1 / 39

12.3 Efficient Diversification with Many Assets

12.3 Efficient Diversification with Many Assets. We have considered Investments with a single risky, and a single riskless, security Investments where each security shares the same underlying return statistics We will now investigate investments with more than one (heterogeneous) stock.

galan
Download Presentation

12.3 Efficient Diversification with Many Assets

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 12.3 Efficient Diversification with Many Assets • We have considered • Investments with a single risky, and a single riskless, security • Investments where each security shares the same underlying return statistics • We will now investigate investments with more than one (heterogeneous) stock

  2. Portfolio of Two Risky Assets • Recall from statistics, that two random variables, such as two security returns, may be combined to form a new random variable • A reasonable assumption for returns on different securities is the linear model:

  3. Equations for Two Shares • The sum of the weights w1 and w2 being 1 is not necessary for the validity of the following equations, for portfolios it happens to be true • The expected return on the portfolio is the sum of its weighted expectations

  4. Equations for Two Shares • Ideally, we would like to have a similar result for risk • Later we discover a measure of risk with this property, but for standard deviation:

  5. Mnemonic • There is a mnemonic that will help you remember the volatility equations for two or more securities • To obtain the formula, move through each cell in the table, multiplying it by the row heading by the column heading, and summing

  6. Variance with 2 Securities

  7. Variance with 3 Securities

  8. Note: • The correlation of a with b is equal to the correlation of b with a • For every element in the upper triangle, there is an element in the lower triangle • so compute each upper triangle element once, and just double it • This generalizes in the expected manner

  9. Correlated Common Stock • The next slide shows statistics of two common stock with these statistics: • mean return 1 = 0.15 • mean return 2 = 0.10 • standard deviation 1 = 0.20 • standard deviation 2 = 0.25 • correlation of returns = 0.90 • initial price 1 = $57.25 • initial price 2 = $72.625

  10. Observation • The statistics indicate that one security appears to totally dominate the other • Security 1 has a lower risk and higher return than security 2 • In an efficient market: • Wouldn’t everybody short 2, and buy 1? • Wouldn’t supply and demand then cause the relative expected returns to “flip”?

  11. Does it Happen? • The purpose of selecting two shares with this paradoxical form is to illustrate an important point later • This kind of relationship does occur in the real world

  12. A Pair of Price Trajectories • The next graph shows a trajectory of two share prices with the statistics we have selected

  13. Observation • If you were to “cut a piece” from one trajectory, re-scale it for relative price differences, and slide it over the other, you would observe that both trajectories behave in a broadly similar manner, but each has independent behavior as well • Quick confirmation is seen in the region 1 to 4 years where prices are close

  14. Correlation • The two shares are highly correlated • They track each other closely, but even adjusting for the different average returns, they have some individual behavior

  15. Observation • Shorting the high-risk, low-return stock, and re-investing in the low-risk, high-return stock, creates efficient portfolios • Shorting high-risk by 80% of the net wealth crates a portfolio with a volatility of 20% and a return of 19% (c.f. 15% on security 1) • Shorting by 180% gives a volatility of 25%, and a return of 24% (c.f. 10% on security 2)

  16. Observation • In order to generate a portfolio that generates the same risk, but with a higher return • Compute the weights of the minimum portfolio, W1 (min-var), W2 (min-var) • (Formulae given later) • Use the relationship • Wi (sub-opt) +Wi (opt) = 2 * Wi (min-var)

  17. Observation • Another way to generate the two securities is to form two portfolios consisting of a risky and a riskless security that each meet the efficient frontier • Result: two portfolios that are long the risky security, and short the riskless security • Short one of the portfolios and invest in the other to generate one of the desired efficient portfolios • Repeat to generate the other • Prove that the riskless security becomes irrelevant

  18. Optimal Combination of Risky Assets • The following slides are samples of the computations used to generate the graphs

  19. Fragments of the Output Table

  20. Sample of the Excel Formulae

  21. Formulae for Minimum Variance Portfolio

  22. Formulae for Tangent Portfolio

  23. Example: What’s the Best Return given a 10% SD?

  24. Selecting the Preferred Portfolio • The procedure is as follows • Find the portfolio weights of the tangent portfolio of the line (CML) through (0, rf) • Determine the standard deviation and expectation of this point • Construct the equation of the CML • Apply investment criterion

  25. Achieving the Target Expected Return (2): Weights • Assume that the investment criterion is to generate a 30% return • This is the weight of the risky portfolio on the CML

  26. Achieving the Target Expected Return (2):Volatility • Now determine the volatility associated with this portfolio • This is the volatility of the portfolio we seek

  27. Achieving the Target Expected Return (2): Portfolio Weights

  28. Investment Strategies • We have examined two strategies in detail when • the volatility is specified • the return is specified • Additionally, one of the graphs indicated an approach to take when presented with investor’s risk/return preferences

  29. Portfolio of Many Risky Assets • In order to solve problems with more than two securities requires tools such as quadratic programming • The “Solve” function in Excel may be used to obtain solutions, but it is generally better to use a software package such as the one that came with this book

  30. Chapter Assumptions • The theory underlying this chapter is essentially just probability theory, but there are financial assumptions

  31. We do not have to assume that the generating process of returns is normal, but we do assume that the process has a mean and a variance. This is may not be the case in real life

  32. We assumed that the process was generated without inter-temporal correlations. Some investors believe that there is valuable information in old price data that has not been incorporated into the current price--this runs counter to many rigorous empirical studies.

  33. There are no “hidden variables” that explain some of the noise

  34. Investors make decisions based on mean-variances alone • statistics such as skewness & kurtosis have been ignored

  35. We have made the assumption the we can lend at the risk-free rate, and that we can “short” common stock aggressively

  36. Summary • There is no single investment strategy that is suitable for all investors; nor for a single investor for his whole life • Time makes risky investments more attractive than safer investments • In practice, diversification has somewhat limited power to reduce risk

More Related