Please use this identifier to cite or link to this item:
https://hdl.handle.net/2445/221590
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sáez Ortuño, Laura | - |
dc.contributor.author | Forgas Coll, Santiago | - |
dc.contributor.author | Huertas García, Rubén | - |
dc.contributor.author | Puertas i Prats, Eloi | - |
dc.date.accessioned | 2025-06-17T10:47:09Z | - |
dc.date.issued | 2024-06-01 | - |
dc.identifier.issn | 0742-6046 | - |
dc.identifier.uri | https://hdl.handle.net/2445/221590 | - |
dc.description.abstract | The proliferation of reviews evaluating different services on social networks andonline platforms and their importance in consumer decision‐making has led someunscrupulous individuals to take advantage of the anonymity offered by the Internetto manipulate these reviews and influence customers' decisions. The main objectivesof this study are: (1) to test whether spammers usually perform their misdemeanorsfrom the same IP address; (2) to explore whether there are differences betweenstated sexes in this regard; (3) to detect the main motivations for posting fraudulentreviews; and (4) to determine the motivations for doing so from the same IP address.These objectives were achieved by means of a quasi‐experiment with a sample of7,192,487 users, and a qualitative investigation in which 37 users who had falsifiedinformation were interviewed. The results show that spammers who tend to faketheir identity do so from the same IP address and that they tend to be male. Fourtypes of motivation are presented: revenge, entertainment, opportunity for profit,and self‐esteem; as well as a further three to explain the use of the same IP:convenience, limited resources, and complacency. | - |
dc.format.extent | 20 p. | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | - |
dc.publisher | John Wiley & Sons | - |
dc.relation.isformatof | Versió postprint del document publicat a: https://doi.org/10.1002/mar.21985 | - |
dc.relation.ispartof | Psychology & Marketing, 2024, vol. 41, num.6, p. 1363-1382 | - |
dc.relation.uri | https://doi.org/10.1002/mar.21985 | - |
dc.rights | (c) John Wiley & Sons, 2024 | - |
dc.subject.classification | Investigació operativa | - |
dc.subject.classification | Protocols de xarxes d'ordinadors | - |
dc.subject.classification | Adreces d'Internet | - |
dc.subject.classification | Xarxes socials en línia | - |
dc.subject.other | Operations research | - |
dc.subject.other | Computer network protocols | - |
dc.subject.other | Internet addresses | - |
dc.subject.other | Online social networks | - |
dc.title | Chasing spammers: Using the Internet protocol address fordetection | - |
dc.type | info:eu-repo/semantics/article | - |
dc.type | info:eu-repo/semantics/acceptedVersion | - |
dc.identifier.idgrec | 747319 | - |
dc.date.updated | 2025-06-17T10:47:09Z | - |
dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | - |
dc.embargo.lift | 2026-05-31 | - |
dc.date.embargoEndDate | info:eu-repo/date/embargoEnd/2026-05-31 | - |
Appears in Collections: | Articles publicats en revistes (Matemàtiques i Informàtica) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
857253.pdf | 1.56 MB | Adobe PDF | View/Open Request a copy |
Document embargat fins el
31-5-2026
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.