Heather Lipford
Orcid: 0000-0002-5261-0148Affiliations:
- University of North Carolina at Charlotte, Charlotte, NC, USA
According to our database1,
Heather Lipford
authored at least 108 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on sis.uncc.edu
On csauthors.net:
Bibliography
2025
Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security.
Proc. Priv. Enhancing Technol., 2025
2024
What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
An Open Data Cube Platform as a Coastal Digital Twin: Prototypes to Inform Flooding and Environmental Health.
Proceedings of the IGARSS 2024, 2024
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Exploring privacy implications of awareness and control mechanisms in smart home devices.
Proc. Priv. Enhancing Technol., January, 2023
CoRR, 2023
A comparison of machine learning surrogate models of street-scale flooding in Norfolk, Virginia.
CoRR, 2023
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
A Digital Twin to Link Flood Models, Sensors, and Earth Observations for Coastal Resilience in Hampton Roads, Virginia, U.S.A.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023
Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Digitally Twinning Coastal Resilience Via Multsensor Imagery, in Situ Sensors, and Geospatial Analysis.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022
Mi Casa es Su Casa ("MiSu"): A Mobile App for Sharing Smart Home Devices with People Outside The Home.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022
Modern Socio-Technical Perspectives on Privacy, 2022
2021
Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving.
Proc. ACM Hum. Comput. Interact., 2021
J. Comput. Inf. Syst., 2021
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021
2020
Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities.
Proc. ACM Hum. Comput. Interact., 2020
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool.
IEEE Trans. Software Eng., 2019
Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together.
Proc. ACM Hum. Comput. Interact., 2019
Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the Joint Proceedings of the ACM IUI 2019 Workshops co-located with the 24th ACM Conference on Intelligent User Interfaces (ACM IUI 2019), 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Making privacy personal: Profiling social network users to inform privacy education and nudging.
Int. J. Hum. Comput. Stud., 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
2016
Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users.
Commun. Assoc. Inf. Syst., 2016
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
Proceedings of the 2nd Workshop on Security Information Workers, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 11th International Workshop on Automation of Software Test, 2016
2015
ACM Trans. Comput. Hum. Interact., 2015
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends.
J. Assoc. Inf. Sci. Technol., 2015
Proceedings of the 2015 IEEE Symposium on Visual Languages and Human-Centric Computing, 2015
Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02343-9, 2014
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014
2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
Proceedings of the 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 5th IEEE Conference on Visual Analytics Science and Technology, 2010
Proceedings of the Graphics Interface 2010 Conference, May 31, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
IEEE Computer Graphics and Applications, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the 3rd IEEE Symposium on Visual Analytics Science and Technology, 2008
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008
Proceedings of the 3rd International Conference on Game Development in Computer Science Education, 2008
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008
2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007
2006
Proceedings of the 2006 First International Workshop on Multimedia Requirements Engineering, 2006
2005
Multim. Tools Appl., 2005
An empirical investigation of capture and access for software requirements activities.
Proceedings of the Graphics Interface 2005 Conference, 2005
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
2004
Int. J. Softw. Eng. Knowl. Eng., 2004
Proceedings of the Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, 2004
2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
2002
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the Ubicomp 2001: Ubiquitous Computing, 2001
Proceedings of GROUP 2001, ACM 2001 International Conference on Supporting Group Work, September 30, 2001
2000
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000
1997
Proceedings of the Pulling Together, 1997