메뉴 건너뛰기




Volumn 34, Issue SPEC. ISSUE 3, 2010, Pages 435-461

Detecting fake websites: The contribution of statistical learning theory

Author keywords

Design science; Fake website detection; Information systems development; Internet fraud; Statistical learning theory; Website classification

Indexed keywords

CLASSIFICATION (OF INFORMATION); CRIME; DESIGN; WEBSITES;

EID: 77957045434     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/25750686     Document Type: Article
Times cited : (193)

References (79)
  • 2
    • 55949110596 scopus 로고    scopus 로고
    • Cybergate: A design framework and system for text analysis of computer-mediated communication
    • Abbasi, A., and Chen, H. 2008a. "CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication,"MIS Quarterly (32:4), pp. 811-837.
    • (2008) MIS Quarterly , vol.32 , Issue.4 , pp. 811-837
    • Abbasi, A.1    Chen, H.2
  • 3
    • 42049084142 scopus 로고    scopus 로고
    • Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
    • Article 7.
    • Abbasi, A., and Chen, H. 2008b. "Writeprints: A Stylometric Approach to Identity-level Identification and Similarity Detection in Cyberspace," ACM Transactions on Information Systems (26:2), Article 7.
    • (2008) ACM Transactions on Information Systems , vol.26 , Issue.2
    • Abbasi, A.1    Chen, H.2
  • 4
    • 49049110756 scopus 로고    scopus 로고
    • Stylometric identification in electronic markets: Scalability and robustness
    • Abbasi, A., Chen, H., and Nunamaker Jr., J. F. 2008. "Stylometric Identification in Electronic Markets: Scalability and Robustness," Journal of Management Information Systems (25:1), pp. 49-79.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.1 , pp. 49-79
    • Abbasi, A.1    Chen, H.2    Nunamaker Jr., J.F.3
  • 5
    • 42049122994 scopus 로고    scopus 로고
    • Data mining challenges for electronic safety: The case of fraudulent intent detection in E-mails
    • Los Alamitos, CA: IEEE Computer Society
    • Airoldi, E., and Malin, B. 2004. "Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails," in Proceedings of the Workshop on Privacy and Security Aspects of Data Mining, Los Alamitos, CA: IEEE Computer Society, pp. 57-66.
    • (2004) Proceedings of the Workshop on Privacy and Security Aspects of Data Mining , pp. 57-66
    • Airoldi, E.1    Malin, B.2
  • 6
    • 34548392598 scopus 로고    scopus 로고
    • Enhancing information retrieval through statistical natural language processing: A study of collocation indexing
    • Arazy, O., and Woo, C. 2007. "Enhancing Information Retrieval Through Statistical Natural Language Processing: A Study of Collocation Indexing,"MIS Quarterly (31:3), pp. 525-546.
    • (2007) MIS Quarterly , vol.31 , Issue.3 , pp. 525-546
    • Arazy, O.1    Woo, C.2
  • 7
    • 0002096055 scopus 로고
    • Studies in the history of probability and statistics: XI. Thomas bayes' essay towards solving a problem in the doctrine of chances
    • Bayes, T. 1958. "Studies in the History of Probability and Statistics: XI. Thomas Bayes' Essay Towards Solving a Problem in the Doctrine of Chances," Biometrika (45), pp. 293-295.
    • (1958) Biometrika , vol.45 , pp. 293-295
    • Bayes, T.1
  • 8
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges, C. J. C. 1998. "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery (2), pp. 121-167.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 121-167
    • Burges, C.J.C.1
  • 10
    • 84863268449 scopus 로고    scopus 로고
    • Dynamic support vector machines for non-stationary time series forecasting
    • Cao, L., and Gu, Q. 2002. "Dynamic Support Vector Machines for Non-Stationary Time Series Forecasting," Intelligent Data Analysis (6:1), pp. 67-83.
    • (2002) Intelligent Data Analysis , vol.6 , Issue.1 , pp. 67-83
    • Cao, L.1    Gu, Q.2
  • 13
    • 7244245467 scopus 로고    scopus 로고
    • Fighting internet auction fraud: An assessment and proposal
    • Chua, C. E. H., and Wareham, J. 2004. "Fighting Internet Auction Fraud: An Assessment and Proposal," IEEE Computer (37:10), pp. 31-37.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 31-37
    • Chua, C.E.H.1    Wareham, J.2
  • 14
    • 38549173255 scopus 로고    scopus 로고
    • The role of online trading communities in managing internet auction fraud
