Advertisement

Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices

  • Eamonn O’Neill
  • Peter Thompson
  • Stavros Garzonis
  • Andrew Warr
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4480)

Abstract

We investigate the use of 2 tagging technologies: Near Field Communication (NFC) and 2-dimensional barcodes. Our investigation combined a field trial and interview based study with an experimental evaluation. The field trial focused on users’ experience of the usability of NFC for a range of trial services, users’ perceptions of NFC use in their daily life context, and users’ suggestions for potential applications of NFC. The tags were embedded in a variety of postcards, table-top signs and posters. The experimental evaluation compared the ease of use of NFC and 2D barcodes, operationalised in terms of time taken to read a specified sequence of tags on posters. We found that for untrained users the 2D barcodes were quicker to use than the NFC tags but that training significantly improved users’ performance with the NFC tags while having no effect on their performance with the barcodes.

Keywords

Mobile Phone Service Discovery Near Field Communication Untrained Participant Treasure Hunt 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: an overview of problems and proposed solutions. IEEE Security & Privacy 3(3), 34–43 (2005)CrossRefGoogle Scholar
  2. 2.
    Günther, O., Spiekermann, S.: RFID and the perception of control: the consumer’s view. Commun. ACM 48(9), 73–76 (2005)CrossRefGoogle Scholar
  3. 3.
    Hillier, B., Shu, S.: Crime and urban layout: the need for evidence. In: Ballityne, S., Pease, K., McLaren, V. (eds.) Secure foundations: key issues in crime prevention, crime reduction and community safety, IPPR, London (2000)Google Scholar
  4. 4.
    Kindberg, T., O’Hara, K.: “You are here” – experiences with located systems. HP Labs Technical Report HPL-2006-120 (2006), http://www.hpl.hp.com/techreports/2006/HPL-2006-120.pdf
  5. 5.
    Kostakos, V., O’Neill, E., Shahi, A.: Building common ground for face to face interactions by sharing mobile device context. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 222–238. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID privacy issues and technical challenges. Commun. ACM 48(9), 66–71 (2005)CrossRefGoogle Scholar
  7. 7.
    Patel, S.N., et al.: Farther than you think: an empirical investigation of the proximity of users to their mobile phones. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 123–140. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Pering, T., Ballagas, R., Want, R.: Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM 48(9), 53–59 (2005)CrossRefGoogle Scholar
  9. 9.
    Riekki, J., Salminen, T., Alakarppa, I.: Requesting pervasive services by touching RFID tags. IEEE Pervasive Computing 5(1), 40–46 (2006)CrossRefGoogle Scholar
  10. 10.
    Rukzio, E., et al.: An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 87–104. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Scott, D., et al.: Using visual tags to bypass Bluetooth device discovery. SIGMOBILE Mob. Comput. Commun. Rev. 9(1), 41–53 (2005)CrossRefGoogle Scholar
  12. 12.
    Toye, E., et al.: Using smart phones to access site-specific services. IEEE Pervasive Computing 4(2), 60–66 (2005)CrossRefGoogle Scholar
  13. 13.
    Want, R.: An introduction to RFID technology. IEEE Pervasive Computing, 25-33 (Jan.-Mar. 2006)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Eamonn O’Neill
    • 1
  • Peter Thompson
    • 2
  • Stavros Garzonis
    • 1
  • Andrew Warr
    • 1
  1. 1.Department of Computer Science, University of Bath, BA2 7AYUK
  2. 2.Vodafone Group R&D, Newbury, RG14 2FNUK

Personalised recommendations