Вы находитесь на странице: 1из 2

 Another middle level of NFC framework as NFC enabled Applications and Services.

This is
influenced from other three categories and provides a problem space or new business needs.
NFC technology covers a wide range of applications and these applications provides real
implementations or prototypes with rigor design artifact evaluations such as experimental,
testing or field studies etc. We investigate NFC applications from the standpoint of NFC operating
modes. “Reader/Writer Mode Applications” provides NFC devices to read and modify data
stored in NFC compliant passive (without battery) transponders, “Card Emulation Mode
Applications” provides NFC devices to behave like a standard smartcard (e.g. payment and
ticketing applications), “Peer-To-Peer Mode Applications” enables two NFC devices to establish a
device to device link-level communication to exchange contacts or any other kind of data [81].
Indeed, design artifacts which propose composed applications or services operating in two or
more modes can be seen in NFC literature. (Mehmet N. Aydin)

 Hevner et al. (2004) propose the difference of behavioral science and design science research.
Design science is inherently a problem solving process that creates and evaluates Information
Technology (IT) artifacts intended to solve identified organizational problems. They mainly focus
on the importance of design science in information systems research areas and creates a
research framework which maintains relevance and rigorous of the research. They provide seven
critical guidelines for researchers to achieve effective design-science research in Information
Systems (IS). Thus, achieving a complete, effective NFC design science is a crucial and necessary
issue, in these days. Today most of the NFC academic literature can also be considered as a
design science rather than a behavioral science.

 Isomursu et al. (2011) [20] described a case study that explores the adoption of attendance
control system in the school environment. The system was implemented using networked
technology components, including smart cards, NFC enabled mobile phones and card readers, a
web portal, and SMS messaging. Using Schwartz’s value model adopted from social psychology
as a framework, the study analyze the technology adoption from the viewpoint of three end user
groups, namely children, parents and teachers. The study presented value analysis to help
understand user experience perceived by different user groups when adopting technology-
supported attendance system.

 Bucicoiu & Tapus (2013) [7] propose a location-based authentication for attendance system
using NFC technology integrated with Moodle. The system exploits both NFC and pictures to
ensure double verification on student attendance. The unique part about this project is that it
uses a Moodle, which is one of the most popular e-learning platforms. By applying Moodle,
lecturers can verify their students more effectively and a lot faster than verifying them
individually. Enabling various functions and creative uses of NFC will further improve and
enhance previous research in terms of what is lacking in certain fields for instance in the security
and performance aspects [2]. Extracting information on what these researches are providing and
what they are lacking are the key to pushing ourselves towards innovatively implementing and
improving NFC-based student attendance system. In the next Section, we describe about the
method we used in identifying studies related to the use of NFC in managing students’
attendance.

 Rahmana et al. [11] proposed RFID authentication system utilizing ParseKey++ multi-way
authentication scheme for the purpose to strengthen the security of the system. The algorithm
was implemented on RFID based attendance control system. Such a secure authentication
system is needed for highly secure environment for example to access confidential resources on
computer network or authentication to access high security locals.

References:

http://www.informatica.si/index.php/informatica/article/view/450/453

https://www.researchgate.net/publication/228853536_NFC_Research_Framework_A_Literature_Review
_And_Future_Research_Directions

https://www.researchgate.net/profile/Sanjay_Misra2/publication/300791064_A_Review_of_Student_A
ttendance_System_Using_Near-
Field_Communication_NFC_Technology/links/57c4b9d008ae5e5a8191be28/A-Review-of-Student-
Attendance-System-Using-Near-Field-Communication-NFC-Technology.pdf?origin=publication_detail

Methodology:

In order to power these NFC tags, electromagnetic induction is used to create a current in the passive
device. We won’t get too technical on this, but the basic principle is that coils of wire can be used to
produce electromagnetic waves, which can then be picked up and turned back into current by an
another coil of wire. This is very similar to the techniques used for wireless charging technologies, albeit
much less powerful.

Вам также может понравиться