Publication statistics

Pub. period:2008-2012
Pub. count:13
Number of co-authors:22


Number of publications with 3 favourite co-authors:

Lorraine Kisselburgh:
Cliff Lampe:
Pamela J. Wisniewski:



Productive colleagues

Heather Richter Lipford's 3 most productive colleagues in number of publications:

Gregory D. Abowd:116
William Ribarsky:35
Celine Latulipe:20

Upcoming Courses

go to course
Psychology of Interaction Design: The Ultimate Guide
Starts tomorrow LAST CALL!
go to course
User-Centred Design - Module 3
90% booked. Starts in 5 days

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !


Our Latest Books

The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading

Heather Richter Lipford


Publications by Heather Richter Lipford (bibliography)

 what's this?
Edit | Del

Lipford, Heather Richter, Wisniewski, Pamela J., Lampe, Cliff, Kisselburgh, Lorraine and Caine, Kelly (2012): Reconciling privacy with social media. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work 2012. pp. 19-20.

Social media is one way that individuals share information, present themselves, and manage their social interactions in both personal and professional contexts. While social media benefits have been examined in the literature, relatively little attention has been paid to the relationship of privacy to these benefits. Privacy has traditionally been framed as a way for individuals to protect themselves from the consequences of too much information disclosure. However, privacy can be a means to enhance social media outcomes and is essential for coordinating cooperative relationships. In this workshop we seek to: a) broaden the lens of social media privacy research to examine the benefits and outcomes of interactional privacy as they relate to social media goals; and b) discuss the design of social media interfaces that are responsive to both relational and privacy needs.

© All rights reserved Lipford et al. and/or ACM Press

Edit | Del

Watson, Jason, Besmer, Andrew and Lipford, Heather Richter (2012): +Your circles: sharing behavior on Google+. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 12.

Users are sharing and consuming enormous amounts of information through online social network interaction every day. Yet, many users struggle to control what they share to their overlapping social spheres. Google+ introduces circles, a mechanism that enables users to group friends and use these groups to control their social network feeds and posts. We present the results of a qualitative interview study on the sharing perceptions and behavior of 27 Google+ users. These results indicate that many users have a clear understanding of circles, using them to target information to those most interested in it. Yet, despite these positive perceptions, there is only moderate use of circles to control information flow. We explore reasons and risks associated with these behaviors and provide insight on the impact and open questions of this privacy mechanism.

© All rights reserved Watson et al. and/or their publisher

Edit | Del

Whitney, Michael and Lipford, Heather Richter (2011): Participatory sensing for community building. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 1321-1326.

In this research, we explore the viability of using participatory sensing as a means to enhance a sense of community. To accomplish this, we are developing and deploying a suite of participatory sensing applications, where users explicitly report on the state of their environment, such as the location of the bus. In doing so, community members become reliant on each other for valuable information about the community. By better understanding the relationship between participatory sensing and community, we inform the design and research of similar participatory sensing, or crowd-sourced sensing applications.

© All rights reserved Whitney and Lipford and/or their publisher

Edit | Del

Besmer, Andrew, Watson, Jason and Lipford, Heather Richter (2010): The impact of social navigation on privacy policy configuration. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 7.

Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been applied to several privacy and security systems such as peer-to-peer file sharing, cookie management, and firewalls. However, little empirical evaluation of social navigation cues has been performed in security or privacy systems to understand the real impact such knowledge has on user behavior and the resulting policies. In this paper, we explore the application of social navigation to access control policy configuration using an empirical between subjects study. Our results indicate that community information does impact user behavior, but only when the visual representation of the cue is sufficiently strong.

© All rights reserved Besmer et al. and/or their publisher

Edit | Del

Lipford, Heather Richter, Watson, Jason, Whitney, Michael, Froiland, Katherine and Reeder, Robert W. (2010): Visual vs. compact: a comparison of privacy policy interfaces. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 1111-1114.

In this paper, we compare the impact of two different privacy policy representations -- AudienceView and Expandable Grids -- on users modifying privacy policies for a social network site. Despite the very different interfaces, there were very few differences in user performance. However, users had clear, and different, preferences and acknowledged the tradeoffs between the two representations. Our results imply that while either interface would be a usable option for policy settings, a combination may appeal to a wider audience and offer the best of both worlds.

© All rights reserved Lipford et al. and/or their publisher

Edit | Del

Besmer, Andrew and Lipford, Heather Richter (2010): Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 1563-1572.

Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each person's profile. In this paper, we examine privacy concerns and mechanisms surrounding these tagged images. Using a focus group, we explored the needs and concerns of users, resulting in a set of design considerations for tagged photo privacy. We then designed a privacy enhancing mechanism based on our findings, and validated it using a mixed methods approach. Our results identify the social tensions that tagging generates, and the needs of privacy tools to address the social implications of photo privacy management.

© All rights reserved Besmer and Lipford and/or their publisher

Edit | Del

Besmer, Andrew and Lipford, Heather Richter (2010): Users' (mis)conceptions of social applications. In: Proceedings of the 2010 Conference on Graphics Interface 2010. pp. 63-70.

Many social network sites, such as Facebook and MySpace, feature social applications, applications and services written by third party developers that provide additional functionality linked to a user's profile. Current platforms allow these applications to consume much of a user's profile information, as well as the profile information of the user's friends. Researchers are proposing mechanisms to reduce the risks of this data sharing, yet these efforts need to be informed with an understanding of application use and impressions. This paper examines users' motivations, intentions, and concerns with using applications, as well as their perceptions of data sharing. Our results indicate that the social interaction driving application use is also leading to a lack of awareness of data sharing, its risks, and its implications.

© All rights reserved Besmer and Lipford and/or their publisher

Edit | Del

Wisniewski, Pamela Karr, Pala, Okan, Lipford, Heather Richter and Wilson, David C. (2009): Grounding geovisualization interface design: a study of interactive map use. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems 2009. pp. 3757-3762.

Building the most effective tools to support user-centered geographic visualization faces a significant challenge: not enough is known about how people interact with maps. Map use research has often focused on higher order use goals or cognitive interpretations of static map representations. In order to address the problem of understanding foundational user-map interaction behavior, we are studying user interactions in complex geovisualizations, with an initial focus on analysis tasks. This paper describes an exploratory user study to examine general interaction issues with complex map visualizations. Our results highlight the need for map tools to improve interactivity and support basic analysis tasks to aid users in decision making.

© All rights reserved Wisniewski et al. and/or ACM Press

Edit | Del

Besmer, Andrew, Lipford, Heather Richter, Shehab, Mohamed and Cheek, Gorrell (2009): Social applications: exploring a more secure framework. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 2.

Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications -- applications and services written by third party developers that provide additional functionality linked to a user's profile. However, current application platforms put users at risk by permitting the disclosure of large amounts of personal information to these applications and their developers. This paper formally abstracts and defines the current access control model applied to these applications, and builds on it to create a more secure framework. We do so in the interest of preserving as much of the current architecture as possible, while seeking to provide a practical balance between security and privacy needs of the users, and the needs of the applications to access users' information. We present a user study of our interface design for setting a user-to-application policy. Our results indicate that the model and interface work for users who are more concerned with their privacy, but we still need to explore alternate means of creating policies for those who are less concerned.

© All rights reserved Besmer et al. and/or ACM Press

Edit | Del

Dou, Wenwen, Jeong, Dong Hyun, Stukes, Felesia, Ribarsky, William, Lipford, Heather Richter and Chang, Remco (2009): Recovering Reasoning Processes from User Interactions. In IEEE Computer Graphics and Applications, 29 (3) pp. 52-61.

Edit | Del

Lipford, Heather Richter and Abowd, Gregory D. (2008): Reviewing Meetings in TeamSpace. In Human-Computer Interaction, 23 (4) pp. 406-432.

A number of prototype meeting capture applications have been created in the past decade, yet relatively little research has focused on the review and long-term use of real captured meeting information. To that end, we have implemented a system called TeamSpace for capturing and reviewing general meetings. In this article, we describe the long-term deployment of TeamSpace to a university research group, along with a pseudo-controlled study involving the same group of users and their meetings. We gained a detailed understanding of the behavioral patterns involved in reviewing meeting content and how to improve on the experience. Our evaluations also demonstrate several of the barriers and challenges in realizing the potential benefits of meeting capture.

© All rights reserved Lipford and Abowd and/or Taylor and Francis

Edit | Del

Strater, Katherine and Lipford, Heather Richter (2008): Strategies and Struggles with Privacy in an Online Social Networking Community. In: Proceedings of the HCI08 Conference on People and Computers XXII 2008. pp. 111-119.

Online social networking communities such as Facebook and MySpace are extremely popular. These sites have changed how many people develop and maintain relationships through posting and sharing personal information. The amount and depth of these personal disclosures have raised concerns regarding online privacy. We expand upon previous research on users' under-utilization of available privacy options by examining users' current strategies for maintaining their privacy, and where those strategies fail, on the online social network site Facebook. Our results demonstrate the need for mechanisms that provide awareness of the privacy impact of users' daily interactions.

© All rights reserved Strater and Lipford and/or their publisher

Edit | Del

Latulipe, Celine and Lipford, Heather Richter (2008): The HCI Lab at UNC Charlotte. In: Proceedings of the HCI08 Conference on People and Computers XXII 2008. pp. 169-170.

At the Human Computer Interaction Lab (HCILab) at UNC Charlotte, we investigate novel ways for people to interact with computers, and through computers with their environments. Our research covers a broad range of areas within Human Computer Interaction, such as Novel Interaction and Multimedia, Privacy, Creativity, and Visual Analytics. We collaborate with researchers in a number of areas related to HCI, such as visualization, gaming, art, and psychology. We also study interaction in a variety of domains such as intelligent information systems, information privacy and security, image processing and graphics, and intelligence analysis.

© All rights reserved Latulipe and Lipford and/or their publisher

Add publication
Show list on your website

Join our community and advance:




Join our community!

Page Information

Page maintainer: The Editorial Team