Security Analysis: An Investment Perspective / Kewei Hou, Haitao Mo, Chen Xue, Lu Zhang.
Material type:
- Hardcopy version available to institutional subscribers
Item type | Home library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
Working Paper | Biblioteca Digital | Colección NBER | nber w26060 (Browse shelf(Opens below)) | Not For Loan |
Collection: Colección NBER Close shelf browser (Hides shelf browser)
July 2019.
The investment theory, in which the expected return varies cross-sectionally with investment, expected profitability, and expected growth, is a good start to understanding Graham and Dodd's (1934) Security Analysis. Empirically, the q^5 model goes a long way toward explaining prominent equity strategies rooted in security analysis, including Frankel and Lee's (1998) intrinsic-to-market value, Piotroski's (2000) fundamental score, Greenblatt's (2005) "magic formula," Asness, Frazzini, and Pedersen's (2019) quality-minus-junk, Buffett's Berkshire, Bartram and Grinblatt's (2018) agnostic analysis, as well as Penman and Zhu's (2014, 2018) and Lewellen's (2015) expected-return strategies.
Hardcopy version available to institutional subscribers
System requirements: Adobe [Acrobat] Reader required for PDF files.
Mode of access: World Wide Web.
Print version record
There are no comments on this title.