SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Pricing Vulnerable European Options When the
      Option’s Payoff Can Increase the Risk of Financial
                           Distress

                                   Peter Klein, Michael Inglis
                                  Journal of Banking & Finance


                                  presenter: Chuan-Ju Wang



Chaun-Ju Wang, November 1, 2007                                  1 / 35
Outline

y Outline
                                Introduction
                            q
Introduction

The model
                                The model
                            q
Valuation equations

Valuation methods
                                Valuation equations
                            q
Numerical examples

                                Valuation methods
                            q
Conclusion



                                Numerical examples
                            q

                                Conclusion
                            q




  Chaun-Ju Wang, November 1, 2007                     2 / 35
y Outline

Introduction
y Vulnerable options
y Related works
y The idea of this
paper

The model

Valuation equations

                                    Introduction
Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                  3 / 35
Vulnerable options

y Outline
                                Many financial institutions actively trading derivative
                            q
Introduction
                                contract with their corporate clients as well as with other
y Vulnerable options
y Related works
                                financial institutions in the over-the-counter (OTC)
y The idea of this
                                markets.
paper

The model

                                No exchange or cleaning house to ensure that both parties
                            q
Valuation equations

                                to a contract honor their obligations.
Valuation methods

Numerical examples

                                The holder’s of these contracts are vulnerable to
                            q
Conclusion

                                counter-party credit risk.




  Chaun-Ju Wang, November 1, 2007                                                             4 / 35
Related works

y Outline
                                Most of the literature on vulnerable options assumes that
                            q
Introduction
                                financial distress occurs when the value of writer’s assets
y Vulnerable options
y Related works
                                drop below the value of its other liabilities.
y The idea of this
paper

                                This assumption ignores the potential liability created by
                            q
The model

                                the option itself.
Valuation equations

Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                            5 / 35
Related works (cont.)

y Outline
                                Johnson and Stulz (1987)
                            q
Introduction
y Vulnerable options
                                    3 Allowing the occurrence of financial distress to depend
y Related works
y The idea of this
                                      on the value of the option that has been written.
paper

The model
                                    3 In the event of financial distress, they assume that the
Valuation equations
                                      option holder receives all the assets of the option
Valuation methods
                                      writer.
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                           6 / 35
Related works (cont.)

y Outline
                                Klein (1996)
                            q
Introduction
y Vulnerable options
                                    3 Default boundary does not depend on the value of the
y Related works
y The idea of this
                                      option itself (fixed default boundary).
paper

The model
                                    3 Allowing for the presence of other liabilities in the
Valuation equations
                                      capital structure of the option writer.
Valuation methods

Numerical examples
                                Rich (1996)
                            q
Conclusion


                                    3 Allowing the default boundary to be stochastic.
                                    3 But not explicitly connect to the stochastic boundary
                                      to the value of the option that has been written.




  Chaun-Ju Wang, November 1, 2007                                                             7 / 35
The idea of this paper

y Outline
                                Allowing for the presence of other liabilities in the capital
                            q
Introduction
                                structure of the option writer while recognizing the growth
y Vulnerable options
y Related works
                                in the value of the option itself may also cause financial
y The idea of this
                                distress.
paper

The model

                                Default barrier can be stochastic.
                            q
Valuation equations

Valuation methods
                                    3 A fixed component represents the other liabilities of
Numerical examples

                                      the option writer.
Conclusion


                                    3 A stochastic component measures the potential payoff
                                      on the option itself.




  Chaun-Ju Wang, November 1, 2007                                                            8 / 35
y Outline

Introduction

The model
y Assumption

Valuation equations

Valuation methods

Numerical examples

                                    The model
Conclusion




  Chaun-Ju Wang, November 1, 2007               9 / 35
Assumption

y Outline
                                Summarizing the assumptions underlying the Klein (1996)
                            q
Introduction
                                model after appropriate adjustments to incorporate the
The model
                                variable default boundary (VDB) condition.
y Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                    10 / 35
Assumption (cont.)

