全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Uncertain Reasoning for Detection of Selling Stolen Goods in Online Auctions Using Contextual Information

DOI: 10.1155/2014/891954

Full-Text   Cite this paper   Add to My Lib

Abstract:

This work describes the design of a decision support system for detection of fraudulent behavior of selling stolen goods in online auctions. In this system, each seller is associated with a type of certification, namely “proper seller,” “suspect seller,” and “selling stolen goods.” The certification level is determined on the basis of a seller’s behaviors and especially on the basis of contextual information whose origin is outside online auctions portals. In this paper, we focus on representing knowledge about sellers in online auctions, the influence of additional information available from other Internet source, and reasoning on bidders’ trustworthiness under uncertainties using Dempster-Shafer theory of evidence. To demonstrate the practicability of our approach, we performed a case study using real auction data from Czech auction portal Aukro. The analysis results show that our approach can be used to detect selling stolen goods. By applying Dempster-Shafer theory to combine multiple sources of evidence for the detection of this fraudulent behavior, the proposed approach can reduce the number of false positive results in comparison to approaches using a single source of evidence. 1. Introduction Online auction portals have become a convenient trading platform for a great number of sellers and buyers. Besides eBay [1], the Aukro auction portal [2], a Czech Republic division of the multinational Allegro group with a turnover of USD 250 million and 2.5 million users as of January 2012, is an example of such an Internet auction system. Online auctions allow their users to buy or sell products and services. A large number of users use Internet auctions as their main source of income. For example, the Aukro states [2] that, from 2.5 million users, 9,300 users are professional traders. On the other hand, the number of frauds in online auctions is also increasing [3]. The most common types of fraud are: intentionally incorrect description of goods, undelivered goods, irredeemable payments, sale of stolen goods, and others [4]. Fraudsters are attracted by low admission costs and high profit potential. In order to reduce frauds, Internet auction portals use basically three methods:(1)built-in mechanisms which allow estimation of the credibility of users: auction systems create user profiles (reputation) that are based on the evaluation which is performed by users after performed transaction. Any user can look at the profile of another user before she/he will do business with her/him; if this user (a bidder or a seller) has a bad reputation, no one will want

References

[1]  eBay, 2013, http://www.ebay.cz/.
[2]  Aukro, 2013, http://aukro.cz/.
[3]  B. Gavish and C. L. Tucci, “Fraudulent auctions on the Internet,” Electronic Commerce Research, vol. 6, no. 2, pp. 127–140, 2006.
[4]  D. G. Gregg and J. E. Scott, “A typology of complaints about eBay sellers,” Communications of the ACM, vol. 51, no. 4, pp. 69–74, 2008.
[5]  D. Harrison McKnight, V. Choudhury, and C. Kacmar, “The impact of initial consumer trust on intentions to transact with a web site: a trust building model,” Journal of Strategic Information Systems, vol. 11, no. 3-4, pp. 297–323, 2002.
[6]  D. G. Gregg and J. E. Scott, “The role of reputation systems in reducing on-line auction fraud,” International Journal of Electronic Commerce, vol. 10, no. 3, pp. 95–120, 2006.
[7]  Y. Hu and B. Panda, “Design and analysis of techniques for detection of malicious activities in database systems,” Journal of Network and Systems Management, vol. 13, no. 3, pp. 269–291, 2005.
[8]  Y. Ku, Y. Chen, and C. Chiu, “A proposed data mining approach for internet auction fraud detection,” in Intelligence and Security Informatics, vol. 4430 of Lecture Notes in Computer Science, pp. 238–243, Springer, New York, NY, USA, 2007.
[9]  S. Pandit, D. H. Chau, S. Wang, and C. Faloutsos, “Netprobe: A fast and scalable system for fraud detection in online auction networks,” in Proceedings of the 16th International World Wide Web Conference, pp. 201–210, Banf, Canada, May 2007.
[10]  B. Zhang, Y. Zhou, and C. Faloutsos, “Toward a comprehensive model in internet auction fraud detection,” in Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS '08), p. 79, IEEE, Waikoloa, Hawaii, USA, January 2008.
[11]  G. Shafer, A Mathematical Theory of Evidence, Princeton University Press, Princeton, NJ, USA, 1976.
[12]  L. Beranek and J. Knizek, “The use of contextual information to detection of fraud on online auctions,” The Journal of Internet Banking and Commerce, vol. 18, no. 3, pp. 1–18, 2013.
[13]  Bryant and C. Colledge, “Trust in electronic commerce business relationships,” Journal of Electronic Commerce Research, vol. 3, no. 2, pp. 32–39, 2002.
[14]  D. L. Hoffman, T. P. Novak, and M. Peralta, “Building consumer trust online,” Communications of the ACM, vol. 42, no. 4, pp. 80–85, 1999.
[15]  L. C. Hsu and C. H. Wang, “A study of e-trust in online auctions,” Journal of Electronic Commerce Research, vol. 9, pp. 310–321, 2008.
[16]  B. Lee, H. Cho, M. Chae, and S. Shim, “Empirical analysis of online auction fraud: credit card phantom transactions,” Expert Systems with Applications, vol. 37, no. 4, pp. 2991–2999, 2010.
[17]  C. Chua and J. Wareham, “Self-regulation for online auctions: an analysis,” in Proceedings of the 23rd International Conference on Information Systems (ICIS '02), pp. 115–125, December 2002.
[18]  Y. Sakurai and M. Yokoo, “A false-name-proof double auction protocol for arbitrary evaluation values,” in Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS '03), pp. 329–336, July 2003.
[19]  F. Dong, S. M. Shatz, and H. Xu, “Combating online in-auction fraud: clues, techniques and challenges,” Computer Science Review, vol. 3, no. 4, pp. 245–258, 2009.
[20]  J. Trevathan and W. Read, “Detecting shill bidding in online english auctions,” in Handbook of Research on Social and Organizational Liabilities in Information Security, M. Gupta and R. Sharman, Eds., pp. 446–470, Information Science Reference, 2009.
[21]  J. Trevathan and W. Read, “Secure online english auctions,” in E-Business and Telecommunication Networks, vol. 9 of Communications in Computer and Information Science, pp. 119–133, Springer, Berlin, Germany, 2008.
[22]  J. Trevathan, “Security, anonymity and trust in electronic auctions,” Crossroads, vol. 11, pp. 3–9, 2005.
[23]  V. Da Silva Almendra and D. Schwabe, “Analysis of fraudulent activity in a Brazilian auction site,” in International World Wide Web Conference (WWW '09), ACM, Madrid, Spain, 2009.
[24]  J. Trevathan and W. Read, “Detecting collusive shill bidding,” in Proceedings of the 4th International Conference on Information Technology-New Generations (ITNG '07), pp. 799–808, IEEE Computer Society, Las Vegas, Nev, USA, April 2007.
[25]  F. Dong, S. M. Shatz, and H. Xu, “Reasoning under uncertainty for shill detection in online auctions using Dempster-Shafer theory,” International Journal of Software Engineering and Knowledge Engineering, vol. 20, no. 7, pp. 943–973, 2010.
[26]  D. H. Chau and C. Faloutsos, “Fraud detection in electronic auction,” in Proceedings of EWMF'05: European Web Mining Forum (ECML/PKDD '05), pp. 87–97, October 2005.
[27]  J. Wang and C. Q. Chiu, “Detecting online auction inflated-reputation behaviors using social network analysis,” in Proceedings of North American Association for Computational Social and Organizational Science, Notre Dame, Indiana, 2005.
[28]  D. H. Chau, S. Pandit, and C. Faloutsos, “Detecting fraudulent personalities in networks of online auctioneers,” in Knowledge Discovery in Databases: PKDD 2006, vol. 4213 of Lecture Notes in Computer Science, pp. 103–114, Springer, Berlin, Germany, 2006.
[29]  H. Xu and Y. Cheng, “Model checking bidding behaviors in internet concurrent auctions,” Computer Systems Science & Engineering, vol. 22, no. 4, pp. 179–191, 2007.
[30]  B. J. Ford, H. Xu, and I. Valova, “Identifying suspicious bidders utilizing hierarchical clustering and decision trees,” in Proceedings of the International Conference on Artificial Intelligence (ICAI '10), vol. 2, pp. 195–201, July 2010.
[31]  A. Goel, H. Xu, and S. M. Shatz, “A multi-state Bayesian network for shill verification in online auctions,” in Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering (SEKE '10), pp. 279–285, July 2010.
[32]  F. Dong, S. M. Shatz, H. Xu, and D. Majumdar, “Price comparison: a reliable approach to identifying shill bidding in online auctions?” Electronic Commerce Research and Applications, vol. 11, no. 2, pp. 171–179, 2012.
[33]  L. Beranek, P. Tlusty, and R. Remes, “The usage of belief functions for an online auction reputation model,” in Proceedings of the 28th Conference on Mathematical Method in Economy, pp. 49–54, September 2010.
[34]  L. Beranek and J. Knizek, “The usage of contextual discounting and opposition in determining the trustfulness of users in online auctions,” Journal of Theoretical and Applied Electronic Commerce Research, vol. 7, no. 1, pp. 34–50, 2012.
[35]  W.-H. Chang and J.-S. Chang, “A novel two-stage phased modeling framework for early fraud detection in online auctions,” Expert Systems with Applications, vol. 38, no. 9, pp. 11244–11260, 2011.
[36]  W.-H. Chang and J.-S. Chang, “A Multiple-Phased modeling method to identify potential fraudsters in online auctions,” in Proceedings of the 2nd International Conference on Computer Research and Development (ICCRD '10), pp. 186–190, Kuala Lumpur, Malaysia, May 2010.
[37]  W.-H. Chang and J.-S. Chang, “Using clustering techniques to analyze fraudulent behavior changes in online auctions,” in Proceedings of the International Conference on Networking and Information Technology (ICNIT '10), pp. 34–38, Manila, Philippines, June 2010.
[38]  W.-H. Chang and J.-S. Chang, “An online auction fraud screening mechanism for choosing trading partners,” in Proceedings of the 2nd International Conference on Education Technology and Computer (ICETC '10), vol. 5, pp. V5-56–V5-60, Shanghai, China, June 2010.
[39]  W. H. Chang and J. S. Chang, “An effective early fraud detection method for online auctions,” Electronic Commerce Research and Applications, vol. 11, no. 4, pp. 346–360, 2012.
[40]  M. Y. K. Kwan, R. E. Overill, K. P. Chow et al., “Evaluation of evidence in internet auction fraud investigations,” in Advances in Digital Forensics VI, vol. 337 of IFIP Advances in Information and Communication Technology, pp. 121–132, Springer, Berlin, Germany, 2010.
[41]  P. Smets, “Belief functions: the disjunctive rule of combination and the generalized Bayesian theorem,” International Journal of Approximate Reasoning, vol. 9, no. 1, pp. 1–35, 1993.
[42]  Czech e-shops inspection, Kontrola e-shop v roce 2012: Vedou nekalé obchodn praktiky, Oversito.cz, 2013, (Czech), http://www.oversito.cz/aktualne/kontrola-e-shopu-v-roce-2012-vedou-nekale-obchodni-praktiky-92/.
[43]  Stolen Columbus, “Odcizeni Columbuse,” Forum.Skodahome.cz., (Czech), 2013, http://forum.skodahome.cz/topic/114051-odcizeni-columbuse/.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133