{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:11:54Z","timestamp":1743088314027,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030603465"},{"type":"electronic","value":"9783030603472"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60347-2_6","type":"book-chapter","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T06:02:54Z","timestamp":1600927374000},"page":"84-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bayesian Audits Are Average But Risk-Limiting Audits are Above Average"],"prefix":"10.1007","author":[{"given":"Amanda K.","family":"Glazer","sequence":"first","affiliation":[]},{"given":"Jacob V.","family":"Spertus","sequence":"additional","affiliation":[]},{"given":"Philip B.","family":"Stark","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"key":"6_CR1","unstructured":"American Statistical Association. American Statistical Association statement on risk-limiting post-election audits (2010). www.amstat.org\/outreach\/pdfs\/Risk-Limiting_Endorsement.pdf"},{"issue":"2","key":"6_CR2","first-page":"523","volume":"4","author":"A Appel","year":"2020","unstructured":"Appel, A., Stark, P.: Evidence-based elections: create a meaningful paper trail, then audit. Georgetown Law Technol. Rev. 4(2), 523\u2013541 (2020). https:\/\/georgetownlawtechreview.org\/wp-content\/uploads\/2020\/07\/4.2-p523-541-Appel-Stark.pdf","journal-title":"Georgetown Law Technol. Rev."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Appel, A., DeMillo, R., Stark, P.: Ballot-marking devices cannot assure the will of the voters. Elect. Law J. Rules Polit. Policy (2020). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3375755","DOI":"10.2139\/ssrn.3375755"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bernhard, M., et al.: Can voters detect malicious manipulation of ballot marking devices? In: 41st IEEE Symposium on Security and Privacy (2020). https:\/\/jhalderm.com\/pub\/papers\/bmd-verifiability-sp20.pdf","DOI":"10.1109\/SP40000.2020.00118"},{"key":"6_CR5","unstructured":"Bickel, P., Doksum, K.: Mathematical Statistics: Basic Ideas and Selected Topics. Pearson (2006)"},{"key":"6_CR6","unstructured":"Blom, M., Stuckey, P., Teague, V.: RAIRE: Risk-limiting audits for IRV elections (2019). https:\/\/arxiv.org\/abs\/1903.08804"},{"key":"6_CR7","unstructured":"Brennan Center for Justice, Rhode Island RLA Working Group. Pilot implementation study of risk-limiting audit methods in the state of Rhode Island (2019). https:\/\/www.brennancenter.org\/our-work\/research-reports\/pilot-implementation-study-risk-limiting-audit-methods-state-rhode-island"},{"key":"6_CR8","unstructured":"Colorado Secretary of State. Audit Center (2020). https:\/\/www.sos.state.co.us\/pubs\/elections\/auditCenter.html"},{"key":"6_CR9","unstructured":"Howard, L., Rivest, R., Stark, P.: A review of robust post-election audits: Various methods of risk-limiting audits and Bayesian audits. Technical report, Brennan Center for Justice (2019). https:\/\/www.brennancenter.org\/sites\/default\/files\/2019-11\/2019_011_RLA_Analysis_FINAL_0.pdf"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Z., Rivest, R., Stark, P., Teague, V., Vukcevic, D.: A unified evaluation of two-candidate ballot-polling election auditing methods. In: Proceedings of the 5th Annual Conference on Electronic Voting (E-Vote-ID 2020) (2020)","DOI":"10.1007\/978-3-030-60347-2_8"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2012.56","volume":"10","author":"M Lindeman","year":"2012","unstructured":"Lindeman, M., Stark, P.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10, 42\u201349 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR12","unstructured":"McCammon, S.: Virginia Republican David Yancey wins tie-breaking drawing (2018). https:\/\/www.npr.org\/2018\/01\/04\/573504079\/virginia-republican-david-yancey-wins-tie-breaking-drawing"},{"key":"6_CR13","unstructured":"Michigan Secretary of State. Pilot audit of march presidential primary results showcases security, accuracy of Michigan elections systems (2020). www.michigan.gov\/sos\/0,4670,7--127-531561-,00.html"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Morin, S., McClearn, G., McBurnett, N., Vora, P., Zagorski, F.: A note on risk-limiting Bayesian polling audits for two-candidate elections. In: Voting 2020 (2020, in press)","DOI":"10.1007\/978-3-030-54455-3_24"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"National Academies of Sciences: Engineering, and Medicine. Protecting American Democracy. The National Academies