EconPapers    
Economics at your fingertips  
 

Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method

Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Muhammad Ramzan Saeed and Yu Zhou

Complexity, 2022, vol. 2022, 1-27

Abstract: In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy numbers (2TLCq-ROFNs) to tackle this issue. We propose the 2TLCq-ROF concept by combining the complex q-rung orthopair fuzzy set with 2-tuple linguistic terms, including the fundamental definition, operational rules, scoring, and accuracy functions. Aggregation operators are the fundamental mathematical approach used to combine various inputs into a single output. Taking into account the interaction between the attributes, we develop the 2TLCq-ROF Hamacher (2TLCq-ROFH) operators by using the innovative operational rules. These operators include the 2TLCq-ROFH weighted average (2TLCq-ROFHWA), 2TLCq-ROFH ordered weighted average (2TLCq-ROFHOWA), 2TLCq-ROFH hybrid average (2TLCq-ROFHHA), 2TLCq-ROFH weighted geometric (2TLCq-ROFHWG), 2TLCq-ROFH ordered weighted geometric (2TLCq-ROFHOWG), and 2TLCq-ROFH hybrid geometric (2TLCq-ROFHHG) operators. In addition, we talk about the properties of 2TLCq-ROFH operators such as idempotency, commutativity, monotonicity, and boundedness and also examine their spatial cases. To tackle the problems of the 2TLCq-ROF multiattribute group decision-making (MAGDM) environment, we develop a novel approach according to the COPRAS (complex proportional assessment) model. Finally, to validate the feasibility of the given strategy, we employ a quantitative example related to select the best network security service provider. In comparison with existing approaches, the developed decision-making algorithm is most extensively used and reduces the loss of information.

Date: 2022
References: Add references at CitEc
Citations:

Downloads: (external link)
http://downloads.hindawi.com/journals/complexity/2022/4523287.pdf (application/pdf)
http://downloads.hindawi.com/journals/complexity/2022/4523287.xml (application/xml)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:hin:complx:4523287

DOI: 10.1155/2022/4523287

Access Statistics for this article

More articles in Complexity from Hindawi
Bibliographic data for series maintained by Mohamed Abdelhakeem ().

 
Page updated 2025-03-19
Handle: RePEc:hin:complx:4523287