{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T18:47:14Z","timestamp":1772218034296,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T00:00:00Z","timestamp":1459900800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s12243-016-0510-2","type":"journal-article","created":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T03:33:12Z","timestamp":1459913592000},"page":"309-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An investigation into the usability of electronic voting systems for complex elections"],"prefix":"10.1007","volume":"71","author":[{"given":"Jurlind","family":"Budurushi","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Woide","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,6]]},"reference":[{"key":"510_CR1","unstructured":"Bundeswahlgerteverordnung of 3 september 1975 (bgbl. i p. 2459), last changed on 20 april 1999 (bgbl. i p. 749). http:\/\/www.gesetze-im-internet.de\/bundesrecht\/bwahlgv\/gesamt.pdf (German only), last accessed 16 November 2015"},{"key":"510_CR2","unstructured":"A study of vote verification technology conducted for the Maryland State Board of Elections Part II: Usability Study (2006). http:\/\/www.capc.umd.edu\/rpts\/MarylandReport accessed 16 November 2015"},{"key":"510_CR3","unstructured":"Benaloh J (2006) Simple verifiable elections. In: Proceedings of the USENIX workshop on electronic voting technology, pp 5\u201314. USENIX"},{"key":"510_CR4","unstructured":"Benaloh J (2007) Ballot casting assurance via voter-initiated poll station auditing. In: Proceedings of the USENIX workshop on electronic voting technology, pp 14\u201321. USENIX"},{"key":"510_CR5","first-page":"376","volume":"384","author":"M de Brettes","year":"1875","unstructured":"de Brettes M (1875) Appareil pour voter, indiquer, autographier et contr\u00f2ler les votes. Bulletin Hebdomadaire d\u2019Association Scientifique de France 384:376\u2013378","journal-title":"Bulletin Hebdomadaire d\u2019Association Scientifique de France"},{"issue":"194","key":"510_CR6","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke J (1996) SUS\u2014a quick and dirty usability scale. Usability Evaluation in Industry 189(194):4\u20137","journal-title":"Usability Evaluation in Industry"},{"key":"510_CR7","doi-asserted-by":"crossref","unstructured":"Bruck S, Jefferson D, Rivest RL (2010) A modular voting architecture (\u201cfrog voting\u201d). In: Towards trustworthy elections, pp 97\u2013106. Springer","DOI":"10.1007\/978-3-642-12980-3_5"},{"issue":"2","key":"510_CR8","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jisa.2014.03.001","volume":"19","author":"J Budurushi","year":"2014","unstructured":"Budurushi J, J\u00f6ris R, Volkamer M (2014) Implementing and evaluating a software-independent voting system for polling station elections. Journal of Information Security and Applications 19(2):105\u2013114","journal-title":"Journal of Information Security and Applications"},{"key":"510_CR9","doi-asserted-by":"crossref","unstructured":"Budurushi J, Renaud K, Volkamer M, Woide M (2014) Implementation and evaluation of the EasyVote tallying component and ballot. In: Krimmer R, Volkamer M (eds) Proceedings of the 6th International Conference on Electronic Voting (EVOTE): Verifying the Vote, pp 1\u20138. IEEE","DOI":"10.1109\/EVOTE.2014.7001140"},{"key":"510_CR10","unstructured":"Budurushi J, Volkamer M (2014) Feasibility analysis of various electronic voting systems for complex elections. In: Parycek P, Edelmann N (eds) International Conference for E-Democracy and Open Government 2014, pp 141\u2013152. Edition Donau-Universit\u00e4t Krems"},{"key":"510_CR11","doi-asserted-by":"crossref","unstructured":"Budurushi J, Woide M, Volkamer M (2014) Introducing precautionary behavior by temporal diversion of voter attention from casting to verifying their vote. In: Workshop on usable security (USEC). Internet Society","DOI":"10.14722\/usec.2014.23037"},{"key":"510_CR12","unstructured":"Canard S, Sibert H (2006) Votinbox\u2014a voting system based on smart cards. In: Workshop on e-voting and e-government in the UK"},{"issue":"1","key":"510_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D Chaum","year":"2004","unstructured":"Chaum D (2004) Secret-ballot receipts: true voter-verifiable elections. IEEE Secur Priv 2(1):38\u201347","journal-title":"IEEE Secur Priv"},{"key":"510_CR14","unstructured":"Cohen SB (2005) Auditing technology for electronic voting machines. Master\u2019s thesis, California Institute of Technology and Massachusetts Institute of Technology. http:\/\/vote.caltech.edu\/sites\/default\/files\/vtp_wp46.pdf , last accessed 16 November 2015"},{"key":"510_CR15","unstructured":"ELECTION ASSISTANCE COMMISSION: Voluntary Voting System Guidelines 1.1 Volume 1 (2015). http:\/\/www.eac.gov\/assets\/ 1\/Documents\/VVSG.1.1.VOL.1.FINAL.pdf, last