@Article{csse.2021.015284, AUTHOR = {Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Masood Ahmad, Abhishek Kumar Pandey, Rajeev Kumar,4, Raees Ahmad Khan}, TITLE = {Impact of Tools and Techniques for Securing Consultancy Services}, JOURNAL = {Computer Systems Science and Engineering}, VOLUME = {37}, YEAR = {2021}, NUMBER = {3}, PAGES = {347--360}, URL = {http://www.techscience.com/csse/v37n3/41715}, ISSN = {}, ABSTRACT = {In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on the intended outcomes only and often ignore the security-specific issues. Our research study is an initiative to recommend the use of a hybrid computational technique based on fuzzy Analytical Hierarchy Process (AHP) and fuzzy Technique for Order Preference by Similarity to Ideal Solutions (TOPSIS) for prioritizing the tools and techniques that are used in consultancy services on the basis of their security features and efficacy. The empirical analysis conducted in this context shows that after implementing the assessment process, the rank of the tools and techniques obtained is: A7 > A1 > A4 > A2 > A3 > A5 > A6 > A7, and General Electric McKinsey (GE-McKinsey) Nine-box Matrix (A7) obtained the highest rank. Thus, the outcomes show that this order of selection of the tools and techniques will give the most effective and secure services. The awareness about using the best tools and techniques in consultancy services is as important as selecting the most secure tool for solving a given problem. In this league, the results obtained in this study would be a conclusive and a reliable reference for the consultants.}, DOI = {10.32604/csse.2021.015284} }