skip to main content
10.1145/2989250.2989274acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems

Authors Info & Claims
Published:13 November 2016Publication History

ABSTRACT

With the myriad of information resources available on the Web, personalization has become important to facilitate information retrieval and recommender systems that provide information and services adapted to the user's needs. A crucial component in any personalization approach is the availability of a user profile that reflects the user's interests, behaviour and intention. In this paper we exploit the fact that for many people the mobile phone is a close companion that follows the person everywhere and is used for many different tasks in the person's daily life. In particular, we focus on mining user activities on NFC-based services to collect information that can be included in a user profile. The paper describes the process of mining usage information from multiple NFC-based applications, both on a smart phone and on back-end systems. We also describe our experiments that lead to and support mining of NFC-based user information.

References

  1. M. Gao, K. Liu, and Z. Wu, "Personalisation in web computing and informatics: Theories, techniques, applications, and future research," Information Systems Frontiers, vol. 12, pp. 607--629, Nov. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Ghorab, D. Zhou, A. O'Connor, and V. Wade, "Personalised information retrieval: survey and classification," User Modeling and User-Adapted Interaction, vol. 23, no. 4, pp. 381--443, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Bravo, R. Hervas, G. Chavira, S. Nava, and V. Villarreal, "From implicit to touching interaction: RFID and NFC approaches," in 2008 Conference on Human System Interactions, pp. 743--748, May 2008.Google ScholarGoogle Scholar
  4. K. Ok, V. Coskun, M. Aydin, and B. Ozdenizci, "Current benefits and future directions of NFC services," in Education and Management Technology (ICEMT), 2010 International Conference on, pp. 334--338, Nov. 2010.Google ScholarGoogle Scholar
  5. E. Siira, T. Tuikka, and V. Törmänen, "Location-based mobile wiki using NFC tag infrastructure," in First International Workshop on Near Field Communication (NFC'09), pp. 56--60, IEEE, Feb. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Pesonen and E. Horster, "Near field communication technology in tourism," Tourism Management Perspectives, vol. 4, pp. 11--18, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  7. V. Coskun, B. Ozdenizci, and K. Ok, "A survey on near field communication (NFC) technology," Wireless Personal Communications, vol. 71, no. 3, pp. 2259--2294, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. NFC Forum, "NFC data exchange format (NDEF)," Technical Specification NDEF 1.0, NFC Forum, July 2006.Google ScholarGoogle Scholar
  9. G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC devices: Security and privacy," in Third International Conference on Availability, Reliability and Security, ARES 08, pp. 642--647, Mar. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Andersen and R. Karlsen, "Experimenting with instant services using NFC technology," in The First International Conference on Smart Systems, Devices and Technologies (SMART 2012), (Stuttgart, Germany), IARIA, May 2012.Google ScholarGoogle Scholar
  11. A. Andersen, R. Karlsen, and A. Munch-Ellingsen, "NFC provided user friendliness for technologically advanced services," in 15th International Conference on Human-Computer Interaction (HCI International 2013) (S. Yamamoto, ed.), vol. 8017 of Lecture Notes in Computer Science, (Las Vegas, USA), pp. 337--346, Springer-Verlag, July 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Evjemo, S. Akselsen, D. Slettemeås, A. Munch-Ellingsen, A. Andersen, and R. Karlsen, "I expect smart services! -- user feedback on NFC based services addressing everyday routines," IFIP Transactions, (Rome, Italy), Oct. 2014.Google ScholarGoogle Scholar
  13. R. Karlsen and A. Andersen, "NFC-based image annotation," in The International Workshop on the Future Internet of Things and Cloud (FiCloud 2013), in conjunction with The 10th International Conference on Mobile Web Information Systems (MobiWIS 2013) (M. Matera and G. Rossi, eds.), vol. 183 of Communications in Computer and Information Science, (Cyprus), pp. 72--85, Springer-Verlag, Aug. 2013.Google ScholarGoogle Scholar
  14. A. Andersen and A. Munch-Ellingsen, "Mobile device security: The role of NFC, UICC and secure elements," in Norsk Informasjonssikkerhetskonferanse (NISK 2014), (Fredrikstad), Nov. 2014.Google ScholarGoogle Scholar
  15. A. Munch-Ellingsen, A. Andersen, S. Akselsen, and R. Karlsen, "Customer managed security domain on mobile network operators' SIM cards: Opportunities to enable new business models," in Marktplätze im Umbruch: Digitale Strategien und das Zusammenwachsen von Shop, Online-Business sowie Services im Mobilen Internet, Springer-Verlag, 2015.Google ScholarGoogle Scholar
  16. A. Munch-Ellingsen, R. Karlsen, A. Andersen, and S. Akselsen, "Two-factor authentication for android host card emulated contactless cards," in Proceedings of the 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 2015.Google ScholarGoogle Scholar

Index Terms

  1. User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiWac '16: Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access
      November 2016
      186 pages
      ISBN:9781450345033
      DOI:10.1145/2989250

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate83of272submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader