Skip to main content

Efficient Market Hypothesis

有效市场假说Efficient Market Hypothesis)又叫效率市场假说有效市场假设。该假说认为,投资者在买卖股票时会迅速有效地利用可能的信息。所有已知的影响一种股票价格的因素都已经反映在股票的价格中,因此根据这一理论,股票的技术分析是无效的。

目录

基本假设

依据尤金·法马对效率市场理论存在的三个基本假设:
  1. 市场将立即反应新的资讯,调整至新的价位。因此价格变化是取决于新资讯的发生,股价呈随机走势。
  2. 新资讯的出现是呈随机性,即好、坏资讯是相伴而来的。
  3. 市场上许多投资者是理性且追求最大利润,而且每人对于股票分析是独立的,不受相互影响。
由效率市场理论延伸发展,Fama 依市场效率性质提出弱式效率半强式效率强式效率,其分述如下:

弱式效率(Weak Form Efficiency)

目前股票价格已充分反映过去股票价格所提供各项情报。所以,投资人无法再运用各种方法对过去股票价格进行分析,再利用分析结果来预测未来股票价格,基于随机游走假说,未来消息是随机而来的。意即投资者无法再利用过去资讯来获得高额报酬。所以,弱势效率越高,若以过去价量为基础的技术分析来进行预测效果将会十分不准确。

半强式效率(Semi-Strong Form Efficiency)

目前股票价格已充分反应于所有公开资讯上,所以,投资者无法利用情报分析结果来进行股票价格预测而获取高额报酬。因此,半强势效率越高,依赖公开的财务报表、经济情况及政治情势来进行基本面分析,然后再预测股票价格是徒劳无功。

强式效率(Strong Form Efficiency)

目前股票价格充分反应了所有已公开和未公开之所有情报。虽然情报未公开,但投资者能利用各种管道来获得资讯,所以,所谓未公开的消息,实际上是已公开的资讯且已反应于股票价格上。此种情形下,投资者也无法因拥有某些股票内幕消息而获取高额报酬。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...