loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jarrod Trevathan and Wayne Read

Affiliation: School of Mathematical and Physical Sciences, James Cook University, Australia

ISBN: 978-972-8865-63-4

ISSN: 2184-2825

Keyword(s): Bid shielding, shilling, sniping, siphoning, non-existent/misrepresented items.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Enterprise Information Systems ; Ethical and Legal Implications of Security and Privacy ; Formal Methods ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Information Systems Analysis and Specification ; Management of Computing Security ; Methodologies and Technologies ; Operational Research ; Security ; Security in Information Systems ; Security Requirements ; Simulation and Modeling

Abstract: Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In addition, an outsider or rival seller can lure away bidders by directly offering them better deals, or a malicious seller can auction mis-represented or non-existent items. This conduct is a problem as it results in market failure, thereby inhibiting the usefulness of online auctions as an exchange medium. While cryptography has been used to provide security in terms of bid authentication and privacy, there is no documented means to prevent many of the aforementioned problems. This paper investigates undesirable and fraudulent behaviour in online auctions. We examine the following practices: bid shielding, shill bidding, bid sniping, siphoning and selling non-existent or misrepresented items. We describe the characteristics of such behaviour and how to identify it in an auction. We also provide recommendations for recourse against undesirable and fraudulent participants. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.209.10.183

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Trevathan J.; Read W. and (2006). UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 450-458. DOI: 10.5220/0002100704500458

@conference{secrypt06,
author={Jarrod Trevathan and Wayne Read},
title={UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={450-458},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002100704500458},
isbn={978-972-8865-63-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS
SN - 978-972-8865-63-4
AU - Trevathan, J.
AU - Read, W.
PY - 2006
SP - 450
EP - 458
DO - 10.5220/0002100704500458

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.