0% found this document useful (0 votes)
159 views56 pages

Kembabazi Jackline & Alfred Ajakol PDF

This document outlines the design and implementation of an online voting system for Uganda. It discusses challenges with the current in-person voting system such as long travel distances and wait times for voter registration. The proposed online system would allow voters to register and check their registration status online, as well as cast and track their votes. It covers requirements, design, and components of the system, including a website, database, and secure network. The goal is to make the voting process more accessible and efficient through digital tools.

Uploaded by

keisha baby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views56 pages

Kembabazi Jackline & Alfred Ajakol PDF

This document outlines the design and implementation of an online voting system for Uganda. It discusses challenges with the current in-person voting system such as long travel distances and wait times for voter registration. The proposed online system would allow voters to register and check their registration status online, as well as cast and track their votes. It covers requirements, design, and components of the system, including a website, database, and secure network. The goal is to make the voting process more accessible and efficient through digital tools.

Uploaded by

keisha baby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

DESIGN AND IMPLEMENTATION OF AN ONLINE VOTING SYSTEM IN

SELECTED DEVELOPING COUNTRIES; A CASE OF THE REPUBLIC

OF UGANDA

BY

KEMBABAZI JACKLINE
BITI2001 71821DU

And

ALFRED OJAKOL
BIT/20039/82/rjU

PROJECT REPORT SUBMITTED TO THE COLLEGE OF APPLIED SCIENCE AND

TECHNOLOGy IN PARTIAL FULFILLMENTSOF THE REQUIREMENTS

FOR THE AWARD OF A BACHELOR DEGREE OF INFORMATION

TECHNOLOGYOF KAMPALA INTERNATIONAL

UNIVERSITY.

AUGUST, 2012
Declaration

We , KEMBABAZI Jackline and Alfred OJAKOL, do hereby declare that this project
proposal is our original and has not been published and/or submitted for any other Degree
award to any other institution before.

KEMBABAZI JACKLINE
BIT/2001 7/82/DU

Date

ALFRED OJAKOL
BIT/20039/82/DU

Date
Approval

This project proposal has been submitted for Examination with my approval as the
University Supervisor.

SSEGAWA E. JAMES KIGGUNDU

....z~
Date
Acknowledgements

We wish to acknowledge our indebtednes to our Supervisor Mr. Ssegawa James K. for his
patience, encouragement and continous guidance which have enabled us to produce this report.

Our thanks also go the staff of Kampala International University who created an enabling
environment that made it possible for us to complete this work.

Iv
LIST OF ACRONYMS

ICT Information Communication Technology


PC Personal Computer
BBC British Broadcasting Company
TCP/IP Transmission Control Protocol/Internet Protocol
LAN Local Area Network
USA United States of America
LC Local Council
EC Electoral Commission
CAST College of Applied Science and Technology
SQL Structured Query Language

V
LIST OF FIGURES

0. Conceptual model for an online voting system 22


0.1. Entity Relationship diagram 32
1. A Gantt chart for time frame 33
2. Login interface 35
3. Voter’s registration form 36
4. Polling form 36
5. Statistical vote’s results chart 37
6. Home page of online voting system web site 39
7. Illustration of system conversion 44
8. Voter’s Registration form 40
9. Voter’s Login frame 40
10. Voter’s account opening form 41
11. Polling frame 42
12. Candidates’ frame 43
13. Online voting system database 56
14. Users’ table 57
15. Voters’ table 58
16. Voters’ registration table 59
17. Poll menu table 60

VI
Abstract

Potential voters face difficulty when registering to be legitimate voters, some of these difficulties
includes: the long distances to be traveled for registration process, the long queues at the
registration sites, the short time duration provided for registration, updating and viewing the
voter register. In an effort to make the voter registration and voting process easier, this project
report outlines the designing and implementation of the online voting system based on current
literature on voter registration and voting process, web security and latest software application.
The online voting system allows the voter to register online and ensure the existence of his/her
name on the voter register. Furthermore, it allows the voter to cast his/her vote and check for
election results updates.
Although the online voting system focused on the Uganda Electoral Commission (UEC), it is
important to note that it can be implemented for other electoral commissions in other democratic
countries worldwide. The online voting system was evaluated and validated in terms of usability
and feasibility. The online voting system is both usable and feasible, though fixes are
recommended to meet the limitations. Trends in the quantitative data and logical inference based
on the context of the evaluation suggest that the online voting system might help the UEC to
produce more accurate voting process.

VII
TABLE OF CONTENTS

Declaration .11

Approval

Acknowledgements TV

LIST OF ACRONYMS v
LIST OF FIGURES

Abstract

vHI
CHAPTER ONE
INTRODUCTION 4
1.0 INTRODUCTION 4
1.1 BACKGROIJ1~~D OF THE STUDY 4
1.2 STATEMENT OF THE PROBLEM 5
1.3 PURPOSE OF THE STUDY 6
1.4 MAIN OBJECTIVE 6
1.5 SPECIFIC OBJECTIVES 6
1.6 RESEARCH QUESTIONS 7
1.7 SCOPE 7
1.7.1 Geographicalscope 7
1.7.2 ContentScope 7
1.7.3 Time scope 7
1.7.4 Significance of the study 7
CHAPTER TWO 9
LITERATURE REVIEW 9
2.0 INTRoDUCTION 9
2.1 INFORMATION COMMIJ1~nCATION TECI~OLOGY (ICT) 9
2.].] Website 11
2.1.2 Database 1]
2.1.3 Network 11
2.1.4 Internet 12
2.1.5 Voting process management 12
2.1.6 Voters’ registration 12
2.1.7 Communication 12
2.1.7.] Communication via LAN 12
2.1. 7.2 Communication via Internet 13
2.1.8 Votes casting, recording and counting 13
2.2. VoTES REPORT 13
2.2.1 ICT and Voting Process Management 13
2.2.2 Theoretical perspective 15
2.2.3 Related studies 16
CHAPTER THREE 18
METHODOLOGY 18
3.0 INTRODUCTION 18
3.1 RESEARCH DESIGN 18
3.2 RESEARCH POPULATION 18
3.3 SAMPLE SIZE .18
3.4 SAMPLING PRoCEDuREs 19
3.5 RESEARCH INSTRUMENTS 19
3.5.1 Questionnaires 19
3.5.2 Observation 19
3.6 DATA GATHERING PROCEDURES 20
3.6.1 Before the administration ofthe questionnaires 20
3.6.2 During the administration ofthe questionnaires 20
3.6.3 Ethical Considerations 20
3. 7.8 Limitations ofthe Study 21
CHAPTER FOUR 22
SYSTEM DESIGN AND IMPLEMENTATION 22
4.0 INTRODUCTION 22
4.1 OLD SYSTEM WEAKNESSES 22
4.2 ExPECTED VALUES OF THE NEW SYSTEM 22
4.3 SYSTEM REQUIREMENTS 22
4.3.2 Functional requirements 23
4.3.3 System Development Methodology 23
4.3.4 System Development Tools 23
4.3.5 Function needs ofthe system 23
4.4 SYSTEM DESIGN 24
4,4.1 Logical Design 24
4.4.2 Entity Relationship Diagram 24
4.4.3 Dataflow Diagram 25
4.4.4 Physical Design 27
4.4.5 Database Design 27
4.4.6 Login interfaces 27
4.4. 7 Voters’ registration form 28
4.4.8 Pollingform 28
4.4.9 Statistical votes results chat 29
4.5 SYSTEM DEVELOPMENT 29
4.5.1 Introduction 29
4.5.2 System implementation 29
4.5.2.1 Registration 30
4.5.2.2 Creating an account 30
4.5.2.3 Login 30
4.5.2.4 Cast the vote 30
4.5.2.5 View the results 30
4.6 COMPONENTS OF THE ONLINE VOTING SYSTEM 31

2
4.6.1 Online Voting System Home Page 31
4.6.2 Registration Form 31
4.6.3 Login Frame 32
4.6.4 Voter ‘5 account 33
4.6.5 Polling Frame 33
4.6.6 Candidates’ Frame 35
4.6.7 Database 35
4.6.8 Findings 35
5. SYSTEM CONVERSION 36
CHAPTER FIVE 37
SUMMARY, EVALUATION, CONCLUSION, AND RECOMMENDATIONS 37
5.0 INTRODUCTION
5.1 SUMMARy
5.2 EvALUATION OF THE NEW SYSTEM 37
5.3 CONCLUSION 38
5.4 RECOMMENDATIONS 38
REFERENCES
APPENDICES 41
APPENDIX I 41
APPENDIX II 46
APPENDIX III 47
APPENDIX IV 48
APPENDIX V 49
APPENDIX VI 50
APPENDIX VII 51

3
CHAPTER ONE

INTRODUCTION

1.0 Introduction
This study focuses on design and implementation of an online voting system for Uganda,
managed by Electoral Commission that will facilitate Uganda citizens in the diaspora and in the
country, to vote via Internet with a major focus on the overcoming of the election material and
time costs and allow anyone who would like to cast his/her vote, to do so from where he/she is
without going to line up at the polling stations. A good electoral process is one that ensures the
preservation of the secret ballot, accuracy, privacy, integrity and proper tabulation of the voter’s
intent regardless of his or her physical condition, language of origin, or literacy ability. The
election system must be sufficiently strong to withstand a variety of fraudulent behaviors, must
be sufficiently transparent and comprehensible that voters and candidates can accept the results
from an election. Indeed, free and fair elections are a component of all definitions of democracy.
The online voting system will work in parallel with an existing one. The existing system is
conducting election process in a traditional manner, where the voters have to go to line up at the
polling stations. However, the new system will no replace completely the old one since the
online voting system requires some computer knowledge to use it. Thus, the old system will be
maintained to serve those who are ignorant in computer environment until when every Ugandan
will be able to use a computerized system.

