题名

以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標

并列篇名

Detecting Online Auction Fraud of Reputation Inflation through Social Network Structures Embedded in Transaction Records

DOI

10.6382/JIM.200510.0143

作者

王俊程(Jyun-Cheng Wang);邱垂鎮(Chui-Chen Chiu);葛煥元(Hwan-Yuan Ker)

关键词

線上拍賣 ; 社會網絡分析 ; 信任成本 ; 哄抬評價 ; 類神經網路 ; Online auction ; Social network analysis ; Inflated reputation ; Neural network ; Cost of trust

期刊名称

資訊管理學報

卷期/出版年月

12卷4期(2005 / 10 / 01)

页次

143 - 184

内容语文

繁體中文

中文摘要

線上拍賣漸為一般大眾接受,交易額常創新高之際,卻也慢慢成為網路交易欺騙的主要來源,影響使用者對線上交易的信任。在線上拍賣市場的環境下,由於匿名性的特質,交易者容易取得或更換不同的身份資訊,是以身份難以確認,其個人特性資料不再可以倚賴作為偵測詐欺行為的資訊。由於線上拍賣欺騙的特性在於欺騙者同時具有許多身份,而達到欺騙的目的,必須是這些身份之間有目的之互動。因此在建立線上拍賣欺騙偵測的準則時所採行的策略,必須能夠反應群體互動的特性,如此才能發現其惡意的行為。 過去的研究著重在以不同的方式來認證資訊的價值或真實性,以降低資訊不均,或是平衡因資訊不均所衍生的利益。本研究則以檢視行為者在資訊處理上所耗費的資源為重點,來偵測意圖操弄資訊進行欺詐行為者。運用線上拍賣的大量交易記錄資料為基礎,分析交易者的網絡結構特性,來做為拍賣詐欺行為的偵測指標。研究分析乃由收集美國eBay實際線上拍賣網路資料,以社會網絡分析方法,建構出線上拍賣參與者的交易網絡結構指標-核心結構(k-core)與核心周邊比(core/periphery),以偵測呈現出異常交易緊密的群組來分辨可疑的哄抬評價拍賣者。這些指標的辨識能力以二種方式來做驗證。一、統計檢定的分析來證實其顯著性;二、將這些指標與eBay網站提供之交易者評價資訊做比較,分別作為監督式類神經網路的輸入層指標值,來比較兩者所建構之線上拍賣可疑交易者的偵測系統的準確度。兩種偵測系統的比較檢定結果指出,有此社會網絡分析指標者可以提供更高的辨識效果,是以可作為網路拍賣偵測可能詐欺者的先期指標。

