{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:23:34Z","timestamp":1773300214310,"version":"3.50.1"},"reference-count":50,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Electronic Commerce"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.2753\/jec1086-4415150306","type":"journal-article","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T01:08:06Z","timestamp":1303866486000},"page":"123-147","source":"Crossref","is-referenced-by-count":43,"title":["Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches"],"prefix":"10.1080","volume":"15","author":[{"given":"Chaochang","family":"Chiu","sequence":"first","affiliation":[{"name":"a Department of Information Management, Yuan Ze University, Taiwan"}]},{"given":"Yungchang","family":"Ku","sequence":"additional","affiliation":[{"name":"b Computer Center, Central Police University, Taiwan"}]},{"given":"Ting","family":"Lie","sequence":"additional","affiliation":[{"name":"c Department of Information Management, Yuan Ze University, Taiwan"}]},{"given":"Yuchi","family":"Chen","sequence":"additional","affiliation":[{"name":"d Foxconn Technology Group, Yuan Ze University, Taiwan"}]}],"member":"301","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"1","volume-title":"An Introduction to Neural Computing","author":"I. Aleksander","year":"1980"},{"issue":"3","key":"2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0167-9236(02)00074-X","article-title":"Building trust in online auction markets through an economic incentive mechanism","volume":"35","author":"S. Ba","year":"2003","journal-title":"Decision Support Systems"},{"issue":"4","key":"3","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1080\/07421222.2005.11045822","article-title":"Choice of transaction channels: The effects of product characteristics on market evolution","volume":"21","author":"S. Ba","year":"2005","journal-title":"Journal of Management Information Systems"},{"key":"4","first-page":"44","article-title":"Group formation in large social networks: Membership, growth, and evolution","author":"L. Backstrom","year":"2006"},{"issue":"3","key":"5","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1162\/evco.1996.4.3.297","article-title":"Using learning to facilitate the evolution of features for recognizing visual concepts","volume":"4","author":"J. Bala","year":"1996","journal-title":"Evolutionary Computation"},{"key":"6","unstructured":"Bandyopadhyay, S., and Wolfe, J. A critical review of online auction models. <i>Journal of the Academy of Business and Economics<\/i> (January 1, 2004) (available at <a target=\"_blank\" href='http:\/\/www.allbusiness.com\/sales\/internet-ebay\/300257-1.html'>www.allbusiness.com\/sales\/internet-ebay\/300257-1.html<\/a>"},{"key":"7","unstructured":"Barakat, B. Internet auction fraud a growing concern in Miami. Miami Criminal Attorney Blog, April 2, 2010 (available at <a target=\"_blank\" href='http:\/\/www.miamicriminalattorneyblog.com\/2010\/04\/online-auction-fraud-a-growing.html#more\/'>www.miamicriminalattorneyblog.com\/2010\/04\/online-auction-fraud-a-growing.html#more\/<\/a>"},{"key":"8","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984"},{"issue":"7","key":"9","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1108\/EUM0000000007060","article-title":"Fraud on Internet auctions","volume":"53","author":"C. Bywell","year":"2001","journal-title":"Aslib Proceedings"},{"key":"10","first-page":"155","article-title":"An empirical analysis of fraud detection in online auctions: Credit card phantom transaction","author":"M. Chae","year":"2007"},{"key":"11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-71549-8_1","volume-title":"Intelligence and Security Informatics","author":"H. Chen","year":"2007"},{"issue":"4","key":"12","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","article-title":"Crime data mining: A general framework and some examples","volume":"37","author":"H. Chen","year":"2004","journal-title":"Computer"},{"key":"13","first-page":"49","article-title":"Coplink center: Social network analysis and identity deception detection for law enforcement and homeland security","author":"H. Chen","year":"2006"},{"issue":"4","key":"14","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/34.88569","article-title":"Optimal partitioning for classification and regression trees","volume":"13","author":"P. Chou","year":"1991","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"10","key":"15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2004.165","article-title":"Fighting Internet auction fraud: An assessment and proposal","volume":"37","author":"C. Chua","year":"2004","journal-title":"Computer"},{"key":"16","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"U. Fayyad","year":"1996"},{"issue":"3","key":"17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","author":"L. Freeman","year":"1978","journal-title":"Social Networks"},{"issue":"2","key":"18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1117454.1117456","article-title":"Link mining: A survey","volume":"7","author":"L. Getoor","year":"2005","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"3","key":"19","doi-asserted-by":"crossref","first-page":"95","DOI":"10.2753\/JEC1086-4415100304","article-title":"The role of reputation systems in reducing on-line auction fraud","volume":"10","author":"D. Gregg","year":"2006","journal-title":"International Journal of Electronic Commerce"},{"issue":"4","key":"20","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0740-8188(96)90003-1","article-title":"Social network analysis: An approach and technique for the study of information exchange","volume":"18","author":"C. Haythornthwaite","year":"1996","journal-title":"Library & Information Science Research"},{"issue":"7","key":"21","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/278476.278495","article-title":"How should CIOs deal with Web-based auctions?","volume":"41","author":"E. Heck","year":"1998","journal-title":"Communications of the ACM"},{"issue":"2","key":"22","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1111\/j.1530-9134.2006.00103.x","article-title":"Reputation in auctions: Theory, and evidence from eBay","volume":"15","author":"D. Houser","year":"2006","journal-title":"Journal of Economics & Management Strategy"},{"issue":"4","key":"23","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1049\/ise.1993.0020","article-title":"Classification by induction: Application to modelling and control of non-linear dynamical systems","volume":"2","author":"K. Hunt","year":"1993","journal-title":"Intelligent Systems Engineering"},{"issue":"1","key":"24","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.elerap.2005.12.002","article-title":"Cheating in online auction\u2014Towards explaining the popularity of English auction","volume":"6","author":"M. Jenamani","year":"2007","journal-title":"Electronic Commerce Research and Applications"},{"key":"25","unstructured":"Jheng, Y. Combing social network analysis with Web structure mining for detecting collusive fraud group in online auction. Master's thesis, National Central University, Taiwan, 2010."