References

  • Aggarwal, R.K., and Wu, G. Stock market manipulations. Journal of Business, 79, 4 (2006), 1915–1953.
  • Alias-i. 2015. http://alias-i.Com/lingpipe. (accessed April 20, 2015).
  • Auer, S.; Bizer, C.; Lehmann, J.; Kobilarov, G.; Cyganiak, R.; and Ives, Z. Dbpedia: A nucleus for a web of open data. In 6th International Semantic Web Conference. Busan, Korea: LNCS, Springer, 2007, pp. 722–735.
  • Augustin, P.; Brenner, M.; and Subrahmanyam, M.G. Informed options trading prior to M&A announcements: Insider trading? 2014. http://ssrn.com/abstract=2441606. (accessed April 20, 2015).
  • AWACS. 2015. http://www.3i-infotech.Com/content/capital_market/stock_exchange_surveillance_system.Aspx. (accessed April 20, 2015).
  • Baccianella, S.; Esuli, A.; and Sebastiani, F. Sentiwordnet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining. In 7th Conference on International Language Resources and Evaluation, Valletta, Malta: European Language Resources Association (ELRA), 2010, pp. 19–21.
  • Baralis, E.; Cagliero, L.; Jabeen, S.; Fiori, A.; and Shah, S. Multi-document summarization based on the Yago ontology. Expert Systems with Applications, 40, 17 (2013), 6976–6984.
  • Bloehdorn, S.; Hotho, A.; and Staab, S. An ontology-based framework for text mining. LDV Forum: GLDV Journal for Computational Linguistics and Language Technology, 20, 1 (2005), 87–112.
  • Caruthers, R. NYSE to switch its market surveillance from FINRA to NYSE regulation subsidiary. FierceFinanceIT, 2014. http://www.fiercefinanceit.com/story/nyse-switch-its-market-surveillance-finra-nyse-regulation-subsidiary/2014-10-07 (accessed April 20, 2015).
  • Comerton-Forde, C., and Rydge, J. Market integrity and surveillance effort. Journal of Financial Servies Research, 29 (2006), 149–172.
  • Cornell, B., and Sirri, E.R. The reaction of investors and stock-prices to insider trading. Journal of Finance, 47, 3 (1992), 1031–1059.
  • Cumming, D., and Johan, S. Global market surveillance. American Law and Economics Review, 10, 2 (2008), 454–506.
  • Das, S.R., and Chen, M.Y. Yahoo! For Amazon: Sentiment extraction from small talk on the web. Management Science, 53, 9 (2007), 1375–1388.
  • DeLone, W.H., and McLean, E.R. The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19, 4 (2003), 9–30.
  • Diaz, D.; Theodoulidis, B.; and Sampaio, P. A unified framework for financial market monitoring systems. 2010. http://ssrn.com/abstract=1561663 (accessed April 20, 2015).
  • Drummond, M. Asic targets insider traders with new $44m surveillance system. AFR Weekend, 2013. http://www.afr.com/news/asic-targets-insider-traders-with-new-44m-surveillance-system-20131124-iysqv (accessed April 20, 2015).
  • Elkins, A.C.; Dunbar, N.E.; Adame, B.; and Nunamaker, J.F. Are users threatened by credibility assessment systems? Journal of Management Information Systems, 29, 4 (2013), 249–261.
  • Fama, E. Efficient capital markets: A review of theory and empirical work. Journal of Finance, 25, 2 (1970), 383–417.
  • Frisen, M. Methods and evaluations for surveillance in industry, business, finance, and public health. Quality and Reliability Engineering International, 27, 5 (2011), 611–621.
  • Fung, G.P.C.; Yu, J.X.; and Lam, W. News sensitive stock trend prediction. In 6th Pacific-Asia Conference on Knowledge Discovery and Data Mining. Taipei, 2002, pp. 481–493.
  • Gabrilovich, E., and Markovitch, S. Feature generation for text categorization using world knowledge. International Joint Conferences on Artificial Intelligence, Edinburgh, Scotland: AAAI Press, 2005, pp. 1048–1053.
  • Gerrig, R., and McKoon, G. The readiness is all: The functionality of memory-based text processing. Discourse Processes, 26, 2–3 (1998), 67–86.
  • Gidofalvi, G. Using news articles to predict stock price movements. Technical Report, Department of Computer Science and Engineering, University of California, 2003.
  • Glovin, D., and Voris, B.V. Rajaratnam guilty on all counts in U.S. insider-trading case. Bloomberg, 2011. http://www.bloomberg.com/news/articles/2011-05-11/rajaratnam-is-found-guilty-of-all-counts-in-galleon-insider-trading-trial. (accessed April 20, 2015).
  • Goldberg, H.; Kirkland, J.; Lee, D.; Shyr, P.; and Thakker, D. The NASD securities observation, news analysis & regulation system. In Conference on Innovative Applications of Artificial Intelligence. Acapulco, Mexico, 2003, pp. 11–18.
  • Green, T. Economic news and the impact of trading on bond prices. Journal of Finance, 59, 3 (2004), 1203–1234.
  • Gregor, S., and Hevner, A.R. Positioning and presenting design science research for maximum impact. MIS Quarterly, 37, 2 (2013), 337–355.
  • Gupta, R., and Ratinov, L. Text categorization with knowledge transfer from heterogeneous data sources. In 23rd AAAI Conference on Artificial Intelligence. Chicago, 2008, pp. 842–847.
  • Hagoort, P.; Hald, L.; Bastiaansen, M.; and Petersson, K.M. Integration of word meaning and world knowledge in language comprehension. Science, 304, 5669 (2004), 438–441.
  • Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; and Witten, I.H. The Weka data mining software: An update. SIGKDD Explorations, 11, 1 (2009), 10–18.
  • Harris, F.H.D.; Aitken, M.J.; and Ji, S. Trade-based manipulation and market efficiency after the introduction of real-time surveillance: A cross-market comparison. 2011. http://ssrn.com/abstract=1890928 (accessed April 20, 2015).
  • Hevner, A.R.; March, S.T.; Park, J.; and Ram, S. Design science in information systems research. MIS Quarterly, 28, 1 (2004), 75–105.
  • Hu, P.J.H.; Zeng, D.; Chen, H.C.; Larson, C.; Chang, W.; Tseng, C.J.; and Ma, J. System for infectious disease information sharing and analysis: Design and evaluation. IEEE Transactions on Information Technology in Biomedicine, 11, 4 (2007), 483–492.
  • Hung, C.L.; Wermter, S.; and Smith, P. Hybrid neural document clustering using guided self-organization and wordnet. IEEE Intelligent Systems, 19, 2 (2004), 68–77.
  • Jeeman, J., and Robert, S. Samuelson’s dictum and the stock market. Economic Inquiry, 43, 2 (2005), 221–228.
  • Khan, A.M. Conformity with large speculators: A test of efficiency in the grain futures market. Atlantic Economic Journal, 14, 3 (1986), 51–55.
  • Kintsch, W. The role of knowledge in discourse processing: A construction-integration model. Psychological Review, 95, 2 (1988), 163–182.
  • Kintsch, W., and Vandijk, T.A. Toward a model of text comprehension and production. Psychological Review, 85, 5 (1978), 363–394.
  • Kirkland, J.D.; Senator, T.E.; Hayden, J.J.; Dybala, T.; Goldberg, H.G.; and Shyr, P. The nasd regulation advanced-detection system (ads). AI Magazine, 20, 1 (1999), 55–67.
  • Lenat, D.B., and Guha, R.V. Building Large Knowledge-based Systems: Representation and Inference in the Cyc Project. Boston: Addison-Wesley Longman, 1989.
  • Lieberman, H.; Liu, H.; Singh, P.; and Barry, B. Beating common sense into interactive applications. AI Magazine, 25, 4 (2004), 63–76.
  • Lucas, H.C. Market expert surveillance system. Communications of the ACM, 36, 12 (1993), 27–34.
  • Luo, X.M., and Zhang, J. How do consumer buzz and traffic in social media marketing predict the value of the firm? Journal of Management Information Systems, 30, 2 (2013), 213–238.
  • Markus, M.L.; Majchrzak, A.; and Gasser, L. A design theory for systems that support emergent knowledge processes. MIS Quarterly, 26, 3 (2002), 179–212.
  • Milosavljevic, M.J.-Y.D.; Hachey, B.; Arunasalam, B.; Radford, W.; and Curran, J.R. Automating financial surveillance. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 40 (2010), 305–311.
  • Mittermayer, M.-A., and Knolmayer, G.F. Newscats: A news categorization and trading system. In International Conference in Data Mining. Hong Kong, 2006, pp. 1002–1007.
  • Muir, D.M., and Schipani, C.A. The use of efficient market hypothesis: Beyond sox. Michigan Law Review, 105, 8 (2007), 1941–1980.
  • Nunamaker, J.F.J.; Chen, M.; and Purdin, T.D.M. Systems development in information systems research. Journal of Management Information Systems, 7, 3 (1990), 89–106.
