@inproceedings{lam2004shilling, abstract = {Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have become particularly common is in e-commerce, where recommendation of items can often help a customer find what she is interested in and, therefore can help drive sales. Unscrupulous producers in the never-ending quest for market penetration may find it profitable to shill recommender systems by lying to the systems in order to have their products recommended more often than those of their competitors. This paper explores four open questions that may affect the effectiveness of such shilling attacks: which recommender algorithm is being used, whether the application is producing recommendations or predictions, how detectable the attacks are by the operator of the system, and what the properties are of the items being attacked. The questions are explored experimentally on a large data set of movie ratings. Taken together, the results of the paper suggest that new ways must be used to evaluate and detect shilling attacks on recommender systems.}, address = {New York, NY, USA}, author = {Lam, Shyong K. and Riedl, John}, booktitle = {WWW '04: Proceedings of the 13th International Conference on World Wide Web}, doi = {10.1145/988672.988726}, interhash = {66e00212d44132e4d2ff6968a10999d4}, intrahash = {fa20593a49577529fdde250fc6d15110}, isbn = {1-58113-844-X}, location = {New York, NY, USA}, pages = {393--402}, publisher = {ACM}, title = {Shilling recommender systems for fun and profit}, url = {http://portal.acm.org/citation.cfm?id=988726&dl=GUIDE&coll=GUIDE&CFID=62005989&CFTOKEN=12250743}, year = 2004 }