towards a model of online auction deception
TRANSCRIPT
Towards a Model of Online Auction Deception
By Alex Nikitkov1 and Dan N. Stone2
Contact Author:
Alex Nikitkov
Brock University 243 Taro Hall
St. Catharines, ON L2S 3A1 Tel. (905) 688-5550 ext. 3272 E-mail: [email protected]
December 24, 2005
Alex Nikitkov thanks Brock University for the grant supporting this study. Dan Stone thanks the University of Kentucky and the Gatton College of Business and Economics for grants supporting his research.
1 Assistant Professor, Brock University 2 Gatton Endowed Chair, University of Kentucky
Towards a Model of Online Auction Deception
Abstract
The phenomenal growth of e-commerce and online auctions is exceeded only by the
corresponding growth in e-commerce and online auction fraud. Herein, we report two pilot
studies that use eBay data, and the Bell & Whaley (1991) taxonomy of cheating, to investigate
the nature and frequency of online auction deception. Study one (n = 24) categorizes a one-week
sample of online transactions into deception strategies in two general classes (i.e., hiding versus
showing) and three strategic domains (i.e., product, seller, and transaction characteristics).
Results indicate more frequent use of hiding than showing strategies, and, more frequent
deception in product and seller than transaction characteristics. Study 2 (n = 31) replicates the
results of Study 1 and presents a nascent model of the effects of deception strategies on
transaction characteristics and outcomes. Results indicate that showing deception strategies are
associated with marginally higher sales prices, higher levels of seller experience, and, higher
levels of unusual or undesirable transaction outcomes (e.g., no sale, buyer dropped from market,
inexperienced (falsified?) buyer). In contrast, hiding strategies are associated with less
experienced sellers but have no apparent effects on transaction outcomes. Limitations of both
studies include high levels of beta error and a small sample of online markets. The results
indicate that experienced sellers use different deception strategies than do novice sellers, and,
that the strategies used by more experienced (but not novice) sellers change transaction
outcomes.
I. Introduction
While e-commerce has recently grown 25% per year, evidence suggests that
internet fraud is growing at an even faster rate (Laudon & Traver, 2004). Internet fraud
has many subcategories. However, Internet auction fraud is the most frequently reported
online offense, comprising 71.2% of reported complaints (Internet Fraud Complaint
Center (IFCC), 2005). Online auction fraud is also among the most expensive forms of e-
commerce fraud. In 2003, the U.S. Federal Trade Commission (FTC) reported $100
million in losses due to online auctions (Wingfield, 2004). Further, the incidence of
online fraud is increasing. For example, IFCC reports a 66.6% increase in complaints
from 2003 to 2004 (158% increase for 2003).
E-commerce and online auction fraud impose multiple costs on individuals,
companies, and society. For seller’s, fraud costs include the direct financial losses, lost
sales due to fraud risk, costs of preventive and detective internal controls, and discounts
to attract online buyers (cf. Grazioli and Jarvenpaa, 2000). For buyer’s, fraud costs
include monetary and time losses as well as loss of trust in the particular seller and in e-
commerce viability as a whole. Further, high fraud rates can increase regulation (e.g. the
Sarbannes-Oxley (SOX) act) which increases business costs of business and as a result
decrease the competitiveness of online relative to brick-and-mortar merchants.
Online auctions are more vulnerable to fraud than are brick-and-mortar
transactions due to increased information asymmetry between sellers and buyers
(Kauffman & Wood, 2000). Considerable evidence highlights the importance of trust in
online commerce (McKnight et al. 2002, Pennington et al. 2003). For example, Grazioli
and Jarvenpaa (2000) find a strong negative relationship between deception and trust in
Online Auction Deception Page 2
online trading. Research also suggests that increasing trust in online environments
increases consumer purchasing intentions and behavior (Ba et al. 2002, Pennington et al.
2003, McKnight et al. 2002, Nikitkov 2006). Building trust in online auctions is an
important antecedent to the continued growth of such markets. Grazioli & Jarvenpaa
(2000) argue for the importance of research directed towards understanding the predictors
of fraud and deception. Indeed, the ability to successful identify online fraud is an
important corollary of improving market security, privacy, and trust.
This paper reports the results of two pilot studies that explore the type, frequency,
and effects of online auction deception. We next describe the eBay auction market,
introduce online deception, and discuss the Bell and Whaley deception framework.
