Skip to main content
Business LibreTexts

13.4: Behavioral Finance and Investment Strategies

  • Page ID
    487
    • Anonymous
    • LibreTexts

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
    Learning Objectives
    1. Identify the factors that make successful market timing difficult.
    2. Explain how technical analysis is used as an investment strategy.
    3. Identify the factors that encourage investor fraud in an asset bubble.

    You can apply your knowledge of findings from the field of behavioral finance in a number of ways. First, you can be alert to and counteract your natural tendencies toward investor bias and framing. For example, you can avoid availability bias by gathering news from different sources and by keeping the news in historical perspective.

    A long-term viewpoint can also help you avoid anchoring or assuming that current performance indicates future performance. At the same time, keep in mind that current market trends are not the same as the past trends they may resemble. For example, factors leading to stock market crashes include elements unique to each.

    Ambiguity aversion can be useful if your uncertainty is caused by a lack of information, as it can let you know when you need to do more homework. On the other hand, aversion to ambiguity can blind you to promising opportunities.

    Loss aversion, like any fear, is useful when it keeps you from taking too much risk, but not when it keeps you from profitable opportunities. Using knowledge to best assess the scope and probability of loss is a way to see the loss in context. Likewise, segregating investments by their goals, risks, liquidity, and time horizons may be useful for, say, encouraging you to save for retirement or some other goal.

    Your best protection against your own behavioral impulses, however, is to have a plan based on an objective analysis of goals, risk tolerance, and constraints, taking your entire portfolio into account. Review your plan at least once a year as circumstances and asset values may have changed. Having a plan in place helps you counteract investor biases.

    Following your investment policy or plan, you determine the capital and asset allocations that can produce your desired return objective and risk tolerance within your defined constraints. Your asset allocation should provide diversification, a good idea whatever your investment strategy is.

    Market Timing and Technical Analysis

    Asset bubbles and market crashes are largely a matter of timing. If you could anticipate a bubble and invest just before it began and divest just before it burst, you would get maximum return. That sort of precise timing, however, is nearly impossible to achieve. To time events precisely, you would constantly have to watch for new information, and even then, the information from different sources may be contradictory, or there may be information available to others that you do not have. Taken together, your chances of profitably timing a bubble or crash are fairly slim.

    Market timing was defined in Chapter 12 as an asset allocation strategy. Because of the difficulty of predicting asset bubbles and crashes, however, and because of the biases in financial behavior, individual investors typically develop a “buy-and-hold” strategy. You invest in a diversified portfolio that reflects your return objectives and risk tolerance, and you hold on to it. You review the asset allocation periodically so it remains in line with your return and risk preferences or as your constraints shift. You rely on your plan to make progress toward your investment goals and to resist the temptations that are the subjects of the field of behavioral finance.

    As you read in Chapter 12, a passive investment strategy ignores security selection by using index funds for asset classes. An active strategy, in contrast, involves selecting securities with a view to market timing in the selection of securities and asset allocation.

    An investment strategy based on the idea that timing is everything is called technical analysis. Technical analysis involves analyzing securities in terms of their history, expressed, for example, in the form of charts of market data such as price and volume. Technical analysts are sometimes referred to as chartists. Chartists do not consider the intrinsic value of a security—a concern of fundamental analysis. Instead, using charts of past price changes and returns, technical analysts try to predict a security’s future market movement.

    Candlestick charting, with its dozens of symbols, is used as a way to “see” market timing trends. It is believed to have been invented by an eighteenth-century Japanese rice trader named Homma Munehisa.Gregory L. Morris, Candlestick Charting Explained: Timeless Techniques for Trading Stocks and Futures (New York: McGraw-Hill, 2006). Although charting and technical analysis has its proponents, fundamental analysis of value remains essential to investment strategy, along with analyzing information about the economy, industry, and specific asset.

    13.4.1.jpg
    Figure 13.4.1 : A Candlestick Chart Used in Technical AnalysisCourtesy of StockCharts.com, http://stockcharts.com.

    Technical analysts use charts like this one, showing the NASDAQ’s performance for April and May 2009. Each symbol annotating the graph, such as the shaded and clear “candlesticks,” represents financial data. Chartists interpret the patterns they see on these charts as indicators of future price moves and returns as driven by traders’ financial behavior.

    Financial Fraud

    Fraud is certainly not an investment strategy, but bubbles attract fraudulent schemers as well as investors and speculators. A loss of market efficiency and signs of greater investor irrationality attract con men to the markets. It is easier to convince a “mark” of the credibility and viability of a fraudulent scheme when there is general prosperity, rising asset values, and lower perceived risks.

