Introduction To Portfolio Selection and Capital Market Theory: Static Analysis
Introduction To Portfolio Selection and Capital Market Theory: Static Analysis
Assumption 2: Price-Taker
W0
Where Z 1 w j Z j is the random variable
n
{ w1 , w2 ,wn }
1 (2.4)
n
max E{U ([ w j ( Z j R ) R ]W0 )}
{ w1 , w2 ,wn }
1
The first-order conditions can be written
as:
E{U ( Z W0 )( Z j R )} 0 j 1, 2, , n
can be rewritten as 1 j ( Z j R) R
n
Where Z
w
dA U (W )
A(W ) A(W )[ A(W ) ]
dW U (W )
A(W ) ispositive, and such investor are call
risk averse.
An alternative, measure of risk aversion is
the relative risk-aversion function defined
by
U (W )W
R(W ) A(W )W
U (W )
Its change with respect to a change in we
alth is given by
R(W ) A(W )W A(W )
The certainty-equivalent end-of-period
wealth WC is defined to be such that
U (WC ) E{U (W )}
WC is the amount of money such that the
investor is indifferent between having this
amount of money for certain or the
portfolio with random variable outcome W .
We can proof follows directly by Jensen’s
inequality: if U is strictly concave
U (WC ) E{U (W )} U ( E{W })
Because U is an increase function, So
WC E{W }
The certainty equivalent can be used to
compare the risk aversions of two investor.
If A is more risk averse than B and they
hold same portfolio, the certainty
equivalent end of period wealth for A is
less than or equal to the certainty
equivalent end of period wealth for B.
Rothschild and Stiglitz define the meaning
of “increasing risk” for a security so we ca
n compare the riskiness of two securities o
r portfolios.
If E (W1 ) E (W2 ) , E{U (W1 )} E{U (W2 )} for a
ll concave Uwith strict inequality holding
for some concave U , we said the first por
tfolio is less risky than the second portfolio
.
Its equivalence to the two following
definitions:
(1) W2 is equal in distribution to W1 plus some
“noise”.
(2) W2 has more “weight in its tails” than W1 .
If there exists an increasing strictly
concave function V such that
E{V ( Z )( Z j R)} 0, j 1, 2, , n., we call this
portfolio is an efficient portfolio.
All portfolios that are not efficient are
Proof: By hypothesis
E{U [( Z Z )W0 ]} E{[( Z e Z e )W0 ]}
Z Ze E{U ( ZW0 )} E{U ( Z eW0 )}
If then trivially .
But Z is a feasible portfolio and
Zis
e an ef
E{V (Z
1
j K j R )} E{VK ( Z P R )} 0
By a similar argument, E{VK ( Z eK R )} 0
Hence,
K
cov(VK , Z e ) E[VK ( Z e Z e )]
K K
E[VK ( Z eK R R Z eK )]
E[VK ( Z e R )] E[VK ( R Z e )]
K K
( R Z ) E[VK ]
e
K
and
cov(VK , Z P ) ( R Z P ) E{VK }
By Corollary 2.1 , e R
K
Z . Therefore
Z p R b (Z R)
K
p e
K
Hence, the expected excess return on
portfolio P, Z P R is in direct proportion
to its risk and the larger is its risk , the
larger is its expected return.
Consider an investor with utility function U
and initial wealth W0 who solves the
portfolio-selection problem:
max E{U ([ wZ j (1 w) Z ]W0 )}
w
The first order condition:
E{U ([ w* Z j (1 w* ) Z ]W0 )( Z j Z )}
If Z Z * then the solution is W * 0 .
However , an optimal portfolio is an efficie
nt portfolio. By Theorem 2.4
Z j R b (Z R)
*
j
*
w *
w W0 E{U ( Z Z j )} E{U }
*
Z j
W0 E{U ( Z Z j ) } 2
olio K.
cov( Z p ,VK ) 0
e } Z p then
K
(ii) If E{ Z P | Z
(iii) cov( Z p ,VK ) 0 for efficient portfolio K if
and only if cov( Z PVL ) 0 for every efficient
portfolio L.
Proof: (i) VK is a continuous monotonic fun
ction of and
Z K
e hence VK
and are
Z K
e in o
ne to one correspondence.
(ii) cov(Z p ,VK ) E{VK ( Z p Z P )} E{VK E{Z p Z P | ZeK }} 0
(iii)Because bpK 0 cov( Z p ,VK ) 0
if p 0 , then Z p R .
b K
Z R L
Zp R Zp R
b
K
L
e
b
K
p b
L
p
Z R e
K
Z R
e
K
Z R
e
L
Property 2: If L and K are efficient
portfolios, then bK 1 and bKL 0 .
K
Proof: From Property 1, we have
b b b
K
p
K
L
L
p b b b
K
q
K L
L q
K
Thus the b measure provides the same
p
orderings of risk for any reference efficient
portfolio.
Property 5: For each efficient portfolio K
and any feasible portfolio p, Z p R bpK ( ZeK R) p
where E{ p } 0 and E{ V
p L
( Z e )} 0
L
for
every efficient portfolio L.
Proof: From Theorem 2.4 E{ p } 0 . If por
tfolio q is constructed by holding one dolla
r p, dollars
b K
p riskless security, short sellin
g bp portfolio K, then
dollars
K
Zq R p
so bqL 0 for every efficient portfolio L.
But q 0 implies 0 cov( Z q ,VL ) E{ p ,VL}
L
b
.
They can give different rankings.
The Rothschild Stiglitz definition measure t
he “total risk” of a security. It is appropriat
e definition for identifying optimal portfolio
s and determining the efficient portfolio se
t.
The b measure the “ systematic risk” of a
K
j
security.
K
To determine the b j , the efficient
portfolio set must be determined.
The manifest behavioral characteristic
shared by all risk averse utility
maximization is to diversify.
The greatest benefits in risk reduction com
e from adding a security to the portfolio w
hose realized return tends to be higher wh
en the return on the rest of the portfolio is
lower.
Next to such “ countercyclical” investment
s in terms of benefit are the noncyclic sec
urities whose returns are orthogonal to th
e return on the portfolio.
Theorem 2.5 : If Z p and Z q denote the
returns on portfolio p and q respectively
and if, for each possible value of Z e ,
dG p ( Z e ) dGq ( Z e )
dZ e with strict inequality
dZ e
holding over some finite probability
measure of Z e ,then portfolio p is riskier
than portfolio q and Z p Z q .
Where G p (Z e ) E{Z p | Z e } , Z e is the
realized return on an efficient portfolio.
Proof:
bp bq cov[Y ( Z e ), Z p Z q ] E[Y ( Z e )( Z p Z q )]
E[Y ( Z e )( E{Z p | Z e } E{Z q | Z e })]
E[Y ( Z e )(Ge ( Z p ) Ge ( Z q ))
cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )]
Y (Ze )is a strictly increasing function, Ge ( Z p ) Ge ( Z q )
is a nondecreasing function, so
bp bq cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )] 0
From Theorem 2.4 Z p Zq
Theorem 2.6: If Z p and Z q denote the
returns on portfolio p and q respectively
and if, for each possible value of Z e ,
dG p ( Z e ) dGq ( Z e )
a pq , a constant, then
dZ e dZ e
bp bq a pq and Z Z a ( Z R) .
p q pq e
Proof: By hypothesis
Ge ( Z p ) Ge ( Z q ) a pq h
bp bq cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )]
cov[Y ( Z e ), a pq Z e h] a pq
Z p R bp ( Z e R ) R bq (Z e R ) a pq (Z e R ) Z q a pq (Z e R )
Theorem 2.7: If, for all possible values of Z e
(i)dG (Z ) dZ 1 , then Z p Z e
p e
e
dG p ( Z e )
(II) 0 dZ e
1 , then R Z p Z e
dG p ( Z e )
(III) dZ e
0 , then R Zp
dG p ( Z e )
(IV) dZ e
ap , a constant, then
Z p R a p (Z e R)
Theorems 2.5, 2.6 and 2.7 demonstrate,
the conditional expected return function
provides considerable information about a
security’s risk and equilibrium expected
return.
2.4 Spanning, Separation, and
Mutual-Fund Theorems
Definition: A set of M feasible portfolios
with random variable returns ( X 1 , X M )
is said to span the space of portfolios
contained in the set if and only if for
any portfolio in with return denoted by Z p
there exist numbers (1 , M ) , 1 i 1
M
such that Z p 1 j X j
M
A mutual fund is a financial intermediary
that holds as its assets a portfolio of
securities and issues as liabilities shares
against this collection of assets.
