skip to main content
10.1145/2858036.2858555acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces

Published:07 May 2016Publication History

ABSTRACT

Reputation systems in current electronic marketplaces can easily be manipulated by malicious sellers in order to appear more reputable than appropriate. We conducted a controlled experiment with 40 UK and 41 German participants on their ability to detect malicious behavior by means of an eBay-like feedback profile versus a novel interface involving an interactive visualization of reputation data. The results show that participants using the new interface could better detect and understand malicious behavior in three out of four attacks (the overall detection accuracy 77% in the new vs. 56% in the old interface). Moreover, with the new interface, only 7% of the users decided to buy from the malicious seller (the options being to buy from one of the available sellers or to abstain from buying), as opposed to 30% in the old interface condition.

References

  1. Rehab Alnemr and Christoph Meinel. 2011. Why rating is not enough: A study on online reputation systems. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on. IEEE, 415-421.Google ScholarGoogle Scholar
  2. Donovan Artz and Yolanda Gil. 2007. A survey of trust in computer science and the Semantic Web. Web Semantics 5, 2 (2007), 58-71. DOI: http://dx.doi.org/10.1016/j.websem.2007.03.002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S.B. Azhar and M.J. Rissanen. 2011. Evaluation of Parallel Coordinates for Interactive Alarm Filtering. In Information Visualisation (IV), 2011 15th International Conference on. 102-109. DOI: http://dx.doi.org/10.1109/IV.2011.30 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sulin Ba and Paul A Pavlou. 2002. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS quarterly (2002), 243-268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Aaron Bangor, Philip T Kortum, and James T Miller. 2008. An empirical evaluation of the system usability scale. Intl. Journal of Human-Computer Interaction 24, 6 (2008), 574-594.Google ScholarGoogle ScholarCross RefCross Ref
  6. Zinaida Benenson, Anna Girard, and Ioannis Krontiris. 2015. User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. In Workshop on the Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  7. Gary Bente, Odile Baptist, and Haug Leuschner. 2012. To buy or not to buy: Influence of seller photos and reputation on buyer trust and purchase behavior. International Journal of Human-Computer Studies 70, 1 (2012), 1-13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gregory S Black. 2005. Is eBay for everyone? An assessment of consumer demographics. SAM Advanced Management Journal 70, 1 (2005), 50.Google ScholarGoogle Scholar
  9. Gary E Bolton, Elena Katok, and Axel Ockenfels. 2004. How effective are electronic reputation mechanisms? An experimental investigation. Management science 50, 11 (2004), 1587-1602. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Philip Bonhard, Clare Harries, John McCarthy, and M Angela Sasse. 2006. Accounting for taste: using profile similarity to improve recommender systems. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 1057-1066. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Michael Bostock, Vadim Ogievetsky, and Jeffrey Heer. 2011. D3 data-driven documents. Visualization and Computer Graphics, IEEE Transactions on 17, 12 (2011), 2301-2309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. John Brooke. 1996. SUS - A quick and dirty usability scale. Usability evaluation in industry 189 (1996), 194.Google ScholarGoogle Scholar
  13. SAP User Experience Community. 2015. System Usability Scale - jetzt auch auf Deutsch. https://experience.sap.com/skillup/system-usability-scale-jetzt-auch-auf-deutsch. (2015). {Online; last access on September 15th, 2015}.Google ScholarGoogle Scholar
  14. Fred D. Davis, Richard P. Bagozzi, and Paul R. Warshaw. 1989. User acceptance of computer technology: a comparison of two theoretical models. Management science 35, 8 (1989), 982-1003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chrysanthos Dellarocas. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM Conference on Electronic Commerce. ACM, NY, 150-157. DOI: http://dx.doi.org/10.1145/352871.352889 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Andreas Diekmann, Ben Jann, Wojtek Przepiorka, and Stefan Wehrli. 2013. Reputation Formation and the Evolution of Cooperation in Anonymous Online Markets. American Sociological Review (2013). DOI: http://dx.doi.org/10.1177/0003122413512316Google ScholarGoogle Scholar
  17. Liran Einav, Chiara Farronato, Jonathan D Levin, and Neel Sundaresan. 2013. Sales Mechanisms in Online Markets: What Happened to Internet Auctions? Technical Report. National Bureau of Economic Research.Google ScholarGoogle Scholar
  18. Diego Gambetta. 1988. Can We Trust Trust? In Trust: Making and Breaking Cooperative Relations, Diego Gambetta (Ed.). Basil Blackwell, Oxford, 213-237.Google ScholarGoogle Scholar
  19. Anindya Ghose, Panagiotis G Ipeirotis, and Arun Sundararajan. 2009. The dimensions of reputation in electronic markets. NYU Center for Digital Economy Research Working Paper No. CeDER-06-02 (2009).Google ScholarGoogle ScholarCross RefCross Ref
