nfc written report
Post on 05-Apr-2018
221 Views
Preview:
TRANSCRIPT
-
8/2/2019 NFC Written Report
1/16
@NFC_CCT506: Danielle Haigh, Yuan Li, Siyang Wu, Alexandra Landegger, Jessica Steele18 April 2011, CCTP 506-03: Fundamentals of Technology
Written Report:
Near Field Communication
Abstract- This paper presents a summary of research findings from multiple print
and non-print sources surrounding both the fundamental technical capabilities and
contextual potential impacts of an existing yet (predicted) soon-to-be widely adopted
technology: near field communication. These findings highlight significant trends
surrounding potential adoption barriers and the wider significance to our global culture
including issues of consumer data usage. To conclude, we offer our suggestions on future
research paths and provide references for further exploration.
As a game-changing concept, NFC is more than just a gobbledygook name of
which many technology users have little knowledge of, our research suggests (Bosker).
Once deployed within a mobile device, NFC is on track to go mainstream (Bosker) withits ability to centralize a users life creating a swiss army knife technical tool (Fischer
22) for mobile commerce transactions, data collection, ticketing & more. As a potentially
evasive technology, the implications of these and future NFC applications must be explored
beyond the context of user life-style.
I. INTRODUCTIONNear Field Communication, or NFC, is a contactless technology that allows devices,
such as smartphones, to share and access data over short ranges (Rooney). Described as a
magic wand technology (Fischer 22), the close range wireless data exchange allows devices
to communicate by coming into close contact with one another (Bosker). As both a read and
write technology (Bosker), NFC is mundane in that the technology is based on a simple RF
connection between two NFC products (Fischer 22). As the RF connection is limited to around
four centimeters in range (Bosker), a resulting connection indicates user intent and allows your
favorite electronic companion to become your magic wand (Fischer 22).
II. NFC CONTENT & CONTEXTOpening the black box, we discover NFC is based on inductive-coupling, where loosely
coupled inductive circuits share power and data over a distance of a few centimeters (NFC
Forum). Typically, there are two pieces of technology involved in a near field communication
-
8/2/2019 NFC Written Report
2/16
@NFC_CCT506, Page 2
process: an NFC-enabled device connecting/communicating with another NFC-enabled device
or an NFC tag (NFC Forum). These pieces can include both passive technology ( where the
item does not provide its own source of energy) as well as active (includes a self-contained
energy source) technology (Fischer 22). Significantly, passive NFC tags can be made
inexpensively and last virtually forever (Fischer 22). Typically, an NFC tag is passive and
stores data that can be read by an NFC-enabled device (NFC Forum). Meanwhile, NFC-
enabled devices, such as smartphones, are complex in their ability to switch operating modes
which can include:
Reader/writer Mode: In this mode, an NFC-enabled device initiate[s] an operationwith a passive tag (Fischer 22), such those on smart posters (NFC Forum).
Card Emulator Mode: Similar to a traditional contactless smart card (NFC Forum),an NFC-enabled device will appear to a reader/writer as a passive tag, but in fact can be
active(Fischer 23), allowing it to look like any selectable number of tags for the users
and also to allow the device to be read as a default tag when powered down or out of
battery (Fisher 23) or without changing the existing infrastructure (NFC Forum).
Peer-to-Peer Mode: Here, two NFC-enabled devices exchange data (NFC Foum),mandating both an active initiator and active target- i.e., a phone and another device (or
another phone) sharing data as network peers (Fisher 23). Often leveraging
Bluetooth or WiFi link set up parameters users can easily share data in this mode by
close contact, such as virtual business cards or digital photos (NFC Forum).
Although unique, NFC builds upon many familiar technologies deployed today. Specifically,
one may think of the similarities to RFID (Radio Frequency Identification) technologies where
a reader/writer is trying to read or write the contents of a tag (Fischer 22) or contactless cards,
which incorporate a chip (microprocessor) that communicates with a card reader through RFID
technology (NFC Forum). While NFC shares the basic technology associated with these,
-
8/2/2019 NFC Written Report
3/16
@NFC_CCT506, Page 3
NFC employs a number of key new features (NFC Forum) including close-range security
and standards. Compared to contactless technologies such as QR or barcodes readers, NFC can
provide a more elaborate data set when deployed in a mobile phone, such as automatically
dialing and storing numbers or addresses and deploying peer-to-peer connection[s] to, for
example, sync navigation systems (Fischer 24). Following an un-linear development and
production path from similar wireless technologies, NFC is also similar to, compatible with, and,
yet unique from, Bluetooth and Wi-Fi. Most obviously, the technologies wireless range (10-
meters for Bluetooth and over 100-meters for Wi-Fi) (NFC Forum) creates the largest
discrepancy and differences in security and establishing a connection (for example touch versus
type). In order to leverage the benefits of these existing technologies, NFC enables high-
bandwidth connections for some NFC peer-to-peer applications, acting as a pairing
mechanism to immediately establish a Bluetooth or WiFi connection between the touch of
two devices (Fisher 25).
