{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:50:52Z","timestamp":1725702652231},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332432"},{"type":"electronic","value":"9783642332449"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33244-9_4","type":"book-chapter","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T21:16:29Z","timestamp":1348607789000},"page":"51-66","source":"Crossref","is-referenced-by-count":4,"title":["Trust in e-Voting Systems: A Case Study"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Palas Nogueira","sequence":"first","affiliation":[]},{"given":"Filipe","family":"de S\u00e1-Soares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"4_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/859670.859692","volume":"46","author":"D.L. Dill","year":"2003","unstructured":"Dill, D.L., Schneier, B., Simons, B.: Voting and Technology: Who Gets to Count Your Vote? Communications of the ACM\u00a046(8), 29\u201331 (2003)","journal-title":"Communications of the ACM"},{"key":"4_CR2","unstructured":"Granneman, S.: Electronic Voting Debacle. Security (2003), http:\/\/www.securityfocus.com\/columnists\/198"},{"key":"4_CR3","unstructured":"Mercuri, R.: Electronic Vote Tabulation: Checks & Balances. PhD Thesis, University of Pennsylvania, USA (2001)"},{"key":"4_CR4","unstructured":"Schneier, B.: Getting Out the Vote: Why is it so hard to run an honest election? San Francisco Chronicle, October 31 (2004)"},{"key":"4_CR5","unstructured":"Schneier, B.: What\u2019s wrong with electronic voting machines? OpenDemocracy (2004), http:\/\/www.opendemocracy.net\/media-voting\/article_2213.jsp"},{"key":"4_CR6","unstructured":"Schneier, B.: Did Your Vote Get Counted? (2006), http:\/\/www.schneier.com\/essay-133.html"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-74444-3_31","volume-title":"Electronic Government","author":"A. Antoniou","year":"2007","unstructured":"Antoniou, A., Korakas, C., Manolopoulos, C., Panagiotaki, A., Sofotassios, D., Spirakis, P., Stamatiou, Y.C.: A Trust-Centered Approach for Building E-Voting Systems. In: Wimmer, M.A., Scholl, J., Gr\u00f6nlund, \u00c5. (eds.) EGOV. LNCS, vol.\u00a04656, pp. 366\u2013377. Springer, Heidelberg (2007)"},{"issue":"10","key":"4_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1022594.1022595","volume":"7","author":"J. Grove","year":"2004","unstructured":"Grove, J.: ACM Statement on Voting Systems. Communications of the ACM\u00a07(10), 69\u201370 (2004)","journal-title":"Communications of the ACM"},{"issue":"5","key":"4_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2006.140","volume":"4","author":"B. Randell","year":"2006","unstructured":"Randell, B., Ryan, P.Y.A.: Voting Technologies and Trust. IEEE Security and Privacy\u00a04(5), 50\u201356 (2006)","journal-title":"IEEE Security and Privacy"},{"key":"4_CR10","unstructured":"Jones, B.: A Report on the Feasibility of Internet Voting, California Internet Voting Task Force, Sacramento, USA (2000)"},{"key":"4_CR11","unstructured":"McDaniel, P., Aviv, A., Balzarotti, D., Banks, G., Blaze, M., Butler, K.: EVEREST \u2013 Evaluation and Validation of Election-Related Equipment, Standards and Testing (2007), http:\/\/www.patrickmcdaniel.org\/pubs\/everest.pdf"},{"key":"4_CR12","unstructured":"Jones, D.W.: Voting and Elections, The University of Iowa, USA (2001), http:\/\/www.divms.uiowa.edu\/~jones\/voting\/"},{"key":"4_CR13","unstructured":"ACE: Opportunities, risks and challenges of e-voting. ACE Project, The Electoral Knowledge Network (2001), http:\/\/aceproject.org\/"},{"key":"4_CR14","unstructured":"Antunes, P. (ed.): Voto Electr\u00f3nico \u2013 Discuss\u00e3o t\u00e9cnica dos seus problemas e oportunidades, Edi\u00e7\u00f5es S\u00edlabo, Lisboa (2008)"},{"key":"4_CR15","unstructured":"CE: Legal, Operational and Technical Standards for e-Voting. Recommendation Rec. (2004) of the Council of Europe. Council of Europe Publishing (2005)"},{"key":"4_CR16","unstructured":"Crane, R.E., Keller, A.M., Dechert, A., Cherlin, E., Mertz, D.: A Deeper Look: Rebutting Shamos on e-Voting (2005), http:\/\/www.acm.org\/crossroads\/xrds2-4\/voting.html"},{"key":"4_CR17","unstructured":"Cranor, L.F., Cytron, R.K.