{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:09:19Z","timestamp":1757628559928,"version":"3.44.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032050359","type":"print"},{"value":"9783032050366","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>While internet voting can enhance democratic participation, concerns about voter coercion have emerged due to\u00a0the uncontrolled voting environment. To mitigate this, researchers\u00a0have proposed different types of <jats:italic>counter-strategies<\/jats:italic>, allowing voters to cast their intended vote despite being coerced. We conduct semi-structured interviews (<jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$N = 26$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>N<\/mml:mi>\n                    <mml:mo>=<\/mml:mo>\n                    <mml:mn>26<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>) to investigate voters\u2019 perceptions of six types of counter-strategies concerning\u00a0their effectiveness. Our findings show that the voter\u2019s perception\u00a0of the effectiveness of counter-strategies depends on both\u00a0the technical and personal skills of voters, concrete risks, and ease\u00a0of use. Overall, our findings pave the way for future research aimed\u00a0at developing user-friendly solutions that are effective against\u00a0voter coercion.<\/jats:p>","DOI":"10.1007\/978-3-032-05036-6_10","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:23Z","timestamp":1757488943000},"page":"158-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Voting Under Pressure: Perceptions of\u00a0Counter-Strategies in\u00a0Internet Voting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7912-9249","authenticated-orcid":false,"given":"Christina","family":"Nissen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9267-5109","authenticated-orcid":false,"given":"Tobias","family":"Hilt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6732-4400","authenticated-orcid":false,"given":"Jurlind","family":"Budurushi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4218-1658","authenticated-orcid":false,"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Agbesi, S., Budurushi, J., Dalela, A., Nissen, C., Kulyk, O.: How to increase transparency and trust in internet voting systems: an experimental study. In: Proceedings of the 13th Nordic Conference on Human-Computer Interaction. NordiCHI \u201924, Association for Computing Machinery, New York, NY, USA (2024)","DOI":"10.1145\/3679318.3685362"},{"key":"10_CR2","first-page":"1","volume":"2022","author":"S Agbesi","year":"2022","unstructured":"Agbesi, S., Dalela, A., Budurushi, J., Kulyk, O.: \u201cWhat will make me trust or not trust will depend upon how secure the technology is\u2019\u2019: factors influencing trust perceptions of the use of election technologies. E-Vote-ID 2022, 1 (2022)","journal-title":"E-Vote-ID"},{"key":"10_CR3","unstructured":"Aranha, D.F., Battagliola, M., Roy, L.: Faster coercion-resistant e-voting by encrypted sorting. Cryptology ePrint Archive, Paper 2023\/837 (2023)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-17619-7_20","volume-title":"Cryptology and Network Security","author":"R Ara\u00fajo","year":"2010","unstructured":"Ara\u00fajo, R., Ben Rajeb, N., Robbana, R., Traor\u00e9, J., Youssfi, S.: Towards practical and secure coercion-resistant electronic elections. In: Heng, S.H., Wright, R.N., Goi, B.M. (eds.) Cryptology and Network Security, pp. 278\u2013297. Springer, Berlin Heidelberg, Berlin, Heidelberg (2010)"},{"key":"10_CR5","unstructured":"Bj\u00f8rner, T.: Why \u2019Qualitative Methods for Consumer Research\u2019?, pp. 11\u201315. Hans Reitzels Forlag, Denmark (2015)"},{"key":"10_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-63396-7_11","volume-title":"Information Systems","author":"M Chaieb","year":"2020","unstructured":"Chaieb, M., Yousfi, S.: LOKI vote: a blockchain-based coercion resistant E-voting protocol. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds.) EMCIS 2020. LNBIP, vol. 402, pp. 151\u2013168. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63396-7_11"},{"key":"10_CR7","unstructured":"Chaum, D., et al.: VoteXX: a solution to improper influence in voter-verifiable elections. Cryptology ePrint Archive, Paper 2022\/1212 (2022)"},{"key":"10_CR8","unstructured":"Christiano, L., Longo, R., Spadafora, C.: Click and cast: assessing the usability of vote app. In: Electronic Voting: 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2\u20134, 2024, Proceedings (2024)"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-27576-0_4","volume-title":"Financial Cryptography and Data Security","author":"J Clark","year":"2012","unstructured":"Clark, J., Hengartner, U.: Selections: internet voting with over-the-shoulder coercion-resistance. In: Danezis, G. (ed.) Financial Cryptography and Data Security, pp. 47\u201361. Springer, Berlin Heidelberg, Berlin, Heidelberg (2012)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"10_CR11","unstructured":"Cortier, V., Gaudry, P., Yang, Q.: Is the JCJ voting system really coercion-resistant? Cryptology ePrint Archive, Paper 2022\/430 (2022)"},{"issue":"4","key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101718","volume":"39","author":"P Ehin","year":"2022","unstructured":"Ehin, P., Solvak, M., Willemson, J., Vinkel, P.: Internet voting in Estonia 2005\u20132019: evidence from eleven elections. Gov. Inf. Q. 39(4), 101718 (2022)","journal-title":"Gov. Inf. Q."},{"key":"10_CR13","unstructured":"of\u00a0Europe, C.: Recommendation cm\/rec(2017)5[1] of the committee of ministers to member states on standards for e-voting"},{"key":"10_CR14","unstructured":"Feier, C., Neumann, S., Volkamer, M.: Coercion-resistant internet voting in practice. In: Informatik 2014, pp. 1401\u20131414. Gesellschaft f\u00fcr Informatik e.V., Bonn (2014)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Giustolisi, R., Garjan, M.S., Schuermann, C.: Thwarting last-minute voter coercion. Cryptology ePrint Archive, Paper 2023\/1876 (2023)","DOI":"10.1109\/SP54263.2024.00112"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Guest, G., Bunce, A., Johnson, L.: How many interviews are enough? An experiment with data saturation and variability. Field Meth. 18, 59\u201382 (02 2006)","DOI":"10.1177\/1525822X05279903"},{"key":"10_CR17","unstructured":"Haines, T., Mueller, J.: How not to VoteAgain: pitfalls of scalable coercion-resistant e-voting. Cryptology ePrint Archive, Paper 2020\/1406 (2020)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Haines, T., M\u00fcller, J., Querejeta-Azurmendi, I.n.: Scalable coercion-resistant e-voting under weaker trust assumptions. In: Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing, pp. 1576\u20131584. SAC \u201923, Association for Computing Machinery, New York, NY, USA (2023)","DOI":"10.1145\/3555776.3578730"},{"key":"10_CR19","unstructured":"Hilt, T., Kulyk, O., Volkamer, M.: German social elections 2023: An overview and first analysis. In: E-Vote-ID 2023. Lecture Notes in Informatics - Proceedings, Gesellschaft f\u00fcr Informatik (GI) (2023), 46.23.01; LK 01"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections, pp. 37\u201363. Springer Berlin Heidelberg, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12980-3_2"},{"key":"10_CR21","unstructured":"Kristensen, P.K., Pedersen, L.E.M.: Under corona har vi klaret alt online \u2013 derfor kan du ikke stemme digitalt (2021). https:\/\/www.dr.dk\/nyheder\/politik\/kommunalvalg\/under-corona-har-vi-klaret-alt-online-derfor-kan-du-ikke-stemme. Accessed 06 May 2025"},{"key":"10_CR22","unstructured":"Kulyk, O., Neumann, S.: Human factors in coercion resistant internet voting \u2013 a review of existing solutions and open challenges (2020)"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-662-53357-4_11","volume-title":"Financial Cryptography and Data Security","author":"P Locher","year":"2016","unstructured":"Locher, P., Haenni, R., Koenig, R.E.: Coercion-resistant internet voting with everlasting privacy. In: Clark, J., Meiklejohn, S., Ryan, P.Y., Wallach, D., Brenner, M., Rohloff, K. (eds.) Financial Cryptography and Data Security, pp. 161\u2013175. Springer, Berlin Heidelberg, Berlin, Heidelberg (2016)"},{"key":"10_CR24","unstructured":"Longo, R., Spadafora, C.: Amun: Securing e-voting against over-the-shoulder coercion. Cryptology ePrint Archive, Paper 2021\/851 (2021)"},{"key":"10_CR25","unstructured":"Lueks, W., Querejeta-Azurmendi, I., Troncoso, C.: VoteAgain: a scalable coercion-resistant voting system. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1553\u20131570. USENIX Association (2020)"},{"key":"10_CR26","unstructured":"Marky, K., Gerber, P., G\u00fcnther, S., Khamis, M., Fries, M., M\u00fchlh\u00e4user, M.: Investigating State-of-the-Art practices for fostering subjective trust in online voting through interviews. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 4059\u20134076. USENIX Association, Boston, MA (2022)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Merino, L.H., et al.: E-vote your conscience: perceptions of coercion and vote buying, and the usability of fake credentials in online voting. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 3478\u20133496 (2024)","DOI":"10.1109\/SP54263.2024.00252"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Neto, A.S., Leite, M., Ara\u00fajo, R., Mota, M.P., Neto, N.C.S., Traor\u00e9, J.: Usability considerations for coercion-resistant election systems. In: Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. IHC \u201918, Association for Computing Machinery, New York, NY, USA (2018). 10.1145\/3274192.3274232, https:\/\/doi-org.ep.ituproxy.kb.dk\/10.1145\/3274192.3274232","DOI":"10.1145\/3274192.3274232"},{"key":"10_CR29","unstructured":"Neumann, S., Feier, C., Volkamer, M., Koenig, R.: Towards a practical JCJ \/ civitas implementation. Cryptology ePrint Archive, Paper 2013\/464 (2013)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Neumann, S., Volkamer, M.: Civitas and the real world: Problems and solutions from a practical point of view. In: 2012 Seventh International Conference on Availability, Reliability and Security, pp. 180\u2013185 (2012)","DOI":"10.1109\/ARES.2012.75"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"160940691989922","DOI":"10.1177\/1609406919899220","volume":"19","author":"C O\u2019Connor","year":"2020","unstructured":"O\u2019Connor, C., Joffe, H.: Intercoder reliability in qualitative research: debates and practical guidelines. Int. J. Qual. Meth. 19, 1609406919899220 (2020)","journal-title":"Int. J. Qual. Meth."},{"issue":"4","key":"10_CR32","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3758\/BF03331011","volume":"11","author":"A Paivio","year":"1968","unstructured":"Paivio, A., Rogers, T.B., Smythe, P.C.: Why are pictures easier to recall than words? Psych. Sci. 11(4), 137\u2013138 (1968). https:\/\/doi.org\/10.3758\/BF03331011","journal-title":"Psych. Sci."},{"key":"10_CR33","doi-asserted-by":"publisher","unstructured":"Song, H., Healey, J., Siu, A.F., Wigington, C., Stasko, J.: Experts prefer text but videos help novices: an analysis of the utility of multi-media content. In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, pp. 1\u20139. CHI \u201923, ACM (2023). https:\/\/doi.org\/10.1145\/3544549.3585900","DOI":"10.1145\/3544549.3585900"},{"key":"10_CR34","unstructured":"Spadafora, C., Longo, R., Sala, M.: Coercion-resistant blockchain-based e-voting protocol. Cryptology ePrint Archive, Paper 2020\/674 (2020)"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Vassil, K., Solvak, M., Vinkel, P., Trechsel, A.H., Alvarez, R.M.: The diffusion of internet voting. usage patterns of internet voting in Estonia between 2005 and 2015. Govern. Info. Quart. 33(3), 453\u2013459 (2016)","DOI":"10.1016\/j.giq.2016.06.007"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Spycher, O., Dubuis, E.: Measures to establish trust in internet voting. In: Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, pp. 1\u201310 (2011)","DOI":"10.1145\/2072069.2072071"},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-04135-8_2","volume-title":"E-Voting and Identity","author":"R Wen","year":"2009","unstructured":"Wen, R., Buckland, R.: Masked ballot voting for receipt-free online elections. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) E-Voting and Identity, pp. 18\u201336. Springer, Berlin Heidelberg, Berlin, Heidelberg (2009)"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Zhaoju, Z., Hanbo, L., Hong, D.: Verifiable receipt-free electronic voting system based on mask ballot. In: 2021 IEEE 9th International Conference on Smart City and Informatization (iSCI), pp. 47\u201352 (2021)","DOI":"10.1109\/iSCI53438.2021.00016"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05036-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T08:02:39Z","timestamp":1757491359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05036-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032050359","9783032050366"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05036-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nancy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id-2025.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}