ABSTRACT
Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight for the campaigns launched in each service. However, they are not properly incentivized to combat fraud among users and the campaigns they launch: on the one hand, a platform’s revenue is directly proportional to the number of transactions (since the platform charges a fixed amount per donation); on the other hand, if a platform is transparent with respect to how much fraud it has, it may discourage potential donors from participating.
In this paper, we take the first step in studying fraud in crowdfunding campaigns. We analyze data collected from different crowdfunding platforms, and annotate 700 campaigns as fraud or not. We compute various textual and image-based features and study their distributions and how they associate with campaign fraud. Using these attributes, we build machine learning classifiers, and show that it is possible to automatically classify such fraudulent behavior with up to 90.14% accuracy and 96.01% AUC, only using features available from the campaign’s description at the moment of publication (i.e., with no user or money activity), making our method applicable for real-time operation on a user browser.
Supplemental Material
- Ahmed Abbasi, Conan Albrecht, Anthony Vance, and James Hansen. 2012. Metafraud: A meta-learning framework for detecting financial fraud.Mis Quarterly 36, 4 (2012).Google Scholar
- Lauren Baker. 2018. Kendall’s Fight Against Leukemia. GoFundMe.com. https://www.gofundme.com/57o2vj4.Google Scholar
- Paul Belleflamme, Nessrine Omrani, and Martin Peitz. 2015. The economics of crowdfunding platforms. Information Economics and Policy 33 (2015), 11–28.Google ScholarCross Ref
- Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida. 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Vol. 6. 12.Google Scholar
- Siddhartha Bhattacharyya, Sanjeev Jha, Kurian Tharakunnel, and J Christopher Westland. 2011. Data mining for credit card fraud: A comparative study. Decision Support Systems 50, 3 (2011), 602–613.Google ScholarDigital Library
- Giulio Biondi, Valentina Franzoni, and Valentina Poggioni. 2017. A Deep Learning Semantic Approach to Emotion Recognition Using the IBM Watson Bluemix Alchemy Language. In ICCSA.Google Scholar
- Jeremy Blackburn, Nicolas Kourtellis, John Skvoretz, Matei Ripeanu, and Adriana Iamnitchi. 2014. Cheating in online games: A social network perspective. ACM Transactions on Internet Technology (TOIT) 13, 3 (2014), 1–25.Google ScholarDigital Library
- Charles F. Bond, Adnan Omar, Adnan Mahmoud, and Richard Neal Bonser. 1990. Lie detection across cultures. Journal of Nonverbal Behavior 14, 3 (Sep 1990), 189–204.Google ScholarCross Ref
- Mark Cecchini, Haldun Aytug, Gary J Koehler, and Praveen Pathak. 2010. Detecting management fraud in public companies. Management Science 56, 7 (2010), 1146–1160.Google ScholarDigital Library
- Ken Chatfield, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531(2014).Google Scholar
- Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1 (1960), 37–46.Google Scholar
- Douglas J Cumming, Lars Hornuf, Moein Karami, and Denis Schweizer. 2020. Disentangling crowdfunding from fraudfunding. Max Planck Institute for Innovation & competition research paper16-09 (2020).Google Scholar
- Patricia M Dechow, Weili Ge, Chad R Larson, and Richard G Sloan. 2011. Predicting material accounting misstatements. Contemporary accounting research 28, 1 (2011), 17–82.Google Scholar
- Jefferson Duarte, Stephan Siegel, and Lance Young. 2012. Trust and credit: The role of appearance in peer-to-peer lending. The Review of Financial Studies 25, 8 (2012), 2455–2484.Google ScholarCross Ref
- Henry Been-Lirn Duh and Vivian Hsueh Hua Chen. 2009. Cheating behaviors in online gaming. In International Conference on Online Communities and Social Computing. Springer, 567–573.Google Scholar
- Gofundme Inc. 2019. GoFundMe Pricing. goFundme. http://gofundme.com/pricing.Google Scholar
- GoFundMe Inc. 2020. GoFundMe fraudulent campaigns. GoFundMe. https://www.gofundme.com/c/safety/fraudulent-campaigns.Google Scholar
- Adrienne Gonzalez. 2014. GoFraudMe. goFraudMe. http://gofraudme.com/.Google Scholar
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR.Google Scholar
- Gabriel Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2017. Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 11.Google ScholarCross Ref
- Tina H Ho. 2015. Social Purpose Corporations: The Next Targets for Greenwashing Practices and Crowdfunding Scams. Seattle Journal for Social Justice 13, 3 (2015), 14.Google Scholar
- Becky Ann Clark Holland. 2018. Vet with cancer needs your help. GoFundMe.com. https://www.gofundme.com/vet-cancer-needs-help.Google Scholar
- Matthew Honnibal and Ines Montani. 2017. spacy 2: Natural language understanding with bloom embeddings, convolutional neural networks and incremental parsing. To appear 7, 1 (2017).Google Scholar
- Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, and Nikolaos Laoutaris. 2019. Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies (Orlando, Florida) (CoNEXT ’19). Association for Computing Machinery, New York, NY, USA, 110–122. https://doi.org/10.1145/3359989.3365428Google ScholarDigital Library
- Patrick Johnston. 2020. FBI details new methods of fraud born amid the pandemic. https://www.havredailynews.com/story/2020/04/22/local/fbi-details-new-methods-of-fraud-born-amid-the-pandemic/528576.html. Accessed: 2020-05-15.Google Scholar
- Dhiraj Joshi, Ritendra Datta, Elena Fedorovskaya, Quang-Tuan Luong, James Z Wang, Jia Li, and Jiebo Luo. 2011. Aesthetics and emotions in images. IEEE Signal Processing Magazine 28, 5 (2011), 94–115.Google ScholarCross Ref
- Patric Kabus and Alejandro P Buchmann. 2007. Design of a cheat-resistant P2P online gaming system. In Proceedings of the 2nd international conference on Digital interactive media in entertainment and arts. 113–120.Google ScholarDigital Library
- Kleomenis Katevas, Diego Perino, and Nicolas Kourtellis. 2022. FLaaS - Practical Federated Learning as a Service for Mobile Applications. In Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications (Tempe, Arizona) (HotMobile ’22). Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3508396.3517074Google ScholarDigital Library
- Davis E King. 2009. Dlib-ml: A machine learning toolkit. Journal of Machine Learning Research 10, Jul (2009), 1755–1758.Google ScholarDigital Library
- Nicolas Kourtellis, Kleomenis Katevas, and Diego Perino. 2020. FLaaS: Federated Learning as a Service. In Proceedings of the 1st Workshop on Distributed Machine Learning (Barcelona, Spain) (DistributedML’20). Association for Computing Machinery, New York, NY, USA, 7–13.Google ScholarDigital Library
- Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NeurIPS.Google Scholar
- J Richard Landis and Gary G Koch. 1977. An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. Biometrics (1977), 363–374.Google Scholar
- Mingfeng Lin, Nagpurnanand R Prabhala, and Siva Viswanathan. 2013. Judging borrowers by the company they keep: Friendship networks and information asymmetry in online peer-to-peer lending. Management Science 59, 1 (2013), 17–35.Google ScholarDigital Library
- Michael Luca and Georgios Zervas. 2016. Fake it till you make it: Reputation, competition, and Yelp review fraud. Management Science 62, 12 (2016), 3412–3427.Google ScholarDigital Library
- Carolyn McClanahan. 2018. People Are Raising USD650 Million On GoFundMe Each Year To Attack Rising Healthcare Costs. Forbes. https://www.forbes.com/sites/carolynmcclanahan/2018/08/13/using-gofundme-to-attack-health-care-costs.Google Scholar
- Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. 2021. PPFL: Privacy-Preserving Federated Learning with Trusted Execution Environments. In ACM MobiSys. 94–108.Google ScholarDigital Library
- Michalis Pachilakis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, and Nicolas Kourtellis. 2021. YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy. Proc. ACM Meas. Anal. Comput. Syst. 5, 3, Article 32 (Dec 2021), 26 pages. https://doi.org/10.1145/3491044Google ScholarDigital Library
- Suvasini Panigrahi, Amlan Kundu, Shamik Sural, and Arun K Majumdar. 2009. Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning. Information Fusion 10, 4 (2009), 354–363.Google ScholarDigital Library
- David Parsley. 2020. Captain Tom Moore: Just Giving blocks copycats over fears scammers are ’cashing in’ on 28M NHS fundraising campaign. https://inews.co.uk/inews-lifestyle/money/captain-tom-moore-war-hero-just-giving-copycats-scams-fundraising-nhs-2546244. Accessed: 2020-05-15.Google Scholar
- Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, 2011. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12, Oct (2011), 2825–2830.Google ScholarDigital Library
- Devin G Pope and Justin R Sydnor. 2011. What’s in a Picture? Evidence of Discrimination from Prosper. com. Journal of Human resources 46, 1 (2011), 53–92.Google ScholarCross Ref
- Nathaniel Popper and Taylor Lorenz. 2020. GoFundMe Confronts Coronavirus Demand. https://www.nytimes.com/2020/03/26/style/gofundme-coronavirus.html. Accessed: 2020-05-15.Google Scholar
- Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining. 985–994.Google ScholarDigital Library
- Daniel Sánchez, MA Vila, L Cerda, and José-Maria Serrano. 2009. Association rules applied to credit card fraud detection. Expert systems with applications 36, 2 (2009), 3630–3640.Google Scholar
- Wafa Shafqat, Seunghun Lee, Sehrish Malik, and Hyun-chul Kim. 2016. The Language of Deceivers: Linguistic Features of Crowdfunding Scams. In Proceedings of the 25th International Conference Companion on World Wide Web (Montréal, Québec, Canada) (WWW’16 Companion). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 99–100.Google Scholar
- Michael Siering, Jascha-Alexander Koch, and Amit V Deokar. 2016. Detecting fraudulent behavior on crowdfunding platforms: The role of linguistic and content-based cues in static and dynamic contexts. Journal of Management Information Systems 33, 2 (2016), 421–455.Google ScholarCross Ref
- Abhinav Srivastava, Amlan Kundu, Shamik Sural, and Arun Majumdar. 2008. Credit card fraud detection using hidden Markov model. IEEE Transactions on dependable and secure computing 5, 1 (2008), 37–48.Google ScholarDigital Library
- Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2010. Detecting spammers on social networks. In Proceedings of the 26th annual computer security applications conference. 1–9.Google ScholarDigital Library
- M Szmigiera. 2018. Crowdfunding Statistics and Facts. Statista. https://www.statista.com/topics/1283/crowdfunding/.Google Scholar
- US Legal. 2020. Fraud Law and Legal Definition. https://definitions.uslegal.com/f/fraud.Google Scholar
- Daniel Victor. 2019. Woman and Homeless Man Plead Guilty in $400,000 GoFundMe Scam. https://www.nytimes.com/2019/03/07/us/gofundme-homeless-scam-guilty.html. Accessed: 2020-05-15.Google Scholar
- Brittany Vonow. 2020. LOWEST OF THE LOW: Sick scammers are setting up GoFundMe accounts for fake coronavirus victims. https://www.thesun.co.uk/news/11364340/scammers-fake-gofundme-coronavirus-victims/. Accessed: 2020-05-15.Google Scholar
- Yaqing Wang, Fenglong Ma, Zhiwei Jin, Ye Yuan, Guangxu Xun, Kishlay Jha, Lu Su, and Jing Gao. 2018. Eann: Event adversarial neural networks for multi-modal fake news detection. In Proceedings of the 24th acm sigkdd international conference on knowledge discovery & data mining. 849–857.Google ScholarDigital Library
- Michael Wessel, Ferdinand Thies, and Alexander Benlian. 2016. The emergence and effects of fake social information: Evidence from crowdfunding. Decision Support Systems 90 (2016), 75 – 85.Google ScholarDigital Library
- Jennifer J. Xu, Yong Lu, and Michael Chau. 2015. P2P Lending Fraud Detection: A Big Data Approach. In ISI.Google Scholar
- S Yeung, John CS Lui, Jiangchuan Liu, and Jeff Yan. 2006. Detecting cheaters for multiplayer games: theory, design and implementation. In Proc IEEE CCNC, Vol. 6. 1178–1182.Google ScholarCross Ref
- Quanzeng You, Jiebo Luo, Hailin Jin, and Jianchao Yang. 2016. Building a large scale dataset for image emotion recognition: The fine print and the benchmark. In AAAI.Google Scholar
- Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. 2018. On the origins of memes by means of fringe web communities. In Proceedings of the Internet Measurement Conference 2018. 188–202.Google ScholarDigital Library
- Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2019. Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the web. In Companion proceedings of the 2019 world wide web conference. 218–226.Google ScholarDigital Library
- Savvas Zannettou, Michael Sirivianos, Jeremy Blackburn, and Nicolas Kourtellis. 2019. The web of false information: Rumors, fake news, hoaxes, clickbait, and various other shenanigans. Journal of Data and Information Quality (JDIQ) 11, 3 (2019), 1–37.Google ScholarDigital Library
- Matthew D Zeiler and Rob Fergus. 2014. Visualizing and understanding convolutional networks. In ECCV.Google Scholar
- Sicheng Zhao, Yue Gao, Xiaolei Jiang, Hongxun Yao, Tat-Seng Chua, and Xiaoshuai Sun. 2014. Exploring principles-of-art features for image emotion recognition. In MM.Google Scholar
Index Terms
- I call BS: Fraud Detection in Crowdfunding Campaigns
Recommendations
Autonomous credit card fraud detection using machine learning approach☆
Highlights- The proposed research work focused on autonomous credit card fraud detection.
- ...
AbstractCredit card fraud has risen in vulnerable effects in recent years as more people use credit cards to pay for products. This is owing to advancements in technology and growths in internet transactions, both of which have resulted in ...
Graphical abstractDisplay Omitted
A biometrics-based solution to combat SIM swap fraud
iNetSec'10: Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network securityCybercriminals are constantly prowling the depths of cyberspace in search of victims to attack. The motives for their attacks vary: some cybercriminals deface government websites to make political statements; others spread malicious software to do large-...
International Call Fraud Detection Systems and Techniques
MEDES '14: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystemsIn recent years, fraud in telecommunication industry becomes one of encumbrance for a telecommunication operator which is growing dramatically. It is befall a serious international problem for GSM and PSTN network service providers. It has undoubtedly ...
Comments