Undesirable and Fraudulent Behaviour in Online Auctions

Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In addition, an outsider or rival seller can lure away bidders by directly offering them better deals, or a malicious seller can auction mis-represented or non-existent items. This conduct is a problem as it results in market failure, thereby inhibiting the usefulness of online auctions as an exchange medium. While cryptography has been used to provide security in terms of bid authentication and privacy, there is no documented means to prevent many of the aforementioned problems. This paper investigates undesirable and fraudulent behaviour in online auctions. We examine the following practices: bid shielding, shill bidding, bid sniping, siphoning and selling non-existent or misrepresented items. We describe the characteristics of such behaviour and how to identify it in an auction. We also provide recommendations for recourse against undesirable and fraudulent participants.

[1]  Matthew K. Franklin,et al.  The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..

[2]  Paul F. Syverson,et al.  Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.

[3]  Ed Dawson,et al.  A Three Phased Schema for Sealed Bid Auction System Design , 2000, ACISP.

[4]  Andrew B. Whinston,et al.  Shill bidding in multi-round online auctions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[5]  Ashish Sureka,et al.  Mining for bidding strategies on ebay , 2003 .

[6]  Jarrod Trevathan,et al.  Design issues for electronic auctions , 2005, ICETE.

[7]  Jarrod Trevathan,et al.  RAS: a system for supporting research in online auctions , 2006, CROS.

[8]  Jarrod Trevathan,et al.  An Anonymous and Secure Continuous Double Auction Scheme , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).