Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (5): 33-35    DOI:
Current Issue | Archive | Adv Search |
Research on the Protection of Consumers' Privacy in Electronic Commerce
Zhao Junjie
Anhui University of Finance
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the wide use of precision marketing and personalized services, some of the market main body pays more and more attention to understand the consumers, they are motivated by profit to obtain and make use of its information of online consumers without knowledge or willingness. It violates the privacy of consumers. Although consumers can enjoy more convenient and personalized products and services, they also pay attention to the privacy of personal information protection increasingly. This paper summarizes the consumer privacy in e-commerce, and sums up the common way of consumer information collection in electronic commerce. Finally, the data mining technology and common algorithm based on privacy protection are summarized.
Key wordselectronic commerce      consumer      privacy protection      data mining      information collection     
Published: 10 November 2017
ZTFLH:  D923  

Cite this article:

Zhao Junjie. Research on the Protection of Consumers' Privacy in Electronic Commerce. Computer & Telecommunication, 2016, 1(5): 33-35.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I5/33

[1] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Construction and Research on Data Mining Course Based on Jupyter[J]. 电脑与电信, 2021, 1(7): 12-16.
[2] GE Xiao-yan. Exploring on Mixed Teaching Reform of Data Mining Course[J]. 电脑与电信, 2021, 1(6): 43-46.
[3] ZHANG Chun LIU Chao LIU Xv-dong CHEN Zhi-hao JIANG Yong ZHANG Hui ZHOU Hui HU Jian-cun. Consumer Portrait Construction and Potential Consumer Mining Method in Business District[J]. 电脑与电信, 2021, 1(6): 79-86.
[4] CAI Zhao-zhao NUERAILI Aierken. Research on Mixed Teaching Mode of Data Mining Course Based on SPOC[J]. 电脑与电信, 2020, 1(9): 40-42.
[5] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[6] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[7] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[8] . K-Means ParallelizationAlgorithm Based on Canopy[J]. 电脑与电信, 2019, 1(7): 30-.
[9] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[10] ZHAO Yu-kuo. Design Method of Communication Trace and Information Analysis System[J]. 电脑与电信, 2018, 1(9): 52-53.
[11] WANG Yi-bai. Research on Clustering K-means Algorithm Based on Hadoop Platform[J]. 电脑与电信, 2018, 1(4): 18-20.
[12] ZHANG Zhi-wen, HE Ming-chang, YANGWei-wei, LIU Ren-xiao, WANG Yu, HU Xue-you. The Design and Implementation of System to Realize the Value of Knowledge and Skills[J]. 电脑与电信, 2018, 1(4): 27-30.
[13] WEI Shuang. An Enhanced Data Mining Method for Text Clustering[J]. 电脑与电信, 2018, 1(3): 46-48.
[14] PAN Zheng-yong. Design and Application of Automatic Data Acquisition System for Soil and Water Conservation Monitoring Station Based on Big Data[J]. 电脑与电信, 2018, 1(1-2): 64-66.
[15] Jiang Mengyi, He Mingchang, Zhou Linhui, Ye Huan, Yan Liuping, Wang Rong. The Design and Implementation of Public Square Dancing Online Community Based on .NET[J]. 电脑与电信, 2017, 1(5): 7-10.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd