loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jarrod Trevathan and Wayne Read

Affiliation: School of Mathematical and Physical Sciences, James Cook University, Australia

Keyword(s): Bid shielding, shilling, sniping, siphoning, non-existent/misrepresented items.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Enterprise Information Systems ; Ethical and Legal Implications of Security and Privacy ; Formal Methods ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Information Systems Analysis and Specification ; Management of Computing Security ; Methodologies and Technologies ; Operational Research ; Security ; Security in Information Systems ; Security Requirements ; Simulation and Modeling

Abstract: Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In addition, an outsider or rival seller can lure away bidders by directly offering them better deals, or a malicious seller can auction mis-represented or non-existent items. This conduct is a problem as it results in market failure, thereby inhibiting the usefulness of online auctions as an exchange medium. While cryptography has been used to provide security in terms of bid authentication and privacy, there is no documented means to prevent many of the aforementioned problems. This paper investigates undesirable and fraudulent behaviour in online auctions. We examine the following practices: bid shielding, shill bidding, bid sniping, siphoning and selling non-existent or misrepresented items. We describe the characteristics of such behaviour and how to identify it in an auction. We also provide recommendations for recourse against undesirable and fraudulent participants. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.143.244.83

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Trevathan, J. and Read, W. (2006). UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT; ISBN 978-972-8865-63-4; ISSN 2184-3236, SciTePress, pages 450-458. DOI: 10.5220/0002100704500458

@conference{secrypt06,
author={Jarrod Trevathan. and Wayne Read.},
title={UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT},
year={2006},
pages={450-458},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002100704500458},
isbn={978-972-8865-63-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT
TI - UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS
SN - 978-972-8865-63-4
IS - 2184-3236
AU - Trevathan, J.
AU - Read, W.
PY - 2006
SP - 450
EP - 458
DO - 10.5220/0002100704500458
PB - SciTePress