{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:19Z","timestamp":1750307479378,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2010,9]]},"abstract":"<jats:p>Reputation in online economic systems is typically quantified using counters that specify positive and negative feedback from past transactions and\/or some form of transaction network analysis that aims to quantify the likelihood that a network user will commit a fraudulent transaction. These approaches can be deceiving to honest users from numerous perspectives. We take a radically different approach with the goal of guaranteeing to a buyer that a fraudulent seller cannot disappear from the system with profit following a set of fabricated transactions that total a certain monetary limit. Even in the case of stolen identity, such an adversary cannot produce illegal profit unless a buyer decides to pay over the suggested limit.<\/jats:p>","DOI":"10.1145\/1841909.1841914","type":"journal-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:15Z","timestamp":1286289495000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Relating Reputation and Money in Online Markets"],"prefix":"10.1145","volume":"4","author":[{"given":"Ashwin","family":"Swaminathan","sequence":"first","affiliation":[{"name":"Qualcomm Corporate R &amp; D"}]},{"given":"Renan G.","family":"Cattelan","sequence":"additional","affiliation":[{"name":"Federal University of Uberl\u00e2ndia"}]},{"given":"Ydo","family":"Wexler","sequence":"additional","affiliation":[{"name":"DRW Trading"}]},{"given":"Cherian V.","family":"Mathew","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Darko","family":"Kirovski","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]}],"member":"320","published-online":{"date-parts":[[2010,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the UNECE Forum on ODR.","author":"Abernethy S.","year":"2003","unstructured":"}} Abernethy , S. 2003 . Building large-scale online dispute resolution &amp; trustmark systems . In Proceedings of the UNECE Forum on ODR. }}Abernethy, S. 2003. Building large-scale online dispute resolution &amp; trustmark systems. In Proceedings of the UNECE Forum on ODR."},{"key":"e_1_2_1_3_1","unstructured":"}}Advogato.org. 2000. Advogato\u2019s trust metric. http:\/\/www.advogato.org\/trust-metric.html. }} Advogato.org . 2000. Advogato\u2019s trust metric. http:\/\/www.advogato.org\/trust-metric.html."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.905605"},{"key":"e_1_2_1_5_1","unstructured":"}}Amazon.com Inc. 2009. The Amazon marketplace. http:\/\/www.amazon.com. }} Amazon.com Inc. 2009. The Amazon marketplace. http:\/\/www.amazon.com."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1027"},{"key":"e_1_2_1_7_1","unstructured":"}}Breiman L. Friedman J. Stone C. J. and Olshen R. A. 1984. Classification and Regression Trees. Chapman &amp; Hall\/CRC. }} Breiman L. Friedman J. Stone C. J. and Olshen R. A. 1984. Classification and Regression Trees . Chapman &amp; Hall\/CRC."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"}}Buchegger S. and Le Boudec J.-Y. 2003. A robust reputation system for mobile ad-hoc networks. Tech. rep. IC\/2003\/50 EPFL-IC-LCA. }} Buchegger S. and Le Boudec J.-Y. 2003. A robust reputation system for mobile ad-hoc networks. Tech. rep. IC\/2003\/50 EPFL-IC-LCA.","DOI":"10.1201\/9780203504086.ch20"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511496"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"e_1_2_1_13_1","first-page":"1277","article-title":"Algorithm for solution of a problem of maximum flow in networks with power estimation","volume":"11","author":"Dinic E.","year":"1970","unstructured":"}} Dinic , E. 1970 . Algorithm for solution of a problem of maximum flow in networks with power estimation . Soviet Math. Doklady 11 , 1277 -- 1280 . }}Dinic, E. 1970. Algorithm for solution of a problem of maximum flow in networks with power estimation. Soviet Math. Doklady 11, 1277--1280.","journal-title":"Soviet Math. Doklady"},{"key":"e_1_2_1_14_1","unstructured":"}}eBay Inc. 2002. Chat with Rob Chesnut vice president of ebay\u2019s trust and safety dept. http:\/\/pages.ebay.com\/event\/robc. }} eBay Inc. 2002. Chat with Rob Chesnut vice president of ebay\u2019s trust and safety dept. http:\/\/pages.ebay.com\/event\/robc."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"}}eBay Inc. 2008. Interactive annual report. http:\/\/investor.ebay.com\/annuals.cfm. }} eBay Inc. 2008. Interactive annual report. http:\/\/investor.ebay.com\/annuals.cfm.","DOI":"10.3833\/pdr.v2008i92.217"},{"key":"e_1_2_1_16_1","unstructured":"}}eBay Inc. 2009. Protecting the seller\u2019s reputation. http:\/\/pages.ebay.com\/services\/forum\/sellerprotection.html. }} eBay Inc. 2009. Protecting the seller\u2019s reputation. http:\/\/pages.ebay.com\/services\/forum\/sellerprotection.html."