accessed 16 November 2015"},{"key":"510_CR16","unstructured":"Everett SP (2007) The usability of electronic voting machines and how votes can be changed without detection. Ph.D. thesis, Psychology"},{"key":"510_CR17","unstructured":"Federal Constitutional Court of Germany: Decisions: Order of 03 March 2009 - 2 BvC 3\/07 (2009). http:\/\/www.bundesverfassungsgericht.de\/SharedDocs\/Entscheidungen\/EN\/2009\/03\/cs20090303_2bvc000307en.html , last accessed 16 November 2015"},{"key":"510_CR18","unstructured":"Franklin J, Myers JC (2012) Interpreting babel: classifying electronic voting systems. In: Kripp MJ, Volkamer M, Grimm R (eds) Proceedings of the 5th international conference on electronic voting (EVOTE). Bonn, LNI GI Series, pp 244\u2013256"},{"key":"510_CR19","unstructured":"Herrnson PS, Niemi RG, Hanmer MJ, Francia PL, Bederson BB, Conrad F, Traugott M (2005) The promise and pitfalls of electronic voting: results from a usability field test. http:\/\/www.capc.umd.edu\/rpts\/Promise_and_Pitfalls_of_Electronic_Voting.pdf , last accessed 16 November 2015"},{"key":"510_CR20","unstructured":"International organization for standardization: ISO 9241-11: Ergonomics of Human System Interaction \u2013 Part 11: Guidance on Usability (1998). https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-11:ed-1:v1:en , last accessed 16 November 2015"},{"key":"510_CR21","unstructured":"International organization for standardization: ISO 9241-210: Ergonomics of Human System Interaction \u2013 Part 210: Human-centred design processes for interactive systems (2010). https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-210:ed-1:v1:en , last accessed 16 November 2015"},{"key":"510_CR22","unstructured":"Krimmer R (2012) The evolution of e-voting: why voting technology is used and how it affects democracy. Ph.D. thesis, Public Administration"},{"key":"510_CR23","unstructured":"Krimmer R, Volkamer M (2008) Observing threats to voters anonymity: election observation of electronic voting. In: Krishna SJ, Agarwal NK (eds) E-voting\u2014perspectives and experiences, The Icfai University Press"},{"issue":"3","key":"510_CR24","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/1125864.1125886","volume":"13","author":"C Kuo","year":"2006","unstructured":"Kuo C, Perrig A, Walker J (2006) Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. Journal of Interactions 13(3):28\u201331","journal-title":"Journal of Interactions"},{"issue":"5","key":"510_CR25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2012.56","volume":"10","author":"M Lindeman","year":"2012","unstructured":"Lindeman M, Stark PB (2012) A gentle introduction to risk-limiting audits. IEEE Secur Priv 10(5):42\u201349","journal-title":"IEEE Secur Priv"},{"key":"510_CR26","unstructured":"Lindeman M, Stark PB, Yates VS (2012) BRAVO: ballot-polling risk-limiting audits to verify outcomes. In: Electronic voting technology workshop\/workshop on trustworthy elections. USENIX"},{"key":"510_CR27","unstructured":"Loeber L (2014) E-voting in the Netherlands; past, current, future?. In: Krimmer R, Volkamer M (eds) Proceedings of the 6th international conference on electronic voting (EVOTE). TUT Press, Tallinn, pp 43\u201346"},{"key":"510_CR28","unstructured":"Lohmann K, Sch\u00e4ffer J (2013) System usability scale (SUS)\u2014an improved German translation of the questionnaire. http:\/\/minds.coremedia.com\/2013\/09\/18\/sus-scale-an-improved-german-translation-questionnaire\/ , last accessed 16 November 2015"},{"key":"510_CR29","unstructured":"MacNamara D, Scully T, Gibson PJ, Carmody F, Oakley K, Quane E (2011) Dualvote: addressing usability and verifiability issues in electronic voting systems. In: Parycek P, Kripp MJ, Edelmann N (eds) International Conference for E-Democracy and Open Government 2011, pp 313\u2013322. Edition Donau-Universit\u00e4t Krems"},{"key":"510_CR30","unstructured":"Mercuri R (2001) Electronic vote tabulation checks & balances. Ph.D. thesis, University of Pennsylvania"},{"key":"510_CR31","unstructured":"Neff AC (2003) Election confidence: a comparison of methodologies and their relative effectiveness at achieving it. http:\/\/www.verifiedvoting.org\/wp-content\/uploads\/downloads\/20031217.neff.electionconfidence.pdf , last accessed 16 November 2015"},{"key":"510_CR32","doi-asserted-by":"crossref","unstructured":"Pomares J, Levin I, Alvarez MR, Mirau GL, Ovejero T (2014) From piloting to roll-out: voting experience and trust in the first full e-election in Argentina. In: Krimmer R, Volkamer M (eds) Proceedings of the 6th International Conference on Electronic Voting (EVOTE): verifying the vote, pp 1\u201310. IEEE","DOI":"10.1109\/EVOTE.2014.7001136"},{"key":"510_CR33","unstructured":"Pozo J (2014) Implementation project electronic voting Azuay Ecuador 2014. In: Krimmer R, Volkamer M (eds) Proceedings of the 