ISG Software Research Analyst Perspectives

Exploiting Cryptic Data for Securities Analysis

Written by ISG Software Research | Mar 25, 2016 7:09:48 AM

I coined the term “cryptic data” to mean information that isn’t easy to find or access by people who could make use of it. In one instance, cryptic data offers professional investors – portfolio managers and securities analysts – a source of proprietary information that can improve their ability to pick stocks and achieve superior performance relative to their benchmarks. Automation through technology now makes collecting cryptic data substantially more efficient than manual methods and thus makes accessing it practical. In particular, Web scraping tools (what I call “data drones”) can be programmed to retrieve specific information once or on an ongoing basis. Although this data is accessible to anyone, it requires insight and experience to understand how to use it for superior investment performance.

Having such technology comes at a time when active portfolio management and the securities analysis that supports it are increasingly challenged by a shift to passive investing strategies. Active portfolio management uses human judgment to select investments for particular purposes, such as retirement, a college education or short-term liquidity. Active managers apply their experience and judgment to industry and company research, economic forecasts and financial analyses to select investments. The main alternative, passive management or indexing, involves buying an entire basket of similar investments, for instance, all of the companies in the Standard & Poor’s 500 stock index. In this way, an investor is able to approximate the average performance of equities in that index. Active portfolio management and the research performed by the “sell side” (investment banks and brokers) analysts, which evolved to serve active managers, are being challenged by indexing. Index funds are displacing active managers and putting pressure on their fees, which reduces the money available to pay for sell-side research. The shift is significant in magnitude. From 2007 to 2014, indexed equity mutual funds and exchange traded funds (ETFs) in the U.S. received $1 trillion in net new cash and reinvested dividends, while over this same period actively managed domestic equity mutual funds had a net outflow of $659 billion, including reinvested dividends.

Two factors have been driving the shift to passive investment management. One is the consistently poor performance of active managers relative to their relevant investment benchmarks, such as a major stock index. The second is that in a period of relatively low returns on investments, management fees have become more important, which favors the lower-cost passive alternative. Technology has made it feasible to create low-cost index fund alternatives to compete with active management.

Portfolio managers and securities analysts base their investment decisions for actively managed portfolios or investment recommendations on a variety of sources. Some of the most useful are based on personal relationships because they can provide more insight, context and nuance and because the information is not widely available. (I’m excluding insider information here.) However, a great deal of the research is based on generally accessible investment research and information services provided by trading platforms and information aggregators. These sources are an essential component of equity research, but because they are readily available, they offer limited competitive advantage to investment managers or research analysts. Cryptic data, on the other hand, can provide investors with an edge in stock selection because it requires individual insight to understand what information is necessary, where it is located and why it is useful, as well as the analytic skills to understand what it means.

Cryptic data can be found on any industry or subject somewhere in the Internet. Here are a few examples:

  • Tables of related data assembled through repetitive queries of a free or paid data source (such as patents, real estate ownership or uniform commercial code filings)
  • Store or retail outlet locations
  • Product lines or price lists
  • Industry data collected by a group that makes it available only to members
  • Data contained in footnotes in financial filings that are not already collected in tabular form by data aggregators.

Collected, aggregated and analyzed, cryptic data can provide companies and individuals with information and insight that is not readily available. This is particularly true of data sets gathered over time from a source or a combination of sources that can reveal trends and relationships that otherwise would be difficult to spot.

Collecting the data in a consistent format makes it easier to do mashups of data sets to understand trends or spot potential issues. For example, starting with a list of addresses of store locations of a retailer, restaurant chain or consumer services provider, it’s possible to assess their geographic dispersion to determine whether new locations will fill in gaps or on the other hand cannibalize sales at existing stores. The data also can underpin analysis of the amount of capital needed to add productive sites to increase market share in a region. Geographic areas of overlap with competitors can be assessed. Location-based demographic databases can provide insight into their proximity to target customers. The impact of weather or natural disasters on such chains can be pinpointed quickly. While this data is openly available, knowing what to look for, how to analyze it and how to assess the results requires individual insight, skill and experience. This proprietary element is what makes cryptic data valuable to active investment management. Until automation technology became available, collecting cryptic information was too time-consuming to be practical.

The challenge of accessing widely scattered information on the Web is daunting. Our next-generation finance analytics benchmark research shows that companies have limited access to information about markets, industries and economies. Only 14 percent of participants said they have access to all the external data they need. Most (63%) said they can access only some of it, and another 14 percent said they can’t access any such data.

I recommend that portfolio managers and securities analysts consider how they might utilize cryptic data as part of their investment analysis. By automating the process of routinely collecting information and transforming it into usable formats, technology can expand the range of data available by lowering the cost of acquiring it. To address this constraint, data drones are designed for business users. They use a visual user interface design and hide some of the complexity inherent in the process. They can automate the process of collecting cryptic data and expand the scope and depth of data used for analysis, alerting and decision support. Having the ability to do this work in house can lower its cost in comparison to paying a service bureau. More importantly, by keeping the data retrieval and analysis in house (as opposed to contracting the work to a third party), the unique insights and the metrics that support it remain proprietary.

Automating the process of collecting cryptic data requires software that business people can use. I recommend taking a look at tools that can help you take advantage of cryptic data.

Regards,

Robert Kugel

Senior Vice President, Research