The Complexity of Control and Bribery in Majority Judgment

We study strategic voting problems for majority judgment, in which each voter assigns to every candidate a grade and the winners are determined by their majority-grades. We first study the constructive/destructive control by adding/deleting votes/candidates problems. Then we study the bribery problem, where an external agent wants to change the result by asking a limited number of voters to change their votes. In addition, we study the variant of the bribery problem where each voter has a price for changing her grade assigned to a candidate and the external agent has a limited budget. Finally, we propose and study the constructive/destructive control by adding & deleting grades problem where an external agent aims to change the result by adding and deleting some grades simultaneously. We show that majority judgment is immune to constructive control by adding candidates and destructive control by deleting candidates. Moreover, for each other problem, we either derive a polynomial-time algorithm or show it is NP-hard.

[1]  Rida Laraki,et al.  Judge: Don't Vote! , 2014, Oper. Res..

[2]  Jörg Rothe,et al.  Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..

[3]  Piotr Faliszewski,et al.  Swap Bribery , 2009, SAGT.

[4]  Jörg Rothe,et al.  Complexity of manipulation and bribery in judgment aggregation for uniform premise-based quota rules , 2015, Math. Soc. Sci..

[5]  Yongjie Yang,et al.  The control complexity of r-Approval: From the single-peaked case to the general case , 2013, J. Comput. Syst. Sci..

[6]  M. Balinski,et al.  Majority Judgment: Measuring, Ranking, and Electing , 2011 .

[7]  Edith Hemaspaandra,et al.  Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.

[8]  Joachim Gudmundsson,et al.  Computational Aspects of Multi-Winner Approval Voting , 2014, MPREF@AAAI.

[9]  Dan S. Felsenthal,et al.  The Majority Judgement Voting Procedure : A Critical Evaluation 1 , 2009 .

[10]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[11]  Yongjie Yang,et al.  Possible Winner Problems on Partial Tournaments: A Parameterized Study , 2013, ADT.

[12]  Jesper Larsson Träff,et al.  A Meticulous Analysis of Mergesort Programs , 1997, CIAC.

[13]  Y. Narahari,et al.  Complexity of Manipulation with Partial Information in Voting , 2016, IJCAI.

[14]  Edith Hemaspaandra,et al.  The complexity of Kemeny elections , 2005, Theor. Comput. Sci..

[15]  Edith Elkind,et al.  The Complexity of Safe Manipulation under Scoring Rules , 2011, IJCAI.

[16]  Vincent Conitzer,et al.  Handbook of Computational Social Choice , 2016 .

[17]  K. Arrow A Difficulty in the Concept of Social Welfare , 1950, Journal of Political Economy.

[18]  Rida Laraki,et al.  HOW BEST TO RANK WINES: MAJORITY JUDGMENT , 2013 .

[19]  Edith Hemaspaandra,et al.  Solving hard problems in election systems , 2012 .

[20]  Yongjie Yang,et al.  Controlling elections with bounded single-peaked width , 2014, AAMAS.

[21]  Toby Walsh,et al.  The Computational Impact of Partial Votes on Strategic Voting , 2014, ECAI.

[22]  Teofilo F. GONZALEZ,et al.  Clustering to Minimize the Maximum Intercluster Distance , 1985, Theor. Comput. Sci..

[23]  Jean-François Laslier,et al.  Handbook on approval voting , 2010 .

[24]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[25]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[26]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[27]  Jörg Rothe,et al.  Exact Complexity of the Winner Problem for Young Elections , 2001, Theory of Computing Systems.

[28]  Jianxin Wang,et al.  Anyone But Them: The Complexity Challenge for A Resolute Election Controller , 2017, AAMAS.

[29]  Ariel D. Procaccia,et al.  Complexity of Strategic Behavior in Multi-Winner Elections , 2008, J. Artif. Intell. Res..

[30]  Rida Laraki,et al.  Election by Majority Judgment: Experimental Evidence , 2011 .

[31]  Haradhan Mohajan Majority judgment in an election with Borda majority count , 2011 .

[32]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..

[33]  Piotr Faliszewski,et al.  Weighted electoral control , 2013, AAMAS.

[34]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[35]  Yongjie Yang,et al.  How Hard Is Bribery with Distance Restrictions? , 2016, ECAI.

[36]  L. A. Hemaspaandra,et al.  Computational Aspects of Approval Voting , 2010 .

[37]  Harrie de Swart,et al.  The Borda Majority Count , 2015, Inf. Sci..

[38]  Michael A. Trick,et al.  How hard is it to control an election? Math , 1992 .

[39]  Piotr Faliszewski,et al.  Multimode Control Attacks on Elections , 2009, IJCAI.

[40]  Gábor Erdélyi,et al.  Bribery in k-Approval and k-Veto Under Partial Information: (Extended Abstract) , 2016, AAMAS.

[41]  Warren D. Smith Descriptions of single-winner voting systems , 2006 .