491
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey

, &

References

  • Almeida, P. S., & Gondim, J. J. C. (2019). Click fraud detection and prevention system for ad networks. Journal of Information Security and Cryptography (Enigma), 5(1), 27–40. https://doi.org/10.17648/jisc.v5i1.71
  • Al-rousan, S., Abuhussein, A., Alsubaei, F., Collen, L., & Shiva, S. (2020). Ads-guard: Detecting scammers in online classified ads [Paper presentation]. 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia.
  • Al-rousan, S., Abuhussein, A., Alsubaei, F., Kahveci, O., Farra, H., & Shiva, S. (2020). Social-guard: Detecting scammers in online dating [Paper presentation]. IEEE International Conference on Electro Information Technology, Chicago, IL (pp. 416–422). https://doi.org/10.1109/EIT48999.2020.9208268
  • Alsaleh, H., & Zhou, L. (2018). A heuristic method for identifying scam Ads on craigslist [Paper presentation]. Proceedings of the 2018 European Intelligence and Security Informatics Conference (EISIC 2018) (pp. 69–72). https://doi.org/10.1109/EISIC.2018.00019
  • Amarasekara, B. R., & Mathrani, A. (2016). Controlling risks and fraud in affiliate marketing: A simulation and testing environment [Paper presentation]. 2016 14th Annual Conference on Privacy, Security and Trust (pp. 353–360). https://doi.org/10.1109/PST.2016.7906986
  • Amarasekara, B. R., Mathrani, A., & Scogings, C. (2020). Stuffing, sniffing, squatting, and stalking: Sham activities in affiliate marketing. Library Trends, 68(4), 659–678. https://doi.org/10.1353/lib.2020.0016
  • Andrews, L., & Boyle, M. V. (2008). Consumers’ accounts of perceived risk online and the influence of communication sources. Qualitative Market Research: An International Journal, 11(1), 59–75. https://doi.org/10.1108/13522750810845559
  • Arshad, A., Zafar, M., Fatima, I., & Khan, S. (2015). The impact of perceived risk on online buying behavior. International Journal of New Technology and Research, 1(8), 263641.
  • Bashir, M. A., & Robertson, W. (2017). A longitudinal analysis of the ads. txt standard. https://cbw.sh/static/pdf/bashir-imc19.pdf
  • Beware of craigslist rental scams. (2021). https://sellbuymdhomes.com/real-estate-blog/craigslist-rental-scams/.
  • Brown, J. O., Broderick, A. J., & Lee, N. (2007). Online communities: Conceptualizing the online social network. Journal of Interactive Marketing, 21(3), 2–20. https://doi.org/10.1002/dir
  • Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180
  • Button, M., Nicholls, C. M. N., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian and New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/10.1177/0004865814521224
  • Castro, A. (2013). The dangerous 419 spam. https://archive.org/details/TheDangerous419.
  • Chaffey, D., & Smith, P. (2013). Emarketing excellence. https://charsoomarketing.com/wp-content/uploads/downloads/2016/02/Dave_Chaffey_PR_Smith_Emarketing_Excellence_Pl.pdf
  • Dash, A., & Pal, S. (2020). Auto-detection of click-frauds using machine learning auto-detection of click-frauds using machine learning. https://ijesc.org/upload/c85b77baa8fb8e66d83d5a80fd11a744.Auto-Detection%20of%20Click-Frauds%20using%20Machine%20Learning.pdf.
  • Dave, V., Guha, S., & Zhang, Y. (2013). ViceROI: Catching click-spam in search ad networks [Paper presentation]. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (pp. 765–776). ACM. https://doi.org/10.1145/2508859.2516688
  • Dörnyei, K. R. (2021). Marketing professionals’ views on online advertising fraud. Journal of Current Issues and Research in Advertising, 42(2), 156–174. https://doi.org/10.1080/10641734.2020.1737276
  • Dyrud, M. A. (2016). “I brought you a good news”: An analysis of Nigerian 419 letters [Paper presentation]. Proceedings of the 2005 Association for Business Communication Annual Convention, 2005.
