{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T04:39:29Z","timestamp":1728535169632},"reference-count":56,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T00:00:00Z","timestamp":1575417600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.sagepub.com\/licence-information-for-chorus"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1409401"],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Hum Factors"],"published-print":{"date-parts":[[2022,8]]},"abstract":"Background:<\/jats:title> From the project\u2019s inception, STAR-Vote was intended to be one of the first usable, end-to-end (e2e) voting systems with sophisticated security. To realize STAR-Vote, computer security experts, statistical auditors, human factors (HF)\/human-computer interaction (HCI) researchers, and election officials collaborated throughout the project and relied upon a user-centered, iterative design and development process, which included human factors research and usability testing, to make certain the system would be both usable and secure. <\/jats:p><\/jats:sec>Objective:<\/jats:title> While best practices in HF\/HCI methods for design were used and all apparent usability problems were identified and fixed, summative system usability assessments were conducted toward the end of the user-centered design process to determine whether STAR-Vote is in fact easy to use. <\/jats:p><\/jats:sec>Method and Results:<\/jats:title> After collecting efficiency, effectiveness, and satisfaction measurements per ISO 9241-11\u2019s system usability criteria, an analysis of the data revealed that there is evidence for STAR-Vote being the most usable, cryptographically secure voting system to date when compared with the previously tested e2e systems: Helios, Pr\u00eat \u00e0 Voter, and Scantegrity. <\/jats:p><\/jats:sec>Conclusion and Application:<\/jats:title> STAR-Vote being one of the first e2e voting systems that is both highly usable and secure is a significant accomplishment, because tamper-resistant voting systems can be used in U.S. elections to ensure the integrity of the electoral process, while still ensuring that voter intent is accurately reflected in the cast ballots. Moreover, this research empirically shows that a complex, secure system can still be usable\u2014meaning that implemented security is not an excuse for poor usability. <\/jats:p><\/jats:sec>","DOI":"10.1177\/0018720818812586","type":"journal-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T19:40:10Z","timestamp":1543952410000},"page":"866-889","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use"],"prefix":"10.1177","volume":"64","author":[{"given":"Claudia Ziegler","family":"Acemyan","sequence":"first","affiliation":[{"name":"Rice University, Houston, Texas"}]},{"given":"Philip","family":"Kortum","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas"}]},{"given":"Michael D.","family":"Byrne","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas"}]},{"given":"Dan S.","family":"Wallach","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas"}]}],"member":"179","published-online":{"date-parts":[[2018,12,4]]},"reference":[{"issue":"3","key":"bibr1-0018720818812586","first-page":"26","volume":"2","author":"Acemyan C. Z.","year":"2014","journal-title":"Journal of Election Technology and Systems"},{"issue":"2","key":"bibr2-0018720818812586","first-page":"1","volume":"3","author":"Acemyan C. Z.","year":"2015","journal-title":"Journal of Election Technology and Systems"},{"key":"bibr3-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_41"},{"key":"bibr4-0018720818812586","first-page":"335","volume":"17","author":"Adida B.","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"bibr5-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.71"},{"key":"bibr6-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.53"},{"key":"bibr7-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642638"},{"issue":"1","key":"bibr8-0018720818812586","volume":"1","author":"Bell S.","year":"2013","journal-title":"USENIX Journal of Election Technology and Systems (JETS)"},{"key":"bibr9-0018720818812586","volume":"6","author":"Benaloh J.","year":"2006","journal-title":"USENIX \/Accurate Electronic Voting Technology Workshop"},{"volume-title":"Overview of red team reports. Top to bottom review of electronic voting machines","year":"2007","author":"Bishop M.","key":"bibr10-0018720818812586"},{"key":"bibr11-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2008.00914.x"},{"key":"bibr12-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240653"},{"journal-title":"University of California, Berkeley under contract to the California Secretary of State","year":"2007","author":"Calandrino J. A.","key":"bibr13-0018720818812586"},{"volume-title":"Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections","year":"2009","author":"Campbell B. A.","key":"bibr14-0018720818812586"},{"key":"bibr15-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031947"},{"key":"bibr16-0018720818812586","unstructured":"Carback R., Chaum D., Clark J., Conway J., Essex A., Herrnson P. S. Sherman A. T. (2010). Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy. Retrieved from http:\/\/static.usenix.org\/legacy\/events\/sec10\/tech\/full_papers\/Carback.pdf"},{"key":"bibr17-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1080\/10658980601051318"},{"key":"bibr18-0018720818812586","first-page":"1","volume":"8","author":"Chaum D.","year":"2008","journal-title":"EVT"},{"key":"bibr19-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.70"},{"key":"bibr20-0018720818812586","first-page":"89","volume-title":"Advances in Cryptology \u2013 Crypto \u201892, Volume 740 of Lecture Notes in Computer Science","author":"Chaum D.","year":"1992"},{"key":"bibr21-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.010"},{"volume-title":"Security and usability: Designing secure systems that people can use","year":"2005","author":"Cranor L. F.","key":"bibr22-0018720818812586"},{"key":"bibr23-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"bibr24-0018720818812586","unstructured":"Entous A., Nakashema E. (2016). FBI in agreement with CIA that Russia aimed to help Trump win White House. Washington Post. Retrieved from https:\/\/www.washingtonpost.com\/politics\/clinton-blames-putins-personal-grudge-against-her-for-election-interference\/2016\/12\/16\/12f36250-c3be-11e6-8422-eac61c0ef74d_story.html?utm_term=.47621777212a."},{"key":"bibr25-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.46"},{"key":"bibr26-0018720818812586","unstructured":"Everett S. P. (2007). The usability of electronic voting machines and how votes can be changed without detection (Unpublished doctoral dissertation). Rice University, Houston, TX."},{"key":"bibr27-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357195"},{"key":"bibr28-0018720818812586","unstructured":"Feldman A. J., Halderman J. A., Felten E. W. (2007). Security analysis of the Diebold AccuVote-TS voting machine. In Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 07). Retrieved from https:\/\/www.usenix.org\/legacy\/event\/evt07\/tech\/full_papers\/feldman\/feldman_html\/"},{"journal-title":"Young-adult voting: An analysis of presidential elections, 1964\u20132012","year":"2014","author":"File T.","key":"bibr29-0018720818812586"},{"key":"bibr30-0018720818812586","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"key":"bibr31-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_3"},{"key":"bibr32-0018720818812586","unstructured":"Help America Vote Act of 2002, Pub.L. No. 107-252 (2002)."},{"volume-title":"Ergonomic requirements for office work with visual display terminals (VDTs)\u2014Part 11: Guidance on usability","year":"1998","author":"ISO","key":"bibr33-0018720818812586"},{"key":"bibr34-0018720818812586","unstructured":"Jefferson D. (2016). If I can shop and bank online, why can\u2019t I vote online? Verified Voting: Safeguarding Elections in the Digital Age. Retrieved from https:\/\/www.verifiedvoting.org\/resources\/internet-voting\/vote-online\/"},{"volume-title":"Usability assessment: How to measure the usability of products, services, and systems","year":"2016","author":"Kortum P.","key":"bibr35-0018720818812586"},{"key":"bibr36-0018720818812586","unstructured":"Langone A. (2018, August 14). An 11-year-old hacked into a U.S. voting system replica in 10 minutes this weekend. Time. Retrieved from http:\/\/time.com\/5366171\/11-year-old-hacked-into-us-voting-system-10-minutes\/"},{"key":"bibr37-0018720818812586","volume":"500","author":"Laskowski S. J.","year":"2004","journal-title":"NIST Special Publication"},{"key":"bibr38-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1201\/9780203643662"},{"key":"bibr39-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1145\/1620693.1620708"},{"volume-title":"Workshop on Human-Computer Interaction and Security Systems","year":"2003","author":"Paul N.","key":"bibr40-0018720818812586"},{"key":"bibr41-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.50"},{"volume-title":"2007 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 07)","year":"2007","author":"Proebstel E.","key":"bibr42-0018720818812586"},{"key":"bibr43-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1518\/001872096778940723"},{"key":"bibr44-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2008.05.015"},{"key":"bibr45-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033233"},{"key":"bibr46-0018720818812586","unstructured":"Ryan P., Peacock T. (2005). Pr\u00eat \u00e0 Voter: A system perspective. University of Newcastle upon Tyne. Retrieved from https:\/\/www.researchgate.net\/profile\/Peter_Ryan7\/publication\/277296393_Pret_a_voter_a_systems_perspective\/links\/55c0c57b08aec0e5f447ad8e.pdf"},{"issue":"0","key":"bibr47-0018720818812586","volume-title":"USENIX Security Symposium","volume":"4","author":"Sandler D.","year":"2008"},{"key":"bibr48-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"bibr49-0018720818812586","volume-title":"Guide to enterprise password management (draft)","volume":"800","author":"Scarfone K.","year":"2009"},{"key":"bibr50-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_18"},{"key":"bibr51-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"bibr52-0018720818812586","first-page":"1","volume-title":"Proceedings of the Winter International Symposium on Information and Communication Technologies","author":"Summers W. C.","year":"2004"},{"key":"bibr53-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2010.50"},{"key":"bibr54-0018720818812586","first-page":"31","volume-title":"Security and usability: Designing secure systems that people can use","author":"Tognazzini B.","year":"2005"},{"volume-title":"Request for proposals (RFP) STAR-Vote: A new voting system","year":"2016","author":"Travis County Texas","key":"bibr55-0018720818812586"},{"key":"bibr56-0018720818812586","doi-asserted-by":"publisher","DOI":"10.1017\/S000305540040002X"}],"container-title":["Human Factors: The Journal of the Human Factors and Ergonomics Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818812586","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0018720818812586","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818812586","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818812586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T00:12:36Z","timestamp":1728519156000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0018720818812586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,4]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10.1177\/0018720818812586"],"URL":"https:\/\/doi.org\/10.1177\/0018720818812586","relation":{},"ISSN":["0018-7208","1547-8181"],"issn-type":[{"type":"print","value":"0018-7208"},{"type":"electronic","value":"1547-8181"}],"subject":[],"published":{"date-parts":[[2018,12,4]]}}}