throbber
UNIVERSITY OF OSLO
`Department of informatics
`
`Contactless Payment with
`Near Field Communication
`
`An Empirical Study in
`Ubiquitous Computing Context
`
`Master thesis
`60 credits
`
`Ummear Ahmad Khan
`
`2 May 2006
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 1 of 109
`
`

`

`II II
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 2 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 2 of 109
`
`

`

`Foreword
`
`This thesis is the result of a research study as a part of the Masters degree in Information
`Technology at the Department of Informatics.
`
` I
`
` would like to thank my internal supervisor Jo Herstad at the Department of Informatics
`for motivating and constructive guidance with the theoretical and methodical framework,
`and external supervisor Juan Carlos López Calvet at Telenor R&D for technical guidance
`and access to Telenor’s research lab and equipment for the research.
`
` I
`
` am grateful for the time and effort from the participants in the user study, for the
`valuable feedback from co-students at University of Oslo, and the inspiring ideas I got
`from the researchers at Telenor R&D.
`
`Special thanks go to Saeeda for proof reading and commenting the thesis. Thanks to
`Vibeke for the design for menu and manuals. I would also like to thank my fiancé,
`Nimra, and my family who supported me throughout the process.
`
` A
`
` final thank goes to fellow students and friends at Lekestue study room. Thomas,
`Thommy, Tor Eric, Petter, Lena; without your humor, company and intellectual food for
`thought, the last weeks wouldn’t have been so motivating and inspiring.
`
`
`Oslo, 2 May 2006
`
`
`Ummear Ahmad Khan
`
`
`
`III
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 3 of 109
`
`

`

`IV
`IV
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 4 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 4 of 109
`
`

`

`Abstract
`
`This master thesis focuses on the use of NFC payment in Ubiquitous Computing context.
`NFC payment and the possibilities that emerge from this technology have been described.
`A case study has been conducted on the use of NFC payment with two user groups with
`different backgrounds. Knowledge from both of the previous mentioned work has been
`used to discuss how NFC payment appears as visible or invisible for the users.
`
`The problem statements are:
`
`
`- Describe the possibilities that emerge with NFC as a payment method.
`- Conduct a user study of NFC as a payment method
`- Discuss how NFC payment appears as visible or invisible technology for the
`users in the user study.
`
`
`Twelve different users participated in this study. The focus has been on the NFC phone
`that can bee used for payments. The NFC phone was used in the user study which was
`specially designed to observe the users experience and reactions when the NFC phone
`shifted between visible and invisible context. The results from the study are presented in
`this thesis.
`
`The theoretical framework has been Ubiquitous Computing and related theories. Main
`concepts have been invisibility vs. visibility, center and periphery of attention and routine
`invisibility to mention some.
`
`The study showed that the users approached and related differently towards NFC
`payment technology. This was evident through the different reactions and experiences the
`users expressed through surveys and interviews. It was not possible to sum up with a
`concluding remark on how NFC payment appears as visible or invisible technology for
`the users in the user study.
`
`
`V
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 5 of 109
`
`

`

`VI VI
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 6 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 6 of 109
`
`

`

`Sammendrag
`
`Denne masteroppgaven fokuserer på bruk av NFC-betalingsløsning i Ubiquitous
`Computing kontekst. NFC-betalingsløsning og mulighetene den frembringer med denne
`teknologien har blitt beskrevet. En case studie har blitt gjennomført om NFC-
`betalingsløsning med to brukergrupper med forskjellig bakgrunn. Kunnskap fra begge
`forgående arbeidene har blitt brukt til å diskutere hvordan NFC-betalingsløsning framtrer
`som synlig og usynlig for brukerne.
`
`Problemstillingene er:
`
`
`- Beskriv muligheter som fremtrer med NFC som betalingsløsning.
`- Gjør en brukerstudie av NFC som betalingsløsning.
`- Diskuter hvordan NFC betalingsløsning fremstår som synlig og usynlig
`teknologi for brukerne i studien.
`
`
`Tolv forskjellige brukere deltok i studien. Fokuset har vært på NFC-telefoner som kan bli
`brukt ved betaling. NFC-telefoner ble brukt i brukerstudien som var spesielt konstruert
`for å observerer brukerne erfaringer og reaksjoner da NFC-telefonen skiftet fra synlig til
`usynlig kontekst. Resultatet fra studien er presentert i denne masteroppgaven.
`
`Det teoretiske rammeverket har vært Ubiquitous Computing og relaterte teorier.
`Hovedkonsepter har vært usynlighet vs. synlighet, senter og periferi for oppmerksomhet
`og rutinemessig usynlighet for å nevne noen.
`
`Studien har vist at brukerne tilnærmet seg og reagerte forskjellige på NFC-
`betalingteknologi. Dette var tydelig gjennom forskjellige reaksjoner og erfaringer som
`brukerne gav uttrykk for gjennom undersøkelser og intervjuer. Det var ikke mulig å
`oppsummere med neon konkluderende kommentar om hvordan NFC-betalingsløsning
`fremtrer som synlig og usynlig teknologi for brukerne i brukerstudien.
`
`VII
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 7 of 109
`
`

