Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Lecture notes, cheat sheets
Free library / Directory / Lecture notes, cheat sheets

Investments. Investment risks (most important)

Lecture notes, cheat sheets

Directory / Lecture notes, cheat sheets

Comments on the article Comments on the article

Table of contents (expand)

INVESTMENT RISKS

Investment risk - this is the risk of depreciation of capital investments due to the actions of state authorities and management. The purpose of investment portfolio management is to increase its market value. An important criterion for selecting portfolio shares is the level of return on shares. But a high expected return is associated with a high risk of not receiving it or the risk of losing the invested capital. When managing an investment portfolio, a full assessment of its level of risk is carried out, then the level of profitability of the investment portfolio is planned.

Classification of investment risks:

1) systematic (market) risk: the risk of changes in the interest rate; currency risk; inflation risk; political risk;

2) non-systematic risk: industry risk; business risk; credit risk.

Systematic (market) risk called the risk arising from external events that affects the market as a whole:

▪ interest rate risk - the risk associated with a change in the interest rate by the country's central bank. When the interest rate decreases, the cost of loans that companies receive decreases and their profit growth increases, which is favorable and promising for the stock market. Conversely, an increase in the interest rate negatively affects the market;

▪ inflation risk - this type of risk is caused by rising inflation. It reduces the true profit of companies, which negatively affects the market, and also causes the emergence of another risk - the risk of changes in the interest rate;

▪ currency risk - the risk arising due to political and economic factors taking place in the country;

▪ political risk - this is the threat of a negative impact on the market due to political actions (change of government, war, etc.).

Here, it is important for the investor to evaluate not so much the risk of each security as the entire market risk. Systematic risk cannot be mitigated by diversifying stocks, since the different types of risks included in it affect all stocks at the same time.

Unsystematic risk, or the risk that can be reduced through diversification, is determined by events affecting only one given firm.

Unsystematic risks include:

▪ industry risk - the risk associated with the influence of industry-wide factors on the company;

▪ business risk - the risk associated with production efficiency and its management by the management of this company;

▪ credit risk arises when capital or part of it is formed at the expense of debt obligations (for example, when a credit rating is lowered and the prices of corporate bonds placed on the market are caused to fall, and also entails an increase in the cost of a bank loan).

Author: Kuznetsova S.A.

<< Back: Extrabudgetary funds

>> Forward: Methods for assessing investment risks

We recommend interesting articles Section Lecture notes, cheat sheets:

Latin for doctors. Crib

Family law. Lecture notes

Hospital therapy. Crib

See other articles Section Lecture notes, cheat sheets.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

The existence of an entropy rule for quantum entanglement has been proven 09.05.2024

Quantum mechanics continues to amaze us with its mysterious phenomena and unexpected discoveries. Recently, Bartosz Regula from the RIKEN Center for Quantum Computing and Ludovico Lamy from the University of Amsterdam presented a new discovery that concerns quantum entanglement and its relation to entropy. Quantum entanglement plays an important role in modern quantum information science and technology. However, the complexity of its structure makes understanding and managing it challenging. Regulus and Lamy's discovery shows that quantum entanglement follows an entropy rule similar to that for classical systems. This discovery opens new perspectives in the field of quantum information science and technology, deepening our understanding of quantum entanglement and its connection to thermodynamics. The results of the study indicate the possibility of reversibility of entanglement transformations, which could greatly simplify their use in various quantum technologies. Opening a new rule ... >>

Mini air conditioner Sony Reon Pocket 5 09.05.2024

Summer is a time for relaxation and travel, but often the heat can turn this time into an unbearable torment. Meet a new product from Sony - the Reon Pocket 5 mini-air conditioner, which promises to make summer more comfortable for its users. Sony has introduced a unique device - the Reon Pocket 5 mini-conditioner, which provides body cooling on hot days. With it, users can enjoy coolness anytime, anywhere by simply wearing it around their neck. This mini air conditioner is equipped with automatic adjustment of operating modes, as well as temperature and humidity sensors. Thanks to innovative technologies, Reon Pocket 5 adjusts its operation depending on the user's activity and environmental conditions. Users can easily adjust the temperature using a dedicated mobile app connected via Bluetooth. Additionally, specially designed T-shirts and shorts are available for convenience, to which a mini air conditioner can be attached. The device can oh ... >>

Energy from space for Starship 08.05.2024

Producing solar energy in space is becoming more feasible with the advent of new technologies and the development of space programs. The head of the startup Virtus Solis shared his vision of using SpaceX's Starship to create orbital power plants capable of powering the Earth. Startup Virtus Solis has unveiled an ambitious project to create orbital power plants using SpaceX's Starship. This idea could significantly change the field of solar energy production, making it more accessible and cheaper. The core of the startup's plan is to reduce the cost of launching satellites into space using Starship. This technological breakthrough is expected to make solar energy production in space more competitive with traditional energy sources. Virtual Solis plans to build large photovoltaic panels in orbit, using Starship to deliver the necessary equipment. However, one of the key challenges ... >>

Random news from the Archive

Good deed ransomware virus 03.06.2022

CloudSEK cybersecurity experts spoke about the GoodWill hacker group, which distributes a ransomware virus, but in order to decrypt the data, it requires the victim not to pay a ransom, but to do good deeds. For example, donate blankets to the homeless, feed starving children with fast food, or pay for treatment for the poor, capture all this on photos and videos, and then post them on social networks.

According to experts, the ransomware operators work from India - this is indicated by their emails and IP addresses assigned to Mumbai, to which the virus accesses. In addition, in one of the lines of code, an entry was found in "Hinglish" - a mixture of Hindi and English. The malware is written in the .NET framework, compressed with the UPX executable file packer, and data on infected Windows machines is encrypted using the AES algorithm.

After infecting the victim’s PC, the GoodWill virus encrypts files of various formats on it and offers to do three good deeds to decrypt them: donate clothes or blankets to the “needy on the road”, take five poor children to a fast food establishment, and also visit the nearest hospital and pay for treatment to a person who who are unable to do so on their own.

The first two actions must be documented on social networks using the photo frame offered by the hackers, and the last one should be taken with the object of help and sent along with the audio recording of the conversation with this person to the operators of the ransomware virus. After completing these three good deeds, you need to write and post on the social network an article on the topic "How you became a kind person, being a victim of the GoodWill ransomware virus." After that, the hackers allegedly send a tool to decrypt the data.

Experts have discovered a connection between GoodWill and a sample of experimental malware HiddenTear, which was developed and placed on GitHub by a certain Turkish programmer for security reasons. CloudSEK reported that 91 of GoodWill's 1246 lines of code match the HiddenTear sample.

Other interesting news:

▪ Super Slim Generator Inspection Robot

▪ Smartphones as modular constructors

▪ In sneakers and barefoot

▪ Record of the lowest artificially created temperature

▪ Sunspots affect the climate

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ site section Infrared technology. Article selection

▪ article I don't want to study, I want to get married. Popular expression

▪ article Why were jousting tournaments banned when? Detailed answer

▪ article Hemoptysis, or pulmonary hemorrhage. Health care

▪ article Heating control panel with three groups of heating elements. Encyclopedia of radio electronics and electrical engineering

▪ article Soldering iron power switch. Encyclopedia of radio electronics and electrical engineering

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024