Image from Google Jackets

Security Analysis: An Investment Perspective / Kewei Hou, Haitao Mo, Chen Xue, Lu Zhang.

By: Contributor(s): Material type: TextTextSeries: Working Paper Series (National Bureau of Economic Research) ; no. w26060.Publication details: Cambridge, Mass. National Bureau of Economic Research 2019.Description: 1 online resource: illustrations (black and white)Subject(s): Online resources: Available additional physical forms:
  • Hardcopy version available to institutional subscribers
Abstract: The investment theory, in which the expected return varies cross-sectionally with investment, expected profitability, and expected growth, is a good start to understanding Graham and Dodd's (1934) Security Analysis. Empirically, the q^5 model goes a long way toward explaining prominent equity strategies rooted in security analysis, including Frankel and Lee's (1998) intrinsic-to-market value, Piotroski's (2000) fundamental score, Greenblatt's (2005) "magic formula," Asness, Frazzini, and Pedersen's (2019) quality-minus-junk, Buffett's Berkshire, Bartram and Grinblatt's (2018) agnostic analysis, as well as Penman and Zhu's (2014, 2018) and Lewellen's (2015) expected-return strategies.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

July 2019.

The investment theory, in which the expected return varies cross-sectionally with investment, expected profitability, and expected growth, is a good start to understanding Graham and Dodd's (1934) Security Analysis. Empirically, the q^5 model goes a long way toward explaining prominent equity strategies rooted in security analysis, including Frankel and Lee's (1998) intrinsic-to-market value, Piotroski's (2000) fundamental score, Greenblatt's (2005) "magic formula," Asness, Frazzini, and Pedersen's (2019) quality-minus-junk, Buffett's Berkshire, Bartram and Grinblatt's (2018) agnostic analysis, as well as Penman and Zhu's (2014, 2018) and Lewellen's (2015) expected-return strategies.

Hardcopy version available to institutional subscribers

System requirements: Adobe [Acrobat] Reader required for PDF files.

Mode of access: World Wide Web.

Print version record

There are no comments on this title.

to post a comment.

Powered by Koha