As the technology is based on pre-existing contactless payment and ticketing standards
that are used on a daily basis by millions of people using their devices worldwide, NFCs future
adoption success is heightened despite the non-linear nature of development often found in
technology today and, specifically, in regards to wireless technology (NFC Forum). The NFC
Forum (www.nfc-forum.org), formed in 2004 to advance the use of Near Field Communication
technology by developing specifications, ensuring interoperability among devices and services,
and educating the market about NFC technology, has helped to ensure NFC standards for not
only the contactless operating environment, such as the physical requirements of the antennas,
but also the format of the data to be transferred and the data rates for that transfer (NFC
Forum). Acknowledged by the ISO/IEC (International Organization for Standardization /
-
8/2/2019 NFC Written Report
4/16
@NFC_CCT506, Page 4
International Electrotechnical Commission), ETSI (European Telecommunications Standards
Institute), and ECMA (European association for standardizing information and communication
systems), NFC Forum compliant devices, including the operating modes discussed, support
and are built on pre-existing contactless smart cart standards (the ISO/IEC 18092 NFC IP-1 and
ISO/IEC 14443) (NFC Forum). In order for adoption to proliferate, standards will become
increasingly important as NFC applications evolve and will need to garner unified support from a
number of NFC players including device manufacturers, mobile operators, retailers, and more.
According to our research, based on a survey by Sybase 365, 30% of respondents said a lack of
industry coordination is the main problem holding back wider adoption of the technology
(Raice). Research also suggests, standards implemented around mobile payments have seen
better adoption rates, specifically in European markets (Raice). With the support of the NFC
Forum and NFC industry providers, NFC standards would allow the technology to become a
global standard on cell phones and increase adoption (Raice).
Apart from a case-study in global standards adoption, near field communication, as
implemented today and in its potential impact, provides a wide context of significance to both
the end-user, the industries involved in implementing the technology, as well as those who will
utilize the technology for an endless array of applications relevant to nearly any field. Existing
and predicted forthcoming NFC solutions include simple feature applications or local
applications, such as smart posters, which will drive investment for adding the back-end of
more complex NFC applications, such as those that need authentication and virtual-wallet
applications (Fischer 24). Local applications include smart objects or infotags which can be
placed in buses, at bus stops, the theater, a restaurant[or] a pub and then read with an NFC-
enabled device or phone (Kessler). These applications already impact and will increasingly
-
8/2/2019 NFC Written Report
5/16
@NFC_CCT506, Page 5
become significant to a breadth of industries from education (Students could get their individual
daily schedule, announcements, and information about homework by waving their phones past
the tags) to unique projects which will impact daily life for generations, such as NFC tablet
enabled gravestones to provide additional information about the deceased (see fig. 1)
(Kessler). As our bibliographic reviews reference (http://cct506nfc.wordpress.com/annotated-
bibliographies/), NFC applications are impacting practically every field such as transit, healthcare,
social media and more (Kessler) while future applications can be tailored to niche use cases. The
most widely discussed NFC application, however, is contactless payment. As reported by
consulting firm Edgar, Dunn & Co, the market for mobile payments is expected to grow
significantly in the next several years, reaching $618 billion by 2016 (Efrati and Sidel). Despite
the expected growth of mobile commerce, the specific NFC application spurs questions and
predicted potential impact to areas of consumer privacy and security.
