{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:08:43Z","timestamp":1757628523658,"version":"3.44.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032050359","type":"print"},{"value":"9783032050366","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>As digitalization advances, online elections are becoming increasingly prevalent. State-of-the-art internet voting systems implement verifiability, which allows to observe the election result to be correct, while safeguarding the secrecy of the election. However, the continued use of unverifiable \u2018black-box\u2019 systems suggests that election organizers may be unaware of the security challenges in internet voting and the mitigation strategies\u00a0that have been developed.<\/jats:p>\n          <jats:p>To address this gap, we developed an informative video on the\u00a0topic for election organizers who are non-experts in internet voting.\u00a0To ensure that the simplifications made for our target audience do\u00a0not lead to misunderstandings, 19 German-speaking internet voting experts evaluated the video. Based on their feedback, we consider improvements to the video to enhance its correctness, clarity,\u00a0and completeness. Further, developing the video and then performing\u00a0the expert evaluation provided valuable experiences and lessons learned we want to share with similar endeavours trying to simplify complex topics for non-expert audiences.<\/jats:p>","DOI":"10.1007\/978-3-032-05036-6_7","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:34Z","timestamp":1757488954000},"page":"107-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development and\u00a0Expert Evaluation of\u00a0an\u00a0Informative Video Concerning Verifiable Internet Voting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9267-5109","authenticated-orcid":false,"given":"Tobias","family":"Hilt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2268-2367","authenticated-orcid":false,"given":"Florian","family":"Moser","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1523-3875","authenticated-orcid":false,"given":"Philipp","family":"Matheis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Cortier, V., Debant, A., Moser, F.: Code voting: when simplicity meets security. In: Computer Security \u2013 ESORICS 2024, pp. 410\u2013429. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-70890-9_21"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Cortier, V., Gaudry, P., Glondu, S.: Belenios: a simple private and verifiable electronic voting system, pp. 214\u2013238. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-19052-1_14"},{"key":"7_CR3","unstructured":"Federal Chancellery: Federal chancellery ordinance on electronic voting (2013). https:\/\/www.fedlex.admin.ch\/eli\/cc\/2022\/336\/en"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.electstud.2017.03.001","volume":"47","author":"M Germann","year":"2017","unstructured":"Germann, M., Serd\u00fclt, U.: Internet voting and turnout: evidence from Switzerland. Elect. Stud. 47, 1\u201312 (2017)","journal-title":"Elect. Stud."},{"key":"7_CR5","unstructured":"Gharadaghy, R., Volkamer, M.: Verifiability in electronic voting - explanations for non security experts. In: Krimmer, R., Grimm, R. (eds.) Electronic Voting 2010. LNI, vol. P-167, pp. 151\u2013162. GI (2010)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Haenni, R., Koenig, R.E., Locher, P.: Private internet voting on untrusted voting devices. In: Financial Cryptography and Data Security. FC 2023 International Workshops, pp. 47\u201362. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-48806-1_4"},{"key":"7_CR7","unstructured":"Haenni, R., Koenig, R.E., Locher, P., Dubuis, E.: CHVote protocol specification. Cryptology ePrint Archive, Paper 2017\/325 (2017). https:\/\/eprint.iacr.org\/2017\/325"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Verifiable internet voting in Estonia. In: 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE), pp.\u00a01\u20138 (2014)","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Verifiable internet voting in Estonia. In: International Conference on Electronic Voting (EVOTE) (2014)","DOI":"10.1109\/EVOTE.2014.7001135"},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013105 (2004)","journal-title":"MIS Q."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hilt, T., Berens, B., Truderung, T., Udovychenko, M., Neumann, S., Volkamer, M.: Systematic user evaluation of a second device based cast-as-intended verifiability approach. In: Voting\u201924. Springer (2024)","DOI":"10.1007\/978-3-031-69231-4_3"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Krimmer, R., Duenas-Cid, D., Krivonosova, I., Vinkel, P., Koitmae, A.: How much does an e-vote cost? Cost comparison per vote in multichannel elections in Estonia. In: Electronic Voting, pp. 117\u2013131. Springer, Cham (2018)","DOI":"10.1007\/978-3-030-00419-4_8"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2017.70","volume":"15","author":"O Kulyk","year":"2017","unstructured":"Kulyk, O., Neumann, S., Budurushi, J., Volkamer, M.: Nothing comes for free: How much usability can you sacrifice for security? IEEE Secur. Priv. 15(3), 24\u201329 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-031-45648-0_29","volume-title":"Information Systems and Technologies","author":"P Liesbrock","year":"2024","unstructured":"Liesbrock, P., Sneiders, E.: Assessing poor adoption of the Eid in Germany. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F., Colla, V. (eds.) Information Systems and Technologies, pp. 292\u2013301. Springer, Cham (2024)"},{"key":"7_CR15","unstructured":"Llewellyn, M., et al.: Testing voters\u2019 understanding of a security mechanism used in verifiable voting. In: 2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13). USENIX Association (2013)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Manasrah, A., Masoud, M., Jaradat, Y.: Short videos, or long videos? A study on the ideal video length in online learning. In: 2021 International Conference on Information Technology (ICIT), pp. 366\u2013370 (2021)","DOI":"10.1109\/ICIT52682.2021.9491115"},{"key":"7_CR17","unstructured":"Moser, F., Kirsten, M., D\u00f6rre, F.: SoK: mechanisms used in practice for verifiable internet voting. In: 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024). LNI, Gesellschaft f\u00fcr Informatik (2024)"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"204","DOI":"10.3102\/0034654321990713","volume":"91","author":"M Noetel","year":"2021","unstructured":"Noetel, M., et al.: Video improves learning in higher education: a systematic review. Rev. Educ. Res. 91(2), 204\u2013236 (2021)","journal-title":"Rev. Educ. Res."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sch\u00fcrmann, C., Jensen, L.H., Sigbj\u00f6rnsd\u00f3ttir, R.M.: Effective cybersecurity awareness training for election officials. In: Electronic Voting, pp. 196\u2013212. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-60347-2_13"},{"key":"7_CR20","unstructured":"Storer, T., Little, L., Duncan, I.: An exploratory study of voter attitudes towards a pollsterless remote voting system. In: IaVoSS Workshop on Trustworthy Elections (WOTE 06) Pre-Proceedings, pp. 77\u201386. Citeseer (2006)"},{"key":"7_CR21","unstructured":"Swiss Post Ltd.: Swiss post voting system \u2013 system specification (version 1.4.1), Technical report, Swiss Post Ltd. (2024)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Th\u00fcrw\u00e4chter, P.T., Volkamer, M., Kulyk, O.: Individual verifiability with return codes: manipulation detection efficacy. In: Electronic Voting, pp. 139\u2013156. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-15911-4_9"},{"key":"7_CR23","unstructured":"Volkamer, M., Kulyk, O., Ludwig, J., Fuhrberg, N.: Increasing security without decreasing usability: a comparison of various verifiable voting systems. In: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 233\u2013252. USENIX Association (2022)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Wikstr\u00f6m, D.: A universally composable mix-net. In: Theory of Cryptography, pp. 317\u2013335. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24638-1_18"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Wolchok, S., Wustrow, E., Isabel, D., Halderman, J.A.: Attacking the Washington, D.C. internet voting system. In: Financial Cryptography and Data Security, pp. 114\u2013128. Springer, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-32946-3_10"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05036-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:40Z","timestamp":1757488960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05036-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032050359","9783032050366"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05036-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nancy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id-2025.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}