1.1 Background of the study


In a true democracy, elections are the basis for the nation’s political health. Elections allow the
populace to choose their representatives and express their preferences for how they want to be
governed. Naturally, the integrity of the electoral process is fundamental to the integrity of
democracy in any developing country like Uganda. Nowadays, the issues of combining voting
with information technology can develop an online voting, which is voting on the internet
without limiting people in the polling station but needs higher level of security. By using
Information Technology, online voting system can cast and count votes with higher convenience
and efficiency, even make the electoral procedures simple and reduce the mistake rate of ballot
examination.

4
At the global level, electronic election started in the year 2000 for presidential election in United
States of America. The aim was to increase participation, lower the costs of running elections
and improve the accuracy of results. This briefing note looks at options for using new
technologies in voting, focusing on the pros and cons of Internet voting and the implications of
such a radical change in the way that elections are conducted, Jung-Ying Lai (2003).

In Africa, some countries still experience political and ethnic divisions, confirming that Africans
do not trust the counting of votes which is carried out manually. So, the dynamic of elections
should be changed from a traditional to an electronic one. So far, no African country has tried to
implement an electronic voting, Kyanda 5. (2004).

In Uganda, the voters suggest the concept of an online voting, by integrating Information
Technology to satisfy the characteristic of election such as uniqueness, accuracy, completeness,
verifiability, audibility, and privacy. This can also facilitate those in the Diaspora to vote from
abroad via the Internet at the time of voting to exercise their right, Kyanda 5. (2004).

This project intends to come up with an online voting system prototype that will facilitate any
Ugandan citizen to enjoy the right of casting the vote from where he/she is via the Internet.

1.2 Statement of the problem


The Government of Uganda attaches great importance to the free and fair elections. It recognizes
the fact that free and fair elections for all is a powerful tool for transformation of society, in a
way that elections play a key role in achieving moral, intellectual, ideological, cultural, social
development and prosperity for the people in the society as well as achieving national goals of
unity, democracy, financial progress and security for all its citizens, (White Paper, 2001).

The government of Uganda, according to the White Paper, (2001), is fully conscious of the
problems it is facing in its effort to cause rapid improvement of democratization. The quality of
elections has been seriously eroded at all levels due to depredation of war, civil strives and the
consequent financial decline during the last two decades. Ugandan citizens have experienced
dictatorship problem, security was just a dream, people were demoralized and many of them
have been killed during elections and others have been forced to take exile where some of them

5
are still outside the country and have no right to enjoy and participate in democratic exercise that
is taking place in the country.

In Uganda, it has been proved that election malpractice and or fraud has become a threat to the
democratization process. Furthermore, the corruption, loss of lives in election process, the delays
in election materials and high costs of conducting elections in a traditional manner have become
a burden for the country. Thus, IT has to be considered as a good solution for the above
problems.

In the light of the above scenario, the prevailing problem which this study intends to solve, is the
design and implementation of an online voting system which is the better solution for all
Ugandans wherever they are, because in case Ugandans in Diaspora are deprived of their voting
right, they may be a problem to the current regime by creating a strong opposition through which
they hope to be treated like other Ugandan nationals. This system will handle such problem since
it will be uploaded so that anyone can access it form the Internet wherever hi/she is located.

1.3 Purpose of the study


The purpose of this study is to design and implement a web based voting system that will
facilitate Ugandan citizens abroad and in the country to vote via the Internet without going to
line up at the polling stations.

1.4 Main Objective


The main objective of this study is to design and implement an online voting system that will
facilitate Uganda citizens abroad and locally to vote via Internet in order to achieve a democratic
goal.

1.5 Specific objectives


1) To investigate the existing voting system in Uganda
2) To analyze the requirements of the new voting system
3) To design a database to store the voters’ identification and votes
4) To build a dynamic website that will serve as interface between the users(voters) and the
voting system
5) To implement and test the web based voting system prototype to ensure that it is of
expected quality

6
1.6 Research questions
1) Is it possible to design and implement an online voting system that will facilitate Uganda
citizens abroad and locally to vote via Internet?

2) Is it possible to design a database to store the voters’ identification, record, counting and
display statistically vote results?
3) Is it possible to build a dynamic website that will serve as interface between the users
(voters) and the voting system?

1.7 Scope

1.7.1 Geographical scope


The study will be conducted in five divisions of Kampala district ( Kampala central,
Kawempe, Makindye, Rubaga and Nakawa) .The investigation will look upon the voters,
candidates and Electoral Commission staff as well.

1.7.2 Content Scope


The study will investigate the existing voting system in Uganda and analyze the
requirements of the upcoming system.

1.7.3 Time scope


The study will cover the period of five months (May-September, 2012) as shown in
Appendix II.

1.7.4 Significance of the study


The following disciplines will benefit from the findings of the study: The entire Uganda
community in general and Diaspora in particular will recognize the role they have to play
in Electronic ICT resources availability and their utilization in democratization exercise.
Furthermore, the voters will get their full right of casting their votes from everywhere
they are without queuing at the polling stations.

The government of Uganda will aim to achieve the good of good governance and
democracy. Then, it will save costs in terms of money and time it usually use to purchase
and ship the ballots; security will be sure and no cheating will be experienced since the
voters will be voting in absolute secret and the system will be designed in a such way that
no one will be given a gap for cheating.

7
The Uganda Electoral Commission will use the findings as empirical information to
improve the modern way of voting, quality standard in terms of democracy in Uganda
toward a free and fair election in countrywide and in Diaspora communities.

The future researchers will utilize the findings of this study to embark on a related study.

8
CHAPTER TWO

LITERATURE REVIEW

2.0 Introduction
This chapter involves looking through earlier research documents and related literature with an
aim of identifying a problem of concern such that no duplication of earlier research work was
done. This was sourced by reviewing documented resources such as text books and online
publications, related with the research topic.

2.1 Information Communication Technology (ICT)


In today’s world, Information and Communication Technology (ICT) is rapidly growing and
being widely used in different aspects of human life. According to Internet work stats (2010), 1.9
billion users have been using Internet by June 30, 2010. Since Internet is a main basis of ICT,
these facts and One Man International Company Business Model 301 figures that show 448
percent increase from 2000 to 2010 in World Internet Users and Population Stats, indicate the
growing role of ICT in human life, David F. (2000).

In the field of Politics, Information and Communication Technology (ICT) has emerged as
voting and online voting. Computer scientists who have done work in, or are interested in,
electronic voting all seem to agree on two things:

1. Internet voting does not meet the requirements for public elections
2. Currently widely-deployed voting systems need improvement, Charles W. (2000).

Voting on the Internet using everyday PC’s offers only weak security, but its main disadvantages
are in the areas of anonymity and protection against oppression and/or vote selling. It’s such a
truly bad idea that there seems to be no credible academic effort to deploy it at all. The USA
Presidential elections of 2000 brought national attention to problems with current American
methods of casting and counting votes in public elections. Most people believe that the current
system should be changed; there is much disagreement on how such changes should be made,
Jamie B. (2003).

9
Other researchers have done work in electronic voting; while they may not explicitly mention
voting from remote poll sites, their work is nonetheless relevant to any effort at designing or
implementing a remote poii site voting system. Lorrie C. (2002) could be classified, like the
Caltech researchers, as a cautious optimist. She acknowledges the problems inherent in each kind
of voting apparatus, but doesn’t make an overt recommendation on her site for one technology
over the rest.
Mercuri, R. (2002) invented the Mercuri method for electronic voting. A critical component of
this method is very similar to the Caltech proposal: a voting machine must produce human-
readable hardcopy paper results, which can be verified by the voter before the vote is cast, and
manually recounted later if necessary.

David, C. (2002) presents a very interesting scheme, Available at


http://www.vreceipt.com/article.pdf), whereby voters could get receipts for their votes. This
receipt would allow them to know if their votes were included in the final tally or not, and to
prove that they voted without revealing any information about how they voted. The security of
this scheme depends on visual cryptography developed by Naor and Shamir, and on voters
randomly choosing one of two pieces of paper.

Dr. Michael, S.(2002) provides a sharp counterpoint to Mercuri’s view. He is less afraid of the
catastrophic failures and sweeping fraud made possible by imperfections in electronic voting
machines actually occurring in a real election. Shamos is also much less impressed with paper
ballots than is Mercuri. He places a great deal of faith in decentralization to make fraud difficult
to commit and easy to detect.

According to Reding V. (2008), ICT has increasingly been identified as a major contributor to
the process of business development and improvement and it has been identified that ICT is
responsible for around half of productivity growth in modern economies. It drives improved
efficiency and better services and products across the entirely of the private and the public
sectors.

According to BBC, (2005), the use of ICT has affected every aspect of business, transforming
not only the way that business is conducted but also creating new business sectors and jobs. The

10
creation of companies like Google and e-Bay which did not exist 10 years ago, was only made
possible by advances in ICT and the changes that this has created in the way that people behave
(currently Google is valued at 44~billion).

According to Ronamald T. & William C. (2003), Information Technology refers to as a system


that is both simple and complete and electronic hardware devices and informal (word-of-mouth)
communication chain net or computer based information system that use hardware and software,
Net Internet and other communication networks that transform data resources into an endless
variety of information products.

2.1.1 Web site


A website is a set of related web pages containing content (media) such as text, image, video,
audio, etc. A website is hosted on at least one web server, accessible via a network such as the
Internet or a private local area network through an Internet address known as a Uniform
Resource Locator, Ronamald T & William C.B. (2003).

2.1.2 Database
Widom J. (2001) defines a database as a collection of data, organized for access and
modification preserved over a long period.

According to C.J.Date (1990), a database is a computerized record keeping system; that is, it is a
computerized system whose overall purpose is to maintain information and to make that
information available on demand.

