Show simple item record

Robust Security Design

dc.contributor.authorRajan, Uday
dc.contributorLee, Seokwoo
dc.date.accessioned2017-02-17T13:42:54Z
dc.date.available2017-02-17T13:42:54Z
dc.date.issued2016-08
dc.identifier1338en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/136095
dc.description.abstractWe consider the optimal contract between an entrepreneur and investors in a single-period model when both parties have limited liability, are risk-neutral toward cash flow risk, and are ambiguity-averse. Ambiguity aversion is modeled by multiplier preferences for robustness toward model uncertainty, as in Hansen and Sargent (2001). Efficient ambiguity-sharing implies that the first-best contract consists of either convertible debt or levered equity. As is customary, in the second-best contract, moral hazard is alleviated by giving more cash to investors in low cash flow states. Under many settings in our model, the optimal security has an equity-like component in high cash flow states, providing a contrast to the results in Innes (1990).en_US
dc.subjectOptimal Security Designen_US
dc.subjectRobustnessen_US
dc.subjectMoral Hazarden_US
dc.subjectAmbiguity aversionen_US
dc.subjectlimited liabilityen_US
dc.subjectoptimal contracten_US
dc.subject.classificationFinanceen_US
dc.titleRobust Security Designen_US
dc.typeWorking Paperen_US
dc.subject.hlbsecondlevelFinanceen_US
dc.subject.hlbtoplevelBusiness
dc.contributor.affiliationumRoss School of Businessen_US
dc.contributor.affiliationumcampusAnn Arbor
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/136095/1/1338_Lee.pdf
dc.owningcollnameBusiness, Stephen M. Ross School of - Working Papers Series


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.