  • Flasy, E. (2020). Survey on ‘scams and fraud experienced by consumers’. Global Journals. https://ec.europa.eu/info/sites/info/files/aid_development_cooperation_fundamental_rights/ensuring_aid_effectiveness/documents/survey_on_scams_and_fraud_experienced_by_consumers_-_final_report.pdf.
  • Forsythe, S. M., & Shi, B. (2003). Consumer patronage and risk perceptions in Internet shopping. Journal of Business Research, 56(11), 867–875. https://doi.org/10.1016/S0148-2963(01)00273-9
  • Garg, V., & Niliadeh, S. (2013). Craigslist scams and community composition: Investigating online fraud victimization [Paper presentation]. Proceedings of the IEEE CS Security and Privacy Workshops (SPW 2013) (pp. 123–126). https://doi.org/10.1109/SPW.2013.21
  • Hu, N., Liu, L., & Sambamurthy, V. (2011). Fraud detection in online consumer reviews. Institutional Knowledge at Singapore Management University. https://doi.org/10.1016/j.dss.2010.08.012
  • Huang, T. H. D., Yu, C. M., & Kao, H. Y. (2018). Data-driven and deep learning methodology for deceptive advertising and phone scams detection [Paper presentation]. Proceedings of the 2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2017) (pp. 166–171). https://doi.org/10.1109/TAAI.2017.30
  • Jane, S., Buckley, M., & Greene, D. (2012). Expert systems with applications SMS spam filtering: Methods and data. Expert Systems with Applications. 39(10), 9899–9908. https://doi.org/10.1016/j.eswa.2012.02.053
  • Järveläinen, J. (2007). Online purchase intentions: an empirical testing of a multiple-theory model. Journal of Organizational Computing and Electronic Commerce, 17(1), 53–74. https://doi.org/10.1080/10919390701291000
  • Kharraz, A., Robertson, W., & Kirda, E. (2018). Surveylance: Automatically detecting online survey scams [Paper presentation]. Proceedings of the IEEE Symposium on Security and Privacy (pp. 70–86). https://doi.org/10.1109/SP.2018.00044
  • Kim, M., et al. (2019). Scam detection assistant: Automated protection from scammers [Paper presentation]. 2019 First International Conference on Societal Automation (SA 20196) (pp. 1–8). https://doi.org/10.1109/SA47457.2019.8938036
  • Lee, H., Lee, J., Kim, D., Jana, S., Shin, I., & Son, S. (2021). AdCube : WebVR ad fraud and practical confinement of third-party ads. https://www.usenix.org/conference/usenixsecurity21/presentation/lee-hyunjoo.
  • Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Felegyhazi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G. M., & Savage, S. (2011). Click trajectories: End-to-end analysis of the spam value chain [Paper presentation]. Proceedings of the IEEE Symposium on Security and Privacy (pp. 431–446). https://doi.org/10.1109/SP.2011.24
  • Li, Z., Zhang, K., Xie, Y., Yu, F., & Wang, X. F. (2012). Knowing your enemy: Understanding and detecting malicious Web advertising [Paper presentation]. Proceedings of the 17th ACM Conference on Computer and Communications Security (pp. 674–686). https://doi.org/10.1145/2382196.2382267
  • McCormick, A., & Eberle, W. (2013). Discovering fraud in online classified ads [Paper presentation]. FLAIRS 2013 – Proceedings of the 26th International Florida Artificial Intelligence Research Society Conference (pp. 450–455).
  • Minastireanu, E. A., Alexandru, U., Cuza, I., Mesnita, G., Alexandru, U., & Cuza, I. (2019). Light GBM machine learning algorithm to online click fraud detection light GBM machine learning algorithm to online click fraud detection. Journal of Information Assurance & Cybersecurity, 3, 1–12. https://doi.org/10.5171/2019.263928
  • Miramirkhani, N., Starov, O., & Nikiforakis, N. (2016). Dial one for scam: Analyzing and detecting technical support scams. https://arxiv.org/pdf/1607.06891v1.pdf
  • Miramirkhani, N., Starov, O., & Nikiforakis, N. (2017). Dial one for scam: A large-scale analysis of technical support scams [Paper presentation]. https://doi.org/10.14722/ndss.2017.23163
  • Online Card Fraud - FraudSMART. (2021). https://www.fraudsmart.ie/stories/online-card-card-fraud/.