    • Chua, C. E. H., Wareham, J., and Robey, D. 2007. "The Role of Online Trading Communities in Managing Internet Auction Fraud," MIS Quarterly (31:4), pp. 759-781.
    • (2007) MIS Quarterly , vol.31 , Issue.4 , pp. 759-781
    • Chua, C.E.H.1    Wareham, J.2    Robey, D.3
  • 16
    • 44249094423 scopus 로고    scopus 로고
    • Modeling web site design across cultures: Relationships to trust, satisfaction, and e-loyalty
    • Cyr, D. 2008. "Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty," Journal of Management Information Systems (24:4), pp. 47-72.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 47-72
    • Cyr, D.1
  • 17
    • 33749551929 scopus 로고    scopus 로고
    • Dinev, T. 2006. "Why Spoofing is Serious Internet Fraud," Communications of the ACM (49:10), pp. 76-82.
    • (2006) Communications of the ACM , vol.49 , Issue.10 , pp. 76-82
    • Dinev, T.1
  • 21
    • 33748583750 scopus 로고    scopus 로고
    • How presentation flaws affect perceived site quality, trust, and intention to purchase from an online store
    • Everard, A. P., and Galletta, D. F. 2005. "How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store," Journal of Management Information Systems (22:3), pp. 56-95.
    • (2005) Journal of Management Information Systems , vol.22 , Issue.3 , pp. 56-95
    • Everard, A.P.1    Galletta, D.F.2
  • 23
    • 2942731012 scopus 로고    scopus 로고
    • An extensive empirical study of feature selection metrics for text classification
    • Forman, G. 2003. "An Extensive Empirical Study of Feature Selection Metrics for Text Classification," Journal of Machine Learning Research (3), pp. 1289-1305.
    • (2003) Journal of Machine Learning Research , vol.3 , pp. 1289-1305
    • Forman, G.1
  • 24
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on earth mover's distance
    • Fu, A. Y., Liu, W., and Deng, X. 2006. "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)," IEEE Transactions on Dependable and Secure Computing (3:4), pp. 301-311.
    • (2006) IEEE Transactions on Dependable and Secure Computing (3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Liu, W.2    Deng, X.3
  • 25
    • 15044354915 scopus 로고    scopus 로고
    • Managing user trust in B2C e-services
    • Gefen, D., and Straub, D. 2003. "Managing User Trust in B2C e-Services," eService Journal (2:2), pp. 7-24.
    • (2003) EService Journal , vol.2 , Issue.2 , pp. 7-24
    • Gefen, D.1    Straub, D.2
  • 26
    • 0034226904 scopus 로고    scopus 로고
    • Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
    • Grazioli, S., and Jarvenpaa, S. L. 2000. "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and Cybernetics Part A (20:4), pp. 395-410.
    • (2000) IEEE Transactions on Systems Man and Cybernetics Part A , vol.20 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.L.2
  • 27
    • 33745561205 scopus 로고    scopus 로고
    • An introduction to variable and feature selection
    • Guyon, I., and Elisseeff, A. 2003. "An Introduction to Variable and Feature Selection," Journal of Machine Learning Research (3), pp. 1157-1182.
    • (2003) Journal of Machine Learning Research , vol.3 , pp. 1157-1182
    • Guyon, I.1    Elisseeff, A.2
  • 28
    • 27344439205 scopus 로고    scopus 로고
    • Spam: It's not just for inboxes anymore
    • Gyongyi, Z., and Garcia-Molina, H. 2005. "Spam: It's Not Just for Inboxes Anymore," IEEE Computer (38:10), pp. 28-34.
    • (2005) IEEE Computer , vol.38 , Issue.10 , pp. 28-34
    • Gyongyi, Z.1    Garcia-Molina, H.2
  • 30
    • 0242652022 scopus 로고    scopus 로고
    • Design science in information systems research
    • Hevner, A. R., March, S. T., Park, J., and Ram, S. 2004. "Design Science in Information Systems Research," MIS Quarterly (28:1), pp. 75-105.
    • (2004) MIS Quarterly , vol.28 , Issue.1 , pp. 75-105
    • Hevner, A.R.1    March, S.T.2    Park, J.3    Ram, S.4
  • 31
    • 77957082458 scopus 로고    scopus 로고
    • Trends in cybercrime: The darkside of the internet
    • Hoar, S. B. 2005. "Trends in Cybercrime: The Darkside of the Internet," Criminal Justice (20:3), pp. 4-13.
    • (2005) Criminal Justice , vol.20 , Issue.3 , pp. 4-13
    • Hoar, S.B.1
  • 34
