Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (92)

Search Parameters:
Keywords = NFC (near-field communication)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1806 KiB  
Article
From Transactions to Transformations: A Bibliometric Study on Technology Convergence in E-Payments
by Priyanka C. Bhatt, Yu-Chun Hsu, Kuei-Kuei Lai and Vinayak A. Drave
Appl. Syst. Innov. 2025, 8(4), 91; https://doi.org/10.3390/asi8040091 - 28 Jun 2025
Viewed by 690
Abstract
This study investigates the convergence of blockchain, artificial intelligence (AI), near-field communication (NFC), and mobile technologies in electronic payment (e-payment) systems, proposing an innovative integrative framework to deconstruct the systemic innovations and transformative impacts driven by such technological synergy. Unlike prior research, which [...] Read more.
This study investigates the convergence of blockchain, artificial intelligence (AI), near-field communication (NFC), and mobile technologies in electronic payment (e-payment) systems, proposing an innovative integrative framework to deconstruct the systemic innovations and transformative impacts driven by such technological synergy. Unlike prior research, which often focuses on single-technology adoption, this study uniquely adopts a cross-technology convergence perspective. To our knowledge, this is the first study to empirically map the multi-technology convergence landscape in e-payment using scientometric techniques. By employing bibliometric and thematic network analysis methods, the research maps the intellectual evolution and key research themes of technology convergence in e-payment systems. Findings reveal that while the integration of these technologies holds significant promise, improving transparency, scalability, and responsiveness, it also presents challenges, including interoperability barriers, privacy concerns, and regulatory complexity. Furthermore, this study highlights the potential for convergent technologies to unintentionally deepen the digital divide if not inclusively designed. The novelty of this study is threefold: (1) theoretical contribution—this study expands existing frameworks of technology adoption and digital governance by introducing an integrated perspective on cross-technology adoption and regulatory responsiveness; (2) practical relevance—it offers actionable, stakeholder-specific recommendations for policymakers, financial institutions, developers, and end-users; (3) methodological innovation—it leverages scientometric and topic modeling techniques to capture the macro-level trajectory of technology convergence, complementing traditional qualitative insights. In conclusion, this study advances the theoretical foundations of digital finance and provides forward-looking policy and managerial implications, paving the way for a more secure, inclusive, and innovation-driven digital payment ecosystem. Full article
(This article belongs to the Topic Social Sciences and Intelligence Management, 2nd Volume)
Show Figures

Figure 1

18 pages, 6166 KiB  
Article
Design of an Integrated Near-Field Communication and Wireless Power Transfer Coupler for Mobile Device Applications
by Hongguk Bae and Sangwook Park
Technologies 2025, 13(5), 207; https://doi.org/10.3390/technologies13050207 - 17 May 2025
Viewed by 542
Abstract
In this study, we propose a model that integrates a near-field communication (NFC) coupler and a wireless power transfer (WPT) coupler for mobile device applications. The NFC and WPT couplers were independently designed and then combined into a four-port NFC–WPT coupler. The proposed [...] Read more.
In this study, we propose a model that integrates a near-field communication (NFC) coupler and a wireless power transfer (WPT) coupler for mobile device applications. The NFC and WPT couplers were independently designed and then combined into a four-port NFC–WPT coupler. The proposed practical equivalent circuit (PEC) introduces a novel multi-port network representation, where inductive and capacitive coupling structures are modeled using T-model and Pi-model configurations, respectively. Based on this circuit model, we present a detailed theoretical approach for deriving a 4 × 4 S-parameter matrix by converting the transmission matrices of the partitioned circuit networks into S-parameters. The comparison between the theoretical analysis and the simulation results shows an error of less than 2.4%, which demonstrates the high accuracy of the proposed method. Full article
Show Figures

