Characterizing fraud and its ramifications in affiliate marketing networks

نویسندگان

  • Peter Snyder
  • Chris Kanich
چکیده

Cookie stuffing is an activity which allows unscrupulous actors online to defraud affiliate marketing programs by causing themselves to receive credit for purchases made by web users, even if the affiliate marketer did not actively perform any marketing for the affiliate program. Using 2 months of HTTP request logs from a large public university, we present an empirical study of fraud in affiliate marketing programs. First, we develop an efficient, decision-tree based technique for detecting cookie-stuffing in HTTP request logs. Our technique replicates domain-informed human labeling of the same data with 93.3% accuracy. Second, we find that over one-third of publishers in affiliate marketing programs use fraudulent cookie-stuffing techniques in an attempt to claim credit from online retailers for illicit referrals. However, most realized conversions are credited to honest publishers. Finally, we present a stake holder analysis of affiliate marketing fraud and find that the costs and rewards of affiliate marketing program are spread across all parties involved in affiliate marketing programs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

No Please, After You: Detecting Fraud in Affiliate Marketing Networks

Cookie stuffing is an activity which allows unscrupulous actors online to defraud affiliate marketing programs by causing themselves to receive credit for purchases made by web users, even if the affiliate marketer did not actively perform any marketing for the affiliate program. Using two months of HTTP request logs from a large public university, we present an empirical study of fraud in affi...

متن کامل

Exploring Risk and Fraud Scenarios in Affiliate Marketing Technologies from the Advertisers perspective

Affiliate Marketing (AM) has become an important and cost effective tool for e-commerce. There are numerous risks and vulnerabilities that are typically associated with AM. Though a well-planned AM model can greatly benefit the e-commerce strategies of an enterprise, a haphazardly implemented system can expose a business enterprise to major risks and vulnerabilities, which can lead to great fin...

متن کامل

Affiliate Marketing Optimisation in Hospitality and Tourism: a Multiple Stakeholder Perspective

This article discusses the enabling conditions that may allow hospitality and tourism businesses, and their affiliate stakeholders, to optimise and exploit affiliate marketing to its fuller potential, and proposes an affiliate marketing optimisation framework. The empirical findings are generated from an in-depth analysis of 72 online discussions from affiliate forums; and 38 interviews with th...

متن کامل

Controlling your Brand: Contractual Restrictions Placed by Internet Retailers on Affiliate Marketing Activities in Spain

Affiliate marketing programs have emerged as one of the fastest-growing methods for online retailers to acquire customers and increase sales. Affiliate marketing offers a number of advantages, including a relatively low cost and the ability to accurately track the actions of website visitors and their responses to targeted promotional activities. However, while these programs have proven effect...

متن کامل

Technology-Driven Online Marketing Performance Measurement: Lessons from Affiliate Marketing

Although the measurement of offline and online marketing is extensively researched, the literature on online performance measurement still has a number of limitations such as slow theory advancement and predominance of technologyand practitioner-driven measurement approaches. By focusing on the widely employed but under-researched affiliate marketing channel, this study addresses these limitati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Cybersecurity

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2016