Journal of Information Technology

, Volume 32, Issue 3, pp 251–269 | Cite as

A taxonomy of financial market manipulations: establishing trust and market integrity in the financialized economy through automated fraud detection

  • Michael Siering
  • Benjamin Clapham
  • Oliver Engel
  • Peter Gomber
Research Article

Abstract

Financial market manipulations represent a major threat to trust and market integrity in capital markets. Manipulations contribute to mispricing, market imperfections and an increase in transaction costs for market participants and in costs of capital for issuers. Manipulations are facilitated by increased transaction velocity, speculative trading and abusive usage of new trading technologies, i.e., they are directly linked to financial sector changes that drive financialization. Research at the intersection of financialization and IS might support regulatory authorities and market operators in improving market surveillance and helping to detect fraudulent activities. However, confusing terminology is prevalent on financial markets with respect to different manipulation techniques and their characteristics, which hampers efficient fraud detection. Furthermore, recognizing manipulations is challenging given the large number of information sources and the vast number of trades occurring not least because of high-frequency traders. Therefore, automated market surveillance tools require a comprehensive taxonomy of financial market manipulations as a basis for appropriate configuration. Based on a cluster analysis of SEC litigation releases, a review of the latest market abuse regulation and academic studies, we develop a taxonomy of manipulations that structures and details existing manipulation techniques and reveals how these techniques differ along several dimensions. In a case study, we show how the taxonomy can be utilized to guide the development of appropriate decision support systems for fraud detection.

Keywords

financial market manipulation market surveillance taxonomy fraud detection decision support 

