{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:17:18Z","timestamp":1771676238054,"version":"3.50.1"},"reference-count":42,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper are twofold: first, develop a novel concept of a mobiquitous home application (Near Field Communication Smartphone Entertainment Systems (NFC SES)) with the use of photo interface and NFC smartphone. Second, examine age-group differences in relation to the influence of intuitive, convenience and perceived usefulness on users\u2019 behavioural intention to use NFC SES. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Using design science research, NFC SES is developed and a survey of 52 users is conducted to evaluate NFC SES. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 There are age differences in individual behavioural intention to use NFC technology. Convenience appears to be the primary factor for the youths. The adult cohort, in contrast emphasizes intuitive and perceived usefulness as two significant determinants of their behavioural intention to use NFC SES. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 This study offers a fresh insight for mobile device manufacturer and application developers to focus their design efforts around three aspects (intuitive, convenience and usefulness) that are desired by different age-group users. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Social implications<\/jats:title>\n               <jats:p> \u2013 The development of NFC SES bridges the gap of cyber-physical spaces by enabling users to automate multiple heterogeneous digital appliances without imposing undue technological effort and inconvenience. NFC SES, operating through a touch-driven interaction between NFC smartphone and photo interface, is likely to be useful for many home users, especially for people with disabilities. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 NFC SES contributes in itself as a novel innovation. Additionally, studies on mobile technology largely focus on students as users, and often neglect the adult segment. This study entails a new model for evaluation of NFC technology, by uncovering age differences impacts on new technology adoption.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imds-06-2013-0274","type":"journal-article","created":{"date-parts":[[2014,3,31]],"date-time":"2014-03-31T11:47:13Z","timestamp":1396266433000},"page":"484-502","source":"Crossref","is-referenced-by-count":17,"title":["Age-group differences in Near Field Communication smartphone"],"prefix":"10.1108","volume":"114","author":[{"given":"Pei-Lee","family":"Teh","sequence":"first","affiliation":[]},{"given":"Pervaiz","family":"K. Ahmed","sequence":"additional","affiliation":[]},{"given":"Soon-Nyean","family":"Cheong","sequence":"additional","affiliation":[]},{"given":"Wen-Jiun","family":"Yap","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010121515647600_b1","unstructured":"Anderson, C.\n                (2005), \u201cCreating conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security\u201d, Conference on Information Systems Technology (CIST)\/INFORMS, San Francisco, CA, 12-13 November."},{"key":"key2021010121515647600_b2","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n, C.\n               , \n                  Camarero, C.\n                and \n                  Rodr\u00edguez, J.\n                (2013), \u201cUsefulness, enjoyment, and self-image congruence: the adoption of e-book readers\u201d, Psychology and Marketing, Vol. 30 No. 4, pp. 372-384.","DOI":"10.1002\/mar.20612"},{"key":"key2021010121515647600_b3","unstructured":"Batat, W.\n                (2009), \u201cThe impact of technology development on youth consumption culture: an empirical investigation of French teenage's use of mobile phone device\u201d, Communications of the IBIMA, Vol. 7 No. 18, pp. 153-163."},{"key":"key2021010121515647600_b4","unstructured":"Broadcom Corporation\n                (2013), \u201cNFC leads in mobile payments and more: making \u2018Connecting everything\u00ae\u2019 a reality\u201d, available at: www.broadcom.com\/products\/features\/nfc.php (accessed 25 June 2013)."},{"key":"key2021010121515647600_b5","doi-asserted-by":"crossref","unstructured":"Brush, A.J.B.\n               , \n                  Lee, B.\n               , \n                  Mahajan, R.\n               , \n                  Agarwal, S.\n               , \n                  Saroiu, S.\n                and \n                  Dixon, C.\n                (2011), \u201cHome automation in the wild: challenges and opportunities\u201d, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Association for Computing Machinery (ACM), Vancouver, 7-12 May, pp. 2115-2124.","DOI":"10.1145\/1978942.1979249"},{"key":"key2021010121515647600_b6","doi-asserted-by":"crossref","unstructured":"Chau, P.Y.K.\n                (1996), \u201cAn empirical assessment of a modified technology acceptance model\u201d, Journal of Management Information Systems, Vol. 13 No. 2, pp. 185-204.","DOI":"10.1080\/07421222.1996.11518128"},{"key":"key2021010121515647600_b7","unstructured":"Chen, L.\n               , \n                  Pan, G.\n                and \n                  Li, S.\n                (2012), \u201cTouch-driven interaction via an NFC-enabled smartphone\u201d, paper presented at the Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference, 19-23 March, pp. 504-506, available at: http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6197548&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A6197445%29%26pageNumber%3D6 (accessed 25 June 2013)."},{"key":"key2021010121515647600_b8","doi-asserted-by":"crossref","unstructured":"Chong, A.Y.L.\n                (2013), \u201cA two-staged SEM-neural network approach for understanding and predicting the determinants of m-commerce adoption\u201d, Expert Systems with Applications, Vol. 40 No. 4, pp. 1240-1247.","DOI":"10.1016\/j.eswa.2012.08.067"},{"key":"key2021010121515647600_b9","unstructured":"comScore Data Mine\n                (2010), \u201cAge demographic breakdown of US mobile subscribers vs smartphone subscribers\u201d, available at: www.comscoredatamine.com\/2010\/11\/age-demographic-breakdown-of-u-s-mobile-subscribers-vs-smartphone-subscribers\/ (accessed 25 June 2013)."},{"key":"key2021010121515647600_b10","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n                (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2021010121515647600_b11","doi-asserted-by":"crossref","unstructured":"Davis, F.D.\n               , \n                  Bagozzi, R.P.\n                and \n                  Warshaw, P.R.\n                (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982-1003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2021010121515647600_b12","doi-asserted-by":"crossref","unstructured":"Eckl, R.\n                and \n                  MacWilliams, A.\n                (2009), \u201cSmart home challenges and approaches to solve them: a practical industrial perspective\u201d, in \n                  Tavangarian, D.\n               , \n                  Kirste, T.\n               , \n                  Timmermann, D.\n               , \n                  Lucke, U.\n                and \n                  Versick, D.\n                (Eds), Intelligent Interactive Assistance and Mobile Multimedia Computing, Springer-Verlag, Berlin, Heidelberg, pp. 119-130.","DOI":"10.1007\/978-3-642-10263-9_11"},{"key":"key2021010121515647600_b13","doi-asserted-by":"crossref","unstructured":"Giniger, S.\n               , \n                  Dispenzieri, A.\n                and \n                  Eisenberg, J.\n                (1983), \u201cAge, experience, and performance on speed and skill jobs in an applied setting\u201d, Journal of Applied Psychology, Vol. 68 No. 3, pp. 469-475.","DOI":"10.1037\/0021-9010.68.3.469"},{"key":"key2021010121515647600_b14","doi-asserted-by":"crossref","unstructured":"Grant, I.\n                and \n                  O'Donohoe, S.\n                (2007), \u201cWhy young consumers are not open to mobile marketing communication\u201d, International Journal of Advertising, Vol. 26 No. 2, pp. 223-246.","DOI":"10.1080\/10803548.2007.11073008"},{"key":"key2021010121515647600_b15","doi-asserted-by":"crossref","unstructured":"Gregor, S.\n                and \n                  Hevner, A.R.\n                (2013), \u201cPositioning and presenting design science research for maximum impact\u201d, MIS Quarterly, Vol. 37 No. 2, pp. 337-355.","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"key2021010121515647600_b16","unstructured":"GSMA\n                (2012), \u201cKorea blazes global trail for NFC\u201d, available at: www.gsma.com\/mobilenfc\/wp-content\/uploads\/2012\/11\/Korea-Case-Study-Nov-2012-FINAL.pdf (accessed 25 June 2013)."},{"key":"key2021010121515647600_b17","unstructured":"Hair, J.F. Jr\n               , \n                  Black, W.C.\n               , \n                  Babin, B.J.\n                and \n                  Anderson, R.E.\n                (2010), Multivariate Data Analysis: A Global Perspective, 7th ed., Pearson Education, Upper Saddle River, NJ."},{"key":"key2021010121515647600_b18","doi-asserted-by":"crossref","unstructured":"Herath, T.\n                and \n                  Rao, H.R.\n                (2009), \u201cEncouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness\u201d, Decision Support Systems, Vol. 47 No. 2, pp. 154-165.","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"key2021010121515647600_b19","unstructured":"Hornby, A.S.\n               , \n                  Wehmeier, S.\n                and \n                  Ashby, M.\n                (2005), Oxford Advanced Learner's English-Chinese Dictionary, 6th ed., Oxford University Press, Oxford."},{"key":"key2021010121515647600_b20","unstructured":"ITEX\n                (2013), \u201cAbout ITEX\u201d, available at: www.itex.com.my (accessed 25 June 2013)."},{"key":"key2021010121515647600_b21","doi-asserted-by":"crossref","unstructured":"Karahanna, E.\n               , \n                  Agarwal, R.\n                and \n                  Angst, C.M.\n                (2006), \u201cReconceptualizing compatibility beliefs in technology acceptance research\u201d, MIS Quarterly, Vol. 30 No. 4, pp. 781-804.","DOI":"10.2307\/25148754"},{"key":"key2021010121515647600_b22","doi-asserted-by":"crossref","unstructured":"Karjaluoto, H.\n               , \n                  Lehto, H.\n               , \n                  Lepp\u00e4niemi, M.\n                and \n                  Jayawardhena, C.\n                (2008), \u201cExploring gender influence on customer's intention to engage permission-based mobile marketing\u201d, Electronic Markets, Vol. 18 No. 3, pp. 242-259.","DOI":"10.1080\/10196780802265793"},{"key":"key2021010121515647600_b23","unstructured":"Katz, J.\n                (1996), \u201cThe rights of kids in the digital age\u201d, Wired, Cond\u00e9 Nast Publications Inc, San Francisco, CA."},{"key":"key2021010121515647600_b24","doi-asserted-by":"crossref","unstructured":"Kourouthanassis, P.E.\n               , \n                  Giaglis, G.M.\n                and \n                  Karaiskos, D.C.\n                (2010), \u201cDelineating \u2018pervasiveness\u2019 in pervasive information systems: a taxonomical framework and design implications\u201d, Journal of Information Technology, Vol. 25 No. 3, pp. 273-287.","DOI":"10.1057\/jit.2009.6"},{"key":"key2021010121515647600_b25","unstructured":"Lane, W.\n                and \n                  Manner, C.\n                (2011), \u201cThe impact of personality traits on smartphone ownership and use\u201d, International Journal of Business and Social Science, Vol. 2 No. 17, pp. 22-28."},{"key":"key2021010121515647600_b26","doi-asserted-by":"crossref","unstructured":"Leong, L.Y.\n               , \n                  Hew, T.S.\n               , \n                  Tan, G.W.H.\n                and \n                  Ooi, K.B.\n                (2013), \u201cPredicting the determinants of the NFC-enabled mobile credit card acceptance: a neural networks approach\u201d, Expert Systems with Applications, Vol. 40 No. 14, pp. 5604-5620.","DOI":"10.1016\/j.eswa.2013.04.018"},{"key":"key2021010121515647600_b27","doi-asserted-by":"crossref","unstructured":"Li, H.\n               , \n                  Ma, D.\n               , \n                  Saxena, N.\n               , \n                  Shrestha, B.\n                and \n                  Zhu, Y.\n                (2013), \u201cTap-wave-rub: lightweight malware prevention for smartphones using intuitive human gestures\u201d, WiSec\u201913, 17-19 April, Budapest, available at: www-personal.engin.umd.umich.edu\/\u223csafe\/publication\/wisec13.pdf (accessed 25 June 2013).","DOI":"10.1145\/2462096.2462101"},{"key":"key2021010121515647600_b29","doi-asserted-by":"crossref","unstructured":"McCarty, J.A.\n                and \n                  Shrum, L.J.\n                (1993), \u201cThe role of personal values and demographics in predicting television viewing behavior: implications for theory and application\u201d, Journal of Advertising, Vol. 22 No. 4, pp. 77-101.","DOI":"10.1080\/00913367.1993.10673420"},{"key":"key2021010121515647600_b28","unstructured":"Magura, B.\n                (2003), \u201cWhat hooks m-commerce customers?\u201d, MIT Sloan Management Review, Vol. 44 No. 3, p. -."},{"key":"key2021010121515647600_b30","doi-asserted-by":"crossref","unstructured":"Miranda, S.\n                and \n                  Pastorelly, N.\n                (2011), \u201cNFC mobiquitous information service prototyping at the University of Nice Sophia Antipolis and multi-mode NFC application proposal\u201d, Third International Workshop on Near Field Communication (NFC), 22 February, Hagenberg, pp. 3-8, available at: www.computer.org\/csdl\/proceedings\/nfc\/2011\/4327\/00\/4327a003-abs.html (accessed 25 June 2013).","DOI":"10.1109\/NFC.2011.21"},{"key":"key2021010121515647600_b31","unstructured":"NearFieldCommunication.org\n                (2013), \u201cAbout near field communication\u201d, available at: www.nearfieldcommunication.org\/about-nfc.html (accessed 25 June 2013)."},{"key":"key2021010121515647600_b32","doi-asserted-by":"crossref","unstructured":"Okazaki, S.\n                and \n                  Mendez, F.\n                (2013), \u201cPerceived ubiquity in mobile services\u201d, Journal of Interactive Marketing, Vol. 27 No. 2, pp. 98-111.","DOI":"10.1016\/j.intmar.2012.10.001"},{"key":"key2021010121515647600_b33","doi-asserted-by":"crossref","unstructured":"Parre\u00f1o, J.M.\n               , \n                  Sanz-Blas, S.\n               , \n                  Ruiz-Mafe, C.\n                and \n                  Ald\u00e1s-Manzano, J.\n                (2013), \u201cKey factors of teenagers\u2019 mobile advertising acceptance\u201d, Industrial Management & Data Systems, Vol. 113 No. 5, pp. 732-749.","DOI":"10.1108\/02635571311324179"},{"key":"key2021010121515647600_b34","doi-asserted-by":"crossref","unstructured":"Tan, G.W.H.\n               , \n                  Ooi, K.B.\n               , \n                  Chong, S.C.\n                and \n                  Hew, T.S.\n                (2014), \u201cNFC mobile credit card: the next frontier of mobile payment?\u201d, Telematics and Informatics, Vol. 31 No. 2, pp. 292-307.","DOI":"10.1016\/j.tele.2013.06.002"},{"key":"key2021010121515647600_b35","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n                and \n                  Bala, H.\n                (2008), \u201cTechnology acceptance model 3 and a research agenda on interventions\u201d, Decision Sciences, Vol. 39 No. 2, pp. 273-315.","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"key2021010121515647600_b36","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n               , \n                  Morris, M.G.\n               , \n                  Davis, G.B.\n                and \n                  Davis, F.D.\n                (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.","DOI":"10.2307\/30036540"},{"key":"key2021010121515647600_b37","doi-asserted-by":"crossref","unstructured":"Volland, D.\n               , \n                  Noyen, K.\n               , \n                  Kayikci, O.\n               , \n                  Ackermann, L.\n                and \n                  Michahelles, F.\n                (2012), \u201cSwitching the role of NFC tag and reader for the implementation of smart posters\u201d, Applications, IEEE Computer Society, Los Alamitos, CA, pp. 63-68.","DOI":"10.1109\/NFC.2012.11"},{"key":"key2021010121515647600_b38","doi-asserted-by":"crossref","unstructured":"Want, R.\n                (2011), \u201cNear field communication\u201d, Pervasive Computing, IEEE, Vol. 10 No. 3, pp. 4-7.","DOI":"10.1109\/MPRV.2011.55"},{"key":"key2021010121515647600_b40","doi-asserted-by":"crossref","unstructured":"Winkler, S.\n               , \n                  K\u00f6nig, C.J.\n                and \n                  Kleinmann, M.\n                (2013), \u201cWhat makes human resource information successful? Managers\u2019 perceptions of attributes for successful human resource information\u201d, International Journal of Human Resource Management, Vol. 24 No. 2, pp. 227-242.","DOI":"10.1080\/09585192.2012.680068"},{"key":"key2021010121515647600_b39","unstructured":"World Health Organization\n                (2013), \u201cWHO case definitions of HIV for surveillance and revised clinical staging and immunological classification of HIV-related disease in adults and children\u201d, available at: www.who.int\/en\/ (accessed 25 June 2013)."},{"key":"key2021010121515647600_b41","doi-asserted-by":"crossref","unstructured":"Yang, K.C.C.\n                (2005), \u201cExploring factors affecting the adoption of mobile commerce in Singapore\u201d, Telematics and Informatics, Vol. 22 No. 3, pp. 257-277.","DOI":"10.1016\/j.tele.2004.11.003"},{"key":"key2021010121515647600_b42","unstructured":"Zikmund, W.G.\n               , \n                  Babin, B.J.\n               , \n                  Carr, J.C.\n                and \n                  Griffin, M.\n                (2010), Business Research Methods, 8th ed., South-Western, Cengage Learning, Mason, Ohio."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMDS-06-2013-0274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-06-2013-0274\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-06-2013-0274\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:52:20Z","timestamp":1753393940000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/114\/3\/484-502\/183932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,4,8]]}},"alternative-id":["10.1108\/IMDS-06-2013-0274"],"URL":"https:\/\/doi.org\/10.1108\/imds-06-2013-0274","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2014,4,8]]}}}