Threat To Dollar As The Term Paper

The willingness of the foreign central banks to continue lending money to the U.S. has enabled Americans to sustain their consumer economy and to live beyond their means. The profligate nature of the American consumers is reflected in the personal savings rate in the U.S. (about 1% of disposable income) as compared to over 40% in China. (Gundzik, Para on "Consumption vs. investment") However, indefinite support of the rising U.S. current accounts deficit by foreign banks is unlikely. Private foreign investors have already stopped investing in the U.S. since America now has the lowest real (in fact negative) interest rates in the world and over-valued stock and real estate markets. The Asian central banks have been making noises about diversifying their foreign exchange reserves that are almost exclusively in U.S. dollars. They now have an alternative currency (the Euro) that can perform the role of a joint reserve currency. Most of all, the Bush administration is itself undermining the dollar's position as the world's reserve currency by not being overly concerned about its further devaluation, whose value, according to some analysts could be halved if the foreign central banks stop supporting it.

The loss of the dollar's status as the global reserve currency...

...

It would result in an economy in which consumption is limited by domestic production, and its borrowing is capped by its domestic savings. Moreover, the Americans' standard of living would fall way below its current levels and the U.S. government would be unable to sustain expensive foreign adventures such as the Iraqi occupation and its foreign policy plans to extend democracy all over the world.
Works Cited

Gundzik, Jephraim P. "U.S. begging for dollar devaluation." Asia Times Online. May 13, 2005. May 17, 2005. http://www.atimes.com/atimes/China/GE13Ad02.html

Roubini, Nouriel and Brad Setser. "The U.S. As a Net Debtor: The Sustainability of the U.S. External Imbalances." (Nov 2004). May 17, 2005. http://pages.stern.nyu.edu/~nroubini/papers/Roubini-Setser-U.S.-External-Imbalances.pdf

Jephraim P. Gundzik. "U.S. begging for dollar devaluation." (May 13, 2005) Asia Times Online

Due to their high quality and low cost

According to Bank of International Settlements (BIS) estimates, central banks provided $441 billion of the $531 billion needed to finance the United States' 2003 current account deficit. (Roubini and Setser 2004, p. 4)

Reserve Currency

Sources Used in Documents:

Works Cited

Gundzik, Jephraim P. "U.S. begging for dollar devaluation." Asia Times Online. May 13, 2005. May 17, 2005. http://www.atimes.com/atimes/China/GE13Ad02.html

Roubini, Nouriel and Brad Setser. "The U.S. As a Net Debtor: The Sustainability of the U.S. External Imbalances." (Nov 2004). May 17, 2005. http://pages.stern.nyu.edu/~nroubini/papers/Roubini-Setser-U.S.-External-Imbalances.pdf

Jephraim P. Gundzik. "U.S. begging for dollar devaluation." (May 13, 2005) Asia Times Online

Due to their high quality and low cost


Cite this Document:

"Threat To Dollar As The" (2005, May 20) Retrieved May 15, 2024, from
https://www.paperdue.com/essay/threat-to-dollar-as-the-64978

"Threat To Dollar As The" 20 May 2005. Web.15 May. 2024. <
https://www.paperdue.com/essay/threat-to-dollar-as-the-64978>

"Threat To Dollar As The", 20 May 2005, Accessed.15 May. 2024,
https://www.paperdue.com/essay/threat-to-dollar-as-the-64978

Related Documents

Dollar General Stores Inc. DG) is one of the largest retail chains in the United States. Established in 1939, DG has been serving more than 40 markets in the country with almost 10,000 stores. The Company is headquartered in Goodlettsville, Tennessee but has retail stores in all the major and small cities and towns of the country. In its full owned retail stores, DG sells an extremely wide variety of

Threats to Ownership and Copyright of Intellectual Property The intellectual property (IP) is defined as an original creative work, which may be tangible or intangible form legally protected by law. (Raman, 2004). The intellectual properties include the rights to scientific, artistic and literary works. Moreover, IP covers the invention of human endeavor, scientific discoveries, and industrial design. A current revolution of information technology has made IPs the greatest assets of assets.

According to an article entitled "Three Vulnerability Assessment Tools Put to the Test" Vulnerability assessment systems scan operating systems and applications for potential problems, such as the use of default passwords or configurations and open ports. This can give administrators a head start in fixing problems and will, hopefully, let IT organizations more effectively beat bad guys to the punch." The above factors are only true when vulnerability systems find all

Terrorism in Seattle Even before the World Trade Center attack in September, 2011, most major cities in the United States were not only aware, but anticipatory regarding the potential for a terrorist attack. Seattle has been fortunate in that it has never experienced an actual international attack, but has had three major domestic incidents since 1999 that continue to be in the minds of Emergency Management professionals. In 1999, Ahmed Ressam,

San Dollar Boat Charters
PAGES 6 WORDS 1838

Sand Dollar Boat Charters There are several different things that can pose barriers to entry into a new business. Some barriers to entry are government intervention (regulation, limits on entry), or naturally occurring barriers to entry such as high fixed costs, a steep knowledge curve or the structure of the industry (Investopedia, 2013). There are few barriers to entry in the boat rental industry. Startup costs are relatively low, and even the

They include the use of stealthy tactics, tools and techniques in order to avoid detection by antimalware software. The second goal is to create a backdoor that allows the attackers to gain greater access to the compromised software especially if other access points are discovered or patched. The third goal is to initiate the primary mission of the attackers which may be to steal sensitive information, monitor communications or