Computers and Security
Employment outsourcing in information systems
Communications of the ACM
Web security & commerce
Communications of the ACM
Communications of the ACM
Communications of the ACM
Information Quality Assurance and Internal Control for Management Decision Making
Information Quality Assurance and Internal Control for Management Decision Making
The Internet Security Guidebook: From Planning to Deployment
The Internet Security Guidebook: From Planning to Deployment
Communications of the ACM - Mobile computing opportunities and challenges
A rational choice model of computer and network crime
International Journal of Electronic Commerce
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Business Process Reengineering and Organizational Performance: An Exploration of Issues
International Journal of Information Management: The Journal for Information Professionals
Interpersonal Traits, Complementarity, and Trust in Virtual Collaboration
Journal of Management Information Systems
The Role of Reputation Systems in Reducing On-Line Auction Fraud
International Journal of Electronic Commerce
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact
International Journal of Electronic Commerce
Reputation and Dispute in eBay Transactions
International Journal of Electronic Commerce
Parasitism and Internet auction fraud: An exploration
Information and Organization
Determinants of online merchant rating: Content analysis of consumer comments about Yahoo merchants
Decision Support Systems
The Glitch in On-line Advertising: A Study of Click Fraud in Pay-Per-Click Advertising Programs
International Journal of Electronic Commerce
The Glitch in On-line Advertising: A Study of Click Fraud in Pay-Per-Click Advertising Programs
International Journal of Electronic Commerce
Smart marketing or bait & switch: competitors' brands as keywords in online advertising
Proceedings of the 4th workshop on Information credibility
Reputation inflation detection in a Chinese C2C market
Electronic Commerce Research and Applications
An investigation of email processing from a risky decision making perspective
Decision Support Systems
Counterfeit Products on the Internet: The Role of Seller-Level and Product-Level Information
International Journal of Electronic Commerce
Journal of Management Information Systems
Electronic Commerce Research and Applications
Computers in Human Behavior
Electronic Commerce Research and Applications
Hi-index | 0.00 |
Internet deception threatens the sustainability of Internet commerce because it undermines trust. This paper investigates the deceptive tactics available on the Internet and some of the factors that make them more or less likely to be adopted. An established theory of deception is applied to the Internet context to identify the deception tactics available on-line. The theory is then expanded with new hypotheses that link the selection of a specific tactic to the identity of the target and the purported identity of the deceiver. Content analysis of a broad range of documentary evidence published between 1995 and 2000 is used to build a database of 201 cases of Internet deception. Data from the database are used to test the hypotheses. The results suggest that deceivers select tactics as a function of their targets as well as their own purported identities. Practical implications for deterrence, prevention, and detection of Internet deception are discussed.