Janne Lindqvist

Janne Lindqvist

Associate Professor and Head of Department of Computer Science

    20052024

    Research activity per year

    Filter
    Conference article in proceedings

    Search results

    • 2024

      From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences

      Väkevä, J., Mekler, E. & Lindqvist, J., 11 May 2024, CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. Mueller, F. F., Kyburz, P., Williamson, J. R., Sas, C., Wilson, M. L., Toups Dugas, P. & Shklovski, I. (eds.). ACM, p. 1-20 808

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      2 Citations (Scopus)
      74 Downloads (Pure)
    • Privacy of Default Apps in Apple’s Mobile Ecosystem

      Bourdoucen, A. & Lindqvist, J., 11 May 2024, CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. Mueller, F. F., Kyburz, P., Williamson, J. R., Sas, C., Wilson, M. L., Toups Dugas, P. & Shklovski, I. (eds.). ACM, p. 1-32 786

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      1 Citation (Scopus)
      115 Downloads (Pure)
    • 2023

      When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping

      Ma, R., Lassila, H., Nurgalieva, L. & Lindqvist, J., Apr 2023, CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. ACM, 20 p. 861

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      2 Citations (Scopus)
      121 Downloads (Pure)
    • 2022

      Public Views on Digital COVID-19 Certificates: a Mixed Methods User Study

      Nurgalieva, L., Ryan, S., Balaskas, A., Lindqvist, J. & Doherty, G., 29 Apr 2022, CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. ACM, 75

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      7 Citations (Scopus)
      155 Downloads (Pure)
    • Usability and Security of Trusted Platform Module (TPM) Library APIs

      Rao, S. P., Limonta, G. & Lindqvist, J., 2022, Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022. USENIX -The Advanced Computing Systems Association, p. 213-232 20 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      4 Citations (Scopus)
      146 Downloads (Pure)
    • 2019

      Robust Performance Metrics for Authentication Systems

      Sugrim, S., Liu, C., McLean, M. & Lindqvist, J., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. Internet Society

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • 2018

      Forgetting of passwords: Ecological theory and data

      Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J. & Oulasvirta, A., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, p. 221-238

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      276 Downloads (Pure)
    • 2017

      Composition policies for gesture passwords: User choice, security, usability and memorability

      Clark, G., Lindqvist, J. & Oulasvirta, A., 2017, 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 9 p. (IEEE Conference on Communications and Network Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      231 Downloads (Pure)
    • Demo: Garda - Robust Gesture-Based Authentication for Mobile Systems

      Liu, C., Clark, G. D. & Lindqvist, J., 2017, Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. New York, NY, USA: ACM, p. 253–256 (UbiComp ’17).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • How busy are you? Predicting the interruptibility intensity of mobile users

      Yuan, F., Gao, X. & Lindqvist, J., 2 May 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. ACM, p. 5346-5360 15 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      51 Citations (Scopus)
    • UbiMI'17: Ubiquitous mobile instrumentation

      Visuri, A., Ferreira, D., Pirttikangas, S., Kostakos, V., Synnes, K., Lindqvist, J. & Nishiyama, Y., 11 Sept 2017, UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers. ACM, p. 448-451 4 p. (UbiComp/ISWC 2017 - Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Where usability and security go hand-in-hand: Robust gesture-based authentication for mobile systems

      Liu, C., Clark, G. D. & Lindqvist, J., 2 May 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. ACM, p. 374-386 13 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      16 Citations (Scopus)
    • 2016

      BO-Ear: Unsupervised car sound sensing and tracking using microphones on smartphones

      Li, S., Fan, X., Zhang, Y., Trappe, W., Lindqvist, J. & Howard, R., 3 Oct 2016, Proceedings of the 8th Wireless of the Students, by the Students, and for the Students Workshop, S3. ACM, p. 9-11 3 p. 2987362. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM; vol. 03-07-October-2016).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      1 Citation (Scopus)
    • Demo of Headbanger: Authenticating smart wearable devices using unique head movement patterns

      Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J. & Gruteser, M., 19 Apr 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016. IEEE, 7457076. (2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      26 Citations (Scopus)
    • Feasibility of software-based duty cycling of GPS for trajectory-based services

      Li, X., Yuan, F. & Lindqvist, J., 30 Mar 2016, 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016. IEEE, p. 18-26 9 p. 7444725. (2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      2 Citations (Scopus)
    • Free-form gesture authentication in the wild

      Yang, Y., Clark, G., Lindqvist, J. & Oulasvirta, A., 2016, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI). ACM, p. 3722-3735 14 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      35 Citations (Scopus)
    • No time at all: Opportunity cost of android permissions (invited paper)

      Clark, G. D., Sarode, S. & Lindqvist, J., 3 Oct 2016, Proceedings of the 3rd Workshop on Hot Topics in Wireless, HotWireless 2016. ACM, p. 12-16 5 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      3 Citations (Scopus)
    • Of two minds, multiple addresses, and one ledger: Characterizing opinions, knowledge, and perceptions of Bitcoin across users and non-users

      Gao, X., Clark, G. D. & Lindqvist, J., 7 May 2016, CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems. ACM, p. 1656-1668 13 p. (Conference on Human Factors in Computing Systems - Proceedings).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      60 Citations (Scopus)
    • On my way: Optimizing driving routes for navigation applications

      Yuan, F., Song, X. & Lindqvist, J., 30 Mar 2016, 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016. IEEE, p. 27-31 5 p. 7444726. (2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      1 Citation (Scopus)
    • Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns

      Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J. & Gruteser, M., 19 Apr 2016, 2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016. IEEE, 7456514. (2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      63 Citations (Scopus)
    • 2015

      Securacy: An empirical investigation of android applications' network usage, privacy and security

      Ferreira, D., Kostakos, V., Beresford, A. R., Lindqvist, J. & Dey, A. K., 22 Jun 2015, Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. ACM, a11. (Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      46 Citations (Scopus)
    • 2014

      A field study of run-time location access disclosures on android smartphones

      Fu, H., Yang, Y., Shingte, N., Lindqvist, J. & Gruteser, M., 2014, Workshop on Usable Security. Internet Society, Vol. 14. (Proc. USEC).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • A policy-driven approach to access control in future internet name resolution services

      Liu, X., Trappe, W. & Lindqvist, J., 11 Sept 2014, MobiArch 2014 - Proceedings of the 9th ACM MobiCom Workshop on Mobility in the Evolving Internet Architecture. ACM, p. 7-12 6 p. (MobiArch 2014 - Proceedings of the 9th ACM MobiCom Workshop on Mobility in the Evolving Internet Architecture).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      5 Citations (Scopus)
    • Disaster mitigation by crowdsourcing hazard documentation

      Yang, Y., Sherman, M. & Lindqvist, J., 1 Dec 2014, Proceedings of the 4th IEEE Global Humanitarian Technology Conference, GHTC 2014. IEEE, p. 93-98 6 p. 6970266. (Proceedings of the 4th IEEE Global Humanitarian Technology Conference, GHTC 2014).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      3 Citations (Scopus)
    • Elastic pathing: Your speed is enough to track you

      Gao, X., Firner, B., Sugrim, S., Kaiser-Pendergrast, V., Yang, Y. & Lindqvist, J., 1 Jan 2014, UbiComp 2014 - Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, p. 975-986 12 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      59 Citations (Scopus)
    • General area or approximate location? How people understand location permissions

      Fu, H. & Lindqvist, J., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 117-120 4 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      8 Citations (Scopus)
    • Groupsourcing: Nudging users away from unsafe content

      Liu, J., Jacucci, G., Ruohomaa, S., Asokan, N., Athukorala, K. & Lindqvist, J., 26 Oct 2014, Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. ACM, p. 883-886 4 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      3 Citations (Scopus)
    • Private browsing: An inquiry on usability and privacy protection

      Gao, X., Yang, Y., Fu, H., Lindqvist, J. & Wang, Y., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 97-106 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      19 Citations (Scopus)
    • Should I protect you? Understanding developers’ behavior to privacy-preserving APIs

      Jain, S. & Lindqvist, J., 2014, Workshop on Usable Security (USEC’14).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • The motivations and experiences of the on-demand mobile workforce

      Teodoro, R., Ozturk, P., Naaman, M., Mason, W. & Lindqvist, J., 1 Jan 2014, CSCW 2014 - Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, p. 236-247 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      81 Citations (Scopus)
    • User-generated free-form gestures for authentication: Security and memorability

      Sherman, M., Clark, G., Yang, Y., Sugrim, S., Modig, A., Lindqvist, J., Oulasvirta, A. & Roos, T., 2014, MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. ACM, p. 176-189 14 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      83 Citations (Scopus)
    • 2012

      Distinguishing users with capacitive touch communication

      Vu, T., Baid, A., Gao, S., Gruteser, M., Howard, R., Lindqvist, J., Spasojevic, P. & Walling, J., 28 Sept 2012, MobiCom'12 - Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. p. 197-208 12 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      59 Citations (Scopus)
    • Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing

      Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J. & Zhang, J., 19 Oct 2012, UbiComp'12 - Proceedings of the 2012 ACM Conference on Ubiquitous Computing. p. 501-510 10 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      367 Citations (Scopus)
    • 2011

      Caché: Caching location-enhanced content to improve user privacy

      Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E. & Sadeh, N., 8 Aug 2011, MobiSys'11 - Compilation Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services and Co-located Workshops. p. 197-209 13 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      54 Citations (Scopus)
    • I’m the mayor of my house: Examining why people use foursquare-- a social--driven location sharing application

      Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J. & Zimmerman, J., 13 Jun 2011, CHI 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts. ACM, p. 2409-2418 10 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      281 Citations (Scopus)
    • Undistracted driving: A mobile phone that doesn't distract

      Lindqvist, J. & Hong, J., 1 Dec 2011, HotMobile 2011: The 12th Workshop on Mobile Computing Systems and Applications. p. 70-75 6 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      38 Citations (Scopus)
    • 2010

      Practical defenses for evil twin attacks in 802.11

      Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D. & Sicker, D., 1 Dec 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5684213

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      36 Citations (Scopus)
    • 2009

      Leap-of-Faith Security is Enough for IP Mobility

      Komu, M. & Lindqvist, J., 2009, The 6th Annual IEEE Consumer Communications & Networking Conference IEEE CCNC 2009, Las Vegas, Nevada, January 2009.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      5 Citations (Scopus)
    • Privacy-preserving 802.11 access-point discovery

      Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M., 2009, ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      32 Citations (Scopus)
    • 2008

      Accessible Voice CAPTCHAs for Internet Telephony

      Markkola, A. & Lindqvist, J., 2008, The Symposium on Accessible Privacy and Security (SOAPS '08), July 23, 2008, Pittsburgh, PA, USA.. Pittsburgh, PA, USA, p. -

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Chattering Laptops

      Aura, T., Lindqvist, J., Roe, M. & Mohammed, A., 2008, 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany: Springer, p. 167-186

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      4 Citations (Scopus)
    • Interconnecting Multiple Home Networks Services

      Chowdhury, R., Arjona, A., Lindqvist, J. & Ylä-Jääski, A., 2008, 15th International Conference in Telecommunications, ICT 08, June 16-19, 2008, St. Petersburg, Russia. p. 1-7

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      5 Citations (Scopus)
    • Protecting Privacy with Protocol Stack Virtualization

      Lindqvist, J. & Tapio, J.-M., 2008, 7th ACM CCS Workshop on Privacy in Electronic Society - WPES 2008, Alexandria, Virginia, USA, October 27th, 2008. New York, NY, USA, p. 65-74

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      7 Citations (Scopus)
    • 2007

      Cure for Spam over Internet Telephony

      Lindqvist, J. & Komu, M., 2007, The 4th IEEE Consumer Communications and Networking Conference - IEEE CCNC 2007, Las Vegas, USA, 11-13 January 2007.. IEEE, p. 896-900

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      17 Citations (Scopus)
    • Privacy in Networked Mobile Device Configuration

      Lindqvist, J., 2007, Doctoral Colloquium at the 9th International Conference on Ubiquitous Computing (UbiComp 2007-DC), September 16, 2007, Innsbruck, Austria.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing

      Hota, C., Lindqvist, J., Karvonen, K., Ylä-Jääski, A. & Mohan, C., 2007, IEEE International Conference on Communications and Networking in China (Chinacom 2007), Shanghai, China, 22-24 August 2007. IEEE, p. 1-5

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      4 Citations (Scopus)
    • Usability Improvements for WLAN Access

      Karvonen, K. & Lindqvist, J., 2007, 12th International Conference on Human-Computer Interaction (HCI International 2007), 22-27.7.2007, Beijing, China, (Human-Computer Interaction, Part I, HCII 2007). p. 549-558

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • VERKKOKE: Learning Routing and Network Programming Online

      Alstes, A. & Lindqvist, J., 2007, 12th Annual Conference on Innovation and Technology in Computer Science Education - ITiCSE 2007, 25-27th June 2007, Dundee, Scotland, UK.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      8 Citations (Scopus)
    • 2006

      IPv6 Stateless Address Autoconfiguration Considered Harmful

      Lindqvist, J., 2006, Military Communications Conference - MILCOM 2006, Washington, D.C., USA, 23.10. - 25.10.2006.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Privacy Management for Secure Mobility

      Lindqvist, J. & Takkinen, L., 2006, 5th ACM CCS Workshop on Privacy in Electronic Society - WPES 2006, Alexandria, Virginia, USA, 30.10.2006. p. 63-66

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      5 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.