Campaign Management Under Approval-Driven Voting Rules

Total Page:16

File Type:pdf, Size:1020Kb

Campaign Management Under Approval-Driven Voting Rules Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence Campaign Management under Approval-Driven Voting Rules Ildiko´ Schlotter Piotr Faliszewski Edith Elkind Department of Computer Science Department of Computer Science School of Physical and and Information Theory AGH Univ. of Science and Technology Mathematical Sciences Budapest University of Technology Poland Nanyang Technological University and Economics, Hungary Singapore Abstract Approval voting does not allow her to express this. There- Approval-like voting rules, such as Sincere-Strategy Prefe- fore, it is desirable to have a voting rule that operates sim- rence-Based Approval voting (SP-AV), the Bucklin rule (an ilarly to Approval, yet takes voters’ preference orders into adaptive variant of k-Approval voting), and the Fallback rule account. (an adaptive variant of SP-AV) have many desirable proper- Several such voting rules have been proposed. For in- ties: for example, they are easy to understand and encour- stance, the Bucklin rule (also known as the majoritarian age the candidates to choose electoral platforms that have a compromise) asks the voters to gradually increase the num- broad appeal. In this paper, we investigate both classic and pa- ber of candidates they approve of, until some candidate is ap- rameterized computational complexity of electoral campaign management under such rules. We focus on two methods that proved by a majority of the voters. The winners are the can- can be used to promote a given candidate: asking voters to didates that receive the largest number of approvals at this move this candidate upwards in their preference order or ask- point. In a simplified version of this rule, which is popular ing them to change the number of candidates they approve in the computational social choice literature (Xia et al. 2009; of. We show that finding an optimal campaign management Xia and Conitzer 2008; Elkind, Faliszewski, and Slinko strategy of the first type is easy for both Bucklin and Fallback. 2010), the winners are all candidates that are approved by In contrast, the second method is computationally hard even a majority of the voters in the last round. Under both vari- if the degree to which we need to affect the votes is small. ants of the Bucklin rule, the common approval threshold is Nevertheless, we identify a large class of scenarios that admit lowered gradually, thus reflecting the voters’ preferences. a fixed-parameter tractable algorithm. However, this common threshold may move past an indi- vidual voter’s personal approval threshold, forcing this voter Introduction to grant approval to a candidate that she does not approve Approval voting—a voting rule that asks each voter to report of. To alleviate this problem, Brams and Sanver (2009) have which candidates she approves of and outputs the candidates recently introduced a new election system, which they call with the largest number of approvals—is one of the very few Fallback voting. This system works similarly to the Buck- election systems that have a real chance of replacing Plural- lin rule, but allows each voter to only approve of a limited ity voting in political elections. Some professional organiza- number of candidates; its simplified version can be defined tions, such as, e.g., the Mathematical Association of Amer- similarly to the simplified Bucklin voting. ica or IEEE, already employ Approval voting, and recently With variants of Approval voting gaining wider accep- New Hampshire state representatives sponsored a bill that tance, it becomes important to understand whether various replaces first-past-the-post voting with Approval voting.1 Ir- activities associated with running an approval-based elec- respective of the success of this initiative, it is a clear in- toral campaign are computationally tractable. Such activ- dication that Approval voting is attracting the attention of ities can be roughly classified into benign, such as win- political decision-makers. One of the reasons for this is that, ner determination, and malicious, such as manipulation and in contrast to the more standard Plurality voting, under Ap- control; an ideal voting rule admits polynomial-time algo- proval voting the candidates can benefit from running their rithms for the benign activities, but not for the malicious campaigns in a consensus-building fashion, i.e., by choosing ones. However, there is an election-related activity that de- a platform that appeals to a large number of voters. fies such classification, namely, bribery, or campaign man- Nonetheless, Approval voting has certain disadvantages agement (Faliszewski, Hemaspaandra, and Hemaspaandra as well. Perhaps the most significant of them is its limited ex- 2009; Elkind, Faliszewski, and Slinko 2009; Elkind and Fal- pressivity. Indeed, even a voter that approves of several can- iszewski 2010). Both of these terms are used for actions that didates may like some of them more than others; however, aim to make a given candidate an election winner by means Copyright c 2011, Association for the Advancement of Artificial of spending money on individual voters so as to change Intelligence (www.aaai.org). All rights reserved. their preference rankings; these actions can be benign if the 1See http://freekeene.com/2011/01/28/will-nh money is spent on legitimate activities, such as advertising, -adopt-approval-voting/. or malicious, if the voters are paid to vote non-truthfully. 