- Open Access
- Total Downloads : 264
- Authors : Dr Boniface Ekechukwu, Ifeoma Orji, Mary Yerokun
- Paper ID : IJERTV2IS70875
- Volume & Issue : Volume 02, Issue 07 (July 2013)
- Published (First Online): 31-07-2013
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
System Design for E-Auction in Developing Nations
Dr Boniface Ekechukwu,* Ifeoma Orji*, Mary Yerokun **
*Department of Computer Science, Nnamdi Azikiwe University, PMB5025 Awka,
Anambra State, Nigeria
**Dept of Computer Education, Fed College of Education(Tech) Asaba
ABSTRACT
The research has designed a system that has a strong security and trust for buyers to access before purchasing while users cannot give wrong information about their identities easily. The system is designed to detect shill bidding in online and provide a friendly and responsive customer support system. The expert system tool was used in order to achieve our desired motives. The system has been developed to increase the rate of trust in online auction system in developing nations where consumers will start engaging themselves in online auction . This will increase the business opportunities and economic development of the nation. The lack of consumer trust is one of the focused issued today as the world is moving towards advanced information and technology era. In light of this, there is an urgent need for Nigeria to develop a trustworthy system; hence we proffer a model for real-time trust management in online auction system. The objective of this research is to design a system that has a strong security and trust in it as the buyers can assess items before purchasing it and users cannot give wrong information about their identity easily. Also , to detect shill bidding in real-time and provide a friendly and responsive customer support system.
INTRODUCTION
Online auctions can be considered a subset of e-commerce that uses auctioning methods at the pricing stage. Consumers or users are the main players that contribute to the future direction of e-commerce. In this era of ICT, cyber crimes have emerge as one of the most frequent crimes committed and the main victims of these unethical activities are consumer who participate in internet activities. This has influenced the decision-making and perception of consumer about engaging in any online transaction or purchasing activities. They are concerned about their privacy and personal information that may be misused by uninvited parties. In developing world like Nigeria, consumers are not participating in auctioning due to lack of trust between most businesses and customers on web. When the environment is with
uncertainty and risk, people need to trust to serve as mechanism to reduce the complexity of human conduct. One of the most damning indictments of Nigerian in the eyes of the world is the relatively high incidence of cybercrime in the country. There is uncertainty in the online auction transactions due to incomplete or distorted information provided by sellers in online auction. Many sites allow users to hide their identity easily by providing wrong information and it make easier to create fake accounts. The shill bidders create a new dummy account(i.e account open in short period of time) to bid on their own item for the shill bidding. Nowadays, because there is improper awareness creation of goods, works of arts e.t.c. as sellers only display their items in the shop to only the people in the vicinity, there is delay in purchase of such goods leading to degrade of goods quality and thus low profit; we need to develop a system that should be able to offer proper awareness creation of goods.
BACKGROUND OF STUDY
Consumers are the main players that contribute to the future direction of e-commerce. In this era of ICT, cyber crimes have emerge as one of the most frequent crimes committed and the main victims of these unethical activities are consumer who participate in Internet activities. This has influenced the decision-making and perception of consumer about engaging in any online transaction or purchasing activities. They are concerned about their privacy and personal information that may be misused by uninvited parties. Trust always becomes a priority when it comes to doing business in an unseen and untouched environment. In Nigeria today, online auction is not trustworthy as it does not ensure warranty of items auctioned since these items are not accessed prior to auctioning. This is because most of the auctioneers are more concerned about their selfish gain, they tend to accept items or goods to be auctioned from any body notwithstanding the quality or the source of items and as a result they cannot grant warranty on any of the items as they dont have confidence in them. Again, because there is no room for proper assessment and verification of items before payment in the former systems, the customers sometimes end up getting items less than the standard ordered or not getting items paid for and correcting such mistakes takes more time and money. Furthermore ,there is an uncertainty in the online auction transactions due to incomplete or distorted information provided by sellers in online auction. Many sites allow users to hide their identities easily by providing wrong information and it make easier to create fake accounts. Hence , the shill bidders take advantage of that to create a new dummy account(i.e account open in short period of time) to bid on their
own item for the shill bidding. To maintain trust of users, it is necessary for the auction systems to detect and prevent undesired activities in the auctions in real time. It requires a strong and secure model to be established in order to provide a safe and secure environment for online transactions through which two unknown users can safely complete their transactions as well as maintain trust between the users and the auction systems.
MATERIALS AND METHODS
PHP and MYSQL were used to enable the system achieve the required objectives. Having looked at the weaknesses and flaws associated with the present online systems, we introduce automated auction system. In the proposed system, bidders go online and place their biddings. Likewise auctioneer can place their product for auctioning online. The system enables the bidders to view the biddings while it is still on. All the parties in the bidding have access to real- time reporting of events while the auctioning is still on. The system also keeps record of customers and maintains a database for their transactions. The system uses customers past record to detect when a shilling biding occurs and also, derives shill factor from the activities done by the participant by applying different rules to auction related activities and if finds any undesired bidding behaviours like shilling, then it will updates the information regarding shilling behaviour in current transaction and notified the involved users, and cancel the corresponding auction immediately. The system also provide an avenue where the bidder that won the auction need to to answer certain question when received his/her goods. Based on this, the system will use bayesian probability game model in rating and assigning category where each seller belongs such as trustworthy, not trustworthy and highly trustworthy. Furthermore, there is a platform for advertisement of goods to potential buyers and all payment are made online through the use of credit card, hence the system is integrated credit card payment system. All transactions are verified before concluded. Here, the problems and weaknesses of the present system were identified. In the present system, the major problem observed is that of security and trust as buyers can not have proper assessment of items before purchasing it. Also users can hide their identity easily by providing wrong information.
