Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Fighting Internet Auction Fraud: An Assessment and Proposal

Published: 01 October 2004 Publication History

Abstract

Although online auctions constitute one of the most successful Internet business models, auction fraud has become the largest component of all Internet fraud. Traditional government organizations have joined auction businesses in trying to develop new mechanisms to fight this problem. In parallel with these institutional efforts, various auction communities are waging a less visible, covert war. Unfortunately, these various entities act in unilateral and even contradictory ways that diminish their combined efforts. To resolve this inefficiency, the authors propose empowering auction communities to integrate their work with that of governments and auction institutions.

References

[1]
Internet Fraud Watch, "2003 Fraud Statistics," Nat'l Consumer's League, Mar. 2004; www.fraud.org/internet/intstat.htm.
[2]
Internet Fraud Complaint Center, "2002 Internet Fraud Report," Nat'l White Collar Crime Center, Apr. 2003; www.ifccfbi.gov/strategy/statistics.asp.
[3]
S. Grazioli and S.L. Jarvenpaa, "Deceived: Under Target Online," Comm. ACM, Dec. 2003, pp. 196-205.
[4]
R.J. Kauffman and C.A. Wood, "An Investigation of Premium Bidding in Online Auctions," 2003; www.misrc.umn.edu/workingpapers/fullpapers/2003/0304_111303.pdf.
[5]
C.E.H. Chua and J. Wareham, "Self-Regulation for Online Auctions: An Analysis," Proc. 23rd Int'l Conf. Information Systems, Assoc. for Information Systems, 2002, pp. 115-125.
[6]
S. Ba and P.A. Pavlou, "Evidence of the Effect of Trust-Building Technology in Electronic Markets: Price Premiums and Buyer Behavior," MIS Quarterly, vol. 26, no. 3, 2002, pp. 243-268.
[7]
T.T. Kubic, "Statement for the Record of Thomas T. Kubic, Deputy Asst. Director, FBI Criminal Investigative Division," House Committee on the Judiciary, Washington, D.C., 2001; www.house.gov/judiciary/kubic_061201.htm.
[8]
S.E. Samenow, Straight Talk About Criminals, Jason Aronson Inc., 2001.
[9]
US Postal Inspection Service, Know Your Rights: A Guide for Victims and Witnesses of Crime, pamphlet, 2002; www.usps.com/cpim/ftp/pubs/pub308.pdf.
[10]
S.L. Jarvenpaa E.H. Tiller and R. Simons, "Regulation and the Internet: Public Choice Insights for Business Organizations," Calif. Management Rev., vol. 46, no. 1, 2003, pp. 72-85.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 37, Issue 10
October 2004
105 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 October 2004

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy-Preserving Blockchained Edge Resource Auction With Fraud ResistanceIEEE Transactions on Network and Service Management10.1109/TNSM.2024.337767321:4(4076-4089)Online publication date: 1-Aug-2024
  • (2023)Integration of Blockchain and Auction Models: A Survey, Some Applications, and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2022.322240325:1(497-537)Online publication date: 1-Jan-2023
  • (2021)The Phishing Funnel ModelInformation Systems Research10.1287/isre.2020.097332:2(410-436)Online publication date: 1-Jun-2021
  • (2020)Web page classification: a survey of perspectives, gaps, and future directionsMultimedia Tools and Applications10.1007/s11042-019-08373-879:17-18(11921-11945)Online publication date: 1-May-2020
  • (2017)Community CommerceProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025550(4344-4357)Online publication date: 2-May-2017
  • (2017)Prisoner's dilemma game model for e-commerceApplied Mathematics and Computation10.1016/j.amc.2016.07.018292:C(128-144)Online publication date: 1-Jan-2017
  • (2017)Computer assisted fraudsInformation Systems Frontiers10.1007/s10796-017-9752-419:3(443-455)Online publication date: 1-Jun-2017
  • (2016)Fraud detection systemJournal of Network and Computer Applications10.1016/j.jnca.2016.04.00768:C(90-113)Online publication date: 1-Jun-2016
  • (2015)Detecting anomaly collections using extreme feature ranksData Mining and Knowledge Discovery10.1007/s10618-014-0360-329:3(689-731)Online publication date: 1-May-2015
  • (2012)Detecting Fake Medical Web Sites Using Recursive Trust LabelingACM Transactions on Information Systems10.1145/2382438.238244130:4(1-36)Online publication date: 1-Nov-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media