英文摘要

Online auctions has become the main frauds source and demolishing the trust to the traders in this well accepted and soaring transaction records internet commerce model. The anonymity of internet transaction in online auction market creates the difficulty for identity verification. Traditional demographic-data-based verifications are no longer valid in Internet auction. The online auction reputation inflation frauds are utilizing the low cost of multiple identities to build inflated reputation for deceiving. The interactions among these reputation inflated accounts are essential to fabricate the reputation in the online auction market. To detect such premeditated online auction frauds, the effected indicators have to exploit the nature of network community structures of these reputation inflated accounts. To reduce the information inequilibrium or to balance the advantage caused by the information inequilibrium, previous researches have focused on the approach of verifying the genuineness of the information or revealing its value. This research focused on the balancing the information processing capability to unveil the trader who manipulated the reputation. Based on the cumulated magnitude of online auction transaction data, the trader's transaction social network can be characterized as detection indicator of reputation inflated traders. By gathering the actual online auction transaction data from eBay Inc. American and the methodology from social network analysis (SNA), this research are able to construct the transactional network structure measurements to discriminate the reputation inflated traders from regular accounts. The power of these two measurements was verified by two approaches, by statistical significance testing and the accuracy contribution in the supervised neural network model.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. (2003).2002 Tnternet Fraud Statistics.National Fraud Information Center
  2. (2003).Statistical Package for the Social Sciences.
  3. (2004).Learn More about Feedback, Your eBay Reputation.eBay Inc.
  4. (2004).Yahoo! Help-Listing Fees.
  5. (2004).Amazon.com Help_Selling at Amazon.com_Auctions_Fees for Auctions Sellers.
  6. (2004).eBay Help: Seller Guide: List it!: Fees.
  7. (2003).DB2 Intelligent Miner for Data.International Business Machine Corporation
  8. Agorics, I.(1996).Going, going, gone!.Asurvey of auction types.
  9. Akerlof, G.A.(1970).The Market for Lemons: Quality Uncertainty and the Market Mechanism..The Quarterly Journal of Economics,84(3),488-500.
  10. Arquilla, J.,Ronfeldt, D.(2002).Networks and Netwars: The Future of Terror, Crime, and Militancy.RAND,61-97.
  11. Ba, S.,Pavlou, P.A.(2002).Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior.MIS Quarterly,26(3),243-268.
  12. Ba, S.,Whinston, A.B.,Zhang, H.(2002).Building trust in online auction markets through an economic incentive mechanism.Decision Support Systems, Accepted 31 March 2002
  13. Barnes, B.(2002).Art & Money.Wall Street Journal
  14. Baron, D.P.(1709).Private Ordering on the Internet: The eBay Community of Traders.Graduate School of Business
  15. Batagelj, V.,Zaversnik, M.(2002).An O(m) Algorithm for Cores Decomposition of Networks.working paper
  16. Batagelj, V.,Zaversnik, M.(2002).An O(m) Algorithm for Cores Decomposition of Networks, working paper.working paper
  17. Bierman, H.S.,Fernandez, L.(1998).Game Theory with Economic Applications.Addison Wesley Higher Education,33.
  18. Boissevian, J.(1974).Friends of Friends Basil Blackwell.
  19. Bolton, G.E.,Katok, E.,Ockenfels, A.(2003).How Effective are Electronic Reputation Mechanisms? An Experimental Investigation.
  20. Bolton, R.J.,Hand, D.J.(2001).Unsupervised Profiling Methods for Fraud Detection.Credit Scoring and Credit Control,5-7.
  21. Borgatti, S.P.(1998).What Is Social Network Analysis?.
  22. Borgatti, S.P.,Freeman, L.C.(1996).UC1NET IV.Analytic Technologies
  23. Brandabur, S.,Saunders-Watson, C.(2001).Fraud Online and Off.AuctionWatch.com
  24. Brause, R.,Langsdorf, T.,Hepp, M.(1999).Neural Data Mining for Credit Card Fraud Detection.The 11th IEEE International Conference on Tools with Artificial Intelligence,103-107.
  25. Burt, R.S.(1992).Structural Holes Harvard University Press.Cambridge:
  26. Bywell, C.E.,Oppenheim, C.(2001).Fraud on Internet Auctions.ASLIB,265-272.
  27. Cambanis, T.(2002).West Boylston, Mass., Woman Admits to Selling Nonexistent Computers over eBay.Knight Ridder Tribune Business News,13,1.
  28. Carley, K.M.(2002).Dynamic Network Analysis.Summary of the NRC workshop on Social Network Modeling and Analysis
  29. Chau, Michael,Zeng, D.,Chen, H.,Huang, M.,Hendriawan, D.(2003).Design and evaluation of a multi-agent collaborative Web mining system.Decision Support Systems,35(1),167-183.
  30. Chua, C.E.H.,Wareham, J.(2002).Self-Regulation for Online Auctions: An Analysis.International Conference on Information Systems, Barcelona
