Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3313831.3376769acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Improving the Usability and UX of the Swiss Internet Voting Interface

Published: 23 April 2020 Publication History

Abstract

Up to 20% of residential votes and up to 70% of absentee votes in Switzerland are cast online. The Swiss system aims to provide individual verifiability by different verification codes. The voters have to carry out verification on their own, making the usability and UX of the interface of great importance. To improve the usability, we first performed an evaluation with 12 human-computer interaction experts to uncover usability weaknesses of the Swiss Internet voting interface. Based on the experts' findings, related work, and an exploratory user study with 36 participants, we propose a redesign that we evaluated in a user study with 49 participants. Our study confirmed that the redesign indeed improves the detection of incorrect votes by 33% and increases the trust and understanding of the voters. Our studies furthermore contribute important lessons for designing verifiable e-voting systems in general.

Supplementary Material

ZIP File (pn8590aux.zip)
Our supplementary material consists of: * Exploratory Study Evaluation Documents * User Evaluation Documents * Interface Screenshots Please note, that during our studies, we used ballots from the Bundestag election 2017. The ballots in the screenshots are simplified for illustrative purposes. * Code Sheets Please note, that during our studies, we used ballots from the Bundestag election 2017. The candidates and parties on the code sheets are simplified for illustrative purposes.
MP4 File (a640-marky-presentation.mp4)

References

[1]
Claudia Z. Acemyan, Philip Kortum, Michael D. Byrne, and Dan S. Wallach. 2014. Usability of Voter Verifiable, End-to-End Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II. The USENIX Journal of Election Technology and Systems (JETS) 2, 3 (2014), 26--56.
[2]
B. Adida. 2006. Advances in Cryptographic Voting Systems. Ph.D. Dissertation. Massachusetts Institute of Technology.
[3]
Ben Adida. 2008. Helios: Web-based Open-Audit Voting. In Proceedings of the USENIX Security Symposium, Vol. 17. USENIX Association, Berkeley, CA, USA, 335--348.
[4]
Jordi Puiggalí Allepuz and Sandra Guasch Castelló. 2012. Cast-as-Intended Verification in Norway. In Proceedings of the International Conference on Electronic Voting (EVOTE). Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, Germany, 49--63.
[5]
Aaron Bangor, Philip Kortum, and James Miller. 2009. Determining What Individual SUS Scores Mean: Adding an Adjective Rating Scale. Journal of Usability Studies 4, 3 (2009), 114--123.
[6]
Josh Benaloh. 2006. Simple Verifiable Elections. In Proceedings of the Electronic Voting Technology Workshop (EVT). USENIX Association, Berkeley, CA, USA, Article 5, 10 pages.
[7]
Josh Benaloh. 2007. Ballot Casting Assurance via Voter-Initiated Poll Station Auditing. In Proceedings of the Electronic Voting Technology Workshop (EVT). USENIX Association, Berkeley, CA, USA, Article 14, 8 pages.
[8]
Ted Boren and Judith Ramey. 2000. Thinking Aloud: Reconciling Theory and Practice. IEEE transactions on professional communication 43, 3 (2000), 261--278.
[9]
John Brooke. 1996. SUS - A Quick and Dirty Usability Scale. Usability Evaluation in Industry 189, 194 (1996), 4--7.
[10]
Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, and Mema Roussopoulos. 2016. D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System. In Proceedings of the International Conference on Distributed Computing Systems (ICDCS). IEEE, Piscataway, NJ, USA, 711--720.
[11]
Véronique Cortier, David Galindo, and Mathieu Turuani. 2018. A Formal Analysis of the Neuchatel e-Voting Protocol. In Proceedings of the IEEE European Symposium on Security and Privacy (S&P) ((Euro S&P)). 430--442.
[12]
Véronique Cortier and Ben Smyth. 2013. Attacking and Fixing Helios: An Analysis of Ballot Secrecy. Journal of Computer Security 21, 1 (2013), 89--148.
[13]
Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An Empirical Study of Textual Key-Fingerprint Representations. In Proceedings of the USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 193--208.
[14]
Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Roenne, Peter Y. A. Ryan, and Vincent Koenig. 2019. Security - Visible, Yet Unseen?. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '19). ACM, NY, NY, USA, Article 605, 13 pages.
[15]
Swiss Post E-Voting. 2019. Swiss Post. https://www.evoting.ch/. (2019). [Online; accessed: 18-January-2019].
[16]
Programme Office eGovernment Switzerland. 2019. Electronic Voting. https://www.egovernment.ch/en/umsetzung/schwerpunktplan/vote-electronique/. (2019). [Online; accessed: 18-January-2019].
[17]
Uwe Flick. 2014. An Introduction to Qualitative Research (5 ed.). Sage, London.
[18]
Kristin Skeide Fuglerud and Till Halbach Røssvoll. 2012. An Evaluation of Web-Based Voting Usability and Accessibility. Universal Access in the Information Society 11, 4 (2012), 359--373.
[19]
David Galindo, Sandra Guasch, and Jordi Puiggalí. 2015. Neuchâtel's Cast-as-Intended Verification Mechanism. In Proceedings of the International Conference on E-Voting and Identity (VoteID). Springer-Verlag, Cham, Switzerland, 3--18.
[20]
Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, and Moti Yung. 2001. The Business of Electronic Voting. In Proceedings of the International Conference on Financial Cryptography (FC). Springer-Verlag, Cham, Switzerland, 243--268.
[21]
Micha Germann and Uwe Serdült. 2014. Internet Voting for Expatriates: The Swiss Case. JeDEM-eJournal of eDemocracy and Open Government 6, 2 (2014), 197--215.
[22]
Kristian Gjøsteen. 2011. The Norwegian Internet Voting Protocol. In Proceedings of the International Conference on E-Voting and Identity (VoteID). Springer-Verlag, Cham, Switzerland, 1--18.
[23]
Gurchetan S. Grewal, Mark D. Ryan, Liqun Chen, and Michael R. Clarkson. 2015. Du-Vote: Remote Electronic Voting with Untrusted Computers. In Proceedings of the Computer Security Foundations Symposium (CSF). IEEE, Piscataway, NJ, USA, 155--169.
[24]
Sandra Guasch Castelló. 2016. Individual Verifiability in Electronic Voting. Ph.D. Dissertation. Universitat Politécnica de Catalunya.
[25]
Rolf Haenni, Reto E. Koenig, and Eric Dubuis. 2016. Cast-as-Intended Verification in Electronic Elections based on Oblivious Transfer. In Proceedings of the International Joint Conference on Electronic Voting. Springer-Verlag, Cham, Switzerland, 73--91.
[26]
Rolf Haenni, Reto E. Koenig, Philipp Locher, and Eric Dubuis. 2017. CHVote System Specification. Cryptology ePrint Archive, Report 2017/325, (2017), 1--325. https://eprint.iacr.org/2017/325.pdf.
[27]
J. Alex Halderman and Vanessa Teague. 2015. The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. In Proceedings of the International Conference on E-voting and Identity (VoteID). Springer, Cham, Switzerland, 35--53.
[28]
Sven Heiberg and Jan Willemson. 2014. Verifiable Internet Voting in Estonia. In Proceedings of the International Conference on Electronic Voting: Verifying the Vote (EVOTE). IEEE, Piscataway, NJ, USA, 1--8.
[29]
Jörg Helbach and Jörg Schwenk. 2007. Secure Internet Voting with Code Sheets. In Proceedings of the International Conference on E-Voting and Identity (VoteID). Springer-Verlag, Cham, Switzerland, 166--177.
[30]
