Open Access iconOpen Access

ARTICLE

crossmark

Impact of Tools and Techniques for Securing Consultancy Services

Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

1 Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
2 Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
3 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
4 Department of Computer Application, Shri Ramswaroop Memorial University, Barabanki, 225003, India

* Corresponding Author: Rajeev Kumar. Email: email

Computer Systems Science and Engineering 2021, 37(3), 347-360. https://doi.org/10.32604/csse.2021.015284

Abstract

In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues. Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process (AHP) and fuzzy Technique for Order Preference by Similarity to Ideal Solutions (TOPSIS) for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy. The empirical analysis conducted in this context shows that after implementing the assessment process, the rank of the tools and techniques obtained is: A7 > A1 > A4 > A2 > A3 > A5 > A6 > A7, and General Electric McKinsey (GE-McKinsey) Nine-box Matrix (A7) obtained the highest rank. Thus, the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services. The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem. In this league, the results obtained in this study would be a conclusive and a reliable reference for the consultants.

Keywords


Cite This Article

APA Style
Alosaimi, W., Alharbi, A., Alyami, H., Ahmad, M., Pandey, A.K. et al. (2021). Impact of tools and techniques for securing consultancy services. Computer Systems Science and Engineering, 37(3), 347-360. https://doi.org/10.32604/csse.2021.015284
Vancouver Style
Alosaimi W, Alharbi A, Alyami H, Ahmad M, Pandey AK, Kumar R, et al. Impact of tools and techniques for securing consultancy services. Comput Syst Sci Eng. 2021;37(3):347-360 https://doi.org/10.32604/csse.2021.015284
IEEE Style
W. Alosaimi et al., “Impact of Tools and Techniques for Securing Consultancy Services,” Comput. Syst. Sci. Eng., vol. 37, no. 3, pp. 347-360, 2021. https://doi.org/10.32604/csse.2021.015284

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2277

    View

  • 1254

    Download

  • 2

    Like

Share Link