{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:14:44Z","timestamp":1769548484044,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031437557","type":"print"},{"value":"9783031437564","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":264,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>While Internet voting is argued to have the potential to improve election processes, concerns about security risks remain one of its main adoption barriers. These concerns are furthermore aggravated by the lack of<jats:italic>transparency<\/jats:italic>of Internet voting systems that are often perceived as a \u201cblack box\u201d. Moreover, there is a research gap in conceptualizing the idea of transparency and in studying voters\u2019 attitudes towards transparency in Internet voting. In this work, we aim to address this gap by (1) Conducting a systematic literature review, from which we identified five dimensions of transparency; (2) Developing a questionnaire (Transparency Dimensions of Internet Voting, TDIV) to assess voters\u2019 attitudes regarding the correlation of these dimensions with transparency; and (3) Conducting an online study (N = 500) to investigate voters\u2019 attitudes towards transparency in Internet voting. We conclude that providing information about the security of the Internet voting system; testing it by independent experts for security vulnerabilities prior to the election; monitoring the election process and verifying its integrity; and providing a remedy for security breaches while holding the responsible parties accountable, are perceived by voters as important, and enhance transparency in Internet voting systems.<\/jats:p>","DOI":"10.1007\/978-3-031-43756-4_1","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T23:02:23Z","timestamp":1695337343000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Investigating Transparency Dimensions for\u00a0Internet Voting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9527-1924","authenticated-orcid":false,"given":"Samuel","family":"Agbesi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6732-4400","authenticated-orcid":false,"given":"Jurlind","family":"Budurushi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4031-161X","authenticated-orcid":false,"given":"Asmita","family":"Dalela","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4218-1658","authenticated-orcid":false,"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Agbesi, S., Dalela, A., Budurushi, J., Kulyk, O.: What will make me trust or not trust will depend upon how secure the technology is: factors influencing trust perceptions of the use of election technologies. E-Vote-ID 2022, p. 1 (2022)","DOI":"10.1007\/978-3-031-43756-4_1"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Aithal, A., Aithal, P.: Development and validation of survey questionnaire & experimental data-a systematical review-based statistical approach. Int. J. Manag. Technol. Soc. Sci. (IJMTS) 5(2), 233\u2013251 (2020)","DOI":"10.47992\/IJMTS.2581.6012.0116"},{"key":"1_CR3","unstructured":"Association, A.P., et al.: Apa. Ethical principles of psychologists and code of conduct (2017)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-030-49065-2_27","volume-title":"Human-Computer Interaction. Human Values and Quality of Life","author":"D Branley-Bell","year":"2020","unstructured":"Branley-Bell, D., Whitworth, R., Coventry, L.: User trust and understanding of explainable ai: exploring algorithm visualisations and user biases. In: Kurosu, M. (ed.) HCII 2020. LNCS, vol. 12183, pp. 382\u2013399. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49065-2_27"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Brunk, J., Mattern, J., Riehle, D.M.: Effect of transparency and trust on acceptance of automatic online comment moderation systems. In: 2019 IEEE 21st Conference on Business Informatics (CBI), vol. 1, pp. 429\u2013435. IEEE (2019)","DOI":"10.1109\/CBI.2019.00056"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-32747-6_14","volume-title":"E-Voting and Identity","author":"R Buckland","year":"2012","unstructured":"Buckland, R., Teague, V., Wen, R.: Towards best practice for E-election systems. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 224\u2013241. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32747-6_14"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-030-30625-0_6","volume-title":"Electronic Voting","author":"A Driza Maurer","year":"2019","unstructured":"Driza Maurer, A.: The swiss Post\/Scytl transparency exercise and its possible impact on internet voting regulation. In: Krimmer, R., et al. (eds.) E-Vote-ID 2019. LNCS, vol. 11759, pp. 83\u201399. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30625-0_6"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101718","volume":"39","author":"P Ehin","year":"2022","unstructured":"Ehin, P., Solvak, M., Willemson, J., Vinkel, P.: Internet voting in Estonia 2005\u20132019: evidence from eleven elections. Gov. Inf. Q. 39(4), 101718 (2022)","journal-title":"Gov. Inf. Q."