35
Chaun-Ju Wang, November 1, 2007 1 / 35 Pricing Vulnerable European Options When the Option’s Payoff Can Increase the Risk of Financial Distress Peter Klein, Michael Inglis Journal of Banking & Finance presenter: Chuan-Ju Wang

Pricing Vulnerable European Options

Embed Size (px)

DESCRIPTION

Pricing vulnerable European options when the option’s payoff can increase the risk of financial distress Peter Klein, Michael Inglis Journal of Banking & Finance

Citation preview

Page 1: Pricing Vulnerable European Options

Chaun-Ju Wang, November 1, 2007 1 / 35

Pricing Vulnerable European Options When the

Option’s Payoff Can Increase the Risk of Financial

Distress

Peter Klein, Michael InglisJournal of Banking & Finance

presenter: Chuan-Ju Wang

Page 2: Pricing Vulnerable European Options

Outline

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 2 / 35

● Introduction

● The model

● Valuation equations

● Valuation methods

● Numerical examples

● Conclusion

Page 3: Pricing Vulnerable European Options

Introduction

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 3 / 35

Page 4: Pricing Vulnerable European Options

Vulnerable options

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 4 / 35

● Many financial institutions actively trading derivativecontract with their corporate clients as well as with otherfinancial institutions in the over-the-counter (OTC)markets.

● No exchange or cleaning house to ensure that both partiesto a contract honor their obligations.

● The holder’s of these contracts are vulnerable tocounter-party credit risk.

Page 5: Pricing Vulnerable European Options

Related works

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 5 / 35

● Most of the literature on vulnerable options assumes thatfinancial distress occurs when the value of writer’s assetsdrop below the value of its other liabilities.

● This assumption ignores the potential liability created bythe option itself.

Page 6: Pricing Vulnerable European Options

Related works (cont.)

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 6 / 35

● Johnson and Stulz (1987)

✦ Allowing the occurrence of financial distress to dependon the value of the option that has been written.

✦ In the event of financial distress, they assume that theoption holder receives all the assets of the optionwriter.

Page 7: Pricing Vulnerable European Options

Related works (cont.)

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 7 / 35

● Klein (1996)

✦ Default boundary does not depend on the value of theoption itself (fixed default boundary).

✦ Allowing for the presence of other liabilities in thecapital structure of the option writer.

● Rich (1996)

✦ Allowing the default boundary to be stochastic.

✦ But not explicitly connect to the stochastic boundaryto the value of the option that has been written.

Page 8: Pricing Vulnerable European Options

The idea of this paper

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 8 / 35

● Allowing for the presence of other liabilities in the capitalstructure of the option writer while recognizing the growthin the value of the option itself may also cause financialdistress.

● Default barrier can be stochastic.

✦ A fixed component represents the other liabilities ofthe option writer.

✦ A stochastic component measures the potential payoffon the option itself.

Page 9: Pricing Vulnerable European Options

The model

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 9 / 35

Page 10: Pricing Vulnerable European Options

Assumption

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 10 / 35

● Summarizing the assumptions underlying the Klein (1996)model after appropriate adjustments to incorporate thevariable default boundary (VDB) condition.

Page 11: Pricing Vulnerable European Options

Assumption (cont.)

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 11 / 35

Page 12: Pricing Vulnerable European Options

Assumption (cont.)

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 12 / 35

Page 13: Pricing Vulnerable European Options

Valuation equations

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 13 / 35

Page 14: Pricing Vulnerable European Options

Johnson and Stulz (1987)

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 14 / 35

● Johnson and Stulz (1987) pricing equation of vulnerableEuropean calls can be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ ST −K

VT ST ≥ K,VT < ST −K

0 otherwise

}]

. (3)

Page 15: Pricing Vulnerable European Options

Klein (1996)

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 15 / 35

● Klein (1996) pricing equation of vulnerable European callscan be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ D∗

(1− α)VTST−K

D∗ST ≥ K,VT < D

0 otherwise

}]

. (4)

Page 16: Pricing Vulnerable European Options

Model of this paper

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 16 / 35

● The pricing equation for vulnerable European calls in thispaper’s framework can be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ D∗ + ST −K

(1− α)VTST−K

D∗+ST−KST ≥ K,VT < D

∗ + ST −K

0 otherwise

}]

. (5)

Page 17: Pricing Vulnerable European Options

Valuation methods

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 17 / 35

Page 18: Pricing Vulnerable European Options

Numerical method

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 18 / 35

● Three-dimension binomial tree

● Orthogonal the two process to ensure zero correlationbetween the two state variables.

