INFORMATION SECURITY ASSESSMENT BASED ON MACHINE LEARNING TECHNOLOGY-FUZZY-GRA-AHP
Keywords:Information Security, Gray Relation Analytic (GRA), Machine Learning, Fuzzy Computing, Analytic Hierarchy Process (AHP)
With the advent of the information age, information security has become an urgent problem to be solved. Various application and platforms have not only brought convenience to people, but also brought hidden dangers - information security risks. This paper uses some of the machine learning technology - fuzzy computing and gray relation analysis (GRA), to analyze data of the three major video platforms of China, and takes the information security level as a new criterion to conduct the evaluation of their performance. An assessment model is constructed based on machine learning technology, namely the combination of fuzzy computing and GRA and analytic hierarchy process (AHP). Conclusions can be drawn as follows. First, consumers’ perception of video platform information security level is constantly being strengthened. Second, information security risks are affecting consumers' choice decisions about video platforms, and the weights will continue to increase. Third, video platforms are paying more attention to information security construction.
Jiang Liqiu. Research on Video Website Communication Mode and Development Strategy. [D], Hunan Normal University,2015
Xie Xinzhou, Huang Yuting. The application of big data in network video needs more rationality. Visit Ge Chengzhi, Dean of Academy of IQYI Data. [J]. News and Writing, 2018 (09): 82-85
Zhao Meng. The Construction of Internal Control Evaluation System in University based on Environmental Target—Using AHP-Fuzzy Analysis Method. Communication of Finance and Accounting[J].2017, (34),55-57+4
Chen Hongyan. Fuzzy Analysis of Operational Safety Evaluation of Chemical Logistics Enterprises. Journal of Commercial Economics.2015(11),25-26
Xue Song. Research on the Competitiveness of Video Websites Based on Multiple Regression [D]. Yanshan University, 2017
Chai Xiaotian. Research on the "Feedback" Effect of Self-made Programs on TV under the Background of Media Integration [D]. Zhengzhou University, 2017.
Sun Yonglu. Research on Automatic Discovery and Evaluation Method of Internet Video Service Website [D]. China University of Science and Technology, 2014.
Shen Junwei. Research on Core Competence of Internet Video Website [J]. Times Finance, 2015 (11): 208-209.
Jiang Chengming, Jiang Xinghao, Sun Tanfeng. Video Filtration for Content Security based on Multimodal Features[J]. Information Security and Communications Privacy.2012 (3):76-77
Chen Yingjie. Overseas Practices in Information Security Policies Concerning Internet New Applications[J]. Modern Science & Technology of Telecommunications.2009(5):37-41
Lu Xin, Zhang Meng, Tan Yueyang. Research on Signal Processing and Reduction Technology of Computer Video Leakage Information[J]. Science and Technology Innovation Herald.2019(6):142-143
Wu Youxin, Wu Bo, Zhang Ming. Information Security Hidden Troubles in Network Video and Countermeasures.China Radio & TV Academic Journal[J].2009(11):44-45
Shu Wanchang. Application and Analysis of Reptilian Technology in Big Data Field [J]. Scientific and Technological Innovation, 2018 (36): 91-92.
199 IT Internet Data Center.www.emarketer.com. 2018,7
How to Cite
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.