Search

Readings and References

Election administration audits can play in important role in assuring voters of an election's integrity. What forms do these audits take? How are they conducted—and when? Who runs them? As more and more states adopt some form of election auditing, research and innovation to make them more practical and transparent have also expanded.

We have gathered a selection of this emerging scholarship below, for your reference. For a more abbreviated syllabus, click back to the main conference page.

Research Bibliography: Election Auditing and Forensics 

1. Statistical models of post-election ballot auditing

 

Aslam, Javed A., Raluca A. Popa, and Ronald L. Rivest.  2008. On Auditing Elections When Precincts Have Different Sizes.  Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop.

 

Benaloh, Josh, Ronald Rivest, Peter Y.A. Ryan, Philip Stark, Vanessa Teague, and Poorvi Vora. 2015. End-to-End Verifiability. arXiv:1504.03778

 

Baxter, Patrick, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodridguez, Cynthia Sturton, and David Wagner. 2012. Automated Analysis of Election Audit Logs. Proceedings of the 2012 USENIX/WOTE Conference.

 

Bell, Susan, Josh Bealoh, Michael Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya, Michelle Parker, Olivier Pereira, Philip Stark, Dan Wallach, Michael Winn. 2013. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. JETS: USENIX Journal of Election Technology and Systems, 1.1.

 

Cordero, Arel and David Wagner.  2008. Replayable Voting Machine Audit Logs.  Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop.

 

Davtyan, Seda, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, and Alexander A. Shvartsman.  2008. Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop.

 

Laurent, Michel, Alexander Shvartsman, and Nikolaj Volgushev. 2014. A Systematic Approach to Analyzing Voting Terminal Event Logs. JETS: USENIX Journal of Election Technology and Systems, 2.2.

 

Lindeman, Mark and Philip B. Stark. A Gentle introduction to Risk-limiting Audits. IEEE Security & Privacy 10, no. 5 (2012): 42-49.

 

Lindeman, Mark, Philip Stark, and Vincent Yates. 2012. BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes. Proceedings of the 2012 USENIX/WOTE Conference.

 

Lindeman, Mark, Mark Halvorson, Pamela Smith, Lynn Garland, Vittorio Adona, and Dan McCrea, eds. Principles and Best Practices for Post-Election Audits.

 

Risk-Limiting Audits Working Group. 2012 (Version 1.1). Risk-Limiting Post-Election Audits: Why and How.

 

Rivest, Rondald L. 2018. Bayesian Tabulation Audits Explained and Extended.

 

Rivest, Ronald L. and Emily Shen. 2012. A Bayesian Method for Auditing Elections. Proceedings 2012 EVT/WOTE Conference.

 

Shenker, Jacob, and R. Michael Alvarez. 2014. Mitigating Coercion, Maximizing Confidence in Postal Elections. JETS: USENIX Journal of Election Technology and Systems, 2.3.

 

Stark, Philip B. 2009. Risk-Limiting Postelection Audits: Conservative P-Values From Common Probability Inequalities. IEEE Transactions on Information Forensics and Security, Vol. 4, No. 4.

 

Stark, Philip B. 2012. Ballot-polling Risk-limiting Audits in Two Pages (±1).

 

Stark, Philip B. Tools for Comparison Risk-Limiting Election Audits. Website.

 

Stark, Philip B. Tools for Ballot-Polling Risk-Limiting Election Audits. Website.

 

Stark, Philip B. and David Wagner. 2012. Evidence-Based Elections. IEEE Security and Privacy, Special Issue on Electronic Voting.

 

University of Connecticut. Center for Voting Technology Research. Computer Assisted Post Election Audits. Website.

 

Verified Voting. Post-Election Audits.  Website.

 

2. Quantitative studies of post-election ballot auditing

 

Alvarez, R. Michael, Lonna Rae Atkeson, and Thad E. Hall.  2012. Evaluating Elections:  A Handbook of Methods and Standards.  New York:  Cambridge University Press, Chapter 5.

 

Alvarez, R. Michael, Lonna Rae Atkeson, and Thad E. Hall, editors. 2012. Confirming Elections: Creating Confidence and Integrity through Election Auditing. New York: Palgrave MacMillan.

 

Alvarez, R. Michael, Jonathan N. Katz, Sarah A. Hill, and Erin K. Hartman.  2012. Machines Versus Humans: The Counting and Recounting of Paper Ballots in LA County.  In R. Michael Alvarez, Lonna Rae Atkeson, and Thad E. Hall, editors. 2012.  Confirming Elections:  Creating Confidence and Integrity through Election Auditing.  New York:  Palgrave MacMillan, 73-88.

 

Ansolabehere, Stephen, Barry C. Burden, Kenneth R. Mayer, and Charles Stewart III. 2018. Learning from Recounts. Election Law Journal: Rules, Politics, and Policy 17.2: 100-116.

 

Ansolabehere, Stephen and Reeves Andrew. 2012. Using Recounts to Measure the Accuracy of Vote Tabulations: Evidence from New Hampshire Elections 1946–2002. In Confirming Elections: Creating Confidence and Integrity through Election Auditing, eds. Michael Alvarez R., Atkeson Lonna Rae, and Hall Thad E.. New York: Palgrave.

 

Goggin, Stephen N., Michael D. Byrne, Juan E. Gilbert, Gregory Rogers, and Jerome McClendon. 2008.  Comparing the Auditability of Optical Scan, Voter Verified Paper Audit Trail (VVPAT) and Video (VVVAT) Ballot Systems.  Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop.

