Recent orders

Assignment-1-Internal-External-and-Situational-Factors-Affecting-Consumer-Behavior

Consumer BehaviorStudent Name

Insert DateConsumer BehaviorFactors affecting consumer behavior

There are many factors affecting consumer behavior. These can be split into:

Cultural factors

Personal factors

Social factors

Psychological factors

Under cultural factors we have:

Culture

Simply put, culture is the basic component of each society. It dictates a person’s wants and behavior. Every culture has its effects on the consumer behavior and it varies throughout the world depending on the country.

Sub-culture

In each culture there are different sub groups known as subcultures. These are due to differences in religions, geographic locations, and racial groups among others. Different groups

Social class

Each society has a social class which is very important in the determination of how consumers buy the different commodities. Some of the factors which affect social class include:

Wealth

Education

Occupation.

Under the personal factors we have

Age and lifecycle stage

It is very evident that as people get older, they change the way they shop as their tastes also change. Young people buy different things from those which are bought by older people. This may be determined by factors such as marital status and other factors.

Economic situation

The economic situation of a consumer is a very important factor to be considered during purchasing a commodity. When the economic situation of a consumer is good, then their choice of commodities will be more expensive.

Occupation

People working in different work positions will need different products. For instance, let us think of a mechanic and a chief executive officer. These two people need different types of clothes. While the CEO will need to shop for suits, the mechanic will go for strong, more rugged clothes which suit their duties.

Personality

Different people have varied personalities. The different personalities of the consumers have an effect on how these people shop for products. Personality defines what a person is in reality. This defines a person’s likes or dislikes.

Self concept

Self concept is the personal image of the consumers. This defines how the consumer views themselves. It is very important in determining how different consumers buy their preferred products.

Lifestyle

This defines a person’s living patterns, opinions and interests. It also shows how a person is willing to spend in certain commodities. There are some people who can spend in buying expensive electronics and vehicles while others will think this is being extravagant.

Psychological factors

Perception

All of us perceive things differently and this defines how we think about those things. This also means that various groups of consumers think differently when it comes to products. Think of new fashion for example.

Learning

This is the ability of the different consumers to adapt and change due to different response to experience and observations. People have different levels at which they respond to change. Some people are more rigid than others.

Motivation

This defines how consumers’ efforts are energized and sustained towards a certain direction or goal. If a consumer is not motivated when buying a certain commodity, then it means they will drop their interest in that commodity.

Beliefs and attitude

These are the descriptive thoughts that a person holds on something. For example there are some people who do not see a big deal in buying short clothes whereas others think it is a taboo. This may be influenced by religion and other factors.

Social factors

Roles and status

This involves the duties a person is expected to perform. It usually defines how the consumers buy different goods.

Reference groups

These are groups of people who may directly or indirectly influence one’s buying characteristics. For instance, the buying behavior of any teenager will be subject to the parents’ approval in one way or the other.

Family

This is the basic group of someone’s social life. It influences their thinking and beliefs and their perception on a certain commodity. It also influences their attitude towards the various products.

Environmental conditions

There are different commodities whose consumption is influenced by the environmental conditions. For example, people rarely buy jackets in during sunny and dry seasons.

Geographical location

Geographical area of a certain consumer determines the consumer’s buying power. This is because it also influences the consumer’s income.

Tastes and preferences

Different consumers have different tastes and preferences. The consumers have different tastes on the products they consume.

Prices

If products are of the same use and almost similar quality, then the consumers will consider their prices in order to buy the product with the best price.

Income

The income by any consumer is the main factor to be considered when making decisions on consumption. The consumers with higher income have a higher propensity to consume.

Variety of substitutes

Some consumers consider different varieties of substitutes to a certain good or product. The consumer analyses the product and its substitutes and check the one which well suits their needs.

Fashion and styles

Most consumers usually follow the emerging goods. With the ever dynamic and changing fashion, consumers will be unwilling to buy old fashion of commodities when new fashion is out.

