1. Field of the Invention
The present invention relates generally to systems and methods for identifying liquidity on financial exchanges and markets. More particularly, the present invention relates to novel systems and methods for generating a hidden order volume report.
2. Description of the Related Art
There is a demand among financial traders for more transparency and currency of market information in order driven electronic markets, such as the new level 2 and real-time data products offered by NASDAQ and NYSE. Markets which provide electronic limit order books, including, for example, Euronext, London Stock Exchange, XETRA, Spanish Stock Exchange, and Toronto Stock Exchange, provide a measure of currency and transparency.
An electronic limit order market is a trading platform where anonymous buyers and sellers post price-quantity pairs—i.e., the quoted bid (or ask) prices and associated quantities (depths) of a stock that the market participant is willing to buy (or sell). Limit order books offer market participants the ability to observe levels of market liquidity by displaying prices and quantities of unexecuted limit orders. Utilizing this data, market participants can implement a range of “game theoretical” strategies and choose limit orders with specified price, quantity, and timing, thus allowing them to minimize execution costs and uncertainty, hide market information, and possibly move the market towards the desired price.
Given concerns associated with information leakage due to order placements, some market venues allow market participants to enter “hidden” limit orders which do not reveal the full share volume size and/or the associated price level (also known as “iceberg”, “undisclosed”, or “discretionary” limit orders). This brings with it a complex interrelationship between exposure risk (adverse selection), market liquidity, and the need for transparency. From a market design point of view, hidden limit orders represent a trade-off between liquidity and transparency. Trading systems need to attract liquidity and trading activity. The availability of hidden limit orders encourages limit order traders, who are otherwise hesitant to fully disclose their trading interests, to supply liquidity—thus increasing the liquidity on the system. However, hidden limit order volume, by its nature, does not add information to the market and thus, does not help in the market's transparency.
In particular, hidden orders inside the spread will not attract activity to a venue, since most order routing systems can only operate on visible (i.e., displayed) information. Thus, as reported by A
The concept of hiding transaction fingerprints has been around for several years, but has recently seen increased popularity due to the advent of algorithmic trading systems such as ITG's “Dark Server” or CSFB's “Guerilla,” which utilize continuous mid-point crosses from “Dark Books.” For illiquid stocks, which have larger intra-day volatility, the concept of hiding transaction fingerprints allows the market participant to transact with minimum market impact.
In order to understand market conditions, and for other reasons, there is a need for systems and methods for generating a hidden order book report.
Further applications and advantages of various embodiments of the present invention are discussed below with reference to the drawing figures.
A computer implemented method of generating a hidden order volume report is provided. In some embodiments, the method includes electronically receiving order execution data for a plurality of executed trades via an electronic quotation feed associated with an electronic trading forum for trading both displayed orders and non-displayed orders. For a plurality of time periods, there is a step for determining the location within the best bid, best offer spread, of each executed trade of the plurality of executed trades, by comparing the price of each executed trade for hidden orders to published quotes on a published limit book for the electronic trading forum at a point in time substantially immediately before the corresponding executed trade. A report is generated, for a plurality of asset classes for each time period, of hidden order volume location within the spread based upon the determining step.
According to embodiments of the present invention, data used to generate a hidden order volume report preferably covers a two-week period.
According to embodiments of the present invention, NASDAQ's ITCH data feeds are used to calculate the average hidden order volume, volume executed against hidden orders, as a percentage of total trading volume by exchange, liquidity group and time bins.
According to embodiments of the present invention, a report is generated including the average hidden order volume and total volume in each bin. As a result of the invention, a representation is generated reflecting how hidden order volume is distributed across different locations and its relative size.
While the present invention may be embodied in many different forms, a number of illustrative embodiments are described herein with the understanding that the present disclosure is to be considered as providing examples of the principles of the invention and such examples are not intended to limit the invention to the embodiments shown or described herein.
