Keyphrases
Manipulation Detection
88%
Security Privacy
83%
Internet Voting
83%
Electronic Voting
77%
Perceived Trust
75%
Voter Perceptions
66%
Risk-limiting Audit
66%
Cookies
66%
Code-based
66%
Privacy Concerns
61%
Code Voting
55%
Verifiable Voting Systems
50%
User Study
49%
QR Code
44%
Coercion
44%
Detection Efficiency
44%
Return Codes
44%
Attacker
41%
Personal Data
41%
Verifiability
41%
Detection Rate
41%
User Attitude
40%
Electoral Integrity
38%
Lack of Transparency
37%
Data Protection
37%
Privacy Protection
35%
World Wide Web
33%
Privacy Awareness
33%
Security Policy
33%
Smart Systems
33%
Human Factors
33%
Trust Factors
33%
Code Manipulation
33%
Privacy Practices
33%
Security Education
33%
Security Awareness Training
33%
Cross-country Investigation
33%
Security Awareness
33%
Formal Approach
33%
Security Practices
33%
IoT System
33%
General Data Protection Regulation
33%
Cybersecurity
33%
IT Systems
33%
COVID-19 Pandemic
33%
COVID-19
33%
Paper-based
33%
Security Measures
33%
GitHub
33%
User Reactions
33%
Computer Science
Cybersecurity
100%
Security and Privacy
100%
Privacy Protection
77%
Usability Issue
66%
Security Protection
66%
Security Properties
66%
General Data Protection Regulation
61%
Data Protection
50%
Personal Data
50%
User Experience
50%
Research Direction
33%
Detected Anomaly
33%
Security Awareness Training
33%
Telephone Number
33%
Security Education
33%
Potential Issue
33%
Security Policy
33%
Usability Research
33%
Confirmation Code
33%
Initialization Code
33%
Online Service
33%
System Provider
33%
Election Process
33%
Privacy Practice
33%
Security Practice
33%
Detection Rate
33%
Security Concern
33%
Decision Maker
33%
Open Source Project
33%
Privacy Concern
33%
System Security
33%
Usability Concern
33%
Security Framework
33%
Formal Definition
33%
Smart Device
33%
Attackers
33%
Ergonomics
33%
Conducted Interview
33%
Smart Environment
33%
Internet-Of-Things
33%
Service Provider
33%
Cryptographic Mechanism
33%
security level
33%
Geographical Location
27%
Protection Issue
27%
Digitalization
22%
Software Development
22%
User Behavior
16%
Concrete System
16%
External Attacker
16%