2018
DOI: 10.1002/cpe.4881
|View full text |Cite
|
Sign up to set email alerts
|

Research on information security and privacy protection model based on consumer behavior in big data environment

Abstract: SummaryIn the big data era, information security is becoming more and more important. The recent scandal of the data privacy on Facebook sounded the warning bell for us. Based on the utility theory, this paper proposes that the disclosure behavior of consumer personal information is mainly influenced by two factors, which are perceived risk and perceived benefit, respectively. When consumers make decisions, they weigh the risks and benefits. If the income is greater than the risk, the consumer is willing to pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The fifth and final step is that the consumer ultimately agrees to purchase the product. Big data technology can collect these transaction data in this final step, further expand and refine the consumer profile, thereby increasing the probability of the next purchase by this consumer [9]. Overall, big data technology can be helpful in all five steps of the AIDMA model.…”
Section: Scenario 1: Aidma Model Based On Big Datamentioning
confidence: 99%
“…The fifth and final step is that the consumer ultimately agrees to purchase the product. Big data technology can collect these transaction data in this final step, further expand and refine the consumer profile, thereby increasing the probability of the next purchase by this consumer [9]. Overall, big data technology can be helpful in all five steps of the AIDMA model.…”
Section: Scenario 1: Aidma Model Based On Big Datamentioning
confidence: 99%
“…WSN as a wireless communication system composes of many sensing devices distributed in space. These devices employ sensors to monitor our environmental conditions and changes or perform ecological monitoring, healthcare monitoring, home automation, traffic control, etc.…”
Section: Related Workmentioning
confidence: 99%
“…This study focuses on two aspects, ie, transmission efficiency and security . To achieve the former, the virtual GPS mechanism and the Rectangular Frame with Dynamic Routing mechanism (RFDR for short), which will be described later, are used.…”
Section: Introductionmentioning
confidence: 99%