y Outline

Introduction

The model
y Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007           11 / 35
Assumption (cont.)

y Outline

Introduction

The model
y Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007           12 / 35
y Outline

Introduction

The model

Valuation equations
y Johnson and Stulz
(1987)
y Klein (1996)
y Model of this

                                    Valuation equations
paper

Valuation methods

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                         13 / 35
Johnson and Stulz (1987)

y Outline
                                Johnson and Stulz (1987) pricing equation of vulnerable
                            q
Introduction
                                European calls can be written as
The model

Valuation equations
y Johnson and Stulz
(1987)
y Klein (1996)
y Model of this
                                                    ST − K   ST ≥ K, VT ≥ ST − K
paper
                                c = e−r(T −t) E ∗                                      (3)
                                                    VT       ST ≥ K, VT < ST − K   .
Valuation methods
                                                    0        otherwise
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                            14 / 35
Klein (1996)

y Outline
                                Klein (1996) pricing equation of vulnerable European calls
                            q
Introduction
                                can be written as
The model

Valuation equations
y Johnson and Stulz
(1987)
y Klein (1996)
y Model of this                                     ST − K              ST ≥ K, VT ≥ D∗
paper                                                           ST −K
                                c = e−r(T −t) E ∗                                             (4)
                                                                                          .
                                                    (1 − α)VT           ST ≥ K, VT < D∗
                                                                 D∗
Valuation methods
                                                    0                   otherwise
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                               15 / 35
Model of this paper

y Outline
                                The pricing equation for vulnerable European calls in this
                            q
Introduction
                                paper’s framework can be written as
The model

Valuation equations
y Johnson and Stulz
(1987)
y Klein (1996)
y Model of this
                                                                   ST ≥ K, VT ≥ D∗ + ST − K
                                           ST − K
paper
                                                         ST −K
                                           (1 − α)VT               ST ≥ K, VT < D∗ + ST − K
                      c = e−r(T −t) E ∗                                                             (5)
                                                                                                .
                                                         ∗ +S −K
                                                       D
Valuation methods                                            T
                                           0                       otherwise
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                             16 / 35
y Outline

Introduction

The model

Valuation equations

Valuation methods
y Numerical method
y Approximate
analytical solution
                                    Valuation methods
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                       17 / 35
Numerical method

y Outline
                                Three-dimension binomial tree
                            q
Introduction

The model
                                Orthogonal the two process to ensure zero correlation
                            q
Valuation equations
                                between the two state variables.
Valuation methods
y Numerical method
y Approximate
analytical solution

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                       18 / 35
Approximate analytical solution

y Outline
                                Performing the standard log transformation and then
                            q
Introduction
                                employing a first order Taylor series approximation to
The model
                                linearize the boundary conditions.
Valuation equations

Valuation methods
                                The denominator in the second term of Eq.(5) must also be
                            q
y Numerical method
y Approximate
                                linearized through a first order Taylor series approximation.
analytical solution

Numerical examples
                                A standard rotation as outlined in Abramowitz and Stegun
                            q
Conclusion
                                (1972) is used to eliminate S from the boundary condition
                                for V , which enables us to rewrite the approximation in
                                terms of the cumulative bivariate normal distribution as
                                follows:
                                       c=SN2 (a1 ,b1 ,δ)−Ke−r(T −t) N2 (a2 ,b2 ,δ)+

                                                          rσ 2
                                                            V
                                          (1−α)SV exp      2 +(ρ−m)σS σV       (T −t)+m2

                                                                                           N2 (a3 ,b3 ,−δ)−
                                                             D ∗ −K+m1
                                          (1−α)KV exp(m2 )
                                                           N2 (a4 ,b4 ,−δ).   (6)
                                             D ∗ −K+m1

  Chaun-Ju Wang, November 1, 2007                                                                      19 / 35
Approximate analytical solution (cont.)

y Outline
                                The approximation valuation equation depends on the
                            q
Introduction
                                point (p) around which the Taylor series is expanded.
The model

