Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Do Legal Origins Predict Legal Substance?, Anu Bradford, Yun-Chien Chang, Adam S. Chilton, Nuno Garoupa
Do Legal Origins Predict Legal Substance?, Anu Bradford, Yun-Chien Chang, Adam S. Chilton, Nuno Garoupa
Faculty Scholarship
There is a large literature in economics and law suggesting that countries’ legal origins – whether a country’s legal regime was based on British common law or German, French, or Nordic civil law – profoundly impact a range of outcomes. However, the exact relationship between legal origins and legal substance has been disputed in the literature, and this relationship has not been fully explored with nuanced legal coding. We revisit this debate while leveraging extensive novel cross-country datasets that provide detailed coding of two areas of laws: property and antitrust. We find that having shared legal origins strongly predicts whether countries ...
War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman
War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman
Faculty Scholarship
This model casebook section is concerned with the constitutional law of war powers as developed by the executive and legislative branches, with a limited look at relevant statutes and federal court cases. It is intended for use in Constitutional Law I classes that cover separation of powers. It could also be used for courses in National Security Law or Foreign Relations Law, or for graduate courses in U.S. foreign policy. This is designed to be the reading for one to two classes, and it can supplement or replace standard casebook sections on war powers that are shorter and offer ...
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.