Skip to main content

Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices

  • Conference paper
Pervasive Computing (Pervasive 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4480))

Included in the following conference series:

Abstract

We investigate the use of 2 tagging technologies: Near Field Communication (NFC) and 2-dimensional barcodes. Our investigation combined a field trial and interview based study with an experimental evaluation. The field trial focused on users’ experience of the usability of NFC for a range of trial services, users’ perceptions of NFC use in their daily life context, and users’ suggestions for potential applications of NFC. The tags were embedded in a variety of postcards, table-top signs and posters. The experimental evaluation compared the ease of use of NFC and 2D barcodes, operationalised in terms of time taken to read a specified sequence of tags on posters. We found that for untrained users the 2D barcodes were quicker to use than the NFC tags but that training significantly improved users’ performance with the NFC tags while having no effect on their performance with the barcodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: an overview of problems and proposed solutions. IEEE Security & Privacy 3(3), 34–43 (2005)

    Article  Google Scholar 

  2. Günther, O., Spiekermann, S.: RFID and the perception of control: the consumer’s view. Commun. ACM 48(9), 73–76 (2005)

    Article  Google Scholar 

  3. Hillier, B., Shu, S.: Crime and urban layout: the need for evidence. In: Ballityne, S., Pease, K., McLaren, V. (eds.) Secure foundations: key issues in crime prevention, crime reduction and community safety, IPPR, London (2000)

    Google Scholar 

  4. Kindberg, T., O’Hara, K.: “You are here” – experiences with located systems. HP Labs Technical Report HPL-2006-120 (2006), http://www.hpl.hp.com/techreports/2006/HPL-2006-120.pdf

  5. Kostakos, V., O’Neill, E., Shahi, A.: Building common ground for face to face interactions by sharing mobile device context. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 222–238. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID privacy issues and technical challenges. Commun. ACM 48(9), 66–71 (2005)

    Article  Google Scholar 

  7. Patel, S.N., et al.: Farther than you think: an empirical investigation of the proximity of users to their mobile phones. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 123–140. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Pering, T., Ballagas, R., Want, R.: Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM 48(9), 53–59 (2005)

    Article  Google Scholar 

  9. Riekki, J., Salminen, T., Alakarppa, I.: Requesting pervasive services by touching RFID tags. IEEE Pervasive Computing 5(1), 40–46 (2006)

    Article  Google Scholar 

  10. Rukzio, E., et al.: An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 87–104. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Scott, D., et al.: Using visual tags to bypass Bluetooth device discovery. SIGMOBILE Mob. Comput. Commun. Rev. 9(1), 41–53 (2005)

    Article  Google Scholar 

  12. Toye, E., et al.: Using smart phones to access site-specific services. IEEE Pervasive Computing 4(2), 60–66 (2005)

    Article  Google Scholar 

  13. Want, R.: An introduction to RFID technology. IEEE Pervasive Computing, 25-33 (Jan.-Mar. 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Anthony LaMarca Marc Langheinrich Khai N. Truong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

O’Neill, E., Thompson, P., Garzonis, S., Warr, A. (2007). Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds) Pervasive Computing. Pervasive 2007. Lecture Notes in Computer Science, vol 4480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72037-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72037-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72036-2

  • Online ISBN: 978-3-540-72037-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics