A Summary Of Big Data Analytics In Electronic Commerce
Keywords:
E-Commerce, Big Data Analytics, and Big Data Analytics for Big DataAbstract
There are a number of problems with the widespread use of big data in online shopping, the most well-known of which being security. Businesses that deal in online sales are mainly concerned with how to establish a reliable method of risk assessment within the context of cloud computing.This study examines the security system of e-commerce and discusses the prevention of hidden security policies, bringing together data and e-commerce security. Presenting the Hadoop architecture through Apache Hadoop, this article analyses the YCSB benchmark with a focus on when e-commerce big data technology genuinely begins to address the problems with e-commerce security. The electronic security data perspective allows for the examination of the hidden e-commerce dangers and the successful enhancement of the e-commerce security system.
Downloads
References
S. Akter and S. F. Wamba,”Big data analytics in E-commerce: A systematic review and agenda for future research,” Electron. Markets, vol. 26, no. 2, pp. 173194, May 2016.
Thi Mai Le and Shu-Yi Liaw,”Effects of Pros and Cons of Applying Big Data Analytics to Consumers’ Responses in an E-Commerce Context”,MDIP,BDCC,DOI:10.3390/SU9050798,May 2017.
SARAH S. ALRUMIAH AND MOHAMMED HADWAN,” Implementing Big Data Analytics in E- Commerce:Vendor and Customer View”, IEEE Access,vol.9,March 2021.
Uyoyo Zino Edosio, 2014, ”Big Data Analytics and its Application in E-Commerce”, E-Commerce Technologies At: University of Bradford.
https://millimetric.ai/blog/the-9-biggest-big-data-challenges-for-ecommerce-directors/(Negative Impact of BDA).
https://www.talend.com/resources/big-data-ecommerce/(Importance of BDA in ecommerce).
https://www.ibef.org/blogs/scope-of-data-analytics-in-india-and-future(for current Data Analytics for India).
https://www.hdfstutorial.com/blog/big-data-ecommerce-case-studies/(forindustryCasestudies)
C. Bingand Z. Xiang,2017, “Cloud service platform of electronic identity in cyberspace,” Cluster Computing, pp. 413–425.
J. Peng, X. Zhi, and M. Qiu,2017, “Research on application classification method in cloud computing environment,”, pp. 3488–3507.
F. Pop, B. C. Mocanu,andCitoteanu, 2015, “Trustmodels for efficient communication in Mobile Cloud Computing and their applications to e-Commerce,”, pp. 982–1000, 2015.
N. Kumar, and S. Zeadally,2017, “Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges,” IEEE Communications Magazine, vol. 55, no. 11, pp. 114–122.
H. Jianminand P. Zhang, 2018, “Exploring theinnovation modes and evolution of the cloud-based service using the activity theory on the basis of big data,”, pp. 907–922.
N. Kyriakou and Popa, 2017, “Inter-organizational innovation and cloud computing,”, pp. 379–401.
W. Wangand S. Feng, 2018, “Government affairs service platform for smart city,”, pp. 443–451.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.