NFC Device: Project Closure Report
VerifiedAdded on 2023/06/03
|5
|3393
|342
AI Summary
This closure report evaluates the findings of the previous phases of the NFC device project, including its success and failure, business applications, and future prospects. It also discusses the evaluation method and achievement of the project. The report highlights the importance of documentation, specifications, and data security in NFC devices. It concludes with resolutions to mitigate risks and improve the success criteria of NFC-enabled devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NFC Device: Project Closure Report
First Author Name (Blank if Blind Review)
University Name
ABSTRACT
The main determination of this closure report is to focus
on the success and failure of the project. The
effectiveness and usability of the findings of this project
is evaluated with the use of this report. All the future
prospects of NFC device are mentioned in this report.
The report will help in understanding the issues and
challenges related to this device and also provide a risk
mitigation step for those issues. This closure project will
help the readers of this document to have an overall
perception about this device. The main determination of
this device which are stated in the earlier projects
related to this project are justified in this report. This
report will provide in depth knowledge about the
business applications of this report. The report is based
on both the functionalities of the internal and external
stakeholders of the business organization which deals
with these kinds of devices. The resources used in the
project will be evaluated in this report along with the
impact of the changes. All the key issues and related
information will be provided in this closure report in a
professional manner.
Author Keywords
NFC, Internal and External stakeholders; success criteria.
INTRODUCTION
The prime objective of this closure report is to evaluate the
findings of the previous phases of the project. The Near
Field Communication devices which are actively used in
the communication and electronic industry are very useful
for their business purpose as it is effective to establish a
communication by bringing them with in a limited distance.
Form the previous projects it can be understood that this
device may be defined as the short range wireless
connectivity standard. The paper will focus on the different
aspects of the NFC enabled devices which is an important
for its worldwide acceptance [1]. The key features of a NFC
enabled devices are discussed in this paper with prior
importance [3]. Different extra specifications are always
added in the existing NFC devices such as the card
emulation mode.
EVALUATION METHOD
As every task has some set goals, Heuristic evaluation
method also has some predefined goals. At first, the idea is
to surf through the entire User Interface of the website for
the organization Gates N Fences and check for the smooth
experience of user by checking it through numerous users
many a times (Gates.itcstore.com, 2018). The user data also
needs to be recorded so that all the users surfing through the
website could jot down the entire surfing experience in
details.
Since, Heuristic approach to the evaluation of a website
relies entirely on the user interface it is essential that all the
aspects of the website UI needs to checked thoroughly. The
images used with border in alignment with the font of the
website needs to be checked for consistency. It is also
essential to check the images in the website are relevant
according to the links used and the entire content of the
website (Jimenez, Lozada & Rosas, 2016). Checking the
fonts should be a priority as UI design relies mostly on the
consistency levels. Redirection from one page to another
need to be consistent or the website can be treated as a low
quality one. The borders, margin and padding should be
checked for unswerving surfing and the website evaluation
in heuristic method must be done for checking the ease of
use on the user end.
ACHIEVEMENT OF THE PROJECT
The projects help in acknowledging the fact that these
devices use magnetic field induction to enable
communication between devices when are within a short
distance with each other. The previous projects of this
assignment help in understanding the usefulness of this
device during the online payment systems such as Apple
Pay, Google wallet and Pay Tm. The other essential data
related to this device is the use of the NFC tags. The
application of the NFC device is not only restricted to smart
phones but also to other kinds of devices such as the
electronic media. The extensive use of the NFC device in
the cultural industry and communication industry is
specified in this report. The NFC devices are also used in
the politics are public administration.
The other type of achievement of this near field
communication is the application of the NFC devices in
contactless payment systems. It can be also found that this
device can also be used as an alternative to the credit cards
and electronic ticket standards. The application of NFC
devices is increasing in the different types of social media
websites. The previous phases of the projects help us to
evaluate the use of NFC as the identification documents.
With the help of this device different kinds of data can be
transmitted from one device to another device. The other
phases of the projects also help the readers of this document
to understand the impact of radio frequency identification
technology [2]. The vulnerabilities associated with the NFC
can be understood with the help of the previous projects of
this topic. The importance of maintaining the standards of
1
First Author Name (Blank if Blind Review)
University Name
ABSTRACT
The main determination of this closure report is to focus
on the success and failure of the project. The
effectiveness and usability of the findings of this project
is evaluated with the use of this report. All the future
prospects of NFC device are mentioned in this report.
