scholarly journals Persuading Voters: It's Easy to Whisper, It's Hard to Speak Loud

2020 ◽  
Vol 34 (02) ◽  
pp. 1870-1877
Author(s):  
Matteo Castiglioni ◽  
Andrea Celli ◽  
Nicola Gatti

We focus on the following natural question: is it possible to influence the outcome of a voting process through the strategic provision of information to voters who update their beliefs rationally? We investigate whether it is computationally tractable to design a signaling scheme maximizing the probability with which the sender's preferred candidate is elected. We resort to the model recently introduced by Arieli and Babichenko (2019) (i.e., without inter-agent externalities), and focus on, as illustrative examples, k-voting rules and plurality voting. There is a sharp contrast between the case in which private signals are allowed and the more restrictive setting in which only public signals are allowed. In the former, we show that an optimal signaling scheme can be computed efficiently both under a k-voting rule and plurality voting. In establishing these results, we provide two contributions applicable to general settings beyond voting. Specifically, we extend a well-known result by Dughmi and Xu (2017) to more general settings and prove that, when the sender's utility function is anonymous, computing an optimal signaling scheme is fixed-parameter tractable in the number of receivers' actions. In the public signaling case, we show that the sender's optimal expected return cannot be approximated to within any factor under a k-voting rule. This negative result easily extends to plurality voting and problems where utility functions are anonymous.

2007 ◽  
Vol 97 (1) ◽  
pp. 150-168 ◽  
Author(s):  
Gilat Levy

In this paper I analyze the effect of transparency on decision making in committees. I focus on committees whose members are motivated by career concerns. The main result is that when the decision-making process is secretive (when individual votes are not revealed to the public), committee members comply with preexisting biases. For example, if the voting rule demands a supermajority to accept a reform, individuals vote more often against reforms. Transparent committees are therefore more likely to accept reforms. I also find that coupled with the right voting rule, a secretive procedure may induce better decisions than a transparent one. (JEL D71, D72)


Author(s):  
Palash Dey ◽  
Neeldhara Misra ◽  
Swaprava Nath ◽  
Garima Shakya

We study the parameterized complexity of the optimal defense and optimal attack problems in voting. In both the problems, the input is a set of voter groups (every voter group is a set of votes) and two integers k_a and k_d corresponding to respectively the number of voter groups the attacker can attack and the number of voter groups the defender can defend. A voter group gets removed from the election if it is attacked but not defended. In the optimal defense problem, we want to know if it is possible for the defender to commit to a strategy of defending at most k_d voter groups such that, no matter which k_a voter groups the attacker attacks, the out-come of the election does not change. In the optimal attack problem, we want to know if it is possible for the attacker to commit to a strategy of attacking k_a voter groups such that, no matter which k_d voter groups the defender defends, the outcome of the election is always different from the original (without any attack) one. We show that both the optimal defense problem and the optimal attack problem are computationally intractable for every scoring rule and the Condorcet voting rule even when we have only3candidates. We also show that the optimal defense problem for every scoring rule and the Condorcet voting rule is W[2]-hard for both the parameters k_a and k_d, while it admits a fixed parameter tractable algorithm parameterized by the combined parameter (ka, kd). The optimal attack problem for every scoring rule and the Condorcet voting rule turns out to be much harder – it is W[1]-hard even for the combined parameter (ka, kd). We propose two greedy algorithms for the OPTIMAL DEFENSE problem and empirically show that they perform effectively on reasonable voting profiles.


Author(s):  
Sushmita Gupta ◽  
Pallavi Jain ◽  
Saket Saurabh ◽  
Nimrod Talmon

Multiwinner elections have proven to be a fruitful research topic with many real world applications. We contribute to this line of research by improving the state of the art regarding the computational complexity of computing good committees. More formally, given a set of candidates C, a set of voters V, each ranking the candidates according to their preferences, and an integer k; a multiwinner voting rule identifies a committee of size k, based on these given voter preferences. In this paper we consider several utilitarian and egailitarian OWA (ordered weighted average) scoring rules, which are an extensively researched family of rules (and a subfamily of the family of committee scoring rules). First, we improve the result of Betzler et al. [JAIR, 2013], which gave a O(n^n) algorithm for computing winner under the Chamberlin Courant rule (CC), where n is the number of voters; to a running time of O(2^n), which is optimal. Furthermore, we study the parameterized complexity of the Pessimist voting rule and describe a few tractable and intractable cases. Apart from such utilitarian voting rules, we extend our study and consider egalitarian median and egalitarian mean (both committee scoring rules), showing some tractable and intractable results, based on nontrivial structural observations.


2000 ◽  
Vol 73 (3-4) ◽  
pp. 125-129 ◽  
Author(s):  
Rolf Niedermeier ◽  
Peter Rossmanith

2012 ◽  
Vol 186 ◽  
pp. 1-37 ◽  
Author(s):  
Wolfgang Dvořák ◽  
Reinhard Pichler ◽  
Stefan Woltran

2009 ◽  
Vol 38 (5) ◽  
pp. 2007-2020 ◽  
Author(s):  
Yngve Villanger ◽  
Pinar Heggernes ◽  
Christophe Paul ◽  
Jan Arne Telle

Author(s):  
Serge Gaspers ◽  
Joachim Gudmundsson ◽  
Michael Horton ◽  
Stefan Rümmele

Author(s):  
Robert Ganian ◽  
Andre Schidler ◽  
Manuel Sorge ◽  
Stefan Szeider

Treewidth and hypertree width have proven to be highly successful structural parameters in the context of the Constraint Satisfaction Problem (CSP). When either of these parameters is bounded by a constant, then CSP becomes solvable in polynomial time. However, here the order of the polynomial in the running time depends on the width, and this is known to be unavoidable; therefore, the problem is not fixed-parameter tractable parameterized by either of these width measures. Here we introduce an enhancement of tree and hypertree width through a novel notion of thresholds, allowing the associated decompositions to take into account information about the computational costs associated with solving the given CSP instance. Aside from introducing these notions, we obtain efficient theoretical as well as empirical algorithms for computing threshold treewidth and hypertree width and show that these parameters give rise to fixed-parameter algorithms for CSP as well as other, more general problems. We complement our theoretical results with experimental evaluations in terms of heuristics as well as exact methods based on SAT/SMT encodings.


Sign in / Sign up

Export Citation Format

Share Document