    During the post–World War I expansion and stock bubble of the 1920s, for example, Charles Ponzi created the first Ponzi scheme, a variation of the classic pyramid scheme. The pyramid scheme creates “returns” from new members’ deposits rather than from real earnings in the market. The originator gets a number of people to invest, each of whom recruits more, and so on. The money from each group of investors, however, rather than being invested, is used to pay “returns” to the previous group of investors. The scheme is uncovered when there are not enough “returns” to go around. Thus, the originator and early investors may get rich, while later investors lose all their money.

    During the prosperity of the 1980s, 1990s, and 2000s, the American financier Bernard Madoff notoriously ran a variation of the Ponzi scheme. His fraud, costing investors around the world billions of dollars, lasted through several stock bubbles and a real estate bubble before being exposed in 2008.

    Fraud can be perpetrated at the corporate level as well. Enron Corporation was an innovator in developing markets for energy commodities such as oil, natural gas, and electricity. Its image was of a model corporation that encouraged bright thinkers to go “outside the box.” Unfortunately, that ethos of innovation took a wrong turn when several of its corporate officers conspired to hide the company’s investment risks from financing complicated subsidiaries that existed “off balance sheet.” In the fall of 2001, with investor confidence shaken by the dotcom bust and the post-9/11 deepening of the recession, the fraud began to unravel. By the time the company declared bankruptcy, its stock value was less than one dollar per share, and its major corporate officers were under indictment (and later convicted) for fraud.

    How can you avoid a fraud? Unfortunately, there are no foolproof rules. You can be alert to the investment advisor who pushes a particular investment (see Chapter 14). You can do your own research and gather as much independent information on the investment as possible. The best advice, however, may come in the adage, “If it seems too good to be true, it probably is.” The capital markets are full of buyers and sellers of capital who are serious traders. The chances are extremely slim that any one of them has discovered a market inefficiency undiscoverable by others and exploitable only by him or her. There is too much at stake.

    Summary

    • Market timing, or the ability to predict bubbles and crashes, is nearly impossible because of discrepancies in the
      • availability of information,
      • access to information,
      • interpretation of information.
    • Technical analysis is a strategy based on market timing and investor sentiment.
    • Asset bubbles are often accompanied by an increase in investor fraud due to the
      • loss of market efficiency,
      • increase in investor “irrationality,”
      • increase in wealth and prosperity.
    • One form of financial fraud relating to market bubbles is the Ponzi scheme or pyramid scheme.

    Exercises

    1. Consider exploring the world of chartists at http://www.investopedia.com/articles/technical/02/121702.asp and consider trying your hand at this arcane art. You and our classmates might begin by learning how to read the charts that technical analysts use to predict price changes in the markets. For a detailed glossary of chart symbols and patterns, see http://www.trending123.com/patterns/index.html. What do you see as the advantages and disadvantages of technical analysis compared to fundamental analysis?
    2. What is a pyramid scheme exactly? Find out at http://www.investopedia.com/articles/04/042104.asp. Have you ever participated in or invested in such a scheme? Have you ever been a victim of one? Record your answers in My Notes or your personal finance journal. According to the Investopedia article, why can it be difficult to detect a pyramid scheme? What are some possible tip-offs to this kind of fraud? Why are pyramid schemes unsustainable? Who are the victims? Draw a diagram illustrating the dynamics of pyramid schemes.
    3. How are investment clubs different from pyramid schemes? Read about investment clubs at http://www.ehow.com/how-does_4566462_investment-club-work.html. What does the U.S. Securities Exchange Commission have to say about investment clubs at http://www.sec.gov/investor/pubs/invclub.htm? Investigate further online. Would you consider joining or starting an investment club? Why, or why not? What do your classmates think about this?
    4. Survey the Web site of a 2009 60 Minutes CBS broadcast on the Madoff affair, which includes articles, video, and links at www.cbsnews.com/stories/2009/02/27/60minutes/main4833667.shtml. According to this site, who discovered the Madoff fraud and how? Who were Madoff’s victims? Visit the support group Web site created for the victims at http://berniemadoffponzisupportgroup.blogspot.com/. In the CBS video, how did Madoff defend himself? Read a Wall Street Journal article at http://online.wsj.com/article/SB123111743915052731.html, explaining how Madoff’s Ponzi scheme was able to succeed. How did investor biases contribute to this success? How did biases in regulatory oversight contribute to the fraud? Sample some of the videos of the congressional hearings on the Madoff scandal at video.google.com/videosearch?...1&ie=UTF-8&ei= vSk1Sq2iOsGHtgfduMC8CQ&sa=X&oi= video_result_group&resnum=7&ct=title#. Why did representatives and senators focus their criticism on the Securities and Exchange Commission?

    This page titled 13.4: Behavioral Finance and Investment Strategies is shared under a CC BY-NC-SA 3.0 license and was authored, remixed, and/or curated by Anonymous via source content that was edited to the style and standards of the LibreTexts platform.