Study 1 then explores the feasibility of grounding the Bell and Whaley framework in
online auction seller deception strategies. Following this, study 2 investigates the
relationships among seller experience, deception strategies, and transaction outcomes.
We conclude by discussing the limitations and contributions of the study.
II. Online Seller Deception in eBay Auctions
A. The eBay Auction Market
eBay is the world’s largest online auction. Daily, it lists more than sixteen million
items for sale and recorded $24 billion in sales in 2004 (Wingfield, 2004). Federal Trade
Commission (FTC) data and eBay’s counter-measures to fraud suggest that fraud is an
increasing problem for eBay. For example, eBay spokesperson Kevin Pursglove says that
the company’s published fraud rate is about one-tenth of one percent of transactions; in
contrast, some online “vigilante” groups argue that in some categories, eBay fraud rates
approximate 75% of listings, and, that the incidence of fraud is growing 35-40% a year
Online Auction Deception Page 3
(Sullivan 2005). Because evidence suggests that online seller fraud is more pervasive
and problematic than buyer fraud (IFCC 2003), we focus on seller misrepresentations in
online auctions.
Existing research investigates issues of security and trust in the eBay market. For
example, research investigates the ability of reputation feedback mechanisms to increase
consumer trust in online purchases (Dellarocas 2004, Ba et al. 2002, Lee et al. 2000,
McDonald et al. 2002). Research also investigates the usefulness of information
assurance seals provided by eBay or third parties in building customer trust (Nikitkov
2006). We contribute to this body of knowledge by seeking to build a model of cues that
help in diagnosing potentially deceptive eBay listings.
B. Detecting Online Deception
Deception is a misrepresentation by an opportunistic agent that is designed to
change the target’s behavior in a way that increases the agent’s payoff(s) or probability of
payoff(s) (Hyman 1989). Deception and its detection have been studied for decades. One
approach to detecting deception is to identify verbal and nonverbal cues as to its presence
(Buller et al. 1994, DePaulo et al. 2003, Zuckerman et al. 1985). For example, the
identification and systematic analysis of deception cues is one mechanism for improving
the detection of lies (Vrij et al. 2004). Training in deception cue identification, including
in electronic contexts, has been shown to increase deception detection accuracy (George
et al. 2004).
The strategy of detecting deception through cue identification is problematic in
the online auction environment. Potential online buyers cannot observe cues that are
present in face-to-face interactions that are known to be associated with higher deception
Online Auction Deception Page 4
rates (e.g., increased eye blinking, changes in voice pitch, increased self-grooming)
(George et al. 2004). We speculate that the detection of deception through cue
observation can be extended to the online auction environment. However, this requires
identification and validation of cues that successfully predict online deception.
C. The Bell & Whaley Deception Framework
Categorical (i.e. nominal) measurement is the starting point of science (Shadish at
al. 2002). Well-specified categories provide a skeleton of characteristics that enable
generalization and progress from ideographic to nomothetic science. Herein, we build
upon Bell (1982) and Bell & Whaley (1991) framework of cheating and deception. This
framework has been applied to military tactical planning (Hughes 1990, Parker Jr. 1991),
to preventing and safeguarding against information systems hacker attacks (Cohen at al
2005), to model fraud prevention and detection in financial statement analysis (Johnson
et al, 2001), and to study the effects of training and warning on sensitivity to deception
(Biros et al. 2002).
Bell (1982) and Bell & Whaley (1991) posit two broad deceit strategies: (1)
hiding the real (i.e., concealment) and (2) showing the false (i.e., simulation).
Concealment influences the target by preventing the target’s access to otherwise
observable phenomenon. In contrast, simulation influences the target by offering a
distorted (i.e., simulated) image of reality. Bell (1982) suggests three concealment tactics:
masking, repackaging, dazzling, and three simulation tactics: mimicking, inventing,
decoying. Stech & Elsasser (2004) suggest two additional tactics: red flagging as a
concealment strategy, and, double play as a simulation strategy. Bell and Bell and
Whaley (1991) argue that rational deceivers choose from these deceit strategies based on
Online Auction Deception Page 5
their feasibility, and, the joint likelihood (i.e., in combination with other strategies) of
their success in increasing the likelihood and amount of desired payoffs (cf. Dellarocas
2004).