},{"key":"26","first-page":"1162","article-title":"Generating useful network-based features for analyzing social networks","author":"J. Karamon","year":"2008"},{"key":"27","unstructured":"Kauffman, R. J., and Wood, C. A. Premium bidding in online auctions: An examination of opportunism and seller preference. MIS Research Workshop, West Lafayette, IN, 2005 (available at <a target=\"_blank\" href='http:\/\/www.krannert.purdue.edu\/academics\/mis\/workshop\/kw_111805.pdf'>www.krannert.purdue.edu\/academics\/mis\/workshop\/kw_111805.pdf<\/a>"},{"issue":"4","key":"28","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/10196789700000041","article-title":"Introduction to electronic auctions","volume":"7","author":"S. Klein","year":"1997","journal-title":"Electronic Markets"},{"issue":"3","key":"29","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"V. Krebs","year":"2002","journal-title":"Connections"},{"key":"30","first-page":"49","article-title":"Internet auctions","author":"M. Kumar","year":"1998"},{"issue":"3","key":"31","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/A:1007608224229","article-title":"A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms","volume":"40","author":"T. Lim","year":"2000","journal-title":"Machine Learning"},{"issue":"1","key":"32","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/10864415.2005.11043961","article-title":"Reputation and dispute in eBay transactions","volume":"10","author":"I. MacInnes","year":"2005","journal-title":"International Journal of Electronic Commerce"},{"key":"33","volume-title":"Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns","author":"J. Mitchell","year":"1969"},{"key":"34","unstructured":"National Fraud Information Center (NFIC). Internet fraud statistics reports. Washington, DC, 2007 (available at <a target=\"_blank\" href='http:\/\/www.fraud.org\/internet\/intstat.htm'>www.fraud.org\/internet\/intstat.htm<\/a>"},{"key":"35","article-title":"Decision trees and neural nets: Two complementary representations for learning","author":"J. Paredis","year":"1991"},{"key":"36","volume-title":"Knowledge Discovery in Databases","author":"G. Piatetsky-Shapiro","year":"1991"},{"key":"37","volume-title":"C4.5: Programs for Machine Learning","author":"J. Quinlan","year":"1993"},{"key":"38","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce","volume":"11","author":"P. Resnick","year":"2002"},{"issue":"12","key":"39","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","article-title":"Reputation systems","volume":"43","author":"P. Resnick","year":"2000","journal-title":"Communications of the ACM"},{"key":"40","volume-title":"Social Network Analysis: A Handbook","author":"J. Scott","year":"2000"},{"issue":"1","key":"41","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1080\/10864415.2002.11044256","article-title":"Consumer bidding behavior on Internet auction sites","volume":"7","author":"M. Stafford","year":"2002","journal-title":"International Journal of Electronic Commerce"},{"key":"42","unstructured":"Sung, Y. T. Developing a user-oriented Internet auction fraud detection system by social network analysis and fraud rules matching. Master's thesis, National Central University, Taiwan, 2009."},{"issue":"2","key":"43","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10603-007-9033-6","article-title":"Vendor bidding on online auctions","volume":"30","author":"K. Tokeley","year":"2007","journal-title":"Journal of Consumer Policy"},{"issue":"4","key":"44","first-page":"143","article-title":"Detecting online auction fraud of reputation inflation through social network structures embedded in transaction records","volume":"12","author":"J.-C. Wang","year":"2005","journal-title":"Journal of Information Management"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994"},{"issue":"11","key":"46","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1016\/j.jbusres.2004.06.004","article-title":"Exploring the WOW in online-auction feedback","volume":"58","author":"B. Weinberg","year":"2005","journal-title":"Journal of Business Research"},{"issue":"3","key":"47","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/S0167-9236(03)00117-9","article-title":"Fighting organized crimes: Using shortest-path algorithms to identify associations in criminal networks","volume":"38","author":"J. Xu","year":"2004","journal-title":"Decision Support Systems"},{"key":"48","volume-title":"Internet user behavior and online shopping in Taiwan: Key trends in 2007","author":"B. Yang","year":"2008"},{"key":"49","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-540-71549-8_2","volume-title":"Intelligence and Security Informatics: Lecture Notes in Computer Science","volume":"4430","author":"C. Yang","year":"2007"},{"key":"50","first-page":"79","article-title":"Toward a comprehensive model in Internet auction fraud detection","author":"B. Zhang","year":"2008"}],"container-title":["International Journal of Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.2753\/JEC1086-4415150306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T10:03:57Z","timestamp":1560161037000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.2753\/JEC1086-4415150306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,12,8]]},"published-print":{"date-parts":[[2011,4]]}},"alternative-id":["10.2753\/JEC1086-4415150306"],"URL":"https:\/\/doi.org\/10.2753\/jec1086-4415150306","relation":{},"ISSN":["1086-4415","1557-9301"],"issn-type":[{"value":"1086-4415","type":"print"},{"value":"1557-9301","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4]]}}}