Aceto, L. JayShafer, Michelle M.Smith Ill, Edwin B.Walker, Cyrus J.Kripp, Manuel J.Volkamer, MelanieGrimm, Rüdiger2018-11-142018-11-142012978-3-88579-299-4https://dl.gi.de/handle/20.500.12116/18209There are many security challenges associated with the use of Internet voting solutions. While we are not advocating for the use of Internet voting in this paper, we do assert that if an Internet voting solution is going to be used, its deployment must be undertaken with continuous security auditing in place – security auditing that begins with the development of the Internet voting system by the manufacturer or election jurisdiction and continues throughout the system's use in the field.enInternet voting system security auditing from system development through implementation:Best practices from electronic voting deploymentsText/Conference Paper1617-5468