Computer security technology in E-commerce platform business model construction

被引:1
|
作者
Ma, Xiuli [1 ]
Wang, Zehao [2 ]
机构
[1] Huzhou Vocat & Tech Coll, Huzhou 313000, Zhejiang, Peoples R China
[2] Zhejiang Hairui Network Technol Co Ltd, Huzhou 313000, Zhejiang, Peoples R China
关键词
E-commerce; Big data; Decision making; BIG DATA;
D O I
10.1016/j.heliyon.2024.e28571
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The global e-commerce market is expanding rapidly as the big data era advances and the ecommerce industry thrives. This paper aims to discuss the application of computer security technology in constructing an e-commerce platform business model. The research aims to find effective security technology solutions to strengthen the security of e-commerce platforms, protect user information and rights, and enhance the sustainable development of business models. Big Data-assisted E-Commerce Business Model (BD-ECBM) construction is discussed to overcome the e-commerce platform issues and positively impact marketing strategy decision-makers by raising their level of awareness. The business decision-making process is a series of steps that help businesses overcome obstacles by collecting relevant data, analyzing all relevant alternatives, and settling on a course of action. Big data analytics can improve business management with data fusion technology in many ways. The system's framework of the information service layer, the application-level layer, and the client session layer was developed using the Business model paradigm for accounting for e-past, commerce's capabilities of the platform, and an analysis of supply and demand. It can monitor its rivals in near real-time, adjusting prices, offering more attractive deals, and analyzing negative customer comments to see if it can outperform its rivals. The trial results demonstrate the effectiveness of this method of making marketing decisions and formulating a strategy. Hence, the BD-ECBM technique improves customers' overall satisfaction and experience with the brand while raising the latter's profile.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Research of E-Commerce Security Technology
    Hong, Xie
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3548 - 3552
  • [2] Probe into E-commerce Security Technology
    Ge Qingping
    Feng Li
    Yang Li
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 425 - 428
  • [3] E-commerce platform in housing construction of construction industry
    Pan Fang
    Li Jian-ping
    Pan Yu
    [J]. PROCEEDINGS OF THE 2007 CHINESE CONTROL AND DECISION CONFERENCE, 2007, : 873 - +
  • [4] Construction of E-Commerce Economic Management Platform Based on Data Visualization Technology
    Meng, Xianglin
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [5] Building a Business Using E-commerce Technology
    Fibriyanti, W.
    Kurniasih, D.
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATICS, ENGINEERING, SCIENCE, AND TECHNOLOGY (INCITEST 2019), 2019, 662
  • [6] The impact of trust on the technology acceptance model in business to consumer e-commerce
    McCord, M
    Ratnasingam, P
    [J]. Innovations Through Information Technology, Vols 1 and 2, 2004, : 921 - 924
  • [7] The security audit mechanism in the enterprise e-commerce platform
    Zhang, CY
    Piao, CH
    Zhang, L
    Zheng, LJ
    [J]. ADVANCES IN E-ENGINEERING AND DIGITAL ENTERPRISE TECHNOLOGY-I, PROCEEDINGS, 2004, : 499 - 506
  • [8] CONSTRUCTION OF COMPUTER TECHNOLOGY PERSONALIZED RECOMMENDATION MODEL BASED ON ALLEVIATING E-COMMERCE USERS CHOICE ANXIETY
    Zhao, Lixia
    [J]. PSYCHIATRIA DANUBINA, 2022, 34 : S543 - S544
  • [9] Research on Jiangxi tourism e-commerce platform construction
    Zeng, ZhouYu
    Ye, XiongYing
    [J]. RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-4, 2013, 734-737 : 2990 - 2993
  • [10] Studying on construction programs of the platform of agricultural e-commerce
    Meng, Xiaoming
    [J]. IITA 2007: WORKSHOP ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, PROCEEDINGS, 2007, : 354 - 357