  20. Nathan Griffiths. 2005. Task delegation using experience-based multi-dimensional trust. In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. ACM, 489-496. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Stephan Hammer, Rolf Kiefhaber, Matthias Redlin, Elisabeth Andre, and Theo Ungerer. 2013. A User-Centric Study Of Reputation Metrics in Online Communities. In Proceedings of the 3rd Workshop on Trust, Reputation and User Modeling (TRUM'13). Rome Italy.Google ScholarGoogle Scholar
  22. Jeffrey Heer and Maneesh Agrawala. 2008. Design considerations for collaborative visual analytics. Information visualization 7, 1 (2008), 49-62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Julian Heinrich and Daniel Weiskopf. 2013. State of the Art of Parallel Coordinates. In STAR Proceedings of Eurographics 2013. Eurographics Association, 95-116.Google ScholarGoogle Scholar
  24. Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A Survey of Attack and Defense Techniques for Reputation Systems. ACM Comput. Surv. 42, 1, Article 1 (Dec. 2009), 31 pages. DOI: http://dx.doi.org/10.1145/1592451.1592452 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Daniel Houser and John Wooders. 2006. Reputation in auctions: Theory, and evidence from eBay. Journal of Economics & Management Strategy 15, 2 (2006), 353-369.Google ScholarGoogle ScholarCross RefCross Ref
  26. Alfred Inselberg. 1985. The plane with parallel coordinates. The Visual Computer 1, 2 (1985), 69-91. DOI: http://dx.doi.org/10.1007/BF01898350Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Alfred Inselberg. 2009. Parallel Coordinates: Visual Multidimensional Geometry and Its Applications. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jimmy Johansson and Camilla Forsell. 2016. Evaluation of Parallel Coordinates: Overview, Categorization and Guidelines for Future Research. IEEE Trans. Vis. Comput. Graph. 22, 1 (2016), 579-588. DOI: http://dx.doi.org/10.1109/TVCG.2015.2466992Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Audun Jøsang and Jennifer Golbeck. 2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management. Saint Malo France.Google ScholarGoogle Scholar
  30. Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618-644. DOI: http://dx.doi.org/10.1016/j.dss.2005.05.019 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Audun Jsang. 2012. Robustness of Trust and Reputation Systems: Does It Matter? In Trust Management VI, Theo Dimitrakos, Rajat Moona, Dhiren Patel, and D.Harrison McKnight (Eds.). IFIP Advances in Information and Communication Technology, Vol. 374. Springer Berlin Heidelberg, 253-262. DOI: http://dx.doi.org/10.1007/978--3--642--29852--3_21Google ScholarGoogle Scholar
  32. Daniel Keim, Gennady Andrienko, Jean-Daniel Fekete, Carsten Görg, Jörn Kohlhammer, and Guy Melancçon. 2008. Visual Analytics: Definition, Process, and Challenges. In Information Visualization, Andreas Kerren, JohnT. Stasko, Jean-Daniel Fekete, and Chris North (Eds.). Lecture Notes in Computer Science, Vol. 4950. Springer Berlin Heidelberg, 154-175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Daniel A. Keim. 2001. Visual Exploration of Large Data Sets. Commun. ACM 44, 8 (Aug. 2001), 38-44. DOI: http://dx.doi.org/10.1145/381641.381656 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Reid Kerr and Robin Cohen. 2009. Smart Cheaters Do Prosper: Defeating Trust and Reputation Systems. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2 (AAMAS '09). International Foundation for Autonomous Agents and Multiagent Systems, Richland SC, 993-1000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Eleni Koutrouli and Aphrodite Tsalgatidou. 2012. Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers. Computer Science Review 6, 2--3 (2012), 47-70. DOI: http://dx.doi.org/10.1016/j.cosrev.2012.01.002Google ScholarGoogle ScholarCross RefCross Ref
  36. J Richard Landis and Gary G Koch. 1977. The measurement of observer agreement for categorical data. biometrics (1977), 159-174.Google ScholarGoogle Scholar
  37. James R Lewis and Jeff Sauro. 2009. The factor structure of the system usability scale. In Human Centered Design. Springer, 94-103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Benedikt Loepp, Katja Herrmanny, and Jürgen Ziegler. 2015. Blended Recommending: Integrating Interactive Information Filtering and Algorithmic Recommender Techniques. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 975-984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Zaki Malik and Athman Bouguettaya. 2009. Rateweb: Reputation assessment for trust establishment among web services. The VLDB Journal The International Journal on Very Large Data Bases 18, 4 (2009), 885-911. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Stephen Marsh. 1994. Formalising Trust as a Computational Concept. Ph.D. Dissertation. University of Stirling, Stirling. http://homepage.mac.com/smarsh2003/SteveMarsh/Publications_files/Trust-thesis.pdfGoogle ScholarGoogle Scholar
  41. Stephen Marsh, Anirban Basu, and Natasha Dwyer. 2012. Rendering unto cæsar the things that are cæsars: Complex trust models and human understanding. In Trust Management VI. Springer, 191-200.Google ScholarGoogle Scholar
  42. David Masclet and Thierry Penard. 2012. Do reputation feedback systems really improve trust among anonymous traders? An experimental study. Applied Economics 44, 35 (2012), 4553-4573.Google ScholarGoogle ScholarCross RefCross Ref
  43. D. Harrison McKnight and Normal L. Chervany. 1996. The meanings of trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center (1996).Google ScholarGoogle Scholar