Valuation equations
                                    3 If D ∗ = K, the valuation equation does not depend on
Valuation methods
                                      the point of expansion p.
y Numerical method
y Approximate
                                            The barrier depends only upon ln(ST ) which, after
analytical solution                     s

                                            log transformation is already linear.
Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                          20 / 35
Approximate analytical solution (cont.)

y Outline
                                The approximation valuation equation depends on the
                            q
Introduction
                                point (p) around which the Taylor series is expanded.
The model

Valuation equations
                                    3 If D ∗ > K, the true default barrier is the convex line
Valuation methods
                                      show in Fig. 1.
y Numerical method
y Approximate
                                            Since this line corresponds to the probability that
analytical solution                     s

                                            financial distress will occur.
Numerical examples

Conclusion
                                            An approximation will underestimate the effect of
                                        s

                                            credit risk on the value of the vulnerable call
                                            option.
                                            The optimal value for the expansion point (p) will
                                        s

                                            be the value that minimizes the value of
                                            vulnerable option.




  Chaun-Ju Wang, November 1, 2007                                                            21 / 35
Approximate analytical solution (cont.)

y Outline
                                Fig. 1: Integration region for the vulnerable European call
                            q
Introduction
                                when D∗ > K.
The model

Valuation equations

Valuation methods
y Numerical method
y Approximate
analytical solution

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                        22 / 35
Approximate analytical solution (cont.)

y Outline
                                The approximation valuation equation depends on the
                            q
Introduction
                                point (p) around which the Taylor series is expanded.
The model

Valuation equations
                                    3 If D ∗ < K, the correct default barrier is concave.
Valuation methods

                                            An approximation based on a tangent will
y Numerical method
                                        s
y Approximate
                                            underestimate the value of the vulnerable call
analytical solution

                                            option as shown in Fig. 2.
Numerical examples

Conclusion
                                            The optimal value for p will be the value that
                                        s

                                            maximized the value of the vulnerable option.




  Chaun-Ju Wang, November 1, 2007                                                            23 / 35
Approximate analytical solution (cont.)

y Outline
                                Fig. 2: Integration region for the vulnerable European call
                            q
Introduction
                                when D∗ < K.
The model

Valuation equations

Valuation methods
y Numerical method
y Approximate
analytical solution

Numerical examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                        24 / 35
y Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples
y Numerical

                                    Numerical examples
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                        25 / 35
Numerical examples

y Outline
                                Table 1: A comparison of FDB vs VDB
                            q
Introduction

The model

Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                     26 / 35
Numerical examples (cont.)

y Outline
                                Fig. 3: Vulnerable call values as a function of option’s
                            q
Introduction
                                moneyness: a comparison of the FDB and VDB models
The model
                                (base case)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                          27 / 35
Numerical examples (cont.)

y Outline
                                Fig. 4: Vulnerable call values as a function of option’s
                            q
Introduction
                                moneyness: a comparison of the FDB and VDB models
The model
                                (base case)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                          28 / 35
Numerical examples (cont.)

y Outline
                                Fig. 5: Vulnerable call values as a function of option’s
                            q
Introduction
                                writer’s assets: a comparison of the FDB and VDB models
The model
                                (base case)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                     29 / 35
Numerical examples (cont.)

y Outline
                                Fig. 6: Vulnerable call values as a function of option’s
                            q
Introduction
                                writer’s assets: a comparison of the FDB and VDB models
The model
                                (base case)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                     30 / 35
Numerical examples (cont.)

y Outline
                                Fig. 7: Vulnerable call values as a function of option’s
                            q
Introduction
                                writer’s assets: a comparison of the FDB and VDB models
The model
                                (out-of-the-money option)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                     31 / 35
Numerical examples (cont.)

y Outline
                                Fig. 8: Vulnerable call values as a function of option’s
                            q
Introduction
                                writer’s assets: a comparison of the FDB and VDB models
The model
                                (in-the-money option)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                     32 / 35
Numerical examples (cont.)

