Cover Image

Ascertaining the Presence of Responsiveness in the Websites of Tertiary Institutions

Francis Aien-Akho Imouokhome, Kehinde Desmond Moru, Veronica I Osubor

Abstract


The use of the concept of responsiveness in designing websites aims at developing applications that respond to the behavior and background of users of the sites.  The design procedure involves the use of Cascading Style Sheet (CSS) media queries.  This intelligently blends flexible grids with image layouts and appearances. A web page, when viewed in a specific device, (for example, a desktop computer) adjusts to retain its resolution features, image size and scripting abilities on another device (e.g., laptop or mobile device) without any intervention from the device user.  Product delivery delays are avoided in responsive approach because repetitions of the different phases of the design and development cycle for every new device are eliminated; thus saving on cost. This study, motivated by the significant benefits accruable from this new technology, investigated the websites of 515 tertiary institutions on the Internet with a view to determining if they were designed using the concept of responsiveness or not. Results show that only 55% of the 515 websites were designed with responsive technique, while 45% were not.  It is therefore recommended that other tertiary institutions should adopt responsive technology in the design of their websites in order to avail themselves of its benefits

Full Text:

PDF

References


J. Liedtke, (1993). Improving IPC by Kernel Design. In Proc.14th ACM Symp. On Operating Systems Principles, pp.175–188. Dec., 1993

studyres.com/doc/4743492/the-performance-of-µ-kernel-based-systems

H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg and J. Wolter, “The Performance of µ-Kernel-Based Systems,” Proc.16th ACM Symp. On Operating Systems Principles (SOSP’97, Oct 5-8, 1997, Saint-Malo, France. https://os.inf.tu-dresden.de/papers_ps/sosp97.pdf

L. Singaravelu, , C. Pu, , H. Härtig, and C. Helmuth, (2006) Reducing TCB Complexity for Security-sensitive Applications: Three Case Studies. In Proc.1st ACM SIGOPS/EuroSys European Conf. on Computer Systems April. 2006, pp.161–174, Leuven Belgium. dl.acm.org/citation.cfm?id=1217951

F. P. Buchholz and C. Shields, (2004). Providing Process Origin Information to Aid in Computer Forensic Investigations, Journal of Computer Security. Vol. 12(5), pp. 753-776, September 2004 https://pdfs.semanticscholar.org/4cbe/681e892a6ee062c132c2587865bf2e7782c1.pdf

R. Lemos, (2005). Device Drivers Filled with Flaws, Threaten Security. Security Focus. Available online: http://www.securityfocus.com/news/11189. May 26, 2005

J. Larus, (2009). “Spending Moore’s Dividend,” Communications of the ACM (CACM), Vol. 52, No. 5, pp. 62–69. May, 2009 https://www.microsoft.com/en-us/research/wp-content/uploads/2008/05/tr-2008-69.pdf

A. H. Karp, (2003) Enforce POLA on Processes to Control Viruses. Communications of the ACM (CACM), 46(12):27–29. Dec., 2003 https://cacm.acm.org/magazines/2003/12/6658-enforce-pola-on-processes-to-control-viruses/fulltext

A . Ozment, and S. E. Schechter, “Milk or Wine: Does Software Security Improve with Age?” Proc.15th USENIX Security Symp., pp.93–104. July 3, 2006 https://www.usenix.org/legacyurl/15th-usenix-security-symposium-58


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 University of Sindh Journal of Information and Communication Technology



ISSN-E: 2523-1235, ISSN-P: 2521-5582

 Copyright © University of Sindh, Jamshoro. 2017 All Rights Reserved.  
Printing and Publication by: Sindh University Press. 


Journal Office, Institute of Information and Communication Technology, 
University of Sindh, Jamshoro, Sindh, Pakistan. 76080