Appropriate User Acceptance Criteria For New Social Media Sites
Appropriate User Acceptance Criteria For New Social Media Sites
Nowadays social media sites have attracted many of users and they have become the mostly commonly used websites for public. These websites are used by individuals, small and even big organizations for various purposes, such as meeting your old friends, sharing your own experiences, sharing pictures and videos, promoting businesses, sharing knowledge etc. Their popularity is increasing at an increasing rate. User’s needs are endless so there will be some new area for creating new social media sites. There are two main ideas for creating new social media sites. Firstly, one should identify the new needs of users which are not fulfilled by the current websites. Secondly, the new website must incorporate those features which are mostly liked by end users and add further functionality into the website that attract more users. It is important to know the criteria based on which the users prefer one website over the other. Therefore, the objective of this study is to compare the use of social media and find the acceptance criteria that why an end user prefers one social media over the other. This user feedback based information will help social media developers to incorporate new user needs into future social media to increase user satisfaction. We performed experiments on data collected fifteen most commonly used and popular social media websites in current era. The test data were collected till May 08, 2016.
___
- [1] Anderson, Ross. Security engineering. John Wiley & Sons, 2008.
- [2] Kemp, Simon. "Digital, social & mobile worldwide in 2015." We are social (2015).
- [3] “Top 15 Most Popular Social Networking Sites | February 2016”, http://www.ebizmba.com/articles/social-networking-websites, 26.02.2016.
- [4] Baird, Henry S., Michael A. Moll, and Sui-Yu Wang. "ScatterType: a legible but hard-tosegment CAPTCHA." Document Analysis and Recognition, 2005. Proceedings. Eighth nternational Conference on. IEEE, 2005.
- [5] Duggan, Maeve, et al. "Social media update 2014." Pew Research Center 19 (2015).
- [6] Lamport, Leslie. "Password authentication with insecure communication." Communications of the ACM 24.11 (1981): 770-772.
- [7] Singh, Ved Prakash, and Preet Pal. "Survey of Different Types of CAPTCHA." International Journal of Computer Science and Information Technologies 5.2 (2014): 2242-2245.
- [8] Hoffman, Ned, David F. Pare Jr, and Jonathan A. Lee. "Tokenless identification system for authorization of electronic transactions and electronic transmissions." U.S. Patent No. 5,613,012. 18 Mar. 1997.
- [9] Von Ahn, Luis, et al. "CAPTCHA: Using hard AI problems for security." Advances in Cryptology—EUROCRYPT 2003. Springer Berlin Heidelberg, 2003. 294-311.
- [10] Morris, Robert, and Ken Thompson. "Password security: A case history." Communications of the ACM 22.11 (1979): 594-597.
- [11] Miller, M. F. “Mobile device authentication.” U.S. Patent No. 8,995-960 (2015).
- [12] Husemann, Dirk. “Payment for network-based commercial transactions using a mobile phone.” U.S. Patent Application No. 09/843,968 (2001).
- [13] Jabeur, Nafaâ, Sherali Zeadally, and Biju Sayed, “Mobile social networking applications.” Communications of the ACM 56.3 (2013): 71-79.