Skip to main content

Evaluation of the Preference of Web Browsers Among Undergraduates Using AHP-TOPSIS Model

  • Conference paper
  • First Online:
Proceedings of Third International Conference on Sustainable Expert Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 587))

  • 494 Accesses

Abstract

Technology has advanced at a rapid speed over the years, causing people to spend a majority of their time surfing the Internet. For the convenience of the users, people come up with a sustainable technology called web browsers. However, many web browsers exist nowadays, and the user's face resides in their ability to select the most suitable alternative. The primary objective of this research study is to determine the priority of the decision criteria in the selection of web browsers among undergraduates by using Analytic Hierarchy Process Techniques for Order of Preference by Similarity to Ideal Solution (AHP-TOPSIS) model. Moreover, this study also aims to identify the most preferred web browsers. The decision alternatives such as Google Chrome, Mozilla Firefox, Internet Explorer, Opera, Safari, and Microsoft Edge are considered in this study. Besides, the decision criteria identified in this study are appearance, extension, speed, web features, technical help and support, and lastly privacy and security. The results show that Google Chrome is the most preferred web browser, followed by Safari, Mozilla Firefox, Microsoft Edge, Opera, and lastly Internet Explorer. Privacy and security, speed, and technical help and support are ranked as the top three influential criteria by undergraduate students. The significance of this study is to analyze web browsers as sustainable technology by determining the most preferred web browser as well as the most influential decision criterion in the selection of web browsers by the undergraduates with the AHP-TOPSIS model. This study remains a reference to enhance the improvements of the web browser as a sustainable technology in order to meet the users’ expectations in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Souley B, Sambo AS (2012) A comparative performance analysis of popular internet browsers in current web applications. West Afr J Ind Acad Res 4(1):62–68

    Google Scholar 

  2. Rostampour S (2012) An application of TOPSIS for ranking internet web browsers. Decis Sci Lett 1(2):53–58

    Google Scholar 

  3. Singh OB, Tahbildar H (2015) A literature survey on anti-phishing browser extensions. Int J Comput Sci Eng Surv 6(4):21–37

    Article  Google Scholar 

  4. Rola IS, Santos I, Balzarotti D (2017) Extension breakdown: security analysis of browsers extension resources control policies. In: 26th USENIX security symposium, Canada, 16–18 August. USENIX, Vancouver, BC. https://www.unisex.org/conference/usenixsecurity17/technical-sessions/presentation/sanchez/rola. Last Accessed 18 Aug 2017

  5. Ochin S, Gaur J (2011) Cross browser incompatibility: reason and solutions. Int J Softw Eng Appl 2(3):66–78

    Google Scholar 

  6. Barskar N, Patidar CP (2016) A survey on cross browser inconsistencies in web application. Int J Comput Appl 137(4):37–41

    Google Scholar 

  7. Manhas J (2013) A study of factors affecting websites page loading speed for efficient web performance. Int J Comput Sci Eng 1(3):32–35

    Google Scholar 

  8. Tamary J, Feitelson DG (2015) The rise of chrome. PeerJ Comput Sci 1: cs-28. https://webcache.googleusercontent.com/search?q=cache:XEyfkhKdL28J, https://peerj.com/articles/cs-28.pdf+&cd=3&hl=en&ct=clnk&gl=my. Last Accessed 28 Oct 2015

  9. Weissbacher M, Mariconti E, Suarez-Tangil G, Stringhini G, Robertson W, Kirda E (2017) Ex-Ray: detection of history-leaking browser extension. In: ACSAC 2017: proceedings of the 33rd annual computer security applications conference, pp 590–602

    Google Scholar 

  10. Laperdrix P (2019) Browser fingerprinting: an introduction and the challenges ahead. https://webcache.googleusercontent.com/search?q=cache:tN7o2c_lebwJ, https://blog.torproject.org/browser-fingerprintingintroduction-and-challengesahead+&cd=9&hl=en&ct=clnk&gl=my. Last Accessed 04 Sept 2019

  11. Snyder P, Ansari L, Taylor C, Kanich C (2016) Browser feature usage on the modern web. In: IMC 16: proceedings of the 2016 internet measurement conference, pp 97–110

    Google Scholar 

  12. Serrhini M, Moussa AA (2013) Web browsers security web-lab. Int J Online Eng 9(3):4–9

    Article  Google Scholar 

  13. Dhaya R, Kanthavel R (2020) Comprehensively meld code clone identifier for replicated source code identification in diverse web browsers. J Trends Comput Sci Smart Technol (TCSST) 2(2):109–119

    Article  Google Scholar 

  14. Joby PP (2020) Expedient information retrieval system for web pages using the natural language modeling. J Artif Intell 2(2):100–110

    Google Scholar 

  15. Amami D, Dammak F (2019) Application of AHP and TOPSIS multi-criteria decision making for patients’ priority and assignment to operating room. In: University of Sfax. The 25th international conference on multicriteria decision making. Tunisia. University of Sfax: National School of Engineers (ENIS)

    Google Scholar 

  16. Tyagia M, Kumarb P, Kumarc D (2014) A Hybrid Approach using AHP-TOPSIS for Analyzing e-SCM Performance. Procedia Eng 97:2195–2203

    Article  Google Scholar 

  17. Bhatt N (2015) An integrated AHP-TOPSIS approach in supplier selection: an automotive industry as a case study. Int J Bus Manag 3(8):160–166

    Google Scholar 

  18. Saaty TL (1980) The analytic hierarchy process. McGraw Hill, New York

    MATH  Google Scholar 

  19. Saaty TL (1990) How to make a decision: the analytic hierarchy process. Eur J Oper Res 48(1):9–26

    Article  MATH  Google Scholar 

  20. Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83–98

    Google Scholar 

  21. Hwang CL, Yoon K (2012) Multiple attribute decision making: methods and applications a state-of-the-art-survey. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  22. Satish PS, Chavan RK (2017) Web browser security: different attacks detection and prevention techniques. Int J Comput Appl 170(9):35–41

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weng Siew Lam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liew, K.F., Lam, W.S., Lam, W.H., Teh, K.X. (2023). Evaluation of the Preference of Web Browsers Among Undergraduates Using AHP-TOPSIS Model. In: Shakya, S., Balas, V.E., Haoxiang, W. (eds) Proceedings of Third International Conference on Sustainable Expert Systems . Lecture Notes in Networks and Systems, vol 587. Springer, Singapore. https://doi.org/10.1007/978-981-19-7874-6_62

Download citation

Publish with us

Policies and ethics