69 research outputs found

    Signed Latent Factors for Spamming Activity Detection

    Full text link
    Due to the increasing trend of performing spamming activities (e.g., Web spam, deceptive reviews, fake followers, etc.) on various online platforms to gain undeserved benefits, spam detection has emerged as a hot research issue. Previous attempts to combat spam mainly employ features related to metadata, user behaviors, or relational ties. These works have made considerable progress in understanding and filtering spamming campaigns. However, this problem remains far from fully solved. Almost all the proposed features focus on a limited number of observed attributes or explainable phenomena, making it difficult for existing methods to achieve further improvement. To broaden the vision about solving the spam problem and address long-standing challenges (class imbalance and graph incompleteness) in the spam detection area, we propose a new attempt of utilizing signed latent factors to filter fraudulent activities. The spam-contaminated relational datasets of multiple online applications in this scenario are interpreted by the unified signed network. Two competitive and highly dissimilar algorithms of latent factors mining (LFM) models are designed based on multi-relational likelihoods estimation (LFM-MRLE) and signed pairwise ranking (LFM-SPR), respectively. We then explore how to apply the mined latent factors to spam detection tasks. Experiments on real-world datasets of different kinds of Web applications (social media and Web forum) indicate that LFM models outperform state-of-the-art baselines in detecting spamming activities. By specifically manipulating experimental data, the effectiveness of our methods in dealing with incomplete and imbalanced challenges is valid

    Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms

    Get PDF
    Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers -- with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone Attacks (ICA) and Reconnaissance Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target\u27s resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for the RA to be efficient because well-known social networks, such as Facebook, have a policy to force people to use their real identities for their accounts. The goal of our research is to provide mechanisms to defend against colluding attackers in the presence of ICA and RA collusion attacks. In this work, we consider a scenario not addressed by previous works, wherein multiple attackers collude against the network, and propose defense mechanisms for such an attack. We take into account the asymmetric nature of social networks and include the case where colluders could add or modify some attributes of their clones. We also consider the case where attackers send few friend requests to uncover their targets. To detect fake reviews and uncovering colluders in crowdsourcing, we propose a semantic similarity measurement between reviews and a community detection algorithm to overcome the non-adversarial attack. ICA in a colluding attack may become stronger and more sophisticated than in a single attack. We introduce a token-based comparison and a friend list structure-matching approach, resulting in stronger identifiers even in the presence of attackers who could add or modify some attributes on the clone. We also propose a stronger RA collusion mechanism in which colluders build their own legitimacy by considering asymmetric relationships among users and, while having partial information of the networks, avoid recreating social circles around their targets. Finally, we propose a defense mechanism against colluding RA which uses the weakest person (e.g., the potential victim willing to accept friend requests) to reach their target