Within the online auction environment, we speculate that the strategies and tactics
of deceit may be applied to product, seller, and transaction characteristics. Product
characteristics relate to the product or services offered for sale. Seller characteristics
relate to displayed characteristics such as the seller’s location, reputation feedback,
displayed assurance seals, and commitment to support honest trade. Transactions
characteristics include hiding or showing bidder identities, responses to buyer queries,
and acceptable payment methods.
Figure one presents a proposed model deception strategies and tactics in online
auctions. The first column summarizes the available strategies (hiding and showing) and
related tactics. The second column relates to the characteristic to which the strategy and
tactic is applied. The third column illustrates the ultimate goal of the deception strategies
and tactics: i.e., an illusion that effectively deceives the buyer.
Insert Figure 1 about here
III. Study 1 – A Qualitative Pilot Study of Seller Deception in Online Auctions
Study 1 is a primarily qualitative investigation of the presence of the strategies
identified in Bell and Whaley (1991) deception framework among sellers in the eBay
online auction market. One goal of the study is to generate a “grounded theory” that
applies the Bell and Whaley (1991) framework to online auction market.
Online Auction Deception Page 6
A. Method
Study 1 employed a theory-based qualitative sampling strategy (Miles and
Huberman 1994) that was based on the Bell and Whaley deception framework. One of
the authors searched for examples of each of the Bell and Whaley deception strategies
and tactics in one week of listings during April 2005 in two eBay product categories:
Computer and Networks or Consumer Electronics categories. We chose these product
categories because of evidence that they have relatively high rates of deception compared
with many other product categories (IFCC 2004; Warner 2003).
For listings that employed identified deception strategies, one of the authors
categorized the strategy into the following categories:
1. strategy: hiding or showing
2. tactic within the strategy: hiding (masking, repackaging, dazzling, red-
flagging), showing (mimicking, inventing, decoying, double-play)
3. domain: product, seller, or transaction
B. Results
We identified twenty-four listing cases that showed evidence of deception
strategies and tactics. Table 1 summarizes the frequency of the observed deception
strategies and their related domains in the identified cases. Hiding strategies were twice
as frequent as were showing strategies. In addition, deception in the product and seller
domains was 33% more frequent than was deception in the transaction domain. A Chi-
square test for independence between strategy and domains approaches significance
(χ2(2) = 4.0, p = .14). The data suggest that hiding strategies may be more frequent in the
product and seller domains, while showing strategies may be more frequent in the
Online Auction Deception Page 7
transaction domain. However, given the small sample and corresponding high levels of
Beta error, the significance and importance of this effect is unclear.
Insert Table 1 about here
Table 2 categorizes the twenty-four cases of deception by strategies, tactics, and
domain. The second column of this table includes speculations about possible uses of
each tactic by eBay sellers, although several of these potential tactics were not observed
in the reported data. Table 2 Panel A categorizes the sixteen cases of hiding strategies by
tactics and domain. Table 2 Panel B categorizes the eight cases of showing strategies by
tactics and domain.
Insert Table 2 about here
B.1 Hiding Strategies (See Table 2 Panel A)
B.1.1 Hiding Strategy: Masking Tactic. Masking hides the real through
invisibility (Bell 1982). The data revealed six cases of masking tactics in the product
domain. These six cases were:
Case #1: including an image from the Original Equipment Manufacturer’s (OEM)
web site but providing little or no information about actual unit offered for
sale,
Case #2: providing no image(s) of the product,
Case #3: providing an obscured image of the product,
Case #4: providing a description copies from the OEM web site,
Case #5: providing a vague product description,
Case #6: promising to add information at a later time or asking buyer to email the
seller for more product information.
Online Auction Deception Page 8
We observed one case of masking related to seller characteristics. In this case
(#9) the seller blocked buyer access to the seller feedback profile. We also observed one
case of masking related to transaction characteristics. In this case (#18), the seller hid the
identities of bidders on the transaction.
B.1.2 Hiding Strategy: Repackaging Tactic. Repackaging disguises the real (Bell
et al. 1991). In online auctions, repackaging tactics may attempt to disguise potential cues
as to a problem product, seller, or transaction. We found no examples of repackaging
tactics related to products. We identified six cases of repackaging related to seller
characteristics. These cases included:
Case #10: providing false reasons for changing seller user identification,
Case #11: building reputation feedback by purchasing rather than selling,
Case #12: building reputation feedback from small transactions,
Case #13: falsely displaying information assurance seals (Square Trade, Verified),
Case #14: Reserving an eBay user identification in advance, in order to give the
appearance of a longer tenure as an eBay user,
Case #15: providing false information about the seller’s location.
