Post-conflict, post-totalitarian societies like Iraq possess many economic, political, social, and cultural characteristics that are not conducive to democratic governance. A central pillar of democracy promotion is that judicious institutional engineering--crafting new institutions and other elements outlining the democratic rules of the game--can overcome these obstacles and engender stable democracies.

222

Summary

  • Post-conflict, post-totalitarian societies like Iraq possess many economic, political, social, and cultural characteristics that are not conducive to democratic governance. A central pillar of democracy promotion is that judicious institutional engineering--crafting new institutions and other elements outlining the democratic rules of the game--can overcome these obstacles and engender stable democracies.
  •  Two theories explain the success or failure of institutional engineering: institutions as causes, or institutions as indicators. The first theory states that constitutions, electoral systems, and other components of democratic governance are the direct causes of democratic stability or collapse.
  • The second theory states that institutions are indicators, not causes. Like barometers, they allow us to forecast impending storms or calm weather, but they do not cause these phenomena.
  • Many methodological weaknesses are evident in the studies that supposedly support the "institutions as causes" theory. One type results from nonrandom selection of units. A second type results from nonrandom assignment to treatment. Left uncorrected, these weaknesses generate inaccurate and uncertain estimates of causal effects and may invalidate many studies of institutional design.
  •  Different types of methodological corrections for these biases exist, some statistical, others qualitative. All of them demand that we first model the selection process before estimating the effects of institutions; we must identify the origins of institutions to evaluate their effects correctly.
  • By using a method called process tracing to scrutinize institutional engineering in Iraq, it becomes clear why intensified violence followed the drafting and ratification of the Iraqi constitution. It is not surprising that institutional engineering did not forestall violence; therefore, we can conclude that the Iraqi experience does not support theories of institutional design.
  • Although the "institutions as causes" approach claims that "getting the institutions right" can create a stable democracy in otherwise unfavorable conditions, it is imperative to view the studies that support it with skepticism. Nonetheless, these weaknesses do not completely dismiss the theory of institutional engineering. One study of one country can never produce a definitive conclusion. Instead, policymakers should pay closer attention to the methodological underpinnings of all findings based on case studies and other forms of observational research.

About the Report

David Waldner teaches courses on economic development, democratization, and methodology at the University of Virginia. He is the author of State Building and Late Development. His current book projects are Democracy and Dictatorship in the Post-Colonial World and Causation, Explanation, and the Study of Politics. His research on democracy and dictatorship in the Middle East has been supported by a grant from the United States Institute of Peace.

 

 


Latest Research & Analysis

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

Wednesday, June 18, 2025

The 2024 revelations over China’s effort to implant malware in critical U.S. infrastructure by the Volt Typhoon hacking group — as well as the Salt Typhoon group’s successful breaching of at least nine major U.S. telecoms — have renewed concern over Beijing’s constant, ongoing efforts to hack Western companies, governments and non-governmental organizations. Unlike past incidents, like those involving Chinese military unit 61398, which were largely about cyber espionage, the Volt Typhoon group was actively implanting malware designed to disrupt critical infrastructure such as water and power systems.

Type: Analysis

How Vulnerable Is India to Chinese Economic Coercion?

How Vulnerable Is India to Chinese Economic Coercion?

Monday, June 16, 2025

By: Sushant Singh

While India has taken a strong security stance against China, its economic posture has been cooperative. But India's reliance on Chinese imports may undermine its role as a counterbalance to China. The U.S. can help India serve as a counterweight to China by supporting Delhi’s de-risking efforts.

Type: Analysis

The Perils of a Cold War Analogy for Today’s U.S.-China Rivalry

The Perils of a Cold War Analogy for Today’s U.S.-China Rivalry

Tuesday, June 10, 2025

In the new era of great power rivalry between the United States and the People’s Republic of China (hereafter “China”), the paradigm of strategic competition has become popular. In looking to make sense of the present global geopolitical moment and paradigm, pundits search for a relevant historical analogy.

Type: Analysis

How to Break Gangs’ Grip on Haiti

How to Break Gangs’ Grip on Haiti

Thursday, March 13, 2025

Since the assassination of President Jovenel Moïse in 2021, Haiti has spiraled into chaos, with gangs tightening their grip on nearly every aspect of daily life. Once a fragile but functioning state, the country now finds its capital, Port-au-Prince, almost entirely controlled by gangs — and their influence is spreading. A new U.N. report warns that the situation is more dire than ever, as armed groups extend their control into new territories, displacing communities and deepening the country’s humanitarian crisis. As of January over one million people are displaced, the majority of them children, major roads are impassable, and “5.4 million Haitians – nearly half the population – do not have enough to eat.”

Type: Analysis

View All Research & Analysis