Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 50

Voices of First Responders - Examining Public Safety Communication from the Perspective of 9-1-1 Call Takers and Dispatchers: Findings from User-Centered Interviews, Phase 1, Volume 4

March 24, 2020
Author(s)
Michelle P. Steves, Mary F. Theofanos, Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, 9 1 1 communications, emergency medical services (EMS)

Voices of First Responders—Nationwide Public Safety Communication Survey Methodology: Development, Dissemination, and Demographics, Phase 2, Volume 1

March 20, 2020
Author(s)
Kristen Greene, Shanee T. Dawkins, Sandra S. Prettyman, Pamela J. Konkol, Mary F. Theofanos, Kevin C. Mangold, Susanne M. Furman, Michelle P. Steves
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios (LMR) to a technology ecosystem that will include a variety of new communication tools

Forensic Handwriting Examination and Human Factors: Improving the Practice Through a Systems Approach

February 18, 2020
Author(s)
Melissa Taylor, Carolyne Bird, Brett Bishop, Ted Burkes, Michael P. Caligiuri, Bryan Found, Wesley P. Grose, Lauren R. Logan, Kenneth E. Melson, Mara L. Merlino, Larry S. Miller, Linton Mohammed, Jonathan Morris, John Paul Osborn, Nikola Osborne, Brent Ostrum, Christopher P. Saunders, Scott A. Shappell, H. David Sheets, Sargur N. Srihari, Reinoud D. Stoel, Thomas W. Vastrick, Heather E. Waltke, Emily J. Will
For some 6,000 years, humans have made an indelible mark on history through the loops, strokes, and other characters that constitute the written form of language - handwriting. The study of handwriting is also an important part of forensic science. By

Voices of First Responders – Examining Public Safety Communication from the Rural Perspective

November 25, 2019
Author(s)
Kristen Greene, Shanee T. Dawkins, Mary F. Theofanos, Michelle P. Steves, Susanne M. Furman, Yee-Yin Choong, Sandra S. Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, in urban, suburban, and rural areas. Understanding the

Rethinking Authentication

November 11, 2019
Author(s)
Kim B. Schaffer
In today's environment, there is little doubt that companies, organizations, and governments must make significant investments in developing, implementing, and supporting authentication for their digital systems. Perhaps because of this, an organization's

Human Factors in Smart Home Technologies Workshop Summary

November 5, 2019
Author(s)
Julie M. Haney, Susanne M. Furman
On September 24, 2019, the National Institute of Standards and Technology (NIST) hosted a one- day workshop entitled “Human Factors in Smart Home Technologies.” The workshop addressed human considerations for smart home devices, including usability, user

Categorization Errors for Data Entry in Maintenance Work-Orders

September 24, 2019
Author(s)
Thurston B. Sexton, Melinda Hodkiewicz, Michael P. Brundage
In manufacturing, there is a significant push toward the digitization of processes and decision making, by increasing the level of automation and networking via cyber-physical systems, and machine learning methods that can parse useful patterns from these

Perceptions of Smart Home Privacy and Security Responsibility, Concerns, and Mitigations

August 11, 2019
Author(s)
Julie M. Haney, Susanne M. Furman, Mary F. Theofanos, Yasemin Acar Fahl
Smart home devices are increasingly being used by nontechnical users who have little understanding of the technology, including privacy and security implications. To better understand perceptions of smart home privacy and security, we are conducting an

Voices of First Responders – Examining Public Safety Communication Problems and Requested Functionality: Findings from User-Centered Interviews, Phase 1, Volume 2.1

May 15, 2019
Author(s)
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first

Voices of First Responders – Examining Public Safety Communication Problems and Requested Functionality: Findings from User-Centered Interviews, Phase 1, Volume 2

March 28, 2019
Author(s)
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first

Case Study – Exploring Children’s Password Knowledge and Practices

February 24, 2019
Author(s)
Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous

Public Safety Communication User Needs: Voices of First Responders

September 25, 2018
Author(s)
Shanee T. Dawkins, Kristen Greene, Michelle P. Steves, Mary F. Theofanos, Yee-Yin Choong, Susanne M. Furman, Sandra S. Prettyman
The public safety community is transitioning from land mobile radios to a communications technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communications technology relies on efficient

Voices of First Responders - Identifying Public Safety Communication Problems: Findings from User-Centered Interviews, Phase 1, Volume 1

July 31, 2018
Author(s)
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies

User Context: An Explanatory Variable in Phishing Susceptibility

July 16, 2018
Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training

No Phishing beyond This Point

June 27, 2018
Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos
As phishing continues to evolve, what is your organization doing to stay off the hook?

Towards Developing Standardized Usability Evaluation Methodology for Public Safety Communications Technology: A User-Centered Approach

June 14, 2018
Author(s)
Kristen Greene, Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Sandra S. Prettyman, Susanne M. Furman, Michelle P. Steves
In public safety and homeland security, it is critical to understand technology users’ primary goals, the characteristics of the users, and the context in which they are operating. New and emerging technologies present opportunities and challenges for

Organizational Practices in Cryptographic Development and Testing

October 9, 2017
Author(s)
Julie M. Haney, Simson L. Garfinkel, Mary F. Theofanos
Organizations developing cryptographic products face significant challenges, including usability and human factors, that may result in decreased security, increased development time, and missed opportunities to use the technology to its fullest potential
Displaying 26 - 50 of 50