Add like
Add dislike
Add to saved papers

Computer security technology in E-commerce platform business model construction.

Heliyon 2024 April 16
The global e-commerce market is expanding rapidly as the big data era advances and the e-commerce industry thrives. This paper aims to discuss the application of computer security technology in constructing an e-commerce platform business model. The research aims to find effective security technology solutions to strengthen the security of e-commerce platforms, protect user information and rights, and enhance the sustainable development of business models. Big Data-assisted E-Commerce Business Model (BD-ECBM) construction is discussed to overcome the e-commerce platform issues and positively impact marketing strategy decision-makers by raising their level of awareness. The business decision-making process is a series of steps that help businesses overcome obstacles by collecting relevant data, analyzing all relevant alternatives, and settling on a course of action. Big data analytics can improve business management with data fusion technology in many ways. The system's framework of the information service layer, the application-level layer, and the client session layer was developed using the Business model paradigm for accounting for e-past, commerce's capabilities of the platform, and an analysis of supply and demand. It can monitor its rivals in near real-time, adjusting prices, offering more attractive deals, and analyzing negative customer comments to see if it can outperform its rivals. The trial results demonstrate the effectiveness of this method of making marketing decisions and formulating a strategy. Hence, the BD-ECBM technique improves customers' overall satisfaction and experience with the brand while raising the latter's profile.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app