default search action
Heather Lipford
Person information
- affiliation: University of North Carolina at Charlotte, Charlotte, NC, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Mamtaj Akter, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security. Proc. Priv. Enhancing Technol. 2025(1): 273-289 (2025) - 2024
- [c82]Thomas R. Allen, Yin-Hsuen Chen, Blake Steiner, George McLeod, Sridhar Katragadda, Brian B. Terry, Joshua R. Baptist, Oguz Yetkin, Navid Tahvildari, Sunghoon Han, Brandon Feldhaus, Heather Richter:
An Open Data Cube Platform as a Coastal Digital Twin: Prototypes to Inform Flooding and Environmental Health. IGARSS 2024: 2319-2322 - [c81]Sarah Tabassum, Cori Faklaris, Heather Richter Lipford:
What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake. SOUPS @ USENIX Security Symposium 2024: 393-411 - [i13]Mamtaj Akter, Leena Alghamdi, Dylan Gillespie, Md. Nazmus Sakib Miazi, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
CO-oPS: A Mobile App for Community Oversight of Privacy and Security. CoRR abs/2404.10258 (2024) - [i12]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CoRR abs/2405.06371 (2024) - [i11]Mamtaj Akter, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
Examining Caregiving Roles to Differentiate the Effects of Using a Mobile App for Community Oversight for Privacy and Security. CoRR abs/2409.02364 (2024) - 2023
- [j18]Madiha Tabassum, Heather Lipford:
Exploring privacy implications of awareness and control mechanisms in smart home devices. Proc. Priv. Enhancing Technol. 2023(1): 571-588 (2023) - [c80]Mamtaj Akter, Leena Alghamdi, Jess Kropczynski, Heather Richter Lipford, Pamela J. Wisniewski:
It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones. CHI Extended Abstracts 2023: 194:1-194:7 - [c79]Leena Alghamdi, Mamtaj Akter, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford:
Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies. CHI 2023: 426:1-426:16 - [c78]Abdulmajeed Alqhatani, Heather Richter Lipford:
Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers. HCI (35) 2023: 399-418 - [c77]Thomas R. Allen, Sridhar Katragadda, Yin-Hsuen Chen, Brian B. Terry, Joshua R. Baptist, Oguz Yetkin, Navid Tahvildari, Sunghoon Han, Blake Steiner, George McLeod, Soenke Dangendor, Qiang Sun, Heather Richter:
A Digital Twin to Link Flood Models, Sensors, and Earth Observations for Coastal Resilience in Hampton Roads, Virginia, U.S.A. IGARSS 2023: 1388-1391 - [c76]Mamtaj Akter, Madiha Tabassum, Md. Nazmus Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford:
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security. SOUPS 2023: 437-456 - [i10]Leena Alghamdi, Mamtaj Akter, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford:
Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies. CoRR abs/2301.06652 (2023) - [i9]Mamtaj Akter, Leena Alghamdi, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones. CoRR abs/2306.02287 (2023) - [i8]Mamtaj Akter, Madiha Tabassum, Md. Nazmus Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela J. Wisniewski, Heather Lipford:
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security. CoRR abs/2306.02289 (2023) - [i7]Diana McSpadden, Steven Goldenberg, Binata Roy, Malachi Schram, Jonathan L. Goodall, Heather Richter:
A comparison of machine learning surrogate models of street-scale flooding in Norfolk, Virginia. CoRR abs/2307.14185 (2023) - [i6]Cori Faklaris, Heather Richter Lipford, Sarah Tabassum:
Preliminary Results from a U.S. Demographic Analysis of SMiSh Susceptibility. CoRR abs/2309.06322 (2023) - 2022
- [j17]Mamtaj Akter, Amy J. Godfrey, Jess Kropczynski, Heather Richter Lipford, Pamela J. Wisniewski:
From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? Proc. ACM Hum. Comput. Interact. 6(CSCW1): 57:1-57:28 (2022) - [c75]Mamtaj Akter, Leena Alghamdi, Dylan Gillespie, Md. Nazmus Sakib Miazi, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
CO-oPS: A Mobile App for Community Oversight of Privacy and Security. CSCW Companion 2022: 179-183 - [c74]Leena Alghamdi, Mamtaj Akter, Cristobal Sepulveda Cardenas, Diego A. Cruces, Jason Wiese, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
