Demand Forecast of NFC Mobile Users – A Case Study of Serbian Market
Near Field Communication (NFC) is a very short-range type of radio communication that is compatible with other contactless communication technologies. It provides enormous possibilities, particularly given that it does not require any particular communication infrastructure. NFC technology has found possible application in contactless cards and mobile phone devices as a communication infrastructure which provides a platform for the development of NFC-based business services. This paper proposes a novel approach to forecasting the number of new users of NFC mobile phones based on fuzzy logic and the Norton-Bass diffusion model. The proposed approach is demonstrated through the case study.
 Slade EL, Williams MD, Dwivedi YK. Extending UTAUT2 to explore consumer adoption of mobile payments. In: Proceedings of the UK Academy for Information Systems Conference, Oxford; 2013.
 Amoroso DL, Magnier-Watanabe R. Building a research model for mobile wallet consumer adoption: the case of Mobile Suica in Japan. J. Theor. Appl. Electron. Commer. Res. 2012;7(1): 94-110.
 Dahlberg T, Guo J, Ondrus J. A critical review of mobile payment research. Electronic Commerce Research and Applications. 2015;14(5): 265-284.
 Oliveira T, Thomas M, Baptista G, Campos F. Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior. 2016;61: 404-414.
 Ooi K-B, Tan GW-H. Mobile technology acceptance model: An investigation using mobile users to explore smartphone credit card. Expert Systems with Applications. 2016;59: 33-46.
 Leong L, Hew T, Tan GW-H, Ooi K-B. Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach. Expert Systems with Applications. 2013;40(14): 5604-5620.
 Pham TT, Ho J. The effects of product-related, personal-related factors and attractiveness of alternatives on consumer adoption of NFC-based mobile payments. Technology in Society. 2015;43: 159-172.
 RATEL. An Overview of the Telecom and Postal Services Market in the Republic of Serbia in 2015. Available from: http://www.ratel.rs/regulativa/analize_trzista.539.html
 Ecma International. Standard ECMA-352, Near Field Communication Interface and Protocol-2-2. Geneve: 2010. Available from: http://www.ecmainternational.org/publications/files/ECMA-ST/Ecma-352.pdf
 Madlmayr G, Langer J, Scharinger J. Managing an NFC Ecosystem. In: Proceedings of 7th International Conference on Mobile Business 2008 (ICMB 2008), Barcelona; 2008. p. 95-101.
 The Java Community Process. Available from: http://www.jcp.org /en/jsr/detail?id=257 (Accessed 09 November 2015)
 Rukzio E, Schmidt A, Hussmann H. Physical Posters as Gateways to Context-aware Services for Mobile Devices. In: Proceedings of Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004). English Lake District, UK. IEEE; 2004. p. 10-19.
 Dahlberg T, Mallat N, Ondrus J, Zmijewska A. Past, present and future of mobile payments research: A literature review. Electronic Commerce Research and Applications. 2008;7(2): 165-181.
 Madureira A. Factors that hinder the success of SIMbased mobile NFC service deployments. Telematics and Informatics. 2017;34(1): 133-150.
  Tagawa K. NFC: The Evolution Continues. NFC Forum, WIMA Monaco. Paper Presented at the 5th Global NFC Applications Products & Service Congress, Monaco; 2011.
 NFC Forum. Available from: http://www.NFC forum.org (Accessed 06 November 2015)
 Hassinen M. Utilizing national public-key infrastructure in mobile payment systems. Electronic Commerce Research and Applications. 2008;7(2): 214-231.
 NXP Semiconductors. Available from: http://www.nxp.com/ (Accessed 28 October 2015)
 Chidembo N. Exploring consumer adoption of NFC-enabled mobile payments in South Africa. Master thesis. University of Pretoria, South Africa; 2009.
 Madlmayr G, Langer J, Kantner C, Scharinger J. NFC devices: Security and privacy. In: Proceedings of the third international conference on availability, reliability and security, Barcelona; 2008. p. 642-647.
 Zadeh LA. Fuzzy sets. Information and Control. 1965;8: 338-353.
 Mamdani EH. Advances in the linguistic synthesis of fuzzy controllers. In: Mamdani EH, Gaines BR. (Eds.) Fuzzy Reasoning and its Applications. London, UK: Academic Press; 1981.
 Mamdani EH, Assilian S. Experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies. 1975;7: 1-13.
 Tettamanzi A, Carlesi M, Pannese L, Santalmasi M. Business Intelligence for Strategic Marketing: Predictive Modelling of Customer Behaviour Using Fuzzy Logic and Evolutionary Algorithms. In: Giacobini M, et al. (Eds.) Applications of Evolutionary Computing. Springer-Verlag Berlin Heidelberg; 2007. p. 233-240.
 Escoda A, Ortega A, Sanz A, Herms A. Demand forecast by neuro-fuzzy techniques. In: Proceedings of the Sixth IEEE International Conference, Barcelona. IEEE; 1997. p. 1381-1386.
 Guiffrida I, Nagi R. Fuzzy set theory applications in production management research: A literature survey. Journal of Intelligent Manufacturing. 1998;9: 39-56.
 Radojičić V, Marković G, Bakmaz B. New Diffusion Model with Variable Market Potential. In: Proceedings of 10th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS), Niš, Serbia. IEEE; 2011. p. 637-640.
 Bass F. A New Product Growth Model for Consumer Durables. Management Science. 1969;15(1): 215-227.
 Mahajan V, Peterson R. Models for Innovation Diffusion. Newbury Park, CA: Sage; 1985.
 Meade N, Islam T. Modelling and forecasting the diffusion innovation – A 25-year review. International Journal of Forecasting. 2006;22(3): 519-545.
 Kim N, Chang DR, Shocker AD. Modelling intercategory and generational dynamic for a growing information technology industry. Management Science. 2000;46(4): 496-512.
 Mahajan V, Muller E. Timing, diffusion, and substitution of successive generations of technological innovations: The IBM mainframe case. Technological Forecasting and Social Change. 1996;51(2): 109-132.
 Norton JA, Bass FM. Evolution of Technological Generations: The Law of Capture. Sloan Management Review. 1992;33: 66-77.
 Pae JH, Lehmann DR. Multigeneration innovation diffusion: The impact of intergeneration time. Journal of the Academy of Marketing Science. 2003;31(1): 36-45.
 Dereli T, Durmusoglu A, Daim T. Buyer/seller collaboration through measurement of beliefs on innovativeness of products. Computers in Industry. 2011;62: 205-212.
 Norton JA, Bass FM. A Diffusion Theory Model of Adoption and Substitution for Successive Generations of High Technology Product. Management Science. 1987;33: 1069-1086.
 Teodorović D, Šelmić M. Computer Intelligence in Traffic. [in Serbian]. Belgrade: Faculty of Transport and Traffic Engineering; 2012.
 Green K, Armstrong S, Graefe A. Methods to Elicit Forecasts from Groups: Delphi and Prediction Markets Compared. The International Journal of Applied Forecasting. 2007;8: 17-20.
 Radojičić V, Marković G, Janković M, Drašković B. Broadband Traffic Forecasting in the Transport Network. Promet – Traffic & Transportation. 2012;24(4): 275-284.
 Radojičić V, Bakmaz B. The application of quantitative methods of forecasting in telecommunications [in Serbian]. Belgrade: Faculty of Transport and Traffic Engineering; 2010.
 Satoh DA. Discrete Bass Model and its Parameter Estimation. Journal of the Operations Research. Society of Japan. 2001;44(1): 1-18.
 Hamilton JD. Time Series Analysis. Vol. 2. Princeton: Princeton University Press; 1994.
 Lewis CD. International and Business Forecasting Methods. London: Butterworths; 1982.
 Montgomery DC, Peck EA, Vining GG. Introduction to Linear Regression Analysis. 3rd ed. New York: John Wiley & Sons; 2001.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).