Antitakeover Defense: Efficiency & Impact on Value Creation

Antitakeover Defense: Efficiency & Impact on Value Creation

1 S.S.D.N HEC School of Management, Paris Research paper on “Antitakeover Defense: Efficiency & Impact on Value Creation” Mohit Chawla Grande Ecole, Majeure Finance Student ID: S46372 2 Title: Antitakeover Defense, Efficiency & Impact on Value Creation Author: Mohit Chawla Guide: Prof. Mr. Patrick Legland Date: May 2015 Keywords: Hostile takeover, antitakeover defense, ATPs value creation, shareholder value, precautionary defense, reactive defense Abstract Takeovers are used as a mean for company(ies) to grow and gain entry to new markets. These can be of two types, Friendly & Hostile Takeovers respectively. When undertaken with support from the target management, termed as Hostile takeovers, whereas when an acquirer tries to takeover the company against the will of management, shareholders and board of directors of target company, is it termed as hostile takeover. Since all listed companies bear the (some) risk of being a target for a takeover, thus firms adopt a set of defense propositions & strategies regularly termed as Antitakeover Defence Provisions (ATPs), to protect them & direct their course of action incase of a hostile takeover threat.These strategies could be either precautionary such as poison pills, staggered board, fair price, and super-majority or reactive such as white knight, greenmail, and recapitalization. Lacking such protective measures could potentially prove to be a costly measure for the firm. We use this research paper to serve as a medium to recapitulate a thorough literature review on the various defense mechanisms implemented by firms, the ideology & rational for implementing each of them, which defense mechanism is most efficient in limiting the raider and whether the strategy is management entrenchment or shareholder entrenchment. Further, we form a basis to In addition to theoretical analysis, we tend to model the behavior of participants in a hostile battle, include a lot of statistic research results conducted by scholars and explicitly take into consideration of actions of firms in the real world. By comparing the defense strategy by referring to similar benchmark, we are able to reach the conclusion of which antitakeover defense strategy is efficient. Further, a consolidated literature review is conducted on one of the most discussed topics of corporate finance as to whether antitakeover provisions (ATPs) measures are value creating or destroying & with respect to the different stakeholders (shareholders, bondholders) each considered in detail with empirical data analysis to further consolidate on the inferences. Conclusions are hence drawn on the efficiency of takeover defenses & the effect of takeover defenses on value creation or loss. A radical approach to valuing the effect of ATPs both ex-post and ex-ante is proposed to form a comprehensive view on their efficiency & impact on value creation, as compared to the past scholarly works that model their conclusions only on ex-post analysis. 3 Acknowledgment “First and Foremost, I would like to express my sincere gratitude to Prof. Mr. Patrick Legland (Global Head of Research, Societe Generale) for his guidance and regular availability for helping out and tackling all obstacles and queries in coming up with this research report. Secondly, I would like to thank my Majeure Finance batch mates at HEC Paris for providing an ever so important feedback and competitive spirit throughout the course of this work” -Mohit Chawla 4 Table of contents Section I: Introduction ................................................................................................- 6 1.1 Background.................................................................................................- 6 1.2 Discussion of the Problem .........................................................................- 7 1.3 Purpose of this research..............................................................................- 7 1.4 Methodology...............................................................................................- 8 1.4.1 Research Approach .................................................................................- 8 1.4.2 Research Theory & Data Selection .........................................................- 8 1.5 Definitions ...................................................................................................-9 1.6 Limitation of this research …….................................................................-11 Section II: Hostile takeover ...................................................................................... - 12 2.1 The rationales for hostile takeover.............................................................-12 2.2 Why the bidder is pursuing the target hostilely?................... ...................- 13 2.3 What are the reasons for target firm in not being interested by the acquisition offer? ...............................................................................................- 13 2.4 What are the ideal takeover targets .......................................................... -14 2.5 Valuing the Target Firm.............................................................................-17 2.6 Hostile Takeovers: Bid Premium ...............................................................-20 2.7 Hostile Takeovers: The Process ................................................................ -20 2.7.1 Bear hug ...............................................................................................-20 2.7.2 Tender offer...........................................................................................-21 2.7.3 Proxy fight.............................................................................................-21 2.7.4 Process of hostile takeovers ................................................................. -22 2.7.5 Implication of hostile takeovers ........................................................... -22 Section III: Anti-Takeover Defence Provisions (ATPs) .............................................-24 3.1 Introduction ................................................................................................ -24 3.2 Pre bid Defenses.......................................................................................... -25 3.2.1 Blowfish................................................................................................ -25 3.2.2 Poison pill..............................................................................................-26 3.2.2 a) Effectiveness of poison pills............................................................. -27 3.2.2 b) Vulnerability of poison pills defense.................................................-27 3.2.3 Shark repellent.......................................................................................-28 3.2.4. Corporate charter amendments.............................................................-28 3.2.4.1 Staggered board..................................................................................-28 3.2.4.1 a) Effectiveness of staggered board...................................................-29 3.2.4.1 b) Effective Staggered Board............................................................-29 3.2.5 Interaction of staggered board with poison pills..................................-30 3.2.6 Dual Class Stock: ................................................................................-30 3.2.7 CONCLUSION OF Preventive (pre-bid) Defence Strategies.............-30 3.3 Post bid Defenses.......................................................................................-31 3.3.1 Attack the logic of the bid....................................................................-31 3.3.2 Corporate Restructuring and Reorganization/ Recapitalization...........-31 3.3.2.1. Mechanism and vulnerability of recapitalization.............................-32 5 3.3.2 White Knight & White Squire.................................................................-32 3.3.3 Crown jewel & Scorched Earth defense..................................................-33 3.3.4 Share Repurchase.....................................................................................-34 3.3.5 Greenmail.................................................................................................-34 3.3.6 Management buyout.................................................................................-35 3.3.7 Pac-man defense.......................................................................................-35 3.3.8 Positive public information.......................................................................-35 3.4 CONCLUSION OF Reactive (post-bid) Defence Strategies..........................-36 Section IV: Efficiency of Hostile Takeovers.................................................................-37 4.1 Ideology Against Antitakeover defense Strategies Implementation............-37 4.2. Rational for adopting antitakeover provisions (ATPs) ..............................-38 4.3. Rationale behind reactive defense strategies..............................................-40 Section V: Takeover Defences (ATPs): Impact on Value Creation w.r.t Stakeholders-42 5.1 Introduction..................................................................................................-42 5.2 Do Takeovers Create Value.........................................................................-42 5.3 Takeover Defence (ATPs) Impact on Shareholder & Firm Value: Present research Analysis scope v/s Our Analysis (a Radical Shift) ........................................................-42

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    71 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us