NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
As smart home technology is becoming more pervasive, smart home devices are increasingly being used by non-technical users who may have little understanding of the technology or how to properly mitigate privacy and security risks. To better inform security
Michelle P. Steves, Mary Theofanos, Yee-Yin Choong, Shanee Dawkins, Susanne M. Furman, Kristen K. Greene, Sandra Spickard Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, 9 1 1 communications, emergency medical services (EMS)
Kristen Greene, Shanee T. Dawkins, Sandra S. Prettyman, Pamela J. Konkol, Mary F. Theofanos, Kevin C. Mangold, Susanne M. Furman, Michelle P. Steves
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios (LMR) to a technology ecosystem that will include a variety of new communication tools
Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore childrens practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the worlds cyber posture and
Melissa Taylor, Carolyne Bird, Brett Bishop, Ted Burkes, Michael P. Caligiuri, Bryan Found, Wesley P. Grose, Lauren R. Logan, Kenneth E. Melson, Mara L. Merlino, Larry S. Miller, Linton Mohammed, Jonathan Morris, John Paul Osborn, Nikola Osborne, Brent Ostrum, Christopher P. Saunders, Scott A. Shappell, H. David Sheets, Sargur N. Srihari, Reinoud D. Stoel, Thomas W. Vastrick, Heather E. Waltke, Emily J. Will
For some 6,000 years, humans have made an indelible mark on history through the loops, strokes, and other characters that constitute the written form of language - handwriting. The study of handwriting is also an important part of forensic science. By
Kristen K. Greene, Shanee Dawkins, Mary Theofanos, Michelle P. Steves, Susanne M. Furman, Yee-Yin Choong, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, in urban, suburban, and rural areas. Understanding the
In today's environment, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization's
On September 24, 2019, the National Institute of Standards and Technology (NIST) hosted a one- day workshop entitled "Human Factors in Smart Home Technologies." The workshop addressed human considerations for smart home devices, including usability, user
Thurston B. Sexton, Melinda Hodkiewicz, Michael P. Brundage
In manufacturing, there is a significant push toward the digitization of processes and decision making, by increasing the level of automation and networking via cyber-physical systems, and machine learning methods that can parse useful patterns from these
Julie Haney, Susanne M. Furman, Mary Theofanos, Yasemin Acar Fahl
Smart home devices are increasingly being used by nontechnical users who have little understanding of the technology, including privacy and security implications. To better understand perceptions of smart home privacy and security, we are conducting an
Cyber attacks are on the rise, but individuals and organizations often fail to implement basic security practices and technologies. Cybersecurity advocates are security professionals who encourage and facilitate the adoption of these best practices. To be
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first
Yee-Yin Choong, Mary Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous
Julie Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman
Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past research studies have supported this observation by revealing a multitude of errors and pitfalls in the
Shanee T. Dawkins, Kristen Greene, Michelle P. Steves, Mary F. Theofanos, Yee-Yin Choong, Susanne M. Furman, Sandra S. Prettyman
The public safety community is transitioning from land mobile radios to a communications technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communications technology relies on efficient
Julie M. Haney, Mary F. Theofanos, Yasemin Acar, Sandra S. Prettyman
Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past studies have supported this observation by revealing a multitude of errors and developer pitfalls in the cryptographic implementations of software products. However, the
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies
Kristen K. Greene, Michelle P. Steves, Mary Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training
Kristen Greene, Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Sandra S. Prettyman, Susanne M. Furman, Michelle P. Steves
In public safety and homeland security, it is critical to understand technology users primary goals, the characteristics of the users, and the context in which they are operating. New and emerging technologies present opportunities and challenges for
Organizations developing cryptographic products face significant challenges, including usability and human factors, that may result in decreased security, increased development time, and missed opportunities to use the technology to its fullest potential