THE PAPER | The Mechanism of "Big Data" Impact on Consumer Behavior

This article analyzed the influence from five aspects: consumer behavior in security system, information search, recommendation system, credit system, virtual experience.

By Zilong Fang and Pengju Li
College of Management, Shanghai University of Engineering Science, Shanghai, China.

Abstract

The growth of the network data is beyond the processing capacity of the existing IT infrastructure. At the same time, “big data” is also a major influence on consumer’s behavior. Customer-2-Customer (C2C) e-commerce consumption pattern is experiencing a vigorous development time of the electronic commerce in China. Because of its low threshold of setting up a shop which is occupying less money, low operating costs and obvious price advantages, low-income groups are welcome to this pattern. In case, this article analyzed the influence from five aspects: consumer behavior in security system, information search, recommendation system, credit system, virtual experience.

THE PAPER | The Mechanism of "Big Data" Impact on Consumer Behavior

1. Introduction

With the coming of information age, each data type is developing at the speed of blowout. In the era of “big data”, “big data”, which is such a case, following the cloud computing and internet of things, becomes a new hotspot in the field of information. Modern enterprise use big data in e-commerce, especially C2C e-commerce. This reduces the asymmetric information and the trust risk in the virtual shopping experience, which affect consumers’ shopping behavior patterns. Based on the analysis of the influence factors of big data for C2C e-commerce, we further analyze the mechanism of the big data’s influence on consumer behavior. Through the analysis, the influence factors of large data on consumer behavior can help manufacturers adjust strategy to meet consumer demand.

2. Big Data and Overview of C2C E-Commerce

In the era of “big data”, great changes of era have taken place. Huge amounts of data and the relevant technology of the big data has significant influence on the mode of C2C e-commerce. Therefore, understanding the big data and the definition and features of C2C e-commerce is vital for this study.

2.1. The Definition and Characteristic of Big Data

Wikipedia defines big data as “in a certain period of time, the data set could not be fetched the content, management by conventional software tools” [1]. Gartner which is an authority IT research and consulting firm defines big data as “in one or more dimensions, it is beyond extreme of traditional information management and the processing power of traditional information technology” [2]. The national science foundation (NSF) defines big data as “scientific instruments, sensors, Internet, E-mail, audio and video software, network click stream data sources generate a variety of large-scale, diversified, complicated and long-term distributed data set” [3].

In this paper, according to McKinsey and Merv Adrian’s point of view, “big data” is that hardware and software can’t in an acceptable time deal with data sets. The system has the following features. 1) Massive amounts of data (Volumes). An order of magnitude is rising continuously, from TB to PB, even EB [4]. 2) The mining potential. Vast amount of data contains a lot of valueless information [5]. 3) The diversity. There are large amounts of unstructured message data. 4) Information redundancy, huge amounts of data contains a great value, but which is filled with a lot of garbage information. 5) The speed of processing is fast. The emergence of a large number of advanced technologies greatly accelerates the data processing of technology [5]. 6) Risk is high. A large amount of data would inevitably involve the personal privacy. In addition, due to collection of a large amount of data, the growth of cost would be faster to make enterprise unprepared [4].

2.2. The Definition and Characteristic of C2C E-Commerce

C2C e-commerce refers that the enterprises provide the network platform, not involve in trading, and consumers can free trade on the platform, and the seller can choose goods online auction, and the buyer can choose goods online bidding [6].

C2C e-commerce and traditional market have both similarities and differences.

1) Consumer characteristics: C2Ce-commerce contains various age groups of consumers, men and women, income inequality. Main is families and individuals. The amount of single transaction is not big. The most part of the sellers are individual. The size of the shop is not large. As they provide employment and the desire that people start cheap open a shop. So the quantity is huge [7].

2) The third party payment platform: The construction of third-party payment platform, through a third party credit instead of personal credit, solve the problem of both sides of the transaction security and trust, and reduce the perceived risk of both parties.

3) There is no space and time limitation: Traditional entity shop sales scale is limited by geographical environment. The network is a platform which can accommodate the various regions, nations and states of all kinds of goods. At the same time, the traditional store with a few exceptions, most of them are not open for 24 hours, but online consumers can choose their favorite goods anytime and anywhere [8].

4) More convenient choices: Consumers can never leave home, anytime and anywhere, using the search engines to query information about the goods. The customers just click the mouse to purchase goods [9].

