Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
Straight-party voting: what do voters think?
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Research Methods in Human-Computer Interaction
Research Methods in Human-Computer Interaction
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Bridging the Gap in Computer Security Warnings: A Mental Model Approach
IEEE Security and Privacy
Usability analysis of Helios: an open source verifiable remote electronic voting system
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Communications of the ACM
Feasibility analysis of Prêt à voter for german federal elections
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Hi-index | 0.00 |
In order for voters to verify their votes, they have to carry out additional steps besides selecting a candidate and submitting their vote. In previous work, voters have been found to be confused about the concept of and motivation for verifiability in electronic voting when confronted with it. In order to better communicate verifiability to voters, we identify mental models of verifiability in voting using a questionnaire distributed online in Germany. The identified mental models are, Trusting, No Knowledge, Observer, Personal Involvement and Matching models. Within the same survey, we identify terms that can be used in place of 'verify' as well as security-relevant metaphors known to the voters that can be used to communicate verifiability.