  • Ogut, H.; Doganay, M.M.; and Aktas, R. Detecting stock-price manipulation in an emerging market: The case of turkey. Expert Systems with Applications, 36, 9 (2009), 11944–11949.
  • Oh, C., and Sheng, O. Investigating predictive power of stock micro blog sentiment in forecasting future stock price directional movement. In International Conference on Informaiton Systems. Shanghai: Association for Information Systems, 2011, 17.
  • Palshikar, G.K., and Apte, M.M. Collusion set detection using graph clustering. Data Mining and Knowledge Discovery, 16, 2 (2008), 135–164.
  • Peffers, K.; Rothenberger, T.T.M.A.; and Chatterjee, S. A design science research methodology for information systems research. Journal of Management Information Systems, 24, 3 (2007), 45–77.
  • Peramunetilleke, D., and Wong, R.K. Currency exchange rate forecasting from news headlines. In Australasian Database Conference. Melbourne, 2002, pp. 131–139.
  • Perfetti, C.A. Comprehending written language: A blueprint of the reader. In C.M. Brown and P. Hagoort (eds.), The Neurocognition of Language Processing. London: Oxford University Press, 1999, pp. 167–208.
  • Pirrong, C. Detecting manipulation in futures markets: The Ferruzzi soybean episode. American Law and Economics Review, 6, 1 (2004), 28–71.
  • Punniyamoorthy, M., and Thoppan, J.J. ANN-GA based model for stock market surveillance. Journal of Financial Crime, 20, 1 (2013), 52–66.
  • Qu, J.; Qin, W.; Feng, Y.; and Sai, Y. An outlier detection method based on Voronoi diagram for financial surveillance. In International Workshop on Intelligent Systems and Applications. Wuhan, China: IEEE, 2009, pp. 1–4.
  • Rodier, M. Insider fraud: Watch out, your bank could be the next one to lose billions Wall Street & Technology. 2011. http://www.wallstreetandtech.com/risk-management/insider-fraud-watch-out-your-bank-could-be-the-next-one-to-lose-billions/d/d-id/1265313 (accessed April 20, 2015).
  • Samuelson, P.A. Summing upon business cycles: Opening address. In J.C. Fuhrer and S. Schuh (eds.), Beyond Shocks: What Causes Business Cycles. Federal Reserve Bank of Boston, 1998, pp. 33–36.
  • Schumaker, R.P., and Chen, H.C. Textual analysis of stock market prediction using breaking financial news: The AZFinText system. ACM Transactions on Information Systems, 27, 2 (2009), 12.
  • Scila. 2015. http://www.Cinnober.Com/cinnober%c2%ae-surveillance (accessed April 20, 2015).
  • Seo, Y.W.; Giampapa, J.A.; and Sycara, K.P. Financial news analysis for intelligent portfolio management. Technical Report, CMU-RI-TR-04-04, Robotics Institute, Carnegie Mellon University, Pittsburgh, 2004.
  • SMARTS. 2015. http://www.Nasdaqomx.Com/technology/marketplacesolutions/surveillancecompliance (accessed April 20, 2015).
  • Tetlock, P.C. Does public financial news resolve asymmetric information? Review of Financial Studies, 23, 9 (2010), 3520–3557.
  • Toutanova, K.; Klein, D.; Manning, C.; and Singer, Y. Feature-rich part-of-speech tagging with a cyclic dependency network. In Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology. Edmonton, Canada: Association for Computational Linguistics, 2003, pp. 173–180.
  • Tumarkin, R., and Whitelaw, R.F. News or noise? Internet postings and stock prices. Financial Analysts Journal, 57, 3 (2001), 41–51.
  • Verhoeven, L., and Perfetti, C. Advances in text comprehension: Model, process and development. Applied Cognitive Psychology, 22, 3 (2008), 293–301.
  • Vlas, R.E., and Robinson, W.N. Two rule-based natural language strategies for requirements discovery and classification in open source software development projects. Journal of Management Information Systems, 28, 4 (2012), 11–38.
  • Walls, J.; Widmeyer, G.; and El Sawy, O. Assessing information system design theory in perspective: How useful was our 1992 initial rendition. Journal of Information Technology Theory and Application, 6, 2 (2004), 43–58.
  • Walls, J.G.; Widmeyer, G.R.; and El Sawy, O.A. Building an information system design theory for vigilant EIS. Information Systems Research, 3, 1 (1992), 36–59.
  • Zheng, H.T.; Kang, B.Y.; and Kim, H.G. Exploiting noun phrases and semantic relationships for text document clustering. Information Sciences, 179, 13 (2009), 2249–2262.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.