We did not identify the application of a repackaging tactic to the transaction
domain.
B.1.3 Hiding Strategy: Dazzling Tactic. Dazzling hides the real through
confusion. For example, when masking and repackaging ruses fail, dazzling covers the
retreat. The purpose of dazzling is to confuse the victim, to make victim loose clear
vision of underlying reality or possibly set a blame on someone else, or win time, or
minimize the consequences of the deceit (Bell 1982). We identified one case of dazzling
Online Auction Deception Page 9
in the product domain. Case 7 provided a confusing (i.e., dazzling) text description of the
product. We did not observe the dazzling tactic in the seller or transaction domains.
B.1.4 Hiding Strategy: Red Flagging Tactic. Red flagging hides the real by
displaying potentially negative characteristics, but in a light that suggests that the
negative characteristics are innocuous. In the product domain, this strategy might result
in the seller identifying a problem with the product but claiming that the seller lacks
sufficient the knowledge to diagnose it. We observed one case (#19) of red flagging in
the transaction domain. In this case, the seller claimed that they do not accept Paypal
because they have encountered problems with it in the past and their account was frozen.
The seller then suggested the use of BidPay instead of Paypal for electronic payment.
While BidPay is a legitimate online transfer system, evidence suggests that it is more
frequently prone to seller abuse than is PayPal.
B.2 Showing Strategies (See Table 2 Panel B)
B.2.1 Showing Strategy: Mimicking Tactic. Mimicking shows the false through
imitation. In this strategy, the deceiver does not hide or repackage but rather goes on the
offense. We identified one case (#8) of a mimicking tactic in the product domain. In this
case, the seller displayed an image taken from another seller which did not match the
actual product of the seller. The intent of this deception appeared to be to create the false
impression that the seller had a better, more expensive product for sale. We also
identified one case of a mimicking tactic in the seller domain. In this case (#16), the
seller used an eBay identity that closely approximated that of a well-established brand
name. We also observed one case (#20) of a mimicking tactic applied to the transaction
domain. In this case, the seller advertised a non-existent manufacturer’s warranty.
Online Auction Deception Page 10
B.2.2 Showing Strategy: Inventing Tactic. Inventing shows the false by
displaying a different, newly created, reality. In deception, the inventing strategy
involves showing the false in such a way that it has no analogy in genuine (typical or
legitimate trade) practice. We observed one case of inventing in the seller domain, and,
two cases in the transaction domain., The case in the seller domain (#17) involved the
“invention” of an innocent seller, i.e., claiming innocence related to negative feedback
(despite evidence to the contrary). One case of inventing related to transaction
characteristics (#21) involved attempting to lure buyers off of eBay to purchase an item
by email, thereby avoiding eBay transaction fees and eBay protections to the buyer. The
second case of inventing related to transaction characteristics (#23) involved attempting
to lure buyers off of eBay by using “Submit best offer” option based on the same
motivation as is given for case #21.
B.2.3 Showing Strategy: Decoying Tactic. Decoying shows the false by diverting
attention from the real. We found one example of decoying in the transaction domain
(#22). In this case, the buyer indicated that PayPal was an accepted payment method, but
later “decoyed” the buyer by claiming that, “I cannot accept Paypal because my account
has been frozen two days ago, so other methods of payment are personal check, money
order, or wire transfer”. These methods put the buyer at greater risk of seller fraud.
B.2.3 Showing Strategy: Double Play Tactic. A double play tactic involves
minimizing suspicious information. For example, a seller might employ a double play in
the product domain by stating a product’s faults but also claiming that they are too minor
to be considered (e.g. scratches are very minor or the item is refurbished but passed
manufacturer’s quality control for new merchandise). We observed one case of a double
Online Auction Deception Page 11
play tactic in the transaction domain (#24). In this case, the seller claimed that the listing
“was only a test” but also provide all of the information to the buyer needed to contact
the seller for an actual sale.
C. Discussion
Study 1 provides evidence that eBay sellers use deception strategies and tactics
that are found in the Bell and Whaley (1991) deception framework. In addition, Study 1
provides evidence of the usefulness of the Bell and Whaley framework as a lens for
understanding online auction deception among sellers.
One limitation of Study 1 however, is its small sample size. In addition, Study 1
does not investigate whether sellers with differing levels of experience may use different
deception strategies, or, how deception strategies affect transaction outcomes. Study 2
attempts to provide some evidence related to the relationship among seller characteristics,
deception strategies, and transaction outcomes.
