Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 201 - 223 of 223

Voices of First Responders – Examining Public Safety Communication Problems and Requested Functionality: Findings from User-Centered Interviews, Phase 1, Volume 2

March 28, 2019
Author(s)
Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Kristen Greene, Susanne M. Furman, Michelle P. Steves, Sandra S. Prettyman
The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first

Case Study - Exploring Children's Password Knowledge and Practices

February 23, 2019
Author(s)
Yee-Yin Choong, Mary Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous

Public Safety Communication User Needs: Voices of First Responders

September 25, 2018
Author(s)
Shanee T. Dawkins, Kristen Greene, Michelle P. Steves, Mary F. Theofanos, Yee-Yin Choong, Susanne M. Furman, Sandra S. Prettyman
The public safety community is transitioning from land mobile radios to a communications technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communications technology relies on efficient

Voices of First Responders - Identifying Public Safety Communication Problems: Findings from User-Centered Interviews, Phase 1, Volume 1

July 31, 2018
Author(s)
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband data sharing platforms. Successful deployment and adoption of new communication technology relies

User Context: An Explanatory Variable in Phishing Susceptibility

July 15, 2018
Author(s)
Kristen K. Greene, Michelle P. Steves, Mary Theofanos, Jennifer A. Kostick
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training

No Phishing beyond This Point

June 27, 2018
Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos
As phishing continues to evolve, what is your organization doing to stay off the hook?

Towards Developing Standardized Usability Evaluation Methodology for Public Safety Communications Technology: A User-Centered Approach

June 14, 2018
Author(s)
Kristen Greene, Shanee T. Dawkins, Yee-Yin Choong, Mary F. Theofanos, Sandra S. Prettyman, Susanne M. Furman, Michelle P. Steves
In public safety and homeland security, it is critical to understand technology users’ primary goals, the characteristics of the users, and the context in which they are operating. New and emerging technologies present opportunities and challenges for

Organizational Practices in Cryptographic Development and Testing

October 9, 2017
Author(s)
Julie Haney, Simson L. Garfinkel, Mary Theofanos
Organizations developing cryptographic products face significant challenges, including usability and human factors, that may result in decreased security, increased development time, and missed opportunities to use the technology to its fullest potential