Perhaps most predominantly, marketing and advertising industries serve to leverage NFC
technology. Expanding from the smart poster to include a number of user transactions, including
transit and financial, NFC technology, specifically deployed within a mobile device, will collect
a wealth of consumer-behavior data which can then be utilized for targeted marketing and
advertising services. Of course, the data shared will be dependent on evolving privacy and opt-
in standards. Dr. Alex Pentland, Director of MITs Human Dynamics Laboratory, explains,
Just by watching where you spend time, I can say a lot about the music you like, the car you
drive, your financial risk, your risk for diabetes. If you add financial data, you get an even
greater insight (Hotz). As a tool for financial transactions, NFC becomes a lot smarter than a
card," states Doug Bergeron, VeriFone's chief executive, "It opens the door to a rich experience
at the point of sale that retailers really covet" (Efrati and Sidel). While evidently significant for
-
8/2/2019 NFC Written Report
6/16
@NFC_CCT506, Page 6
the fields of marketing and advertising, the surge of consumer-behavior data inherent with the
use of NFC has and will impact research in a number of fields, specifically social behavior. Dr.
Johan Bollen, an expert in complex networks at Indiana University states, It is not just about
observing what is happening; it is about shaping what is happeningThe patterns are allowing
us to learn how to better manipulate trends, opinions and mass psychology (Hotz). As with the
explosion of location-based advertising companies such as Groupon, NFC both serves to
leverage the expanding location-based advertising market as well deploy local marketing
services such as coupons, loyalty services, and more through the mobile device. NFC will help
to stretch this market even further, where in 2009, BIA/Kelsey estimates small and medium-
sized businesses with 100 or fewer employees collectively spent $35 billion to $40 billion in
local advertising in the U.S. (Efrati and Sidel). Uniquely, NFC will also offer instant results for
advanced targeting (through mobile transactions), offering retailers additional data on mobile
consumers and even allowing companies to prove correlation between in-store sales and ad
targeting (Efrati and Sidel).
Acting as a virtual wallet and collector of consumer-behavior data, one research goal was
to explore NFCs impact to the end-user in terms of privacy and security. Gaining media
traction in recent days, both Apple and Google have come under scrutiny for privacy concerns
involving the collection of where and when people user their mobile phones (Hotz). As these
privacy concerns unfold, we predict they will set standards for NFC data usage in the future
while also forming techno-political implications in adoption and standards including those
involving financial institutions, mobile operators, and marketing/advertisers. Evident from both
our research and interviews (expert and potential users), one of the largest hurdles to NFC
adoption was aperception in lack-of-security, specifically in regards to NFC functioning as a
-
8/2/2019 NFC Written Report
7/16
@NFC_CCT506, Page 7
mobile wallet. Nick Holland, a mobile-transactions analyst at Yankee Group, states, Because
it's contact-less there's a perception people can grab it [data] from thin air, but it's actually a more
sophisticated technology than credit cards with a magnetic stripe, making it more difficult to
steal a consumer's payment information (Efrati and Sidel). Despite this perception, NFC is
unlikely to put consumers at any greater financial risks, while the card companies would
cover the cost of unauthorized purchases (Efrati and Sidel). NFC expert, Jeffery Fisher, notes
the importance of developing standards to keep stored information in separate data wells,
allowing privacy between different financial or organizational providers as NFC applications
evolve (Fisher 24). Fisher discusses a GSMA NFC Initiative which proposes using a trusted
service manager (TSM) between the service provider and mobile network operator layers (24).
The TSMs would be third party organizations that maintain the security data, meet certain
physical storage and protection requirements, and act as liaisons between the customer and the
service providers (Fisher 23). As also evident in our potential user interviews, Fisher notes the
concern over losing control of a credit card and provides over-the-air (OTA) management as
a possible solution, allowing the user to disable all secure features by placing a phone call or
through a Web portal (see fig. 2) (Fischer 24). Multiple authentication solutions are possible for
NFC mobile commerce transactions, such as connecting to a service provider via SMS (Fisher
24). Here an NFC tag triggers an SMS and a service provider would then both be able to
recognize the users intent to purchase and arm the transaction (via the machine) (Fisher 24).
As most of these solutions utilize over-the-air (OTA) management, when a phone is lost, users
could potentially call a number or go to a Web portal and disable or re-enable all secure features
(Fisher 24). While Fisher acknowledges extensive back-end use cases, such as these, may
-
8/2/2019 NFC Written Report
8/16
@NFC_CCT506, Page 8
take some time to work out (24), solutions such as these could create a significant paradigm
shift in mobile commerce and banking.
