IS

Abbasi, Ahmed

Topic Weight Topic Terms
1.132 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.479 intelligence business discovery framework text knowledge new existing visualization based analyzing mining genetic algorithms related
0.279 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.187 online uncertainty reputation sellers buyers seller marketplaces markets marketplace buyer price signaling auctions market premiums
0.171 communication media computer-mediated e-mail richness electronic cmc mail medium message performance convergence used communications messages
0.171 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy
0.165 design systems support development information proposed approach tools using engineering current described developing prototype flexible
0.162 identity norms identification symbolic community help sense european social important verification set identities form obtained
0.159 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social
0.155 information systems paper use design case important used context provide presented authors concepts order number
0.141 electronic markets commerce market new efficiency suppliers internet changes marketplace analysis suggests b2b marketplaces industry
0.122 financial crisis reporting report crises turnaround intelligence reports cash forecasting situations time status adequately weaknesses
0.118 methods information systems approach using method requirements used use developed effective develop determining research determine
0.117 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.106 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.103 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Chen, Hsinchun 4 Nunamaker, Jr., Jay F. 3 Albrecht, Conan 1 Chen, Yan 1
Hansen, James 1 Vance, Anthony 1 Zhang, Zhu 1 Zimbra, David 1
Zahedi, Fatemeh Mariam 1 Zeng, Daniel 1
design science 4 Internet fraud 2 anti-aliasing 1 business intelligence 1
Computer-mediated communication 1 credibility assessment 1 design framework 1 data mining 1
electronic markets 1 Fake website detection 1 feature construction 1 financial statement fraud 1
Fraud detection 1 genre theory 1 information visualization 1 information systems development 1
meta-learning 1 online trust 1 phishing websites 1 phishing 1
statistical learning theory 1 stylometry 1 text analysis systems 1 Website classification 1
website genres 1

Articles (5)

Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Phishing websites continue to successfully exploit user vulnerabilities in household and enterprise settings. Existing anti-phishing tools lack the accuracy and generalizability needed to protect Internet users and organizations from the myriad of attacks encountered daily. Consequently, users often disregard these tools' warnings. In this study, using a design science approach, we propose a novel method for detecting phishing websites. By adopting a genre theoretic perspective, the proposed genre tree kernel method utilizes fraud cues that are associated with differences in purpose between legitimate and phishing websites, manifested through genre composition and design structure, resulting in enhanced anti-phishing capabilities. To evaluate the genre tree kernel method, a series of experiments were conducted on a testbed encompassing thousands of legitimate and phishing websites. The results revealed that the proposed method provided significantly better detection capabilities than state-of-the-art anti-phishing methods. An additional experiment demonstrated the effectiveness of the genre tree kernel technique in user settings; users utilizing the method were able to better identify and avoid phishing websites, and were consequently less likely to transact with them. Given the extensive monetary and social ramifications associated with phishing, the results have important implications for future anti-phishing strategies. More broadly, the results underscore the importance of considering intention/purpose as a critical dimension for automated credibility assessment: focusing not only on the ÒwhatÓ but rather on operationalizing the ÒwhyÓ into salient detection cues. > >
METAFRAUD: A META-LEARNING FRAMEWORK FOR DETECTING FINANCIAL FRAUD. (MIS Quarterly, 2012)
Authors: Abstract:
    Financial fraud can have serious ramifications for the long-term sustainability of an organization, as well as adverse effects on its employees and investors, and on the economy as a whole. Several of the largest bankruptcies in U.S. history involved firms that engaged in major fraud. Accordingly, there has been considerable emphasis on the development of automated approaches for detecting financial fraud. However, most methods have yielded performance results that are less than ideal. In consequence, financial fraud detection continues as an important challenge for business intelligence technologies. In light of the need for more robust identification methods, we use a design science approach to develop MetaFraud, a novel meta-learning framework for enhanced financial fraud detection. To evaluate the proposed framework, a series of experiments are conducted on a test bed encompassing thousands of legitimate and fraudulent firms. The results reveal that each component of the framework significantly contributes to its overall effectiveness. Additional experiments demonstrate the effectiveness of the meta-learning framework over state-of-the-art financial fraud detection methods. Moreover, the MetaFraud framework generates confidence scores associated with each prediction that can facilitate unprecedented financial fraud detection performance and serve as a useful decision-making aid. The results have important implications for several stakeholder groups, including compliance officers, investors, audit firms, and regulators.
DETECTING FAKE WEBSITES: THE CONTRIBUTION OF STATISTICAL LEARNING THEORY. (MIS Quarterly, 2010)
Authors: Abstract:
    Fake websites have become increasingly pervasive, generating billions of dollars in fraudulent revenue at the expense of unsuspecting Internet users. The design and appearance of these websites makes it difficult for users to manually identify them as fake. Automated detection systems have emerged as a mechanism for combating fake websites, however most are fairly simplistic in terms of their fraud cues and detection methods employed. Consequently, existing systems are susceptible to the myriad of obfuscation tactics used by fraudsters, resulting in highly ineffective fake website detection performance. In light of these deficiencies, we propose the development of a new class of fake website detection systems that are based on statistical learning theory (SLT). Using a design science approach, a prototype system was developed to demonstrate the potential utility of this class of systems. We conducted a series of experiments, comparing the proposed system against several existing fake website detection systems on a test bed encompassing 900 websites. The results indicate that systems grounded in SLT can more accurately detect various categories of fake websites by utilizing richer sets of fraud cues in combination with problem-specific knowledge. Given the hefty cost exacted by fake websites, the results have important implications for e-commerce and online security.
Stylometric Identification in Electronic Markets: Scalability and Robustness. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Online reputation systems are intended to facilitate the propagation of word of mouth as a credibility scoring mechanism for improved trust in electronic marketplaces. However, they experience two problems attributable to anonymity abuse--easy identity changes and reputation manipulation. In this study, we propose the use of stylometric analysis to help identify online traders based on the writing style traces inherent in their posted feedback comments. We incorporated a rich stylistic feature set and developed the Writeprint technique for detection of anonymous trader identities. The technique and extended feature set were evaluated on a test bed encompassing thousands of feedback comments posted by 200 eBay traders. Experiments conducted to assess the scalability (number of traders) and robustness (against intentional obfuscation) of the proposed approach found it to significantly outperform benchmark stylometric techniques. The results indicate that the proposed method may help militate against easy identity changes and reputation manipulation in electronic markets.
CYBERGATE: A DESIGN FRAMEWORK AND SYSTEM FOR TEXT ANALYSIS OF COMPUTER-MEDIATED COMMUNICATION. (MIS Quarterly, 2008)
Authors: Abstract:
    Content analysis of computer-mediated communication (CMC) is important for evaluating the effectiveness of electronic communication in various organizational settings. CMC text analysis relies on systems capable of providing suitable navigation and knowledge discovery functionalities. However, existing CMC systems focus on structural features, with little support for features derived from message text. This deficiency is attributable to the informational richness and representational complexities associated with CMC text. In order to address this shortcoming, we propose a design framework for CMC text analysis systems. Grounded in systemic functional linguistic theory, the proposed framework advocates the development of systems capable of representing the rich array of information types inherent in CMC text. It also provides guidelines regarding the choice of features, feature selection, and visualization techniques that CMC text analysis systems should employ. The CyberGate system was developed as an instantiation of the design framework. CyberGate incorporates a rich feature set and complementary feature selection and visualization methods, including the writeprints and ink blots techniques. An application example was used to illustrate the system's ability to discern important patterns in CMC text. Furthermore, results from numerous experiments conducted in comparison with benchmark methods confirmed the viability of CyberGate's features and techniques. The results revealed that the CyberGate system and its underlying design framework can dramatically improve CMC text analysis capabilities over those provided by existing systems.