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/321694.321699"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080207"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/290179.290181"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/48014.61051"},{"key":"e_1_2_1_21_1","volume-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking","author":"Henzinger M. R.","year":"2000","unstructured":"}} Henzinger , M. R. , Heydon , A. , Mitzenmacher , M. , and Najork , M . 2000 . On near-uniform URL sampling. In Proceedings of the 9th International World Wide Web Conference on Computer Networks: The International Journal of Computer and Telecommunications Networking . North-Holland Publishing Co. , Amsterdam , 295--308. }}Henzinger, M. R., Heydon, A., Mitzenmacher, M., and Najork, M. 2000. On near-uniform URL sampling. In Proceedings of the 9th International World Wide Web Conference on Computer Networks: The International Journal of Computer and Telecommunications Networking. North-Holland Publishing Co., Amsterdam, 295--308."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.14"},{"key":"e_1_2_1_23_1","volume-title":"Internet crime report for","author":"}}Internet Crime Complaint Center","year":"2006","unstructured":"}}Internet Crime Complaint Center . 2007. Internet crime report for 2006 . http:\/\/www.ic3.gov\/media\/annualreport\/2006_ic3report.pdf. }}Internet Crime Complaint Center. 2007. Internet crime report for 2006. http:\/\/www.ic3.gov\/media\/annualreport\/2006_ic3report.pdf."},{"key":"e_1_2_1_24_1","volume-title":"Internet crime report for","author":"}}Internet Crime Complaint Center","year":"2008","unstructured":"}}Internet Crime Complaint Center . 2009. Internet crime report for 2008 . http:\/\/www.ic3.gov\/media\/annualreport\/2008_IC3Report.pdf. }}Internet Crime Complaint Center. 2009. Internet crime report for 2008. http:\/\/www.ic3.gov\/media\/annualreport\/2008_IC3Report.pdf."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557067"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_27_1","first-page":"19","article-title":"Ten years of online dispute resolution (ODR): Looking at the past and constructing the future","volume":"38","author":"Katsh E.","year":"2006","unstructured":"}} Katsh , E. and Wing , L. 2006 . Ten years of online dispute resolution (ODR): Looking at the past and constructing the future . Univ. Toledo Law Rev. 38 , 1, 19 -- 47 . }}Katsh, E. and Wing, L. 2006. Ten years of online dispute resolution (ODR): Looking at the past and constructing the future. Univ. Toledo Law Rev. 38, 1, 19--47.","journal-title":"Univ. Toledo Law Rev."},{"key":"e_1_2_1_28_1","first-page":"705","article-title":"E-commerce, e-disputes, and e-dispute resolution: In the shadow of \u201cebay law","volume":"15","author":"Katsh E.","year":"2000","unstructured":"}} Katsh , E. , Rifkin , J. , and Gaitenby , A. 2000 . E-commerce, e-disputes, and e-dispute resolution: In the shadow of \u201cebay law .\u201d Ohio State J. Dispute Resol. 15 , 3, 705 -- 734 . }}Katsh, E., Rifkin, J., and Gaitenby, A. 2000. E-commerce, e-disputes, and e-dispute resolution: In the shadow of \u201cebay law.\u201d Ohio State J. Dispute Resol. 15, 3, 705--734.","journal-title":"Ohio State J. Dispute Resol."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082717"},{"volume-title":"Proceedings of the Belgium-Netherlands Conference on Artificial Intelligence (BNAIC). 357--358","author":"Klos T. B.","key":"e_1_2_1_30_1","unstructured":"}} Klos , T. B. and Poutr\u00e9 , H. L . 2005. Decentralized reputation-based trust for assessing agent reliability under aggregate feedback . In Proceedings of the Belgium-Netherlands Conference on Artificial Intelligence (BNAIC). 357--358 . }}Klos, T. B. and Poutr\u00e9, H. L. 2005. Decentralized reputation-based trust for assessing agent reliability under aggregate feedback. In Proceedings of the Belgium-Netherlands Conference on Artificial Intelligence (BNAIC). 357--358."},{"key":"e_1_2_1_31_1","unstructured":"}}Lawrence Page Sergey Brin R. M. and Winograd T. 1998. The pagerank citation ranking: Bringing order to the Web. Stanford Manuscript http:\/\/ilpubs.stanford.edu:8090\/422\/. }} Lawrence Page Sergey Brin R. M. and Winograd T. 1998. The pagerank citation ranking: Bringing order to the Web. Stanford Manuscript http:\/\/ilpubs.stanford.edu:8090\/422\/."