Reflections on Vote Manipulation

نویسندگان

  • Jan van Eijck
  • Floor Sietsma
  • Sunil Simon
چکیده

The notion of non-manipulability (or: strategy-proofness) used in the famous Gibbard-Satterthwaite theorem is too strong to make useful distinctions between voting rules. We explore alternative definitions and suggest how these can be used to classify voting rules. If A is a finite set of alternatives, with |A| > 2, then an A-ballot is a linear ordering of A. Let {1, . . . , n} be a set of voters. An (A, n)-profile is an n-tuple of A-ballots. If P is an (A, n)-profile, then P can be written as ( 1, . . . , n). i, the i-th component of profile ( 1, . . . , n), is the ballot of voter i. i expresses “what voter i wants.” If P(A) is the set of all (A, n)-profiles, for given n ∈ N, then a function V : P(A)→ A is a resolute voting rule for A, and a function V : P(A)→ P(A) is a voting rule for A. Let P ∼i P′ express that P and P′ differ only in the ballot of voter i. Then the standard definition of non-manipulability is given by:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Party Bias in Union Representation Elections: Testing for Manipulation in the Regression Discontinuity Design When the Running Variable is Discrete

Existing tests for manipulation of the running variable in discontinuity designs are inconsistent when the running variable is discrete. This paper proposes a test that is consistent and approximately UMP unbiased (local to the threshold) when the running variable is discrete. The test exploits the fact that if the discrete running variable—for example, age in quarters—is based on an underlying...

متن کامل

CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment

One of the major problems that prevent the widespread of Internet voting is the vulnerability of the voter’s computer. A computer connected to the Internet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possibl...

متن کامل

Philosophical Reflections in Transcendental Modernism and Religious Politics

The current article believes that the intrinsic interdependence of modernity, science and secularism is an ideological non-universal interdependence but a hegemonic discourse. This kind of explanation and consideration is built upon a collection of ontological, epistemological, anthropological, methodological and evaluative sources. Based on two laws of "interchangeability of existence and scie...

متن کامل

Ties Matter: Complexity of Manipulation when Tie-Breaking with a Random Vote

We study the impact on strategic voting of tie-breaking by means of considering the order of tied candidates within a random vote. We compare this to another non-deterministic tie-breaking rule where we simply choose candidate uniformly at random. In general, we demonstrate that there is no connection between the computational complexity of computing a manipulating vote with the two different t...

متن کامل

CodeVoting: protecting against malicious vote manipulation at the voter's PC

Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolled machine, e.g. the voter’s PC, may be infected with a virus or other malicious program that may try to change the voter’s vote without her knowledge. Here we present CodeVoting, a technique to create a secure communica...

متن کامل

Manipulation is Harder with Incomplete Votes

The Coalitional Manipulation (CM) problem has been studied extensively in the literature for many voting rules. The CM problem, however, has been studied only in the complete information setting, that is, when the manipulators know the votes of the non-manipulators. A more realistic scenario is an incomplete information setting where the manipulators do not know the exact votes of the nonmanipu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011