{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T23:22:57Z","timestamp":1768087377662,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T00:00:00Z","timestamp":1718064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Polish National Research Center","award":["OPUS-20 - 2020\/39\/B\/HS5\/01661"],"award-info":[{"award-number":["OPUS-20 - 2020\/39\/B\/HS5\/01661"]}]},{"name":"EU H2020 MSCA Program","award":["101038055"],"award-info":[{"award-number":["101038055"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,11]]},"DOI":"10.1145\/3657054.3657262","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:33:45Z","timestamp":1717266825000},"page":"669-677","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Trust and Distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006\/07)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0451-4514","authenticated-orcid":false,"given":"David","family":"Duenas-Cid","sequence":"first","affiliation":[{"name":"Pub-Tech Research Center , Kozminski University, Poland"}]}],"member":"320","published-online":{"date-parts":[[2024,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2018.1460288"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9221.2009.00734.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120688"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2003.11647533"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-27242017000200008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.05.013"},{"key":"e_1_3_2_1_7_1","volume-title":"Towards a New Modernity","author":"Beck U.","unstructured":"Beck, U. 1992. RISK SOCIETY, Towards a New Modernity. SAGE Publications."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00018-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.12.002"},{"key":"e_1_3_2_1_10_1","unstructured":"Blankesteijn H. 2016. Vertrouw ons nou maar: Opkomst en ondergang van de stemcomputer. Boom Uitgevers."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00183.x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125170.1125196"},{"key":"e_1_3_2_1_13_1","first-page":"1457","article-title":"Law and Trust","volume":"93","author":"Cross F.B.","year":"2005","unstructured":"Cross, F.B. 2005. Law and Trust. Georgetown Law Journal. 93, 5 (2005), 1457\u20131546.","journal-title":"Georgetown Law Journal."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDEG.2014.6819940"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"D'Cruz J. 2020. Trust and Distrust. The Routledge Handbook of Trust and Philosophy. J. Simon ed. Routledge. 1\u2013455.","DOI":"10.4324\/9781315542294-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/00020184.2018.1519335"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2019.51"},{"key":"e_1_3_2_1_18_1","volume-title":"International Joint Conference on Electronic Voting E-Vote-ID","author":"Duenas-Cid D.","year":"2020","unstructured":"Duenas-Cid, D. 2020. Tripped at the Finishing Line: The \u00c5land Islands Internet Voting Project. International Joint Conference on Electronic Voting E-Vote-ID 2020. R. Krimmer , eds. Springer LNCS. 36\u201349."},{"key":"e_1_3_2_1_19_1","volume-title":"USA","author":"Duenas-Cid D.","year":"2022","unstructured":"Duenas-Cid, D. 2022. Trust and Distrust in e-Democracy. DG.O 2022: The 23rd Annual International Conference on Digital Government Research (New York, NY, USA, Jun. 2022), 486\u2013488."},{"key":"e_1_3_2_1_20_1","volume-title":"E-Vote-ID 2023 Proceedings","author":"Duenas-Cid D.","year":"2024","unstructured":"Duenas-Cid, D. 2024. Trust Frameworks in Application to Technology in Elections. E-Vote-ID 2023 Proceedings (Luxembourg, 2024)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14763\/2023.4.1727"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2009.00232.x"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/ropr.12329"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2020.101560"},{"key":"e_1_3_2_1_25_1","volume-title":"The Consequences of Modernity","author":"Giddens A.","unstructured":"Giddens, A. 1991. The Consequences of Modernity. Polity Press."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology (USA","author":"Gonggrijp R.","year":"2007","unstructured":"Gonggrijp, R. and Hengeveld, W.-J. 2007. Studying the Nedap\/Groenendaal ES3B Voting Computer: A Computer Security Perspective. Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology (USA, 2007), 1."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0007123417000849"},{"key":"e_1_3_2_1_28_1","volume-title":"System: Security Failures and Verification Flaws in a Live Online Election. 35\u201353.","author":"Halderman J.A.","year":"2015","unstructured":"Halderman, J.A. and Teague, V. 2015. The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. 35\u201353."},{"key":"e_1_3_2_1_29_1","volume-title":"Medicine and Trust. Stanford Law Review. 55","author":"Hall M.A.","year":"2002","unstructured":"Hall, M.A. 2002. Law, Medicine and Trust. Stanford Law Review. 55, (2002), 463\u2013529."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Hurley R. 2012. The decision to trust: How leaders create high-trust organizations. Jossey-Bass.","DOI":"10.1002\/ltl.20047"},{"key":"e_1_3_2_1_31_1","volume-title":"Netherlands: From Early Adoption to Early Abolishment. Foundations of Security Analysis and Design. A. Aldini , eds","author":"Jacobs B.","year":"2009","unstructured":"Jacobs, B. and Pieters, W. 2009. Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. Foundations of Security Analysis and Design. A. Aldini , eds. LNCS Springer. 121\u2013144."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/14719037.2017.1305689"},{"key":"e_1_3_2_1_33_1","volume-title":"Distrusting the Trustworthy. Reading Onora O'Neill. D. Archard , eds","author":"Jones K.","unstructured":"Jones, K. 2013. Distrusting the Trustworthy. Reading Onora O'Neill. D. Archard , eds. Routledge. 181\u2013194."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-012-9089-5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243610"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540962.2020.1732027"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77493-8_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/01442872.2021.1958179"},{"key":"e_1_3_2_1_39_1","first-page":"24","article-title":"Gambling with the \u201cGift","volume":"8","author":"K\u00fchne S.","year":"2015","unstructured":"K\u00fchne, S. 2015. Gambling with the \u201cGift\u201d? On the Relationship between Security Technologies, Trust and Distrust. The Case of Fingerprinting. BEHEMOTH A Journal on Civilisation. 8, 1 (2015), 24\u201345.","journal-title":"On the Relationship between Security Technologies, Trust and Distrust. The Case of Fingerprinting. BEHEMOTH A Journal on Civilisation."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4301\/S1807-17752017000100002"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/259288"},{"key":"e_1_3_2_1_42_1","volume-title":"-A","author":"Lheureux-De-Freitas J.","year":"2017","unstructured":"Lheureux-De-Freitas, J. and Macadar, M.-A. 2017. The Brazilian Electronic Voting System: evolution and challenges. 2 nd Joint International Conference on Electronic Voting E-VOTE-ID 2017. R. Krimmer and M. Volkamer, eds. TUT Press. 59\u201372."},{"key":"e_1_3_2_1_43_1","volume-title":"To i-vote or Not to i-vote: Drivers and Barriers to the Implementation of Internet Voting. Electronic Voting. E-Vote-ID","author":"Licht N.","year":"2021","unstructured":"Licht, N. 2021. To i-vote or Not to i-vote: Drivers and Barriers to the Implementation of Internet Voting. Electronic Voting. E-Vote-ID 2021. Lecture Notes in Computer Science. R. Krimmer , eds. Springer."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506066042"},{"key":"e_1_3_2_1_45_1","volume-title":"3rd International Conference on Electronic Voting","author":"Loeber L.","year":"2016","unstructured":"Loeber, L. 2016. E-Voting in the Netherlands; from General Acceptance to General Doubt in Two Years. 3rd International Conference on Electronic Voting 2008. Gesellschaft f\u00fcr Informatik. 21\u201330."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 6th international conference on electronic voting (EVOTE). R. Krimmer and M. Volkamer, eds. TUT Press. 43\u201346","author":"Loeber L.","year":"2014","unstructured":"Loeber, L. 2014. E-voting in the Netherlands; past, current, future? Proceedings of the 6th international conference on electronic voting (EVOTE). R. Krimmer and M. Volkamer, eds. TUT Press. 43\u201346."},{"key":"e_1_3_2_1_47_1","volume-title":"CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government (Krems","author":"Loeber L.","year":"2011","unstructured":"Loeber, L. 2011. Voter trust in the Netherlands between 2006 and 2010. CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government (Krems, 2011), 323\u2013335."},{"key":"e_1_3_2_1_48_1","volume-title":"Trust and Power","author":"Luhmann N.","unstructured":"Luhmann, N. 1979. Trust and Power. Wiley-Blackwell."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00184.x"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.05.005"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2008.00919.x"},{"key":"e_1_3_2_1_52_1","volume-title":"Protecting the Integrity of Elections Using Biometrics. Biometric-Based Physical and Cybersecurity Systems","author":"Obaidat M.S.","unstructured":"Obaidat, M.S. 2019. Protecting the Integrity of Elections Using Biometrics. Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. 513\u2013533."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2202\/1944-2866.1065"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2202\/1944-2866.1065"},{"key":"e_1_3_2_1_55_1","volume-title":"Politics and Society.","author":"Oostveen A.-M.","year":"2014","unstructured":"Oostveen, A.-M. and Van den Besselaar, P. 2004. Security as belief User's perceptions on the security of electronic voting systems. Electronic Voting in Europe: Technology, Law, Politics and Society. 47, May 2014 (2004), 73\u201382."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.011"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/puar.13603"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103315"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/21515581.2023.2184376"},{"key":"e_1_3_2_1_60_1","volume-title":"Estonia: Technological Diffusion and Other Developments Over Ten Years","author":"Solvak M.","year":"2016","unstructured":"Solvak, M. and Vassil, K. 2016. E-voting in Estonia: Technological Diffusion and Other Developments Over Ten Years. Johan Skytte Institute of Political Studies."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660315"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","unstructured":"Stern M.J. and Baird T.D. 2015. Trust ecology and the resilience of natural resource management institutions. Ecology and Society. 20 2 (2015) art14. DOI:https:\/\/doi.org\/10.5751\/ES-07248-200214.","DOI":"10.5751\/ES-07248-200214"},{"key":"e_1_3_2_1_63_1","volume-title":"Trust: A Sociological Theory","author":"Sztompka P.","year":"2003","unstructured":"Sztompka, P. 2003. Trust: A Sociological Theory. Cambridge University Press."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/gpr0000046"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.GIQ.2019.02.002"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/bsl.438"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/03081060.2021.1943132"},{"key":"e_1_3_2_1_68_1","volume-title":"19th European Conference on Information Systems, ECIS 2011","author":"Williams M.","year":"2011","unstructured":"Williams, M. 2011. Is UTAUT really used or just cited for the sake of it? A systematic review of citations of UTAUT's originating article. 19th European Conference on Information Systems, ECIS 2011 (2011), 231."},{"key":"e_1_3_2_1_69_1","first-page":"38","article-title":"The Effect of Technology Trust on Customer E-Loyalty in Online Shopping and the Mediating Effect of Trustworthiness","volume":"1","author":"Wong W.P.M.","year":"2019","unstructured":"Wong, W.P.M. 2019. The Effect of Technology Trust on Customer E-Loyalty in Online Shopping and the Mediating Effect of Trustworthiness. Journal of Marketing Advances and Practices. 1, 2 (2019), 38\u201351.","journal-title":"Journal of Marketing Advances and Practices."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/13698575.2016.1269879"}],"event":{"name":"dg.o 2024: 25th Annual International Conference on Digital Government Research","location":"Taipei Taiwan","acronym":"dg.o 2024"},"container-title":["Proceedings of the 25th Annual International Conference on Digital Government Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657054.3657262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3657054.3657262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:36:25Z","timestamp":1755876985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657054.3657262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,11]]},"references-count":70,"alternative-id":["10.1145\/3657054.3657262","10.1145\/3657054"],"URL":"https:\/\/doi.org\/10.1145\/3657054.3657262","relation":{},"subject":[],"published":{"date-parts":[[2024,6,11]]},"assertion":[{"value":"2024-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}