Research Article
Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things
Table 4
Vague values of each subindicator of data security.
| ā | A 31 | A 32 | A 33 | A 34 |
| P1 | [0.70, 0.80] | [0.60, 0.70] | [0.65, 0.85] | [0.25, 0.55] | P2 | [0.40, 0.50] | [0.30, 0.40] | [0.35, 0.60] | [0.50, 0.60] | P3 | [0.30, 0.40] | [0.30, 0.40] | [0.45, 0.70] | [0.30, 0.50] | P4 | [0, 0] | [0, 0] | [0, 0] | [0.10, 0.20] | P5 | [0, 0] | [0, 0] | [0, 0] | [0, 0] |
|
|