3. The Process of Decision-Making in C2C Mode

The Engel, Blackwell and Miniard, they common put forward EBM consumer purchase decision model in 1990. The decision comes from demand recognition at first. When the consumers create psychological demand, they would gather information, selection, and evaluation, finally make a purchase decision [10]. Through analysis and weigh, consumers would make a buying decision.

According to BEM model, consumers need to experience the following several stages in decision-making (Figure 1).

1) Need recognition: When consumers aware the gap between the reality and the ideal state, and start to make purchase decisions, consumer demand confirmation has generated at this time.

2) Information search: After knowing your requirements, they would begin to search for relevant information. In the network environment, there are two main types of information channels [11]. The first is to show the commodity information. The second is the third party evaluation.

3) Evaluations of alternatives: The rational consumers would collect comprehensive information of goods. This process is very important in the buying decision. Compared with business information, consumers more concern objective evaluation of the third party.

4) Purchase decision: Network consumers’ buying behavior depends on the following conditions. First, goods can meet the needs of the consumers. Second, the internet merchants must be worth trust. Third, online payment security is guaranteed [12]. The last is goods logistics is convenient.

5) Post-purchase behavior: Post-purchase behavior is a means that network consumers communicate each other. If consumers are satisfactory in the shopping experience, their evaluation is propaganda for the industry.

Figure 1. Purchase decision-making process of a consumer.

4. The Influence Mechanism of Big Data on Consumer Behavior

Different from the traditional consumer behavior, in the era of big data, the accumulation of large data and technology of C2C e-commerce model bring new influence. As stated earlier, the consumer’s purchase decision model has five stages. It is the same with shopping in traditional shopping environment. The advent of the era of “big data”, the use of massive accumulation and technology is changing consumer behavior and feeling. We want to analyze the characteristics and influence factors of consumers’ online shopping behavior, and then guide the online shopping behavior.

4.1. The Influence of Security System on Consumer Behavior

In C2C e-commerce, online shopping is done in a virtual environment. And the information flow, cash flow, logistics is done in the separation of time and space. This provides the conditions of information camouflage for product suppliers, and increases the uncertainty of the network shopping and risky [13]. Most consumers worry illegal violation of personal information in the process of network shopping, which affect the online shopping behavior.

1) The influence of security system on information search The development of modern information technology make the collection, analysis and use of personal information without permission become relatively easy. And there is the potential risk of personal privacy. Commodity information description is not clear because the understanding of goods on the network can only be done through pictures and text description. And some ambiguous description is easy to make people have different understanding.

2) The influence of security system on evaluations of alternatives Different from the traditional way of shopping, online shopping, especially online payment, need consumers transmit information on the internet. The process of transmission is likely to be tampered by criminals unauthorized. Personal information or credit card information has been modified, copied, and deleted. This would increase the consumer perceived risk of online shopping.

3) The influence of security system on purchase decision Due to network reduce the company resources that you enter and exit the market, the online store might disappear overnight. Compared with traditional shopping, returning goods on line shopping is a relatively trouble. Online retail goods depend on the impersonal electronic store to complete the transaction. And consumers cannot check goods entity. The product quality risk, returning and the cost of transportation would add the feeling of uncertainty.

4) The influence of security system on post-purchase behavior In the network shopping, space and time block make the exchange of information between consumers and businesses should be done with the help of network. Goods delivery is typically implemented by third-party logistics companies. All this has weakened the consumerto monitoring efforts of the whole process of trading. Consumers cannot determine whether all sensitive information obtain the very good protection during transmission. These would make consumers full of sense of insecurity, especially the consumers who have had shopping security disputes lose trust.

4.2. The Influence of Information Scanning on Consumer Behavior

1) The influence of information scanning on need recognition First, the emotional consumers are easy to induce their purchase desire and demand by network information. Second, as a rational consumer, rich product service information can better meet the needs of their rational judgment, and reduce the cost of information search [14].

2) The influence of information scanning on information search Shopping on the Internet, consumers are often gathering information through online information. Consumers are swimming in the ocean of information. Of course, inevitably there is some false information. But overall, compared with traditional shop mode, the online shopping spends less time and effort. And the information is more comprehensive. It is helpful for consumers to buy cheap and fine commodity.

3) The influence of information scanning on evaluations of alternatives The fully information is the basis of main decision. However a shopper’s resources (including time, energy, and money) are limited. The quick and convenience of gathering online information is one of the main reasons for consumers. Compared with the traditional model, online consumption is not only a wide range selection but also can increase the perceived value of the network shopping.

4) The influence of information scanning on purchase decision The intellect motivation is more than emotional factors. First of all; this is a process of thinking when consumers are looking for goods on the Internet. They have enough time and great convenience to analyze the price, quality, performance and appearance. Second; the network shopping is less affected by the outside factors, the physical and other buying behavior.

5) The influence of information scanning on postpurchase behavior Consumers can search interest information. They filter and browse a large number of information. This can also be comprehensive use of this information. Consumers form their own judgment of products or service. This makes the initiative of online trading in the hands of consumers.

4.3. Recommendation System’s Influence on Consumer Behavior

Recommendation system is based on the customer’s purchase behavior, browsing behavior. Recommendation system can evaluate commodity information, learn interest of the customers, products matching, recommend customers to similar goods [15].

1) The influence of recommendation system on need recognition Studies have shown that consumers can’t form a stable and clear preference as they lack complete and accurate grasp of product information. Consumer’s choice preference is not fixed, but correcting as the change of information in the process of buying. Therefore, recommendation system brings the consumers comprehensive, fully and personalized information. This changes consumer preferences. The result of the survey also shows that consumers are effected by website information and promotional when consumer is choosing goods. They think that recommendation is to give them more reference and bring more inspiration [16].

2) The influence of recommendation system on information search Information search is the best ability of recommendation system. Recommendation provides consumers with more comprehensive and more fully, more personalized information. This makes the consumers have the deeper and more accurate evaluation about product function, performance and price and so on, so as to reduce the cognitive deviation of different brand products.

3) The influence of recommendation system on evaluations of alternatives Recommend system often provide consumers information such as expert reviews and customer reviews at the same time. These would affect consumer product evaluation and attitude on different extent. In buying decision process, recommendation system would affect consumer preference function, the product evaluation and selection strategy. Preference function change means the change of standard of consumer choice. This would cause the search range of products, product evaluation criterion and product consideration set and a series of changes. Product evaluation change means the change of consumer attitudes and purchase intention of corresponding products. Product screening strategy change means that consumers would use different way of thinking, method and path to select products. Obviously these would bring the final different choice.

4) The influence of recommendation system on postpurchase behavior Recommendation system can save consumers a lot of time of information search, evaluation and selection; provide consumers with more comprehensive and quick information. Recommendation system expands the scope of product search and the evaluation; make consumers have greater product selection, thereby enhance the level of consumer purchase decision. These increase consumer trust and confidence on emotion.

4.4. Credibility Impact on Consumer Behavior

1) Credibility’s influence on evaluations of alternatives Credibility is acquired in the previous experience and interaction with others. The information is asymmetry between the seller and the buyer. Consumer cannot discern the stand or fall of product. There is the problem of adverse selection. Credit can improve the condition of the information asymmetry [17]. The buyers think the seller would provide the high quality service, when consumer is choosing high credit rating and the better goods.

2) Credibility’s influence on purchase decision The biggest characteristic of online shopping is price advantage compared with traditional shopping way. “Big data” technologies make information transfer at a relatively low cost operation. It has the significant advantages to build credibility. In addition, when the reputation is high, the impact of price and buying behavior is very weak.

When business reputation is the high, users would be fewer prices sensitive. At this time, merchants can set up a relatively high price in order to get more profit. On the other hand, for the merchants of low credibility, they should be set a low price to earnings. The conclusion has a high reference value for price strategy. Consumers tend to choose the merchants of high credit rating and better network evaluation.

3) Credibility’s influence on post-purchase behavior The speed and breadth of information transmission can’t be measured in cyberspace. Consumers would reflect the good experience in online after purchase [18]. Consumers would not only repeat purchase, but also positively recommend the goods to others. These may be benefit to the manufacturer. But if consumers are not satisfaction after shopping, they are likely to express it through the network, so that the vast number of internet users has a harmful effect on the heart, and many potential consumers lose purchase desire. The evaluation of virtual community and businesses credit rating would affect consumers’ trust.

4.5. Virtual Experience’s Influence on Consumer Behavior

In the environment of virtual experience, consumers are no longer satisfied with the function of the products, but more concerns about the emotional appeal of products, namely products bring the experience of consumers.

