Feeds

Movie oldsters FAIL at internet: Online Oscar voting 'too complex'

Silver-haired members 'don't know how to use computers'

SANS - Survey on application security programs

Attempts to introduce electronic voting for the Oscars are going awry.

Both the Hollywood Reporter and Deadline report that the Academy of Motion Picture Arts and Sciences' new online voting system is too complex to use for an increasingly ageing electorate.

The Academy reportedly worked with Everyone Counts, an electronic voting consultancy that has done work for the US Department of Defense and the UK's Ministry of Justice, to devise a secure system for electronic voting. However the system is so loaded with safeguards and military-type encryption methods to keep hackers and imposters at bay that it has become difficult to use for some registered voters.

One member jokingly told The Hollywood Reporter that "it's easier to break into the CIA" thanks to "military-grade encryption" and other security controls. While usability is crucial to any practical system, usability and security are sometimes wrongly thought of as working against each other. For example, mobile phones are straightforward to use - for voice calls, at least - but these days incorporate voice encryption to prevent casual eavesdropping.

But it looks like the Academy's new system is a little more complicated than that, reportedly including a two-factor authentication process. Members are reportedly required to devise a second password (different and more complex from the one needed to access the Academy's site) and to register a mobile phone number. Users are then asked to authenticate votes using a code sent to their mobile phone number.

Similar systems are employed for electronic banking and wouldn't appear to be over-engineered. However, according to the Los Angeles Times, more than half (54 per cent) of Oscar voters are over 60. A bigger factor, according to Hollywood Reporter, may be that "more than a few members don't even have computers and/or know how to use the internet, which would preclude them not only from streaming screeners, but also from filling out an e-ballot".

A postal balloting system is apparently being used in conjunction with electronic voting for the movie industry's showpiece annual awards but the concern is that those frustrated in their attempts to vote online will simply give up and not bother to vote.

Voting for nominees for the 85th Academy Awards closes on 4 January, with the results due to be announced on 24 February. ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.