Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3466933.3466986acmotherconferencesArticle/Chapter ViewAbstractPublication PagessbsiConference Proceedingsconference-collections
research-article

Fraud Detection in Social Commerce: combining structured attributes and images

Published: 08 July 2021 Publication History

Abstract

Social Commerce has risen and evolved in the last years due to changes either in e-commerce or social networks applications. On top of that, the number of online ads and transactions in Social Commerce has grown. This environment is attractive to either good users and bad users. The bad users cause harm to their victims by making them lose money or suffer psychological damage. Since the volume of transactions is high and the fraud occurrence is low, the manual detection is highly inefficient (too much resource required for low detection) and unscalable. The existing solutions for automatic fraud detection in Social Commerce are based on structured information available in ads such as price, product type, brand, new/used, among others. However, such solutions ignore possible fraud signs from the ads’ images that exhibit the products sold. Therefore, this work aims to evaluate if combining structured information and images available in the ads provides more effective models than the ones considering only structured information. To this end, it proposes FDSC, a method that combines information obtained from ads’ images through deep learning with structured information available in the corresponding ads, in order to detect fraud in Social Commerce. Experimental evidence shows an incremental opportunity of 7% in F-score by the adoption of FDSC.

References

[1]
Aisha Abdallah, Mohd Aizaini Maarof, and Anazida Zainal. 2016. Fraud detection system: A survey. Journal of Network and Computer Applications 68 (2016).
[2]
Kayode Sakariyah Adewole, Nor Badrul Anuar, Amirrudin Kamsin, Kasturi Dewi Varathan, and Syed Abdul. 2017. Malicious accounts : Dark of the social networks. Journal of Network and Computer Applications 79, September 2016(2017), 41–67.
[3]
Abdulrahman Alarifi, Mansour Alsaleh, and Abdulmalik Al-salman. 2016. Twitter turing test : Identifying social machines R. Information Sciences 372(2016).
[4]
V. Almendra. 2013. Finding the needle: A risk-based ranking of product listings at online auction sites for non-delivery fraud prediction. Expert Systems with Applications 40, 12 (2013), 4805–4811.
[5]
Naomi S Altman. 1992. An introduction to kernel and nearest-neighbor nonparametric regression. The American Statistician 46, 3 (1992), 175–185.
[6]
Noticias Automotivas. 2018. Carros só pra rodar: entenda como funciona. Retrieved June 3, 2019 from www.noticiasautomotivas.com.br/carros-so-pra-rodar
[7]
Aashir Baig and K Nagi Reddy. 2020. Utilizing product features for fraud detection on e-commerce platforms in big data transactions. Inter. Journal 5, 11 (2020).
[8]
Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5–32.
[9]
Nuno Carneiro, Gonçalo Figueira, and Miguel Costa. 2017. A data mining based system for credit-card fraud detection in e-tail. Decision Support Systems 95 (2017), 91–101.
[10]
Salvatore Carta, Gianni Fenu, Diego Reforgiato Recupero, and Roberto Saia. 2019. Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model. Journal of Information Security and Applications 46, 1(2019).
[11]
Ming Cheung, James She, and Lufi Liu. 2018. Deep Learning-based Online Counterfeit-seller Detection. INFOCOM - IEEE Inter. Conf. on Computer Communications 1 (2018), 51–56.
[12]
Ming Cheung, James She, and Ning Wang. 2017. Characterizing User Connections in Social Media through User Shared Image. IEEE Trans. on Big Data(2017).
[13]
Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine learning 20, 3 (1995), 273–297.
[14]
Renata Gonçalves Curty and Ping Zhang. 2011. Social commerce: Looking back and forward. Proc. of the ASIST Annual Meeting 48 (2011), 1–10.
[15]
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In 2009 IEEE Conf. on Computer Vision and pattern recognition. Ieee, 248–255.
[16]
Ksenia Dobreva. 2018. Global E-commerce Trends and Statistics. Retrieved April 24, 2018 from www.amasty.com/blog/2018/02/global-trends-and-statistics.pdf
[17]
FBI. 2017. 2017 Annual Internet Crime Report. Federal Bureau of Investigation - Internet Crime Complaint Center (2017).
[18]
Kathleen Fearn-Banks. 2016. Crisis communications: A casebook approach. Routledge.
[19]
Benjamin J. Ford, Haiping Xu, and Iren Valova. 2013. A real-time self-adaptive classifier for identifying suspicious bidders in online auctions. Computer Journal 56, 5 (2013), 646–663.
[20]
David A Freedman. 2009. Statistical models: theory and practice. Cambridge University Press.
[21]
Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT.
[22]
Simon Haykin. 2007. Redes neurais: princípios e prática. Bookman Editora.
[23]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proc. of the IEEE Conf. on Computer Vision and pattern recognition. 770–778.
[24]
Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. preprint arXiv:1704.04861(2017).
[25]
Mohammad Hanif Jhaveri, Orcun Cetin, Carlos Gañán, Tyler Moore, and Michel Van Eeten. 2017. Abuse Reporting and the Fight Against Cybercrime. Comput. Surveys 49, 4 (2017), 1–27.
