Abstract:
A system to detect outlying behavior in a network-based marketplace automatically collects attribute information for a first plurality of sellers that includes a first seller, and stores the attribute information in a storage device. The system computes peer information associated with a second plurality of sellers using a computer system, wherein the first plurality of sellers includes the second plurality of sellers, and wherein the peer information is automatically computed from the attribute information for the second plurality of sellers. The system compares the peer information associated with the second plurality of sellers with attribute information for the first seller for the purpose of automatically detecting outlying behavior by the first seller.
Abstract:
A system to detect outlying behavior in a network-based marketplace automatically collects attribute information for a first plurality of sellers that includes a first seller, and stores the attribute information in a storage device. The system computes peer information associated with a second plurality of sellers using a computer system, wherein the first plurality of sellers includes the second plurality of sellers, and wherein the peer information is automatically computed from the attribute information for the second plurality of sellers. The system compares the peer information associated with the second plurality of sellers with attribute information for the first seller for the purpose of automatically detecting outlying behavior by the first seller.
Abstract:
A system to detect outlying behavior in a network-based marketplace automatically collects attribute information for a first plurality of sellers that includes a first seller, and stores the attribute information in a storage device. The system computes peer information associated with a second plurality of sellers using a computer system, wherein the first plurality of sellers includes the second plurality of sellers, and wherein the peer information is automatically computed from the attribute information for the second plurality of sellers. The system compares the peer information associated with the second plurality of sellers with attribute information for the first seller for the purpose of automatically detecting outlying behavior by the first seller.
Abstract:
A method and system to protect users against potentially fraudulent activities associated with spoof web sites are described. According to one aspect of the present invention, the URL of a document downloaded via a web browser client is compared to the URLs in a list of URLs for known spoof sites. If the URL for the downloaded document is found in the list of URLs for known spoof sites, a security indicator is displayed to the user to indicate to the user that the downloaded document is associated with a known spoof site. According to another aspect of the invention, a security server maintains a master black list and periodically communicates updates of the master black list to the local list of a client security application.
Abstract:
A computer-implemented method processes issue data pertaining to a system. Issue data is received from a reporting entity, the issue data identifying an issue pertaining to the system and the reporting entity. A database is accessed to retrieve performance data regarding the reporting entity. The performance data is indicative of a past performance of the reporting entity in reporting issues pertaining to the system. A response activity, responsive to the issue, is automatically prioritized utilizing the performance data regarding the reporting entity.