SOURCES SOUGHT
R -- Usability and Security
- Notice Date
- 7/9/2009
- Notice Type
- Sources Sought
- NAICS
- 541512
— Computer Systems Design Services
- Contracting Office
- Department of Commerce, National Institute of Standards and Technology (NIST), Acquisition Management Division, 100 Bureau Drive, Building 301, Room B129, Mail Stop 1640, Gaithersburg, Maryland, 20899-1640
- ZIP Code
- 20899-1640
- Solicitation Number
- NIST_SS_69155
- Archive Date
- 7/29/2009
- Point of Contact
- Jennifer Lohmeier, Phone: 301-975-8173, Mario A. Checchia, Phone: 301-975-8407
- E-Mail Address
-
jennifer.lohmeier@nist.gov, mario.checchia@nist.gov
(jennifer.lohmeier@nist.gov, mario.checchia@nist.gov)
- Small Business Set-Aside
- N/A
- Description
- This sources sought notice is issued for information and planning purposes only. The Government is soliciting information to determine the availability of all socioeconomic small business groups capable to perform the requirement indicated below. The draft Statement of Work is as follows: The purpose of this contract is to build a repository of literature published in cognitive psychology, behavioral science, and human factors publications, journals, and conference proceedings of factors affecting people's adoption or resistance to new technologies (not necessarily cyber security or multi-factor authentication). The initial search shall start broadly in the psychology literature and then extend to the technology and computer security literature and focus in on the specific application of cyber-security and multi-factor authentication. From this collection the contractor shall consolidate, summarize, and identify the behavioral/psychological factors that prevent the adoption/understanding of new technology in general and computer security/cyber-security mechanisms and multi-factor authentication more specifically. The Contractor shall perform a thorough search of research literature in the areas of cognitive psychology, behavioral science, human factors/human computer interaction and other areas as applicable to identify relevant factors that influence adoption of new technologies with the goal of identifying factors that prevent or encourage the adoption of computer security mechanisms including multi-factor authentication. The output of the work shall be a written report describing the journals and proceedings examined and the reviews of the applicable papers. The Contractor shall provide all labor, materials, equipment, project oversight, administration and technical execution of this contract. The Contractor is responsible for maintaining accurate records of project activities. The Contractor shall 1.Identify research publications to be searched in the areas enumerated in the scope of work. 2.Find relevant papers. 3.Write extended abstracts and reviews. 4.Submit final report. The COTR shall provide the Contractor with a detailed schedule including all deadlines. This schedule shall be given to Contractor at the beginning of performance. Contractor shall prepare and submit an activity report. The Contractor shall provide to the Government the following deliverables and reports in accordance with the following schedule. All deliverables shall be submitted in MS Word. 1.Identify research publications to be searched and provide list to COTR via email. Visit COTR to discuss and refine list. Final list and visit shall be due within four weeks after purchase order award. 2.Find relevant papers and email list to COTR. This shall be due within 8 weeks of purchase order award. 3.Write reviews and email to COTR. Visit COTR to discuss and refine reviews. This shall be due within 15 weeks of the purchase order award. 4.Write final report containing refined reviews and identification of any factors influencing adoption and email to COTR to complete the contract. This shall be due within 20 weeks of the purchase order award. Task 1: Identify research publications to be searched Desired Output: List of publications Performance Standard: Identified at least 10 publications (covers fields described in the Scope of Work) and accurate (publications are research publications) Monitoring Method: List reviewed by COTR Task 2: Find relevant papers Desired Output: List of papers Performance Standard: Identified at least 20 papers (covers fields described in the Scope of Work) and relevant (contain factors which influence adoption of technology) Monitoring Method: List reviewed by COTR Task 3: Write reviews Desired Output: Report containing written reviews of the relevant research publications and papers Performance Standard: Reviews are written in accordance with style guides used by the IT and business community, are concise and relevant (mention the factors influencing adoption and how they might apply to cyber-security and/or multi-factor authentication) Monitoring Method: Report reviewed by COTR Task 4: Submit final report Desired Output: Final Report containing written reviews and summary of which publications were searched and list of factors influencing adoption of technology. Performance Standard: Final written in accordance with style guides used by the IT and business community, contains feedback from COTR after 2nd visit to NIST Monitoring Method: Report reviewed by COTR Contractor Qualifications: The Contractor shall have at least 20 years experience in human computer interaction, usability and human factors, in user-centered design, task analysis, user modeling, and usability evaluation. The contractor shall also have at least 15 years of experience interpreting research papers, be knowledgeable with and have applied usability research and guidelines to system designs. The contractor shall have a background in the social sciences. This sources sought notice should not be construed as a commitment or authorization to incur costs in anticipation of such procurement. NIST is seeking responses from all responsible small businesses. Small businesses are defined under the associated NAICS code for this effort, 541512, with a size standard of $25 Million. Please include your company’s size classification in any response to this notice. Interested parties are requested to provide information on their ability to satisfy any or all of the requirements outlined above. At a minimum, responses should include company name and address, size of business, point of contact (including telephone number, facsimile number and e-mail address), and a list of contracts within the past five (5) years under which the interested party has performed the same or similar work. No telephone requests will be honored. Contractors must be registered in the Central Contractor Registration (CCR), accessed via the Internet at http://www.ccr.gov. All information provided will become property of the National Institute of Standards and Technology (NIST) and will not be returned. Responses are requested by July 14, 2009 and should include a point of contact, phone number, fax number and email address. Interested parties capable of performing this requirement should send email to Jennifer Lohmeier at Jennifer.lohmeier@nist.gov.
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/DOC/NIST/AcAsD/NIST_SS_69155/listing.html)
- Record
- SN01870779-W 20090711/090710000605-6f9b9b1db7422240ac13f02cc4d39b0f (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |