The application of proxy methods for estimating the cost of equity for unlisted companies : evidence from listed firms
The Campbell and Vuolteenaho (Am Econ Rev 94(5):1249–1275, 2004) two–beta model decomposes the systematic risk in the sensitivity of cash flow and discount rate change. We employed this model, which we call the Two Beta Decomposition Model (TBDM) and found that this model is useful to compute the co...
- Autores:
-
Sarmiento Sabogal, Julio Alejandro
Sadeghi, Mehdi
Sandoval, Juan S.
Cayón Fallon, Edgardo
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2021
- Institución:
- Colegio de Estudios Superiores de Administración
- Repositorio:
- Repositorio CESA
- Idioma:
- eng
- OAI Identifier:
- oai:repository.cesa.edu.co:10726/5055
- Palabra clave:
- Unlisted companies
Cost of equity
Accounting betas
Unlevered betas
Operational betas
Two beta decomposition model
- Rights
- License
- Acceso Restringido
Summary: | The Campbell and Vuolteenaho (Am Econ Rev 94(5):1249–1275, 2004) two–beta model decomposes the systematic risk in the sensitivity of cash flow and discount rate change. We employed this model, which we call the Two Beta Decomposition Model (TBDM) and found that this model is useful to compute the cost of capital for unlisted companies (UCs) via a proxy from listed companies. This model includes not only the accounting return reaction to long-term changes in consumption, but also links fundamental reactions to temporal changes in risk aversion. We test this model along with three traditional alternatives that are potentially useful in computing the cost of equity for UCs: accounting betas (AB), unlevered betas (UB), and operational betas (OB). Our results show that AB, UB and TBDM can partially explain the cross-sectional variations of stock returns. Additionally, using a series of non-parametric ranking test along with several statistics of goodness of fit, we found that the TBDM is the model that produces the best fit among competing models followed by the UB which is currently the most used among proxy methods. |
---|