Follow
Heather Richter Lipford
Title
Cited by
Cited by
Year
Strategies and struggles with privacy in an online social networking community
K Strater, HR Lipford
People and Computers XXII Culture, Creativity, Interaction, 2008
4022008
Moving beyond untagging: photo privacy in a tagged world
A Besmer, H Richter Lipford
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
3512010
Understanding privacy settings in facebook with an audience view.
HR Lipford, A Besmer, J Watson
UPSEC 8 (2008), 1-8, 2008
3382008
Contextual gaps: privacy issues on Facebook
G Hull, HR Lipford, C Latulipe
Ethics and information technology 13, 289-302, 2011
2422011
Usable security: History, themes, and challenges
S Garfinkel, HR Lipford
Morgan & Claypool Publishers, 2014
2092014
Fighting for my space: Coping mechanisms for SNS boundary regulation
P Wisniewski, H Lipford, D Wilson
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
1902012
Flipped classroom strategies for CS education
ML Maher, C Latulipe, H Lipford, A Rorrer
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
1832015
Making privacy personal: Profiling social network users to inform privacy education and nudging
PJ Wisniewski, BP Knijnenburg, HR Lipford
International Journal of human-computer studies 98, 95-108, 2017
1722017
Recovering reasoning processes from user interactions
W Dou, DH Jeong, F Stukes, W Ribarsky, HR Lipford, R Chang
IEEE computer graphics and applications 29 (3), 52-61, 2009
1692009
Game2Learn: building CS1 learning games for retention
T Barnes, H Richter, E Powell, A Chaffin, A Godwin
Proceedings of the 12th annual SIGCSE conference on Innovation and …, 2007
1562007
Why do programmers make security errors?
J Xie, HR Lipford, B Chu
2011 IEEE symposium on visual languages and human-centric computing (VL/HCC …, 2011
1492011
Examining privacy and disclosure in a social networking community
K Strater, H Richter
Proceedings of the 3rd symposium on Usable privacy and security, 157-158, 2007
1482007
" I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks
M Tabassum, T Kosinski, HR Lipford
Fifteenth symposium on usable privacy and security (SOUPS 2019), 435-450, 2019
1462019
Game2Learn: improving the motivation of CS1 students
T Barnes, E Powell, A Chaffin, H Lipford
Proceedings of the 3rd international conference on Game development in …, 2008
1342008
A team collaboration space supporting capture and access of virtual meetings
W Geyer, H Richter, L Fuchs, T Frauenhofer, S Daijavad, S Poltrock
Proceedings of the 2001 ACM International Conference on Supporting Group …, 2001
1312001
Integrating meeting capture within a collaborative team environment
H Richter, GD Abowd, W Geyer, L Fuchs, S Daijavad, S Poltrock
Ubicomp 2001: Ubiquitous Computing: International Conference Atlanta Georgia …, 2001
1112001
Tagged photos: concerns, perceptions, and protections
A Besmer, H Lipford
CHI'09 Extended Abstracts on Human Factors in Computing Systems, 4585-4590, 2009
1092009
Questions developers ask while diagnosing potential security vulnerabilities with static analysis
J Smith, B Johnson, E Murphy-Hill, B Chu, HR Lipford
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
1052015
Security during application development: An application security expert perspective
TW Thomas, M Tabassum, B Chu, H Lipford
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
1032018
ASIDE: IDE support for web application security
J Xie, B Chu, HR Lipford, JT Melton
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
972011
The system can't perform the operation now. Try again later.
Articles 1–20