Two major market crashes, numerous financial and accounting scandals, growth in private equity and hedge funds, Sarbanes Oxley and related regulations, and international developments changed security analysis and business valuation substantially over the last fourteen years. These events necessitated a second edition of this modern classic, praised earlier by Barron's as a "welcome successor to Graham and Dodd" and used in the global CFA exam.
This authoritative book shows the rational, rigorous analysis is still the most successful way to evaluate securities. It picks up where Graham and Dodd's bestselling Security Analysis - for decades considered the definitive word on the subject - leaves off. Providing a practical viewpoint, Security Analysis on Wall Street shows how the values of common stock are really determined in today's marketplace. Incorporating dozens of real-world examples, and spotlighting many special analysis cases - including cash flow stocks, unusual industries and distressed securities - this comprehensive resources delivers all the answers to your questions about security analysis and corporate valuation on Wall Street.
The Second Edition of Security Analysis on Wall Street examines how mutual funds, private equity funds, hedge funds, institutional money managers, investment banks, business appraisers, and corporate acquirers perform their craft of security analysis and business valuation in today's highly charged environment. Completely updated to reflect the latest methodologies, this reliable resource represents the most comprehensive book written by someone who has actually worked as an investment banker, private equity executive, and international institutional investor.
- Shows the methodical process that practitioners use to value common stocks and operating companies and to make buy/sell decisions
- Discusses the impact of the two stock market crashes, the accounting and financial scandals, and the new regulations on the evaluation process
- Covers how Internet and computing power automate portions of the research and analytical effort
- Includes new case study examples representative of valuation issues faced daily by mutual funds, private equity funds, hedge funds, institutional investors, investment banks, business appraisers, and corporate acquirers
- Is a perfect tool for professors wishing to show their MBA students the essential tools of equity and business valuation
Security analysis and business valuation are core financial disciplines for Wall Streeters, corporate acquirers, and international investors. The Second Edition of Security Analysis on Wall Street is an important book for anyone who needs a solid grounding in these critical finance topics.
Two major market crashes, numerous financial and accounting scandals, growth in private equity and hedge funds, Sarbanes Oxley and related regulations, and international developments changed security analysis and business valuation substantially over the last fourteen years. These events necessitated a second edition of this modern classic, praised earlier by Barron's as a "welcome successor to Graham and Dodd" and used in the global CFA exam.
This authoritative book shows the rational, rigorous analysis is still the most successful way to evaluate securities. It picks up where Graham and Dodd's bestselling Security Analysis - for decades considered the definitive word on the subject - leaves off. Providing a practical viewpoint, Security Analysis on Wall Street shows how the values of common stock are really determined in today's marketplace. Incorporating dozens of real-world examples, and spotlighting many special analysis cases - including cash flow stocks, unusual industries and distressed securities - this comprehensive resources delivers all the answers to your questions about security analysis and corporate valuation on Wall Street.
The Second Edition of Security Analysis on Wall Street examines how mutual funds, private equity funds, hedge funds, institutional money managers, investment banks, business appraisers, and corporate acquirers perform their craft of security analysis and business valuation in today's highly charged environment. Completely updated to reflect the latest methodologies, this reliable resource represents the most comprehensive book written by someone who has actually worked as an investment banker, private equity executive, and international institutional investor.
- Shows the methodical process that practitioners use to value common stocks and operating companies and to make buy/sell decisions
- Discusses the impact of the two stock market crashes, the accounting and financial scandals, and the new regulations on the evaluation process
- Covers how Internet and computing power automate portions of the research and analytical effort
- Includes new case study examples representative of valuation issues faced daily by mutual funds, private equity funds, hedge funds, institutional investors, investment banks, business appraisers, and corporate acquirers
- Is a perfect tool for professors wishing to show their MBA students the essential tools of equity and business valuation
Security analysis and business valuation are core financial disciplines for Wall Streeters, corporate acquirers, and international investors. The Second Edition of Security Analysis on Wall Street is an important book for anyone who needs a solid grounding in these critical finance topics.
![Security Analysis and Business Valuation on Wall Street: A Comprehensive Guide to Today's Valuation Methods](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.10.4)
Security Analysis and Business Valuation on Wall Street: A Comprehensive Guide to Today's Valuation Methods
432![Security Analysis and Business Valuation on Wall Street: A Comprehensive Guide to Today's Valuation Methods](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.10.4)
Security Analysis and Business Valuation on Wall Street: A Comprehensive Guide to Today's Valuation Methods
432eBook
Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
Related collections and offers
Overview
Two major market crashes, numerous financial and accounting scandals, growth in private equity and hedge funds, Sarbanes Oxley and related regulations, and international developments changed security analysis and business valuation substantially over the last fourteen years. These events necessitated a second edition of this modern classic, praised earlier by Barron's as a "welcome successor to Graham and Dodd" and used in the global CFA exam.
This authoritative book shows the rational, rigorous analysis is still the most successful way to evaluate securities. It picks up where Graham and Dodd's bestselling Security Analysis - for decades considered the definitive word on the subject - leaves off. Providing a practical viewpoint, Security Analysis on Wall Street shows how the values of common stock are really determined in today's marketplace. Incorporating dozens of real-world examples, and spotlighting many special analysis cases - including cash flow stocks, unusual industries and distressed securities - this comprehensive resources delivers all the answers to your questions about security analysis and corporate valuation on Wall Street.
The Second Edition of Security Analysis on Wall Street examines how mutual funds, private equity funds, hedge funds, institutional money managers, investment banks, business appraisers, and corporate acquirers perform their craft of security analysis and business valuation in today's highly charged environment. Completely updated to reflect the latest methodologies, this reliable resource represents the most comprehensive book written by someone who has actually worked as an investment banker, private equity executive, and international institutional investor.
