|
1.Anderson, K.B., “Internet Auction Fraud: What Can We Learn From Consumer Sentinel Data?,” http://www.ftc.gov/be/workshops/internetauction/keithandersonslides.pdf, Data accessed: 2005/08/19. 2.Ba, S., Whinston, A.B., and Zhang, H., “Building Trust in Online Auction Markets through an Economic Incentive Mechanism,” Decision Support Systems, Vol. 35, No. 3, pp. 273-286, 2003. 3.Bierman, H.S. and Fernandez, L. Game Theory with Economic Applications, Mass: Addison-Wesley, 1998. 6.Bywell, C.E., and Oppenheim, C., “Fraud on Internet Auction,” Aslib Proceedings, Vol. 53, No. 7, pp. 265-272, 2001. 7.Chae, M., Shim, S., Cho, H., and Lee, B., “An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction,” 40th Annual Hawaii International Conference on System Sciences (HICSS’07), pp. 155-164, 2007. 4.Chen, H., “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Proceedings of Pacific Asia Intelligence and Security Informatics, pp. 1-20, 2007. 5.Chen, H., Chung, W., Xu, J.J., Wang, G.., Qin, Y., and Chau, M., “Crime Data Mining: A General Framework and Some Examples,” Journal of Computer, Vol. 37, No. 4, pp. 50–56, 2004. 6.Chen, H., Petersen, T., Violette, C., Atabakhsh, H., Xu, JJ., “Coplink Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security Intelligence and Security Informatics: A Crime Data Mining Approach to Developing Border Safe Research,” ACM International Conference Proceeding Series, Vol. 89, pp. 112-113, 2005. 7.Chua, C.E.H., and Wareham, J., “Fighting Internet Auction Fraud: An Assessment and Proposal,” Journal of Computer, Vol. 37, No. 10, pp. 31-37, 2004. 8.Freeman, L.C., “Centrality in Social Networks: Conceptual Clarification,” Social Network, Vol. 1, pp. 215-329, 1979. 9.Granovetter, M. “The Strength of weak Ties,” American Journal of Sociology, Vol. 78, No. 6, pp. 1360-1380, 1973. 10.Gregg, D.G. and Scott, J.E., “The Role of Reputation Systems in Reducing On-Line Auction Fraud,” International Journal of Electronic Commerce, Vol. 10, No. 3, pp. 95-120, 2006. 11.Haythornthwaite, C., “Social Network Analysis: An Approach and Technique for The Study of Information Exchange,” Library and Information Science Research, Vol. 18, No. 4, pp.323-342, 1996. 12.Heck, V. E., and Vervest, P., “How Should CIOs Deal with Web-Based Auction?,” Communication of the ACM, Vol. 41, No. 7, pp. 99-100, 1998. 13.Houser, D. and Wooders, J., “Reputation in Auctions: Theory, and Evidence from eBay,” Journal of Economics & Management Strategy, Vol. 15, No. 2, pp. 353-370, 2006. 14.Huisman, M. and Duijn, M.A.J.V., “Software for Social Network Analysis,” http://perso.ens-lyon.fr/eric.boix/Cat/SimulationSurvey/SoftwareComparison/SoftwareSocialNetworkAnalysisOct2003.pdf, Data accessed: 2006/07/31. 15.Jenamani, M., Zhong, Y., and Bhargave, B., “Cheating in Online Auction – Towards Explaining the Popularity of English Auction,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 53-62, 2007. 16.Klein, S., “Introduction to Electronic Auction,” Journal of Electronic Markets, Vol. 7, No. 4, pp. 3-6, 1997. 17.Klein, S. and O’Keefe, R.M., “The Impact of The Web on Auctions: Some Empirical Evidence and Theoretical Considerations,” International Journal of Electronic Commerence, Vol. 3, No. 3, pp. 7-20, 1999. 18.Krebs, V.E., “Mapping Networks of Terrorist Cells,” Journal of the International Network for Social Network Analysis, Vol. 24, No. 33, pp. 43-52, 2002. 19.Kauffman, R.J. and Wood, C.A., “Premium Bidding in Online Auctions: An Examination of Opportunism and Seller Preference,” http://www.mgmt.purdue.edu/academics/mis/workshop/kw_111805.pdf, Data accessed: 2007/01/17. 20.Kumar, M. and Feldman, S.I., “Internet Auction,” Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp.49-60, 1998. 21.Lin, Z., Janamanachi, B., and Huang, W., “Reputation Distribution and Consumer-to- Consumer Online Auction Market Structure: An Exploratory Study,” Decision Support Systems, Vol. 41, No. 2, pp. 435-488, 2006. 22.McMillan, R., “Auction Fraud Tops Computer Crime Complaints,” InfoWorld, http://www.infoworld.com/article/07/03/16/HNauctionfraudtopscomplaints_1.html, Data accessed: 2008/01/21. 23.Mitchell, J.C., Social Networks in Urban Situation, Manchester: Manchester University Press, 1969. 24.National Consumer League Internet Fraud Watch, “Internet Fraud Statistics (2000-2005),” http://www.fraud.org/internet/intstat.htm, Data access: 2007/06/20. 25.NFIC (National Fraud Information Center), “Internet Fraud Statistics Reports,” http://www.fraud.org/internet/intstat.htm, Data access: 2007/06/20. 26.Ramsey, J.B., Alternative Bidding Strategies: Some Theoretical Considerations Bidding and oil Leases, JAL Press INC, 1980. 27.Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara, K., “Reputation Systems,” Communication of the ACM, Vol. 43, No. 12, pp. 45-48, 2000. 28.Resnick, P. and Zeckhauser, R., “Trust among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System,” Advances in Applied Microeconomics, Vol 11, pp. 127-157, 2002. 29.Scott, J., Social Network Analysis: A Handbook, Thousands Oaks, Calif.: SAGE Publications, 2000. 30.Stallaert, B.S., Whinston, J.A.B., and Zhang, H., “Choice of Transaction Channels: The Effects of Product Characteristics on Market Evolution,” Journal of Management Information Systems, Vol. 21, No. 4, pp. 173-197, 2005. 31.Tokeley, K., “Vendor Bidding on Online Auctions Protecting Consumers from Vender Bidding on New Zealand Online Auctions,” Journal of Consumer Policy, Vol. 30, No. 2, pp. 137-150, 2007. 32.Wasserman, S. and Faust, K., Social Network Analysis: Methods and Applications, New York: Cambridge University Press, 1994. 33.Wurman, P.R., Wellman, M.P. and Walsh, W.E., ”The Michigan Internet AuctionBot: A Configurable Auction Server for Human and Software Agents,” Proceedings of the second International Conference on Autonomous Agents, pp. 301-308, 1998. 34.Wang, J.C., Chiu, C.C. and Ker, H.Y., “Detecting Online Auction Fraud of Reputation Inflation through Social Network Structures Embedded in Transaction Records,” Journal of Information Management (Taiwan), Vol. 12, No. 4, pp. 144-184, 2004. 35.Weinberg, B. D. and Davis, L., “Exploring the WOW in Online-Auction Feedback,” Journal of Business Research, Vol. 58, No. 11, pp.1609-1621, 2005. 36.Xu, J. and Chen, H., “Fighting organized crime: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks,” Decision Support Systems, Vol. 38, pp. 473-487, 2004 37.Yang, C., Ng, T. D., Wang, J. H., Wei, C. P., and Chen, H., “Analyzing and Visualizing Gray Web Forum Structure,” Proceedings of Pacific Asia Intelligence and Security Informatics, pp. 21-33, 2007.
|