1) The influence of virtual experience on need recognition In the process of consumption, consumers not only pay attention to the quality of the product, but also pay more attention to the feelings of pleasure and satisfaction [19]. The consumers’ pursuit products and services can contribute to the personalized image formation and reveal their uniqueness [20]. The purpose that consumers purchase goods is an emotional desire, prefer those who can resonance between perceptual product and self psychological needs [21].

In the virtual shopping experience, the more the image perceptual experience, more direct individualized experience, the independent factors of the active participation would stimulate the desire of the product buyers.

2) The influence of virtual experience on information search In today’s highly developed Internet, consumers don’t fret the lack of information, but information too much, too miscellaneous, so that they can’t choose. In the virtual experience of C2C e-commerce, beautifully designed website, the style and atmosphere which conforms consumer preferences can stimulate the consumers’ emotional reaction [22]. Consumers often experience various brands of products in order to obtain the most direct information. That they need.

3) The influence of virtual experience on evaluations of alternatives Compared with the traditional marketing environment, in the virtual experience, consumers no longer believe too much the evaluation information of alternative products that business advertise. They are increasingly used to search information in virtual community of the assessment, or rely on their own experience of products.

4) The influence of virtual experience on purchase decision The interaction mechanism of the site solves customers’ questions in a timely manner to attract more and more consumers and discussion and sharing of product information in consumption experience. Generated by expansion of information capacity platform and an increasing number of people network effects can effectively reduce the insecurity of consumers’ online purchase and build confidence in the trading process. Consumer’s decision-making behavior in virtual experience is the initiative.

5) The influence of virtual experience on post-purchase behavior The buying process is also the experience of product process. Unlike post-purchase evaluation, the post-purchase evaluation of virtual experience would not be decided by the features of the product, but consumption experience. Purchases in any detail can produce very big effect on post-purchase evaluation [23].

5. Conclusion

The emergence of the big data is a new challenge to information security. If consumers do not understand the big data, they would have a new worry. The convenience and quick information search let consumers rely more on big data. Recommended Network provides more choices for consumers. They are more likely to believe post purchase evaluation and other consumers. Consumers have been tired of the advertising campaign. They are more likely to experience marketing, pursuit the personal experience and participate in marketing.

About The Author:

Zilong Fang, Pengju Li, College of Management, Shanghai University of Engineering Science, Shanghai, China.

Publication Details:

American Journal of Industrial and Business Management, Vol.4 No.1(2014), Article ID:42318,6 pages DOI:10.4236/ajibm.2014.41008

Copyright © 2014 Fang Zilong, Li Pengju. This is an open access article distributed under the Creative Commons Attribution License by the Original Publisher - SCRIP. All Copyright © 2014 are guarded by law and by SCIRP as a guardian.

References:


  1. Big Data. http://en.wikipedia.org/wiki/Big_data .
  2. Big Data. http://www.gartner.com/it-glossary/big-data
  3. Core Techniques and Technologies for Advancing Big Data Science & Engineering (BIGDATA) http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504767 .
  4. L. Sun, “When Talking about Big Data, What Do We Talk about,” Business Technology, Vol. 350, 2012.
  5. W. Feng, “Opportunity and Challenge of Information Security Faced by the Era of Big Data,” Expert Views, 2013.
  6. X. Y. Zhang, “The Existing Problems and Solutions in the Development of C2C E-Commerce in Our Country,” Information Method, No. 6, 2005.
  7. R. H. Zheng, “C2C E-Commerce Logistics Distribution Study,” Logistic Theory, 2011.
  8. J. M. Huang, “Discuss the Potential Development of China’s C2C E-Commerce Model,” Economic and Trade BBS, 2010.
  9. R. Zhou, “Introduction to China’s C2C E-Commerce Market Present Situation and Development Trend,” Modern Economy, No. 7, 2011.
  10. L. L. Zhang, “Enlightenment of EBM Model to Network Marketing,” Business Modernization, Vol. 386, 2009.
  11. M. L. Liu, “For Electronic Commerce: An Empirical Study of Factors Affecting Consumer Behavior,” Network Economy and E-Commerce, No. 7, 2006.
  12. H. Chen, “In the Condition of Electronic Commerce, the Factors Analysis of Consumer Purchase Decision,” Beijing University of Posts and Telecommunications, No. 2, 2007.
  13. X. Q. Wen, “The Consumer Behavior Research of Network Shopping,” Journal of Lanzhou, Vol. 189, 2006.
  14. C. Y. Hong, “The Influence of Internet Information Search Intention on Consumer Behavior Analysis,” Foreign Economic and Trade University, No. 6, 2013.
  15. S. X. Wang, “Recommendation Scheme Based on Shopping Orientation Research,” Journal of Integration Technology, No. 3, 2013.
  16. D. Zhao, “Recommendation Model Based on Network Shopping Review,” Southwest University for Nationalities, No. 3, 2012.
  17. X. F. Zhang, “The Value of Credit: The Explaining of the Characteristics of Electronic Market in China Based on Data of Taobao,” Contemporary Economic Science, No. 3, 2009.
  18. C. B. Li, “The Role of Reputation System in Online Trading,” Credit/The Rule of Law, No. 4, 2013.
  19. W. H. Su, “Web Experience Marketing and the Way of Study,” Business Management, No. 10, 2009.
  20. S. Y. Pei, “Network Consumer Behavior Research, Review and Evaluation,” Marketing Online, No. 4, 2010.
  21. Y. F. Cao, “Network Consumer Behavior Research Review,” Marketing Research, Vol. 477, 2006.
  22. A. Z. He, “Online Shopping Experience on Customer Behavior Mechanism and Model,” East China Economic Management, No. 3, 2010.
  23. X. M. Mao, “The Research of Experience Marketing of Consumer Behavior,” Marketing Tribune, No. 2, 2009.
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Academics,10,Accidents,20,Activism,1,Adani Group,4,ADB,12,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,111,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,6,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,2,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,56,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,52,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,2,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1191,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,9,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,81,Central Asian,3,Central Eastern Europe,47,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,575,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,66,Climate Change,22,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,106,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,4,COP26,4,COP28,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,3,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,12,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,21,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,2,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,46,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,7,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,107,ECOWAS,2,Ecuador,3,Edge Computing,2,Editor's Opinion,49,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,40,Electric Vehicle,14,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,13,European Union,229,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1350,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,58,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Food Security,27,Forces,1,Forecasting,2,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,13,GDPR,1,Gender Studies,2,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,8,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,67,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,95,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,169,Greece,13,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,6,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,653,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,4,Indonesia,19,IndraStra,1,Industrial Accidents,3,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,32,Investor Relations,1,iPhone,1,IPO,4,Iran,202,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,142,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,88,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,6,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,25,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,80,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,13,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,110,Military Exercise,10,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,33,Natural Disasters,14,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,23,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1244,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,685,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,17,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,52,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,11,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,4,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,17,Report,4,Reports,46,Repository,1,Republicans,3,Rescue Operation,1,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,310,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,129,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,9,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,16,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,14,Somalia,5,South Africa,20,South America,46,South Asia,467,South China Sea,35,South East Asia,74,South Korea,57,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,23,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,3,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,47,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,30,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,648,Think Tank,316,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,2,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,13,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,109,Ukraine War,21,Ummah,1,UNCLOS,7,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,750,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,24,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,2,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,11,Workers Union,1,Workshop,1,World Bank,34,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,27,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: THE PAPER | The Mechanism of "Big Data" Impact on Consumer Behavior
THE PAPER | The Mechanism of "Big Data" Impact on Consumer Behavior
This article analyzed the influence from five aspects: consumer behavior in security system, information search, recommendation system, credit system, virtual experience.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUISzQq1sHJhBP9-d3Jfw7GpxQAUEtPl8es4p_8KyPoDFVfSVJLB9DRfCFlgMR32osty1DTaNzpS6uyCGObKaf23cKxYJCQU8HZO7Q04VQc0V0P77hXDzpnWm72mW0N1nLxn4nihp76cbF/s640/1.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUISzQq1sHJhBP9-d3Jfw7GpxQAUEtPl8es4p_8KyPoDFVfSVJLB9DRfCFlgMR32osty1DTaNzpS6uyCGObKaf23cKxYJCQU8HZO7Q04VQc0V0P77hXDzpnWm72mW0N1nLxn4nihp76cbF/s72-c/1.jpg
IndraStra Global
https://www.indrastra.com/2016/01/PAPER-Mechanism-of-Big-Data-impact-on-CB-002-02-2016-0001.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2016/01/PAPER-Mechanism-of-Big-Data-impact-on-CB-002-02-2016-0001.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content