Next Article in Journal
Digital Risk and Financial Inclusion: Balance between Auxiliary Innovation and Protecting Digital Banking Customers
Next Article in Special Issue
Modifying Sequential Monte Carlo Optimisation for Index Tracking to Allow for Transaction Costs
Previous Article in Journal
A Hypothesis Test for the Long-Term Calibration in Rating Systems with Overlapping Time Windows
Previous Article in Special Issue
Trading Option Portfolios Using Expected Profit and Expected Loss Metrics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Quick Introduction into the General Framework of Portfolio Theory

by
Philipp Kreins
1,*,†,
Stanislaus Maier-Paape
1,† and
Qiji Jim Zhu
2,†
1
Institut für Mathematik, RWTH Aachen University, D-52062 Aachen, Germany
2
Department of Mathematics, Western Michigan University, 1903 W Michigan Ave, Kalamazoo, MI 49008-5248, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Risks 2024, 12(8), 132; https://doi.org/10.3390/risks12080132
Submission received: 2 July 2024 / Revised: 26 July 2024 / Accepted: 29 July 2024 / Published: 19 August 2024
(This article belongs to the Special Issue Portfolio Theory, Financial Risk Analysis and Applications)

Abstract

:
This survey offers a succinct overview of the General Framework of Portfolio Theory (GFPT), consolidating Markowitz portfolio theory, the growth optimal portfolio theory, and the theory of risk measures. Central to this framework is the use of convex analysis and duality, reflecting the concavity of reward functions and the convexity of risk measures due to diversification effects. Furthermore, practical considerations, such as managing multiple risks in bank balance sheets, have expanded the theory to encompass vector risk analysis. The goal of this survey is to provide readers with a concise tour of the GFPT’s key concepts and practical applications without delving into excessive technicalities. Instead, it directs interested readers to the comprehensive monograph of Maier-Paape, Júdice, Platen, and Zhu (2023) for detailed proofs and further exploration.

1. Introduction

This survey offers a concise overview of the General Framework of Portfolio Theory (GFPT). Developed in the 1950s, portfolio theories primarily followed two schools of thought. The first, championed by Markowitz (1959), emphasizes portfolio selection as a trade-off between reward and risk. The second focuses on seeking the optimal portfolio for maximum growth (see Kelly 1956; Lintner 1965; MacLean et al. 2011). However, as portfolio theories evolved, it became evident that Markowitz’s use of variance as a risk measure was not entirely satisfactory. The single-minded pursuit of portfolio returns without adequately addressing risk posed its own set of dangers. Consequently, the analysis of risk measures gained prominence among researchers and practitioners, leading to a fruitful area of financial analysis, cf. Artzner et al. (1999); Carr and Zhu (2018). The GFPT unifies these three areas of research, and establishes a robust mathematical foundation. It is noteworthy that the concavity of the reward management function, driven by risk aversion, and the convexity of the risk measure, attributed to the risk-reducing effects of diversification, make convex analysis and duality central to this framework (see Carr and Zhu 2018; Maier-Paape et al. 2023).
Furthermore, practical problems, such as bank balance sheet management dealing with multiple risks of different properties, necessitate the extension of the theory to encompass the analysis of vector risks. Our goal here is to provide readers with a quick guided tour of the most important results from the General Framework of Portfolio Theory and demonstrate its practical applications. We aim to emphasize key ideas without delving into excessive technical details, refraining from providing proofs. Instead, we highlight selected proof concepts and direct interested readers to the monograph (Maier-Paape et al. 2023) for in-depth details.
Forerunner of this monograph with respect to laying the basic ideas of the General Framework of Portfolio Theory has been the work of Maier-Paape and Zhu (2018a), followed by Maier-Paape and Zhu (2018b) and Maier-Paape et al. (2019), the latter two including drawdown risk and multi-period markets. Furthermore, Platen (2018) contributed significantly to the GFPT by his modular approach, before lastly Maier-Paape et al. (2023) picked up all these ideas, brought them together and crucially extended them by allowing vector risk.
To limit the length of the paper, we have chosen to focus on the main ideas and results of GFPT, necessitating the omission of several important related topics. These include portfolio theory for continuous stochastic market models (cf. Fouque et al. 2017; Merton 1992), as well as issues related to hedging and replicating financial derivatives. Additionally, we have not covered strategies for limiting the risk of growth-optimal portfolios over a finite time horizon, which involves analyzing nonconcave reward functions (see Dewasurendra et al. 2019; Lopez de Prado et al. 2019; Vince and Zhu 2015).
In the next section, we embark on a detailed exploration of the historical underpinnings of the GFPT. We then turn our attention into the simpler case, which involves scalar risk alone. Section 3 will elucidate the efficient frontier, while Section 4 will examine the associated efficient portfolios. Additionally, Section 5 will analyze the behavior of the efficient frontier at its boundaries. Moving forward to Section 6, we will explore the broader scope of portfolio theory, incorporating vector risk. Our survey culminates in Section 7. To aid readers, two appendices have been included, offering reviews on semi-continuity and financial markets for added clarity and convenience.

2. Historic Remarks on Portfolio Theory

The overarching General Framework of Portfolio Theory expands and integrates Markowitz portfolio theory, growth optimal portfolio theory, and the theory of risk measures. This section aims to elucidate the correlation between this general framework and its roots.

2.1. Markowitz Portfolio Theory

Markowitz portfolio theory, pioneered in Markowitz (1959), is grounded in the innovative concept of balancing trade-offs between reward and risk. Using the one-period financial market model laid out in Definition A3 in Appendix A, the Markowitz portfolio problem can be stated as, for a given μ R ,
min { σ ( S ^ 1 x ^ ) : E [ S ^ 1 x ^ ] = μ , S ^ 0 x ^ = 1 } ,
where σ signifies the standard deviation, x ^ R M is the risky part of a portfolio, and S ^ 1 x ^ is the payoff of x ^ after one period (cf. Notation 1 and Notation A1 in Appendix A). Our general framework encompasses the classical Markowitz portfolio theory, detailed in Example 1 (see also Example A1 in Appendix A). While Markowitz’s concept of balancing reward and risk has been enduringly influential, criticisms have arisen regarding the inadequacy of his chosen reward and risk measures in various situations. Furthermore, the original Markowitz framework’s exclusive focus on risky assets has proven overly restrictive, particularly in applications related to the Capital Asset Pricing Model (CAPM); see Sharpe (1964). Addressing these concerns, our generalized framework of portfolio theory incorporates a broader perspective by considering the trade-off between a general concave reward function and a convex risk measure/function.
Viewing problem (1) in the lens of convex duality offers additional insights. The Lagrangian associated with problem (1) is
L ( λ , x ^ ) = σ ( S ^ 1 x ^ ) + λ ( μ E [ S ^ 1 x ^ ] ) , λ R , S ^ 0 x ^ = 1 .
Let λ ¯ be the Lagrange multiplier and x ¯ ^ be the solution to problem (1). It is well known that λ ¯ is the solution to the dual problem of (1); cf. Borwein and Zhu (2016). Note that σ 2 ( S ^ 1 x ^ ) = x ^ Σ x ^ , where Σ = E [ ( S ^ 1 E [ S ^ 1 ] ) ( S ^ 1 E [ S ^ 1 ] ) ] is the covariant matrix; cf. (A2). The optimality condition for the Lagrangian is
0 = x ^ L ( λ ¯ , x ¯ ^ ) = x ¯ ^ Σ σ ( S ^ 1 x ¯ ^ ) λ ¯ E [ S ^ 1 ] .
Multiplying x ¯ ^ from the right yields
λ ¯ 1 = E [ S ^ 1 x ¯ ^ ] / σ ( S ^ 1 x ¯ ^ ) .
This implies that the reciprocal of the dual solution to the Markowitz portfolio problem is precisely the Sharpe ratio introduced in Sharpe (1966)—a widely employed measure for evaluating the effectiveness of investment strategies.

2.2. Growth Optimal Portfolio Theory

The Growth Optimal Portfolio (GOP) theory is designed to optimize the log utility of a portfolio, x R M + 1 :
max E ln S 1 x : S 0 x = 1 .
This can also be considered a special case in the General Framework of Portfolio Theory when the risk is ignored (see Example A2 in Appendix A). We can see that GOP relies solely on the concavity of the log utility to reflect the investor’s risk aversion. Due to the strict concavity of the log utility, the growth optimal portfolio is unique, resulting in an efficient frontier with only one point; see Maier-Paape and Zhu (2018a).
The history of GOP is intriguing. A precursor to GOP appeared in Kelly (1956), addressing a horse race betting problem with inside information transmitted through a noisy communication channel. Kelly’s motivation was to provide an intuitive interpretation of Shannon’s information rate in information theory; cf. Shannon and Weaver (1949). Subsequent developments by Thorp (1962), as well as Thorp and Kassouf (1967), applied Kelly’s result to gambling and trading problems. Concurrently, Lintner (1965) independently developed the general Growth Optimal Portfolio theory. Kelly’s early work reveals a close connection between GOP and information theory. When applied to historical data of a strategy for trading or constructing a portfolio, the optimal gain derived from growth portfolio theory serves as a measure of the true information contained in the strategy, termed the efficiency index; see Zhu (2007). It may be treated as a measure of the information in an investment strategy.
However, the lack of explicit risk restrictions in GOP makes it overly risky in practice, as demonstrated by MacLean et al. (2011). Research in Vince and Zhu (2015) identifies two important underlying assumptions contributing to this excess risk: (1) assuming an infinite investment horizon, and (2) relying on the concavity of the log utility to adequately address risk aversion. Remedies are proposed in Vince and Zhu (2015) and the subsequent paper Lopez de Prado et al. (2019).
The log utility ansatz in (5), is related to the log Terminal Wealth Relative (TWR) utility, which goes back to Vince (1995) and Vince (2009). These ideas of Vince were extended by Platen (2018) to multi-period markets (cf. also Maier-Paape et al. (2019) and Maier-Paape et al. (2023), sct. 2.2).
Also worth noting is that the dual solution of GOP coincides with the risk-neutral measure for pricing financial derivatives related to the financial market (cf. Carr and Zhu 2018; Zhu 2012). This provides a novel perspective on the fundamental theorem of asset pricing.

2.3. Risk Measures

The concept of risk measurement has long been fundamental in portfolio theory. However, the formal study of risk measurement emerged later, primarily in the 1990s. The first widely analyzed and utilized risk measure was the Value at Risk (VaR); see Jorion (1997). Despite its widespread adoption in financial institutions, VaR has a notable limitation: it lacks convexity, which contradicts the established principle that diversification reduces risk. A remedy for this disconnect was proposed in Rockafellar and Uryasev (2000); Rockafellar et al. (2006), where Conditional Value at Risk (CVaR) was introduced as a replacement for VaR, along with a more general deviation measure in risk analysis. More recent developments can be found in Righi (2019). These developments, alongside the axiomatic framework of coherent risk measures introduced in Artzner et al. (1999), have solidified risk measurement as an independent discipline.
Definition 1 
(Coherent risk measure). Let Y : = [ R V ( Ω , 2 Ω , P ) ] M + 1 (see Definition A3 in Appendix A) represent the payoff space. We say a lower semi-continuous function ρ : Y R { + } is a coherent risk measure if, for any y , z Y , ρ has the following properties:
(c1)
(Positive homogeneity)  ρ ( r y ) = r ρ ( y ) for any r > 0 ;
(c2)
(Subadditivity)  ρ ( y + z ) ρ ( y ) + ρ ( z ) ;
(c3)
(Translation property)  ρ ( y + c 1 ) = ρ ( y ) c for all y Y and c R ;
(c4)
(Monotonicity)  ρ ( y ) ρ ( z ) for any y z Y + : = [ R V 0 ( Ω , 2 Ω , P ) ] M + 1 .
A coherent risk measure is convex. Any lower semi-continuous convex function on a finite-dimensional Banach space has the dual representation
ρ ( y ) = sup z Y [ y , z Y ρ * ( z ) ] , y Y ,
where y , z Y : = E [ y z ] and ρ * is the Fenchel conjugate of ρ . It is evident that when a risk measure ρ satisfies (c1) and (c2), ρ * must be an indicator function, i.e., ρ * = ι C for some convex closed set C, and thus ρ = σ C , where σ C is the support function of the set C defined by σ C ( y ) : = sup z C y , z Y .
Properties (c3) and (c4) further constrain the support set C of this indicator function: (c4) implies that C Y + and (c3) implies C { y Y : E [ y ] = 1 } (see Carr and Zhu 2018, sct. 2.4.1).
Coherent risk measures are motivated by practical trading account risk control problems and offer clear financial interpretations (cf. Artzner et al. 1999). The set C * : = { y Y + : E [ y ] = 1 } represents standardized losses. Essentially, a coherent risk measure selects a specific ‘test’ set of typical losses represented by C C * to determine the level of cash reserve requirement for a trading account. There are infinitely many possibilities for choosing C, thereby determining particular coherent risk measures. The larger the set C, the more conservative the risk measure, requiring higher cash reserves. In fact, this notion was the original motivation behind defining coherent risk measures. Examples include the margin system of the Chicago Mercantile Exchange and stress tests performed by regulatory agencies, both utilizing finite sets C. In practice, the diversification of elements in C holds significance.
It is worth noting that the coherent risk measure ρ is defined on the space of random variables of payoffs, distinct from the risk function in Assumption 1, which is defined on the portfolio space. We can relate a risk function on the portfolio space to ρ by r ( x ) = ρ ( S 1 x ) . Clearly, properties (c1) and (c2) imply that a coherent risk measure (and its induced r ( x ) = ρ ( S 1 x ) ) is convex and positive homogeneous. However, translating properties (c3) and (c4) requires a more careful consideration. Assume that the financial market S t in Appendix A Definition A3 has no nontrivial riskless portfolio, as in Appendix A Definition A5. We then observe easily that the linear mapping x S 1 x is a bijection from the portfolio space R M + 1 to its image S 1 R M + 1 in Y . Furthermore, using the induced inner product x , y R M + 1 : = E [ x S 1 S 1 y ] = S 1 x , S 1 y Y for the portfolio space, the above defined mapping is by definition a linear isometry.
It preserves angles and, therefore, partial order through the cone that defines the partial order. Thus, mapping property (c4) into the portfolio space can be performed by defining the partial order on the portfolio space using the cone K : = { x R M + 1 : S 1 x Y + } . To describe (c3), we can use the induced inner product. Thus, if ρ is a coherent risk measure that induces r ( x ) = ρ ( S 1 x ) , then r ( x ) = σ C ( x ) for some C { x K : E [ S 1 x ] = 1 } .
The financial significance and elegant dual representation of coherent risk measures make them a preferred framework for risk measurement. While several popular risk measures such as standard deviation, drawdown, and value at risk are not inherently coherent, they can all be modified naturally to become coherent. For detailed explanations, readers are referred to (Carr and Zhu 2018, sct. 2.4.4). In GFPT, we choose to work with a more general convex risk measure, of which the coherent risk measure is a special case.

