Research Article
Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things
Table 3
Vague values of each subindicator of transaction security.
| ā | A 21 | A 22 | A 23 | A 24 |
| P1 | [0.35, 0.50] | [0.25, 0.65] | [0.60, 0.80] | [0.35, 0.50] | P2 | [0.50, 0.75] | [0.60, 0.80] | [0.30, 0.50] | [0.55, 0.75] | P3 | [0.20, 0.30] | [0.20, 0.30] | [0.20, 0.40] | [0.10, 0.20] | P4 | [0.10, 0.20] | [0.10, 0.20] | [0, 0] | [0, 0] | P5 | [0, 0] | [0, 0] | [0, 0] | [0, 0] |
|
|