{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T20:35:06Z","timestamp":1744058106491},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T00:00:00Z","timestamp":1365120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s10660-013-9113-4","type":"journal-article","created":{"date-parts":[[2013,4,4]],"date-time":"2013-04-04T10:51:03Z","timestamp":1365072663000},"page":"169-182","source":"Crossref","is-referenced-by-count":16,"title":["Fuzzy rule optimization for online auction frauds detection based on genetic algorithm"],"prefix":"10.1007","volume":"13","author":[{"given":"Cheng-Hsien","family":"Yu","sequence":"first","affiliation":[]},{"given":"Shi-Jen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,5]]},"reference":[{"key":"9113_CR1","unstructured":"Borgatti, S. P. (1998). What is social network analysis? http:\/\/www.analytictech.com\/networks\/whatis.htm.Clarke ."},{"issue":"4","key":"9113_CR2","first-page":"643","volume":"28","author":"E. M. Clarke","year":"1996","unstructured":"Clarke, E. M., & Wing, J. M. (1996). Formal methods: state of the art and future directions. Journal ACM Computing Surveys, 28(4), 643.","journal-title":"Journal ACM Computing Surveys"},{"issue":"4","key":"9113_CR3","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.cosrev.2009.09.001","volume":"3","author":"F. Dong","year":"2009","unstructured":"Dong, F., Shatz, S. M., & Xu, H. (2009). Combating online in-auction fraud: clues, techniques and challenges. Computer Science Review, 3(4), 245\u2013258.","journal-title":"Computer Science Review"},{"key":"9113_CR4","first-page":"908","volume-title":"Proc. of the 6th international conference on information technology: new generations","author":"F. Dong","year":"2009","unstructured":"Dong, F., Shatz, S. M., & Xu, H. (2009). Inference of online auction shills using dempster-shafer theory. In Proc. of the 6th international conference on information technology: new generations (pp.\u00a0908\u2013914)."},{"key":"9113_CR5","unstructured":"Elirlich, I. (1974). Participation in illegitimate activities. An economic analysis."},{"key":"9113_CR6","doi-asserted-by":"crossref","first-page":"75","DOI":"10.4135\/9781452231471.n4","volume-title":"Doing Internet research: critical issues and methods for examining the Net","author":"L. Garton","year":"1999","unstructured":"Garton, L., Haythornthwaite, C., & Wellman, B. (1999). Studying on-line social networks. In Doing Internet research: critical issues and methods for examining the Net (p.\u00a075)."},{"issue":"2","key":"9113_CR7","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10660-006-6954-0","volume":"6","author":"B. Gavish","year":"2006","unstructured":"Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127\u2013140.","journal-title":"Electronic Commerce Research"},{"key":"9113_CR8","unstructured":"Internet Crime Complaint Center (2006), 2005 Internet crime report."},{"key":"9113_CR9","unstructured":"Internet Crime Complaint Center (2007), 2006 Internet crime report."},{"key":"9113_CR10","unstructured":"Internet Crime Complaint Center (2008), 2007 Internet crime report."},{"key":"9113_CR11","unstructured":"Internet Crime Complaint Center (2009), 2008 Internet crime report."},{"key":"9113_CR12","unstructured":"Internet Crime Complaint Center (2010), 2009 Internet crime report."},{"key":"9113_CR13","unstructured":"Internet Crime Complaint Center (2011), 2010 Internet crime report."},{"issue":"2","key":"9113_CR14","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"C. C. Lee","year":"1990","unstructured":"Lee, C. C. (1990). Fuzzy logic in control system: fuzzy logic controller. IEEE Transactions on Systems, Man and Cybernetics, 20(2), 404\u2013435.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"issue":"2","key":"9113_CR15","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s10660-010-9049-x","volume":"10","author":"J. A. Livingston","year":"2010","unstructured":"Livingston, J. A. (2010). Functional forms in studies of reputation in online auctions. Electronic Commerce Research, 10(2), 167\u2013190.","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"9113_CR16","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s00453-007-9106-6","volume":"52","author":"M. Morzy","year":"2008","unstructured":"Morzy, M. (2008). New algorithms for mining the reputation of participants of online auctions. Algorithmica, 52(1), 95\u2013112.","journal-title":"Algorithmica"},{"key":"9113_CR17","unstructured":"National Police Agency (2012). http:\/\/www.165.gov.tw\/ , Taiwan."