- Shows the methodical process that practitioners use to value common stocks and operating companies and to make buy/sell decisions
- Discusses the impact of the two stock market crashes, the accounting and financial scandals, and the new regulations on the evaluation process
- Covers how Internet and computing power automate portions of the research and analytical effort
- Includes new case study examples representative of valuation issues faced daily by mutual funds, private equity funds, hedge funds, institutional investors, investment banks, business appraisers, and corporate acquirers
- Is a perfect tool for professors wishing to show their MBA students the essential tools of equity and business valuation
Security analysis and business valuation are core financial disciplines for Wall Streeters, corporate acquirers, and international investors. The Second Edition of Security Analysis on Wall Street is an important book for anyone who needs a solid grounding in these critical finance topics.
Product Details
ISBN-13: | 9780470608920 |
---|---|
Publisher: | Wiley |
Publication date: | 04/07/2010 |
Series: | Wiley Finance , #458 |
Sold by: | JOHN WILEY & SONS |
Format: | eBook |
Pages: | 432 |
File size: | 7 MB |
About the Author
Read an Excerpt
Note: The Figures and/or Tables mentioned in this sample chapter do not appear on the Web. Chapter 1
Why Analyze a Security?
This chapter covers the origin and evolution of security analysis. The herd psychology and gamesmanship that are endemic to the securities market are discussed, along with modern valuation approaches.
Some investors analyze securities to reduce the risk and chance aspects of investing. They need the confidence supplied by their own work. Others seek value where others haven't looked. They're on a treasure hunt. Still others have fiduciary reasons. Without documentation to justify an investment decision, clients can sue them for malpractice, should investment perfor-mance waver. Many investors analyze shares for the thrill of the game. They enjoy pitting their investment acumen against other professionals.
Security analysis is a field of study for the evaluation of securities in a rational way. By performing a rigorous analysis of the factors affecting a stock's price, security analysts seek to find equities that present a good value relative to other investments. In doing such work, professional analysts refute the efficient market theory, which suggests that a monkey throwing darts at the Wall Street Journal will, over time, have a performance record equal to the most experienced money manager. In fact, the proliferation of security analysis techniques as well as advances in regulation and information f low contributes to the market's transparency. Nevertheless, on a regular basis, pricing inefficiencies occur. An astute observer takes advantage of the discrepancies.
THE ORIGINS OF SECURITY ANALYSIS
Benjamin Graham and David Dodd made the business of analyzing investments into a profession. With the publication of their book, Security Analysis, in 1934, they offered investors a logical and systematic way to evaluate the many securities competing for investment dollars. Until then, methodical and reasoned analysis was in short supply on Wall Street. The markets were dominated by speculation. Stocks were frequently purchased on the basis of hype and rumor, with little business justification. Even when the company in question was a solid operation with a consistent track record, participants failed to apply quantitative measures to their purchases. General Motors was a good company whether its stock was trading at 10´ or 30´ earnings, but was it a good investment at 30´ earnings, relative to other equities or the bond market? Investors lacked the skills to answer this question. Security Analysis endeavored to provide these skills.The systematic analysis in place at the time was centered in bond-rating agencies and legal appraisals. Moody's Investors Service and Standard & Poor's began assigning credit ratings to bonds in the early 1900s. The two agencies based their ratings almost entirely on the bond's collateral protection and the issuer's historical track record, giving short shrift to qualitative indicators such as the issuer's future prospects and management depth. Dominated by railroad and utility bonds, the rating agencies' methodology lacked transferability to other industries and the equity markets. In-depth evaluations of corporate shares were found in legal appraisals, which were required for estate tax calculations, complicated reorganization plans, and contested takeover bids. Like credit ratings, these appraisals suffered from an overdependence on historical data at the expense of a careful consideration of future prospects.
Graham and Dodd suggested that certain common stocks were prudent investments, if investors took the time to analyze them properly. Many finance professors and businesspeople were surprised at this notion, thinking the two academics were brave to make such a recommendation. Only five years earlier, the stock market had suffered a terrible crash, signaling the beginning of a wrenching economic depression causing massive business failures and huge job losses.
By today's standards, the market drop of 1929 is hard to comprehend. On Monday, October 28, 1929, the Dow Jones Industrial Average fell 12.8 percent and an additional 11.7 percent on Tuesday. The two-day drop of 23 percent followed a decline that began on September 3, when the industrial average peaked at 381.17, and then declined 21.6 percent in the weeks preceding the Crash. Although the market staged modest recoveries in 1930 and 1931, the October 1929 drop presaged a gut-wrenching descent in stock prices, which wasn't complete until February 1933. Over the 3½-year period, the Dow dropped by 87 percent. A prolonged rally boosted the average 288 percent (to 194.40) by March 1937, only for stock prices to collapse 47 percent by April 1938. The index didn't reach its 1929 high until November 1954, 25 years later.
At the time of the publication of Security Analysis, equity prices had doubled from 1933's terrible bottom, but they were only 26 percent of the 1929 high. Shaken by the volatile performance of equities, the public's view of the stock market in 1934 was still a caricature of the 1920s, when common stocks were speculative. Not only was there a dearth of conservative analysis, but the market was afflicted with insider trading, unethical "story stock" pitches, and unscrupulous brokers. For two educators to promote a scholarly approach was radical indeed.
The publication of Security Analysis coincided with the formation of the Securities and Exchange Commission (SEC). Designed to prevent a repeat of the 1920s' abuses, the SEC was given broad regulatory powers over a wide range of market activities. It required corporate issuers to disclose all material information and to provide regular public earnings reports. This new information provided a major impetus to the security analysis profession. Previously, companies were cavalier about providing information to the public. Analysts, as a result, operated from half truths and incomplete data. With the regulators' charge of full disclosure for publicly traded corpora-tions, practitioners had access to more raw material than ever before. Added to the company-specific data was the storehouse of economic, mar-ket, and industry material available for study. It soon became clear that successful analysts needed to allocate their time and resources efficiently among various sources of information to produce the best results.
