False-name-proof voting with costs over two alternatives

In open, anonymous settings such as the Internet, agents can participate in a mechanism multiple times under different identities. A mechanism is false-name-proof if no agent ever benefits from participating more than once. Unfortunately, the design of false-name-proof mechanisms has been hindered by a variety of negative results. In this paper, we show how some of these negative results can be circumvented by making the realistic assumption that obtaining additional identities comes at a (potentially small) cost. We consider arbitrary such costs and apply our results within the context of a voting model with two alternatives.

[1]  Kevin Leyton-Brown,et al.  Revenue monotonicity in combinatorial auctions , 2007, SECO.

[2]  Chrysanthos Dellarocas,et al.  The Sound of Silence in Online Feedback: Estimating Trading Risks in the Presence of Reporting Bias , 2006, Manag. Sci..

[3]  Paul Resnick,et al.  Manipulation-resistant recommender systems through influence limits , 2008, SECO.

[4]  Michael Luca Reviews, Reputation, and Revenue: The Case of Yelp.Com , 2016 .

[5]  Hervé Moulin,et al.  Pricing traffic in a spanning network , 2009, EC '09.

[6]  R. Myerson Incentive Compatibility and the Bargaining Problem , 1979 .

[7]  Paul Resnick,et al.  The information cost of manipulation-resistance in recommender systems , 2008, RecSys '08.

[8]  Georgios Zervas,et al.  The groupon effect on yelp ratings: a root cause analysis , 2012, EC '12.

[9]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[10]  Makoto Yokoo,et al.  Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.

[11]  Vincent Conitzer,et al.  Limited verification of identities to induce false-name-proofness , 2007, TARK '07.

[12]  Vincent Conitzer,et al.  Anonymity-Proof Voting Rules , 2008, WINE.

[13]  Vincent Conitzer,et al.  Optimal False-Name-Proof Voting Rules with Costly Voting , 2008, AAAI.

[14]  Allan Gibbard,et al.  Straightforwardness of Game Forms with Lotteries as Outcomes , 1978 .

[15]  Vincent Conitzer,et al.  Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..

[16]  Roger B. Myerson,et al.  Optimal Auction Design , 1981, Math. Oper. Res..

[17]  A. Gibbard Manipulation of Schemes That Mix Voting with Chance , 1977 .

[18]  Michael Luca,et al.  Aggregation of Consumer Ratings: An Application to Yelp.com , 2012 .

[19]  Vincent Conitzer,et al.  Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms , 2010, AAMAS.

[20]  Paul Resnick,et al.  The influence limiter: provably manipulation-resistant recommender systems , 2007, RecSys '07.

[21]  Chrysanthos Dellarocas,et al.  Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms , 2004, Manag. Sci..

[22]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[23]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[24]  Jerry R. Green,et al.  Characterization of Satisfactory Mechanisms for the Revelation of Preferences for Public Goods , 1977 .