User Experience Design for E-Voting: How mental models align with security mechanisms

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper [7]. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols.

[1]  Peter Y. A. Ryan,et al.  Security - Visible, Yet Unseen? , 2019, CHI.

[2]  Markus Funk,et al.  How to Assess the Usability Metrics of E-Voting Schemes , 2019, Financial Cryptography Workshops.

[3]  Guillaume Gronier,et al.  Méthodes de design UX : 30 méthodes fondamentales pour concevoir des expériences optimales , 2018 .

[4]  Karola Marky,et al.  What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes , 2018, CHI.

[5]  Melanie Volkamer,et al.  Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability , 2018, IACR Cryptol. ePrint Arch..

[6]  Melanie Volkamer,et al.  Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? , 2017, IEEE Security & Privacy.

[7]  Vincent Koenig,et al.  Lab Testing Beyond Usability: Challenges and Recommendations for Assessing User Experiences , 2017 .

[8]  Harry Hochheiser,et al.  Research Methods in Human-Computer Interaction, 2nd Edition , 2017 .

[9]  Syed Taha Ali,et al.  An Overview of End-to-End Verifiable Voting Systems , 2016, ArXiv.

[10]  Vincenzo Iovino,et al.  Selene: Voting with Transparent Verifiability and Coercion-Mitigation , 2016, Financial Cryptography Workshops.

[11]  Dan S. Wallach,et al.  Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II , 2015, HCI.

[12]  Melanie Volkamer,et al.  Voter, What Message Will Motivate You to Verify Your Vote? , 2014 .

[13]  Dan S. Wallach,et al.  Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II , 2014, EVT/WOTE.

[14]  Melanie Volkamer,et al.  Mental Models of Verifiability in Voting , 2013, VoteID.

[15]  Philip B. Stark,et al.  STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System , 2012, EVT/WOTE.

[16]  Melanie Volkamer,et al.  User study of the improved Helios voting system interfaces , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).

[17]  Zhe Xia,et al.  Focus group views on Prêt à Voter 1.0 , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.

[18]  Jan Gulliksen,et al.  User-centered System Design , 2011 .

[19]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[20]  Michael D. Byrne,et al.  A Comparison of Usability Between Voting Methods , 2006, EVT.

[21]  Benjamin B. Bederson,et al.  The Importance of Usability Testing of Voting Systems , 2006, EVT.

[22]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[23]  Rocky Ross,et al.  Mental models , 2004, SIGA.

[24]  Alan Cooper,et al.  About Face 3: the essentials of interaction design , 1995 .

[25]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[26]  Donald A. Norman,et al.  User Centered System Design: New Perspectives on Human-Computer Interaction , 1988 .