skip to main content
research-article
Free access

Reducing internet auction fraud

Published: 01 May 2008 Publication History

Abstract

When it comes to online auctions, "caveat emptor" is an understatement.

References

[1]
Bajari, P. and Hortaçsu, A. Economic insights from Internet auctions. J. Economic Literature 42, 2 (2004), 457--486.
[2]
Chua, C. and Wareham, J. Fighting Internet auction fraud: An assessment and proposal. IEEE Computer 37, 10 (Oct. 2004), 31--37.
[3]
Chua, C. Wareham, J. and Robey, D. The role of online trading communities in managing Internet auction fraud. MIS Quarterly 31, 4 (2007), 759--781.
[4]
eMarketer. The ePrivacy and security report. Jan. 2001. White paper published by MarketResearch.com.
[5]
Gavish, B. and Tucci, C.L. Fraudulent auctions on the Internet. E. Comm. Research 6, 2 (2006), 127--140.
[6]
Hafner, K. With Internet fraud up sharply, eBay attracts vigilantes. New York Times, (Mar. 20, 2004).
[7]
Internet Crime Complaint Center. 2007 Internet crime report. National White Collar Crime Center and the Federal Bureau of Investigation (March, 2008).
[8]
Palmer, S. Can eBay be saved? OnlineSPIN. MediaPost Publications (June 16, 2005).
[9]
Reuters. Read this before buying on eBay. Wired News (Jan. 9, 2003); www.wired.com/news/ebiz/1,57153-0.html.
[10]
Snyder, J.M. Online auction fraud: Are the auction houses doing all they should or could to stop online fraud? Federal Communications Law Journal 52, 2 (2000), 453--472.
[11]
Trade Commssion of the U.S. (FTC) releases list of top consumer fraud complaints in 2007 (Feb. 13, 2008); www.ftc.gov/opa/2008/02/fraud.shtm.
[12]
Waters, R. How fraudsters set traps and take the credit. Financial Times IT Review (May 21, 2003), 1.

Cited By

View all
  • (2018)Fraud, Economic versus Social-Psychological Losses, and Sustainable E-AuctionSustainability10.3390/su1009313010:9(3130)Online publication date: 3-Sep-2018
  • (2018)The Importance of Online Transaction Textual Labels for Making a Purchasing Decision – An Experimental Study of Consumers’ BrainwavesHuman Interface and the Management of Information. Information in Applications and Services10.1007/978-3-319-92046-7_8(83-97)Online publication date: 15-Jul-2018
  • (2016)Are blockchains immune to all malicious attacks?Financial Innovation10.1186/s40854-016-0046-52:1Online publication date: 10-Dec-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 51, Issue 5
Web searching in a multilingual world
May 2008
92 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1342327
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2008
Published in CACM Volume 51, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)202
  • Downloads (Last 6 weeks)48
Reflects downloads up to 30 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Fraud, Economic versus Social-Psychological Losses, and Sustainable E-AuctionSustainability10.3390/su1009313010:9(3130)Online publication date: 3-Sep-2018
  • (2018)The Importance of Online Transaction Textual Labels for Making a Purchasing Decision – An Experimental Study of Consumers’ BrainwavesHuman Interface and the Management of Information. Information in Applications and Services10.1007/978-3-319-92046-7_8(83-97)Online publication date: 15-Jul-2018
  • (2016)Are blockchains immune to all malicious attacks?Financial Innovation10.1186/s40854-016-0046-52:1Online publication date: 10-Dec-2016
  • (2015)Predicting behaviorIEEE Intelligent Systems10.1109/MIS.2015.1930:3(35-43)Online publication date: 1-May-2015
  • (2015)TACOElectronic Commerce Research10.1007/s10660-015-9182-715:2(207-241)Online publication date: 1-Jun-2015
  • (2015)P2P Lending Fraud Detection: A Big Data ApproachIntelligence and Security Informatics10.1007/978-3-319-18455-5_5(71-81)Online publication date: 2015
  • (2015)Based Big Data Analysis of Fraud Detection for Online Transaction OrdersCloud Computing10.1007/978-3-319-16050-4_9(98-106)Online publication date: 8-Mar-2015
  • (2015)E-Commerce: Regulatory, Ethical, and Social EnvironmentsElectronic Commerce10.1007/978-3-319-10091-3_15(689-730)Online publication date: 2015
  • (2014)Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudstersElectronic Commerce Research and Applications10.1016/j.elerap.2013.10.00413:2(79-97)Online publication date: Mar-2014
  • (2014)An examination of trust assurances adopted by top internet retailersElectronic Commerce Research10.1007/s10660-014-9148-114:4(459-496)Online publication date: 1-Dec-2014
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media