References

  1. Aalbers, M. (2016). Corporate financialization. In D. Richardson, N. Castree, M. F. Goodchild, A. Kobayashi, W. Liu, and R. A. Marston (Eds.), International Encyclopedia of Geography: People, the Earth, Environment and Technology. Oxford: Wiley.Google Scholar
  2. Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., Nunamaker, Jr, and Jay, F. (2010). Detecting Fake Websites: The Contribution of Statistical Learning Theory. MIS Quarterly, 34(3), 435–461.Google Scholar
  3. Abrantes-Metz, R. M., Kraten, M., Metz, A. D., and Seow, G. S. (2012). Libor Manipulation? Journal of Banking & Finance, 36(1), 136–150.CrossRefGoogle Scholar
  4. Aggarwal, R. K., and Wu, G. (2006). Stock Market Manipulations. Journal of Business, 79(4), 1915–1953.CrossRefGoogle Scholar
  5. Akhigbe, A., Madura, J., and Martin, A. (2005). Accounting Contagion: The Case of Enron. Journal of Economics and Finance, 29(2), 187–202.CrossRefGoogle Scholar
  6. Aliguliyev, R. M. (2009). Performance Evaluation of Density-Based Clustering Methods. Information Sciences, 179(20), 3583–3602.CrossRefGoogle Scholar
  7. Allen, F., and Gale, D. (1992). Stock-Price Manipulation. Review of Financial Studies, 5(3), 503–529.CrossRefGoogle Scholar
  8. Allen, F., Litov, L., and Mei, J. (2006). Large Investors, Price Manipulation, and Limits to Arbitrage: An Anatomy of Market Corners. Review of Finance, 10(4), 645–693.CrossRefGoogle Scholar
  9. Allen, S., and Ramanan, R. (1995). Insider Trading, Earnings Changes, and Stock Prices. Management Science, 41(4), 653–668.CrossRefGoogle Scholar
  10. Arshadi, N. (1998). Insider Trading Liability and Enforcement Strategy. Financial Management, 27(2), 70–84.CrossRefGoogle Scholar
  11. Bailey, K. D. (1984). A Three-Level Measurement Model. Quality & Quantity, 18(3), 225–245.CrossRefGoogle Scholar
  12. Baker, N. (2005). Fraud and Artificial Intelligence. Internal Auditor, 62(1), 29–32.Google Scholar
  13. Bartels, K. C. (2000). Click Here to Buy the Next Microsoft: The Penny Stock Rules, Online Microcap Fraud, and the Unwary Investor. Indiana Law Journal, 75(1), 353–378.Google Scholar
  14. Biais, B. and Woolley, P. (2011). High frequency trading [WWW document] http://www.eifr.eu/files/file2220879.pdf (accessed 24th February 2016).
  15. Bonner, S. E., Palmrose, Z.-V., and Young, S. M. (1998). Fraud Type and Auditor Litigation: An Analysis of SEC Accounting and Auditing Enforcement Releases. The Accounting Review, 73(4), 503–532.Google Scholar
  16. Bouwman, M. J. (1983). Human Diagnostic Reasoning by Computer: An Illustration from Financial Analysis. Management Science, 29(6), 653–672.CrossRefGoogle Scholar
  17. Carhart, M. M., Kaniel, R., Musto, D. K., and Reed, A. V. (2002). Leaning for the Tape: Evidence of Gaming Behavior in Equity Mutual Funds. The Journal of Finance, 57(2), 661–693.CrossRefGoogle Scholar
  18. Carroll, J. B. (1993). Human Cognitive Abilities: A Survey of Factor-Analytic Studies. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  19. Carroll, B. (2006). How to Prevent Investment Adviser Fraud. Journal of Accountancy, 201(1), 40–43.Google Scholar
  20. Cataldo, A. J., and Killough, L. N. (2003). Market Makers’ Methods of Stock Manipulation. Management Accounting Quarterly, 4(4), 10–13.Google Scholar
  21. Chaturvedula, C., Bang, N. P., Rastogi, N., and Kumar, S. (2015). Price Manipulation, Front Running and Bulk Trades: Evidence from India. Emerging Markets Review, 23, 26–45.CrossRefGoogle Scholar
  22. Coffee, J. C. (2005). A Theory of Corporate Scandals: Why the USA and Europe Differ. Oxford Review of Economic Policy, 21(2), 198–211.CrossRefGoogle Scholar
  23. Comerton-Forde, C., and Putnins, T. J. (2011). Measuring Closing Price Manipulation. Journal of Financial Intermediation, 20(2), 135–158.CrossRefGoogle Scholar
  24. Cooper, D. J., and Donaldson, R. G. (1998). A Strategic Analysis of Corners and Squeezes. The Journal of Financial and Quantitative Analysis, 33(1), 117–137.CrossRefGoogle Scholar
