In my last article, I posed this puzzle for the reader. We want to do ballot-level comparison audits, a form of RLA (risk-limiting audit) on a precinct-count optical-scan (PCOS) voting system. This requires a serial number printed on every ballot, linked with an entry in the cast-vote-record (CVR) file. The standard method is to pick […]
Ballot-level comparison audits: precinct-count
Special bonus: This article contains two puzzles for the reader, marked in green. Try to solve them yourself before reading the solutions in a future post! In my last post I described a particularly efficient kind of risk-limiting audit (RLA) of election results: ballot-level comparison audits, which rely on a unique serial number on every […]
Ballot-level comparison audits: central-count
All voting machines these days are computers, and any voting machine that is a computer can be hacked to cheat. The widely accepted solution is to use voting machines to count paper ballots, and do Risk-Limiting Audits: random-sample inspections of those paper ballots to ensure (with a guaranteed level of assurance) that the election outcome […]
CITP Tech Policy Boot Camp 2019
[This post was written by Liza Paudel, MPA’21 and Allison Huang, History’20.] Over Fall Break, the Center for Information Technology Policy (CITP) hosted 17 current students on a two-day tech policy bootcamp in Washington D.C. The group was a mix of undergraduate and graduate students from various disciplines including Computer Science, Public Policy, Economics, and […]
Improving Protections for Children’s Privacy Online
CITP’s Tech Policy Clinic submitted a Comment to the Federal Trade Commission in connection with its review of the COPPA Rule to protect children’s privacy online. Our Comment explains why it is important to update the COPPA Rule to keep it current with new privacy risks, especially as children spend increasing amounts of time online […]