2.1.3 Network
Andrew S. Tanenbaum (2002) defines a network as an interconnected collection of autonomous
computers and other communication devices that are able to share resources and exchange the
information.

According to Glenn Berg (1998), a network is a set of interconnected systems with something to
share. The shared resource can be data, a printer, a fax modem, or service such as a database or
an e-mail system. The individual systems must be connected through a pathway (called a
transmission media) that is used to transmit the resource or service between the computers. All
the systems on the pathway must follow a set of common communication rules for data to arrive
at its intended destination and for the sending and receiving systems to understand each other.

11
2.1.4 Internet
According to Layman L. (2001), Internet is a network of networks. Internet is basically a
collection of computers that span the entire globe and connected by satellites, cables, routers and
switches etc. Communication between these computers is by a protocol called Transmission
Control protocol / Internet Protocol (TCP/IP). Using one Computer on the Internet, you can
access another computer on the Internet to obtain data such as Pages, Videos, Audios, and
applications, also over the same Internet one can place a phone call.

To logon to the Internet, a Personal Computer (PC) must have a Browser application program
running on it. Browsers include Internet Explorer, Mozilla Firefox, Google chrome, Netscape
navigator, etc. Documents, files, movies, audio files and any other Internet data can be stored on
a certain Computer over the Internet and each bearing a special Uniform Resource Locator
(URL) address specifying the computer on which this information is residing and the path to this
file on the computer where it is found.

2.1.5 Voting process management


Online voting process management like any other Information system refers to as an organized
combination of people, hard wares, Soft wares, communication networks and data resources that
collects, transforms, stores and disseminates information in an organization.

2.1.6 Voters’ registration


Internet voting goes a step further in the sense that it implies electronic registration, culling and
counting of votes cast from different locations. It typically allows voters to use a more genetic
technology such as the Internet, to register or cast their votes from any preferred place be it from
the home, from the office or even from an Internet cafe while traveling abroad, Norbert Kersting
(2004).

2.1.7 Communication

2.1.7.1 Communication via LAN


A LAN (Local Area Network) supplies networking capability to a group of computers in close
proximity to each other such as in an office building, a school, or a home. A LAN is useful for
sharing resources like files, printers, games or other applications, Bradley Mitchell (2010).

12
2.1.7.2 Communication via Internet
According to Jay Dax Designs (2000), Internet is a great alternative to the conventional methods
of communication. Using Internet you can: send an e-mail, send a fax by e-mail, receive fax by
e-mail, chat to an individual, send and receive instant messages, chat to a group, talk by voice
(Internet telephony), video conferencing, register for voting, cast votes, and display votes report.
In e-voting, Internet is used for online voters’ registration, online vote casting and online election
results updates checking. Furthermore, the voters can interact with BC staff by sending and
receiving messages via the Internet.

2.1.8 Votes casting, recording and counting


Voting by polling machine simply refers to the use of any electronic apparatus to record and
count votes in a fixed public place. This may be a specialized voting machine in a voting booth
or a standalone personal computer (PC) specially installed for this purpose in a voting kiosk.
Polling machines may be specially helpful for a reliable, objective, efficient and expeditious
counting of votes and may also offer some possibilities for electronic verification (for example
verification of whether the user is indeed entitled to vote and whether the vote is cast correctly).

2.2. Votes report


In a web based voting management system, the elections results are displayed on the electoral
commission web site for the public to see. The election results can also be sent to the voters e
mail addresses or by sms via voters’ cell phones. The results will be shown at the end of election
exercise.

2.2.1 ICT and Voting Process Management


E-voting has been used in Europe, for legally binding elections, since at least 1982, Niemoller,
D. K. (2004). Its use is still not widespread, though interest has increased. The Netherlands was a
very early adopter, and it was almost a decade later (1991) that Belgium started experimenting
with e-voting. Just a few years later, in the mid-nineties, France did the same. By the early
2000’s, experiments or pilots had been run in the United Kingdom, Italy, Spain and the Republic
of Ireland, among others, Benoit, D. K. (2004).

In the absence of controversy, surveys of voter attitudes usually reflect satisfaction and trust.
When concerns are raised by experts and in the media, however, public opinion can change

13
dramatically. For example: in Ireland in 2003 a survey by Amarach Consulting found that a
majority of Irish citizens were in favor of the introduction of e-voting.

This instinctive trust of c-voting systems also appears to exist amongst officials. When
government representatives speak about e-voting it tends to be in very positive terms. Their
statements emphasize the benefits of e-voting; the largest obstacle, from their point of view, is
usually gaining the voters’ trust. The idea that the system in question might not deserve such
trust is given little or no attention, except where it overlaps with “allaying public concern” about
the security of the system. Two prime examples of this are the web pages for the voting systems
of the Irish Government and the Swiss state of Geneva.

In reality, implementing e-voting is not so simple. According to Mercuri, R. (2000), identified


one of the most significant obstacles — the conflict between the requirements for secrecy and
accuracy. Serious problems also arise from the way in which voting systems are currently
developed. To knowledge there is still no voting system that has been treated as safety-critical in
its development and deployment. The components of the systems are, in general, proprietary.
These and other factors have combined to create serious issues in legally binding elections.

Examples of worrying incidents in real elections in the US have been gathered by the Verified
Voting Foundation’s Election Incident Reporting System.

This study attempts to address the challenges faced by Uganda and other developing countries in
the use of c-voting by proposing a strategy aimed at reducing the setup and operational costs for
election process, increasing the potential for sustainability and creating an envirornrient that will
encourage the development of the ICT infrastructure.

14
ONLINE VOTING SYSTEM

DATABASE

VOTERS’ REGISTRATION

WEBSITE
: COMMUNICATION

NETWORK
: VOTES CASTING
:

: :
INTERNET VOTES RECORDING

:
VOTES COUNTING

VOTES REPORT
:

Fig.O Conceptual Modelfor an online voting system.

Source: Morgan and Harnns (1986)

2.2.2 Theoretical perspective


This study is based on the open systems model which looks at an organization as a complex
living organism which interacts with its environment. The organization is depicted as distinct and

15
separate from its external environment but with permeable and often ill-defined boundaries. It is
a purposeful entity producing output which it exchanges with stake holders in its external
environment in return for resources and support and so is dependent upon its environment.
In this study, our web based voting system will be an open system that will allow the system
administrator to upgrade it when need be. Its components such as Database, web site, networks
and internet will be independent so that in case of any upgrading task performed on a particular
component will not affect the other. However, all these components will be interacting and work
as a single system.

2.2.3 Related studies


ICY and Voting Process Management

Fujioka et al. (1992) pioneered the verifiability in e-voting protocols by forcing voters to involve
more than one round. Voter has to participate in the counting stage by checking that his vote is
listed correctly in the tallying list, and then sending a part of the vote in order to complete voting.
In this protocol, verifiability is defined as “No one can falsify the result of the voting”.

Later, Sako et al. (1995) introduces the concept of universal verifiability to emphasize the
importance of auditing of overall election by categorizing the verifiability as individual
variability and universal verifiability.

Further e-voting studies apply this categorization. Sako et al. defines individual and universal
verifiability respectively as “A sender can verify whether or not his message has reached its
destination, but cannot determine if this is true for the other voters” and “In the course of the
protocol the participants broadcast information that allows any voter or interested third party to
at a later time verify that the election was performed properly”.

Cranor et al. (1997) makes the definition of universal verifiability narrow by limiting it as just
counting the votes and defines verifiability as “Anyone can independently verify that all votes
have been counted correctly”. Most of the later studies use this definition since it is much more
specific and measurable.

16
He et al. (He 1998) and Riera et al. (Riera 1998) give a variant of the aforementioned definitions
for verifiability. He et al. handles verifiability as “Every voter can make sure that his vote has
been taken into account in the final tabulation”; and Riera et al. handles verifiability as “A
system is verifiable if voters can independently verify that their votes have been counted
correctly”.

Karlof et al. (2005) combines the verifiability definition without distinguishing universal or
individual as follows: “Verifiably cast-as-intended means each voter should be able to verify his
ballot accurately represents the vote he cast. Verifiably counted-as-cast means everyone should
be able to verify that the final tally is an accurate count of the ballots.”

It is obvious that all the above studies left a knowledge gap in their researches. No one of the
above authors talked about web based or online / Internet voting, where by a voter can cast
his/her vote from anywhere he/she is without going to line up at the polling station. Therefore,
this study intends to assess an existing voting system and integration of ICT in voting process in
Uganda. Furthermore; the study will design and implement an online voting system for Uganda
Electoral Commission that will facilitate Uganda citizens abroad and in the country to vote via
Internet without going to line up at the polling stations.

17
CHAPTER THREE

METHODOLOGY

3.0 Introduction
This chapter includes items like research design, research population, sample size, sampling
procedures, research instruments, data gathering procedures, data analysis, system development
methodology and tools and project plan schedule.

3.1 Research Design


The research design is the strategy used in the research to identify and isolate the most
appropriate design for a study. This research used the descriptive correlation survey and expost
factor designs. It described the characteristic of respondents, and the relationship between the
ICT and Voting Process Management. It was expost-factor because the researcher got the facts
as they already existed in the field. It was a survey because it involved a big sample.

In data gathering both quantitative and qualitative approaches were considered. Both primary
and secondly data were gathered. Primary data are responses retrieved from respondents whereas
secondly data are from documents, report literature and related publications.

3.2 Research Population

The target population included a total number of one hundred sixty four (164) senior, middle,
and lower staffs of Uganda’s Electoral commission which is up to now operating in a traditional
way. This is because; the three categories of staff are able to give complete and concrete
information that can be used to determine requirements for the system under investigation. The
research also targeted Electoral commission agents and voters in order to augment the
information gathered from the target institution.

