Weitere Kapitel dieses Buchs durch Wischen aufrufen
Click fraud is arguably the cyberworld’s biggest scam. How do click fraudsters frame their actions? What are the characteristics of click fraud victims? How do formal and informal institutions affect click fraudsters’ actions? We address these questions by examining the contexts, mechanisms, and processes associated with the click fraudsters’ profitability and performance. We also discuss some attempts to criminalize and stigmatize click fraudsters.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Agarwal, N., Athey, S., & Yang, D. (2009). Skewed bidding in pay-per-action auctions for online advertising. American Economic Review, 99(2), 441–447. CrossRef
Anderson, M. (2008, July 2008). Crimeware pays: Adware, phishing, and spam are a strange—and big—business. IEEE Spectrum. http://www.spectrum.ieee.org/jul08/6375. Accessed 2 October 2008.
Anderson, R., & Schneier, B. (2005). Counterpane internet security guest editors introduction: Economics of information security. IEEE Security & Privacy, 3(1), 12–13. CrossRef
Arnott, S. (2008, March 22). Cyber crime stays one step ahead. http://www.independent.co.uk/news/business/analysis-and-features/cyber-crime-stays-one-step-ahead-799395.html. Accessed 2 October 2008.
Backoff, J. F., & Martin, Jr., C. L. (1991). Historical perspectives: Development of the codes of ethics in the legal, medical and accounting professions. Journal of Business Ethics, 10, 99–110. CrossRef
Bailey, J. P., & Bakos, Y. (1997). An exploratory study of the emerging role of electronic intermediaries. International Journal of Electronic Commerce, 1(3), 7–20.
Barboza, D. (2006, September 17). The Rise of Baidu (That’s Chinese for Google). http://www.nytimes.com/2006/09/17/business/yourmoney/17baidu.html?pagewanted=3&_r=1. Accessed 2 October 2008.
Berger, P. L., & Luckmann, T. (1967). The social construction of reality: A treatise in the sociology of knowledge. New York: Doubleday.
Burns, E. (2007, October 15). Worldwide Internet: Now Serving 61 Billion Searches per Month Search Engine Watch. http://searchenginewatch.com/3627304. Accessed 2 October 2008.
Businessweek.com. (2006, April 24). Your ad here. And here. And here. http://www.businessweek.com/magazine/content/06_17/b3981046.htm. Accessed 2 October 2008.
Campbell, J. L. (2004). Institutional change and globalization. Princeton, NJ: Princeton University Press.
Cart, N. G. (2000). Hypermediation: Commerce as Clickstream. Harvard Business Review, 78(1), 46–47.
Chabrow, E. (2006). The spies inside. InformationWeek, 1082, 34–40.
Chapell, A. (2006, October 13). Re-evaluating click fraud. http://www.imediaconnection.com/printpage/printpage.aspx?id=11361. Accessed 2 October 2008.
Chosun.com. (2006, October 31). Click fraud sets back internet advertising. http://english.chosun.com/w21data/html/news/200610/200610310025.html. Accessed 2 October 2008.
Chosun.com. (2008, July 15). Online advertisers demand industry reforms.
Clarke, R.V. (1995). Situational crime prevention. In Tonry, M. & Farrington, D. P. (Eds.), Building a safer society. Strategic approaches to crime (pp. 91–150). Chicago: University of Chicago Press.
Clemons, E. K. (2008). How information changes consumer behavior and how consumer behavior determines corporate strategy. Journal of Management Information Systems, 25(2), 13–40. CrossRef
Deci, E. L, & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum Press.
Dickson, M., & BeShers, R. G. V. (2004). The impact of societal culture and industry on organizational culture: Theoretical explanations. In R. J. House, P. J. Hanges, M. Javidan, P. W. Dorfman, & V. Gupta (Eds.), Culture, leadership, and organizations: The GLOBE study of 62 societies. Thousand Oaks, CA: Sage Publications.
