Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Market Design for AI Algorithms
ACM SIGecom Exchanges (SIGECOM), Volume 20, Issue 2Pages 62–68https://doi.org/10.1145/3699804.3699809We discuss results from a few recent papers on how market design affects play between artificial intelligence (AI) algorithms. We describe the results from Banchio and Skrzypacz [2022] where the first-price auction appears more prone to collusion than ...
- research-articleJuly 2024
Fairness Regulation of Prices in Competitive Markets
Manufacturing & Service Operations Management (INFORMS-MSOM), Volume 26, Issue 5Pages 1897–1917https://doi.org/10.1287/msom.2022.0552Problem definition: The loyalty penalty refers to a pricing strategy where companies charge higher prices to loyal customers for exploitation while offering lower prices to nonloyal customers for attraction. To address this unfair business practice, ...
- research-articleMay 2024
FENCE: Fairplay Ensuring Network Chain Entity for Real-Time Multiple ID Detection at Scale In Fantasy Sports
AIMLSystems '23: Proceedings of the Third International Conference on AI-ML SystemsArticle No.: 26, Pages 1–7https://doi.org/10.1145/3639856.3639882Dream11 takes pride in being a unique platform that enables over 190 million fantasy sports users to demonstrate their skills and connect deeper with their favorite sports. While managing such a scale, one issue we are faced with is duplicate/multiple ...
- posterMay 2023
The Price of Algorithmic Pricing: Investigating Collusion in a Market Simulation with AI Agents
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2748–2750Due to the rising availability and adoption of Artificial Intelligence in e-commerce, many of the online-prices are not set by humans, but by algorithms. The consequence is an opaque pricing situation that raises the potential of concealed, unfair ...
- research-articleOctober 2022
Collusion Resistant Federated Learning with Oblivious Distributed Differential Privacy
ICAIF '22: Proceedings of the Third ACM International Conference on AI in FinancePages 114–122https://doi.org/10.1145/3533271.3561754Federated learning enables a population of distributed clients to jointly train a shared machine learning model with the assistance of a central server. The finance community has shown interest in its potential to allow inter-firm and cross-silo ...
-
- research-articleOctober 2022
Why Bitcoin Will Fail to Scale?
Management Science (MANS), Volume 68, Issue 10Pages 7323–7349https://doi.org/10.1287/mnsc.2021.4271Bitcoin falls dramatically short of the scale provided by banks for payments. Currently, its ledger grows by the addition of blocks of ∼2,000 transactions every 10 minutes. Intuitively, one would expect that increasing the block capacity would solve this ...
- research-articleJuly 2022
Talking Behind Your Back: Communication and Team Cooperation
Management Science (MANS), Volume 68, Issue 7Pages 5187–5200https://doi.org/10.1287/mnsc.2021.4143Communication is one of the most effective devices in promoting team cooperation. However, asymmetric communication sometimes breeds collusion and hurts team efficiency. Here, we present experimental evidence showing that excluding one member from team ...
- research-articleJune 2022
Educating Students about Programming Plagiarism and Collusion via Formative Feedback
ACM Transactions on Computing Education (TOCE), Volume 22, Issue 3Article No.: 31, Pages 1–31https://doi.org/10.1145/3506717To help address programming plagiarism and collusion, students should be informed about acceptable practices and about program similarity, both coincidental and non-coincidental. However, current approaches are usually manual, brief, and delivered well ...
- research-articleNovember 2021
Detecting and Analyzing Collusive Entities on YouTube
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 12, Issue 5Article No.: 64, Pages 1–28https://doi.org/10.1145/3477300YouTube sells advertisements on the posted videos, which in turn enables the content creators to monetize their videos. As an unintended consequence, this has proliferated various illegal activities such as artificial boosting of views, likes, comments, ...
- research-articleSeptember 2021
Optimal Team Composition: Diversity to Foster Implicit Team Incentives
Management Science (MANS), Volume 67, Issue 9Pages 5800–5820https://doi.org/10.1287/mnsc.2020.3762We study optimal team design. In our model, a principal assigns either heterogeneous agents to a team (a diverse team) or homogenous agents to a team (a specialized team) to perform repeated team production. We assume that specialized teams exhibit a ...
