Skip to main content

Identifying Firm-Specific Risk Statements in News Articles

  • Conference paper
Intelligence and Security Informatics (PAISI 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5477))

Included in the following conference series:

Abstract

Textual data are an important information source for risk management for business organizations. To effectively identify, extract, and analyze risk-related statements in textual data, these processes need to be automated. We developed an annotation framework for firm-specific risk statements guided by previous economic, managerial, linguistic, and natural language processing research. A manual annotation study using news articles from the Wall Street Journal was conducted to verify the framework. We designed and constructed an automated risk identification system based on the annotation framework. The evaluation using manually annotated risk statements in news articles showed promising results for automated risk identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Slywotzky, A.J., Drzik, J.: Countering the Biggest Risk of All. Harvard Business Review, 1–11 (2005)

    Google Scholar 

  2. Chapelle, A., Crama, Y., Hubner, G., Peters, J.-P.: Practical methods for measuring and managing operational risk in the financial sector: A clinical study. Journal of Banking & Finance 32, 1049–1061 (2008)

    Article  Google Scholar 

  3. Merriam-Webster: Risk: Definition from the Merrian-Webster Online Dictionary (2008)

    Google Scholar 

  4. COSO: Enterprise Risk Management - Intergrated Framework. COSO(Committee of Sponsoring Organizations of the Treadway Commission) (2004)

    Google Scholar 

  5. Mas-Colell, A., Whinston, M., Green, J.R.: Microeconomic Theory, Oxford (1995)

    Google Scholar 

  6. Bruce, R.F., Wiebe, J.M.: Recognizing subjectivity: a case study of manual tagging. Natural Language Engineering 1, 1–16 (1999)

    Google Scholar 

  7. Wiebe, J., Wilson, T., Cardie, C.: Annotating Expressions of Opinions and Emotions in Language. Language Resources and Evaluation 39, 165–210 (2005)

    Article  Google Scholar 

  8. Rubin, V.L., Liddy, E.D.: Certainty Identification in Texts: Categorization Model and Manual Tagging Results. In: Shanahan, J.G., Qu, Y., Wiebe, J. (eds.) Computing Attitude and Affect in Text: Theory and Applications. Springer, Heidelberg (2005)

    Google Scholar 

  9. Rubin, V.L.: Certainty Categorization Model. In: AAAI Spring Symposium: Exploring Attitude and Affect in Text: Theories and Applications, Stanford, CA (2004)

    Google Scholar 

  10. Rubin, V.L.: Starting with Certainty or Starting with Doubt: Intercoder Reliability Results for Manual Annotation of Epistemically Modalized Statements. In: Proceedings of NAACL HLT 2007, pp. 141–144 (2007)

    Google Scholar 

  11. Coates, J.: Epistemic Modality and Spoken Discourse. Transactions of the Philological Society 85, 110–131 (1987)

    Article  Google Scholar 

  12. de Haan, F.: Evidentiality and Epistemic Modality: Setting Boundaries. Southwest Journal of Linguistic 18, 83–101 (1999)

    Google Scholar 

  13. Porter, M.F.: An Algorithm for Suffix Stripping. Program 14, 130–137 (1980)

    Article  Google Scholar 

  14. Berger, A.L., Pietra, V.J.D., Pietra, S.A.D.: A maximum entropy approach to natural language processing. Comput. Linguist. 22, 39–71 (1996)

    Google Scholar 

  15. Joachims, T.: Making large-Scale SVM Learning Practical. In: Schölkopf, B., Burges, C., Smola, A. (eds.) Advances in Kernel Methods - Support Vector Learning. MIT-Press, Cambridge (1999)

    Google Scholar 

  16. Cortes, C., Mohri, M.: Confidence Intervals for the Area under the ROC Curve. In: Advances in Neural Information Processing Systems (NIPS 2004), vol. 17. MIT Press, Vancouver (2005)

    Google Scholar 

  17. Abbasi, A., Chen, H.: Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26, 1–29 (2008)

    Google Scholar 

  18. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Elsevier, Amsterdam (2005)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, HM., Huang, N.W., Zhang, Z., Chen, TJ. (2009). Identifying Firm-Specific Risk Statements in News Articles. In: Chen, H., Yang, C.C., Chau, M., Li, SH. (eds) Intelligence and Security Informatics. PAISI 2009. Lecture Notes in Computer Science, vol 5477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01393-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01393-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01392-8

  • Online ISBN: 978-3-642-01393-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics