Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 133 of 133

Voices of First Responders - Identifying Public Safety Communication Problems: Findings from User-Centered Interviews, Phase 1, Volume 1

July 31, 2018
Author(s)
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies

User Context: An Explanatory Variable in Phishing Susceptibility

July 15, 2018
Author(s)
Kristen K. Greene, Michelle P. Steves, Mary Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training

No Phishing beyond This Point

June 27, 2018
Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos
As phishing continues to evolve, what is your organization doing to stay off the hook?

Towards Developing Standardized Usability Evaluation Methodology for Public Safety Communications Technology: A User-Centered Approach

June 14, 2018
Author(s)
Kristen Greene, Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Sandra S. Prettyman, Susanne M. Furman, Michelle P. Steves
In public safety and homeland security, it is critical to understand technology users’ primary goals, the characteristics of the users, and the context in which they are operating. New and emerging technologies present opportunities and challenges for

Organizational Practices in Cryptographic Development and Testing

October 9, 2017
Author(s)
Julie Haney, Simson L. Garfinkel, Mary Theofanos
Organizations developing cryptographic products face significant challenges, including usability and human factors, that may result in decreased security, increased development time, and missed opportunities to use the technology to its fullest potential
Displaying 126 - 133 of 133