Security Analysis: An Investment Perspective Kewei Hou∗ Haitao Mo† Chen Xue‡ Lu Zhang§ Ohio State and CAFR LSU U. of Cincinnati Ohio State and NBER June 2019 Abstract The investment theory, in which the expected return varies cross-sectionally with in- vestment, expected profitability, and expected growth, is a good start to understanding Graham and Dodd’s (1934) Security Analysis. Empirically, the q5 model goes a long way toward explaining prominent equity strategies rooted in security analysis, including Frankel and Lee’s (1998) intrinsic-to-market value, Piotroski’s (2000) fundamental score, Greenblatt’s (2005) “magic formula,” Asness, Frazzini, and Pedersen’s (2019) quality- minus-junk, Buffett’s Berkshire, Bartram and Grinblatt’s (2018) agnostic analysis, as well as Penman and Zhu’s (2014, 2018) and Lewellen’s (2015) expected-return strategies. ∗Fisher College of Business, The Ohio State University, 820 Fisher Hall, 2100 Neil Avenue, Columbus OH 43210; and China Academy of Financial Research (CAFR). Tel: (614) 292-0552. E-mail:
[email protected]. †E. J. Ourso College of Business, Louisiana State University, 2931 Business Education Complex, Baton Rouge, LA 70803. Tel: (225) 578-0648. E-mail:
[email protected]. ‡Lindner College of Business, University of Cincinnati, 405 Lindner Hall, Cincinnati, OH 45221. Tel: (513) 556-7078. E-mail:
[email protected]. §Fisher College of Business, The Ohio State University, 760A Fisher Hall, 2100 Neil Avenue, Columbus OH 43210; and NBER. Tel: (614) 292-8644. E-mail: zhanglu@fisher.osu.edu. 1 Introduction As shown in Cochrane (1991), the investment theory predicts that the expected return varies cross- sectionally, depending on firms’ investment, expected profitability, and expected growth.