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Proceedings of the Hawai International Conference on System Sciences, Wailea (1997)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1353-4858(08)70041-2","volume":"11","author":"D. Frith","year":"2007","unstructured":"Frith, D.: E-voting security: hope or hype? Network Security\u00a011, 14\u201316 (2007)","journal-title":"Network Security"},{"issue":"6","key":"4_CR19","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"D.A. Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Computers & Security\u00a021(6), 539\u2013556 (2002)","journal-title":"Computers & Security"},{"key":"4_CR20","unstructured":"Hall, J.L.: Policy Mechanisms for Increasing Transparency in Electronic Voting. PhD Dissertation. University of California at Berkeley, USA (2008)"},{"key":"4_CR21","unstructured":"Mercuri, R.: Questions for Voting System Vendors (2000), http:\/\/www.notablesoftware.com\/checklists.html"},{"key":"4_CR22","unstructured":"Monteiro, A., Soares, N., Oliveira, R.M., Antunes, P.: Sistemas Electr\u00f3nicos de Vota\u00e7\u00e3o. Technical Report, Universidade de Lisboa, Portugal (2001)"},{"key":"4_CR23","unstructured":"Neumann, P.G.: Security Criteria for Electronic Voting. In: Proceedings of the 16th National Computer Security Conference, Baltimore (1993)"},{"key":"4_CR24","unstructured":"Shamos, I.: Electronic Voting \u2013 Evaluating the Threat. In: Proceedings of the Third Conference on Computers, Freedom and Privacy, Burlingame, pp. 3.18\u20133.25 (1993)"},{"key":"4_CR25","unstructured":"Strauss, C., Mertz, D., Dopp, K.: Electronic Voting System Best Practices (2005), http:\/\/electionmathematics.org\/em-voting-systems\/Best_Practices_US.pdf"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Neumann, G.: Special Issue: The problems and potentials of voting systems. Communications of the ACM 47(10) (2004)","DOI":"10.1145\/3262653"},{"key":"4_CR27","unstructured":"OpenRightsGroup: May 2007 Election Report \u2013 Findings of the Open Rights Group Election Observation Mission in Scotland an England (2007), http:\/\/www.openrightsgroup.org\/wp-content\/uploads\/org_election_report.pdf"},{"issue":"3","key":"4_CR28","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review\u00a020(3), 709\u2013734 (1995)","journal-title":"Academy of Management Review"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Schlienger, T., Teufel, S.: Information Security Culture: The socio-cultural dimension in information security management. In: Ghonaimy, A., El-Hadidi, M.T., Aslan, H.K. (eds.) Proceedings of the IFIP TC11 International Conference on Information Security, pp. 191\u2013202. Kluwer (2002)","DOI":"10.1007\/978-0-387-35586-3_15"},{"key":"4_CR30","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1590\/S1415-65552005000200008","volume":"9","author":"V.A. Brei","year":"2005","unstructured":"Brei, V.A., Rossi, C.A.V.: Confian\u00e7a, valor percebido e lealdade em trocas relacionais de servi\u00e7o: um estudo com usu\u00e1rios de Internet Banking no Brasil. Revista de Administra\u00e7\u00e3o Contempor\u00e2nea\u00a09, 145\u2013168 (2005)","journal-title":"Revista de Administra\u00e7\u00e3o Contempor\u00e2nea"},{"issue":"10","key":"4_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSPEC.2002.1038569","volume":"39","author":"R. Mercuri","year":"2002","unstructured":"Mercuri, R.: A better ballot box? IEEE Spectrum\u00a039(10), 46\u201350 (2002)","journal-title":"IEEE Spectrum"}],"container-title":["Lecture Notes in Business Information Processing","Knowledge and Technologies in Innovative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33244-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T11:12:17Z","timestamp":1643454737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33244-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332432","9783642332449"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33244-9_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}