3.3 Sample size

As a number of population is big, a sample from the target population was taken. The Sloven’s
formula was used to determine the minimum sample size.

T~= N = 164 =116


~ 1+Na2 1+164(0.052)
18
Where n= sample size, N= population and a2= 0.052 level of significance. From the population
of 164 administrative staff, the researcher selected a minimum sample of 116.

3.4 Sampling Procedures


The purposive sampling were utilized to select the respondents based on these criteria:

1. Male or female respondents in any of the LC 1 from five divisions in Kampala District.
2. EC staff and Agents with experience under ICT discipline ranging from one year and above.
From the list of qualified respondents chosen based on the inclusion criteria, the random
sampling were used to finally select the respondents with consideration of the minimum sample
size.

3.5 Research Instruments.


The research instruments included interview, questionnaires and observation. Interview can give
information about policies, procedures and the prevailing situation in the organization. Some
information may not be got from other methods, therefore we used interview. Interview can be
approached by looking at different levels. Top management and lower cadre’s levels. Interview
may be structured or unstructured. Structured interviews include only questions you have
planned and written out in advance. By sticking with this script, you can ask a number of people
identical questions and compare their answers. In the other hand, unstructured interviews also
include questions prepared in advance, but you can vary from the line of questions and pursue
other subjects if it seems productive.

3.5.1 Questionnaires
Questionnaires are set of documents with questions that are sent out to respondents.
Questionnaires are useful for getting information from large group of people when you cannot
get around to interview everyone .Questionnaires may also yield more information if respondents
can be anonymous. In addition, this tool is convenient, is inexpensive, and yields a lot of data.

3.5.2 Observation
Observation technique was used by the researchers to monitor obvious items of the system
without applying interview or questionnaires methods. These led to the best conclusion of the
whole situation within the Electoral Commission. Through observation, the researchers saw how

19
voters interact with EC agents (during by election exercises), how time of voting was not enough
and how people in diasporas had no right of voting; etc. The observation was conducted secretly
by the researchers as participant observers in order to get more insights by experiencing the
conflicts and responsibilities of the people they were working with. We avoided making people
to know that they were being observed, because they might falsify their behavior in some way.

3.6 Data Gathering Procedures

3.6.1 Before the administration of the questionnaires


1. An introduction letter was obtained from the College of Applied Science and
Technology (CAST) for the researcher to solicit approval to conduct the study from
respective administrative entities.
2. When approved, the researchers secured a list of the qualified respondents from the
research areas’ authorities in charge and selected through random sampling from this list
to arrive at the minimum sample size (116 respondents).
3. The respondents were explained about the study and were requested to sign the
informed Consent Form.
4. We reproduced more than enough questionnaires for distribution.
5. We selected research assistants who assisted in the data collection; briefed and oriented
them in order to be consistent in administering the questionnaires.

3.6.2 During the administration of the questionnaires


1. The respondents were requested to answer completely and not to leave any part of the
questionnaires unanswered.
2. The researchers and assistants emphasized retrieval of the questionnaires within five
days from the date of distribution.
3. On retrieval, all returned questionnaires were checked if all were answered.

3.6.3 Ethical Considerations


To ensure confidentiality of the information provided by the respondents and to ascertain the
practice of ethics in this study, the following activities were implemented by the researchers:

1. The respondents were coded instead of reflecting the names.


2. We solicit permission through a written request to the concerned officials of the
administration entities included in the study.

20
3. We request the respondents to sign in the Informed Consent Form
4. We present the findings in a generalized manner.

3.7.8 Limitations of the Study


In view of the following threats to validity, the researchers claimed an allowable 5% margin of
errors. Measures were also indicated in order to minimize if not to eradicate the threats to the
validity of the findings of this study.

Extraneous variables which were beyond the researchers’ control such as respondents’ honesty,
personal biases and uncontrolled setting of the study.

Instrumentation: The research instruments on ICT resources availability and utilization were
not standardized. Therefore a validity and reliability test was done to produce a credible
measurement of the research variables.

Testing: The use of research assistants could bring about inconsistency in the administration of
the questionnaires in terms of time of administration, understanding of the items in the
questionnaires and explanations given to the respondents. To minimize this threat, the research
assistants were oriented and briefed on the procedures to be done in data collection.

21
CHAPTER FOUR

SYSTEM DESIGN AND IMPLEMENTATION

4.0 Introduction
This chapter explains the logical design, physical design developed by the researcher, entity
relationship diagram, data flow diagram, the new design system, data input and findings from
questionnaires and observation. The new system is designed to meet the needs of Electoral
Commission as far as voters’ registration and election results report are concerned. It is also
designed to ensure accurate voters’ record keeping and provide better services to voters. It will
be expected to overcome the shortfalls associated with the current voting system that uses
traditional manual methods to operate.

4.1 Old system weaknesses


The existing system uses traditional manual methods to operate. Voters line up at the polling
station to be able to cast their votes. Sometimes; some voters do not go for vote because they do
not like queuing. During votes counting, there is vote rigging due to the lack of secure system to
control any kind of fraud. Ugandans in Diaspora do not have right to exercise their voting right
because it is very hard for them to come for voting in the country

4.2 Expected values of the new system


In the light of the above system weaknesses, the researcher intends to design and implement an
online voting system that is expected to improve efficiency in conducting the voting processes,
hence saving time and money. Further, it has to ensure the preservation of the secret ballot,
accuracy, privacy, integrity and proper tabulation of the voter’s intent regardless of his or her
voting right, and political preferences.

4.3 System requirements


4.3.1 User requirements
This involved the project developer identifying and analyzing the end-users’ needs. Users
describe the people who would use the system and these mainly were the EC staff and agents,
voters, and other authorized persons. Requirements were what the intended users were required
of the system that is, what requirement could be met for them to perform effectively.

22
4.3.2 Functional requirements
Functional requirements are statements of services the system should provide, how the system
should react to a particular inputs and how the system should behave in a particular situation. In
some cases, the functional requirements may also explicitly state what the system should not do.

4.3.3 System Development Methodology


The system was developed using the system development life cycle. During the planning phase,
the researchers identified the scope and the boundary of the system and planned the development
strategy and goals. In the analysis phase, the researchers studied and analyzed the problem,
causes and effects of the new system and also analyzed the requirements that had to be fulfilled
for the new system to be successful. The researchers then designed the new system and
developed a prototype .In the implementation stage, the prototype was put in use and tested.

4.3.4 System Development Tools

This involved a collection of programs, routines and subroutines that facilitated programming
and operation of the system, but also included documentation and operational procedures.A
content management system “Joomla 1.5.26” was used to develop a system’s website and user
interfaces. MYSQL server used to build a powerful database to store the information and handle
the large number of voters. This is because MYSQL can be used in distributed computing, in a
networked environment. The application operates on Windows7 ultimate and Windows server
2008 operating systems. This is because windows operating system is user friendly and widely
used in many organizations. Windows Internet Explorer 8 was used as a web browser.Other
requirements included RAM for Windows (2 GB), disk space at least 160 GB, printer, monitor.
A dual core processor with at least 3GHZ was used to enable faster computation and allowed
further investigations of new components into the application and run it.

4.3.5 Function needs of the system


The function needs of the system included online voters’ registration, vote casting, counting,
storing and report.

23
4.4 System Design
System design is specification or construction of a technical, computer based solution for the
business requirements identified in a system analysis. Whereas system analysis emphasizes the
business problem, system design focuses on the technical or implementation concerns of the
system. It is driven by the technical concerns of the system designer. System design is looked at
from the three perspectives: Logical design, Physical design and Database design.

4.4.1 Logical Design


Logical design (logical models) depict what a system is or what a system must do but not how
the system will be implemented. They are implementation independent that is they depict the
system independent of any technical implementation.

Logical design is concerned with the conversion of logical records structures of a data model
supported by a database management system identifying entities and their matching attributes
and the relationship types determining the attributes domain. It involves the use of entity
relations diagrams.

4.4.2 Entity Relationship Diagram


An entity relationship model is part of system development methodology that provides an
understanding of the logical data requirement of a system independently of the systems’
organization and process. It also reflects a static view of the relationship between different
entities

Figure 0. Entity Relation Diagram

24
From the above diagram, one candidate can be voted by many voters. From the above diagram
the relationship between the voter table and candidate table is many to one.

4.4.3 Data flow Diagram


Data flow diagram is a tool that depicts the flow of data through a system and the work of
processing performed by the system (Jeffrey and Whitten, 200l)Jt can also be described as a
graphical modeling technique that models the sources and destination of data inputs and outputs
and the data maintained by the information system. It’s a graphic design that shows both how
data flows to, from and within an information system and various processes that transforms the
data.

25
The above flow chart shows how the voter interacts with the online voting system. When a voter
casts the vote to the candidate the system enters the vote into the database and it displays the
updated results.

4.4.4 Physical Design


Physical design (physical models) show how not only what a system is nor does, but also how
the system is physically and technically implemented. They are implementation dependent
because they reflect technology choices and limitations of those technology choices.

4.4.5 Database Design


Database design was the process of producing a detailed data model of the database. This logical
data model contained all the needed logical and physical design choices and physical storage
parameters needed to generate a design in a contents management system (Joomla), which was
then used to create the database. Database design was the process of translating logical data
models into physical database schemas. Data models are the standard way to show the complete
picture of the data used and stored by the system. The designer used a Contents Management
System (Joomla 1.5.26) and Wamp server 2.0 to come up with data model.

The design of the Online Voting System has been tailored to fulfill the objectives of the project.
Section 4.1,4 looks at the design of the interface, section 4.1.5 looks at the Voters ‘Registration
form, 4.1.6 looks at Polling form, section 4.1.7 looks at Statistical votes results and 4.1.8 looks
at Results updates form.

4.4.6 Login interfaces

Usrn~e~

Figure 2 shows Login interfaces

This is where the only registered voter has the right to login and view either the polling menu for
voting or to view the election results.

27
4.4.7 Voters’ registration form
~ REGISTRATION FORM
R~qofred

FISRT NAME

LAST NAME

GENDER * M

AGE 15/0812012

NA]1ONAUTY

OCCUPATION

ADDRESS

~ATHERS NAMES

MOTHERS NAMES

FATHERS
OCCUPATION
SUBMIT RESET

Figure 3 shows voter’s registration form

In order to get right for voting or viewing the election results updates, the voter has to fill the
following form to get registered with the Online Voting System.

4.4.8 Polling form


Cast Your Vo~ Now
*
V ~<MUS~V~N~
A~3~ BWA~PflkA
~ETT’C ~

i~N WK4AMUZ8
T~W3~A QaOrB

Figure 4 shows pollingform

This is where the candidates’ names appear with the option of voting by selecting the name of
the candidate of your choice. To vote, you select a radio button behind the candidate’s name. The
poling frame is entitled “Cast your vote now”.

28
4.4.9 Statistical votes results chat
Cas~You,~ Vote Now
~ W KWEFE~
1647%
~ K Mq$EV~H 1647%
ABeD ~WAt~áKA~ 33 ~%
B~W NAMS.~3~c3c~ 0%
B1pAt~D~ ~$SA14 ~0%
~ kYArØ~Jz~ 1847%
OBQT~- I4~

1bf~at vo~e~~ ~
~ have~ ~1read~/ vqtéd
On~ o~ø Vote per user is
showed.
View d.~a%

Figure 5 shows statistical vote’s results chart

This is where the updated statistical election results will automatically appear after casting a
vote, showing the name of candidates, the number of people that have voted so far and the
number, percentage and graphical representation of the votes each candidate has got.

4.5 System Development

4.5.1 Introduction
This contains program testing, project implementation, user interfaces and system conversion.
System implementation entails the construction of the new system and delivery of that system
into production. Prior to system implementation, it’s necessary to carry out training since it
enables users to gain maximum benefits from the new system. Managers should learn that the
system is capable of functioning to the benefits of the organization. Operators need training in
how to interact with the new system.

4.5.2 System implementation.


To implement the system acquiring the installation of requirements e.g. hardware and software
was needed. Planning analysis and project writing was done. The System was designed and users
were trained on how to use the online voting system. System testing and review was also done to
ensure that it was performing as it was designed to perform. It was reviewed to ensure that it has
met the objectives The System was then implemented and a report was written. This scheme
contains five main stages namely:

29
1. Registration

2. Creating an account

3. Login

4. Cast the vote

5. View the results

4.5.2.1 Registration
In order to get right for voting or viewing the election results updates, the voter has to fill the
registration form to get registered with the Online Voting System.

4.5.2.2 Creating an account


In order to get the full right of login for voting or viewing the election results, each voter has to
be with an account with the system. This is where you are authenticated to enable you vote once
your details are identified. A voter’s account is created by filling the appropriate form.

4.5.2.3 Login
This is where the only registered voter has the right to login and view either the polling menu for
voting or to view the election results. The login form prompts the voter to enter the online voting
system.

4.5.2.4 Cast the vote


After the voter has registered and logged in, a list of candidates appears. This where the
candidates’ names appear with the option of voting by selecting the name of the candidate of
your choice. To vote, you select a radio button behind the candidate’s name. The poling frame is
entitled “Cast your vote now”.

4.5.2.5 View the results


After casting a vote the updated statistical election results will automatically appear, showing the
name of candidates, the number of people that have voted so far and the number, percentage and
graphical representation of the votes each candidate has got.

30
4.6 Components of the Online Voting System

4.6.1 Online Voting System Home Page


This is the welcome screen for voters .It shows information about the Electoral Commission. The
voters read carefully the information from this Home Page before they login for voting or
viewing the election results updates.

l000thnst cotcng.~ j,~dNhilifVO1ll’ill -~ ] I oeiuusvonets o

+ ~.i lntalhntt1 i.e ~‘- ,0 * ~‘


—~

Flash tslaypr

ONL~NE VOTING SYST


~ EXERCISE
0~
YO5 onc.n 0

__________ @ ONLINE VOTING SYSTEM


Usemitm(e
WELCOME TO OUR ONLINE VOTING SYSTEM
The Eioctonol Cnttonisxiott iso sto.000ey body estolthslied sonlee Aotiole 60 of the Coottitotion of the
Republic of Ugaoda. with the mandate of coodontiog eegsdae. (eec and fine eleodoos and eefeeeoda.
Reá~berMe ~y
In line with our -vision of beootning a model ieaeltvtico and centre of excellence in election
~yi~4~s ~ktWi(1
*q ~ nt000gse000e’, the EC hot etobeelced no itnpletneutiog o ootnpeebourive plan dined ot oontinoously
9 improving the ,0000gettont of electorol processes.

This svebsite is one of the ehnnuels we expect to ole io edocotiog nod sensitising voters on elcctiotts
OyUosw Nfl and refeeendo for effective
We itt Eleotceel Coooniteinn snoo~y believe in haeoessiog the potential of eoodeto technology, like the internet, to
ptovide slId itd’ctntodoti and ditto (It tree iliot,dly fontiat) Ott dnvnlnpotootn in electicsi s0000getttnnt in Uganda nbc din
post two denadet. The site will also highlight hey ocltieceotentt in the development of elentoral democracy 0 Ugaoda, as
] svefl an the challenges esoontOeeed in the process

The site ilntltee penvides neetid iofcetnotion, doted at ednooting the geoecal pohilo, nod voted in potticolor. on the vatiotts
aspeots of die electoral process, tlonogh an integeoted t0000gemetit of infntttzatinn system foe efficiency mci
effecticeness.
At the same time, we believe this (site) still enable us (an nlentino os000gees) to receive and respond to issues thot you.
one esteeinedpttbhc, will raise front tIne to dine
4 As the PC aitus Os bettee deliverc of electoral sosonces in Ugaodo, we realise the hnpontnnoe of public soppoet and
iosolveeneot I theoefoee, invite you on stokeholdeos, to join and snppntt one efforts of toldng election to an even notch
higher lesel

Cnpyll9lti di 2012 mliii Rdittls R000tcod


0020006 by lvEMSAEOZIiACRIJIIE

Figure 6 shows the home page of online voting system web site

4.6.2 Registration Form


In order to get right for voting or viewing the election results updates, the voter has to fill the
following form to get registered with the Online Voting System.

31
1~ON NT~M-~ —

- lecaihost p

flash ~ia

ONLINE VOTING SYS~~


EXERC~j_~U

_________ ~ REGISTRATION FORM


U~emetpo Required *

Passw~d FISRTNAME

LAST NAME
M
GENDER
Ft~obro~d~ F
o~u ~h~tfi AGE 1710812012 La
NA11ONALrr(~

OCCUPA11ON

ADDRESS

FATHERS NAMES

MOTHERS NAMES

4 FATHERS
OCCUPA11ON
SUBMIT RESET.

Cspyclghl 02012 All ROOtS Reseived


Designed by KEMBARAZI JACKUNE

Figure 7 shows voter’s registration form

4.6.3 Login Frame


This is where the only registered voter has the right to login and view either the polling menu for
voting or to view the election results.

Usorname

Passwo,rd

Remerpber Me

~,r~ot~p~Jr 3sEth~d?
For’f~ooq~e dtq~
Stó~D~öOUflL

Figure 8 shows voter’s login frame

32
4.6.4 Voter’s account
In order to get the full right of login for voting or viewing the election results. each voter has to
be with an account with the s~ stern. This is where you are authenticated to enable you vote once
your details are identified. A voter~ s account is created by filling the form below:

-. j P,,~:.., ~ ‘g~t,_~n

(,. I”.-”,- ,‘J --- —‘

Gal Mob’
- - FlDobpbver

O5\~LllNE VOTING SYSTEM


r ~

--— -loina A~ oul Us Ro’~sir Pc bc~I f’arlias c~ntacta ~an ic~ato~

I - - C REGISTRATION
Usernamo Name

Usor’iarn-~

Rcrn~niber in E-rn~ul
Login Paso.o d

- \‘orJy Pass:,~’u

- FioI’ls make i’. ~m an use ink (‘) are ‘eq med

- - RogisSar

fl~

~
‘~ 1~ ~ -J~.

- C’ ~, ~m-m - : ;- m-i~ ‘-,,

- [. ,-~r,.E.e~:ssCmL,E

m,Ii,:t~., ~ ~, - -

Figure 9 shows voter’s account openingform

4.6.5 Polling Frame


This is where the candidates’ names appear with the option of voting by selecting the name of
the candidate of your choice. To vote, you select a radio button behind the candidates name. The
poling frame is entitled “Cast your vote now”.