NO PROFIT GUARANTEE
It is important to remember that security analysis doesn't presume an absolute value for a given stock, nor does it guarantee the investor a profit. After undertaking the effort to study a security, an analyst derives a range of value, since the many variables involved reduce the element of uncertainty. After an investigation, suppose the analyst concludes that Random Corp. stock is worth $8 to $10 per share. This conclusion isn't worth much if the stock is trading at $9, but it is certainly valuable if the stock is trading at $4, far below the range, or at $20, which is far above. In such cases, the difference between the conclusion and the market prompts an investment decision, either buy or sell .If the analyst acts on his conclusion and buys Random Corp. stock at $4 per share, he has no assurance that the price will reach the $8 to $10 range. The broad market might decline without warning or Random Corp. might suffer an unexpected business setback. These variables can restrict the stock from reaching appraised value. Over time, however, the analyst believes that betting on such large differences provides superior investment results.
DAY-TO-DAY TRADING AND SECURITY ANALYSIS
For the most part, participants in the stock market behave rationally. Day-to-day trading in most stocks causes few major price changes, and large interday differentials can usually be explained by the introduction of new information. Small price discrepancies are often attributable to a few professionals having a somewhat different interpretation of the same set of facts. An investor may believe a stock's price will change because either (1) the market will conform to his opinion of the stock's value over time, or (2) the future of the underlying business will unfold as he anticipates.In the first instance, perhaps the investor's research uncovered a hidden real estate value on the company's balance sheet. The general public is unaware of this fact. As soon as others acknowledge the extra value, the stock price should increase. In the second situation, the investor may assume more corporate growth than the market assumes. Should the investor's prediction come true, the stock price should increase accordingly. Perhaps 250,000 people follow the markets full time, so there are plenty of differing views. Even small segments of investors with conflicting opinions can cause significant trading activity in a stock.
It is not unusual that professionals using similar methods of analysis come up with valuations that differ by 10 to 15 percent. These small percentages are sufficiently large to cause active trading. As discussed later, the popular valuation techniques require a certain amount of judgment in sifting information and applying numerical analysis, so reasonable people can easily derive slightly dissimilar values for the same security. As these differences become more profound, the price of a given stock becomes more volatile, and divergent valuations do battle in the marketplace. Today, this price volatility is evident in many high-tech stocks. The prospects of the underlying businesses are hard to appraise, even for experienced professionals.
HERD PSYCHOLOGY AND SECURITY ANALYSIS
Ideally, a security analyst studies the known facts of a business, considers its prospects, and prepares a careful evaluation. From this effort, a buy or sell recommendation is derived for the company's shares. This valuation model, while intrinsically sensible, understates the need to temper a rational study with due regard for the vagaries of the stock market.At any given time, the price behavior of certain individual stocks and selected market sectors is governed by forces that defy a studied analysis. Key elements influencing equity values in these instances are the emotions of the investors themselves. Market participants are human beings, after all, and are subject to the same impulses as anyone. Many emotions affect their decision-making process, but two sentiments have the most lasting impact: fear and greed. Investors in general are scared of losing money, and all are anxious to make more profits. These feelings become accentuated in the professional investor community, whose members are caught up in the treadmill of maintaining good short-term performance.
Of the two emotions, fear is by far the stronger, as evidenced by stock prices, which fall faster than they go up. Afraid of losing money, people demonstrate a classic herd psychology on hearing bad news, and rush to sell a stock before the next investor. Stocks can drop 20 to 30 percent in price on a single day, even when the new information is less than striking. In the crash of 1987, the Dow Jones Index fell 23 percent in one day on no real news. Buying frenzies, in contrast, take place over longer stretches of time, such as weeks or months. Exceptions include the shares of takeover candidates and initial public offerings.
True takeover stocks are identified by a definitive offer from a respectable bidder. Because the offers typically involve a substantial control premium, investors rush in to acquire the takeover candidate's shares at a price slightly below the offer, thus immediately boosting the company's market valve. Occurring as frequently as real bids are rumored bids. Speculators act on takeover rumors by inflating a stock's price in anticipation of a premium-priced control offer.
All these factors play a role in the next hard-to-analyze security the initial public offering (IPO). Many IPOs rise sharply in price during their first few days of trading, such as Etoys, an Internet retailer of children's toys. Etoys went public in May 1999, at $20 per share, and jumped 280 percent to $76 per share on its first day of trading. Within three weeks, the stock was selling for $85. Unlike an existing issue, an IPO has no trading history, so the underwriters setting the offering price make an educated guess as to its value. At times, this guess is conservative and the price rises accordingly. More frequently, the lead underwriters "lowball" the IPO price to ensure that the offering is fully sold, protecting themselves from their moral obligation to buy back shares from unsatisfied investors if the price were to fall steeply.
When underwriters get their publicity machines working and an IPO becomes "hot," the herd psychology infects investors, who then scramble over one another to buy in anticipation of a large price jump. At this point, a dedicated evaluation of the IPO has little merit. For a hot deal, equity buyers operate by game theory what's the other guy thinking and what's he going to pay for this issue? Others use momentum investing logic: I must buy the stock because others are buying it.
