Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Usable Cybersecurity

Research Publications & Presentations

Topics:


Legend: Papers paper icon   Presentations presentation icon   Videos video icon    Research Posters poster icon

Authentication 

Authentication Diary Study

Report: Authentication Diary Study paper icon – Michelle P. Steves & Mary F. Theofanos. NISTIR 7983 (2014)


Digital Identity Guidelines

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements paper icon – Paul Grassi, James Fenton, Naomi Lefkovitz, Jamie Danker, Yee-Yin Choong, Kristen Greene, & Mary Theofanos. SP 800-63A (2017)

Digital Identity Guidelines: Authentication and Lifecycle Management paper icon – Paul Grassi, Elaine Newton, Ray Perliner, Andrew Regenscheid, James Fenton, William Burr, Justin Richter, Naomi Lefkovitz, Jamie Danker, Yee-Yin Choong, Kristen Greene, & Mary Theofanos. SP 800-63B (2017)

Digital Identity Guidelines: Federation and Assertions paper icon – Paul Grassi, Ellen Nadeau, Justin Richer, Sarah Squire, James Fenton, Naomi Lefkovitz, Jamie Danker, Yee-Yin Choong, Kristen Greene, & Mary Theofanos. SP 800-63C (2017)


Memory and Motor

Memory and Motor Processes of Password Entry Error paper icon - Frank Tamborello & Kristen Greene. Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2016)

Password Entry Errors: Memory or Motor?  report icon - Kristen Greene & Frank Tamborello. Proceedings of the 13th International Conference on Cognitive Modeling (2015)

ACT-R Modeling of Password Entry Errors poster icon - Kristen Greene & Franklin Tamborello. Proceedings of the 24th Conference on Behavior Representation in Modeling and Simulation (2015)

Electrodermal Activity and Eye Movements Inform the Usability of Passwords poster icon - Jennifer R. Bergstrom, Kristen Greene, David C. Hawkins, & Christian Gonzalez. Proceedings of the 44th Annual Meeting of the Society for Neuroscience (2014)


Mobile Authentication

Usability and Security Considerations for Public Safety Mobile Authentication paper icon - Yee-Yin Choong, Joshua M. Franklin, & Kristen Greene. NISTIR 8080 (2016)

Measuring the Usability and Security of Permuted Passwords on Mobile Platforms paper icon - Kristen Greene, John M. Kelsey, & Joshua M. Franklin. NISTIR 8040 (2016)

Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry paper icon video icon - Kristen Greene, Joshua M. Franklin, & John M. Kelsey. Proceedings of ShmooCon (2015)

I Can't Type That! P@$$w0rd Entry on Mobile Devices paper icon - Kristen Greene, Melissa A. Gallagher, Brian C. Stanton, & Paul Y. Lee. Proceedings of HCI International (2014)


Multi-factor Authentication

Usability of PIV Smartcards for Logical Access paper icon - Mary F. Theofanos, Emile L. Morse, Hannah Wald, Yee-Yin Choong, Celeste Paul, & Aiping L. Zhang. NISTIR 7867 (2012)

A Field Study of User Behavior and Perception in Smartcard Authentication paper icon  - Emile L. Morse, Celeste L. Paul, Aiping L. Zhang, Yee-Yin Choong, & Mary F. Theofanos. Proceedings of the 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT) (2011)

PIV Pilot Usability Lessons Learned presentation icon – Mary Theofanos (Nov 8, 2010)


Password Creation and Use

Must I, can I? I don’t understand your ambiguous password rules paper icon  – Kristen K. Greene & Yee-Yin Choong. Information and Computer Security (2017)

Secure and Usable Enterprise Authentication: Lessons from the Field paper icon - Mary F. Theofanos, Simson L. Garfinkel, & Yee-Yin Choong. IEEE Security & Privacy (2016)

What's a Special Character Anyway? Effects of Ambiguous Terminology in Password Rules paper icon  - Yee-Yin Choong & Kristen Greene. Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2016)

Password Usability presentation icon - Yee-Yin Choong (Oct 23, 2015)

Employee Password Usability Study presentation icon - Yee-Yin Choong (Sep 10, 2015)

What 4,500+ people can tell you – Employees' Attitudes toward Organizational Password Policy Do Matter paper icon  - Yee-Yin Choong & Mary F. Theofanos. Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust (2015)

Effects of Password Permutation on Subjective Usability Across Platforms paper icon  - Kristen Greene. Proceedings of HCI International (2015)

Human Generated Passwords - The Impacts of Password Requirements and Presentation Styles paper icon  - Paul Y. Lee & Yee-Yin Choong. Proceedings of HCI International (2015)

The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords paper icon  - Cathryn A. Ploehn & Kristen Greene Proceedings of HCI International (2015)

Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords paper icon - Jennifer R. Bergstrom, Stefan A. Frisch, David C. Hawkins, Joy Hackenbracht, Kristen Greene, Mary F. Theofanos, & Brian Griepentrog. Proceedings of the 6th International Conference on Cross-Cultural Design (2014)

United States Federal Employees' Password Management Behaviors paper icon  – A Department of Commerce Case Study - Yee-Yin Choong, Mary F. Theofanos, & Hung-Kung Liu. NISTIR 7991 (2014)

Character Strings, Memory and Passwords: What a Recall Study Can Tell Us paper icon  - Brian C. Stanton & Kristen K. Greene. Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) (2014)

A Cognitive-Behavioral Framework of User Password Management Lifecycle paper icon  – Yee-Yin Choong. Proceedings of HCI International (2014)


Password Policy Analysis

Password Policy Languages: Usable Translation from the Informal to the Formal paper icon – Michelle Steves, Mary Theofanos, Celia Paulsen, & Athos Ribeiro. Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015)

Clear, Unambiguous Password Policies: An Oxymoron? paper icon  – Michelle Steves, Kevin Killourhy, & Mary F. Theofanos Proceedings of the 6th International Conference on Cross-Cultural Design (2014)

Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language paper icon - Kevin Killourhy, Yee-Yin Choong, & Mary Theofanos. NISTIR 7970 (2013)

Usability Research in Support Of Cyber-Security: A Password Policy Taxonomy presentation icon – Kevin Killourhy (May 7, 2008)


Youth Passwords

Case Study – Exploring Children’s Password Knowledge and Practices paper icon - Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, & Suzanne Prior. Proceedings of the Workshop on Usable Security (USEC) at the Network and Distributed Systems Security (NDSS) Symposium (2019)

 

Cryptography

Organizational Cryptographic Product Development

Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs paper icon  – Julie Haney, Mary Theofanos, Yasemin Acar, & Sandra S. Prettyman. NISTIR 8241 (2018)

"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products paper icon  - Julie M. Haney,  Mary F. Theofanos, Yasemin Acar & Sandra S. Prettyman. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2018). 

Organizational Practices in Cryptographic Development and Testing paper icon  - Julie M. Haney, Simson L. Garfinkel, & Mary F. Theofanos. Proceedings of the IEEE Conference on Communications and Network Security (CNS) (2017). 


Usable Key Management

Usability and Key Management presentation icon – Mary Theofanos (Jun 8, 2009)

 

Cybersecurity Adoption

Security Awareness in Action: A Case Study [extended abstract] paper icon- Julie M. Haney & Wayne G. Lutters. 5th Workshop on Security Information Workers (WSIW) at the Symposium on Usable Privacy and Security (SOUPS) (2019).

