2022
DOI: 10.1016/j.dss.2021.113698
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of third-party request structures to detect fraudulent websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…In general, all the investigations presented in the preceding paragraphs relate to a very narrow range of products. However, as we have said, the issue of counterfeiting has acquired such a magnitude that it already covers very diverse topics (Islam et al, 2021) especially technological fields (Jha, 2023; Su et al, 2022) that help to identify fraudulent websites (Gopal et al, 2022) or to make moral‐theological analysis of unethical business practices (Uroko, 2022).…”
Section: Literature Reviewmentioning
confidence: 99%
“…In general, all the investigations presented in the preceding paragraphs relate to a very narrow range of products. However, as we have said, the issue of counterfeiting has acquired such a magnitude that it already covers very diverse topics (Islam et al, 2021) especially technological fields (Jha, 2023; Su et al, 2022) that help to identify fraudulent websites (Gopal et al, 2022) or to make moral‐theological analysis of unethical business practices (Uroko, 2022).…”
Section: Literature Reviewmentioning
confidence: 99%
“…While the ability to automatically distinguish between fake and genuine web shops has been well studied (e.g., [45,46]) and continues to be actively investigated ( [47][48][49]), the subsequent task of recognizing affiliate programs among the detected fake web shops has been less researched up until now, although it allows enforcement at scale and brings long-lasting results. One notable exception is [25], where the authors used a conventional clustering algorithm together with a few clustering features, mainly extracted from the HTML and the URLs of the websites.…”
Section: Description Of Experimental Scenariomentioning
confidence: 99%
“…Data availability and quality 8 (Baesens et al, 2021;Carta et al, 2019;Ileberi et al, 2022;Lucas et al, 2020;Sadaoui & Wang, 2017;Saia and Carta, 2019;J. Wang et al, 2020;Wei et al, 2013) 2 Imbalanced issue 4 (Baesens et al, 2021;Chang et al, 2022;Dastidar et al, 2022;Goswami et al, 2017) 3 Model drift 8 (Baesens et al, 2021;Chang et al, 2022;Gopal et al, 2022;Patil et al, 2018;Rezvani and Wang, 2022;Ruan et al, 2020;Sadaoui and Wang, 2017;Zhang et al, 2022) 4 Misclassification due to indetermincay 2 (Askari and Hussain, 2020;Dastidar et al, 2022) 5 Complication in data structure 1 (Dang et al, 2019) 6 Cost factors 3 (Chang et al, 2022;Ebrahim and Golpayegani, 2022;Kodate et al, 2020) Source: Processed by the Author These challenges have been identified based on their existence in relevant literature. In summary, the challenges relating to machine learning-powered e-commerce fraud detection include 8 frequencies of data availability and quality, 4 frequencies of addressing imbalanced datasets, 8 frequencies of combating model drift, 2 frequencies of dealing with misclassification due to indeterminacy, 1 frequency of managing complex data structures, and 3 frequencies of considering the financial implications of the fraud detection process.…”
Section: The Challenges Related To Machine Learning Powered E-commerc...mentioning
confidence: 99%