{"id":"https://openalex.org/W4407247843","doi":"https://doi.org/10.1109/aibthings63359.2024.10863078","title":"A Thematic Analysis and Detection of Fraudulent Online Ratings","display_name":"A Thematic Analysis and Detection of Fraudulent Online Ratings","publication_year":2024,"publication_date":"2024-09-07","ids":{"openalex":"https://openalex.org/W4407247843","doi":"https://doi.org/10.1109/aibthings63359.2024.10863078"},"language":"en","primary_location":{"id":"doi:10.1109/aibthings63359.2024.10863078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aibthings63359.2024.10863078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116188877","display_name":"Sivani Chava","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sivani Chava","raw_affiliation_strings":["University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019060398","display_name":"Isaac Kofi Nti","orcid":"https://orcid.org/0000-0001-9257-4295"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Issac Kofi Nti","raw_affiliation_strings":["University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053076513","display_name":"Murat \u00d6zer","orcid":"https://orcid.org/0000-0002-2518-3398"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murat Ozer","raw_affiliation_strings":["University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,School of Information Technology (SoIT),Cincinnati,Ohio,USA,45220","institution_ids":["https://openalex.org/I63135867"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116188877"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43366777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/thematic-map","display_name":"Thematic map","score":0.5898231863975525},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5737283229827881},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.4404163956642151},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33911916613578796},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.06362408399581909},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.05219194293022156}],"concepts":[{"id":"https://openalex.org/C93692415","wikidata":"https://www.wikidata.org/wiki/Q1502030","display_name":"Thematic map","level":2,"score":0.5898231863975525},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5737283229827881},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.4404163956642151},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33911916613578796},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.06362408399581909},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.05219194293022156},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aibthings63359.2024.10863078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aibthings63359.2024.10863078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2738130394","https://openalex.org/W2895482572","https://openalex.org/W2911594722","https://openalex.org/W3021442389","https://openalex.org/W3209185269","https://openalex.org/W4206272022","https://openalex.org/W4293232875","https://openalex.org/W4361019851","https://openalex.org/W4361731994","https://openalex.org/W4387444396"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2291311298","https://openalex.org/W2378021067","https://openalex.org/W3196787553","https://openalex.org/W2898552957","https://openalex.org/W1969939902","https://openalex.org/W1982702875","https://openalex.org/W3034807830"],"abstract_inverted_index":{"This":[0,76],"study":[1,134],"examines":[2],"the":[3,80,95,98,104,114],"characteristics":[4],"and":[5,22,26,54,100,108,123,141,147,155,159],"detection":[6,122],"of":[7,39,42,83,92,116,125],"fraudulent":[8,55,71,85,93],"online":[9,32,56,157],"reviews":[10,33,44,66,72],"using":[11],"different":[12],"state-of-the-art":[13],"machine":[14,126,142],"learning":[15,143],"algorithms":[16],"like":[17],"support":[18],"vector":[19],"classifier":[20],"(SVC)":[21],"logistic":[23],"regression":[24],"(LR)":[25],"random":[27],"forest":[28],"(RF).":[29],"We":[30],"analyzed":[31],"across":[34],"ten":[35],"categories.":[36],"Our":[37],"analysis":[38],"thematic":[40],"content":[41],"these":[43],"revealed":[45],"an":[46],"overlap":[47],"in":[48],"commonly":[49],"used":[50,67],"words":[51,61,87,119],"between":[52],"legitimate":[53],"reviews.":[57],"However,":[58],"less":[59,84],"frequent":[60],"offered":[62],"better":[63],"differentiation.":[64],"Legitimate":[65],"context-specific":[68],"terms,":[69],"while":[70],"lacked":[73],"such":[74],"specificity.":[75],"suggests":[77],"focusing":[78],"on":[79],"\u201clong":[81],"tail\u201d":[82],"review":[86,148],"for":[88,120,130],"detection.":[89],"In":[90],"terms":[91],"detection,":[94],"SVC":[96],"outperformed":[97],"RF":[99],"LR":[101],"by":[102],"obtaining":[103],"highest":[105],"accuracy":[106],"(89%)":[107],"F1-score":[109],"(89%).":[110],"These":[111],"findings":[112],"highlight":[113],"importance":[115],"analyzing":[117],"uncommon":[118],"fraud":[121],"effectiveness":[124],"learning,":[127],"particularly":[128],"SVC,":[129],"this":[131],"task.":[132],"The":[133],"results":[135],"show":[136],"how":[137],"crucial":[138],"linguistic":[139],"patterns":[140],"can":[144],"offer":[145],"consumers":[146],"platforms":[149],"tools":[150],"to":[151],"safeguard":[152],"user":[153],"experience":[154],"promote":[156],"safety":[158],"trust.":[160]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
