政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/131498
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113148/144119 (79%)
造访人次 : 50711264      在线人数 : 303
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/131498


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/131498


    题名: 網路拍賣價格哄抬偵測之研究
    Detection of Shill Bidding in Online Auctions
    作者: 張成家
    Chang, Cheng-Chia
    贡献者: 梁定澎
    莊皓鈞

    Liang, Ting-Peng
    Chuang, Hao-Chun

    張成家
    Chang, Cheng-Chia
    关键词: 網路拍賣
    哄抬物價
    出價行為
    集群分析
    資料探勘
    Online Auction
    Shill Bidding
    Bidding Behavior
    Cluster Analysis
    Data Mining
    日期: 2020
    上传时间: 2020-09-02 11:47:29 (UTC+8)
    摘要: 網路上購物早已成為現代人的習慣,然由於網路上匿名的虛擬帳號,無法確認其身分和過去的交易資訊,使用者得在網路拍賣上進行不當行為,尤其是常見的蓄意哄抬價格,賣家為了謀利,造成買家損失。
    為了偵測價格哄抬之行為,過去學者透過六個出價行為變數,計算買家可能價格哄抬之機率,變數包含(1)買家參與同一位賣家拍賣之比率;(2)出價次數;(3)得標次數;(4)出價時間;(5)出價增額;(6)進入拍賣的時間。過去研究多使用以上六個行為變數做分群,分群完再計算買家的價格哄抬機率分數,並以平均哄抬機率分數用來評估分群之型態,找出可能價格哄抬集群,此方法衍伸之問題有(1)價格哄抬機率公式之權重為主觀設定,(2)價格哄抬評分與分群為獨立的。
    本研究提出一個同步評分與分群模型,以整數規劃方法,同時最佳化價格哄抬機率公式權重和分群的組成,透過數據導向的方法,達到分群最佳化,產生的價格哄抬機率,自然地成為每個買家的標籤。使用eBay的真實資料來測試並評估方法的有效性,拍賣網站能根據研究結果,辨識出可能的價格哄抬者,對價格哄抬此一不當行為提出較好的解決辦法,加以防制,保障出價者免於過度付出成本,同時解決過去文獻中,哄抬機率公式權重不一的問題。
    Online shopping has become a habit of modern people. Because online accounts are anonymous, they cannot confirm their identity and past transactions. Users can conduct improper behavior in online auctions, especially common deliberate shilling. The sellers’ making a profit will result in the buyers’ losses.
    In order to detect the behavior of shilling, scholars used six bidding behavior variables to score the probability of shilling. The variables include (1) ratio of bidding to the same seller’s auction, (2) frequency of bidding, (3) number of bids won, (4) Time of bidding, (5) increment of bidding, (6) time to enter the auction. In the past studies, the above six behavioral variables were used for clustering. After clustering, the probability of buyer`s shilling was calculated. Average shilling score of each group was evaluated what kind of type of the group is and find the possible group. This method extends the problem. There are (1) the weights of the formula for the calculating probability of shilling are set subjectively, and (2) scoring probability of shilling and clustering are independent.
    This research proposes a simultaneous scoring and grouping model, using an integer programming method, while optimizing the weight of the price bidding probability formula and the composition of the groupings. Through a data-oriented method, the grouping optimization is achieved. The resulting price bidding probability naturally becomes labels for each buyer. Use eBay’s real data set to test and evaluate the effectiveness of the model. The auction website can identify possible shilling buyer based on the research results, propose better solutions to prevent them, avoid over-paying costs, and at the same time solve the problem of inconsistent weighting of formulas in the past literature.
    參考文獻: 劉羿君. (2017). 網路拍賣出價行為與價格哄抬之分群研究. 國立中山大學資訊管理學系研究所學位論文
    楊文菁. (2004). 消費性網路競標策略之影響因素. 國立中山大學傳播管理研究所碩士論文.
    Brest, J., Greiner, S., Boskovic, B., Mernik, M., & Zumer, V. (2006). Self-adapting control parameters in differential evolution: A comparative study on numerical benchmark problems. IEEE transactions on evolutionary computation, 10(6), 646-657.
    Chakraborty, I., & Kosmopoulou, G. (2004). Auctions with shill bidding. Economic Theory, 24(2), 271-287.
    Chua, C. E. H., & Wareham, J. (2002, December). Self-regulation for online auctions: An analysis. In Proceedings of the Twenty-Third International Conference on Information Systems (pp. 115-125).
    Dholakia, U. M., Basuroy, S., & Soltysinski, K. (2002). Auction or agent (or both)? A study of moderators of the herding bias in digital auctions. International Journal of Research in Marketing, 19(2), 115-130.
    Kalakota, R., & Whinston, A. B. (1997). Electronic commerce: a manager`s guide. Addison-Wesley Professional.
    Kelley, C. T. (1999). Iterative methods for optimization. Society for Industrial and Applied Mathematics.
    Kochenderfer, M. J., & Wheeler, T. A. (2019). Algorithms for optimization. Mit Press.
    Krishna, V. (2009). Auction theory. Academic press.
    Liang, T. P., & Doong, H. S. (2000). Effect of bargaining in electronic commerce. International Journal of Electronic Commerce, 4(3), 23-43.
    Lucking‐Reiley, D. (2000). Auctions on the Internet: What’s being auctioned, and how?. The journal of industrial economics, 48(3), 227-252.
    McAfee, R. P., & McMillan, J. (1987). Auctions and bidding. Journal of economic literature, 25(2), 699-738.
    Runarsson, T. P., & Yao, X. (2000). Stochastic ranking for constrained evolutionary optimization. IEEE Transactions on evolutionary computation, 4(3), 284-294.
    Steven G. Johnson, The NLopt nonlinear-optimization package, http://ab-initio.mit.edu/nlopt
    Trevathan, J. (2009). Detecting shill bidding in online English auctions. In Handbook of research on social and organizational liabilities in information security (pp. 446-470). IGI Global.
    Trevathan, J., & Read, W. (2007, April). A simple shill bidding agent. In Fourth International Conference on Information Technology (ITNG`07) (pp. 766-771). IEEE.
    Trevathan, J., & Read, W. (2007, April). Detecting collusive shill bidding. In Fourth International Conference on Information Technology (ITNG`07) (pp. 799-808). IEEE.
    Tsang, S., Koh, Y. S., Dobbie, G., & Alam, S. (2014). Detecting online auction shilling frauds using supervised learning. Expert systems with applications, 41(6), 3027-3040.
    Turban, E. (1997). Auctions and bidding on the Internet: An assessment. Electronic Markets, 7(4), 7-11.
    Wang, W., Hidvégi, Z., & Whinston, A. B. (2001). Shill bidding in English auctions. Emory University and the University of Texas at Austin, mimeo.
    描述: 碩士
    國立政治大學
    資訊管理學系
    107356028
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0107356028
    数据类型: thesis
    DOI: 10.6814/NCCU202001556
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    602801.pdf2645KbAdobe PDF20检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