MOMENTUM INVESTORS
Extremely influential in short-term pricing moves, momentum investors predict individual stock values based on trading patterns that have happened repeatedly, either in the relevant stock or in similar situations. Thus, if they notice the beginning of a downward price trend, they sell the stock in anticipation of the pattern reaching completion. Naturally, the selling pattern is a self-fulfilling prophecy as other momentum investors are motivated by the increased activity and follow suit. Often lumped together with emotional investors by the media, momentum players attempt to take advantage of the common belief that stocks move in discernible patterns. Two of Wall Street's oldest expressions, "You can't fight the tape" and "You can't buck the trend," are evidence of the futility of injecting a security analysis bias into any price move driven by emotional and momentum factors. The herd instinct that is set off by such behavior contributed to several market crashes in the past. As a result, the federal government prohibits computerized program trading, which activates on the observance of such trends, if market indices drop too much. Right now, the "circuit breaker" kicks in with a 350-point decline in the Dow Jones Average, as it did on October 27, 1997, when the Dow Industrials Average dropped 554 points.GAME THEORY AND SECURITY ANALYSIS
The average portfolio manager does not have a controlling position in his shareholdings. Public corporations are owned by numerous equity investors, perhaps numbering in the thousands. With this diversity of ownership, the portfolio manager's return in a given stock, or in the general market, is dependent on the behavior of rival investors. If the manager holds onto a stock because he thinks its a good investment, while others are selling because they think the opposite, he loses in the short run. Future results of the company may bear out his original analysis, but in the present he looks bad. This is a dangerous situation in the investment industry, which tends to measure results quarter by quarter rather than year by year. For this reason, knowing how others think and react to events is critical to success.As the following examples illustrate, some investors bring this dynamic into the realm of game theory and attempt to influence the market's thought processes:
- False Takeover. An investor with a reputation for hostile takeovers acquires a position in a company's shares. He files a public notice or leaks his interest to the rumor mill. As other investors react to a potential takeover, they buy the stock and its price increases. In this case, the takeover artist has no intention of bidding for the company. He sells his shares into the buying activity sparked by his original interest, thus realizing a quick profit from speculative expectations. Clinton Morrison, an analyst at John Kinnard & Co., remarks, "It's called a self-fulfilling prophecy. You advertise your position and then you sell into it."
- Phony Promotion. A key market player, such as a large fund manager, indicates his strong interest in a certain industry sector, such as cable television. As other investors follow the fund manager's direction by purchasing cable TV stocks, the manager busily unloads his own holdings into the trading strength. One large fund manager was criticized in 1995 for advocating technology stocks in public, when his fund was selling them in private.
- Story Stocks. A professional investor establishes a significant position in a little-known company. Using financial publicists, stock newsletters, and aggressive brokers, he weaves a story behind the scenes about the company's unrecognized earnings potential. Although the analysis is sketchy, the growth story is entertaining. Carlton Lutts, editor of the Cabot Market Letter, summarized such game theory dynamics well. "A stock, like love, thrives on romance and dies on statistics." As the drumbeating becomes louder and louder, a cross section of investors takes notice. They buy in and the price climbs. When the professional's profit objective is reached, he bails out of his position and winds down the publicity machine. Shortly thereafter, the stock price collapses. This strategy is most effective with early-stage companies and technology firms. Their business prospects are difficult to analyze, making fanciful forecasts hard to dispute. Sometimes, just the rumor of an important investor is enough. In December 1996, Zitel Corp. shares rose from $22-7/8 per share to $72-7/8 per share on rumors that George Soros was amassing a position. When his firm publicly denied the reports on December 30, Zitel's stock price dropped 43 percent, or 31 points, in minutes.
In each of the preceding situations, the outcome of a competitive move by one investor depends on the reactions of his rivals, much like a good chess game. A seemingly irrational reaction by competitors may make a fine strategy unsuccessful. What happens if a professional feeds the takeover rumor mill and no one buys? The risk of the game is that his competitors won't act as expected. This risk decreases if he commands a visible leadership role in the market and has a strong public relations operation. Former Goldman, Sachs strategist, Leon Cooperman, for example, has the qualifications to be a top game player at his new firm, Omega Advisors. Of course, selection of the target stock must be made carefully. Competitors may see through a promoter's strategy or simply ignore the new information presented to them.
THE PREMISE OF SECURITY ANALYSIS
Practicing security analysts acknowledge the impact of human emotions, herd behavior, and game theory on stock prices, and they factor these elements into their investment conclusions. Generally, these are short-term influences, and sooner or later, most share prices reflect a rational view of underlying economic values. This rational view is far from absolute. Investment evaluation is not an exact science, and reasonable people examining the same facts are bound to have differences. Over the long haul, an analytical approach toward stock selection offers superior results, as occasional instances of price irrationality provide obvious opportunities. Maintaining a valuation discipline in emotional markets is one of the analyst's hardest challenges. Few people want to face the ridicule of going against the crowd by sticking to accepted standards, even though equity investors invariably return to normal measures of determining value after periodic infatuations with untested themes. These notions of rationality and consistency form the bedrock of the security analysis profession.A large part of a stock's price is set by expectations of its future growth in earnings. While a competent study of the past frequently provides the basis for an earnings projection, even the most talented analyst has a limited ability to predict the growth rate of a given company for years ahead. This implies that a major portion of any analyst's valuation is the product of educated guessing. As with similar vocations, many conclusions look terribly wrong with 20Ð 20 hindsight. Sometimes the actual earnings of a company come in substantially lower than forecast data, and the stock price drops accordingly. An analyst who recommended the stock has made a mistake, but level-headed investors, realizing the field's limitations, don't demand perfection. Rather, excellence can be achieved by partial success. In baseball, a .300 hitter "fails" 7 out of 10 times at bat, yet he is among the best. For security analysts, the grading process is more complicated than baseball, but a professional who is right 60 to 70 percent of the time is considered exceptional. Luck plays a role in compiling this kind of track record, but over time the importance of chance diminishes in favor of analytical skill.