  25. Cumming, D., and Johan, S. (2008). Global Market Surveillance. American Law and Economics Review, 10(2), 454–506.CrossRefGoogle Scholar
  26. Cumming, D., Zhan, F. and Aitken, M. (2012). High Frequency Trading and End-of-Day Manipulation [WWW document] https://www.legacy.wlu.ca/documents/54105/Cumming-Zhan-Aitken-15012013_2.pdf (accessed 24th February 2016).
  27. Davis, H. A. (2007). Summary of Selected FINRA Regulatory Notices. Journal of Investment Compliance, 8(4), 60–67.CrossRefGoogle Scholar
  28. Denney, A. S., and Tewksbury, R. (2013). How to Write a Literature Review. Journal of Criminal Justice Education, 24(2), 218–234.CrossRefGoogle Scholar
  29. Easley, D., Prado, De, Lopez, Marcos M., and O’Hara, M. (2011). The Microstructure of the “Flash Crash”: Flow Toxicity, Liquidity Crashes, and the Probability of Informed Trading. Journal of Portfolio Management, 37(2), 118.CrossRefGoogle Scholar
  30. European Parliament and Council (2014). Market Abuse Regulation No 596/2014 [WWW document] http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32014R0596 (accessed 24th February 2016).
  31. European Parliament and Council (2016). Benchmark Regulation 2016/1011 [WWW document] http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R1011&from=EN (accessed 4th August 2016).
  32. Fama, E. F. (1970). Efficient Capital Markets: A Review of Theory and Empirical Work. The Journal of Finance, 25(2), 383–417.CrossRefGoogle Scholar
  33. Fatudimu, I., Musa, A., Ayo, C., and Sofoluwe, A. B. (2008). Knowledge Discovery in Online Repositories: A Text Mining Approach. European Journal of Scientific Research, 22(2), 241–250.Google Scholar
  34. Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P. (1996). From Data Mining to Knowledge Discovery in Databases. AI Magazine, 17(3), 37–54.Google Scholar
  35. Financial Conduct Authority (FCA) (2014). FCA Final Notice: Reference Number 124491 [WWW document] http://www.fca.org.uk/your-fca/documents/final-notices/2014/jpmorgan-chase-bank (accessed 25th August 2016).
  36. Financial Conduct Authority (FCA) (2015). Call for Input: Supporting the Development and Adoption of RegTech [WWW document] https://www.fca.org.uk/publication/call-for-input/regtech-call-for-input.pdf (accessed 12th September 2016).
  37. Financial Services Authority (FSA) (2012). FSA Final Notice: Reference Number 122702 [WWW document] http://www.fsa.gov.uk/static/pubs/final/barclays-jun12.pdf (accessed 25th August 2016).
  38. Fischel, D. R., and Ross, D. J. (1991). Should the Law Prohibit “Manipulation” In Financial Markets? Harvard Law Review, 105(2), 503–553.CrossRefGoogle Scholar
  39. Fouquau, J., and Spieser, P. K. (2015). Statistical Evidence About LIBOR Manipulation: A “Sherlock Holmes” Investigation. Journal of Banking & Finance, 50, 632–643.CrossRefGoogle Scholar
  40. Frank, J. (1994). Artificial Intelligence and Intrusion Detection: Current and Future Directions, in 17th National Computer Security Conference; Baltimore, USA, 1994, pp. 1–12.Google Scholar
  41. Gerety, M., and Lehn, K. (1997). The Causes and Consequences of Accounting Fraud. Managerial and Decision Economics, 18(7–8), 587–599.CrossRefGoogle Scholar
  42. Golmohammadi, K., Zaiane, O.R. and Diaz, D. (2014). Detecting Stock Market Manipulation Using Supervised Learning Algorithms, in International Conference on Data Science and Advanced Analytics (DSAA); Shanghai, China, 2014, pp. 435–441.Google Scholar
  43. Gomber, P., Sagade, S., Theissen, E., Weber, M.C. and Westheide, C. (2016). Competition Between Equity Markets: A Review of the Consolidation Versus Fragmentation Debate, Journal of Economic Surveys (forthcoming).Google Scholar
  44. Hanke, M., and Hauser, F. (2008). On the Effects of Stock Spam e-Mails. Journal of Financial Markets, 11(1), 57–83.CrossRefGoogle Scholar
  45. Hazen, T. L. (2010). Are Existing Stock Broker Standards Sufficient? Principles, Rules and Fiduciary Duties. Columbia Business Law Review, 2010(3), 710–761.Google Scholar
