Janne Lindqvist is an associate professor of computer science at Aalto. Prior to Aalto, Janne was an associate professor of electrical and computer engineering at Rutgers University.
Janne is the recipient of the United States National Science Foundation (NSF) CAREER award, which is NSF’s most prestigious award in support of early-career faculty. At Aalto, Janne has served as the Head of Department of Computer Science (08/2022-08/2025), as the director of the Helsinki-Aalto Institute for Cybersecurity (HAIC, 01/2020-12/2023), Vice-Director of the Helsinki Institute for Information Technology (HIIT, 10/2020 – 10/2022). He is the responsible professor and the founder of the Engineering Psychology BSc major at Aalto.
His work has received sustained attention in the global media including Scientific American, IEEE Spectrum, MIT Technology Review, NPR, International Business Times, ABC News, CBS News, Fox News, Fortune, Computerworld, Der Spiegel, London Times, New Scientist, PBS and Wired. In addition to the NSF CAREER award, Janne’s awards include the Best Paper Awards from CHI’24 and MobiCom’12, the Best Paper Nominee Award from UbiComp’14, Honorable Mention from CHI’25 and the Sustainable Jersey Creation & Innovation Award 2014 (together with Warren Township, NJ). Janne is the proud recipient of the inaugural ARISTOTELES award (2025) for education from the ATHENE Guild at Aalto.
During his spare time, Janne spends time with his family and children and is learning to play drums, practices fitboxing and yoga, and is developing skills with improvisational theatre and stand up comedy.
Publications
-
2025. Privacy perceptions of custom gpts by users and creators. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (2025). , 1-18.
10.1145/3706598.3713540 -
2025. Channel Switching and Adaptive Behaviors in Multichannel Communication. In Proceedings of the ACM on Human-Computer Interaction (CSCW220). , 1 - 33.
10.1145/3757401 -
2025. Fluid Roles for Close-Knit Gaming: Households Playing Digital Games. In Proceedings of the ACM on Human-Computer Interaction (9). , 695-729.
10.1145/3748619 -
2025. ‘Don’t You Dare Go Hollow’: How Dark Souls Helps Players Cope with Depression, a Thematic Analysis of Reddit Discussions. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems (2025). , .
10.1145/3706598.3714075 -
2024. Privacy of Default Apps in Apple’s Mobile Ecosystem. In Proceedings of the CHI Conference on Human Factors in Computing Systems (2024). , 1-32.
10.1145/3613904.3642831 -
2024. Questions without Answers: Enjoyment of Irresolution in Mystery Player Experience. In Proceedings of the ACM on Human-Computer Interaction, Volume 8, Issue CHI PLAY (2024). , 1-28.
10.1145/3677100 -
2024. Swapping 5G for 3G: Motivations, Experiences, and Implications of Contemporary Dumbphone Adoption. In Proceedings of the ACM on Human-Computer Interaction (8, CSCW1). , .
10.1145/3637402 -
2024. From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences. In CHI ’24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (2024). , 1-20.
10.1145/3613904.3642543 -
2023. Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games. In Proceedings of the ACM on Human-Computer Interaction (7 CHI PLAY). , 418:1136–418:1178.
10.1145/3544548.3580690 -
2023. When Browsing Gets Cluttered: Exploring and Modeling Interactions of Browsing Clutter, Browsing Habits, and Coping. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (2023). , 1-29.
10.1145/3544548.3580690 -
2019. Recruit Until It Fails: Exploring Performance Limits for Identification Systems.. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (3). , 1 - 26.
10.1145/3351262 -
2019. Robust Performance Metrics for Authentication Systems.. In Proceedings of the Network and Distributed System Security Symposium (NDSS’19) (). , 1 - 26.
10.14722/ndss.2019.23351 -
2018. Forgetting of Passwords: Ecological Theory and Data. In Proceedings of the 27th USENIX Security Symposium (). , 221 - 238.
-
2017. Guessing Attacks on User-Generated Gesture Passwords. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (1). , 1 - 24.
10.1145/3053331 -
2017. Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17) (2017). , 374 - 386.
10.1145/3025453.3025879 -
2017. How Busy Are You?: Predicting the Interruptibility Intensity of Mobile Users. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17) (2017). , 1 - 24.
10.1145/3025453.3025946 -
2016. Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI ’16) (). , 3722 - 3735.
10.1145/2858036.2858049 -
2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In IEEE International Conference on Pervasive Computing and Communications (PerCom) (). , 1-9.
10.1109/PERCOM.2016.7456514 -
2016. Free-Form Gesture Authentication in the Wild. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI ’16) (). , 3722 - 3735.
10.1145/2858036.2858270 -
2015. Engineering Gesture-Based Authentication Systems. In IEEE Pervasive Computing (14). , 18-25.
10.1109/MPRV.2015.6 -
2015. Is secure and usable smartphone authentication asking too much?. In Computer (48). , 64-68.
10.1109/MC.2015.134 -
2015. Understanding Motivations for Using Grocery Shopping Applications. In IEEE Pervasive Computing (14). , 38-44.
10.1109/MPRV.2015.65 -
2014. A Field Study of Run-Time Location Access Disclosures on Android Smartphones. In Proceedings of NDSS workshops: Usable Security (USEC 2014) (14). , 1-10.
10.14722/usec.2014.23044 -
2014. Elastic pathing: your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ’14) (14). , 975-986.
10.1145/2632048.2632077 -
2014. User-generated free-form gestures for authentication: security and memorability. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (MobiSys ’14) (14). , 176-189.
10.1145/2594368.2594375 -
2014. The motivations and experiences of the on-demand mobile workforce. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW ’14) (14). , 236-247.
10.1145/2531602.2531680 -
2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp ’12) (). , 501-510.
10.1145/2370216.2370290 -
2012. Distinguishing users with capacitive touch communication. In Distinguishing users with capacitive touch communication. In Proceedings of the 18th annual international conference on Mobile computing and networking (Mobicom ’12) (). , 197 - 208.
10.1145/2348543.2348569 -
2011. Caché: caching location-enhanced content to improve user privacy. In Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys ’11) (). , 197-210.
10.1145/1999995.2000015 -
2011. Undistracted driving: a mobile phone that doesn’t distract.. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile ’11) (). , 70-75.
10.1145/2184489.2184504 -
2011. I’m the mayor of my house: examining why people use foursquare - a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11) (). , 2409-2418.
10.1145/1978942.1979295 -
2009. Privacy-preserving 802.11 access-point discovery. In Proceedings of the second ACM conference on Wireless network security (WiSec ’09) (). , 123-130.
10.1145/1514274.1514293 -
2008. Chattering Laptops. In Proceedings of the 8th international symposium on Privacy Enhancing Technologies (PETS ’08) (). , 167-186.
10.1007/978-3-540-70630-4_11