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jesang, A., Ismail, R., and Boyd, C. 2007. "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems (43:2), pp. 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jesang, A.1    Ismail, R.2    Boyd, C.3
  • 36
    • 0036015968 scopus 로고    scopus 로고
    • Applying the technology acceptance model and flow theory to online consumer behavior
    • Koufaris, M. 2002. "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior," Information Systems Research (13:2), pp. 205-223.
    • (2002) Information Systems Research , vol.13 , Issue.2 , pp. 205-223
    • Koufaris, M.1
  • 37
    • 0030653064 scopus 로고    scopus 로고
    • Authorship analysis: Identifying the author of a program
    • Krsul, I., and Spafford, H. E. 1997. "Authorship Analysis: Identifying the Author of a Program," Computer Security (16:3), pp. 233-257.
    • (1997) Computer Security , vol.16 , Issue.3 , pp. 233-257
    • Krsul, I.1    Spafford, H.E.2
  • 38
    • 2342532313 scopus 로고    scopus 로고
    • Criminals become tech savvy
    • Levy, E. 2004. "Criminals Become Tech Savvy," IEEE Security and Privacy (2:2), pp. 65-68.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.2 , pp. 65-68
    • Levy, E.1
  • 39
    • 34249853668 scopus 로고    scopus 로고
    • Usability evaluation of anti-phishing toolbars
    • Li, L., and Helenius, M. 2007. "Usability Evaluation of Anti-Phishing Toolbars," Journal in Computer Virology (3:2), pp. 163-184.
    • (2007) Journal in Computer Virology , vol.3 , Issue.2 , pp. 163-184
    • Li, L.1    Helenius, M.2
  • 40
    • 34250091945 scopus 로고
    • Learning quickly when irrelevantattributes are abound: A new linear threshold algorithm
    • Littlestone, N. 1988. "Learning Quickly When IrrelevantAttributes are Abound: A New Linear Threshold Algorithm," Machine Learning (2), pp. 285-318.
    • (1988) Machine Learning , vol.2 , pp. 285-318
    • Littlestone, N.1
  • 41
    • 33645131523 scopus 로고    scopus 로고
    • An anti-phishing strategy based on visual similarity assessment
    • Liu, W., Deng, X., Huang, G., and Fu, A. Y. 2006. "An Anti-phishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing (10:2), pp. 58-65.
    • (2006) IEEE Internet Computing , vol.10 , Issue.2 , pp. 58-65
    • Liu, W.1    Deng, X.2    Huang, G.3    Fu, A.Y.4
  • 43
    • 44249091185 scopus 로고    scopus 로고
    • Explaining and predicting the impact of brand alliances and web site quality on initial consumer trust of E-commerce web sites
    • Lowry, P. B., Vance, A., Moody, G., Beckman, B., and Read, A. 2008. "Explaining and Predicting the Impact of Brand Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites," Journal of Management Information Systems (24:4), pp. 199-224.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 199-224
    • Lowry, P.B.1    Vance, A.2    Moody, G.3    Beckman, B.4    Read, A.5
  • 45
    • 13244298307 scopus 로고    scopus 로고
    • Internet Users' Information Privacy Concern (IUIPC): The construct, the scale, and a causal model
    • Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet Users' Information Privacy Concern (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research (15:4), pp. 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 46
    • 0029537737 scopus 로고
    • Design and natural science research on information technology
    • March, S. T., and Smith, G. 1995. "Design and Natural Science Research on Information Technology," Decision Support Systems (15:4), pp. 251-266.
    • (1995) Decision Support Systems , vol.15 , Issue.4 , pp. 251-266
    • March, S.T.1    Smith, G.2
  • 47
    • 0012741362 scopus 로고    scopus 로고
    • A design theory for systems that support emergent knowledge processes
    • Markus, M. L., Majchrzak, A., and Gasser, L. 2002. "A Design Theory for Systems that Support Emergent Knowledge Processes," MIS Quarterly (26:3), pp. 179-212.
    • (2002) MIS Quarterly , vol.26 , Issue.3 , pp. 179-212
    • Markus, M.L.1    Majchrzak, A.2    Gasser, L.3
  • 48
    • 77957033680 scopus 로고    scopus 로고
    • FTC, businesses renewing fight against ID theft
    • September 3.
    • McGuire, D. 2003. "FTC, Businesses Renewing Fight Against ID Theft," Washington Post, September 3.
    • (2003) Washington Post
    • McGuire, D.1
  • 49
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for E-commerce
