Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501-510, 2012 | 674 | 2012 |
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application J Lindqvist, J Cranshaw, J Wiese, J Hong, J Zimmerman Proceedings of the SIGCHI conference on human factors in computing systems …, 2011 | 618 | 2011 |
The motivations and experiences of the on-demand mobile workforce R Teodoro, P Ozturk, M Naaman, W Mason, J Lindqvist Proceedings of the 17th ACM conference on Computer supported cooperative …, 2014 | 147 | 2014 |
User-generated free-form gestures for authentication: Security and memorability M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ... Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 145 | 2014 |
Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns S Li, A Ashok, Y Zhang, C Xu, J Lindqvist, M Gruteser 2016 IEEE International Conference on Pervasive Computing and Communications …, 2016 | 144 | 2016 |
Caché: caching location-enhanced content to improve user privacy S Amini, J Lindqvist, J Hong, J Lin, E Toch, N Sadeh Proceedings of the 9th international conference on Mobile systems …, 2011 | 116 | 2011 |
Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users X Gao, GD Clark, J Lindqvist Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016 | 106 | 2016 |
Elastic pathing: your speed is enough to track you X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014 | 106 | 2014 |
An Ecological Investigation of the Emotional Context Surrounding Nonsuicidal Self‐Injurious Thoughts and Behaviors in Adolescents and Young Adults A Kranzler, KB Fehling, J Lindqvist, J Brillante, F Yuan, X Gao, AL Miller, ... Suicide and Life‐Threatening Behavior 48 (2), 149-159, 2018 | 99 | 2018 |
Distinguishing users with capacitive touch communication T Vu, A Baid, S Gao, M Gruteser, R Howard, J Lindqvist, P Spasojevic, ... Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 84 | 2012 |
Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security D Ferreira, V Kostakos, AR Beresford, J Lindqvist, AK Dey Proceedings of the 8th ACM Conference on Security and Privacy in Wireless …, 2015 | 79 | 2015 |
How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users F Yuan, X Gao, J Lindqvist Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 78 | 2017 |
Anxious and overwhelming affects and repetitive negative thinking as ecological predictors of self-injurious thoughts and behaviors CD Hughes, AM King, A Kranzler, K Fehling, A Miller, J Lindqvist, ... Cognitive Therapy and Research 43, 88-101, 2019 | 77 | 2019 |
Practical defenses for evil twin attacks in 802.11 H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 69 | 2010 |
Free-form gesture authentication in the wild Y Yang, GD Clark, J Lindqvist, A Oulasvirta Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 64 | 2016 |
A field study of run-time location access disclosures on Android smartphones H Fu, Y Yang, N Shingte, J Lindqvist, M Gruteser Proc. USEC 14, 2014 | 61 | 2014 |
Privacy-preserving 802.11 access-point discovery J Lindqvist, T Aura, G Danezis, T Koponen, A Myllyniemi, J Mäki, M Roe Proceedings of the second ACM conference on Wireless network security, 123-130, 2009 | 59 | 2009 |
Undistracted driving: a mobile phone that doesn't distract J Lindqvist, J Hong Proceedings of the 12th Workshop on Mobile Computing Systems and …, 2011 | 57 | 2011 |
Engineering gesture-based authentication systems GD Clark, J Lindqvist IEEE Pervasive Computing 14 (1), 18-25, 2015 | 56 | 2015 |
Should I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIs S Jain, J Lindqvist Workshop on Usable Security (USEC’14), 2014 | 55 | 2014 |