Page 19: Pricing Vulnerable European Options

Approximate analytical solution

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 19 / 35

● Performing the standard log transformation and thenemploying a first order Taylor series approximation tolinearize the boundary conditions.

● The denominator in the second term of Eq.(5) must also belinearized through a first order Taylor series approximation.

● A standard rotation as outlined in Abramowitz and Stegun(1972) is used to eliminate S from the boundary conditionfor V , which enables us to rewrite the approximation interms of the cumulative bivariate normal distribution asfollows:

c=SN2(a1,b1,δ)−Ke−r(T−t)N2(a2,b2,δ)+

(1−α)SV exp

((

rσ2V

2 +(ρ−m)σSσV

)

(T−t)+m2

)

D∗−K+m1N2(a3,b3,−δ)−

(1−α)KV exp(m2)

D∗−K+m1N2(a4,b4,−δ). (6)

Page 20: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 20 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ = K, the valuation equation does not depend onthe point of expansion p.

■ The barrier depends only upon ln(ST ) which, afterlog transformation is already linear.

Page 21: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 21 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ > K, the true default barrier is the convex lineshow in Fig. 1.

■ Since this line corresponds to the probability thatfinancial distress will occur.

■ An approximation will underestimate the effect ofcredit risk on the value of the vulnerable calloption.

■ The optimal value for the expansion point (p) willbe the value that minimizes the value ofvulnerable option.

Page 22: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 22 / 35

● Fig. 1: Integration region for the vulnerable European callwhen D∗ > K.

Page 23: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 23 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ < K, the correct default barrier is concave.

■ An approximation based on a tangent willunderestimate the value of the vulnerable calloption as shown in Fig. 2.

■ The optimal value for p will be the value thatmaximized the value of the vulnerable option.

Page 24: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 24 / 35

● Fig. 2: Integration region for the vulnerable European callwhen D∗ < K.

Page 25: Pricing Vulnerable European Options

Numerical examples

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 25 / 35

Page 26: Pricing Vulnerable European Options

Numerical examples

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 26 / 35

● Table 1: A comparison of FDB vs VDB

Page 27: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 27 / 35

● Fig. 3: Vulnerable call values as a function of option’smoneyness: a comparison of the FDB and VDB models(base case)

Page 28: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 28 / 35

● Fig. 4: Vulnerable call values as a function of option’smoneyness: a comparison of the FDB and VDB models(base case)

Page 29: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 29 / 35

● Fig. 5: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(base case)

Page 30: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 30 / 35

● Fig. 6: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(base case)

Page 31: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 31 / 35

● Fig. 7: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(out-of-the-money option)

Page 32: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 32 / 35

● Fig. 8: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(in-the-money option)

Page 33: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 33 / 35

● Fig. 9: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(ρ = 0.5)

Page 34: Pricing Vulnerable European Options

Conclusion

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

❖ Conclusion

Chaun-Ju Wang, November 1, 2007 34 / 35

Page 35: Pricing Vulnerable European Options

Conclusion

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

❖ Conclusion

Chaun-Ju Wang, November 1, 2007 35 / 35

● This paper extends the vulnerable European option pricingresults of Johnson and Stulz (1987) and Klein (1996).

✦ Allowing for other liabilities in the capital structure ofthe option writer.

✦ The default boundary depends on the payoff of theoption itself.

✦ Allowing the pay-out ratio to be linked to the value ofoption writer’s assets, and for correlation between theassets of the option writer and the asset underlyingthe option.