y Outline
                                Fig. 9: Vulnerable call values as a function of option’s
                            q
Introduction
                                writer’s assets: a comparison of the FDB and VDB models
The model
                                (ρ = 0.5)
Valuation equations

Valuation methods

Numerical examples
y Numerical
examples

Conclusion




  Chaun-Ju Wang, November 1, 2007                                                     33 / 35
y Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion
                                    Conclusion
y Conclusion




  Chaun-Ju Wang, November 1, 2007                34 / 35
Conclusion

y Outline
                                This paper extends the vulnerable European option pricing
                            q
Introduction
                                results of Johnson and Stulz (1987) and Klein (1996).
The model

Valuation equations
                                    3 Allowing for other liabilities in the capital structure of
Valuation methods
                                      the option writer.
Numerical examples

                                    3 The default boundary depends on the payoff of the
Conclusion
y Conclusion
                                      option itself.
                                    3 Allowing the pay-out ratio to be linked to the value of
                                      option writer’s assets, and for correlation between the
                                      assets of the option writer and the asset underlying
                                      the option.




  Chaun-Ju Wang, November 1, 2007                                                             35 / 35

Weitere ähnliche Inhalte

Andere mochten auch

IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...
IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...
IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...Quantifi
 
Model Risk for Pricing and Risk Models in Finance
Model Risk for Pricing and Risk Models in FinanceModel Risk for Pricing and Risk Models in Finance
Model Risk for Pricing and Risk Models in FinanceHäner Consulting
 
SlideshareData management implications of the Fundamental Review of the Tradi...
SlideshareData management implications of the Fundamental Review of the Tradi...SlideshareData management implications of the Fundamental Review of the Tradi...
SlideshareData management implications of the Fundamental Review of the Tradi...Leigh Hill
 
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...Andrea Gigli
 
Credit Scoring
Credit ScoringCredit Scoring
Credit ScoringMABSIV
 
Model building in credit card and loan approval
Model building in credit card and loan approval Model building in credit card and loan approval
Model building in credit card and loan approval Venkata Reddy Konasani
 
Brexit or Bremain ? Evidence from bubble analysis
Brexit or Bremain ? Evidence from bubble analysisBrexit or Bremain ? Evidence from bubble analysis
Brexit or Bremain ? Evidence from bubble analysisMarco Bianchetti
 
FRTB - Market Risk Capital Charge Calculation
FRTB - Market Risk Capital Charge CalculationFRTB - Market Risk Capital Charge Calculation
FRTB - Market Risk Capital Charge CalculationRamesh Jonnadula
 

Andere mochten auch (15)

IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...
IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...
IFRS 13 CVA DVA FVA and the Implications for Hedge Accounting - By Quantifi a...
 
Model Risk for Pricing and Risk Models in Finance
Model Risk for Pricing and Risk Models in FinanceModel Risk for Pricing and Risk Models in Finance
Model Risk for Pricing and Risk Models in Finance
 
SlideshareData management implications of the Fundamental Review of the Tradi...
SlideshareData management implications of the Fundamental Review of the Tradi...SlideshareData management implications of the Fundamental Review of the Tradi...
SlideshareData management implications of the Fundamental Review of the Tradi...
 
R- Introduction
R- IntroductionR- Introduction
R- Introduction
 
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...
Impact of Valuation Adjustments (CVA, DVA, FVA, KVA) on Bank's Processes - An...
 
Cluster analysis
Cluster analysisCluster analysis
Cluster analysis
 
Credit Scoring
Credit ScoringCredit Scoring
Credit Scoring
 
IP Valuation
IP ValuationIP Valuation
IP Valuation
 
Step By Step Guide to Learn R
Step By Step Guide to Learn RStep By Step Guide to Learn R
Step By Step Guide to Learn R
 
Model building in credit card and loan approval
Model building in credit card and loan approval Model building in credit card and loan approval
Model building in credit card and loan approval
 
Decision tree
Decision treeDecision tree
Decision tree
 
Credit Risk Model Building Steps
Credit Risk Model Building StepsCredit Risk Model Building Steps
Credit Risk Model Building Steps
 