`

`VIII VIII
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 8 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 8 of 109
`
`

`

`TABLE OF CONTENTS
`
`
`1.
`
`2.
`
`INTRODUCTION............................................................................................................................... 1
`1.1.
`BACKGROUND AND MOTIVATION ................................................................................................ 1
`1.2.
`PROBLEM DEFINITION.................................................................................................................. 3
`1.3.
`TARGET GROUP ............................................................................................................................ 4
`1.4.
`RESEARCH METHOD IN BRIEF ...................................................................................................... 4
`1.5.
`STRUCTURE OF THE REPORT ......................................................................................................... 5
`THEORETICAL FOCUS AND RELATED LITERATURE ......................................................... 6
`2.1.
`THE INVISIBLE COMPUTER........................................................................................................... 6
`2.2.
`UBIQUITOUS COMPUTING............................................................................................................. 8
`2.3.
`CALM COMPUTING..................................................................................................................... 10
`2.4.
`UNREMARKABLE COMPUTING.................................................................................................... 13
`2.5.
`TANGIBLE COMPUTING .............................................................................................................. 15
`2.6.
`AMBIENT INTELLIGENCE............................................................................................................ 16
`2.7.
`CONTEXT-AWARE COMPUTING.................................................................................................. 17
`2.8.
`SUMMARY.................................................................................................................................. 18
`TECHNICAL FOCUS – NFC.......................................................................................................... 19
`3.1.
`UBIQUITOUS COMPUTING AND NFC .......................................................................................... 19
`3.2.
`NFC - NEAR FIELD COMMUNICATION........................................................................................ 19
`3.3.
`OVERVIEW ................................................................................................................................. 19
`3.4.
`TECHNICAL – HOW IT WORKS.................................................................................................... 20
`3.5.
`RADIO FREQUENCY IDENTIFICATION (RFID)............................................................................. 22
`3.6.
`CONTACTLESS AND MOBILE PAYMENT METHODS TODAY......................................................... 22
`3.7.
`STANDARDS ............................................................................................................................... 24
`3.8.
`MARKET..................................................................................................................................... 24
`3.9.
`FIELD TRIALS............................................................................................................................. 25
`3.10.
`SECURITY ISSUES ....................................................................................................................... 27
`3.11.
`SUMMARY.................................................................................................................................. 27
`4. METHOD .......................................................................................................................................... 29
`4.1.
`DIFFERENT RESEARCH METHODS .............................................................................................. 29
`4.2.
`QUALITATIVE RESEARCH........................................................................................................... 30
`4.3.
`RESEARCH APPROACH USED IN THE THESIS ............................................................................... 36
`4.4.
`SUMMARY.................................................................................................................................. 38
`5. USER STUDY WITH NFC PAYMENT......................................................................................... 39
`5.1.
`USER STUDY .............................................................................................................................. 39
`5.2.
`PRELIMINARY FIELD STUDY....................................................................................................... 39
`5.3.
`HOW I PLANNED TO CONDUCT THE USER STUDY ........................................................................ 40
`5.4.
`USER STUDY DESIGN ................................................................................................................. 40
`5.5.
`INFORMANTS.............................................................................................................................. 41
`5.6.
`HOW I ACTUALLY CARRIED OUT THE USER STUDY ..................................................................... 42
`5.7.
`NFC IN USE – NOKIA 3220......................................................................................................... 44
`5.8.
`SUMMARY.................................................................................................................................. 47
`USER STUDY...........................................................................FEIL! BOKMERKE ER IKKE DEFINERT.
`6.
`FINDINGS AND ANALYSIS .......................................................................................................... 48
`6.1.
`SURVEY 1 - INFORMANTS’ BACKGROUNDS AND MOBILE PHONE USAGE ..................................... 48
`6.2.
`OBSERVATIONS AFTER TASK 1................................................................................................... 50
`6.3.
`OBSERVATIONS AFTER TASK 2................................................................................................... 51
`6.4.
`SURVEY 2 – THOUGHTS AND IDEAS AFTER TASK 1..................................................................... 52
`
`3.
`
`IX
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 9 of 109
`
`

