{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:22:35Z","timestamp":1773300155799,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540715481","type":"print"},{"value":"9783540715498","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71549-8_22","type":"book-chapter","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T09:11:58Z","timestamp":1183021918000},"page":"238-243","source":"Crossref","is-referenced-by-count":20,"title":["A Proposed Data Mining Approach for Internet Auction Fraud Detection"],"prefix":"10.1007","author":[{"given":"Yungchang","family":"Ku","sequence":"first","affiliation":[]},{"given":"Yuchi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chaochang","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"22_CR1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/278476.278495","volume":"41","author":"E. Heck van","year":"1998","unstructured":"van Heck, E., Vervest, P.: How Should CIOs Deal With Web-Based Auction? Communication of the ACM\u00a041(7), 99\u2013100 (1998)","journal-title":"Communication of the ACM"},{"key":"22_CR2","unstructured":"National Fraud Information Center: Internet Fraud Statistics Reports (2005), Available from \n                      \n                        http:\/\/www.fraud.org\/internet\/intstat.htm"},{"key":"22_CR3","unstructured":"Anderson, K.B.: Internet Auction Fraud: What Can We Learn From Consumer Sentinel Data? Federal Trade Commission Report (2004)"},{"key":"22_CR4","unstructured":"National Consumer League Internet Fraud Watch (2000-2005), Internet Fraud Statistics (2005), Available from \n                      \n                        http:\/\/www.fraud.org\/internet\/intstat.htm"},{"key":"22_CR5","unstructured":"Chua, C.E.H., Wareham, J.: Self-Regulation for Online Auctions: An Analysis. In: Proc. 23rd Int\u2019l Conf. Information Systems, pp. 115\u2013125. Assoc. for Information Systems (2002)"},{"key":"22_CR6","unstructured":"Kauffman, R.J., Wood, C.A.: Premium Bidding in Online Auctions: An Examination of Opportunism and Seller Preference (2006), Available from \n                      \n                        http:\/\/www.mgmt.purdue.edu\/academics\/mis\/workshop\/kw_111805.pdf"},{"issue":"10","key":"22_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2004.165","volume":"37","author":"C.E.H. Chua","year":"2004","unstructured":"Chua, C.E.H., Wareham, J.: Fighting Internet Auction Fraud: An Assessment and Proposal. IEEE Computer\u00a037(10), 31\u201337 (2004)","journal-title":"IEEE Computer"},{"issue":"12","key":"22_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., et al.: Reputation Systems. Communication of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communication of the ACM"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume":"11","author":"P. Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust among Strangers in Internet Transactions: Empirical Analysis of eBay\u2019s Reputation System. Advances in Applied Microeconomics\u00a011, 127\u2013157 (2002)","journal-title":"Advances in Applied Microeconomics"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1111\/j.1530-9134.2006.00103.x","volume":"15","author":"D. Houser","year":"2006","unstructured":"Houser, D., Wooders, J.: Reputation in Auctions: Theory, and Evidence from eBay. Journal of Economics & Management Strategy\u00a015(2), 353\u2013370 (2006)","journal-title":"Journal of Economics & Management Strategy"},{"issue":"3","key":"22_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2753\/JEC1086-4415100304","volume":"10","author":"D.G. Gregg","year":"2006","unstructured":"Gregg, D.G., Scott, J.E.: The Role of Reputation Systems in Reducing On-Line Auction Fraud. International Journal of Electronic Commerce\u00a010(3), 95\u2013120 (2006)","journal-title":"International Journal of Electronic Commerce"},{"issue":"4","key":"22_CR12","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1080\/07421222.2005.11045822","volume":"21","author":"S. Ba","year":"2005","unstructured":"Ba, S., et al.: Choice of Transaction Channels: The Effects of Product Characteristics on Market Evolution. Journal of Management Information Systems\u00a021(4), 173\u2013197 (2005)","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0167-9236(02)00074-X","volume":"35","author":"S. Ba","year":"2003","unstructured":"Ba, S., Whinston, A.B., Zhang, H.: Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems\u00a035(3), 273\u2013286 (2003)","journal-title":"Decision Support Systems"},{"issue":"1","key":"22_CR14","first-page":"1","volume":"2","author":"K.M. Dolan","year":"2004","unstructured":"Dolan, K.M.: Internet Auction Fraud: The Silent Victims. Journal of Economic Crime Management\u00a02(1), 1\u201322 (2004)","journal-title":"Journal of Economic Crime Management"},{"key":"22_CR15","unstructured":"National White Collar Crime Center, IC3 2005 Internet Crime Report (2005), Available from \n                      \n                        http:\/\/www.nw3c.org\/"},{"issue":"4","key":"22_CR16","first-page":"144","volume":"12","author":"J.C. Wang","year":"2004","unstructured":"Wang, J.C., Chiu, C.C., Ker, H.Y.: Detecting Online Auction Fraud of Reputation Inflation through Social Network Structures Embedded in Transaction Records. Journal of Information Management (Taiwan)\u00a012(4), 144\u2013184 (2004)","journal-title":"Journal of Information Management"},{"issue":"4","key":"22_CR17","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/S0740-8188(96)90003-1","volume":"18","author":"C. Haythornthwaite","year":"1996","unstructured":"Haythornthwaite, C.: Social Network Analysis: An Approach and Technique for the Study of Information Exchange. Library & Information Science Research\u00a018(4), 323\u2013342 (1996)","journal-title":"Library & Information Science Research"},{"key":"22_CR18","volume-title":"Social Network Analysis","author":"J. Scott","year":"2000","unstructured":"Scott, J.: Social Network Analysis. SAGE Publications, London (2000)"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J. Xu","year":"2005","unstructured":"Xu, J., Chen, H.: CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems\u00a023(2), 201\u2013226 (2005)","journal-title":"ACM Transactions on Information Systems"},{"issue":"6","key":"22_CR20","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J. Xu","year":"2005","unstructured":"Xu, J., Chen, H.: Criminal network analysis and visualization. Communication of the ACM\u00a048(6), 100\u2013107 (2005)","journal-title":"Communication of the ACM"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Seidman, S.B.: Network Structure and minimum degree. Social Networks, 267-287 (1983)","DOI":"10.1016\/0378-8733(83)90028-X"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71549-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:22:41Z","timestamp":1605763361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71549-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540715481","9783540715498"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71549-8_22","relation":{},"subject":[]}}