},{"volume-title":"Attack resistant trust metrics. Manuscript","author":"Levien R.","key":"e_1_2_1_32_1","unstructured":"}} Levien , R. 2002. Attack resistant trust metrics. Manuscript , University of California - Berkeley . http:\/\/www.levien.com\/thesis\/compact.pdf. }}Levien, R. 2002. Attack resistant trust metrics. Manuscript, University of California - Berkeley. http:\/\/www.levien.com\/thesis\/compact.pdf."},{"key":"e_1_2_1_33_1","unstructured":"}}Levien.com. 2002. Attack resistant trust metric metadata howto. http:\/\/www.levien.com\/free\/tmetric-HOWTO.html. }} Levien.com . 2002. Attack resistant trust metric metadata howto. http:\/\/www.levien.com\/free\/tmetric-HOWTO.html."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458205"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10196780500083845"},{"volume-title":"Proceedings of the Workshop on Information Technologies and Systems (WITS).","author":"Mui L.","key":"e_1_2_1_36_1","unstructured":"}} Mui , L. , Mohtashemi , M. , Ang , C. , Szolovits , P. , and Halberstadt , A . 2001. Ratings in distributed systems: A Bayesian approach . In Proceedings of the Workshop on Information Technologies and Systems (WITS). }}Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., and Halberstadt, A. 2001. Ratings in distributed systems: A Bayesian approach. In Proceedings of the Workshop on Information Technologies and Systems (WITS)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060808"},{"key":"e_1_2_1_39_1","unstructured":"}}Stone B. 2007. Ebay says fraud crackdown has worked. New York Times 6\/14\/07. http:\/\/www.nytimes.com\/2007\/06\/14\/technology\/14ebay.html. }} Stone B. 2007. Ebay says fraud crackdown has worked. New York Times 6\/14\/07. http:\/\/www.nytimes.com\/2007\/06\/14\/technology\/14ebay.html."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.107"},{"volume-title":"Reputation management in decentralized networks. Tech. rep","author":"Swamynathan G.","key":"e_1_2_1_41_1","unstructured":"}} Swamynathan , G. 2007. Reputation management in decentralized networks. Tech. rep ., University of California , Sta. Barbara. }}Swamynathan, G. 2007. Reputation management in decentralized networks. Tech. rep., University of California, Sta. Barbara."},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"}}Trevathan J. and Reed W. 2008. Detecting shill bidding in online english auctions. In Handbook of Research on Social and Organizational Liabilities in Information Security. Chapter XXVII Information Science Reference. }} Trevathan J. and Reed W. 2008. Detecting shill bidding in online english auctions. In Handbook of Research on Social and Organizational Liabilities in Information Security . Chapter XXVII Information Science Reference.","DOI":"10.4018\/978-1-60566-132-2.ch027"},{"volume-title":"Proceedings of the IEEE\/WIC International Conference on Web Intelligence (WI\u201903)","author":"Wang Y.","key":"e_1_2_1_43_1","unstructured":"}} Wang , Y. and Vassileva , J . 2003. Bayesian network-based trust model . In Proceedings of the IEEE\/WIC International Conference on Web Intelligence (WI\u201903) . IEEE Computer Society, Los Alamitos, CA, 372. }}Wang, Y. and Vassileva, J. 2003. Bayesian network-based trust model. In Proceedings of the IEEE\/WIC International Conference on Web Intelligence (WI\u201903). IEEE Computer Society, Los Alamitos, CA, 372."},{"key":"e_1_2_1_44_1","unstructured":"}}Whitby A. Josang A. and Indulska J. 2005. Filtering out unfair ratings in Bayesian reputation systems. Icfain J. Manage. Resear. 48--64. }} Whitby A. Josang A. and Indulska J. 2005. Filtering out unfair ratings in Bayesian reputation systems. Icfain J. Manage. Resear. 48--64."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151495"},{"volume-title":"Proceedings of the 22nd National Conference on Artificial Intelligence (AAAI\u201907)","author":"Zhang J.","key":"e_1_2_1_47_1","unstructured":"}} Zhang , J. and Cohen , R . 2007. Design of a mechanism for promoting honesty in e-marketplaces . In Proceedings of the 22nd National Conference on Artificial Intelligence (AAAI\u201907) . AAAI Press, 1495--1500. }}Zhang, J. and Cohen, R. 2007. Design of a mechanism for promoting honesty in e-marketplaces. In Proceedings of the 22nd National Conference on Artificial Intelligence (AAAI\u201907). AAAI Press, 1495--1500."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1841909.1841914","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1841909.1841914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:57Z","timestamp":1750248537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1841909.1841914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["10.1145\/1841909.1841914"],"URL":"https:\/\/doi.org\/10.1145\/1841909.1841914","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2010,9]]},"assertion":[{"value":"2009-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}