Curriculum Vitae
Total Page:16
File Type:pdf, Size:1020Kb
Heather Richter Lipford CURRICULUM VITAE Heather Richter Lipford Department of Software and Information Systems University of North Carolina at Charlotte 9201 University City Boulevard Charlotte, NC 28223 Phone: +1 (704) 687-8376; Fax: +1 (704) 687-4893 [email protected] http://www.sis.uncc.edu/~richter 1 Education 1997 - 2005 Ph.D. College of Computing, Georgia Institute of Technology “Designing and Evaluating Meeting Capture and Access Services” Advisor: Dr. Gregory Abowd 1992 - 1995 B.S. Computer Science, Michigan State University Advisor: Dr Betty H.C. Cheng 2 Professional Experience 2011 - present Associate Professor, Department of Software and Information Systems. University of North Carolina at Charlotte, Charlotte, NC. 2005 – 2011 Assistant Professor, Department of Software and Information Systems. University of North Carolina at Charlotte, Charlotte, NC. 1997 – 2005 Research and Teaching Assistant. Georgia Institute of Technology Atlanta, GA. 2000 - 2001 Technical Intern. IBM T.J. Watson Research Laboratories. Hawthorne, NY. 1997, 1998 Technical Intern. Hewlett-Packard Laboratories Palo Alto, CA. 1995 Undergraduate research assistant. Michigan State University, East Lansing, MI. 3 Licenses and Certifications 4 Career Highlights • Established HCI as a core area in the department by founding the HCI Lab and developing 2 new HCI courses at UNC Charlotte. • Core contributor to the usable security and privacy community with my work on privacy and social network sites. July, 2011 Curriculum Vitae Page 1 of 17 Heather Richter Lipford • Honorable mention award at CHI 2010. • Active leadership roles in usable security and privacy by serving in conference and workshop organizing roles, such as the CHI and CSCW program committees and co-chair of the SOUPS 2011 and 2012 technical program. • Participated in interdisciplinary research and education, including collaborations with faculty in information security, visualization, architecture, cognitive science, gaming, and philosophy. • Supervising 5 Ph.D. students, and supervised 23 undergraduates in senior projects and research, which includes 16 women and 8 minority students. 5 Publications 5.1 Peer Reviewed Journal Publications [J6] Jun Zhu, Jing Xie, Heather Richter Lipford, Bill Chu. “Supporting Secure Programming in Web Applications through Interactive Static Analysis” Journal of Advanced Research, 2013. http://www.sciencedirect.com/science/article/pii/S2090123213001422 [J5] Gordon Hull, Heather Richter Lipford, and Celine Latulipe. “Contextual Gaps: Privacy Issues on Facebook.” Journal on Ethics in Information Technologies, Springer Science + Business Media, 13(4), 2011. http://dx.doi.org/10.1007/s10676-010-9224-8 [J4] Wenwen Dou, Dong Hyun Jeong, Felesia Stukes, William Ribarsky, Heather Richter Lipford, and Remco Chang. “Recovering Reasoning Process From User Interactions.” IEEE Computer Graphics and Applications, 29(3), May/June 2009, pp 52-61. http://dx.doi.org/10.1109/MCG.2009.49 [J3] Heather Richter Lipford and Gregory D. Abowd. “Reviewing Meetings in TeamSpace.” HCI Journal, Taylor and Francis Group, 23(4), October 2008, pp 406-432. http://dx.doi.org/10.1080/07370020802532759 [J2] Werner Geyer, Heather Richter, and Gregory D. Abowd. “Towards a Smarter Meeting Record – Capture and Access of Meetings Revisited.” Multimedia Tools and Applications, Springer Science + Business Media, 27(3), December 2005, pp 393-410. http://www.springerlink.com/content/764173787524gh76/ [J1] Heather Richter, Chris Miller, Gregory D. Abowd, and Harry Funk. “Tagging Knowledge Acquisition To Facilitate Knowledge Traceability.” International Journal on Software Engineering and Knowledge Engineering, World Scientific, 14(1), February 2004, pp 3-19. 5.2 Peer Reviewed Conference Publications [C34] Jun Zhu, Heather Richter Lipford, Bill Chu. “Interactive Support for Secure Programming Education.” In the Proceedings of SIGCSE 2013, the 44th Technical Symposium on Computer Science Education, March 2013. [C33] Heather Richter Lipford and Mary Ellen Zurko. “Someone To Watch Over Me” In the Proceedings of the New Security Paradigms Workshop (NSPW 2012), September 2012. [C32] Jason Watson, Andrew Besmer, and Heather Richter Lipford. “+Your Circles: Sharing Behavior on Google+” In the Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2012), July 2012 (acceptance 21%). July, 2011 Curriculum Vitae Page 2 of 17 Heather Richter Lipford [C31] Jing Xie, Heather Richter Lipford, and Bei-Tseng Chu. “Evaluating Interactive Support for Secure Programming.” In the Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2012), May 2012. http://dl.acm.org/citation.cfm?id=2208665 [C30] Pamela Karr-Wisniewski, Heather Richter Lipford, and David Wilson. “Fighting for My Space: Coping Mechanisms for SNS Boundary Regulation.” In the Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2012), May 2012. http://dl.acm.org/citation.cfm?id=2207761 [C29] Jing Xie, Bei-Tseng Chu, Heather Richter Lipford, and John Melton. “ASIDE: IDE Support for Web Application Security.” In the Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC 2011), December 2011, pp 267-276. http://doi.acm.org/10.1145/2076732.2076770 [C28] Jing Xie, Heather Richter Lipford, and Bei-Tseng Chu. “Why Do Programmers Make Security Errors?” In the Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), September, 2011, pp161-164. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6070393&isnumber=6070364 [C27] Pamela Karr Wisniewski, Heather Richter Lipford, and David Wilson. “A New Social Order: Boundary Regulation within Online Social Networks.” In the Proceedings of the Americas Conference on Information Systems (AMCIS), August 2011. [C26] Pamela Karr Wisniewski, Erin Carroll, and Heather Richter Lipford. “Technology overload: Gender-based Perceptions of Knowledge Worker Performance.” In the Proceedings of the Americas Conference on Information Systems (AMCIS), August 2011. [C25] Jing Xie, Bei-Tseng Chu, and Heather Richter Lipford. “Idea: Interactive Support for Secure Software Development.” In the Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS 2011), February 2011, pp 248-255. (acceptance 28.6%) http://dx.doi.org/10.1007/978-3-642-19125-1_19 [C24] Heather Richter Lipford, Felesia Stukes, Wenwen Dou, Matthew Hawkins, and Remco Chang. “Helping Users Recall Their Reasoning Process.” In the Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST), October, 2010. (acceptance 28%) [C23] Andrew Besmer, Jason Watson, and Heather Richter Lipford. “The Impact of Social Navigation on Privacy Policy Configuration.” In the Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS 2010), July 2010. (acceptance 25%) http://portal.acm.org/citation.cfm?doid=1837110.1837120 [C22] Heather Richter Lipford, Jing Xie, Will Stranathan, Daniel Oakley, and Bei-Tseng Chu. “The Impact of a Structured Application Framework on Web Application Security.” In the Proceedings of the Colloquium for Information Systems Security Education (CISSE) 2010, June 2010, pp 212-219. [C21] Andrew Besmer and Heather Richter Lipford. “Users’ (Mis) Conceptions of Social Applications.” In the Proceedings of Graphics Interface (GI 2010), June 2010, pp 63-70. (acceptance 39%) [C20] Andrew Besmer and Heather Richter Lipford. “Moving Beyond UnTagging: Photo Privacy in a Tagged World.” In the Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 2010, April 2010, pp 1563-1572. Best Paper Honorable Mention. (acceptance 22%) http://doi.acm.org/10.1145/1753326.1753560 [C19] Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, and Robert W. Reeder. “Visual vs. Compact: A Comparison of Privacy Policy Interfaces.” In the Proceedings of July, 2011 Curriculum Vitae Page 3 of 17 Heather Richter Lipford the ACM Conference on Human Factors in Computing Systems, CHI 2010, April 2010. pp 1111- 1114. (acceptance 22%) http://doi.acm.org/10.1145/1753326.1753492 [C18] Jason Watson, Michael Whitney, and Heather Richter Lipford. “Configuring Audience- Oriented Privacy Policies.” In the Proceedings the Workshop on Assurable and Usable Security Configurations (SafeConfig), collocated with ACM CCS 2009, November 2009, pp 71-78. http://doi.acm.org/10.1145/1655062.1655076 [C17] Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. “Visual Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites.” In the Proceedings of the Workshop on Security and Privacy in Online Social Networking, IEEE International Conference on Social Computing (SocialCom), August 2009, pp 985-989. http://dx.doi.org/ 10.1109/CSE.2009.241 [C16] Andrew Besmer, Heather Richter Lipford, Mohammed Shehab, and Gorrell Cheek. “Social Applications: Exploring a More Secure Framework.” In the Proceedings of the Fifth Symposium on Usable Privacy and Security (SOUPS), July 2009. (acceptance 31%) http://doi.acm.org/10.1145/1572532.1572535 [C15] Dong Hyun Jeong, Wenwen Dou, Felesia Stukes, William Ribarsky, Heather Richter Lipford, and Remco Chang. “Evaluating the Relationship between User Interaction and Financial Visual Analysis.” In the Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST), October 2008, pp 83-90. (acceptance 36%) [C14] Katherine P. Strater and Heather Richter Lipford. “Strategies and Struggles