{"title":"基于AHP和TOPSIS方法的中小企业软件安全关键成功因子估算","authors":"N. Kavyashree, M. Supriya, M. Lokesh","doi":"10.2991/ahis.k.210913.018","DOIUrl":null,"url":null,"abstract":"In small and medium scale software industry, software security success factor is trivial process. Six-sigma and fuzzy logic methodology address software security problems effectively in the state of work. The research work chosen Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchical Process (AHP) method to identify critical success factor estimation. The experimental case study, shows the Euclidean distance amongst the nine components of IOS mobile application. The results discuss on the goal alternate and the best/worst alternate Ranking of the factors to verify mobile IOS application software security. For attaining supportable software security, it is authoritative to safeguard that best practices are conscripted in considering the security valuation at the actual commencement of the software development life cycle.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach\",\"authors\":\"N. Kavyashree, M. Supriya, M. Lokesh\",\"doi\":\"10.2991/ahis.k.210913.018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In small and medium scale software industry, software security success factor is trivial process. Six-sigma and fuzzy logic methodology address software security problems effectively in the state of work. The research work chosen Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchical Process (AHP) method to identify critical success factor estimation. The experimental case study, shows the Euclidean distance amongst the nine components of IOS mobile application. The results discuss on the goal alternate and the best/worst alternate Ranking of the factors to verify mobile IOS application software security. For attaining supportable software security, it is authoritative to safeguard that best practices are conscripted in considering the security valuation at the actual commencement of the software development life cycle.\",\"PeriodicalId\":417648,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2991/ahis.k.210913.018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/ahis.k.210913.018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach
In small and medium scale software industry, software security success factor is trivial process. Six-sigma and fuzzy logic methodology address software security problems effectively in the state of work. The research work chosen Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchical Process (AHP) method to identify critical success factor estimation. The experimental case study, shows the Euclidean distance amongst the nine components of IOS mobile application. The results discuss on the goal alternate and the best/worst alternate Ranking of the factors to verify mobile IOS application software security. For attaining supportable software security, it is authoritative to safeguard that best practices are conscripted in considering the security valuation at the actual commencement of the software development life cycle.