{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:18:15Z","timestamp":1771024695989,"version":"3.50.1"},"reference-count":68,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["9041569"],"award-info":[{"award-number":["9041569"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong's SRG","award":["7002426"],"award-info":[{"award-number":["7002426"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:p>In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.<\/jats:p>","DOI":"10.1145\/2070710.2070716","type":"journal-article","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T13:52:04Z","timestamp":1398261124000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":152,"title":["Text mining and probabilistic language modeling for online review spam detection"],"prefix":"10.1145","volume":"2","author":[{"given":"Raymond Y. K.","family":"Lau","sequence":"first","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"S. Y.","family":"Liao","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"Ron Chi-Wai","family":"Kwok","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"Kaiquan","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Yunqing","family":"Xia","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Yuefeng","family":"Li","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Australia"}]}],"member":"320","published-online":{"date-parts":[[2012,1,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017473"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250103"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of 20th International Conference on Very Large Data Bases. 487--499","author":"Agrawal R."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572047"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312681"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248644"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401907"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646235"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415130402"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/506309.506311"},{"key":"e_1_2_1_11_1","volume-title":"TREC 2005 spam track overview. http:\/\/plg.uwaterloo.ca\/~gvcormac\/trecspamtrack05","author":"Cormack G. V."},{"key":"e_1_2_1_12_1","volume-title":"TREC 2007 spam track overview. http:\/\/trec.nist.gov\/pubs\/trec16\/papers\/SPAM. OVERVIEW16","author":"Cormack G. V.","year":"2007"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321486"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247715.1247717"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526729"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0567"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076066"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240411"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282100.1282158"},{"key":"e_1_2_1_21_1","unstructured":"Goldberg D. 1989. Genetic Algorithms in Search Optimization and Machine Learning Addison-Wesley Reading MA.   Goldberg D. 1989. Genetic Algorithms in Search Optimization and Machine Learning Addison-Wesley Reading MA."},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web. 39--47","author":"Gy\u00f6ngyi A."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010920819831"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017212.2017217"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.68"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242759"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871669"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649721"},{"key":"e_1_2_1_30_1","unstructured":"Joachims T. 1999. Making large--scale SVM learning practical. In B. Sch\u00f6lkopf C. J. C. Burges and A. J. Smola Eds. Advances in Kernel Methods - Support Vector Learning. MIT Press Cambridge MA.   Joachims T. 1999. Making large--scale SVM learning practical. In B. Sch\u00f6lkopf C. J. C. Burges and A. J. Smola Eds. Advances in Kernel Methods - Support Vector Learning. MIT Press Cambridge MA."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing. 423--428","author":"Kim S.-M."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383970"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 31st International Conference on Information Systems.","author":"Lau R. Y. K."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.137"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 30th International Conference on Information Systems.","author":"Lau R. Y. K."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the IEEE International Conference on Computer Science and Information Technology. 467--471","author":"Lau R. Y. K."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344414"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.v21:1"},{"key":"e_1_2_1_40_1","first-page":"3","article-title":"Context-sensitive text mining and belief revision for intelligent information retrieval on the web","volume":"1","author":"Lau R. Y. K.","year":"2003","journal-title":"J. Web Intell. Agent Syst."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326565"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009026"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.94"},{"key":"e_1_2_1_45_1","volume-title":"Overview of the TREC 2007 blog track. In Proceedings of the 16th Text REtrieval Conference. http:\/\/trec.nist.gov\/pubs\/trec16\/.","author":"Macdonald C."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572090"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017399.2017404"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531920"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web. 1--6.","author":"Mishne G."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijl\/3.4.235"},{"key":"e_1_2_1_51_1","unstructured":"Mitchell T. 1997. Machine Learning. McGraw-Hill New York.   Mitchell T. 1997. Machine Learning. McGraw-Hill New York."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164378"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236181.1236183"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"e_1_2_1_55_1","unstructured":"Papadimitriou C. H. 1994. Computational Complexity. Addison-Wesley Reading MA.  Papadimitriou C. H. 1994. Computational Complexity. Addison-Wesley Reading MA."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(02)00400-0"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451990"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.291008"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225733.1225751"},{"key":"e_1_2_1_62_1","unstructured":"Salton G. and McGill H. J. 1983. Introduction to Modern Information Retrieval. McGraw-Hill New York.   Salton G. and McGill H. J. 1983. Introduction to Modern Information Retrieval. McGraw-Hill New York."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312679"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017483.2017493"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993036.1993039"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1416950.1416953"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1552303.1552306"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2070710.2070716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2070710.2070716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:25Z","timestamp":1750241185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2070710.2070716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.1145\/2070710.2070716"],"URL":"https:\/\/doi.org\/10.1145\/2070710.2070716","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12]]},"assertion":[{"value":"2011-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}