File Download

There are no files associated with this item.

Supplementary

Conference Paper: Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking

TitleExtracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Authors
Issue Date2018
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001810
Citation
Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 9-11 November 2018, p. 244-246 How to Cite?
AbstractSocial media are increasingly reflecting and influencing the behavior of human and financial market. Cognitive hacking leverages the influence of social media to spread deceptive information with an intent to gain abnormal profits illegally or to cause losses. Measuring the information content in financial social media can be useful for identifying these attacks. In this paper, we developed an approach to identifying social media features that correlate with abnormal returns of the stocks of companies vulnerable to be targets of cognitive hacking. To test the approach, we collected price data and 865,289 social media messages on four technology companies from July 2017 to June 2018, and extracted features that contributed to abnormal stock movements. Preliminary results show that terms that are simple, motivate actions, incite emotion, and uses exaggeration are ranked high in the features of messages associated with abnormal price movements. We also provide selected messages to illustrate the use of these features in potential cognitive hacking attacks.
Persistent Identifierhttp://hdl.handle.net/10722/278671
ISBN

 

DC FieldValueLanguage
dc.contributor.authorChung, WY-
dc.contributor.authorLiu, J-
dc.contributor.authorTang, X-
dc.contributor.authorLai, VS-
dc.date.accessioned2019-10-21T02:11:52Z-
dc.date.available2019-10-21T02:11:52Z-
dc.date.issued2018-
dc.identifier.citationProceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 9-11 November 2018, p. 244-246-
dc.identifier.isbn978-1-5386-7849-7-
dc.identifier.urihttp://hdl.handle.net/10722/278671-
dc.description.abstractSocial media are increasingly reflecting and influencing the behavior of human and financial market. Cognitive hacking leverages the influence of social media to spread deceptive information with an intent to gain abnormal profits illegally or to cause losses. Measuring the information content in financial social media can be useful for identifying these attacks. In this paper, we developed an approach to identifying social media features that correlate with abnormal returns of the stocks of companies vulnerable to be targets of cognitive hacking. To test the approach, we collected price data and 865,289 social media messages on four technology companies from July 2017 to June 2018, and extracted features that contributed to abnormal stock movements. Preliminary results show that terms that are simple, motivate actions, incite emotion, and uses exaggeration are ranked high in the features of messages associated with abnormal price movements. We also provide selected messages to illustrate the use of these features in potential cognitive hacking attacks.-
dc.languageeng-
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1001810-
dc.relation.ispartofIEEE International Conference on Intelligence and Security Informatics (ISI)-
dc.rightsIEEE International Conference on Intelligence and Security Informatics (ISI). Copyright © IEEE.-
dc.rights©2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.titleExtracting Textual Features of Financial Social Media to Detect Cognitive Hacking-
dc.typeConference_Paper-
dc.identifier.emailChung, WY: wchun@hku.hk-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.hkuros307657-
dc.identifier.spage244-
dc.identifier.epage246-
dc.publisher.placeUnited States-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats