Ashton, Henry;
(2022)
Law breaking trading algorithms: Emergence and deterrence.
Doctoral thesis (Ph.D), UCL (University College London).
Preview |
Text
Ashton_10155509_Thesis_id_removed.pdf Download (3MB) | Preview |
Abstract
This thesis demonstrates that trading algorithms trained through Reinforcement Learning will learn to manipulate prices (thereby breaking the law) through a process called spoofing in a fully functioning limit order book environment. The regulatory definition of Spoofing requires the establishment of intent on part of the accused: it is defined by the US CFTC as the placement of orders with the intent to cancel them. This needs to be defined for auto-didactic algorithms where behaviour emerges somewhat independently from the programmer. I propose a high-level definition informed by current law then test to see whether it matches with a laypeople's natural understanding of the concept. Finally, I implement a constrained learning method in Reinforcement Learning using an appropriate definition of intent to cancel which allow auto-didactic trading algorithms to be trained and deployed safely without the risk of spoofing behaviour emerging. This subject is important because algorithmic trading leads other areas in the degree of agency that algorithmic actors are permitted. The simple pursuit of high-level objectives like profit maximisation can result in behaviour that contradicts the law. Without a method of encoding laws within the training and testing process, algorithms will likely learn to break laws when it is rational to do so.
Type: | Thesis (Doctoral) |
---|---|
Qualification: | Ph.D |
Title: | Law breaking trading algorithms: Emergence and deterrence |
Open access status: | An open access version is available from UCL Discovery |
Language: | English |
Additional information: | Copyright © The Author 2022. Original content in this thesis is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) Licence (https://creativecommons.org/licenses/by-nc/4.0/). Any third-party copyright material present remains the property of its respective owner(s) and is licensed under its existing terms. Access may initially be restricted at the author’s request. |
UCL classification: | UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science UCL > Provost and Vice Provost Offices > UCL BEAMS UCL |
URI: | https://discovery.ucl.ac.uk/id/eprint/10155509 |



1. | ![]() | 17 |
2. | ![]() | 10 |
3. | ![]() | 3 |
4. | ![]() | 3 |
5. | ![]() | 1 |
6. | ![]() | 1 |
7. | ![]() | 1 |
8. | ![]() | 1 |
9. | ![]() | 1 |
10. | ![]() | 1 |
Archive Staff Only
![]() |
View Item |