Theorem 2.8 If there exist M mutual funds
whose portfolio span the portfolio set ,
then all investors will be indifferent
between selecting their optimal portfolios
from and selecting from portfolio
combination of just the M mutual funds.
Therefore the smallest number of such
funds M is a particularly important
spanning set.
When such spanning obtain, the investor’s
portfolio-selection problem can be
separated into two steps.
However, if the smallest funds can be
constructed only if the fund managers
know the preferences, endowments, and
probability beliefs of each investor.
Theorem 2.9: Necessary conditions for the
M feasible portfolios with return ( X 1 , , X M )
to span the portfolio set are (a) that
f
p Zp
1 p 1 to
allocated the security with return
n
j
a
ecurity j with return
p j p [b R (1
R, Zif Ris chosen
such
n
a )] t
1 j
hat ,then Z R is
riskless security and therefore but
can be chosen arbitrarily. So we get the
result.
Hence, as long as there are no arbitrage o
pportunities, it can be assumed without lo
ss of generality that one of the portfolios i
n any candidate spanning set is the riskles
s security.
Theorem 2.10: A necessary and sufficient
condition for ( X 1 , , X m , R) to span is that
f
X M R and substituting Mj 1 1 ij , we ha
m
ve Z j R 1 aij ( X i R ) j 1, 2, , n.
m
ination of ( Z1 , ,andZ n ) R.
Corollary 2.10: A necessary and sufficient
condition for ( X 1 , , X m , R) to be the smallest
number of feasible portfolio that span is th
at the rank of equals the rank of X m
Proof: If the rank of X m , then X
are linearly independent. Moreover
hence, if the rank of m then there e
that Z j Z j 1 aij ( X i X i )
m
xist number {aijsuch }
for . Therefore Z j b j 1 aij X i wher
m
j 1, , n
b j Z j 1 by
m
e aij XTheorem
i 2.10
span
f
It follows from Corollary 2.10 that a
necessary and sufficient condition for
nontrivial spanning of is f
that some of the
risky securities are redundant securities.
By Theorem 2.10, if investors agree on a set
of portfolios such that
( X 1 , , X m , R ) and if they
agree
Z j R 1 aij (number
on the
m
X i R ) j 1,,then2, , n. span
even if investors do {not a } agree (on
ij
the
X 1 , , X m , R)
joint distribution
f of
( X 1 , , X m , R )
Proposition 2.2: If Z e is the return on a por
tfolio contained in , then
e
any portfolio t
hat combines positive amount of with the Z e
riskless security is also contained in ,
where
e
is theset
e
of all efficient portfolio
s contained in . f
Proof: Let Z Z e (1 ) R , because Z eis
an efficient portfolio, so E{V ( Z e )( Z j R)} 0
Define U (W ) V (aW b) where a 1 and
b ( 1)R , Hence E{U ( Z )( Z j R)} 0 , th
us Z is an efficient portfolio.
It follows from Proposition 2.2 that, for
every number Z such that Z R , there
exists at least one efficient portfolio with
expected return equal to Z .
Theorem 2.11: Let ( X 1 , , X m ) denote the
return on m feasible portfolios. If, for
security j, there exist number {aij } such that
Z j Z j 1 aij ( X i X i ) j where E{ jVK ( Z eK )} 0
m
Z p R [ Z j R 1 aij ( X i R )] j by
m
1 w j R 1 1 w j aij ( X i R) 1 wKj j
n K n m K m
R 1 iK ( X i R) K
m
1 j aij
n
K 1 w Kj j
K K
Where
m
w i
Construct portfolio Z 1 X i (1 1 iK ) R
m K m
i
K
Z
Hence, for 0 , e is riskier than Z,
K
K
which contradicts that Z e is and efficient
portfolio. So K
0 . We get the result.
K
Theorem 2.13: Let j denote the fraction
w
of efficient portfolio K allocation to security
j, j 1, , n. ( X 1 ,span
, X m , R) if and only
e
1
ment of .X
Hence given some knowledge of the joint e
distribution of a set of portfolio that span
with Z j Z j , we can determining the aijand Z j
Proposition 2.4: If ( Z1 , , Z n ) contain no
redundant securities, j denotes the
fraction of portfolio X allocated to security
j, and w j denotes the fraction of any risk-
averse investor’s optimal portfolio
allocated to security j, j 1, , n, then for
every such risk-averse investor
w
jj
j , k 1, 2, , n
w k
*
k
Because every optimal portfolio is an effici
ent portfolio and the holding of risky securi
ties in every efficient portfolio are proporti
onal to the holding in X.
If there exist numbers j where , j, k 1,, n
*
j
*
j
k k
1 j
n
*
and ( ,the
,then
*
1 )portfolio with proporti
*
n
ons is called the Optimal Combina
tion of Risky Assets.( X , R) e e
Proposition 2.5: If span , then i
s a convex set.
Proof: Let Z e1 1 ( X R ) R Z e2 2 ( X R ) R
and 1 2 , Z Z 1
e (1 ) Z e . By
2
1 j k j j 1,, nMultiplying
0
rtfolio by
K
w k
M
.
R summing over j, it follows that
Z jand
k 1 w ( Z j R ) 1 K ( Z K R)
K n k K
1 j
n
1 i
M
( Z j R) Z M R
because 1 k 1, Z M 1 K Z k . Hence, Z M is
K K
use Z , R k . Hence
k 0 ZM R
The market portfolio is the only risky portf
olio where the sign of its equilibrium expec
ted excess return can always be predicted.
Returning to the special case where e is s
panned by a single risky portfolio and the
riskless security, the market portfolio is eff
icient. So the risky spanning portfolio can
always be chosen to be the market portfoli
o.
Theorem 2.15: If M ( Z , R )
span , then the
e
S .T Z ( )
If R then Z ( R) R and j 0, j 1, 2 , n
R
Proof: By hypothesis
p ( Z1 , Z i , Z n ) p ( Z i , Z1 , Z n ) for each set
of given values. Therefore every risk
averse investor will choose 1 i . But this
the distribution of . Vj
Theorem 2.20: If ( X 1 , , X m ) denote a set of
linearly independent portfolios that satisfy
the hypothesis of Theorem 2.12, and all se
curities have finite variances, then a neces
sary condition for equilibrium in the securit
ies’ market is that
V j 1
m m
vik cov( X k , V j )( X j R)
Vj0 1
R
1
where vik is the ikth
element of X
Proof: By linear independence V j Z jV j 0
by Theorem 2.12 V j V j 0 [ R m aij ( X i R) j ]
1
where E{ j | X 1 , , X m } 0 . Take
expectations, we have
V j V j 0 [ R 1 aij ( X i R)]
m
We can get
V j 1
m m
vik cov( X k ,V j )( X j R )
Vj0 1
R
Hence, from Theorem 2.20, a sufficient se
t of information to determine the equilibriu
m value of security j is the first and secon
d moments for the join distribution of
. ( X 1 , , X m , V j )
Corollary 2.20a: If the hypothesized condit
ions of Theorem 2.20 hold and if the end-
of-period value a security is given by
V 1 jV j then in equilibrium
n
V0 1 jV j 0
n
q
f V (I )
where is the equilibrium initial value of
k0 j0 j
is the equilibrium initial value of
1
financialf k 0claim k.
Hence, for a given investment policy, the
way in which the firm finances its
investments changes the return
distribution of the efficient portfolio set.
Clearly, a sufficient condition for Theorem
2.21 to obtain is that each of the financial
claims issued by the firm are “ redundant
securities”.
An alternative approach to the
development of nontrivial spanning
theorems is to derive a class of utility
functions for investors .
Such that even with arbitrary joint
probability distributions for the available
securities,investors within the class can
generate their optimal portfolios from the
spanning portfolios.
Let u denote the set of optimal portfolios
selected from f by investors with strictly
concave von Neumann-Morgenstern utility
functions.
Theorem 2.22 There exists a portfolio with
span if and onl
u
return X such that ( X , R )
y if Ai (W ) 1 (ai bW ) , where
0 isAithe abs
olute risk-aversion function for investor
i in u .
Because the b in the statement of Theore
m 2.22 does not have a subscript , theref i
ore all investors in
must have virtually t
u
thanks