{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T05:28:46Z","timestamp":1731043726657,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613905.3650977","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:15:21Z","timestamp":1715415321000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0008-9529-2427","authenticated-orcid":false,"given":"Yorick","family":"Last","sequence":"first","affiliation":[{"name":"Paderborn University, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5607-1524","authenticated-orcid":false,"given":"Jorrit","family":"Geels","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1847-2754","authenticated-orcid":false,"given":"Hanna","family":"Schraffenberger","sequence":"additional","affiliation":[{"name":"Radboud University, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_3_3_2_1","unstructured":"Adobe. 2023. PDF Reader - Adobe Acrobat Reader. https:\/\/www.adobe.com\/acrobat\/pdf-reader.html"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310802205776"},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a01666)","author":"Bellare Mihir","key":"e_1_3_3_3_4_1","unstructured":"Mihir Bellare and Sara\u00a0K. Miner. 1999. A Forward-Secure Digital Signature Scheme. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a01666). Springer, 431\u2013448."},{"volume-title":"EUROCRYPT(Lecture Notes in Computer Science, Vol.\u00a03027)","author":"Boneh Dan","key":"e_1_3_3_3_5_1","unstructured":"Dan Boneh and Xavier Boyen. 2004. Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In EUROCRYPT(Lecture Notes in Computer Science, Vol.\u00a03027). Springer, 223\u2013238."},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a02139)","author":"Boneh Dan","key":"e_1_3_3_3_6_1","unstructured":"Dan Boneh and Matthew\u00a0K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a02139). Springer, 213\u2013229."},{"key":"e_1_3_3_3_7_1","first-page":"1","article-title":"PostGuard: Towards Easy and Secure Email Communication","volume":"232","author":"Botros Leon","year":"2023","unstructured":"Leon Botros, Merel Brandon, Bart Jacobs, Daniel Ostkamp, Hanna\u00a0Kathrin Schraffenberger, and Marloes Venema. 2023. PostGuard: Towards Easy and Secure Email Communication. In CHI Extended Abstracts. ACM, 232:1\u2013232:6.","journal-title":"CHI Extended Abstracts. ACM"},{"volume-title":"Thematic analysis","author":"Braun Virginia","key":"e_1_3_3_3_8_1","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis. American Psychological Association, Washington, DC, US. 57\u201371 pages."},{"volume-title":"SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194","year":"1996","author":"John Brooke","key":"e_1_3_3_3_9_1","unstructured":"John Brooke 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194 (1996), 4\u20137."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Frederik Brudy Christian Holz Roman R\u00e4dle Chi-Jui Wu Steven Houben Clemens\u00a0Nylandsted Klokmose and Nicolai Marquardt. 2019. Cross-Device Taxonomy: Survey Opportunities and Challenges of Interactions Spanning Across Multiple Devices. In CHI. ACM 562.","DOI":"10.1145\/3290605.3300792"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550614558841"},{"volume-title":"European Digital Identity. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en [Online","year":"2023","author":"European Commission","key":"e_1_3_3_3_12_1","unstructured":"European Commission. 2021. European Digital Identity. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/european-digital-identity_en [Online; accessed 10-June-2023]."},{"volume-title":"European Digital Identity Wallet Pilot implementation. https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/eudi-wallet-implementation [Online","year":"2023","author":"European Commission","key":"e_1_3_3_3_13_1","unstructured":"European Commission. 2023. European Digital Identity Wallet Pilot implementation. https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/eudi-wallet-implementation [Online; accessed 14 September 2023]."},{"volume-title":"Security and usability: designing secure systems that people can use. O\u2019Reilly Media","author":"Cranor Lorrie\u00a0Faith","key":"e_1_3_3_3_14_1","unstructured":"Lorrie\u00a0Faith Cranor and Simson Garfinkel. 