    Enhancing trustability in MMOGs environments

    Get PDF
    Massively Multiplayer Online Games (MMOGs; e.g., World of Warcraft), virtual worlds (VW; e.g., Second Life), social networks (e.g., Facebook) strongly demand for more autonomic, security, and trust mechanisms in a way similar to humans do in the real life world. As known, this is a difficult matter because trusting in humans and organizations depends on the perception and experience of each individual, which is difficult to quantify or measure. In fact, these societal environments lack trust mechanisms similar to those involved in humans-to-human interactions. Besides, interactions mediated by compute devices are constantly evolving, requiring trust mechanisms that keep the pace with the developments and assess risk situations. In VW/MMOGs, it is widely recognized that users develop trust relationships from their in-world interactions with others. However, these trust relationships end up not being represented in the data structures (or databases) of such virtual worlds, though they sometimes appear associated to reputation and recommendation systems. In addition, as far as we know, the user is not provided with a personal trust tool to sustain his/her decision making while he/she interacts with other users in the virtual or game world. In order to solve this problem, as well as those mentioned above, we propose herein a formal representation of these personal trust relationships, which are based on avataravatar interactions. The leading idea is to provide each avatar-impersonated player with a personal trust tool that follows a distributed trust model, i.e., the trust data is distributed over the societal network of a given VW/MMOG. Representing, manipulating, and inferring trust from the user/player point of view certainly is a grand challenge. When someone meets an unknown individual, the question is “Can I trust him/her or not?”. It is clear that this requires the user to have access to a representation of trust about others, but, unless we are using an open source VW/MMOG, it is difficult —not to say unfeasible— to get access to such data. Even, in an open source system, a number of users may refuse to pass information about its friends, acquaintances, or others. Putting together its own data and gathered data obtained from others, the avatar-impersonated player should be able to come across a trust result about its current trustee. For the trust assessment method used in this thesis, we use subjective logic operators and graph search algorithms to undertake such trust inference about the trustee. The proposed trust inference system has been validated using a number of OpenSimulator (opensimulator.org) scenarios, which showed an accuracy increase in evaluating trustability of avatars. Summing up, our proposal aims thus to introduce a trust theory for virtual worlds, its trust assessment metrics (e.g., subjective logic) and trust discovery methods (e.g., graph search methods), on an individual basis, rather than based on usual centralized reputation systems. In particular, and unlike other trust discovery methods, our methods run at interactive rates.MMOGs (Massively Multiplayer Online Games, como por exemplo, World of Warcraft), mundos virtuais (VW, como por exemplo, o Second Life) e redes sociais (como por exemplo, Facebook) necessitam de mecanismos de confiança mais autĂłnomos, capazes de assegurar a segurança e a confiança de uma forma semelhante Ă  que os seres humanos utilizam na vida real. Como se sabe, esta nĂŁo Ă© uma questĂŁo fĂĄcil. Porque confiar em seres humanos e ou organizaçÔes depende da percepção e da experiĂȘncia de cada indivĂ­duo, o que Ă© difĂ­cil de quantificar ou medir Ă  partida. Na verdade, esses ambientes sociais carecem dos mecanismos de confiança presentes em interacçÔes humanas presenciais. AlĂ©m disso, as interacçÔes mediadas por dispositivos computacionais estĂŁo em constante evolução, necessitando de mecanismos de confiança adequados ao ritmo da evolução para avaliar situaçÔes de risco. Em VW/MMOGs, Ă© amplamente reconhecido que os utilizadores desenvolvem relaçÔes de confiança a partir das suas interacçÔes no mundo com outros. No entanto, essas relaçÔes de confiança acabam por nĂŁo ser representadas nas estruturas de dados (ou bases de dados) do VW/MMOG especĂ­fico, embora Ă s vezes apareçam associados Ă  reputação e a sistemas de reputação. AlĂ©m disso, tanto quanto sabemos, ao utilizador nĂŁo lhe Ă© facultado nenhum mecanismo que suporte uma ferramenta de confiança individual para sustentar o seu processo de tomada de decisĂŁo, enquanto ele interage com outros utilizadores no mundo virtual ou jogo. A fim de resolver este problema, bem como os mencionados acima, propomos nesta tese uma representação formal para essas relaçÔes de confiança pessoal, baseada em interacçÔes avatar-avatar. A ideia principal Ă© fornecer a cada jogador representado por um avatar uma ferramenta de confiança pessoal que segue um modelo de confiança distribuĂ­da, ou seja, os dados de confiança sĂŁo distribuĂ­dos atravĂ©s da rede social de um determinado VW/MMOG. Representar, manipular e inferir a confiança do ponto de utilizador/jogador, Ă© certamente um grande desafio. Quando alguĂ©m encontra um indivĂ­duo desconhecido, a pergunta Ă© “Posso confiar ou nĂŁo nele?”. É claro que isto requer que o utilizador tenha acesso a uma representação de confiança sobre os outros, mas, a menos que possamos usar uma plataforma VW/MMOG de cĂłdigo aberto, Ă© difĂ­cil — para nĂŁo dizer impossĂ­vel — obter acesso aos dados gerados pelos utilizadores. Mesmo em sistemas de cĂłdigo aberto, um nĂșmero de utilizadores pode recusar partilhar informaçÔes sobre seus amigos, conhecidos, ou sobre outros. Ao juntar seus prĂłprios dados com os dados obtidos de outros, o utilizador/jogador representado por um avatar deve ser capaz de produzir uma avaliação de confiança sobre o utilizador/jogador com o qual se encontra a interagir. Relativamente ao mĂ©todo de avaliação de confiança empregue nesta tese, utilizamos lĂłgica subjectiva para a representação da confiança, e tambĂ©m operadores lĂłgicos da lĂłgica subjectiva juntamente com algoritmos de procura em grafos para empreender o processo de inferĂȘncia da confiança relativamente a outro utilizador. O sistema de inferĂȘncia de confiança proposto foi validado atravĂ©s de um nĂșmero de cenĂĄrios Open-Simulator (opensimulator.org), que mostrou um aumento na precisĂŁo na avaliação da confiança de avatares. Resumindo, a nossa proposta visa, assim, introduzir uma teoria de confiança para mundos virtuais, conjuntamente com mĂ©tricas de avaliação de confiança (por exemplo, a lĂłgica subjectiva) e em mĂ©todos de procura de caminhos de confiança (com por exemplo, atravĂ©s de mĂ©todos de pesquisa em grafos), partindo de uma base individual, em vez de se basear em sistemas habituais de reputação centralizados. Em particular, e ao contrĂĄrio de outros mĂ©todos de determinação do grau de confiança, os nossos mĂ©todos sĂŁo executados em tempo real

    Algorithmic Pricing:The Current State of Affairs from a Law and Economics Perspective

    Get PDF
    The rise of algorithmic pricing has transformed perfect price discrimination from a theoretical concept into a real possibility. Through self-learning pricingalgorithms, a strategy can be developed that approximates consumers’ reservation prices with ever-improving accuracy. This paper analyzes algorithmic pricing from a law and economics perspective to identify the efficiency and equity effects that the practice could cause and determine to which extent it is regulated under the current legal framework. This paper finds that under competitive market conditions, algorithmic pricing could be welcomed from an efficiency perspective, but from an equity and ethical perspective serious concerns need to be raised. If these concerns are to be taken seriously, the legal framework provides only a partially functional approach to address algorithmic pricing. Additional appropriate remedies are, therefore, needed to protect consumers adequately and effectively against exploitation that reduces their welfare

    Modern markets : competition in the 21st century

    Get PDF
    Defence date: 25 September 2023Examining board: Prof. Giacomo Calzolari (Eurooean University Institute, supervisor); Prof. David Levine (Eurooean University Institute, co-supervisor); Dr. Justus Haucap (DĂŒsseldorf Institute for Competition Economics (DICE)); Dr. Pierre Regibeau (European Commission)This thesis is composed of three independent chapters, the third of which consists of two separate but thematically related papers. In Chapter 1, I introduce a theoretical model of vertical integration with a novel demand structure to investigate the effect of vertical integration into Internet infrastructure on competition in digital markets. I find that pure infrastructure providers have an incentive to accommodate vertically integrated firms by becoming “commoditized” suppliers of infrastructure. My model explains new trends in digital markets and has implications for competition policy, industrial policy and political economy. In Chapter 2, I estimate the effects of crisis intensity and deregulation on home bias in procurement. Using a novel data set on the award of procurement contracts for medical supplies during the first wave of the Covid-19 pandemic in Europe, I study the propensity to award contracts internationally. I document a unique shift towards international procurement, driven by local spikes in infection rates and deregulation. In Chapter 3, I study the role of pricing algorithms in online marketplaces. Its first part is a joint article with Giacomo Calzolari that describes the algorithmic repricing industry. Based on a novel sample of 130 repricing companies, we study the prices and claimed attributes of pricing algorithms. We find that turn-key algorithmic pricing services are widely available, and discuss product features, fees, and associated services. The second part of Chapter 3 is a literature review on algorithmic pricing. I summarize findings from the economics literature covering computational, experimental, and empirical methods as well as adjacent fields. I argue that a lack of understanding of buyer responses to algorithmic pricing cycles and endogenous adoption of algorithmic pricing are the main gaps in the literature.-- 1. Internet infrastructure and competition in digital markets -- 2. Does buyer discretion facilitate home bias in procurement? Cross-border procurement of medical supplies under Covid-19 -- 3. Pricing algorithms out of the box: a study of the repricing industry -- 4. Algorithmic pricing - a literature review -- A. Appendix to chapter 1 -- B. Appendix to chapter 2 -- C. Appendix to chapter

    Resale price maintenance and the limits of Article 101 TFEU: reconsidering the application of EU competition law to vertical price restraints

    Get PDF
    The public policy towards minimum resale price maintenance (‘RPM’), or vertical price fixing, namely the practice whereby a manufacturer stipulates a retail price floor below which its products are not to be resold, has traditionally been one of the most contentious antitrust issues on both sides of the Atlantic. Economic theory suggests that RPM is capable of producing ambivalent welfare consequences, thus obscuring the intellectual debate as to the optimal antitrust response to the practice. This normative uncertainty is best reflected in the divergent approach taken to RPM under the relevant laws of the United States and the European Union, arguably the world’s two most mature antitrust jurisdictions. In 2007, in its seminal Leegin judgment, the United States Supreme Court abolished the century-old per se ban on vertical price fixing. At the same time, under the European Commission’s recent Guidelines on Vertical Restraints price floors remain subject to a quasi-conclusive presumption of illegality. The purpose of this thesis is to examine whether a more consistent approach through the relaxation of the European Commission’s blanket prohibition on price floors would be feasible and, in effect, desirable. Based on insights from new institutional economics, it will be argued that RPM may on certain occasions be a substitute – however imperfect – for vertical integration, where a merger would be prohibitively costly for the parties, in which case the hierarchical form of organisation will have to be replaced by a hybrid governance structure. Under certain circumstances, a fixed retail profit margin may enhance the self-enforcing range of long-term partnerships governed by relational norms, as well as the manufacturer’s control over distribution by reducing substantially the transaction costs associated with monitoring dealer performance. At the same time, however, the analysis will take into account the various objections to the practice, most notably the horizontal collusion theory, in order to argue that the approach to RPM should in principle be cautious. The discussion will culminate in the proposal for a new, workable analytical framework for the substantive assessment of vertical price fixing under EU competition law, which will be based on a – genuinely – rebuttable presumption of anti-competitive object under Article 101(1) of the Treaty on the Functioning of the European Union

    Regulating Vertical Agreements: a comparative law & economics analysis of Brazil and Europe

    Get PDF
    This research reviews the enforcement of the Brazilian and the EU antitrust policies oriented to vertical agreements from an institutional perspective. It has considered both the evolution of the legal framework and the application of the existing policies in practice. The thesis highlighted the main challenges of the current approaches taken by the competition authorities in these jurisdictions and formulated specific proposals for improvements. Because Brazilian competition rules were originally inspired by the European legal framework, this PhD research also resumes discussions regarding comparative law and the efficiency of transplanting laws and good practices
    • 

    corecore