Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Recommending trusted online auction sellers using social network analysis

Published: 01 April 2008 Publication History

Abstract

The reputation system currently used by major auction sites to recommend sellers is overly simple and fails to take into account the collusive attempts by some sellers to fraudulently increase their own ratings. This paper presents a recommendation system that uses trading relationships to calculate level of recommendation for trusted online auction sellers. We demonstrate that network structures formed by transactional histories can be used to expose such underlying opportunistic collusive seller behaviors. Taking a structural perspective by focusing on the relationships between traders rather than their attribute values, we use k-core and center weights algorithms, two social network indicators, to create a collaborative-based recommendation system that could suggest risks of collusion associated with an account. We tested this system against real world ''blacklist'' data published regularly in a leading auction site and found it able to screen out 76% of the blacklisted accounts. This system can provide warning several months ahead of officially released blacklists to help guard against possible seller collusion and can be incorporated into current reputation systems used to recommend trusted online auction sellers.

References

[1]
Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering. v17 i6. 734-749.
[2]
Aggarwal, C. C., Wolf, J. L., Wu, K.-L., & Yu, P. S. (1999). Hosting hatches an egg: a new graph-theoretic approach to collaborative filtering. Paper presented at the Fifth ACM SIGKDD international conference on Knowledge discovery and data mining, San Diego, CA, United States.
[3]
Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems. v35 i3. 273-286.
[4]
Fab: content-based, collaborative recommendation. Communications of ACM. v40 i3. 66-72.
[5]
Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly. v26 i3. 243-268.
[6]
Art & money. Wall Street Journal. W.8
[7]
Private ordering on the Internet: The eBay Community of Traders (No. 1709). Graduate School of Business, Stanford University.
[8]
Batagelj, V., & Mrvar, A. (2005). Pajek, Program for Large Network Analysis (Version 1.10). Ljubljana, Slovenia.
[9]
Batagelj, V., & Zaversnik, M. (2002). An O(m) algorithm for cores decomposition of networks. Unpublished manuscript.
[10]
Adaptive interfaces for ubiquitous Web access. Communications of ACM. v45 i5. 34-38.
[11]
How effective are electronic reputation mechanisms? An experimental investigation. Management Science. v50 i11. 1587-1602.
[12]
Borgatti, S. P. (1998). What Is Social Network Analysis? <http://www.analytictech.com/networks/whatis.htm> (Retrieved 10.07.2003).
[13]
Knowledge-based recommender systems. In: Kent, A. (Ed.), Encyclopedia of library and information systems, vol. 69. Marcel Dekker. pp. 32
[14]
Carley, K. M. (2002). Dynamic network analysis. In: R. Breiger &amp; K. M. Carley (Eds.), Summary of the NRC workshop on social network modeling and analysis. National Research Council.
[15]
Mining association rules procedure to support on-line recommendation by customers and products fragmentation. Expert Systems with Applications. v20 i4. 325-335.
[16]
Chua, C. E. H., &amp; Wareham, J. (2002, June). Self-regulation for online auctions: an analysis. Paper presented at the international conference on information systems, Barcelona, Spain.
[17]
Chua, C. E. H., Wareham, J., &amp; Robey, D. (2002, December). Anti-fraud mechanisms in internet auctions: the roles of markets, hierarchies and communities of practice. Paper presented at the international conference on information systems (ICIS).
[18]
Information seeking in social context: structural influences and receipt of information benefits. IEEE Transactions on Systems, Man, And Cybernetics - Part C: Applications and Reviews. v31 i4. 438-448.
[19]
Order without law. Harvard University Press, Cambridge.
[20]
Adaptive fraud detection. In: Data mining and knowledge discovery, Kluwer Academic Publishers, Boston, MA. pp. 1-28.
[21]
Networks and places: Social relations in the urban setting. Free Press, New York.
[22]
What eBay isn't telling you. Business 2.0. v3 i8. 56
[23]
Centrality in social network: I. Conceptual clarification. Social Networks. 1
[24]
The gatekeeper, pair dependency and structural centrality. Quality and Quantity. 14
[25]
Garton, L., Haythornthwaite, C., &amp; Wellman, B. (1997). Studying online social networks. <http://www.ascusc.org/jcmc/vol3/issue1> (Retrieved 8.07.2003).
[26]
Goldsborough, R. (2002). Personal computing: avoiding online auction fraud. Unpublished manuscript, Reston.
[27]
The strength of weak ties. American Journal of Sociology. v78. 1360-1380.
[28]
Reputation and coalitions in medieval trade: evidence on the Maghribi traders. Journal of Economic History. v49. 857-882.
[29]
Contract enforceability and economic institutions in early trade: the Maghribi traders? coalition. American Economic Review. v83. 525-548.
[30]
On the political foundations of the late medieval commercial revolution: Genoa during the twelfth and thirteenth centuries. Journal of Economic History. v54. 271-287.
[31]
Identity theft, other cybercrimes show no sign of slowing in Utah. Knight Ridder Tribune Business News. 1
[32]
Han, K.-H. (2003, June 27). Brother and Sister partners on the net, Scam NT$ 5 Million on Yahoo auction. United Evenings.
[33]
Hanneman, R. (1998). Introduction to Social Network. <http://wizard.ucr.edu/~rhannema/networks/nettext.pdf> (Retrieved 3.07.2003).
[34]
Hogg, T., &amp; Adamic, L. (2004). Enhancing reputation mechanisms via online social networks. Paper presented at the 5th ACM conference on Electronic commerce, New York, NY, USA.
[35]
Network interference in pair relationships: a social psychological recasting of Slater's (1963) theory of social regression. Journal of Marriage and the Family. v46 iNovember. 893-899.
[36]
Introduction to electronic auctions. Electronic Markets. v7 i4. 3-6.
[37]
