the efficient breach fallacy daniel friedmann the journal...

25
The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal Studies, Vol. 18, No. 1. (Jan., 1989), pp. 1-24. Stable URL: http://links.jstor.org/sici?sici=0047-2530%28198901%2918%3A1%3C1%3ATEBF%3E2.0.CO%3B2-0 The Journal of Legal Studies is currently published by The University of Chicago Press. Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/journals/ucpress.html. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. JSTOR is an independent not-for-profit organization dedicated to and preserving a digital archive of scholarly journals. For more information regarding JSTOR, please contact [email protected]. http://www.jstor.org Mon Mar 12 06:54:33 2007

Upload: others

Post on 12-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal

The Efficient Breach Fallacy

Daniel Friedmann

The Journal of Legal Studies, Vol. 18, No. 1. (Jan., 1989), pp. 1-24.

Stable URL:

http://links.jstor.org/sici?sici=0047-2530%28198901%2918%3A1%3C1%3ATEBF%3E2.0.CO%3B2-0

The Journal of Legal Studies is currently published by The University of Chicago Press.

Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available athttp://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtainedprior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content inthe JSTOR archive only for your personal, non-commercial use.

Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained athttp://www.jstor.org/journals/ucpress.html.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printedpage of such transmission.

JSTOR is an independent not-for-profit organization dedicated to and preserving a digital archive of scholarly journals. Formore information regarding JSTOR, please contact [email protected].

http://www.jstor.orgMon Mar 12 06:54:33 2007

Page 2: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 3: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 4: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 5: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 6: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 7: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 8: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 9: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 10: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 11: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 12: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 13: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 14: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 15: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 16: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 17: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 18: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 19: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 20: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 21: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 22: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 23: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 24: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal
Page 25: The Efficient Breach Fallacy Daniel Friedmann The Journal ...danielfriedmann.com/wp-content/uploads/2010/12... · The Efficient Breach Fallacy Daniel Friedmann The Journal of Legal