-
Can Voters Detect Errors on Their Printed Ballots? Absolutely
Authors:
Philip Kortum,
Michael D. Byrne,
Chidera O. Azubike,
Laura E. Roty
Abstract:
There is still debate on whether voters can detect malicious changes in their printed ballot after making their selections on a Ballot Marking Device (BMD). In this study, we altered votes on a voter's ballot after they had made their selections on a BMD. We then required them to examine their ballots for any changes from the slate they used to vote. Overall accuracy was exceptionally high. Partic…
▽ More
There is still debate on whether voters can detect malicious changes in their printed ballot after making their selections on a Ballot Marking Device (BMD). In this study, we altered votes on a voter's ballot after they had made their selections on a BMD. We then required them to examine their ballots for any changes from the slate they used to vote. Overall accuracy was exceptionally high. Participants saw 1440 total contests, and of those 1440, there were a total of 4 errors, so total accuracy was 99.8%. Participants were able to perform with near-perfect accuracy regardless of ballot length, ballot type, number of altered races, and location of altered races. Detection performance was extremely robust. We conclude that with proper direction and resources, voters can be near-perfect detectors of ballot changes on printed paper ballots after voting with a BMD. This finding has significant implications for the voting community as BMD use continues to grow. Research should now focus on identifying administrative and behavioral methods that will prompt and encourage voters to check their BMD-generated ballots before they drop them in the ballot box.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
Voter Verification of BMD Ballots Is a Two-Part Question: Can They? Mostly, They Can. Do They? Mostly, They Don't
Authors:
Philip Kortum,
Michael D. Byrne,
Julie Whitmore
Abstract:
The question of whether or not voters actually verify ballots produced by ballot marking devices (BMDs) is presently the subject of some controversy. Recent studies (e.g., Bernhard, et al. 2020) suggest the verification rate is low. What is not clear from previous research is whether this is more a result of voters being unable to do so accurately or whether this is because voters simply choose no…
▽ More
The question of whether or not voters actually verify ballots produced by ballot marking devices (BMDs) is presently the subject of some controversy. Recent studies (e.g., Bernhard, et al. 2020) suggest the verification rate is low. What is not clear from previous research is whether this is more a result of voters being unable to do so accurately or whether this is because voters simply choose not to attempt verification in the first place. In order to understand this problem, we conducted an experiment in which 108 participants participated in a mock election where the BMD displayed the voters' true choices, but then changed a subset of those choices on the printed ballot. The design of the printed ballot, the length of the ballot, the number of changes that were made to the ballot, the location of those changes, and the instructions provided to the voters were manipulated as part of the experiment. Results indicated that of those voters who chose to examine the printed ballot, 76% detected anomalies, indicating that voters can reliably detect errors on their ballot if they will simply review it. This suggests that administrative remedies, rather than attempts to alter fundamental human perceptual capabilities, could be employed to encourage voters to check their ballots, which could prove as an effective countermeasure.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
Authors:
Josh Benaloh,
Mike Byrne,
Philip Kortum,
Neal McBurnett,
Olivier Pereira,
Philip B. Stark,
Dan S. Wallach
Abstract:
In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It pro…
▽ More
In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It provides both a paper trail and end-to-end cryptography using COTS hardware. It is designed to support both ballot-level risk-limiting audits, and auditing by individual voters and observers. The human interface and process flow is based on modern usability research. This paper describes the STAR-Vote architecture, which could well be the next-generation voting system for Travis County and perhaps elsewhere.
△ Less
Submitted 8 November, 2012;
originally announced November 2012.
-
Practical Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage
Authors:
Ahmad Rahmati,
Clayton Shepard,
Chad Tossell,
Lin Zhong,
Philip Kortum
Abstract:
Context information brings new opportunities for efficient and effective applications and services on mobile devices. A wide range of research has exploited context dependency, i.e., the relations between context(s) and the outcome, to achieve significant, quantified, performance gains for a variety of applications. These works often have to deal with the challenges of multiple sources of context…
▽ More
Context information brings new opportunities for efficient and effective applications and services on mobile devices. A wide range of research has exploited context dependency, i.e., the relations between context(s) and the outcome, to achieve significant, quantified, performance gains for a variety of applications. These works often have to deal with the challenges of multiple sources of context that can lead to a sparse training data set, and the challenge of energy hungry context sensors. Often, they address these challenges in an application specific and ad-hoc manner. We liberate mobile application designers and researchers from these burdens by providing a methodical approach to these challenges. In particular, we 1) define and measure the context-dependency of three fundamental types of mobile usage in an application agnostic yet practical manner, which can provide clear insight into the performance of potential ap-plication. 2) Address the challenge of data sparseness when dealing with multiple and different sources of context in a systematic manner. 3) Present SmartContext to address the energy challenge by automatically selecting among context sources while ensuring the minimum accuracy for each estimation event is met.
Our analysis and findings are based on usage and context traces collected in real-life settings from 24 iPhone users over a period of one year. We present findings regarding the context dependency of the three principal types of mobile usage; visited websites, phone calls, and app usage. Yet, our methodology and the lessons we learn can be readily extended to other context-dependent mobile usage and system resources as well. Our findings guide the development of context aware systems, and highlight the challenges and expectations regarding the context dependency of mobile usage.
△ Less
Submitted 8 September, 2012; v1 submitted 3 September, 2012;
originally announced September 2012.
-
Tales of 34 iPhone Users: How they change and why they are different
Authors:
Ahmad Rahmati,
Clayton Shepard,
Chad Tossell,
Mian Dong,
Zhen Wang,
Lin Zhong,
Philip Kortum
Abstract:
We present results from a longitudinal study of 34 iPh-one 3GS users, called LiveLab. LiveLab collected unprecedented usage data through an in-device, programmable logger and several structured interviews with the participants throughout the study. We have four objectives in writing this paper: (i) share the findings with the research community; (ii) provide insights guiding the design of smartpho…
▽ More
We present results from a longitudinal study of 34 iPh-one 3GS users, called LiveLab. LiveLab collected unprecedented usage data through an in-device, programmable logger and several structured interviews with the participants throughout the study. We have four objectives in writing this paper: (i) share the findings with the research community; (ii) provide insights guiding the design of smartphone systems and applications; (iii) demonstrate the power of prudently designed longitudinal field studies and the power of advanced research methods; and (iv) raise important questions that the research community can help answer in a collaborative, multidisciplinary manner.
We show how the smartphone usage changes over the year and why the users are different (and similar) in their usage. In particular, our findings highlight application and web usage dynamics, the influence of socioeconomic status (SES) on usage, and the shortcomings of iPhone 3GS and its ecosystem. We further show that distinct classes of usage patterns exist, and these classes are best served by different phone designs, instead of the one-size-fits-all phone Apple provides. Our findings are significant not only for understanding smartphone users but also in guiding device and application development and optimizations. While we present novel results that can only be produced by a study of this nature, we also raise new research questions to be investigated by the mobile research community.
△ Less
Submitted 24 June, 2011;
originally announced June 2011.
-
Seamless Flow Migration on Smartphones without Network Support
Authors:
Ahmad Rahmati,
Clay Shepard,
Chad Tossell,
Angela Nicoara,
Lin Zhong,
Phil Kortum,
Jatinder Singh
Abstract:
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol changes? To answer this question, we make three research contributions. (i) We report a comprehensive characterization of IP traffic on smartphones using traces collected from 27 iPhone 3GS users for three months. (ii) D…
▽ More
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol changes? To answer this question, we make three research contributions. (i) We report a comprehensive characterization of IP traffic on smartphones using traces collected from 27 iPhone 3GS users for three months. (ii) Driven by the findings from the characterization, we devise two novel system mechanisms for mobile devices to sup-port seamless flow migration without network support, and extensively evaluate their effectiveness using our field collected traces of real-life usage. Wait-n-Migrate leverages the fact that most flows are short lived. It establishes new flows on newly available networks but allows pre-existing flows on the old network to terminate naturally, effectively decreasing, or even eliminating, connectivity gaps during network switches. Resumption Agent takes advantage of the functionality integrated into many modern protocols to securely resume flows without application intervention. When combined, Wait-n-Migrate and Resumption Agent provide an unprecedented opportunity to immediately deploy performance and efficiency-enhancing policies that leverage multiple networks to improve the performance, efficiency, and connectivity of mobile devices. (iii) Finally, we report an iPhone 3GS based implementation of these two system mechanisms and show that their overhead is negligible. Furthermore, we employ an example network switching policy, called AutoSwitch, to demonstrate their performance. AutoSwitch improves the Wi-Fi user experience by intelligently migrating TCP flows between Wi-Fi and cellular networks. Through traces and field measurements, we show that AutoSwitch reduces the number of user disruptions by an order of magnitude.
△ Less
Submitted 14 December, 2010;
originally announced December 2010.