Understanding Underground Incentivized Review Services
- URL: http://arxiv.org/abs/2102.04217v4
- Date: Wed, 14 Feb 2024 23:32:08 GMT
- Title: Understanding Underground Incentivized Review Services
- Authors: Rajvardhan Oak and Zubair Shafiq
- Abstract summary: We study review fraud on e-commerce platforms through an HCI lens.
We uncover sophisticated recruitment, execution, and reporting mechanisms fraudsters use to scale their operation.
Countermeasures that crack down on communication channels through which these services operate are effective in combating incentivized reviews.
- Score: 26.402818153734035
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: While human factors in fraud have been studied by the HCI and security
communities, most research has been directed to understanding either the
victims' perspectives or prevention strategies, and not on fraudsters, their
motivations and operation techniques. Additionally, the focus has been on a
narrow set of problems: phishing, spam and bullying. In this work, we seek to
understand review fraud on e-commerce platforms through an HCI lens. Through
surveys with real fraudsters (N=36 agents and N=38 reviewers), we uncover
sophisticated recruitment, execution, and reporting mechanisms fraudsters use
to scale their operation while resisting takedown attempts, including the use
of AI tools like ChatGPT. We find that countermeasures that crack down on
communication channels through which these services operate are effective in
combating incentivized reviews. This research sheds light on the complex
landscape of incentivized reviews, providing insights into the mechanics of
underground services and their resilience to removal efforts.
Related papers
- "It Warned Me Just at the Right Moment": Exploring LLM-based Real-time Detection of Phone Scams [21.992539308179126]
We propose a framework for modeling scam calls and introduce an LLM-based real-time detection approach.
We evaluate the method's performance and analyze key factors influencing its effectiveness.
arXiv Detail & Related papers (2025-02-06T10:57:05Z) - Illusions of Relevance: Using Content Injection Attacks to Deceive Retrievers, Rerankers, and LLM Judges [52.96987928118327]
We find that embedding models for retrieval, rerankers, and large language model (LLM) relevance judges are vulnerable to content injection attacks.
We identify two primary threats: (1) inserting unrelated or harmful content within passages that still appear deceptively "relevant", and (2) inserting entire queries or key query terms into passages to boost their perceived relevance.
Our study systematically examines the factors that influence an attack's success, such as the placement of injected content and the balance between relevant and non-relevant material.
arXiv Detail & Related papers (2025-01-30T18:02:15Z) - CP-Guard: Malicious Agent Detection and Defense in Collaborative Bird's Eye View Perception [54.78412829889825]
Collaborative Perception (CP) has shown a promising technique for autonomous driving.
In CP, ego CAV needs to receive messages from its collaborators, which makes it easy to be attacked by malicious agents.
We propose a novel method, textbfCP-Guard, that can be deployed by each agent to accurately detect and eliminate malicious agents in its collaboration network.
arXiv Detail & Related papers (2024-12-16T17:28:25Z) - Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - Application of AI-based Models for Online Fraud Detection and Analysis [1.764243259740255]
We conduct a Systematic Literature Review on AI and NLP techniques for online fraud detection.
We report the state-of-the-art NLP techniques for analysing various online fraud categories.
We identify issues in data limitations, training bias reporting, and selective presentation of metrics in model performance reporting.
arXiv Detail & Related papers (2024-09-25T14:47:03Z) - The TikToking troll and weaponization of conscience: A systems perspective case study [0.0]
Weaponization of conscience is a tactic used by fraudsters to camouflage their activity, deceive their victims, and extend the effectiveness of their modi operandi.
This case study centers around a controversial TikToker, highlighting how the weaponization of conscience can be leveraged to manipulate multiple actors within a propagandist's target population.
arXiv Detail & Related papers (2024-04-14T21:05:40Z) - A Safe Harbor for AI Evaluation and Red Teaming [124.89885800509505]
Some researchers fear that conducting such research or releasing their findings will result in account suspensions or legal reprisal.
We propose that major AI developers commit to providing a legal and technical safe harbor.
We believe these commitments are a necessary step towards more inclusive and unimpeded community efforts to tackle the risks of generative AI.
arXiv Detail & Related papers (2024-03-07T20:55:08Z) - The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign [4.369550829556578]
This study takes an unprecedented deep dive into large-scale phishing campaigns aimed at Meta's users.
Analysing data from over 25,000 victims worldwide, we highlight the nuances of these campaigns.
Through the application of advanced computational techniques, including natural language processing and machine learning, this work unveils critical insights into the psyche of victims.
arXiv Detail & Related papers (2023-10-05T12:24:24Z) - Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence [88.37416552778178]
We report on a ten-month study where we worked with six support workers and eighteen perpetrators in the design and deployment of Fragments of the Past.
We share how crafting digitally-augmented artefacts - 'fragments' - of experiences of desisting from violence can translate messages for motivation and rapport between peers.
These insights provide the basis for practical considerations for future network design with challenging populations.
arXiv Detail & Related papers (2021-07-09T22:57:43Z) - Fraud Detection using Data-Driven approach [0.0]
The first known online banking service came in 1980.
The ever increasing use of internet banking and a large number of online transactions increased fraudulent behavior also.
This research paper aims to construct an efficient fraud detection model which is adaptive to customer behavior changes.
arXiv Detail & Related papers (2020-09-08T20:58:51Z) - DFraud3- Multi-Component Fraud Detection freeof Cold-start [50.779498955162644]
The Cold-start is a significant problem referring to the failure of a detection system to recognize the authenticity of a new user.
In this paper, we model a review system as a Heterogeneous InformationNetwork (HIN) which enables a unique representation to every component.
HIN with graph induction helps to address the camouflage issue (fraudsterswith genuine reviews) which has shown to be more severe when it is coupled with cold-start, i.e., new fraudsters with genuine first reviews.
arXiv Detail & Related papers (2020-06-10T08:20:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.