Mapping networks of terrorist cells. Journal of the International Network for Social Network Analysis. v24 i3. 3-52.
[38]
Expert system methodologies and applications - a decade review from 1995 to 2004. Expert Systems with Applications. v28 i1. 93-103.
[39]
Predicting the final prices of online auction items. Expert Systems with Applications. v31 i3. 542-550.
[40]
Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Computing.
[41]
Little, B. B., Johnston, W. L., Lovell, A. C., Rejesus, R. M., &amp; Steed, S. A. (2002). Collusion in the US crop insurance program: applied data mining. Paper presented at the Eighth ACM SIGKDD international conference on Knowledge discovery and data mining.
[42]
Lucking-Reiley, D. (1999). Auctions on the Internet: what's being auctioned, and how? (Working paper): Vanderbilt University.
[43]
Lucking-Reiley, D., Bryan, D., Prasad, N., &amp; Reeves, D. (2001). Pennies from eBay: the Determinants of Price in Online Auctions. Working paper, University of Arizona.
[44]
Defection-free exchange mechanisms based on an entry fee imposition. Artificial Intelligence. v142 i2. 265-286.
[45]
Private order under dysfunctional public order. Michigan Law Review. v98. 2421-2458.
[46]
Miller, B. N., Albert, I., Lam, S. K., Konstan, J. A., &amp; Riedl, J. (2003). MovieLens unplugged: experiences with an occasionally connected recommender system. Paper presented at the international conference of intelligent user interface.
[47]
Detection of the customer time-variant pattern for improving recommender systems. Expert Systems with Applications. v28 i2. 189-199.
[48]
The concept and use of social networks. Manchester University Press, Manchester.
[49]
On centrality in graph. Scandinavian Journal of Psychology. 15
[50]
The PageRank citation ranking: Bringing order to the web (technical report). Stanford University, Stanford, CA.
[51]
Building solutions with Microsoft Commerce Server 2002. Microsoft Press.
[52]
Potter, G. W. (1994). Criminal organizations: Vice, racketeering, and politics in an American city. Prospect Heights, IL: Waveland.
[53]
Reffay, C., &amp; Chanier, T. (2003, June). How social network analysis can help to measure cohesion in collaborative distance-learning. Paper presented at the computer supported collaborative learning conference (CSCL'2003), Bergen, Norway.
[54]
Reputation systems. Communications of the ACM. v43 i12. 45-48.
[55]
Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system. In: Michael Baye, R. (Ed.), Advances in applied microeconomics: The economics of the Internet and e-commerce, Elsevier Science, Amsterdam.
[56]
Sabater, J., &amp; Sierra, C. (2002). Reputation and social network analysis in multi-agent systems. Paper presented at the autonomous agents and multi-agents systems, Bologna, Italy.
[57]
Social networks: Critical concepts in sociology. Routledge Publication Inc.
[58]
Shah, H. S., Joshi, N. R., Sureka, A., &amp; Wurman, P. R. (2002). Mining for bidding strategies on eBay. Paper presented at the WEBKDD 2002 Web mining for usage patterns and user profiles.
[59]
Shardanand, U., &amp; Maes, P. (1995). Social information filtering: Algorithms for automating 'Word of Mouth'. Paper presented at the conference of human factors in computing systems.
[60]
Online auction fraud: are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal. v52 i2. 453-472.
[61]
The application of network analysis to criminal intelligence: an assessment of the prospects. Social Networks. v13 i3. 251-274.
[62]
Swan, W. (2001). Social network analysis in construction project teams. <http://www.scpm.salford.ac.uk/trust/publications.htm> (Retrieved 10.05.2003).
[63]
Social structure of coopetition within a multiunit organization: coordination, competition, and intraorganizational knowledge sharing. Organization Science. v13 i2. 179-190.
[64]
Auctions and bidding on the internet: an assessment. Electronic Markets. v7 i4. 7-11.
[65]
TWINC, T.N.I.C. (2005). Internet Broadband Usage in Taiwan (No. 0507). Taipei, Taiwan: Taiwan Network Information Center.
[66]
Tyler, J. R., Wilkinson, D. M., &amp; Huberman, B. A. (2003). Email as spectroscopy: automated discovery of community structure within organizations. <http://xxx.lanl.gov/arXiv:cond-mat/0303264> (Retrieved 20.07.2003).
[67]
Wang, J.-C., &amp; Chiu, C.-C. (2005). Detecting online auction inflated-reputation behaviors using social network analysis. Paper presented at the North American Association for Computational Social and Organizational Science, Notre Dame, Indiana.
[68]
Designing mechanisms for e-commerce security: an example from sealed-bid auctions. International Journal of Electronic Commerce. v6 i2. 139-156.
[69]
Wang, W., Hidvégi, Z., &amp; Whinston, A. B. (2001, October 1). Shill bidding in multi-round online auctions. Paper presented at the 35th Hawaii international conference on system sciences, Hawaii.
[70]
eBay's worst nightmare. Fortune. v147 i10. 89
[71]
Wellman, B. (1996). For a social network analysis of computer networks: a sociological perspective on collaborative work and virtual community. Paper presented at the ACM SIGCPR/SIGMIS conference.
[72]
Multiple algorithms for fraud detection. Knowledge-Based Systems. v13 i2. 93-99.
[73]
Network Analysis.
[74]
Leading the news: fraud crackdown hits Web auctions - federal and state officials to make arrests, file suits EBay cooperates in probe. Wall Street Journal. A.3
[75]
Transnational criminal networks. In: Arquilla, J., Ronfeldt, D. (Eds.), Networks and netwars: The future of terror, crime, and militancy, RAND, Santa Monica, CA. pp. 61-97.
[76]
Xu, J.-J., &amp; Chen, H. (2002). Using shortest path algorithms to identify criminal associations. Paper presented at the 2002 national conference on digital government research.
[77]
Yahoo! Inc. (2004). Yahoo! Help - Listing Fees. <http://help.yahoo.com/help/us/auct/afee/afee-02.html> (Retrieved 6.03.2004).
[78]
Zacharia, G., Moukas, A., &amp; Maes, P. (1999, January 5-9). Collaborative reputation mechanisms in electronic marketplaces. Paper presented at the 32nd Hawaii international conference on system sciences, Electronic Commerce Minitrack, Maui, Hawaii.

