Showing 1 - 10 of 18
Persistent link: https://www.econbiz.de/10001244060
Persistent link: https://www.econbiz.de/10001221350
Persistent link: https://www.econbiz.de/10003888034
Persistent link: https://www.econbiz.de/10003974920
Persistent link: https://www.econbiz.de/10003303732
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10003763942
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10010264454
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005766165
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals...
Persistent link: https://www.econbiz.de/10005357445
Persistent link: https://www.econbiz.de/10005127411