Janne Lindqvist
Janne Lindqvist
Aalto University (Computer Science)
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501-510, 2012
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, J Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
User-generated free-form gestures for authentication: Security and memorability
M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ...
Proceedings of the 12th annual international conference on Mobile systems …, 2014
The motivations and experiences of the on-demand mobile workforce
R Teodoro, P Ozturk, M Naaman, W Mason, J Lindqvist
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns
S Li, A Ashok, Y Zhang, C Xu, J Lindqvist, M Gruteser
2016 IEEE International Conference on Pervasive Computing and Communications …, 2016
Caché: caching location-enhanced content to improve user privacy
S Amini, J Lindqvist, J Hong, J Lin, E Toch, N Sadeh
Proceedings of the 9th international conference on Mobile systems …, 2011
Elastic pathing: your speed is enough to track you
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users
X Gao, GD Clark, J Lindqvist
An Ecological Investigation of the Emotional Context Surrounding Nonsuicidal Self‐Injurious Thoughts and Behaviors in Adolescents and Young Adults
A Kranzler, KB Fehling, J Lindqvist, J Brillante, F Yuan, X Gao, AL Miller, ...
Suicide and Life‐Threatening Behavior 48 (2), 149-159, 2018
Distinguishing users with capacitive touch communication
T Vu, A Baid, S Gao, M Gruteser, R Howard, J Lindqvist, P Spasojevic, ...
Proceedings of the 18th annual international conference on Mobile computing …, 2012
Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless …, 2015
How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users
F Yuan, X Gao, J Lindqvist
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
Anxious and overwhelming affects and repetitive negative thinking as ecological predictors of self-injurious thoughts and behaviors
CD Hughes, AM King, A Kranzler, K Fehling, A Miller, J Lindqvist, ...
Cognitive Therapy and Research 43, 88-101, 2019
Practical defenses for evil twin attacks in 802.11
H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
Free-form gesture authentication in the wild
Y Yang, GD Clark, J Lindqvist, A Oulasvirta
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
Privacy-preserving 802.11 access-point discovery
J Lindqvist, T Aura, G Danezis, T Koponen, A Myllyniemi, J Mäki, M Roe
Proceedings of the second ACM conference on Wireless network security, 123-130, 2009
A field study of run-time location access disclosures on Android smartphones
H Fu, Y Yang, N Shingte, J Lindqvist, M Gruteser
Proc. USEC 14, 2014
Undistracted driving: a mobile phone that doesn't distract
J Lindqvist, J Hong
Proceedings of the 12th Workshop on Mobile Computing Systems and …, 2011
Engineering gesture-based authentication systems
GD Clark, J Lindqvist
IEEE Pervasive Computing 14 (1), 18-25, 2015
Should I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIs
S Jain, J Lindqvist
Workshop on Usable Security (USEC’14), 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20