Large-scale insider trading analysis: patterns and discoveries

  • Acar Tamersoy
  • Elias Khalil
  • Bo Xie
  • Stephen L. Lenkey
  • Bryan R. Routledge
  • Duen Horng Chau
  • Shamkant B. Navathe
Original Article

Abstract

How do company insiders trade? Do their trading behaviors differ based on their roles (e.g., chief executive officer vs. chief financial officer)? Do those behaviors change over time (e.g., impacted by the 2008 market crash)? Can we identify insiders who have similar trading behaviors? And what does that tell us? This work presents the first academic, large-scale exploratory study of insider filings and related data, based on the complete Form 4 fillings from the U.S. Securities and Exchange Commission. We analyze 12 million transactions by 370 thousand insiders spanning 1986–2012, the largest reported in academia. We explore the temporal and network-based aspects of the trading behaviors of insiders, and make surprising and counterintuitive discoveries. We study how the trading behaviors of insiders differ based on their roles in their companies, the types of their transactions, their companies’ sectors, and their relationships with other insiders. Our work raises exciting research questions and opens up many opportunities for future studies. Most importantly, we believe our work could form the basis of novel tools for financial regulators and policymakers to detect illegal insider trading, help them understand the dynamics of the trades, and enable them to adapt their detection strategies toward these dynamics.

References

  1. Aboody D, Kasznik R (2000) CEO stock option awards and the timing of voluntary corporate disclosures. J. Account. Econ. 29:73–100CrossRefGoogle Scholar
  2. Adamic, L, Brunetti C, Harris JH, Kirilenko AA (2010) Trading networks. Social Science Research Network Working Paper Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1361184
  3. Agrawal A., Cooper T (2008) Insider trading before accounting scandals. Social Science Research Network Working Paper Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=929413
  4. Agrawal A, Nasser T (2011) Insider trading in takeover targets. Social Science Research Network Working Paper Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1517373
  5. Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: spotting anomalies in weighted graphs. In: Proceedings of the Pacific-Asia conference on advances in knowledge discovery and data miningGoogle Scholar
  6. Bay S, Kumaraswamy K, Anderle MG, Kumar R, Steier DM (2006) Large scale detection of irregularities in accounting data. In: Proceedings of the IEEE international conference on data miningGoogle Scholar
  7. Bernhardt D, Hollifield B, Hughson E (1995) Investment and insider trading. Rev Financ Stud 8(2):501–543CrossRefGoogle Scholar
  8. Bizjak J, Lemmon M, Whitby R (2009) Option backdating and board interlocks. Rev Financ Stud 22(11):4821–4847CrossRefGoogle Scholar
  9. Brockman P, Li X, Price SM (2013) Do managers put their money where their mouths are? Evidence from insider trading after conference calls. Social Science Research Network Working Paper Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2200639
  10. Brockman P, Martin X, Puckett A (2010) Voluntary disclosures around CEO stock option exercises. J Corp Financ 16:120–136CrossRefGoogle Scholar
  11. Chakrabarti D (2004) Autopart: parameter-free graph partitioning and outlier detection. In: Proceedings of the European conference on principles of, data mining and knowledge discovery, pp 112–124Google Scholar
  12. Cheng Q, Lo K (2006) Insider trading and voluntary disclosure. J Account Res 44:815–848CrossRefGoogle Scholar
  13. Chin A (1997) Accurate calculation of short-swing profits under section 16(b) of the Securities Exchange Act of 1934. Del J Corp Law 22(32):587–599Google Scholar
  14. Cohen L, Malloy C, Pomorski L (2012) Decoding inside information. J Financ 67(3):1009–1044CrossRefGoogle Scholar
  15. Donoho S (2004) Early detection of insider trading in option markets. In: Proceedings of the ACM SIGKDD conference on knowledge discovery and data miningGoogle Scholar
  16. Eberle W, Holder L (2007): Discovering structural anomalies in graph-based data. In: Proceedings of the IEEE international conference on data mining workshops, pp 393–398Google Scholar
  17. Edelson R, Whisenant S (2009) A study of companies with abnormally favorable patterns of executive stock option grant timing. Social Science Research Network Working Paper Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1326517
  18. Fan W, Yu PS, Wang H (2004) Mining extremely skewed trading anomalies. In: Proceedings of the extending database technology conferenceGoogle Scholar
  19. Goldberg HG, Kirkland JD, Lee D, Shyr P, Thakker D (2003) The NASD securities observation, new analysis and regulation system (SONAR). In: Proceedings of the conference on innovative applications of artificial intelligenceGoogle Scholar
  20. Hamilton J (2011) The SEC’s new approach to fraud. Accessed March 22, 2013. http://www.businessweek.com/magazine/the-secs-new-approach-to-fraud-12082011.html
  21. Khandani AE, Lo AW (2011) What happened to the quants in August 2007? Evidence from factors and transactions data. J Financ Mark 14(1):1–46CrossRefGoogle Scholar
  22. Kirkos E, Spathis C, Manolopoulos Y (2007) Data mining techniques for the detection of fraudulent financial statements. Expert Syst Appl 32(4):995–1003CrossRefGoogle Scholar
  23. Lakonishok J, Lee I (2001) Are insider trades informative? Rev Financ Stud 14(1):79–111CrossRefGoogle Scholar
  24. Lorie JH, Niederhoffer V (1968) Predictive and statistical properties of insider trading. J Law Econ 11(1):35–53CrossRefGoogle Scholar
  25. McGlohon M, Bay S, Anderle MG, Steier DM, Faloutsos C (2009) SNARE: a link analytic system for graph labeling and risk detection. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data miningGoogle Scholar
  26. Moonesinghe H, Tan PN (2008) Outrank: a graph-based outlier detection framework using random walk. Int J Artif Intell Tools 17(01):19–36CrossRefGoogle Scholar
  27. Odean T (1998) Are investors reluctant to realize their losses? J Financ 53(5):1775–1798CrossRefGoogle Scholar
  28. Pandit S, Chau DH, Wang S, Faloutsos C (2007) NetProbe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the international conference on world wide webGoogle Scholar
  29. Ruiz EJ, Hristidis V, Castillo C, Gionis A, Jaimes A (2012) Correlating financial time series with micro-blogging activity. In: Proceedings of the ACM international conference on web search and data mining, pp 513–522Google Scholar
  30. Summers SL, Sweeney JT (1998) Fraudulently misstated financial statements and insider trading: an empirical analysis. Account Rev 73(1):131–146Google Scholar
  31. Sun J, Qu H, Chakrabarti D, Faloutsos C (2005) Neighborhood formation and anomaly detection in bipartite graphs. In: Proceedings of the IEEE international conference on data miningGoogle Scholar
  32. Tamersoy A, Xie B, Lenkey SL, Routledge BR, Chau DH, Navathe SB (2013) Inside insider trading: Patterns & discoveries from a large scale exploratory analysis. In: Proceedings of the IEEE/ACM international conference on advances in social networks analysis and miningGoogle Scholar
  33. The U.S. Security and Exchange Comission Electronic Data Gathering, Analysis, and Retrieval (EDGAR) System: http://www.sec.gov/edgar.shtml
  34. Witte RS, Witte JS (2009) Statistics, 9 edn. WileyGoogle Scholar

Copyright information

© Springer-Verlag Wien 2014

Authors and Affiliations

  • Acar Tamersoy
    • 1
  • Elias Khalil
    • 1
  • Bo Xie
    • 1
  • Stephen L. Lenkey
    • 2
  • Bryan R. Routledge
    • 3
  • Duen Horng Chau
    • 1
  • Shamkant B. Navathe
    • 1
  1. 1.College of ComputingGeorgia Institute of TechnologyAtlantaUSA
  2. 2.Division of Economic and Risk AnalysisU.S. Securities and Exchange CommissionWashingtonUSA
  3. 3.Tepper School of BusinessCarnegie Mellon UniversityPittsburghUSA

Personalised recommendations