Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]
Abstract
Most electronic voting systems in use today provide printouts so called voter verifiable paper audit trails (VVPATs). Voters are supposed to verify these before they put them into the ballot box in order to detect election fraud. A number of studies have shown that voters are unlikely to do so when using current systems. Thus, it is very likely that malicious electronic voting systems print the wrong candidates without being detected. We introduce precautionary behavior by providing voters with “just in time” instructions while ensuring that these instructions cannot be manipulated by a malicious electronic voting system. Our approach is evaluated in a user study, showing a highly significant increase in the number of voters that verify, as they found the manipulation we introduced in the printouts for the study.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2014 |
Creators: | Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie |
Title: | Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote |
Language: | English |
Abstract: | Most electronic voting systems in use today provide printouts so called voter verifiable paper audit trails (VVPATs). Voters are supposed to verify these before they put them into the ballot box in order to detect election fraud. A number of studies have shown that voters are unlikely to do so when using current systems. Thus, it is very likely that malicious electronic voting systems print the wrong candidates without being detected. We introduce precautionary behavior by providing voters with “just in time” instructions while ensuring that these instructions cannot be manipulated by a malicious electronic voting system. Our approach is evaluated in a user study, showing a highly significant increase in the number of voters that verify, as they found the manipulation we introduced in the printouts for the study. |
Title of Book: | Workshop on Usable Security (USEC) |
Publisher: | Internet Society |
ISBN: | 1-891562-37-1 |
Uncontrolled Keywords: | Security, Usability and Society;Secure Data |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra 20 Department of Computer Science > SECUSO - Security, Usability and Society Profile Areas Profile Areas > Cybersecurity (CYSEC) LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt |
Event Location: | San Diego |
Date Deposited: | 28 Jul 2016 18:35 |
DOI: | 10.14722/usec.2014.23037 |
Identification Number: | TUD-CS-2014-0026 |
Corresponding Links: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |