Showing 1 - 10 of 1,248
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10003763942
Persistent link: https://www.econbiz.de/10003888034
Persistent link: https://www.econbiz.de/10003974920
Persistent link: https://www.econbiz.de/10003303732
Persistent link: https://www.econbiz.de/10001221350
Persistent link: https://www.econbiz.de/10001244060
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10010264454
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10012753434
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10012718756
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005357445