SYSTEM DESIGN
This is the phase of system designing. It is most crucial phase in the development of a system. Normally, the design proceeds in two stages: Preliminary or general design; Structure or detailed design. Preliminary or general design: In the preliminary or general design, the features of the new system are specified. The costs of implementing these features and the benefits to be derived are estimated. If the project is still considered to be feasible, we move to the design stage. Structure or Detailed design: In the detailed design stage, computer oriented work begins in earnest. At this stage, the design of the system becomes more structured.
Build And Test A Prototype Expert System
Before actually implementing the new system into operations, a test run of the system is done removing all the bugs, if any. It is an important phase of a successful system. After codifying the whole programs of the system, a test plan should be developed and run on a given set of test data. The output of the test run should match the expected results. Using the test data the following test run are carried out: Unit test; System test. Unit test: When the programs have been coded and compiled and brought to working conditions, they must be individually tested with the prepared test data. Any undesirable happening must be noted and debugged (error corrections). System Test: After carrying out the unit test for each of the programs of the system and when errors are removed, then system test is done. At this stage the test is done on actual data. At each stage of the execution, the results or output of the system is analyzed. During the result analysis, it may be found that the outputs are not matching the expected out of the system. In such case, the errors in the particular programs are identified and are fixed further tested for the expected output. After having the user acceptance of the new system developed, the implementation phase begins. Implementation is the stage of a project during which theory is turned into practice. Maintenance is necessary to eliminate errors in the system during its working life and to tune the system to any variations in its working environment.
Bidding Rule
Bidding rules define the types of bids that are allowed and which participants are allowed to place them. In a single seller auction, the designated seller is the only participant who can place a sell offer, and is typically required to do so at the beginning of the auction. If that offer is non-
zero, then the sellers offer is called her reserve price . In a procurement situation, only the designated procurer can place a buy offer, and typically, the members of a pre-screened set of suppliers are the only participants who can placoe sell offers. In an open, Continuous Double Auction (CDA), like the stock market, any participant can place either a buy or sell offer. In fact, in a CDA, a bidder can simultaneously place offers to buy and sell, as long as the buy offers are less than the sell offers. Much of the flexibility of auction systems comes from treating buyers and sellers symmetrically.
i
i
Specification of the Model Dominance
Let si
and
s' be two strategies of player i, and
Si the set of strategy of the remaining players.
Then:
1.
2.
si strictly dominates s' si weakly dominates s'
if for all if for all
i
i
siSi , ui(si,si)ui(s',si)
i
i
siSi , ui(si,si)ui(s',si)
i
i
i
i
Nash Equilibrium
Given a strategic form game
N,(S ),(u )
, the Nash equilibrium is mathematically defined
i i
as a strategy profile
s*(s*,s*,…,s*n) such that:
1 2
i
i
ui(s*,s*i)ui(si,s*i)
siSi
i 1,2,…,n
Bayesian Games
In Bayesian games also known as games of incomplete information, each player has a type which is privately known to him, and is not known to other players. There is a prior probability distribution p over the possible types of each player. The types determine the outcome of the game. Mathematically a Bayesian game is defined as:
(N, A, ,
p , u )
Where : N is
the set of
agentsor bidders;
A A …
An .
where Ai
is theset of actions availabletoplayeri;
1 … n
where
i is the typespaceof playeri;
p 1
[ 0,1]
where i
is a common prior
over types; and
u (u1 ,… ,u n ).
where ui : A 1
R is a utilityfunctionfor playeri.
An example of Bayesian game is the auction. In auctions a players valuation of the object being bid for constitute his type, and a players type is not known to his fellow bidders.
Auctions
Mathematically in auctions the following holds:
Considering two players i and j. Let v denote the players valuations and b the players bids. Profit (utility) = ui = vi-bi
Profit (utility) = uj = vj-bj
v b
if b b
i i i j
u (b ,b ,v ,v ) v b ) / 2 if b b
i
i
i 1 2 1 2 ( i
0
i j
if b b
i j
[Giving strategies, bi (vi ) and bj (v j ) for players i and j. Giving js strategy, the best response for i constitute the Bayesian Nash equilibrium of the game. Hence, accordingly the Bayesian Nash equilibrium is:
max(v b ) Pr obb b (v
) 1 (v b ) Pr obb b (v )b
i i i
j j 2 i i
i
i
j
j
j
j
i
i
DATABASE DESIGN AND SPECIFICATIONS
MySql database was used in the design of the new system database. The structure of the tables in the database is as follows: admin_login, bid, bidders, bidding, products. Some of the structures for the database tables used are as follows:
Structure of admin_login Table
Field |
Type |
Null |
Key |
Username |
varchar(12) |
NO |
PRI |
Password |
varchar(12) |
YES |
Structure of Products for database Table
Field |
Type |
Null |
Key |
Category |
varchar(50) |
YES |
|
Products |
varchar(100) |
YES |
|
Snum |
int(6) |
NO |
PRI |
INPUT / OUTPUT SPECIFICATION AND DESIGN
The input/output specification and design in the new system is structured to allow users to fill forms and submit the data to the database. Some of the input forms and output designed in the online auction is as follows:
Product Entry Form Category
Product
Product Entry Form Category
Product
Product Entry Form
Admin Password
User Name Password
Admin Password
User Name Password
Admin password form
Date |
Name of customer |
Phone |
|
Detail |
Delete |
Customer information report
Picture |
Auction name |
Product Details |
Start bid |
End bid |
Last bid |
Delete |
Products for auctioning
RESULTS AND DISCUSSION
This work has been successfully completed and has been capable of maintaining trust between the users and the auction system and also, to restrict undesired bidding beaviours like shilling at runtime. Furthermore, it would allow all the parties in the bidding to have access to real-time reporting of events while the auctioning is still on and also give room for users to assess the goods they want to bid for. In addition, this research will help to guide other researchers to conduct more studies related to consumer trust in e-commerce and uncover a more practical solution for this issue. This research work has explored the operation of online auction systems, observed certain problems, and therefore proffer a model for real-time trust management to solve the problems discovered. Moreover, the bayesian probability game model was used in deriving a equilibrium bid. In addition, expert system methodology was employed in developing the need and specification of the real-time trust management in online auction system after studying the existing system. This research has Created an online system for customers to view all products that is up for auctioning and for the customers to upload their products for auctioning. The system has a platform for customers to post their bids and online advertising of products. The system gives bidders access to view auction details and detect shilling biddings. The system makes available the bidders history and maintain a robust database for managing the auction sales. It also maintains a database of bidders information.
REFERENCES
Allen .N et al (1972) Human Problem Solving. Prentice Hall, Pp 4-8 Anigbogu S.O.(2003) Fundamental Principles of Artificial Intelligence and
Expert Systems pp1-2, 156-157.
Ausubel, L. M. et al (2002) Ascending auctions with package bidding.
Frontiers of Theoretical Economics, 1(1):pp 142.
EBay (2006) Leading Online Auction Site, [www.ebay.com]. Retrieved on October 10, pp 1-30.
Giarratano .J et al (1998) Expert Systems: Principles and Programming, 3rd
Ed., PWS Publishing Company, Boston, MA, pp 1-10.
Kauffman . R. J et al (2002) Running Up the Bid: Detecting, Predicting, and Preventing Reserve Price Shilling in Online Auctions, working paper of the 5th International Conference on Electronic Commerce, pp 20-25.
Lamoureux .M et al(2008) e-Auction in Sourcing the Strategic sourcing Equilizer, pp 1-10.
Lamourex .M (2008) The 6 Days of X-asperation: Day 2- Question to ask ypur e-RFX and E-auction Vendor, pp 1-5.
Mahmood, M.A.et al (2004). On-line Shopping Behaviour: Cross-Country Empirical Research. International Journal of Electronic Commerce. Vol. 9, No. 1, pp. 9-30.
Mayer R.C.,et al(1995). An integrative model of organizational trust. Academy of Management Review, Vol. 20, No. 3, pp. 709-34.
McAfee R.P et al(1996) Analyzing the Airwaves Auction. Journal of Economic Perspectives, 10(1): 159-175
McKnight, D.H et al (2001). What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. International Journal of Electronic Commerce 6 (2) pp. 35-60.
Mouri.H et al(2005) A Formal Model for Stateful Trust Management Systems, In Proceedings of IASTED International Conference on Software Engineering and Applications , Phoenix, USA, pp. 87-92.
Nisan .N(2000) Bidding and Allocation in Combinatorial Auctions. In second ACM Conference on Electronic Commerce,pp 1-12.
Pennanen, K. (2005). Consumers Trust Formation Process in e-Commerce: Development of a Theoretical Framework. Frontiers of E-Business Research.
Riegelsberger, J et al (2003). The researchers dilemma: evaluating trust in
computer-mediated communication.International Journal of Human-Computer Studies, Vol 58, pp. 759781.
Sinha, A. R. et al(2000) The Impact of Discrete Bidding and Bidder agrressiveness on Sellers Strategies in Open English Auctions: Reserves and Covert Shilling, Marketing Science (19:3), 244-265.
Shanthi Potla, (2011). Online Auction System, A Thesis presented to The Faculty
of San Diego state University in Computer Science,pp 1-10 Suh, B.et al (2003). The Impact of Customer Trust and Perception of
Security Control on the Acceptance of Electronic Commerce. International Journal of Electronic Commerce, Vol. 7, No. 3, pp.135-161.