Research on Information Security Evaluation of Internet of Things Electronic Commerce Based on AHP

Article Preview

Abstract:

Internet of Things (IOT) is an extension and expansion of the internet development. The ultimate goal of IOT system is to realize the exchange and communication between human and thing as well as thing to thing. With the constant development of IOT, the intellectual degree of the future IOT would be higher and higher, the application filed would be getting extensive too. IOT plays a very important promoting effect on the logistic service system, corporation production and operation management, the production quality control of the online shopping by consumers and other aspects of the electronic commerce. IOT E-commerce provides extreme convenience to people’s work and life, but its information safety still has some restriction. The character of Analytic Hierarchy Process (AHP) is to divide the complicated problem into simple combinations of multiple hierarchies and factors, and group each factor in two for comparison and calculation, according to the calculated result to make judgment and make choice. This article, based on AHP model, establishes information security evaluation model of IOT electronic commerce, evaluates on the five physical measures to protect electronic label by theory analysis on algorithm and AHP model, which has certain referential value to the IOT E-commerce information security evaluation work.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 217-218)

Pages:

1355-1360

Citation:

Online since:

March 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] GUSTAVO R G, MARIO M O, CARLOS D K. Early infrastructure of an Internet of Things in Spaces for Learning[C]. Eighth IEEE International Conference on Advanced Learning Technologies, 2008: 381-383.

DOI: 10.1109/icalt.2008.210

Google Scholar

[2] Clinton Douglas, Webber sally A, Hassel John M.Implementing the Balanced Scorecard Using the Analytic Hierarchy Process. [J]. Management Accounting Quarterly. 2002, (01) : l-11.

Google Scholar

[3] YAN B, HUANG G W. Application of RFID and internet of things in monitoring and anti-counterfeiting for products[C]. 2008 International Seminar on Business and In-formation Management, 2008: 392-395.

DOI: 10.1109/isbim.2008.196

Google Scholar

[4] L I Yucun, LIU Lianchen, ZHANG Long. et al. Establishment of user management model of cooperation e-commerce platform [J]. Computer Integrated Manufacturing Systems. 2002, 8 (3): 169-172.

Google Scholar

[5] David Trejo, Shekhar Patil, Stuart Anderson and Elizabeth Cervantes. Framework for Competency and Capability Assessment for Resource Allocation[J], Journal of Management in Engineering. January 2002 : 44-49.

DOI: 10.1061/(asce)0742-597x(2002)18:1(44)

Google Scholar

[6] Hao Linal, XU Xinhe. Study of Enterprise Equipment Maintenance Management Integrated Information System Based on B/S[J]. International Journal of Plant Engineering and Management. 2000, 4(15) : 154-160.

Google Scholar

[7] Dini Endah, Hendry Raharjo. EVALUATING RELATIONSHIP OF CONSISTENCY RATIO AND NUMBER OF ALTERNATIVES ON RANK REVERSAL[C]. ISAHP 2003, 2003, 8: 203-206.

DOI: 10.13033/isahp.y2003.019

Google Scholar