11 research outputs found

    Comparing "challenge-based" and "code-based" internet voting verification implementations

    Get PDF
    Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting. Voters might be concerned about their vote being recorded correctly and included in the final tally. To mitigate mistrust, many Internet-enabled voting systems build verifiability into their systems. This allows voters to verify that their votes have been cast as intended, stored as cast and tallied as stored at the conclusion of the voting period. Verification implementations have not been universally successful, mostly due to voter difficulties using them. Here, we evaluate two cast as intended verification approaches in a lab study: (1) "Challenge-Based" and (2) "Code-Based". We assessed cast-as-intended vote verification efficacy, and identified usability issues related to verifying and/or vote casting. We also explored acceptance issues post-verification, to see whether our participants were willing to engage with Internet voting in a real election. Our study revealed the superiority of the code-based approach, in terms of ability to verify effectively. In terms of real-life Internet voting acceptance, convenience encourages acceptance, while security concerns and complexity might lead to rejection

    Understanding Organizations Through Systems Oriented Design: Mapping Critical Intervention Points for Universal Design

    No full text
    This paper discusses how organisations pro-actively can ensure compliance with disciplinary best practice and regulations on Universal Design (UD) of ICT. We apply system-oriented design to analyse and engineer organisational compliance. The focus is on how best practice – disclosed in theory on how to design for UD, as well as coming regulatory updates – relate to current practices and systems theory on where in a system to intervene in order to change systems most effectively. The aim is a blueprint for a compliant, stable and improved organizational system. The case for the study is the Norwegian Labour and Welfare Administration (NAV). The work presented is part of ongoing strategic work on UD for NAV. Two contributions are made; 1) a discussion on the success of the utilized approach to inform strategic work on intervention points, and 2) recommended system mechanisms for NAV and similar organizations in order to meet the intention of the UD legislation and current quality benchmarks

    A User-Centered Approach to Digital Household Risk Management

    No full text
    Internet of Things (IoT) is expected to become as common as electricity (OECD 2016) and there is a high probability for connected homes to become central parts of critical societal. IoT technologies might access, manage and record sensitive data about citizens and, as they become more and more pervasive, unintended data breaches reports increase every week. However, most of the tools designed to protect users’ privacy and personal data on IoT devices fail to contemplate the experience of persons with disabilities, elderly and other vulnerable categories of people. As a consequence, they are forced to rely on the help of family members or other related persons with technical skills, as frequent technical problems turn out to be the rule rather than the exception. With humans traditionally considered to be the “weak link” in technological networks there is the need of a vast educational project to raise awareness on the subject. This ongoing research paper aims to fill the existing gap in research by asking how humans deal with the risk factors linked to connected homes and how to develop a universally designed set of tools for everyday risk management in connected homes

    Co-creating Persona Scenarios with Diverse Users Enriching Inclusive Design

    No full text
    In this article, we will examine personas as methodological approach and review some critiques about how its use may omit or stereotype users with disabilities or even restrict user involvement. We review previous persona creation methods and compare it to our approach where we involve diverse users directly in the personas creation process, to ensure more grounded personas. This approach has recently been refined in a project where we are building a tool aiming to give citizens more control over their health information. We discuss our experiences and offer some experience based guidelines for using our method

    Universal Design of ICT: A Historical Journey from Specialized Adaptations Towards Designing for Diversity

    No full text
    Over the last decades, the field of computer science has moved from specialized adaptations and add-on assistive technologies, toward universal solutions catering to a diverse set of user needs. Two paradigm shifts have arguably occurred on this journey: 1) a shift in disability perspective (from a medical model to a psychosocial and situated model) and 2) a shift from reactive accessibility efforts to proactive inclusive design efforts. In addition, we have changed our perception of the end-user (from ‘Mr. Average’ to situated individuals), have expanded our disciplinary epistemologies (from positivist objective knowledge to critical and empathic qualitative insights), and changed the way we build digital solutions (from plan-based with little user contact to iterative with high user contact). This article tells the story of this journey, and how these shifts have all influenced the way we think today. We argue that different ways of thinking about and arguing for universal design today are not necessary confrontations – but can be seen as evolvements over time to complement the different societal systems in which we are designing
    corecore