{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:57Z","timestamp":1776102057698,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642391842","type":"print"},{"value":"9783642391859","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39185-9_9","type":"book-chapter","created":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T00:39:03Z","timestamp":1373243943000},"page":"142-155","source":"Crossref","is-referenced-by-count":14,"title":["Mental Models of Verifiability in Voting"],"prefix":"10.1007","author":[{"given":"Maina M.","family":"Olembo","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Bartsch","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Microsoft: Forsa-Umfrage: Jeder zweite w\u00fcrde online w\u00e4hlen. Digitale Technologien st\u00e4rken die Demokratie. B\u00fcrgerbeteiligung \u00fcber das Internet f\u00f6rdert Vertrauen in die Politik (2013), \n                    http:\/\/www.microsoft.com\/germany\/newsroom\/pressemitteilung.mspx?id=533684\n                   (accessed March 22, 2013)"},{"issue":"10","key":"9_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/2347736.2347754","volume":"55","author":"B. Simons","year":"2012","unstructured":"Simons, B., Jones, D.W.: Internet voting in the U.S. Communications of the ACM\u00a055(10), 68\u201377 (2012)","journal-title":"Communications of the ACM"},{"key":"9_CR3","unstructured":"Sherman, A.T., Carback, R., Chaum, D., Clark, J., Essex, A., Herrnson, P.S., Mayberry, T., Stefan, P., Rivest, R.L., Shen, E., Sinha, B., Vora, P.: Scantegrity Mock Election at Takoma Park. In: Electronic Voting 2010 (EVOTE 2010), pp. 45\u201361 (2010)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Karayumak, F., Kauer, M., Olembo, M.M., Volk, T., Volkamer, M.: User Study of the Improved Helios Voting System Interface. In: Socio-Technical Aspects in Security and Trust (STAST), pp. 37\u201344. IEEE (2011)","DOI":"10.1109\/STAST.2011.6059254"},{"key":"9_CR5","unstructured":"Schneider, S., Llewellyn, M., Culnane, C., Heather, J., Srinivasan, S., Xia, Z.: Focus Group Views on Pr\u00eat \u00e0 Voter 1.0. In: International Workshop on Requirements Engineering for Electronic Voting Systems (2011)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Langer, L., Schmidt, A., Buchmann, J., Volkamer, M.: A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. In: International Conference on Availability, Reliability, and Security, ARES 2010, pp. 475\u2013480. IEEE (2010)","DOI":"10.1109\/ARES.2010.106"},{"key":"9_CR7","unstructured":"Krimmer, R., Volkamer, M.: Bits or Paper? Comparing Remote Electronic Voting to Postal Voting. In: Andersen, K., Gr\u00f6nlund, A., Traunm\u00fcller, R., Wimmer, M. (eds.) Workshop and Poster Proceedings of the Fourth International EGOV Conference, pp. 225\u2013232 (2005)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-32747-6_10","volume-title":"E-Voting and Identity","author":"D. Demirel","year":"2012","unstructured":"Demirel, D., Henning, M., Ryan, P.Y.A., Schneider, S., Volkamer, M.: Feasibility Analysis of Pr\u00eat \u00e0 Voter for German Federal Elections. In: Kiayias, A., Lipmaa, H. (eds.) VoteID 2011. LNCS, vol.\u00a07187, pp. 158\u2013173. Springer, Heidelberg (2012)"},{"key":"9_CR9","unstructured":"Storer, T., Little, L., Duncan, I.: An Exploratory Study of Voter Attitudes Towards a Pollsterless Remote Voting System. In: Chaum, D., Rivest, R., Ryan, P.Y.A. (eds.) IaVoSS Workshop on Trustworthy Elections (WOTE 2006) Pre-Proceedings, pp. 77\u201386 (2006)"},{"issue":"4","key":"9_CR10","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1109\/TIFS.2009.2031947","volume":"4","author":"B.A. Campbell","year":"2009","unstructured":"Campbell, B.A., Byrne, M.D.: Straight-Party Voting: What Do Voters Think? IEEE Transactions on Information Forensics and Security\u00a04(4), 718\u2013728 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/palgrave.ejis.3000672","volume":"16","author":"Y. Yao","year":"2007","unstructured":"Yao, Y., Murphy, L.: Remote Electronic Voting Systems: An Exploration of Voters\u2019 Perceptions and Intention to Use. European Journal of Information Systems\u00a016(2), 106\u2013120 (2007)","journal-title":"European Journal of Information Systems"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Beznosov, K.: Revealing Hidden Context: Improving Mental Models of Personal Firewall Users. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009 (2009)","DOI":"10.1145\/1572532.1572534"},{"key":"9_CR13","unstructured":"Almuhimedi, H., Bhan, A., Mohindra, D., Sunshine, J.S.: Toward Web Browsers that Make or Break Trust. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2008 (2008)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Jaferian, P., Beznosov, K., Booth, K.S.: It\u2019s Too Complicated, So I turned It Off!: Expectations, Perceptions, and Misconceptions of Personal Firewalls. In: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, pp. 53\u201362 (2010)","DOI":"10.1145\/1866898.1866907"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Friedman, B., Hurley, D., Howe, D.C., Felten, E., Nissenbaum, H.: Users\u2019 Conceptions of Web Security: A Comparative Study. In: Extended Abstracts on Human Factors in Computing Systems, CHI EA 2002, pp. 746\u2013747. ACM (2002)","DOI":"10.1145\/506443.506577"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Ho, J.T., Dearman, D., Truong, K.N.: Improving Users\u2019 Security Choices on Home Wireless Networks. In: Symposium of Usable Privacy and Security, SOUPS 2010 (2010)","DOI":"10.1145\/1837110.1837126"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk Models of Home Computer Security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010 (2010)","DOI":"10.1145\/1837110.1837125"},{"issue":"6","key":"9_CR18","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P. Dourish","year":"2004","unstructured":"Dourish, P., Grinter, B., Delgado de la Flor, J., Joseph, M.: Security in the wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitious Computing\u00a08(6), 391\u2013401 (2004)","journal-title":"Personal and Ubiquitious Computing"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-27809-2_12","volume-title":"Financial Cryptography","author":"L.J. Camp","year":"2004","unstructured":"Camp, L.J.: Mental models of computer security. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 106\u2013111. Springer, Heidelberg (2004)"},{"issue":"3","key":"9_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MTS.2009.934142","volume":"28","author":"L. Camp","year":"2009","unstructured":"Camp, L.: Mental Models of Privacy and Security. IEEE Technology and Society Magazine\u00a028(3), 37\u201346 (2009)","journal-title":"IEEE Technology and Society Magazine"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Asgharpour, F., Liu, D., Camp, L.J.: Mental Models of Computer Security Risks. In: Workshop on the Economics of Information Security (2007)","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"9_CR22","unstructured":"Liu, D., Asgharpour, F., Camp, L.J.: Risk Communication in Security Using Mental Models. In: Usable Security (2008)"},{"key":"9_CR23","unstructured":"Camp, J., Asgharpour, F., Liu, D.: Risk Communication in Computer Security Using Mental Models. In: Workshop on the Economics of Information Security, WEIS 2007 (2007)"},{"issue":"2","key":"9_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2010.198","volume":"9","author":"C. Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J.S., Komanduri, S.: Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security and Privacy\u00a09(2), 18\u201326 (2011)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Charmaz, K.: Constructing Grounded Theory: A Practical Guide through Qualitative Analysis, 1st edn. Sage Publications Limited (2006)","DOI":"10.53841\/bpsqmip.2006.1.2.36"},{"issue":"2","key":"9_CR26","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1207\/S15327590IJHC1602_04","volume":"16","author":"D. Andrews","year":"2003","unstructured":"Andrews, D., Nonnecke, B., Preece, J.: Conducting Research on the Internet: Online Survey Design, Development and Implementation Guidelines. International Journal of Human-Computer Interaction\u00a016(2), 185\u2013210 (2003)","journal-title":"International Journal of Human-Computer Interaction"},{"key":"9_CR27","unstructured":"Oppenheim, A.N.: Questionnaire Design, Interviewing and Attitude Measurement. Continuum (2000)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Wright, K.B.: Researching Internet-based Populations: Advantages and Disadvantages of Online Survey Research, Online Questionnaire Authoring Software Packages, and Web Survey Services. Journal of Computer-Mediated Communication\u00a010 (2005)","DOI":"10.1111\/j.1083-6101.2005.tb00259.x"},{"key":"9_CR29","unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research Methods in Human-Computer Interaction. John Wiley and Sons (2010)"},{"issue":"1","key":"9_CR30","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G. Guest","year":"2006","unstructured":"Guest, G., Bunce, A., Johnson, L.: How many interviews are enough? An experiment with data saturation and variability. Field Methods\u00a018(1), 59\u201382 (2006)","journal-title":"Field Methods"},{"key":"9_CR31","unstructured":"Karayumak, F., Michaela, K., Maina, O., Melanie, V.: Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System. In: Proceedings of the 2011 USENIX Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections. USENIX (2011)"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identify"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39185-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T11:47:13Z","timestamp":1674128833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39185-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642391842","9783642391859"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39185-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}