[26]
George H John and Pat Langley. 1995. Estimating continuous distributions in Bayesian classifiers. In Proc. of the 11th Conf. of Uncertainty in A.I.338–345.
[27]
Fujun Lai, Dahui Li, and Chang-tseh Hsieh. 2012. Fighting identity theft : The coping perspective. Decision Support Systems 52, 2 (2012), 353–363.
[28]
Tamilla Mavlanova, Raquel Benbunan-fich, and Guido Lang. 2016. The role of external and internal signals in E-commerce. Decision Support Systems 87 (2016).
[29]
Geoffrey J McLachlan. 2004. Discriminant analysis and statistical pattern recognition. Vol. 544. John Wiley & Sons.
[30]
Jay Nanduri, Yuting Jia, Anand Oka, John Beaver, and Yung-Wen Liu. 2020. Microsoft uses machine learning and optimization to reduce E-Commerce fraud. INFORMS Journal on Applied Analytics 50, 1 (2020), 64–79.
[31]
E. W.T. Ngai, Yong Hu, Y. H. Wong, Yijun Chen, and Xin Sun. 2011. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems 50, 3 (2011).
[32]
J. Ross Quinlan. 1987. Simplifying Decision Trees. Inter. Journal of Man-machine Studies 27, 3 (1987), 221–234.
[33]
Shailendra Rathore, Pradip Kumar, Vincenzo Loia, Young-sik Jeong, and Jong Hyuk. 2017. Social network security: Issues, challenges, threats, and solutions. Information Sciences 421(2017), 43–69.
[34]
Yusuf Sahin, Serol Bulkan, and Ekrem Duman. 2013. Expert Systems with Applications A cost-sensitive decision tree approach for fraud detection. Expert Systems With Applications 40, 15 (2013), 5916–5923.
[35]
Mark Sandler, Andrew Howard, Menglong Zhu, Andrey Zhmoginov, and Liang-Chieh Chen. 2018. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proc. of the IEEE Conf. on Computer Vision and pattern recognition. 4510–4520.
[36]
SEBRAE. 2017. O que você precisa saber sobre comércio eletrônico. Retrieved July 15, 2020 from https://tinyurl.com/sebraesbsi
[37]
Dossier Statista. 2017. Monthly Active Facebook Users Worldwide. Retrieved May 3, 2018 from https://tinyurl.com/sbsi-2021-facebook
[38]
Dossier Statista. 2018. Monthly Active Instagram Users. Retrieved May 6, 2018 from https://tinyurl.com/sbsi-2021-instagram
[39]
Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms, methods, and techniques. Vol. 1. IGI global, 242–264.
[40]
Sidney Tsang, Yun Sing Koh, Gillian Dobbie, and Shafiq Alam. 2014. SPAN: Finding collaborative frauds in online auctions. Knowledge-Based Systems 71 (2014), 389–408.
[41]
Monica T Whitty and Tom Buchanan. 2012. The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking 15, 3(2012).
[42]
Hayden Wimmer and Victoria Y. Yoon. 2017. Counterfeit product detection: Bridging the gap between design science and behavioral science in information systems research. Decision Support Systems 104 (2017), 1–12.
[43]
Shan-hung Wu, Man-ju Chou, Chun-hsiung Tseng, Yuh-jye Lee, and Kuan-ta Chen. 2015. Detecting Identity Fraud on Social Network Services: A Case Study With Facebook. IEEE Systems Journal 11, 4 (2015), 1–12.
[44]
Shan-Hung Wu, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, and Kuan-Ta Chen. 2017. Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook. IEEE Systems Journal 11, 4 (2017), 2432–2443.
[45]
Lin Yang, Wei Bang Chen, Chengcui Zhang, John K. Johnstone, Song Gao, and Gary Warner. 2012. Profiling online auction sellers using image-editing styles. IEEE Multimedia 19, 1 (2012), 29–39.
[46]
Yasser Yasami and Farshad Safaei. 2017. A statistical infinite feature cascade-based approach to anomaly detection for dynamic social networks. Computer Communications 100 (2017), 52–64.
[47]
Kem Z K Zhang and Morad Benyoucef. 2016. Consumer behavior in social commerce : A literature review. Decision Support Systems 86 (2016), 95–108.
[48]
Jie Zhao, Raymond Y K Lau, Wenping Zhang, Kaihang Zhang, Xu Chen, and Deyu Tang. 2016. Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-Commerce. Decision Support Systems 86 (2016), 109–121.
[49]
Liping Zhou, Wei Bang Chen, and Chengcui Zhang. 2013. Authorship detection and encoding for eBay images. Multimedia Data Engineering Applications and Processing 1 (2013), 20–34.
[50]
Yongchun Zhu, Dongbo Xi, Bowen Song, Fuzhen Zhuang, Shuai Chen, Xi Gu, and Qing He. 2020. Modeling users’ behavior sequences with hierarchical explainable network for cross-domain fraud detection. In Proc. of The Web Conf. 2020. 928–938.

Index Terms

  1. Fraud Detection in Social Commerce: combining structured attributes and images
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SBSI '21: Proceedings of the XVII Brazilian Symposium on Information Systems
        June 2021
        453 pages
        ISBN:9781450384919
        DOI:10.1145/3466933
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 08 July 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. e-commerce
        2. fraud detection
        3. image
        4. image classification
        5. image evaluation
        6. machine learning
        7. social commerce (s-commerce)

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        SBSI '21

        Acceptance Rates

        Overall Acceptance Rate 181 of 557 submissions, 32%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 79
          Total Downloads
        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 22 Sep 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media