dcsimg

Nine Ways to Improve Tweets - Slide 2




1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Nine Ways to Improve Tweets-2 Next

Twitter emphasizes real-time information, so information rapidly gets stale. Followers quickly get bored of even relatively fresh links seen multiple times.

Twitter users choose the microblogs they follow, but that doesn't mean they always like what they get. Researchers at Carnegie Mellon University, the Massachusetts Institute of Technology and the Georgia Institute of Technology found that users say only a little more than a third of the tweets they receive are worthwhile.
Other tweets are either so-so or, in one out of four cases, not worth reading at all.
Twitter says more than 200 million tweets are sent each day, yet most users get little feedback about the messages they send besides occasional retweets by followers, or when followers opt to stop following them.
"If we understood what is worth reading and why, we might design better tools for presenting and filtering content, as well as help people understand the expectations of other users," said Paul André, a post-doctoral fellow in Carnegie Mellon's Human-Computer Interaction Institute and lead author of the study.
"A well-received tweet is not all that common," said Michael Bernstein, a co-author of the study and doctoral student at MIT. "A significant amount of content is considered not worth reading, for a variety of reasons." Despite the social nature of Twitter, tweets that were part of someone else's conversation, or updates around current mood or activity were the most strongly disliked.
On the other hand, tweets that included questions to followers, information sharing and self-promotion (such as links to content the writer had created) were more often liked.
This slideshow features nine lessons, identified by the study, for improving tweet content.

More Slideshows:


Five Reasons Project Portfolio Management Will Matter to CIOs in 2012 PPM is moving beyond business projects to managing value and change, as well.

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012 Businesses need to increase their focus on identity and privacy projects that can deliver real value not just to IT, but also to the business.

Spam and Phishing Report: Scammers Taking Advantage of Major EventsSpammers are using major events and holidays to make their mail more appealing.

 

Related Topics : Twitter, Tablets Netbooks and UMPCs, InfiniBand, Compensation, Nearshoring

 
More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

HCI 10 Reasons Why the Enterprise Is Turning to Hyperconverged Infrastructure

While HCI is certainly innovative in design, its true measure lies in the practical benefits it brings to data center management and operations. ...  More >>

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.