<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Michael Lapke</string-name>
          <email>michael.lapke@cnu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jonathan Kaufman</string-name>
          <email>jonathan.kaufman.18@cnu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Election Systems, Cybersecurity, Socio Technical Model, Theory Development</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Christopher Newport University University), 1 Avenue of the Arts</institution>
          ,
          <addr-line>Newport News, VA 23606</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>16</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>Considering the Socio-Technical Model (STM) as a basis for ongoing research has revealed unexpected theoretical results. The research in question is an examination of the impact of technology on user trust and subsequent intent to use election systems. In the process of conducting this research, a new survey instrument was created based on a newly created theoretical foundation built on STM. Our interim findings have exposed an unexpected theoretical finding that suggests further consideration. The ifndings were a result of data validation done on the new survey instrument. These findings indicated that the principle components of STM may not be valid when tested. At the least, the components may be relevant in a non-equal way. Another possibility is that the model should be re-examined to determine if the components accurately reflect the nature of people and technology and their interactions with large scale systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Research is currently underway to investigate the American electorate’s perceptions of security
in election systems and resultant intention to participate in elections [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The primary motivation
for this research was the controversy surrounding the 2020 presidential election and subsequent
propaganda campaign that is attempting to invalidate the results. As voting is the foundation of
the American democratic system, the doubts and questions about the legitimacy of the voting
system are critical to analyze.
      </p>
      <p>
        To facilitate the research, a theoretical framework was developed to provide a framework
and basis for the creation of a survey instrument. As the Socio-Technical Model (STM) deals
with the interaction between technology and the users of the technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], it was selected as
the base theoretical model to create the theoretical framework. STM was utilized in order to
facilitate the analysis of the change in the election process as it relates to the use of IS systems
CEUR
Technical Model: Structure, People, Technology, Tasks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Due to the high amount of human
interaction with technology throughout the whole election system, this theory will be able to
efectively analyze the election system from the perspective of voter perceptions.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Considering the Socio-Technical Model</title>
      <p>
        The first component of STM, structure, describes the social structures that support the system.
In the context of US Presidential Elections, the structure of the system is complex. Presidential
elections are a federal position but the election itself is managed at the state-level. Furthermore,
within the state, there are separate localities that run the actual election. Therefore, this provides
for the potential of weak policies and procedures for administering the election [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This is
the general structure relating to the authority of election administration but the complexity
continues in the fact that each of the 50 states has variations on the laws, power structures, and
general policies that govern how they run elections. So, you might have a situation in one state,
like Georgia, where the Secretary of State has the sole authority to make changes to policy but
another state, like Arizona, where the state legislature has shared authority with the Governor.
      </p>
      <p>The second component of STM, people, describes how individuals interact with the system
under study. For election systems, people play a critical role as humans interact with all aspects
of the voting system from the campaigns to counting the ballots. Of most importance, it is the
individual conducting the primary transaction: voting. If a voter does not trust the system, their
intention to use is very likely to be afected. If they believe that the systems used to administer
the elections are insecure, they are unlikely to use the system.</p>
      <p>
        The third component of the socio-technical model is technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In the context of
election systems, the ballot counters, ballot markers, poll books, and other equipment used in
the election administration would be the technology that falls under this component of the
theoretical framework. As with all systems, technology changes and evolves over time. This
is especially true if there are external forces that are influencing and motivating change. For
example, population growth would predicate the need for more technology in election systems.
A paper ledger might work for 10,000 people but would be unfeasible for 40,000,000 people.
      </p>
      <p>The final component of the socio-technical model is tasks. Tasks deal with the interactions of
the humans within the system. In the context of elections, this includes campaign ads, casting
ballots, and ballot counting. These are just a few of the tasks that occur during the election and
have critical efects on the overall election and the election results. If the processes involved in
these tasks are tampered with in any way, it could potentially result in flawed results.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Creation and Application of the Theoretical Framework</title>
      <p>Given the basis of STM, a new survey instrument was created to facilitate the research into
voter perceptions’ of trust in election systems. A theoretical framework was created whereby
each component of STM was applied within the context of elections. Specific topic areas were
created for each component that applied to election systems. The list below presents the results
of this:</p>
      <sec id="sec-3-1">
        <title>Socio-Technical Model Construct</title>
        <sec id="sec-3-1-1">
          <title>Structure</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>Technology</title>
        </sec>
        <sec id="sec-3-1-3">
          <title>People</title>
        </sec>
        <sec id="sec-3-1-4">
          <title>Task</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Applied Election System Elements</title>
        <sec id="sec-3-2-1">
          <title>Current election laws maintain election security</title>
        </sec>
        <sec id="sec-3-2-2">
          <title>Voter ID verification would increase security in elections</title>
        </sec>
        <sec id="sec-3-2-3">
          <title>New Laws and regulations are needed to ensure the security of elections</title>
        </sec>
        <sec id="sec-3-2-4">
          <title>Current policies are adequate to handle false information being spread</title>
        </sec>
        <sec id="sec-3-2-5">
          <title>Election results should be thrown out if the election laws are violated</title>
        </sec>
        <sec id="sec-3-2-6">
          <title>The federal government should regulate elections</title>
        </sec>
        <sec id="sec-3-2-7">
          <title>The federal government should not regulate elections</title>
        </sec>
        <sec id="sec-3-2-8">
          <title>Current election laws are easily understood/accessible</title>
        </sec>
        <sec id="sec-3-2-9">
          <title>Current election laws are dificult to understand/hard to access</title>
        </sec>
        <sec id="sec-3-2-10">
          <title>Current equipment used adequately secures data</title>
        </sec>
        <sec id="sec-3-2-11">
          <title>Social Media has a negative impact on elections</title>
        </sec>
        <sec id="sec-3-2-12">
          <title>Stricter security standards are needed in election systems</title>
        </sec>
        <sec id="sec-3-2-13">
          <title>Security and encryption yields more trust in election systems</title>
        </sec>
        <sec id="sec-3-2-14">
          <title>Use of technology is a necessity in order to have accurate elections</title>
        </sec>
        <sec id="sec-3-2-15">
          <title>Technology is not needed to have an accurate elections</title>
        </sec>
        <sec id="sec-3-2-16">
          <title>Current voting equipment is user friendly</title>
        </sec>
        <sec id="sec-3-2-17">
          <title>Encryption is free of government overreach</title>
        </sec>
        <sec id="sec-3-2-18">
          <title>Agencies such as the CIA and NSA have access encrypted data</title>
        </sec>
        <sec id="sec-3-2-19">
          <title>All eligible voters have an obligation to participate in the voting process</title>
        </sec>
        <sec id="sec-3-2-20">
          <title>Election oficials efectively maintain the accuracy of the results</title>
        </sec>
        <sec id="sec-3-2-21">
          <title>Security of the voting process comes before ensuring all people can vote</title>
        </sec>
        <sec id="sec-3-2-22">
          <title>Ensuring all people can vote comes before the security of the election</title>
        </sec>
        <sec id="sec-3-2-23">
          <title>Voter perception is easily influenced by the news/information they hear</title>
        </sec>
        <sec id="sec-3-2-24">
          <title>Restricting early voting would increase security in election systems</title>
        </sec>
        <sec id="sec-3-2-25">
          <title>Current voting procedures are user-friendly</title>
        </sec>
        <sec id="sec-3-2-26">
          <title>Current voting procedures makes it dificult to cast a ballot</title>
        </sec>
        <sec id="sec-3-2-27">
          <title>Vote counting and verification procedures ensures accuracy in elections</title>
        </sec>
        <sec id="sec-3-2-28">
          <title>Election oficials should be closely monitored during ballot counting and verificatio</title>
        </sec>
        <sec id="sec-3-2-29">
          <title>A paper record of each ballot is critical to accurate verification of the votes</title>
        </sec>
        <sec id="sec-3-2-30">
          <title>The ballot transportation method used can introduces security risks</title>
          <p>A survey utilizing the election system elements was created. After building the survey, we
conducted a pilot study to validate the survey instrument. A pilot study was conducted using
google forms which collected responses from eligible voters in the United States. This group
generally consists of all adults over the age of 18. There are however exceptions to this in some
states. For example, in 11 states felons lose their voting rights indefinitely for some crimes.</p>
          <p>
            In the pilot study, we collected 205 responses. This number of responses gives us suficient
data to be able to perform the validation on the survey [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ]. The validation process for a survey
deals with the process of assessing the dependability of the survey questions. The pilot study
was conducted by creating an online survey and responses were obtained by making a post
on social media, having others share the survey, as well as having the survey emailed out to
diferent groups on campus. Diversity of response will be critical to the research as eligible
voters include a wide variety of individuals.
          </p>
          <p>
            The purpose of this pilot study is to validate the survey instrument since it is a new survey
and has not been validated previously. Validation of the survey allows us to determine how
well the data we collected covers the areas and topics that we are researching in this study [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
The instrument was analyzed for each question to determine whether, based on responses, the
questions asked are valid [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. Since this study consists of a behavioral survey, having a survey
that is valid is a requirement for this type of instrument.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Validating the Instrument</title>
      <p>
        An analytical tool used for validating a new survey instrument is the Principal Component
Analysis (PCA) test. The PCA test facilitates the determination of the correlation structure
between the diferent variables [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This allows us to determine the correlation between
the components of this study which looks at the move to online voting, enhanced security,
perception of voters, and acceptance/use of the systems by the voters.
      </p>
      <p>
        The Kaiser-Meyer-Olkin (KMO) value determines how adequate the sample size was from
the data [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This value is calculated as a part of the principal component analysis. The KMO
value for the data collected during the pilot study was 0.772. For the sampling to be determined
adequate, it is better for the KMO value to be close to 1 with the minimum being 0.6.
      </p>
      <p>The next value within the PCA analysis would be the p-value. A low p-value shows that the
results are replicable and that the efect is large or that the result is of major theoretical, clinical
or practical importance. This value should be close to 0 and determined to be acceptable if less
than 0.1. The p-value was calculated to be less than 0.001. Therefore, this demonstrates that the
likelihood that the data we collected from the pilot study was less than a 0.001% chance that it
happened by chance.</p>
      <p>After reviewing the results of the PCA analysis, it was determined that there are 2 main
components within the survey instrument questions. The first main component found in the
questions is the structure of elections and the technology used in elections. The other primary
components in the questions are people and tasks. These components line up with the STM
component but appear to be combined into a smaller number of components.</p>
      <p>The PCA analysis revealed that some of the questions that we grouped together should be
grouped diferently based on the interpretation of the questions by the voters. For the most
part, the PCA analysis showed a general theme between the two components, with only a few
questions that did not seem to fit the general theme of the component.</p>
      <p>As demonstrated in Table 2 above, most of the questions from the ST component, which is
component 1, were strongly correlated with that component. However, some of them correlated
with both components using the threshold of 0.3 and -0.3, the question ST1 was strongly
correlated with both components. Most of the first component questions had negative loading
which indicates that it is a negative correlation. ST7 from the first component was not a strong
correlation with either of the components as the highest loading was in the first component as
-0.148.</p>
      <p>Within the second component, most of the item loadings were strong as most of them were
higher than 0.4, however questions PT2 and PT6 were both lower than 0.3, which indicates that
it was not as strong of a correlation with the component as well as it did not show a correlation
with component 1 as well.</p>
      <p>Even though the PCA did not group the questions together as we had them grouped, they
still demonstrated a general theme in the questions and some of the STM components merged
together. The reasoning behind this could have been due to how respondents interpreted the
questions as well as some of the questions do have some crossover between the four STM
components.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>While the intent of the study was to examine the impact of technology on user trust and
subsequent intent to use election systems, our interim findings have exposed an unexpected
theoretical finding that suggests further consideration. STM has long informed scholars on the
interaction between people and technology and is well established in the literature. Despite
this well established application, our process of validating the STM based instrument did not
support the validity of the theory itself.</p>
      <p>The question loadings within the PCA test did not load well into the four core constructs
of STM. This validation testing shows that structure and technology have an outsized impact
on the system while people and tasks are much more minimally significant. Feedback from
subject matter experts in quantitative data validation discussed the possibility that the way the
questions were asked may have impacted the question loading. The survey is in the process of
being adjusted to account for this possibility.</p>
      <p>If the subsequent validation testing shows similar results, it opens the possibility that the
theoretical foundation of STM should be revisited. The implication that the components of STM
are equally impactful is fairly unlikely and should be investigated further. Perhaps refinement
of the components themselves is called for as well.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kaufman</surname>
          </string-name>
          , M. Lapke,
          <article-title>The efect of homomorphic encryption on voters' perceptions of security in election systems</article-title>
          ,
          <source>in: Proceedings of the Southeastern Association for Information Systems</source>
          , Myrtle Beach, SC,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bostrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Heinen</surname>
          </string-name>
          ,
          <article-title>Mis problems and failures: A socio-technical perspective. part i: The causes</article-title>
          , MIS quarterly (
          <year>1977</year>
          )
          <fpage>17</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lyytinen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Newman</surname>
          </string-name>
          ,
          <article-title>Explaining information systems change: A punctuated sociotechnical change model</article-title>
          ,
          <source>European Journal of Information Systems</source>
          <volume>17</volume>
          (
          <year>2008</year>
          )
          <fpage>589</fpage>
          -
          <lpage>613</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Luhmann</surname>
          </string-name>
          ,
          <source>Theory of Society</source>
          , volume
          <volume>2</volume>
          , Stanford University Press, Stanford, CA,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Viechtbauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Smits</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kotz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Budé</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Spigt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Serroyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Crutzen</surname>
          </string-name>
          ,
          <article-title>A simple formula for the calculation of sample size in pilot studies</article-title>
          ,
          <source>Journal of clinical epidemiology 68</source>
          (
          <year>2015</year>
          )
          <fpage>1375</fpage>
          -
          <lpage>1379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Taherdoost</surname>
          </string-name>
          ,
          <article-title>Validity and reliability of the research instrument; how to test the validation of a questionnaire/survey in a research</article-title>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lapke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Henderson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <article-title>The disconnect between healthcare provider tasks and privacy requirements</article-title>
          ,
          <source>Health Policy and Technology</source>
          <volume>6</volume>
          (
          <year>2017</year>
          )
          <fpage>12</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Esbensen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Geladi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wold</surname>
          </string-name>
          ,
          <article-title>Principal component analysis</article-title>
          ,
          <source>Chemometrics and Intelligent Laboratory Systems</source>
          <volume>2</volume>
          (
          <year>1987</year>
          )
          <fpage>37</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>