 

Kim, Eric, Nicholas Carlini, Andrew Chang, George Yiu, Kai Wang, and David Wagner. 2013. Improved Support for Machine-Assisted Ballot-Level Audits. JETS: USENIX Journal of Election Technology and Systems, 1.1.

 

McLaughlin, Katherine and Philip B. Stark. 2011. Workload Estimates for Risk-Limiting Audits of Large Contests.

 

National Academies of Sciences, Engineering, and Medicine. 2018. Securing the Vote: Protecting American Democracy. Washington, DC: The National Academies Press.

 

  • Further information about the report and related resources can be found at the committee's webpage.

 

Stark, Philip B., and Vanessa Teague. 2014. Verifiable European Elections: Risk-limiting Audits for D'Hondt and Its Relatives, JETS: USENIX Journal of Election Technology and Systems, 3.1.

 

U.S. Vote Foundation. 2015. The Future of Voting: End-to-End Verifiable Internet Voting - Specification and Feasibility Study.

 

3. Case studies of post-election ballot auditing

 

Bader, Max. 2013. Do new voting technologies prevent fraud? Evidence from Russia. JETS: USENIX Journal of Election Technology and Systems, 2.1.

 

California Post-Election Audit Standards Working Group. 2007. Report: Evaluation of Audit Sampling Models and Options for Strengthening California's Manual Count.

 

Davtyan, Seda, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, and Alexander A. Shvartsman.  2008. Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. 

 

Chilingirian, Berj, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle Blom, Chris Culnane, and Vanessa Teague. 2016. Auditing Australian Senate Ballots.  arXiv:1610.00127

 

The Colorado Risk-Limiting Project. Overview.

 

Douglas, Michael. 2014. Ballot Bungles: Lessons from the Australian Senate. Election Law Journal 13.4: 559-569.


Hall, Joseph Lorenzo.  2008. Improving the Security, Transparency, and Efficiency of California’s 1% Manual Tally Procedures.  Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. 

 

4. Election forensics

 

A. Election observation

 

Bland, Gary. 2015. Measuring the Quality of Kenya's March 2013 Election. Election Law Journal 14.2: 136-147.

 

Hall, Joseph, Emily Barabas, Gregory Shapiro, Coye Cheshire, and Deirdre Mulligan. 2012. Probing the Front Lines: Pollworker Perceptions of Security & Privacy. Proceedings of the 2012 USENIX/WOTE Conference.

 

Herron, Erik S., and Nazar Boyko. 2016. Conducting Credible Elections Under Threat: Results from a Survey of Election Administrators. Election Law Journal 15.4: 285-301.

 

Pomares, Julia, Ines Levin, and R. Michael Alvarez. 2014. Do Voters and Poll Workers Differ in their Attitudes Toward e-voting? Evidence from the first e-election in Salta, Argentina. JETS: USENIX Journal of Election Technology and Systems, 2.2.

 

 

B. Digit tests

 

Beber, Bernd, and Alexandra Scacco. 2012. What the Numbers Say: A Digit-Based Test for Election Fraud. Political Analysis 20.2: 211-234.

 

Deckert, Joseph, Mikhail Myagkov, and Peter C. Ordeshook. 2011. Benford's Law and the Detection of Election Fraud. Political Analysis 19.3: 245-268.

 

Jiménez, Raúl, and Manuel Hidalgo. 2014. Forensic Analysis of Venezuelan Elections during the Chávez Presidency. Plos One 9.6: e100884.

 

Klimek, Peter, et al. 2012. Statistical detection of systematic election irregularities. Proceedings of the National Academy of Sciences 109.41: 16469-16473.

 

Mebane, Walter. 2008. Election Forensics: The Second-Digit Benford Law’s Test and Recent American Presidential Elections. In Election Fraud: Detecting and Deterring Electoral Manipulation, eds. R. Michael Alvarez, Thad E. Hall, Susan D. Hyde, 162–81. Brookings.

 

Weidmann, Nils B., and Michael Callen. 2013. Violence and Election Fraud: Evidence from Afghanistan. British Journal of Political Science 43.1: 53-75.

 

C. Quantitative forensics

 

Levin, Ines, Gabe A. Cohn, Peter C. Ordeshook, and R. Michael Alvarez.  2009. Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela. EVT/WOTE ‘09 Proceedings, August 10-11, 2009, Montreal, Canada.

 

Levin, Ines, Julia Pomares, and R. Michael Alvarez.  2012. Using Machine Learning Algorithms to Detect Election Fraud.  In R. Michael Alvarez, editor, Computational Social Science:  Discovery and Prediction.  New York:  Cambridge University Press, 266-294.  

 

Wand, Jonathan N., Kenneth W. Shotts, Jasjeet S. Sekhon, Walter R. Mebane, Michael C. Herron, and Henry E. Brady. 2001. The Butterfly Did It: The Aberrant Vote for Buchanan in Palm Beach County, Florida. American Political Science Review 95.4: 793-810.

 

 

D. Registration database auditing

 

Ansolabehere, Stephen and Eitan Hersh. 2010. The Quality of Voter Registration Records: A State-by-State Analysis. Report, Caltech/MIT Voting Technology Project.

 

Brater, Jonathan, Kevin Morris, Myrna Perez, Christopher Deluzio. 2018. Purges: A Growing Threat to the Right to Vote. Brennan Center for Justice..

 

Norden, Lawrence. Voting System Failures: A Database Solution. Brennan Center for Justice. 2010.

 

Ponoroff, Christopher. 2010. Voter Registration in a Digital Age. Brennan Center for Justice.

 

Weiser, Wendy. 2009. Voter Registration Modernization: Collected Reports and Papers. Brennan Center for Justice.