Strategies and struggles with privacy in an online social networking community K Strater, HR Lipford People and Computers XXII Culture, Creativity, Interaction 22, 111-119, 2008 | 362 | 2008 |
Understanding Privacy Settings in Facebook with an Audience View. HR Lipford, A Besmer, J Watson UPSEC 8, 1-8, 2008 | 300 | 2008 |
Moving beyond untagging: photo privacy in a tagged world A Besmer, H Richter Lipford Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 291 | 2010 |
Contextual gaps: privacy issues on Facebook G Hull, HR Lipford, C Latulipe Ethics and information technology 13 (4), 289-302, 2011 | 217 | 2011 |
Fighting for my space: Coping mechanisms for SNS boundary regulation P Wisniewski, H Lipford, D Wilson Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 143 | 2012 |
Recovering reasoning processes from user interactions W Dou, DH Jeong, F Stukes, W Ribarsky, HR Lipford, R Chang IEEE Computer Graphics and Applications 29 (3), 52-61, 2009 | 139 | 2009 |
Examining privacy and disclosure in a social networking community K Strater, H Richter Proceedings of the 3rd symposium on Usable privacy and security, 157-158, 2007 | 134 | 2007 |
Game2Learn: building CS1 learning games for retention T Barnes, H Richter, E Powell, A Chaffin, A Godwin Proceedings of the 12th annual SIGCSE conference on Innovation and …, 2007 | 130 | 2007 |
Game2Learn: improving the motivation of CS1 students T Barnes, E Powell, A Chaffin, H Lipford Proceedings of the 3rd international conference on Game development in …, 2008 | 120 | 2008 |
A team collaboration space supporting capture and access of virtual meetings W Geyer, H Richter, L Fuchs, T Frauenhofer, S Daijavad, S Poltrock Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting …, 2001 | 115 | 2001 |
Usable security: History, themes, and challenges S Garfinkel, HR Lipford Synthesis Lectures on Information Security, Privacy, and Trust 5 (2), 1-124, 2014 | 112 | 2014 |
Tagged photos: concerns, perceptions, and protections A Besmer, H Lipford CHI'09 Extended Abstracts on Human Factors in Computing Systems, 4585-4590, 2009 | 108 | 2009 |
Integrating meeting capture within a collaborative team environment H Richter, GD Abowd, W Geyer, L Fuchs, S Daijavad, S Poltrock International Conference on Ubiquitous Computing, 123-138, 2001 | 106 | 2001 |
Making privacy personal: Profiling social network users to inform privacy education and nudging PJ Wisniewski, BP Knijnenburg, HR Lipford International Journal of human-computer studies 98, 95-108, 2017 | 100 | 2017 |
Flipped classroom strategies for CS education ML Maher, C Latulipe, H Lipford, A Rorrer Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 98 | 2015 |
Why do programmers make security errors? J Xie, HR Lipford, B Chu 2011 IEEE symposium on visual languages and human-centric computing (VL/HCC …, 2011 | 91 | 2011 |
The impact of social navigation on privacy policy configuration A Besmer, J Watson, HR Lipford Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-10, 2010 | 90 | 2010 |
Social applications: exploring a more secure framework A Besmer, HR Lipford, M Shehab, G Cheek Proceedings of the 5th Symposium on Usable Privacy and Security, 1-10, 2009 | 89 | 2009 |
Formalizing and integrating the dynamic model within OMT EY Wang, HA Richter, BHC Cheng Proceedings of the 19th international conference on Software Engineering, 45-55, 1997 | 84 | 1997 |
Towards a smarter meeting record—capture and access of meetings revisited W Geyer, H Richter, GD Abowd Multimedia Tools and Applications 27 (3), 393-410, 2005 | 78 | 2005 |