{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:21:07Z","timestamp":1773879667899,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_41","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"463-474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Users\u2019 Mental Models for Three End-to-End Voting Systems: Helios, Pr\u00eat \u00e0 Voter, and Scantegrity II"],"prefix":"10.1007","author":[{"given":"Claudia Z.","family":"Acemyan","sequence":"first","affiliation":[]},{"given":"Philip","family":"Kortum","sequence":"additional","affiliation":[]},{"given":"Michael D.","family":"Byrne","sequence":"additional","affiliation":[]},{"given":"Dan S.","family":"Wallach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"41_CR1","unstructured":"Nielsen, J.: Mental Models. \n                      http:\/\/www.nngroup.com\/articles\/mental-models\/"},{"key":"41_CR2","unstructured":"Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335\u2013348 (2008)"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2009.2033233","volume":"4","author":"PYA Ryan","year":"2009","unstructured":"Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4, 662\u2013673 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2008.70","volume":"6","author":"D Chaum","year":"2008","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A., Vora, P.: Scantegrity: End-to-end voter-verifiable optical-scan voting. IEEE Secur. Priv. 6, 40\u201346 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"41_CR5","first-page":"26","volume":"2","author":"CZ Acemyan","year":"2014","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Usability of voter verifiable, end-to-end voting systems: baseline data for Helios, Pr\u00eat \u00e0 Voter, and Scantegrity II. USENIX J. Elect. Technol. Syst. 2, 26\u201356 (2014)","journal-title":"USENIX J. Elect. Technol. Syst."},{"key":"41_CR6","unstructured":"Winckler, M., Bernhaupt, R., Palanque, P., Lundin, D., Leach, K., Ryan, P., Alberdi, E., Strigini, L.: Assessing the usability of open verifiable e-voting systems: a trial with the system Pr\u00eat \u00e0 voter. In: Proceedings of ICEGOV 2009. pp. 281\u2013296 (2009)"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1037\/0033-2909.100.3.349","volume":"100","author":"WB Rouse","year":"1986","unstructured":"Rouse, W.B., Morris, N.M.: On looking into the black box: Prospects and limits in the search for mental models. Psychol. Bull. 100, 349\u2013363 (1986)","journal-title":"Psychol. Bull."},{"key":"41_CR8","first-page":"7","volume-title":"Mental Models","author":"DA Norman","year":"1983","unstructured":"Norman, D.A.: Some observationson mental models. In: Gentner, D., Stevens, A.L. (eds.) Mental Models, pp. 7\u201314. Lawrence Erlbaum Associates, Hillsdale (1983)"},{"key":"41_CR9","volume-title":"On the Structure of Knowledge: A Morphology of Mental Models in a Man-Machine System Context","author":"J Rasmussen","year":"1979","unstructured":"Rasmussen, J.: On the structure of knowledge: a morphology of mental models in a man-machine system context. Ris\u00f8 National Laboratory, Ris\u00f8 (1979)"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Byrne, M., Greene, K., Everett, S.: Usability of voting systems: Baseline data for paper, punch cards, and lever machines. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 171\u2013180, ACM (2007)","DOI":"10.1145\/1240624.1240653"},{"key":"41_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-540-88313-5_25","volume-title":"Computer Security - ESORICS 2008","author":"D Lundin","year":"2008","unstructured":"Lundin, D., Ryan, P.Y.: Human readable paper verification of Pr\u00eat \u00e0 voter. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 379\u2013395. Springer, Heidelberg (2008)"},{"key":"41_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-12980-3_12","volume-title":"Towards Trustworthy Elections","author":"PY Ryan","year":"2010","unstructured":"Ryan, P.Y., Peacock, T.: A threat analysis of Pr\u00eat \u00e0 voter. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections, New Directions in Electronic Voting. LNCS, vol. 6000, pp. 200\u2013215. Springer, Heidelberg (2010)"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/11863908_20","volume-title":"Computer Security \u2013 ESORICS 2006","author":"PY Ryan","year":"2006","unstructured":"Ryan, P.Y., Schneider, S.A.: Pr\u00eat \u00e0 voter with re-encryption mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 313\u2013326. Springer, Heidelberg (2006)"},{"key":"41_CR14","unstructured":"Carback, R., Chaum, D., Clark, J., Conway, J., Essex, A., Herrnson, P., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sherman, A., Vora, P.L.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: Proceedings of the 19th USENIX Security Symposium (2010)"},{"key":"41_CR15","unstructured":"The City of Takoma Park Maryland. \n                      http:\/\/www.takomaparkmd.gov"},{"key":"41_CR16","unstructured":"Sherman, A.T., Carback, R., Chaum, D., Clark, J., Essex, A., Herrnson, P.S., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sinha, B., Vora, P.: Scantegrity mock election at Takoma Park. In: Proceedings of the NIST Workshop on End-to-end Voting Systems, pp. 45\u201361 (2009)"},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1207\/s15516709cog0803_3","volume":"8","author":"DE Kieras","year":"1984","unstructured":"Kieras, D.E., Bovair, S.: The role of a mental model in learning to operate a device. Cogn. Sci. 8, 255\u2013273 (1984)","journal-title":"Cogn. Sci."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:19:44Z","timestamp":1583507984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}