  31. Chua, C.E.H.,Wareham, J.,Robey, D.(2002).Anti-Fraud Mechanisms in Internet Auctions: The Roles of Markets, Hierarchies and Communities of Practice.Intemational Conference on Information Systems (ICIS)
  32. Cramton, P.(1998).Ascending Auction.European Economic Review,42,3-5.
  33. Cross, R.,Rice, R.E.,Parker, A.(2001).Information Seeking in Social Context: Structural Influences and Receipt of Information Benefits.IEEE Transactions On Systems, Man, And Cybernetics-part C: Applications And Reviews,31(4),438-448.
  34. Curry, S.(2001).Online Auctions: The Bizarre Bazaar.Internet Scambusters,1(43),29.
  35. Dorronsoro, J.R.,Ginel, F.,Sanchez, C.,Cruz, C.S.(1997).Neural Fraud Detection in Credit Card Operations.IEEE Transactions on Neural Networks,8(4),827-834.
  36. Ellickson, R.C.(1991).Order Without Law.Cambridge:Harvard University Press.
  37. Enos, L.(2001).Fees Cause Yahoo! Auctions To Drop More Than 80 Percent..E-Commerce Times
  38. Fischer, C.S.(1977).Networks and Places: Social Relations in the Urban Setting.New York:Free Press.
  39. Freedman, D.H.(2002).What eBay isn`t telling you.Business,3(8),56.
  40. Freeman, L.C.(1980).The Gatekeeper, Pair Dependency and Structural Centrality.Quality and Quantity,14
  41. Freeman, L.C.(1979).Centrality in Social Network: I. Conceptual Clarification.Social Networks,1
  42. Friedman, E.,Resnick, P.(2001).The Social Cost of Cheap Pseudonyms.Journal of Economics and Management Strategy
  43. Gareth, R.J.,Geo, J.M.(2001).Contemporary Management Irwin.McGraw-Hill.
  44. Garton, L.,Haythomthwaite, C.,Wellman, B.(1997).Studying Online Social Networks.
  45. Goldsborough, R.(2002).PERSONAL COMPUTING: Avoiding Online Auction Fraud.Black Issues in Higher Education, Reston,38.
  46. Granovetter, M.S.(1973).The strength of weak ties.American Journal of Sociology,78,1360-1380.
  47. Greif A.(1993).Contract Enforceability and Economic Institutions in Early Trade: The Maghribi Traders` Coalition..American Economic Review,83,525-548.
  48. Greif, A.(1994).On the Political Foundations of the Late Medieval Commercial Revolution: Genoa during the Twelfth and Thirteenth Centuries..Journal of Economic History,54,271-287.
  49. Greif, A.(1989).Reputation and Coalitions in Medieval Trade: Evidence on the Maghribi Traders..Journal of Economic History,49,857-882.
  50. Griggs, B.(2003).Identity Theft, Other Cybercrimes Show No Sign of Slowing in Utah.Knight Ridder Tribune Business News,1.
  51. Han, J.,Kamber, M.(2001).Data Mining: Concepts and Techniques Morgan Kaufrnann Publishers.
  52. Han, K.-H.(2003).United Evenings.Taipei, Taiwan:
  53. Hanneman, R.(1998).Introduction to Social Network.
  54. Hu, X.,Lin, Z.,Whinston, A.B.,Zhang, H.(2001).Perceived Risk and Escrow Adoption: An Economic Analysis in Online Consumer-to-Consumer Auction Markets.International Conference on Information Systems (ICIS)
  55. Johnson, M.P.,Milardo, R.M.(1984).Network interference in pair relationships: A social psychological recasting of Slater`s (1963) theory of social regression..Journal of Marriage and the Family,46,893-899.
  56. Kauffman, R.J.,Wood, C.A.(2000).Americas Conference on Information Systems.CA.:Long Beach.
  57. Klein, S.(1997).Introduction to Electronic Auctions.Electronic Markets,7(4),3-6.
  58. Knoke, D.,Burt, R.S.(1983).Prominence
  59. Krackhardt, D.(1992).The Strength of Strong Ties: The importance of Philos in Organizations..Network and Organizations: Strncture,216-239.
  60. Krackhardt, D.,Hanson, J.R.(1992).Informal networks: The Company Behind the Chart.Harvard Business Review,104-111.
  61. Krebs, V.E.(2002).Mapping Networks of Terrorist Cells.Journal of the International Network for Social Network Analysis,24(3),3-52.
  62. Lee, H.G.(1997).AUCNET: Electronic Intermediary For Used-Car Transactions.Electronic Markets,7(4),24-28.
  63. Lee, H.G.(1998).Do Electronic Marketplaces Lower the Price of Goods?.Communications of the ACM,41(1),73-80.
  64. Little, B.B.,Johnston, W.L.,Lovell, A.C.,Rejesus, R.M.,Steed, S.A.(2002).Collusion in the U.S. crop insurance program: applied data mining.The eighth ACM SIGKDD international conference, IEEE
  65. Little, B.B.,Johnston, W.L.,Lovell, A.C.,Rejesus, R.M.,Steed, S.A.(2002).Collusion in the U.S. crop insurance program: applied data mining.The Eighth ACM SIGKDD international conference on Knowledge discovery and data mining, IEEE
  66. Lucking-Reiley, D..Auctions on the Internet: what`s being auctioned, and how?.Vanderbilt University.
  67. Lucking-Reiley, D.,Bryan, D.,Prasad, N.,Reeves, D..Pennies from eBay: the Determinants of Price in Online Auctions.University of Arizona.
  68. Lundin, E.(2002).Aspects of employing fraud and intrusion detection systems.School of Computer Science and Engineering, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden
  69. Luo, J.D.(2000).Conference on Internet and Society.Taiwan:
  70. Matsubara, S.,Yokoo, M.(2002).Defection-free exchange mechanisms based on an entry fee imposition.Artificial Intelligence,142(2),265-286.
  71. McAfee,McMillan(1987).Auctions and Bidding.Journal of Economic Literature,27,35-36.
  72. McMillan, J.,Woodruff, C.(2001).Private Order Under Dysfunctional Public Order..Michigan Law Review,98,2421-2458.
  73. Mitchell, J.C.(1969).The Concept and Use of Social Networks Manchester University Press.Manchester:
  74. Nieminen, V.(1974).On Centrality in Graph.Scandinavian Journal of Psychology,15
  75. NW3C, N.W.C.C.C.,FBI, F.B.o.I.(2002).IFCC 2002 Internet Fraud Report.The National White Collar Crime Center
  76. Potter, G.W.(1994).Criminal Organizations: Vice, Racketeering, and Politics in an American City Waveland.Prospect Heights, IL:
  77. Prodromidis, A.,Stolfo, S.J.(1999).Distributed Data Mining in Credit Card Fraud Detection.IEEE Intelligent Systems Journal,67-74.
  78. Reffay, C.,Chanier, T.(2003).How social network analysis can help to measure cohesion in collaborative distance-learning.Computer Supported Collaborative Learning conference (CSCL`2003), Brgen, Norway,10.
  79. Resnick, P.,Kirwabara, K.,Zeckhauser, R.,Friedman, E.(2000).Reputation Systems.Communications of the ACM,43(12),45-48.
  80. Resnick, P.,Zeckhauser, R.(2002).Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay`s Reputation System.Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce.
  81. Sabater, J.,Sierra, C.(2002).Reputation and social network analysis in multi-agent systems.Autonomous Agents and Multi-Agents Systems, Bologna, Italy
  82. Scott, J.(2002).Social Networks: Critical Concepts In Sociology Routledge Publication Inc..
  83. Seidam, S.B.(1983).Network Strucutre and Minimum Degree.Social Networks,5
  84. Shah, H.S.,Joshi, N.R.,Sureka, A.,Wurman, P.R.(2002).Mining for Bidding Strategies on eBay.WEBKDD 2002 Web Mining for Usage Patterns and User Profiles
  85. Snyder, J.M.(2000).Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud?.Federal Communications Law Journal,52(2),453-472.
  86. Sparrow, M.K.(1991).The application of network analysis to criminal intelligence: An assessment of the prospects.Social Networks,13(3),251-274.
  87. Stanley, T.,Stern, S.(1995).FindLaw Legal Dictionary.
  88. Swan, W.(2001).University of Salford.
  89. Tsai, W.(2002).Social Structure of Coopetition Within a Multiunit Organization: Coordination, Competition, and Intraorganizational Knowledge Sharing.Organization Science,13(2),179-190.
  90. Turban, E.(1997).Auctions and Bidding on the Internet: An Assessment.Electronic Markets,7(4),7-11.
  91. Tyler, J.R.,Wilkinson, D.M.,Huberman, B.A.(2003).Email as spectroscopy: automated discovery of community structure within organizations.
  92. US Postal Service.Know Your Rights: A Guide for Victims and Witnesses of Crime.Washington DC:US Postal Service.
  93. van Heck, E.,Vervest, P.(1998).How Should CIOs Deal With Web-Based Auctions?.Communications of the ACM,41(7),99-100.
  94. Wang, W.,Hidvégi, Z.,Whinston, A.B.(2001).Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions.International Journal of Electronic Commerce,6(2),139-156.
  95. Wang, W.,Hidvégi, Z.,Whinston, A.B.(2001).Shill Bidding in Multi-round Online Auctions.The 35th Hawaii International Conference on System Sciences, Hawaii
  96. Warchol, G.(2003).Knight Ridder Tribune Business News.
  97. Warner, M.(2003).eBay`s worst nightmare.Fortune,147(10),89.
  98. Wasko, M.,Teigland, R.(2002).The provision of online public goods: Examining social structure in a network of practice.Twenty-Third International Conference on Information Systems,163-172.
  99. Wasserman, S.,Fraust, K.(1994).Social Network Analysis: Methods and Applications Sage Publications.
  100. Wellman, B.(1996).For a Social Network Analysis of Computer Networks: A Sociological Perspective on Collaborative Work and Virtual Community.ACM SIGCPR/SIGMIS conference,1-11.
  101. Wheeler, R.,Aitken, S.(2000).Multiple algorithms for fraud detection.Knowledge-Based Systems,13(2),93-99.
  102. Whitten, N.E.,Wolfe, A.W.(1973).Network Analysis.
  103. Wilke, J.R.,Wingfield, N.(2003).Leading the News: Fraud Crackdown Hits Web Auctions-Federal and State Officials To Make Arrests, File Suits EBay Cooperates in Probe.Wall Street Journal,3.
  104. Williams, P.(2001).Transnational Criminal Networks.Networks and Netwars: The Future of Terror, Crime, and Militancy,61-97.
  105. Wu, J.,Park, J.(2001).Intelligent Agents and Fraud Detection, working paper.
  106. Xu, J.-J.,Chen, H.(2002).2002 National Conference on Digital Government Research.
  107. 雅虎國際資訊(2004)。拍賣首頁-互動討論區-拍賣黑名單公告。台北:雅虎國際資訊。
  108. 雅虎國際資訊(2004)。Yahoo!-評價功能。台北:雅虎國際資訊。
  109. 黃琮盛(2001)。資訊管理研究所。桃園:中央大學。
  110. 葉怡成(2001)。類神經網路模式應用與實作。台北:儒林出版社。
  111. 韓國海(2003)。聯合晚報。台北:
被引用次数
  1. 莊秉諺、張昭憲(2017)。以行為狀態變遷為基礎之線上拍賣詐騙偵測方法。資訊管理學報,24(1),97-130。