Pricing Vulnerable European Options

35
Chaun-Ju Wang, November 1, 2007 1 / 35 Pricing Vulnerable European Options When the Option’s Payoff Can Increase the Risk of Financial Distress Peter Klein, Michael Inglis Journal of Banking & Finance presenter: Chuan-Ju Wang

description

Pricing vulnerable European options when the option’s payoff can increase the risk of financial distress Peter Klein, Michael Inglis Journal of Banking & Finance

Transcript of Pricing Vulnerable European Options

Page 1: Pricing Vulnerable European Options

Chaun-Ju Wang, November 1, 2007 1 / 35

Pricing Vulnerable European Options When the

Option’s Payoff Can Increase the Risk of Financial

Distress

Peter Klein, Michael InglisJournal of Banking & Finance

presenter: Chuan-Ju Wang

Page 2: Pricing Vulnerable European Options

Outline

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 2 / 35

● Introduction

● The model

● Valuation equations

● Valuation methods

● Numerical examples

● Conclusion

Page 3: Pricing Vulnerable European Options

Introduction

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 3 / 35

Page 4: Pricing Vulnerable European Options

Vulnerable options

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 4 / 35

● Many financial institutions actively trading derivativecontract with their corporate clients as well as with otherfinancial institutions in the over-the-counter (OTC)markets.

● No exchange or cleaning house to ensure that both partiesto a contract honor their obligations.

● The holder’s of these contracts are vulnerable tocounter-party credit risk.

Page 5: Pricing Vulnerable European Options

Related works

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 5 / 35

● Most of the literature on vulnerable options assumes thatfinancial distress occurs when the value of writer’s assetsdrop below the value of its other liabilities.

● This assumption ignores the potential liability created bythe option itself.

Page 6: Pricing Vulnerable European Options

Related works (cont.)

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 6 / 35

● Johnson and Stulz (1987)

✦ Allowing the occurrence of financial distress to dependon the value of the option that has been written.

✦ In the event of financial distress, they assume that theoption holder receives all the assets of the optionwriter.

Page 7: Pricing Vulnerable European Options

Related works (cont.)

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 7 / 35

● Klein (1996)

✦ Default boundary does not depend on the value of theoption itself (fixed default boundary).

✦ Allowing for the presence of other liabilities in thecapital structure of the option writer.

● Rich (1996)

✦ Allowing the default boundary to be stochastic.

✦ But not explicitly connect to the stochastic boundaryto the value of the option that has been written.

Page 8: Pricing Vulnerable European Options

The idea of this paper

❖ Outline

Introduction

❖ Vulnerable options

❖ Related works❖ The idea of thispaper

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 8 / 35

● Allowing for the presence of other liabilities in the capitalstructure of the option writer while recognizing the growthin the value of the option itself may also cause financialdistress.

● Default barrier can be stochastic.

✦ A fixed component represents the other liabilities ofthe option writer.

✦ A stochastic component measures the potential payoffon the option itself.

Page 9: Pricing Vulnerable European Options

The model

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 9 / 35

Page 10: Pricing Vulnerable European Options

Assumption

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 10 / 35

● Summarizing the assumptions underlying the Klein (1996)model after appropriate adjustments to incorporate thevariable default boundary (VDB) condition.

Page 11: Pricing Vulnerable European Options

Assumption (cont.)

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 11 / 35

Page 12: Pricing Vulnerable European Options

Assumption (cont.)

❖ Outline

Introduction

The model

❖ Assumption

Valuation equations

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 12 / 35

Page 13: Pricing Vulnerable European Options

Valuation equations

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 13 / 35

Page 14: Pricing Vulnerable European Options

Johnson and Stulz (1987)

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 14 / 35

● Johnson and Stulz (1987) pricing equation of vulnerableEuropean calls can be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ ST −K

VT ST ≥ K,VT < ST −K

0 otherwise

}]

. (3)

Page 15: Pricing Vulnerable European Options

Klein (1996)

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 15 / 35

● Klein (1996) pricing equation of vulnerable European callscan be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ D∗

(1− α)VTST−K

D∗ST ≥ K,VT < D

0 otherwise

}]

. (4)

Page 16: Pricing Vulnerable European Options

Model of this paper

❖ Outline

Introduction

The model

Valuation equations

❖ Johnson and Stulz(1987)

❖ Klein (1996)

❖ Model of thispaper

Valuation methods

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 16 / 35

● The pricing equation for vulnerable European calls in thispaper’s framework can be written as

c = e−r(T−t)

[

E∗

{

ST −K ST ≥ K,VT ≥ D∗ + ST −K

(1− α)VTST−K

D∗+ST−KST ≥ K,VT < D

∗ + ST −K

0 otherwise

}]

. (5)

Page 17: Pricing Vulnerable European Options

Valuation methods

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 17 / 35

Page 18: Pricing Vulnerable European Options

Numerical method

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 18 / 35

● Three-dimension binomial tree

● Orthogonal the two process to ensure zero correlationbetween the two state variables.

Page 19: Pricing Vulnerable European Options

Approximate analytical solution

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 19 / 35

● Performing the standard log transformation and thenemploying a first order Taylor series approximation tolinearize the boundary conditions.

● The denominator in the second term of Eq.(5) must also belinearized through a first order Taylor series approximation.

● A standard rotation as outlined in Abramowitz and Stegun(1972) is used to eliminate S from the boundary conditionfor V , which enables us to rewrite the approximation interms of the cumulative bivariate normal distribution asfollows:

c=SN2(a1,b1,δ)−Ke−r(T−t)N2(a2,b2,δ)+

(1−α)SV exp

((

rσ2V

2 +(ρ−m)σSσV

)

(T−t)+m2

)

D∗−K+m1N2(a3,b3,−δ)−

(1−α)KV exp(m2)

D∗−K+m1N2(a4,b4,−δ). (6)

Page 20: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 20 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ = K, the valuation equation does not depend onthe point of expansion p.

■ The barrier depends only upon ln(ST ) which, afterlog transformation is already linear.

Page 21: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 21 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ > K, the true default barrier is the convex lineshow in Fig. 1.

■ Since this line corresponds to the probability thatfinancial distress will occur.

■ An approximation will underestimate the effect ofcredit risk on the value of the vulnerable calloption.

■ The optimal value for the expansion point (p) willbe the value that minimizes the value ofvulnerable option.

Page 22: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 22 / 35

● Fig. 1: Integration region for the vulnerable European callwhen D∗ > K.

Page 23: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 23 / 35

● The approximation valuation equation depends on thepoint (p) around which the Taylor series is expanded.

✦ If D∗ < K, the correct default barrier is concave.

■ An approximation based on a tangent willunderestimate the value of the vulnerable calloption as shown in Fig. 2.

■ The optimal value for p will be the value thatmaximized the value of the vulnerable option.

Page 24: Pricing Vulnerable European Options

Approximate analytical solution (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

❖ Numerical method❖ Approximateanalytical solution

Numerical examples

Conclusion

Chaun-Ju Wang, November 1, 2007 24 / 35

● Fig. 2: Integration region for the vulnerable European callwhen D∗ < K.

Page 25: Pricing Vulnerable European Options

Numerical examples

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 25 / 35

Page 26: Pricing Vulnerable European Options

Numerical examples

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 26 / 35

● Table 1: A comparison of FDB vs VDB

Page 27: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 27 / 35

● Fig. 3: Vulnerable call values as a function of option’smoneyness: a comparison of the FDB and VDB models(base case)

Page 28: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 28 / 35

● Fig. 4: Vulnerable call values as a function of option’smoneyness: a comparison of the FDB and VDB models(base case)

Page 29: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 29 / 35

● Fig. 5: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(base case)

Page 30: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 30 / 35

● Fig. 6: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(base case)

Page 31: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 31 / 35

● Fig. 7: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(out-of-the-money option)

Page 32: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 32 / 35

● Fig. 8: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(in-the-money option)

Page 33: Pricing Vulnerable European Options

Numerical examples (cont.)

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

❖ Numericalexamples

Conclusion

Chaun-Ju Wang, November 1, 2007 33 / 35

● Fig. 9: Vulnerable call values as a function of option’swriter’s assets: a comparison of the FDB and VDB models(ρ = 0.5)

Page 34: Pricing Vulnerable European Options

Conclusion

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

❖ Conclusion

Chaun-Ju Wang, November 1, 2007 34 / 35

Page 35: Pricing Vulnerable European Options

Conclusion

❖ Outline

Introduction

The model

Valuation equations

Valuation methods

Numerical examples

Conclusion

❖ Conclusion

Chaun-Ju Wang, November 1, 2007 35 / 35

● This paper extends the vulnerable European option pricingresults of Johnson and Stulz (1987) and Klein (1996).

✦ Allowing for other liabilities in the capital structure ofthe option writer.

✦ The default boundary depends on the payoff of theoption itself.

✦ Allowing the pay-out ratio to be linked to the value ofoption writer’s assets, and for correlation between theassets of the option writer and the asset underlyingthe option.