The report will help in understanding the issues and
challenges related to this device and also provide a risk
mitigation step for those issues. This closure project will
help the readers of this document to have an overall
perception about this device. The main determination of
this device which are stated in the earlier projects
related to this project are justified in this report. This
report will provide in depth knowledge about the
business applications of this report. The report is based
on both the functionalities of the internal and external
stakeholders of the business organization which deals
with these kinds of devices. The resources used in the
project will be evaluated in this report along with the
impact of the changes. All the key issues and related
information will be provided in this closure report in a
professional manner.
Author Keywords
NFC, Internal and External stakeholders; success criteria.
INTRODUCTION
The prime objective of this closure report is to evaluate the
findings of the previous phases of the project. The Near
Field Communication devices which are actively used in
the communication and electronic industry are very useful
for their business purpose as it is effective to establish a
communication by bringing them with in a limited distance.
Form the previous projects it can be understood that this
device may be defined as the short range wireless
connectivity standard. The paper will focus on the different
aspects of the NFC enabled devices which is an important
for its worldwide acceptance [1]. The key features of a NFC
enabled devices are discussed in this paper with prior
importance [3]. Different extra specifications are always
added in the existing NFC devices such as the card
emulation mode.
EVALUATION METHOD
As every task has some set goals, Heuristic evaluation
method also has some predefined goals. At first, the idea is
to surf through the entire User Interface of the website for
the organization Gates N Fences and check for the smooth
experience of user by checking it through numerous users
many a times (Gates.itcstore.com, 2018). The user data also
needs to be recorded so that all the users surfing through the
website could jot down the entire surfing experience in
details.
Since, Heuristic approach to the evaluation of a website
relies entirely on the user interface it is essential that all the
aspects of the website UI needs to checked thoroughly. The
images used with border in alignment with the font of the
website needs to be checked for consistency. It is also
essential to check the images in the website are relevant
according to the links used and the entire content of the
website (Jimenez, Lozada & Rosas, 2016). Checking the
fonts should be a priority as UI design relies mostly on the
consistency levels. Redirection from one page to another
need to be consistent or the website can be treated as a low
quality one. The borders, margin and padding should be
checked for unswerving surfing and the website evaluation
in heuristic method must be done for checking the ease of
use on the user end.
ACHIEVEMENT OF THE PROJECT
The projects help in acknowledging the fact that these
devices use magnetic field induction to enable
communication between devices when are within a short
distance with each other. The previous projects of this
assignment help in understanding the usefulness of this
device during the online payment systems such as Apple
Pay, Google wallet and Pay Tm. The other essential data
related to this device is the use of the NFC tags. The
application of the NFC device is not only restricted to smart
phones but also to other kinds of devices such as the
electronic media. The extensive use of the NFC device in
the cultural industry and communication industry is
specified in this report. The NFC devices are also used in
the politics are public administration.
The other type of achievement of this near field
communication is the application of the NFC devices in
contactless payment systems. It can be also found that this
device can also be used as an alternative to the credit cards
and electronic ticket standards. The application of NFC
devices is increasing in the different types of social media
websites. The previous phases of the projects help us to
evaluate the use of NFC as the identification documents.
With the help of this device different kinds of data can be
transmitted from one device to another device. The other
phases of the projects also help the readers of this document
to understand the impact of radio frequency identification
technology [2]. The vulnerabilities associated with the NFC
can be understood with the help of the previous projects of
this topic. The importance of maintaining the standards of
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the NFC communication protocols is also mentioned in
these previous projects.
However, it can be said the achievement of this kinds of
devices depends very much on the collaboration of the
other corporations as the compatibility issues are one of the
most important issues related to this technology [4]. The
SIM card based NFC service was discarded in the first
place due to different kinds of issues but the research teams
who are working on the development of the NFC
technology ensured that an alternative solution will
provided soon. There were too many complexities in those
devices.
PERFORMANCE AGAINST ORIGINAL SCHEDULE
The performance of the near field communication devices is
considered with the help of specific standards such as the
accuracy and effectiveness of the device, completeness of
the desired results, speed of the working principals of the
new device and the different types of costs in incorporation
and maintenance of the device. The performance of the
NFC applications can be broadly classified into three
categories such as the Touch and go, touch and connect and
touch and confirm these features are the modified versions
of the new NFC enabled devices [5]. The development of
these applications took little more time than expected and it
is very much important in optimizing the key requirements
of a NFC enabled device. The wide range of applications
leads to the use of NFC device in railways stations, airport,
vehicle, office, and store restaurant and theatre stadium.
