Fraud detections for online businesses: a perspective from blockchain technology

Article English OPEN
Cai, Yuanfeng; Zhu, Dan;
  • Publisher: Heidelberg: Springer
  • Journal: issn: 2199-4730
  • Related identifiers: doi: 10.1186/s40854-016-0039-4
  • Subject: Reputation systems | Blockchain | Fraud detection | Rating fraud
    • ddc: ddc:650
    acm: ComputingMilieux_COMPUTERSANDSOCIETY

Background: The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers. However, it is vulnerable to rating fraud. Some raters may inject unfairly high or low ratings to the system so as to promote the... View more
  • References (35)
    35 references, page 1 of 4

    Azari R et al (2003) Current security management & ethical issues of information technology. Idea Group Publishing, Hershey

    Ba S, Pavlou P (2002) Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Q 26(3):243-268

    Bolton GE, Katok E, Ockenfels A (2004) How effective are electronic reputation mechanisms? An exp invest Manag Sci 50(11):1587-1602

    Bromley DB (2001) Relationships between personal and corporate reputation. Eur J Mark 35(3):316-334

    Cai Y, Zhu D (2015) Rating fraud detection-towards designing a trustworthy reputation systems. Proceeding of 36th International Conference on Information Systems (ICIS '15, Dallas, TX

    Coleman A. (2016) Amazon banned incentivized reviews: Companies say reviews anyway. 3568728/amazon-bans-incentivized-reviews-companies-say-review-anyway/. Accessed 1 Nov 2016

    Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. Proceedings of the 2nd ACM Conference on Electronic commerce. October 17-20, 2000, Minneapolis, Minnesota, pp. 150-157

    Dennis R, Owenson G (2016) Rep on the roll: a peer to peer reputation system based on a rolling blockchain. Int J Digital Society (IJDS) 7(1):1123-1134

    Driscoll S (2013) "How Bitcoin Works under the Hood," in: ImponderableThings. Blogger. http://www.

    Douceur J (2002) “The Sybil Attack,” In IPTPS'01 Revised Papers from the First International Workshop on Peer-to-Peer Systems, Springer-Verlag London, UK 2002, pp. 251-260

  • Metrics
    No metrics available
Share - Bookmark