Press, Washington, DC, Securing the Vote (2018). https:\/\/doi.org\/10.17226\/25120. https:\/\/www.nap.edu\/catalog\/25120\/securing-the-vote-protecting-american-democracy. ISBN 978-0-309-47647-8","DOI":"10.17226\/25120"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Ottoboni, K., Stark, P.: Election integrity and electronic voting machines in 2018 Georgia, USA. In: E-Vote-ID 2019 Proceedings (2019). Preprint: https:\/\/ssrn.com\/abstract=3426250","DOI":"10.1007\/978-3-030-30625-0_11"},{"key":"6_CR17","unstructured":"Ottoboni, K., Bernhard, M., Halderman, A., Rivest, R., Stark, P.: Bernoulli ballot polling: a manifest improvement for risk-limiting audits. In: Proceedings of the 4th Annual Workshop on Advances in Secure Electronic Voting (Voting 2019) (2018). Preprint: http:\/\/arxiv.org\/abs\/1812.06361"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-00419-4_12","volume-title":"Electronic Voting","author":"K Ottoboni","year":"2018","unstructured":"Ottoboni, K., Stark, P.B., Lindeman, M., McBurnett, N.: Risk-limiting audits by stratified union-intersection tests of elections (SUITE). In: Krimmer, R., et al. (eds.) E-Vote-ID 2018. LNCS, vol. 11143, pp. 174\u2013188. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00419-4_12"},{"key":"6_CR19","unstructured":"Richie, R., Smith, H.: A survey and analysis of statewide election recounts 2000\u20132015 (2015). https:\/\/fairvote.app.box.com\/v\/recounts"},{"key":"6_CR20","unstructured":"Rivest, R., Shen, E.: A Bayesian method for auditing elections. In: Proceedings of the 2012 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 2012). USENIX, August 2012"},{"key":"6_CR21","unstructured":"Rivest, R.L.: Bayesian tabulation audits: Explained and extended, January 1, 2018. https:\/\/arxiv.org\/abs\/1801.00528"},{"key":"6_CR22","unstructured":"Select Committee on Intelligence. Russian active measures campaigns and interference in the 2016 U.S. election (2019). https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/Report_Volume1.pdf"},{"key":"6_CR23","first-page":"550","volume":"2","author":"P Stark","year":"2008","unstructured":"Stark, P.: Conservative statistical post-election audits. Ann. Appl. Stat. 2, 550\u2013581 (2008). http:\/\/arxiv.org\/abs\/0807.4005","journal-title":"Ann. Appl. Stat."},{"key":"6_CR24","unstructured":"Stark, P.: Election audits by sampling with probability proportional to an error bound: dealing with discrepancies (2008). https:\/\/www.stat.berkeley.edu\/~stark\/Preprints\/ppebwrwd08.pdf"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Stark, P.: Sets of half-average nulls generate risk-limiting audits: SHANGRLA. In: Voting 2020 (2020, in press). Preprint: http:\/\/arxiv.org\/abs\/1911.10035","DOI":"10.1007\/978-3-030-54455-3_23"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2012.62","volume":"10","author":"PB Stark","year":"2012","unstructured":"Stark, P.B., Wagner, D.A.: Evidence-based elections. IEEE Secur. Priv. 10, 33\u201341 (2012). https:\/\/www.stat.berkeley.edu\/~stark\/Preprints\/evidenceVote12.pdf","journal-title":"IEEE Secur. Priv."},{"key":"6_CR27","unstructured":"Verified Voting. The Verifier (2020). https:\/\/verifiedvoting.org\/verifier\/#mode\/navigate\/map\/ppEquip\/mapType\/normal\/year\/2020"},{"key":"6_CR28","unstructured":"Vora, P.: Risk-limiting Bayesian polling audits for two-candidate elections (2019). https:\/\/arxiv.org\/abs\/1902.00999"},{"key":"6_CR29","unstructured":"Zetter, K.: The crisis of election security. The New York Times (2018). https:\/\/www.nytimes.com\/2018\/09\/26\/magazine\/election-security-crisis-midterms.html"},{"key":"6_CR30","unstructured":"Zetter, K.: Critical U.S. election systems have been left exposed online despite official denials. Vice (2019). https:\/\/www.vice.com\/en_us\/article\/3kxzk9\/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials"},{"key":"6_CR31","unstructured":"Zetter, K.: How close did Russia really come to hacking the 2016 election? Politico (2019). https:\/\/www.politico.com\/news\/magazine\/2019\/12\/26\/did-russia-really-hack-2016-election-088171"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60347-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T19:27:20Z","timestamp":1645212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-60347-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030603465","9783030603472"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60347-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bregenz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}