    • McKnight, D. H., Choudhury, V., and Kacmar, C. 2002. "Developing and Validating Trust Measures for E-commerce," Information Systems Research (13:3), pp. 334-359.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 334-359
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 50
    • 0242288813 scopus 로고    scopus 로고
    • The support vector machine under test
    • Meyer, D., Leisch, F., and Hornik, K. 2003. "The Support Vector Machine Under Test," Neurocomputing (55:1-2), pp. 169-186.
    • (2003) Neurocomputing , vol.55 , Issue.1-2 , pp. 169-186
    • Meyer, D.1    Leisch, F.2    Hornik, K.3
  • 53
    • 1242295725 scopus 로고
    • Build and learn, evaluate and learn
    • Nunamaker, Jr., J. F. 1992. "Build and Learn, Evaluate and Learn," Informatica (1:1)
    • (1992) Informatica , vol.1 , Issue.1
    • Nunamaker Jr., J.F.1
  • 56
    • 29444459006 scopus 로고    scopus 로고
    • Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role
    • Pavlou, P. A., and Gefen, D. 2005. "Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role," Information Systems Research (16:4), pp. 372-399.
    • (2005) Information Systems Research , vol.16 , Issue.4 , pp. 372-399
    • Pavlou, P.A.1    Gefen, D.2
  • 57
    • 33744584654 scopus 로고
    • Quinlan, R. 1986. "Induction of Decision Trees," Machine Learning (1:1), pp. 81-106.
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, R.1
  • 58
    • 85088336756 scopus 로고    scopus 로고
    • nd ed.) Upper Saddle River, NJ: Prentice Hall.
    • nd ed.), Upper Saddle River, NJ: Prentice Hall.
    • (2003)
    • Russell, S.J.1    Norvig, P.2
  • 59
    • 85064266519 scopus 로고    scopus 로고
    • Weblog classification for fast splog filtering: A URL language model segmentation approach
    • New York, June 4-9
    • Salvetti, F., and Nicolov, N. 2006. "Weblog Classification for Fast Splog Filtering: A URL Language Model Segmentation Approach," in Proceedings of the Human Language Technology Conference, New York, June 4-9, pp. 137-140.
    • (2006) Proceedings of the Human Language Technology Conference , pp. 137-140
    • Salvetti, F.1    Nicolov, N.2
  • 60
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • Sebastiani, F. 2002. "Machine Learning in Automated Text Categorization," ACM Computing Surveys (34:1), pp. 1-47.
    • (2002) ACM Computing Surveys , vol.34 , Issue.1 , pp. 1-47
    • Sebastiani, F.1
  • 62
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C. E. 1948. "A Mathematical Theory of Communication," Bell Systems Technical Journal (27:10), pp. 379-423.
    • (1948) Bell Systems Technical Journal , vol.27 , Issue.10 , pp. 379-423
    • Shannon, C.E.1
  • 68
    • 2142643698 scopus 로고    scopus 로고
    • A support vector machine with a hybrid kernel and minimal vapnik-chervonenkis dimension
    • Tan, Y., and Wang, J. 2004. "A Support Vector Machine with a Hybrid Kernel and Minimal Vapnik-Chervonenkis Dimension," IEEE Transactions on Knowledge and Data Engineering (16:4), pp. 385-395.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.4 , pp. 385-395
    • Tan, Y.1    Wang, J.2
  • 71
    • 0032594959 scopus 로고    scopus 로고
    • An overview of statistical learning theory
    • Vapnik, V. 1999b. "An Overview of Statistical Learning Theory," IEEE Transactions on Neural Networks (10:5), pp. 988-999.
    • (1999) IEEE Transactions on Neural Networks , vol.10 , Issue.5 , pp. 988-999
    • Vapnik, V.1
  • 72
    • 0002430582 scopus 로고
    • Building an information system design theory for vigilant EIS
    • Walls, J. G., Widmeyer, G. R., and El Sawy, O. A. 1992. "Building an Information System Design Theory for Vigilant EIS," Information Systems Research (3:1), pp. 36-59.
    • (1992) Information Systems Research , vol.3 , Issue.1 , pp. 36-59
    • Walls, J.G.1    Widmeyer, G.R.2    El Sawy, O.A.3
  • 79
    • 30344452268 scopus 로고    scopus 로고
    • Localization site prediction for membrane proteins by integrating rule and svm classification
    • Zhou, S., and Wang, K. 2005. "Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification," IEEE Transactions on Knowledge and Data Engineering (17:12), pp. 1694-1705.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.12 , pp. 1694-1705
    • Zhou, S.1    Wang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.