  46. Hellwig, M. F. (1980). On the Aggregation of Information in Competitive Markets. Journal of Economic Theory, 22(3), 477–498.CrossRefGoogle Scholar
  47. Hillion, P., and Suominen, M. (2004). The Manipulation of Closing Prices. Journal of Financial Markets, 7(4), 351–375.CrossRefGoogle Scholar
  48. Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., and Felix, W. F. (2011). Identification of Fraudulent Financial Statements Using Linguistic Credibility Analysis. Decision Support Systems, 50(3), 585–594.CrossRefGoogle Scholar
  49. IIROC (2012). Proposed Guidance on Certain Manipulative and Deceptive Trading Practices [WWW document] http://www.iiroc.ca/Documents/2012/f62c746a-b5c9-448a-b57f-f1c04c88de14_en.pdf (accessed 19th February 2016).
  50. Ionescu, L. (2010). Madoff’s Fraudulent Financial Scheme, His Decades-Long Swindle, and the Failure of Operational Risk Management. Economics, Management, and Financial Markets, 5(3), 239–244.Google Scholar
  51. Jarrow, R. A. (1992). Market Manipulation, Bubbles, Corners, and Short Squeezes. Journal of Financial and Quantitative Analysis, 27(03), 311–336.CrossRefGoogle Scholar
  52. Jones, K. S. (1972). A Statistical Interpretation of Term Specificity and Its Application in Retrieval. Journal of Documentation, 28(1), 11–21.CrossRefGoogle Scholar
  53. Jones, M. J. (2011). Creative Accounting, Fraud And International Accounting Scandals. Hoboken: Wiley.Google Scholar
  54. Karz, G., and Wagner, W. H. (2006). Should I Fire My Trader or Pay Him A Million? The Journal of Trading, 1(4), 85–89.CrossRefGoogle Scholar
  55. Kim, Y., and Sohn, S. Y. (2012). Stock Fraud Detection Using Peer Group Analysis. Expert Systems with Applications, 39(10), 8986–8992.CrossRefGoogle Scholar
  56. Kirkos, E., Spathis, C., and Manolopoulos, Y. (2007). Data Mining Techniques for the Detection of Fraudulent Financial Statements. Expert Systems with Applications, 32(4), 995–1003.CrossRefGoogle Scholar
  57. Klein, L. R., Dalko, V., and Wang, M. (2012). Regulating Competition in Stock Markets: Antitrust Measures to Promote Fairness and Transparency Through Investor Protection and Crisis Prevention. Hoboken: Wiley.CrossRefGoogle Scholar
  58. Kumar, P., and Langberg, N. (2009). Corporate Fraud and Investment Distortions in Efficient Capital Markets. The Rand Journal of Economics, 40(1), 144–172.CrossRefGoogle Scholar
  59. Kyle, A. S., and Viswanathan, S. (2008). How to Define Illegal Price Manipulation. American Economic Review, 98(2), 274–279.CrossRefGoogle Scholar
  60. Lagoarde-Segot, T. (2016). Financialization: Towards a New Research Agenda, International Review of Financial Analysis. doi:10.1016/j.irfa.2016.03.007.
  61. Ledgerwood, S. D., and Carpenter, P. (2012). A Framework for the Analysis of Market Manipulation. The Review of Law & Economics, 8(1), 253–295.CrossRefGoogle Scholar
  62. Lee, E. J., Eom, K. S., and Park, K. S. (2013). Microstructure-Based Manipulation: Strategic Behavior and Performance of Spoofing Traders. Journal of Financial Markets, 16(2), 227–252.CrossRefGoogle Scholar
  63. Leinweber, D. J., and Madhavan, A. N. (2001). Three Hundred Years of Stock Market Manipulations. The Journal of Investing, 10(2), 7–16.CrossRefGoogle Scholar
  64. Lenard, M. J., and Alam, P. (2009). An Historical Perspective on Fraud Detection: From Bankruptcy Models to Most Effective Indicators of Fraud in Recent Incidents. Journal of Forensic & Investigative Accounting, 1(1), 1–27.Google Scholar
  65. Levy, Y., and Ellis, T. J. (2006). A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Science: International Journal of an Emerging Transdiscipline, 9(1), 181–212.Google Scholar
  66. Lomnicka, E. (2001). Preventing and Controlling the Manipulation of Financial Markets: Towards a Definition of “Market Manipulation”. Journal of Financial Crime, 8(4), 297–304.CrossRefGoogle Scholar
  67. Losiewicz, P., Oard, D. W., and Kostoff, R. N. (2000). Textual Data Mining to Support Science and Technology Management. Journal of Intelligent Information Systems, 15(2), 99–119.CrossRefGoogle Scholar
  68. LR 17346 (2002). Litigation Release No. 17346: Securities and Exchange Commission v. Patrick O. Wheeler, Steven S. Gallers, and Robert L. Carberry, Case No. 02-60131-CIV-GRAHAM (S.D. Fla.) [WWW document] http://www.sec.gov/litigation/litreleases/lr17346.htm (accessed 19th February 2016).
  69. LR 17645 (2002). Litigation Release No. 17645: Securities and Exchange Commission v. Michael A. Ofstedahl, et al., United States District Court for the Northern District of California, Civil Action No. C-02-3685 RS. [WWW document] http://www.sec.gov/litigation/litreleases/lr17645.htm (accessed 19th February 2016).
  70. LR 21423 (2010). Litigation Release No. 21423: Securities and Exchange Commission v. Frank J. Custable, Jr., et al., Civil Action No. 03-CV-2182 (N.D. Ill.) [WWW document] http://www.sec.gov/litigation/litreleases/2010/lr21423.htm (accessed 19th February 2016).
  71. LR 22545 (2012). Litigation Release No. 22545: SEC v. Berton M. Hochfeld et al., Civil Action No. 12-CV-8202 (S.D.N.Y.) [WWW document] http://www.sec.gov/litigation/litreleases/2012/lr22545.htm (accessed 19th February 2016).
  72. MacQueen, J. (1967). Some Methods for Classification and Analysis of Multivariate Observations, in Fifth Berkeley Symposium on Mathematical Statistics and Probability (Berkeley, USA, 1967), pp. 281–297.Google Scholar
  73. Miller, G. A. (1956). The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information. Psychological Review, 63(2), 343–352.CrossRefGoogle Scholar
  74. Miller, J. G., and Roth, A. V. (1994). A Taxonomy of Manufacturing Strategies. Management Science, 40(3), 285–304.CrossRefGoogle Scholar
  75. Møllgaard, H. P. (1997). A Squeezer Round the Corner? Self-Regulation and Forward Markets. The Economic Journal, 107(440), 104–112.CrossRefGoogle Scholar
  76. Ngai, E., Hu, Y., Wong, Y., Chen, Y., and Sun, X. (2011). The Application of Data Mining Techniques in Financial Fraud Detection: A Classification Framework and an Academic Review of Literature. Decision Support Systems, 50(3), 559–569.CrossRefGoogle Scholar
  77. Nickerson, R. C., Varshney, U., and Muntermann, J. (2013). A Method for Taxonomy Development and Its Application in Information Systems. European Journal of Information Systems, 22(3), 336–359.CrossRefGoogle Scholar
  78. Öğüt, H., Doğanay, M. M., and Aktaş, R. (2009). Detecting Stock-Price Manipulation in an Emerging Market: The Case of Turkey. Expert Systems with Applications, 36(9), 11944–11949.CrossRefGoogle Scholar
  79. Pagano, M., and Immordino, G. (2012). Corporate Fraud, Governance, and Auditing. Review of Corporate Finance Studies, 1(1), 109–133.CrossRefGoogle Scholar
  80. Pelleg, D. and Moore, A. (2000). X-Means: Extending K-Means with Efficient Estimation of the Number of Clusters, in 17th International Conference on Machine Learning; Stanford, USA, 2000, pp. 727–734.Google Scholar
  81. Porter, M. F. (2006). An Algorithm for Suffix Stripping. Electronic Library and Information Systems, 40(3), 211–218.CrossRefGoogle Scholar
  82. Pozza, C. L., Jr., Cox, T. R., and Morad, R. J. (2009). Review of Recent Investor Issues in the Madoff, Standford and Forte Ponzi Scheme Cases. Journal of Business and Securities Law, 10, 113–132.Google Scholar
  83. Putnins, T. J. (2012). Market Manipulation: A Survey. Journal of Economic Surveys, 26(5), 952–967.CrossRefGoogle Scholar
  84. Rapoport, N. B. (2012). Black Swans, Ostriches, and Ponzi Schemes. Golden Gate University Law Review, 42, 627–661.Google Scholar
  85. Rehman, Z., Anwar, W., Bajwa, U. I., Xuan, W., Chaoying, Z., and Patterson, R. L. (2013). Morpheme Matching Based Text Tokenization for a Scarce Resourced Language. PLoS ONE, 8(8), e68178.CrossRefGoogle Scholar
  86. Roddenberry, S., and Bacon, F. (2011). Insider Trading and Market Efficiency: Do Insiders Buy Low and Sell High? Journal of Finance & Accountancy, 8, 1–15.Google Scholar
  87. Rokach, L. and Maimon, O. (2005). Clustering Methods, in O. Maimon and L. Rokach, (eds.), Data Mining and Knowledge Discovery Handbook, New York: Springer US, pp. 321–352.Google Scholar
  88. Rowley, J., and Slack, F. (2004). Conducting a Literature Review. Management Research News, 27(6), 31–39.CrossRefGoogle Scholar
  89. Sabherwal, S., Sarkar, S. K., and Zhang, Y. (2011). Do Internet Stock Message Boards Influence Trading? Evidence from Heavily Discussed Stocks with no Fundamental News. Journal of Business Finance & Accounting, 38(9–10), 1209–1237.CrossRefGoogle Scholar
  90. Scopino, G. (2015). The (Questionable) Legality Of High-Speed Pinging and Front Running in the Futures Market. Connecticut Law Review, 47(3), 607–697.Google Scholar
  91. Shapiro, S., Kinkela, K., and Harris, P. (2012). Churning and Suitability of Investments: A Financial Industry Regulatory Authority Arbitration Case Study. Review of Business & Finance Case Studies, 3(1), 61–67.Google Scholar
  92. Shleifer, A., and Vishny, R. W. (1997). A Survey of Corporate Governance. The Journal of Finance, 52(2), 737–783.CrossRefGoogle Scholar
  93. Tabrizi, S. A., Shakery, A., Asadpour, M., Abbasi, M., and Tavallaie, M. A. (2013). Personalized PageRank Clustering: A Graph Clustering Algorithm Based on Random Walks. Physica A: Statistical Mechanics and its Applications, 392(22), 5772–5785.CrossRefGoogle Scholar
  94. Thel, S. (1993). 850,000 in Six Minutes-The Mechanics of Securities Manipulation. Cornell Law Review, 79(2), 219–298.Google Scholar
  95. Tripp, M. J. W. (1963). Securities Regulation: Stock Scalping by the Investment Adviser: Fraud or Legitimate Business Practice? California Law Review, 51(1), 232–245.CrossRefGoogle Scholar
  96. U.S. Commodity Futures Trading Commission (CFTC) (2016). Education Center: CFTC Glossary [WWW document] http://www.cftc.gov/consumerprotection/educationcenter/cftcglossary/glossary_b (accessed 4th August 2016).
  97. Vaughan, L. (2016). Broken Benchmarks: Six Years of Probes into Financial Fiddling [WWW document] https://www.bloomberg.com/quicktake/broken-benchmarks (accessed 25th August 2016).
  98. Vila, J.-L. (1989). Simple Games of Market Manipulation. Economics Letters, 29(1), 21–26.CrossRefGoogle Scholar
  99. Webster, J., and Watson, R. T. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. Management Information Systems Quarterly, 26(2), 3.Google Scholar
  100. Wheeler, R., and Aitken, S. (2000). Multiple Algorithms for Fraud Detection. Knowledge-Based Systems, 13(2), 93–99.CrossRefGoogle Scholar
  101. Willett, P. (1988). Recent Trends in Hierarchic Document Clustering: A Critical Review. Information Processing and Management, 24(5), 577–597.CrossRefGoogle Scholar
  102. Willett, P. (2006). The Porter Stemming Algorithm: Then and Now. Electronic Library and Information Systems, 40(3), 219–223.CrossRefGoogle Scholar
  103. Ye, J. (2011). Cosine Similarity Measures for Intuitionistic Fuzzy Sets and Their Applications. Mathematical and Computer Modelling, 53(1), 91–97.CrossRefGoogle Scholar
  104. Zahedi, F. M., Abbasi, A., and Chen, Yan. (2015). Fake-Website Detection Tools: Identifying Elements that Promote Individuals’ Use and Enhance Their Performance. Journal of the Association for Information Systems, 16(6), 448–484.Google Scholar
  105. Zhou, L., Burgoon, J. K., Twitchell, D. P., Qin, T., Nunamaker, Jr, and Jay, F. (2004). A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. Journal of Management Information Systems, 20(4), 139–166.CrossRefGoogle Scholar

Copyright information

© Association for Information Technology Trust 2017

Authors and Affiliations

  • Michael Siering
    • 1
  • Benjamin Clapham
    • 1
  • Oliver Engel
    • 1
  • Peter Gomber
    • 1
  1. 1.Goethe University FrankfurtFrankfurtGermany

Personalised recommendations