},{"key":"9113_CR18","first-page":"4870","volume-title":"Proceedings of the IEEE Chinese control and decision conference","author":"W. Pan","year":"2009","unstructured":"Pan, W., Zhang, B., & Zhu, L. (2009). Genetic algorithm combined with immune mechanism and its application in skill fuzzy control. In Proceedings of the IEEE Chinese control and decision conference (pp.\u00a04870\u20134874)."},{"key":"9113_CR19","first-page":"210","volume-title":"Proceedings of the 16th international conference on world wide web","author":"S. Pandit","year":"2007","unstructured":"Pandit, S., Chau, D. H., Wang, S., & Faloutsos, C. (2007). Netprobe: a fast and scalable system for fraud detection in online auction networks. In Proceedings of the 16th international conference on world wide web (p.\u00a0210)."},{"key":"9113_CR20","first-page":"279","volume-title":"Proceedings of the 12th ACM conference on computer and communications security","author":"S. Rubin","year":"2005","unstructured":"Rubin, S., Christodorescu, M., Ganapathy, V., Giffin, J. T., Kruger, L., Wang, H., et al. (2005). An auctioning reputation system based on anomaly. In Proceedings of the 12th ACM conference on computer and communications security (p.\u00a0279)."},{"key":"9113_CR21","first-page":"799","volume-title":"Fourth international conference on information technology, 2007, ITNG\u201907","author":"J. Trevathan","year":"2007","unstructured":"Trevathan, J., & Read, W. (2007). Detecting collusive shill bidding. In Fourth international conference on information technology, 2007, ITNG\u201907 (pp.\u00a0799\u2013808)."},{"key":"9113_CR22","volume-title":"Handbook of research on social and organizational liabilities in information security","author":"J. Trevathan","year":"2009","unstructured":"Trevathan, J., & Read, W. (2009). Detecting shill bidding in online English auctions. In Handbook of research on social and organizational liabilities in information security."},{"issue":"3","key":"9113_CR23","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.1016\/j.eswa.2007.01.045","volume":"34","author":"J. C. Wang","year":"2008","unstructured":"Wang, J. C., & Chiu, C. C. (2008). Recommending trusted online auction sellers using social network analysis. Expert Systems with Applications, 34(3), 1666\u20131679.","journal-title":"Expert Systems with Applications"},{"key":"9113_CR24","volume-title":"Annual conference of the North American Association for Computational Social and Organizational Science","author":"J. C. Wang","year":"2005","unstructured":"Wang, J. C., & Chiu, C. (2005). Detecting online auction inflated-reputation behaviors using social network analysis. In Annual conference of the North American Association for Computational Social and Organizational Science."},{"key":"9113_CR25","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., & Faust, K. (1994). Social network analysis: methods and applications. Cambridge: Cambridge University Press."},{"key":"9113_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/238857.238860","volume-title":"Proceedings of the 1996 ACM SIGCPR\/SIGMIS conference on computer personnel research","author":"B. Wellman","year":"1996","unstructured":"Wellman, B. (1996). For a social network analysis of computer networks: a sociological perspective on collaborative work and virtual community. In Proceedings of the 1996 ACM SIGCPR\/SIGMIS conference on computer personnel research (pp.\u00a01\u201311)."},{"issue":"4","key":"9113_CR27","first-page":"179","volume":"22","author":"H. Xu","year":"2007","unstructured":"Xu, H., & Cheng, Y. T. (2007). Model checking bidding behaviors in Internet concurrent auctions. International Journal of Computer Systems Science & Engineering, 22(4), 179\u2013191.","journal-title":"International Journal of Computer Systems Science & Engineering"},{"key":"9113_CR28","series-title":"LNCS","first-page":"455","volume-title":"ISI 2008 workshops","author":"C. H. Yu","year":"2008","unstructured":"Yu, C. H., & Lin, S. J. (2008). Parallel crawling and capturing for on-line auction. In Yang et al. (Eds.), LNCS: Vol.\u00a05075. ISI 2008 workshops (pp.\u00a0455\u2013466)."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9113-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9113-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9113-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:52:53Z","timestamp":1559249573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9113-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,5]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["9113"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9113-4","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,5]]}}}