Malicious Selling Strategies in Livestream Shopping: A Case Study of Alibaba's Taobao and ByteDance's Douyin

11/20/2021
by   Qunfang Wu, et al.
0

Livestream shopping is getting more and more popular as a new shopping form. Also, due to the COVID-19 pandemic, people have shifted to online shopping platforms. However, the broader user adoption comes with a cost – many streamers' malicious selling incidents have recently been reported. In this study, we aim to explore streamers' malicious selling strategies and how viewers may perceive these strategies. First, we collected 40 livestream shopping sessions from two popular livestream platforms in China – Taobao and Douyin (TikTok of Chinese version). We identified three categories of malicious selling strategies (i.e., Compulsive, Restrictive, and Designing) and found platform designs mostly enhanced these malicious selling strategies. Second, through an interview study with 13 end users, we provide a rich description of users' awareness of malicious selling strategies and challenges to counter malicious selling. We conclude the paper by discussing the policy and design implications to counter malicious selling.

READ FULL TEXT
research
08/26/2020

#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives

The rapid expansion of cyberspace has greatly facilitated the strategic ...
research
06/28/2018

Malicious User Experience Design Research for Cybersecurity

This paper explores the factors and theory behind the user-centered rese...
research
10/06/2021

Detecting and Quantifying Malicious Activity with Simulation-based Inference

We propose the use of probabilistic programming techniques to tackle the...
research
04/08/2022

Gone Quishing: A Field Study of Phishing with Malicious QR Codes

The COVID-19 pandemic enabled "quishing", or phishing with malicious QR ...
research
07/27/2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams

As COVID-19 has been spreading across the world since early 2020, a grow...
research
12/14/2022

"I Knew It Was Me": Understanding Users' Interaction with Login Notifications

Login notifications are intended to inform users about recent sign-ins a...
research
11/24/2021

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files

Increasing usage of Digital Manufacturing (DM) in safety-critical domain...

Please sign up or login with your details

Forgot password? Click here to reset