Graham and Dodd summarized the analyst's requirements many years ago in Security Analysis:
To do these jobs credibly the analyst needs a wide equipment. He must understand security forms, corporate accounting, the basic elements that make for the success or failure of various kinds of businesses, the general workings not only of our total economy but also of its major segments, and finally the characteristic fluctuations of our security markets. He must be able to dig for facts, to evaluate them critically, and to apply his conclusions with good judgment and a fair amount of imagination. He must be able to resist human nature itself sufficiently to mistrust his own feelings when they are part of mass psychology. He must have courage commensurate with his competence.
SCIENTIFIC METHOD
According to serious practitioners, security analysis is a quasi-science, like medicine or economics. Its systematized knowledge has been derived from the observance of decades of stock market data and the application of common sense. The field's basic tenets have thus been tested by the use of the scientific method, which calls for carrying out three basic steps to reach a conclusion. Exhibit 1-3 summarizes the scientific method alongside its application in the securities market. Two supermarket stocks can serve as an example. Suppose the respective shares of Safeway and Kroger, two national chains, have the key financial characteristics shown in Exhibit 1Ð 4. Safeway's stock is trading at 15 times earnings. Given the similarity, what should be the P/ E multiple of Kroger's stock? All things being equal, Kroger shares should have a 15 P/ E multiple, meaning a $30 price (i. e., 15 P/ E ´ $2 EPS = $30). If the Kroger shares are trading at $25, the stock is a buy because it should eventually reach the $30 price. In practice, analysts take this $30 theoretical value as a starting point. They then study the future prospects of each company. Certain factors may justify the $25 value, despite the apparent similarities.Although the "similar stock/ similar price" supposition is easy to describe and makes sense, proving this theory and other basic tenets of security analysis in a scientific manner is difficult. In a true science such as physics, observations are repeated in a laboratory environment to verify their accuracy (e. g., a ball is dropped in a vacuum 100 times to confirm the pull of gravity). Security analysis theories, in contrast, are subject to the vagaries of the stock market, which has far too many uncontrolled variables to provide the appropriate conditions for a truly scientific test.
Even the "similar supermarket" example is hard to prove scientifically. Finding two publicly traded supermarket chains with identical financial results is impossible, and most chains have significant differences in market conditions, business operations, and managerial styles. Even with two firms that resemble each other in financial and business attributes, the scientific method is problematic. Much of a company's value is represented by its future potential to generate earnings, as opposed to its present condition and past history. Determining a consensus view of a company's future is accurately described as educated guesswork, rather than scientific deduction.
Despite the drawback of injecting scientific methods into the stock market, investors and finance professors keep trying. Certain of their theories have been proven academically, while others have a commonsense appeal that heightens their acceptance. For example, most professionals consider the next two hypotheses to be valid:
TrueCompanies with low interest coverage ratios go bankrupt more frequently than those with high interest coverage ratios.
TrueCompanies with high P/ E ratios have better growth records than those with low P/ E ratios.
A combination of academic proofs, commonsense ideas, and intuitive beliefs supports these and other notions of security analysis. The systematic application of these concepts has evolved into a rational discipline, which one studies like other quasi-scientific fields such as medicine, economics, or sociology.
SECURITY ANALYSIS TECHNIQUES
As discussed earlier, emotions and trend followers influence the values of companies, but an underlying discipline governs share prices. Over time, this discipline, which is founded in security analysis, tends to correct stock market excesses. Thus, if a "hot" stock such as Ionica Group, the telephone service provider, goes public at a valuation of $900 million although the company has few revenues and no earnings, inevitably the stock price come back to earth, as investors lose their fervor and evaluate the business in terms of its risk-adjusted potential. Elder Beerman was a good company but a speculative stock in 1998, when its initial public offering sold at $22 per share. One year later, it was still a good firm but a better equity value at $7 per share, which was more in line with the company's future prospects. Frequently, the life cycle of pricing excesses begins with a security being bid up to an irrational price by anticipation investors and momentum players, who are then battled by scientifically inclined investors. The latter argue for a realistic valuation based on time-honored value anchors, derived from the four valuation approaches set forth in Exhibit 1-5.BASIC VALUATION APPROACHES
Of the four principal approaches to security analysis, the first three intrinsic value, relative value, and acquisition value lend themselves to the scientific method. All three approaches forecast stock prices on the basis of historical economic, capital market, industry, and corporate statistics, which are then used to establish predictive trends for corporate operating results and share prices. The principal decision variables are earnings projections and comparable company values.Under the intrinsic value method, future dividends are derived from earnings forecasts and then discounted to the present, thereby establishing a present value for the stock. If the stock is trading at a price lower than this calculation, it is a "buy"; if the market price is higher then the intrinsic value, the stock is a "sell."
For most businesspeople, the intrinsic value approach (discounted cash flow) is their first introduction to security analysis since it is the approach emphasized by business schools and most valuation books. The intrinsic value concept makes economic sense and is theoretically sound, but in the real world its applicability is limited. No professional investor places much weight on projections extending past two or three years, and dividend discount rates are hard to pinpoint. Furthermore, even devoted advocates of this technique are hesitant to promote its use for analyses involving (1) growth companies that don't pay dividends; (2) established companies that are consistent money losers; and (3) complex companies that are liquidation or restructuring candidates.
The relative value approach considers intrinsic values too difficult to determine, owing to the arguments over hard-to-make projections and controversial discount rates. Instead, various valuation parameters of a given publicly traded stock, such as its P/ E, price/ book and price/ sales ratios, are compared with the stocks of companies in the same industry. If the value ratio of the stock being evaluated is substantially lower than its peer group, and if there is no justifiable reason for the discrepancy, the relative value approach views the stock as a buy. Stock valuations are therefore made in a manner similar to many other asset appraisals. In real estate, the value of a house is established by comparing the target house to nearby houses that have sold recently. The relative value approach is attractive to analysts because it takes most of the guesswork out of relying on future projections and discount rates. Its weaknesses stem from three factors. First, few publicly traded companies have exact comparables, leaving a lot of room for subjectivity in the appraisal. Second, investors are in the market to make money in absolute terms, whereas the relative value method focuses on relativeperformance. Suppose an entire industry is the subject of speculative interest, and its share prices crash when expected operating results fail to materialize. The relative value picks fall 20 percent, but the industry's decline is 30 percent. The successful relative value investor is losing less money than other investors committed to the industry, but he's still losing money. Third, relative value places a heavy emphasis on contrasting the historical operating results of similar businesses, when future prospects are critical. "Driving by looking in the rearview mirror" is a perilous investment tactic.
The acquisition value approach suggests that a publicly traded stock should never trade at less than 70 to 75 percent of its worth to a sophisticated and well-financed third party. The analyst evaluates industry acquisition prices compared with the relevant company, and he tests its feasibility as a leveraged buyout or liquidation candidate. If the stock trades at less than 70 percent of its acquisition value, it is probably a buy. By relying on "comparable company" data, the acquisition value approach suffers from the same weaknesses as the relative value method, with the further proviso that comparable public mergers and acquisitions (M& A) deals are rare in many situations. The leveraged buyout (LBO) and liquidation techniques are dependable, but they apply only to a select group of manufacturing and service industries.
The fourth approach, technical analysis, has a wide following but it lacks the broad institutional acceptance of the first three approaches. Often referred to as Wall Street's version of "voodoo economics," technical analysis is concerned solely with the price and volume trading patterns of a stock. This valuation technique does not consider a company's operating history, its earning potential, or other microeconomic factors as relevant to the valuation process. Rather, the technician believes that trading patterns reflect all logical and emotional forces affecting a stock price. An analysis of these patterns, usually in conjunction with industry and market trading indicators, provides predictive trends that enable the technician to forecast stock prices.
Suppose a stock price fluctuates in a small range over a period of months, after it has made a big upward move. This behavior is called a "consolidation" pattern because the stock is consolidating its previous gain. If the stock price breaks through the top end of this range, this is a buy signal, because technical theory says it is poised for another run-up, after which the price will stabilize again. Numerous investors and academics have tested this and other technical theories and concluded that there is no evidence to support these claims. Nevertheless, Wall Street is one place where perception easily becomes reality. Since thousands of investors believe in technical analysis, market participants are sensitive to technical opinions in evaluating stock prices. Reports of security analysts often include charts outlining the trading activity of the stock in question, and I have observed that most professional money managers use such charts as one ingredient in buy/ sell decisions.
OTHER VALUATION APPROACHES
Technical analysis represents a systemized body of knowledge and numerous books review its procedures. Nevertheless, it straddles the line between rational inquiry and educated speculation. Two common stock-picking approaches that fall into the speculative category are "momentum investing" and "market anticipation".Both approaches require a sophisticated knowledge of the market's inner workings and an experienced hand in equity trading. They are best employed by professional traders and stock promoters, who participate in the securities markets on a full-time basis and are thus in a position to react quickly to the sharp price movements endemic to these investment strategies.
Conventional security analysis is sometimes characterized as the art of "buying low, and selling high." Momentum investing, in contrast, is frequently referred to as "buying high, and selling higher," because its adherents look to buy shares which are rising quickly in price. Momentum investors pay close attention to trading trends and give short shrift to the underlying company's sales or earnings; and thus, they represent a subset of the technical community. Having played a major role in many share price run-ups, they are a key source of market volatility, often through automated program trading. Such trading is initiated by a series of signals such as an upward 90-day moving price average, a large positive net cash flow into a stock, or a big jump in trading volume.
The market anticipation approach acknowledges that most stocks are fairly valued by security analysts using the intrinsic value, relative value, and acquisition value methods. At some future point, however, the consensus view on any given stock's earnings power or business risk changes, providing impetus to a higher (or lower) stock price. A typical pronouncement from a market anticipation analyst might be, "The Starbucks shares will increase in value as the market realizes the reduced volatility of the company's earning stream." Such conclusions carry little analytical weight and are most effective when repeated loudly and continually, thus echoing "the squeaky wheel gets the grease" tactic used by promoters in any business. Despite the speculative nature of this approach, even the most rigorous disciples of security analysis are cognizant of the sometimes relentless drumbeating of "market anticipation" investors, who are trying desperately to influence the consensus decision on a stock's value. Their influence has been strong in certain cases and has been observed in the rise and fall of numerous "high flyer" stocks, the peak prices of which defy rational explanation. How else does one explain the rocketlike rise of Amazon. com from $40 per share to $180 in nine months in 1998, the precipitous drop of Dispatch Management from $30 to $3 in the first four months of 1999, or the lightning round trip of Books-a-Million, which rose from $2½ in August 1998 to $46 in October 1998, and then declined to $7 by June 1999?
SUMMARY
Security analysis is a field of study that maintains stocks can be valued in a methodical and sensible way. While acknowledging the stock market's periodic spasms of emotion and irrationality, it suggests that, sooner or later, the price of a security approaches its economic value, as determined by a reasonable person with the requisite background in business operations, economics, finance, and accounting. This value cannot be pinpointed definitively because security analysis is not a science. Its results depend on the surrounding environment, which constantly changes with new information regarding developments of the business in question. As a quasi-science, security analysis has its limitations yet it provides a reasonable framework for comparing and contrasting investment opportunities. As a result, security analysis is widely accepted in the institutional community and it is the primary means for justifying investment decisions.Despite its lack of exactitude, security analysis provides careful investors with sufficient tools to recognize pricing anomalies in the market, and then to benefit from them by making the appropriate buy/ sell decision. These evaluation tools provide the pricing anchors from which a rational decision can be reached, and they include the intrinsic value, relative value, and acquisition value methods. Technical analysis, a popular stock-picking technique based on trading patterns, is often used as a complement to these approaches.