Dillman, B. (2007). Introduction: Shining light on the shadows: The political economy of illicit transactions in the Mediterranean. Mediterranean Politics, 12(2), 123–139. CrossRef
Edelman, B. (2007, January 25). Why I can never agree with adware and spyware. The Guardian.
Edelman, L. B., & Suchman, M. C. (1997). The legal environments of organizations. Annual Review of Sociology, 23, 479–515. CrossRef
Ehrlich, I., & Becker, G. (1972). Market insurance, serf-insurance and serf-protection. Journal of Political Economy, 80(4), 623–648. CrossRef
Einhorn, B. (2006). Advertisers in China are getting burned, too. Business Week, 4003, 54.
Elgin, B. (2006). Yahoo’s pop-up connection. Business Week, July 17 (3993), 45.
Emarketer. (2009, February 6). US Search Ad Spending Falters? http://www.emarketer.com/Article.aspx?id=1006902. Accessed 2 October 2009.
Epstein, A. J. (2007, April 23). Online merchant’s guide to pay per click advertising. AuctionBytes.com. http://www.auctionbytes.com/cab/abn/y07/m04/i23/s03. Accessed 2 October 2008.
Espiner, T. (2007, December 14). Cracking open the cybercrime economy. ZDNet News. http://news.zdnet.com/2100-1009_22-180416.html. Accessed 2 October 2008.
Giragosian, R. (2006). Redefining Armenian national security. Demokratizatsiya, 14(2), 223–234. CrossRef
Giragosian, R. (2007). Armenia on the move: A comparative assessment. AGBU, 17(1), 22–24.
Glaeser, E. L., & Sacerdote, B. (1999). Why is there more crime in cities? The Journal of Political Economy, 107(6), 225–258. CrossRef
Gleeson, S. (2008, April 2). Superhacker convicted of international cyber crime. http://www.nzherald.co.nz/category/story.cfm?c_id=30&objectid=10501518. Accessed 2 October 2008.
Gonsalves, A. (2006, April 24). Click fraud less than expected. Monitoring Firm Says. http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml?articleID=186700544. Accessed 2 October 2008.
Graham, J. (2005, November 3). Google’s AdSense a bonanza for some websites. USA Today.
Greenberg, A. (2007, July 3). More Evil than Google? http://www.forbes.com/2007/07/03/google-evil-competition-tech-techbiz-cx_ag_0703googevil.html. Accessed 2 October 2008.
Greenwood, R., Suddaby, R., & Hinings, C. R. (2002). Theorizing change: The role of professional associations in the transformation of institutionalized fields. Academy of Management Journal, 45(1), 58–80. CrossRef
Grow, B., Elgin, B., & Herbst, M. (2006). Click fraud. Business Week, 4003, 46.
Hamner, K. M. (1992). Gay-bashing: A social identity analysis of violence against Lesbians and Gay Men. In G. M. Herek & K. Berrill (Eds.). Hate crimes: Confronting violence against Lesbians and Gay Men (pp. 179–90). Newbury Park, CA: Sage.
Haunschild, P. R., & Rhee, M. (2004). The role of volition in organizational learning: The case of automotive product recalls. Management Science, 50, 1545–1560. CrossRef
Heun, C. T. (2005). Can spyware ever come in from the cold? InformationWeek, 1061, 70–71.
Higgins, K. J. (2008, July 28). Botnets behind one fourth of click fraud. DarkReading. http://www.darkreading.com/security/government/showArticle.jhtml?articleID=211201369.
Hollinger, R., & Lanza-Kaduce, L. (1988). The process of criminalization: The case of computer crime laws. Criminology, 26, 101–126. CrossRef
Information Today. (2008). Challenges in the East, 25(2), 22.
IT Week. (2006, August 14). Advertising body fights click fraud, 13.
Kehaulani, S. (2006, October 22). ‘Click Fraud’ threatens foundation of web ads; Google faces another lawsuit by businesses claiming overcharges. The Washington Post, A.1.
