Author List: Lappas, Theodoros; Sabnis, Gaurav; Valkanas, Georgios;
Information Systems Research, 2016, Volume 27, Issue 4, Page 940_961.
Extant research has focused on the detection of fake reviews on online review platforms, motivated by the well-documented impact of customer reviews on the users' purchase decisions. The problem is typically approached from the perspective of protecting the credibility of review platforms, as well as the reputation and revenue of the reviewed firms. However, there is little examination of the vulnerability of individual businesses to fake review attacks. This study focuses on formalizing the visibility of a business to the customer base and on evaluating its vulnerability to fake review attacks. We operationalize visibility as a function of the features that a business can cover and its position in the platform's review-based ranking. Using data from over 2.3 million reviews of 4,709 hotels from 17 cities, we study how visibility can be impacted by different attack strategies. We find that even limited injections of fake reviews can have a significant effect and explore the factors that contribute to this vulnerable state. Specifically, we find that, in certain markets, 50 fake reviews are sufficient for an attacker to surpass any of its competitors in terms of visibility. We also compare the strategy of self-injecting positive reviews with that of injecting competitors with negative reviews and find that each approach can be as much as 40% more effective than the other across different settings. We empirically explore response strategies for an attacked hotel, ranging from the enhancement of its own features to detecting and disputing fake reviews. In general, our measure of visibility and our modeling approach regarding attack and response strategies shed light on how businesses that are targeted by fake reviews can detect and tackle such attacks.
Keywords: customer reviews; fake reviews; knowledge management; vulnerability assessment; decision support systems
Algorithm:

List of Topics

#199 0.198 reviews product online review products wom consumers consumer ratings sales word-of-mouth impact reviewers word using effect marketing helpfulness electronic commerce
#56 0.183 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#7 0.175 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators science important theory performance improved
#220 0.102 research study different context findings types prior results focused studies empirical examine work previous little knowledge sources implications specifically provide
#103 0.071 exploration climate technology empowerment explore features trying use employees intention examining work intentions exploring autonomy exploitation innovate feature understanding individual
#10 0.061 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective affect employ particular online control