A proposer requires a veto player’s approval to change a status quo. Proposer is uncertain about Vetoer’s preferences. We show that Vetoer is typically given a non-singleton menu, or delegation set, of options to pick from. The optimal set balances the extent of compromise with the risk of a veto. We identify conditions for certain delegation sets to emerge, including “full delegation”: Vetoer can choose any action between the status quo and Proposer’s ideal action. By contrast to expertise-based delegation, Proposer gives less discretion to Vetoer when their preferences are more (likely to be) aligned. (JEL D72, D82)
more »
« less
Veto Threat Bargaining with a Bicameral Congress
According to the conventional view, presidents are largely bereft of influence with an opposition-controlled Congress. Congress sends them legislation with a “take it or leave it” choice that maximizes the preferences of the opposition majority while minimizing presidents’ preferences. To extricate themselves from this bind, presidents threaten vetoes. Past research suggests that their efforts largely fail, however, for two model-driven reasons: first, veto threats amount to minimally informative “cheap talk,” and second, Congress is a unitary actor with firm control over its agenda. We relax both assumptions, bringing veto rhetoric into a setting more closely resembling real-world conditions. Presidents transmit credible veto threats to a heterogeneous, bicameral Congress where chamber rules enable the minority party to wield some influence over legislation. Examining the legislative histories of all veto-threatened bills passed between 1985 and 2016, we confirm that veto threats ward off about half of veto-targeted legislative provisions—a far greater share than for comparable unthreatened provisions. The House of Representatives is more likely to introduce and pass legislation objectionable to presidents and the Senate is more likely to accommodate presidents, findings consistent with the textbook description of the modern bicameral Congress.
more »
« less
- Award ID(s):
- 1655792
- PAR ID:
- 10547358
- Publisher / Repository:
- SAGE Publications
- Date Published:
- Journal Name:
- Political Research Quarterly
- Volume:
- 74
- Issue:
- 3
- ISSN:
- 1065-9129
- Format(s):
- Medium: X Size: p. 628-644
- Size(s):
- p. 628-644
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
We study sequential bargaining between a proposer and a veto player. Both have single‐peaked preferences, but the proposer is uncertain about the veto player's ideal point. The proposer cannot commit to future proposals. When players are patient, there can be equilibria with Coasian dynamics: the veto player's private information can largely nullify proposer's bargaining power. Our main result, however, is that under some conditions there also are equilibria in which the proposer obtains the high payoff that he would with commitment power. The driving force is that the veto player's single‐peaked preferences give the proposer an option to “leapfrog,” that is, to secure agreement from only low‐surplus types early on to credibly extract surplus from high types later. Methodologically, we exploit the connection between sequential bargaining and static mechanism design.more » « less
-
Background: Biologics is an exciting and growing area of medicine. Within the larger field of biologics, the use of viral vectors and virus-like particles (VLPs) is increasingly common, making it crucial to develop innovative and practical unit operations for the related purification process. Objective: Some scientists and engineers propose that membrane-based downstream virus purification (MVP) platforms would allow for more scalable and cost-effective production of these critical particles. However, the so-cial, political, and ethical implications of these advancements remain largely unex-plored. This paper aims to explore various pivotal facets of MVP technology govern-ance and regulations within the U.S. context, including (1) government policy ar-rangements related to the implementation of the technologies, (2) stakeholder atti-tudes, policy preferences, and behaviors, and (3) the fundamental factors that shape these attitudes, policy preferences, and behaviors. Methods: In doing so, we analyze publicly available federal and state government documents pertaining to biomanu-facturing, healthcare, and legislative attempts. Additionally, we will perform a stake-holder analysis on relevant industries, healthcare service providers, and recipients. Conclusions: Our goal is to outline the socio-political, ethical, and regulatory factors pertaining to the regulation and governance of these technologies.more » « less
-
Privacy is a hot topic for policymakers across the globe, including the United States. Evolving advances in AI and emerging concerns about the misuse of personal data have pushed policymakers to draft legislation on trustworthy AI and privacy protection for its citizens. This paper presents the state of the privacy legislation at the U.S. Congress and outlines how voice data is considered as part of the legislation definition. This paper also reviews additional privacy protection for children. This paper presents a holistic review of enacted and proposed privacy laws, and consideration for voice data, including guidelines for processing children’s data, in those laws across the fifty U.S. states. As a groundbreaking alternative to actual human data, ethically generated synthetic data allows much flexibility to keep AI innovation in progress. Given the consideration of synthetic data in AI legislation by policymakers to be relatively new, as compared to that of privacy laws, this paper reviews regulatory considerations for synthetic data.more » « less
-
Development of a comprehensive legal privacy framework in the United States should be based on identification of the common deficiencies of privacy policies. We attempt to delineate deficiencies by critically analyzing the privacy policies of mobile apps, application suites, social networks, Internet Service Providers, and Internet-of-Things devices. Whereas many studies have examined readability of privacy policies, few have specifically identified the information that should be provided in privacy policies but is not. Privacy legislation invariably starts a definition of personally identifiable information. We find that privacy policies’ definitions of personally identifiable information are far too restrictive, excluding information that does not itself identify a person but which can be used to reasonably identify a person, and excluding information paired with a device identifier which can be reasonably linked to a person. Legislation should define personally identifiable information to include such information, and should differentiate between information paired with a name versus information paired with a device identifier. Privacy legislation often excludes anonymous and de-identified information from notice and choice requirements. We find that privacy policies’ descriptions of anonymous and de-identified information are far too broad, including information paired with advertising identifiers. Computer science has repeatedly demonstrated that such information is reasonably linkable. Legislation should define these categories of information to align with technological abilities. Legislation should also not exempt de-identified information from notice requirements, to increase transparency. Privacy legislation relies heavily on notice requirements. We find that, because privacy policies’ disclosures of the uses of personal information are disconnected from their disclosures about the types of personal information collected, we are often unable to determine which types of information are used for which purposes. Often, we cannot determine whether location or web browsing history is used solely for functional purposes or also for advertising. Legislation should require the disclosure of the purposes for each type of personal information collected. We also find that, because privacy policies disclosures of sharing of personal information are disconnected from their disclosures about the types of personal information collected, we are often unable to determine which types of information are shared. Legislation should require the disclosure of the types of personal information shared. Finally, privacy legislation relies heavily on user choice. We find that free services often require the collection and sharing of personal information. As a result, users often have no choices. We find that whereas some paid services afford users a wide variety of choices, paid services in less competitive sectors often afford users few choices over use and sharing of personal information for purposes unrelated to the service. As a result, users are often unable to dictate which types of information they wish to allow to be shared, and which types they wish to allow to be used for advertising. Legislation should differentiate between take-it-or-leave it, opt-out, and opt-in approaches based on the type of use and on whether the information is shared. Congress should consider whether user choices should be affected by the presence of market power.more » « less
An official website of the United States government