Exposure

Consumers having more exposure can consume products from anywhere in the world as opposed to consumers with little exposure who are very cautious when it comes to buying new goods

Technology

People who are exposed to new technologies can buy different commodities from those people who do not have access to technology. Research has shown that even mobile phones can influence consumer behavior significantly.

Internal factors

They include: Exposure, personality, Beliefs, age, occupation, lifestyle, learning ablity and personality.

Situational

These include: Prices, marriage status, economic situation

External

Some of them are: Environmental conditions, geographical location

Conclusion

There are numerous factors which influence consumer behavior and these influence how consumers shop for their commodities. It is important for the marketers to ensure that they understand the different needs of the consumers. This will influence how they can win the different groups of consumers.

References

Peter, J. P., Olson, J. C., & Grunert, K. G. (1999). Consumer behavior and marketing strategy (pp. 329-48). London: McGraw-Hill.

Park, C. H., & Kim, Y. G. (2003). Identifying key factors affecting consumer purchase behavior in an online shopping context. International Journal of Retail & Distribution Management, 31(1), 16-29.

Hawkins, D., & Mothersbaugh, D. (2009). Consumer behavior building marketing strategy. McGraw-Hill.

Nebraska Prenatal Case Study

Nebraska Prenatal Case Study

Abstract

The paper has addressed the issues of the impacts of parental care in Nebraska prenatal case and their positive and negative ramifications on Nebraska economy, society, and illegal immigration. The paper has been compiled through collection of information from diverse sources. Various books and journal articles have been explored to give the past literature about the topic. There has also been a need to conduct some research to collect existing data.

Introduction

This paper posits to explore the possibility to provide prenatal care for the women of undocumented status in the government of Nebraska. In Nebraska, there is a bill that has been proposed but still under contention that proposes joining of 14 states and the Columbia Districts in the provision of prenatal care for the pregnant women especially the ones under low income category without the consideration of their immigration status as provided for by the CHIP and the program of health insurance for the children. The argument behind the policy is the need for upholding the moral rights of the children since they all deserve a healthy environment at their time of birth. According to the argument of the government of Nebraska, the communal benefits that are funded out of the tax payers’ money should not be accessed by the citizens who do not have a legal citizenship.

Hypothesis

Provision of prenatal care leads to the improvement of the possibility of the choice of a woman to give birth instead of seeking for an abortion.

Research question

Should a state provide prenatal care for the women of undocumented status?

Literature review

According to the proposition of “Nebraska Right to Life” the provision of prenatal care leads to the improvement of the possibility of the choice of a woman to give birth instead of seeking for an abortion. The denial of appropriate coverage to the women is consequential to seeking for abortion and it was therefore vital for everybody to support the bill. Among the organizations that are in support of the bill include the Roman Catholic, Voices for Children in Nebraska, Nebraska Medical Association as well as all the existing medical organizations in Nebraska. They all advocate for the right of the women and the children. There are however other organizations that are against the bill as a result of their argument that it was imperative for the government to send back pregnant women to their native countries and they are supposed to be denied benefits associated with prenatal care, good housing as well as opportunities for employment. Without the support of the Act and the government there is no option for the pregnant women despite the fact that most of the immigrants are working. Despite the fact they are still denied health insurance which in most cases is shelved by the employers. The earnings of the immigrants are also limited such that it is difficult for them to purchase individual premiums policies.

One of the important arguments that would give weight to the bill is that the citizenship of the immigrants’ children who are born in Nebraska is automatic and they therefore also acquire the eligibility of the health programs provided by the state. Paying for the bill of prenatal care would prove economical to the government as compared to paying for the bill of birth of premature child or one having serious complications. This is a situation that can be prevented and its occurrence will call for costly interventions in the entire life of the child.

Appropriate decision with regard to the act would save a lot of state money coupled with the restoration of the prenatal coverage of the babies whose parents’ are of low income group in Nebraska. This is the best option to ensure that all the babies who are born in this state will have a high degree of health. The refusal of the governor to endorse the act would call for the courageous action of the Legislature in coming up with a preferred policy that will favor the health of the babies. It is the duty of the Legislature to offer protection to the prenatal care of the women and their babies. All the babies are entitled to a healthy start and it is therefore important to provide for good quality as well as consistent prenatal care.

These people along with any children born in the host country require government-financed services such as public education and health care. Thus Nebraska the settlement of millions of immigrants would raise the numbers of Nebraska residents who need health insurance and rely on publicly financed clinics and other safety nets There is a high degree of morbidity with a likelihood of living in poor environments where poverty as well as physical and mental health are deplorable. Basic health as well as safety among the immigrants is also an important issue. Money management issues are also important considerations for the immigrants. The provision of services of this nature enhances the induction of the immigrants to live in a semi independent manner. They are also equipped with the relevant skills to manage their lives, acquaintance to fewer boundaries, having more freedom and assuming a higher level of responsibilities. Health is an important aspect with the immigrants being deprived proper health care. The poor access to health care is compounded by the unawareness of the health care providers of the specific needs of the immigrants. Their rights to the provision of appropriate health care and social amenities are usually violated. Immigrant women are a sensitive class that needs delicate care due to their socio-economic as well as the legal position that they are exposed to. The immigrant women have been exposed to particular disadvantage in addition to instances of multi-discrimination. There is also a shortage of information with regard to the immigrant women in the government data sets. Gender perspective has also been lacking in policy decisions and the service design which becomes fundamental barriers in the context of inequality.

Research methodology

Introduction

This section spells out the procedures and the methods that the researcher can employ in achieving the objectives of the project so highlighted in the abstract of this paper. It defines location of the study, research procedures and analysis plan that would be put in consideration when carrying out this particular research. The research is supposed to start with the clear understanding of the research objectives as well as the hypothesis. Success of the project will depend on the provision of satisfying information in line with the objectives and hypothesis.

The objective of the research just as a recap is to identify the effective provision of prenatal care for the women of undocumented status. It is important to note here that this research was mainly based on the questionnaire even though other research methodologies were briefly discussed. Sample questionnaire used is as shown in the appendices.

Primary research.

Primary research is the collection of data that does not exist. This can be through numerous forms: including questionnaires, telephone conversations, surveys, etc. As pertained to this project, the primary sources would likely be the agencies responsible for prenatal care for the women of undocumented status in Nebraska. The major merit with conducting primary research is that it accurate. However, the disadvantage of primary research is that it may be time consuming, as it involves dealing with people from various regions, the human sources may only become resourceful out of their own willingness, and this may take them quit sometimes before making up their minds to tell you what they know or give you their side stories about your questions

Secondary research on the other hand is the collection of existing data, that is, in contrast to primary research. For example: research on experiments or specific subjects. The merit of secondary research is that it’s not time consuming however a disadvantage is that the information retrieved may not be relevant.

Quantitative and qualitative data

There are two main ways in implementing the activity of the research, ‘Quantitative research’ and ‘Qualitative research’. The Qualitative data are data which are based on meanings spoken through words or personal expressions from the respondents. Qualitative analysis of data is one of the major methods for data compilation, interpersonal interviews.

Quantitative analysis of data is a process that is based on the amount of data collected from the identified materials (sources such as Educational journals on prenatal care for the women of undocumented status, scientific libraries et cetera) such information are often accurate and not prone to human manipulations.

Research methods

Another aspect that is of great significance in this research would be the research strategy. It’s the research strategy shows which methods a researcher adapts to answer the research objectives or questions. There are types of research strategies that can be employed in conducting a research study. These include experiments, case studies, survey, theoretical perspectives, cross-sectional and longitudinal studies. It is imperative to examine some of these strategies while paying particular attention to the case study method which will be applied in this particular research.

Experiment as one of the research strategies is based on the observation ‘of a highly predefined range of behavior under controlled conditions. The researcher chooses, for instance, two phenomena and tests them on the subject of study, focusing on the analogies or distinctions in this case prenatal care for the women of undocumented. Experimental research strategy is often recommended when carrying out a scientific research, where the phenomenon being studied will not be affected by the experimental conditions

Research Procedures

Use of research tools such as questionnaires, interviews, relevant journals, periodicals and data sampling and machines would be utilized in the process conducting the interview. Experts would be needed to conduct the research.

In implementing the activities, both the quantitative and qualitative approaches was considered, where by qualitative data are those that would be based on the spoken words while the quantitative data would be generated from the overall data collected based of accuracy and efficiency The research project was scheduled to run for a period of one year and a few Months within which prenatal care for the women of undocumented status would be put under scrutiny and rigorous investigations to ascertain the objectives of the research (Venables, 1996).

Validity and Reliability of Results

A debate about the findings of the preceding literatures on prenatal care for the women of undocumented status inevitably includes a discussion of ‘research’, normally referring to the way in which the data were collected”. This research being a phenomenological, all questions are related to theoretical characteristics discussed in literature preview. The process would therefore be accurate in collecting, analyzing and sampling data; hence the validity of result would be quite high. Considering that there are many different aspects of validity, which influence the validity of the research in general (Freeman, & Curt 2002).

Ethical consideration

The participants were supplied with different questionnaires based on specific areas of interests. The approval or the disapproval of implementation of the program should be based on its merits and demerits as determined after conducting the research. All the participants were given their respectively informed consent for the purpose of participation in the research. They were informed prior to the research, the purposes, the potential benefits as well as the risks that might be associated with their participation. Ethical standards shall be considered in the process of the procedures of the research.

It is an ethical requirement that all the people taking part in this study shall be informed about the rationale of the research and the intentions of the researcher by means of an introductory letter that shall be sent to them. All the findings taken care of higher levels of confidentiality and as a matter of ethics, none of the sources, be it personal or at organization level, shall correlated with any particular observation, nor shall any comment be associated without explicit permission from the source. All the information gathered during the interviews shall be treated as confidential and every individual participant shall be given full rights of anonymity. All interviewees shall be treated with high degree of respect and esteem.

If the participants may chose not to answer any part of the question/s, their right to not answer shall be acknowledged and it will be ensured that the privacy of any person shall not compromised upon. Two attempts shall be made and no further again to respect the privacy of any individual. Besides, the proposal for a general announcement of the ruling for agreeing to contribute to no other involvement incentive shall be offered. Whilst conducting interviews with the sources, researcher should stay cognitive of the selected interview time and makes no efforts to intentionally lengthen the interview. Moreover, as an important part of the ethical considerations, all the sources of secondary data are given complete recognition for their input to this study. The composed data is characterized truthfully and the investigation is to the finest of the researcher’s knowledge and capability

Limitations encountered

During the carrying out of the research several challenges were encountered which included:

Some respondents were not willing to cooperate in the process of carrying out of the interview.

Some questionnaires were not properly answered while others remained blank forcing the possibility of assumptions to be included here.

Summary

The methodology which was exploited here mainly through the questionnaires and the interviews were most appropriate as they enabled the most information to be obtained. Many respondents could be reached within a short period of time while sampling enabled a comparison to be carried out on prenatal care for the women of undocumented status. They helped in the real understanding on how prenatal care for the women of undocumented status has actually been done which have actually helped it in realizing the objectives.

Data Analysis and Presentation

The data collected will then be double entered, edited and then input into SPSS V-10 statistical package for analysis. The results will be categorized as categorical, continuous or discreet or count data. The analyzed data will presented in form of histograms for continuous data and bar graphs descript data. Inferences will be made from the triangulation of the qualitative and quantitative data.

Sample population and sampling method

As the researcher tries to define the population of interest in the study, there is a need to consider that the population should be specific to an extent that this population is applicable to the particular situation of the study as well as the understanding of the population. The best sampling method is therefore worth consideration during selection to make sure that the random selection has identified the representative individuals. This is the only way that the insights of the whole population that has been targeted for the research are provided in the study (Thomas & Kilmann, 2004).

Application of triangulation to research

The essence of applying triangulation is for the sake of indications of applicability of several methods (excess of two) in the course of the study in consideration of checking double or even triples results checking otherwise known as cross examination. The idea behind the concept is for the researcher to express a high degree of confidence in consideration of the results of diverse methods that give similar results. In case a single method was applied by the researcher, there is a higher tendency of believing that the results are valid. The application of more that a single method may result to a clash of the results. The application of about three methods attempting to derive an answer may lead to a similarity of answers from two out of the three methods used. In case of an occurrence of a crash there is then a need of reframing the question.

References

FUNK, J., (2009). Nebraska governor proposes widespread budget cuts. Associated Press Writer.

HYPERLINK “http://www.medicalnewstoday.com/articles/183451.php” http://www.medicalnewstoday.com/articles/183451.php

newsdesk, (2008). Nebraska Governor, AG Outline Proposal to Address Illegal Immigration in

Allen, K. & Moore, K. B., (2010). Midlands Voices: Protection of prenatal care urgent policy for Nebraska.

Women’s eNews Nebraska Prenatal Bill Stirs Fight Over Immigration

Near Field Communications and their Operations

Near Field Communications and their Operations

Name:

Instructor:

Date:

Introduction

Over the last three decades, there has been significant improvement and advancement in technology with telecommunication sector being the major beneficiary of these technological advancements. These technological expansive processes have been fundamental in improving the quality of life by allowing faster, effective, reliable, and safety interactions. The primary idea of communication and technology integration is driven by the desire to efficiently connect the physical world to the virtual information thereby providing ubiquitous computing (Want, 2011). The concept of ‘Internet of Thing’ is closely related to network ubiquity, which refers to identification, virtual connectivity and tracking of daily connection objects. This connectivity if the object and the virtual communication system have been enabled by the introduction of modern technology, particularly NFC (Near Field Communication), a device that is responsible for linking virtual information to different physical devices through proximity (Langer, & Roland, 2010). Nearly every place or object can supplied with this technology (NFC tags) and this would aid in providing useful information and proximate identification to the smart device users such as smartphones and tablet computers. For instance, the application of this device would provide detailed information about a music concert advert as well as allowing purchasing of the concert’s tickets using their phones as the technology allows for direct dispensing of the tickets through the smartphones and computers. The technological interaction behind the NFC has remained invisible to majority of the users who are unleobtrusively struck to concern posters (Langer, & Roland, 2010). The validity of these tickets can simply be verified by just waving the smartphone or computer across the NFC reader device installed at the entrance to the hall. After the event, the attendance can easily share the photos taken during the concert by just holding their Smartphone together.

NFC Technology

Technical Principles and Historical Progression

Near Field Communication (NFC) is a high frequency wireless form of communication technology that enables effective exchange of data and information between devices that are four inches distance apart. The NFC is just but an expansion of ISO/IEC 14443 or RFID proximity-card standard that is a combination of reader and smartcard interface into one simple device. The NFC standardization covers data exchange format and communications protocols that are based on the already existing RFID (radio-frequency identification) standards including FeliCa and IEC/ISO 14443 (Want, 2011). The RFID technology was introduced by 1970s and has since then been critical in enhancing telecommunication industry. The RFID technology realizes automatic data transfer and identification by the use of electromagnetic radio signals by active reader means connected passive electronic tag and energy source that relies on magnetic inductions to transponder the receiving of communication power (Want, 2011). The RFID tag is fixed with antenna that is responsible for receiving and transmitting radio signals. The device is also fitted with integrated circuits for storing and processing information as well as demodulating and modulating the signal received.

In 2004, Sony, Nokia, and NXO Semiconductors founded the popular NFC Forum purposely to standardize the then existing smart card technology and the RFID technologies together, thus creating an innovative and novel capability targeting short-range communication. The NFC Forum still support companies that aims at standardizing NFC technology.