726 Now, winner determination for all approval-based rules systems we study, and provide the necessary background on listed above is clearly easy, and the complexity of manip- (parameterized) computational complexity. We then present ulation and especially control under such rules is well un- our algorithms for shift bribery, followed by complexity re- derstood (Baumeister et al. 2010; Erdelyi´ and Rothe 2010; sults and a fixed-parameter tractable algorithm for support Erdelyi´ and Fellows 2010; Erdelyi,´ Piras, and Rothe 2011). bribery. We conclude the paper by presenting directions for Thus, in this paper we focus on algorithmic aspects of future research. We omit most proofs due to page limit. electoral campaign management. Following (Elkind, Fal- iszewski, and Slinko 2009; Elkind and Faliszewski 2010) Preliminaries (see also (Dorn and Schlotter 2010)) who study this prob- E =(C, V ) C = {c ,...,c } lem for a variety of preference-based voting rules, we model An election is a pair , where 1 m is the set of candidates and V =(v1,...,vn) is the list of the campaign management setting using the framework of vi shift bribery. Under this framework, each voter v is associ- voters. Each voter is associated with a preference order i, which is a total order over C, and an approval count ated with a cost function π, which indicates, for each k>0, i i i v ∈ [0, |C|]; voter v is said to approve of the top candi- how much it would cost to convince to promote the target rank (c, v) candidate p by k positions in his vote. The briber (campaign dates in her preference order. We denote by the p position of candidate c in the preference order of voter v: manager) wants to make a winner by spending as little as v 1 possible. This framework can be used to model a wide va- ’s most preferred candidate has rank and her least pre- ferred candidate has rank |C|.Avoting rule is a mapping riety of campaign management activities, ranging from one- E =(C, V ) W ⊆ C on-one meetings to phon-a-thons to direct mailing, each of that given an election outputs a set of which has a per-voter cost that may vary from one voter to election winners. another. Voting rules Most voting rules commonly considered in Note, however, that in the context of approval-based vot- the literature do not make use of the approval counts. For in- ing rules, we can campaign in favor of a candidate p even stance, under k-Approval each candidate gets one point from without changing the preference order of any voter. Specif- each voter that ranks her in top k positions. The k-Approval ically, if some voter v ranks p in position k and currently score sk(c) of a candidate c ∈ C is the total number of approves of k − 1 candidates, we can try to convince v to points that she gets, and the winners are the candidates with lower her approval threshold so that she approves of p as the highest score. The Bucklin rule, which can be thought of well. Similarly, we can try to convince a voter to be more as an adaptive version of k-Approval, is defined as follows. stringent and withdraw her approval from her least preferred Given a candidate c ∈ C, let sB(c) denote the smallest value n approved candidate; this may be useful if that candidate is of k such that at least 2 +1voters rank c in the top k po- p’s direct competitor. Arguably, a voter may be more will- sitions, where n is the number of voters; we say that c wins ing to change her approval threshold than to alter her rank- in round sB(c). The quantity kB =minc∈C sB(c) is called ing of the candidates. Therefore, such campaign manage- the Bucklin winning round. Observe that no candidate wins ment tactics may be within the campaign manager’s budget, in any of the rounds <kB and at least one candidate wins even when she cannot afford the more direct approach dis- in round kB. The Bucklin winners are the candidates with cussed in the previous paragraph. We will refer to this cam- the highest kB-Approval score. Under the simplified Buck- paign management technique as “support bribery”; a variant lin rule, the winners are the candidates whose kB-Approval n of this model has been considered by Elkind, Faliszewski, score is at least 2 +1; all Bucklin winners are simplified and Slinko (2009).
Recommended publications
  • Influences in Voting and Growing Networks
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Influences in Voting and Growing Networks Permalink https://escholarship.org/uc/item/0fk1x7zx Author Racz, Miklos Zoltan Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Influences in Voting and Growing Networks by Mikl´osZolt´anR´acz A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Statistics in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Elchanan Mossel, Chair Professor James W. Pitman Professor Allan M. Sly Professor David S. Ahn Spring 2015 Influences in Voting and Growing Networks Copyright 2015 by Mikl´osZolt´anR´acz 1 Abstract Influences in Voting and Growing Networks by Mikl´osZolt´anR´acz Doctor of Philosophy in Statistics University of California, Berkeley Professor Elchanan Mossel, Chair This thesis studies problems in applied probability using combinatorial techniques. The first part of the thesis focuses on voting, and studies the average-case behavior of voting systems with respect to manipulation of their outcome by voters. Many results in the field of voting are negative; in particular, Gibbard and Satterthwaite showed that no reasonable voting system can be strategyproof (a.k.a. nonmanipulable). We prove a quantitative version of this result, showing that the probability of manipulation is nonnegligible, unless the voting system is close to being a dictatorship. We also study manipulation by a coalition of voters, and show that the transition from being powerless to having absolute power is smooth. These results suggest that manipulation is easy on average for reasonable voting systems, and thus computational complexity cannot hide manipulations completely.
    [Show full text]
  • Single-Winner Voting Method Comparison Chart
    Single-winner Voting Method Comparison Chart This chart compares the most widely discussed voting methods for electing a single winner (and thus does not deal with multi-seat or proportional representation methods). There are countless possible evaluation criteria. The Criteria at the top of the list are those we believe are most important to U.S. voters. Plurality Two- Instant Approval4 Range5 Condorcet Borda (FPTP)1 Round Runoff methods6 Count7 Runoff2 (IRV)3 resistance to low9 medium high11 medium12 medium high14 low15 spoilers8 10 13 later-no-harm yes17 yes18 yes19 no20 no21 no22 no23 criterion16 resistance to low25 high26 high27 low28 low29 high30 low31 strategic voting24 majority-favorite yes33 yes34 yes35 no36 no37 yes38 no39 criterion32 mutual-majority no41 no42 yes43 no44 no45 yes/no 46 no47 criterion40 prospects for high49 high50 high51 medium52 low53 low54 low55 U.S. adoption48 Condorcet-loser no57 yes58 yes59 no60 no61 yes/no 62 yes63 criterion56 Condorcet- no65 no66 no67 no68 no69 yes70 no71 winner criterion64 independence of no73 no74 yes75 yes/no 76 yes/no 77 yes/no 78 no79 clones criterion72 81 82 83 84 85 86 87 monotonicity yes no no yes yes yes/no yes criterion80 prepared by FairVote: The Center for voting and Democracy (April 2009). References Austen-Smith, David, and Jeffrey Banks (1991). “Monotonicity in Electoral Systems”. American Political Science Review, Vol. 85, No. 2 (June): 531-537. Brewer, Albert P. (1993). “First- and Secon-Choice Votes in Alabama”. The Alabama Review, A Quarterly Review of Alabama History, Vol. ?? (April): ?? - ?? Burgin, Maggie (1931). The Direct Primary System in Alabama.
