Download Thepdf

Total Page:16

File Type:pdf, Size:1020Kb

Download Thepdf Volume 61, Issue 3 Page 629 Stanford Law Review LEGISLATIVE THREATS Guy Halfteck © 2008 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 61 STAN. L. REV. 629 (2008). For information visit http://lawreview.stanford.edu. HALFTECK 61 STAN.L.REV. 629 CORRECTED 2/8/2009 7:48 PM LEGISLATIVE THREATS Guy Halfteck* This Article introduces a theory of legislative threats that not only pierces the fundamental construction of the legal system as a social regulatory institution but, more fundamentally, shows that the conventional wisdom on the role of the legal system in achieving and maintaining social order cannot explain how modern social control actually works. Contrary to received wisdom, the theory demonstrates that the threat of legislation—rather than legislation itself—plays a remarkable role in controlling behavior, in creating and setting incentives, and in maintaining social order. Conceptually, legislative threats encompass threats that legislators exert on target entities—including banks and financial institutions, manufacturing corporations, professions, industrial sectors and trade bodies, universities and other public institutions, and federal agencies and U.S. states—according to which the legislator will exercise her legislative power and enact adverse legislation to regulate the conduct in question unless the threat recipients modify their conduct in line with the legislator’s demands. Implicit in the threat is the inverse promise that the legislator will forgo the threatened legislation if, and only if, threat recipients duly meet these demands. The Article examines ten case studies drawn from diverse areas of social policy, which demonstrate both the pervasive use of threats and their formidable regulatory capacity. The Article also offers an analytic taxonomy that delineates the conceptual boundaries of legislative threats and enhances the precision of the analytic inquiry: this taxonomy includes explicit, implicit, and anticipatory legislative threats. The Article borrows tools and insights from the field of game theory to model the strategic interaction between legislators and target firms as a noncooperative game. This model yields clear and insightful predictions regarding the inducement effect of legislative threats—namely, the capacity of legislative threats to induce target entities to modify their behavior so as to avert the risk and consequences of the threatened legislation. The inducement effect, it is shown, depends on: (i) the credibility condition—namely, whether threat recipients believe that the threat is credible or, rather, mere “cheap talk”; and * General Counsel, Solow Realty & Development Company, LLC, New York, New York. S.J.D., Harvard University (2003); LL.M., Columbia University (2000); LL.B., Hebrew University (1998). I wish to thank Alex Stein for his insightful comments, astute advice and unwavering support. I also wish to thank Jessica Eisenthal for her meticulous editing of this Article as well as the editors of the Stanford Law Review for their thorough review and excellent substantive comments and proposals. The opinions expressed in this Article—as well as any errors—are mine. 629 HALFTECK 61 STAN.L.REV. 629 CORRECTED 2/8/2009 7:48 PM 630 STANFORD LAW REVIEW [Vol. 61:629 (ii) the effectiveness condition—that is, whether the perceived probability that the threatened legislation will be enacted into law is sufficiently high. The analysis also demonstrates how legislators’ commitments, reputation, and motivations affect the credibility of threats and, consequently, their inducement effect on the conduct of target firms. Because threats are often directed towards groups as a whole (rather than to a single firm), the Article explains the counterintuitive effects of strategic interaction within groups on compliance with such threats (giving special attention to homogenous or heterogeneous as well organized or unorganized ones). In this respect, the Article develops the claim that compliance with legislative threats is, essentially, an informal political bargain in which a legislator barters the non-use of legislative power (with respect to a particular issue) in return for firms’ commitment to change their conduct. Thus, by focusing on bargaining in the shadow of legislative threats, the Article identifies two important, interrelated effects: (i) exerting legislative threats elicits valuable information from target entities, which in turn reduces transaction costs, facilitates efficient regulatory bargaining, and decreases the contractual incompleteness of the regulatory bargain; and (ii) regulatory bargaining provides an opportunity to craft superior measures that are necessary to effectively address the issues initially targeted by the legislator’s threat. Overall, legislative threats encompass a powerful, innovative mechanism that legislators and regulators frequently employ as a means for exercising their institutional mandate to control social conduct and effect public policy. The emergence and prevalence of legislative threats therefore appear to be driven by the unprecedented functional challenges that modern legislators confront as they try to maintain social order in a highly dynamic social reality. Hence, this spontaneous solution seems to have emerged as a response to the functional limits of the law and the systemic failures of lawmakers. Further, the ever- increasing use of legislative threats represents a trend towards second-order social control where