Defending against speculative attacks - It is risky, but it can pay off

被引:6
|
作者
Erler, Alexander [1 ]
Bauer, Christian [2 ]
Herz, Bernhard [1 ]
机构
[1] Univ Bayreuth, Dept Law & Econ, Chair Int Econ & Finance, D-95440 Bayreuth, Germany
[2] Univ Trier, Chair Monetary Econ, D-54286 Trier, Germany
关键词
Exchange rate; Currency crisis; Monetary policy; CURRENCY CRISES; BEHAVIOR; OUTPUT;
D O I
10.1016/j.jbankfin.2014.03.036
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
While currency crises are typically considered to be painful and costly events, a closer look reveals that economic developments after a speculative attack differ considerably. Monetary authorities can play a central role in determining the economic course and costs of currency crises. They have to decide whether to defend or not to defend the domestic currency giving rise to three different types of crises: (i) an immediate depreciation if the central bank does not intervene and either (ii) a successful defense or (iii) an unsuccessful defense in the case of an intervention. We find that a central bank has two options to mitigate the costs of speculative attacks, namely an immediate depreciation and a successful defense. If a central bank intervenes she might be able to stabilize the exchange rate only temporarily and risks to ultimately fail facing the worst of the three scenarios with the highest economic costs. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:309 / 330
页数:22
相关论文
共 50 条
  • [1] Defending against speculative attacks: The policy maker's reputation
    Huang, Chong
    [J]. JOURNAL OF ECONOMIC THEORY, 2017, 171 : 1 - 34
  • [2] Trust Management for Defending On-Off Attacks
    Chae, Younghun
    DiPippo, Lisa Cingiser
    Sun, Yan Lindsay
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 1178 - 1191
  • [3] Does it pay to defend against a speculative attack?
    Eichengreen, B
    Rose, AK
    [J]. MANAGING CURRENCY CRISES IN EMERGING MARKETS, 2003, : 61 - 85
  • [4] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    [J]. UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [5] Defending Against Backdoor Attacks by Quarantine Training
    Yu, Chengxu
    Zhang, Yulai
    [J]. IEEE ACCESS, 2024, 12 : 10681 - 10689
  • [6] Defending against adversarial attacks by randomized diversification
    Taran, Olga
    Rezaeifar, Shideh
    Holotyak, Taras
    Voloshynovskiy, Slava
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 11218 - 11225
  • [7] Defending against Sybil attacks in sensor networks
    Zhang, QH
    Wang, P
    Reeves, DS
    Ning, P
    [J]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 185 - 191
  • [8] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [9] Defending against denial of service attacks in scout
    Spatscheck, O
    Peterson, LL
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), 1999, : 59 - 72
  • [10] Defending against terrorist attacks with limited resources
    Powell, Robert
    [J]. AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) : 527 - 541