Brexit or Bremain ? Evidence from bubble analysis
Brexit or Bremain ? Evidence from bubble analysisBrexit or Bremain ? Evidence from bubble analysis
Brexit or Bremain ? Evidence from bubble analysis
 
Prudent Valuation
Prudent ValuationPrudent Valuation
Prudent Valuation
 
FRTB - Market Risk Capital Charge Calculation
FRTB - Market Risk Capital Charge CalculationFRTB - Market Risk Capital Charge Calculation
FRTB - Market Risk Capital Charge Calculation
 

Kürzlich hochgeladen

fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingAbdi118682
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...Amil Baba Dawood bangali
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 

Kürzlich hochgeladen (20)

fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial Accounting
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 

Pricing Vulnerable European Options When Payoff Can Increase Financial Distress

  • 1. Pricing Vulnerable European Options When the Option’s Payoff Can Increase the Risk of Financial Distress Peter Klein, Michael Inglis Journal of Banking & Finance presenter: Chuan-Ju Wang Chaun-Ju Wang, November 1, 2007 1 / 35
  • 2. Outline y Outline Introduction q Introduction The model The model q Valuation equations Valuation methods Valuation equations q Numerical examples Valuation methods q Conclusion Numerical examples q Conclusion q Chaun-Ju Wang, November 1, 2007 2 / 35
  • 3. y Outline Introduction y Vulnerable options y Related works y The idea of this paper The model Valuation equations Introduction Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 3 / 35
  • 4. Vulnerable options y Outline Many financial institutions actively trading derivative q Introduction contract with their corporate clients as well as with other y Vulnerable options y Related works financial institutions in the over-the-counter (OTC) y The idea of this markets. paper The model No exchange or cleaning house to ensure that both parties q Valuation equations to a contract honor their obligations. Valuation methods Numerical examples The holder’s of these contracts are vulnerable to q Conclusion counter-party credit risk. Chaun-Ju Wang, November 1, 2007 4 / 35
  • 5. Related works y Outline Most of the literature on vulnerable options assumes that q Introduction financial distress occurs when the value of writer’s assets y Vulnerable options y Related works drop below the value of its other liabilities. y The idea of this paper This assumption ignores the potential liability created by q The model the option itself. Valuation equations Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 5 / 35
  • 6. Related works (cont.) y Outline Johnson and Stulz (1987) q Introduction y Vulnerable options 3 Allowing the occurrence of financial distress to depend y Related works y The idea of this on the value of the option that has been written. paper The model 3 In the event of financial distress, they assume that the Valuation equations option holder receives all the assets of the option Valuation methods writer. Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 6 / 35
  • 7. Related works (cont.) y Outline Klein (1996) q Introduction y Vulnerable options 3 Default boundary does not depend on the value of the y Related works y The idea of this option itself (fixed default boundary). paper The model 3 Allowing for the presence of other liabilities in the Valuation equations capital structure of the option writer. Valuation methods Numerical examples Rich (1996) q Conclusion 3 Allowing the default boundary to be stochastic. 3 But not explicitly connect to the stochastic boundary to the value of the option that has been written. Chaun-Ju Wang, November 1, 2007 7 / 35
  • 8. The idea of this paper y Outline Allowing for the presence of other liabilities in the capital q Introduction structure of the option writer while recognizing the growth y Vulnerable options y Related works in the value of the option itself may also cause financial y The idea of this distress. paper The model Default barrier can be stochastic. q Valuation equations Valuation methods 3 A fixed component represents the other liabilities of Numerical examples the option writer. Conclusion 3 A stochastic component measures the potential payoff on the option itself. Chaun-Ju Wang, November 1, 2007 8 / 35
  • 9. y Outline Introduction The model y Assumption Valuation equations Valuation methods Numerical examples The model Conclusion Chaun-Ju Wang, November 1, 2007 9 / 35