33
I~ ‘tocaThni/vnrk~~ONUNEVo1~Gliy$Tgt,4:A~ foix~oeao tYST 01 + ~pu 03
loraihort
c ~“F ‘p * ~3,
Gal Adobe
Flash ylayer

ONLINE VOTING SYSTj


EXERCISE Y~

@ ONLINE VOTING SYSTEM CastYour Vote Now


Y0WERt MtJSEVENI
~öuL M1R~A 060Th
WELCOME TO OU~ ONLINE VOTING SYSTEM N0jT~0
The Electoral Comorission is a statsstorv body established ORK. 8ESJGYE
~ snider Article 60 of the Constitution of the Republic of Ugnoda,
with the mandate of conducting regular, free and fair elections
~ 7 and referenda.
In hoe with our sosion of becoonog a model osstitutran and
centre of excellence In election management”, the SC has
embarked on implementing a comprehensive plan aimed at
continuously improving the management of electoral processev
This website ix one of the channels we expect to use in educating and seorsitising
voters on elections and referenda foe effective
Went Electoral Commission strongly believe in harnessing the potential of modern
technotog~ like the internet, to provide vital infornsation and data cm user friendly
format) on developments in election management in Uganda over the past two
decades. The site svlll also highlight key achievetoents in the development of
electoral democracy in Uganda, as well as the dsallenges encountered in the
process.
The site farther provides nse0d information, aimed at educating the general public,
and voters in particular, on the various aspects of the electoral process, through an
integrated management of infomsation system for elEciency i,nd effectiveness.
At the same time, we believe this (site) svlll enable us (as election managers) to
receive and respond to issues that you, our esteemed public, soft raise Eons time to
time.
As the SC aims at belier delivery of electoral services in Uganda, we realise the
importance of public support and invoivemeiss. I therefore, invite you as
stalceholders, to join and support our efforts of taking electian to an even much
higher leveL

Figure 10 shows pollingframe

34
4.6.6 Candidates’ Frame
L~ Z~j~—~~——--— ~~OHLfl~EVOnHGsvsTo~ f~3Cththt.~

4. -~ b~.IhoP - -, ~ e~-r- O~ ~ P * ~-

Get Mobe
~Jaer
ONLINE VOTING SYS~
EXERCI~

I__

MEET YOUR CANDIDATE


Pessw4rd’ POLUICAI PARTY
PHOTO

NRM

S~ft~

~et~r dI~co~f ______

MIRIAORQTE
uPc

a 4OPGERT tIAO DY

COpyn~htO2O12 Ab RIgets Reserveg


Des~gneaI by KEMBABAZI JACRUNE

Fig 11 shows the candidatesframe

4.6.7 Database
The database stores the users and voters’ identification, candidates’ identification and votes. The
database for this project was created by the use of Joomla 1.5.26 and wamp server 2.O.The
database and some tables’ figures are shown in the appendices.

4.6.8 Findings
The research undertaken under the defined aim and objectives of this project gave the following
findings:

Security has been for a long time a major concern for computing systems and more so
with the advent of the distributed networked system. Viruses, worms and hackers have

35
given the greatest challenge to the system security personnel as they strive to cover all
loopholes into their systems.

e Authentication is also of the big challenge since one person may register for more than
once using different names in this system prototype. During the system real life
implementation, the finger print control system will be thought about.

The preservation of the secret ballot, accuracy, privacy, integrity and proper tabulation of
the voter’s intent were given a great value in this system’s design. The voter casts his/her
vote secretly, no one can change the votes, no one can vote more than once and a voter as
long as he/she is registered with the system has a right to come, login and review the
election updates as the voting process is going on.
o The poling exercise is scheduled in a way that the beginning and the end of the voting
process is specified so, anyone who comes before or after the appropriate time will not be
allowed to vote.

5. System conversion
System conversion which is also called system change over, takes place upon the approval of the
system testing. The parallel method of conversion from the current system to the new system was
selected as the most appropriate for the current scenario.

Figure 12: illustration ofsystem conversion.

The above figure shows how the system’s change over takes place. Both the new and old
systems are used concurrently. This allows the users to learn how to use the new system and also
the system’s performance is monitored.

36
CHAPTER FIVE

SUMMARY, EVALUATION, CONCLUSION, AND RECOMMENDATIONS

5.0 Introduction
This chapter explains the evaluation, recommendation and conclusion arrived at by the
researcher.

5.1 Summary
I have designed an Online Voting System that offers three different types of authentication
measures. This indeed enables voter details anonymous makes it reliable and safe for individual
during voting. The login page offers the first level of security offered by this system by making
sure that only authorized user gets access to the poll results thus avoids rigging.

The use of Contents Management System (Joomla) and Mysql language has broadened my
website construction and my programming and problem solving skills as well.

However, the project was characterized with a number of challenges and experiences. This
among others included the limited resources especially implementation of the system on a virtual
server, software, hardware, money, and time.

The methodology utilized entailed visiting websites and reviewing existing literature on the area
of research.

5.2 Evaluation of the new system.


The new online voting system if implemented will achieve the following: the information system
will control data redundancy in the electoral commission database thus improving performance.
No vote rigging, no ghost voters. Also the system will ensure data integrity within the electoral
commission since there will be only one single storage area of data (only E. C. database, no
ballots at the polling stations).

The online voting system will increase efficiency and effectiveness in its operations, making it
stand at the democratic environment. For instance, the system will permit only registered voters
into the database to cast their votes. To make sure that this is accomplished; the system will
validate the voter’s user name and password.

37
Once a voter has cast his/her vote, he/ she will not be prompted to vote any more. However, the
system will permit the voters to login in order to view the updated election results in a statistical
way, but the system will not show the polling form to anyone who will have already voted.

Although the new system achieved the above performances it has some Limitations.

1. During the use of this application, only voters with some computer knowledge will enjoy this
modernized voting process. Also, one is likely to forget his/her user name or password and hence
not get access to the application.

2.The system has no algorithm that can be able to filter or identify different categories of voters,
for instance, identify already registered voters from the non registered ones so that no one can
register more than once using different names.

5.3 Conclusion
It has been proved that this online voting system achieves efficiency in conducting the voting
processes, hence saving time and money. Further, it ensures the preservation of the secret ballot,
accuracy, privacy, integrity and proper tabulation of the voter’s intent regardless of his or her
voting right, and political preferences even with the flaws that still need to be addressed. The
major area in this project for further research would be, an algorithm that can be able to filter or
identify different categories of voters, for instance, identify already registered voters from the not
registered ones so that no one can register more than once using different names.

5.4 Recommendations
Much as the system is ready for use, the author feels that more work can be done to make it
interactive. This work includes:

More research could be carried out to find out an algorithm that can be able to filter or identify
different categories of voters, for instance, identify already registered voters from the not
registered ones so that no one can register more than once using different names.

I recommend that an authenticated system is implemented alongside other security


implementations such as firewalls, anti-virus software, spy ware, and physical security like
security guards.

38
REFERENCES

1. Aronson E, (2001) Decision Support Systems And Intelligent Systems Pearson Education Inc.
India
2. Case J, Bradely A, Milispaugh C (2000) Programming in Visual Basic 6.0. McGraw-Hill.
New York.
3. Charles W. (2000).Electronic Voting.
4. Cranor et al. (Cranor 1997). Verification and Validation Issues in Electronic Voting.
Computer Engineering, METU, Ankara, Turkey.
5. David Flanagan, (1997) Java in A Nutshell. O’Reilly and Associates Inc. United States of
America.
6. David F. (2000).Electronic Voting Literature Review
7.D. Chaum (2002). Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms. http://www.vreceipt.com/article.pdf
8. Dr Corina Sas (2004). Public Voting System. [email protected]
9. Dr. Michael Shamos (2002).Electronic voting Evaluating the Threat, 2002. Maryland 21218,
-

USA
10.Fujioka 1992) , Verification and Validation Issues in Electronic Voting. Institute of Applied
Mathematics, METU, Ankara, Turkey.
11 .He et al. (He 1998). Verification and Validation Issues in Electronic Voting. Institute of
Applied Mathematics, METU, Ankara, Turkey.
12.Henry Lucas (1997).Introduction to Information Systems.Calfornia University.
13.Hoffer J,George F. and Valancith (2005) Modern system analysis and design,
Benj aminlcummings Masachusetts.
14.James A. 0’ Brien (2003); Essential for E-business Enterprise, 11th edition, College of
Business Administration, Northern Arizona University.
15,Jamie B. (2003), E-voting System: Specification and Design Document. Carl Steinebach,
2003
16. Jung-Ying Lai (2003), Design and Implementation of an Electronic Voting System with
Contactiess IC Cards, Institute of Information and Computer Education, National Kaohsiung
Normal University, [email protected]
17. Kenneth C. Laudon Jane Laudon (2001); Essential of Management Information Systems,
organization and technology in the networked enterprises, ~ edition, New York
University.
18. Kenneth C. Laudon Jane Laudon (2003); Essential of Management Information Systems,
Managing Digital firm,5t~~ edition, New York University.
19.KYANDA SWAIB KAAWAASE (2004). A web-based voter registration tool. Makerere
University.
20. Mercuri (2000).Electronic Journal of c-Government Volume 5 Issue 2 2007 (117-126).
21.Sako et al. (Sako 1995). Verification and Validation Issues in Electronic Voting. Computer
Engineering, METU, Ankara, Turkey.
22.Stephen Coleman (2001). Information Communication Technology. Oxford, UK.
23 .TADAYOSHI KOHNO (2003). Analysis of an Electronic Voting System. University of
California at San Diego.
24. Jeffrey Whittin, Lonnie .D Bentley, Kevin C Dittman (2000) System Analysis And Design

39
Methods. McGraw- Hill. New York.
25 .John Edwards, Sage Software (2006) http ://itconsulting.com/interviews/sfa-trends
chrisreich- 12(2006)
26. Ramachandra, T.m Nambissan, (1995) Computerized Business Application. Suned Golgotia.
India

40
APPENDICES

Appendix I

STUDY QUESTIONNAIRE FOR ELECTORAL COMMISION STAFF, AGENTS AND


VOTERS

TOPIC: Voting System for Electoral Commission.

This questionnaire is seeking information on the voting system of Electoral Commission. The
information you will provide will be treated with the highest level of confidentiality. You are
kindly asked to fill the form below appropriately.

Guidelines: Put a tick in the appropriate box.

Objective: design a database to record the votes and keep voters’ information.

Questioni

(a) Do the employees of the Electoral Commission store votes and voters’ information on a
database?

Yes Yes

No

41
(b) What do you think about a database being developed to be used for storing votes and voters’
information?

y
It’s necessary

Not necessary

Idon’t know

Objective: computerize and automate the voting process of the Electoral Commission.