  • Park, Y., Jones, J., McCoy, D., Shi, E., & Jakobsson, M. (2014). Scambaiter: Understanding targeted Nigerian scams on craigslist [Paper presentation]. Network and Distributed System Security Symposium (pp. 23–26) https://doi.org/10.14722/ndss.2014.23284
  • Park, Y., McCoy, D., & Shi, E. (2017). Understanding craigslist rental scams. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 9603 LNCS, 3–21. https://doi.org/10.1007/978-3-662-54970-4_1
  • Perera, K. S., Neupane, B., & Faisal, M. A. (2013). A novel ensemble learning-based approach for click fraud detection in mobile advertising. In R. Prasath & T. Kathirvalavakumar (Eds.), Mining intelligence and knowledge exploration. Lecture notes in computer science (Vol. 8284, pp. 1–12). Springer. https://doi.org/10.1007/978-3-319-03844-5_38.
  • Pi, S. M., & Sangruang, J. (2011). The perceived risks of online shopping in Taiwan. Social Behavior and Personality: An International Journal, 39(2), 275–286. https://doi.org/10.2224/sbp.2011.39.2.275
  • Rastogi, V., Shao, R., Chen, Y., Pan, X., Zou, S., & Riley, R. (2016). Are these ads safe: Detecting hidden attacks through the mobile app-web interfaces (pp. 21–24). https://users.cs.northwestern.edu/∼ychen/Papers/ndss16.pdf
  • Shaari, H., & Ahmed, N. (2020, December). An extensive study on online and mobile ad fraud [Paper presentation]. The Third Conference for Engineering Sciences and Technology, Elmergib University, Alkhoms, Libya (pp. 1–3).
  • Sharifi, M., Fink, E., & Carbonell, J. G. (2011). Detection of Internet scam using logistic regression [Paper presentation]. 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (pp. 2168–2172). https://doi.org/10.1109/ICSMC.2011.6083998
  • Singla, R. (2018). Chokegati: A browser extension to mitigate resource hints vulnerabilities in HTML5 Cyber Security Roshan Rangwani Supervisor. https://norma.ncirl.ie/3563/1/roshanrangwani.pdf.
  • Smith, R. G., & Holmes, M. N. (1999). Nigerian advance fee fraud [No. 121]. https://www.aic.gov.au/publications/tandi/tandi121.
  • Sofo, F., Berzins, M., Ammirato, S., & Volpentesta, A. P. (2010). Investigating the relationship between consumers’ style of thinking and online victimization in scamming. International Journal of Digital Content Technology and its Applications, 4(7), 38–49. https://doi.org/10.4156/jdcta.vol4.issue7.4
  • Springborn, K., & Media, B. I. (2013). Impression fraud in on-line advertising via pay-per-view networks impression fraud in online advertising via pay-per-view. https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_springborn.pdf
  • Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2020). Automatically dismantling online dating fraud. IEEE Transactions on Information Forensics and Security, 15, 1128–1137. https://doi.org/10.1109/TIFS.2019.2930479
  • Suresh, S., Di, F., Katerina, T., & Mark, P. (2019). An analysis of android adware. Journal of Computer Virology and Hacking Techniques, 15, 147–160. https://doi.org/10.1007/s11416-018-0328-8
  • The most common examples of a phishing email. (2021). https://blog.usecure.io/the-most-common-examples-of-a-phishing-email.
  • Van Der Zee, S., Clayton, R., & Anderson, R. (2019). The gift of the gab: Are rental scammers skilled at the art of persuasion? (pp. 1–32). https://arxiv.org/abs/1911.08253.
  • Vidros, S., Kolias, C., Kambourakis, G., & Akoglu, L. (2017). Automatic detection of online recruitment frauds: Characteristics, methods, and a public dataset. Future Internet, 9(1), 6–19. https://doi.org/10.3390/fi9010006
  • Whitty, M. T. (2013). Anatomy of the online dating romance scam. Security Journal, 28(4), 443–455.
  • Zhu, Y., Byford, M., Gans, J., Weiss, A., & Xu, L. (n.d.). Acknowledgements: We are grateful for extensive comments and discussions with Simon An-derson.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.