A RFID-based Campus Context-Aware Notification System
This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the proces…
Authors: Nazleeni S. Haron, Nur S. Saleem, Mohd H. Hasan
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 122 A RFID-based Campus Context-A ware Notification System Nazleeni S. Haron, Nur S. Saleem, Mohd H. Hasan, Mazeyanti M. Arif fin and Izzatdin A. Aziz Abst ract — This paper presents the design and development of a c ontext-aware notification system for university students using RFID technology . This sy stem is leveraging on the student’s matrix card as the RFID tag (sens or), RFID reader and server as the processors and scr een monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the intended students imm ediately at their respective locations. In addition, the syste m is also able to display personalized information based on the st udents’ preference s and current location when accessing the system. The background of the study , the design approaches fo r this system and the preliminary evaluation of the prototype are presented in this paper . The evaluation re sults have indicated that the the proposed system is useful and easy to use. Index T erms — Mobile Applications, Pervasive Computing, Ubiquitous Computing —————————— —————————— 1 I NTRODUCTION ONTEXT –AWARE is a term that describes the abili- ty of an application to provide personalized sevice based on the detected context. A system is context- aware if it can extract, inter pret and use context informa- tion and adapt its functionality to the current context of use[1] .Context can be defined as the information that characterizes the situation of an entity [2] . An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications them selves [2]. The four types of primary context identified in [3] are location, identity, time and activity. With the advent of context-aware computing, it enables the services to be discovered and performed au- tonomusly on behalf of the user. As such, many research- ers have embedded this technology in their proposed ap- plications [4-9] and the extensive list of developed con- text-aware applications can be found in [10]. However, despite the popularity of this technology and the advan- tages it offer, only one out of the many applications has deployed this technology for notification system in a uni- versity environment [10]. Therefore, this paper prop oses a RFID-based Campus Context-Aware Notification System (R-CCANS) that im- plements context-aware concep t for a noti fication system in a campus environment using RFID technology. In this research we are trying to prove that the context-aware concept can be applied in a university environment by leveraging on RFID technology. Our work is motivated by the observation on the exist- ing campus notification channels, E-learning and bulletin board. E-learning is an online learning system that is normally used by lecturers to post academic-related noti- fications due to its extensiv e coverage. The problem that exists in E-learning is that, it cannot cater for real-time notification. The students have to log on t o the internet to get notified. For instance, the lecturer posted last minute announcement saying that that the class is cancelled. He posted at 8.55 am but the class starts at 9 am. The students who are already waiting in the class will not be notified. Another problem in E-learning is it has a limitation in term of the usage. It cannot be accessed when there is no internet service available. Another announcement me dium was using bulletin board by campus staff for announcing ca mpus events. By using this method, notification will hardly reach the in- tended and interested audien ce due to its limited cover- age. Life as a typical students are so hectic and busy . Some ‐ times, students are not aw are of what is happening around them. Therefore, it is vital to have a system that can convey notification to students so that they know what is happening around them. Other than that, by hav ‐ ing a notification system it also can help to [11]: Increase the likelihood of reaching students imme- diately with important information Improve response times from the students It has been proven that users tend to ignore screen dis- play notifications if they are too used to it or if they feel that those notifications are no t relevant to them. Therefore by providing personalized notifications at the screen, it will intrigue the user to see the contents displayed on the screen that might contain pertinent information to the user. As a consequence, user can make a decision and execute actions accordingly. R-CCANS is leve raging on RFID technology to ensure the notification reached the in tended audience in timely manner (before the preset deadline). To illustrate w hat motivates the needs for R-CCANS and how R-CCAN S works, consider tw o scenarios as follow: Jen is an undergraduate student and has a replacement ——————————————— — N.S.Haron, N.S. Saleem, M. H. Hasan and M. M. Ariffin are with De- partment of Computer and Information Sciences, Universiti Teknologi PE- TRONAS, 31750 Tronoh, Perak, MY. I.A.Aziz is with Deakin University, AUS. C JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 123 class at 8 pm tonight. It was 5 pm in the evening and Jen was with her colleagues at the café. One of her colleagues, Fay was asking for her help with their soon-to-due class project tonight. Jen was about to answer no when she decided to check the class status at the nearby R-CCANS display. One hour before, Prof. Layne has decided to postpone the class due to unforeseen circumstances. She has posted a notification via R-CCANS website. Jen passed by a reader and a notification from Prof. Layne was displayed. Jen then informed Fay on her availability tonight. As a result, Jen does not have to waste her time going to the cancelled lecture and yet she can still do a fruitful activity tonight. John is the university sports officer who just received an invitation letter for a friendly soccer match in 2 days time. Due to the urgent needs, he decided to do the audi- tion on that very same day. He publishes the announce- ment via R-CCANS to those who happened to be in near or at sport complex only. Farris is a graduate student, an avid fan of soccer, really good at playing the game and always linger around at the sports complex to use the facility. He happened to pass by an R-CCANS display and announcement made by John was then shown on the screen. Without hesitation, Farris made his way to the audition venue. Both of these scenarios depicts that personalized noti- fications can be published to subset of students based on their registered course or ba sed on their registered prefe- rences and locations. R-CCANS deploys the matrix card as the RFID tag (input to t he system), RFID reader and server as the processor and screen display as the actua- tor. This paper is structured as follows. We introduce some background concepts of context-awareness and con- text-aware categories. We de scribe the RFID technology that we are using. We then present the d esign of the R- CCANS followed by the prototype development and evaluation. Finally, we draw our conclusions. 2 C ONTEXT - AW A R E C OMPUTING 2.1 Context-A ware Concept Context-aware refers to the ability of computing devices or applications to detect and respond and interact in us- ers’ environment [12-16]. Other than that, it is also an ap- plication that dynamically changes or adapts their beha- vior based on the context of the application and the user [2]. Context can be classified into four types (abbreviated as TILE) [3]. T is for Time context and is u sable when the user enters a service zone and if the service is available at that time, then the serv ice is working for the user. I represents Identity context that indicates with whom th e system is communicating. L stands for Location which representing the location of the user or the location of an identity that the user is interested in. Lastly, E is for Entity concept that portrays information of any things that th e user may be currently using [17]. In addition, a system is said to be context-aware, if it uses context to provide relevant information and / or services to the user, where relevancy depends on the us- er’s task. To develop a good context-aware application, it must be able to answer all the questions below: Who is the User? Where is the User? What is he/she doing? What is his requirement? As a summary, context-aw are computing involves ap- plication development that allo ws for collection of context and dynamic program behavior dictated by the know- ledge it gathers from the environment [3]. 2.2 Context-A ware Category Three attempts have been made in developing taxonomy for context-aware categorization [2, 13, 18]. However, there are some overlapping among these taxonomies and we have chosen to further describe taxo nomy proposed by Schilit et al in [17]. T ABLE 1 C ONTEXT - A WARE C A TEGORIES According to [18], context-aware applications can be divided into four categories and these categories are the product of two points along two orthogonal dimensio ns as shown in Table 1. The dimensions divide the categories into whether the task at hand is getting information or doing a command and whether it is affected manually or automatically to the user. Futher explanation of each category is as follows:. Proximate Selection In this category, the applications retrieve the information for the user manually on wh ere the located-objects (phys- ical or virtual) resided based on the current location of th e user or other specified context. In this case, the applica- tion still requires manual intervention from the user and will not choose any specific object automatically. Exam- ples include the application able to display available nearby computer input and output devices such printers, displays, speakers for the users to choose from. Location information can be used to weight the choices of choosing the objects [18]. Automatic Contextual Reco nfiguration Applications that are developed under this category ac- tually must be able to retr ieve information automatically from the available contexts. Th ey must also able to recon- manual automatic information Proximate selection Contextual infor- mation Automatic contex- tual reconfiguration command Contextual com- mands Context-triggered actions JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 124 figure the system to bind to new resource based on new context. Reconfiguration in this case refers to adding new components, removing existing components or altering the connection between components in the system [18]. Reconfiguration could be based on location, activity or the type of user using the applications. For example, when a set of users are having a meeting in a room, a workspace in form of virtual whit eboard is provided. The user can use the whiteboard to share their thoughts and ideas. The moment they enter the room, their mobile host will be reconfigured and binded to the room’s virt ual whiteboard. And if they were to move to other room for other kind of activity, anothe r resource available in the room will be binded to their mobile host for different usage. Contextual Information and Com mands Contextual Information and Commands makes use the fact that people’s actions can be predicted by their situa- tion. In this category, applications offer information and command based on the context in whic h they were is- sued. The contextual command can be found in two mod- es. Firstly, the appearance of the command itself may change depending on context of use [18]. For example, when the user is in the library, a command for invoking card catalogue appears on screen whereas it is normall y hidden. Secondly, a command may appear the same but present different results [18]. For example, the same mi- grate command button appears on the location browser interface while moving from room to room. However, it will invoke to different hosts depending on the location it was invoked. Context-T riggered Actions Context-triggered actions use simple IF-THEN rules to specify how context-aware systems should adapt. The category is similar to contextual information and com- mands only except that, it will invoke according to the specified rules [18]. It will invoke automatically when the right combination of contexts exists. For example, moni- tors the “washing-machine” badge which is attached to the washing machine and will play a sound once it fi- nished washing. 3 RFID T ECHNOLOGY RFID is a dedicated short range communication (DSRC) technology. This type of technology has been widely used around the world. Its uses radio waves to automatically identify people or objects. It is a form of automatic identi- fication technology that refers to data capture and stor age with no or very minimal human intervention [19]. All RFID data can be read through the human body, clothing and non-metallic materials. The most important aspect of RFID is that it does not require contact or line of sight for communication. Basic RFID consists of three components [9]. They are: An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically pro- grammed with unique information Fig. 1 shows the RFID infrastructures. The antenna emits radio signals to activate the tag and at the same time read and write data to it. Antennas are the middl e- man between the tag and the transceiver. It controls the system's data acquisition and communication [19]. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power out- put and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing [20]. RFID systems use many different frequencies depend- ing on the type of applications. Available frequencies in- clude low frequency (~ 125 KH z), high-frequency (13.56 MHz) and ultra-high-frequency or UHF (860-960 MHz) while microwave (2.45 GHz) [19]. There are two general categories of RFID systems, ac- tive and passive. As for active RFID, it uses active tags that carry their own power source in the chip to generate the radio waves that can be read by a rea der from larger distances [19]. In this syst em, the broadcast waves from the tag can be read over a range to 60 to 300 feet. Howev- er, despite this advantage, it has trade off with increased size, cost and reduced operational life. Active RFID sys- tems are normally used for tracking objects that need large range such as cargo container or warehouse track- ing. As such the vehicle does not need to slow down or the items that do not being close to the rea der. Passive RFID system is using passive tag of which the tags do not transmit ra di o waves but communicate by reflecting back the waves they receive from the reader. The tags do not have its own battery and power its circuit using the electromagnetic signal generated by the reader. They are very cheap and small yet it has limitation in terms of reading range (up to twenty feet only). However, this kind of technology is suitable for pet tagging, identi- fication cards or retail merchand ise [19]. In this project, we have chosen passive RFID system as the technology for conveying notification system since it requires onetime cost (during the initial purchase and implementation) and it is relatively cheap unlike SMS and active system. This technology is very useful to large batch of target recipients and the best method to avoid spam of notifications. Since it has small reading range, it can provide better personalized notification to the user. Fig. 1. RFID Infrastructures JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 125 4 S YSTEM D ESIGN 4.1 Context Model We have chosen three out of fo ur contexts outlined in [3]. Firstly, Time context is chosen to represent the timestamp when the students use the system . The obtained value will be used to evaluate and compare with the expiry date of the notification posted by the lecturer and other staff. Identity context refers to th e student who is going to re- ceive the notification. This context will he lp to empower the personalization feature. Location context is the current nearby building or venue of the student while accessing the system. We adopt Abowd’s dimensions [3] and design approach in [17] in modeling the context. The model of our context is as follows: Context::== Time_context+Identity_context+Location_context Time_context::=T imestamp+Expiry; Expiry ::=Date+AM/PM+Hou r+Minute; Identity_context::=Personal_profile; Personal_p rofile::=Tag_id+Course_id+Preferences; Preferen ces::=[‘Book ’|’Class’|’Sports’|’Events’| ’misc’]; Location_C ontext::=Buildi ng_name+Venue_nam e; 4.2 Context-a ware Category We chose the Context-Triggered Actions category [18] since we want the system to perform the required action autonomously based on presen ted and detected context. The inferring mechanism is using IF-THEN rules and represented as follows: IF AND …. AND THEN For example, consider a scenario of which current context is as follows: Time = ‘5 pm’ Identity = ‘1038’ Location = ‘Sports Complex’ Preferences = ‘Sports’ Then the rules will be presented as follows: IF hour = 5 AND ampm = ‘pm’ AND location = ‘sports_complex’ AND preferences = ‘sports’ THEN display_notification = “inter-varsity football league is on now” 4.3 System Architec ture Fig. 2 shows the proposed system architecture for the R-CCANS. When the student passes by any RFID reader, the reader will detect the presence of a tag (embedded in the student’s matrix card). In this system, we will be us- ing a passive tag. Each student’s matrix card is assigned a unique tag ID and each reader is assigned a unique loca- tion ID. The server will find the respective information in the database based on the dete cted tag ID and location ID. Once the server found the ID and the matching notifica- tion, it will then display the notification on the screen monitor nearby to the student. Therefore, as long as the students are within 1 inch to 20 feet, the reader will be able to detect the students and the personalized notifica- tion can be displayed on the screen. We have chosen the screen as the display unit instead of the user personal devices (PDA, mobile phones or laptop) due to impleme- tation limitation. This is because the implementations and API features of various device s are different. Therefore, in order to solve that we have to develop different type of client interface. In addition, it will be hard to manage in case the client interface needs to be updated. The personalized information was deri ved based on preferences and user profiles acquired manually from the user. The users have to perform manual registration with the system and their profiles and preferences will be stored in information repository for futu re use. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 126 Fig. 2. System Architecture 5 P ROTOTYPE D EVELOPMENT 5.1 Hardware For prototyping, we have used the UPM Raflatac Dog- Bone HF RFID as the passive tag for the proposed system. We used the Passive HF RFID Reader of Pocket Reader Juno7 as the reader to extrac t the information stored in the passive RFID tags. We also used the same RFID read- er as the display component to display the notification for our prototype system. 5.2 Sof tware We have developed the prototype using Microsoft Visual Studio 2008 development kit and specifically using VB.Net and C# as the programming languages. These languages are chosen due to the simplicity in coding for interfacing with the RFID hardware. In addition, we chose Microsoft Access for storing the inf ormation (data- base) and JUNO_900W_C# as the middleware for RFID devices. 5.3 User Interface There are two main types of user interface of R-CCANS. One is for the users who send the notification (eg. lecturer or other universi ty staff) and the other one is for the recipient of the notification (student). Post Notification User Interface Fig.3 shows the posting announcement page. This is where the lecturer or other staffs posts the announce- ment. The created date is automa tically produced to avoid any error in determinin g the notification creation date. The sender’s name will be automatically inserted based on the login profile. The notification expiry date is to be determined by the lecturer. Prior to the expir y date, the contents of the notification will be displayed to the intended students. Once the noti- fication reaches the expiration date, it will no longer be notified to the students. The lecturer/staff can choose either specific student or a batch of student from a specif- ic course as the target recipient for the notification. The list of students and courses are available for retrieva l from the database. The related location of the notification will be inserted in the next page together with extended details of the event. The lecturer/staff can also search for announcement made earlier. The search can be made by specifying either by who posted the notification, by the notification crea- tion date or by the notification title. Notification Display User Interfac e The user interface is as shown in Fig. 4. The student will be presented with the latest pers onalized notifications. Student can choose to read any notification displayed. Student can also delete notification and mark notification a s u n r e a d i n c a s e t h e y w a n t the notification to appear as unread. The close button is to close the announcement page. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 127 Fig. 3. Post Notification User Interface (for lecturers or staff) Fig. 4. Display Notification User Interface (for student) JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 128 6 P ROTOTYPE E V ALUA TION We have a conducted an evaluation testing in order to solicit the usefulness and ease of use of the proposed sys- tem. The respondents were from various background s but chosen from two groups of university membe rs: lec- turers and undergraduate st udents. To evaluate the sys- tem, we have administered a questionnaire that was de- signed based on Technology Acceptance Model (TAM) [21]. The respondents have to fill up the questionnaire once they have completed experiencing with the system. 20 statements/items are prepar ed altogether for both cat- egories and for both types of respondents. They have to rank between one(1) to seven (7) for each statement in the questionnaire given. one (1) means strongly agree while seven (7) represents strongly disagree. Fig. 5 presents the result on usefulness and ease of use evaluation collected from le cturers. The lecturers collec- tively ranked usefulness at 2.3 and this demonstrates that system is useful to them. As for ease of use, in average the lecturers ranked it at 2.5 and this reveals that the lectures find it easy to use the proposed system. Fig. 6 shows the students’ point of view on both useful- ness and ease of use. They have ranked usefulness at 2.4 and ease of use at 1.8. As su ch, it can be concluded that the students also find the sy stem both useful and easy to use. Fig. 4. Results on Usefulness and Ease of Use collected from lecturers Fig. 5. Results on Usefulness and Ease of Use collected from students 7 C ONCLUSION In this paper, we propo se a design for a RFID-based Campus Context-Aware Notification Syste m (R-CCANS) which aims to deliv er notification to the in tended recipients in timely manner leveraging on RFID technology. Th is sys- tem uses contextual attributes such as time, location an d identity of the u ser in inferring