NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for first responders' use during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as major
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore children's practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world's cyber posture and
Jody Jacobs, Julie Haney, Susanne M. Furman, Fernando Barrientos
Organizational security awareness programs are often underfunded and rely on part-time security awareness professionals who may lack sufficient background, skills, or resources necessary to manage an effective and engaging program. U.S. government
Although new technology may benefit rural first responders to help them serve their communities, to date little is known about what communication technology problems rural first responders most need addressed and what future technology they desire. To
Kerrianne Buchanan, Shanee Dawkins, Yee-Yin Choong, Mary Frances Theofanos, Kristen K. Greene, Susanne M. Furman, Sandra Spickard-Prettyman
With advances in network technologies, there has been increasing interest in developing new communication technology for first responders that utilizes wireless broadband networks. In order to develop new communication technology, user requirements are
In the fall of 2019, the National Institute of Standards and Technology (NIST) funded three studies to better understand equity and inclusivity. This report is a comprehensive integration and summary of the sequential, exploratory mixed methods study
Cybersecurity advocates motivate individuals and organizations to adopt positive security behaviors. Based on our research, we describe qualities of successful advocates. Our findings have practical implications for expanding the cybersecurity workforce by
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential compromise of information security for both the individual and their organization. These
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen K. Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a broader spectrum of communication technologies for use on the newly created Nationwide Public Safety
Melissa Taylor, Brett Bishop, Ted Burkes, Michael Caligiuri, Bryan Found, Carolyne Bird, Wesley Grose, Lauren Logan, Kenneth Melson, Mara Merlino, Larry Miller, Linton Mohammed, Jonathan Morris, John Paul Osborn, Nikola Osborne, Brent Ostrum, Christopher Saunders, Scott Shappell, H. David Sheets, Sargur Srihari, Reinoud Stoel, Thomas Vastrick, Heather Waltke, Emily Will
For some 6,000 years, humans have made an indelible mark on history through the loops, strokes, and other characters that constitute the written form of language - handwriting. The study of handwriting is also an important part of forensic science. By
Purpose: Cybersecurity advocates attempt to reduce exposure to cyber attacks by promoting security best practices and encouraging security adoption. However, little is known about the skills necessary for success in this role. To fill this gap, our study
While the threats may appear to be vastly different, further investigation reveals that the cybersecurity community can learn much from the COVID-19 response.
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty – key to understanding variability in phishing click rates.
WITHDRAWN January 4, 2023 The artificial intelligence (AI) revolution is upon us, with the promise of advances such as driverless cars, smart buildings, automated health diagnostics and improved security monitoring. Many current efforts are aimed to
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios with a technology ecosystem that will include a variety of new and improved
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack understanding of the privacy and security implications, while devices fail to provide transparency and
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, users may lack understanding of the privacy and security implications, while devices fail to provide transparency and
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty key to understanding variability in phishing click rates. This talk will cover why users click, why its
Security awareness training requirements set a minimum baseline for introducing security practices to an organization's workforce. But is simple compliance enough to result in behavior change?
Smart home technology exposes adopters to increased risk to network security, information privacy, and physical safety. However, users may lack understanding of the privacy and security implications. Additionally, manufacturers often fail to provide
Smart home device updates are important tools for users to remediate security vulnerabilities and protect devices from future attacks. However, no prior research has been conducted to understand smart home users' perceptions of and experiences with updates
Shanee T. Dawkins, Kristen Greene, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network, the public safety community is in the process of supplementing the use of land mobile radios with the use of a broader spectrum of technologies. As these technologies are being developed