Kshetri, N., & Dholakia, N. (2009). Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian offshoring industry. Journal of International Management, 15(2), 225–239. CrossRef
Lawrence, T. B., & Phillips, N. (2004) From Moby Dick to Free Willy: Macro-cultural discourse and institutional entrepreneurship in emerging institutional fields. Organization, 11, 689–711. CrossRef
Leggatt, H. (2009, October 13). Online advertisers duped by ‘invisible’ ads. BizReport. http://www.bizreport.com/2009/10/online_advertisers_duped_by_invisible_ads.html. Accessed 27 October 2009.
Leonard, D. (2006). When is a click not a click? Fortune, 154(5), 53.
Leyden, J. (2006, October 6). Worm automates Google AdSense fraud. . http://www.theregister.co.uk/2006/10/06/google_adsense_worm. Accessed 2 October 2008.
Liptak, A. (2007, October 15). Competing for clients, and paying by the click. The New York Times. http://www.nytimes.com/2007/10/15/us/15 bar.html. Accessed 27 October 2009.
Los Angeles Times. (2006, August 3). In brief/internet; Search engines unite to fight ‘Click Fraud’, C.4.
Lu, P. B. (2007, March). CIC China search engine advertisers survey brief 1Q2007. http://www.researchinchina.com/headline/download/ChinaPaidSearchAdvertisersSurvey1Q2007.pdf. Accessed 2 October 2008.
Lynn, M. (2006, October 7). Why Google has already passed its peak. The Spectator.
Mann, C. C. (2006, January). How click fraud could swallow the internet. WIRED Magazine, 14(1). http://www.wired.com/wired/archive/14.01/fraud.html. Accessed 27 October 2008.
Marketing. (2006, July 19). Media analysis: Click fraud rears its head. http://www.accessmylibrary.com/coms2/summary_0286-33091453_ITM. Accessed 2 October 2008.
Martin, K. D., & Smith, N. C. (2008). Commercializing social interaction: The ethics of stealth marketing. Journal of Public Policy & Marketing, 27(1), 45–56. CrossRef
Matin, S. (2007). Clicks Ahoy! Navigating online advertising in a sea of fraudulent clicks. Berkeley Technology Law Journal, Annual Review, 22(1), 533–554.
McCarthy, B. (2002). New economics of sociological criminology. Annual Review of Sociology, 28, 417–442. CrossRef
Mello, J. P. Jr. (2006, May 1). Pornographers turn to click fraud. E-Commerce Times. http://www.ecommercetimes.com/story/48135.html. Accessed 2 October 2008.
Milyan, A. (2007, May 14). Developing click fraud standards: Q&A with Tom Cuthbert l Click Forensics. http://www.searchmarketingstandard.com/articles/2007/05/developing-click-fraud-standards-qa-with-tom-cuthbert-l-click-forensics.html. Accessed 2 October 2008.
Mindlin, A. (2008, June 16). Rogue computers used in ad fraud; [Business/Financial Desk]. New York Times, (Late Edition (East Coast)), C.4.
Mittelman, J. H., & Johnston, R. (1999). The globalization of organized crime, the courtesan state, and the corruption of civil society. Global Governance, 5(1), 103–126.
Motlogelwa, T. (2007, October 5). Cyber crime law gets teeth. http://www.mmegi.bw/index.php?sid=1&aid=30&dir=2007/October/Friday5. Accessed 27 October 2009.
Naidu, E. (2008, May 11). Cybercrime expert comes to SA. http://www.iol.co.za/index.php?set_id=1&click_id=139&art_id=vn20080511082218330C406913 Accessed 1 October 2008.
Olsen, S. (2004, July 19). Exposing click fraud. CNET News. http://news.cnet.com/Exposing-click-fraud/2100-1024_3-5273078.html. Accessed 2 October 2008.
Parker, D. B. (1976). Crime by computer. New York: Charles Scribners’ Sons.
Penenberg, A. L. (2005). So many clicks, so few sales. Inc, 27(8), 29–30.
