Janne Lindqvist
Cited by
Cited by
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501-510, 2012
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, J Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
The motivations and experiences of the on-demand mobile workforce
R Teodoro, P Ozturk, M Naaman, W Mason, J Lindqvist
Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014
User-generated free-form gestures for authentication: Security and memorability
M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ...
Proceedings of the 12th annual international conference on Mobile systems …, 2014
Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns
S Li, A Ashok, Y Zhang, C Xu, J Lindqvist, M Gruteser
2016 IEEE International Conference on Pervasive Computing and Communications …, 2016
Caché: caching location-enhanced content to improve user privacy
S Amini, J Lindqvist, J Hong, J Lin, E Toch, N Sadeh
Proceedings of the 9th international conference on Mobile systems …, 2011
Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users
X Gao, GD Clark, J Lindqvist
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
Elastic pathing: your speed is enough to track you
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
An Ecological Investigation of the Emotional Context Surrounding Nonsuicidal Self‐Injurious Thoughts and Behaviors in Adolescents and Young Adults
A Kranzler, KB Fehling, J Lindqvist, J Brillante, F Yuan, X Gao, AL Miller, ...
Suicide and Life‐Threatening Behavior 48 (2), 149-159, 2018
Distinguishing users with capacitive touch communication
T Vu, A Baid, S Gao, M Gruteser, R Howard, J Lindqvist, P Spasojevic, ...
Proceedings of the 18th annual international conference on Mobile computing …, 2012
Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security
D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless …, 2015
How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users
F Yuan, X Gao, J Lindqvist
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
Anxious and overwhelming affects and repetitive negative thinking as ecological predictors of self-injurious thoughts and behaviors
CD Hughes, AM King, A Kranzler, K Fehling, A Miller, J Lindqvist, ...
Cognitive Therapy and Research 43, 88-101, 2019
Practical defenses for evil twin attacks in 802.11
H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
Free-form gesture authentication in the wild
Y Yang, GD Clark, J Lindqvist, A Oulasvirta
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
Privacy-preserving 802.11 access-point discovery
J Lindqvist, T Aura, G Danezis, T Koponen, A Myllyniemi, J Mäki, M Roe
Proceedings of the second ACM conference on Wireless network security, 123-130, 2009
A field study of run-time location access disclosures on Android smartphones
H Fu, Y Yang, N Shingte, J Lindqvist, M Gruteser
Proc. USEC 14, 2014
Undistracted driving: a mobile phone that doesn't distract
J Lindqvist, J Hong
Proceedings of the 12th Workshop on Mobile Computing Systems and …, 2011
Engineering gesture-based authentication systems
GD Clark, J Lindqvist
IEEE Pervasive Computing 14 (1), 18-25, 2015
Should I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIs
S Jain, J Lindqvist
Workshop on Usable Security (USEC’14), 2014
The system can't perform the operation now. Try again later.
Articles 1–20