IV. Study 2 – A Pilot Study of Seller Characteristics, Deception Strategies, and Transaction Outcomes
Study 2 investigates the relationship among seller characteristics, deception
strategies, and transaction outcomes. Our goal in Study 2 is to ground the nascent theory
developed in Study 1 in quantitative data from an online auction market. Accordingly,
we collected quantitative data about the relationships among seller characteristics,
deception strategies, and transaction outcomes. Our intuitive speculations about the
relationships among these variables, which are not informed by specific theory, are as
follows:
Speculation #1: Experienced and novice eBay sellers will use different deception
strategies.
Online Auction Deception Page 12
Speculation #2: The deception strategies used by experienced eBay sellers will be
more successful at deceiving buyers than will the deception strategies used by novice
eBay sellers.
A. Method
One author collected data on all offers (listings) for Apple PowerBook G4 laptop
computers with 1.67 GHz processor speed for one day in November 2005. We chose this
market because of potentially high rates of deception in the laptop computer market, and,
because unambiguous market prices are available for this product from its manufacturer.
The resulting sample produced 31 observations.
For each listing, we collected data on:
1. the number of deception cues in the listing using the method described in
Study 1,
2. if present, the domain of deception cues (product, seller, transaction), using
the method described in Study 1,
3. if present, the deception strategy (hiding or showing), using the method
described in Study 1,
4. two measures of seller experience: (a) the ratio of seller sell to buy
transactions, and (b) the total number of seller eBay transactions,
5. ending sales price,
6. transaction outcome, which measures the success or failure of a listing. We
coded this variable as:
a. 1: sale occurred and buyer posted positive feedback (successful
transaction)
Online Auction Deception Page 13
b. 0.5 if a sale took place, the buyer did not post feedback, and none of
the condition listed in item “c” below obtained (ambiguous
transaction)
c. 0 if (unsuccessful transaction):
i. The listing closed prematurely: this can occur because eBay
suspects fraud, or, because the seller is dissatisfied with
existing offers
ii. Item received no bids, potentially indicating a lack of buyer
trust in the seller
iii. Sale occurs but buyer is delisted (removed) by eBay within 2
weeks of the sale
iv. Sale occurs but buyer has a feedback rating < 15 which
potentially indicates a seller using a buyer pseudonym to
“purchase” his or her own product.
v. Highest bid was entered after the end of the auction (which
violates eBay market rules).
B. Results
B.1 Descriptive Results
We identified forty-nine deception cues in the thirty-one listing in our sample.
The listings averaged 1.10 hiding and 0.48 showing deception cues. Six listings had no
deception cues while two listings had four deception cues. Table 3 summarizes the
frequency of the observed deception cues by strategy and domain. Consistent with Study
1, we observe a higher frequency of hiding than showing strategies. Also, consistent with
Online Auction Deception Page 14
Study 1, we observe higher deception rates in the product and seller domains than in the
transaction domain. A Chi-square test of independent approaches significance, (χ2 (2) =
5.72, p = .06) which may suggest dependences in the relationship among strategies and
domains. If reliable when verified with a larger sample, the data suggest that hiding
strategies may be more frequent in the product domain, while showing strategies are
more common in the seller and transaction domains.
Insert Table 3 about here
B.2 Tests of Speculations
Table 4 presents correlation results. Speculation #1 argues that experienced and
novice eBay sellers will use different deception strategies. Consistent with this
speculation, sellers with higher sell-to-buy transaction ratios use more showing deception
strategies than do sellers with lower sell-to-buy transaction ratios. Also consistent with
this speculation, sellers with fewer total eBay transactions use marginally more hiding
deception strategies than do sellers with more total eBay transactions. These results
provide some support for speculation #1.
Insert Table 4 about here
Speculation #2 argues that the deception strategies used by experienced eBay
sellers will be more successful at deceiving buyers than will the deception strategies used
by novice eBay sellers. Consistent with this speculation, showing deception cues (which
are used more frequently by experienced sellers) positively (though marginally) correlate
with higher sales prices. In addition, showing cues positively correlate with successful
transaction outcomes.
