Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 137

Reflection of its Creators: Qualitative Analysis of General Public and Expert Perceptions of Artificial Intelligence

October 16, 2024
Author(s)
Theodore Jensen, Mary Frances Theofanos, Kristen K. Greene, Olivia Williams, Kurtis Goad, Janet Bih Fofang
The increasing prevalence of artificial intelligence (AI) will likely lead to new interactions and impacts for the general public. An understanding of people's perceptions of AI can be leveraged to design and deploy AI systems toward human needs and values

A Review of the Literature on Voter Verification and Ballot Review

July 8, 2024
Author(s)
Whitney Quesenbery, Suzanne Chapman, Christopher Patten, Roberto Spreggiaro, Shanee Dawkins
One of the major issues for voting systems today is whether they provide voters with a meaningful opportunity to verify their ballot before casting it. This opportunity is important in helping them vote their intent by catching errors or omissions made

How Voters Review and Verify Ballots

July 8, 2024
Author(s)
Suzanne Chapman, Lynn Baumeister, Whitney Quesenbery, Shanee Dawkins
Qualitative research to gain deeper insights about how voters mark, review, verify, and cast their ballots. Conducted as part of the work to update the human factors—accessibility, privacy, and usability—requirements in federal voting system standards and

Mathematical Entities: Corpora and Benchmarks

May 20, 2024
Author(s)
Jacob Collard, Valeria de Paiva, Eswaran Subrahmanian
Mathematics is a highly specialized domain with its own unique set of challenges. Despite this, there has been relatively little research on natural language processing for mathematical texts, and there are few mathematical language resources aimed at NLP

Preliminary Study of Mixed Reality Interfaces for Collaborative Robot Programming of a Manufacturing Assembly Task Board

March 9, 2024
Author(s)
Medhavi Kamran, Snehesh Shrestha, Arnav Juneja, Shelly Bagchi, Jeremy Marvel, Megan Zimmerman, Vinh Nguyen
Collaborative robot tasks in manufacturing often involve manually placing and recording the robot in various positions throughout the intended task. However, existing methods for programming robot have been shown to cause physical strain and confusion for

NIST Phish Scale User Guide

November 15, 2023
Author(s)
Shanee Dawkins, Jody Jacobs
The phishing cyber threat exploits vulnerabilities in the U.S. and around the world across private and public sectors. Embedded phishing awareness training programs, where simulated phishing emails are sent to employees, are designed to prepare employees

Can you Spot a Phish?

September 26, 2023
Author(s)
Jody Jacobs, Shanee Dawkins
This talk will cover findings from over 4 years of NIST phishing training data, highlighting user context as the key to phishing susceptibility. We will discuss the NIST Phish Scale, our research on why users click, and how it can help users spot a phish.

Phishing for User Context: Understanding the NIST Phish Scale

August 23, 2023
Author(s)
Shanee Dawkins, Jody Jacobs
The NIST Phish Scale is a method for measuring human phishing detection difficulty, providing a metric – a phishing email detection difficulty rating – for phishing training implementers to gain a better understanding of the variability in click rates

How to Scale a Phish: An Investigation into the Use of the NIST Phish Scale

August 7, 2023
Author(s)
Shanee Dawkins, Jody Jacobs
Organizations around the world are using the NIST Phish Scale (NPS) in their phishing awareness training programs. As a new metric for measuring human phish-ing detection difficulty of phishing emails, the use of the NPS by phishing training implementers

Peering into the Phish Bowl: An Analysis of Real-World Phishing Cues

August 7, 2023
Author(s)
Lorenzo Neil, Shanee Dawkins, Jody Jacobs, Julia Sharp
Organizations use simulated phishing awareness train-ing exercises to help users identify, detect, and defend against the ever-changing phishing threat landscape. Realistic phishing emails are used to test users' ability to spot a phish from visible cues

Cybersecurity Definitions for Non-Experts

August 6, 2023
Author(s)
Lorenzo Neil, Julie Haney, Kerrianne Buchanan, Charlotte Healy
Despite the importance of cybersecurity, there is no standard definition nor common terminology for explaining cybersecurity. Existing definitions largely target academics or technical experts but not non-experts (those without cybersecurity proficiency)
Displaying 1 - 25 of 137