1,693
Views
1
CrossRef citations to date
0
Altmetric
Articles

Detection of financial rumors using big data analytics: the case of the Bombay Stock Exchange

&

References

  • Abbasi, A., C. Albrecht, A. Vance, and J. Hansen. 2012. MetaFraud: A meta-learning framework for detecting financial fraud. MIS Quarterly 36 (4):1293–327.
  • Ahern, K. R. 2015. Rumor has it: Sensationalism in financial media. The Review of Financial Studies 28 (7):2050–93. doi:10.1093/rfs/hhv006.
  • Alic, I. 2015. Supporting financial market surveillance: An IT artifact evaluation. In Proceedings of the 28th Bled eConference, 16–31, Bled, Slovenia.
  • Baesens, B., V. Van Vlasselaer, and W. Verbeke. 2015. Fraud analytics using descriptive, predictive, and social network techniques: A guide to data science for fraud detection. New Jersey, USA: John Wiley & Sons, Ltd.
  • Benbasat, I., D. K. Goldstein, and M. Mead. 1987. The case research strategy in studies of information systems. MIS Quarterly 11 (3):369–86.
  • Bommel, J. V. 2003. Rumors. The Journal of Finance 58 (4):1499–519.
  • Cavaye, A. L. M. 1996. Case study research: A multi-faceted research approach for IS. Information Systems Journal 6:227–42.
  • Cumming, D., and S. Johan. 2008. Global market surveillance. American Law and Economics Review 10 (2):454–506.
  • Delort, J.-Y., B. Arunasalam, H. Leung, and M. Milosavljevic. 2011. The impact of manipulation in internet stock message boards. The International Journal of Banking and Finance 8 (4):1–18.
  • Diaz, D., B. Theodoulidis, and P. Sampaio. 2011. Analysis of stock market manipulations using knowledge discovery techniques applied to intraday trade prices. Expert Systems with Applications 38 (10):12757–71. doi:10.1016/j.eswa.2011.04.066.
  • Dredze, M., P. Kambadur, G. Kazantsev, G. Mann, and M. Osborne. 2016. How twitter is changing the nature of financial news discovery. In Proceedings of the Second International Workshop on Data Science for Macro-Modeling, 1–5, San Francisco, USA. doi:10.1145/1235.
  • Dubé, L., and G. Pare. 2003. Rigor in information systems positivist case research: Current practices, trends, and recommendations. MIS Quarterly 27 (4):597–636.
  • Dutta, D., and I. Bose. 2015. Managing a big data project: The case of ramco cements limited. International Journal of Production Economics 165:293–306. doi:10.1016/j.ijpe.2014.12.032.
  • Fang, B., and P. Zhang. 2016. Big data in finance. In Big data concepts, theories, and applications, ed. S. Yu, and S. Guo, 391–412. Cham: Springer International Publishing. doi:10.1007/978-3-319-27763-9_11.
  • Fayyad, U. M. 1996. Data mining and knowledge discovery: Making sense out of data. IEEE Expert: Intelligent Systems and Their Applications 11 (5):20–25. doi:10.1109/64.539013.
  • Gibbert, M., W. Ruigrok, and B. Wicki. 2008. What passes as a rigorous case study? Strategic Management Journal 29 (13):1465–74. doi:10.1002/smj.722.
  • Goldberg, H., D. Kirkland, D. Lee, P. Shyr, and D. Thakker. 2003. The NASD securities observation, new analysis and regulation system (SONAR). In Proceedings of the IAAI 2003, 11–18, Acapulco, Mexico.
  • Hamidian, S., and M. T. Diab. 2016. Rumor identification and belief investigation on twitter. In Proceedings of the 7th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, 3–8, San Diego,USA.
  • Höchtl, J., P. Parycek, and S. Ralph. 2016. Big data in the policy cycle: Policy decision making in the digital Era. Journal of Organizational Computing and Electronic Commerce 26 (1–2):147–69. doi:10.1080/10919392.2015.1125187.
  • Hu, W., A. Almansoori, P. K. Kannan, S. Azarm, and Z. Wang. 2012. Corporate dashboards for integrated business and engineering decisions in oil refineries: An agent-based approach. Decision Support Systems 52:729–41. doi:10.1016/j.dss.2011.11.019.
  • IOSCO. 2009. Approaches to market surveillance in emerging markets final report. Accessed August 10, 2017. https://www.iosco.org/library/pubdocs/pdf/IOSCOPD313.pdf.
  • Jin, F., E. Dougherty, P. Saraf, Y. Cao, and N. Ramakrishnan. 2013. Epidemiological modeling of news and rumors on twitter. In Proceedings of the 7th Workshop on Social Network Mining and Analysis, 1–9, Chicago,USA.
  • Jing, R., Y. Yang, and Z. Lin. 2015. How service-related factors affect the survival of B2T providers: A sentiment analysis approach. Journal of Organizational Computing and Electronic Commerce 25 (3):316–36.
  • Kimmel, A. J. 2004. Rumors and the financial marketplace. Journal of Behavioral Finance 5 (3):134–41. doi:10.1207/s15427579jpfm0503.
  • Kolb, D. A. 1984. Experiential learning: Experience as the source of learning and development. Englewood Cliffs, NJ: Printice Hall.
  • Kouloumpis, E., T. Wilson, and J. Moore. 2011. Twitter sentiment analysis: The good the bad and the omg! In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain.
  • Li, X., S. X. Sun, K. Chen, T. Fung, and H. Wang. 2015. Design theory for market surveillance systems. Journal of Management Information Systems 32 (2):278–313. doi:10.1080/07421222.2015.1063312.
  • Loughran, T., and B. Mcdonald. 2011. when is a liability not a liability? Textual analysis, distionaries, and 10-Ks. Journal of Finance 66 (1):35–65. doi:10.1111/j.1540-6261.2010.01625.x.
  • McAfee, A., and E. Brynjolfsson. 2012. Big data: The management revolution. Harvard Business Review. Accessed August 10, 2017. https://hbr.org/2012/10/big-data-the-management-revolution.
  • Milosavljevic, M., J. Y. Delort, H. Ben, B. Arunasalam, W. Radford, and J. R. Curran. 2009. Automating financial surveillance. In Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, ed. P. Daras, and O. M. Ibarra, 305–11. Berlin Heidelberg: Springer. doi:10.1007/978-3-642-12630-7_38.
  • Mongkolnavin, J., and S. Tirapat. 2009. Marking the close analysis in Thai Bond market surveillance using association rules. Expert Systems with Applications 36 (4):8523–27. doi:10.1016/j.eswa.2008.10.073.
  • Obenshain, M. K. 2004. Application of data mining techniques to healthcare data. Infection Control and Hospital Epidemiology 25 (8):690–95. doi:10.1086/502460.
  • Oh, O., M. Agrawal, and H. Raghav Rao. 2013. Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises. MIS Quarterly 37 (2):407–26. doi:10.25300/MISQ/2013/37.2.05.
  • Qazvinian, V., E. Rosengren, D. R. Radev, and Q. Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In Conference on Empirical Methods in Natural Language Processing, 1589–99, Edinburgh, Scotland.
  • Qin, Z., J. Cai, and H. Z. Wangchen. 2015. How rumors spread and stop over social media: A multi-layered communication model and empirical analysis. Communications of the Association for Information Systems 36:369–91.
  • Ramos, J. 2003. Using TF-IDF to determine word relevance in document queries. In Proceedings of the First Instructional Conference on Machine Learning. Accessed August, 2017. http://www.cs.rutgers.edu/~mlittman/courses/ml03/iCML03/papers/ramos.pdf.
  • Ravisankar, P., G. Vadlamani Ravi, R. Rao, and I. Bose. 2011. Detection of financial statement fraud and feature selection using data mining techniques. Decision Support Systems 50:491–500. doi:10.1016/j.dss.2010.11.006.
  • Schultze, U., and M. Avital. 2011. Designing interviews to generate rich data for information systems research. Information and Organization 21 (1):1–16. doi:10.1016/j.infoandorg.2010.11.001.
  • Seth, T., and V. Chaudhary. 2015. Big data in finance. In Big data: Algorithms, analytics, and applications, ed. L. Kuan-Ching, H. Jiang, L. T. Yang, and A. Cuzzocrea, 329–56. Boca Raton, FL: CRC Press.
  • Sheng, J., J. Amankwah-Amoah, and X. Wang. 2017. A multidisciplinary perspective of big data in management research. International Journal of Production Economics 191:97–112. doi:10.1016/j.ijpe.2017.06.006.
  • Siggelkow, N. 2007. Persuasion with case studies. The Academy of Management Journal 50 (1):20–24.
  • Small, T. A. 2011. What the Hashtag? Information, Communication & Society 14 (6):872–95. doi:10.1080/1369118X.2011.554572.
  • Spiegel, U., T. Tavor, and J. Templeman. 2010. The effects of rumours on financial market efficiency. Applied Economics Letters 17 (15):1461–64. doi:10.1080/13504850903035873.
  • Thoppan, J. J., and M. Punniyamoorthy. 2013. Market manipulation and surveillance – A survey of literature and some practical implications. International Journal of Value Chain Management 7 (1):55–75.
  • Van Osch, W., and C. K. Coursaris. 2017. A strategic social action framework: Theorizing and analyzing the alignment of social media affordances and organizational social action. Journal of Organizational Computing and Electronic Commerce 27 (2):99–117. doi:10.1080/10919392.2017.1297643.
  • Väyrynen, K., R. Hekkala, and T. Liias. 2013. Knowledge protection challenges of social media encountered by organizations. Journal of Organizational Computing and Electronic Commerce 23 (1–2):34–55. doi:10.1080/10919392.2013.748607.
  • Wang, J., Y. Chen, Y. Tang, and L. Qing 2016. The effect of rumor clarifcation on Chinese stock markets. In Proceedings of the Pacific-Asia Conference on Information Systems, 298, Chiayi City, Taiwan.
  • Wang, Q., and P. Song. 2015. Is positive always positive? The effects of precrisis media coverage on rumor refutation effectiveness in social media. Journal of Organizational Computing and Electronic Commerce 25 (1):98–116. doi:10.1080/10919392.2015.990785.
  • Yin, R. K. 1994. Case study research: Design and methods. London, UK: Sage Publications.
  • Zhao, Z., P. Resnick, and Q. Mei. 2015. Enquiring minds: Early detection of rumors in social media from enquiry posts. In Proceedings of the 24th International Conference on World Wide Web, 1395–405, Florence, Italy. doi:10.1145/2736277.2741637.
  • Zubiaga, A., A. Aker, K. Bontcheva, M. Liakata, and R. Procter. 2017. Detection and resolution of rumours in social media: A survey. Arxiv Preprint. arXiv:1704.00656v2 [cs.CL].
  • Zubiaga, A., M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie. 2014. Towards detecting rumours in social media. Arxiv Preprint. arXiv:1504.04712v1 [cs.SI].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.