Manipulative Voting Dynamics

Manipulative Voting Dynamics
Author: Neelam Gohar
Publisher: Cambridge Scholars Publishing
Total Pages: 152
Release: 2017-05-11
Genre: Political Science
ISBN: 1443892300

One of the most actively growing subareas in multi-agent systems is computational social choice theory, which provides a theoretical foundation for preference aggregation and collective decision-making in multi-agent domains. It is concerned with the application of techniques developed in computer science, including complexity analysis and algorithm design, in the study of social choice mechanisms, such as voting. It seeks to import concepts from social choice theory into Artificial Intelligence and computing. People often have to reach a joint decision despite conflicting preferences over the alternatives. This joint decision can be reached by an informal negotiating process or by a carefully specified protocol. Over the course of the past decade or so, computer scientists have also become deeply involved in this study. Within computer science, there is a number of settings where a decision must be made based on the conflicting preferences of multiple parties. The paradigms of computer science give a different and useful perspective on some of the classic problems in economics and related disciplines. A natural and very general approach for deciding among multiple alternatives is to vote on them. Voting is one of the most popular ways of reaching common decisions. As such, the study of elections is an area where fields such as computer science, economics, business, operations research, and political science can be brought together. Social choice theory deals with voting scenarios, in which a set of individuals must select an outcome from a set of alternatives. This book focuses on convergence to pure strategy Nash equilibria in plurality voting games and a number of other positional and non-positional scoring rules. In such games, the voters strategically choose a candidate to vote for, and the winner is determined by the plurality (or other) voting rules. Voters take turns modifying their votes; these manipulations are classified according to the way in which they affect the outcome of the election. The focus is on achieving a stable outcome, taking strategic behaviour into account. A voting profile is in equilibrium, when no voter can change his vote so that his more preferable candidate gets elected. The book investigates restrictions on the number of iterations that can be made for different voting rules, considering both weighted and equi-weighted voting settings.

Why Governments and Parties Manipulate Elections

Why Governments and Parties Manipulate Elections
Author: Alberto Simpser
Publisher: Cambridge University Press
Total Pages: 303
Release: 2013-03-18
Genre: Political Science
ISBN: 1107311322

Why do parties and governments cheat in elections they cannot lose? This book documents the widespread use of blatant and excessive manipulation of elections and explains what drives this practice. Alberto Simpser shows that, in many instances, elections are about more than winning. Electoral manipulation is not only a tool used to gain votes, but also a means of transmitting or distorting information. This manipulation conveys an image of strength, shaping the behavior of citizens, bureaucrats, politicians, parties, unions and businesspeople to the benefit of the manipulators, increasing the scope for the manipulators to pursue their goals while in government and mitigating future challenges to their hold on power. Why Governments and Parties Manipulate Elections provides a general theory about what drives electoral manipulation and empirically documents global patterns of manipulation.

Political Cycles in a Developing Economy

Political Cycles in a Developing Economy
Author: Stuti Khemani
Publisher: World Bank Publications
Total Pages: 58
Release: 2000
Genre: Business cycles
ISBN:

Empirical results from India suggest that politicians exert greater effort in managing public works during election years. Surprisingly, there is no evidence of a populist spending spree to sway voters just before elections.

Elections, Protest, and Authoritarian Regime Stability

Elections, Protest, and Authoritarian Regime Stability
Author: Regina Smyth
Publisher: Cambridge University Press
Total Pages: 277
Release: 2020-10-29
Genre: Political Science
ISBN: 1108841201

This comprehensive study of Russian electoral politics shows the vulnerability of Putin's regime as it navigates the risks of voter manipulation.

Securing the Vote

Securing the Vote
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
Total Pages: 181
Release: 2018-09-30
Genre: Political Science
ISBN: 030947647X

During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.

Frontiers of Dynamic Games

Frontiers of Dynamic Games
Author: Leon A. Petrosyan
Publisher: Springer Nature
Total Pages: 302
Release: 2022-03-09
Genre: Mathematics
ISBN: 3030936163

This book features contributions from the GTM 2020 International Meeting on Game Theory held virtually from St. Petersburg, Russia, including presentations by plenary speakers. The topics cover a wide range of game-theoretic models and include both theory and applications, including applications to management.