  • 10. Assumption y Outline Summarizing the assumptions underlying the Klein (1996) q Introduction model after appropriate adjustments to incorporate the The model variable default boundary (VDB) condition. y Assumption Valuation equations Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 10 / 35
  • 11. Assumption (cont.) y Outline Introduction The model y Assumption Valuation equations Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 11 / 35
  • 12. Assumption (cont.) y Outline Introduction The model y Assumption Valuation equations Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 12 / 35
  • 13. y Outline Introduction The model Valuation equations y Johnson and Stulz (1987) y Klein (1996) y Model of this Valuation equations paper Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 13 / 35
  • 14. Johnson and Stulz (1987) y Outline Johnson and Stulz (1987) pricing equation of vulnerable q Introduction European calls can be written as The model Valuation equations y Johnson and Stulz (1987) y Klein (1996) y Model of this ST − K ST ≥ K, VT ≥ ST − K paper c = e−r(T −t) E ∗ (3) VT ST ≥ K, VT < ST − K . Valuation methods 0 otherwise Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 14 / 35
  • 15. Klein (1996) y Outline Klein (1996) pricing equation of vulnerable European calls q Introduction can be written as The model Valuation equations y Johnson and Stulz (1987) y Klein (1996) y Model of this ST − K ST ≥ K, VT ≥ D∗ paper ST −K c = e−r(T −t) E ∗ (4) . (1 − α)VT ST ≥ K, VT < D∗ D∗ Valuation methods 0 otherwise Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 15 / 35
  • 16. Model of this paper y Outline The pricing equation for vulnerable European calls in this q Introduction paper’s framework can be written as The model Valuation equations y Johnson and Stulz (1987) y Klein (1996) y Model of this ST ≥ K, VT ≥ D∗ + ST − K ST − K paper ST −K (1 − α)VT ST ≥ K, VT < D∗ + ST − K c = e−r(T −t) E ∗ (5) . ∗ +S −K D Valuation methods T 0 otherwise Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 16 / 35
  • 17. y Outline Introduction The model Valuation equations Valuation methods y Numerical method y Approximate analytical solution Valuation methods Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 17 / 35
  • 18. Numerical method y Outline Three-dimension binomial tree q Introduction The model Orthogonal the two process to ensure zero correlation q Valuation equations between the two state variables. Valuation methods y Numerical method y Approximate analytical solution Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 18 / 35
  • 19. Approximate analytical solution y Outline Performing the standard log transformation and then q Introduction employing a first order Taylor series approximation to The model linearize the boundary conditions. Valuation equations Valuation methods The denominator in the second term of Eq.(5) must also be q y Numerical method y Approximate linearized through a first order Taylor series approximation. analytical solution Numerical examples A standard rotation as outlined in Abramowitz and Stegun q Conclusion (1972) is used to eliminate S from the boundary condition for V , which enables us to rewrite the approximation in terms of the cumulative bivariate normal distribution as follows: c=SN2 (a1 ,b1 ,δ)−Ke−r(T −t) N2 (a2 ,b2 ,δ)+ rσ 2 V (1−α)SV exp 2 +(ρ−m)σS σV (T −t)+m2 N2 (a3 ,b3 ,−δ)− D ∗ −K+m1 (1−α)KV exp(m2 ) N2 (a4 ,b4 ,−δ). (6) D ∗ −K+m1 Chaun-Ju Wang, November 1, 2007 19 / 35
  • 20. Approximate analytical solution (cont.) y Outline The approximation valuation equation depends on the q Introduction point (p) around which the Taylor series is expanded. The model Valuation equations 3 If D ∗ = K, the valuation equation does not depend on Valuation methods the point of expansion p. y Numerical method y Approximate The barrier depends only upon ln(ST ) which, after analytical solution s log transformation is already linear. Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 20 / 35
  • 21. Approximate analytical solution (cont.) y Outline The approximation valuation equation depends on the q Introduction point (p) around which the Taylor series is expanded. The model Valuation equations 3 If D ∗ > K, the true default barrier is the convex line Valuation methods show in Fig. 1. y Numerical method y Approximate Since this line corresponds to the probability that analytical solution s financial distress will occur. Numerical examples Conclusion An approximation will underestimate the effect of s credit risk on the value of the vulnerable call option. The optimal value for the expansion point (p) will s be the value that minimizes the value of vulnerable option. Chaun-Ju Wang, November 1, 2007 21 / 35
  • 22. Approximate analytical solution (cont.) y Outline Fig. 1: Integration region for the vulnerable European call q Introduction when D∗ > K. The model Valuation equations Valuation methods y Numerical method y Approximate analytical solution Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 22 / 35
  • 23. Approximate analytical solution (cont.) y Outline The approximation valuation equation depends on the q Introduction point (p) around which the Taylor series is expanded. The model Valuation equations 3 If D ∗ < K, the correct default barrier is concave. Valuation methods An approximation based on a tangent will y Numerical method s y Approximate underestimate the value of the vulnerable call analytical solution option as shown in Fig. 2. Numerical examples Conclusion The optimal value for p will be the value that s maximized the value of the vulnerable option. Chaun-Ju Wang, November 1, 2007 23 / 35
  • 24. Approximate analytical solution (cont.) y Outline Fig. 2: Integration region for the vulnerable European call q Introduction when D∗ < K. The model Valuation equations Valuation methods y Numerical method y Approximate analytical solution Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 24 / 35
  • 25. y Outline Introduction The model Valuation equations Valuation methods Numerical examples y Numerical Numerical examples examples Conclusion Chaun-Ju Wang, November 1, 2007 25 / 35
  • 26. Numerical examples y Outline Table 1: A comparison of FDB vs VDB q Introduction The model Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 26 / 35
  • 27. Numerical examples (cont.) y Outline Fig. 3: Vulnerable call values as a function of option’s q Introduction moneyness: a comparison of the FDB and VDB models The model (base case) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 27 / 35
  • 28. Numerical examples (cont.) y Outline Fig. 4: Vulnerable call values as a function of option’s q Introduction moneyness: a comparison of the FDB and VDB models The model (base case) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 28 / 35
  • 29. Numerical examples (cont.) y Outline Fig. 5: Vulnerable call values as a function of option’s q Introduction writer’s assets: a comparison of the FDB and VDB models The model (base case) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 29 / 35
  • 30. Numerical examples (cont.) y Outline Fig. 6: Vulnerable call values as a function of option’s q Introduction writer’s assets: a comparison of the FDB and VDB models The model (base case) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 30 / 35
  • 31. Numerical examples (cont.) y Outline Fig. 7: Vulnerable call values as a function of option’s q Introduction writer’s assets: a comparison of the FDB and VDB models The model (out-of-the-money option) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 31 / 35
  • 32. Numerical examples (cont.) y Outline Fig. 8: Vulnerable call values as a function of option’s q Introduction writer’s assets: a comparison of the FDB and VDB models The model (in-the-money option) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 32 / 35
  • 33. Numerical examples (cont.) y Outline Fig. 9: Vulnerable call values as a function of option’s q Introduction writer’s assets: a comparison of the FDB and VDB models The model (ρ = 0.5) Valuation equations Valuation methods Numerical examples y Numerical examples Conclusion Chaun-Ju Wang, November 1, 2007 33 / 35
  • 34. y Outline Introduction The model Valuation equations Valuation methods Numerical examples Conclusion Conclusion y Conclusion Chaun-Ju Wang, November 1, 2007 34 / 35
  • 35. Conclusion y Outline This paper extends the vulnerable European option pricing q Introduction results of Johnson and Stulz (1987) and Klein (1996). The model Valuation equations 3 Allowing for other liabilities in the capital structure of Valuation methods the option writer. Numerical examples 3 The default boundary depends on the payoff of the Conclusion y Conclusion option itself. 3 Allowing the pay-out ratio to be linked to the value of option writer’s assets, and for correlation between the assets of the option writer and the asset underlying the option. Chaun-Ju Wang, November 1, 2007 35 / 35