6th international conference on electronic voting (EVOTE). TUT Press, Tallinn, pp 47\u201360"},{"key":"510_CR34","unstructured":"Rivest RL, Wack JP (2006) On the notion of \u201csoftware independence\u201d in voting systems. http:\/\/people.csail.mit.edu\/rivest\/RivestWack-OnTheNotionOfSoftwareIndependenceInVotingSystems.pdf http:\/\/people.csail.mit.edu\/rivest\/RivestWack-OnTheNotionOf , last accessed 16 November 2015"},{"key":"510_CR35","unstructured":"Sandler D, Derr K, Wallach DS (2008) Votebox: a tamper-evident, verifiable electronic voting system. In: Proceedings of the 17th conference on security symposium, pp 349\u2013364. USENIX"},{"key":"510_CR36","unstructured":"Sandler D, Wallach DS (2007) Casting votes in the auditorium. In: Proceedings of the USENIX workshop on electronic voting technology, pp 4\u20134. USENIX"},{"key":"510_CR37","unstructured":"Sauro J (2011) Measuring usability with the system usability scale (SUS). http:\/\/www.measuringu.com\/sus.php , last accessed 16 November 2015"},{"issue":"1","key":"510_CR38","first-page":"7","volume":"2","author":"T Selker","year":"2006","unstructured":"Selker T, Pandolfo A (2006) A methodology for testing voting systems. J Usability Stud 2(1):7\u201321","journal-title":"J Usability Stud"},{"key":"510_CR39","unstructured":"Sotirakopoulos A, Hawkey K, Beznosov K (2010) \u2018I did it because I trusted you\u2019: challenges with the study environment biasing participant behaviours. In: SOUPS usable security experiment reports (USER) workshop"},{"key":"510_CR40","doi-asserted-by":"crossref","unstructured":"Stark PB (2009) Efficient post-election audits of multiple contests: 2009 california tests. In: CELS 2009 4Th annual conference on empirical legal studies paper","DOI":"10.2139\/ssrn.1443314"},{"issue":"3","key":"510_CR41","first-page":"18","volume":"1","author":"PB Stark","year":"2014","unstructured":"Stark PB, Teague V (2014) Veriable european elections: risk-limiting audits for d\u2019hondt and its relatives. USENIX Journal of Election Technology and Systems (JETS) 1(3):18\u2013 39","journal-title":"USENIX Journal of Election Technology and Systems (JETS)"},{"issue":"5","key":"510_CR42","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSP.2012.62","volume":"10","author":"PB Stark","year":"2012","unstructured":"Stark PB, Wagner D (2012) Evidence-based elections. IEEE Secur Priv 10(5):33\u201341","journal-title":"IEEE Secur Priv"},{"key":"510_CR43","first-page":"1711","volume":"73","author":"DP Takaji","year":"2004","unstructured":"Takaji DP (2004) The paperless chase: electronic voting and democratic values. Fordham L Rev 73:1711","journal-title":"Fordham L Rev"},{"key":"510_CR44","unstructured":"Vegas C (2012) The new belgian e-voting system. In: Br\u00f6mme A, Busch C (eds) Proceedings of the 5th international conference on electronic voting (EVOTE). Bonn, Gesellschaft f\u00fcr Informatik (GI), pp 199\u2013211"},{"key":"510_CR45","doi-asserted-by":"crossref","unstructured":"Volkamer M, Budurushi J, Demirel D (2011) Vote casting device with VV-SV-PAT for elections with complicated ballot papers. In: International workshop on requirements engineering for electronic voting systems (REVOTE), pp 1\u20138. IEEE","DOI":"10.1109\/REVOTE.2011.6045910"},{"key":"510_CR46","doi-asserted-by":"crossref","unstructured":"Volkamer M, Spycher O, Dubuis E (2011) Measures to establish trust in internet voting. In: ICEGOV 2011, Proceedings of the 5th international conference on theory and practice of electronic governance, ICEGOV \u201911. ACM, New York, NY, USA, pp 1\u201310","DOI":"10.1145\/2072069.2072071"},{"key":"510_CR47","unstructured":"Vot.ar.: Vot.ar. http:\/\/www.vot-ar.com.ar\/en\/system-votation\/ , last accessed 16 November 2015"},{"key":"510_CR48","unstructured":"Weldemariam K, Villafiorita A (2008) Modeling and analysis of procedural security in (e)voting: the Trentino\u2019s approach and experiences. In: Proceedings of the USENIX workshop on electronic voting technology, pp. 1\u201310. USENIX"},{"key":"510_CR49","unstructured":"Yee KP, Wagner D, Hearst M, Bellovin SM (2006) Prerendered user interfaces for higher-assurance electronic voting. In: Proceedings of the USENIX workshop on electronic voting technology, pp 6\u20136. USENIX"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0510-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-016-0510-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0510-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T08:50:56Z","timestamp":1567759856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-016-0510-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,6]]},"references-count":49,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["510"],"URL":"https:\/\/doi.org\/10.1007\/s12243-016-0510-2","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,6]]}}}