Motivating Cybersecurity Advocates: Implications for Recruitment and Retention paper icon - Julie M. Haney & Wayne G. Lutters.  ACM SIGMIS Computers & Personnel Research (2019)

"It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security [presentation] presentation icon - Julie Haney. Presented at FISSEA Conference (June 27, 2019)

 

Internet of Things

Human Factors in Smart Home Technologies Workshop Summary Report paper icon - Susanne Furman & Julie Haney. (2019)
 
Consumer Perceptions of Smart Home Privacy and Security presentation icon - Julie Haney, Susanne Furman, & Yasemin Acar. Presented at the NIST Human Factors in Smart Home Technologies Workshop (September 24, 2019)
 

Perceptions of Smart Home Privacy and Security Responsibility, Concerns, and Mitigations paper icon- Julie Haney, Susanne Furman, Yasemin Acar, & Mary Theofanos. Extended abstract from poster presented at Symposium on Usable Privacy and Security (SOUPS) (2019).

 

Methodologies

The Power of Qualitative Methods: Aha Moments in Exploring Cybersecurity and Trust paper icon  - Brian C. Stanton, Mary F. Theofanos, Susanne M. Furman, & Sandra S. Prettyman. User Experience Magazine (2016)

 

Phishing

Phishing Behaviors

No Phishing Beyond This Point paper icon  - Kristen Greene, Michelle Steves, & Mary Theofanos. IEEE Computer (2018)

You've Been Phished video icon (2018)

ISPAB presentation - User Context: An Explanatory Variable in Phishing Susceptibility presentation icon- Kristen Greene, Michelle Steves, & Mary Theofanos. (June 21, 2018)

User Context: An Explanatory Variable in Phishing Susceptibility paper icon  – Kristen K. Greene, Michelle P. Steves, Mary F. Theofanos, & Jennifer Kostick. Proceedings of the Workshop on Usable Security (USEC) at the Network and Distributed Systems Security (NDSS) Symposium (2018)


Phishing Models

A Phish Scale: Rating Human Phishing Message Detection Difficulty paper icon - Michelle P. Steves, Kristen K. Greene, & Mary F. Theofanos. Proceedings of the Workshop on Usable Security (USEC) at the Network and Distributed Systems Security (NDSS) Symposium (2019)

Exploratory Lens Model of Decision-Making in Potential Phishing Attack Scenario paper icon - Franklin Tamborello & Kristen Greene. NISTIR 8194 (2017)

 

Privacy

Differential Privacy video icon (2018)

Non-breach Privacy Events paper icon - Simson L Garfinkel & Mary Theofanos. IEEE Security & Privacy (2018)

Preserving Privacy – More Than Reading a Message paper icon - Susanne M. Furman & Mary F. Theofanos. Proceedings of the International Conference on Universal Access in Human-Computer Interaction (2014)

 

Usable Security (general)

Shouldn't All Security Be Usable? paper icon  - Mary Frances Theofanos & Shari Lawrence Pfleeger. IEEE Security & Privacy (2011)

ISPAB Panel on Usable Security presentation icon – Mary Theofanos & Ellen Kowalczyk (Oct 29, 2010)

Usability Research in Support of Cybersecurity presentation icon – Mary Theofanos (May 7, 2008)

Poor Usability: The Inherent Insider Threat presentation icon  – Mary Theofanos (Mar 21, 2008)

 

User Perceptions & Behaviors

Be Prepared: How US Government Experts Think About Cybersecurity paper icon  - Mary F. Theofanos, Brian C. Stanton, Sandra S. Prettyman, Susanne M. Furman, & Simson L. Garfinkel. Proceedings of the Workshop on Usable Security (USEC) at the Network and Distributed Systems Security (NDSS) Symposium (2017)

Security Fatigue paper icon  - Brian C. Stanton, Sandra S. Prettyman, Mary F. Theofanos, & Susanne M. Furman. IT Professional (2016)

Cybersecurity Fatigue video icon (2016)

Privacy and Security in the Brave New World: The Use of Multiple Mental Models paper icon  - Susanne M. Furman, Mary F. Theofanos, Brian C. Stanton, & Sandra S. Prettyman. Proceedings of HCI International (2015)

Basing Cybersecurity Training on User Perceptions paper icon  - Susanne M. Furman, Mary Frances Theofanos, Yee-Yin Choong, & Brian Stanton. IEEE Security & Privacy (2012)

Created November 17, 2016, Updated November 12, 2019