Electronic Communication Networks (ECNs) and Alternative Trading Systems (ATSs) may include undisclosed (e.g., “hidden” or non-displayed) order volume within their order book. ECNs and ATSs will electronically report trades to the NASDAQ (National Association of Securities Dealers Automated Quotations) after they have been consummated. NASDAQ, in turn, publishes information about executed trades.
ITCH is a direct data-feed interface that allows customers to observe or disseminate information about stock trading activities on the NASDAQ. ITCH facilitates the display of data concerning added, executed, modified, or canceled orders. It is also possible to exchange cross and stock directory information. Each ITCH feed is composed of a series of sequenced messages delivered with a higher-level protocol such as TCP (Transmission Control Protocol) or UDP (User Datagram Protocol). ITCH makes it possible for subscribers to track the status of each order from the time it is first entered until the time it is either executed or canceled. Subscribers can also disseminate or receive administrative messages. ITCH is intended for information exchange only.
The present invention can use the ITCH direct feeds data to calculate the average hidden order volume, volume executed against hidden orders, as a percentage of total trading volume by exchange, liquidity group and time bins. According to embodiments of the present invention, a report is generated including the average hidden order volume and total volume in each bin. As a result of the invention, a representation is generated reflecting how hidden order volume is distributed across different locations and its relative size.
According to embodiments of the present invention, data used to generate a hidden order volume report preferably covers a two-week period. The trading day is sliced into bins, for example, in a preferred embodiment, thirteen 30-minute bins are defined as follows:
The prices of trades executed against hidden orders, hidden order trades, are compared to the quotes on the published limit order book (e.g., received from NASDAQ via ITCH) immediately before each trade to determine the location of each such trade. The location of a hidden order trade is defined as in the following table.
The second column is the price range of hidden order trades for each location. ASK denotes the best ask price and BID denotes the best bid price.
P1 and P2 are determined using the methods outlined next. Let S denote the inside spread in cents and MQ denote the midquote immediately before a trade occurs; that is:
S=100×(ASK−BID),
and
Now we can determine the values of P1 and P2 for three different cases:
If S<4 or S=6, then P1=P2=MQ.
Otherwise, if S is an even number, then
If S is an odd number, then
Int(x) returns the integer obtained by truncating x towards zero, and x/y returns the modulus of x with repect to y.
The proportion of hidden order volume as a percentage of total trading volume of the same side can be defined as
where hiddenOrderVolumeji is the total hidden order volume at location i in bin j, hiddenOrderVolumej is the total hidden order volume in bin j regardless of location, and visibleOrderVolumej is the total visible order volume in bin j. The hidden order volume (HV) and the total volume (TV) reported in tables 1-22 are in shares traded. All the other numbers are percentages.
At least three types of orders are known which could contribute to hidden liquidity in a limit order book: Reserve Orders, Non-display Orders, and Pegged Orders.
Reserve orders have a round lot display size and corresponding non-display size. Incoming order flow has access to both the display and non-display portion of a booked reserve order. Minimum share quantity for a displayed order is 100 shares; this amount is replenished when the amount falls below 100 shares. A new timestamp is created for the replenished portion of the order each time it is replenished from reserve, while the reserve portion retains the timestamp of its original entry.
Non-display Orders are hidden from the market place both in the System and in the NBBO. All incoming order flow can interact with hidden orders until hidden size is exhausted or cancelled at the specified price.
Pegged Orders are orders that, after entry, have their price automatically adjusted by the System in response to changes in either the local inside bid or offer, or bids or offers in the national market system, as appropriate. A Pegged Order can specify that its price will equal the inside quote on the same side of the market (“Primary Peg”), the opposite side of the market (“Market Peg”), or the midpoint of the bid and offer (“Midpoint Peg”). A Pegged Order may have a limit price beyond which the order shall not be executed. In addition, the Primary Peg and Market Peg Orders may also establish their pricing relative to the appropriate bids or offers by the selection of one or more offset amounts that will adjust the price of the order by the offset amount selected. A Midpoint Peg Order is priced based upon the inside bid and offer, excluding the effect that the Midpoint Peg Order itself has on the inside bid or inside offer. A new timestamp is created for the order each time it is automatically adjusted.
Each stock is grouped into either Listed or Nasdaq by its primary listing exchange according to the classification indicated in the following table.
The following discussions and exemplary report results include BUY trades only, but one skilled in the art will understand that the results are analogous for SELL trades.
The Nasdaq stocks have a uniformly larger proportion of hidden order volume in the locations of ASKM and ASK, with a few exceptions observed in Liquidity Group 0. The Listed stocks have a larger proportion of hidden order volume in the location of BIDM. This pattern is more obvious and profound for groups with higher liquidity. For the location of MID, listed stocks have a smaller proportion of hidden order volume for groups with lower liquidity, but have a larger proportion of hidden order volume for groups with higher liquidity. Basically, it can be concluded that the incoming marketable limit orders for Nasdaq stocks have higher transaction costs than those for Listed stocks.
The proportion of hidden order volume in the location of ASKM is decreasing as stocks become more liquid, however, the proportion of hidden order volume is increasing with liquidity group. This pattern is less profound for Listed stocks.
Both the proportion of hidden order volume and the hidden order volume exhibit a U-shape, which is consistent with standard results about trading volume. The larger proportion of hidden order volume after the market opens and before the market closes suggests that more hidden order volume occurs when the market is volatile and active.
The results in the tables are based on aggregated data. Results based on more granular data can be made available through the LOB database. All numbers are cross-sectional means. For each side, the first four columns are percentages and the fifth and sixth columns are in shares traded.
One skilled in the art will recognize that the data generated from the systems and methods described herein can be stored in a data storage facility, such as a database, or made otherwise accessible to users, such as traders or algorithms, via a client interface or other known means. The information content can be used to better assess the amount of typical additional undisclosed liquidity for different liquidity groups, different time periods of the day and different regions at or between the best bid and ask levels. One skilled in the art will readily notice that the time of the day variable is just one specific factor that can determine the amount of hidden liquidity. The amount of hidden liquidity depends on many other factors such as, for instance, stock-specific effective spread, historical stock-specific volatility, day of week, or stock-specific real-time intra-day volatility. For each of these factors, similar historical-based reports can be computed which can then be incorporated, for example, in algorithmic servers to discover undisclosed volume or in the post-trade performance evaluation process to assess and enforce best execution.
Computer software stored on the server (“server software”), when executed by the server's processor, causes the server 102 to communicate with the workstations 104 and one or more data vendors 106, e.g., data services, exchanges, ATS's, ECN's, etc., that offer real-time securities data in an electronic format. For example, NASDAQ offers a quotation data feed in the format called ITCH, as described above.
The server software, when executed by the server's processor, also causes the server 102 to perform certain calculations, already described in detail above, using the data from the data vendors 106, as well as estimating the probability of hidden market orders, and providing hidden order volume data for display on one or more workstations 104.
The server 102 can be located at a user's facility or at a site remote from the user's facility. Communication between the server 102 and the data vendors 106 can be accomplished via a direct data link connection or an electronic data network, such as a LAN, an intranet, or internet. In alternate embodiments, one or more workstations can be configured to perform the server functions such that a dedicated server is not needed. It will also be appreciated that workstations can be configured to communicate individually with data vendors and/or local databases without being networked to a server or other workstations.
The data representation or reports can be formatted to be printed onto paper or other physical media as a document, etc.
A number of embodiments of the present invention have been fully described above with reference to the drawing figures. Although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions could be made to the described embodiments within the spirit and scope of the invention. For example, as explained above, numerous other analytics could be calculated for the purpose of generating indicators of abnormal trading conditions for a security according to the present invention.
This application claims the benefit of U.S. Provisional Application Ser. No. 60/996,705 “System and Method for Providing a Hidden Volume Report,” filed on Nov. 30, 2007, the entire contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60996705 | Nov 2007 | US |