1. Introduction
This survey offers a concise overview of the General Framework of Portfolio Theory (GFPT). Developed in the 1950s, portfolio theories primarily followed two schools of thought. The first, championed by 
Markowitz (
1959), emphasizes portfolio selection as a trade-off between reward and risk. The second focuses on seeking the optimal portfolio for maximum growth (see 
Kelly 1956; 
Lintner 1965; 
MacLean et al. 2011). However, as portfolio theories evolved, it became evident that Markowitz’s use of variance as a risk measure was not entirely satisfactory. The single-minded pursuit of portfolio returns without adequately addressing risk posed its own set of dangers. Consequently, the analysis of risk measures gained prominence among researchers and practitioners, leading to a fruitful area of financial analysis, cf. 
Artzner et al. (
1999); 
Carr and Zhu (
2018). The GFPT unifies these three areas of research, and establishes a robust mathematical foundation. It is noteworthy that the concavity of the reward management function, driven by risk aversion, and the convexity of the risk measure, attributed to the risk-reducing effects of diversification, make convex analysis and duality central to this framework (see 
Carr and Zhu 2018; 
Maier-Paape et al. 2023).
Furthermore, practical problems, such as bank balance sheet management dealing with multiple risks of different properties, necessitate the extension of the theory to encompass the analysis of vector risks. Our goal here is to provide readers with a quick guided tour of the most important results from the General Framework of Portfolio Theory and demonstrate its practical applications. We aim to emphasize key ideas without delving into excessive technical details, refraining from providing proofs. Instead, we highlight selected proof concepts and direct interested readers to the monograph (
Maier-Paape et al. 2023) for in-depth details.
Forerunner of this monograph with respect to laying the basic ideas of the General Framework of Portfolio Theory has been the work of 
Maier-Paape and Zhu (
2018a), followed by 
Maier-Paape and Zhu (
2018b) and 
Maier-Paape et al. (
2019), the latter two including drawdown risk and multi-period markets. Furthermore, 
Platen (
2018) contributed significantly to the GFPT by his modular approach, before lastly 
Maier-Paape et al. (
2023) picked up all these ideas, brought them together and crucially extended them by allowing vector risk.
To limit the length of the paper, we have chosen to focus on the main ideas and results of GFPT, necessitating the omission of several important related topics. These include portfolio theory for continuous stochastic market models (cf. 
Fouque et al. 2017; 
Merton 1992), as well as issues related to hedging and replicating financial derivatives. Additionally, we have not covered strategies for limiting the risk of growth-optimal portfolios over a finite time horizon, which involves analyzing nonconcave reward functions (see 
Dewasurendra et al. 2019; 
Lopez de Prado et al. 2019; 
Vince and Zhu 2015).
In the next section, we embark on a detailed exploration of the historical underpinnings of the GFPT. We then turn our attention into the simpler case, which involves scalar risk alone. 
Section 3 will elucidate the efficient frontier, while 
Section 4 will examine the associated efficient portfolios. Additionally, 
Section 5 will analyze the behavior of the efficient frontier at its boundaries. Moving forward to 
Section 6, we will explore the broader scope of portfolio theory, incorporating vector risk. Our survey culminates in 
Section 7. To aid readers, two appendices have been included, offering reviews on semi-continuity and financial markets for added clarity and convenience.
  3. The Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk
In this and the following two sections, we outline the basics of the General Framework of Portfolio Theory (GFPT) for scalar risk. Our exposition is based on the recent book of 
Maier-Paape et al. (
