You are here

APPROPRIATE USER ACCEPTANCE CRITERIA FOR NEW SOCIAL MEDIA SITES

Journal Name:

Publication Year:

Author NameUniversity of Author
Abstract (2. Language): 
Nowadays social media sites have attracted many of users and they have become the mostly commonly used websites for public. These websites are used by individuals, small and even big organizations for various purposes, such as meeting your old friends, sharing your own experiences, sharing pictures and videos, promoting businesses, sharing knowledge etc. Their popularity is increasing at an increasing rate. User’s needs are endless so there will be some new area for creating new social media sites. There are two main ideas for creating new social media sites. Firstly, one should identify the new needs of users which are not fulfilled by the current websites. Secondly, the new website must incorporate those features which are mostly liked by end users and add further functionality into the website that attract more users. It is important to know the criteria based on which the users prefer one website over the other. Therefore, the objective of this study is to compare the use of social media and find the acceptance criteria that why an end user prefers one social media over the other. This user feedback based information will help social media developers to incorporate new user needs into future social media to increase user satisfaction. We performed experiments on data collected fifteen most commonly used and popular social media websites in current era. The test data were collected till May 08, 2016.
59
68

REFERENCES

References: 

[1] Anderson, Ross, Security engineering (John Wiley & Sons, 2008).
[2] Kemp, Simon, “Digital, social & mobile worldwide in 2015.” We are social, Special
Report (2015).
[3] “Top 15 Most Popular Social Networking Sites.”, last modified 12 March, 2016,
http://www.ebizmba.com/articles/social-networking-websites.
[4] Baird, Henry S., Michael A. Moll, and Sui-Yu Wang, “ScatterType: a legible but hardto-
segment CAPTCHA.” (paper presented at the annual meeting for the Document
Analysis and Recognition, 2005. Proceedings. Eighth International Conference on. IEEE,
2005).
[5] Duggan, M., “Social Media Update 2014.” Pew Research Center, (2015).
[6] Lamport, Leslie, “Password authentication with insecure communication.”
Communications of the ACM 24.11 (1981): 770-772.
[7] Singh, Ved Prakash, and Preet Pal, “Survey of different types of CAPTCHA.”
International Journal of Computer Science and Information Technologies 5.2 (2014):
2242-2245.
[8] Hoffman, Ned, “Token less biometric electronic transactions using an audio signature to
identify the transaction processor.” U.S. Patent No. 6,397,198 (2002).
68
[9] Von Ahn, Luis, “CAPTCHA: Using hard AI problems for security.” (paper presented at
the annual meeting for the International Conference on the Theory and Applications of
Cryptographic Techniques. Springer Berlin Heidelberg, 2003).
[10] Morris, Robert, and Ken Thompson, “Password security: A case history.”
Communications of the ACM 22.11 (1979): 594-597.
[11] Miller, M. F. “Mobile device authentication.” U.S. Patent No. 8,995-960 (2015).
[12] Husemann, Dirk. “Payment for network-based commercial transactions using a mobile
phone.” U.S. Patent Application No. 09/843,968 (2001).
[13] Jabeur, Nafaâ, Sherali Zeadally, and Biju Sayed, “Mobile social networking
applications.” Communications of the ACM 56.3 (2013): 71-79.

Thank you for copying data from http://www.arastirmax.com