    [Show full text]
  • Ranked-Choice Voting from a Partisan Perspective
    Ranked-Choice Voting From a Partisan Perspective Jack Santucci December 21, 2020 Revised December 22, 2020 Abstract Ranked-choice voting (RCV) has come to mean a range of electoral systems. Broadly, they can facilitate (a) majority winners in single-seat districts, (b) majority rule with minority representation in multi-seat districts, or (c) majority sweeps in multi-seat districts. Such systems can be combined with other rules that encourage/discourage slate voting. This paper describes five major versions used in U.S. public elections: Al- ternative Vote (AV), single transferable vote (STV), block-preferential voting (BPV), the bottoms-up system, and AV with numbered posts. It then considers each from the perspective of a `political operative.' Simple models of voting (one with two parties, another with three) draw attention to real-world strategic issues: effects on minority representation, importance of party cues, and reasons for the political operative to care about how voters rank choices. Unsurprisingly, different rules produce different outcomes with the same votes. Specific problems from the operative's perspective are: majority reversal, serving two masters, and undisciplined third-party voters (e.g., `pure' independents). Some of these stem from well-known phenomena, e.g., ballot exhaus- tion/ranking truncation and inter-coalition \vote leakage." The paper also alludes to vote-management tactics, i.e., rationing nominations and ensuring even distributions of first-choice votes. Illustrative examples come from American history and comparative politics. (209 words.) Keywords: Alternative Vote, ballot exhaustion, block-preferential voting, bottoms- up system, exhaustive-preferential system, instant runoff voting, ranked-choice voting, sequential ranked-choice voting, single transferable vote, strategic coordination (10 keywords).
    [Show full text]
  • Präferenzaggregation Durch Wählen: Algorithmik Und Komplexität
    Pr¨aferenzaggregationdurch W¨ahlen: Algorithmik und Komplexit¨at Folien zur Vorlesung Wintersemester 2017/2018 Dozent: Prof. Dr. J. Rothe J. Rothe (HHU D¨usseldorf) Pr¨aferenzaggregation durch W¨ahlen 1 / 57 Preliminary Remarks Websites Websites Vorlesungswebsite: http:==ccc:cs:uni-duesseldorf:de=~rothe=wahlen Anmeldung im LSF J. Rothe (HHU D¨usseldorf) Pr¨aferenzaggregation durch W¨ahlen 2 / 57 Preliminary Remarks Literature Literature J. Rothe (Herausgeber): Economics and Computation: An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division. Springer-Verlag, 2015 with a preface by Matt O. Jackson und Yoav Shoham (Stanford) Buchblock 155 x 235 mm Abstand 6 mm Springer Texts in Business and Economics Rothe Springer Texts in Business and Economics Jörg Rothe Editor Economics and Computation Ed. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division J. Rothe D. Baumeister C. Lindner I. Rothe This textbook connects three vibrant areas at the interface between economics and computer science: algorithmic game theory, computational social choice, and fair divi- sion. It thus offers an interdisciplinary treatment of collective decision making from an economic and computational perspective. Part I introduces to algorithmic game theory, focusing on both noncooperative and cooperative game theory. Part II introduces to Jörg Rothe Einführung in computational social choice, focusing on both preference aggregation (voting) and judgment aggregation. Part III introduces to fair division, focusing on the division of Editor Computational Social Choice both a single divisible resource ("cake-cutting") and multiple indivisible and unshare- able resources ("multiagent resource allocation"). In all these parts, much weight is Individuelle Strategien und kollektive given to the algorithmic and complexity-theoretic aspects of problems arising in these areas, and the interconnections between the three parts are of central interest.
    [Show full text]
  • Group Decision Making with Partial Preferences
    Group Decision Making with Partial Preferences by Tyler Lu A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto c Copyright 2015 by Tyler Lu Abstract Group Decision Making with Partial Preferences Tyler Lu Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2015 Group decision making is of fundamental importance in all aspects of a modern society. Many commonly studied decision procedures require that agents provide full preference information. This requirement imposes significant cognitive and time burdens on agents, increases communication overhead, and infringes agent privacy. As a result, specifying full preferences is one of the contributing factors for the limited real-world adoption of some commonly studied voting rules. In this dissertation, we introduce a framework consisting of new concepts, algorithms, and theoretical results to provide a sound foundation on which we can address these problems by being able to make group decisions with only partial preference information. In particular, we focus on single and multi-winner voting. We introduce minimax regret (MMR), a group decision-criterion for partial preferences, which quantifies the loss in social welfare of chosen alternative(s) compared to the unknown, but true winning alternative(s). We develop polynomial-time algorithms for the computation of MMR for a number of common of voting rules, and prove intractability results for other rules. We address preference elicitation, the second part of our framework, which concerns the extraction of only the relevant agent preferences that reduce MMR. We develop a few elicitation strategies, based on common ideas, for different voting rules and query types.
    [Show full text]
  • Voting with Rank Dependent Scoring Rules
    Voting with Rank Dependent Scoring Rules Judy Goldsmith, Jer´ omeˆ Lang, Nicholas Mattei, and Patrice Perny Abstract Positional scoring rules in voting compute the score of an alternative by summing the scores for the alternative induced by every vote. This summation principle ensures that all votes con- tribute equally to the score of an alternative. We relax this assumption and, instead, aggregate scores by taking into account the rank of a score in the ordered list of scores obtained from the votes. This defines a new family of voting rules, rank-dependent scoring rules (RDSRs), based on ordered weighted average (OWA) operators, which include all scoring rules, and many oth- ers, most of which of new. We study some properties of these rules, and show, empirically, that certain RDSRs are less manipulable than Borda voting, across a variety of statistical cultures and on real world data from skating competitions. 1 Introduction Voting rules aim at aggregating the ordinal preferences of a set of individuals in order to produce a commonly chosen alternative. Many voting rules are defined in the following way: given a vot- ing profile P, a collection of votes, where a vote is a linear ranking over alternatives, each vote contributes to the score of an alternative. The global score of the alternative is then computed by summing up all these contributed (“local”) scores, and finally, the alternative(s) with the highest score win(s). The most common subclass of these scoring rules is that of positional scoring rules: the local score of x with respect to vote v depends only on the rank of x in v, and the global score of x is the sum, over all votes, of its local scores.
    [Show full text]
  • Math 105 Workbook Exploring Mathematics
    Math 105 Workbook Exploring Mathematics Douglas R. Anderson, Professor Fall 2018: MWF 11:50-1:00, ISC 101 Acknowledgment First we would like to thank all of our former Math 105 students. Their successes, struggles, and suggestions have shaped how we teach this course in many important ways. We also want to thank our departmental colleagues and several Concordia math- ematics majors for many fruitful discussions and resources on the content of this course and the makeup of this workbook. Some of the topics, examples, and exercises in this workbook are drawn from other works. Most significantly, we thank Samantha Briggs, Ellen Kramer, and Dr. Jessie Lenarz for their work in Exploring Mathematics, as well as other Cobber mathemat- ics professors. We have also used: • Taxicab Geometry: An Adventure in Non-Euclidean Geometry by Eugene F. Krause, • Excursions in Modern Mathematics, Sixth Edition, by Peter Tannenbaum. • Introductory Graph Theory by Gary Chartrand, • The Heart of Mathematics: An invitation to effective thinking by Edward B. Burger and Michael Starbird, • Applied Finite Mathematics by Edmond C. Tomastik. Finally, we want to thank (in advance) you, our current students. Your suggestions for this course and this workbook are always encouraged, either in person or over e-mail. Both the course and workbook are works in progress that will continue to improve each semester with your help. Let's have a great semester this fall exploring mathematics together and fulfilling Concordia's math requirement in 2018. Skol Cobbs! i ii Contents 1 Taxicab Geometry 3 1.1 Taxicab Distance . .3 Homework . .8 1.2 Taxicab Circles .
    [Show full text]
  • The Expanding Approvals Rule: Improving Proportional Representation and Monotonicity 3
    Working Paper The Expanding Approvals Rule: Improving Proportional Representation and Monotonicity Haris Aziz · Barton E. Lee Abstract Proportional representation (PR) is often discussed in voting settings as a major desideratum. For the past century or so, it is common both in practice and in the academic literature to jump to single transferable vote (STV) as the solution for achieving PR. Some of the most prominent electoral reform movements around the globe are pushing for the adoption of STV. It has been termed a major open prob- lem to design a voting rule that satisfies the same PR properties as STV and better monotonicity properties. In this paper, we first present a taxonomy of proportional representation axioms for general weak order preferences, some of which generalise and strengthen previously introduced concepts. We then present a rule called Expand- ing Approvals Rule (EAR) that satisfies properties stronger than the central PR axiom satisfied by STV, can handle indifferences in a convenient and computationally effi- cient manner, and also satisfies better candidate monotonicity properties. In view of this, our proposed rule seems to be a compelling solution for achieving proportional representation in voting settings. Keywords committee selection · multiwinner voting · proportional representation · single transferable vote. JEL Classification: C70 · D61 · D71 1 Introduction Of all modes in which a national representation can possibly be constituted, this one [STV] affords the best security for the intellectual qualifications de- sirable in the representatives—John Stuart Mill (Considerations on Represen- tative Government, 1861). arXiv:1708.07580v2 [cs.GT] 4 Jun 2018 H. Aziz · B. E. Lee Data61, CSIRO and UNSW, Sydney 2052 , Australia Tel.: +61-2-8306 0490 Fax: +61-2-8306 0405 E-mail: [email protected], [email protected] 2 Haris Aziz, Barton E.
    [Show full text]
  • Voting Systems: from Method to Algorithm
    Voting Systems: From Method to Algorithm A Thesis Presented to The Faculty of the Com puter Science Department California State University Channel Islands In (Partial) Fulfillment of the Requirements for the Degree M asters of Science in Com puter Science b y Christopher R . Devlin Advisor: Michael Soltys December 2019 © 2019 Christopher R. Devlin ALL RIGHTS RESERVED APPROVED FOR MS IN COMPUTER SCIENCE Advisor: Dr. Michael Soltys Date Name: Dr. Bahareh Abbasi Date Name: Dr. Vida Vakilian Date APPROVED FOR THE UNIVERITY Name Date Acknowledgements I’d like to thank my wife, Eden Byrne for her patience and support while I completed this Masters Degree. I’d also like to thank Dr. Michael Soltys for his guidance and mentorship. Additionally I’d like to thank the faculty and my fellow students at CSUCI who have given nothing but assistance and encouragement during my time here. Voting Systems: From Method to Algorithm Christopher R. Devlin December 18, 2019 Abstract Voting and choice aggregation are used widely not just in poli­ tics but in business decision making processes and other areas such as competitive bidding procurement. Stakeholders and others who rely on these systems require them to be fast, efficient, and, most impor­ tantly, fair. The focus of this thesis is to illustrate the complexities inherent in voting systems. The algorithms intrinsic in several voting systems are made explicit as a way to simplify choices among these systems. The systematic evaluation of the algorithms associated with choice aggregation will provide a groundwork for future research and the implementation of these tools across public and private spheres.
    [Show full text]
  • Control Complexity in Bucklin, Fallback, and Plurality Voting: an Experimental Approach Arxiv:1203.3967V2 [Cs.GT] 20 Aug 2012
    Control Complexity in Bucklin, Fallback, and Plurality Voting: An Experimental Approach∗ Jorg¨ Rothe and Lena Schend Institut fur¨ Informatik Heinrich-Heine-Universitat¨ Dusseldorf¨ 40225 Dusseldorf,¨ Germany September 12, 2018 Walsh [Wal10, Wal09], Davies et al. [DKNW10, DKNW11], and Narodytska et al. [NWX11] studied various voting systems empirically and showed that they can often be manipulated ef- fectively, despite their manipulation problems being NP-hard. Such an experimental approach is sorely missing for NP-hard control problems, where control refers to attempts to tamper with the outcome of elections by adding/deleting/partitioning either voters or candidates. We ex- perimentally tackle NP-hard control problems for Bucklin and fallback voting. Among natural voting systems with efficient winner determination, fallback voting is currently known to display the broadest resistance to control in terms of NP-hardness, and Bucklin voting has been shown to behave almost as well in terms of control resistance [ER10, EPR11, EFPR11]. We also in- vestigate control resistance experimentally for plurality voting, one of the first voting systems analyzed with respect to electoral control [BTT92, HHR07]. Our findings indicate that NP-hard control problems can often be solved effectively in prac- tice. Moreover, our experiments allow a more fine-grained analysis and comparison—across various control scenarios, vote distribution models, and voting systems—than merely stating NP-hardness for all these control problems. arXiv:1203.3967v2 [cs.GT] 20 Aug 2012 ∗This work was supported in part by DFG grants RO 1202/15-1 and RO 1202/12-1 (within the EUROCORES programme LogICCC of the ESF), SFF grant “Cooperative Normsetting” of HHU Dusseldorf,¨ and a DAAD grant for a PPP project in the PROCOPE programme.
