skip to main content
10.1145/3543507.3583385acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Open Access

Misbehavior and Account Suspension in an Online Financial Communication Platform

Published:30 April 2023Publication History

ABSTRACT

The expanding accessibility and appeal of investing have attracted millions of new retail investors. As such, investment discussion boards became the de facto communities where traders create, disseminate, and discuss investing ideas. These communities, which can provide useful information to support investors, have anecdotally also attracted a wide range of misbehavior – toxicity, spam/fraud, and reputation manipulation. This paper is the first comprehensive analysis of online misbehavior in the context of investment communities. We study TradingView, the largest online communication platform for financial trading. We collect 2.76M user profiles with their corresponding social graphs, 4.2M historical article posts, and 5.3M comments, including information on nearly 4 000 suspended accounts and 17 000 removed comments. Price fluctuations seem to drive abuse across the platform and certain types of assets, such as “meme” stocks, attract disproportionate misbehavior. Suspended user accounts tend to form more closely-knit communities than those formed by non-suspended accounts; and paying accounts are less likely to be suspended than free accounts even when posting similar levels of content violating platform policies. We conclude by offering guidelines on how to adapt content moderation efforts to fit the particularities of online investment communities.

References

  1. Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Sue Moon, and Hawoong Jeong. 2007. Analysis of topological characteristics of huge online social networking services. In Proceedings of the 16th international conference on World Wide Web. 835–844.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Muhammad Al-Qurishi, Majed Alrubaian, Sk Md Mizanur Rahman, Atif Alamri, and Mohammad Mehedi Hassan. 2018. A prediction system of Sybil attack in social network using deep-regression model. Future Generation Computer Systems 87 (2018), 743–753.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Pentland. 2014. Twitter: who gets caught? observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science. 33–41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Wayne E Baker. 1984. The social structure of a national securities market. American journal of sociology 89, 4 (1984), 775–811.Google ScholarGoogle Scholar
  5. Gianluca Bonifazi, Enrico Corradini, Domenico Ursino, and Luca Virgili. 2021. A Social Network Analysis–based approach to investigate user behaviour during a cryptocurrency speculative bubble. Journal of Information Science (2021), 01655515211047428.Google ScholarGoogle Scholar
  6. Jeffrey R Brown, Zoran Ivković, Paul A Smith, and Scott Weisbenner. 2008. Neighbors matter: Causal community effects and stock market participation. The Journal of Finance 63, 3 (2008), 1509–1531.Google ScholarGoogle ScholarCross RefCross Ref
  7. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197–210.Google ScholarGoogle Scholar
  8. Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477–488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Meta Transparency Center. 2022. Inauthentic behavior. https://transparency.fb.com/policies/community-standards/inauthentic-behavior/. Accessed Sep. 29th, 2022.Google ScholarGoogle Scholar
  10. Farhan Asif Chowdhury, Lawrence Allen, Mohammad Yousuf, and Abdullah Mueen. 2020. On Twitter purge: a retrospective analysis of suspended users. In Companion proceedings of the web conference 2020. 371–378.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Farhan Asif Chowdhury, Dheeman Saha, Md Rashidul Hasan, Koustuv Saha, and Abdullah Mueen. 2021. Examining factors associated with twitter account suspension following the 2020 us presidential election. In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 607–612.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web. 213–224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1 (1960), 37–46.Google ScholarGoogle Scholar
  14. Stefano Cresci. 2020. A decade of social bot detection. Commun. ACM 63, 10 (2020), 72–83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated hate speech detection and the problem of offensive language. In Proceedings of the international AAAI conference on web and social media, Vol. 11. 512–515.Google ScholarGoogle ScholarCross RefCross Ref
  16. Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proceedings of the 25th international conference companion on world wide web. 273–274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Philipp Doering, Sascha Neumann, and Stephan Paul. 2015. A primer on social trading networks–institutional aspects and empirical evidenc. In EFMA annual meetings.Google ScholarGoogle Scholar
  18. Don Fallis. 2015. What is disinformation?Library trends 63, 3 (2015), 401–426.Google ScholarGoogle Scholar
  19. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96–104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Emma Fletcher. 2022. Reports show scammers cashing in on crypto craze. https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze#crypto1Google ScholarGoogle Scholar
  21. Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148–170.Google ScholarGoogle Scholar
  22. JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. 2018. The economics of cryptocurrency pump and dump schemes. Available at SSRN 3310307 (2018).Google ScholarGoogle Scholar
  23. Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 42, 1 (2009), 1–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Steven Huddart. 1999. Reputation and performance fee effects on portfolio choice by investment advisers. Journal of financial Markets 2, 3 (1999), 227–271.Google ScholarGoogle ScholarCross RefCross Ref
  25. Google Jigsaw. Accessed: Oct. 12th, 2022. Perspective: Using machine learning to reduce toxicity online. https://perspectiveapi.com/.Google ScholarGoogle Scholar
  26. Mika Juuti, Tommi Gröndahl, Adrian Flanagan, and N. Asokan. 2020. A little goes a long way: Improving toxic language classification despite data scarcity. In Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, Online, 2991–3009. https://doi.org/10.18653/v1/2020.findings-emnlp.269Google ScholarGoogle Scholar
  27. Josh Kamps and Bennett Kleinberg. 2018. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science 7, 1 (2018), 1–18.Google ScholarGoogle ScholarCross RefCross Ref
  28. Hyunwoo Kim, Youngjae Yu, Liwei Jiang, Ximing Lu, Daniel Khashabi, Gunhee Kim, Yejin Choi, and Maarten Sap. 2022. ProsocialDialog: A Prosocial Backbone for Conversational Agents. arXiv preprint arXiv:2205.12688 (2022).Google ScholarGoogle Scholar
  29. Deepak Kumar, Jeff Hancock, Kurt Thomas, and Zakir Durumeric. 2022. Understanding Longitudinal Behaviors of Toxic Accounts on Reddit. arXiv preprint arXiv:2209.02533 (2022).Google ScholarGoogle Scholar
  30. Huyen Le, GR Boynton, Zubair Shafiq, and Padmini Srinivasan. 2019. A postmortem of suspended Twitter accounts in the 2016 US presidential election. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 258–265.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Guillaume Lemaître, Fernando Nogueira, and Christos K Aridas. 2017. Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. The Journal of Machine Learning Research 18, 1 (2017), 559–563.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Ivan Levingston. 2021. TradingView’s $3 Billion Valuation Fed by Retail Investing Boom. https://www.bloomberg.com/news/articles/2021-10-14/tradingview-s-3-billion-valuation-fed-by-retail-investing-boom. Accessed Jan. 31st, 2022.Google ScholarGoogle Scholar
  33. Tao Li, Donghwa Shin, and Baolian Wang. 2019. Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041 (2019).Google ScholarGoogle Scholar
  34. Alice E Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. (2017).Google ScholarGoogle Scholar
  35. Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Galstyan. 2021. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Transactions on Computational Social Systems 8, 3 (2021), 607–617.Google ScholarGoogle ScholarCross RefCross Ref
  36. Tyler Moore and Nicolas Christin. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International conference on financial cryptography and data security. Springer, 25–33.Google ScholarGoogle ScholarCross RefCross Ref
  37. Tyler Moore, Jie Han, and Richard Clayton. 2012. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In International Conference on financial cryptography and data security. Springer, 41–56.Google ScholarGoogle ScholarCross RefCross Ref
  38. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report.Google ScholarGoogle Scholar
  39. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti, Stefano Cresci, Maurizio Tesconi, and Emilio Ferrara. 2020. Charting the landscape of online cryptocurrency manipulation. IEEE Access 8 (2020), 113230–113245.Google ScholarGoogle ScholarCross RefCross Ref
  41. Han Woo Park and LEE Youngjoo. 2019. How Are Twitter Activities Related to Top Cryptocurrencies’ Performance? Evidence from Social Media Network and Sentiment Analysis. Drustvena Istrazivanja 28, 3 (2019).Google ScholarGoogle Scholar
  42. John Pavlopoulos, Jeffrey Sorensen, Lucas Dixon, Nithum Thain, and Ion Androutsopoulos. 2020. Toxicity detection: Does context really matter?arXiv preprint arXiv:2006.00998 (2020).Google ScholarGoogle Scholar
  43. Reddit. Accessed 2022-10-12. /r/wallstreetbets. https://www.reddit.com/r/wallstreetbets/.Google ScholarGoogle Scholar
  44. Manoel Horta Ribeiro, Pedro H Calais, Yuri A Santos, Virgílio AF Almeida, and Wagner Meira Jr. 2018. Characterizing and detecting hateful users on twitter. In Twelfth international AAAI conference on web and social media.Google ScholarGoogle ScholarCross RefCross Ref
  45. Maarten Sap, Swabha Swayamdipta, Laura Vianna, Xuhui Zhou, Yejin Choi, and Noah A Smith. 2021. Annotators with attitudes: How annotator beliefs and identities bias toxic language detection. arXiv preprint arXiv:2111.07997 (2021).Google ScholarGoogle Scholar
  46. Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. 2018. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior 83 (2018), 278–287.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15). 33–48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan Routledge, and Nicolas Christin. 2021. Towards understanding cryptocurrency derivatives: A case study of BitMEX. In Proceedings of the 30th Web Conference (WWW’21). Ljubljana, Slovenia (online).Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, 2021. Sok: Hate, harassment, and the changing landscape of online abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247–267.Google ScholarGoogle ScholarCross RefCross Ref
  50. Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. 243–258.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. TradingView. 2022. Advertise on TradingView. https://www.tradingview.com/advertising-info/ Accessed Oct. 6th, 2022.Google ScholarGoogle Scholar
  52. TradingView. 2022. Our House rules. https://www.tradingview.com/support/solutions/43000591638-our-house-rules/. Accessed Sep. 28th, 2022.Google ScholarGoogle Scholar
  53. Tavish Vaidya, Daniel Votipka, Michelle L Mazurek, and Micah Sherr. 2019. Does being verified make you more credible? Account verification’s effect on tweet credibility. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Marie Vasek and Tyler Moore. 2018. Analyzing the Bitcoin Ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, 101–112.Google ScholarGoogle Scholar
  55. Friedhelm Victor and Tanja Hagemann. 2019. Cryptocurrency pump and dump schemes: Quantification and detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, 244–251.Google ScholarGoogle ScholarCross RefCross Ref
  56. Bimal Viswanath, Ansley Post, Krishna P Gummadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 363–374.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Veit Wohlgemuth, Elisabeth SC Berger, and Matthias Wenzel. 2016. More than just financial performance: Trusting investors in social trading. Journal of Business Research 69, 11 (2016), 4970–4974.Google ScholarGoogle ScholarCross RefCross Ref
  58. Samuel C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday (2016).Google ScholarGoogle Scholar
  59. Jiahua Xu and Benjamin Livshits. 2019. The anatomy of a cryptocurrency pump-and-dump scheme. In 28th USENIX Security Symposium). 1609–1625.Google ScholarGoogle Scholar
  60. Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web. 71–80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Kai-Cheng Yang, Onur Varol, Pik-Mai Hui, and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 1096–1103.Google ScholarGoogle ScholarCross RefCross Ref
  62. Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data (TKDD) 8, 1 (2014), 1–29.Google ScholarGoogle Scholar
  63. David Yermack. 2015. Is Bitcoin a real currency? An economic appraisal. In Handbook of digital currency. Elsevier, 31–43.Google ScholarGoogle Scholar

Index Terms

  1. Misbehavior and Account Suspension in an Online Financial Communication Platform

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Article Metrics

        • Downloads (Last 12 months)349
        • Downloads (Last 6 weeks)32

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format