-
1
-
-
9144229518
-
Hope or hype: On the viability of escrow services as trusted third parties in online auction environments
-
Hu X, Lin Z, Whinston AB, Zhang H (2004) Hope or hype: On the viability of escrow services as trusted third parties in online auction environments. Inf Syst Res 15(3):236-249
-
(2004)
Inf Syst Res
, vol.15
, Issue.3
, pp. 236-249
-
-
Hu, X.1
Lin, Z.2
Whinston, A.B.3
Zhang, H.4
-
2
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inf Syst Res 15(1):37-59
-
(2004)
Inf Syst Res
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
3
-
-
0037408982
-
Building trust in online auction markets through an economic incentive mechanism
-
Ba S, Whinston AB, Zhang H (2003) Building trust in online auction markets through an economic incentive mechanism. Decis Support Syst 35(3):273-286
-
(2003)
Decis Support Syst
, vol.35
, Issue.3
, pp. 273-286
-
-
Ba, S.1
Whinston, A.B.2
Zhang, H.3
-
4
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618-644
-
(2007)
Decis Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
5
-
-
7244245467
-
Fighting internet auction fraud: An assessment and proposal
-
Chua CEH, Wareham J (2004) Fighting internet auction fraud: An assessment and proposal. IEEE Computer, pp. 31-37
-
(2004)
IEEE Computer
, pp. 31-37
-
-
Chua, C.E.H.1
Wareham, J.2
-
6
-
-
68349158205
-
Bidder beware: Toward a fraud-free marketplace-best practices for the online auction industry
-
Selis P, Ramasastry A, Wright CS (2001) Bidder beware: Toward a fraud-free marketplace-best practices for the online auction industry. Annual LCT Conference
-
(2001)
Annual LCT Conference
-
-
Selis, P.1
Ramasastry, A.2
Wright, C.S.3
-
11
-
-
68349126071
-
Fake escrow site scam widens: Auction winners sometimes lose $40,000
-
MSNBC, Dec 17 2002
-
Sullivan B (2002) Fake escrow site scam widens: Auction winners sometimes lose $40,000. MSNBC, Dec 17 2002
-
(2002)
-
-
Sullivan, B.1
-
12
-
-
85044841595
-
Client-side defense against web-based identity theft
-
In: San Diego
-
Chou N, Ledesma R, Teraguchi Y, Boneh D, Mitchell JC (2004) Client-side defense against web-based identity theft. In: Proceedings of the network and distributed system security symposium, San Diego
-
(2004)
Proceedings of the Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
15
-
-
68349142152
-
-
Fraud.org "Fraud Alert
-
Fraud.org "Fraud Alert, 2001, http://www.fraud.org/news/newsset.htm
-
(2001)
-
-
-
16
-
-
0242641140
-
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
-
Dellarocas C (2003) The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Manage Sci 49(10):1407-1424
-
(2003)
Manage Sci
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
17
-
-
29444459006
-
Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role
-
Pavlou PA, Gefen D (2005) Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Inf Syst Res 16(4):372-399
-
(2005)
Inf Syst Res
, vol.16
, Issue.4
, pp. 372-399
-
-
Pavlou, P.A.1
Gefen, D.2
-
18
-
-
13244298307
-
Internet users' information privacy concern (IUIPC): The construct, the scale, and a causal model
-
Malhotra NK, Kim SS, Agarwal J (2004) Internet users' information privacy concern (IUIPC): The construct, the scale, and a causal model. Inf Syst Res 15(4):336-355
-
(2004)
Inf Syst Res
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
20
-
-
27344439205
-
Spam: It's not just for inboxes anymore
-
Gyongyi Z, Garcia-Molina H (2005) Spam: It's not just for inboxes anymore. IEEE Comput 38(10):28-34
-
(2005)
IEEE Comput
, vol.38
, Issue.10
, pp. 28-34
-
-
Gyongyi, Z.1
Garcia-Molina, H.2
-
24
-
-
27344450109
-
Identification and comparison of extremist-group web forum messages using authorship analysis
-
Abbasi A, Chen H (2005) Identification and comparison of extremist-group web forum messages using authorship analysis. IEEE Intell Syst 20(5):67-75
-
(2005)
IEEE Intell Syst
, vol.20
, Issue.5
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
25
-
-
85064266519
-
Weblog classification for fast splog filtering: A URL language model segmentation approach
-
Salvetti F, Nicolov N (2006) Weblog classification for fast splog filtering: A URL language model segmentation approach. In: Proceedings of the human language technology conference, pp. 137-140
-
(2006)
Proceedings of the Human Language Technology Conference
, pp. 137-140
-
-
Salvetti, F.1
Nicolov, N.2
-
27
-
-
70350672544
-
Focused crawling using context graphs
-
In: Cairo, Egypt
-
Diligenti M, Coetzee FM, Lawrence S, Giles CL, Gori M (2000) Focused crawling using context graphs. In: Proceedings of the 26th conference on very large databases, Cairo, Egypt, pp. 527-534
-
(2000)
Proceedings of the 26th Conference on Very Large Databases
, pp. 527-534
-
-
Diligenti, M.1
Coetzee, F.M.2
Lawrence, S.3
Giles, C.L.4
Gori, M.5
-
28
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
Abbasi A, Chen H (2008) Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7
-
(2008)
ACM Trans Inf Syst
, vol.26
, Issue.2
, pp. 7
-
-
Abbasi, A.1
Chen, H.2
-
29
-
-
33644552803
-
A framework for authorship analysis of online messages: Writing-style features and techniques
-
Zheng R, Qin Y, Huang Z, Chen H (2006) A framework for authorship analysis of online messages: Writing-style features and techniques. J Am Soc Inf Sci Technol 57(3):378-393
-
(2006)
J Am Soc Inf Sci Technol
, vol.57
, Issue.3
, pp. 378-393
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
-
32
-
-
33745213523
-
From fingerprint to writeprint
-
Li J, Zheng R, Chen H (2006) From fingerprint to writeprint. Commun ACM 49(4):76-82
-
(2006)
Commun ACM
, vol.49
, Issue.4
, pp. 76-82
-
-
Li, J.1
Zheng, R.2
Chen, H.3
-
34
-
-
55949110596
-
CyberGate: A design framework and system for text analysis of computer- mediated communication
-
Abbasi A, Chen H (2008) CyberGate: A design framework and system for text analysis of computer- mediated communication. MIS Q 32(4):811-837
-
(2008)
MIS Q
, vol.32
, Issue.4
, pp. 811-837
-
-
Abbasi, A.1
Chen, H.2
-
36
-
-
84937183956
-
The application of principal component analysis to stylometry
-
Binongo JNG, Smith MWA (1999) The application of principal component analysis to stylometry. Lit Linguist Comput 14(4):445-466
-
(1999)
Lit Linguist Comput
, vol.14
, Issue.4
, pp. 445-466
-
-
Binongo, J.N.G.1
Smith, M.W.A.2
-
37
-
-
0028461417
-
Automated learning of decision rules for text categorization
-
Apte C, Damerau F, Weiss SM (1994) Automated learning of decision rules for text categorization. ACM Trans Inf Syst 12(3):233-251
-
(1994)
ACM Trans Inf Syst
, vol.12
, Issue.3
, pp. 233-251
-
-
Apte, C.1
Damerau, F.2
Weiss, S.M.3
-
38
-
-
34250091945
-
Learning quickly when irrelevant attributes are abound: A new linear threshold algorithm
-
Littlestone N (1988) Learning quickly when irrelevant attributes are abound: A new linear threshold algorithm. Mach Learn 2:285-318
-
(1988)
Mach Learn
, vol.2
, pp. 285-318
-
-
Littlestone, N.1
-
39
-
-
33744584654
-
Induction of decision trees
-
Quinlan R (1986) Induction of decision trees. Mach Learn 1(1):81-106
-
(1986)
Mach Learn
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, R.1
-
40
-
-
84985033441
-
Automatically categorizing written texts by author gender
-
Koppel M, Argamon S, Shimoni AR (2002) Automatically categorizing written texts by author gender. Lit Linguist Comput 17(4):401-412
-
(2002)
Lit Linguist Comput
, vol.17
, Issue.4
, pp. 401-412
-
-
Koppel, M.1
Argamon, S.2
Shimoni, A.R.3
-
41
-
-
0002096055
-
Studies in the history of probability and statistics: XI. Thomas bayes' essay towards solving a problem in the doctrine of chances
-
Bayes T (1958) Studies in the history of probability and statistics: XI. Thomas bayes' essay towards solving a problem in the doctrine of chances. Biometrika 45:293-295
-
(1958)
Biometrika
, vol.45
, pp. 293-295
-
-
Bayes, T.1
-
42
-
-
0036498398
-
A study of approaches to hypertext categorization
-
Yang Y, Slattery S, Ghani R (2002) A study of approaches to hypertext categorization. J Intell Inf Syst 18(2-3):219-241
-
(2002)
J Intell Inf Syst
, vol.18
, Issue.2-3
, pp. 219-241
-
-
Yang, Y.1
Slattery, S.2
Ghani, R.3
-
44
-
-
0001920992
-
Human expert-level performance on a scientific image analysis task by a system using combined artificial neural networks
-
In: Chan P (ed)
-
Cherkauer KJ (1996) Human expert-level performance on a scientific image analysis task by a system using combined artificial neural networks. In: Chan P (ed) Working notes of the AAAI workshop on integrating multiple learned models, pp. 15-21
-
(1996)
Working Notes of the AAAI Workshop on Integrating Multiple Learned Models
, pp. 15-21
-
-
Cherkauer, K.J.1
-
47
-
-
0242709390
-
Web site mining: A new way to spot competitors, customers, and suppliers in the world wide web
-
Ester M, Kriegel H, Schubert M (2002) Web site mining: A new way to spot competitors, customers, and suppliers in the world wide web. In: Proceedings of the 8th ACM SIGKDD, pp. 249-258
-
(2002)
Proceedings of the 8th ACM SIGKDD
, pp. 249-258
-
-
Ester, M.1
Kriegel, H.2
Schubert, M.3
-
48
-
-
0037213443
-
Text categorization based on k-nearest neighbor approach for web site classification
-
Kwon O, Lee J (2003) Text categorization based on k-nearest neighbor approach for web site classification. Inf Process Manage 39(1):25-44
-
(2003)
Inf Process Manage
, vol.39
, Issue.1
, pp. 25-44
-
-
Kwon, O.1
Lee, J.2
-
49
-
-
12144288329
-
Is combining classifiers with stacking better than selecting the best one?
-
Dzerosi S, Zenko B (2004) Is combining classifiers with stacking better than selecting the best one? Mach Learn 54(3):255-273
-
(2004)
Mach Learn
, vol.54
, Issue.3
, pp. 255-273
-
-
Dzerosi, S.1
Zenko, B.2
-
51
-
-
0027332773
-
Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches
-
Jackson D (1993) Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches. Ecology 74(8):2204-2214
-
(1993)
Ecology
, vol.74
, Issue.8
, pp. 2204-2214
-
-
Jackson, D.1
|