{"doi":"10.1145/3613905.3650977","date_created":"2024-04-17T11:26:46Z","_id":"53532","status":"public","year":"2024","author":[{"orcid":"https://orcid.org/0009-0008-9529-2427","full_name":"Last, Yorick","last_name":"Last","first_name":"Yorick","id":"100966"},{"full_name":"Geels, Jorrit","last_name":"Geels","first_name":"Jorrit"},{"first_name":"Hanna","last_name":"Schraffenberger","full_name":"Schraffenberger, Hanna"}],"user_id":"100966","publisher":"ACM","type":"conference","citation":{"apa":"Last, Y., Geels, J., & Schraffenberger, H. (2024). Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets. Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24). CHI Conference on Human Factors in Computing Systems, Honululu, HI, USA. https://doi.org/10.1145/3613905.3650977","chicago":"Last, Yorick, Jorrit Geels, and Hanna Schraffenberger. “Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets.” In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24). ACM, 2024. https://doi.org/10.1145/3613905.3650977.","mla":"Last, Yorick, et al. “Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets.” Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24), ACM, 2024, doi:10.1145/3613905.3650977.","ieee":"Y. Last, J. Geels, and H. Schraffenberger, “Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets,” presented at the CHI Conference on Human Factors in Computing Systems, Honululu, HI, USA, 2024, doi: 10.1145/3613905.3650977.","bibtex":"@inproceedings{Last_Geels_Schraffenberger_2024, title={Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets}, DOI={10.1145/3613905.3650977}, booktitle={Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24)}, publisher={ACM}, author={Last, Yorick and Geels, Jorrit and Schraffenberger, Hanna}, year={2024} }","ama":"Last Y, Geels J, Schraffenberger H. Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets. In: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24). ACM; 2024. doi:10.1145/3613905.3650977","short":"Y. Last, J. Geels, H. Schraffenberger, in: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24), ACM, 2024."},"language":[{"iso":"eng"}],"date_updated":"2024-05-11T13:07:53Z","title":"Digital Dotted Lines: Design and Evaluation of a Prototype for Digitally Signing Documents Using Identity Wallets","conference":{"location":"Honululu, HI, USA","name":"CHI Conference on Human Factors in Computing Systems"},"publication":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24)","abstract":[{"lang":"eng","text":"Documents are largely stored and shared digitally. Yet, digital documents are still commonly signed using (copies of) handwritten signatures, which are sensitive to fraud. Though secure, cryptography-based signature solutions exist, they are hardly used due to usability issues. This paper proposes to use digital identity wallets for securely and intuitively signing digital documents with verified personal data. Using expert feedback, we implemented this vision in an interactive prototype. The prototype was assessed in a moderated usability test (𝑁 = 15) and a subsequent unmoderated remote\r\nusability test (𝑁 = 99). While participants generally expressed satisfaction with the system, they also misunderstood how to interpret the signature information displayed by the prototype. Specifically, signed documents were also trusted when the document was signed with irrelevant personal data of the signer. We conclude that such unwarranted trust forms a threat to usable digital signatures and requires attention by the usable security community."}]}