Because so much of a typical share's value is based on hard-to-predict future results, the stock market is fertile ground for unscrupulous promoters who exaggerate the prospects of investments in which they have a financial interest. The rumor mongering and tub thumping of these players sometimes has the desired effect of inflating the price of a stock. This impact is transitory, and share prices generally return to a modest valuation range in which reasonable people achieve a consensus. Within this band, however, investors still face uncertainty, and so investment selection remains a challenging activity.
QUESTIONS AND SHORT PROBLEMS
1. How does the principal objective of security analysis (i. e., finding su-perior investment values) contradict the "efficient market" theory?2. How can a solid company with a strong operating record be a poor investment choice when compared to competing alternatives, such as other stocks or bonds? Why might companies with less stellar records represent better investment choices?
3. A security analyst determines that Incel Corp. stock is worth $20 per share. The current market price is now $15 per share, indicating a likely "buy" decision. Is the analyst guaranteed an eventual $5 per share profit? Why or why not?
4. Name the two emotions that have the most lasting impact on stock prices.
5. Why do underwriters like to price initial public offerings below the value dictated by their supply-and-demand estimates?
6. Which of the following expressions summarizes momentum trading: a. Buy high, sell low. b. You can't buck the trend. c. You have to do your homework. d. Stocks thrive on love and die on statistics.
7. The "story stock" technique is often used by promoters for high-tech issues. Why are high-tech companies suitable for this technique?
8. Which statements are relevant to security analysis? Circle all that apply: a. Emotions are short-to-intermediate term influences on stock prices. b. Over the long-term, security analysis offers above-average investment returns. c. Security analysis is a science, like chemistry or physics. d. Security analysis depends on rational behavior over the long-term.
9. Why is security analysis likened to "educated guesswork," even by its practitioners?
10. All things being equal, which of the two chemical stocks shown below should trade at the higher P/ E multiple?
11. List the four principal approaches to security analysis.
12. Which of the four approaches is almost totally dependent on the analyst's assessment of a company's future earnings potential?13. Why do "real life" practitioners tend to favor the "relative value" approach?
14. Is "momentum investing" similar to technical analysis?
Adopt-a-Company Exercises
A. To learn security analysis concepts in a practical way, each student (or a group of students) selects a company to follow during the semester. To ease the learning process, students select companies that are relatively easy to understand. The best companies for this purpose are companies that:
- Have a five-year history of sales and positive earnings;
- Offer a low-tech product or service;
- Have a debt to equity ratio of 1;1 or less;
- Are engaged in one industry only; and
- Have completed an IPO within the last five years.
B. Students have two weeks to identify their company for adoption. The instructor will approve the selections that meet the criteria, or provide alternative companies.
Table of Contents
Preface xiiiWhat Is Security Analysis? xiv
Recent Trends xv
Why Study Security Analysis and Business Valuation? xvii
Overview of the Contents xviii
What’s New in the Second Edition xviii
PART ONE The Investing Environment 1
CHAPTER 1 Why Analyze a Security? 3
The Origins of Security Analysis 3
No Profit Guarantee 5
Day-to-Day Trading and Security Analysis 6
Herd Psychology and Security Analysis 6
Momentum Investors 7
Game Theory and Security Analysis 8
The Premise of Security Analysis 9
Scientific Method 10
Security Analysis Techniques 12
Basic Valuation Approaches 12
Other Valuation Approaches 14
Summary 16
CHAPTER 2 Who’s Practicing Security Analysis and Business Valuation? 17
Securities Firms and Their Analysts 18
Major Institutional Investors 20
A Dying Art? 21
Index Funds and Exchange-Traded Funds 24
Small Money Management Firms 25
Rating Agencies 26
Individual Investors: A Special Category 26
Business Valuation 28
Summary 28
CHAPTER 3 Seeking a Level Playing Field 29
Brief History of Securities Regulation 30
The Chief Regulator: The Securities and Exchange Commission 32
Sales and Trading Practices 34
Margin Regulation 37
The Life Cycle of a New Security Issue 37
Summary 49
CHAPTER 4 Other Sources of Information 51
The Business Media 51
The Free Internet 53
The Fee-for-Service Internet 53
Trade Associations, Consulting Firms, Government Publications, and Financial Organizations 54
Credit Rating Agencies 54
Securities Firm Research 55
Newswires 56
Independent Expert Services 56
Summary 57
PART TWO Performing the Analysis and Writing the Research Report 59
CHAPTER 5 Starting the Analysis 61
The Security Analysis Process 62
Model Research Report 63
The Analyst’s Responsibility 64
The Cascade of Projections 66
Selecting Stocks for Study: Top-Down versus Bottom-Up 67
Limited Time and Resources 68
The Margin of Safety 69
Summary 70
CHAPTER 6 Industry Analysis 73
Background 73
Organizing an Industry Analysis 75
Industry Classification 75
External Factors 81
Demand Analysis 86
Supply Analysis in the Industry Study 92
Profitability, Pricing, and the Industry Study 94
