{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:24:40Z","timestamp":1777854280883,"version":"3.51.4"},"reference-count":108,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[2017,9]]},"abstract":"<jats:p>Financial market manipulations represent a major threat to trust and market integrity in capital markets. Manipulations contribute to mispricing, market imperfections and an increase in transaction costs for market participants and in costs of capital for issuers. Manipulations are facilitated by increased transaction velocity, speculative trading and abusive usage of new trading technologies, i.e., they are directly linked to financial sector changes that drive financialization. Research at the intersection of financialization and IS might support regulatory authorities and market operators in improving market surveillance and helping to detect fraudulent activities. However, confusing terminology is prevalent on financial markets with respect to different manipulation techniques and their characteristics, which hampers efficient fraud detection. Furthermore, recognizing manipulations is challenging given the large number of information sources and the vast number of trades occurring not least because of high-frequency traders. Therefore, automated market surveillance tools require a comprehensive taxonomy of financial market manipulations as a basis for appropriate configuration. Based on a cluster analysis of SEC litigation releases, a review of the latest market abuse regulation and academic studies, we develop a taxonomy of manipulations that structures and details existing manipulation techniques and reveals how these techniques differ along several dimensions. In a case study, we show how the taxonomy can be utilized to guide the development of appropriate decision support systems for fraud detection.<\/jats:p>","DOI":"10.1057\/s41265-016-0029-z","type":"journal-article","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T05:16:15Z","timestamp":1488777375000},"page":"251-269","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":46,"title":["A Taxonomy of Financial Market Manipulations: Establishing Trust and Market Integrity in the Financialized Economy through Automated Fraud Detection"],"prefix":"10.1177","volume":"32","author":[{"given":"Michael","family":"Siering","sequence":"first","affiliation":[{"name":"Goethe University Frankfurt, Theodor-W.-Adorno-Platz 4, 60323 Frankfurt, Germany"}]},{"given":"Benjamin","family":"Clapham","sequence":"additional","affiliation":[{"name":"Goethe University Frankfurt, Theodor-W.-Adorno-Platz 4, 60323 Frankfurt, Germany"}]},{"given":"Oliver","family":"Engel","sequence":"additional","affiliation":[{"name":"Goethe University Frankfurt, Theodor-W.-Adorno-Platz 4, 60323 Frankfurt, Germany"}]},{"given":"Peter","family":"Gomber","sequence":"additional","affiliation":[{"name":"Goethe University Frankfurt, Theodor-W.-Adorno-Platz 4, 60323 Frankfurt, Germany"}]}],"member":"179","published-online":{"date-parts":[[2017,9,1]]},"reference":[{"key":"bibr1-s41265-016-0029-z","volume-title":"International Encyclopedia of Geography: People, the Earth, Environment and Technology.","author":"Aalbers M.","year":"2016"},{"key":"bibr2-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/25750686"},{"key":"bibr3-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2011.06.014"},{"key":"bibr4-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1086\/503652"},{"key":"bibr5-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1007\/BF02761553"},{"key":"bibr6-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.06.012"},{"key":"bibr7-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/5.3.503"},{"key":"bibr8-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1007\/s10679-006-9008-5"},{"key":"bibr9-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.4.653"},{"key":"bibr10-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/3666294"},{"key":"bibr11-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1007\/BF00156457"},{"issue":"1","key":"bibr12-s41265-016-0029-z","first-page":"29","volume":"62","author":"Baker N.","year":"2005","journal-title":"Internal Auditor"},{"issue":"1","key":"bibr13-s41265-016-0029-z","first-page":"353","volume":"75","author":"Bartels K. C.","year":"2000","journal-title":"Indiana Law Journal"},{"key":"bibr14-s41265-016-0029-z","unstructured":"BiaisB., and WoolleyP. (2011). High frequency trading [www document] http:\/\/www.eifr.eu\/files\/file2220879.pdf (accessed 24th February 2016)."