legislators, rather than dictating first-order rules of conduct, opt for second-order rules designed to create the incentives necessary to induce firms and groups to devise desirable social control measures on their own. Inevitably, this trend is bound to diminish the extensive role that the regulatory state has traditionally performed in directing social and economic life and, at the same time, increase the power of groups. INDEX OF FIGURES AND TABLES ............................................................................631 INTRODUCTION.......................................................................................................631 I. THE CONVENTIONAL WISDOM ON SOCIAL CONTROL .......................................639 II. LEGISLATIVE THREATS AS REGULATORS OF CONDUCT ...................................645 A. Legislators and the Reality of Legislative Business ...................................645 1. Cybersecurity ......................................................................................648 2. E-piracy...............................................................................................649 3. Digital obscenity .................................................................................651 4. Executive compensation......................................................................651 5. Money laundering ...............................................................................652 6. Toxic-waste recycling..........................................................................653 7. Greenhouse-gas emissions..................................................................654 8. Automobile air pollution .....................................................................655 HALFTECK 61 STAN.L.REV. 629 CORRECTED 2/8/2009 7:48 PM December 2008] LEGISLATIVE THREATS 631 9. Commercial leases ..............................................................................655 10. Illegal substances................................................................................656 B. An Analytic Taxonomy of Legislative Threats............................................657 1. Explicit legislative threats...................................................................658 2. Implicit legislative threats...................................................................659 3. Anticipatory legislative threats ...........................................................661 III. HOW DO LEGISLATIVE THREATS REGULATE SOCIAL CONDUCT AND INDUCE SOCIAL CHANGE?................................................................................663 A. A Game-Theoretic Model of Legislative Threats .......................................665 1. The rules of the game ..........................................................................666 2. The information structure of the game................................................667 3. The game’s underlying assumptions ...................................................668 4. A game-tree representation.................................................................671 B. The Model’s Predictions ............................................................................671 1. Predicting the players’ equilibrium behavior .....................................673 2. Refining the predictions: Incorporating the notion of probabilistic threats .................................................................................................675 3. Extending the analysis to games with perfect and imperfect information..........................................................................................680 IV. CREDIBILITY AND THE INDUCEMENT EFFECT OF LEGISLATIVE THREATS ........687 A. The Role of Commitments...........................................................................689 B. The Role of Reputation...............................................................................692 C. The Role of Emotions .................................................................................695 V. THE EFFECTS
Recommended publications
  • Mirrored Externalities Lisa Grow Sun BYU Law School
    Notre Dame Law Review Volume 90 | Issue 1 Article 4 11-2014 Mirrored Externalities Lisa Grow Sun BYU Law School Brigham Daniels BYU Law School Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Part of the Property Law and Real Estate Commons Recommended Citation 90 Notre Dame L. Rev. 135 (2014) This Article is brought to you for free and open access by the Notre Dame Law Review at NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. \\jciprod01\productn\N\NDL\90-1\NDL104.txt unknown Seq: 1 8-DEC-14 14:39 MIRRORED EXTERNALITIES Lisa Grow Sun* and Brigham Daniels** ABSTRACT A fundamental but underappreciated truth is that positive and negative externalities are actually mirror reflections of each other. What we call “mirrored externalities” exist because any action with externalities associated with it can be described as a choice to do or to refrain from doing that particular action. For example, if a person smokes and thereby creates a negative externality of more secondhand smoke, then her choice not to smoke creates a positive externality of less secondhand smoke. Conversely, if a person’s choice to get an immunization confers a positive externality of reducing vectors for disease transmission, then a choice not to get an immu- nization necessarily imposes negative externalities on third parties in the form of more vectors for disease. In each set, the negative externalities are the inverse—the mirror image—of the positive externalities.
    [Show full text]
  • Real Estate Issues®
    36654_CRE_Cvr:36654_CRE_Cvr 11/14/08 7:33 AM Page A REAL ESTATE ISSUES REAL ESTATE REAL ESTATE ISSUES® Published by THE COUNSELORS OF REAL ESTATE Volume 33, Number 3, 2008 Published by THE COUNSELORS OF REAL ESTATE Special Focus Issue: Understanding The Business of Green www.cre.org Shifting the Sustainability Paradigm: Expanding the Principles of Performance From Advocacy to Good Business to Sustainable Buildings Ujjval K. Vyas, Ph.D., J.D., and Susanne E. Cannon, Ph.D., CRE James E. Woods, Ph.D., P.E. Weather-Related Losses in the Built Environment: Sustainable Buildings and the Surety Societal Change and Climate Change Bryan M. Seifert, Esq. Roger Pielke, Jr. Legal Issues Arising Out Of Selling and Governing the Green Project: Green Building Legislation Owner Risks in Marketing, Entitlement Stephen T. Del Percio, Esq. and Project Governance Energy Performance in Residential Green Paul D’Arelli, Esq. Developments: A Florida Case Study Greening the Standard of Care: Pierce Jones, Ph.D., and Ujjval K. Vyas, Ph.D., J.D. Evolving Legal Standards of Practice for Green Building Representations and the the Architect in a Sustainable World Emerging Potential for Securities Fraud Liability Frederick F. Butters, FAIA, Esq. Brian D. Anderson, Esq. Trust, but Verify: Blinded by the (Green) Light: Building Enclosure Commissioning The Rise of Environmentalism and in Sustainable Design a New Vocabulary–Four Perspectives Daniel J. Lemieux, AIA Richard Shields Volume 33, Number 3, 2008 Volume 430 N. Michigan Ave. Chicago, IL 60611-4089 Telephone: 312.329.8427 E-mail: [email protected] Web site: www.cre.org www.cre.org 36654_CRE_Cvr 11/10/08 11:01 AM Page B THE CRE MISSION To be the forum for leaders in real estate.
    [Show full text]
  • Confronting the Rise of Authoritarianism During the COVID-19 Pandemic Should Be a Priority for Critical Geographers and Social Scientists
    Confronting the rise of authoritarianism during the COVID-19 pandemic should be a priority for critical geographers and social scientists Dragos Simandan, Claus Rinner, Valentina Capurri Abstract: The aim1 of this paper is to encourage critical geographers and social scientists to take a stronger, more explicit, and more intellectually rigorous anti-authoritarian stance against the problematic public response to the COVID-19 pandemic. To do so effectively, what is urgently needed is to contribute to the emerging body of academic research documenting the devastating political economy of lockdowns and other non-pharmaceutical interventions, and arguing for a more proportionate pandemic response. This necessitates a genuinely critical approach that (a) avoids the tunnel vision of minimizing only one specific form of harm (COVID-19 deaths and illnesses) and (b) cultivates instead a more encompassing sense of solidarity, grounded in the careful documenting of the multiple, long-term, harms caused by that tunnel vision. Key words: COVID-19; authoritarianism; geographical political economy; critical social science 1 Recommended citation format: Simandan, D., Rinner, C., Capurri, V., 2021. Confronting the rise of authoritarianism during the COVID-19 pandemic should be a priority for critical geographers and social scientists. ACME: An International Journal for Critical Geographies. Affiliations of authors: Dragos Simandan, corresponding author (Brock University, Canada; [email protected]); Claus Rinner (Ryerson University, Canada), Valentina Capurri (Ryerson University, Canada). 1 Introduction The purpose of this paper is to encourage critical geographers and social scientists to take a stronger, more explicit anti-authoritarian stance against the problematic public response to the COVID-19 pandemic. To be sure, there have already been published academic debates concerning geographers’ reaction to the pandemic, with special issues dedicated to the topic in Dialogues in Human Geography (vol.
    [Show full text]
  • Corrupted Infrastructures of Meaning: Post-Truth Identities Online
    Corrupted Infrastructures of Meaning: Post-truth Identities Online Catherine R. Baker and Andrew Chadwick1 Forthcoming in Howard Tumber and Silvio Waisbord (eds) (2021) The Routledge Companion to Media Misinformation and Populism. New York: Routledge. May 12, 2020. Summary This article outlines a framework for analyzing post-truth identities. Our overarching argument is that post-truth identities emerge from a confluence of individual-level and contextual factors. Cognitive biases that shape how individuals encounter and process information have recently been granted freer rein as a result of changes in the technological basis of media systems in the advanced democracies. But in addition to these macro- structural changes, we suggest that attention should also focus on how post-truth identities come to be formed and maintained at the micro level, in everyday life. Drawing upon the social identity theory tradition in social psychology, we assume that identity is inextricably tied to group formation and the maintenance of group belonging. Post-truth identities rely upon corrupted, self-initiated infrastructures of meaning that are animated by emotional narratives and repositories of cherry-picked, misrepresented justifying ‘evidence.’ These infrastructures are, in part, enabled by the unique affordances of social media for decentralizing, but also algorithmically organizing, the production and circulation of socially consequential information. Identity affirmation is reinforced by the major online platforms’ commercially driven, personalized recommendation features, such as Google search’s autosuggest, YouTube’s autoplay, and Facebook’s news feed. The affordances these create contribute to shared experiences among believers but can also make it more likely that larger audiences are exposed to falsehoods as part of everyday searching, reading, viewing, and sharing.
    [Show full text]
  • View / Open Wilson.Pdf
    WILSON 10/28/2011 10:35 AM MOLLY J. WALKER WILSON* Cultural Understandings of Risk and the Tyranny of the Experts Introduction ...................................................................................... 115 I. The Nature of Modern Risks: Why We Worry ..................... 119 II. Current Theoretical Perspectives on Risk Response ............. 123 A. Traditional Risk Analysis ............................................... 124 B. Psychometric Study of Risk Perception ......................... 127 C. The Social Amplification of Risk Theory ...................... 128 1. Amplification Mechanisms ...................................... 129 2. Second- and Third-Order Impacts ............................ 130 3. Information Channels ............................................... 130 4. Features of the Social Environment ......................... 131 D. Availability Cascade Theory .......................................... 133 E. The Cultural Evaluator Model and the Role of Emotion .......................................................................... 137 F. Why a Comprehensive Model Is Necessary................... 139 1. Limitations of Existing Theories .............................. 139 2. What We Stand to Gain from a Comprehensive Model ....................................................................... 142 III. Foci of Existing Risk Paradigms ........................................... 143 A. Features of Human Decision Making and Cognition ..... 143 B. Characteristics of the Communication Context .............. 145 C. The
    [Show full text]
  • Nudging Towards Vaccination: a Behavioral Law and Economics Approach to Childhood Immunization Policy*
    LASKOWSKI.TOPRINTER (DO NOT DELETE) 2/1/2016 6:52 PM Nudging Towards Vaccination: A Behavioral Law and Economics Approach * to Childhood Immunization Policy I. Introduction The Bill & Melinda Gates Foundation declared this decade “the Decade of Vaccines.”1 Vaccines are more effective and protect against more diseases than ever before;2 yet childhood immunization rates in the United States and many other industrialized nations are declining.3 Diseases that had been declared eradicated in the United States are increasingly reappearing.4 Most recently in early 2015, a large multistate measles outbreak was linked to an infected individual who had visited Disneyland in Southern California. A study concluded that the outbreak was likely a result of substandard vaccination rates.5 The anti-vaccination movement can be traced to a paper published by British doctor Andrew Wakefield in 1998 that claimed there might be a connection between the measles, mumps, and rubella (MMR) vaccine and * I would like to thank Professor Sean H. Williams for his guidance and assistance with early drafts of this Note. I would also like to thank the Texas Law Review staff for all the hard work put into the editing process. Finally, thank you to my parents for their love and support over the years. 1. Vaccine Delivery: Strategy Overview, BILL & MELINDA GATES FOUND., http://www .gatesfoundation.org/What-We-Do/Global-Development/Vaccine-Delivery [http://perma.cc/XQY4-F9GC]. 2. Ensuring Vaccine Safety, CENTERS FOR DISEASE CONTROL & PREVENTION, http://www .cdc.gov/vaccinesafety/ensuringsafety/index.html [http://perma.cc/QWP8-3G3V]; see Vaccine History: Developments by Year, CHILD.
    [Show full text]
  • A Critical Examination of Food and Drug Legislation in the United States
    University of Colorado Law School Colorado Law Scholarly Commons Articles Colorado Law Faculty Scholarship 2009 Crises, Congress, and Cognitive Biases: A Critical Examination of Food and Drug Legislation in the United States Sharon B. Jacobs University of Colorado Law School Follow this and additional works at: https://scholar.law.colorado.edu/articles Part of the Food and Drug Law Commons, Law and Psychology Commons, Legal History Commons, and the Legislation Commons Citation Information Sharon B. Jacobs, Crises, Congress, and Cognitive Biases: A Critical Examination of Food and Drug Legislation in the United States, 64 FOOD & DRUG L.J. 599 (2009), available at https://scholar.law.colorado.edu/articles/251. Copyright Statement Copyright protected. Use of materials from this collection beyond the exceptions provided for in the Fair Use and Educational Use clauses of the U.S. Copyright Law may violate federal law. Permission to publish or reproduce is required. This Article is brought to you for free and open access by the Colorado Law Faculty Scholarship at Colorado Law Scholarly Commons. It has been accepted for inclusion in Articles by an authorized administrator of Colorado Law Scholarly Commons. For more information, please contact [email protected]. +(,121/,1( Citation: 64 Food & Drug L.J. 599 2009 Provided by: William A. Wise Law Library Content downloaded/printed from HeinOnline Thu Mar 2 17:24:27 2017 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at http://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text.
    [Show full text]
  • A Cool Look at Global Warming
    A Cool Look at Global Warming By Don Aitkin Planning Institute of Australia, Canberra, 2 April 2008 I thank the Institute for giving space and time to an Honorary Fellow who is venturing into dangerous space, at least for him. The title of this paper gives a taste of its content, and I had better start with a summary. Australia is faced, over the next generation at least and almost certainly much longer, with two environmental problems of great significance. They are, first, how to manage water in a dry continent that may be moving into a long dry period, within a society that is used to having lots of good water very cheaply; and second, how to find acceptable alternatives to oil-based energy (which looks like getting much more expensive quite quickly) within a society that is used to cheap oil and lots of it. Global Warming, you will have realised, is not one of those two issues, at least for me, and I see it as a distraction from the two I have highlighted. This paper is about why it may not be such an important issue, and why we should get on with the others, which are unquestionably important, and closer to hand. I shall say something about the application to this issue of the precautionary principle at the end. Conventional Wisdom You will appreciate that I am going against ‘conventional wisdom’ in doing so. But Western societies like ours have the standard of living, the longevity and the creativity we have because we have learned that conventional wisdom has no absolute status, and that progress often comes when it is successfully challenged.
    [Show full text]
  • Greenhill FAPD Notre Dame Excerpt 3519
    Draft: Please do not distribute without the express permission of the author. The following is a compilation of excerpts from the Introduction and Chapter 1 of my book ms, Fear and Present Danger: Extra-factual Sources of Threat Conception and Proliferation. Kelly M. Greenhill Tufts and Harvard Universities When U.S. Senator Arthur Vandenberg famously told President Harry Truman that he would have to “scare the hell out of the American people” to secure support for the coming Cold War, Vandenburg was tapping into a tried and true tradition of strategically cultivating fear to influence attitudes and change behavior. While this tactic has a long history of use, strikingly little has been written on precisely how, why, and when it actually works. To be sure, much has been written on the influence of cognitive biases on decision-makers’ behavior. However, previous IR research has been largely silent on the supply side of this equation: namely, on the strategic triggering and manipulation of audiences' emotions and cognitive biases to influence security-related political attitudes and outcomes. This book offers the first systematic theoretical and empirical exploration of this phenomenon. Coupling findings from recent breakthroughs in cognitive science and psychology with theoretical insights from an array of political science subfields, Fear and Present Danger presents a new international relations-focused explanation of how emotionally resonant threat narratives can materially affect individual attitudes and collective political behavior, through the use of what might be thought of as cognitive hacking. It asks, “when uncertainty is high, and verifiable facts are inconvenient or few, how do individuals learn what to fear and how to respond to the threats they have identified?” These questions lie at the heart of national security decision-making at the highest levels of government as well as at the most intimate levels of human decision-making.
    [Show full text]
  • Proof That Voluntary Corporate Responsibility Investments Does Not Affect Financial Returns When in the News
    DEGREE PROJECT FOR MASTER OF SCIENCE IN ENGINEERING INDUSTRIAL ECONOMICS Proof That Voluntary Corporate Responsibility Investments Does Not Affect Financial Returns When in the News Alexander Andersson Blekinge Institute of Technology, Karlskrona, Sweden, 2017 Supervisor: Emil Numminen, Department of Industrial Economics, BTH Abstract This paper presents the results of financial return analyses after 133 articles regarding social and environmental news were published in Svenska Dagbladet. During the period from 2006 to 2015 Swedish Large Cap companies were analysed after the news announcements, using the event study methodology. The study shows that abnormal returns were significant for only three events at the announcement date. A regression analysis shows that firms issuing ESG reports do not significantly have distinct returns from non-issuing firms when in the news. The study shows that firms producing consumer goods or services experienced 0.5 percent significant return differences compared to other firms in the pre-announcement period (two days). Findings also suggest that there are no significant differences between different industries when in the news regarding social and environmental aspects. An analysis of means shows no implications of differences regarding articles of: equality, employees, society or environment. This study concludes that voluntary corporate responsibility acts are not premiered when a firm is in the news regarding social or environmental events. I Sammanfattning Denna studie presenterar resultatet fran˚ analyser av finansiell avkastning efter det att 133 ar- tiklar gallande¨ sociala och miljom¨ assiga¨ faktorer publicerats i Svenska Dagbladet. Svenska Large Cap-foretag¨ analyserades under perioden 2006 - 2015 med eventstudiemetoden. Stu- dien visar att dessa artiklar endast genererar signifikant abnormal avkastning vid eventdagen i tre fall.
    [Show full text]
  • Misbeliefs – Acquisition & Probable Examples
    HUMINANITY Series of PowerPoint Presentations by J. W. Gardner ● Misbeliefs – Acquisition & Probable Examples ● Big Picture Science – Observable Universe ● Big Picture Science – Planet Earth ● Big Picture Science – Life on Earth ● Basic Science Sampler – Quantum Physics, Relativity and Thermodynamics Contents Introduction Misbelief Acquisition – 4 I's Ignorance Insecurity Intuition Indoctrination Empirical Truths Scientific Consensus Historical Knowledge Benefits of Modern Medicine Popularity of Liberal Democracy Reliability of Modern Technology Probable Misbeliefs Resources Pseudohistory Pseudoscience Paranormal Belief Surveys Wrap-up Shortcuts to topics underlined Quotes Contents Introduction Misbelief Acquisition – 4 I's Ignorance Insecurity Intuition Indoctrination Empirical Truths Scientific Consensus Historical Knowledge Benefits of Modern Medicine Popularity of Liberal Democracy Reliability of Modern Technology Probable Misbeliefs Resources Pseudohistory Pseudoscience Paranormal Belief Surveys Wrap-up Quotes Introduction Humans are the only beings known to provide explanations for their existence. Simple accounts might date back to the first behaviorally modern humans (400 centuries or so ago) Prior to modern science most explanations involved supernatural causes Although a fairly deep scientific understanding of the world was achieved in the 20th century, most humans have yet to fully embrace it, either for lack awareness or a penchant for traditional accounts Unfortunately, a world overpopulated by a technologically advanced
    [Show full text]
  • John M. Olin Center for Law, Economics, and Business
    ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS UNLEASHED Cass R. Sunstein Discussion Paper No. 938 11/2017 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center The Social Science Research Network Electronic Paper Collection: https://ssrn.com/abstract=3025749 Very preliminary draft 8/22/17 All rights reserved Unleashed Cass R. Sunstein* Abstract Significant social change often comes from the unleashing of hidden preferences; it also comes from the construction of novel preferences. Under the pressure of social norms, people sometimes falsify their preferences. They do not feel free to say or do as they wish. Once norms are weakened or revised, through private efforts or law, it becomes possible to discover preexisting preferences. Because those preferences existed but were concealed, large-scale movements are both possible and exceedingly difficult to predict; they are often startling. But revisions of norms can also construct rather than uncover preferences. Once norms are altered, again through private efforts or law, people come to hold preferences that they did not hold before. Nothing has been unleashed. These points bear on the rise and fall (and rise again, and fall again) of discrimination on the basis of sex and race (and also religion and ethnicity). They also help illuminate the dynamics of social cascades and the effects of social norms on diverse practices and developments, including smoking, drinking, police brutality, protest activity, veganism, drug use, crime, white nationalism, “ethnification,” considerateness, and the public expression of religious beliefs.
    [Show full text]