Figure 1

27 pages, 7017 KiB  
Article
Efficient Internet of Things Communication System Based on Near-Field Communication and Long Range Radio
by Ting Chai, Dongryool Kim and Seungsoo Shin
Sensors 2025, 25(8), 2509; https://doi.org/10.3390/s25082509 - 16 Apr 2025
Viewed by 954
Abstract
Efficient communication in the Internet of Things (IoT) is essential for enabling smart applications. While NFC excels in near-field device interaction, its limited communication range hinders LoRa’s long-range communication due to its low data throughput. Together with NFC and LoRa technologies, Raspberry Pi [...] Read more.
Efficient communication in the Internet of Things (IoT) is essential for enabling smart applications. While NFC excels in near-field device interaction, its limited communication range hinders LoRa’s long-range communication due to its low data throughput. Together with NFC and LoRa technologies, Raspberry Pi is used as a microcontroller (MCU) in this paper to look into how to make near-field and long-distance communication work better together and fix the issue of an imbalance between communication range and energy consumption in the IoT system. By optimizing the communication algorithm and parameter tuning, the power consumption of the system is significantly reduced, and the communication range and data throughput are improved. Our research gives you the technical information you need to make an IoT communication system that works well, uses little power, and has a wide coverage area. This kind of system is good for situations where you need to collect data from a close distance and keep an eye on things from afar. This makes the system more power-efficient and better at communicating, which also makes it easier for users to manage data. It is suitable for a wide range of application scenarios, such as warehousing, healthcare, agriculture, and smart cities. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

15 pages, 5934 KiB  
Article
A Waterborne, Flexible, and Highly Conductive Silver Ink for Ultra-Rapid Fabrication of Epidermal Electronics
by Patrick Rwei, Jia-Wei Shiu, Mehmet Senel, Amirhossein Hajiaghajani, Chengyang Qian, Chin-Wen Chen, Peter Tseng and Michelle Khine
Sensors 2025, 25(7), 2092; https://doi.org/10.3390/s25072092 - 27 Mar 2025
Cited by 1 | Viewed by 1363
Abstract
Epidermal electronics provide a promising solution to key challenges in wearable electronics, such as motion artifacts and low signal-to-noise ratios caused by an imperfect sensor–skin interface. To achieve the optimal performance, skin-worn electronics require high conductivity, flexibility, stability, and biocompatibility. Herein, we present [...] Read more.
Epidermal electronics provide a promising solution to key challenges in wearable electronics, such as motion artifacts and low signal-to-noise ratios caused by an imperfect sensor–skin interface. To achieve the optimal performance, skin-worn electronics require high conductivity, flexibility, stability, and biocompatibility. Herein, we present a nontoxic, waterborne conductive ink made of silver and child-safe slime for the fabrication of skin-compatible electronics. The ink formulation includes polyvinyl acetate (PVAc), known as school glue, as a matrix, glyceryl triacetate (GTA) as a plasticizer, sodium tetraborate (Borax) as a crosslinker, and silver (Ag) flakes as the conducting material. Substituting citric acid (CA) for GTA enhances the deformability by more than 100%. With exceptional conductivity (up to 1.17 × 104 S/cm), we demonstrate the ink’s potential in applications such as an epidermal near-field communication (NFC) antenna patch and a wireless ECG system for motion monitoring. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

10 pages, 2588 KiB  
Proceeding Paper
Combining Interactive Technology and Visual Cognition—A Case Study on Preventing Dementia in Older Adults
by Chung-Shun Feng and Chao-Ming Wang
Eng. Proc. 2025, 89(1), 16; https://doi.org/10.3390/engproc2025089016 - 25 Feb 2025
Viewed by 626
Abstract
According to the World Health Organization, the global population is aging, with cognitive and memory functions declining from the age of 40–50. Individuals aged 65 and older are particularly prone to dementia. Therefore, we developed an interactive system for visual cognitive training to [...] Read more.
According to the World Health Organization, the global population is aging, with cognitive and memory functions declining from the age of 40–50. Individuals aged 65 and older are particularly prone to dementia. Therefore, we developed an interactive system for visual cognitive training to prevent dementia and delay the onset of memory loss. The system comprises three “three-dimensional objects” with printed 2D barcodes and near-field communication (NFC) tags and operating software processing text, images, and multimedia content. Electroencephalography (EEG) data from a brainwave sensor were used to interpret brain signals. The system operates through interactive games combined with real-time feedback from EEG data to reduce the likelihood of dementia. The system provides feedback based on textual, visual, and multimedia information and offers a new form of entertainment. Thirty participants were invited to participate in a pre-test questionnaire survey. Different tasks were assigned to randomly selected participants with three-dimensional objects. Sensing technologies such as quick-response (QR) codes and near-field communication (NFC) were used to display information on smartphones. Visual content included text-image narratives and media playback. EEG was used for visual recognition and perception responses. The system was evaluated using the system usability scale (SUS). Finally, the data obtained from participants using the system were analyzed. The system improved hand-eye coordination and brain memory using interactive games. After receiving visual information, brain function was stimulated through brain stimulation and focused reading, which prevents dementia. This system could be introduced into the healthcare industry to accumulate long-term cognitive function data for the brain and personal health data to prevent the occurrence of dementia. Full article
Show Figures