Online Auction Deception Page 15
V. Discussion, Limitations, and Conclusion
Study 2 provides evidence that online auction sellers may differentially use
deception strategies depending on their levels of experience. In addition, we find some
evidence that showing deception strategies, which are used more frequently by
experienced sellers, are more successful at deceiving buyers than are hiding deception
strategies. Although preliminary, the data suggest that experienced deceivers use
different, more successful, strategies than do inexperienced deceivers.
Our studies are subject to several important limitations. Our samples are both
small, and from a small set of eBay markets that are thought to have relatively high levels
of deceptive practices. Accordingly, our results are unlikely to generalize to markets
with fewer opportunities, and smaller payoffs, for deception. In addition, our small
samples, and correspondingly high levels of Beta error, may result in our failing to reject
null hypotheses that, with higher levels of statistical power, we would reject. We plan to
expand our samples for both studies. In addition, our pilot data were coded by only of
the authors. Hence, our coded variables may contain higher levels of noise and bias than
if we used a multi-coder approach and tested for agreement among coders.
Our studies investigate an important, but difficult to investigate, phenomenon:
online auction fraud. Our research strategy is to conceive of deception as a general and
generalizable phenomenon, and to therefore seek a general theory of deception. Our
goals in this research are to create a grounded theory of online seller deception, to
identify a set of information cues that are valuable in detecting this deception, and to
empirically validate these cues. The pragmatic goal of such research is to enable online
buyers to identify the strategies and tactics of seller deceit, and to take appropriate
Online Auction Deception Page 16
countermeasures. However, fraud strategies and tactics are an evolutionary phenomenon.
Today’s successful deceit tactics, if overused (e.g., the Nigerian fraud letter scheme)
become tomorrow’s ubiquitous, though harmless annoyances. Though an uncomfortable
realization for buyers and consumers, the evolving nature of deception at least promises
to provide deception researchers with an unending set of strategies and tactics to
investigate in future research.
Online Auction Deception Page 17
VI. Bibliography
Ba, S., and Pavlou, P. “Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior,” MIS Quarterly (26:3), 2002, pp. 243-266.
Bell J.B. and B. Whaley Cheating and Deception, Transaction Publishers, New Brunswick, USA, and London, UK, 1991.
Bell J.B. Cheating, St. Martin’s Press, New York, 1982.
Biros, D.P., George, J.F., and Zmud, R.W. “Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study,” MIS Quarterly (26:2), 2002, pp.119-144.
Buller, D. and Burgoon, J., “Deception: Strategic and non-strategic communication,” Strategic Interpersonal Communication, J.A. Daly and J.M. Wienamm, Eds. Hillsdale, NJ: Erlbaum, 1994, pp.191-223.
Cohen, F., Lambert, D., Preston, C., Berry, N., Stewart, C., and Thomas, E. A Framework for Deception, Final Report. Retrieved on July 19, 2005 from: http://all.net/journal/deception/Framework/Framework.html
Dellarocas, C. N., "Sanctioning Reputation Mechanisms in Online Trading Environments with Moral Hazard" (July 2004). MIT Sloan Working Paper No. 4297-03. http://ssrn.com/abstract=393043
Dellarocas, C. N., "Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms" (August 2004). MIT Sloan Working Papers No. 4501-04. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=585404
DePaulo, B., Lindsay, J., Malon, B., Muhlenbruck, L., Charlton, K., and Cooper, H., “Cues to deception,” Psychological Bulletin, vol.129, pp.74-118, 2003.
George, J.F., Marett, K., Burgoon, J.K., Crews, J., Cao, J., Lin, M., Biros, D.P. “Training to detect deception: an experimental investigation,” Proceedings of the 37th Hawaii International Conference on System Sciences, 2004.
Grazioli, S., and Jarvenpaa, S.L. “Deceived! Under Target On Line,” Communications of the ACM, (46:12), 2003, pp.196-205 http://gates.comm.virginia.edu/sg6m/grazioli/pubs/Under%20Target%20on%20line%20CACM%202003.pdf.
Grazioli, S., and Jarvenpaa, S.L. “Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans (30:4), 2000, pp.395-410.
Hughes, J.L. Deception: An Integral Part of Warfare, USMC, 1990. Hyman, R. “The Psychology of Deception,” Annual Review of Psychology (40), 1989, pp. 133-
154.
Online Auction Deception Page 18
Internet Fraud Complaint Center (IFCC). “Internet Fraud Complain Center Referred More than 48,000 Fraud Complaints to Law Enforcement in 2002”, Intelligence Note 11/04/2003. Retrieved on July 19, 2005 from http://www.ifccfbi.gov/strategy/wn030409.asp.
Johnson, P.E., Grazioli, S., Jamal, K., and Berryman, R.G. “Detecting Deception: Adversarial Problem Solving in a Low Base-rate World,” Cognitive Science (25), 2001, pp. 355-392.
Kauffman, R. and Wood, C. “Running Up the Bid: Modeling Seller Opportunism in Internet Auctions,” The Proceedings of the 2000 Americas Conference on Information Systems, Long Beach, CA, August, 2000, pp. 10-13.
Laudon K.C., and Traver, C.G. E-commerce. Pearson: Addison Wesley, 2004, pp. 1: 24
Lee, Z., Im, I., and Lee, S.J. ”The effect of negative buyer feedback on prices in the Internet auction markets,” Proceedings of the 21st International Conference on Information Systems. December 2000: 286-302.
McDonald, C. G., and Slawson Jr., V.C. “Reputation in an internet auction market,” Economic Inquiry, (40:3), 2002, pp. 633-650.
McKnight D.H., Choudhury V., Kacmar C. “The impact of initial consumer trust on intentions to transact with a web site: a trust building model,” Journal of Strategic Information Systems, (11), 2002, pp. 297-323.
Miles, M. B. and A. M. Huberman (1994). Qualitative Data Analysis. Thousand Oaks, Sage.
Nikitkov, A.N. (2006) “Information Assurance Seals: How they Impact Consumer Purchasing Behavior” Journal of Information Systems (20:1)
Parker Jr., R.R. Deception—The Missing Tool, USMC CSC, 1991. http://www.globalsecurity.org/military/library/report/1991/PRR.htm
Pennington R., Wilcox, H.D., and Grover, V. “The Role of System Trust in Business-to-Consumer Transactions,” Journal of Management Information System (20), 2003, pp.197-226.
Shadish, W.R., Cook, T.D., & Campbell, D.T. (2002). Experimental and Quasi-Experimental Designs for Generalized Causal Inference. Boston: Houghton-Mifflin.
Stech F.J., and Elasasser, C. Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis, presentation at the 72nd MORS Symposium, Naval Postgraduate School, Monterey California, 22-24, June 2004. http://www.mitre.org/work/tech_papers/tech_papers_04/stech_deception/stech_deception.pdf.
Sullivan B. “Auction Fraud on the rise, some say,” 2005, Retrieved on July 26, 2005 from http://msnbc.msn.com/id/3078737/
Online Auction Deception Page 19
Vrij A. and Mann S. “Detecting deception: the benefit of looking at a combination of behavioral, auditory and speech content related cues in a systematic manner,” Group Decision and Negotiation 13, 2004, pp.61-79.
Warner, M. “eBay’s worst nightmare,” Fortune, May 26, 2003, pg. 89.
Wingfield, N. “Cat and Mouse—Problem for Cops on eBay Beat,” Wall Street Journal, Aug. 3, 2004, pg. A1.
Zuckerman, M. and Driver, R., “Telling lies: Verbal and nonverbal correlates of deception,” in Nonverbal Communication: An Integrated Perspective, A. W. Siegman and S. Feldstein, Eds. Hillsdale, NJ: Erlbaum, 1985, pp.129-147.
Online Auction Deception Page 20
Hiding (Concealing) Masking Repackaging Dazzling Red-Flagging Showing (Simulating) Mimicking Inventing Decoying Double-Play
Deception Strategies and Tactics
Product
or (and)
Seller
or (and)
Transaction
Applied to Characteristics of
Selected tactic is
applied to
Illusion (false perception of reality)
Figure 1
Proposed Model of Deception Strategies and Tactics in Online Auctions (Adapted
from Bell & Whaley, 1991)
creates
Goal
Online Auction Deception Page 21
Table 1 Study 1 - Frequency of Observed Strategies & Domains
Domain
Strategy Product Seller Transaction Row
Totals % by Row
Hiding 7 7 2 16 66.7% Showing 2 2 4 8 33.3% Column Totals 9 9 6 24 % by Column 37.5% 37.5% 25.0% 100.0%
χ2(2) = 4.0, p = .14
Online Auction Deception Page 22
Table 2 Panel A - Hiding (Concealing) Strategies Deception Strategies and Tactics and Example Application to eBay
Hiding Tactics Potential Application to eBay Sellers
Case # Domain
Displaying image from the original equipment manufacturer (OEM) Web site that does not represent the actual item for sale 1
Not including an image of the product 2 Displaying an obscure image of the product 3
Cut-and-paste description from OEM Web site 4
Providing vague textual description 5
Promising to add information at a later date or asking to email for information as a form of a lure 6
Product
Preventing access to the seller's feedback 9
Providing no or not meaningful information on the location of the seller Seller
Masking
Hiding bidder identities 18 Transaction Providing subjective product descriptions
Selling counterfeit product under a name that resembles a known brand.
Product
Suggesting a false reason for ID change 10 Collecting positive feedback primarily from buying not selling 11
Collecting positive feedback on primarily small transactions 12 Using multiple eBay IDs to falsely create self-delivered positive feedback Falsely using assurance seals 13 Reserving ID with eBay in advance 14
Providing unsupported statements of seller's commitment to honest trade Providing false information about seller location 15
Making false claims about affiliation with a brick-and-mortar (established) company
Seller Repackaging
Delaying shipment in order to gain time to defraud other potential buyers
Transaction
Providing confusing text description 7
Including an image of the item that does not match the textual description
Product
Claiming that seller was away from home and now will ship product Seller
Claiming that the drop-shipping company had a problem
Claiming that the merchandise is no longer available and payment will be returned
Dazzling
Not responding to buyers’ inquiries after receiving a payment
Transaction
Stating that there is a problem with the product, but claiming that seller lacks the needed knowledge to diagnose the problem Product Stating that the price for the item is abnormally low because the seller is new to eBay and is seeking to build a quick, positive reputation Seller Red
Flagging Claiming that the seller does not accept a common method of payment because seller has problems with it 19 Transaction
Online Auction Deception Page 23
Table 2 Panel B - Showing (Simulating) Strategies Deception Strategies and Tactics and Example Application to eBay
Showing Tactics Potential Application to eBay Sellers
Case #
Domain of Application
Displaying an image from another seller 8 Selling stolen merchandise
Showing pictures of similar but not the described merchandise (alternative model, lack of options, absence of accessories)
Product
Using an ID that resembles an established and known seller 16 Falsely claiming to be an authorized dealer
Seller Mimicking
Offering a non-existent manufacturing warranty or not-honoring seller's personal guaranty 20
Transaction
Mailing different merchandise than that displayed in the listing Product Claiming innocence about negative feedback 17 Seller Luring a buyer off eBay to purchase an item through e-mail 21 Restricting bidders to pre-approved list
Inventing
Using "Submit best offer" option to lure buyers off eBay 23 Transaction
Focusing buyer's attention not on the item, but on a bonus that comes with the item
Product
Claiming that seller's account was compromised by hackers and that the seller did not sell disputed item
Seller
Listing conventional methods of payment on eBay page, but stating later in invoice that only Western Union or Money Gram payment will be accepted. 22
Decoying
Threatening the buyer with negative feedback, or, revealing negative information to eBay, the INS, IRS, or another governmental agency.
Transaction
Falsely minimizing merchandise's faults Product Claiming that the seller recently had trouble with one dishonest buyer who unjustly spoiled all the reputation feedback record to justify changing identities.
Seller Double Play
Stating in the description that listing is a test, but providing all the information and inviting buyers to contact the seller 24
Transaction
Online Auction Deception Page 24
Table 3 Study 2 Results - Frequency of Observed Strategies & Domains
Domain
Strategy Product Seller Transaction Row
Totals % by Row
Hiding 18 13 4 35 71.4% Showing 2 9 3 14 28.6% Column Totals 20 22 7 49 % by Column 40.8% 44.9% 14.3% 100.0%
χ2 (2) = 5.72, p = .06
Table 4 Study 2 Results – Pearson Correlations Among Variables (n = 31) Significant and marginally significant results (p ≤ .10) shown in bold
Hiding Cues Showing Cues Sales Price
Seller Ratio of Sell to Buy Transactions
Seller # of eBay Transactions
Showing Cues -0.18
Sales Price 0.02 0.32*
Seller Ratio of Sell to Buy Transactions
-0.33 0.59*** 0.20
Seller # of eBay Transactions
-0.33* 0.11 0.23 0.76***
Transaction Outcome (1 = success, 0 = not success)
0.00 0.37** 0.06 0.18 0.03
*** significant at p ≤ .01 ** significant at p ≤ .05 * significant at p ≤ .10