2023). Here, however, we restrict ourselves to presenting the main results and some main ideas of proofs. Central to this theory are so-called “admissible” portfolios with 
 components, 
:
Definition 2  (Admissible portfolios; 
Maier-Paape et al. 2023, Definition 2.7)
. We say that  is a set of admissible portfolios
, provided that A is Notation 1  (Risky parts of portfolios; 
Maier-Paape et al. 2023, Notation 2.8)
. We define the risky parts
 of the admissible portfolios as The theory will always deal with portfolios from the admissible set 
, where we distinguish for 
 the component 
, which stands for a risk-free investment, and 
, which stands for 
M risky investments. This models a financial market consisting of a scalar risk-free bond and 
M risky assets (see Definition A3 in 
Appendix A).
The other two ingredients for the General Framework of Portfolio Theory are risk and utility functions, both of which are defined on the set of admissible portfolios. Hence, we continue with the abstract definition of a risk function and include some relevant properties, before we follow up with the definition of a utility function.
Assumption 1  (Risk functions; 
Maier-Paape et al. 2023, Assumption 2.20)
. Consider an extended-valued risk function
  on the admissible portfolios  (cf. Definition 2). We always assume risk functions to be lower semi-continuous (see Definition A1 in Appendix A). Furthermore, we will often use some of the following properties:- (r1)
- (Riskless asset contributes no risk) The risk function  is a function of only the risky part of the portfolio, where , i.e.,  (cf. Notation 1). 
- (r1n)
- (Non-negativity and normalization) The risk function is non-negative, i.e.,  for all , and there is at least one portfolio of purely bonds in A. Furthermore,  if and only if  contains only a riskless bond, i.e.,  for some . 
- (r2)
- (Diversification reduces risk) The risk function  is proper convex. 
- (r2s)
- (Diversification strictly reduces risk) The risk function  is strictly convex on its . 
 Remark 1  (Usual assumptions regarding risk functions in GFPT). For a valid risk function in terms of the GFPT, it has to satisfy either (r2) or (r2s). However, the conditions (r1) and (r1n) are not necessary for the theory presented here to hold, although they are often satisfied in applications.
 Assumption 2  (Utility functions; 
Maier-Paape et al. 2023, Assumption 2.29)
. Consider an extended-valued utility function 
 on the admissible portfolios A (cf. Definition 2). We will always assume utility functions to be upper semi-continuous (see Remark A2 in Appendix A). Furthermore, we often use some of the following properties:- (u2)
- (Diminishing marginal utility) The utility function  is proper concave. 
- (u2s)
- (Strict diminishing marginal utility) The utility function  is strictly concave on its domain . 
 Example 1  (Markowitz risk and utility)
. The probably most well-known utility function is expected return 
from Markowitz,where  is the risky part of the payoff  of a one-period financial market (cf. Definitions A3 and A4 in Appendix A). Note that  is linear in x, such that (u2)
 is satisfied, but not (u2s)
. On the other hand, using Notation A1 in Appendix A, we definewhich is known as Markowitz volatility
. It satisfies (r1)
 and (r2)
. However, under further assumptions on the financial market, such as the so-called “no nontrivial riskless portfolio” condition (cf. Definition A5 in Appendix A), and with  from (7), even (r1n) 
is satisfied, and  satisfies (r2s) 
on its domain  (see Example A1 in Appendix A for more details). We provide further examples of utility and risk functions in Examples A2 and A3 in Appendix A, respectively. Using a set of admissible portfolios A (cf. Definition 2), as well as an extended-valued risk function  and an extended-valued utility function , the following compactness assumption is essential for most of the results of the GFPT (see also Assumption 4).
Assumption 3  - (a)
- ; 
- (b)
- For all , the setsare compact in . 
 Points 
, which may be represented as
      
