An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jody Jacobs, Julie Haney, Susanne M. Furman, Fernando Barrientos
Organizational security awareness programs are often underfunded and rely on part-time security awareness professionals who may lack sufficient background, skills, or resources necessary to manage an effective and engaging program. U.S. government
Although new technology may benefit rural first responders to help them serve their communities, to date little is known about what communication technology problems rural first responders most need addressed and what future technology they desire. To
Kerrianne Buchanan, Shanee Dawkins, Yee-Yin Choong, Mary Frances Theofanos, Kristen K. Greene, Susanne M. Furman, Sandra Spickard-Prettyman
With advances in network technologies, there has been increasing interest in developing new communication technology for first responders that utilizes wireless broadband networks. In order to develop new communication technology, user requirements are
In the fall of 2019, the National Institute of Standards and Technology (NIST) funded three studies to better understand equity and inclusivity. This report is a comprehensive integration and summary of the sequential, exploratory mixed methods study
Cybersecurity advocates motivate individuals and organizations to adopt positive security behaviors. Based on our research, we describe qualities of successful advocates. Our findings have practical implications for expanding the cybersecurity workforce by
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential compromise of information security for both the individual and their organization. These
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen K. Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a broader spectrum of communication technologies for use on the newly created Nationwide Public Safety
Melissa Taylor, Brett Bishop, Ted Burkes, Michael Caligiuri, Bryan Found, Carolyne Bird, Wesley Grose, Lauren Logan, Kenneth Melson, Mara Merlino, Larry Miller, Linton Mohammed, Jonathan Morris, John Paul Osborn, Nikola Osborne, Brent Ostrum, Christopher Saunders, Scott Shappell, H. David Sheets, Sargur Srihari, Reinoud Stoel, Thomas Vastrick, Heather Waltke, Emily Will
For some 6,000 years, humans have made an indelible mark on history through the loops, strokes, and other characters that constitute the written form of language - handwriting. The study of handwriting is also an important part of forensic science. By
Purpose: Cybersecurity advocates attempt to reduce exposure to cyber attacks by promoting security best practices and encouraging security adoption. However, little is known about the skills necessary for success in this role. To fill this gap, our study
While the threats may appear to be vastly different, further investigation reveals that the cybersecurity community can learn much from the COVID-19 response.
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty – key to understanding variability in phishing click rates.
WITHDRAWN January 4, 2023 The artificial intelligence (AI) revolution is upon us, with the promise of advances such as driverless cars, smart buildings, automated health diagnostics and improved security monitoring. Many current efforts are aimed to