  44. Mikhail I Melnik and James Alm. 2002. Does a seller's ecommerce reputation matter? Evidence from eBay auctions. Journal of Industrial Economics (2002), 337-349.Google ScholarGoogle Scholar
  45. Jakob Nielsen. 1994. Usability engineering. Elsevier.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Paul A Pavlou and Angelika Dimoka. 2006. The nature and role of feedback text comments in online marketplaces: Implications for trust building, price premiums, and seller differentiation. Information Systems Research 17, 4 (2006), 392-414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Martin Rehak, Milos Gregor, Michal Pechoucek, and Jeffrey Bradshaw. 2006. Representing Context for Multiagent Trust Modeling. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology. Hongkong China, 737-746. DOI: http://dx.doi.org/10.1109/IAT.2006.107 Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation systems. Commun. ACM 43, 12 (2000), 45-48. DOI: http://dx.doi.org/10.1145/355112.355122 Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Paul Resnick and Hal R Varian. 1997. Recommender systems. Commun. ACM 40, 3 (1997), 56-58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Paul Resnick and Richard Zeckhauser. 2002. Trust among strangers in internet transactions: Empirical analysis of ebays reputation system. The Economics of the Internet and E-commerce 11, 2 (2002), 23-25.Google ScholarGoogle Scholar
  51. Paul Resnick, Richard Zeckhauser, John Swanson, and Kate Lockwood. 2006. The value of reputation on eBay: A controlled experiment. Experimental Economics 9, 2 (2006), 79-101.Google ScholarGoogle ScholarCross RefCross Ref
  52. Jens Riegelsberger, Martina Angela Sasse, and John D. McCarthy. 2005. The mechanics of trust: A framework for research and design. Int. J. Hum.-Comput. Stud. 62, 3 (2005), 381-422. DOI: http://dx.doi.org/10.1016/j.ijhcs.2005.01.001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Bob Rietjens. 2006. Trust and reputation on eBay: Towards a legal framework for feedback intermediaries. Information & Communications Technology Law 15, 1 (2006), 55-78.Google ScholarGoogle ScholarCross RefCross Ref
  54. Denise M Rousseau, Sim B Sitkin, Ronald S Burt, and Colin Camerer. 1998. Not so different after all: A cross-discipline view of trust. Academy of management review 23, 3 (1998), 393-404.Google ScholarGoogle Scholar
  55. Daniel M Russell, Mark J Stefik, Peter Pirolli, and Stuart K Card. 1993. The cost structure of sensemaking. In Proceedings of the INTERACT'93 and CHI'93 conference on Human factors in computing systems. ACM, 269-276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Johannes Sänger and Günther Pernul. 2014. Visualizing Transaction Context in Trust and Reputation Systems. In Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8--12, 2014. 94-103. DOI: http://dx.doi.org/10.1109/ARES.2014.19 Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Christine Satchell and Paul Dourish. 2009. Beyond the user. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group on Design: Open 24/7 - OZCHI '09. ACM Press, NY, NY, USA, 9. DOI: http://dx.doi.org/10.1145/1738826.1738829Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Galit Shmueli, Wolfgang Jank, Aleks Aris, Catherine Plaisant, and Ben Shneiderman. 2006. Exploring auction databases through interactive visualization. Decision Support Systems 42, 3 (2006), 1521-1538. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Mohammad Gias Uddin, Mohammad Zulkernine, and Sheikh Iqbal Ahamed. 2008. CAT: a context-aware trust model for open and dynamic systems. In Proceedings of the 2008 ACM symposium on Applied computing. ACM, 2024-2029. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, and Fred D. Davis. 2003. User acceptance of information technology: Toward a unified view. MIS quarterly (2003), 425-478. Google ScholarGoogle Scholar
  61. Edward J. Wegman. 1987. Hyperdimensional data analysis using parallel coordinates. Fairfax and Va.Google ScholarGoogle Scholar
  62. Yuan Yao, Sini Ruohomaa, and Feng Xu. 2012. Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce. JTAER 7, 1 (2012), 1-20. http://www.jtaer.com/apr2012/Yao_Ruohomaa_Xu_p1.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Koji Yatani, Michael Novati, Andrew Trusty, and Khai N. Truong. 2011. Review spotlight. In Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11. ACM Press, NY, NY, USA, 1541. DOI: http://dx.doi.org/10.1145/1978942.1979167Google ScholarGoogle Scholar
  64. Haibin Zhang, Yan Wang, and Xiuzhen Zhang. 2012. A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments. In Proceedings of the 5th IEEE International Conference on Service-Oriented Computing and Applications. Vol. SOCA. Taipei Taiwan, 1-8. DOI: http://dx.doi.org/10.1109/SOCA.2012.6449461 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
            May 2016
            6108 pages
            ISBN:9781450333627
            DOI:10.1145/2858036

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 May 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CHI '16 Paper Acceptance Rate565of2,435submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

            Upcoming Conference

            CHI '24
            CHI Conference on Human Factors in Computing Systems
            May 11 - 16, 2024
            Honolulu , HI , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader