Brand Digital Marketing under Intranet Security Control Based on the Machine Learning Classification Algorithm
With the advent of the information age, digital marketing models have begun to receive attention and to have applications in many industries. Although the digital marketing model has thus become a hot spot in the sales world, there is still not enough research on digital marketing. In order to optim...
Gespeichert in:
| Veröffentlicht in: | Security and communication networks Jg. 2021; S. 1 - 10 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
London
Hindawi
03.11.2021
John Wiley & Sons, Inc |
| Schlagworte: | |
| ISSN: | 1939-0114, 1939-0122 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | With the advent of the information age, digital marketing models have begun to receive attention and to have applications in many industries. Although the digital marketing model has thus become a hot spot in the sales world, there is still not enough research on digital marketing. In order to optimize brand digital marketing under internal and external security control based on the machine learning classification algorithm, this paper uses fuzzy system theory to perform fuzzy analysis on various experimental data studied, convert it into a fuzzy set, obtain the fuzzy solution of the related function, establish related models of machine learning classification algorithms, and identify and collect relevant experimental data in an intelligent way, saving time for data collection. This paper collects the customer characteristics, customer sensitivity, brand promotion, and brand revenue of a brand within seven days; then uses the classification algorithm and collected data to predict and analyze the future data results; and uses the machine learning classification algorithm model formula to solve the correlation function. The final experimental results show that, in the digital marketing mode, network marketing brings 75% of the benefits to the brand, which is the highest among the four digital marketing models, and it has the best brand publicity level, 45%. At the same time, customers’ sensitivity to the brand reaches 50% under the network marketing model. |
|---|---|
| AbstractList | With the advent of the information age, digital marketing models have begun to receive attention and to have applications in many industries. Although the digital marketing model has thus become a hot spot in the sales world, there is still not enough research on digital marketing. In order to optimize brand digital marketing under internal and external security control based on the machine learning classification algorithm, this paper uses fuzzy system theory to perform fuzzy analysis on various experimental data studied, convert it into a fuzzy set, obtain the fuzzy solution of the related function, establish related models of machine learning classification algorithms, and identify and collect relevant experimental data in an intelligent way, saving time for data collection. This paper collects the customer characteristics, customer sensitivity, brand promotion, and brand revenue of a brand within seven days; then uses the classification algorithm and collected data to predict and analyze the future data results; and uses the machine learning classification algorithm model formula to solve the correlation function. The final experimental results show that, in the digital marketing mode, network marketing brings 75% of the benefits to the brand, which is the highest among the four digital marketing models, and it has the best brand publicity level, 45%. At the same time, customers’ sensitivity to the brand reaches 50% under the network marketing model. |
| Author | Liu, Yishu Huang, Xiaoyan |
| Author_xml | – sequence: 1 givenname: Yishu surname: Liu fullname: Liu, Yishu organization: School of Economics and ManagementNanchang Normal College of Applied TechnologyNanchang 330108JiangxiChina – sequence: 2 givenname: Xiaoyan orcidid: 0000-0003-4240-9042 surname: Huang fullname: Huang, Xiaoyan organization: School of Economics and ManagementNanchang Normal College of Applied TechnologyNanchang 330108JiangxiChina |
| BookMark | eNp9kE1PAyEQhompiW315g8g8ai1wH6wHNv1q0mNB_W8oTDbUrdsBTam_16aNh5M9MQEnneGeQaoZ1sLCF1Scktplo0ZYXQsBOeM0RPUpyIRI0IZ6_3UND1DA-_XhOQ05Wkf2amTVuM7szRBNvhZug8Ixi5xZzU4PLMhvkPAr6A6Z8IOl228ahs8lR40bi0OK4gxtTIW8Byks_t02UjvTW2UDCYyk2bZxvRqc45Oa9l4uDieQ_T-cP9WPo3mL4-zcjIfqSThYbTgidZE5qnSRAuR8gIkMNCCF0wmNakzkUsQXLCELXLIMhX3J0WuC0V5ziAZoqtD361rPzvwoVq3nbNxZMUywZM0pSmNFDtQyrXeO6grFS3sfxy3Nk1FSbX3Wu29VkevMXTzK7R1ZiPd7i_8-oBHQVp-mf_pb8iRh6w |
| CitedBy_id | crossref_primary_10_1109_TEM_2022_3174628 crossref_primary_10_1155_2023_9761461 |
| Cites_doi | 10.3390/fi9040076 10.29407/gj.v4i1.13906 10.1038/nrg3920 10.37160/emass.v2i1.426 10.1016/j.gsf.2015.07.003 10.1016/j.future.2020.08.037 10.17485/ijst/2015/v8is4/62941 10.1002/ett.2931 10.1016/j.proeng.2017.04.309 10.21511/im.16(1).2020.01 10.1109/tc.2015.2470247 10.3390/nu10020148 10.22610/jebs.v7i5(j).604 10.1002/cpe.5740 10.1166/asl.2016.6648 10.1007/s00500-015-1752-z 10.1108/jrim-04-2018-0062 10.19105/iqtishadia.v4i1.1134 10.1007/978-3-319-51168-9_7 10.1016/j.scs.2020.102655 10.1016/j.ijhm.2018.01.003 10.1016/j.ijinfomgt.2016.05.002 |
| ContentType | Journal Article |
| Copyright | Copyright © 2021 Yishu Liu and Xiaoyan Huang. Copyright © 2021 Yishu Liu and Xiaoyan Huang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2021 Yishu Liu and Xiaoyan Huang. – notice: Copyright © 2021 Yishu Liu and Xiaoyan Huang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1155/2021/9977221 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Chen, Chi-Hua |
| Editor_xml | – sequence: 1 givenname: Chi-Hua surname: Chen fullname: Chen, Chi-Hua |
| EndPage | 10 |
| ExternalDocumentID | 10_1155_2021_9977221 |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAJEY AAONW ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATUGU AZVAB BCNDV BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS F1Z G-S GROUPED_DOAJ HCIFZ HZ~ IAO ICD ITC IX1 K7- LITHE MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHU RHW RHX TH9 TUS W99 WBKPD XV2 24P AAMMB AAYXX ACCMX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION H13 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c337t-b73dd0a64cd0d99478eae2ed9782a3f0f596ae979232b6e55c115086d8c1762e3 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000719704600004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-0114 |
| IngestDate | Fri Jul 25 10:34:36 EDT 2025 Sat Nov 29 02:59:35 EST 2025 Tue Nov 18 22:00:17 EST 2025 Sun Jun 02 19:15:46 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-b73dd0a64cd0d99478eae2ed9782a3f0f596ae979232b6e55c115086d8c1762e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-4240-9042 |
| OpenAccessLink | https://dx.doi.org/10.1155/2021/9977221 |
| PQID | 2597344141 |
| PQPubID | 1046363 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_2597344141 crossref_citationtrail_10_1155_2021_9977221 crossref_primary_10_1155_2021_9977221 hindawi_primary_10_1155_2021_9977221 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-11-03 |
| PublicationDateYYYYMMDD | 2021-11-03 |
| PublicationDate_xml | – month: 11 year: 2021 text: 2021-11-03 day: 03 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2021 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 23 26 27 28 Z. Vaculikova (11) 2020; 16 A Al Ateeq (4) 2015; 208 10 12 H. Andreas (19) 2016; 3 13 S. J. Ramón (22) 2017; 9 15 16 P. Jeevan (25) 2017; 5 17 18 1 2 B. Limin (21) 2018; 10 3 M. Pouryazdan (14) 2017; 4 D. Kumar (24) 2017; 8 5 6 7 8 9 M. K. K. Leung (20) 2015; 104 |
| References_xml | – volume: 9 start-page: 76 issue: 4 year: 2017 ident: 22 article-title: Understanding the digital marketing environment with KPIs and web analytics publication-title: Future Internet doi: 10.3390/fi9040076 – volume: 104 start-page: 1 issue: 1 year: 2015 ident: 20 article-title: Machine learning in genomic medicine: a review of computational problems and data sets publication-title: Proceedings of the IEEE – ident: 9 doi: 10.29407/gj.v4i1.13906 – ident: 18 doi: 10.1038/nrg3920 – ident: 1 doi: 10.37160/emass.v2i1.426 – ident: 17 doi: 10.1016/j.gsf.2015.07.003 – ident: 26 doi: 10.1016/j.future.2020.08.037 – ident: 23 doi: 10.17485/ijst/2015/v8is4/62941 – volume: 8 start-page: 197 issue: 10 year: 2017 ident: 24 article-title: Digital marketing strategical role to promote technical education in andhra and telangana: an exploratory study publication-title: International Journal of Civil Engineering & Technology – ident: 16 doi: 10.1002/ett.2931 – ident: 2 doi: 10.1016/j.proeng.2017.04.309 – volume: 16 start-page: 1 issue: 1 year: 2020 ident: 11 article-title: Digital marketing access as a source of competitiveness in traditional Vietnamese handicraft villages publication-title: Innovative Marketing doi: 10.21511/im.16(1).2020.01 – ident: 13 doi: 10.1109/tc.2015.2470247 – volume: 10 start-page: 148 issue: 2 year: 2018 ident: 21 article-title: The effects of digital marketing of unhealthy commodities on young people: a systematic review publication-title: Nutrients doi: 10.3390/nu10020148 – volume: 4 start-page: 529 issue: 1 year: 2017 ident: 14 article-title: Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing publication-title: IEEE Access – ident: 8 doi: 10.22610/jebs.v7i5(j).604 – ident: 27 doi: 10.1002/cpe.5740 – ident: 7 doi: 10.1166/asl.2016.6648 – volume: 208 start-page: 12 issue: 1 year: 2015 ident: 4 article-title: Using a digital marketing platform for the promotion of an Internet based health encyclopedia in Saudi Arabia publication-title: Studies in Health Technology and Informatics – ident: 12 doi: 10.1007/s00500-015-1752-z – ident: 10 doi: 10.1108/jrim-04-2018-0062 – ident: 5 doi: 10.19105/iqtishadia.v4i1.1134 – volume: 3 start-page: 119 issue: 1 year: 2016 ident: 19 article-title: Interactive machine learning for health informatics: when do we need the human-in-the-loop? publication-title: Brain Informatics – volume: 5 start-page: 12 issue: 7 year: 2017 ident: 25 article-title: A study of an integrated digital marketing framework - theoretical model and analysis using ABCD model publication-title: Social ence Electronic Publishing – ident: 6 doi: 10.1007/978-3-319-51168-9_7 – ident: 28 doi: 10.1016/j.scs.2020.102655 – ident: 3 doi: 10.1016/j.ijhm.2018.01.003 – ident: 15 doi: 10.1016/j.ijinfomgt.2016.05.002 |
| SSID | ssj0061474 |
| Score | 2.2370486 |
| Snippet | With the advent of the information age, digital marketing models have begun to receive attention and to have applications in many industries. Although the... |
| SourceID | proquest crossref hindawi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Artificial intelligence Classification Customers Data analysis Data collection Digital marketing Fuzzy logic Fuzzy sets Internet Intranets Machine learning Market strategy Marketing Methods Network security Security Sensitivity Smart cities System theory Systems theory Technology Acceptance Model |
| Title | Brand Digital Marketing under Intranet Security Control Based on the Machine Learning Classification Algorithm |
| URI | https://dx.doi.org/10.1155/2021/9977221 https://www.proquest.com/docview/2597344141 |
| Volume | 2021 |
| WOSCitedRecordID | wos000719704600004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5sUdCD-MRqLXuoJwkm2U2yObbVUkFL8UVvIdndtoGaShv17zuTbkQtosfAbA4z2ZlvMjPfENL0ABUnsbQt5SluISO4JdxEW74A3xeyRCZF9fzpJuj3xXAYDgxJ0mK1hA_RDtNz5yIEnOLiwHhFeNi5ddcblg4XAkxgisfY-uPwsr_9x9lvkWdjginve7rigou40t0h2wYQ0tbSgrtkTWd7ZOsLTeA-ydoQUBS9TMe44YPeloPKFAfA5vQa_89mOqf3Zhcd7Sz7z2kbQpSis4wCyoNj2DapqWFUHdNiHyZ2ChXGoa3peAanJ88H5LF79dDpWWZPgiUZC3IrCZhSduxzqWwVhjwQOtauVpAgujEb2SMwSKxDZAp0E197nkQYKHwlpAO-ULNDUs1mmT4iVHEWC-YzW9kJH0ktOEfSMcAcseTgC2rkvNRhJA2JOO6ymEZFMuF5EWo8MhqvkbNP6ZclecYvck1jjj_E6qWtInPTFhGkbwEDTMed4_-95YRs4mMxT8jqpJrPX_UpWZdvebqYN0jF5YNG8X19AH2Kxd8 |
| linkProvider | Hindawi Publishing |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Brand+Digital+Marketing+under+Intranet+Security+Control+Based+on+the+Machine+Learning+Classification+Algorithm&rft.jtitle=Security+and+communication+networks&rft.au=Liu%2C+Yishu&rft.au=Huang%2C+Xiaoyan&rft.date=2021-11-03&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2021&rft.spage=1&rft.epage=10&rft_id=info:doi/10.1155%2F2021%2F9977221&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2021_9977221 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |