +} |
| | |
| | |