The Invisible Transformation of the Co-decision Procedure: Problems of Democratic Legitimacy, Institutional Challenges in Post-Constitutional Europe: Governing Change eds. Catherine Moury and Luis de Sousa – with Adrienne Hèritier

The relationship between Council and Parliament within the codecision procedure involves a plethora of informal and semi-formal meetings in which many of the real decisions about legislation are taken, with little scope for public oversight. In the light of the current debate on the future of European Union, the report will address the question what this informalization of the decision-making process means for the legitimacy of the legislative process. The report was presented at the seminar Striking the Institutional Balance? and is a part of the research project Strategy 2004. 2003:7 The Invisible Transformation of Codecision: Problems of Democratic Legitimacy

Henry Farrell and Adrienne Hèritier, “The Invisible Transformation of the Co-decision Procedure: Problems of Democratic Legitimacy,” Institutional Challenges in Post-Constitutional Europe: Governing Change eds. Catherine Moury and Luis de Sousa (Routledge: 2009).

Access the full text here.

Other Writing:

Essay

Will the Coronavirus End Globalization as We Know It? – with Abraham Newman

The new coronavirus is shaping up to be an enormous stress test for globalization. As critical supply chains break down, and nations hoard medical supplies and rush to limit travel, the crisis is forcing a major reevaluation of the interconnected global economy. Not only has globalization allowed for the rapid spread of contagious disease but ...
Read Article
Essay

Defending Democratic Mechanisms and Institutions against Disinformation Attacks – with Bruce Schneier

To better understand influence attacks, we proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable to certain forms of information attacks that autocracies naturally resist. Our model combines ideas from both international security and computer security, avoiding the limitations of both in explaining how influence attacks may ...
Read Article