A deep learning approach for detecting fake reviewers: Exploiting reviewing behavior and textual information

D Zhang, W Li, B Niu, C Wu - Decision Support Systems, 2023 - Elsevier
Ensuring the credibility of online consumer reviews (OCRs) is a growing societal concern.
However, the problem of fake reviewers on online platforms significantly influences e …

Detecting review manipulation on online platforms with hierarchical supervised learning

N Kumar, D Venugopal, L Qiu… - Journal of Management …, 2018 - Taylor & Francis
Opinion spammers exploit consumer trust by posting false or deceptive reviews that may
have a negative impact on both consumers and businesses. These dishonest posts are …

Fraudulent review detection model focusing on emotional expressions and explicit aspects: investigating the potential of feature engineering

A Kumar, RD Gopal, R Shankar, KH Tan - Decision Support Systems, 2022 - Elsevier
Reading customer reviews before purchasing items online has become a common practice;
however, some companies use machine learning (ML) algorithms to generate false reviews …

The use of eye-tracking in information systems research: a literature review of the last decade

A Vasseur, M Passalacqua, S Sénécal… - AIS Transactions on …, 2023 - aisel.aisnet.org
Eye-trackers provide continuous information on individuals' gaze behavior. Due to the
increasing popularity of eye-tracking in the information systems (IS) field, we reviewed how …

Detecting anomalous online reviewers: An unsupervised approach using mixture models

N Kumar, D Venugopal, L Qiu… - Journal of Management …, 2019 - Taylor & Francis
Online reviews play a significant role in influencing decisions made by users in day-to-day
life. The presence of reviewers who deliberately post fake reviews for financial or other …

[HTML][HTML] Intelligent eye-tracker-based methods for detection of deception: A survey

W Celniak, D Słapczyńska, A Pająk, J Przybyło… - Electronics, 2023 - mdpi.com
Over the last few years, a large number of studies have been conducted on the monitoring of
human behavior remaining beyond conscious control. One area of application for such …

Human identification for activities of daily living: A deep transfer learning approach

H Zhu, S Samtani, H Chen… - Journal of Management …, 2020 - Taylor & Francis
Sensor-based home Activities of Daily Living (ADLs) monitoring systems have emerged to
monitor elderly people's self-care ability remotely. However, the unobtrusive, privacy-friendly …

Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools

Y Chen, FM Zahedi, A Abbasi, D Dobolyi - Information & Management, 2021 - Elsevier
Phishing websites become a critical cybersecurity threat affecting individuals and
organizations. Phishing-website detection tools are designed to protect users against such …

Do you know him? Gaze dynamics toward familiar faces on a concealed information test

OC Lancry-Dayan, T Nahari, G Ben-Shakhar… - Journal of Applied …, 2018 - Elsevier
Can gaze position reveal concealed knowledge? During visual processing, gaze allocation
is influenced not only by features of the visual input, but also by previous exposure to …

Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements

JL Jenkins, J Proudfoot, JS Valacich… - Journal of the …, 2019 - aisel.aisnet.org
Organizational members who conceal information about adverse behaviors present a
substantial risk to that organization. Yet the task of identifying who is concealing information …