`

`SURVEY 3 – THOUGHTS AND IDEA AFTER TASK 2 ...................................................................... 57
`6.5.
`INTERVIEWS ............................................................................................................................... 61
`6.6.
`SUMMARY.................................................................................................................................. 66
`6.7.
`7. DISCUSSION.................................................................................................................................... 67
`7.1.
`DIFFERENCE IN USER EXPERIENCE............................................................................................. 67
`7.2.
`VISIBLE IN USE VS. INVISIBLE IN USE.......................................................................................... 71
`8. CONCLUSION ................................................................................................................................. 78
`REFERENCES ........................................................................................................................................... 80
`APPENDIX A ................................................................................................................................................I
`APPENDIX B............................................................................................................................................... II
`APPENDIX C ...............................................................................................................................................V
`APPENDIX D ............................................................................................................................................... 8
`APPENDIX E.............................................................................................................................................. 10
`
`
`X
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 10 of 109
`
`

`

`
`Figures
`
`FIGURE 1 EARLY ADOPTERS ........................................................................................................................... 7
`FIGURE 2PRAGMATIC ADOPTERS .................................................................................................................... 7
`FIGURE 3: LATE ADOPTERS............................................................................................................................. 7
`FIGURE 4: THE MAJOR TRENDS IN COMPUTING ............................................................................................ 11
`FIGURE 5: DIFFERENT USES OF NFC.............................................................................................................. 20
`FIGURE 6: EXAMPLES OF NFC (FELICA) USE................................................................................................ 21
`FIGURE 7: NFC AND OTHER STANDARDS....................................................................................................... 24
`FIGURE 8: NOKIA 3220 WITH NFC SHELL INTERACTING WITH VISA-SENSOR............................................... 26
`FIGURE 9: DIFFERENT RESEARCH METHODS .................................................................................................. 30
`FIGURE 10: UNDERLYING EPISTEMOLOGY..................................................................................................... 32
`FIGURE 11: PROFESSIONALS VS. STUDENTS .................................................................................................. 49
`FIGURE 12: FORGETTING THE MOBILE PHONE AT HOME............................................................................... 50
`FIGURE 13: PROBLEMS – SWIPING THE NFC PHONE...................................................................................... 53
`FIGURE 14: HOW DID THE NFC PHONE KNOW WHICH ITEM YOU WANTED?.................................................. 54
`FIGURE 15: VIEWPOINTS FOR USING NFC PAYMENT..................................................................................... 55
`FIGURE 16: THEIR OWN DESCRIPTION OF THIS PAYMENT METHOD............................................................... 56
`FIGURE 17: TIME-SAVING OR TIME-CONSUMING? ......................................................................................... 57
`FIGURE 18: EXPERIENCE OF USING NFC-PAYMENT NOW .............................................................................. 58
`FIGURE 19: COMMENTS ABOUT THE MENU ................................................................................................... 58
`FIGURE 20: CONCERNS AFTER SURVEY 2...................................................................................................... 60
`FIGURE 21: CONCERNS AFTER SURVEY 3...................................................................................................... 60
`FIGURE 22: IMPORTANT DIMENSIONS FOR GROUP 1 AND GROUP 2................................................................ 69
`
`
`XI
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 11 of 109
`
`

`

`XII XII
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 12 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 12 of 109
`
`

`

` List of Acronyms
`
`
`NFC Near Field Communication
`RFID Radio Frquency Identification
`SMS Short Message Service
`WAP Wireless Application Protocol
`HCI Human Computer Interaction
`
`
`XIII
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 13 of 109
`
`