Technical Characteristics and Operation Modes

The main advantage of this technology (NFC) that was made its success possible is its compatibility with the RFID infrastructure, many smart cards, and RFID tags. The NFC is built on subsets of ISO standards that are already in existence, including ISO/IEC 14443 standards that are applied in RFID technology. Therefore, NFC operates at 13.56 MHz radio frequency band and it is unlicensed, but has amplitude shift-keying modules that allow transfer of data up to 424 Kilobits per second (Siira, Tuikka, & Tormanen, 2009). Theoretically, the NFC operates within 20 cm but in most instances, a 4 cm working parameter is preferred as the electromagnetic powers are more powerful and effective within that radius. Unlike the conventional RFID technology, NFC system has limited strict difference between the reader and the transponder (Langer, & Roland, 2010). NFC-capable devices have the capacity to integrate both components: the active reader and passive transponder. Besides reading and writing data from a tag, NFC can also transmit and receive data directly from another NFC garget within the supported distance (Siira, Tuikka, & Tormanen, 2009). Therefore, NFC effectively supports the three basic functions:

Reader/Writer Mode: NFC capable devices function as either writer or active reader. If the NFC gets closer (within the sensitive region) to the passive RFID system or passive smartcard, the magnetic inductive power helps in transferring the energy to the device’s passive tag, which established a contactless communication after being powered. The NFC powered device then reads the information in kept in the tag and also writes the information in the tag’s memory.

Peer-to-Peer Mode: when two or more active NFC devices are held close, the device allows for easy exchange of data between these devices (Siira, Tuikka, & Tormanen, 2009).

Card Emulation Mode: NFC can serve as smartcard that other smart device can easily read data from. It is this operation that is applied in ticketing and payment applications or in the provision of access controls (Langer, & Roland, 2010). This device, NFC therefore serves a perfect substitute for credit cards, ID cards, and paper-based tickets, thus elimination of accordant physical objects.

Applications of NFC

Near Field Communication provides massive abilities for diverse and wide utilization cases. NFC application is mainly based on prevailing RFID infrastructure which is cheap, fast acceptable and marketability (Coskun, 2013). NFC is applicable in mobile payment and mobile Ticketing. NFC is utilized in mobile payment, which is faster and easier payment at the underlying Point of Sale in places such as the supermarket checkout and ticket vending machine (Coskun, 2013). The POS also offer proper amount of invoiced money, change of need and scrabbled together. NFC capable phone utilized reader device that enforced payment which store personalized discount coupons and bonus cards (Resatsch, 2010). NFC mobile payment also are utilized include Google Wallet that offer card and compromise and record personalized vouchers and corresponding loyalty cards through means of a service known as Google Offers (Resatsch, 2010). It also Offer Company owned commodities such as Google Maps and Google Places. NFC mobile payment also utilized ISIS Consortium and SIMpass Technology. Consortium is mainly constructed upon a partnership amidst major players of the US mobile communication market such as AT & T, T-Mobile and corresponding Verizon Wireless. SIMpass Technology offer diverse approaches for the mobile payments that is mainly based on an external NFC antenna that are manually placed amidst the battery and the back case of the prevailing mobile phone that is linked to the special RFID-SIM card (Resatsch, 2010). For NFC based P2P Payment both users are normally demanded to possess an account at PayPal and to install the application of the Android NFC phones, Via a Request Money widget on the phone, the payee enters the favorite amount, shunts the phone of the corresponding user and buzz appearance (Resatsch, 2010).

NFC is also utilized in Mobile Ticketing via application of the Oyster Card, DB Touch and Travel, Movie, Concert and Hotel Ticketing (Resatsch, 2010). Oyster Card function with numerous smartcard for the prepaid mobile ticketing since it is equipped with RFID readers that customers utilized at the buses entrance and corresponding departure gates of the subway and train stations (Coskun, 2013). It automatically debits suitable fare from the card depending on the travelling type and duration. DB Touch and Travel is mainly based on the best price principle utilizing check-in and check-out sections at the train stations which the customers know in order to trace their journey (Coskun, 2013). NFC is applicable in the Movie, Concert and Hotel Ticketing that is tag advertisement poster and is redirected to a corresponding website that aids in buying ticket online. Application of the NFC technology is also used in access control, P2P Data Transfer, Product Information System, Location-based Wikipedia, Indoor Navigation System and Educational Systems.

Security Concerns of NFC

NFC normally deals with complex data such as credit card numbers, bank account details, account balances, custom-made tickets and individual data. Therefore, data storage and corresponding wireless transfer security is fundamental for NFC. This is because it offers numerous mechanisms security and immunity (Coskun, 2013). NFC technology offers data transfer amidst dual devices and corresponding tagged object distance amidst the dual items falls below a particular range though certain physical security due to the underlying touch-to-connect principle (Resatsch, 2010). The transmit power of the radio frequency and the obtain sensitivity of the NFC readers that accomplish the ISO specifications that is robust to function to a certain centimeters. Thus, supermarket checkpoint the client requires setting the phone directly above the prevailing reading device. Data skimming that is responsible for capturing and intercepting transferred data by the distant attacker is not possible thereby making its misuse to be possible in the form to relay attacks. Moreover, the attacks are ideally achieved through an attacker serving as the underlying man-in-the-middle that forward transmission data amidst a reader such as the NFC payments and corresponding target transponder (Coskun, 2013). An attacker places their altered NFC phone on the top of the NFC reader at the underlying POS.

Wireless channel communication in regard to the NFC does not ensure secure encrypting mechanisms. Nevertheless, elevated layers of the NFC applications can be utilized industry-standard cryptographic protocols such as SSL/TLS based on the underlying methods that encrypt the prevailing data that are transferred over the air and stored within the secure element (Resatsch, 2010).

Challenges of NFC

The extent definite standards for the NFC services are currently missing. There is also lack of an ultimate conclusive strategy for the advancement of the NFC services originates within a fundamental conflict amidst numerous involved chief actors encompassing mobile phone manufacturers, network operators, banks and other supplementary service providers (Coskun, 2013). This means that each party normally strive to enforce interest and corresponding needs that play main role within the flow of the application scenario and relation acquisition of massive money (Resatsch, 2010).

Moreover, third-party providers such as banks and financial institutions strive to host NFC applications within the neutral space on the handset whilst the network operators that can charge customers for offering services hoisted within secure environment on the prevailing UICC (Coskun, 2013). Conversely, the mobile phone manufacturers have decided kind of the NFC hardware, which is an alternative form of dedicated Secure Elements chips that are executed within the handset (Resatsch, 2010).

Conclusion

Dependability and usability of the NFC applications are likely the most significant elements of the user experience in the day to day utilization of the NFC technology and thus significant component for its accomplishment (Coskun, 2013). In comparison to the underlying alternative technologies, NFC provides massive merits. Fundamental basement of NFC have been established and effectual field trials have been finished (Resatsch, 2010). Based on the accomplishment of partnerships and corresponding collaborations amidst the stakeholders the applications with good user knowledge require to be published. Moreover, the experience of the NFC applications has resulted to motivation of the handset manufacturers to be incentivized to the production of the NFC capable smartphones (Coskun, 2013). This makes NFC technology to the probable technology that is capable to play a big role in the people’s future day to day life.

References

Coskun, V. (2013). Professional NFC Application Development for Android. Hoboken, N.J: Wiley.

Langer, J. & Roland, M. (2010). Anwendungen und Technik von Near Field Communication (NFC).

Resatsch, F. (2010). Ubiquitous Computing: Developing and Evaluating Near Field Communication applications. Wiesbaden: Gabler.

Siira, E., Tuikka, T. & Tormanen, V. (2009). “Location-based mobile wiki using NFC tag infrastructure,” in Near Field Communication, 2009. NFC ’09. First International Workshop on, Feb. 2009, pp. 56 –60.

Want, R. (2011). “Near Field Communication,” Pervasive Computing, IEEE, vol. 10, no. 3, pp. 4–7.