Election Fraud

Election Fraud
Author: R. Michael Alvarez
Publisher: Brookings Institution Press
Total Pages: 272
Release: 2009-11-01
Genre: Political Science
ISBN: 0815701608

Allegations of fraud have marred recent elections around the world, from Russia and Italy to Mexico and the United States. Such charges raise fundamental questions about the quality of democracy in each country. Yet election fraud and, more broadly, electoral manipulation remain remarkably understudied concepts. There is no consensus on what constitutes election fraud, let alone how to detect and deter it. E lection Fraud: Detecting and Deterring Electoral Manipulation brings together experts on election law, election administration, and U.S. and comparative politics to address these critical issues. The first part of the book, which opens with an essay by Craig Donsanto of the U.S. Department of Justice, examines the U.S. understanding of election fraud in comparative perspective. In the second part of the book, D. Roderick Kiewiet, Jonathan N. Katz, and other scholars of U.S. elections draw on a wide variety of sources, including survey data, incident reports, and state-collected fraud allegations, to measure the extent and nature of election fraud in the United States. Finally, the third part of the book analyzes techniques for detecting and potentially deterring fraud. These strategies include both statistical analysis, as Walter R. Mebane, Jr. and Peter Ordeshook explain, and the now widespread practice of election monitoring, which Alberto Simpser examines in an intriguing essay.

Tactical Manipulation of Runoff Voting

Tactical Manipulation of Runoff Voting
Author: Fouad Sabry
Publisher: One Billion Knowledgeable
Total Pages: 404
Release: 2024-10-16
Genre: Political Science
ISBN:

Explore the complex world of runoff voting and its strategic implications in this insightful guide. Aimed at professionals, students, and enthusiasts, this book unveils the subtle tactics that can dramatically shape election outcomes. 1: Tactical Manipulation of Runoff Voting: Grasp how tactical manipulation can shift electoral results, shaping the outcome. 2: Strategic Voting: Understand how voters may cast votes not solely by preference but for favorable outcomes. 3: Independence of Irrelevant Alternatives: Explore how election results are affected by non-winning candidates. 4: Vote Pairing: Learn how voters agree to swap votes to achieve mutually beneficial results. 5: Vote Splitting: Analyze how multiple similar candidates can split votes, affecting results. 6: 2002 French Presidential Election: A case study illustrating tactical voting in the 2002 French presidential election. 7: Coombs' Method: Explore an elimination-based voting system that removes the least popular candidates. 8: Exhaustive Ballot: Understand how this system works by eliminating candidates one by one. 9: Contingent Vote: Explore a hybrid system combining elements of plurality and instant-runoff voting. 10: Instant-Runoff Voting: Learn the mechanics of ranking candidates and how votes transfer in rounds. 11: Approval Voting: Discover a system where voters can approve multiple candidates at once. 12: Plurality Voting: Examine the plurality system, where the most votes win, despite possible manipulation. 13: Two-Round System: Learn about this system, which calls for a second voting round if no majority is achieved. 14: Bullet Voting: Understand the practice of voting for only one candidate despite having more options. 15: 2002 French Legislative Election: Analyze another case study of tactical voting in French legislative elections. 16: Supplementary Vote: Learn about this variation of instant-runoff voting in elections. 17: Plural Left: Study the coalition within the Plural Left and its electoral influence. 18: Borda Count: Explore a ranking system where points are assigned based on candidates' positions. 19: Schulze STV: Learn about this method, which aims to minimize wasted votes. 20: 2016 The Republicans Presidential Primary: A case study on strategic voting in the 2016 French Republican primary. 21: STAR Voting: Understand the STAR voting system, combining scoring and runoff methods. Through this exploration, you’ll unlock the hidden strategies used in elections and gain the tools to analyze or participate in political systems with greater expertise. With in-depth insights into voting systems from around the globe, you’ll be well-equipped to navigate and influence electoral outcomes more strategically. Whether you're involved in political campaigns or academic research, this guide offers a transformative understanding of runoff voting tactics.

Mechanisms for Stability and Welfare: Increasing Cooperation among Self-interested Agents

Mechanisms for Stability and Welfare: Increasing Cooperation among Self-interested Agents
Author: Reshef Meir
Publisher: Lulu.com
Total Pages: 200
Release: 2014-08-10
Genre: Computers
ISBN: 129197962X

Too often an interaction among self-interested parties leads to an outcome that is not in the best interest of any of them. In this thesis, I look at such interactions as games, so that the loss of stability and welfare can be measured and studied using the standard concepts of game theory such as equilibrium and utility. I study and design mechanisms that alter these games in order to induce more cooperation, stable outcomes, and higher utility for the participants.

Algorithmic Aspects of Manipulation and Anonymization in Social Choice and Social Networks

Algorithmic Aspects of Manipulation and Anonymization in Social Choice and Social Networks
Author: Talmon, Nimrod
Publisher: Universitätsverlag der TU Berlin
Total Pages: 295
Release: 2016-05-20
Genre: Computers
ISBN: 3798328048

This thesis presents a study of several combinatorial problems related to social choice and social networks. The main concern is their computational complexity, with an emphasis on their parameterized complexity. The goal is to devise efficient algorithms for each of the problems studied here, or to prove that, under widely-accepted assumptions, such algorithms cannot exist. The problems discussed in Chapter 3 and in Chapter 4 are about manipulating a given election, where some relationships between the entities of the election are assumed. This can be seen as if the election occurs on top of an underlying social network, connecting the voters participating in the election or the candidates which the voters vote on. The problem discussed in Chapter 3, Combinatorial Candidate Control, is about manipulating an election by changing the set of candidates which the voters vote on. That is, there is an external agent who can add new candidates or delete existing candidates. A combinatorial structure over the candidates is assumed, such that whenever the external agent adds or removes a candidate, a predefined set of candidates (related to the chosen candidate) are added or removed from the election. The problem discussed in Chapter 4, Combinatorial Shift Bribery, is also about manipulating an election. Here, however, the external agent can change the way some voters vote. Specifically, a combinatorial structure over the voters is assumed, such that the external agent can change the position of its preferred candidate in sets of voters, following some predefined patterns. The problem discussed in Chapter 5, Election Anonymization, is also about elections. The main concern here, however, is preserving the privacy of the voters, when the votes are published, along with some additional (private) information. The task is to transform a given election such that each vote would appear at least k times. By doing so, even an adversary which knows how some voters vote, cannot identify individual voters. The problems discussed in Chapter 6 and in Chapter 7 are also about privacy. Specifically, a social network (modeled as a graph) is to become publicly available. The task is to anonymize the graph; that is, to transform the graph such that, for every vertex, there will be at least $k - 1$ other vertices with the same degree. By doing so, even an adversary which knows the degrees of some vertices cannot identify individual vertices. In the problem discussed in Chapter 6, Degree Anonymization by Vertex Addition, the way to achieve anonymity is by introducing new vertices. In the problem discussed in Chapter 7, Degree Anonymization By Graph Contractions, the way to achieve anonymity is by contracting as few edges as possible. The main aim of this thesis, considering the problems mentioned above, is to explore some boundaries between tractability and intractability. Specifically, as most of these problems are computationally intractable (that is, NP-hard or even hard to approximate), some restricted cases and parameterizations for these problems are considered. The goal is to devise efficient algorithms for them, running in polynomial-time when some parameters are assumed to be constant, or, even better, to show that the problems are fixed-parameter tractable for the parameters considered. If such algorithms cannot be