Perez, J. C. (2009, January 26). Google Q4 earnings plummet, revenue up 18%. http://www.techworld.com.au/article/274113/google_q4_earnings_plummet_revenue_up_18. Accessed 2 October 2009.
Powell, W. W. (1993). The social construction of an organizational field: The case of biotechnology. Paper presented at the Warwick-Venice workshop on Perspectives on Strategic Change, University of Warwick.
redherring.com. (2005, April 5). China’s Zombie PCs. http://www.redherring.com/Home/11708. Accessed 2 October 2008.
Rhee, M., & Haunschild, P. R. (2006). The liability of good reputation: A study of product recalls in the US automobile industry. Organization Science, 17, 101–117. CrossRef
Rhee, M., & Valdez, M. E. (2009). Contextual factors surrounding reputation damage with potential implications for reputation repair. Academy of Management Review, 34(1), 146–168.
Rindova, V. P., Pollock, T. G., & Hayward, M. L. A. (2006). Celebrity firms: The social construction of market popularity. Academy of Management Review, 31, 50–71.
Roberts, D. (2008). Inside the war against China’s Blogs; Vengeful bloggers? Flaming posts? PR firms help global brands navigate the country’s perilous Web. Business Week, 4089, 60.
Robertson, B. (2006, October 23). China’s Internet Mess; Search-engine firms routinely use spyware to capture market share. Now they face allegations of click fraud. Newsweek (International ed.)..
Schneier, B. (2009, October 15). Why framing your enemies is now virtually child’s play. The Guardian. http://www.guardian.co.uk/technology/2009/oct/15/bruce-schneier-internet-security. Accessed 22 October 2008.
Scott, W. R. (1992). Organizations: Rational, natural and open systems. Englewood Cliffs, NJ: Prentice Hall.
Skrzycki, C. (2007). Stopping Spyware at the source. The Washington Post, D.1.
Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472. CrossRef
Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137. CrossRef
Standing, G. (1984). The notion of technological unemployment. International Labour Review, 123(2), 127–147.
Sullivan, E. A. (2008, February 15). Consider your source. Marketing News, 42(3), 16–19.
Sullivan, L. (2009, February 6). Brick-and-Mortar retailers losing search battle. MediaPost. http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=99829. Accessed 2 October 2008.
Tajfel, H., & Turner, J. C. (1986). The social identity theory of intergroup behavior. In S. Worchel & W. G. Austin (Eds.), Psychology of intergroup relations (pp. 7–24). Chicago, IL: Nelson-Hall.
The Economist. (2006). Leaders: Truth in advertising; Internet commerce, 381(8505), 12.
USA Today. (2008, December 17). Marketers hone the focus of search ads.
Utter, D. A. (2006). High-priced keyword click fraud rises. http://www.webpronews.com/insiderreports/2006/07/17/highpriced-keyword-click-fraud-rises, July 17. Accessed 2 October 2008.
Vassilev, R. (2003). De-development problems in Bulgaria. East European Quarterly, 37(3), 345.
Veverka, M. (2006). How Click Fraud Just Got Scammier; Calling All “Bot” Busters!. Barron’s, 44.
Vidyasagar, N. (2004, May 3). India’s secret army of online ad ‘clickers’. http://timesofindia.indiatimes.com/articleshow/msid-654822,curpg-1.cms. Accessed 2 October 2008.
Vise, D. A. (2005). Clicking to steal: When advertisers pay by the look. The Washington Post, F01. http://www.washingtonpost.com/wp-dyn/articles/A58268-2005Apr16.html. Accessed 2 October 2008.
Wiesenfeld, B. M., Wurthmann, K. A., & Hambrick, D. C. (2008). The stigmatization and devaluation of elites associated with corporate failures: A process model. Academy of Management Review, 33(1), 231–251.
Zaharov-Reutt, A. (2008, November 30). Click fraud: Advertisers to watch closely. ITWire. http://www.itwire.com/content/view/21990/53. Accessed 28 October 2009.
- The Global Click Fraud Industry
Dr. Nir Kshetri
- Springer Berlin Heidelberg
- Chapter 10