2005. Security and usability: designing secure systems that people can use. O\u2019Reilly Media, Inc."},{"volume-title":"New Directions in Cryptography. 42","year":"2022","author":"Diffie Whitfield","key":"e_1_3_3_3_15_1","unstructured":"Whitfield Diffie and Martin\u00a0E. Hellman. 2022. New Directions in Cryptography. 42 (2022), 365\u2013390."},{"key":"e_1_3_3_3_16_1","first-page":"1","article-title":"When Willeke can get rid of paperwork: a lean infrastructure for qualified information exchange based on trusted identities","volume":"89","author":"Dijkhuis Sander","year":"2018","unstructured":"Sander Dijkhuis, Remco van Wijk, Hidde Dorhout, and Nitesh Bharosa. 2018. When Willeke can get rid of paperwork: a lean infrastructure for qualified information exchange based on trusted identities. In DG.O. ACM, 89:1\u201389:10.","journal-title":"DG.O. ACM"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Verena Distler Gabriele Lenzini Carine Lallemand and Vincent Koenig. 2020. The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. In NSPW. ACM 45\u201358.","DOI":"10.1145\/3442167.3442173"},{"key":"e_1_3_3_3_18_1","unstructured":"DocuSign. 2023. Electronic Signature and Contract Lifecycle Management. https:\/\/www.docusign.com\/"},{"key":"e_1_3_3_3_19_1","unstructured":"European Commission. [n. d.]. What is eSignature. https:\/\/ec.europa.eu\/digital-building-blocks\/wikis\/display\/DIGITAL\/What+is+eSignature"},{"key":"e_1_3_3_3_20_1","unstructured":"Hal Finney Lutz Donnerhacke Jon Callas Rodney\u00a0L. Thayer and Daphne Shaw. 2007. OpenPGP Message Format. RFC 4880. https:\/\/www.rfc-editor.org\/info\/rfc4880"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.15294\/sji.v9i1.34058"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"volume-title":"SOUPS(ACM International Conference Proceeding Series, Vol.\u00a093)","author":"L.","key":"e_1_3_3_3_23_1","unstructured":"Simson\u00a0L. Garfinkel and Robert\u00a0C. Miller. 2005. Johnny 2: a user test of key continuity management with S\/MIME and Outlook Express. In SOUPS(ACM International Conference Proceeding Series, Vol.\u00a093). ACM, 13\u201324."},{"volume-title":"Investigating Verification Behavior and Perceptions of Visual Digital Certificates. In USENIX Security Symposium. USENIX Association, 3565\u20133582","year":"2023","author":"Gerhardt Da\u00f1iel","key":"e_1_3_3_3_24_1","unstructured":"Da\u00f1iel Gerhardt, Alexander Ponticello, Adrian Dabrowski, and Katharina Krombholz. 2023. Investigating Verification Behavior and Perceptions of Visual Digital Certificates. In USENIX Security Symposium. USENIX Association, 3565\u20133582."},{"volume-title":"Fabian van\u00a0den Broek, and Bart Jacobs","year":"2015","author":"Hampiholi Brinda","key":"e_1_3_3_3_25_1","unstructured":"Brinda Hampiholi, Gergely Alp\u00e1r, Fabian van\u00a0den Broek, and Bart Jacobs. 2015. Towards Practical Attribute-Based Signatures. In SPACE(Lecture Notes in Computer Science, Vol.\u00a09354). Springer, 310\u2013328."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.10.001"},{"volume-title":"eIDAS Interoperability and Cross-Border Compliance Issues. Mathematics 11, 2","year":"2023","author":"H\u00f6lbl Marko","key":"e_1_3_3_3_27_1","unstructured":"Marko H\u00f6lbl, Bo\u0161tjan Ke\u017emah, and Marko Kompara. 2023. eIDAS Interoperability and Cross-Border Compliance Issues. Mathematics 11, 2 (2023)."},{"volume-title":"The authenticity crisis. Computer Law & Security Review: The International Journal of Technology Law and Practice","year":"2024","author":"Jacobs Bart","key":"e_1_3_3_3_28_1","unstructured":"Bart Jacobs. 2024. The authenticity crisis. Computer Law & Security Review: The International Journal of Technology Law and Practice (2024). Forthcoming."},{"volume-title":"Selbstbestimmung, Privatheit und Datenschutz","author":"Khayretdinova Alina","key":"e_1_3_3_3_29_1","unstructured":"Alina Khayretdinova, Michael Kubach, Rachelle Sellung, and Heiko Ro\u00dfnagel. 2022. Conducting a Usability Evaluation of Decentralized Identity Management Solutions. In Selbstbestimmung, Privatheit und Datenschutz. Springer Fachmedien Wiesbaden, 389\u2013406."},{"volume-title":"SOUPS @ USENIX Security Symposium","author":"Korir Maina","key":"e_1_3_3_3_30_1","unstructured":"Maina Korir, Simon Parkin, and Paul Dunphy. 2022. An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control. In SOUPS @ USENIX Security Symposium. USENIX Association, 195\u2013211."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.998843"},{"edition":"2","volume-title":"Research Methods in Human-Computer Interaction","author":"Lazar Jonathan","key":"e_1_3_3_3_32_1","unstructured":"Jonathan Lazar, Jinjuan Feng, and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction, 2nd Edition. Morgan Kaufmann."},{"volume-title":"Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In EuroS&P","year":"2017","author":"Lerner Ada","key":"e_1_3_3_3_33_1","unstructured":"Ada Lerner, Eric Zeng, and Franziska Roesner. 2017. Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In EuroS&P. IEEE, 385\u2013400."},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X14535916"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2022.101380"},{"volume-title":"Task-centered user interface design. A practical introduction","year":"1993","author":"Lewis Clayton","key":"e_1_3_3_3_36_1","unstructured":"Clayton Lewis and John Rieman. 1993. Task-centered user interface design. A practical introduction (1993)."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447319509526110"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/291391.291397"},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0293)","author":"Merkle C.","key":"e_1_3_3_3_39_1","unstructured":"Ralph\u00a0C. Merkle. 1987. A Digital Signature Based on a Conventional Encryption Function. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0293). Springer, 369\u2013378."},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0435)","author":"Merkle C.","key":"e_1_3_3_3_40_1","unstructured":"Ralph\u00a0C. Merkle. 1989. A Certified Digital Signature. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0435). Springer, 218\u2013238."},{"volume-title":"d.]. 10 Usability Heuristics for User Interface Design. https:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/ [Online","year":"2023","author":"Nielsen Jakob","key":"e_1_3_3_3_41_1","unstructured":"Jakob Nielsen. [n. d.]. 10 Usability Heuristics for User Interface Design. https:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/ [Online; accessed 13 September 2023]."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"crossref","unstructured":"Jakob Nielsen. 1994. Usability engineering. Morgan Kaufmann.","DOI":"10.1016\/B978-0-08-052029-2.50009-7"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1201\/b15703"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1057\/dddmp.2015.18"},{"volume-title":"What is a (Digital) Identity Wallet? A Systematic Literature Review","author":"Podgorelec Blaz","key":"e_1_3_3_3_45_1","unstructured":"Blaz Podgorelec, Lukas Alber, and Thomas Zefferer. 2022. What is a (Digital) Identity Wallet? A Systematic Literature Review. In COMPSAC. IEEE, 809\u2013818."},{"key":"e_1_3_3_3_46_1","unstructured":"Privacy by Design Foundation and SIDN. 2023. Yivi (formerly known as IRMA) [Mobile application]. https:\/\/yivi.app"},{"volume-title":"Handbook of usability testing: How to plan, design, and conduct effective tests","author":"Rubin Jeffrey","key":"e_1_3_3_3_47_1","unstructured":"Jeffrey Rubin and Dana Chisnell. 2008. Handbook of usability testing: How to plan, design, and conduct effective tests. John Wiley & Sons."},{"volume-title":"Still Can\u2019t Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs\/1510.08555","year":"2015","author":"Ruoti Scott","key":"e_1_3_3_3_48_1","unstructured":"Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent\u00a0E. Seamons. 2015. Why Johnny Still, Still Can\u2019t Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs\/1510.08555 (2015)."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2933683"},{"volume-title":"Open Identity Summit. LNI, Vol.