devised, then the goal is to prove that these problems are indeed not fixed-parameter tractable with respect to some parameters, or, even better, to show that the problems are NP-hard even when some parameters are assumed to be constant. Diese Dissertation stellt eine Untersuchung von verschiedenen kombinatorischen Problemen im Umfeld von Wahlen und sozialen Netzwerken dar. Das Hauptziel ist die Analyse der Berechnungskomplexität mit dem Schwerpunkt auf der parametrisierten Komplexität. Dabei werden für jedes der untersuchten Probleme effiziente Algorithmen entworfen oder aber gezeigt, dass unter weit akzeptierten Annahmen solche Algorithmen nicht existieren können. Die Probleme, welche im Kapitel 3 und im Kapitel 4 diskutiert werden, modellieren das Manipulieren einer gegebenen Wahl, bei welcher gewisse Beziehungen zwischen den Beteiligten angenommen werden. Dies kann so interpretiert werden, dass die Wahl innerhalb eines Sozialen Netzwerks stattfindet, in dem die Wähler oder die Kandidaten miteinander in Verbindung stehen. Das Problem Combinatorial Candidate Control ONTROL, welches in Kapitel 3 untersucht wird, handelt von der Manipulation einer Wahl durch die änderung der Kandidatenmenge über welche die Wähler abstimmen. Genauer gesagt, gibt es einen externen Agenten, welcher neue Kandidaten hinzufügen oder existierende Kandidaten entfernen kann. Es wird eine kombinatorische Struktur über der Kandidatenmenge angenommen, so dass immer wenn der externe Agent einen Kandidaten hinzufügt oder entfernt, eine vordefinierte Kandidatenmenge (welche mit den ausgewählten Kandidaten in Beziehung steht) ebenfalls hinzugefügt bzw. entfernt wird. Das Problem Combinatorial Shift Bribery, welches in Kapitel 4 untersucht wird, thematisiert ebenfalls die Manipulation einer Wahl. Hier allerdings kann der externe Agent Änderungen des Abstimmungsverhaltens einiger Wähler herbeiführen. Dabei wird eine kombinatorische Struktur über den Wählern angenommen, so dass der externe Agent die Position des von ihm präferierten Kandidaten bei mehreren Wählern entsprechend vordefinierter Muster gleichzeitig ändern kann. Das Problem Election Anonymization, welches in Kapitel 5 untersucht wird, befasst sich ebenso mit Wahlen. Das Hauptanliegen hier ist es jedoch, die Privatsphäre der Wähler bei der Veröffentlichung der Stimmenabgaben zusammen mit einigen zusätzlichen (privaten) Informationen aufrecht zu erhalten. Die Aufgabe ist es eine gegebene Wahl so zu verändern, dass jede Stimmenabgabe mindestens k-fach vorkommt. Dadurch kann noch nicht einmal ein Gegenspieler einzelne Wähler identifizieren, wenn er die Stimmenabgaben einiger Wähler bereits kennt. Die in Kapitel 6 und 7 untersuchten Probleme behandeln gleichermaßen Privatsphärenaspekte. Präziser gesagt, geht es darum, dass ein soziales Netzwerk (modelliert als Graph) veröffentlicht werden soll. Die Aufgabe ist es den Graphen zu anonymisieren; dies bedeutet man verändert den Graphen, so dass es für jeden Knoten mindestens k − 1 weitere Knoten mit dem selben Grad gibt. Dadurch wird erreicht, dass selbst ein Gegenspieler, welcher die Knotengrade einiger Knoten kennt, nicht in der Lage ist einzelne Knoten zu identifizieren. Bei dem Problem Degree Anonymization by Vertex Addition, welches in Kapitel 6 untersucht wird, wird Anonymität durch Einführung neuer Knoten erreicht. Bei dem Problem Degree Anonymization by Graph Contractions, welches in Kapitel 7 untersucht wird, wird Anonymität durch die Kontraktion von möglichst wenigen Kanten erreicht. Das Hauptanliegen dieser Dissertation in Bezug auf die obig genannten Probleme ist es die Grenzen der effizienten Lösbarkeit auszuloten. Insbesondere da die meisten dieser Probleme berechnungsschwer (genauer NP-schwer bzw. sogar schwer zu approximieren) sind, werden einige eingeschränkte Fälle und Parametrisierungen der Probleme betrachtet. Das Ziel ist es effiziente Algorithmen für sie zu entwickeln, welche in Polynomzeit laufen, wenn einige Parameter konstante Werte aufweisen, oder besser noch zu zeigen, dass die Probleme “fixed-parameter tractable” für die betrachteten Parameter sind. Wenn solche Algorithmen nicht gefunden werden können, dann ist es das Ziel zu beweisen, dass diese Probleme tatsächlich nicht “fixed-parameter tractable” bezüglich der entsprechenden Parameter sind, oder noch besser zu zeigen, dass die Probleme NP-schwer sind, sogar wenn die entsprechenden Parameter konstante Werte aufweisen.