Heather Lipford
Heather Richter Lipford – Heather Richter – Heather A. Richter
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c63]Madiha Tabassum, Abdulmajeed Alqhatani, Marran Aldossari, Heather Richter Lipford:
Increasing User Attention with a Comic-based Policy. CHI 2018: 200 - [c62]Tyler W. Thomas, Madiha Tabassum, Bill Chu, Heather Lipford:
Security During Application Development: an Application Security Expert Perspective. CHI 2018: 262 - [c61]Madiha Tabassum, Stacey Watson, Bill Chu, Heather Richter Lipford:
Evaluating Two Methods for Integrating Secure Programming Education. SIGCSE 2018: 390-395 - [c60]Stacey Watson, Julio César Bahamón, Harini Ramaprasad, Heather Richter Lipford:
Developing Soft Skills with a Classroom Behavior Management Game: (Abstract Only). SIGCSE 2018: 1092 - [e3]Mary Ellen Zurko, Heather Richter Lipford:
Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018 [contents] - [i4]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Using Unit Testing to Detect Sanitization Flaws. CoRR abs/1804.00753 (2018) - [i3]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic Web Security Unit Testing: XSS Vulnerability Detection. CoRR abs/1804.00754 (2018) - [i2]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. CoRR abs/1804.00755 (2018) - [i1]Mahmoud Mohammadi, Bei-Tseng Chu, Heather Richter Lipford:
Automated Detecting and Repair of Cross-Site Scripting Vulnerabilities. CoRR abs/1804.01862 (2018) - 2017
- [j10]Pamela J. Wisniewski, Bart P. Knijnenburg, Heather Richter Lipford:
Making privacy personal: Profiling social network users to inform privacy education and nudging. Int. J. Hum.-Comput. Stud. 98: 95-108 (2017) - [c59]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. QRS 2017: 364-373 - [c58]Madiha Tabassum, Stacey Watson, Heather Richter Lipford:
Comparing Educational Approaches to Secure programming: Tool vs. TA. SOUPS 2017 - [c57]Stacey Watson, Heather Richter Lipford:
A Proposed Visualization for Vulnerability Scan Data. SOUPS 2017 - 2016
- [j9]Pamela J. Wisniewski, A. K. M. Najmul Islam, Heather Richter Lipford, David C. Wilson:
Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users. CAIS 38: 10 (2016) - [j8]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Security & Privacy 14(5): 33-39 (2016) - [c56]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic web security unit testing: XSS vulnerability detection. AST@ICSE 2016: 78-84 - [c55]Jun Zhu, Bill Chu, Heather Richter Lipford:
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. SACMAT 2016: 73-80 - [c54]Yousra Javed, Heather Richter Lipford:
A Body of Knowledge for Usable Security and Privacy Education (Abstract Only). SIGCSE 2016: 494-495 - [c53]Tyler Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson R. Murphy-Hill:
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool. WSIW@SOUPS 2016 - 2015
- [j7]Celine Latulipe, Heather Richter Lipford, Mary Lou Maher, David C. Wilson:
UNC Charlotte HCI/InDe lab. Interactions 22(6): 16-19 (2015) - [j6]Pamela J. Wisniewski, Heng Xu, Heather Richter Lipford, Emmanuel Bello-Ogunu:
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. JASIST 66(9): 1883-1896 (2015) - [j5]Jason Watson, Heather Richter Lipford, Andrew Besmer:
Mapping User Preference to Privacy Default Settings. ACM Trans. Comput.-Hum. Interact. 22(6): 32:1-32:20 (2015) - [c52]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
POSTER: Using Unit Testing to Detect Sanitization Flaws. ACM Conference on Computer and Communications Security 2015: 1659-1661 - [c51]Jun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas:
Mitigating Access Control Vulnerabilities through Interactive Static Analysis. SACMAT 2015: 199-209 - [c50]Michael Whitney, Heather Richter Lipford, Bill Chu, Jun Zhu:
Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course. SIGCSE 2015: 60-65 - [c49]Mary Lou Maher, Celine Latulipe, Heather Richter Lipford, Audrey Rorrer:
Flipped Classroom Strategies for CS Education. SIGCSE 2015: 218-223 - [c48]Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
Questions developers ask while diagnosing potential security vulnerabilities with static analysis. ESEC/SIGSOFT FSE 2015: 248-259 - [c47]Tyler Thomas, Bill Chu, Heather Richter Lipford, Justin Smith, Emerson R. Murphy-Hill:
A study of interactive code annotation for access control vulnerabilities. VL/HCC 2015: 73-77 - 2014
- [b1]Simson L. Garfinkel, Heather Richter Lipford:
Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014 - [c46]Erik E. Northrop, Heather Richter Lipford:
Exploring the Usability of Open Source Network Forensic Tools. SIW@CCS 2014: 1-8 - [c45]Heather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill:
Interactive Code Annotation for Security Vulnerability Detection. SIW@CCS 2014: 17-22 - [c44]Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle:
SIW 2014: First Workshop on Security Information Workers. ACM Conference on Computer and Communications Security 2014: 1554 - [e2]Robert Biddle, Bill Chu, Emerson R. Murphy-Hill, Heather Richter Lipford:
Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3152-4 [contents] - 2013
- [c43]Jun Zhu, Heather Richter Lipford, Bill Chu:
Interactive support for secure programming education. SIGCSE 2013: 687-692 - 2012
- [c42]Pamela J. Wisniewski, Heather Richter Lipford, David C. Wilson:
Fighting for my space: coping mechanisms for sns boundary regulation. CHI 2012: 609-618 - [c41]Jing Xie, Heather Richter Lipford, Bei-tseng Chu:
Evaluating interactive support for secure programming. CHI 2012: 2707-2716 - [c40]Heather Richter Lipford, Pamela J. Wisniewski, Cliff Lampe, Lorraine G. Kisselburgh, Kelly Caine:
Reconciling privacy with social media. CSCW (Companion) 2012: 19-20 - [c39]
- [c38]Jason Watson, Andrew Besmer, Heather Richter Lipford:
+Your circles: sharing behavior on Google+. SOUPS 2012: 12 - 2011
- [c37]Jing Xie, Bill Chu, Heather Richter Lipford, John T. Melton:
ASIDE: IDE support for web application security. ACSAC 2011: 267-276 - [c36]Pamela Karr Wisniewski, Erin A. Carroll, Heather Richter Lipford:
Technology Overload: Gender-based Perceptions of Knowledge Worker Performance. AMCIS 2011 - [c35]Pamela Karr Wisniewski, David C. Wilson, Heather Richter Lipford:
A New Social Order: Mechanisms for Social Network Site Boundary Regulation. AMCIS 2011 - [c34]Michael Whitney, Heather Richter Lipford:
Participatory sensing for community building. CHI Extended Abstracts 2011: 1321-1326 - [c33]Jing Xie, Bill Chu, Heather Richter Lipford:
Idea: Interactive Support for Secure Software Development. ESSoS 2011: 248-255 - [c32]Eve Powell, Felesia Stukes, Tiffany Barnes, Heather Richter Lipford:
Snag'em: Creating Community Connections through Games. SocialCom/PASSAT 2011: 591-594 - [c31]Jing Xie, Heather Richter Lipford, Bill Chu:
Why do programmers make security errors? VL/HCC 2011: 161-164 - 2010
- [c30]Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, Robert W. Reeder:
Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010: 1111-1114 - [c29]Andrew Besmer, Heather Richter Lipford:
Moving beyond untagging: photo privacy in a tagged world. CHI 2010: 1563-1572 - [c28]Andrew Besmer, Heather Richter Lipford:
Users' (mis)conceptions of social applications. Graphics Interface 2010: 63-70 - [c27]Heather Richter Lipford, Felesia Stukes, Wenwen Dou, Matthew E. Hawkins, Remco Chang:
Helping users recall their reasoning process. IEEE VAST 2010: 187-194 - [c26]Andrew Besmer, Jason Watson, Heather Richter Lipford:
The impact of social navigation on privacy policy configuration. SOUPS 2010 - [e1]Tony Sager, Gail-Joon Ahn, Krishna Kant, Heather Richter Lipford:
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0093-3 [contents]
2000 – 2009
- 2009
- [j4]Wenwen Dou, Dong Hyun Jeong, Felesia Stukes, William Ribarsky, Heather Richter Lipford, Remco Chang:
Recovering Reasoning Processes from User Interactions. IEEE Computer Graphics and Applications 29(3): 52-61 (2009) - [c25]Pamela Karr Wisniewski, Okan Pala, Heather Richter Lipford, David C. Wilson:
Grounding geovisualization interface design: a study of interactive map use. CHI Extended Abstracts 2009: 3757-3762 - [c24]Andrew Besmer, Heather Richter Lipford:
Tagged photos: concerns, perceptions, and protections. CHI Extended Abstracts 2009: 4585-4590 - [c23]Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson:
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. CSE (4) 2009: 985-989 - [c22]Jason Watson, Michael Whitney, Heather Richter Lipford:
Configuring audience-oriented privacy policies. SafeConfig 2009: 71-78 - [c21]Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell P. Cheek:
Social applications: exploring a more secure framework. SOUPS 2009 - 2008
- [j3]Heather Richter Lipford, Gregory D. Abowd:
Reviewing Meetings in TeamSpace. Human-Computer Interaction 23(4): 406-432 (2008) - [c20]Katherine Strater, Heather Richter Lipford:
Strategies and struggles with privacy in an online social networking community. BCS HCI (1) 2008: 111-119 - [c19]
- [c18]Tiffany Barnes, Eve Powell, Amanda Chaffin, Heather Richter Lipford:
Game2Learn: improving the motivation of CS1 students. GDCSE 2008: 1-5 - [c17]David C. Wilson, Heather Richter Lipford, Erin A. Carroll, Pamela Karr, Nadia Najjar:
Charting new ground: modeling user behavior in interactive geovisualization. GIS 2008: 61 - [c16]Dong Hyun Jeong, Wenwen Dou, Heather Richter Lipford, Felesia Stukes, Remco Chang, William Ribarsky:
Evaluating the relationship between user interaction and financial visual analysis. IEEE VAST 2008: 83-90 - [c15]Heather Richter Lipford, Andrew Besmer, Jason Watson:
Understanding Privacy Settings in Facebook with an Audience View. UPSEC 2008 - 2007
- [c14]Tiffany Barnes, Heather Richter, Eve Powell, Amanda Chaffin, Alex Godwin:
Game2Learn: building CS1 learning games for retention. ITiCSE 2007: 121-125 - [c13]Katherine Strater, Heather Richter:
Examining privacy and disclosure in a social networking community. SOUPS 2007: 157-158 - 2006
- [c12]Heather Richter, Robin A. Gandhi, Lei Liu, Seok Won Lee:
Incorporating Multimedia Source Materials into a Traceability Framework. MERE 2006: 7 - 2005
- [j2]Werner Geyer, Heather A. Richter, Gregory D. Abowd:
Towards a Smarter Meeting Record-Capture and Access of Meetings Revisited. Multimedia Tools Appl. 27(3): 393-410 (2005) - [c11]Heather Richter, Andrew Skaggs, Gregory D. Abowd:
Indexing unstructured activities with peripheral cues. CHI Extended Abstracts 2005: 1737-1740 - [c10]Heather Richter, Christopher A. Miller, Gregory D. Abowd, Idris Hsi:
An empirical investigation of capture and access for software requirements activities. Graphics Interface 2005: 121-128 - 2004
- [j1]Heather Richter, Gregory D. Abowd, Christopher A. Miller, Harry Funk:
Tagging Knowledge Acquisition Sessions To Facilitate Knowledge Traceability. International Journal of Software Engineering and Knowledge Engineering 14(1): 3-19 (2004) - [c9]Khai N. Truong, Heather Richter, Gillian R. Hayes, Gregory D. Abowd:
Devices for sharing thoughts and affection at a distance. CHI Extended Abstracts 2004: 1203-1206 - 2003
- [c8]Werner Geyer, Heather Richter, Gregory D. Abowd:
Making multimedia meeting records more meaningful. ICME 2003: 669-672 - [c7]Heather Richter, Gregory D. Abowd, Christopher A. Miller, Harry Funk:
Tagging Knowledge Acquisition Sessions to Facilitate Knowledge Traceability. SEKE 2003: 432-439 - 2002
- [c6]
- 2001
- [c5]Werner Geyer, Heather A. Richter, Ludwin Fuchs, Tom Frauenhofer, Shahrokh Daijavad, Steven E. Poltrock:
A team collaboration space supporting capture and access of virtual meetings. GROUP 2001: 188-196 - [c4]Heather A. Richter, Gregory D. Abowd, Werner Geyer, Ludwin Fuchs, Shahrokh Daijavad, Steven E. Poltrock:
Integrating Meeting Capture within a Collaborative Team Environment. UbiComp 2001: 123-138 - [c3]Ludwin Fuchs, Steven E. Poltrock, Werner Geyer, Tom Frauenhofer, Shahrokh Daijavad, Heather A. Richter:
Enabling Inter-Company Team Collaboration. WETICE 2001: 374-379 - 2000
- [c2]W. Michael McCracken, Idris Hsi, Heather A. Richter, Robert Waters, Laura Burkhart:
A Proposed Curriculum for an Undergraduate Software Engineering Degree. CSEE&T 2000: 246-
1990 – 1999
- 1997
- [c1]Enoch Y. Wang, Heather A. Richter, Betty H. C. Cheng:
Formalizing and Integrating the Dynamic Model within OMT. ICSE 1997: 45-55
Coauthor Index
last updated on 2019-02-16 22:38 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint