{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:40:03Z","timestamp":1748583603975,"version":"3.41.0"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,19]]},"DOI":"10.1109\/sp54263.2024.00136","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:32Z","timestamp":1725558992000},"page":"3458-3477","source":"Crossref","is-referenced-by-count":2,"title":["Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting"],"prefix":"10.1109","author":[{"given":"Karola","family":"Marky","sequence":"first","affiliation":[{"name":"Ruhr University Bochum,Germany"}]},{"given":"Nina","family":"Gerber","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Henry John","family":"Krumb","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow"}]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2020.1742264"},{"key":"ref2","article-title":"Advances in Cryptographic Voting Systems","volume-title":"Ph.D. dissertation","author":"Adida","year":"2006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01014-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32747-6_13"},{"issue":"3","key":"ref5","first-page":"26","article-title":"Usability of voter verifiable, end-to-end voting systems: Baseline data for Helios, Pr\u00eat \u00e0 Voter, and Scantegrity II","volume":"2","author":"Acemyan","year":"2014","journal-title":"The USENIX Journal of Election Technology and Systems"},{"article-title":"Analysis of the antrim county, Michigan November 2020 election incident","year":"2021","author":"Milic","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300835"},{"article-title":"Attitudes of Swiss citizens towards the generalisation of e-voting","year":"2016","author":"Milic","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.03.007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.140"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/63039.63041"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.56"},{"article-title":"A comparison of usability between voting methods","volume-title":"Proceedings of the Electronic Voting Technology Workshop (EVT)","author":"Greene","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/154193120605002407"},{"article-title":"Security analysis of the Diebold AccuVote-TS voting machine","year":"2006","author":"Feldman","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58589-5_5"},{"key":"ref19","first-page":"10","article-title":"An examination of the auditability of voter verified paper audit trail (VVPAT) ballots","volume":"7","author":"Goggin","year":"2007","journal-title":"EVT"},{"key":"ref20","article-title":"Usable security evaluation of EasyVote in the context of complex elections","volume-title":"Ph.D. dissertation","author":"Budurushi","year":"2016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.70"},{"key":"ref22","first-page":"1","article-title":"Scantegrity ii: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes","volume-title":"Proceedings of the Electronic Voting Technology Workshop EVT","volume":"8","author":"Chaum"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357195"},{"article-title":"Coercion-resistant hybrid voting systems","year":"2010","author":"Spycher","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588262"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3459604"},{"article-title":"Simple verifiable elections","volume-title":"Proceedings of the Electronic Voting Technology Workshop (EVT)","author":"Benaloh","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173750"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_12"},{"key":"ref30","first-page":"187","article-title":"User experience design for e-voting: How mental models align with security mechanisms","volume-title":"Proceedings of the International Joint Conference on Electronic Voting (E-Vote-ID)","author":"Zollinger"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86942-7_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00118"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-011-0253-9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376769"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312971"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_18"},{"article-title":"How users respond to authentication methods: A study of security readiness","volume-title":"Proceedings of the 14th Americas Conference on Information Systems (AMCIS\u201908)","author":"Sun","key":"ref41"},{"key":"ref42","first-page":"4059","article-title":"Investigating state-of-the-art practices for fostering subjective trust in online voting through interviews","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)","author":"Marky"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1656779"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5948\/upo9781614440260.011"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_41"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468463"},{"issue":"1","key":"ref48","first-page":"7","article-title":"A methodology for testing voting systems","volume":"2","author":"Selker","year":"2006","journal-title":"Journal of Usability Studies"},{"issue":"3","key":"ref49","first-page":"114","article-title":"Determining what individual sus scores mean: Adding an adjective rating scale","volume":"4","author":"Bangor","year":"2009","journal-title":"Journal of usability studies"},{"article-title":"Usability analysis of Helios - an open source verifiable remote electronic voting system","volume-title":"Proceedings of the Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE)","author":"Karayumak","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2072069.2072071"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440370111"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762011000300004"},{"key":"ref54","article-title":"Voting as a habit? quantitative analyses of voting costs and turnout in direct democracy","volume-title":"Ph.D. dissertation","author":"Veseli","year":"2016"},{"issue":"1","key":"ref55","first-page":"75","article-title":"Designing systems that people will trust","volume":"1","author":"Patrick","year":"2005","journal-title":"Security and Usability"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985776"},{"article-title":"Surevote: Technical overview","volume-title":"Proceedings of the Workshop on Trustworthy Elections (WOTE)","author":"Chaum","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36213-2_15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.70"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_32"}],"event":{"name":"2024 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2024,5,19]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2024,5,23]]}},"container-title":["2024 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646615\/10646598\/10646764.pdf?arnumber=10646764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:26:29Z","timestamp":1748582789000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,19]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/sp54263.2024.00136","relation":{},"subject":[],"published":{"date-parts":[[2024,5,19]]}}}