234 research outputs found

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    Mobile learning and communication: educational change?; a systematic review

    Get PDF
    Purpose The authors of this research present a study on Mmobile learning (ML) and the communication processes that are generated in different educational and professional contexts through a systematic review. Design/methodology/approach This is descriptive research that analyzes a total of 201 results present in Web of Science and SCOPUS, with the criteria established by the PRISMA protocol, giving special relevance to the following categories: country of origin, date of publication, main objectives, methodological design, variables analyzed and considered, size and details of the samples; and their respective scientific contributions in relation to their area of research. Findings The results show significant methodological discrepancies with respect to the established criteria. Five blocks of action are apparent: technical issues, influence on learning, impact on satisfaction and motivation, impact on communicative processes and new forms of interaction. Originality/value The value of this research lies on offering a critical view based on an in-depth analysis of the existing scientific production between ML and communication in education

    TechNews digests: Jan - Mar 2010

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month

    Prospects of Mobile Search

    Get PDF
    Search faces (at least) two major challenges. One is to improve efficiency of retrieving relevant content for all digital formats (images, audio, video, 3D shapes, etc). The second is making relevant information retrievable in a range of platforms, particularly in high diffusion ones as mobiles. The two challenges are interrelated but distinct. This report aims at assessing the potential of future Mobile Search. Two broad groups of search-based applications can be identified. The first one is the adaptation and emulation of web search processes and services to the mobile environment. The second one is services exploiting the unique features of the mobile devices and the mobile environments. Examples of these context-aware services include location-based services or interfacing to the internet of things (RFID networks). The report starts by providing an introduction to mobile search. It highlights differences and commonalities with search technologies on other platforms (Chapter 1). Chapter 2 is devoted to the supply side of mobile search markets. It describes mobile markets, presents key figures and gives an outline of main business models and players. Chapter 3 is dedicated to the demand side of the market. It studies users¿ acceptance and demand using the results on a case study in Sweden. Chapter 4 presents emerging trends in technology and markets that could shape mobile search. It is the author's view after discussing with many experts. One input to this discussion was the analysis of on forward-looking scenarios for mobile developed by the authors (Chapter 5). Experts were asked to evaluate these scenarios. Another input was a questionnaire to which 61 experts responded. Drivers, barriers and enablers for mobile search have been synthesised into SWOT analysis. The report concludes with some policy recommendations in view of the likely socio-economic implications of mobile search in Europe.JRC.DG.J.4-Information Societ

    Investigation of the NFC technology for mobile payments and the development of a prototype payment application in the context of marginalized rural areas

    Get PDF
    Both communication, and the methods and tools of commerce have evolved over time through the invention of new technologies. The latest of these technologies are mobile devices and electronic commerce respectively. The combination of these two technologies has resulted in the creation of electronic commerce which also enables mobile payments. Mobile payments (mpayments) are enabled by many technologies with Near Field Communication (NFC) being the most recent one. NFC is a wireless technology that enables mobile devices in close proximity to exchange data. The mobile device has already been enthusiastically accepted by the customers and they carry it with them wherever they go and this makes it a good device for providing a payment method alternative. This research looks at contactless mobile payment as a payment method. Customers in marginalized rural areas lack a payment alternative to cash hence in this research we are investigating and proposing the use of a NFC enabled mobile payment application for Marginalized Rural Areas. This research extensively evaluates and assesses the potential of using NFC enabled m-payments in Marginalized Rural Areas in South Africa by carrying out an investigation of the technology and its acceptance by customers. The investigation of the technology included implementation of a prototype application which was used to introduce the technology to the consumers. The customer acceptance of the NFC enabled mobile payments was evaluated using the Technology Acceptance model (TAM). The model was modified to suit the context of this study by adding more constructs. This research concluded that Near Field Communication enabled m-payments have great potential to be used and accepted by people in the marginalized rural areas

    Emerging technologies for learning report (volume 3)

    Get PDF

    Looking towards the future: the changing nature of intrusive surveillance and technical attacks against high-profile targets

    Get PDF
    In this thesis a novel Bayesian model is developed that is capable of predicting the probability of a range of eavesdropping techniques deployed, given an attacker's capability, opportunity and intent. Whilst limited attention by academia has focused on the cold war activities of Soviet bloc and Western allies' bugging of embassies, even less attention has been paid to the changing nature of the technology used for these eavesdropping events. This thesis makes four contributions: through the analysis of technical eavesdropping events over the last century, technological innovation is shown to have enriched the eavesdropping opportunities for a range of capabilities. The entry barrier for effective eavesdropping is lowered, while for the well resourced eavesdropper, the requirement for close access has been replaced by remote access opportunities. A new way to consider eavesdropping methods is presented through the expert elicitation of capability and opportunity requirements for a range of present-day eavesdropping techniques. Eavesdropping technology is shown to have life-cycle stages with the technology exploited by different capabilities at different times. Three case studies illustrate that yesterday’s secretive government method becomes today’s commodity. The significance of the egress transmission path is considered too. Finally, by using the expert elicitation information derived for capability, opportunity and life-cycle position, for a range of eavesdropping techniques, it is shown that it is possible to predict the probability of particular eavesdropping techniques being deployed. This novel Bayesian inferencing model enables scenarios with incomplete, uncertain or missing detail to be considered. The model is validated against the previously collated historic eavesdropping events. The development of this concept may be scaled with additional eavesdropping techniques to form the basis of a tool for security professionals or risk managers wishing to define eavesdropping threat advice or create eavesdropping policies based on the rigour of this technological study.Open Acces
    corecore