{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:43Z","timestamp":1750220563357,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:p>With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?<\/jats:p>","DOI":"10.1145\/3461464","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T17:58:51Z","timestamp":1621879131000},"page":"24-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The risks of election believability (or lack thereof)"],"prefix":"10.1145","volume":"64","author":[{"given":"Rebecca T.","family":"Mercuri","sequence":"first","affiliation":[{"name":"Notable Software, Inc"}]},{"given":"Peter G.","family":"Neumann","sequence":"additional","affiliation":[{"name":"SRI International Computer Science Lab"}]}],"member":"320","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"e_1_2_1_1_1","series-title":"Aug. 2009","volume-title":"EVT\/WOTE'09","author":"Appel A.","unstructured":"Appel , A. et al. The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine , EVT\/WOTE'09 ( Aug. 2009 ); https:\/\/bit.ly\/32tWlRS Appel, A. et al. The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine, EVT\/WOTE'09 (Aug. 2009); https:\/\/bit.ly\/32tWlRS"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3277564"},{"key":"e_1_2_1_3_1","series-title":"Sept. 2017","volume-title":"et al. Voting Machine Hacking Village Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and Infrastructure,","author":"Blaze M.","unstructured":"Blaze , M. et al. Voting Machine Hacking Village Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and Infrastructure, ( Sept. 2017 ); https:\/\/bit.ly\/3suT6UH Blaze, M. et al. Voting Machine Hacking Village Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and Infrastructure, (Sept. 2017); https:\/\/bit.ly\/3suT6UH"},{"key":"e_1_2_1_4_1","volume-title":"Secret-ballot receipts: True voter-verifiable elections","author":"Chaum D.","year":"2004","unstructured":"Chaum , D. Secret-ballot receipts: True voter-verifiable elections . IEEE Security & Privacy , ( Jan. 2004 ); https:\/\/bit.ly\/3eh7nzm Chaum, D. Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, (Jan. 2004); https:\/\/bit.ly\/3eh7nzm"},{"key":"e_1_2_1_5_1","volume-title":"Georgia election officials knew system had 'critical vulnerabilities' before 2016 vote","author":"Gordon G.","year":"2018","unstructured":"Gordon , G. , Condon , C. and Dunlap , S . Georgia election officials knew system had 'critical vulnerabilities' before 2016 vote . McClatchy DC Associated Press (Aug . 6, 2018 ); https:\/\/bit.ly\/3mZGQKN Gordon, G., Condon, C. and Dunlap, S. Georgia election officials knew system had 'critical vulnerabilities' before 2016 vote. McClatchy DC Associated Press (Aug. 6, 2018); https:\/\/bit.ly\/3mZGQKN"},{"key":"e_1_2_1_6_1","unstructured":"Joint Statement from Elections Infrastructure Government Coordinating Council and The Election Infrastructure Sector Coordinating Executive Committees (Nov. 12 2020); https:\/\/bit.ly\/3v3I9Lo  Joint Statement from Elections Infrastructure Government Coordinating Council and The Election Infrastructure Sector Coordinating Executive Committees (Nov. 12 2020); https:\/\/bit.ly\/3v3I9Lo"},{"volume-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy (May 2019)","author":"Kocher P.","key":"e_1_2_1_7_1","unstructured":"Kocher , P. et al. Spectre Attacks: Exploiting Speculative Execution . In Proceedings of the 2019 IEEE Symposium on Security and Privacy (May 2019) ; https:\/\/bit.ly\/32qhH2o Kocher, P. et al. Spectre Attacks: Exploiting Speculative Execution. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (May 2019); https:\/\/bit.ly\/32qhH2o"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23194"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2002.1038569"},{"key":"e_1_2_1_10_1","first-page":"1","volume":"45","author":"Mercuri R.","year":"2002","unstructured":"Mercuri , R. Uncommon criteria. Commun , ACM 45 , 1 ( Jan. 2002 ); https:\/\/bit.ly\/3gjSJtP Mercuri, R. Uncommon criteria. Commun, ACM 45, 1 (Jan. 2002); https:\/\/bit.ly\/3gjSJtP","journal-title":"ACM"},{"key":"e_1_2_1_11_1","volume-title":"Press Release (Nov. 18","author":"Monmouth University Poll.","year":"2020","unstructured":"Monmouth University Poll. More Americans happy about Trump loss than Biden win . Press Release (Nov. 18 , 2020 ); https:\/\/bit.ly\/3swuuej Monmouth University Poll. More Americans happy about Trump loss than Biden win. Press Release (Nov. 18, 2020); https:\/\/bit.ly\/3swuuej"},{"key":"e_1_2_1_12_1","volume-title":"The IEEE P1583 Voting Machine Standard","author":"Rein L.","year":"2004","unstructured":"Rein , L. The IEEE P1583 Voting Machine Standard . IEEE Internet Computing 8, 1 (Jan .-- Feb. 2004 ); https:\/\/bit.ly\/3edEwM9 Rein, L. The IEEE P1583 Voting Machine Standard. IEEE Internet Computing 8, 1 (Jan.--Feb. 2004); https:\/\/bit.ly\/3edEwM9"},{"key":"e_1_2_1_13_1","series-title":"Oct. 2012","volume-title":"Risk-Limiting Post-Election Audits: Why and How","author":"Risk-Limiting Audits Working Group","unstructured":"Risk-Limiting Audits Working Group , Risk-Limiting Post-Election Audits: Why and How ( Oct. 2012 ); https:\/\/bit.ly\/3sr0qRe Risk-Limiting Audits Working Group, Risk-Limiting Post-Election Audits: Why and How (Oct. 2012); https:\/\/bit.ly\/3sr0qRe"},{"key":"e_1_2_1_14_1","unstructured":"Saltman R. Accuracy Integrity and Security in Computerized Vote-Tallying. NBS\/NIST (Aug. 1 1988); https:\/\/bit.ly\/3sx8y2z  Saltman R. Accuracy Integrity and Security in Computerized Vote-Tallying. NBS\/NIST (Aug. 1 1988); https:\/\/bit.ly\/3sx8y2z"},{"key":"e_1_2_1_15_1","volume-title":"Voting Technologies In Use By County, as of","author":"Weber S.N.","year":"2020","unstructured":"Weber , S.N. California Secretary of State , Voting Technologies In Use By County, as of 15 October 2020 ; https:\/\/bit.ly\/32tPfg0 Weber, S.N. California Secretary of State, Voting Technologies In Use By County, as of 15 October 2020; https:\/\/bit.ly\/32tPfg0"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:35Z","timestamp":1750195715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":15,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1145\/3461464"],"URL":"https:\/\/doi.org\/10.1145\/3461464","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}