Complexity of safe strategic voting

Noam Hazon, Edith Elkind

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [10]. In this model, a potential manipulator v announces how he intends to vote, and some of the other voters whose preferences coincide with those of v may follow suit. Depending on the number of followers, the outcome could be better or worse for v than the outcome of truthful voting. A manipulative vote is called safe if for some number of followers it improves the outcome from v's perspective, and can never lead to a worse outcome. In this paper, we study the complexity of finding a safe manipulative vote for a number of common voting rules, including Plurality, Borda, k-approval, and Bucklin, providing algorithms and hardness results for both weighted and unweighted voters. We also propose two ways to extend the notion of safe manipulation to the setting where the followers' preferences may differ from those of the leader, and study the computational properties of the resulting extensions.

Original languageEnglish
Title of host publicationAlgorithmic Game Theory - Third International Symposium, SAGT 2010, Proceedings
Pages210-221
Number of pages12
EditionM4D
DOIs
StatePublished - 2010
Externally publishedYes
Event3rd International Symposium on Algorithmic Game Theory, SAGT 2010 - Athens, Greece
Duration: 18 Oct 201020 Oct 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberM4D
Volume6386 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Symposium on Algorithmic Game Theory, SAGT 2010
Country/TerritoryGreece
CityAthens
Period18/10/1020/10/10

Fingerprint

Dive into the research topics of 'Complexity of safe strategic voting'. Together they form a unique fingerprint.

Cite this