PERFORMANCE AGAINST ORIGINAL FORECAST
COSTS & RESOURCES
The estimated cost and resources used in the effective
utilization of an NFC enabled device is the prime
determination of this unit of this report [7]. The probability
of the different types of risks such as the improper design,
infrastructural costs, tag determination are one of the most
vital vulnerabilities associated with this project. As stated in
the previous assignments this device would take around 90
workings days to be fully completed. Since the device
involves different sub categories which are very complex in
their structure [8]. Feasibility test and other kinds of
performance tests are performed on the device before
proceeding to the next phase of the development so it may
get delayed. The resources used in this device will be very
much significant in the productions unit. The management
of the different aspects of a NFC device is one of the most
important challenges of the production units of the NFC
devices [9]. Changes in the communication plan are also a
very significant factor regarding this project.
Documentation is one of the most important aspects related
to this technology as it helps us to understand the
specifications of this device in a more professional manner.
IMPACT OF APPROVED CHANGES & RAISED
EXCEPTIONS
The extensive development in the field of NFC technology
will be very much impact for both personal and business
use. The impact of this technology is huge in terms of
communication and transmission of data. This powerful
wireless connection between one or more than one devices
can be very much efficient for two systems which are
places closed to each other. The changes which are brought
after the applications of this system are very much
significant and effective on the users. The growth in the
field of NFC technology has led to the growth and
improvement of new specifications such as the launching
applications, Wi-Fi sharing, file transfer and setting of
alarms.
NFC WI-FI sharing application: The features of this
application are very much useful in our daily life and also
prove the success of this device and its technology. With
the help of this application sharing of long and complicated
WI-FI passwords are not needed instead of that users can
install this WI-FI sharing application on their mobile
phones and connect the two systems.
NFC application launchers: The prime objective of the NFC
application launchers is the creation of the tags which
performs their action whenever an NFC enabled device
comes into proximity.
NFC File Transfer applications: Essential data can be
transferred from one device to another with the help of the
NFC file transfer applications. This feature is enabled in all
the online payment techniques which are popular in every
part of the world.
NFC Writing applications: The prime objective of this
writing application is to write data to unlocked NFC tag.
One of the most widely used NFC writing applications is
Tagstand’s program. The chief advantage of this application
is that it is very much user friendly and have a great user
interface.
SUMMARY OF KEY FINDINGS AND RESOLUTION
The different types of phases of implementation of the NFC
device are a considerable reason behind the success and the
failure of the project [10]. Each of the phases should be
properly understood before implementing them on a
working environment. The key areas where improvement is
needed are the initiation phase, planning phase, designing
phase, implementation phase, testing phase and the closure
phase. The establishment of the charter is one of the most
important aspects of the NFC device [11]. The people who
are in charge of implementing this device in a business
environment or any other kinds of environments should be
fully aware of the key challenges and issues related to this
device [13]. Efficient resource planning is one of the most
important criteria of the NFC device. The financial plan
involved in the incorporation of the NFC device should be
2
these previous projects.
However, it can be said the achievement of this kinds of
devices depends very much on the collaboration of the
other corporations as the compatibility issues are one of the
most important issues related to this technology [4]. The
SIM card based NFC service was discarded in the first
place due to different kinds of issues but the research teams
who are working on the development of the NFC
technology ensured that an alternative solution will
provided soon. There were too many complexities in those
devices.
PERFORMANCE AGAINST ORIGINAL SCHEDULE
The performance of the near field communication devices is
considered with the help of specific standards such as the
accuracy and effectiveness of the device, completeness of
the desired results, speed of the working principals of the
new device and the different types of costs in incorporation
and maintenance of the device. The performance of the
NFC applications can be broadly classified into three
categories such as the Touch and go, touch and connect and
touch and confirm these features are the modified versions
of the new NFC enabled devices [5]. The development of
these applications took little more time than expected and it
is very much important in optimizing the key requirements
of a NFC enabled device. The wide range of applications
leads to the use of NFC device in railways stations, airport,
vehicle, office, and store restaurant and theatre stadium.
PERFORMANCE AGAINST ORIGINAL FORECAST
COSTS & RESOURCES
The estimated cost and resources used in the effective
utilization of an NFC enabled device is the prime
determination of this unit of this report [7]. The probability
of the different types of risks such as the improper design,
infrastructural costs, tag determination are one of the most
vital vulnerabilities associated with this project. As stated in
the previous assignments this device would take around 90
workings days to be fully completed. Since the device
involves different sub categories which are very complex in
their structure [8]. Feasibility test and other kinds of
performance tests are performed on the device before
proceeding to the next phase of the development so it may
get delayed. The resources used in this device will be very
much significant in the productions unit. The management
of the different aspects of a NFC device is one of the most
important challenges of the production units of the NFC
devices [9]. Changes in the communication plan are also a
very significant factor regarding this project.
Documentation is one of the most important aspects related
to this technology as it helps us to understand the
specifications of this device in a more professional manner.
IMPACT OF APPROVED CHANGES & RAISED
EXCEPTIONS
The extensive development in the field of NFC technology
will be very much impact for both personal and business
use. The impact of this technology is huge in terms of
communication and transmission of data. This powerful
wireless connection between one or more than one devices
can be very much efficient for two systems which are
places closed to each other. The changes which are brought
after the applications of this system are very much
significant and effective on the users. The growth in the
field of NFC technology has led to the growth and
improvement of new specifications such as the launching
applications, Wi-Fi sharing, file transfer and setting of
alarms.
NFC WI-FI sharing application: The features of this
application are very much useful in our daily life and also
prove the success of this device and its technology. With
the help of this application sharing of long and complicated
WI-FI passwords are not needed instead of that users can
install this WI-FI sharing application on their mobile
phones and connect the two systems.
NFC application launchers: The prime objective of the NFC
application launchers is the creation of the tags which
performs their action whenever an NFC enabled device
comes into proximity.
NFC File Transfer applications: Essential data can be
transferred from one device to another with the help of the
NFC file transfer applications. This feature is enabled in all
the online payment techniques which are popular in every
part of the world.
NFC Writing applications: The prime objective of this
writing application is to write data to unlocked NFC tag.
One of the most widely used NFC writing applications is
Tagstand’s program. The chief advantage of this application
is that it is very much user friendly and have a great user
interface.
SUMMARY OF KEY FINDINGS AND RESOLUTION
The different types of phases of implementation of the NFC
device are a considerable reason behind the success and the
failure of the project [10]. Each of the phases should be
properly understood before implementing them on a
working environment. The key areas where improvement is
needed are the initiation phase, planning phase, designing
phase, implementation phase, testing phase and the closure
phase. The establishment of the charter is one of the most
important aspects of the NFC device [11]. The people who
are in charge of implementing this device in a business
environment or any other kinds of environments should be
fully aware of the key challenges and issues related to this
device [13]. Efficient resource planning is one of the most
important criteria of the NFC device. The financial plan
involved in the incorporation of the NFC device should be
2
materialized with the help of experienced system experts
who knows both the advantages and limitations of this
technology.
The other issues related with this device are the
vulnerabilities and risks associated with the NFC such as
the Eaves dropping, data corruption and manipulation. The
interception attacks are the other kinds of major threat
associated with the NFC technology [12]. The security
breaches have the capability of having a direct negative
impact on the growth and productivity of the users of the
NFC devices. The previous projects of this topic help in
understanding the importance of the data security. The
entire working principal of this device is connection
oriented which can be a source of concern for the users of
the NFC devices as any kind of network related issues can
have a harmful impact on the users.
Resolutions should be taken so that key issues such as data
tampering can be avoided which is one of the prime risks
associated with this device [14]. The interference of the
malicious programs is the other source of concern in a NFC
enabled device. The success criteria of the NFC enabled
should be considered along with the data interception. Data
interception is the other reason behind the security concerns
of this device. Data interception mainly occurs when an
unknown malicious user intercepts the data between the two
NFC enabled users. These kinds of attacks are also called
man in the middle attacks [15]. Eavesdropping is the other
kinds of security challenges involved with the wide
application of a NFC enabled device. This security concern
involves alteration of essential data where the modified or
the incorrect data are sent to the receiver which can cause
huge personal and business loss. Encryption or the use of a
secure communication channel is the risk mitigation steps
of the NFC enabled devices. The download of the unwanted
applications is the other source of security concerns in the
NFC enabled device, these harmful applications can extract
essential information related to the users and a very
negative impact on the users of the NFC enabled device.
FUTURE SCOPE OF NFC
The extensive growth in the field of NFC technology has
led to the growth and development of the different new
features of NFC. The application of NFC is not only
restricted to transfer of data and online payments. They are
restricted to transfer of data and online payments. The
application of the advances specifications of NFC are seen
in the winter Olympics when Visa and Samsung partnered
to create NFC compatible smart phones. Those devices
were used in the transactions with in the sports Olympics.
The growth of the NFC technology is increasing every day
like the other types of technologies [18]. The new
applications and services provided by this device is very
much useful to understand the success criteria of the.
Specifications are the main reasons behind the success rate
of different business organization. Customer satisfaction is
widely improved after the application of this technology
[17]. Data encryption provide more security to the data
which are transmitted from one device to another device.
CONCLUSION
From this above closure report it can be understood that the
application of the NFC devices can significant project. The
communication and data transfer problem of the retail
industry as well other kinds of industries can be
purposefully solved with the help of the NFC technology.
The reduction in expenses are important signal that this
technology has more advantages than limitations. Efficient
project management techniques can be used to mitigate the
issues in the production units of the NFC devices.
Contactless transformations are very much an aspect of a
NFC enabled device [19]. The wide range of application of
the advances specifications of NFC are seen in the winter
Olympics when Visa and Samsung partnered to create NFC
compatible smart phones [20]. Those devices were used in
the transactions with in the sports Olympics
REFERENCES
[1] Alan, Ufuk Demir, and Derya Birant. "Server-Based
Intelligent Public Transportation System with
NFC." IEEE Intelligent Transportation Systems
Magazine 10.1 (2018): 30-46.
[2] Al-Haj, Ali, and Mayyadah Adnan Al-Tameemi.
"Providing security for NFC-based payment
systems using a management authentication
server." 2018 4th International Conference on
Information Management (ICIM). IEEE, 2018.
[3] Badra, Mohamad, and Rouba Borghol Badra. "A
lightweight security protocol for NFC-based
mobile payments." Procedia Computer Science 83
(2016): 705-711.
[4] Dahlberg, Tomi, Jie Guo, and Jan Ondrus. "A critical
review of mobile payment research." Electronic
Commerce Research and Applications 14.5
(2015): 265-284.
[5] de Reuver, Mark, et al. "Collective action for mobile
payment platforms: A case study on collaboration
issues between banks and telecom operators."
Electronic Commerce Research and Applications
14.5 (2015): 331-344.
[6] Di Pietro, L., et al. "The integrated model on mobile
payment acceptance (IMMPA): An empirical
application to public transport." Transportation
Research Part C: Emerging Technologies 56
(2015): 463-479.
3
who knows both the advantages and limitations of this
technology.
The other issues related with this device are the
vulnerabilities and risks associated with the NFC such as
the Eaves dropping, data corruption and manipulation. The
interception attacks are the other kinds of major threat
associated with the NFC technology [12]. The security
breaches have the capability of having a direct negative
impact on the growth and productivity of the users of the
NFC devices. The previous projects of this topic help in
understanding the importance of the data security. The
entire working principal of this device is connection
oriented which can be a source of concern for the users of
the NFC devices as any kind of network related issues can
have a harmful impact on the users.
Resolutions should be taken so that key issues such as data
tampering can be avoided which is one of the prime risks
associated with this device [14]. The interference of the
malicious programs is the other source of concern in a NFC
enabled device. The success criteria of the NFC enabled
should be considered along with the data interception. Data
interception is the other reason behind the security concerns
of this device. Data interception mainly occurs when an
unknown malicious user intercepts the data between the two
NFC enabled users. These kinds of attacks are also called
man in the middle attacks [15]. Eavesdropping is the other
kinds of security challenges involved with the wide
application of a NFC enabled device. This security concern
involves alteration of essential data where the modified or
the incorrect data are sent to the receiver which can cause
huge personal and business loss. Encryption or the use of a
secure communication channel is the risk mitigation steps
of the NFC enabled devices. The download of the unwanted
applications is the other source of security concerns in the
NFC enabled device, these harmful applications can extract
essential information related to the users and a very
negative impact on the users of the NFC enabled device.
FUTURE SCOPE OF NFC
The extensive growth in the field of NFC technology has
led to the growth and development of the different new
features of NFC. The application of NFC is not only
restricted to transfer of data and online payments. They are
restricted to transfer of data and online payments. The
application of the advances specifications of NFC are seen
in the winter Olympics when Visa and Samsung partnered
to create NFC compatible smart phones. Those devices
were used in the transactions with in the sports Olympics.
The growth of the NFC technology is increasing every day
like the other types of technologies [18]. The new
applications and services provided by this device is very
much useful to understand the success criteria of the.
Specifications are the main reasons behind the success rate
of different business organization. Customer satisfaction is
widely improved after the application of this technology
[17]. Data encryption provide more security to the data
which are transmitted from one device to another device.
CONCLUSION
From this above closure report it can be understood that the
application of the NFC devices can significant project. The
communication and data transfer problem of the retail
industry as well other kinds of industries can be
purposefully solved with the help of the NFC technology.
The reduction in expenses are important signal that this
technology has more advantages than limitations. Efficient
project management techniques can be used to mitigate the
issues in the production units of the NFC devices.
Contactless transformations are very much an aspect of a
NFC enabled device [19]. The wide range of application of
the advances specifications of NFC are seen in the winter
Olympics when Visa and Samsung partnered to create NFC
compatible smart phones [20]. Those devices were used in
the transactions with in the sports Olympics
REFERENCES
[1] Alan, Ufuk Demir, and Derya Birant. "Server-Based
Intelligent Public Transportation System with
NFC." IEEE Intelligent Transportation Systems
Magazine 10.1 (2018): 30-46.
[2] Al-Haj, Ali, and Mayyadah Adnan Al-Tameemi.
"Providing security for NFC-based payment
systems using a management authentication
server." 2018 4th International Conference on
Information Management (ICIM). IEEE, 2018.
[3] Badra, Mohamad, and Rouba Borghol Badra. "A
lightweight security protocol for NFC-based
mobile payments." Procedia Computer Science 83
(2016): 705-711.
[4] Dahlberg, Tomi, Jie Guo, and Jan Ondrus. "A critical
review of mobile payment research." Electronic
Commerce Research and Applications 14.5
(2015): 265-284.
[5] de Reuver, Mark, et al. "Collective action for mobile
payment platforms: A case study on collaboration
issues between banks and telecom operators."
Electronic Commerce Research and Applications
14.5 (2015): 331-344.
[6] Di Pietro, L., et al. "The integrated model on mobile
payment acceptance (IMMPA): An empirical
application to public transport." Transportation
Research Part C: Emerging Technologies 56
(2015): 463-479.
3
[7] Ferreira, Marta Campos, et al. "Evaluation of an
integrated mobile payment, ticketing and
couponing solution based on NFC." New
Perspectives in Information Systems and
Technologies, Volume 2. Springer, Cham, 2014.
165-174.
[8] Gerpott, Torsten J., and Phil Meinert. "Who signs up for
NFC mobile payment services? Mobile network
operator subscribers in Germany." Electronic
Commerce Research and Applications 23 (2017):
1-13.
[9] Kamoun, Faouzi. "Towards a Typology of Business
Models for NFC-Based Mobile Payment
Services." Encyclopedia of E-Commerce
Development, Implementation, and Management.
IGI Global, 2016. 87-99.
[10] Kamoun, Faouzi. "Towards a Typology of Business
Models for NFC-Based Mobile Payment
Services." Encyclopedia of E-Commerce
Development, Implementation, and Management.
IGI Global, 2016. 87-99.
[11] Khalilzadeh, Jalayer, Ahmet Bulent Ozturk, and Anil
Bilgihan. "Security-related factors in extended
UTAUT model for NFC based mobile payment in
the restaurant industry." Computers in Human
Behavior 70 (2017): 460-474.
[12] Madureira, António. "Factors that hinder the success of
SIM-based mobile NFC service deployments."
Telematics and Informatics 34.1 (2017): 133-150.
[13] Mohandes, Mohamed Ahmed. "Mobile technology for
socio-religious events: a case study of NFC
technology." IEEE Technology and Society
Magazine 34.1 (2015): 73-79.
[14] Oliveira, Tiago, et al. "Mobile payment:
Understanding the determinants of customer
adoption and intention to recommend the
technology." Computers in Human Behavior 61
(2016): 404-414.
[15] Palumbo, Federica, and Gandolfo Dominici.
"Unraveling the complexity of tourist experience
with NFC technology and mobile wallets." Chaos,
Complexity and Leadership 2013. Springer, Cham,
2015. 189-196.
[16] Rajesh, G. P., et al. "Near field application: NFC smart
notice board." Wireless and Optical
Communications Networks (WOCN), 2016
Thirteenth International Conference on. IEEE,
2016.
[17] Ramos-de-Luna, Iviane, Francisco Montoro-Ríos, and
Francisco Liébana-Cabanillas. "Determinants of
the intention to use NFC technology as a payment
system: an acceptance model approach."
Information Systems and e-business Management
14.2 (2016): 293-314.
[18] Stopka, Ulrike, Gertraud Schäfer, and Andreas Kreisel.
"NFC-Enabled eTicketing in Public Transport–
Aims, Approaches and First Results of the
OPTIMOS Project." International Conference on
Human-Computer Interaction. Springer, Cham,
2017.
[19] Tojib, Dewi, Yelena Tsarenko, and Agung Y.
Sembada. "The facilitating role of smartphones in
increasing use of value-added mobile services."
new media & society 17.8 (2015): 1220-1240.
[20] Wen, Xiaoli, et al. "Network Recharge Platform for
Public Transport Smart Card Based on Mobile
Devices." 2016 International Conference on
Advances in Energy, Environment and Chemical
Engineering (AEECE). 2016.
4
integrated mobile payment, ticketing and
couponing solution based on NFC." New
Perspectives in Information Systems and
Technologies, Volume 2. Springer, Cham, 2014.
165-174.
[8] Gerpott, Torsten J., and Phil Meinert. "Who signs up for
NFC mobile payment services? Mobile network
operator subscribers in Germany." Electronic
Commerce Research and Applications 23 (2017):
1-13.
[9] Kamoun, Faouzi. "Towards a Typology of Business
Models for NFC-Based Mobile Payment
Services." Encyclopedia of E-Commerce
Development, Implementation, and Management.
IGI Global, 2016. 87-99.
[10] Kamoun, Faouzi. "Towards a Typology of Business
Models for NFC-Based Mobile Payment
Services." Encyclopedia of E-Commerce
Development, Implementation, and Management.
IGI Global, 2016. 87-99.
[11] Khalilzadeh, Jalayer, Ahmet Bulent Ozturk, and Anil
Bilgihan. "Security-related factors in extended
UTAUT model for NFC based mobile payment in
the restaurant industry." Computers in Human
Behavior 70 (2017): 460-474.
[12] Madureira, António. "Factors that hinder the success of
SIM-based mobile NFC service deployments."
Telematics and Informatics 34.1 (2017): 133-150.
[13] Mohandes, Mohamed Ahmed. "Mobile technology for
socio-religious events: a case study of NFC
technology." IEEE Technology and Society
Magazine 34.1 (2015): 73-79.
[14] Oliveira, Tiago, et al. "Mobile payment:
Understanding the determinants of customer
adoption and intention to recommend the
technology." Computers in Human Behavior 61
(2016): 404-414.
[15] Palumbo, Federica, and Gandolfo Dominici.
"Unraveling the complexity of tourist experience
with NFC technology and mobile wallets." Chaos,
Complexity and Leadership 2013. Springer, Cham,
2015. 189-196.
[16] Rajesh, G. P., et al. "Near field application: NFC smart
notice board." Wireless and Optical
Communications Networks (WOCN), 2016
Thirteenth International Conference on. IEEE,
2016.
[17] Ramos-de-Luna, Iviane, Francisco Montoro-Ríos, and
Francisco Liébana-Cabanillas. "Determinants of
the intention to use NFC technology as a payment
system: an acceptance model approach."
Information Systems and e-business Management
14.2 (2016): 293-314.
[18] Stopka, Ulrike, Gertraud Schäfer, and Andreas Kreisel.
"NFC-Enabled eTicketing in Public Transport–
Aims, Approaches and First Results of the
OPTIMOS Project." International Conference on
Human-Computer Interaction. Springer, Cham,
2017.
[19] Tojib, Dewi, Yelena Tsarenko, and Agung Y.
Sembada. "The facilitating role of smartphones in
increasing use of value-added mobile services."
new media & society 17.8 (2015): 1220-1240.
[20] Wen, Xiaoli, et al. "Network Recharge Platform for
Public Transport Smart Card Based on Mobile
Devices." 2016 International Conference on
Advances in Energy, Environment and Chemical
Engineering (AEECE). 2016.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.