Figure 1

21 pages, 783 KiB  
Article
Robust Beamfocusing for Secure NFC with Imperfect CSI
by Weijian Chen, Zhiqiang Wei and Zai Yang
Sensors 2025, 25(4), 1240; https://doi.org/10.3390/s25041240 - 18 Feb 2025
Viewed by 780
Abstract
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly [...] Read more.
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly increase array aperture, thereby rendering the eavesdroppers more inclined to lurk near the transmission end. This situation necessitates using near-field channel models to more accurately describe channel characteristics. We consider two schemes with imperfect channel estimation information (CSI). The first scheme involves a conventional multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) setup, where Alice simultaneously transmits information signal and artificial noise (AN). In the second scheme, Bob operates in a full-duplex (FD) mode, with Alice transmitting information signal while Bob emits AN. We then jointly design beamforming and AN vectors to degrade the reception signal quality at Eve, based on the signal-to-interference-plus-noise ratio (SINR) of each node. To tackle the power minimization problem, we propose an iterative algorithm that includes an additional constraint to ensure adherence to specified quality-of-service (QoS) metrics. Additionally, we decompose the robust optimization problem of the two schemes into two sub-problems, with one that can be solved using generalized Rayleigh quotient methods and the other that can be addressed through semi-definite programming (SDP). Finally, our simulation results confirm the viability of the proposed approach and demonstrate the effectiveness of the protection zone for NFC systems operating with CSI. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

25 pages, 1580 KiB  
Review
Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review
by Princewill Onumadu and Hossein Abroshan
Sensors 2024, 24(23), 7423; https://doi.org/10.3390/s24237423 - 21 Nov 2024
Cited by 4 | Viewed by 7494
Abstract
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC [...] Read more.
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC transactions and examines strategies for mitigating these risks, focusing on payment devices. This paper provides an overview of NFC technology, related security vulnerabilities, privacy concerns, and fraudulent activities. It then investigates payment devices such as smartphones, contactless cards, and wearables, highlighting their features and vulnerabilities. The study also examines encryption, authentication, tokenization, biometric authentication, and fraud detection methods as risk mitigation strategies. The paper synthesizes theoretical frameworks to provide insights into NFC transaction security and offers stakeholder recommendations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