	  contribute to the so-called “
risk–utility space” 
 defined in (
10) below. We continue with some basic properties of 
.
Proposition 1  (Basic properties of 
; 
Maier-Paape et al. 2023, Proposition 2.58)
. Assume that  is a set of admissible portfolios, as in Definition 2. Moreover, assume the risk function  satisfies (r2) 
in Assumption 1, and assume the utility function  satisfies (u2) 
in Assumption 2. We claim:- (a)
- (b)
- (c)
- Assume furthermore that Assumption 3(b) holds. Then, the set  is closed. 
 Investors generally prefer portfolios either with lower risk for a given utility value, or with higher utility for a given risk value. Thus, portfolios which cannot be “improved” are called efficient.
Definition 3  (Efficient portfolios; 
Maier-Paape et al. 2023, Definition 2.59)
. We say that a portfolio  with  and  is Pareto efficient 
(for the risk function , the utility function , and admissible portfolios A), provided that there does not exist any , such that eitherorholds. Definition 4  (Efficient frontier; 
Maier-Paape et al. 2023, Definition 2.60)
. We call the set of images of all efficient portfolios in the two-dimensional risk–utility space, i.e.,the efficient frontier.
 Analogously as in standard portfolio theory, the efficient frontier is essential in the GFPT as well. We continue with some basic and straight forward properties of the efficient frontier , and some relations to the risk–utility space .
Theorem 1  (Efficient frontier properties; 
Maier-Paape et al. 2023, Theorem 2.61)
. Assume again the situation of Proposition 1. Then, the following holds true:- (a)
- Efficient portfolios represented in the two-dimensional risk–utility space all lie on the boundary  of . 
- (b)
-  cannot contain vertical or horizontal line segments (of positive length). 
- (c)
- In the case where furthermore Assumption 3(b) holds, then  has the following representation: 
 The so-called “standing assumptions” below collect these assumptions on  and , which are necessary for the main results on the efficient frontier to come.
Assumption 4  (Standing assumptions for 
 and 
; 
Maier-Paape et al. 2023, Assumption 2.64)
. We assume the following properties:- (a)
-  is a set of admissible portfolios, according to Definition 2. 
- (b)
-  is a lower semi-continuous extended-valued risk function satisfying (r2) in Assumption 1. 
- (c)
-  is an upper semi-continuous extended-valued utility function satisfying (u2) in Assumption 2. 
- (d)
- Assumption 3, concerning compact level sets, holds for  and . 
 The following proposition states that, under the standing assumptions, the risk–utility space and the efficient frontier are non-empty. It furthermore defines and investigates some auxiliary functions  and . These will become very important, since parts of the graphs of  and  will lead to a representation of the efficient frontier below in Theorem 2.
Proposition 2  (Auxiliary functions 
 and 
; 
Maier-Paape et al. 2023, Proposition 2.68)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 is given. Then, the following holds true:- (a)
- . 
- (b)
- The functionis well-defined, increasing, lower semi-continuous, and convex, andis well-defined, increasing, upper semi-continuous, and concave. 
- (c)
- . 
 Proof.  We just give some ideas; for details, see 
Maier-Paape et al. (
2023). Obviously, 
, because 
 by Assumption 4(d). Similarly, using a point from 
 and improving it until improvement is no longer possible, yields 
 (see also Lemma 1 for a detailed proof). Furthermore, some of the properties of 
 and 
 are more or less easy to obtain. For instance, the increasing property follows immediately from the definitions of 
 and 
. Moreover, for instance convexity of 
 is a consequence of
        
