Heather Lipford

Orcid: 0000-0002-5261-0148

Affiliations:
  • University of North Carolina at Charlotte, Charlotte, NC, USA


According to our database1, Heather Lipford authored at least 104 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Exploring privacy implications of awareness and control mechanisms in smart home devices.
Proc. Priv. Enhancing Technol., January, 2023

Preliminary Results from a U.S. Demographic Analysis of SMiSh Susceptibility.
CoRR, 2023

A comparison of machine learning surrogate models of street-scale flooding in Norfolk, Virginia.
CoRR, 2023

Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

A Digital Twin to Link Flood Models, Sensors, and Earth Observations for Coastal Resilience in Hampton Roads, Virginia, U.S.A.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?
Proc. ACM Hum. Comput. Interact., 2022

Evaluating Students' Perceptions of Online Learning with 2-D Virtual Spaces.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Digitally Twinning Coastal Resilience Via Multsensor Imagery, in Situ Sensors, and Geospatial Analysis.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

Mi Casa es Su Casa ("MiSu"): A Mobile App for Sharing Smart Home Devices with People Outside The Home.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022

CO-oPS: A Mobile App for Community Oversight of Privacy and Security.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022

Privacy and the Internet of Things.
Modern Socio-Technical Perspectives on Privacy, 2022

Introduction and Overview.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving.
Proc. ACM Hum. Comput. Interact., 2021

Effects of Privacy Notification Style and Frequency on Phone Usage.
J. Comput. Inf. Syst., 2021

Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

2020
Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities.
Proc. ACM Hum. Comput. Interact., 2020

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Smart Home Beyond the Home: A Case for Community-Based Access Control.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool.
IEEE Trans. Software Eng., 2019

Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together.
Proc. ACM Hum. Comput. Interact., 2019

Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Motivating Students Beyond Course Requirements with a Serious Game.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

An Exploration on Sharing Smart Home Devices Beyond the Home.
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019

Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

2018
Automated Detecting and Repair of Cross-Site Scripting Vulnerabilities.
CoRR, 2018

Using Unit Testing to Detect Sanitization Flaws.
CoRR, 2018

Developing Soft Skills with a Classroom Behavior Management Game: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Evaluating Two Methods for Integrating Secure Programming Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Security During Application Development: an Application Security Expert Perspective.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Increasing User Attention with a Comic-based Policy.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Making privacy personal: Profiling social network users to inform privacy education and nudging.
Int. J. Hum. Comput. Stud., 2017

A Proposed Visualization for Vulnerability Scan Data.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Comparing Educational Approaches to Secure programming: Tool vs. TA.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Debunking Security-Usability Tradeoff Myths.
IEEE Secur. Priv., 2016

Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users.
Commun. Assoc. Inf. Syst., 2016

What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

A Body of Knowledge for Usable Security and Privacy Education (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Automatic web security unit testing: XSS vulnerability detection.
Proceedings of the 11th International Workshop on Automation of Software Test, 2016

2015
Mapping User Preference to Privacy Default Settings.
ACM Trans. Comput. Hum. Interact., 2015

Facebook apps and tagging: The trade-off between personal privacy and engaging with friends.
J. Assoc. Inf. Sci. Technol., 2015

UNC Charlotte HCI/InDe lab.
Interactions, 2015

A study of interactive code annotation for access control vulnerabilities.
Proceedings of the 2015 IEEE Symposium on Visual Languages and Human-Centric Computing, 2015

Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Flipped Classroom Strategies for CS Education.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

POSTER: Using Unit Testing to Detect Sanitization Flaws.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Usable Security: History, Themes, and Challenges
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02343-9, 2014

Exploring the Usability of Open Source Network Forensic Tools.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

SIW 2014: First Workshop on Security Information Workers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Interactive Code Annotation for Security Vulnerability Detection.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

2013
Interactive support for secure programming education.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
+Your circles: sharing behavior on Google+.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Someone to watch over me.
Proceedings of the New Security Paradigms Workshop, 2012

Reconciling privacy with social media.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012

Evaluating interactive support for secure programming.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Fighting for my space: coping mechanisms for sns boundary regulation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Why do programmers make security errors?
Proceedings of the 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, 2011

Snag'em: Creating Community Connections through Games.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Idea: Interactive Support for Secure Software Development.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Participatory sensing for community building.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

A New Social Order: Mechanisms for Social Network Site Boundary Regulation.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Technology Overload: Gender-based Perceptions of Knowledge Worker Performance.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

ASIDE: IDE support for web application security.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
The impact of social navigation on privacy policy configuration.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Helping users recall their reasoning process.
Proceedings of the 5th IEEE Conference on Visual Analytics Science and Technology, 2010

Users' (mis)conceptions of social applications.
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010

Visual vs. compact: a comparison of privacy policy interfaces.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Moving beyond untagging: photo privacy in a tagged world.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Recovering Reasoning Processes from User Interactions.
IEEE Computer Graphics and Applications, 2009

Social applications: exploring a more secure framework.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Configuring audience-oriented privacy policies.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Grounding geovisualization interface design: a study of interactive map use.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Tagged photos: concerns, perceptions, and protections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Reviewing Meetings in TeamSpace.
Hum. Comput. Interact., 2008

Understanding Privacy Settings in Facebook with an Audience View.
Proceedings of the Usability, Psychology, and Security, 2008

Evaluating the relationship between user interaction and financial visual analysis.
Proceedings of the 3rd IEEE Symposium on Visual Analytics Science and Technology, 2008

Charting new ground: modeling user behavior in interactive geovisualization.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

Game2Learn: improving the motivation of CS1 students.
Proceedings of the 3rd International Conference on Game Development in Computer Science Education, 2008

Strategies and struggles with privacy in an online social networking community.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

The HCI lab at UNC Charlotte.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

2007
Examining privacy and disclosure in a social networking community.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Game2Learn: building CS1 learning games for retention.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

2006
Incorporating Multimedia Source Materials into a Traceability Framework.
Proceedings of the 2006 First International Workshop on Multimedia Requirements Engineering, 2006

2005
Towards a Smarter Meeting Record-Capture and Access of Meetings Revisited.
Multim. Tools Appl., 2005

An empirical investigation of capture and access for software requirements activities.
Proceedings of the Graphics Interface 2005 Conference, 2005

Indexing unstructured activities with peripheral cues.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Tagging Knowledge Acquisition Sessions To Facilitate Knowledge Traceability.
Int. J. Softw. Eng. Knowl. Eng., 2004

Devices for sharing thoughts and affection at a distance.
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004

2003
Making multimedia meeting records more meaningful.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Understanding meeting capture and access.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

2001
Enabling Inter-Company Team Collaboration.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Integrating Meeting Capture within a Collaborative Team Environment.
Proceedings of the Ubicomp 2001: Ubiquitous Computing, 2001

A team collaboration space supporting capture and access of virtual meetings.
Proceedings of GROUP 2001, ACM 2001 International Conference on Supporting Group Work, September 30, 2001

2000
A Proposed Curriculum for an Undergraduate Software Engineering Degree.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000

1997
Formalizing and Integrating the Dynamic Model within OMT.
Proceedings of the Pulling Together, 1997


  Loading...