Heather Lipford

According to our database1, Heather Lipford authored at least 77 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Motivating Students Beyond Course Requirements with a Serious Game.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

An Exploration on Sharing Smart Home Devices Beyond the Home.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019

2018
Developing Soft Skills with a Classroom Behavior Management Game: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Evaluating Two Methods for Integrating Secure Programming Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Security During Application Development: an Application Security Expert Perspective.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Increasing User Attention with a Comic-based Policy.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Making privacy personal: Profiling social network users to inform privacy education and nudging.
Int. J. Hum.-Comput. Stud., 2017

A Proposed Visualization for Vulnerability Scan Data.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Comparing Educational Approaches to Secure programming: Tool vs. TA.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Debunking Security-Usability Tradeoff Myths.
IEEE Security & Privacy, 2016

Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users.
CAIS, 2016

What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

A Body of Knowledge for Usable Security and Privacy Education (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, Memphis, TN, USA, March 02, 2016

Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Automatic web security unit testing: XSS vulnerability detection.
Proceedings of the 11th International Workshop on Automation of Software Test, 2016

2015
Mapping User Preference to Privacy Default Settings.
ACM Trans. Comput.-Hum. Interact., 2015

Facebook apps and tagging: The trade-off between personal privacy and engaging with friends.
JASIST, 2015

UNC Charlotte HCI/InDe lab.
Interactions, 2015

A study of interactive code annotation for access control vulnerabilities.
Proceedings of the 2015 IEEE Symposium on Visual Languages and Human-Centric Computing, 2015

Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Flipped Classroom Strategies for CS Education.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

POSTER: Using Unit Testing to Detect Sanitization Flaws.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Usable Security: History, Themes, and Challenges
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2014

Exploring the Usability of Open Source Network Forensic Tools.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

SIW 2014: First Workshop on Security Information Workers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Interactive Code Annotation for Security Vulnerability Detection.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

2013
Interactive support for secure programming education.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
+Your circles: sharing behavior on Google+.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Someone to watch over me.
Proceedings of the New Security Paradigms Workshop, 2012

Reconciling privacy with social media.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

Evaluating interactive support for secure programming.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Fighting for my space: coping mechanisms for sns boundary regulation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Why do programmers make security errors?
Proceedings of the 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, 2011

Snag'em: Creating Community Connections through Games.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Idea: Interactive Support for Secure Software Development.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Participatory sensing for community building.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

A New Social Order: Mechanisms for Social Network Site Boundary Regulation.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Technology Overload: Gender-based Perceptions of Knowledge Worker Performance.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

ASIDE: IDE support for web application security.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
The impact of social navigation on privacy policy configuration.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Helping users recall their reasoning process.
Proceedings of the IEEE Conference on Visual Analytics Science and Technology, 2010

Users' (mis)conceptions of social applications.
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010

Visual vs. compact: a comparison of privacy policy interfaces.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Moving beyond untagging: photo privacy in a tagged world.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Recovering Reasoning Processes from User Interactions.
IEEE Computer Graphics and Applications, 2009

Social applications: exploring a more secure framework.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Configuring audience-oriented privacy policies.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Grounding geovisualization interface design: a study of interactive map use.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Tagged photos: concerns, perceptions, and protections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Reviewing Meetings in TeamSpace.
Human-Computer Interaction, 2008

Understanding Privacy Settings in Facebook with an Audience View.
Proceedings of the Usability, Psychology, and Security, 2008

Evaluating the relationship between user interaction and financial visual analysis.
Proceedings of the IEEE Symposium on Visual Analytics Science and Technology, 2008

Charting new ground: modeling user behavior in interactive geovisualization.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Game2Learn: improving the motivation of CS1 students.
Proceedings of the 3rd International Conference on Game Development in Computer Science Education, 2008

Strategies and struggles with privacy in an online social networking community.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

The HCI lab at UNC Charlotte.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

2007
Examining privacy and disclosure in a social networking community.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Game2Learn: building CS1 learning games for retention.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

2006
Incorporating Multimedia Source Materials into a Traceability Framework.
Proceedings of the 2006 First International Workshop on Multimedia Requirements Engineering, 2006

2005
Towards a Smarter Meeting Record-Capture and Access of Meetings Revisited.
Multimedia Tools Appl., 2005

An empirical investigation of capture and access for software requirements activities.
Proceedings of the Graphics Interface 2005 Conference, 2005

Indexing unstructured activities with peripheral cues.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Devices for sharing thoughts and affection at a distance.
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004

2003
Tagging Knowledge Acquisition Sessions to Facilitate Knowledge Traceability.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

Making multimedia meeting records more meaningful.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Understanding meeting capture and access.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

2001
Enabling Inter-Company Team Collaboration.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Integrating Meeting Capture within a Collaborative Team Environment.
Proceedings of the Ubicomp 2001: Ubiquitous Computing, 2001

A team collaboration space supporting capture and access of virtual meetings.
Proceedings of GROUP 2001, ACM 2001 International Conference on Supporting Group Work, September 30, 2001

2000
A Proposed Curriculum for an Undergraduate Software Engineering Degree.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000

1997
Formalizing and Integrating the Dynamic Model within OMT.
Proceedings of the Pulling Together, 1997


  Loading...