Juha Häikiö

20072018
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Juha Häikiö is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 18 Similar Profiles
Data privacy Engineering & Materials Science
Authentication Engineering & Materials Science
Mobile devices Engineering & Materials Science
Retail stores Engineering & Materials Science
User Authentication Mathematics
Data visualization Engineering & Materials Science
User interfaces Engineering & Materials Science
Animation Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2007 2018

Mobile gaming in gyms - Can fitness and games join together?

Siira, E., Häikiö, J. & Annanperä, E., 29 Jun 2018, 2018 IEEE 6th International Conference on Serious Games and Applications for Health, SeGAH 2018. Institute of Electrical and Electronic Engineers IEEE, p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

personal data
Data privacy
fitness
Equipment and Supplies
trend
1 Citation (Scopus)

Engaging Patients, Empowering Doctors in Digitalization of Healthcare: Rich Data in Policy Decision-Making

Iivari, M., Gomes, J., Pikkarainen, M., Häikiö, J. & Ylén, P., 1 Jan 2017, Proceedings of the ISPIM 2017. Klimenko, S., Huang, Z., Wang, H., Zhang, Y., Aickelin, U., Zhou, R. & Siuly, S. (eds.). International Society for Professional Innovation Management ISPIM, p. 40-44 5 p. (Lecture Notes in Computer Science, Vol. 10594 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Data privacy
Data visualization
Healthcare
Decision making
Decision Making
5 Citations (Scopus)

Evaluation of user authentication methods in the gadget-free world

Halunen, K., Häikiö, J. & Vallivaara, V., 1 Sep 2017, In : Pervasive and Mobile Computing. 40, p. 220-241 22 p.

Research output: Contribution to journalArticleScientificpeer-review

User Authentication
Authentication
Evaluation
Requirements
Usability
2 Citations (Scopus)

N-Auth: Mobile authentication done right

Peeters, R., Hermans, J., Maene, P., Grenman, K., Halunen, K. & Häikiö, J., 4 Dec 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery ACM, Vol. Part F132521. p. 1-15 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Authentication
Mobile devices
Data privacy
Human computer interaction
Application programs