ABSTRACT
The expanding accessibility and appeal of investing have attracted millions of new retail investors. As such, investment discussion boards became the de facto communities where traders create, disseminate, and discuss investing ideas. These communities, which can provide useful information to support investors, have anecdotally also attracted a wide range of misbehavior – toxicity, spam/fraud, and reputation manipulation. This paper is the first comprehensive analysis of online misbehavior in the context of investment communities. We study TradingView, the largest online communication platform for financial trading. We collect 2.76M user profiles with their corresponding social graphs, 4.2M historical article posts, and 5.3M comments, including information on nearly 4 000 suspended accounts and 17 000 removed comments. Price fluctuations seem to drive abuse across the platform and certain types of assets, such as “meme” stocks, attract disproportionate misbehavior. Suspended user accounts tend to form more closely-knit communities than those formed by non-suspended accounts; and paying accounts are less likely to be suspended than free accounts even when posting similar levels of content violating platform policies. We conclude by offering guidelines on how to adapt content moderation efforts to fit the particularities of online investment communities.
- Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Sue Moon, and Hawoong Jeong. 2007. Analysis of topological characteristics of huge online social networking services. In Proceedings of the 16th international conference on World Wide Web. 835–844.Google Scholar
Digital Library
- Muhammad Al-Qurishi, Majed Alrubaian, Sk Md Mizanur Rahman, Atif Alamri, and Mohammad Mehedi Hassan. 2018. A prediction system of Sybil attack in social network using deep-regression model. Future Generation Computer Systems 87 (2018), 743–753.Google Scholar
Digital Library
- Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Pentland. 2014. Twitter: who gets caught? observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science. 33–41.Google Scholar
Digital Library
- Wayne E Baker. 1984. The social structure of a national securities market. American journal of sociology 89, 4 (1984), 775–811.Google Scholar
- Gianluca Bonifazi, Enrico Corradini, Domenico Ursino, and Luca Virgili. 2021. A Social Network Analysis–based approach to investigate user behaviour during a cryptocurrency speculative bubble. Journal of Information Science (2021), 01655515211047428.Google Scholar
- Jeffrey R Brown, Zoran Ivković, Paul A Smith, and Scott Weisbenner. 2008. Neighbors matter: Causal community effects and stock market participation. The Journal of Finance 63, 3 (2008), 1509–1531.Google Scholar
Cross Ref
- Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197–210.Google Scholar
- Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477–488.Google Scholar
Digital Library
- Meta Transparency Center. 2022. Inauthentic behavior. https://transparency.fb.com/policies/community-standards/inauthentic-behavior/. Accessed Sep. 29th, 2022.Google Scholar
- Farhan Asif Chowdhury, Lawrence Allen, Mohammad Yousuf, and Abdullah Mueen. 2020. On Twitter purge: a retrospective analysis of suspended users. In Companion proceedings of the web conference 2020. 371–378.Google Scholar
Digital Library
- Farhan Asif Chowdhury, Dheeman Saha, Md Rashidul Hasan, Koustuv Saha, and Abdullah Mueen. 2021. Examining factors associated with twitter account suspension following the 2020 us presidential election. In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 607–612.Google Scholar
Digital Library
- Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web. 213–224.Google Scholar
Digital Library
- Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1 (1960), 37–46.Google Scholar
- Stefano Cresci. 2020. A decade of social bot detection. Commun. ACM 63, 10 (2020), 72–83.Google Scholar
Digital Library
- Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated hate speech detection and the problem of offensive language. In Proceedings of the international AAAI conference on web and social media, Vol. 11. 512–515.Google Scholar
Cross Ref
- Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proceedings of the 25th international conference companion on world wide web. 273–274.Google Scholar
Digital Library
