skip to main content
10.1145/3543507.3583385acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

Misbehavior and Account Suspension in an Online Financial Communication Platform

Published: 30 April 2023 Publication History

Abstract

The expanding accessibility and appeal of investing have attracted millions of new retail investors. As such, investment discussion boards became the de facto communities where traders create, disseminate, and discuss investing ideas. These communities, which can provide useful information to support investors, have anecdotally also attracted a wide range of misbehavior – toxicity, spam/fraud, and reputation manipulation. This paper is the first comprehensive analysis of online misbehavior in the context of investment communities. We study TradingView, the largest online communication platform for financial trading. We collect 2.76M user profiles with their corresponding social graphs, 4.2M historical article posts, and 5.3M comments, including information on nearly 4 000 suspended accounts and 17 000 removed comments. Price fluctuations seem to drive abuse across the platform and certain types of assets, such as “meme” stocks, attract disproportionate misbehavior. Suspended user accounts tend to form more closely-knit communities than those formed by non-suspended accounts; and paying accounts are less likely to be suspended than free accounts even when posting similar levels of content violating platform policies. We conclude by offering guidelines on how to adapt content moderation efforts to fit the particularities of online investment communities.

References

[1]
Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Sue Moon, and Hawoong Jeong. 2007. Analysis of topological characteristics of huge online social networking services. In Proceedings of the 16th international conference on World Wide Web. 835–844.
[2]
Muhammad Al-Qurishi, Majed Alrubaian, Sk Md Mizanur Rahman, Atif Alamri, and Mohammad Mehedi Hassan. 2018. A prediction system of Sybil attack in social network using deep-regression model. Future Generation Computer Systems 87 (2018), 743–753.
[3]
Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Pentland. 2014. Twitter: who gets caught¿ observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science. 33–41.
[4]
Wayne E Baker. 1984. The social structure of a national securities market. American journal of sociology 89, 4 (1984), 775–811.
[5]
Gianluca Bonifazi, Enrico Corradini, Domenico Ursino, and Luca Virgili. 2021. A Social Network Analysis–based approach to investigate user behaviour during a cryptocurrency speculative bubble. Journal of Information Science (2021), 01655515211047428.
[6]
Jeffrey R Brown, Zoran Ivković, Paul A Smith, and Scott Weisbenner. 2008. Neighbors matter: Causal community effects and stock market participation. The Journal of Finance 63, 3 (2008), 1509–1531.
[7]
Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 197–210.
[8]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 477–488.
[9]
Meta Transparency Center. 2022. Inauthentic behavior. https://transparency.fb.com/policies/community-standards/inauthentic-behavior/. Accessed Sep. 29th, 2022.
[10]
Farhan Asif Chowdhury, Lawrence Allen, Mohammad Yousuf, and Abdullah Mueen. 2020. On Twitter purge: a retrospective analysis of suspended users. In Companion proceedings of the web conference 2020. 371–378.
[11]
Farhan Asif Chowdhury, Dheeman Saha, Md Rashidul Hasan, Koustuv Saha, and Abdullah Mueen. 2021. Examining factors associated with twitter account suspension following the 2020 us presidential election. In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 607–612.
[12]
Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web. 213–224.
[13]
Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1 (1960), 37–46.
[14]
Stefano Cresci. 2020. A decade of social bot detection. Commun. ACM 63, 10 (2020), 72–83.
[15]
Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated hate speech detection and the problem of offensive language. In Proceedings of the international AAAI conference on web and social media, Vol. 11. 512–515.
[16]
Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proceedings of the 25th international conference companion on world wide web. 273–274.
[17]
Philipp Doering, Sascha Neumann, and Stephan Paul. 2015. A primer on social trading networks–institutional aspects and empirical evidenc. In EFMA annual meetings.
[18]
Don Fallis. 2015. What is disinformation¿Library trends 63, 3 (2015), 401–426.
[19]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96–104.
[20]
Emma Fletcher. 2022. Reports show scammers cashing in on crypto craze. https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze#crypto1
[21]
Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148–170.
[22]
JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek. 2018. The economics of cryptocurrency pump and dump schemes. Available at SSRN 3310307 (2018).
[23]
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 42, 1 (2009), 1–31.
[24]
Steven Huddart. 1999. Reputation and performance fee effects on portfolio choice by investment advisers. Journal of financial Markets 2, 3 (1999), 227–271.
[25]
Google Jigsaw. Accessed: Oct. 12th, 2022. Perspective: Using machine learning to reduce toxicity online. https://perspectiveapi.com/.
[26]
Mika Juuti, Tommi Gröndahl, Adrian Flanagan, and N. Asokan. 2020. A little goes a long way: Improving toxic language classification despite data scarcity. In Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, Online, 2991–3009. https://doi.org/10.18653/v1/2020.findings-emnlp.269
[27]
Josh Kamps and Bennett Kleinberg. 2018. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science 7, 1 (2018), 1–18.
[28]
Hyunwoo Kim, Youngjae Yu, Liwei Jiang, Ximing Lu, Daniel Khashabi, Gunhee Kim, Yejin Choi, and Maarten Sap. 2022. ProsocialDialog: A Prosocial Backbone for Conversational Agents. arXiv preprint arXiv:2205.12688 (2022).
[29]
Deepak Kumar, Jeff Hancock, Kurt Thomas, and Zakir Durumeric. 2022. Understanding Longitudinal Behaviors of Toxic Accounts on Reddit. arXiv preprint arXiv:2209.02533 (2022).
[30]
Huyen Le, GR Boynton, Zubair Shafiq, and Padmini Srinivasan. 2019. A postmortem of suspended Twitter accounts in the 2016 US presidential election. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 258–265.
[31]
Guillaume Lemaître, Fernando Nogueira, and Christos K Aridas. 2017. Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. The Journal of Machine Learning Research 18, 1 (2017), 559–563.
[32]
Ivan Levingston. 2021. TradingView’s $3 Billion Valuation Fed by Retail Investing Boom. https://www.bloomberg.com/news/articles/2021-10-14/tradingview-s-3-billion-valuation-fed-by-retail-investing-boom. Accessed Jan. 31st, 2022.
[33]
Tao Li, Donghwa Shin, and Baolian Wang. 2019. Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041 (2019).
[34]
Alice E Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. (2017).
[35]
Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Galstyan. 2021. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Transactions on Computational Social Systems 8, 3 (2021), 607–617.
[36]
Tyler Moore and Nicolas Christin. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International conference on financial cryptography and data security. Springer, 25–33.
[37]
Tyler Moore, Jie Han, and Richard Clayton. 2012. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In International Conference on financial cryptography and data security. Springer, 41–56.
[38]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report.
[39]
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
[40]
Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti, Stefano Cresci, Maurizio Tesconi, and Emilio Ferrara. 2020. Charting the landscape of online cryptocurrency manipulation. IEEE Access 8 (2020), 113230–113245.
[41]
Han Woo Park and LEE Youngjoo. 2019. How Are Twitter Activities Related to Top Cryptocurrencies’ Performance¿ Evidence from Social Media Network and Sentiment Analysis. Drustvena Istrazivanja 28, 3 (2019).
[42]
John Pavlopoulos, Jeffrey Sorensen, Lucas Dixon, Nithum Thain, and Ion Androutsopoulos. 2020. Toxicity detection: Does context really matter¿arXiv preprint arXiv:2006.00998 (2020).
[43]
Reddit. Accessed 2022-10-12. /r/wallstreetbets. https://www.reddit.com/r/wallstreetbets/.
[44]
Manoel Horta Ribeiro, Pedro H Calais, Yuri A Santos, Virgílio AF Almeida, and Wagner Meira Jr. 2018. Characterizing and detecting hateful users on twitter. In Twelfth international AAAI conference on web and social media.
[45]
Maarten Sap, Swabha Swayamdipta, Laura Vianna, Xuhui Zhou, Yejin Choi, and Noah A Smith. 2021. Annotators with attitudes: How annotator beliefs and identities bias toxic language detection. arXiv preprint arXiv:2111.07997 (2021).
[46]
Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. 2018. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior 83 (2018), 278–287.
[47]
Kyle Soska and Nicolas Christin. 2015. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15). 33–48.
[48]
Kyle Soska, Jin-Dong Dong, Alex Khodaverdian, Ariel Zetlin-Jones, Bryan Routledge, and Nicolas Christin. 2021. Towards understanding cryptocurrency derivatives: A case study of BitMEX. In Proceedings of the 30th Web Conference (WWW’21). Ljubljana, Slovenia (online).
[49]
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, 2021. Sok: Hate, harassment, and the changing landscape of online abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247–267.
[50]
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. 243–258.
[51]
TradingView. 2022. Advertise on TradingView. https://www.tradingview.com/advertising-info/ Accessed Oct. 6th, 2022.
[52]
TradingView. 2022. Our House rules. https://www.tradingview.com/support/solutions/43000591638-our-house-rules/. Accessed Sep. 28th, 2022.
[53]
Tavish Vaidya, Daniel Votipka, Michelle L Mazurek, and Micah Sherr. 2019. Does being verified make you more credible¿ Account verification’s effect on tweet credibility. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.
[54]
Marie Vasek and Tyler Moore. 2018. Analyzing the Bitcoin Ponzi scheme ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, 101–112.
[55]
Friedhelm Victor and Tanja Hagemann. 2019. Cryptocurrency pump and dump schemes: Quantification and detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, 244–251.
[56]
Bimal Viswanath, Ansley Post, Krishna P Gummadi, and Alan Mislove. 2010. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 363–374.
[57]
Veit Wohlgemuth, Elisabeth SC Berger, and Matthias Wenzel. 2016. More than just financial performance: Trusting investors in social trading. Journal of Business Research 69, 11 (2016), 4970–4974.
[58]
Samuel C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday (2016).
[59]
Jiahua Xu and Benjamin Livshits. 2019. The anatomy of a cryptocurrency pump-and-dump scheme. In 28th USENIX Security Symposium). 1609–1625.
[60]
Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu. 2012. Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web. 71–80.
[61]
Kai-Cheng Yang, Onur Varol, Pik-Mai Hui, and Filippo Menczer. 2020. Scalable and generalizable social bot detection through data selection. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 1096–1103.
[62]
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data (TKDD) 8, 1 (2014), 1–29.
[63]
David Yermack. 2015. Is Bitcoin a real currency¿ An economic appraisal. In Handbook of digital currency. Elsevier, 31–43.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '23: Proceedings of the ACM Web Conference 2023
April 2023
4293 pages
ISBN:9781450394161
DOI:10.1145/3543507
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 April 2023

Check for updates

Author Tags

  1. Finance
  2. OSN
  3. Online abuse
  4. Toxicity detection
  5. Trust and safety

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • ONR

Conference

WWW '23
Sponsor:
WWW '23: The ACM Web Conference 2023
April 30 - May 4, 2023
TX, Austin, USA

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)466
  • Downloads (Last 6 weeks)77
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media