Year |
Citation |
Score |
2019 |
Smith J, Johnson B, Murphy-Hill E, Chu B, Lipford HR. How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool Ieee Transactions On Software Engineering. 45: 877-897. DOI: 10.1109/Tse.2018.2810116 |
0.371 |
|
2019 |
Besmer A, Thomas T, Lipford HR. Effects of Privacy Notification Style and Frequency on Phone Usage Journal of Computer Information Systems. 1-12. DOI: 10.1080/08874417.2018.1563008 |
0.506 |
|
2017 |
Wisniewski PJ, Knijnenburg BP, Lipford HR. Making privacy personal International Journal of Human-Computer Studies \/ International Journal of Man-Machine Studies. 98: 95-108. DOI: 10.1016/J.Ijhcs.2016.09.006 |
0.792 |
|
2016 |
Wisniewski PJ, Najmul Islam AKM, Lipford HR, Wilson DC. Framing and measuring Multi-dimensional interpersonal privacy preferences of social networking site users Communications of the Association For Information Systems. 38: 235-258. DOI: 10.17705/1Cais.03810 |
0.811 |
|
2015 |
Watson J, Lipford HR, Besmer A. Mapping user preference to privacy default settings Acm Transactions On Computer-Human Interaction. 22. DOI: 10.1145/2811257 |
0.785 |
|
2015 |
Wisniewski P, Xu H, Lipford H, Bello-Ogunu E. Facebook apps and tagging: The trade-off between personal privacy and engaging with friends Journal of the Association For Information Science and Technology. 66: 1883-1896. DOI: 10.1002/asi.23299 |
0.307 |
|
2014 |
Zhu J, Xie J, Lipford HR, Chu B. Supporting secure programming in web applications through interactive static analysis. Journal of Advanced Research. 5: 449-62. PMID 25685513 DOI: 10.1016/J.Jare.2013.11.006 |
0.316 |
|
2014 |
Northrop EE, Lipford HR. Exploring the usability of open source network forensic tools Proceedings of the Acm Conference On Computer and Communications Security. 2014: 1-8. DOI: 10.1145/2663887.2663903 |
0.352 |
|
2012 |
Watson J, Besmer A, Lipford HR. Your circles: Sharing behavior on Google Soups 2012 - Proceedings of the 8th Symposium On Usable Privacy and Security. DOI: 10.1145/2335356.2335373 |
0.815 |
|
2012 |
Wisniewski PJ, Lipford HR, Wilson DC. Fighting for my space: Coping mechanisms for SNS boundary regulation Conference On Human Factors in Computing Systems - Proceedings. 609-618. DOI: 10.1145/2207676.2207761 |
0.652 |
|
2012 |
Lipford HR, Wisniewski PJ, Lampe C, Kisselburgh L, Caine K. Reconciling privacy with social media Proceedings of the Acm Conference On Computer Supported Cooperative Work, Cscw. 19-20. DOI: 10.1145/2141512.2141523 |
0.761 |
|
2012 |
Lipford HR, Zurko ME. Someone to watch over me Proceedings New Security Paradigms Workshop. 67-75. |
0.444 |
|
2011 |
Powell E, Stukes F, Barnes T, Lipford HR. Snag'em: Creating community connections through games Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 591-594. DOI: 10.1109/PASSAT/SocialCom.2011.229 |
0.417 |
|
2011 |
Hull G, Lipford HR, Latulipe C. Contextual gaps: Privacy issues on Facebook Ethics and Information Technology. 13: 289-302. DOI: 10.1007/S10676-010-9224-8 |
0.695 |
|
2010 |
Besmer A, Watson J, Lipford HR. The impact of social navigation on privacy policy configuration Acm International Conference Proceeding Series. DOI: 10.1145/1837110.1837120 |
0.8 |
|
2010 |
Lipford HR, Watson J, Whitney M, Froiland K, Reeder RW. Visual vs. compact: A comparison of privacy policy interfaces Conference On Human Factors in Computing Systems - Proceedings. 2: 1111-1114. DOI: 10.1145/1753326.1753492 |
0.495 |
|
2010 |
Besmer A, Lipford HR. Users' (mis)conceptions of social applications Proceedings - Graphics Interface. 63-70. |
0.816 |
|
2009 |
Dou W, Jeong DH, Stukes F, Ribarsky W, Lipford HR, Chang R. Recovering reasoning processes from user interactions. Ieee Computer Graphics and Applications. 29: 52-61. PMID 19642615 DOI: 10.1109/Mcg.2009.49 |
0.368 |
|
2009 |
Watson J, Whitney M, Lipford HR. Configuring audience-oriented privacy policies Proceedings of the Acm Conference On Computer and Communications Security. 71-78. DOI: 10.1145/1655062.1655076 |
0.627 |
|
2009 |
Besmer A, Lipford HR, Shehab M, Cheek G. Social applications: Exploring a more secure framework Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572535 |
0.812 |
|
2009 |
Besmer A, Lipford H. Tagged photos: Concerns, perceptions, and protections Conference On Human Factors in Computing Systems - Proceedings. 4585-4590. DOI: 10.1145/1520340.1520704 |
0.807 |
|
2009 |
Wisniewski PK, Wilson DC, Pala O, Lipford HR. Grounding geovisualization interface design: A study of interactive map use Conference On Human Factors in Computing Systems - Proceedings. 3757-3762. DOI: 10.1145/1520340.1520567 |
0.316 |
|
2009 |
Lipford HR, Hull G, Latulipe C, Besmer A, Watson J. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites Proceedings - 12th Ieee International Conference On Computational Science and Engineering, Cse 2009. 4: 985-989. DOI: 10.1109/CSE.2009.241 |
0.796 |
|
2008 |
Wilson DC, Lipford HR, Carroll E, Karr P, Najjar N. Charting new ground: Modeling user behavior in interactive geovisualization Gis: Proceedings of the Acm International Symposium On Advances in Geographic Information Systems. 447-450. DOI: 10.1145/1463434.1463506 |
0.388 |
|
2008 |
Jeong DH, Dou W, Lipford HR, Stukes F, Chang R, Ribarsky W. Evaluating the relationship between user interaction and financial visual analysis Vast'08 - Ieee Symposium On Visual Analytics Science and Technology, Proceedings. 83-90. DOI: 10.1109/VAST.2008.4677360 |
0.385 |
|
2008 |
Lipford HR, Abowd G. Reviewing meetings in teamspace Human-Computer Interaction. 23: 406-432. DOI: 10.1080/07370020802532759 |
0.374 |
|
2008 |
Strater K, Lipford HR. Strategies and struggles with privacy in an online social networking community Proceedings of the 22nd British Hci Group Annual Conference On People and Computers: Culture, Creativity, Interaction, Bcs Hci 2008. 1: 111-119. |
0.642 |
|
Show low-probability matches. |