III. OUR RESEARCH APPROACHAcknowledging the disruptive power of near field technology, our goal as a research
group was to further understand the implications of near field communication to not only the
end-user, but also to the expanding ecosystem of NFC providers and NFC-enabled services (see
fig. 3). By examining the social and techno-political significance of the technology, our
research has been geared to predict possible implications in the increased adoption of NFC,
including the immediate users, manufactures, and service providers, as well as the significance of
NFC as an evolving technology, a business enabler, and a case-study in consumer privacy,
security, standards and interoperability. Our research methods included an effort to deeply
understand the basic components of the technology as well as its applications through interviews
with highly specified experts in the field as well as larger-context expert interviews
(http://cct506nfc.wordpress.com/storyboard-and-video/ ), to build-upon questions and trends
forming from extensive academic and industry published research and case-study reviews. As an
evolving technology, our team also sought to become NFC experts by absorbing real-time NFC
news via online media journals, technology blogs, and social media platforms such as Twitter.
Our hope is to provide unique and insightful research, beyond the media-hype and relatable to
the average user, and to provide this through our online presence
(http://cct506nfc.wordpress.com/ ) in real-time as the significance of NFC continues to evolve and
as we continue to expand our research. The components of our research have included, but are
not limited to:
-
8/2/2019 NFC Written Report
9/16
@NFC_CCT506, Page 9
Video: Through our research and interviews of potential users we discovered twoprominent, alarming trends: generally, there is little to no knowledge of NFC as an
existing technology amongst the general public and there is also a threatening perception
of the inability to provide secure transactions both through the mobile phone and in case
of theft. As such, our goal for the video was to provide a format, including a series of
interviews of potential NFC users, to expose these concerns while also providing expert
opinion in response.
Poster: As our research progressed, we became increasingly aware as a team of the largescope of players both involved in making NFC possible to the NFC user, in the adoption
and development of future applications, as well as the possible wide-ranging impacts to
our culture at large. Therefore, our poster aims at the significant task of outlining these
overarching implications and to provide a top-level over view to such an immense project
as NFC. Combined with our brochure, these elements of our research project provide
value to both the average potential user, who may have little previous knowledge of the
technology, as well as more advanced experts in the field who seek to explore contextual
NFC implications.
Survey: Our online survey sought to explore significant implications and concerns foundthrough research including NFC: adoption, application usability, previous knowledge,
security & privacy perceptions, and more. Through the varied question/answer format,
the potential collection of these survey would provide both a specific data-set (i.e.-
demographics, technology use) as well as opinion trends through the use of possible
answers ranging from I absolutely agree to I absolutely disagree.
Online Presence: Through our blog, our teams research and daily updates areaccessible globally and in real-time while also providing additional methods to follow a
rapidly advancing technology (RSS, Twitter). Readers are able to access top-level
information and summaries quickly and easily while our team also provides the context
of research aims and deep level information for those who wish to explore NFC further
(as we believe they should!).
Interviews: Our interview process included over five potential NFC users chosen atrandom. In an effort to capture, and answer, NFC related concerns and implications these
interviews included a wide-range of students and professionals from multiple fields, all
-
8/2/2019 NFC Written Report
10/16
@NFC_CCT506, Page 10
applicable to NFC, including telecommunications, education, consulting, finance, and
more. As video is an easily viewed and shareable medium, we felt this component would
best be used to answer these common concerns through an interlace of NFC expert
opinion and in a relatable fashion. Our aim here is to dissolve some of the common
myths surrounding NFC while also providing non-biased expert insight.
IV. FUTURE RESEARCH DISCUSSION AND CONCLUSIONWith a combination of integration of low-power short-range RFcircuits, low-power memory,
careful software design, goodstandards for interface specifications, and ergonomic designs, we believe
NFC widespread global adoption, specifically within mobile devices, is possible, if not eminent (Fischer
27). Alongside its many uses, near field technology will potentially dramatically impact standard
regulations for evolving technologies, security and privacy social and political concerns, and provides a
unique, omnipresent tool for research on human behavior. While we have reviewed case studies of
increased adoption, specifically in Europe, since we commenced our research project, we have already
begun to see an increase in the number of US corporations who have or are planning to provide NFC
devices or solutions, including: device manufactures (Google and predicted in forthcoming Apple
models), mobile operators (AT&T, Verizon Wireless, T-Mobile), and financial services (Discover Financial
Services, MasterCard, Visa, Citigroup)(Efratie and Sidel; Raice; Rooney). As these NFC applications serve
to impact each of us in unique ways, we believe it is vital to both understand the basic technological
functions of NFC while also understanding its contextual implications on an evolving basis. To aid in this
discovery, please visit our blog as well as the condensed list of significant NFC resources below for future
research:
NFC Sites & Organizationso The NFC Forum: http://www.nfc-forum.org/ o Near Field Communications World:
http://www.nearfieldcommunicationsworld.com/resources/
-
8/2/2019 NFC Written Report
11/16
@NFC_CCT506, Page 11
o NFC Insight: NFC Payment Europe Conferencehttp://www.nfcinsight.com/paymentseurope/
NFC Newso NFC Google News RSS:
http://news.google.com/news?q=near+field+technology&hl=en&rlz=1C1_____enUS429
US429&prmd=ivns&bav=on.2,or.r_gc.r_pw.&um=1&ie=UTF-8&output=rss o Our Research Updates via Twitter: http://twitter.com/#!/NFC_CCT506 o NFCNews.com: http://www.nfcnews.com/
Breaking NFC Research:o Near Field Communication Research Lab Hagenberg: http://www.nfc-research.at/ o NFC Touch Research Project: http://www.nearfield.org/about
Far from comprehensive, we hope this guide, along with our research and online presence, will
serve as a starting point for continued research and exploration surrounding NFC, specifically
potential niche applications which will serve to strengthen multiple vital functions in an array of
significant fields (health care, educations, government, etc.) as well as the technologys
discussed implications, especially surrounding privacy, security, and consumer behavior data
collection, in conjunction with future research, discussion, and suggested methods for increased
adoption and development to steer the potential impact of NFC technologies in positive
directions.
-
8/2/2019 NFC Written Report
12/16
V. APPENDIXFigure 1: NFC-Enabled Obj
S o u r c e : h t t p : / / m a s h a b l e . c o
As seen through one niche ap
culture in unforeseeable and
ect the Grave Stone
m / 2 0 1 0 / 0 5 / 0 6 / n e a r - f i e l d - c o m m u n i c a t i o
lication of NFC, an NFC enabled object po
ndlessly significant variations, such as histo
@NFC_CCT506, Page 12
/ ( K e s s l e r )
ses the ability to alter
ry and education.
-
8/2/2019 NFC Written Report
13/16
Figure 2: NFC as a Mobile
S o u r c e : h t t p : / / m a s h a b l e . c o
While multiple back-end solu
impact to multiple industries
(shown here as MoLo), financ
here:http://mashable.com/201
ayment Application an OTA solution
/ 2 0 1 0 / 0 5 / 0 6 / n e a r - f i e l d - c o m m u n i c a t i o n
tions are possible for NFC-enable mobile pa
nd policy will surely be felt, from the user, r
ial service provider, and more. Read more o
0/05/06/near-field-communication/ .
@NFC_CCT506, Page 13
/ ( K e s s l e r )
ment solutions, the
tailer, marketer
n the Molo project
-
8/2/2019 NFC Written Report
14/16
Figure 3: The NFC Ecosyste
S o u r c e : http://www.nfc-forum
The image demonstrates mem
does not grasp the wide impa
adoption.
m
.org/aboutnfc/ecosystem/ ( N F C F o r u m )
bership areas of the NFC Forum. However
t resulting from possible NFC applications,
@NFC_CCT506, Page 14
xpansive, this list still
evelopment and
-
8/2/2019 NFC Written Report
15/16
@NFC_CCT506, Page 15
Works Cited
B o s k e r , B i a n c a . " C a n W e D o B e t t e r T h a n ' N e a r - F i e l d C o m m u n i c a t i o n ? ' . " H u f f P o s t
T e c h 2 5 J a n 2 0 1 1 . W e b . 3 0 A p r 2 0 1 1 .
< h t t p : / / w w w . h u f f i n g t o n p o s t . c o m / 2 0 1 1 / 0 1 / 2 5 / n e a r - f i e l d - c o m m u n i c a t i o n - n f c -
t e r m _ n _ 8 1 3 7 5 8 . h t m l > .
E f r a t i , A m i r , a n d R o b i n S i d e l . " G o o g l e S e t s R o l e i n M o b i l e P a y m e n t . " W a l l S t r e e t
J o u r n a l 2 8 M a r 2 0 1 1 . W e b . 3 0 A p r 2 0 1 1 .
< h t t p : / / o n l i n e . w s j . c o m / a r t i c l e / S B 1 0 0 0 1 4 2 4 0 5 2 7 4 8 7 0 3 5 7 6 2 0 4 5 7 6 2 2 6 7 2 2 4 1 2 1 5 2
6 7 8 . h t m l ? K E Y W O R D S = n e a r + f i e l d + c o m m u n i c a t i o n & _ n o c a c h e = 1 3 0 4 0 3 6 2 1 2 5 2 1
& m g = c o m - w s j # p r i n t M o d e > .
F i s c h e r , J . " N F C i n c e l l p h o n e s : T h e n e w p a r a d i g m f o r a n i n t e r a c t i v e w o r l d [ N e a r -
F i e l d C o m m u n i c a t i o n s ] . " C o m m u n i c a t i o n s M a g a z i n e , I E E E 4 7 . 6 ( 2 0 0 9 ) : 2 2 - 2 8 .
W e b . 1 8 A p r 2 0 1 1 .
" F r e q u e n t l y A s k e d Q u e s t i o n s . " N F C F o r u m ( 2 0 1 0 ) : W e b . 1 9 A p r 2 0 1 1 .
< h t t p : / / w w w . n f c f o r u m . o r g / r e s o u r c e s / f a q s / F r e q u e n t l y _ A s k e d _ Q u e s t i o n s _ A b o u t
_ N F C _ J a n _ 2 0 1 0 . p d f > .
H o t z , R o b e r t L e e . " T h e R e a l l y S m a r t P h o n e . " W a l l S t r e e t J o u r n a l 2 3 A p r 2 0 1 1 . W e b .
3 0 A p r 2 0 1 1 .
< h t t p : / / o n l i n e . w s j . c o m / a r t i c l e / S B 1 0 0 0 1 4 2 4 0 5 2 7 4 8 7 0 4 5 4 7 6 0 4 5 7 6 2 6 3 2 6 1 6 7 9 8 4 8
8 1 4 . h t m l ? K E Y W O R D S = n e a r + f i e l d + c o m m u n i c a t i o n # p r i n t M o d e > .
K e s s l e r , S a r a h . " N F C T e c h n o l o g y : 6 W a y s I t C o u l d C h a n g e O u r D a i l y
L i v e s . " M a s h a b l e 0 6 M a y 2 0 1 0 . W e b . 3 0 A p r 2 0 1 1 .
< h t t p : / / m a s h a b l e . c o m / 2 0 1 0 / 0 5 / 0 6 / n e a r - f i e l d - c o m m u n i c a t i o n / > .
R a i c e , S h a y n d i . " B r i g h t F u t u r e , M u r k y P r e s e n t f o r M o b i l e P a y m e n t s . " W a l l S t r e e t
J o u r n a l 2 3 F e b 2 0 1 1 . W e b . 3 0 A p r 2 0 1 1 .
< h t t p : / / b l o g s . w s j . c o m / d i g i t s / 2 0 1 1 / 0 2 / 2 3 / b r i g h t - f u t u r e - m u r k y - p r e s e n t - f o r -
m o b i l e - p a y m e n t s / t a b / p r i n t / > .
-
8/2/2019 NFC Written Report
16/16
@NFC_CCT506, Page 16
R o o n e y , B e n . " N F C P a y B y M o b i l e P h o n e T e c h n o l o g y H e a t i n g U p . " W a l l S t r e e t
J o u r n a l 3 1 M a r 2 0 1 1 . W e b . 3 0 A p r 2 0 1 1 . < h t t p : / / b l o g s . w s j . c o m / t e c h -
e u r o p e / 2 0 1 1 / 0 3 / 3 1 / n f c - p a y - b y - m o b i l e - p h o n e - t e c h n o l o g y - h e a t i n g -u p / t a b / p r i n t / > .
R o o n e y , B e n . " P a y i n g f o r Y o u r S h o p p i n g W i t h a M o b i l e P h o n e . " W a l l S t r e e t
J o u r n a l 1 7 M a r 2 0 1 1 . W e b . 3 0 A p r 2 0 1 1 . < h t t p : / / b l o g s . w s j . c o m / t e c h -
e u r o p e / 2 0 1 1 / 0 3 / 1 7 / p a y i n g - f o r - y o u r - s h o p p i n g - w i t h - a - m o b i l e - p h o n e / t a b / p r i n t / > .
top related