Mi Casa es Su Casa ("MiSu"): A Mobile App for Sharing Smart Home Devices with People Outside The Home. CSCW Companion 2022: 184-187 - [c73]Thomas R. Allen, George McLeod, Heather Richter, Alex Nielsen:
Digitally Twinning Coastal Resilience Via Multsensor Imagery, in Situ Sensors, and Geospatial Analysis. IGARSS 2022: 4739-4742 - [c72]Nadia Najjar, Anna Stubler, Harini Ramaprasad, Heather Lipford, David C. Wilson:
Evaluating Students' Perceptions of Online Learning with 2-D Virtual Spaces. SIGCSE (1) 2022: 112-118 - [p2]Bart P. Knijnenburg, Xinru Page, Pamela J. Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano:
Introduction and Overview. Modern Socio-Technical Perspectives on Privacy 2022: 1-11 - [p1]Heather Richter Lipford, Madiha Tabassum, Paritosh Bahirat, Yaxing Yao, Bart P. Knijnenburg:
Privacy and the Internet of Things. Modern Socio-Technical Perspectives on Privacy 2022: 233-264 - [e6]Bart P. Knijnenburg, Xinru Page, Pamela J. Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano:
Modern Socio-Technical Perspectives on Privacy. Springer 2022, ISBN 978-3-030-82785-4 [contents] - [i5]Mamtaj Akter, Amy J. Godfrey, Jess Kropczynski, Heather Lipford, Pamela J. Wisniewski:
From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? CoRR abs/2204.07749 (2022) - 2021
- [j16]Andrew Besmer, Tyler Thomas, Heather Richter Lipford:
Effects of Privacy Notification Style and Frequency on Phone Usage. J. Comput. Inf. Syst. 61(1): 30-41 (2021) - [j15]Jess Kropczynski, Reza Ghaiumy Anaraky, Mamtaj Akter, Amy J. Godfrey, Heather Lipford, Pamela J. Wisniewski:
Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 396:1-396:23 (2021) - [c71]Md. Nazmus Sakib Miazi, Heather Lipford, Mohamed Shehab:
Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons. INTERACT (2) 2021: 351-372 - 2020
- [j14]Jess Kropczynski, Zaina Aljallad, Nathan Jeffrey Elrod, Heather Lipford, Pamela J. Wisniewski:
Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities. Proc. ACM Hum. Comput. Interact. 4(CSCW3): 1-27 (2020) - [c70]Madiha Tabassum, Jess Kropczynski, Pamela J. Wisniewski, Heather Richter Lipford:
Smart Home Beyond the Home: A Case for Community-Based Access Control. CHI 2020: 1-12 - [c69]Elham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab:
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. EuroS&P Workshops 2020: 150-159 - [e5]Heather Richter Lipford, Sonia Chiasson:
Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020. USENIX Association 2020 [contents]
2010 – 2019
- 2019
- [j13]Madiha Tabassum, Tomasz Kosinski, Alisa Frik, Nathan Malkin, Primal Wijesekera, Serge Egelman, Heather Richter Lipford:
Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 153:1-153:23 (2019) - [j12]Chhaya Chouhan, Christy M. LaPerriere, Zaina Aljallad, Jessica Kropczynski, Heather Lipford, Pamela J. Wisniewski:
Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proc. ACM Hum. Comput. Interact. 3(CSCW): 146:1-146:31 (2019) - [j11]Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool. IEEE Trans. Software Eng. 45(9): 877-897 (2019) - [c68]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing. ISSRE Workshops 2019: 370-377 - [c67]Abhiditya Jha, Jess Kropczynski, Heather Richter Lipford, Pamela J. Wisniewski:
An Exploration on Sharing Smart Home Devices Beyond the Home. IUI Workshops 2019 - [c66]Stacey Watson, Heather Richter Lipford:
Motivating Students Beyond Course Requirements with a Serious Game. SIGCSE 2019: 211-217 - [c65]Abdulmajeed Alqhatani, Heather Richter Lipford:
"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data. SOUPS @ USENIX Security Symposium 2019 - [c64]Madiha Tabassum, Tomasz Kosinski, Heather Richter Lipford:
I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks. SOUPS @ USENIX Security Symposium 2019 - [e4]Heather Richter Lipford:
Fifteenth Symposium on Usable Privacy and Security, SOUPS 2019, Santa Clara, CA, USA, August 11-13, 2019. USENIX Association 2019 [contents] - 2018
- [c63]Madiha Tabassum, Abdulmajeed Alqhatani, Marran Aldossari, Heather Richter Lipford:
Increasing User Attention with a Comic-based Policy. CHI 2018: 200 - [c62]Tyler W. Thomas, Madiha Tabassum, Bill Chu, Heather Lipford:
Security During Application Development: an Application Security Expert Perspective. CHI 2018: 262 - [c61]Madiha Tabassum, Stacey Watson, Bill Chu, Heather Richter Lipford:
Evaluating Two Methods for Integrating Secure Programming Education. SIGCSE 2018: 390-395 - [c60]Stacey Watson, Julio César Bahamón, Harini Ramaprasad, Heather Richter Lipford:
Developing Soft Skills with a Classroom Behavior Management Game: (Abstract Only). SIGCSE 2018: 1092 - [e3]Mary Ellen Zurko, Heather Richter Lipford:
Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018 [contents] - [i4]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Using Unit Testing to Detect Sanitization Flaws. CoRR abs/1804.00753 (2018) - [i3]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic Web Security Unit Testing: XSS Vulnerability Detection. CoRR abs/1804.00754 (2018) - [i2]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. CoRR abs/1804.00755 (2018) - [i1]Mahmoud Mohammadi, Bei-Tseng Chu, Heather Richter Lipford:
Automated Detecting and Repair of Cross-Site Scripting Vulnerabilities. CoRR abs/1804.01862 (2018) - 2017
- [j10]Pamela J. Wisniewski, Bart P. Knijnenburg, Heather Richter Lipford:
Making privacy personal: Profiling social network users to inform privacy education and nudging. Int. J. Hum. Comput. Stud. 98: 95-108 (2017) - [c59]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. QRS 2017: 364-373 - [c58]Madiha Tabassum, Stacey Watson, Heather Richter Lipford:
Comparing Educational Approaches to Secure programming: Tool vs. TA. SOUPS 2017 - [c57]Stacey Watson, Heather Richter Lipford:
A Proposed Visualization for Vulnerability Scan Data. SOUPS 2017 - 2016
- [j9]Pamela J. Wisniewski, A. K. M. Najmul Islam, Heather Richter Lipford, David C. Wilson:
Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users. Commun. Assoc. Inf. Syst. 38: 10 (2016) - [j8]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [c56]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic web security unit testing: XSS vulnerability detection. AST@ICSE 2016: 78-84 - [c55]Jun Zhu, Bill Chu, Heather Richter Lipford:
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. SACMAT 2016: 73-80 - [c54]Yousra Javed, Heather Richter Lipford:
A Body of Knowledge for Usable Security and Privacy Education (Abstract Only). SIGCSE 2016: 494-495 - [c53]Tyler Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson R. Murphy-Hill:
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool. WSIW@SOUPS 2016 - 2015
- [j7]Celine Latulipe, Heather Richter Lipford, Mary Lou Maher, David C. Wilson:
UNC Charlotte HCI/InDe lab. Interactions 22(6): 16-19 (2015) - [j6]Pamela J. Wisniewski, Heng Xu, Heather Richter Lipford, Emmanuel Bello-Ogunu:
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. J. Assoc. Inf. Sci. Technol. 66(9): 1883-1896 (2015) - [j5]Jason Watson, Heather Richter Lipford, Andrew Besmer:
Mapping User Preference to Privacy Default Settings. ACM Trans. Comput. Hum. Interact. 22(6): 32:1-32:20 (2015) - [c52]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
POSTER: Using Unit Testing to Detect Sanitization Flaws. CCS 2015: 1659-1661 - [c51]Jun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas:
Mitigating Access Control Vulnerabilities through Interactive Static Analysis. SACMAT 2015: 199-209 - [c50]Michael Whitney, Heather Richter Lipford, Bill Chu, Jun Zhu:
Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course. SIGCSE 2015: 60-65 - [c49]Mary Lou Maher, Celine Latulipe, Heather Richter Lipford, Audrey Rorrer:
Flipped Classroom Strategies for CS Education. SIGCSE 2015: 218-223 - [c48]Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
Questions developers ask while diagnosing potential security vulnerabilities with static analysis. ESEC/SIGSOFT FSE 2015: 248-259 - [c47]Tyler Thomas, Bill Chu, Heather Richter Lipford, Justin Smith, Emerson R. Murphy-Hill:
A study of interactive code annotation for access control vulnerabilities. VL/HCC 2015: 73-77 - 2014