},{"key":"1_CR9","unstructured":"Faraon, M., Stenberg, G., Budurushi, J., Kaipainen, M.: Positive but skeptical : a study of attitudes towards internet voting in Sweden. In: CeDEM Asia 2014 : Proceedings of the International Conference for E-Democracy and Open Government, pp. 191\u2013205 (2015)"},{"key":"1_CR10","unstructured":"Federal Constitutional Court of Germany: Decisions: Order of 03 March 2009\u20132 BvC 3\/07 (2009). http:\/\/www.bundesverfassungsgericht.de\/SharedDocs\/Entscheidungen\/EN\/2009\/03\/cs20090303_2bvc000307en.html. Accessed 7 Feb 2016"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-030-30625-0_7","volume-title":"Electronic Voting","author":"E Fragni\u00e8re","year":"2019","unstructured":"Fragni\u00e8re, E., Gr\u00e8zes, S., Ramseyer, R.: How do the swiss perceive electronic voting? Social insights from an exploratory qualitative research. In: Krimmer, R., et al. (eds.) E-Vote-ID 2019. LNCS, vol. 11759, pp. 100\u2013115. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30625-0_7"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Garfinkel, S., Matthews, J., Shapiro, S.S., Smith, J.M.: Toward algorithmic transparency and accountability (2017)","DOI":"10.1145\/3125780"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hair, J., Hult, G., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). SAGE Publications, Thousand Oaks (2021). https:\/\/books.google.dk\/books?id=6z83EAAAQBAJ","DOI":"10.1007\/978-3-030-80519-7"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Hair Jr, J.F., Hult, G.T.M., Ringle, C.M., Sarstedt, M., Danks, N.P., Ray, S.: Partial least squares structural equation modeling (PLS-SEM) using r: a workbook (2021)","DOI":"10.1007\/978-3-030-80519-7"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Hall, J.L.: Transparency and access to source code in E-voting. In: USENIX\/ACCURATE Electronic Voting Technology Workshop (2006)","DOI":"10.2139\/ssrn.909582"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.jbusres.2018.04.016","volume":"89","author":"SS Jain","year":"2018","unstructured":"Jain, S.S., Jain, S.P.: Power distance belief and preference for transparency. J. Bus. Res. 89, 135\u2013142 (2018)","journal-title":"J. Bus. Res."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kizilcec, R.F.: How much information? Effects of transparency on trust in an algorithmic interface. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 2390\u20132395 (2016)","DOI":"10.1145\/2858036.2858402"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Lyons, J.B., et al.: Shaping trust through transparent design: theoretical and experimental guidelines. In: Savage-Knepshield, P., Chen, J. (eds.) Advances in Human Factors in Robots and Unmanned Systems. AISC, vol. 499, pp. 127\u2013136. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-41959-6_11","DOI":"10.1007\/978-3-319-41959-6_11"},{"key":"1_CR20","unstructured":"Marky, K., Gerber, P., G\u00fcnther, S., Khamis, M., Fries, M., M\u00fchlh\u00e4user, M.: Investigating $$\\{$$State-of-the-Art$$\\}$$ practices for fostering subjective trust in online voting through interviews. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 4059\u20134076 (2022)"},{"issue":"5","key":"1_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3459604","volume":"28","author":"K Marky","year":"2021","unstructured":"Marky, K., Zollinger, M.L., Roenne, P., Ryan, P.Y., Grube, T., Kunze, K.: Investigating usability and user experience of individually verifiable internet voting schemes. ACM Trans. Comput.-Hum. Interact. (TOCHI) 28(5), 1\u201336 (2021)","journal-title":"ACM Trans. Comput.-Hum. Interact. (TOCHI)"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-319-58460-7_26","volume-title":"Human Aspects of Information Security, Privacy and Trust","author":"JRC Nurse","year":"2017","unstructured":"Nurse, J.R.C., et al.: An assessment of the security and transparency procedural components of the Estonian internet voting system. In: Tryfonas, T. (ed.) HAS 2017. LNCS, vol. 10292, pp. 366\u2013383. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58460-7_26"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Olembo, M.M., Renaud, K., Bartsch, S., Volkamer, M.: Voter, what message will motivate you to verify your vote? In: Workshop on Usable Security (2014)","DOI":"10.14722\/usec.2014.23038"},{"issue":"4","key":"1_CR24","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1016\/j.jesp.2009.03.009","volume":"45","author":"DM Oppenheimer","year":"2009","unstructured":"Oppenheimer, D.M., Meyvis, T., Davidenko, N.: Instructional manipulation checks: detecting satisficing to increase statistical power. J. Exp. Soc. Psychol. 45(4), 867\u2013872 (2009)","journal-title":"J. Exp. Soc. Psychol."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Portes, A., N\u2019goala, G., Cases, A.S.: Digital transparency: dimensions, antecedents and consequences on the quality of customer relationships. Recherche et Applications en Marketing (English Edition) 35(4), 72\u201398 (2020)","DOI":"10.1177\/2051570720973548"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-319-68687-5_15","volume-title":"Electronic Voting","author":"J Puiggal\u00ed","year":"2017","unstructured":"Puiggal\u00ed, J., Cucurull, J., Guasch, S., Krimmer, R.: Verifiability experiences in government online voting systems. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Sch\u00fcrmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 248\u2013263. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68687-5_15"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Rader, E., Cotter, K., Cho, J.: Explanations as mechanisms for supporting algorithmic transparency. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2018)","DOI":"10.1145\/3173574.3173677"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Redmiles, E.M., Kross, S., Mazurek, M.L.: How well do my results generalize? Comparing security and privacy survey results from MTurk, web, and telephone samples. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1326\u20131343. IEEE (2019)","DOI":"10.1109\/SP.2019.00014"},{"key":"1_CR29","unstructured":"Ringle, C.M., Wende, S., Becker, J.M.: Smartpls 4 (2022). http:\/\/www.smartpls.com"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Saldanha, D.M.F., SILVA, M.B.D.: Transparency and accountability of government algorithms: the case of the Brazilian electronic voting system. Cadernos EBAPE. BR 18, 697\u2013712 (2020)","DOI":"10.1590\/1679-395120190023x"},{"issue":"4","key":"1_CR31","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1080\/12460125.2020.1819094","volume":"29","author":"P Schmidt","year":"2020","unstructured":"Schmidt, P., Biessmann, F., Teubner, T.: Transparency and trust in artificial intelligence systems. J. Decis. Syst. 29(4), 260\u2013278 (2020)","journal-title":"J. Decis. Syst."},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-60347-2_14","volume-title":"Electronic Voting","author":"M Solvak","year":"2020","unstructured":"Solvak, M.: Does vote verification work: usage and impact of confidence building technology in internet voting. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 213\u2013228. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60347-2_14"},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1080\/15309576.2015.1108798","volume":"39","author":"C Song","year":"2016","unstructured":"Song, C., Lee, J.: Citizens\u2019 use of social media in government, perceived transparency, and trust in government. Public Perform. Manag. Rev. 39(2), 430\u2013453 (2016)","journal-title":"Public Perform. Manag. Rev."},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-32747-6_2","volume-title":"E-Voting and Identity","author":"O Spycher","year":"2012","unstructured":"Spycher, O., Volkamer, M., Koenig, R.: Transparency and technical measures to establish trust in Norwegian internet voting. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 19\u201335. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32747-6_2"},{"key":"1_CR35","unstructured":"Volkamer, M., Kulyk, O., Ludwig, J., Fuhrberg, N.: Increasing security without decreasing usability: a comparison of various verifiable voting systems. In: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 233\u2013252 (2022)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Spycher, O., Dubuis, E.: Measures to establish trust in internet voting. In: Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, pp. 1\u201310 (2011)","DOI":"10.1145\/2072069.2072071"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Yang, X.J., Unhelkar, V.V., Li, K., Shah, J.A.: Evaluating effects of user experience and system transparency on trust in automation. In: 2017 12th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 408\u2013416. IEEE (2017)","DOI":"10.1145\/2909824.3020230"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-86942-7_11","volume-title":"Electronic Voting","author":"M-L Zollinger","year":"2021","unstructured":"Zollinger, M.-L., Estaji, E., Ryan, P.Y.A., Marky, K.: Just for the sake of transparency: exploring voter mental models of\u00a0verifiability. In: Krimmer, R., et al. (eds.) E-Vote-ID 2021. LNCS, vol. 12900, pp. 155\u2013170. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86942-7_11"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43756-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T09:21:17Z","timestamp":1703236877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43756-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031437557","9783031437564"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43756-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}