The Search for Someone to Save: A Defensive Case for the Priority of Secured Credit

Oxford Journal of Legal Studies 22 (4):687-728 (2002)
  Copy   BIBTEX

Abstract

The priority of secured credit has repeatedly and famously been attacked for allowing the exploitation of certain types of unsecured creditor. It has also been blamed for creating inefficiencies. This paper examines these arguments specifically as applied to this jurisdiction, and using both theoretical analysis and recent empirical data, suggests none of them can be sustained. It is argued that security is unlikely to lead to the exploitation of involuntary, ‘uninformed’, or ‘unsophisticated’ creditors, since the perverse incentives it allegedly creates for the debtor's management are likely to be outweighed by the managers' liquidation‐related costs. It is then pointed out that both exploitation‐based and inefficiency‐based attacks on the priority of secured credit depend on the assumption that secured credit is generally cheaper than unsecured credit, and further, that this is why debtors prefer to borrow on a secured rather than unsecured basis. Recent evidence from this jurisdiction is used to challenge this assumption. This has dramatic implications for the attacks on security, which are discussed. The paper concludes with the demonstration that secured credit, by inducing creditors to lend when they would not do so without being offered priority, is mutually value‐enhancing for all types of creditor, including unsecured ones

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,779

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Should Access to Credit be a Right?Marek Hudon - 2009 - Journal of Business Ethics 84 (1):17-28.

Analytics

Added to PP
2013-12-09

Downloads
25 (#622,862)

6 months
8 (#507,683)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references