\u00a0P-335","author":"Sellung Rachelle","key":"e_1_3_3_3_50_1","unstructured":"Rachelle Sellung and Michael Kubach. 2023. Research on User Experience for Digital Identity Wallets: State-of-the-Art and Recommendations. In Open Identity Summit. LNI, Vol.\u00a0P-335. Gesellschaft f\u00fcr Informatik e.V."},{"volume-title":"CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0196)","author":"Shamir Adi","key":"e_1_3_3_3_51_1","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO(Lecture Notes in Computer Science, Vol.\u00a0196). Springer, 47\u201353."},{"key":"e_1_3_3_3_52_1","unstructured":"Adobe Sign. 2022. e-Sign software: Electronic & digital signatures. https:\/\/www.adobe.com\/sign.html"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0252"},{"volume-title":"The methodology of participatory design. Technical communication 52, 2","year":"2005","author":"Spinuzzi Clay","key":"e_1_3_3_3_54_1","unstructured":"Clay Spinuzzi. 2005. The methodology of participatory design. Technical communication 52, 2 (2005), 163\u2013174."},{"volume-title":"https:\/\/eur-lex.europa.eu\/eli\/reg\/2014\/910\/oj [Online","year":"2024","author":"The European Parliament and The Council Of The European Union. 2014. Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC.","key":"e_1_3_3_3_55_1","unstructured":"The European Parliament and The Council Of The European Union. 2014. Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. https:\/\/eur-lex.europa.eu\/eli\/reg\/2014\/910\/oj [Online; accessed 27-March-2024]."},{"volume-title":"11th Symposium on Usable Privacy and Security (SOUPS).","year":"2015","author":"Tosi Lorraine","key":"e_1_3_3_3_56_1","unstructured":"Lorraine Tosi, Aur\u00e9lien B\u00e9nel, and Karine Lan\u00a0Hing Ting. 2015. Digital signature services for users, Improving user experience to support trust among work partners. In 11th Symposium on Usable Privacy and Security (SOUPS)."},{"volume-title":"The Psychological Impact of Digital Signatures: A Multistudy Replication. Technology, Mind, and Behavior 1, 2 (11","year":"2020","author":"Tzelios Kallie","key":"e_1_3_3_3_57_1","unstructured":"Kallie Tzelios and Lisa\u00a0A Williams. 2020. The Psychological Impact of Digital Signatures: A Multistudy Replication. Technology, Mind, and Behavior 1, 2 (11 2020)."},{"volume-title":"ESORICS(Lecture Notes in Computer Science, Vol.\u00a06879)","author":"Ulrich Alexander","key":"e_1_3_3_3_58_1","unstructured":"Alexander Ulrich, Ralph Holz, Peter Hauck, and Georg Carle. 2011. Investigating the OpenPGP Web of Trust. In ESORICS(Lecture Notes in Computer Science, Vol.\u00a06879). Springer, 489\u2013507."},{"volume-title":"USENIX Security Symposium. USENIX Association.","year":"1999","author":"Whitten Alma","key":"e_1_3_3_3_59_1","unstructured":"Alma Whitten and J.\u00a0Doug Tygar. 1999. Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_3_3_60_1","first-page":"26","article-title":"Examination on usability issues of security warning dialogs","volume":"18","author":"Zaaba Zarul\u00a0Fitri","year":"2015","unstructured":"Zarul\u00a0Fitri Zaaba and Teo\u00a0Keng Boon. 2015. Examination on usability issues of security warning dialogs. Age 18, 25 (2015), 26\u201335.","journal-title":"Age"},{"volume-title":"ICGS3\/e-Democracy(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol.\u00a099)","author":"Zissis Dimitrios","key":"e_1_3_3_3_61_1","unstructured":"Dimitrios Zissis, Dimitrios Lekkas, and Panayiotis Koutsabasis. 2011. Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates. In ICGS3\/e-Democracy(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol.\u00a099). Springer, 80\u201387."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"],"location":"Honolulu HI USA","acronym":"CHI '24"},"container-title":["Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613905.3650977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:03:54Z","timestamp":1731024234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3650977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":61,"alternative-id":["10.1145\/3613905.3650977","10.1145\/3613905"],"URL":"https:\/\/doi.org\/10.1145\/3613905.3650977","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}