International Competition and Markets 95
Summary 98
CHAPTER 7 Company-Specific Analysis 99
Systematic Approach of a Business Analysis 101
Overview and Business Description 106
Products and Markets Section 106
Production and Distribution 110
Competition 111
Other Topics Included in the Business Review114
Summary 117
CHAPTER 8 Financial Statement Analysis of an Established Business 119
Beginning the Investigation 120
The Raw Materials of an Analysis 121
Evolution of the Approach to Financial Statements 122
Illustration of the Basic Approach 123
Review of Neiman Marcus Financial Analysis 135
Summary 137
CHAPTER 9 The Limitations of Accounting Data 139
Basic Accounting Issues 141
Global Issues 141
Company-Specific Accounting Issues 145
The Fundamental Objective of Public Companies 149
Case Study: Stability Corporation 150
Summary 163
CHAPTER 10 Financial Analysis and Company Classification 165
Company Classifications 166
The Mature Company 166
The Growth Company 167
The Cyclical Company 169
The Declining Company 175
The Turnaround 175
The Pioneer 175
Financial Games 176
Extra Shares Outstanding? 180
Summary 180
CHAPTER 11 Financial Projection Pointers 181
The Cascade of Projections 182
The Typical Financial Projection 182
Alternate Means of Forecasting 183
Critiquing the Huntsman Chemical Projection 185
Preparing Projections 186
Cyclical Company Forecast 189
Hockey Stick Phenomenon 190
Summary 192
PART THREE Valuation and the Investment Decision 193
CHAPTER 12 Valuation Methodologies 195
Assessing Each Methodology 196
Applying Multiple Methodologies 197
Summary 198
CHAPTER 13 Intrinsic Value and Discounted Cash Flow 199
Issues in Applying Discounted Cash Flow 200
Discounted Cash Flow versus Relative Value 203
Discounted Cash Flow and the P/E Ratio 203
The Discounted Cash Flow Valuation Process 205
Summary 208
CHAPTER 14 Discounted Cash Flow: Choosing the Right Discount Rate 209
Beta 211
The Buildup Method for the Equity Rate of Return 212
Special Cases 213
Summary 215
CHAPTER 15 The Relative Value Approach 217
Real Estate Analogy 218
What’s the Right P/E Ratio? 218
Case Study: Temporary Staffing Services 219
Valuing an Initial Public Offering 222
Balance Sheet Items and Relative Value 223
How High Is Up? 223
Summary 223
CHAPTER 16 Marginal Performers 225
Defining the Problem Company 226
Small Companies and Relative Value 232
Summary 232
CHAPTER 17 The Mergers and Acquisitions Market, Security Analysis, and Valuation 233
Understanding Leveraged Buyouts 235
LBO Mechanics 236
Case Study: Keane, Inc. 237
How Much Can the PE Firm Pay? 237
LBO Valuation and the Security Analysis of a Publicly Traded Company 239
Strategic Takeover Values 240
Summary 241
CHAPTER 18 Sum-of-the-Parts Analysis 243
Background 243
Taxes Favor Spin-Offs versus Cash Sales 244
Sample Sum-of-the-Parts Analysis 245
Business Division Valuation 245
Nonoperating Corporate Assets and Liabilities 250
Unlocking Sum-of-the-Parts Values 250
Summary 251
CHAPTER 19 The Investment Recommendation 253
Summary Top-Down Analysis 255
Discounted Cash Flow Valuation 257
Relative Value/Sum-of-the-Parts Valuation Approach 259
Acquisition Value 261
Leveraged Buyout Method 262
Investment Recommendation 265
Summary 266
PART FOUR Special Cases 267
CHAPTER 20 Private Equity 269
Industry Segmentation and Size 269
Fee Structure 270
Private Equity Does Not Beat the S&P 500 271
Private Equity Funds and Information Collection 271
Private Equity Changes to the Public Company
Valuation Methodology 272
Liquidity and Control Adjustments 273
Summary 277
CHAPTER 21 Natural Resource Companies 279
General Methodology 279
The Financial Reporting of Natural Resource Companies 281
Case Study: Encore Acquisition Company 284
Mining Companies 290
Summary 292
CHAPTER 22 Financial Industry Stocks 293
Product Lines 295
The Nature of Financial Assets 296
Two Sets of Skills 298
Lending 298
Large Commercial Banks 304
Summary 307
CHAPTER 23 Insurance Companies 309
General Background 309
Principal Functions of an Insurance Company 311
Insurance Company Regulation 312
Financial Statement Analysis: Property and Casualty Company 313
Financial Statement Ratios 317
Life Insurance Companies 317
Summary 319
CHAPTER 24 Highly Speculative Stocks 321
Background 321
Discounted Cash Flow 323
Case Study: Ballard Power Systems 324
Venture Capital Markups and IPOs 328
Historical Perspective 329
Security Analysis, Technology Stocks, and Portfolio 329
Summary 330
CHAPTER 25 Distressed Securities and Turnarounds 331
Investment Opportunities 332
Screening Technique 333
Recognize the Options of an Unsuccessful Turnaround 334
Financial Analysis of a Company with Leverage Problems 335
The Investment Decision 338
Evaluating Turnarounds 339
Liquidations 340
Summary 342
CHAPTER 26 International Stocks 343
The Role of Security Analysis 343
American Depositary Receipts 345
Developed Country Markets 346
Relative Value Multiples 349
Summary 350
CHAPTER 27 The Emerging Markets 351
Emerging Markets and Security Analysis 353
Stock Pricing Guidelines 357
Financial Projections 360
Emerging Market Equity Discount Rate 361
Relative Value in the Emerging Markets 364
Summary 366
PART FIVE In Conclusion 367
CHAPTER 28 Asset Booms and Busts 369
The 2008 Crash: Contributing Causes 369
Collapse of the U.S. Housing Bubble 370
Failure of the Referees 371
The Certainty of Another Crash 375
How Might Security Analysis and Business Valuation Change? 377
Summary 378
CHAPTER 29 Closing Thoughts 379
Notes 383
About the Author 385
Index 387