Question 2

(a) Is the voting process computerized in Uganda?


Yes

No

42
(b) What do you think about computerizing voting process in Uganda?

It’s necessary

Not necessary

I don’t know

(c) Can election process be carried out via Internet in Uganda?

Yes

No

(d) What do you think about design and implementation of an online voting system in
Uganda?

It’s necessary

Not necessary

I don’t know

43
OBSERVATION CHECKLIST

Checklist for observing employees and polling agents performing their duties at Electoral
Commission
1. Were the employees using a database to store votes and voters information? If yes what kind
of database and which database management system were they using?

2. Which kind of system were they using? Was it manual or computerized? Was the current
system efficient?

3. Were the employees efficient while doing their job? How long did it take to serve one voter?

4. Approximately how many voters can cast their votes per hour?

5. Were the votes and voters’ information records organized so that it enables easy retrieval or
votes counting?

6. Approximately how long does it take to come up with election results report after voting?

7. Do Ugandans in diaspora vote? If yes, how do they vote?

If no, what do you suggest to facilitate them for voting?

45
Appendix III

Online voting system Database as made by joomla contents management system

Lw.A~~8~Iià ~oo~lho.e/ lobo~t,vobog1joo~o... ONUNEVOTIN03050EM ~,~ioo6boe/ bc~Thoe/vrang I phpM


1~ + ~Ih~t Cl P * lF.~I’

p~~482IPb3 5) Server: locaihost (~ Database: voting

~ c5Structure ~SQL ~. Search 5~Query 1~Export ~lmport ~OperatIons ~tiPrlvlleges 7<Drop


Database Table Action Records1~ Type Collation Size Overhead
VOting (48) jos_acepolls_options Ia ~ 7< 7 MyISAM utf8_genera~ci 33 -

~ jos_acepolls_polls 1( ~ 7< 1 MyISAM ulfti_general_ci 2.6 612 -


voting (48) jos_acepolls_votes )~‘f ~ Ia ~ 7< 7 MyISAM ult8_genera~a 3,2 610 -

S jos_~cepvIIs_opbons los_ak_ad - Ia ft 7< 0 mooDS utfS_general_ci 16.0 610

~ jos_alç,proflles 11 Ia )~ 7< 1 InnoDS utf8_generat_ci 16.0 tUC -


S joe_ak_ad jos_,alçstats 17< ~ 7<0 1W 7< 2 mooDS utift_gerieraici 46.0 610 -
S josak_picfiles
~ jos_ak_storage ItS tt’ 7< 0 mooDS otiS general ci 16.3 iU_ -
S J0S_Ot~_0i000~0 jos banner tS 7<o 7< ° MyISAM ulf8_general ci ‘.~ ~‘°-~ -
S Jon boonor —
~ ~:i~0 jos_bannerclient Ia ~ 7< 0 MyISAM utf8_genera~ci 1.0 200 -

~ ~ ~ r 7< 0 MyISAM UfS_geflOrjblCi 1.0 013 -

los_categories g 7< 0 MyISAM utf8_generaLci 1.0 CUB -

~ ~cbome_1 jos_ckfields 1W 1W 1W 7< 12 MyISAM u1f8_generaici 3.7 610


S josck~otlofioldn los ckforms 1W ItS 1W 000 1W 7< 1 MyISAM sitS general ci 2.1 610 -
S ios_.ckc~siles — —, — —
S ieccomoonentn Jos_ckforms_1 )f 7< 3 MyISAM utf8_genera~ci 2,4 ~‘i3 -

~ jos_ckproflleflelds Ia ft 7< 0 MyISAM ntiS general ci 1.0 012 -

~ fll~Lbo3~. ~ jos_ckproflles ~ 7< ~ ~ ~ 1.0 C’oO

~ jos_components 1W ItS 1W Ia ~ ~ MyISAM ~8_peneralci 0.2 ?U0 -


S jot core ad orqjroopn los_contact_details Ia ft 7< 0 MyISAM utt8 general ci 1,0 610 -

~ los_content 1W ~ 1W 1W 7< 6 MyISAM utf8 general ci 320,7 CCIO 224 ~


S jos_cere_acljroups~,aor_d I jos content_fronipage 1W 7< 2 MYISAM ulfS,,,generol ci 2,0 212
S joe core ra loins , — ,, —
S oa_coreJo5_ooorchee .. los_content_rating 1W 7< ° MyISAM utiS_general_ci 1.0 o1~ -

~ ~ jos_core_acl_aro 1W 1W 7<1 Ia 1W 7< 0 MyISAM utlft,,genoiroici 6.2 KoO -


S ~ ~ jos_core_acl_aro_groups 1W 1W 1W Ia 1W 7< 11 MyISAM utf8,,generaici 4,0 600 -

~ jos_core_acl_aro_map itS Ia ft 7< 0 MyISAM ntlB_generaLci 1.0 610 —


S joo,,rrsgraii~n,,b~ckhnko jos_core_adl_aro_sectlons 1W 1W 1W Ia ItS 7< 1 MyISAM utfS_general_ci 6.0 612 —

~ Jos_core_acl_groups_aro_map 1W 1W 1W Ia 1W 7< 0 MyISAM ulf8,,,generaici 4.2 612 -

~ jos_coreJogJtems 1W Ia <7 7< 0 MyISAM otfS,generaici 1.0 610 -

S ios..p~o joa_coreJog_searches iS - 7<o <7 7< 0 MyISAM oilS general ci 1.0 610 -

~~ ::~—~: jos_groups
los_menu
1W
11
iS 17<1 Ia
iS 1W Ia
ItS 7<
ItS 7<
3
0
MyISAM u118 general ci
MyISAM utfti_generaLci
2.1 0010
‘.3 610
-
-
S joe sections —, —
~ - los_menu tv~es 1W iS 17<1 it~ 1W >7 1 MyISAM utftigeoioraici 3,1 261 -
~o7$ ntot~aoecIo iS Ia 7< 7< 0 ,ci 1.0 610 —

Figure 13 shows Online voting system Database as made by Joomla contents management
system,

(Joomla basically provides a framework for your content. You manage it through a GUI in a web
browser, so you don’t have to ever see the php/css/whatever of your pages.)

47
Appendix IV

Users table
host/toca5t/nn~fjosjun... ONUOSEVOTtNOSYOTEM ]~~odhost/ Ieoalhe,I fatting /jos us.. 0 L±_ _~__.

tecnlhonI~ .. - C ~4 (atr~ P * ~
~Jai~A~ ~ 5J Server: localhost ~ Database: voting tO Table: jon_users
~Browse ~Structure ~tSQL ~. Search 8-Slnsert ~5Export fl5lmport ~Operations iBEmpty 3?DrOp

Database
voting (48)
III Showing rows 0-8 (9 total, Query took 0.0004 sec)
voting (48)
rSQL query:—
0 jasscepcttsppttons SELECT
8 jasacepsts~pulis FROM jus_usern
8 jus_scep8s~_vutrs LIMIFO f
8 jun_ak_ad
8 jos_ak_~rn5le~
8 jon_ak_stats
8 jos_ak_storoan
8 jon_banner
I ] Edit I Explain SQL]] Create PHP Code]] Refres~j

0 jos_baansrchsnt
8 jon bunnetrack
8 jon_cotegones
rovory results operations
8 jon_cE (do
8 o~cklonnn
j Print mew .~ Print mew (with lull texts) 5~ Export
8 jasckfsmrnl
8 jon_ckpnfte5elds [~t1owl 30 row(s) starling from record 8 0
8 jos_ckp~utIes
8 jon components in horizontal mode and repeal headers after 100 cells
8 jos_contact_detatls Sort by key None [Go]
8 jot_COsted
8 j_csntsnt_frontpa~e T • Id name usemame email password
8 jos_COotent_ratln5
8 jon_coat_act_are J X 62 Admimstrator admai [email protected] f8957ccfaa538l90e3ee316b2d31 301 3.9OwTUO2bpOB5qkMOk,..
8 J_cnee_acjoro_5wops
8 jon_cnre_acLaro_rnnp J 3< 63 KEMBABAZI JACKUNE kernbajacklinelQlyahoo corn 581617I871485d2875046784b1e7af28iX0wpr53dt~~qtAZy
8 jon_csre_acl._sro_sechont
8 jsn_cnro_acl.~nrOups_arojI J 3< 64 MUWUMUZA JUSTUS justo~yahoo.com e54a4fa681a5896460d6db1543e6c279.KS7deCEuZW5drnl nc
8 jo core_Inn_items
S jon_core_log_searches
S jon_9.toopn 5578b38943e3035698e2462c70613d983 7yRtcBaTR4GVrnKM1
S jon_menu 3< 65 KATO EMMA errima@yahoo corn
S jon_isesuJypen
S jon_messages
S jos_messagus_cfg 7ttdcbl626l336Ofdc4babc6fa3a42btL5RrtjLzZpqOOpl sTg..
S jos_erotwn_backl(nks J 3< 66 WINNIE NATUKUNDA nalu@yahoo corn
S jmmedules ~? 3< 67 GEREVAZ HABUMUCISHA habagervata@gmaiLcorn c9eoo3befl65ecltdbaal c821 hi 5d81 85:chDuflNoFlkTrkcvtrX..
S jon_modutes_wesu
S jos_nowufeeds
S jjtktgmns
S jun_puSs Li ~ 3< 68 NKURUNZIZA INNOCENT [email protected] 729d8aeb946088b8f6736016f14816a7:yoMh2VOE4olB8Hf2k...
S jospdL data 69 KAMAU JOHN 77ba8aadb40257aa16d9c98291096ca2E9As9Z6qI nlcq8e7b
S jon_pull_date .? 3< john@yahoo corn
S jon_poll_menu .? 3< 70 BERNARD BEN ben~yahoo.com 4789a123b9d56cl71 862c6269367521bXQOJLF5i0mJ11 401 C..
S jos_secbonn
S jon_session t.. Check All! Uscheck All With selected- ~) 3<55
Ion 000mg

~E~J
Figure 14 shows the users table. The users ‘passwords are encrypted.

