Abstract
We investigate the use of 2 tagging technologies: Near Field Communication (NFC) and 2-dimensional barcodes. Our investigation combined a field trial and interview based study with an experimental evaluation. The field trial focused on users’ experience of the usability of NFC for a range of trial services, users’ perceptions of NFC use in their daily life context, and users’ suggestions for potential applications of NFC. The tags were embedded in a variety of postcards, table-top signs and posters. The experimental evaluation compared the ease of use of NFC and 2D barcodes, operationalised in terms of time taken to read a specified sequence of tags on posters. We found that for untrained users the 2D barcodes were quicker to use than the NFC tags but that training significantly improved users’ performance with the NFC tags while having no effect on their performance with the barcodes.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: an overview of problems and proposed solutions. IEEE Security & Privacy 3(3), 34–43 (2005)
Günther, O., Spiekermann, S.: RFID and the perception of control: the consumer’s view. Commun. ACM 48(9), 73–76 (2005)
Hillier, B., Shu, S.: Crime and urban layout: the need for evidence. In: Ballityne, S., Pease, K., McLaren, V. (eds.) Secure foundations: key issues in crime prevention, crime reduction and community safety, IPPR, London (2000)
Kindberg, T., O’Hara, K.: “You are here” – experiences with located systems. HP Labs Technical Report HPL-2006-120 (2006), http://www.hpl.hp.com/techreports/2006/HPL-2006-120.pdf
Kostakos, V., O’Neill, E., Shahi, A.: Building common ground for face to face interactions by sharing mobile device context. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 222–238. Springer, Heidelberg (2006)
Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID privacy issues and technical challenges. Commun. ACM 48(9), 66–71 (2005)
Patel, S.N., et al.: Farther than you think: an empirical investigation of the proximity of users to their mobile phones. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 123–140. Springer, Heidelberg (2006)
Pering, T., Ballagas, R., Want, R.: Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM 48(9), 53–59 (2005)
Riekki, J., Salminen, T., Alakarppa, I.: Requesting pervasive services by touching RFID tags. IEEE Pervasive Computing 5(1), 40–46 (2006)
Rukzio, E., et al.: An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, pp. 87–104. Springer, Heidelberg (2006)
Scott, D., et al.: Using visual tags to bypass Bluetooth device discovery. SIGMOBILE Mob. Comput. Commun. Rev. 9(1), 41–53 (2005)
Toye, E., et al.: Using smart phones to access site-specific services. IEEE Pervasive Computing 4(2), 60–66 (2005)
Want, R.: An introduction to RFID technology. IEEE Pervasive Computing, 25-33 (Jan.-Mar. 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
O’Neill, E., Thompson, P., Garzonis, S., Warr, A. (2007). Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds) Pervasive Computing. Pervasive 2007. Lecture Notes in Computer Science, vol 4480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72037-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-72037-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72036-2
Online ISBN: 978-3-540-72037-9
eBook Packages: Computer ScienceComputer Science (R0)