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, and Bo-Yin Yang. 2009. A Study of User-Friendly Hash Comparison Schemes. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). IEEE, Piscataway, NJ, USA, 105--114.
[31]
Ding-Long Huang, Pei-Luen Patrick Rau, Gavriel Salvendy, Fei Gao, and Jia Zhou. 2011. Factors Affecting Perception of Information Security and Their Impacts on IT Adoption and Security Practices. International Journal of Human-Computer Studies 69, 12 (2011), 870--883.
[32]
Fatih Karayumak, Michaela Kauer, M. Maina Olembo, Tobias Volk, and Melanie Volkamer. 2011a. User Study of the Improved Helios Voting System Interfaces. In Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST). IEEE, Piscataway, NJ, USA, 37--44.
[33]
Fatih Karayumak, Maina M. Olembo, Michaela Kauer, and Melanie Volkamer. 2011b. Usability Analysis of Helios-An Open Source Verifiable Remote Electronic Voting System. In Proceedings of the Conference on Electronic Voting Technology/Workshop on Trustworthy Elections (EVT/WOTE). USENIX Association, Berkeley, CA, USA, Article 5, 16 pages.
[34]
Shahram Khazaei and Douglas Wikström. 2017. Return Code Schemes for Electronic Voting Systems. In Proceedings of the International Joint Conference on Electronic Voting (E-Vote-ID). Springer-Verlag, Cham, Switzerland, 198--209.
[35]
Aggelos Kiayias, Thomas Zacharias, and Bingsheng Zhang. 2015. End-to-End Verifiable Elections in the Standard Model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, Cham, Switzerland, 468--498.
[36]
Bettina Laugwitz, Theo Held, and Martin Schrepp. 2008. Construction and Evaluation of a User Experience Questionnaire. In Proceedings of the HCI and Usability for Education and Work.
[37]
Karola Marky, Oksana Kulyk, Karen Renaud, and Melanie Volkamer. 2018b. What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, Article 176, 13 pages.
[38]
Karola Marky, Oksana Kulyk, and Melanie Volkamer. 2018a. Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting. In Proceedings of the "SICHERHEIT 2018". Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, Germany, 197--208.
[39]
Karola Marky, Marie-Laure Zollinger, Markus Funk, Peter Ryan, and Max Mühlhäuser. 2019. How to Assess the Usability Metrics of E-Voting Schemes. In Proceeding of the 4th Workshop on Advances in Secure Electronic Voting (VOTING '19). Springer.
[40]
Víctor Mateu and Magda Valls. 2017. Cast as Intended Verifiability for Mixed Array Ballots. In Proceedings of the International Conference on Electronic Government and the Information Systems Perspective (EGOVIS). Springer-Verlag, Cham, Switzerland, 206--218.
[41]
Stephan Neumann, Maina M. Olembo, Karen Renaud, and Melanie Volkamer. 2014. Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?. In Proceedings of the International Conference on Electronic Government and the Information Systems Perspective (EGOVIS). Springer-Verlag, Cham, Switzerland, 246--260.
[42]
Federal Chancellery of Switzerland. 2018. Federal Chancellery Ordinance on Electronic Voting (VEleS). https://www.bk.admin.ch/dam/bk/de/dokumente/pore/ Federal_Chancellery_Ordinance_on_Electronic_Voting_ V2.0_July_2018.pdf.download.pdf/Federal_Chancellery_ Ordinance_on_Electronic_Voting_V2.0_July_2018.pdf. (2018). [Online; accessed: 18-January-2019].
[43]
POLYAS GmbH. 2019. Overview of Polyas Costumers. POLYASKundenÜbersicht. (2019). [Online; accessed: 26-December-2019].
[44]
Paulo Realpe-Muñoz, César A. Collazos, Julio Hurtado, Toni Granollers, Jaime Muñoz-Arteaga, and Jaime Velasco-Medina. 2017. Eye Tracking-Based Behavioral Study of Users Using E-Voting Systems. Computer Standards & Interfaces 55 (2017), 182--195.
[45]
Peter Y. A. Ryan, Peter B. Rønne, and Vincenzo Iovino. 2016. Selene: Voting With Transparent Verifiability and Coercion-Mitigation. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC). Springer, 176--192.
[46]
Ted Selker, Elizabeth Rosenzweig, and Anna Pandolfo. 2006. A Methodology for Testing Voting Systems. Journal of Usability Studies 2, 1 (Nov. 2006), 7--21. http://dl.acm.org/citation.cfm?id=2835536.2835538
[47]
U. Serdült, M. Germann, F. Mendez, A. Portenier, and C. Wellig. 2015. Fifteen Years of Internet Voting in Switzerland [History, Governance and Use]. In Proceedings of the Second International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, Piscataway, NJ, USA, 126--132.
[48]
Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, and J. Alex Halderman. 2014. Security Analysis of the Estonian Internet Voting System. In Proceedings of the Conference on Computer and Communications Security (CCS '14). ACM, NY, NY, USA, 703--715.
[49]
Tim Storer and Ishbel Duncan. 2004. Polsterless Remote Electronic Voting. Journal of E-government 1, 1 (2004), 75--103.
[50]
Tim Storer, Linda Little, and Ishbel Duncan. 2006. An Exploratory Study of Voter Attitudes Towards a Pollsterless Remote Voting System. In Pre-Proceedings of the IAVoSS Workshop on Trustworthy Elections (WOTE). 77--86.
[51]
Joshua Tan, Lujo Bauer, Joseph Bonneau, Lorrie Faith Cranor, Jeremy Thomas, and Blase Ur. 2017. Can Unicorns Help Users Compare Crypto Key Fingerprints?. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, NY, NY, USA, 3787--3798.
[52]
Janna-Lynn Weber and Urs Hengartner. 2009. Usability Study of the Open Audit Voting System Helios. http://www.jannaweber.com/wp-content/uploads/2009/09/ 858Helios.pdf. (2009). [Online; accessed: 12-June-2018].
[53]
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, and Rop Gonggrijp. 2010. Security Analysis of India's Electronic Voting Machines. In Proceedings of the Conference on Computer and Communications Security (CCS '10). ACM, NY, NY, USA, 1--14.
[54]
Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman. 2012. Attacking the Washington, DC Internet Voting System. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC). Springer-Verlag, Cham, Switzerland, 114--128.

Cited By

View all
  • (2024)Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00136(3458-3477)Online publication date: 19-May-2024
  • (2024)On the feasibility of E2E verifiable online voting – A case study from Durga Puja trialJournal of Information Security and Applications10.1016/j.jisa.2024.10371981(103719)Online publication date: Mar-2024
  • (2023)Comparison of methods for analyzing the correlation of user experience and information securityProceedings of the 2023 5th International Conference on Software Engineering and Development10.1145/3637792.3637794(8-16)Online publication date: 20-Oct-2023
  • Show More Cited By

Index Terms

  1. Improving the Usability and UX of the Swiss Internet Voting Interface

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
    April 2020
    10688 pages
    ISBN:9781450367080
    DOI:10.1145/3313831
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 April 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. e-voting
    2. individual verifiability
    3. usability evaluation

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)92
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00136(3458-3477)Online publication date: 19-May-2024
    • (2024)On the feasibility of E2E verifiable online voting – A case study from Durga Puja trialJournal of Information Security and Applications10.1016/j.jisa.2024.10371981(103719)Online publication date: Mar-2024
    • (2023)Comparison of methods for analyzing the correlation of user experience and information securityProceedings of the 2023 5th International Conference on Software Engineering and Development10.1145/3637792.3637794(8-16)Online publication date: 20-Oct-2023
    • (2023)Two factor authentication in E-voting system using time based one time password2ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION SCIENTIFIC DEVELOPMENT (ICAISD) 2021: Innovating Scientific Learning for Deep Communication10.1063/5.0132950(020042)Online publication date: 2023
    • (2021)“Just for the Sake of Transparency”: Exploring Voter Mental Models of VerifiabilityElectronic Voting10.1007/978-3-030-86942-7_11(155-170)Online publication date: 5-Oct-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media