		so that the epigraph of 
 is a convex set by Proposition 1(a). Hence, 
 is convex as well.    □
 Next, we define the projections of  to the r- and -axes, and investigate these sets.
Corollary 1  (Projection of 
 to the axes; 
Maier-Paape et al. 2023, Corollary 2.71)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 is given. Then, we define the projections of  to the axes, i.e.,andThen, the following holds true:
- (a)
- . 
- (b)
- . 
 Corollary 2  (Topological structure of 
; 
Maier-Paape et al. 2023, Corollary 2.73)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 holds. Then, the efficient frontier  is a single point or a path-connected continuous curve (one-sided continuous at finite endpoint(s)). Thus, 
 is a path-connected continuous curve, unless it is just a single point. In particular, the proof of the path-connectedness is by no means trivial, and therefore, we refer the reader to consult 
Maier-Paape et al. (
2023) for more details. However, with the path-connectedness of 
 at hand, it follows easily that the sets 
I and 
J, defined in (13) and (14), respectively, are intervals.
Corollary 3  (
I and 
J are intervals; 
Maier-Paape et al. 2023, Corollary 2.74)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 is given. Then, the following holds true:- (a)
- The projections of the efficient frontier  to the axes, , as well as  from (13) and (14), respectively, are intervals. 
- (b)
- Either , and J are all just single points, or otherwise, I and J are both nondegenerate intervals, i.e., with positive length. 
 With all these notations and properties at hand, we may conclude this section with the main theorem on the parameterizations of  as graphs of  on I, as well as  on J.
Theorem 2  (Parameterization of 
 as graphs on 
I and 
J;  
Maier-Paape et al. 2023, Theorem 2.76)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 holds. Then, for I and J, defined in (13) and (14), as well as ν and γ, defined in (12) and (11), respectively, that the following holds true:- (a)
-  and  are continuous (one-sided continuous at finite endpoints). 
- (b)
- Furthermore,  and  are strictly increasing, bijective, and inverse to each other, i.e., 
- (c)
-  has the representationwhere the “exchange operator”  is defined asusing . 
 We note that, with Theorem 2, the properties of  restricted to J, as well as  restricted to I, improve significantly compared to  and  defined on the whole set , as in Proposition 2. For instance, we obtain here continuity versus semi-continuity beforehand. Similarly, the increasing property beforehand improves to strictly increasing, and, most importantly,  and  are inverse to each other, and their graphs represent . Observe that, since the graphs of  and  represent , it is evident from Theorem 1(b) that  and  have to increase strictly.
A typical situation of Theorem 2 may be viewed in 
Figure 1, where 
I and 
J are both bounded and closed. Notice that, in this example, the graph of 
 and 
 do not coincide.
However, the intervals 
I and 
J may also be open, or half-open to either side (cf. 
Figure 2).
With the “endpoints” of I and J being included or not, it appears that there should be at least sixteen different possibilities for the tuple , and thus for . In reality, however, we will see in Corollary 4(e) that there are only four different options for  concerning the endpoints of I and J.
  4. Efficient Portfolios within the General Framework of Portfolio Theory for Scalar Risk
Having investigated the efficient frontier in detail in 
Section 3, we now turn our focus to related efficient portfolios granted within the GFPT.
Theorem 3  (Continuous efficient portfolio map; 
Maier-Paape et al. 2023, Theorem 2.79)
. Assume, for a set  of admissible portfolios, as well as for extended-valued risk and utility functions  and , that Assumption 4 holds. Suppose additionally that either  is strictly concave on , i.e., (u2s) 
in Assumption 2 holds, or  is strictly convex on , i.e., (r2s) 
in Assumption 1 holds. Then, the following holds true:- (a)
- Each point , with  from Definition 4, corresponds to a unique efficient portfolio  realizing the risk–utility values . 
- (b)
- The mappingis injective and continuous (one-sided continuous at finite endpoint(s) of ). Therefore, the efficient portfolios lie on a continuous curve with no self-intersections. Furthermore, X is surjective onto the set of efficient portfolios in A. 
- (c)
- Moreover, efficient portfolios have the continuous representationsandon intervals I and J defined in (13) and (14), respectively, where ν and γ are defined in (12) and (11). 
 Under the standing assumptions from Assumption 4, a direct consequence of Definition 4 is that the existence part in Theorem 3(a) is obvious. Uniqueness, however, follows from the strictness conditions of either  or .
Apparently, with Theorem 3, all efficient portfolios lie on a (path-connected) curve. This is essential for applications. It guarantees that little changes in 
 for the minimum risk optimization problem
      
      lead to minor adaptions of the corresponding efficient portfolio solving (
18) (cf. the representation (
17), as well as the continuity of 
 due to Theorem 2(a), and the continuity of 
X on 
 due to Theorem 3(b)). Thus, fund managers are able to adjust such strategies continuously. A similar remark applies to the efficient portfolios solving the maximum utility optimization problem for given 
, i.e.,
      
For illustration purposes, we give a simple example.
Example 2  (Case of an efficient pure bond portfolio realizing minimum risk)
. Let  and  satisfy the assumptions of Theorem 3. Furthermore,  should satisfy (r1n)
 from Assumption 1 and A should contain only portfolios with unit initial cost (see Definition A4 in Appendix A). Then, the set  contains exactly one element, which is the pure bond portfolio 
 with a minimal possible risk value . In the case where its utility value  is finite, then  is in fact an efficient portfolio, so that . Hence, . Following on from Proposition 2(c), we briefly explain here how to find an efficient portfolio for a given point , whose risk is not higher than r and whose utility is not lower than .
Lemma 1  (Construction of an efficient portfolio)
. Let the situation of Proposition 2 be given. Furthermore, let . Then, there exists an efficient portfolio , such that Proof.  The proof of this lemma goes back to ideas provided in the proof of 
Maier-Paape et al. (
2023), Proposition 2.68(c). Because of its importance, we here give the following quick argument: Since 
, 
 follows. Then, by lowering 
r and increasing 
, while staying in 
, one finally reaches a point 
, which cannot be improved, so 
 results. This is a consequence of 
 for all 
 and 
 for all 
, according to Proposition 2(b). By construction, 
 and 
 is valid, and, since 
, there exists an efficient portfolio 
 such that
        
		as claimed.    □
   5. Endpoints of the Efficient Frontier within the General Framework of Portfolio Theory for Scalar Risk
Apparently, the sets 
I and 
J, defined in Corollary 1, are of great interest for this theory, since they may be used for parameterizations of the efficient frontier (see Theorem 2) and the efficient portfolios (cf. (
16) and (
17)). In this section, we investigate the “endpoints” of these intervals (cf. Corollary 3).
Definition 5  (“Endpoints” of I and J; 
Maier-Paape et al. 2023, Definition 2.81)
. For the intervals  and , defined in (13) and (14) as projections of  to the axes, we set: The above defined values may or may not lie in 
, because 
I or 
J might be unbounded. Notice that all above representations are evident using the definitions in (
13) and (
14), as well as Corollary 1(a) and (b). The next proposition, however, is a bit more involved (cf. 
Maier-Paape et al. 2023).
Proposition 3  (Alternative representations of “endpoints” of I and J; 
Maier-Paape et al. 2023, Proposition 2.82)
. Assume, for a set  of admissible portfolios, as well as extended-valued risk and utility functions  and , that Assumption 4 holds. Then, using , the following holds true: With these representations at hand, and using some technical argumentation, it is possible to show several nontrivial relations between  and  on the one hand, and between  and  on the other hand (see below).
Corollary 4  (“Endpoint” properties; 
Maier-Paape et al. 2023, Corollary 2.83)
. In the situation of Proposition 3 with  and , defined in (13) and (14), we have:- (a)
- , if and only if . 
- (b)
- If , then  and . 
- (c)
- , if and only if . 
- (d)
- If , then  and . 
- (e)
-   - (i)
- If  and , then  and . 
- (ii)
- If  and , then  and . 
- (iii)
- If  and , then  and . 
- (iv)
- If  and , then  and . 
 
 In particular, as already noted at the end of 
Section 3, according to Corollary 4(e), we obtain only four different possibilities for the tuple 
, and thus for 
.
Thus, 
Maier-Paape et al. (
2023) have examined the behavior and properties of 
 and 
 on 
J and 
I, respectively, (cf., e.g., Theorem 2) as well as the intervals 
J and 
I themselves (cf., e.g., Corollary 4) in detail. We will conclude with a brief look at how 
 and 
 behave outside 
J and 
I, respectively (cf. 
Figure 1 for an illustration). Although the respective graphs outside 
J and 
I do not contribute to the efficient frontier, the behavior of 
 and 
 there is often of technical value.
Lemma 2  (Behavior of 
 or 
 outside of 
J or 
I)
. In the situation of Proposition 3, with  and  defined in (13) and (14), the following holds:- (a)
- If , then  and  for all . 
- (b)
- If , then  and  for all . 
- (c)
-   - (i)
- If , then  for all . 
- (ii)
- If  and , then  for all . 
 
- (d)
-   - (i)
- If , then  for all . 
- (ii)
- If  and , then  for all . 
 
 Proof.  We only have to consider (a) and (c) because (b) and (d) are symmetric statements.
ad(a). Let 
. Then, by Corollary 4(c), (d), 
 with 
 follows. Furthermore, since
        
		holds, and 
 is increasing by Proposition 2(b), we obtain 
 for all 
.
 ad(c). These assertions can be shown straight forwardly with the help of Lemma 1 by using the definitions of 
 in (
20) and of 
 in (
12).    □
    6. Generalizations of the General Framework of Portfolio Theory for Vector Risk
In this section, the risk function is assumed to be vector-valued, while the utility function remains to be scalar and, as before, 
 is a set of admissible portfolios. The results of the General Framework of Portfolio Theory (GFPT) for this case are taken from 
Maier-Paape et al. (
2023, chap. 3). However, in contrast to the theory developed there for 
 dimensional risk vectors, we restrain ourselves here for simplicity and visualization reasons to 
.
Assumption 5  (Conditions on the vector risk functions; see Assumption 1 and 
Maier-Paape et al. 2023, Assumption 3.1)
. Consider a vector risk function , with lower semi-continuous components  and , where  is a set of admissible portfolios according to Definition 2. We say that:- (a)
-  satisfies one (or more) of the conditions (r1), (r1n), or (r2) if  and  satisfy (r1), (r1n), or (r2) from Assumption 1, respectively; 
- (b)
-  satisfies (r2s) if  or  satisfies (r2s) from Assumption 1. 
 In the following we simplify notation by using ≤ and ≥ componentwise; i.e., for two vectors , we have , if and only if  for  (analogously for the other operator).
Remark 2  (Risk–utility as row vectors; see 
Maier-Paape et al. 2023, Remark 3.3)
. Here, and in the following, it is convenient to have risk vectors  as row vectors. Similarly, the risk–utility vectors  are assumed to be row vectors, which is in contrast to our portfolio vectors , which are always column vectors. Similarly to Assumption 3, for the scalar risk case, we rely here on compactness assumptions as well.
Assumption 6  (Compact level sets in vector risk case; see 
Maier-Paape et al. 2023, Assumption 3.4)
. We assume for a vector-valued risk function , as in Assumption 5, and a scalar-valued utility function , as in Assumption 2, that:- (a)
- ; 
- (b)
- For all , the setsare compact. 
 
      The next proposition lifts Proposition 1 to the vector risk case.
Proposition 4  (Properties of 
; cf. 
Maier-Paape et al. 2023, Proposition 3.6)
. Assume that  is a set of admissible portfolios, as in Definition 2. In addition, assume that the vector risk function  satisfies (r2) 
in Assumption 5, and the utility function  satisfies (u2) 
in Assumption 2. We then have:- (a)
- The set of valid risk and utility valuesis convex. 
- (b)
-  implies that, for any , we have  and . 
- (c)
- Assume furthermore that Assumption 6(b) holds. Then,  is closed. 
 With all that notation at hand, we can now define efficient portfolios and the efficient frontier in the vector risk case.
Definition 6  (Efficient portfolios in vector risk case; see 
Maier-Paape et al. 2023, Definition 3.7)
. We say that a portfolio  with finite risk and utility values is Pareto efficient 
(for given vector risk function , scalar utility function , and admissible portfolios A), provided that there does not exist any portfolio  such that eitherorholds. For better understanding, it is worthwhile to compare Definition 6 with the one of the scalar risk case; see Definition 3.
Definition 7  (Efficient frontier in vector risk case; see Definition 4 and 
Maier-Paape et al. 2023, Definition 3.8)
. We call the set of (risk–utility) images of all efficient portfolios in the three-dimensional risk–utility space the efficient frontier
, and denote it by . Similarly to some of the properties of the efficient frontier for the scalar risk case given in Theorem 1, we obtain the following for the vector risk case.
Theorem 4  (Efficient frontier properties in vector risk case; confer Theorem 3.9 in 
Maier-Paape et al. 2023)
. Efficient portfolios represented in the three-dimensional risk–utility space are all located on the boundary  of the set . In case the boundary of  contains a line segment parallel to any of the three coordinate axes, on such a line segment lies, at most, one efficient portfolio. The analog of the “standing” Assumption 4 for the scalar risk case is given for the vector risk case next.
Assumption 7  (Standing assumptions for efficient trade-off in vector risk case; see 
Maier-Paape et al. 2023, Assumption 3.11)
. We assume the following properties:- (a)
-  is a set of admissible portfolios, according to Definition 2. 
- (b)
-  is a lower semi-continuous extended-valued vector risk function satisfying (r2) in Assumption 5. 
- (c)
-  is an upper semi-continuous extended-valued scalar utility function satisfying (u2) in Assumption 2. 
- (d)
- Assumption 6 concerning compact level sets holds for , and . 
 From now on, we use the following notations for risk values 
:
	  i.e., we have 
.
While we only had two auxiliary functions  and  for the scalar risk case (see Proposition 2), we now obtain three auxiliary functions for two-dimensional vector risk.
Proposition 5  (Auxiliary functions related to the efficient frontier in vector risk case; see 
Maier-Paape et al. 2023, Proposition 3.12)
. Assume, for a set  of admissible portfolios, as well as for extended-valued vector risk and scalar utility functions  and , that Assumption 7 holds. Then, the following holds true:- (a)
- . 
- (b)
- The functions , defined byand , defined byfor , are well-defined extended-valued functions. Moreover, the function  is decreasing in , increasing in μ, and lower semi-continuous as well as proper convex. The function ν is increasing (coordinate-wise), upper semi-continuous, and proper concave. 
- (c)
- . 
 In the following, using the definitions in (
26), we define the projections
      
	  for 
 and
      
	  as well as some kind of permutation mappings
      
	  for 
.
We now shift our focus to projections of the efficient frontier 
 from the three-dimensional risk–utility space to planes built by two of the three variables 
. This result is along the lines of Corollary 1 and Theorem 2(c) for the scalar risk case. In particular, the definitions in (
32) and (
35) below should be compared with the definitions of the sets 
I and 
J in (
13) and (
14).
Theorem 5  (Representation of efficient frontier in vector risk case; see Theorem 3.14 in 
Maier-Paape et al. 2023)
. Assume, for a set  of admissible portfolios, that the vector risk function  and the scalar utility function  satisfy Assumption 7. Then, the following holds true:- (a)
- (b)
- For arbitrary but fixed , we set 
 Note that Equations (
34) and (
36) provide representations of 
 as graphs of the auxiliary functions 
 and 
, respectively. In particular, we clearly obtain from (
34) and (
36) that
      
	  but also that the following holds true using, e.g., (
33) and (
34):
This can also be seen in the following example which we provide for illustration purposes.
Example 3  (Non-convex projections of 
)
. In Figure 3, we see a wooden model to illustrate the boundary of a possible set  and its efficient frontier  for the vector risk case and some fixed risk and utility functions,  and , as well as a fixed set of possible admissible portfolios  (whose specific forms are all irrelevant for now).Of course, the black “ground plate” of the wooden model in Figure 3 is just there to hold the construction. The extensions of the side lines of the ground plate to the left and to the right should be viewed as - and -axis. Perpendicular to these axes and upwards directed is the μ-axis. Note that, e.g., the facets on top  or to the right and to the left have to be extended in - and/or -direction to  to obtain all of . Similarly, the facets below are to be extended in μ-direction to . Also, the three transparent facets in front mimicked by a cord are part of . In fact, it is easy to see that only these three cord facets build . Moreover, the reader should be able to imagine, for this example, the set , i.e., the projection of  to the -plane, which is a path-connected set, but  is not convex in the case. This is remarkable because it is in contrast to the scalar risk case, where the projections of the efficient frontier to the axes, i.e., the sets I and J from (13) and (14) are always convex (see Corollary 3).  It should be furthermore noted that the representations of 
 in (
34) and (
36) are an analog of Theorem 2(c) for the vector risk case. An analog of Theorem 2(b) for the vector risk case holds as well (see (
38) and (
39) below). However, continuity of 
 and 
 is no longer granted unconditionally, although, for scalar risk, this was no problem (see Theorem 2(a)).
In consensus with definition (
26), in the following, we use the convention that 
 followed by 
 is to be interpreted as a completed vector in 
, i.e.,
      
	  for 
.
Theorem 6  (Representation of efficient frontier 2 in the vector risk case; see 
Maier-Paape et al. 2023, Corollary 3.15)
. Under the same assumptions as in Theorem 5, the following holds true:- (a)
-  is strictly increasing in each component;  is strictly increasing in μ and strictly decreasing in  (coordinate-wise) for . 
- (b)
-  and  are  inverse to each other in the following sense: 
- (c)
-  and  are (for fixed ) inverse to each other in the following sense: 
 Remark 3  (Continuity of 
 and 
 in the interior of their domains)
. As provided in Proposition 5, ν is upper semi-continuous and concave, and  is lower semi-continuous and convex for . At least in the (relative) interior of their domains, both ν and  are even continuous (cf. Rockafellar 1972, Theorem 10.1). Nevertheless, discontinuities on the boundary are possible (see Maier-Paape et al. 2023, Example 3.16, for a counterexample to continuity at the boundary). Path-connectedness of the efficient frontier in the scalar risk case was already not completely obvious (cf. Corollary 2). For the vector risk case, however, path-connectedness turns out to be a really subtle question. For that result, a few more assumptions are necessary.
Assumption 8  (Standing assumptions for connectedness in the vector risk case; see 
Maier-Paape et al. 2023, Assumption 3.27)
. Assume for a set  of admissible portfolios (cf. Definition 2) that the vector risk function  and the scalar utility function  satisfy Assumption 7. In particular, Assumption 6, concerning compact level sets, holds as well. We assume furthermore:- (a)
- The components of the risk vector are all non-negative, i.e., , for . 
- (b)
- Either (r2s) holds for all  (see Assumption 1), or  satisfies (u2s) in Assumption 2. 
 With this relatively strong assumption, the path-connectedness of 
 follows from a quite lengthy geometric proof (cf. 
Maier-Paape et al. 2023, sct. 3.2).
Theorem 7  (Path-connected efficient frontier in vector risk case; see Corollary 3.41 as well as Remark 3.29 from 
Maier-Paape et al. 2023)
. Let Assumption 8 hold true, and let the components  be continuous on . Then, the set  is path-connected. Finally, we report results on the uniqueness of efficient portfolios and properties of the efficient portfolio map (cf. Theorem 3 for the scalar risk case).
Theorem 8  (Uniqueness of efficient portfolios for the vector risk–utility trade-off; see 
Maier-Paape et al. 2023, Theorem 3.46)
. Let Assumption 7 be satisfied. Denote by  the set of efficient portfolios corresponding to . Then,  is an upper semi-continuous multifunction (cf. Definition A2 in Appendix A) on its domain .In addition, suppose that either the vector risk function  satisfies (r2s) in Assumption 5, or the scalar utility function  satisfies condition (u2s) in Assumption 2. Then,  is single-valued and continuous. In particular,  is also injective.
 Theorem 9  (Topological properties of the efficient portfolio set; see Corollary 3.47 in 
Maier-Paape et al. 2023)
. In the situation of Theorem 5 and Theorem 7, the sets  from (32) and , from (35) are path-connected. Furthermore, the efficient portfolio map ,  from Theorem 8 is continuous in this situation and, thus, the set of efficient portfolios is path-connected as well. Moreover, the efficient portfolios can be parameterized as a graph over  or , respectively, i.e., bothandyield all efficient portfolios for given , and A. Thus, according to Remark 3,  and  are continuous in the relative interior of N and  for , respectively. Having the path-connectedness of 
 at hand, it is again worthwhile to note that this enables fund managers to adjust their strategies continuously, at least when parameters from the relative interior of 
 or 
 are used. The corresponding optimization problems to find efficient portfolios are similar to (
18) and (
19): firstly, the maximum utility problem
      
	  and, secondly, the two minimum risk optimization problems 
In conclusion, although the notation and proofs are a bit more involved for the vector risk case, many of the results for scalar risk remain valid for the vector risk case as well.