the right n otification to dis- play. R-CCAN S is context-t rigge red actions system where it acts autonomously when the context is detected (v ia tag ID and location I D) and proces sed. The notifi cation given i s also derived from user’s personal pr eferences which ha ve been acquire d by manual regist ration. The prelim inary eval- uation on the proto type conducted on tw o types of user has indicated that the system is us eful and easy to use. However, the prototype is still in p rogress and we have envision ed to add more features i n the future R-CCA NS. Among the planned functions are the ab ility for the student to post noti- fication as well as for the message to be able to b e trans- ferred to user ’s mobile dev ice via Blueto oth or Infra red technologies. R EFERENCES [1] H.E. Byun and K. Cheverst, “Utilizing context history to pro ‐ vide dyna mic adaptations,” Applied Artificial Intellig ence, vo l. 18, no. 6, pp. 533–548, 2004. [2] A.K. Dey, and G. D. Abowd, “Towards a better understand ing of context and context ‐ awareness,” GVU technical report GIT ‐ GVU ‐ 99 ‐ 22, College of Computing, Georgia Institute of Tech ‐ nology, 1999. [3] G.D. Ab owd , ʺ Software Engineering Issues for Ubiquito us Computing. ʺ Pr oceedings 21st Int ʺ l Conference on Software Engi ‐ neering, pp. 75 – 84, 1999. [4] F. Bellotti, R. Berta, A. De Gloria and M. Margarone, “Imple- menting tour guides for travelers”, Human Fa ctors and Ergonom- ics in Manufacturing, vol. 15, no. 4 , pp. 461–476, 2005. [5] S. Agarwal, A. Jo shi, T. Fini n, Y. Yesha and T. Ganous, “A per- vasive computing system for the operating room of the future”, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 129 Mobile Networks and Applications , vol. 12, no. 3, pp. 215–228, 2007. [6] D. Wilson, J. Doyle, J. Weakliam, M. Bertolotto and D. Lynch, “Personalised maps in multimodal mobile GIS”, International Journal of Web Engineering and Technology, vol. 3, no. 2, pp. 196– 216, 2007 . [7] C.B. A nagnostopoulos, A. Tsou nis and S. Hadjiefthymiades , “Context awareness in mobile computing environm ents”, Wire- less Personal Communications , vol. 42, no. 3, pp. 445–464, 2007. [8] D. Mandato, E. Kovacs, F. Hohl and H. Amir-Alikhani, “CAM P: A context-aware mobile portal”, IEEE Communications Magazine , vol. 40, no. 1, pp. 90– 97, 2002. [9] S.H. Baek, H.J. Lee, S.Y. Lim and J.D. Huh , “Managing mechan- ism for service compatibility and interaction issues in context- aware ubiquitous h ome”, IEEE Transactions on Consumer Elec- tronics, vol. 51, no. 2, pp. 524–528, 2005. [10] J. ‐ y.Hong, E. ‐ h. Suh, S. ‐ J. Kim, “Context ‐ aware systems: A literature review and classification”, Expert Systems with Appli ‐ cations , vol. 36, no.4, pp. 8509 ‐ 8522, 2009. [11] M. Ladin, “As I see it, Multiple Modes of Notificatio n Makes Sense”, Campus Safety Magazine July/August 2007 issue, http://www.camp ussafetymagazine.com/Articles/?ArticleID=11 0.2007 [12] L. Barkhuus, “Context inform ation vs. sensor information: A model for categorizing context in context ‐ aware mobile compu ‐ ting,” In Symposium on Collaborative Technologies and Systems , pages 127–133, San Diego, CA, 2003. [13] R. Hull, P. Neaves, J. Bedford ‐ Roberts, “T ow ards Situated Com ‐ puting,” 1st International Symposium on Wearable Computers , pp . 146 ‐ 153, 1997. [14] J. Pa s c o e , “A d d i n g Generic Contextua l Capabilities to W earable Computers,” 2nd International Symposium on Wearable Computers , pp. 92 ‐ 99, 2008. [15] J. Pa s c o e , N.S. Ryan , D.R . Morse, “Human ‐ Computer ‐ Gira ffe Interaction – HCI in the Field,” Workshop on Human Computer Interaction with Mobile Devi ces , 1998. [16] N. Ryan , J. Pa s c o e , D. Morse, “Enhanced Reality Fieldwork: the Context ‐ Aw a r e Archaeological Assistant,” Gaffney ,V ., va n Leu ‐ sen, M., Exxon, S. (eds.) Computer Applications in Archaeology, 1997. [17] O. Kwon, “The potential roles of context ‐ aware computi ng technology in optimization ‐ based intelligent decision ‐ making, ” Expert Systems with Applications , vol.31, 2006, pp.629 ‐ 642. [18] B. Schilit, N. Ad ams, and R. Want, “Context ‐ aware computing applications,”. Proceedings of the 1st International Workshop on Mobile Computin g Systems and Applications . Los Alamitos, CA: IEEE . [19] RFID Journal, http://www.rfidjournal.com.2009 [20] Aim Global, “Technologies: RFID/What is RFID ?” Aim Global, http://www.aimglobal.org/techno logies/rfid/what_is_rfid.asp.2 009 [21] F. Davis, “User Accep tance of infor mat ion technolo gy:system characteristics, user perceptions and behavior impacts.”, International Journal of Man ‐ Machine Studies, Vol. 38, pp. 475 ‐ 487.
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment