{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T19:47:40Z","timestamp":1714160860711},"reference-count":20,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.<\/jats:p>","DOI":"10.4018\/ijeis.2018010104","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:21:42Z","timestamp":1517246502000},"page":"63-76","source":"Crossref","is-referenced-by-count":6,"title":["E-Commerce Security Research in Big Data Environment"],"prefix":"10.4018","volume":"14","author":[{"given":"Mei","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information, GUI Zhou University of Finance and Economics, Guiyang, China"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information, GUI Zhou University of Finance and Economics, Guiyang, China"}]},{"given":"Jinghua","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Information, GUI Zhou University of Finance and Economics, Guiyang, China"}]}],"member":"2432","reference":[{"key":"IJEIS.2018010104-0","unstructured":"Si, Y. S., Yang, W. T., & Liu, G. (2011). A Quantitative Risk Evaluation Model of E-commerce System. Journal of North China Institute of Water Conservancy and Hydroelectric Power, 32(3), 136\u2013138."},{"issue":"26","key":"IJEIS.2018010104-1","first-page":"76","article-title":"Research on Architecture of Electronic Commerce","volume":"2","author":"J.Bo","year":"2010","journal-title":"Microcomputer Information,"},{"key":"IJEIS.2018010104-2","author":"Y.Chen","year":"2013","journal-title":"Study on the Impact of Big Data Processing in Electronic Commerce"},{"issue":"1","key":"IJEIS.2018010104-3","first-page":"246","article-title":"Big data security and privacy protection","volume":"37","author":"D.Feng","year":"2014","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"IJEIS.2018010104-4","article-title":"On the research frontiers of business management in the context of Big Data","volume":"16","author":"Z.Feng","year":"2013","journal-title":"Journal of Management Sciences in China"},{"key":"IJEIS.2018010104-5","author":"Y.Guo","year":"2012","journal-title":"Design and Implementation of the Data Storage System Based on Cloud Storage"},{"key":"IJEIS.2018010104-6","author":"Y.Guo","year":"2012","journal-title":"Hadoop distributed data cleaning Method the research and implementation of Hadoop data cleaning algorithm based on Outlier mining"},{"issue":"20","key":"IJEIS.2018010104-7","first-page":"1","article-title":"Analysis on the current situation and technical strategy of the development of electronic commerce security","volume":"17","author":"W.Hao","year":"2012","journal-title":"Computer CD Software and Applications"},{"issue":"1","key":"IJEIS.2018010104-8","first-page":"114","article-title":"Study on Electric Commercial Safety Architecture in Gr id-Environment","volume":"24","author":"X.Meng","year":"2006","journal-title":"Jisuanji Yingyong Yanjiu"},{"issue":"6","key":"IJEIS.2018010104-9","first-page":"37","article-title":"Weblog Mining Based on Hadoop","volume":"15","author":"C.Miao","year":"2011","journal-title":"Computer Engineering"},{"key":"IJEIS.2018010104-10","author":"L.Qing","year":"2014","journal-title":"Processing Research of big data processing based on NoSQL"},{"key":"IJEIS.2018010104-11","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04416"},{"key":"IJEIS.2018010104-12","unstructured":"Shu, X., & Li, A. (2013). Research of E- commerce security in big data and cloud computing environment. In Proceedings of the 2013 Chinese Information Economic Association annual meeting and international graduate Symposium."},{"key":"IJEIS.2018010104-13","author":"L.Tong","year":"2012","journal-title":"Design and Implementation of the Data Analysis System Based on HADOOP"},{"key":"IJEIS.2018010104-14","unstructured":"Wang, S., & Li, J. (2013). Research on the security risk assessment model of electronic commerce. Modern management science, 35(1), 73-78."},{"key":"IJEIS.2018010104-15","author":"W.Xiu","year":"2014","journal-title":"Research on e-commerce security risk assessment model for cloud computing environment"},{"key":"IJEIS.2018010104-16","author":"D.Yansui","year":"2015","journal-title":"The security of e-commerce in cloud computing environment and Its Countermeasures"},{"key":"IJEIS.2018010104-17","unstructured":"Yu, L., Li, J., & He, Y. (2012). Introduction to electronic commerce (3rd ed.). Beijing: Tsinghua University press."},{"issue":"10","key":"IJEIS.2018010104-18","first-page":"2141","article-title":"Efficient Processing of Spatial Keyword Queries on HBase","volume":"33","author":"Z.Yu","year":"2012","journal-title":"Journal of Chinese Computer Systems"},{"key":"IJEIS.2018010104-19","author":"D.Yuan","year":"2010","journal-title":"Research on theory and model of the e\u2013commerce pariicirtor credit risk evaluation"}],"container-title":["International Journal of Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=198430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:50:07Z","timestamp":1651780207000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJEIS.2018010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijeis.2018010104","relation":{},"ISSN":["1548-1115","1548-1123"],"issn-type":[{"value":"1548-1115","type":"print"},{"value":"1548-1123","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}