Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Mary Frances Theofanos (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 76 - 100 of 109

Usability of PIV Smartcards for Logical Access

June 28, 2012
Author(s)
Emile L. Morse, Mary F. Theofanos, Yee-Yin Choong, Celeste Paul, Aiping L. Zhang, Hannah Wald
This paper presents the findings of a PIV usability pilot study conducted at NIST during the summer of 2010. The study focused on factors that affected users' perceptions and adoption of PIV smartcards. Based on observation of the study participants, the

Basing Cybersecurity Training on User Perceptions

April 2, 2012
Author(s)
Susanne M. Furman, Mary F. Theofanos, Yee-Yin Choong, Brian C. Stanton
The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users’ perceptions of computer and online

Latent Print Examination and Human Factors: Improving the Practice through a Systems Approach

February 17, 2012
Author(s)
Melissa Taylor, David H. Kaye, Thomas Busey, Melissa Gische, Gerry LaPorte, Colin Aitken, Susan M. Ballou, Leonard Butt, Christophe Champod, David Charlton, Itiel E. Dror, Jules Epstein, Robert J. Garrett, Max Houck, Edward J. Imwinkelried, Ralph Keaton, Glenn Langenburg, Deborah A. Leben, Alice Maceo, Kenneth F. Martin, Jennifer L. Mnookin, Cedric Neumann, Joe Polski, Maria A. Roberts, Scott A. Shappell, Lyle Shaver, Sargur N. Srihari, Hal S. Stern, David Stoney, Anjali Swienton, Mary Theofanos, Robert M. Thompson, John Vanderkolk, Maria Weir, Kasey Wertheim
Fingerprints have provided a valuable method of personal identification in forensic science and criminal investigations for more than 100 years. The examination of fingerprints left at crime scenes, generally referred to as latent prints, consists of a

Real-time Feedback for Usable Fingerprint Systems

October 11, 2011
Author(s)
Mary F. Theofanos, Brian C. Stanton, Yee-Yin Choong, Haiying Guan
Compared with traditional password and other identification methods, biometrics like face, iris, and fingerprint for automatic personal identification/verification have many advantages, and are increasingly gaining popularity in all kinds of applications

A Field Study of User Behavior and Perception in Smartcard Authentication

September 9, 2011
Author(s)
Emile L. Morse, Celeste L. Paul, Aiping L. Zhang, Yee-Yin Choong, Mary F. Theofanos
A field study of 24 participants over 10 weeks explored user behavior and perception in a smartcard authentication system. Ethnographic methods used to collect data included diaries, surveys, interviews, and field observations. We observed a number of

USABILITY STANDARDS ACROSS THE DEVELOPMENT LIFECYCLE

July 11, 2011
Author(s)
Mary F. Theofanos, Brian C. Stanton
In 2005 the International Standards Organization published ISO/IEC 25062 “Common Industry Format (CIF) for Usability Test Reports”. This standard focused on documenting the results of usability testing in a consistent format in terms of user effectiveness

Biometrics Systems Include Users

December 16, 2009
Author(s)
Mary F. Theofanos, Ross J. Micheals, Brian C. Stanton
Where do biometrics come from? The “canonical” standard (Wayman) biometric system model includes the biometric presentation and a biometric sensor but not the user themselves. Having this model facilitates having shared vocabulary and abstraction for

Hostage Rescue Team Quick Capture Platform Use Case Document

September 30, 2009
Author(s)
Brian Stanton, Yee-Yin Choong, Mary Theofanos
The document defines functional requirements for the Quick Capture Platform (QCP). These requirements have been developed for a portable hardware device with screen size as small as 5"(W)x3"(H). Functional requirements are the definitions of specific

Quick Capture Platform Graphics

September 30, 2009
Author(s)
Brian C. Stanton, Yee-Yin Choong, Mary F. Theofanos, Patrick Hoffman
This document defines all of the graphic images for the quick capture platform. For each graphic we provide a description, the dimensions, the image, the image name, the use area and the filename containing the graphic image.

Assessing Face Overlay

August 17, 2009
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, Yee-Yin Choong, John W. Wydler II, Kevin C. Mangold, Michelle P. Steves, Emile L. Morse
The United States Visitor and Immigrant Status Indicator Technology's (US-VISIT) has embarked on an effort to improve the quality of facial images captured at US ports of entry. One aspect of this effort was the identification of usability and human

Symbol Representing Biometrics in Use

July 30, 2009
Author(s)
Yee-Yin Choong, Mary Theofanos, Brian Stanton
During the InterNational Committee for Information Technology Standards (INCITS) M1 task group meetings in 2008, it was recognized that there is a need for a symbol to represent that any biometrics (fingerprint, iris, photo, etc.) are in use. The symbol is

Does the Angle of a Fingerprint Scanner Affect User Performance?

September 22, 2008
Author(s)
Mary F. Theofanos, Ross J. Micheals, Shahram Orandi, Brian C. Stanton, Nien F. Zhang, Charles L. Sheppard
As the deployment of biometric technologies such as fingerprints has become more widespread in government applications there is an increased awareness of the human-computer interaction that such technologies involve. User behavior can impact operational

Assessing Face Acquisition

September 15, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John M. Libert, Shahram Orandi
The requirements necessary for taking a successful face picture are arguably the least constrained of any biometric. The camera must be operational, and the subject must be illuminated sufficiently and facing the camera. Yet, a significant portion of the

Usability Testing of Face Image Capture for US Ports of Entry

September 10, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals
Abstract The requirements necessary for taking a successful face picture are arguably the least constrained of any biometric. The camera must be operational, and the subject must be illuminated sufficiently & facing the camera. Yet, a significant portion

Usability and Biometrics: Ensuring Successful Biometric Systems

June 11, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Cari Wolfson
The National Institute of Standards and Technology (NIST)Visualization and Usability Gropu initiated a Usability and Biometrics effort to focus on the users and human factors of biometric systems. The goal of this effort has been to conduct research to

How the User can Improve Fingerprint Image Quality

May 12, 2008
Author(s)
Mary F. Theofanos, Ross J. Micheals, Shahram Orandi, Brian C. Stanton, Nien F. Zhang
Traditionally the biometric field has viewed the user as a passive source of the biometric sample rather than an interactive component of the biometric system. But fingerprint image quality is highly dependent on the human computer interaction and

Usability Testing of Height and Angles of Ten-Print Fingerprint Capture

May 11, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard, Ross J. Micheals, John W. Wydler II, Nien F. Zhang, Lawrence Nadel, William Rubin
As the deployment of biometric technologies such as fingerprints has become more widespread in government applications there is an increased awareness of the human-computer interaction that such technologies involve. User behavior can impact operational

A Study of Users with Visual Disabilities and a Fingerprint Process

April 10, 2008
Author(s)
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard
The Department of Homeland Security¿s (DHS) United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program is a biometrically-enhanced identification system primarily situated at border points of entry such as airports and seaports

Making Biometric Systems Usable Let's Not Forget the User

December 31, 2007
Author(s)
Mary F. Theofanos, Brian C. Stanton
The use of physical identifiable characteristics (biometrics) in border and transportation security has increased since 9/11. Currently, the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program collects a right and left index

A Framework for the Evaluation of Pervasive Information Systems

December 28, 2007
Author(s)
Jean C. Scholtz, Mary F. Theofanos, Sunny Consolvo
In this chapter we present a framework of areas of evaluation for pervasive information systems along with metrics and examples from the literature. We review a number of methodologies that have been used in evaluation. A case study of an evaluation using

Usability Testing of Ten-Print Fingerprint Capture

October 8, 2007
Author(s)
Brian C. Stanton, Mary F. Theofanos, Shahram Orandi, Ross J. Micheals, Nien F. Zhang
Despite the increased deployment of biometric technologies in United States government applications, not enough attention is being paid to the human factors that such technologies involve. The use of biometric applications will be unfamiliar to many users

Biometric Systematic uncertatinty and the User

September 12, 2007
Author(s)
Mary F. Theofanos, Ross J. Micheals, Shahram Orandi, Brian C. Stanton
Often biometric technology and system evaluators are concerned with capturing accurate performance estimates that predict performance for target populations of interest. Occasionally, predictions, and perhaps adjustments, for subpopulations based on

Effects of Scanner Height on Fingerprint Capture

June 27, 2007
Author(s)
Mary Theofanos, Shahram Orandi, Ross J. Micheals, Brian Stanton, Nien F. Zhang
Although there is widespread deployment of biometric technologies such as fingerprint systems, little attention is being paid to the human-computer interaction that such technologies involved. This report presents the results of a study that examined the