Showing 1 - 10 of 11
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005357445
Using exchange rate data on five currencies vis-à-vis the US dollar, this paper examines the insample and out-of-sample performance of exchange rate equations derived from alternative empirical and optimal interest rate rules. These rules could have either homogeneous or heterogeneous response...
Persistent link: https://www.econbiz.de/10009209838
We explore the role of interest rate policy in the exchange rate determination process. Specifically, we derive exchange rate equations from interest rate rules that are theoretically optimal under a few alternative settings. The exchange rate equation depends on its underlying interest rate...
Persistent link: https://www.econbiz.de/10009294099
We explore the role of interest rate policy in the exchange rate determination process. Specifically, we derive exchange rate equations from interest rate rules that are theoretically optimal under a few alternative settings. The exchange rate equation depends on its underlying interest rate...
Persistent link: https://www.econbiz.de/10009321846
This study evaluates the role market competition plays in determining inflation based on sector-level data from OECD countries. In theory, trade openness can affect inflation through changes in market competitiveness and productivity. Nonetheless, previous empirical studies often fail to account...
Persistent link: https://www.econbiz.de/10009391719
This study evaluates the role market competition plays in determining inflation based on sectorlevel data from OECD countries. In theory, trade openness can affect inflation through changes in market competitiveness and productivity. Nonetheless, previous empirical studies often fail to account...
Persistent link: https://www.econbiz.de/10009421805
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005766165
Persistent link: https://www.econbiz.de/10005127411
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005066640
Persistent link: https://www.econbiz.de/10005413732