Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 51

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords

August 11, 2021
Mary Theofanos, Yee-Yin Choong
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore children's practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world's cyber posture and

Exploring Government Security Awareness Programs: A Mixed-Methods Approach

August 3, 2021
Jody Jacobs, Julie Haney, Susanne M. Furman, Fernando Barrientos
Organizational security awareness programs are often underfunded and rely on part-time security awareness professionals who may lack sufficient background, skills, or resources necessary to manage an effective and engaging program. U.S. government

Communication Technology Problems and Needs of Rural First Responders

July 27, 2021
Kerrianne Buchanan, Yee-Yin Choong, Shanee Dawkins, Sandra Spickard Prettyman
Although new technology may benefit rural first responders to help them serve their communities, to date little is known about what communication technology problems rural first responders most need addressed and what future technology they desire. To

Current Problems, Future Needs: Voices of First Responders about Communication Technology

July 27, 2021
Kerrianne Buchanan, Shanee Dawkins, Yee-Yin Choong, Mary Theofanos, Kristen Greene, Susanne M. Furman, Sandra S. Prettyman
With advances in network technologies, there has been increasing interest in developing new communication technology for first responders that utilizes wireless broadband networks. In order to develop new communication technology, user requirements are

Cybersecurity Advocates: Force Multipliers in Security Behavior Change

July 5, 2021
Julie Haney, Wayne Lutters, Jody Jacobs
Cybersecurity advocates motivate individuals and organizations to adopt positive security behaviors. Based on our research, we describe qualities of successful advocates. Our findings have practical implications for expanding the cybersecurity workforce by

Scaling the Phish: Advancing the NIST Phish Scale

July 3, 2021
Fernando Barrientos, Jody Jacobs, Shanee Dawkins
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential compromise of information security for both the individual and their organization. These

What Futuristic Technology Means for First Responders: Voices from the Field

July 3, 2021
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a broader spectrum of communication technologies for use on the newly created Nationwide Public Safety

Forensic Handwriting Examination and Human Factors: Improving the Practice Through a Systems Approach

June 1, 2021
Melissa Taylor, Brett Bishop, Ted Burkes, Michael Caligiuri, Bryan Found, Carolyne Bird, Wesley Grose, Lauren Logan, Kenneth Melson, Mara Merlino, Larry Miller, Linton Mohammed, Jonathan Morris, John Paul Osborn, Nikola Osborne, Brent Ostrum, Christopher Saunders, Scott Shappell, H. David Sheets, Sargur Srihari, Reinoud Stoel, Thomas Vastrick, Heather Waltke, Emily Will
For some 6,000 years, humans have made an indelible mark on history through the loops, strokes, and other characters that constitute the written form of language - handwriting. The study of handwriting is also an important part of forensic science. By

Trust and Artificial Intelligence

March 2, 2021
Brian Stanton, Theodore Jensen
The artificial intelligence (AI) revolution is upon us, with the promise of advances such as driverless cars, smart buildings, automated health diagnostics and improved security monitoring. Many current efforts are aimed to measure system trustworthiness

Voices of First Responders - Applying Human Factors and Ergonomics Knowledge to Improve the Usability of Public Safety Communications Technology: Findings from User-Centered Interviews, Phase 1, Volume 5

February 11, 2021
Yee-Yin Choong, Gavriel Salvendy
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios with a technology ecosystem that will include a variety of new and improved

Smart Home Consumers’ Privacy and Security Perceptions & Practices

December 8, 2020
Julie M. Haney, Susanne Furman, Yasemine Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack understanding of the privacy and security implications, while devices fail to provide transparency and

Research Report: User Perceptions of Smart Home Privacy and Security

November 17, 2020
Julie M. Haney, Susanne M. Furman, Yasemin Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, users may lack understanding of the privacy and security implications, while devices fail to provide transparency and

The New NIST Phish Scale, Revealing Why End Users Click

October 22, 2020
Shanee T. Dawkins, Kristen Greene, Jody L. Jacobs
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty – key to understanding variability in phishing click rates. This talk will cover why users click, why it’s

Towards Usable Updates for Smart Home Devices

September 17, 2020
Julie M. Haney, Susanne M. Furman
Smart home device updates are important tools for users to remediate security vulnerabilities and protect devices from future attacks. However, no prior research has been conducted to understand smart home users' perceptions of and experiences with updates
Displaying 1 - 25 of 51