},{"issue":"4","key":"bibr15-s41265-016-0029-z","first-page":"503","volume":"73","author":"Bonner S. E.","year":"1998","journal-title":"The Accounting Review"},{"key":"bibr16-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.6.653"},{"key":"bibr17-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/1540-6261.00438"},{"key":"bibr18-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511571312"},{"issue":"1","key":"bibr19-s41265-016-0029-z","first-page":"40","volume":"201","author":"Carroll B.","year":"2006","journal-title":"Journal of Accountancy"},{"issue":"4","key":"bibr20-s41265-016-0029-z","first-page":"10","volume":"4","author":"Cataldo A. J.","year":"2003","journal-title":"Management Accounting Quarterly"},{"key":"bibr21-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.ememar.2015.04.001"},{"key":"bibr22-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1093\/oxrep\/gri012"},{"key":"bibr23-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfi.2010.03.003"},{"key":"bibr24-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/2331380"},{"key":"bibr25-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1093\/aler\/ahn009"},{"key":"bibr26-s41265-016-0029-z","doi-asserted-by":"crossref","unstructured":"CummingD., ZhanF., and AitkenM. (2012). High Frequency Trading and End-of-Day Manipulation [www document] https:\/\/www.legacy.wlu.ca\/documents\/54105\/Cumming-Zhan-Aitken-15012013_2.pdf (accessed 24th February 2016).","DOI":"10.2139\/ssrn.2081154"},{"key":"bibr27-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/15285810710839570"},{"key":"bibr28-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1080\/10511253.2012.730617"},{"key":"bibr29-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.3905\/jpm.2011.37.2.118"},{"key":"bibr30-s41265-016-0029-z","unstructured":"European Parliament and Council (2014). Market Abuse Regulation No 596\/2014 [www document] http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32014R0596 (accessed 24th February 2016)."},{"key":"bibr31-s41265-016-0029-z","unstructured":"European Parliament and Council (2016). Benchmark Regulation 2016\/1011 [www document] http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R1011&from=EN (accessed 4th August 2016)."},{"key":"bibr32-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/2325486"},{"issue":"2","key":"bibr33-s41265-016-0029-z","first-page":"241","volume":"22","author":"Fatudimu I.","year":"2008","journal-title":"European Journal of Scientific Research"},{"issue":"3","key":"bibr34-s41265-016-0029-z","first-page":"37","volume":"17","author":"Fayyad U.","year":"1996","journal-title":"AI Magazine"},{"key":"bibr35-s41265-016-0029-z","unstructured":"Financial Conduct Authority (FCA) (2014). FCA Final Notice: Reference Number 124491 [www document] http:\/\/www.fca.org.uk\/your-fca\/documents\/final-notices\/2014\/jpmorgan-chase-bank (accessed 25th August 2016)."},{"key":"bibr36-s41265-016-0029-z","unstructured":"Financial Conduct Authority (FCA) (2015). Call for Input: Supporting the Development and Adoption of RegTech [www document] https:\/\/www.fca.org.uk\/publication\/call-for-input\/regtech-call-for-input.pdf (accessed 12th September 2016)."},{"key":"bibr37-s41265-016-0029-z","unstructured":"Financial Services Authority (FSA) (2012). FSA Final Notice: Reference Number 122702 [www document] http:\/\/www.fsa.gov.uk\/static\/pubs\/final\/barclays-jun12.pdf (accessed 25th August 2016)."},{"key":"bibr38-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/1341697"},{"key":"bibr39-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2014.03.039"},{"key":"#cr-split#-bibr40-s41265-016-0029-z.1","unstructured":"FrankJ. (1994). Artificial Intelligence and Intrusion Detection: Current and Future Directions, in 17th National Computer Security Conference"},{"key":"#cr-split#-bibr40-s41265-016-0029-z.2","unstructured":"Baltimore, USA, 1994, pp. 1-12."},{"key":"bibr41-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1468(199711\/12)18:7\/8<587::AID-MDE855>3.0.CO;2-R"},{"key":"#cr-split#-bibr42-s41265-016-0029-z.1","doi-asserted-by":"crossref","unstructured":"GolmohammadiK., ZaianeO.R., and DiazD. (2014). Detecting Stock Market Manipulation Using Supervised Learning Algorithms, in International Conference on Data Science and Advanced Analytics (DSAA)","DOI":"10.1109\/DSAA.2014.7058109"},{"key":"#cr-split#-bibr42-s41265-016-0029-z.2","unstructured":"Shanghai, China, 2014, pp. 435-441."