48
Appendix V

Votes table
jJ~3JdJioooi0jit/oo5n5jj [ ONUNNYSTEM J.~ineethoit/loselhost/ootinv /ies_se... ° [+ i ~. ~;

iocalhact—. -p * ~.

*
13) Server: locathost & Database: voting 0) Table: jos_acepolls_votes
~ Browse ~ Structure ~l SQL ,~ Search Insert ~13 Export I~9 Import ~Oporattons [~Empty 7<Drop

Database
voting (48)
II Showing rows 0 -6 (7 total. Query took 00005 nec)
vcsttng(48)
r~~- query:
B jos_ucepons_ephoss SELECT
B jonacspets_psltu rnou jos_ecapolls_vutnu
B tss_acepolts_Yetns LIMITS 30
B joe_ak_act
B in° ak_profiles [Edit]] Explain SQL]] Create PHP Code]] Refresh]
B p5 akntats
B os_aIc_stnragv
B jon_banner
B ~
B jos_banne,track rQuery results operations
B juscatagsnas
B jos_clilelds ~ Printmew Pdnt~ew(mthfulltm4s) ~ Export
B jotcidomis
B jos_ckleims_1
B jos_ckprvelnlnldu Esiow., 30 row(s) starting from record 4 0
B jas_ckpeettes
B jOS cnmpnvvvts in toonzontal mode and repeat headers after 100 cells
B jos_contact_dotails Sort by key: Noes [R~J
B jun content
B Joe centeni fmontpugo T Id date option_id poltjd tp user_id
B joe content_eating
B juu_Foce_act_are ~ 3< 1 2012-08-09 14:35.06 7 1 2130706433 63
B jss.curect.Fro_gresps .. 7< 2 2012-08-1015:10:20 3 1 2130706433 65
B jss_cnie_nct_urojnap
B jsu_cura_pcl_aro_snttiosn ,~‘ 3< 3 2012-08-11 113755 3 1 2130706433 66
B jscnre_act_gFOupn_sre_fl Y 3< 4 2012-08-13 141759 6 1 2130706433 67
B joe coca log items ~Jo 7< 5 2012-08-1412:16:16 2 1 2130706433 138
B jos_cnrejng_unnrchos
B Jon_groups ) 3< 6 2012-08-1511 20:45 1 1 2130706433 69
B Jon meeu
B jon_menu_typos ~ 7< 7 2012-08-15 12:10:11 6 1 2130706433 70
B jon_messages t__ Check All I Uncheck All With selected. , 7<
B joe_messages_pIg
B jes_rmgratmon_bocktmnkn 30 row(s) starting from record # 0
B 1ns_moduteo
B jss_mndutes_mvnu in trortzontsl mode and repeat headers after 100 cells
B joe_newsfeeds
B jos_idogins
B Jon ~OOS
B jos_pdLdata
B jos_pult_dala
B jon_pu0 menu
B jos_sectiuns
B jon session
on on elgen anOde

Figure 15 shows the votes table

49
Appendix VI

Registration table
LJ4tsl~i~theejfkrheotI~obngJjeexm~ ONUNEVOTtNGSVSTEM j ihnet/iobont/voxn5JJonoL t
,0 ~
+ ioolho,t.

Database
voting (48)
QJ Showing rows 0 - 11(12 total, Query took 00059 sac)

voting (48)
FSQL query:
~ jas_acepats_aptionn SELECT
~ jas_ecepalts_pslir FROM jos_ckEetds
D jao_acepeIls_~ates UMITO
~ jan alt act
~
nt
~
jon_ak_preStos
jan_ak_slots
jsn_nk_stara5a
I I Edit]] Explain SQL] [ Create PHP Code]] Refresh ij
ot jon banner
~ jas_bassarclleflt
D jonboasorleack ~Query results opmations
ot jascate5unen
~ jsnctsetds ~ Print view Print view (with full texts) ~ Export
ot janekfsrms
nt jan_sutures_i 30 row(s) starting from record # 0
ot jssckpratletelds
~ jan_ckproilas in horizontal mode and repeat headers alter 100 cells
ot Jan carnrponestn
ut jss_cnatact_detarln Sort by key: None I Go~
ot pro_cantons mandatory tea
~ jascnt_trsntruran T Id ltd name tabel tjrpettetd dafauttvalue
nt ja~caatest_Pt Sri 2 3< 1 1 FISRTNAME FISRT NAME test tJnjtvatueT=ee[~~]t_maxcham=25]_1t_teXttypeo-..
S jon_core_ad_ace r
S jos_care_act_ara_greups 2 3< 2 1 LASTNAME LFoST NAME text tjrntsalueTame(_]t_maxctraex25t~~]t_texttyPecme.
S jna_care_acl_ara_prop 2 3< 3 I GENDER GENDER radrobutton t_listHRB===optrb0aaM~~M[~]optrb1F)~F[_)t_di5Pl..
S jss_csre_acLaro_ssctisss
S jos_cnre_acLrjreupn_uro_a 2 3< 4 1 AGE AGE text ~
S jon_caror_lag_riems
S jss_csrejag_searctren 2 3< 5 1 ADDRESS ADDRESS text t_initvalueT=a[—]t_maschar°°°’SO[--)t_testtype°°°.
S jos_wsat~~ $ 3< 8 1 FATHERNAMES FAThERS tent t~nitsalueT==a[~~)t_maxchsre50[_]t_texttypee
S jon_menu NAMES
S Iso_mess_typos
5 jas_mossagos $ 3< 7 1 MATHER MOTHERS tent ~
S jas_mensoges_cis NAMES
S jas_mrsralien_bsckiinkn
S jss_nrsdalea 2 3< 8 1 OCCUPATION
FAThERS tent ~
S jon madams menu OCCUPATION
S tan_5sWufse~s 9 1 OCCUPATION OCCUPATION text tjniIvalueT=oe]—)t_maxcham~50[~)t_teettype~~
S Jss_pluens
S jon_puts 10 1 NATIONALtTY NATIONALtTY tent t_rntvatueT===I~.]I_maxchsr~~~25[_Jt_texftype
S jos_psll_dsta 11 1 SUBMf~ SUBMIT button t_typesT=aasubmit 0
5 jan_pall date
S jnn_poIl_mesu 12 1 RESET RESET button ttype8T=ereset 0
S ~ssnsCtrann
S ~ L_ CheckjolllUncheck.5JlWrths&ected: f 3< ~
5 jos_stots_aaaste
S jas_tempiotes_mesu [~tio~1 30 row(s) starting from record St 0
S jon_users in horizontal mode and repeat headers after 100 cells
~ jss_raebltsks

~zI L~L~i
Figure 16 show the voters’ registration table

50
Appendix VII

Poll menu table


— L.,,,,ieeelhnetfieeeiheeelvulflaiJos..pe... I +
L ~Lou~! slie_L oNurjsvoliiie SVSJEM
~‘4~ G~
+ lueclheet

53 Server: locaihost 5a Database: voting Id Table: joa_poII_data


Database ~lSQL Search fUlneert ~)Export [J8lmport ~Operations (5~Empty 3<~ngp
voting (48) ~j18rowse

voting (48)
~ jua_acepulis_nptienn
W Showing rows 0 - 11(12 total, Query took 0.0004 nec)
~ jus_acepefapeUs
~ jus_asepulls_reteu rSQL query:—
~ ins_ak_ad
m jan ak_pinkies sELECr’
m jes:ak_stsIs FROM jas_peli_dala
m jun_ak_StOrage LIMIT S
~ jsa banner
m jea_bannerchent
~ 1uslesnrieilrauk
~ Jun catepexes
I [ Edit] Explain SQL] [ Create PHP Code] [Refresh)

m jan shIelds
~ ins ~ results operations
m ins ciduems I
~ jascbpreflefeldn ~rint dew .~ Prini dew (seth full tests) ~ Espod
m jusckpeufiIen
m jes_cnmpeennla
~ jea_cantacl_detals 30 row(s) starling from record 8 0
m jas_cealent cells
D jsscnnte~tfraeIPa9e in horizorilal mode and repeat headers after 100
m JOS_COCICTItJSI 09
m jeacnee_aci_aru Sort by key: None
m ~ne cnee_aci_srn_gresps eTi Id pollid text hits
~ jun_core_aol_am_map
~ jos_cnre_acLaro.,,aectiana , 3< 1 YOWERI KAGUTA MUSEVENI I
m jus_csre_asi_gruupu_aia_e 3< 2 I3ESIGYE WARREN KIFEFE 4
S jon_cnee_Iagjtems
S jes_cereJua_sesrcheu ~ 3< 3 BElLY OLIVE NAMISANGO KAMYO 3
S jesjeuepx ,)< 4 0
~ ins menu
s ins menu types 5 0
S jaa_messagnn 6 0
S 1esmeasages_cfg
S jasnegeaknnkachinks ‘3< 7 0
5 jusmadelen 8 0
5 1ns_medulen_mnnu
S jas_newsfeeda ~3< 9 0
S jus_ylegms .~ 3< 10
S jet_pulls
S joe_pull_dale -,~ 3< 11
19 1aa_pell_date 3< 12 0
S jun_pull_menu
S jos_sectens t__ __________
Check All I Uncheck All With selected. J 3< ~
S ion session
S jon creSS agents
5 jan templates menu
ri~J 30 rOW(S) starting from record 8 0
mode and repeal headers after 100 cells
s p5:50cm m horizontal
~ ten minis

Figure 17 shows the poll menu table

51

You might also like