- research-articleAugust 2021
DECIFE: Detecting Collusive Users Involved in Blackmarket Following Services on Twitter
HT '21: Proceedings of the 32nd ACM Conference on Hypertext and Social MediaPages 91–100https://doi.org/10.1145/3465336.3475108The popularity of Twitter has fostered the emergence of various fraudulent user activities - one such activity is to artificially bolster the social reputation of Twitter profiles by gaining a large number of followers within a short time span. Many ...
- abstractAugust 2021
Automated, Personalised, and Timely Feedback for Awareness of Programming Plagiarism and Collusion
ICER 2021: Proceedings of the 17th ACM Conference on International Computing Education ResearchPages 393–394https://doi.org/10.1145/3446871.3469768It is important to educate students about acceptable practices with regard to programming plagiarism and collusion. However, the current approach is quite demanding since it is manual, relying heavily on instructors. The information is delivered ...
- research-articleMarch 2021
Common Code Segment Selection: Semi-Automated Approach and Evaluation
SIGCSE '21: Proceedings of the 52nd ACM Technical Symposium on Computer Science EducationPages 335–341https://doi.org/10.1145/3408877.3432436When comparing student programs to check for evidence of plagiarism or collusion, the goal is to identify code segments that are common to two or more programs. Yet some code segments are common for reasons other than plagiarism or collusion, and so ...
- research-articleJanuary 2021
Collusion detection and ground truth inference in crowdsourcing for labeling tasks
The Journal of Machine Learning Research (JMLR), Volume 22, Issue 1Article No.: 190, Pages 8532–8576Crowdsourcing has been a prompt and cost-effective way of obtaining labels in many machine learning applications. In the literature, a number of algorithms have been developed to infer the ground truth based on the collected labels. However, most existing ...
- research-articleJanuary 2021
Frontiers: Algorithmic Collusion: Supra-competitive Prices via Independent Algorithms
Marketing Science (MKTGS), Volume 40, Issue 1Pages 1–12https://doi.org/10.1287/mksc.2020.1276We show that the long-run prices from independent machine learning algorithms depend on the informational value of price experiments. If low, the long-run prices are consistent with the static Nash equilibrium; however, if high, the long-run prices are ...
Motivated by their increasing prevalence, we study outcomes when competing sellers use machine learning algorithms to run real-time dynamic price experiments. These algorithms are often misspecified, ignoring the effect of factors outside their control, ...
- research-articleDecember 2020
Collusive Investments in Technological Compatibility: Lessons from U.S. Railroads in the Late 19th Century
Management Science (MANS), Volume 66, Issue 12Pages 5683–5700https://doi.org/10.1287/mnsc.2019.3504Collusion is widely condemned for its negative effects on consumer welfare and market efficiency. In this paper, I show that collusion may also in some cases facilitate the creation of unexpected new sources of value. I bring this possibility into focus ...
- research-articleNovember 2020
Preprocessing for Source Code Similarity Detection in Introductory Programming
Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education ResearchArticle No.: 3, Pages 1–10https://doi.org/10.1145/3428029.3428065It is well documented that some students either work together on programming assessments when required to work individually (collusion) or make unauthorised use of existing code from external sources (plagiarism). One approach used in the detection of ...
- short-paperNovember 2020
Disguising Code to Help Students Understand Code Similarity
Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education ResearchArticle No.: 13, Pages 1–5https://doi.org/10.1145/3428029.3428064To act with academic integrity in programming, students need to understand the concept of code similarity and the aspects that contribute to it, because undue similarity is often used as a first step in detecting plagiarism or collusion. However, if ...
- research-articleOctober 2020
Marketing Agencies and Collusive Bidding in Online Ad Auctions
Management Science (MANS), Volume 66, Issue 10Pages 4433–4454https://doi.org/10.1287/mnsc.2019.3457The transition of the advertising market from traditional media to the internet has induced a proliferation of marketing agencies specialized in bidding in the auctions that are used to sell ad space on the web. We analyze how collusive bidding can emerge ...
- research-articleDecember 2020
Choosing Code Segments to Exclude from Code Similarity Detection
ITiCSE-WGR '20: Proceedings of the Working Group Reports on Innovation and Technology in Computer Science EducationPages 1–19https://doi.org/10.1145/3437800.3439201When student programs are compared for similarity as a step in the detection of academic misconduct, certain segments of code are always sure to be similar but are no cause for suspicion. Some of these segments are boilerplate code (e.g. public static ...