14 pages, 1762 KiB  
Article
NFC Tag Awareness and Its Visual Implementation on Food Packaging: Case Study in Slovenia
by Tina Žurbi and Diana Gregor-Svetec
Appl. Sci. 2024, 14(21), 9933; https://doi.org/10.3390/app14219933 - 30 Oct 2024
Cited by 1 | Viewed by 2351
Abstract
Many companies are using smart packaging to provide consumers with more information about their products. The goal of our case study is to access the Near Field Communication (NFC) tag knowledge, as well as getting insights into tag positioning in food package design [...] Read more.
Many companies are using smart packaging to provide consumers with more information about their products. The goal of our case study is to access the Near Field Communication (NFC) tag knowledge, as well as getting insights into tag positioning in food package design for better visibility in order to develop some guidelines for future tag implementations. A preliminary survey of professionals provided an overview of NFC tag usage, followed by an online survey that assessed knowledge and visibility of tag placements. These findings were further discussed in focus groups and measured using eye-tracking technology. For placement visibility assessments, well-known and fictitious packaging designs of milk were used. The results show that, due to the NFC tag’s low market penetration, consumer recognition is low, with only generations Y and Z being familiar with the NFC tag. Knowledge of the NFC tag does not significantly vary based on education level. When considering the use of NFC tags, it is crucial to define and understand the target market. If the target is younger generations, the potential to increase engagement with the product can be achieved. Additionally, to boost consumer interaction, NFC tags or other smart elements should include an activation prompt, positioned on the central right section of the packaging and distinguished by a distinct color. The influence of the design on tag visibility is essential to ensure its effectiveness. Full article
Show Figures

Figure 1

23 pages, 2454 KiB  
Article
CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
by Konstantinos Markantonakis, Ghada Arfaoui, Sarah Abu Ghazalah, Carlton Shepherd, Raja Naeem Akram and Damien Sauveron
Smart Cities 2024, 7(5), 2887-2909; https://doi.org/10.3390/smartcities7050112 - 8 Oct 2024
Viewed by 1966
Abstract
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit [...] Read more.
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit widespread adoption due to their centralised control mechanisms. The CO-TSM model addresses these issues by decentralising management and offering greater flexibility and scalability, making it more adaptable to the evolving needs of embedded systems, particularly in the context of the Internet of Things (IoT) and Radio Frequency Identification (RFID) technologies. This paper provides a comprehensive analysis of the CO-TSM model, highlighting its application in various technological domains such as smart cards, HCE-based NFC mobile phones, TEE-enabled smart home IoT devices, and RFID-based smart supply chains. By evaluating the CO-TSM model’s architecture, implementation challenges, and practical deployment scenarios, this paper demonstrates how CO-TSM can overcome the limitations of traditional TSM approaches. The case studies presented offer practical insights into the model’s adaptability and effectiveness in real-world scenarios. Through this examination, the paper aims to underscore the CO-TSM model’s role in enhancing scalability, flexibility, and user autonomy in secure embedded device management, while also identifying areas for future research and development. Full article
Show Figures

Figure 1

29 pages, 14405 KiB  
Article
Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security
by Andrzej Firlej, Slawomir Musial and Ireneusz Kubiak
Appl. Sci. 2024, 14(13), 5854; https://doi.org/10.3390/app14135854 - 4 Jul 2024
Cited by 1 | Viewed by 1508
Abstract
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by [...] Read more.
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by the need to bring the data carrier close to the system reader. Due to the possibility of transmitting sensitive data in this type of system, an important problem seems to be the electromagnetic security of the transmitted data between the cards (tags) and the reader and within the system. In most of the available research studies, the security of RFID systems comes down to the analysis of the effectiveness of encryption of transmitted data or testing the range of communication between the reader and the identifier. In this research, however, special attention is paid to the so-called electromagnetic information security without the analysis of cryptographic protection. In some cases (e.g., data retransmission), encryption may not be an effective method of securing data (because, e.g., encrypted data might be used to open and start a car with a keyless system). In addition, the research draws attention to the fact that the data from the identifier can be accessed not only from the identifier, but also from the control system (reader, wiring, controller, etc.) from which the data can be radiated (unintentionally) at a much greater distance than the communication range between the identifier and the reader. In order to determine the security of the transmitted data in the HF-band RFID systems, a number of tests were carried out with the use of specialized equipment. During the measurements, both the data carriers themselves (cards, key fobs, stickers, tags) and exemplary systems for reading data from the media (a writable card reader, a mobile phone with NFC function, and an extensive access control system) were tested. The experiments carried out made it possible to determine the safety of NFC and MIFARE systems during their use and only storage (e.g., the ability to read data from an identification card stored in a pocket). Full article
Show Figures

Figure 1

24 pages, 4954 KiB  
Review
Wireless Battery Management Systems: Innovations, Challenges, and Future Perspectives
by Zhi Cao, Wei Gao, Yuhong Fu and Chris Mi
Energies 2024, 17(13), 3277; https://doi.org/10.3390/en17133277 - 4 Jul 2024
Cited by 11 | Viewed by 6702
Abstract
With the growing adoption of battery energy storage systems in renewable energy sources, electric vehicles (EVs), and portable electronic devices, the effective management of battery systems has become increasingly critical. The advent of wireless battery management systems (wBMSs) represents a significant innovation in [...] Read more.
With the growing adoption of battery energy storage systems in renewable energy sources, electric vehicles (EVs), and portable electronic devices, the effective management of battery systems has become increasingly critical. The advent of wireless battery management systems (wBMSs) represents a significant innovation in battery management technology. Traditional wired battery management systems (BMSs) face challenges, including complexity, increased weight, maintenance difficulties, and a higher chance of connection failure. In contrast, wBMSs offer a robust solution, eliminating physical connections. wBMSs offer enhanced flexibility, reduced packaging complexity, and improved reliability. Given that wBMSs are still in a preliminary stage, this review paper explores their evolution, current state, and future directions. A comprehensive survey of state-of-the-art wBMS technologies, including academic and commercial solutions, is elaborated in this paper. We compare wireless communication technologies like Bluetooth Low Energy (BLE), Zigbee, Near-Field Communication (NFC), Wi-Fi, and cellular networks in the context of wBMSs. We discuss their performance in terms of efficiency, reliability, scalability, and security. Despite its promising outlook, wBMSs still face challenges such as data security, signal interference, regulatory and standardization issues, and competition from the continued advancement of wired BMS technologies, making the advantages of wBMSs less evident. This paper concludes with guidelines for future research and development of wBMSs, aiming to address these challenges and pave the way for a broad adoption of wBMSs across various applications. This paper aims to inspire further research and innovation in the field, contributing to developing an industry-ready wBMS. Full article
(This article belongs to the Section F: Electrical Engineering)
Show Figures

Figure 1

20 pages, 377 KiB  
Review
A Survey of Short-Range Wireless Communication for Ultra-Low-Power Embedded Systems
by Billy Baker, John Woods, Martin J. Reed and Martin Afford
J. Low Power Electron. Appl. 2024, 14(2), 27; https://doi.org/10.3390/jlpea14020027 - 14 May 2024
Cited by 4 | Viewed by 5022
Abstract
Wireless short-range communication has become widespread in the modern era, partly due to the advancement of the Internet of Things (IoT) and smart technology. This technology is now utilized in various sectors, including lighting, medical, and industrial applications. This article aims to examine [...] Read more.
Wireless short-range communication has become widespread in the modern era, partly due to the advancement of the Internet of Things (IoT) and smart technology. This technology is now utilized in various sectors, including lighting, medical, and industrial applications. This article aims to examine the historical, present, and forthcoming advancements in wireless short-range communication. Additionally, the review will analyze the modifications made to communication protocols, such as Bluetooth, RFID and NFC, in order to better accommodate modern applications. Batteryless technology, particularly batteryless NFC, is an emerging development in short-range wireless communication that combines power and data transmission into a single carrier. This modification will significantly influence the trajectory of short-range communication and its applications. The foundation of most low-power, short-range communication applications relies on an ultra-low-power microcontroller. Therefore, this study will encompass an analysis of ultra-low-power microcontrollers and an investigation into the potential limitations they might encounter in the future. In addition to offering a thorough examination of current Wireless short-range communication, this article will also attempt to forecast future patterns and identify possible obstacles that future research may address. Full article
(This article belongs to the Special Issue Ultra-Low-Power ICs for the Internet of Things (2nd Edition))
Show Figures

Figure 1

17 pages, 1897 KiB  
Article
An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain
by Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni
Appl. Sci. 2023, 13(18), 10477; https://doi.org/10.3390/app131810477 - 19 Sep 2023
Cited by 1 | Viewed by 1591
Abstract
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based [...] Read more.
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely managed by means of blockchain-based solutions. Unfortunately, blockchain cannot guarantee the provenance and accuracy of the stored information. To overcome such a limitation, this paper proposes a secure solution to strongly rely on the tracking information of the physical assets in the supply chain. The proposed solution exploits Hardware Security Modules (HSMs) to provide required cryptographic primitives through a Near-Field Communication (NFC) connection. In our approach, each transfer of the assets is authenticated, verified, and recorded in the blockchain through the HSM. Transaction entries are signed, thus providing a guarantee of ownership and authenticity. The proposed infrastructure has been subject of an exhaustive security analysis and proved resilient against counterfeiting attempts, stakeholder repudiations, and misleading information. Full article
(This article belongs to the Special Issue Cybersecurity and Cryptography in the Internet of Things (IoT))
Show Figures

Figure 1

18 pages, 623 KiB  
Article
The Role of Near-Field Communication Mobile Payments in Sustainable Restaurant Operations: A Restaurateur’s Perspective
by Wen-Way Yu and Chin-Yi Fang
Sustainability 2023, 15(16), 12471; https://doi.org/10.3390/su151612471 - 16 Aug 2023
Cited by 6 | Viewed by 3258
Abstract
Mobile payments have emerged as a viable alternative to cash and credit cards and are rapidly gaining popularity worldwide. Limited research has explored the effects of mobile payments on restaurant performance from the perspective of restaurateurs. This study utilized a combination of the [...] Read more.
Mobile payments have emerged as a viable alternative to cash and credit cards and are rapidly gaining popularity worldwide. Limited research has explored the effects of mobile payments on restaurant performance from the perspective of restaurateurs. This study utilized a combination of the innovation diffusion theory (IDT) and the technology acceptance model (TAM) to investigate the influence of a near-field-communication (NFC) mobile payment environment on restaurant operating performance (ROP). Through convenience sampling, questionnaires were distributed to restaurant owners and managers, resulting in 279 valid responses. The empirical findings revealed that sales growth (β = 0.478), cost savings (β = −0.236), flexibility (β = 0.117), accessibility (β = 0.184), and trust and safety (β = 0.286) significantly impacted ROP. When considering restaurant size as a moderator for analysis, only two constructs, namely, accessibility (β = 0.108) and trust and safety (β = −0.160), showed significant impacts on ROP. These empirical insights offer valuable references to restaurateurs for enhancing ROP by leveraging the mobile payment environment. Full article
(This article belongs to the Special Issue Contemporary Issues and Future Trends in Sustainability Hospitality)
Show Figures

Figure 1

16 pages, 2487 KiB  
Article
Use of Internet-of-Things for Sustainable Art Businesses: Action Research on Smart Omni-Channel Service
by Arum Park
Sustainability 2023, 15(15), 12035; https://doi.org/10.3390/su151512035 - 6 Aug 2023
Cited by 3 | Viewed by 1986
Abstract
Performance and exhibition venues are well-suited for implementing business models that leverage Internet-of-Things (IoT) concepts to integrate both online and offline information. The use of IoT technologies has led to the emergence of omni-channel services, providing customers with information from both online and [...] Read more.
Performance and exhibition venues are well-suited for implementing business models that leverage Internet-of-Things (IoT) concepts to integrate both online and offline information. The use of IoT technologies has led to the emergence of omni-channel services, providing customers with information from both online and offline channels. However, there is a lack of field research on the practical implications of IoT concepts in art exhibitions. An action research methodology is required to address this gap, and one potential solution is to implement an IoT-based omni-channel service that integrates online and offline channels to enhance service quality and provide a seamless customer experience. Near Field Communication (NFC), iBeacon, and Internet buttons can be used in an art gallery to achieve these objectives. This study utilized action research methods to examine the impact of customers’ technology interactions in an art gallery setting. The findings indicate that the inclusion of a physical interactive element has a positive effect on IoT use. Full article
(This article belongs to the Special Issue Optimization of Deep Learning in the Perspective of Sustainability)
Show Figures

Figure 1

Back to TopTop