3. The Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk

In this and the following two sections, we outline the basics of the General Framework of Portfolio Theory (GFPT) for scalar risk. Our exposition is based on the recent book of Maier-Paape et al. (2023). Here, however, we restrict ourselves to presenting the main results and some main ideas of proofs. Central to this theory are so-called “admissible” portfolios with M + 1 components, M N :
Definition 2 
(Admissible portfolios; Maier-Paape et al. 2023, Definition 2.7). We say that A R M + 1 is a set of admissible portfolios, provided that A is
  • Non-empty;
  • Closed;
  • Convex.
Notation 1 
(Risky parts of portfolios; Maier-Paape et al. 2023, Notation 2.8). We define the risky parts of the admissible portfolios as
A ^ : = x ^ R M : x 0 R such that x 0 , x ^ A .
The theory will always deal with portfolios from the admissible set A R M + 1 , where we distinguish for x = ( x 0 , x ^ ) A the component x 0 R , which stands for a risk-free investment, and x ^ R M , which stands for M risky investments. This models a financial market consisting of a scalar risk-free bond and M risky assets (see Definition A3 in Appendix A).
The other two ingredients for the General Framework of Portfolio Theory are risk and utility functions, both of which are defined on the set of admissible portfolios. Hence, we continue with the abstract definition of a risk function and include some relevant properties, before we follow up with the definition of a utility function.
Assumption 1 
(Risk functions; Maier-Paape et al. 2023, Assumption 2.20). Consider an extended-valued risk function  r : A R { + } on the admissible portfolios A R M + 1 (cf. Definition 2). We always assume risk functions to be lower semi-continuous (see Definition A1 in Appendix A). Furthermore, we will often use some of the following properties:
(r1)
(Riskless asset contributes no risk) The risk function r ( x ) = r ^ ( x ^ ) is a function of only the risky part of the portfolio, where x = x 0 , x ^ A , i.e., x ^ A ^ (cf. Notation 1).
(r1n)
(Non-negativity and normalization) The risk function is non-negative, i.e., r ( x ) 0 for all x A , and there is at least one portfolio of purely bonds in A. Furthermore, r ( x ) = 0 if and only if x A contains only a riskless bond, i.e., x = ( x 0 , 0 ^ ) for some x 0 R .
(r2)
(Diversification reduces risk) The risk function r is proper convex.
(r2s)
(Diversification strictly reduces risk) The risk function r is strictly convex on its dom ( r ) = { x A : r ( x ) < } A .
Remark 1 
(Usual assumptions regarding risk functions in GFPT). For a valid risk function in terms of the GFPT, it has to satisfy either (r2) or (r2s). However, the conditions (r1) and (r1n) are not necessary for the theory presented here to hold, although they are often satisfied in applications.
Assumption 2 
(Utility functions; Maier-Paape et al. 2023, Assumption 2.29). Consider an extended-valued utility function  u : A R { } on the admissible portfolios A (cf. Definition 2). We will always assume utility functions to be upper semi-continuous (see Remark A2 in Appendix A). Furthermore, we often use some of the following properties:
(u2)
(Diminishing marginal utility) The utility function u is proper concave.
(u2s)
(Strict diminishing marginal utility) The utility function u is strictly concave on its domain dom ( u ) = { x A : u ( x ) > } .
Example 1 
(Markowitz risk and utility). The probably most well-known utility function is expected return from Markowitz,
u ( x ) = u ^ ( x ^ ) = u ^ EXP ( x ^ ) : = E S ^ 1 x ^ , x = ( x 0 , x ^ ) A ,
where S ^ 1 x ^ is the risky part of the payoff S 1 x of a one-period financial market (cf. Definitions A3 and A4 in Appendix A). Note that u EXP is linear in x, such that (u2) is satisfied, but not (u2s). On the other hand, using Notation A1 in Appendix A, we define
r ( x ) = r S t d ( x ) : = r V a r ( x ) , where r V a r ( x ) : = Var S 1 x = Var S ^ 1 x ^ = : r ^ Var ( x ^ ) , x = ( x 0 , x ^ ) A ,
which is known as Markowitz volatility. It satisfies (r1) and (r2). However, under further assumptions on the financial market, such as the so-called “no nontrivial riskless portfolio” condition (cf. Definition A5 in Appendix A), and with A ^ from (7), even (r1n) is satisfied, and r ^ Var satisfies (r2s) on its domain dom ( r ^ Var ) = A ^ (see Example A1 in Appendix A for more details). We provide further examples of utility and risk functions in Examples A2 and A3 in Appendix A, respectively.
Using a set of admissible portfolios A (cf. Definition 2), as well as an extended-valued risk function r : A R { + } and an extended-valued utility function u : A R { } , the following compactness assumption is essential for most of the results of the GFPT (see also Assumption 4).
Assumption 3 
(Compact level sets; Maier-Paape et al. 2023, Assumption 2.56). We assume
(a)
dom ( u ) dom ( r ) ;
(b)
For all ( r , μ ) R 2 , the sets
B A ( r r ; u μ ) : = { x A : r ( x ) r , u ( x ) μ } R M + 1
are compact in R M + 1 .
Points ( r , μ ) R 2 , which may be represented as
( r , μ ) = r ( x ) , u ( x ) for some x A
contribute to the so-called “risk–utility space G = G ( r , u ; A ) defined in (10) below. We continue with some basic properties of G .
Proposition 1 
(Basic properties of G ; Maier-Paape et al. 2023, Proposition 2.58). Assume that A R M + 1 is a set of admissible portfolios, as in Definition 2. Moreover, assume the risk function r satisfies (r2) in Assumption 1, and assume the utility function u satisfies (u2) in Assumption 2. We claim:
(a)
The set
G : = G ( r , u ; A ) : = { ( r , μ ) R 2 : x A s . t . r ( x ) r and u ( x ) μ }
is convex.
(b)
In addition,
( r , μ ) G ( r , u ; A ) ( r + k , μ ) G ( r , u ; A ) for all k > 0 , ( r , μ k ) G ( r , u ; A ) for all k > 0 .
(c)
Assume furthermore that Assumption 3(b) holds. Then, the set G ( r , u ; A ) is closed.
Investors generally prefer portfolios either with lower risk for a given utility value, or with higher utility for a given risk value. Thus, portfolios which cannot be “improved” are called efficient.
Definition 3 
(Efficient portfolios; Maier-Paape et al. 2023, Definition 2.59). We say that a portfolio x A with r x < and u x > is Pareto efficient (for the risk function r , the utility function u , and admissible portfolios A), provided that there does not exist any x A , such that either
r x r x and u x > u x
or
r x < r x and u x u x
holds.
Definition 4 
(Efficient frontier; Maier-Paape et al. 2023, Definition 2.60). We call the set of images of all efficient portfolios in the two-dimensional risk–utility space, i.e.,
G eff : = G eff ( r , u ; A ) : = { ( r , μ ) R 2 : efficient portfolio x A with r ( x ) = r and u ( x ) = μ } G ,
the efficient frontier.
Analogously as in standard portfolio theory, the efficient frontier is essential in the GFPT as well. We continue with some basic and straight forward properties of the efficient frontier G eff , and some relations to the risk–utility space G .
Theorem 1 
(Efficient frontier properties; Maier-Paape et al. 2023, Theorem 2.61). Assume again the situation of Proposition 1. Then, the following holds true:
(a)
Efficient portfolios represented in the two-dimensional risk–utility space all lie on the boundary G = G ( r , u ; A ) of G = G ( r , u ; A ) .
(b)
G eff ( r , u ; A ) cannot contain vertical or horizontal line segments (of positive length).
(c)
In the case where furthermore Assumption 3(b) holds, then G eff ( r , u ; A ) has the following representation:
G eff ( r , u ; A ) = { ( r , μ ) G : ( r k , μ ) , ( r , μ + k ) G for all k > 0 } .
The so-called “standing assumptions” below collect these assumptions on A , r and u , which are necessary for the main results on the efficient frontier to come.
Assumption 4 
(Standing assumptions for A , r and u ; Maier-Paape et al. 2023, Assumption 2.64). We assume the following properties:
(a)
A R M + 1 is a set of admissible portfolios, according to Definition 2.
(b)
r : A R { + } is a lower semi-continuous extended-valued risk function satisfying (r2) in Assumption 1.
(c)
u : A R { } is an upper semi-continuous extended-valued utility function satisfying (u2) in Assumption 2.
(d)
Assumption 3, concerning compact level sets, holds for A , r and u .
The following proposition states that, under the standing assumptions, the risk–utility space and the efficient frontier are non-empty. It furthermore defines and investigates some auxiliary functions γ and ν . These will become very important, since parts of the graphs of γ and ν will lead to a representation of the efficient frontier below in Theorem 2.
Proposition 2 
(Auxiliary functions γ and ν ; Maier-Paape et al. 2023, Proposition 2.68). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 is given. Then, the following holds true:
(a)
G ( r , u ; A ) .
(b)
The function
γ : R R { + } , μ γ ( μ ) : = inf { r : ( r , μ ) G ( r , u ; A ) } = inf { r ( x ) : u ( x ) μ , x A }
is well-defined, increasing, lower semi-continuous, and convex, and
ν : R R { } , r ν ( r ) : = sup { μ : ( r , μ ) G ( r , u ; A ) } = sup { u ( x ) : r ( x ) r , x A }
is well-defined, increasing, upper semi-continuous, and concave.
(c)
G eff ( r , u ; A ) .
Proof. 
We just give some ideas; for details, see Maier-Paape et al. (2023). Obviously, G ( r , u ; A ) , because dom ( u ) dom ( r ) by Assumption 4(d). Similarly, using a point from G ( r , u ; A ) and improving it until improvement is no longer possible, yields G eff ( r , u ; A ) (see also Lemma 1 for a detailed proof). Furthermore, some of the properties of γ and ν are more or less easy to obtain. For instance, the increasing property follows immediately from the definitions of γ and ν . Moreover, for instance convexity of γ is a consequence of
epi ( γ ) : = ( r , μ ) R : γ ( μ ) r = G ( r , u ; A ) ,
so that the epigraph of γ is a convex set by Proposition 1(a). Hence, γ is convex as well. □
Next, we define the projections of G eff ( r , u ; A ) to the r- and μ -axes, and investigate these sets.
Corollary 1 
(Projection of G eff to the axes; Maier-Paape et al. 2023, Corollary 2.71). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 is given. Then, we define the projections of G eff = G eff ( r , u ; A ) to the axes, i.e.,
I = I ( r , u ; A ) : = r R : μ R with ( r , μ ) G eff ( r , u ; A )
and
J = J ( r , u ; A ) : = μ R : r R with ( r , μ ) G eff ( r , u ; A ) .
Then, the following holds true:
(a)
I = dom ( ν ) range ( γ ) R .
(b)
J = dom ( γ ) range ( ν ) R .
Corollary 2 
(Topological structure of G eff ; Maier-Paape et al. 2023, Corollary 2.73). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 holds. Then, the efficient frontier G eff = G eff ( r , u ; A ) is a single point or a path-connected continuous curve (one-sided continuous at finite endpoint(s)).
Thus, G eff ( r , u ; A ) is a path-connected continuous curve, unless it is just a single point. In particular, the proof of the path-connectedness is by no means trivial, and therefore, we refer the reader to consult Maier-Paape et al. (2023) for more details. However, with the path-connectedness of G eff ( r , u ; A ) at hand, it follows easily that the sets I and J, defined in (13) and (14), respectively, are intervals.
Corollary 3 
(I and J are intervals; Maier-Paape et al. 2023, Corollary 2.74). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 is given. Then, the following holds true:
(a)
The projections of the efficient frontier G eff = G eff ( r , u ; A ) R 2 to the axes, I = I ( r , u ; A ) , as well as J = J ( r , u ; A ) from (13) and (14), respectively, are intervals.
(b)
Either G eff , I , and J are all just single points, or otherwise, I and J are both nondegenerate intervals, i.e., with positive length.
With all these notations and properties at hand, we may conclude this section with the main theorem on the parameterizations of G eff as graphs of ν on I, as well as γ on J.
Theorem 2 
(Parameterization of G eff as graphs on I and J; Maier-Paape et al. 2023, Theorem 2.76). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 holds. Then, for I and J, defined in (13) and (14), as well as ν and γ, defined in (12) and (11), respectively, that the following holds true:
(a)
γ : J R and ν : I R are continuous (one-sided continuous at finite endpoints).
(b)
Furthermore, γ : J I and ν : I J are strictly increasing, bijective, and inverse to each other, i.e.,
( γ ν ) ( r ) = r for all r I and ( ν γ ) ( μ ) = μ for all μ J .
(c)
G eff ( r , u ; A ) has the representation
G eff ( r , u ; A ) = P ^ graph γ J = graph ν I ,
where the “exchange operator” P ^ is defined as
P ^ : R ^ 2 R ^ 2 , ( μ , r ) ( r , μ ) ,
using R ^ : = R { ± } .
We note that, with Theorem 2, the properties of γ restricted to J, as well as ν restricted to I, improve significantly compared to γ and ν defined on the whole set R , as in Proposition 2. For instance, we obtain here continuity versus semi-continuity beforehand. Similarly, the increasing property beforehand improves to strictly increasing, and, most importantly, γ J and ν I are inverse to each other, and their graphs represent G eff . Observe that, since the graphs of γ J and ν I represent G eff , it is evident from Theorem 1(b) that γ J and ν I have to increase strictly.
A typical situation of Theorem 2 may be viewed in Figure 1, where I and J are both bounded and closed. Notice that, in this example, the graph of ν I and graph ( ν ) do not coincide.
However, the intervals I and J may also be open, or half-open to either side (cf. Figure 2).
With the “endpoints” of I and J being included or not, it appears that there should be at least sixteen different possibilities for the tuple ( I , J ) , and thus for G eff . In reality, however, we will see in Corollary 4(e) that there are only four different options for G eff concerning the endpoints of I and J.

4. Efficient Portfolios within the General Framework of Portfolio Theory for Scalar Risk

Having investigated the efficient frontier in detail in Section 3, we now turn our focus to related efficient portfolios granted within the GFPT.
Theorem 3 
(Continuous efficient portfolio map; Maier-Paape et al. 2023, Theorem 2.79). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued risk and utility functions r and u , that Assumption 4 holds. Suppose additionally that either u is strictly concave on dom ( u ) A , i.e., (u2s) in Assumption 2 holds, or r is strictly convex on dom ( r ) A , i.e., (r2s) in Assumption 1 holds. Then, the following holds true:
(a)
Each point ( r , μ ) G eff = G eff ( r , u ; A ) , with G eff from Definition 4, corresponds to a unique efficient portfolio X ( r , μ ) A realizing the risk–utility values ( r , μ ) .
(b)
The mapping
X : G eff ( r , u ; A ) A R M + 1 , ( r , μ ) X ( r , μ ) ,
is injective and continuous (one-sided continuous at finite endpoint(s) of G eff ). Therefore, the efficient portfolios lie on a continuous curve with no self-intersections. Furthermore, X is surjective onto the set of efficient portfolios in A.
(c)
Moreover, efficient portfolios have the continuous representations
x * : r x * ( r ) : = X ( r , ν ( r ) ) , r I ,
and
y * : μ y * ( μ ) : = X ( γ ( μ ) , μ ) , μ J ,
on intervals I and J defined in (13) and (14), respectively, where ν and γ are defined in (12) and (11).
Under the standing assumptions from Assumption 4, a direct consequence of Definition 4 is that the existence part in Theorem 3(a) is obvious. Uniqueness, however, follows from the strictness conditions of either u or r .
Apparently, with Theorem 3, all efficient portfolios lie on a (path-connected) curve. This is essential for applications. It guarantees that little changes in μ J for the minimum risk optimization problem
min x A r ( x ) subject to u ( x ) μ
lead to minor adaptions of the corresponding efficient portfolio solving (18) (cf. the representation (17), as well as the continuity of γ J due to Theorem 2(a), and the continuity of X on G eff due to Theorem 3(b)). Thus, fund managers are able to adjust such strategies continuously. A similar remark applies to the efficient portfolios solving the maximum utility optimization problem for given r I , i.e.,
max x A u ( x ) subject to r ( x ) r .
For illustration purposes, we give a simple example.
Example 2 
(Case of an efficient pure bond portfolio realizing minimum risk). Let A , r and u satisfy the assumptions of Theorem 3. Furthermore, r should satisfy (r1n) from Assumption 1 and A should contain only portfolios with unit initial cost (see Definition A4 in Appendix A). Then, the set { x A : r ( x ) 0 } contains exactly one element, which is the pure bond portfolio  x bond : = ( 1 , 0 ^ ) A R M + 1 with a minimal possible risk value r bond : = r ( x bond ) = 0 . In the case where its utility value μ bond : = u ( x bond ) is finite, then x bond is in fact an efficient portfolio, so that ( r bond , μ bond ) G eff ( r , u ; A ) . Hence, X ( r bond , μ bond ) = x bond .
Following on from Proposition 2(c), we briefly explain here how to find an efficient portfolio for a given point ( r , μ ) G , whose risk is not higher than r and whose utility is not lower than μ .
Lemma 1 
(Construction of an efficient portfolio). Let the situation of Proposition 2 be given. Furthermore, let  x ¯ dom ( r ) dom ( u ) . Then, there exists an efficient portfolio x A , such that
r ( x ) r ( x ¯ ) and u ( x ) u ( x ¯ ) .
Proof. 
The proof of this lemma goes back to ideas provided in the proof of Maier-Paape et al. (2023), Proposition 2.68(c). Because of its importance, we here give the following quick argument: Since x ¯ dom ( r ) dom ( u ) , ( r ¯ , μ ¯ ) : = ( r ( x ¯ ) , u ( x ¯ ) ) G = G ( r , u ; A ) follows. Then, by lowering r and increasing μ , while staying in G , one finally reaches a point ( r , μ ) G G , which cannot be improved, so ( r , μ ) G eff = G eff ( r , u ; A ) results. This is a consequence of ν ( r ) < for all r R and γ ( μ ) > for all μ R , according to Proposition 2(b). By construction, r r ¯ and μ μ ¯ is valid, and, since ( r , μ ) G eff , there exists an efficient portfolio x A such that
r ( x ) = r r ¯ = r ( x ¯ ) and u ( x ) = μ μ ¯ = u ( x ¯ ) ,
as claimed. □

5. Endpoints of the Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk

Apparently, the sets I and J, defined in Corollary 1, are of great interest for this theory, since they may be used for parameterizations of the efficient frontier (see Theorem 2) and the efficient portfolios (cf. (16) and (17)). In this section, we investigate the “endpoints” of these intervals (cf. Corollary 3).
Definition 5 
(“Endpoints” of I and J; Maier-Paape et al. 2023, Definition 2.81). For the intervals I = I ( r , u ; A ) and J = J ( r , u ; A ) , defined in (13) and (14) as projections of G eff = G eff ( r , u ; A ) to the axes, we set:
r min : = inf I = inf ( r , μ ) G eff { r } = inf [ dom ( ν ) range ( γ ) ] , r max : = sup I = sup ( r , μ ) G eff { r } = sup [ dom ( ν ) range ( γ ) ] , μ min : = inf J = inf ( r , μ ) G eff { μ } = inf [ dom ( γ ) range ( ν ) ] , μ max : = sup J = sup ( r , μ ) G eff { μ } = sup [ dom ( γ ) range ( ν ) ] .
The above defined values may or may not lie in R , because I or J might be unbounded. Notice that all above representations are evident using the definitions in (13) and (14), as well as Corollary 1(a) and (b). The next proposition, however, is a bit more involved (cf. Maier-Paape et al. 2023).
Proposition 3 
(Alternative representations of “endpoints” of I and J; Maier-Paape et al. 2023, Proposition 2.82). Assume, for a set A R M + 1 of admissible portfolios, as well as extended-valued risk and utility functions r and u , that Assumption 4 holds. Then, using B : = dom ( u ) dom ( r ) A , the following holds true:
r min = inf x B { r ( x ) } = inf { r ( x ) : u ( x ) > , x A } < + ,
μ max = sup x B { u ( x ) } = sup { u ( x ) : r ( x ) < + , x A } > ,
μ min = lim r r min sup { u ( x ) : r ( x ) r , x A } μ max ,
r max = lim μ μ max inf { r ( x ) : u ( x ) μ , x A } r min .
With these representations at hand, and using some technical argumentation, it is possible to show several nontrivial relations between r min and μ min on the one hand, and between r max and μ max on the other hand (see below).
Corollary 4 
(“Endpoint” properties; Maier-Paape et al. 2023, Corollary 2.83). In the situation of Proposition 3 with I = I ( r , u ; A ) and J = J ( r , u ; A ) , defined in (13) and (14), we have:
(a)
r min I , if and only if μ min J .
(b)
If r min I , then μ min = ν r min and γ μ min = r min .
(c)
r max I , if and only if μ max J .
(d)
If μ max J , then r max = γ μ max and ν r max = μ max .
(e)
 
(i)
If r min I and μ max J , then I = r min , r max and J = μ min , μ max .
(ii)
If r min I and μ max J , then I = r min , and J = μ min , μ max .
(iii)
If r min I and μ max J , then I = r min , r max and J = , μ max .
(iv)
If r min I and μ max J , then I = r min , and J = , μ max .
In particular, as already noted at the end of Section 3, according to Corollary 4(e), we obtain only four different possibilities for the tuple ( I , J ) , and thus for G eff .
Thus, Maier-Paape et al. (2023) have examined the behavior and properties of γ and ν on J and I, respectively, (cf., e.g., Theorem 2) as well as the intervals J and I themselves (cf., e.g., Corollary 4) in detail. We will conclude with a brief look at how γ and ν behave outside J and I, respectively (cf. Figure 1 for an illustration). Although the respective graphs outside J and I do not contribute to the efficient frontier, the behavior of γ and ν there is often of technical value.
Lemma 2 
(Behavior of γ or ν outside of J or I). In the situation of Proposition 3, with I = I ( r , u ; A ) and J = J ( r , u ; A ) defined in (13) and (14), the following holds:
(a)
If μ max J , then r max I and ν ( r ) = μ max for all r r max .
(b)
If r min I , then μ min J and γ ( μ ) = r min for all μ μ min .
(c)
 
(i)
If r min I , then ν ( r ) = for all r < r min .
(ii)
If r min I and r min R , then ν ( r ) = for all r r min .
(d)
 
(i)
If μ max J , then γ ( μ ) = for all μ > μ max .
(ii)
If μ max J and μ max R , then γ ( μ ) = for all μ μ max .
Proof. 
We only have to consider (a) and (c) because (b) and (d) are symmetric statements.
ad(a). Let μ max J . Then, by Corollary 4(c), (d), r max I with ν r max = μ max follows. Furthermore, since
ν ( r ) = ( 12 ) sup { u ( x ) : r ( x ) r , x A } sup { u ( x ) : r ( x ) < , x A } = ( 21 ) μ max
holds, and ν is increasing by Proposition 2(b), we obtain ν ( r ) = μ max for all r r max .
ad(c). These assertions can be shown straight forwardly with the help of Lemma 1 by using the definitions of r min in (20) and of ν in (12). □

6. Generalizations of the General Framework of Portfolio Theory for Vector Risk

In this section, the risk function is assumed to be vector-valued, while the utility function remains to be scalar and, as before, A R M + 1 is a set of admissible portfolios. The results of the General Framework of Portfolio Theory (GFPT) for this case are taken from Maier-Paape et al. (2023, chap. 3). However, in contrast to the theory developed there for d 2 dimensional risk vectors, we restrain ourselves here for simplicity and visualization reasons to d = 2 .
Assumption 5 
(Conditions on the vector risk functions; see Assumption 1 and Maier-Paape et al. 2023, Assumption 3.1). Consider a vector risk function r = r 1 , r 2 : A ( R { + } ) 2 , with lower semi-continuous components r 1 and r 2 , where A R M + 1 is a set of admissible portfolios according to Definition 2. We say that:
(a)
r satisfies one (or more) of the conditions (r1)(r1n), or (r2) if r 1  and  r 2 satisfy (r1)(r1n), or (r2) from Assumption 1, respectively;
(b)
r satisfies (r2s) if r 1  or  r 2 satisfies (r2s) from Assumption 1.
In the following we simplify notation by using ≤ and ≥ componentwise; i.e., for two vectors v = ( v 1 , v 2 ) , w = ( w 1 , w 2 ) R 2 , we have v w , if and only if v i w i for i = 1 , 2 (analogously for the other operator).
Remark 2 
(Risk–utility as row vectors; see Maier-Paape et al. 2023, Remark 3.3). Here, and in the following, it is convenient to have risk vectors r = ( r 1 , r 2 ) R 2 as row vectors. Similarly, the risk–utility vectors ( r , μ ) R 2 × R = R 3 are assumed to be row vectors, which is in contrast to our portfolio vectors x A , which are always column vectors.
Similarly to Assumption 3, for the scalar risk case, we rely here on compactness assumptions as well.
Assumption 6 
(Compact level sets in vector risk case; see Maier-Paape et al. 2023, Assumption 3.4). We assume for a vector-valued risk function r : A R { + } 2 , as in Assumption 5, and a scalar-valued utility function u : A R { } , as in Assumption 2, that:
(a)
dom ( u ) dom ( r ) ;
(b)
For all ( r , μ ) R 3 , the sets
B A ( 2 d ) ( r r ; u μ ) : = { x A : r ( x ) r and u ( x ) μ }
are compact.
The next proposition lifts Proposition 1 to the vector risk case.
Proposition 4 
(Properties of G ( 2 d ) = G ( 2 d ) ( r , u ; A ) ; cf. Maier-Paape et al. 2023, Proposition 3.6). Assume that A R M + 1 is a set of admissible portfolios, as in Definition 2. In addition, assume that the vector risk function r satisfies (r2) in Assumption 5, and the utility function u satisfies (u2) in Assumption 2. We then have:
(a)
The set of valid risk and utility values
G ( 2 d ) = G ( 2 d ) ( r , u ; A ) : = ( r , μ ) R 3 : x A s . t . r ( x ) r and u ( x ) μ R 3
is convex.
(b)
( r , μ ) G ( 2 d ) ( r , u ; A ) implies that, for any k , k 0 R 0 2 × R 0 , we have ( r + k , μ ) G ( 2 d ) ( r , u ; A ) and r , μ k 0 G ( 2 d ) ( r , u ; A ) .
(c)
Assume furthermore that Assumption 6(b) holds. Then, G ( 2 d ) ( r , u ; A ) is closed.
With all that notation at hand, we can now define efficient portfolios and the efficient frontier in the vector risk case.
Definition 6 
(Efficient portfolios in vector risk case; see Maier-Paape et al. 2023, Definition 3.7). We say that a portfolio x A with finite risk and utility values is Pareto efficient (for given vector risk function r , scalar utility function u , and admissible portfolios A), provided that there does not exist any portfolio x A such that either
r x r x and u x > u x
or
r x r x , r x r x and u x u x
holds.
For better understanding, it is worthwhile to compare Definition 6 with the one of the scalar risk case; see Definition 3.
Definition 7 
(Efficient frontier in vector risk case; see Definition 4 and Maier-Paape et al. 2023, Definition 3.8). We call the set of (risk–utility) images of all efficient portfolios in the three-dimensional risk–utility space the efficient frontier, and denote it by G eff ( 2 d ) = G eff ( 2 d ) ( r , u ; A ) .
Similarly to some of the properties of the efficient frontier for the scalar risk case given in Theorem 1, we obtain the following for the vector risk case.
Theorem 4 
(Efficient frontier properties in vector risk case; confer Theorem 3.9 in Maier-Paape et al. 2023). Efficient portfolios represented in the three-dimensional risk–utility space are all located on the boundary G ( 2 d ) = G ( 2 d ) ( r , u ; A ) of the set G ( 2 d ) ( r , u ; A ) . In case the boundary of G ( 2 d ) ( r , u ; A ) contains a line segment parallel to any of the three coordinate axes, on such a line segment lies, at most, one efficient portfolio.
The analog of the “standing” Assumption 4 for the scalar risk case is given for the vector risk case next.
Assumption 7 
(Standing assumptions for efficient trade-off in vector risk case; see Maier-Paape et al. 2023, Assumption 3.11). We assume the following properties:
(a)
A R M + 1 is a set of admissible portfolios, according to Definition 2.
(b)
r : A ( R { + } ) 2 is a lower semi-continuous extended-valued vector risk function satisfying (r2) in Assumption 5.
(c)
u : A R { } is an upper semi-continuous extended-valued scalar utility function satisfying (u2) in Assumption 2.
(d)
Assumption 6 concerning compact level sets holds for A , r , and u .
From now on, we use the following notations for risk values r = ( r 1 , r 2 ) R 2 :
r 2 = : r ^ 1 R ^ 1 2 : = R and r 1 = : r ^ 2 R ^ 2 2 : = R ,
i.e., we have r = ( r 1 , r ^ 1 ) = ( r ^ 2 , r 2 ) .
While we only had two auxiliary functions γ and ν for the scalar risk case (see Proposition 2), we now obtain three auxiliary functions for two-dimensional vector risk.
Proposition 5 
(Auxiliary functions related to the efficient frontier in vector risk case; see Maier-Paape et al. 2023, Proposition 3.12). Assume, for a set A R M + 1 of admissible portfolios, as well as for extended-valued vector risk and scalar utility functions r and u , that Assumption 7 holds. Then, the following holds true:
(a)
G ( 2 d ) ( r , u ; A ) .
(b)
The functions ν : R 2 R { } , defined by
ν ( r ) : = sup μ : ( r , μ ) G ( 2 d ) ( r , u ; A ) R 3 = sup { u ( x ) : r ( x ) r , x A } , r R 2 ,
and γ k : R 2 R { + } , defined by
γ k r ^ k , μ : = inf r k : ( r , μ ) G ( 2 d ) ( r , u ; A ) R 3 = inf r k ( x ) : u ( x ) μ , r ^ k ( x ) r ^ k , x A , r ^ k , μ R 2 ,
for k = 1 , 2 , are well-defined extended-valued functions. Moreover, the function γ k is decreasing in r ^ k , increasing in μ, and lower semi-continuous as well as proper convex. The function ν is increasing (coordinate-wise), upper semi-continuous, and proper concave.
(c)
G eff ( 2 d ) ( r , u ; A ) .
In the following, using the definitions in (26), we define the projections
Pro j R ^ k 2 × R : R 3 R ^ k 2 × R R 2 , Pro j R ^ k 2 × R ( r , μ ) : = ( r ^ k , μ ) ,
for k = 1 , 2 and
Pro j R 2 : R 3 R 2 , Pro j R 2 ( r , μ ) : = r ,
as well as some kind of permutation mappings
P ^ k : R 3 R 3 , P ^ k r ^ k , μ , r k : = ( r , μ ) ,
for k = 1 , 2 .
We now shift our focus to projections of the efficient frontier G eff ( 2 d ) from the three-dimensional risk–utility space to planes built by two of the three variables ( r 1 , r 2 , μ ) . This result is along the lines of Corollary 1 and Theorem 2(c) for the scalar risk case. In particular, the definitions in (32) and (35) below should be compared with the definitions of the sets I and J in (13) and (14).
Theorem 5 
(Representation of efficient frontier in vector risk case; see Theorem 3.14 in Maier-Paape et al. 2023). Assume, for a set A R M + 1 of admissible portfolios, that the vector risk function r : A ( R { + } ) 2 and the scalar utility function u : A R { } satisfy Assumption 7. Then, the following holds true:
(a)
Setting
N = N ( r , u ; A ) : = Proj R 2 G eff ( 2 d ) ( r , u ; A ) = r R 2 : μ R with ( r , μ ) G eff ( 2 d ) ( r , u ; A ) ,
we have
N = Proj R 2 graph ν | dom ( ν ) k = 1 2 Proj R 2 P ^ k graph γ k | dom ( γ k ) Proj R 2 graph ν | dom ( ν ) = dom ( ν )
and
G eff ( 2 d ) ( r , u ; A ) = graph ν | N .
(b)
For arbitrary but fixed k { 1 , 2 } , we set
M k = M k ( r , u ; A ) : = Proj R ^ k 2 × R G eff ( 2 d ) ( r , u ; A ) = ( r ^ k , μ ) : r k R with ( r , μ ) G eff ( 2 d ) ( r , u ; A ) .
Then, we have
M k = Proj R ^ k 2 × R graph ν | dom ( ν ) = 1 2 Proj R ^ k 2 × R P ^ graph γ | dom ( γ ) Proj R ^ k 2 × R P ^ k graph γ k | dom ( γ k ) = dom ( γ k )
and
G eff ( 2 d ) ( r , u ; A ) = P ^ k graph γ k | M k .
Note that Equations (34) and (36) provide representations of G eff ( 2 d ) as graphs of the auxiliary functions ν , γ 1 and γ 2 , respectively. In particular, we clearly obtain from (34) and (36) that
G eff ( 2 d ) ( r , u ; A ) = graph ( ν | N ) P ^ 1 graph γ 1 | M 1 P ^ 2 graph γ 2 | M 2 ,
but also that the following holds true using, e.g., (33) and (34):
G eff ( 2 d ) ( r , u ; A ) = graph ν | dom ( ν ) P ^ 1 graph γ 1 | dom ( γ 1 ) P ^ 2 graph γ 2 | dom ( γ 2 ) .
This can also be seen in the following example which we provide for illustration purposes.
Example 3 
(Non-convex projections of G eff ( 2 d ) ). In Figure 3, we see a wooden model to illustrate the boundary of a possible set G * ( 2 d ) : = G ( 2 d ) ( r * , u * ; A * ) R 3 and its efficient frontier G eff , * ( 2 d ) : = G eff ( 2 d ) ( r * , u * ; A * ) for the vector risk case and some fixed risk and utility functions, r * and u * , as well as a fixed set of possible admissible portfolios A * (whose specific forms are all irrelevant for now).
Of course, the black “ground plate” of the wooden model in Figure 3 is just there to hold the construction. The extensions of the side lines of the ground plate to the left and to the right should be viewed as r 1 - and r 2 -axis. Perpendicular to these axes and upwards directed is the μ-axis. Note that, e.g., the facets on top ν = const = μ max * : = sup μ : ( r , μ ) G eff , * ( 2 d ) or to the right and to the left have to be extended in r 1 - and/or r 2 -direction to + to obtain all of G * ( 2 d ) : = G ( 2 d ) ( r * , u * ; A * ) . Similarly, the facets below are to be extended in μ-direction to . Also, the three transparent facets in front mimicked by a cord are part of G * ( 2 d ) . In fact, it is easy to see that only these three cord facets build G eff , * ( 2 d ) . Moreover, the reader should be able to imagine, for this example, the set N * = N ( r * , u * ; A * ) , i.e., the projection of G eff , * ( 2 d ) to the ( r 1 , r 2 ) -plane, which is a path-connected set, but N * is not convex in the case. This is remarkable because it is in contrast to the scalar risk case, where the projections of the efficient frontier to the axes, i.e., the sets I and J from (13) and (14) are always convex (see Corollary 3).
It should be furthermore noted that the representations of G eff ( 2 d ) = G eff ( 2 d ) ( r , u ; A ) in (34) and (36) are an analog of Theorem 2(c) for the vector risk case. An analog of Theorem 2(b) for the vector risk case holds as well (see (38) and (39) below). However, continuity of ν | N , γ 1 | M 1 and γ 2 | M 2 is no longer granted unconditionally, although, for scalar risk, this was no problem (see Theorem 2(a)).
In consensus with definition (26), in the following, we use the convention that r ^ k followed by r k is to be interpreted as a completed vector in R 2 , i.e.,
( r ^ k , r k ) : = ( r 1 , r 2 ) = r R 2
for k = 1 , 2 .
Theorem 6 
(Representation of efficient frontier 2 in the vector risk case; see Maier-Paape et al. 2023, Corollary 3.15). Under the same assumptions as in Theorem 5, the following holds true:
(a)
ν : N R is strictly increasing in each component; γ k : M k R is strictly increasing in μ and strictly decreasing in r ^ k (coordinate-wise) for k = 1 , 2 .
(b)
γ k : M k R , k = 1 , 2 and ν : N R are for fixed r ^ k R ^ k 2 inverse to each other in the following sense:
γ k r ^ k , ν ( r ^ k , r k ) = r k for all r = ( r ^ k , r k ) N dom ( ν ) , ν r ^ k , γ k ( r ^ k , μ ) = μ for all ( r ^ k , μ ) M k dom ( γ k ) .
(c)
γ 1 : M 1 R and γ 2 : M 2 R are (for fixed μ R ) inverse to each other in the following sense:
γ 2 ( γ 1 ( r 2 , μ ) , μ ) = r 2 for all ( r 2 , μ ) = ( r ^ 1 , μ ) M 1 dom ( γ 1 ) , γ 1 ( γ 2 ( r 1 , μ ) , μ ) = r 1 for all ( r 1 , μ ) = ( r ^ 2 , μ ) M 2 dom ( γ 2 ) .
Remark 3 
(Continuity of ν and γ k in the interior of their domains). As provided in Proposition 5, ν is upper semi-continuous and concave, and γ k is lower semi-continuous and convex for k = 1 , 2 . At least in the (relative) interior of their domains, both ν and γ k are even continuous (cf. Rockafellar 1972, Theorem 10.1). Nevertheless, discontinuities on the boundary are possible (see Maier-Paape et al. 2023, Example 3.16, for a counterexample to continuity at the boundary).
Path-connectedness of the efficient frontier in the scalar risk case was already not completely obvious (cf. Corollary 2). For the vector risk case, however, path-connectedness turns out to be a really subtle question. For that result, a few more assumptions are necessary.
Assumption 8 
(Standing assumptions for connectedness in the vector risk case; see Maier-Paape et al. 2023, Assumption 3.27). Assume for a set A R M + 1 of admissible portfolios (cf. Definition 2) that the vector risk function r = ( r 1 , r 2 ) : A ( R { + } ) 2 and the scalar utility function u : A R { } satisfy Assumption 7. In particular, Assumption 6, concerning compact level sets, holds as well. We assume furthermore:
(a)
The components of the risk vector are all non-negative, i.e., r i : A R 0 { + } , for i = 1 , 2 .
(b)
Either (r2s) holds for all r i , i = 1 , 2 (see Assumption 1), or u satisfies (u2s) in Assumption 2.
With this relatively strong assumption, the path-connectedness of G eff ( 2 d ) follows from a quite lengthy geometric proof (cf. Maier-Paape et al. 2023, sct. 3.2).
Theorem 7 
(Path-connected efficient frontier in vector risk case; see Corollary 3.41 as well as Remark 3.29 from Maier-Paape et al. 2023). Let Assumption 8 hold true, and let the components r i : A R 0 { + } ( i = 1 , 2 ) be continuous on dom ( r ) . Then, the set G eff ( 2 d ) = G eff ( 2 d ) ( r , u ; A ) R 3 is path-connected.
Finally, we report results on the uniqueness of efficient portfolios and properties of the efficient portfolio map (cf. Theorem 3 for the scalar risk case).
Theorem 8 
(Uniqueness of efficient portfolios for the vector risk–utility trade-off; see Maier-Paape et al. 2023, Theorem 3.46). Let Assumption 7 be satisfied. Denote by X ( 2 d ) ( r , μ ) A R M + 1 the set of efficient portfolios corresponding to ( r , μ ) G eff ( 2 d ) ( r , u ; A ) . Then, X ( 2 d ) is an upper semi-continuous multifunction (cf. Definition A2 in Appendix A) on its domain G eff ( 2 d ) ( r , u ; A ) .
In addition, suppose that either the vector risk function r satisfies (r2s) in Assumption 5, or the scalar utility function u satisfies condition (u2s) in Assumption 2. Then, X ( 2 d ) is single-valued and continuous. In particular, X ( 2 d ) : G eff ( 2 d ) ( r , u ; A ) R M + 1 is also injective.
Theorem 9 
(Topological properties of the efficient portfolio set; see Corollary 3.47 in Maier-Paape et al. 2023). In the situation of Theorem 5 and Theorem 7, the sets N = N ( r , u ; A ) from (32) and M k = M k ( r , u ; A ) , k = 1 , 2 , from (35) are path-connected. Furthermore, the efficient portfolio map X = X ( 2 d ) ( r , μ ) , ( r , μ ) G eff ( 2 d ) ( r , u ; A ) from Theorem 8 is continuous in this situation and, thus, the set of efficient portfolios is path-connected as well. Moreover, the efficient portfolios can be parameterized as a graph over N , M 1 or M 2 , respectively, i.e., both
x ¯ ( r ) : = X ( 2 d ) ( r , ν ( r ) ) , r N ,
and
y ¯ k r ^ k , μ : = X ( 2 d ) r ^ k , γ k r ^ k , μ , μ , r ^ k , μ M k , k = 1 , 2 ,
yield all efficient portfolios for given r , u , and A. Thus, according to Remark 3, x ¯ and y ¯ k are continuous in the relative interior of N and M k for k = 1 , 2 , respectively.
Having the path-connectedness of G eff ( 2 d ) at hand, it is again worthwhile to note that this enables fund managers to adjust their strategies continuously, at least when parameters from the relative interior of N , M 1 or M 2 are used. The corresponding optimization problems to find efficient portfolios are similar to (18) and (19): firstly, the maximum utility problem
max x A u ( x ) subject to r ( x ) r , r N ,
and, secondly, the two minimum risk optimization problems ( k = 1 , 2 )
min x A r k ( x ) subject to u ( x ) μ , r ^ k ( x ) r ^ k , r ^ k , μ M k .
In conclusion, although the notation and proofs are a bit more involved for the vector risk case, many of the results for scalar risk remain valid for the vector risk case as well.

7. Conclusions

We have provided a concise introduction to the General Framework of Portfolio Theory. This framework not only consolidates previous efforts in portfolio optimization but also extends its applicability to encompass vector risks, which are prevalent in numerous financial scenarios. Its significance resonates in practical applications, ranging from bank balance sheet management problems involving linear and quadratic models to portfolio optimization tasks that entail modifying benchmarks with diversification constraints, as well as those concerning log drawdown and log Terminal Wealth Relative (TWR). Due to space constraints, we are unable to delve into these applications in this paper. Interested readers are directed to explore the more comprehensive monograph (Maier-Paape et al. 2023).
As is customary in research endeavors, new explorations invariably give rise to fresh inquiries. One such avenue worth pursuing is discerning the relationship between efficient portfolios derived from the trade-off between a reward and scalar risk versus those emerging from vector risk considerations. Discussion of two pertinent special cases can be found in Maier-Paape et al. (2023), namely Examples 2.85 and 3.50. In these instances, the tracking error serves to confine admissible portfolios in the former case, while it acts as an additional risk function in the latter.
In GFPT, we adopt the perspective of a portfolio manager tasked with optimizing returns within a prudent risk framework. Alternatively, another viewpoint considers portfolio risk control from the standpoint of a regulator focused on ensuring financial market stability. Research discussed in Hamel and Heyde (2010); Hamel et al. (2011); Jouini et al. (2004) explores this regulatory perspective, extending coherent risk measures to address scenarios involving multiple risk types. Investigating the interplay between these two perspectives represents an intriguing avenue for further research.

Author Contributions

All authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CAPMCapital Asset Pricing Model
GFPTGeneral Framework of Portfolio Theory
GOPGrowth Optimal Portfolio Theory
TWRTerminal Wealth Relative
VaRValue at Risk
r1, r1n, r2, r2sProperties of risk functions, cf. Assumption 1
u2, u2sProperties of utility functions, cf. Assumption 2

Appendix A. Reviews

Appendix A.1. Review of Semi-Continuity

In this section, we quote a few well-known definitions and results from convex analysis, in particular on semi-continuity (see, e.g., Rockafellar 1972 or Maier-Paape et al. 2023, Appendix A).
Definition A1 
(Lower semi-continuity; cf. Maier-Paape et al. 2023, Introduction to sct. A.1). Let X be a finite-dimensional (real) Banach space, and let f be any extended-valued function f : X R { ± } . Then, f is called lower semi-continuous at x 0 X , if
f x 0 lim inf y x 0 f ( y ) = def lim δ 0 inf f ( y ) : y B δ x 0 x 0 ,
where B δ ( x 0 ) : = { y X : y x 0 < δ } is a ball around x 0 with radius δ > 0 .
  • Moreover, f is called lower semi-continuous if it is lower semi-continuous for all x X .
Lemma A1 
(Maier-Paape et al. 2023, Lemma A.2). Let X be a finite-dimensional (real) Banach space, and let f be any extended-valued function f : X R { ± } . Then, f is lower semi-continuous at x X , if and only if
f ( x ) lim i f x i
for every sequence x i i N X with lim i x i = x , and for which the limit of f x i i N exists in R { ± } .
Theorem A1 
(Characterization of lower semi-continuity; Rockafellar 1972, Theorem 7.1). Let X be a finite-dimensional (real) Banach space, and let f be any extended-valued function f : X R { ± } . Then, the following conditions are equivalent:
(a)
f is lower semi-continuous on the whole of X , i.e., for all x 0 X holds
f ( x 0 ) lim inf x x 0 f ( x ) .
(b)
Sublevel sets { x X : f ( x ) α } X are closed for all α R .
(c)
The epigraph of f,
epi ( f ) : = { ( x , r ) X × R : f ( x ) r } ,
is a closed set in X × R .
Remark A1 
(Maier-Paape et al. 2023, Remark A.4). A theorem similar to Theorem A1 holds true for a lower semi-continuous function g : Y R { ± } when Y X is a closed subset of a finite-dimensional (real) Banach space X . To see this, just consider f : X R { ± } , defined by
f ( x ) : = g ( x ) , x Y , , x Y c ,
which is lower semi-continuous on the whole of X (e.g., by Lemma A1), and thus Theorem A1 applies. In particular, for instance, the sublevel sets { y Y : g ( y ) α } are always closed subsets of X .
Remark A2 
(Upper semi-continuity). Similar, but symmetric, statements hold true for upper semi-continuous extended-valued functions f : X R { ± } , i.e., when f is lower semi-continuous.
Definition A2 
(Upper semi-continuity of multifunctions; see Borwein and Zhu 2005, sct. 5.1).  Let a multifunction  F : R K 2 R L be given. The domain of F is defined by dom ( F ) : = y R K : F ( y ) . We say that F is upper semi-continuous at y ¯ dom ( F ) if, whenever y n , z n graph ( F ) converges to ( y ¯ , z ¯ ) , this implies that z ¯ F ( y ¯ ) .

Appendix A.2. Review of Financial Markets and Related Risk and Utility Functions

Definition A3 
(One-period financial market; Maier-Paape et al. 2023, Definition 2.3). Let ( Ω , 2 Ω , P ) be a probability space where Ω is a finite sample space with | Ω | = N elements, and with P ( ω ) > 0 for all ω Ω . For M N fixed, we say that S t = S t 0 , S t 1 , , S t M , t { 0 , 1 } is a financial market in a one-period economy, provided that S 0 R > 0 M + 1 and S 1 ( 0 , ) × R V 0 Ω , 2 Ω , P M . Here, S 0 0 = 1 , S 1 0 = φ 0 > 0 represents a risk-free asset with a positive return when φ 0 > 1 . The rest of the components S t m , m = 1 , , M , represent the price of the mth risky financial asset at time t.
Definition A4 
(Portfolio, wealth and payoff; Maier-Paape et al. 2023, Definition 2.6).  A portfolio is a column vector x = x 0 , , x M R M + 1 , whose components x m represent the shares of the mth asset in the portfolio. Thus, S t x is the value of the portfolio at time t, where S 0 x represents the initial investments and S 1 x represents the payoff. A portfolio with S 0 x = i = 0 M S 0 i x i = 1 is called unit initial cost portfolio.
Notation A1 
(Price vector of risky assets; Maier-Paape et al. 2023, Notation 2.5). Set S ^ t : = S t 1 , , S t M , t { 0 , 1 } , where S 1 m R V 0 Ω , 2 Ω , P is a random variable for m = 1 , , M .
In various scenarios, adding restrictions to the one-period financial market, as defined in Definition A3, becomes necessary to eliminate unrealistic circumstances such as arbitrage. The “no nontrivial riskless portfolio” condition, delineated below, will consistently be adopted as the standard assumption in this paper whenever financial markets are discussed.
Definition A5 
(One-period financial market with no nontrivial riskless portfolio). We say that the financial market S t in Definition A3 has no nontrivial riskless portfolio when there does not exist any portfolio x = x 0 , x ^ R M + 1 with x ^ 0 ^ and
S 1 φ 0 S 0 x 0 ( P a . s . ) .
We next want to investigate the Markowitz risk function r Std from (9) more thoroughly. With the covariance matrix of the risky assets defined below, r Std can be represented nicely.
Lemma A2 
(Positive definite covariance matrix; Maier-Paape and Zhu 2018a, Corollary 1). Assume that the financial market S t in Definition A3 has no nontrivial riskless portfolio, as in Definition A5. Then, the covariant matrix of the risky assets
Σ : = E ( S ^ 1 E ( S ^ 1 ) ) ( S ^ 1 E ( S ^ 1 ) ) = E ( S 1 i E ( S 1 i ) ) ( S 1 j E ( S 1 j ) ) i , j = 1 , , M R M × M
is positive definite.
This leads us to the Markowitz risk function, also known as Markowitz volatility.
Example A1 
(Markowitz volatility: standard deviation of the payoff; Maier-Paape et al. 2023, Remark 2.27). Under the assumptions of Lemma A2, the standard deviation of the payoff, r Std from (9) has the following representation:
r Std ( x ) = r ^ Std ( x ^ ) = r ^ Var ( x ^ ) = Var ( S ^ 1 x ^ ) = x ^ Σ x ^ ,
for x = ( x 0 , x ^ ) A . It satisfies (r1) and (r2) from Assumption 1. Furthermore, in the case where A ^ from (7) is positive scaling invariant, r ^ Std is positive homogeneous in x ^ A ^ , i.e., r ^ Std ( t x ^ ) = t · r ^ Std ( x ^ ) for all t 0 , x ^ A ^ . However, with the representation in (A3)and Σ from (A2) being positive definite, one also obtains that r ^ Var satisfies (r2s) on dom ( r ^ Var ) = A ^ . Lastly, in the case where A R M + 1 is a set with only unit initial cost portfolios (cf. Definition A4), using Maier-Paape et al. 2023, Lemma 2.22, r Var satisfies (r2s) as well.
A large class of utility functions in the sense of Assumption 2 is constructed as so-called expected utility.
Definition A6 
(Expected utility; Maier-Paape et al. 2023, Definition 2.31). Consider a one-period financial market S t , as in Definition A3. Using an auxiliary function ϕ : R R { } , the function u : A R { } , u ( x ) : = E ϕ S 1 x , defined on the admissible portfolios A, is called expected utility.
Example A2 
(Expected utility functions). The two most prominent expected utility functions are for ϕ = id the so-called Markowitz utility (see Example 1) and, for ϕ = log (natural logarithm), the log utility occurring in Growth Optimal Portfolio Theory; see Maier-Paape and Zhu (2018a). For relevant properties guaranteeing applications within the GFPT, see (Maier-Paape et al. 2023), Lemma 2.34.
Example A3 
(Drawdown risk functions). Another important set of risk functions with applications in GFPT stems from the idea of measuring the drawdown of an equity curve over a prescribed amount of time. For instance, in Maier-Paape et al. (2023), sct. 2.2.5, several drawdown risk functions were constructed on a logarithmic equity curve for a multi-period financial market.

References

  1. Artzner, Philippe, Freddy Delbaen, Jean-Marc Eber, and David Heath. 1999. Coherent measures of risk. Mathematical Finance 9: 203–27. [Google Scholar] [CrossRef]
  2. Borwein, Jonathan M., and Qiji J. Zhu. 2005. Techniques of Variational Analysis. New York: Springer. [Google Scholar] [CrossRef]
  3. Borwein, Jonathan M., and Qiji J. Zhu. 2016. A variational approach to Lagrange multipliers. Journal of Optimization Theory and Applications 171: 727–56. [Google Scholar] [CrossRef]
  4. Carr, Peter, and Qiji Jim Zhu. 2018. Convex Duality and Financial Mathematics. Cham: Springer. [Google Scholar] [CrossRef]
  5. Dewasurendra, Sagara, Pedro Judice, and Qiji Zhu. 2019. The optimum leverage level of the banking sector. Risks 7: 51. [Google Scholar] [CrossRef]
  6. Fouque, Jean-Pierre, Ronnie Sircar, and Thaleia Zariphopoulou. 2017. Portfolio optimization and stochastic volatility asymptotics. Mathematical Finance 27: 704–45. [Google Scholar] [CrossRef]
  7. Hamel, Andreas H., and Frank Heyde. 2010. Duality for set-valued measures of risk. SIAM Journal on Financial Mathematics 1: 66–95. [Google Scholar] [CrossRef]
  8. Hamel, Andreas H., Frank Heyde, and Birgit Rudloff. 2011. Set-valued risk measures for conical market models. Mathematics and Financial Economics 5: 1–28. [Google Scholar] [CrossRef]
  9. Jorion, Philippe. 1997. Value at Risk. The New Benchmark for Controlling Derivatives Risk. New York: McGraw-Hill. [Google Scholar]
  10. Jouini, Elyés, Moncef Meddeb, and Nizar Touzi. 2004. Vector-valued coherent risk measures. Finance and Stochastics 8: 531–52. [Google Scholar] [CrossRef]
  11. Kelly, John L. 1956. A new interpretation of information rate. Bell System Technical Journal 35: 917–26. [Google Scholar] [CrossRef]
  12. Lintner, John. 1965. The valuation of risk assets and the selection of risky investments in stock portfolios and capital budgets. Review of Economics and Statistics 47: 13–37. [Google Scholar] [CrossRef]
  13. López de Prado, Marcos, Ralph Vince, and Qiji Jim Zhu. 2019. Optimal risk budgeting under a finite investment horizon. Risks 7: 86. [Google Scholar] [CrossRef]
  14. MacLean, Leonard C., Edward O. Thorp, and William T. Ziemba, eds. 2011. The Kelly Capital Growth Investment Criterion: Theory and Practice. Singapore: World Scientific. [Google Scholar] [CrossRef]
  15. Maier-Paape, Stanislaus, and Qiji Jim Zhu. 2018a. A general framework for portfolio theory. Part I: Theory and various models. Risks 6: 53. [Google Scholar] [CrossRef]
  16. Maier-Paape, Stanislaus, and Qiji Jim Zhu. 2018b. A general framework for portfolio theory. Part II: Drawdown risk measures. Risks 6: 76. [Google Scholar] [CrossRef]
  17. Maier-Paape, Stanislaus, Andreas Platen, and Qiji Jim Zhu. 2019. A general framework for portfolio theory. Part III: Multi-period markets and modular approach. Risks 7: 60. [Google Scholar] [CrossRef]
  18. Maier-Paape, Stanislaus, Pedro Júdice, Andreas Platen, and Qiji Jim Zhu. 2023. Scalar and Vector Risk in the General Framework of Portfolio Theory. A Convex Analysis Approach. CMS/CAIMS Books in Mathematics. Cham: Springer, vol. 9. [Google Scholar] [CrossRef]
  19. Markowitz, Harry M. 1959. Portfolio Selection. Cowles Monograph. New York: Wiley, vol. 16. [Google Scholar]
  20. Merton, Robert C. 1992. Continuous-Time Finance. Boston: Blackwell. [Google Scholar]
  21. Platen, Andreas. 2018. Modular Portfolio Theory: A General Framework with Risk and Utility Measures as Well as Trading Strategies on Multi-Period Markets. Ph.D. thesis, RWTH Aachen University, Aachen, Germany. [Google Scholar] [CrossRef]
  22. Righi, Marcelo Brutti. 2019. A composition between risk and deviation measures. Annals of Operations Research 282: 299–313. [Google Scholar] [CrossRef]
  23. Rockafellar, R. Tyrrell. 1972. Convex Analysis, 2nd ed. Princeton Landmarks in Mathematics and Physics. Princeton: Princeton University Press, vol. 28. [Google Scholar]
  24. Rockafellar, R. Tyrrell, and Stanislav Uryasev. 2000. Optimization of conditional value-at-risk. Journal of Risk 2: 21–42. [Google Scholar] [CrossRef]
  25. Rockafellar, R. Tyrrell, Stan Uryasev, and Michael Zabarankin. 2006. Master funds in portfolio analysis with general deviation measures. Journal of Banking & Finance 30: 743–78. [Google Scholar] [CrossRef]
  26. Shannon, Claude E., and Warren Weaver. 1949. The Mathematical Theory of Communication. Urbana: University of Illinois Press. [Google Scholar]
  27. Sharpe, William F. 1946. Capital asset prices: A theory of market equilibrium under conditions of risk. Journal of Finance 19: 425–42. [Google Scholar] [CrossRef]
  28. Sharpe, William F. 1966. Mutual fund performance. Journal of Business 1: 119–38. [Google Scholar] [CrossRef]
  29. Thorp, Edward O. 1962. Beat the Dealer. New York: Random House. [Google Scholar]
  30. Thorp, Edward O., and Sheen T. Kassouf. 1967. Beat the Market. New York: Random House. [Google Scholar]
  31. Vince, Ralph. 1995. The New Money Management: A Framework for Asset Allocation. New York: John Wiley and Sons. [Google Scholar]
  32. Vince, Ralph. 2009. The Leverage Space Trading Model. Hoboken: John Wiley and Sons. [Google Scholar]
  33. Vince, Ralph, and Qiji Jim Zhu. 2015. Optimal betting sizes for the game of blackjack. Journal of Investment Strategies 4: 53–75. [Google Scholar] [CrossRef]
  34. Zhu, Qiji Jim. 2007. Mathematical analysis of investment systems. Journal of Mathematical Analysis and Applications 326: 708–20. [Google Scholar] [CrossRef]
  35. Zhu, Qiji Jim. 2012. Convex analysis in financial mathematics. Nonlinear Analysis: Theory Method and Applications 75: 1719–36. [Google Scholar] [CrossRef]
Figure 1. G eff as graph of γ J and ν I (see (Maier-Paape et al. 2023), fig. 2.2).
Figure 1. G eff as graph of γ J and ν I (see (Maier-Paape et al. 2023), fig. 2.2).
Risks 12 00132 g001
Figure 2. G eff examples for a risk function r with non-negative values (see (Maier-Paape et al. 2023), fig. 2.4).
Figure 2. G eff examples for a risk function r with non-negative values (see (Maier-Paape et al. 2023), fig. 2.4).
Risks 12 00132 g002
Figure 3. The efficient frontier G eff , * ( 2 d ) = G eff ( 2 d ) ( r * , u * ; A * ) R 3 is build by three transparent “cord” facets.
Figure 3. The efficient frontier G eff , * ( 2 d ) = G eff ( 2 d ) ( r * , u * ; A * ) R 3 is build by three transparent “cord” facets.
Risks 12 00132 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kreins, P.; Maier-Paape, S.; Zhu, Q.J. Quick Introduction into the General Framework of Portfolio Theory. Risks 2024, 12, 132. https://doi.org/10.3390/risks12080132

AMA Style

Kreins P, Maier-Paape S, Zhu QJ. Quick Introduction into the General Framework of Portfolio Theory. Risks. 2024; 12(8):132. https://doi.org/10.3390/risks12080132

Chicago/Turabian Style

Kreins, Philipp, Stanislaus Maier-Paape, and Qiji Jim Zhu. 2024. "Quick Introduction into the General Framework of Portfolio Theory" Risks 12, no. 8: 132. https://doi.org/10.3390/risks12080132

APA Style

Kreins, P., Maier-Paape, S., & Zhu, Q. J. (2024). Quick Introduction into the General Framework of Portfolio Theory. Risks, 12(8), 132. https://doi.org/10.3390/risks12080132

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop