Showing 1 - 10 of 28
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10003763942
Persistent link: https://www.econbiz.de/10003888034
Persistent link: https://www.econbiz.de/10003974920
Persistent link: https://www.econbiz.de/10003303732
Persistent link: https://www.econbiz.de/10001221350
Persistent link: https://www.econbiz.de/10001244060
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10010264454
We observe that daily highs and lows of stock prices do not diverge over time and, hence, adopt the cointegration concept and the related vector error correction model (VECM) to model the daily high, the daily low, and the associated daily range data. The in-sample results attest the importance...
Persistent link: https://www.econbiz.de/10010277079
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10012753434
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10012718756