ABSTRACT
With the myriad of information resources available on the Web, personalization has become important to facilitate information retrieval and recommender systems that provide information and services adapted to the user's needs. A crucial component in any personalization approach is the availability of a user profile that reflects the user's interests, behaviour and intention. In this paper we exploit the fact that for many people the mobile phone is a close companion that follows the person everywhere and is used for many different tasks in the person's daily life. In particular, we focus on mining user activities on NFC-based services to collect information that can be included in a user profile. The paper describes the process of mining usage information from multiple NFC-based applications, both on a smart phone and on back-end systems. We also describe our experiments that lead to and support mining of NFC-based user information.
- M. Gao, K. Liu, and Z. Wu, "Personalisation in web computing and informatics: Theories, techniques, applications, and future research," Information Systems Frontiers, vol. 12, pp. 607--629, Nov. 2010. Google ScholarDigital Library
- M. Ghorab, D. Zhou, A. O'Connor, and V. Wade, "Personalised information retrieval: survey and classification," User Modeling and User-Adapted Interaction, vol. 23, no. 4, pp. 381--443, 2013. Google ScholarDigital Library
- J. Bravo, R. Hervas, G. Chavira, S. Nava, and V. Villarreal, "From implicit to touching interaction: RFID and NFC approaches," in 2008 Conference on Human System Interactions, pp. 743--748, May 2008.Google Scholar
- K. Ok, V. Coskun, M. Aydin, and B. Ozdenizci, "Current benefits and future directions of NFC services," in Education and Management Technology (ICEMT), 2010 International Conference on, pp. 334--338, Nov. 2010.Google Scholar
- E. Siira, T. Tuikka, and V. Törmänen, "Location-based mobile wiki using NFC tag infrastructure," in First International Workshop on Near Field Communication (NFC'09), pp. 56--60, IEEE, Feb. 2009. Google ScholarDigital Library
- J. Pesonen and E. Horster, "Near field communication technology in tourism," Tourism Management Perspectives, vol. 4, pp. 11--18, 2012.Google ScholarCross Ref
- V. Coskun, B. Ozdenizci, and K. Ok, "A survey on near field communication (NFC) technology," Wireless Personal Communications, vol. 71, no. 3, pp. 2259--2294, 2013. Google ScholarDigital Library
- NFC Forum, "NFC data exchange format (NDEF)," Technical Specification NDEF 1.0, NFC Forum, July 2006.Google Scholar
- G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC devices: Security and privacy," in Third International Conference on Availability, Reliability and Security, ARES 08, pp. 642--647, Mar. 2008. Google ScholarDigital Library
- A. Andersen and R. Karlsen, "Experimenting with instant services using NFC technology," in The First International Conference on Smart Systems, Devices and Technologies (SMART 2012), (Stuttgart, Germany), IARIA, May 2012.Google Scholar
- A. Andersen, R. Karlsen, and A. Munch-Ellingsen, "NFC provided user friendliness for technologically advanced services," in 15th International Conference on Human-Computer Interaction (HCI International 2013) (S. Yamamoto, ed.), vol. 8017 of Lecture Notes in Computer Science, (Las Vegas, USA), pp. 337--346, Springer-Verlag, July 2013. Google ScholarDigital Library
- B. Evjemo, S. Akselsen, D. Slettemeås, A. Munch-Ellingsen, A. Andersen, and R. Karlsen, "I expect smart services! -- user feedback on NFC based services addressing everyday routines," IFIP Transactions, (Rome, Italy), Oct. 2014.Google Scholar
- R. Karlsen and A. Andersen, "NFC-based image annotation," in The International Workshop on the Future Internet of Things and Cloud (FiCloud 2013), in conjunction with The 10th International Conference on Mobile Web Information Systems (MobiWIS 2013) (M. Matera and G. Rossi, eds.), vol. 183 of Communications in Computer and Information Science, (Cyprus), pp. 72--85, Springer-Verlag, Aug. 2013.Google Scholar
- A. Andersen and A. Munch-Ellingsen, "Mobile device security: The role of NFC, UICC and secure elements," in Norsk Informasjonssikkerhetskonferanse (NISK 2014), (Fredrikstad), Nov. 2014.Google Scholar
- A. Munch-Ellingsen, A. Andersen, S. Akselsen, and R. Karlsen, "Customer managed security domain on mobile network operators' SIM cards: Opportunities to enable new business models," in Marktplätze im Umbruch: Digitale Strategien und das Zusammenwachsen von Shop, Online-Business sowie Services im Mobilen Internet, Springer-Verlag, 2015.Google Scholar
- A. Munch-Ellingsen, R. Karlsen, A. Andersen, and S. Akselsen, "Two-factor authentication for android host card emulated contactless cards," in Proceedings of the 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 2015.Google Scholar
Index Terms
- User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems
Recommendations
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case
BIGDATACONGRESS '13: Proceedings of the 2013 IEEE International Congress on Big DataUser profiling is the process of collecting information about a user in order to construct their profile. The information in a user profile may include various attributes of a user such as geographical location, academic and professional background, ...
User profiling in intrusion detection
Intrusion detection systems are important for detecting and reacting to the presence of unauthorised users of a network or system. They observe the actions of the system and its users and make decisions about the legitimacy of the activity and users. ...
Dynamic user profiling approach for services discovery in mobile environments
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferenceUser profiling is commonly used to support personalization as well as to enhance usability of software systems by automatically adapting to the needs and preferences of their users. This paper presents an approach to dynamically update mobile users' ...
Comments