{"id":"https://openalex.org/W4402716985","doi":"https://doi.org/10.1007/978-3-031-72244-8_4","title":"A Framework for Voters\u2019 Trust Repair in Internet Voting","display_name":"A Framework for Voters\u2019 Trust Repair in Internet Voting","publication_year":2024,"publication_date":"2024-09-22","ids":{"openalex":"https://openalex.org/W4402716985","doi":"https://doi.org/10.1007/978-3-031-72244-8_4"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-72244-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-72244-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-72244-8_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-72244-8_4.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061383536","display_name":"Leo Fel","orcid":"https://orcid.org/0000-0002-5896-0640"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Leo Fel","raw_affiliation_strings":["University of Luxembourg, Esch-Sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Esch-Sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061383536"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35067422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"54","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8359318971633911},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.7298649549484253},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5885136723518372},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47512108087539673},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38421088457107544},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3367151916027069},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0717681348323822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359318971633911},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.7298649549484253},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5885136723518372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47512108087539673},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38421088457107544},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3367151916027069},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0717681348323822},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-031-72244-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-72244-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-72244-8_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:orbilu.uni.lu:10993/62128","is_oa":false,"landing_page_url":"https://orbilu.uni.lu/handle/10993/62128","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electronic Voting. E-Vote-ID 2024. Lecture Notes in Computer Science, vol 15014., 54\u201371 (2024-09-23)","raw_type":"peer reviewed"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-72244-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-72244-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-72244-8_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402716985.pdf","grobid_xml":"https://content.openalex.org/works/W4402716985.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1502071157","https://openalex.org/W1854663754","https://openalex.org/W1929204665","https://openalex.org/W1939525847","https://openalex.org/W1992728747","https://openalex.org/W1995395902","https://openalex.org/W2043450458","https://openalex.org/W2181353691","https://openalex.org/W2594915767","https://openalex.org/W2744762721","https://openalex.org/W2754279832","https://openalex.org/W2759250396","https://openalex.org/W2790750331","https://openalex.org/W2793000014","https://openalex.org/W2799653694","https://openalex.org/W2886887380","https://openalex.org/W2897713812","https://openalex.org/W2919492193","https://openalex.org/W2965954907","https://openalex.org/W2975682064","https://openalex.org/W2980800426","https://openalex.org/W3164104686","https://openalex.org/W3171475660","https://openalex.org/W3203609523","https://openalex.org/W3205850540","https://openalex.org/W4248181070","https://openalex.org/W4249342259","https://openalex.org/W4304190186","https://openalex.org/W6886865277","https://openalex.org/W6888872069"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2167984027","https://openalex.org/W3021302227","https://openalex.org/W10630519","https://openalex.org/W1919377569","https://openalex.org/W3144288563","https://openalex.org/W3123907821","https://openalex.org/W2103111323"],"abstract_inverted_index":{"Abstract":[0],"Research":[1],"on":[2],"voters\u2019":[3,74],"trust":[4,13,27,35,43,67,75,97,105,129,138,143],"in":[5,14,37,45,57,76],"i-voting":[6,18,38,85,101],"has":[7],"been":[8],"exclusively":[9],"related":[10],"to":[11,96],"building":[12],"the":[15,24,58,64,70,78,88,91,100,108,118,122,133],"process":[16,65],"of":[17,26,66,83,90,110,120,124,137],"adoption,":[19],"with":[20],"no":[21],"work":[22],"addressing":[23],"question":[25],"repair.":[28,144],"This":[29],"article":[30,62,116],"introduces":[31],"a":[32],"framework":[33],"for":[34,54,104,153],"repair":[36,44,68,106],"by":[39],"integrating":[40],"insights":[41],"from":[42,69],"other":[46],"research":[47],"areas,":[48],"as":[49,51],"well":[50],"concepts":[52],"developed":[53],"and":[55,80,93,99,107,135,140,150],"used":[56],"e-voting":[59],"literature.":[60],"The":[61,115],"traces":[63],"different":[71],"beliefs":[72],"influencing":[73],"both":[77],"human":[79],"technological":[81],"dimensions":[82,136],"an":[84],"system,":[86],"through":[87],"influence":[89],"internal":[92],"external":[94],"stakeholders,":[95],"violations":[98],"organisers\u2019":[102],"strategies":[103],"\u2018arsenal\u2019":[109],"measures":[111],"at":[112],"their":[113],"disposal.":[114],"highlights":[117],"importance":[119],"detecting":[121],"emergence":[123],"events":[125],"that":[126],"may":[127],"violate":[128],"among":[130],"voters,":[131],"understanding":[132],"severity":[134],"violation,":[139],"strategically":[141],"navigating":[142],"It":[145],"also":[146],"outlines":[147],"open":[148],"questions":[149],"identifies":[151],"avenues":[152],"future":[154],"research.":[155]},"counts_by_year":[],"updated_date":"2026-03-07T13:37:22.277990","created_date":"2025-10-10T00:00:00"}
