Defending against speculative attacks - It is risky, but it can pay off

被引:6
|
作者
Erler, Alexander [1 ]
Bauer, Christian [2 ]
Herz, Bernhard [1 ]
机构
[1] Univ Bayreuth, Dept Law & Econ, Chair Int Econ & Finance, D-95440 Bayreuth, Germany
[2] Univ Trier, Chair Monetary Econ, D-54286 Trier, Germany
关键词
Exchange rate; Currency crisis; Monetary policy; CURRENCY CRISES; BEHAVIOR; OUTPUT;
D O I
10.1016/j.jbankfin.2014.03.036
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
While currency crises are typically considered to be painful and costly events, a closer look reveals that economic developments after a speculative attack differ considerably. Monetary authorities can play a central role in determining the economic course and costs of currency crises. They have to decide whether to defend or not to defend the domestic currency giving rise to three different types of crises: (i) an immediate depreciation if the central bank does not intervene and either (ii) a successful defense or (iii) an unsuccessful defense in the case of an intervention. We find that a central bank has two options to mitigate the costs of speculative attacks, namely an immediate depreciation and a successful defense. If a central bank intervenes she might be able to stabilize the exchange rate only temporarily and risks to ultimately fail facing the worst of the three scenarios with the highest economic costs. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:309 / 330
页数:22
相关论文
共 50 条
  • [31] Defending Against Model Stealing Attacks with Adaptive Misinformation
    Kariyappa, Sanjay
    Qureshi, Moinuddin K.
    [J]. 2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 767 - 775
  • [32] Defending Against Poisoning Attacks in Federated Learning with Blockchain
    Dong N.
    Wang Z.
    Sun J.
    Kampffmeyer M.
    Knottenbelt W.
    Xing E.
    [J]. IEEE Transactions on Artificial Intelligence, 2024, 5 (07): : 1 - 13
  • [33] Defending Against Cyber-Attacks on the Internet of Things
    Abdalrahman, Ghazi Abdalla
    Varol, Hacer
    [J]. 2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [34] Defending Against Byzantine Attacks in Quantum Federated Learning
    Xia, Qi
    Tao, Zeyi
    Li, Qun
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 145 - 152
  • [35] Lessons Learned: Defending Against Property Inference Attacks
    Stock, Joshua
    Wettlaufer, Jens
    Demmler, Daniel
    Federrath, Hannes
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 312 - 323
  • [36] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [37] Defending Against Membership Inference Attacks on Beacon Services
    Venkatesaramani, Rajagopal
    Wan, Zhiyu
    Malin, Bradley A.
    Vorobeychik, Yevgeniy
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (03)
  • [38] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [39] Defending against Flooding Attacks in the Internet of Drones Environment
    Pu, Cong
    Zhu, Pingping
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [40] An unsupervised strategy for defending against multifarious reputation attacks
    Xin Wang
    Shu-juan Ji
    Yong-quan Liang
    Ho-fung Leung
    Dickson K.W. Chiu
    [J]. Applied Intelligence, 2019, 49 : 4189 - 4210