- Philipp Doering, Sascha Neumann, and Stephan Paul. 2015. A primer on social trading networks–institutional aspects and empirical evidenc. In EFMA annual meetings.Google Scholar
- Don Fallis. 2015. What is disinformation?Library trends 63, 3 (2015), 401–426.Google Scholar
- Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96–104.Google Scholar
Digital Library
- Emma Fletcher. 2022. Reports show scammers cashing in on crypto craze. https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze#crypto1Google Scholar
- Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148–170.Google Scholar
- JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. 2018. The economics of cryptocurrency pump and dump schemes. Available at SSRN 3310307 (2018).Google Scholar
- Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 42, 1 (2009), 1–31.Google Scholar
Digital Library
- Steven Huddart. 1999. Reputation and performance fee effects on portfolio choice by investment advisers. Journal of financial Markets 2, 3 (1999), 227–271.Google Scholar
Cross Ref
- Google Jigsaw. Accessed: Oct. 12th, 2022. Perspective: Using machine learning to reduce toxicity online. https://perspectiveapi.com/.Google Scholar
- Mika Juuti, Tommi Gröndahl, Adrian Flanagan, and N. Asokan. 2020. A little goes a long way: Improving toxic language classification despite data scarcity. In Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, Online, 2991–3009. https://doi.org/10.18653/v1/2020.findings-emnlp.269Google Scholar
- Josh Kamps and Bennett Kleinberg. 2018. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science 7, 1 (2018), 1–18.Google Scholar
Cross Ref
- Hyunwoo Kim, Youngjae Yu, Liwei Jiang, Ximing Lu, Daniel Khashabi, Gunhee Kim, Yejin Choi, and Maarten Sap. 2022. ProsocialDialog: A Prosocial Backbone for Conversational Agents. arXiv preprint arXiv:2205.12688 (2022).Google Scholar
- Deepak Kumar, Jeff Hancock, Kurt Thomas, and Zakir Durumeric. 2022. Understanding Longitudinal Behaviors of Toxic Accounts on Reddit. arXiv preprint arXiv:2209.02533 (2022).Google Scholar
- Huyen Le, GR Boynton, Zubair Shafiq, and Padmini Srinivasan. 2019. A postmortem of suspended Twitter accounts in the 2016 US presidential election. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 258–265.Google Scholar
Digital Library
- Guillaume Lemaître, Fernando Nogueira, and Christos K Aridas. 2017. Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. The Journal of Machine Learning Research 18, 1 (2017), 559–563.Google Scholar
Digital Library
- Ivan Levingston. 2021. TradingView’s $3 Billion Valuation Fed by Retail Investing Boom. https://www.bloomberg.com/news/articles/2021-10-14/tradingview-s-3-billion-valuation-fed-by-retail-investing-boom. Accessed Jan. 31st, 2022.Google Scholar
- Tao Li, Donghwa Shin, and Baolian Wang. 2019. Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041 (2019).Google Scholar
- Alice E Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. (2017).Google Scholar
- Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Galstyan. 2021. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Transactions on Computational Social Systems 8, 3 (2021), 607–617.Google Scholar
Cross Ref
- Tyler Moore and Nicolas Christin. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International conference on financial cryptography and data security. Springer, 25–33.Google Scholar
Cross Ref
- Tyler Moore, Jie Han, and Richard Clayton. 2012. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In International Conference on financial cryptography and data security. Springer, 41–56.Google Scholar
Cross Ref
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report.Google Scholar
- Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.Google Scholar
Digital Library
- Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti, Stefano Cresci, Maurizio Tesconi, and Emilio Ferrara. 2020. Charting the landscape of online cryptocurrency manipulation. IEEE Access 8 (2020), 113230–113245.Google Scholar
Cross Ref
- Han Woo Park and LEE Youngjoo. 2019. How Are Twitter Activities Related to Top Cryptocurrencies’ Performance? Evidence from Social Media Network and Sentiment Analysis. Drustvena Istrazivanja 28, 3 (2019).Google Scholar
- John Pavlopoulos, Jeffrey Sorensen, Lucas Dixon, Nithum Thain, and Ion Androutsopoulos. 2020. Toxicity detection: Does context really matter?arXiv preprint arXiv:2006.00998 (2020).Google Scholar
- Reddit. Accessed 2022-10-12. /r/wallstreetbets. https://www.reddit.com/r/wallstreetbets/.Google Scholar
- Manoel Horta Ribeiro, Pedro H Calais, Yuri A Santos, Virgílio AF Almeida, and Wagner Meira Jr. 2018. Characterizing and detecting hateful users on twitter. In Twelfth international AAAI conference on web and social media.Google Scholar
Cross Ref
- Maarten Sap, Swabha Swayamdipta, Laura Vianna, Xuhui Zhou, Yejin Choi, and Noah A Smith. 2021. Annotators with attitudes: How annotator beliefs and identities bias toxic language detection. arXiv preprint arXiv:2111.07997 (2021).Google Scholar
- Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. 2018. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior 83 (2018), 278–287.Google Scholar
Digital Library
- Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15). 33–48.Google Scholar
Digital Library
- Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan Routledge, and Nicolas Christin. 2021. Towards understanding cryptocurrency derivatives: A case study of BitMEX. In Proceedings of the 30th Web Conference (WWW’21). Ljubljana, Slovenia (online).Google Scholar
Digital Library
- Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, 2021. Sok: Hate, harassment, and the changing landscape of online abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247–267.Google Scholar
Cross Ref
- Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. 243–258.Google Scholar
Digital Library
- TradingView. 2022. Advertise on TradingView. https://www.tradingview.com/advertising-info/ Accessed Oct. 6th, 2022.Google Scholar
- TradingView. 2022. Our House rules. https://www.tradingview.com/support/solutions/43000591638-our-house-rules/. Accessed Sep. 28th, 2022.Google Scholar
- Tavish Vaidya, Daniel Votipka, Michelle L Mazurek, and Micah Sherr. 2019. Does being verified make you more credible? Account verification’s effect on tweet credibility. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.Google Scholar
Digital Library
- Marie Vasek and Tyler Moore. 2018. Analyzing the Bitcoin Ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, 101–112.Google Scholar
- Friedhelm Victor and Tanja Hagemann. 2019. Cryptocurrency pump and dump schemes: Quantification and detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, 244–251.Google Scholar
Cross Ref
- Bimal Viswanath, Ansley Post, Krishna P Gummadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 363–374.Google Scholar
Digital Library
- Veit Wohlgemuth, Elisabeth SC Berger, and Matthias Wenzel. 2016. More than just financial performance: Trusting investors in social trading. Journal of Business Research 69, 11 (2016), 4970–4974.Google Scholar
Cross Ref
- Samuel C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday (2016).Google Scholar
- Jiahua Xu and Benjamin Livshits. 2019. The anatomy of a cryptocurrency pump-and-dump scheme. In 28th USENIX Security Symposium). 1609–1625.Google Scholar
- Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web. 71–80.Google Scholar
Digital Library
- Kai-Cheng Yang, Onur Varol, Pik-Mai Hui, and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 1096–1103.Google Scholar
Cross Ref
- Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data (TKDD) 8, 1 (2014), 1–29.Google Scholar
- David Yermack. 2015. Is Bitcoin a real currency? An economic appraisal. In Handbook of digital currency. Elsevier, 31–43.Google Scholar
Index Terms
Misbehavior and Account Suspension in an Online Financial Communication Platform
Recommendations
How Do Financial Firms Manage Risk? Unraveling the Interaction of Financial and Operational Hedging
This paper investigates how firms manage risk by examining the relationship between financial and operational hedging using a sample of bank holding companies. Risk management theory holds that capital market imperfections make cash flow volatility ...
Islamic Online P2P Lending Platform
AbstractPeer to peer (P2P) lending allows people with fund surplus to lend to people who need funds via online platforms. Those who need fund become able to choose the most suitable fund provider; lender. In this type of intermediation, banks are out of ...
On the Integration of Production and Financial Hedging Decisions in Global Markets
We study the integrated operational and financial hedging decisions faced by a global firm who sells to both home and foreign markets. Production occurs either at a single facility located in one of the markets or at two facilities, one in each market. ...





Comments