    [Show full text]
  • Why Approval Voting Is Unworkable in Contested Elections
    Why Approval Voting is Unworkable in Contested Elections And How the Borda Count, Score Voting, Range Voting and Bucklin Voting are Similarly Flawed Due to Vulnerability to Strategic Voting An Analysis by FairVote, July 2011 Summary Approval voting is a method of voting to elect single winners that has adherents among some voting theorists, but is unworkable in contested elections in which voters have a stake in the outcome. Once aware of how approval voting works, strategic voters will always earn a significant advantage over less informed voters. This problem with strategic voting far outweighs any other factor when evaluating the potential use of approval voting in governmental elections. Among other methods that should not be used in meaningfully contested elections are range voting, score voting, the Borda Count and Bucklin voting. They all share approval voting’s practical flaw of not allowing voters to support a second choice without potentially causing the defeat of their first choice. Such voting methods have their potential value, but only in elections where voters have no particular stake in the outcome. The only voting methods that should be weighed seriously for governmental elections are methods that do not violate this “later-no-harm” criterion (plurality voting and forms of runoff elections and instant runoff voting [http://www.instantrunoff.com] ) or only do so indirectly (such as Condorcet voting methods). We support our claims about approval voting and similar voting methods both with theoretical analysis and with a broad range of evidence, including the failure of these voting methods in every single significant use in meaningfully contested elections.
    [Show full text]
  • Comparing Bucklin Voting to Ranked Choice Voting and Approval Voting an Analysis for the City and County of Denver January 2020
    Comparing Bucklin Voting to Ranked Choice Voting and Approval Voting An Analysis for the City and County of Denver January 2020 This report differentiates between three entirely separate voting methods. According to Arrow’s ​ ​ Impossibility Theorem, no mathematically perfect voting method exists. Thus, public administrators look to political scientists to aid in identifying best practices. Why is Bucklin Voting significant? Among the alternative voting methods that have been tried, but failed is Bucklin Voting (BV). The Bucklin ballot uses rankings, so it is tempting to confuse it with Ranked Choice Voting (RCV). However, BV’s tally makes it less like RCV and more like Approval Voting (AV). HISTORIC & LEGAL OVERVIEW.. ​ Bucklin Voting was first proposed by Marquis de Condorcet in 1793, and later implemented by ​ James W. Bucklin in Grand Junction, CO in 1909. It is sometimes called the Grand Junction Method. It was eventually used in 60+ cities including Denver & San Francisco. The courts struck it down in Minnesota and Oklahoma; Brown vs. Smallwood (1915) found that it provided more than one vote per voter. Other places including Denver repealed it because it is susceptible to strategic voting. Ranked Choice Voting is the voter-centered name for a system invented for proportional ​ representation in multi-winner elections in the 1850's. It was later adapted for implementation in single-winner races by William Ware of MIT in the 1870’s. RCV is sometimes called Single Transferable Vote when used in multiple-winner races and is sometimes called Instant Runoff Voting when used in single-winner races. RCV was first implemented in the US in Ashtabula, ​ Ohio in 1915.
    [Show full text]