762
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

A stylized model of home buyers’ and bankers’ behaviours during the 2007-2009 US subprime mortgage crisis: a predatory perspective

&
Pages 915-928 | Published online: 09 Sep 2016
 

ABSTRACT

We examine the behaviour of market agents during the years leading to the 2008 US subprime mortgage crisis using a stylized capital asset pricing model model. In our study, an average investor eager to make money by flipping houses meets a banker who offers him subprime mortgage deals. We refer to recent research that shows the mechanics of the psychological and behavioural components of these two market agents. In particular, much in line with the famous Stanford experiment, it is assumed that investors adopt a predator or a prey position. Our analysis shows that, given a historical tendency towards financial predatory acts on the part of market agents (including buyers), government regulations should be adapted and strengthened to face this dooming reality.

JEL CLASSIFICATION:

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes

1 See studies showing the neurobiological correlates of the predator–prey positions (Mesly Citation2013, Citation2014; Mesly Citation2015).

2 Buyers can also at times act as financial predators by misleading the lenders (see Cowen Citation2008).

3 Note: For all intents and purposes, the graph is bounded by an upper time limit of 2.3. The mathematical reasoning for this assumption can be provided upon request.

4 The Utility Predatory curve expresses the fact that investor J finds a certain utility by developing predatory behaviours given market risks and his own risk. A Utility Predatory curve meets the five characteristics of utility curves: (1) no quantities of risk – market or individual – are negative; (2) more is always preferred to less; (3) they use an ordinal measure; (4) they can be associated with a budget constraint; (5) they cannot cross each other.

5 Note: J is only active on a small portion of the Utility Predatory curve. The mathematical reasoning can be provided upon request.

6 Where k = 1.3. The mathematical reasoning can be provided upon request.

7 If this did not hold true, we could not infer on the rest of the behaviours that we shall examine.

8 The derivative will be used further along in this article.

9 For all intents and purposes, this is the only point of interest as, at that point, as we will proceed to show, J maximizes his position in all respects.

10 In either case, there is potential predator/prey interplay: taking advantage of a position (out of fear) to gain an advantage (predator) or withdrawing from a position (out of fear) (prey).

11 J can adopt any of these profiles over time; the market at large is considered to consist of an aggregate of these three investors’ profiles.

12 Note that the addition or subtraction of a factor such as ε is in line with the well-known build-up method used to estimate the required return of an asset (Pinto et al. Citation2010).

13 At Ψ = 1, J suffers from total blind trustfulness.

14 Recall that Sharpe (Citation1991) had a similar provision in his version of the CAPM model, variable τm standing for ‘societal risk tolerance’. See also Dawson (Citation2015).

15 The formula is similar to the one found in past research (Mesly, Citation2015, Citation2014): Cooperation (or decision to invest) = 0.3 (initial trust endowment or, put differently, rf, within the upper limit of the model set at 2.3) + 0.9 Trust + ε, where 0.9 = 3 × (k–1). Trust = self-confidence in ability to make money. The mathematical reasoning can be provided upon request.

16 The chaos function follows a logistic map function in the form of Panict+1 = k Panict (1–Panict) where t is time. Within the boundaries set by our model, ε = the Feigenbaum value, or twice the upper limit of 2.3 (2.3 for σm and 2.3 for σJ). The mathematical reasoning can be provided upon request.

17 Note: we can calculate the exact slope of both Fne and Fnx curves because we know the shape of the Utility Predatory curve (see further in the article) and we know that its lowest point corresponds to y = 0 for the Panic curve. The mathematical reasoning can be provided upon request.

18 The system is closed (in the sense used in dynamic systems theory) because J operates on a finite time horizon. The mathematical reasoning can be provided upon request.

19 In our model, this curve has the function: S(xJ) = −2k1/2 + 2k/x + x = −2.28 + 2.6/x + x, within the boundaries set at 2.3 with k = 1.3. The S(xJ) is related to the Utility Predatory curve, which is the geometric resulting curve between the Budget curve and this Satisfaction curve. The mathematical reasoning can be provided upon request.

20 Research has shown that the positivity bias increases with age (Mesly Citation2015). Furthermore, J is likely financially illiterate (Gorton Citation2008; Tremoulinas Citation2009; Wang Citation2009; Gayraud Citation2011).

21 The predator–prey model can be used in other types of interactions: equal-to-equal, buyer–seller, supervisor–supervisee, etc. Here, we show the interaction between the naïve investor J and a sneaky banker J2.

22 In fact, there are a number of possibilities where J and J2 can meet, depending on the capacities of each. In , it is assumed that J and J2 have equal capabilities and weaknesses. This point is called a dynamic POE. At all points where J and J2 meet along the contract curve (see Varian Citation2006), there is Pareto efficiency. There is no reallocation between DI and Trust that could make J better off without making J2 worse off, and vice-versa.

23 A political example of such equilibrium is the episode of the Bay of Pigs opposing two super-powers: both the US and the Soviet Union had the capacity to destroy the arch-rival enemy, however destroying oneself by the same token.

24 Recall that once J faces J2, the timeline goes both ways: left to right (initially from J’s perspective) and right to left (initially from J2’s perspective). Hence, the Edgeworth box displays the fact that J can have an effect on J2’s agenda, and J2 could possibly have an effect on J’s agenda. In a predatory situation, J2 imposes his agenda upon J.

25 This is equivalent to taking the rf rate, established at 0.3 in the original model by Mesly (Citation2015), out of k, the reasoning being that this value corresponds to the initial trust endowment a person has towards another. This is like saying that the first person considers the second as being at a minimal risk, expressed by the level of 0. The mathematical reasoning can be provided upon request.

26 Interestingly, the ln of 5% is ln 0.05 = −3, which is −10 × k.

27 Recall that this curve stems from the original Utility Predatory curve which displays the fact that at all points in time J is equal to himself. So, even though J seems greedy at times, and he appears to become increasingly irrational, the bottom line from his perspective is that he endeavours to remain equal to himself, given the information I he has.

28 This would be in line with De Bondt and Thaler (Citation1985)’s findings on the ‘winner–loser’ effect. This phenomenon cannot be explained by risk σ, but by Ψ as it gets powered by predatory acts.

29 That he does not become a prey to market forces. Hence, J has truly entered into a predator/prey dynamic by way of J2’s predatory actions.

30 Reference is made, of course, to Ulysses.

31 They are often illiterate, poor, from a disadvantaged ethnic background, and older.

32 De Bondt (Citation1993) study indicates that over confidence leads to a narrower focus, so that J is increasingly limited, by the reduction in width and depth of his portfolio. He may for example focus solely on residential homes, and residential homes of a certain type, as opposed to investing in various venues to spread the risk. Odean (Citation1999) posits that overconfidence reduces the perception of real risk. J is becoming increasing blind, because he has trusted and keeps trusting J2.

33 This entails that the market is filled with investors fearing to miss the opportunity to enter the market.

34 De Bondt (Citation1993) study points towards a similar observation: disagreement among investors is stronger in bear markets than in bull markets.

35 Our analysis might be viewed as complementary to Dawson (Citation2015).

36 Recall that the Utility Predatory curve contrasts σm and σJ and includes the constant k = 1.3.

37 At the absolute limit, σ would be over 3.3, but then, at that point, there would be nobody left in the market, and hence, no market at all.

38 For an application of the proposed stylized model, see Appendix.

39 It is based on information’s three fundamental characteristics: time line (horizon and cycles); gamma (γ) and lambda (λ) curves (not discussed in this article – see Mesly Citation2015); and risk (internal and external). The HPI was calculated for the years ranging from 1971 to 2012 in the US market (see Mesly Citation2015).

40 Note: when testing on the database we used to develop the CMFP, = 1.35 for some 1700 individual participants; and when taking extremes out, k = 1.13 and the correlation coefficient = 37%.

41 The mathematical reasoning can be provided upon request.

42 We insert a ‘+ ’ sign because J wants to minimize his loss.

43 This analysis reports results that are in line with a recent neurobiological study showing that fear of an unknown predator (chaotic market) elicits stronger reactions than fear of a known predator (see Mesly Citation2015).

44 In fact, based on the HPI, the next extreme financial crisis would be anticipated in 2042–2043.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 387.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.