1 / 4

Security Analysis and Portfolio Management : Theory, Method and Application*

Security Analysis and Portfolio Management : Theory, Method and Application*. Cheng-Few Lee Distinguished Professor of Finance and Economics, Rutgers University Editor of Review of Quantitative Finance and Accounting and Review of Pacific Basin Financial Market and Policy

acarol
Download Presentation

Security Analysis and Portfolio Management : Theory, Method and Application*

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Analysis and Portfolio Management: Theory, Method and Application* Cheng-Few Lee Distinguished Professor of Finance and Economics, Rutgers University Editor of Review of Quantitative Finance and Accounting and Review of Pacific Basin Financial Market and Policy Email: cflee@business.rutgers.edu *Speech to be delivered at FeAT 2019 Annual Conference on May 31, 2019

  2. A: Introduction • B: Efficient Market Hypothesis: Empirical Evidence Based upon Yen and Lee (2008), the empirical evidence of EMH can be divided into three periods. - B1: Supporting Empirical Evidence on the EMH in 1960s - B2: Mixed Empirical Evidence on EMH in the Late 1970s through 1980s - B3: Challenging Empirical Evidence on EMH in 1990s Overall, the market is not as efficient as the theory originally hypothesized; therefore, there is hope to perform security analysis and portfolio management to make money. • C: Four Alternative Methods to Perform Security Analysis C1)Technical Analysis, C2) Fundamental Analysis, C3) Contrarian Analysis, and C4) Dynamic Asset Allocation • D: Security Value Determination and Its Forecast - D1) Discount Cash Flow Method, D2) PE Ratio Method, D3) Alternative Forecasting Methods: Single Equation Method and Simultaneous Equation Method

  3. E: Alternative Momentum Analysis - E1) Technical Approach, E2) Fundamental approach, E3) Combined Approach, and E4) Volatility Spillover Approach • Based upon the recent research paper, “Another Look at Value and Momentum: Volatility Spillovers,” by Klaus Grobysand Sami Vähämaa (2018), the abstract of this paper is quoted as follows: This paper examines volatility interdependencies between value and momentum returns. Using U.S. data over the period 1926-2015, we document persistent periods of low and high volatility spillovers between value and momentum strategies. Moreover, we find that the intensity of the volatility spillovers may change substantially in very short periods of time and that these shifts in spillover intensity can be linked to prominent economic events and financial market turmoil. Our results further demonstrate that value returns increase and momentum returns decrease monotonically with increasing volatility spillovers between the two strategies. Given this linkage between spillover intensity and returns, we propose a simple trading strategy which utilizes a volatility spillover index for allocating funds between value and momentum portfolios. The proposed trading strategy outperforms value and momentum strategies and generates payoffs that are not subject to option-like behavior.

  4. F: Portfolio Analysis and Mutual Fund There are several methods that can be used to formulate a portfolio. They include i) Markowitz method, ii) index method, iii) performance measure method, and iv) other methods. It is well known that mutual funds can be classified into active management funds and passive management funds (ETF). The active management fund can be further classified into different types of funds (See Lee et al. 2013). • G: Introduction to Financial Econometrics, Mathematics, Statistics, and Machine Learning (Please see other PowerPoint for more detail.) • H: Summary and Concluding Remarks • References 1. Grobys, K and S. Vähämaa, 2018. Another Look at Value and Momentum: Volatility Spillovers, Working paper. 2. Lee, C.F., J. Finnerty, J. C. Lee, A. C. Lee, and D. Wort, 2013. Security Analysis, Portfolio Management, and Financial Derivatives, 2nd Edition, World Scientific Publishing. 3. Lee, C.F. and J.C. Lee, 2017. Financial Analysis, Planning and Forecasting, 3rd edition., World Scientific Publishing Co. 4. Lee, C. F. and J. Lee. "Handbook of Financial Econometrics, Mathematics, Statistics, and Technology" 2019, forthcoming. World Scientific, Singapore. 5. Yen, G. and C.F. Lee, 2008. “Efficient Market Hypothesis (EMH): Past, Present and Future,” Review of Pacific Basin Financial Markets and Policies, Vol. 11, pp. 305-329.

More Related