},{"key":"bibr43-s41265-016-0029-z","author":"Gomber P.","year":"2016","journal-title":"Journal of Economic Surveys"},{"key":"bibr44-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.finmar.2007.10.001"},{"issue":"3","key":"bibr45-s41265-016-0029-z","first-page":"710","volume":"2010","author":"Hazen T. L.","year":"2010","journal-title":"Columbia Business Law Review"},{"key":"bibr46-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(80)90056-3"},{"key":"bibr47-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.finmar.2004.04.002"},{"key":"bibr48-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.009"},{"key":"bibr49-s41265-016-0029-z","unstructured":"IIROC (2012). Proposed Guidance on Certain Manipulative and Deceptive Trading Practices [www document] http:\/\/www.iiroc.ca\/Documents\/2012\/f62c746a-b5c9-448a-b57f-f1c04c88del4_en.pdf (accessed 19th February 2016)."},{"issue":"3","key":"bibr50-s41265-016-0029-z","first-page":"239","volume":"5","author":"Ionescu L.","year":"2010","journal-title":"Economics, Management, and Financial Markets"},{"key":"bibr51-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/2331322"},{"key":"bibr52-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"bibr53-s41265-016-0029-z","volume-title":"Creative Accounting, Fraud And International Accounting Scandals.","author":"Jones M. J.","year":"2011"},{"key":"bibr54-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.3905\/jot.2006.654304"},{"key":"bibr55-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.025"},{"key":"bibr56-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"key":"bibr57-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1002\/9781119202714"},{"key":"bibr58-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2171.2008.00059.x"},{"key":"bibr59-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1257\/aer.98.2.274"},{"key":"bibr60-s41265-016-0029-z","author":"Lagoarde-Segot T.","year":"2016","journal-title":"International Review of Financial Analysis."},{"key":"bibr61-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1515\/1555-5879.1577"},{"key":"bibr62-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.finmar.2012.05.004"},{"key":"bibr63-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.3905\/joi.2001.319457"},{"issue":"1","key":"bibr64-s41265-016-0029-z","first-page":"1","volume":"1","author":"Lenard M. J.","year":"2009","journal-title":"Journal of Forensic & Investigative Accounting"},{"key":"bibr65-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.28945\/479"},{"key":"bibr66-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/eb025994"},{"key":"bibr67-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008777222412"},{"key":"bibr68-s41265-016-0029-z","unstructured":"LR 17346 (2002). Litigation Release No. 17346: Securities and Exchange Commission v. Patrick O. Wheeler, Steven S. Gallers, and Robert L. Carberry, Case No. 02-60131-CIV-GRAHAM (S.D. Fla.) [www document] http:\/\/www.sec.gov\/litigation\/litreleases\/lr17346.htm (accessed 19th February 2016)."},{"key":"bibr69-s41265-016-0029-z","unstructured":"LR 17645 (2002). Litigation Release No. 17645: Securities and Exchange Commission v. Michael A. Ofstedahl, et al., United States District Court for the Northern District of California, Civil Action No. C-02-3685 RS. [www document] http:\/\/www.sec.gov\/litigation\/litreleases\/lr17645.htm (accessed 19th February 2016)."},{"key":"bibr70-s41265-016-0029-z","unstructured":"LR 21423 (2010). Litigation Release No. 21423: Securities and Exchange Commission v. Frank J. Custable, Jr., et al., Civil Action No. 03-CV-2182 (N.D. Ill.) [www document] http:\/\/www.sec.gov\/litigation\/litreleases\/2010\/lr21423.htm (accessed 19th February 2016)."},{"key":"bibr71-s41265-016-0029-z","unstructured":"LR22545 (2012). Litigation Release No. 22545: SEC v. Berton M. Hochfeld et al., Civil Action No. 12-CV-8202 (S.D.N.Y.) [www document] http:\/\/www.sec.gov\/litigation\/litreleases\/2012\/lr22545.htm (accessed 19th February 2016)."},{"key":"bibr72-s41265-016-0029-z","unstructured":"MacQueenJ. (1967). Some Methods for Classification and Analysis of Multivariate Observations, in Fifth Berkeley Symposium on Mathematical Statistics and Probability (Berkeley, USA, 1967), pp. 281\u2013297."},{"key":"bibr73-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"bibr74-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.3.285"},{"key":"bibr75-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0297.00144"},{"key":"bibr76-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"bibr77-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.26"},{"key":"bibr78-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.065"},{"key":"bibr79-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1093\/rcfs\/cfs001"},{"key":"#cr-split#-bibr80-s41265-016-0029-z.1","unstructured":"PellegD., and MooreA. (2000). X-Means: Extending K-Means with Efficient Estimation of the Number of Clusters, in 17th International Conference on Machine Learning"},{"key":"#cr-split#-bibr80-s41265-016-0029-z.2","unstructured":"Stanford, USA, 2000, pp. 727-734."},{"key":"bibr81-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681286"},{"key":"bibr82-s41265-016-0029-z","first-page":"113","volume":"10","author":"Pozza C. L.","year":"2009","journal-title":"Journal of Business and Securities Law"},{"key":"bibr83-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6419.2011.00692.x"},{"key":"bibr84-s41265-016-0029-z","first-page":"627","volume":"42","author":"Rapoport N. B.","year":"2012","journal-title":"Golden Gate University Law Review"},{"key":"bibr85-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0068178"},{"key":"bibr86-s41265-016-0029-z","first-page":"1","volume":"8","author":"Roddenberry S.","year":"2011","journal-title":"Journal of Finance & Accountancy"},{"key":"bibr87-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_15"},{"key":"bibr88-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/01409170410784185"},{"key":"bibr89-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5957.2011.02258.x"},{"issue":"3","key":"bibr90-s41265-016-0029-z","first-page":"607","volume":"47","author":"Scopino G.","year":"2015","journal-title":"Connecticut Law Review"},{"issue":"1","key":"bibr91-s41265-016-0029-z","first-page":"61","volume":"3","author":"Shapiro S.","year":"2012","journal-title":"Review of Business & Finance Case Studies"},{"key":"bibr92-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1997.tb04820.x"},{"key":"bibr93-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.07.021"},{"issue":"2","key":"bibr94-s41265-016-0029-z","first-page":"219","volume":"79","author":"Thel S.","year":"1993","journal-title":"Cornell Law Review"},{"key":"bibr95-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.2307\/3478913"},{"key":"bibr96-s41265-016-0029-z","unstructured":"U.S. Commodity Futures Trading Commission (CFTC) (2016). Education Center: CFTC Glossary [www document] http:\/\/www.cftc.gov\/consumerprotection\/educationcenter\/cftcglossary\/glossary_b (accessed 4th August 2016)."},{"key":"bibr97-s41265-016-0029-z","unstructured":"VaughanL. (2016). Broken Benchmarks: Six Years of Probes into Financial Fiddling [www document] https:\/\/www.bloomberg.com\/quicktake\/broken-benchmarks (accessed 25th August 2016)."},{"key":"bibr98-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1765(89)90167-5"},{"issue":"2","key":"bibr99-s41265-016-0029-z","first-page":"3","volume":"26","author":"Webster J.","year":"2002","journal-title":"Management Information Systems Quarterly"},{"key":"bibr100-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(00)00050-2"},{"key":"bibr101-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90027-1"},{"key":"bibr102-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681295"},{"key":"bibr103-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.07.022"},{"key":"bibr104-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00399"},{"key":"bibr105-s41265-016-0029-z","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"}],"container-title":["Journal of Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1057\/s41265-016-0029-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/s41265-016-0029-z","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/s41265-016-0029-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41265-016-0029-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:04:37Z","timestamp":1777503877000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1057\/s41265-016-0029-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":108,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["10.1057\/s41265-016-0029-z"],"URL":"https:\/\/doi.org\/10.1057\/s41265-016-0029-z","relation":{},"ISSN":["0268-3962","1466-4437"],"issn-type":[{"value":"0268-3962","type":"print"},{"value":"1466-4437","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}