Reference : User Experience Design for E-Voting: How mental models align with security mechanisms
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/40486
User Experience Design for E-Voting: How mental models align with security mechanisms
English
Zollinger, Marie-Laure mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC) >]
Distler, Verena mailto [University of Luxembourg > Faculty of Language and Literature, Humanities, Arts and Education (FLSHASE) > Education, Culture, Cognition and Society (ECCS) >]
Roenne, Peter mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ryan, Peter mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Lallemand, Carine mailto [University of Luxembourg > Faculty of Language and Literature, Humanities, Arts and Education (FLSHASE) > Education, Culture, Cognition and Society (ECCS) >]
Koenig, Vincent mailto [University of Luxembourg > Faculty of Language and Literature, Humanities, Arts and Education (FLSHASE) > Education, Culture, Cognition and Society (ECCS) >]
Oct-2019
Electronic Voting
Yes
Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019
from 01-10-2019 to 04-10-2019
[en] e-voting ; user experience ; mental models
[en] This paper presents a mobile application for vote-casting and vote-verification
based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper.
Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols.
http://hdl.handle.net/10993/40486

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
E-Vote-ID-Paper_35.pdfAuthor preprint312.81 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.