`

`XIV XIV
`
`
`
`GOOGLE LLC V. RFCYBER CORP. / Page 14 of 109
`
`GOOG-1032
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 14 of 109
`
`

`

`1. Introduction
`
`
`1. Introduction
`
`
`
`
`“..Ubiquitous Computing will help overcome the problem of information
`overload. There is more information available at out fingertips during a walk in
`the wood than in any computer system, yet people find a walk among tree relaxing
`and computers frustrating.
`Machines that fit the human environment, instead of forcing humans to enter
`theirs, will make using a computer as refreshing as taking a walk in the woods.”
`-- Mark Weiser (1991)
`
`
`
`Background and Motivation
`1.1.
`Humans and computing technology have always been fascinating to me. It’s refreshing to
`get to know new and different people, and it’s refreshing to try out new technological
`inventions. Interactions between these two “creatures” has become an interesting and not
`to mention important subject of research the past decades. New technology gets
`developed all the time, thus research has to be done continuously. Some computing
`technologies help people in their daily life, while other computing devices become
`themselves an important part of people’s daily life. Technology industry rules the world.
`If all computing devices vanished today, half of the world would stop. Humans users
`have become depended on the computing technology.
`
`Some researchers are sceptical to the technological influence on our lives and would
`prefer it to vanish. Other researchers would like the computers to be everywhere and do
`all the work in our daily lives. Another group of researchers have another kind of
`approach:
`- Let the technology vanish when we don’t need it, and let it appear when we need it!
`The message has been something like this the past decade from some research
`communities.
`
`
`1
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 15 of 109
`
`

`

`1. Introduction
`
`
`
`
`Mark Weiser has been a central figure in this socio-technical approach towards
`technology. There is a need to understand how human best can benefit from the
`interactions with the computers. Donald Norman calls for the computing industry to
`understand human’s, the user’s needs when it comes to computing technology. His
`conclusions are also in the same path as Weiser: “Computers should be invisible”.
`
`As said earlier, new technologies emerge all the time. One emerging technology today is
`Near Field Communication (NFC). One domain of use for this technology is contactless
`payment via mobile phone. This is a good example of a Ubiquitous Computing device.
`Mobile phones are everywhere, in almost every human’s hand in the developed countries.
`NFC is a technology hidden under the hood of the mobile phone. NFC enabled mobile
`phones will let you contactlessly and electronically pay for a product. International
`newspapers write regularly that electronic payment via credit cards or internet is
`increasing steadily. Payment with NFC enabled mobile phones has already become an
`important trend in Japan. A study of these user trends should be of great importance for
`the technology industry and socio-technical researchers. Yet still very few field studies,
`even less user studies, have been conducted so far. In Europe such studies are still in their
`early stages.
`
`Based on the above mentioned motivations it should be enriching to study this new
`emerging NFC technology closer, which could help us with the daily payment process.
`Nevertheless it would be highly valuable to gain understanding on the human’s
`interaction with this emerging, ubiquitous technology that could change our everyday
`life.
`
`To sum up, the objective of this thesis is to contribute to the knowledge of the emerging
`possibilities with NFC payment and how people relate to them.
`
`
`2
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 16 of 109
`
`

`

`1. Introduction
`
`
`
`
`
`Problem Definition
`1.2.
`The problem definition has its main focus on the NFC payment technology and the user
`experience in a Ubiquitous Computing context. Three problem statements were
`constructed to explore the above mentioned focus of the problem definition:
`
`
`- Describe the possibilities that emerge with NFC as a payment method.
`- Conduct a user study of NFC as a payment method.
`- Discuss how NFC payment appears as visible or invisible technology for the
`users in the user study.
`
`
`The first problem statement will be answered through the chapter with technical
`background of NFC technology and the possibilities it produces. The second problem
`statement will be explored through a user case. The last problems statement will be
`answered through a discussion on the theory in relation to the findings.
`
`The underlying perception for the last problem statement is that there will be difference
`in use and experience for users with different age and background. It is expected that this
`difference will appear in the user study which is designed in consideration of visibility
`and invisibility in Ubiquitous Computing. The idea is that a technology is at its best when
`it’s faded into the background when it’s not needed. It will be in the periphery of our
`attention even if it still is there, but it would not interfere with our daily life and thus it
`will remain invisible. On the other hand, in the moment it is needed and activated by us,
`it will move to the foreground, to the centre of our attention, and hence it now will be
`visible. Various researchers in the field of Ubiquitous Computing believe that people
`prefer invisible computing devices. It will be interesting to see how the different users in
`this research study will react to this issue; if they react in the same way or differently
`when some elements with the NFC payment first will appear as invisible and later as
`visible.
`
`
`3
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 17 of 109
`
`

`

`1. Introduction
`
`
`
`
`
`Target group
`1.3.
`The research in this thesis is mainly addressed towards the field of Information Systems
`at University of Oslo. But it should also be of interest for various students, researchers
`and interested readers with at least basic academic knowledge of the interaction between
`humans and computers.
`
`
`Research Method in Brief
`1.4.
`The problem domain was little known to me before the research was started. NFC
`technology was still fairly new. One thing that was clear to me was that I wanted to study
`users’ behavior and reactions of using a contactless payment method like NFC payment.
`The human aspect was important in the investigation of this new technology. It felt
`natural to choose a research method that focuses on understanding people in a given
`context. Qualitative research was chosen:
`
` “Qualitative research methods are designed to help researchers understand
`people and the social and cultural contexts within which they live” (Myers, 1997).
`
` A
`
` case study research was conducted. This way of research helps investigate
`contemporary phenomenon:
`
`“A case study is an empirical inquiry that investigates a contemporary
`phenomenon within its real-life context, especially when the boundaries between
`phenomenon and context are not clearly evident” (Myers, 1997).
`
`
`Research skills that were used for data collection were interviews, observations and
`qualitative surveys. In addition a literature study was done which was used as a base in
`the case and problem definition.
`
`
`4
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 18 of 109
`
`

`

`1. Introduction
`
`
`
`
`
`Structure of the report
`1.5.
`The thesis is structured in the following way:
`
`Chapter 1 introduces the background and motivation for the thesis and presents the
`problem definition. In addition to this the research methods used to study NFC payment,
`are presented.
`
`Chapter 2 presents the theoretical concepts and research on Ubiquitous Computing
`related issues, which will be used to shed light upon the empirical findings.
`
`Chapter 3 introduces NFC and the possibility of contactless payment it brings.
`
`Chapter 4 describes some relevant research approaches, which methods were chosen and
`how they were applied.
`
`Chapter 5 presents the user study that was conducted, the design of the user study and
`the equipment used.
`
`Chapter 6 describes the empirical findings. Main findings will be presented and there
`will be referred to situations and feedback from observations and surveys, and results
`from the interviews.
`
`Chapter 7 discusses the findings based on the theory. The chapter discusses the user
`groups’ experiences with NFC payment with visible and invisible elements.
`
`Chapter 8 sums up the problem definition and its statements, shows how they are
`answered through chapters of theory, NFC technology, findings and discussion. Further
`work is also described.
`
`
`
`5
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 19 of 109
`
`

`

`2. Theoretical Focus And Related Literature
`
`
`
`
`2. Theoretical Focus and Related Literature
`In this chapter theories based on existing research will be introduced. The focus is on
`Ubiquitous Computing, Calm Computing, Ambient Intelligence, Tangible Bits,
`Unremarkable Computing. The book by Donald A. Norman “The Invisible Computer”,
`has also been used, as a reference and inspiration. Some other related theories are also
`reviewed. All the theories are related to what impact computing has to people; thus the
`focus is mainly on the interaction between humans and computers.
`
`
`The Invisible Computer
`2.1.
`Donald A. Norman says in his book, “The Invisible Computer” (Norman, 1998), that
`customers are ready for products that offer convenience, ease of use and pleasure. The
`technology should be invisible, hidden from sight. He says that companies must change
`the way they develop products:
`
`
`“They need to start with an understanding of people: user needs first, technology
`last – the opposite of how things are done now. Companies need human-centered
`development process, even if it means reorganizing the entire company.”
`
`Norman’s view is that the customer’s real needs are productivity, ease of use, getting the
`job done. These are the dimensions that should be focused on. He has observed that in
`our world with extensive use of technology, everything seems to be difficult to use. It
`seems like there is a general perception among people that the best technology is the
`technology that is most complicated and overwhelming. His conclusion seems to be
`simply this: the emphasis tends to be on technology, rather than the user.
`
`The term “technology” could have different meanings for different people in different
`contexts. Norman discusses that in everyday speech we refer to “technology” as things
`that are new. Especially electronic devices we use in the daily life, or what we think we
`want to use in the daily life, are what we often refer to as “technology”. A special feature
`
`6
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 20 of 109
`
`

`

`2. Theoretical Focus And Related Literature
`
`
`
`
`with technologies is that they often are taken for granted. We often tend to forget that
`everyday tools like pencil, paper, paper clips, pins and so on are actually commonplace
`technologies. We use them and rely on them everyday without giving them a single
`thought. The idea is that when we start assuming that the technological features are
`reliable and robust, we tend to ignore them or take them for granted.
`
`Norman talks about three main kinds of users/customers in the context of a technology’s
`life cycle.
`
`
`1. Early Adopters:
`- Early days of technology
`- People who buy new technology because they are in love with technology and
`the functions.
`Important dimensions: New cutting edge technology, new functions.
`-
`- They will buy almost any new item, or whose needs for the newly developed
`functions are so great that they are willing to put up with any other problems.
`Figure 1 Early Adopters
`
`
`2. Pragmatic Adopters:
`- Adolescent stage of technology
`- People who wait until they see whether the new technology stabilized, whether
`it can actually deliver its promises.
`Important dimensions: Reliability, maintenance, cost.
`-
`- Everyone has comparable technology: Technology is taken for granted.
`Figure 2Pragmatic Adopters
`
`
`3. Late Adopters:
`- Adulthood/mature days of technology
`- People who wants this from the technology: “Turn it on, use it, and forget it”
`Important dimensions: cost, appearance & convenience
`-
`- Taken for granted: functionality & reliability
`- Product provides real value
`- Technology move to the background
`Figure 3: Late Adopters
`
`In other words, Norman divides the technology in the three stages; early days with the
`early adopters, adolescent stage with the pragmatic adopters and adulthood with the late
`adopters. To generalize we can say that the early adopters focus on the new cutting edge
`technology and the new functionalities. We can say that the pragmatic adopters focus
`more on reliability. But the last group, the late adopters focus on both the functionality
`
`7
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 21 of 109
`
`

`

`2. Theoretical Focus And Related Literature
`
`
`
`
`and reliability. It is in the adolescent stage with the pragmatics adopters that we can see
`the pattern that everyone has compatible technology, hence it is taken for granted. In the
`adulthood stage of the technology with the conservative late adopters Norman talks about
`product providing new value and hence technology moves to the background.
`
`To sum up, the majority wants convenience, ease of use and reliability. They want
`solutions that simplify their lives, not technology that complicate them. As we have seen
`Norman also discusses that good technologies are “invisible” or “taken for granted”,
`never the less: “technology should move to the background”.
`
`Being inspired by these visions of Donald Norman and “The Invisible Computer”, I
`started to dig a bit deeper in this path of Human Computer Interaction. In the following
`chapters some of the above stated issues will be discussed more deeply, while other
`issues will be discussed a bit indirectly. Different researchers have different meaning to
`these issues, but there seems to be a uniform understanding of that these issues are
`important in the discussion of developing useful and user centric technologies and
`computers. We will see that the theories about Ubiquitous Computing by Mark Weiser in
`many ways conform to Norman’s views. Mark Weiser’s theories laid also the
`groundwork for many of the later theories in Human Computer Interaction (HCI).
`
`
`2.2.
`
`Ubiquitous Computing
`
`
`
`“The most profound technologies are those that disappear. They weave
`themselves into the fabric of everyday life until they are indistinguishable from
`it.”
`
`-- Mark Weiser (Weiser, 1991)
`
`
`Historical Background
`Ubiquitous Computing is a computing paradigm first articulated by Mark Weiser at
`Xerox PARC in 1991 and proposed as paradigm with an article in the American Scientist:
`
`8
`
`
`
`GOOG-1032
`GOOGLE LLC v. RFCYBER CORP. / Page 22 of 109
`
`

`

`2. Theoretical Focus And Related Literatu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket