Research Article
BibTex RIS Cite

Appropriate User Acceptance Criteria For New Social Media Sites

Year 2016, , 59 - 68, 09.08.2016
https://doi.org/10.30931/jetas.288188

Abstract



Nowadays social media sites have
attracted many of users and they have become the mostly commonly used websites
for public. These websites are used by individuals, small and even big
organizations for various purposes, such as meeting your old friends, sharing
your own experiences, sharing pictures and videos, promoting businesses,
sharing knowledge etc. Their popularity is increasing at an increasing rate.
User’s needs are endless so there will be some new area for creating new social
media sites. There are two main ideas for creating new social media sites.
Firstly, one should identify the new needs of users which are not fulfilled by
the current websites. Secondly, the new website must incorporate those features
which are mostly liked by end users and add further functionality into the
website that attract more users. It is important to know the criteria based on
which the users prefer one website over the other. Therefore, the objective of
this study is to compare the use of social media and find the acceptance
criteria that why an end user prefers one social media over the other. This
user feedback based information will help social media developers to
incorporate new user needs into future social media to increase user
satisfaction. We performed experiments on data collected fifteen most commonly
used and popular social media websites in current era. The test data were
collected till May 08, 2016.



References

  • [1] Anderson, Ross. Security engineering. John Wiley & Sons, 2008.
  • [2] Kemp, Simon. "Digital, social & mobile worldwide in 2015." We are social (2015).
  • [3] “Top 15 Most Popular Social Networking Sites | February 2016”, http://www.ebizmba.com/articles/social-networking-websites, 26.02.2016.
  • [4] Baird, Henry S., Michael A. Moll, and Sui-Yu Wang. "ScatterType: a legible but hard-tosegment CAPTCHA." Document Analysis and Recognition, 2005. Proceedings. Eighth nternational Conference on. IEEE, 2005.
  • [5] Duggan, Maeve, et al. "Social media update 2014." Pew Research Center 19 (2015).
  • [6] Lamport, Leslie. "Password authentication with insecure communication." Communications of the ACM 24.11 (1981): 770-772.
  • [7] Singh, Ved Prakash, and Preet Pal. "Survey of Different Types of CAPTCHA." International Journal of Computer Science and Information Technologies 5.2 (2014): 2242-2245.
  • [8] Hoffman, Ned, David F. Pare Jr, and Jonathan A. Lee. "Tokenless identification system for authorization of electronic transactions and electronic transmissions." U.S. Patent No. 5,613,012. 18 Mar. 1997.
  • [9] Von Ahn, Luis, et al. "CAPTCHA: Using hard AI problems for security." Advances in Cryptology—EUROCRYPT 2003. Springer Berlin Heidelberg, 2003. 294-311.
  • [10] Morris, Robert, and Ken Thompson. "Password security: A case history." Communications of the ACM 22.11 (1979): 594-597.
  • [11] Miller, M. F. “Mobile device authentication.” U.S. Patent No. 8,995-960 (2015).
  • [12] Husemann, Dirk. “Payment for network-based commercial transactions using a mobile phone.” U.S. Patent Application No. 09/843,968 (2001).
  • [13] Jabeur, Nafaâ, Sherali Zeadally, and Biju Sayed, “Mobile social networking applications.” Communications of the ACM 56.3 (2013): 71-79.
Year 2016, , 59 - 68, 09.08.2016
https://doi.org/10.30931/jetas.288188

Abstract

References

  • [1] Anderson, Ross. Security engineering. John Wiley & Sons, 2008.
  • [2] Kemp, Simon. "Digital, social & mobile worldwide in 2015." We are social (2015).
  • [3] “Top 15 Most Popular Social Networking Sites | February 2016”, http://www.ebizmba.com/articles/social-networking-websites, 26.02.2016.
  • [4] Baird, Henry S., Michael A. Moll, and Sui-Yu Wang. "ScatterType: a legible but hard-tosegment CAPTCHA." Document Analysis and Recognition, 2005. Proceedings. Eighth nternational Conference on. IEEE, 2005.
  • [5] Duggan, Maeve, et al. "Social media update 2014." Pew Research Center 19 (2015).
  • [6] Lamport, Leslie. "Password authentication with insecure communication." Communications of the ACM 24.11 (1981): 770-772.
  • [7] Singh, Ved Prakash, and Preet Pal. "Survey of Different Types of CAPTCHA." International Journal of Computer Science and Information Technologies 5.2 (2014): 2242-2245.
  • [8] Hoffman, Ned, David F. Pare Jr, and Jonathan A. Lee. "Tokenless identification system for authorization of electronic transactions and electronic transmissions." U.S. Patent No. 5,613,012. 18 Mar. 1997.
  • [9] Von Ahn, Luis, et al. "CAPTCHA: Using hard AI problems for security." Advances in Cryptology—EUROCRYPT 2003. Springer Berlin Heidelberg, 2003. 294-311.
  • [10] Morris, Robert, and Ken Thompson. "Password security: A case history." Communications of the ACM 22.11 (1979): 594-597.
  • [11] Miller, M. F. “Mobile device authentication.” U.S. Patent No. 8,995-960 (2015).
  • [12] Husemann, Dirk. “Payment for network-based commercial transactions using a mobile phone.” U.S. Patent Application No. 09/843,968 (2001).
  • [13] Jabeur, Nafaâ, Sherali Zeadally, and Biju Sayed, “Mobile social networking applications.” Communications of the ACM 56.3 (2013): 71-79.
There are 13 citations in total.

Details

Subjects Engineering
Journal Section Research Article
Authors

Mirsat Yeşiltepe

Publication Date August 9, 2016
Published in Issue Year 2016

Cite

APA Yeşiltepe, M. (2016). Appropriate User Acceptance Criteria For New Social Media Sites. Journal of Engineering Technology and Applied Sciences, 1(2), 59-68. https://doi.org/10.30931/jetas.288188
AMA Yeşiltepe M. Appropriate User Acceptance Criteria For New Social Media Sites. JETAS. August 2016;1(2):59-68. doi:10.30931/jetas.288188
Chicago Yeşiltepe, Mirsat. “Appropriate User Acceptance Criteria For New Social Media Sites”. Journal of Engineering Technology and Applied Sciences 1, no. 2 (August 2016): 59-68. https://doi.org/10.30931/jetas.288188.
EndNote Yeşiltepe M (August 1, 2016) Appropriate User Acceptance Criteria For New Social Media Sites. Journal of Engineering Technology and Applied Sciences 1 2 59–68.
IEEE M. Yeşiltepe, “Appropriate User Acceptance Criteria For New Social Media Sites”, JETAS, vol. 1, no. 2, pp. 59–68, 2016, doi: 10.30931/jetas.288188.
ISNAD Yeşiltepe, Mirsat. “Appropriate User Acceptance Criteria For New Social Media Sites”. Journal of Engineering Technology and Applied Sciences 1/2 (August 2016), 59-68. https://doi.org/10.30931/jetas.288188.
JAMA Yeşiltepe M. Appropriate User Acceptance Criteria For New Social Media Sites. JETAS. 2016;1:59–68.
MLA Yeşiltepe, Mirsat. “Appropriate User Acceptance Criteria For New Social Media Sites”. Journal of Engineering Technology and Applied Sciences, vol. 1, no. 2, 2016, pp. 59-68, doi:10.30931/jetas.288188.
Vancouver Yeşiltepe M. Appropriate User Acceptance Criteria For New Social Media Sites. JETAS. 2016;1(2):59-68.