Cited By

View all
  • (2023)Dual-view Contrastive Learning for Auction RecommendationProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614854(2146-2155)Online publication date: 21-Oct-2023
  • (2022)A fuzzy trust measurement method considering patients' trust opinions in Internet plus HealthcareProcedia Computer Science10.1016/j.procs.2022.09.407207:C(3488-3498)Online publication date: 1-Jan-2022
  • (2022)An efficient recommender system algorithm using trust dataThe Journal of Supercomputing10.1007/s11227-021-03991-278:3(3184-3204)Online publication date: 1-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 01 April 2008

Author Tags

  1. Center weight
  2. Information asymmetry
  3. Online auction
  4. Recommendation system
  5. Social network analysis

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Dual-view Contrastive Learning for Auction RecommendationProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3614854(2146-2155)Online publication date: 21-Oct-2023
  • (2022)A fuzzy trust measurement method considering patients' trust opinions in Internet plus HealthcareProcedia Computer Science10.1016/j.procs.2022.09.407207:C(3488-3498)Online publication date: 1-Jan-2022
  • (2022)An efficient recommender system algorithm using trust dataThe Journal of Supercomputing10.1007/s11227-021-03991-278:3(3184-3204)Online publication date: 1-Feb-2022
  • (2020)A Survey of Personalized Recommendation Based on Machine Learning AlgorithmsProceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering10.1145/3443467.3444711(602-610)Online publication date: 6-Nov-2020
  • (2020)A systematic survey on collaborator finding systems in scientific social networksKnowledge and Information Systems10.1007/s10115-020-01483-y62:10(3837-3879)Online publication date: 1-Oct-2020
  • (2019)TCFACOExpert Systems with Applications: An International Journal10.1016/j.eswa.2018.09.045118:C(152-168)Online publication date: 15-Mar-2019
  • (2018)Uncovering TorSecurity and Communication Networks10.1155/2018/42313262018Online publication date: 9-May-2018
  • (2018)Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary ComputationComplexity10.1155/2018/17163522018Online publication date: 1-Jan-2018
  • (2017)The Influence of Perceived Risk, Shopping Value and Opinion Leader to Explore Online Consumer Purchase IntentionInternational Journal of E-Adoption10.4018/IJEA.20170701039:2(31-58)Online publication date: 1-Jul-2017
  • (2017)GOTCHA! Network-Based Fraud Detection for Social Security FraudManagement Science10.1287/mnsc.2016.248963:9(3090-3110)Online publication date: 1-Sep-2017
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media