- [b1]Simson L. Garfinkel, Heather Richter Lipford:
Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01215-0 - [c46]Erik E. Northrop, Heather Richter Lipford:
Exploring the Usability of Open Source Network Forensic Tools. SIW@CCS 2014: 1-8 - [c45]Heather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill:
Interactive Code Annotation for Security Vulnerability Detection. SIW@CCS 2014: 17-22 - [c44]Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle:
SIW 2014: First Workshop on Security Information Workers. CCS 2014: 1554 - [e2]Robert Biddle, Bill Chu, Emerson R. Murphy-Hill, Heather Richter Lipford:
Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3152-4 [contents] - 2013
- [c43]Jun Zhu, Heather Richter Lipford, Bill Chu:
Interactive support for secure programming education. SIGCSE 2013: 687-692 - 2012
- [c42]Pamela J. Wisniewski, Heather Richter Lipford, David C. Wilson:
Fighting for my space: coping mechanisms for sns boundary regulation. CHI 2012: 609-618 - [c41]Jing Xie, Heather Richter Lipford, Bei-tseng Chu:
Evaluating interactive support for secure programming. CHI 2012: 2707-2716 - [c40]Heather Richter Lipford, Pamela J. Wisniewski, Cliff Lampe, Lorraine G. Kisselburgh, Kelly Caine:
Reconciling privacy with social media. CSCW (Companion) 2012: 19-20 - [c39]Heather Richter Lipford, Mary Ellen Zurko:
Someone to watch over me. NSPW 2012: 67-76 - [c38]Jason Watson, Andrew Besmer, Heather Richter Lipford:
+Your circles: sharing behavior on Google+. SOUPS 2012: 12 - 2011
- [c37]Jing Xie, Bill Chu, Heather Richter Lipford, John T. Melton:
ASIDE: IDE support for web application security. ACSAC 2011: 267-276 - [c36]Pamela Karr Wisniewski, Erin A. Carroll, Heather Richter Lipford:
Technology Overload: Gender-based Perceptions of Knowledge Worker Performance. AMCIS 2011 - [c35]Pamela Karr Wisniewski, David C. Wilson, Heather Richter Lipford:
A New Social Order: Mechanisms for Social Network Site Boundary Regulation. AMCIS 2011 - [c34]Michael Whitney, Heather Richter Lipford:
Participatory sensing for community building. CHI Extended Abstracts 2011: 1321-1326 - [c33]Jing Xie, Bill Chu, Heather Richter Lipford:
Idea: Interactive Support for Secure Software Development. ESSoS 2011: 248-255 - [c32]Eve Powell, Felesia Stukes, Tiffany Barnes, Heather Richter Lipford:
Snag'em: Creating Community Connections through Games. SocialCom/PASSAT 2011: 591-594 - [c31]Jing Xie, Heather Richter Lipford, Bill Chu:
Why do programmers make security errors? VL/HCC 2011: 161-164 - 2010
- [c30]Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, Robert W. Reeder:
Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010: 1111-1114 - [c29]Andrew Besmer, Heather Richter Lipford:
Moving beyond untagging: photo privacy in a tagged world. CHI 2010: 1563-1572 - [c28]Andrew Besmer, Heather Richter Lipford:
Users' (mis)conceptions of social applications. Graphics Interface 2010: 63-70 - [c27]Heather Richter Lipford, Felesia Stukes, Wenwen Dou, Matthew E. Hawkins, Remco Chang:
Helping users recall their reasoning process. IEEE VAST 2010: 187-194 - [c26]Andrew Besmer, Jason Watson, Heather Richter Lipford:
The impact of social navigation on privacy policy configuration. SOUPS 2010 - [e1]Tony Sager, Gail-Joon Ahn, Krishna Kant, Heather Richter Lipford:
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0093-3 [contents]
2000 – 2009
- 2009
- [j4]Wenwen Dou, Dong Hyun Jeong, Felesia Stukes, William Ribarsky, Heather Richter Lipford, Remco Chang:
Recovering Reasoning Processes from User Interactions. IEEE Computer Graphics and Applications 29(3): 52-61 (2009) - [c25]Pamela Karr Wisniewski, Okan Pala, Heather Richter Lipford, David C. Wilson:
Grounding geovisualization interface design: a study of interactive map use. CHI Extended Abstracts 2009: 3757-3762 - [c24]Andrew Besmer, Heather Richter Lipford:
Tagged photos: concerns, perceptions, and protections. CHI Extended Abstracts 2009: 4585-4590 - [c23]Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson:
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. CSE (4) 2009: 985-989 - [c22]Jason Watson, Michael Whitney, Heather Richter Lipford:
Configuring audience-oriented privacy policies. SafeConfig 2009: 71-78 - [c21]Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell P. Cheek:
Social applications: exploring a more secure framework. SOUPS 2009 - 2008
- [j3]Heather Richter Lipford, Gregory D. Abowd:
Reviewing Meetings in TeamSpace. Hum. Comput. Interact. 23(4): 406-432 (2008) - [c20]Katherine Strater, Heather Richter Lipford:
Strategies and struggles with privacy in an online social networking community. BCS HCI (1) 2008: 111-119 - [c19]Celine Latulipe, Heather Richter Lipford:
The HCI lab at UNC Charlotte. BCS HCI (2) 2008: 169-170 - [c18]Tiffany Barnes, Eve Powell, Amanda Chaffin, Heather Richter Lipford:
Game2Learn: improving the motivation of CS1 students. GDCSE 2008: 1-5 - [c17]David C. Wilson, Heather Richter Lipford, Erin A. Carroll, Pamela Karr, Nadia Najjar:
Charting new ground: modeling user behavior in interactive geovisualization. GIS 2008: 61 - [c16]Dong Hyun Jeong, Wenwen Dou, Heather Richter Lipford, Felesia Stukes, Remco Chang, William Ribarsky:
Evaluating the relationship between user interaction and financial visual analysis. IEEE VAST 2008: 83-90 - [c15]Heather Richter Lipford, Andrew Besmer, Jason Watson:
Understanding Privacy Settings in Facebook with an Audience View. UPSEC 2008 - 2007
- [c14]Tiffany Barnes, Heather Richter, Eve Powell, Amanda Chaffin, Alex Godwin:
Game2Learn: building CS1 learning games for retention. ITiCSE 2007: 121-125 - [c13]Katherine Strater, Heather Richter:
Examining privacy and disclosure in a social networking community. SOUPS 2007: 157-158 - 2006
- [c12]Heather Richter, Robin A. Gandhi, Lei Liu, Seok Won Lee:
Incorporating Multimedia Source Materials into a Traceability Framework. MERE 2006: 7 - 2005
- [j2]Werner Geyer, Heather A. Richter, Gregory D. Abowd:
Towards a Smarter Meeting Record-Capture and Access of Meetings Revisited. Multim. Tools Appl. 27(3): 393-410 (2005) - [c11]Heather Richter, Andrew Skaggs, Gregory D. Abowd:
Indexing unstructured activities with peripheral cues. CHI Extended Abstracts 2005: 1737-1740 - [c10]Heather Richter, Christopher A. Miller, Gregory D. Abowd, Idris Hsi:
An empirical investigation of capture and access for software requirements activities. Graphics Interface 2005: 121-128 - 2004
- [j1]Heather Richter, Gregory D. Abowd, Christopher A. Miller, Harry Funk:
Tagging Knowledge Acquisition Sessions To Facilitate Knowledge Traceability. Int. J. Softw. Eng. Knowl. Eng. 14(1): 3-19 (2004) - [c9]Khai N. Truong, Heather Richter, Gillian R. Hayes, Gregory D. Abowd:
Devices for sharing thoughts and affection at a distance. CHI Extended Abstracts 2004: 1203-1206 - 2003
- [c8]Werner Geyer, Heather Richter, Gregory D. Abowd:
Making multimedia meeting records more meaningful. ICME 2003: 669-672 - [c7]Heather Richter, Gregory D. Abowd, Christopher A. Miller, Harry Funk:
Tagging Knowledge Acquisition Sessions to Facilitate Knowledge Traceability. SEKE 2003: 432-439 - 2002
- [c6]Heather Richter:
Understanding meeting capture and access. CHI Extended Abstracts 2002: 558-559 - 2001
- [c5]Werner Geyer, Heather A. Richter, Ludwin Fuchs, Tom Frauenhofer, Shahrokh Daijavad, Steven E. Poltrock:
A team collaboration space supporting capture and access of virtual meetings. GROUP 2001: 188-196 - [c4]Heather A. Richter, Gregory D. Abowd, Werner Geyer, Ludwin Fuchs, Shahrokh Daijavad, Steven E. Poltrock:
Integrating Meeting Capture within a Collaborative Team Environment. UbiComp 2001: 123-138 - [c3]Ludwin Fuchs, Steven E. Poltrock, Werner Geyer, Tom Frauenhofer, Shahrokh Daijavad, Heather A. Richter:
Enabling Inter-Company Team Collaboration. WETICE 2001: 374-379 - 2000
- [c2]W. Michael McCracken, Idris Hsi, Heather A. Richter, Robert Waters, Laura Burkhart:
A Proposed Curriculum for an Undergraduate Software Engineering Degree. CSEE&T 2000: 246-
1990 – 1999
- 1997
- [c1]Enoch Y. Wang, Heather A. Richter, Betty H. C. Cheng:
Formalizing and Integrating the Dynamic Model within OMT. ICSE 1997: 45-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint