Campaign Management Under Approval-Driven Voting Rules
Total Page:16
File Type:pdf, Size:1020Kb
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence Campaign Management under Approval-Driven Voting Rules Ildiko´ Schlotter Piotr Faliszewski Edith Elkind Department of Computer Science Department of Computer Science School of Physical and and Information Theory AGH Univ. of Science and Technology Mathematical Sciences Budapest University of Technology Poland Nanyang Technological University and Economics, Hungary Singapore Abstract Approval voting does not allow her to express this. There- Approval-like voting rules, such as Sincere-Strategy Prefe- fore, it is desirable to have a voting rule that operates sim- rence-Based Approval voting (SP-AV), the Bucklin rule (an ilarly to Approval, yet takes voters’ preference orders into adaptive variant of k-Approval voting), and the Fallback rule account. (an adaptive variant of SP-AV) have many desirable proper- Several such voting rules have been proposed. For in- ties: for example, they are easy to understand and encour- stance, the Bucklin rule (also known as the majoritarian age the candidates to choose electoral platforms that have a compromise) asks the voters to gradually increase the num- broad appeal. In this paper, we investigate both classic and pa- ber of candidates they approve of, until some candidate is ap- rameterized computational complexity of electoral campaign management under such rules. We focus on two methods that proved by a majority of the voters. The winners are the can- can be used to promote a given candidate: asking voters to didates that receive the largest number of approvals at this move this candidate upwards in their preference order or ask- point. In a simplified version of this rule, which is popular ing them to change the number of candidates they approve in the computational social choice literature (Xia et al. 2009; of. We show that finding an optimal campaign management Xia and Conitzer 2008; Elkind, Faliszewski, and Slinko strategy of the first type is easy for both Bucklin and Fallback. 2010), the winners are all candidates that are approved by In contrast, the second method is computationally hard even a majority of the voters in the last round. Under both vari- if the degree to which we need to affect the votes is small. ants of the Bucklin rule, the common approval threshold is Nevertheless, we identify a large class of scenarios that admit lowered gradually, thus reflecting the voters’ preferences. a fixed-parameter tractable algorithm. However, this common threshold may move past an indi- vidual voter’s personal approval threshold, forcing this voter Introduction to grant approval to a candidate that she does not approve Approval voting—a voting rule that asks each voter to report of. To alleviate this problem, Brams and Sanver (2009) have which candidates she approves of and outputs the candidates recently introduced a new election system, which they call with the largest number of approvals—is one of the very few Fallback voting. This system works similarly to the Buck- election systems that have a real chance of replacing Plural- lin rule, but allows each voter to only approve of a limited ity voting in political elections. Some professional organiza- number of candidates; its simplified version can be defined tions, such as, e.g., the Mathematical Association of Amer- similarly to the simplified Bucklin voting. ica or IEEE, already employ Approval voting, and recently With variants of Approval voting gaining wider accep- New Hampshire state representatives sponsored a bill that tance, it becomes important to understand whether various replaces first-past-the-post voting with Approval voting.1 Ir- activities associated with running an approval-based elec- respective of the success of this initiative, it is a clear in- toral campaign are computationally tractable. Such activ- dication that Approval voting is attracting the attention of ities can be roughly classified into benign, such as win- political decision-makers. One of the reasons for this is that, ner determination, and malicious, such as manipulation and in contrast to the more standard Plurality voting, under Ap- control; an ideal voting rule admits polynomial-time algo- proval voting the candidates can benefit from running their rithms for the benign activities, but not for the malicious campaigns in a consensus-building fashion, i.e., by choosing ones. However, there is an election-related activity that de- a platform that appeals to a large number of voters. fies such classification, namely, bribery, or campaign man- Nonetheless, Approval voting has certain disadvantages agement (Faliszewski, Hemaspaandra, and Hemaspaandra as well. Perhaps the most significant of them is its limited ex- 2009; Elkind, Faliszewski, and Slinko 2009; Elkind and Fal- pressivity. Indeed, even a voter that approves of several can- iszewski 2010). Both of these terms are used for actions that didates may like some of them more than others; however, aim to make a given candidate an election winner by means Copyright c 2011, Association for the Advancement of Artificial of spending money on individual voters so as to change Intelligence (www.aaai.org). All rights reserved. their preference rankings; these actions can be benign if the 1See http://freekeene.com/2011/01/28/will-nh money is spent on legitimate activities, such as advertising, -adopt-approval-voting/. or malicious, if the voters are paid to vote non-truthfully. 726 Now, winner determination for all approval-based rules systems we study, and provide the necessary background on listed above is clearly easy, and the complexity of manip- (parameterized) computational complexity. We then present ulation and especially control under such rules is well un- our algorithms for shift bribery, followed by complexity re- derstood (Baumeister et al. 2010; Erdelyi´ and Rothe 2010; sults and a fixed-parameter tractable algorithm for support Erdelyi´ and Fellows 2010; Erdelyi,´ Piras, and Rothe 2011). bribery. We conclude the paper by presenting directions for Thus, in this paper we focus on algorithmic aspects of future research. We omit most proofs due to page limit. electoral campaign management. Following (Elkind, Fal- iszewski, and Slinko 2009; Elkind and Faliszewski 2010) Preliminaries (see also (Dorn and Schlotter 2010)) who study this prob- E =(C, V ) C = {c ,...,c } lem for a variety of preference-based voting rules, we model An election is a pair , where 1 m is the set of candidates and V =(v1,...,vn) is the list of the campaign management setting using the framework of vi shift bribery. Under this framework, each voter v is associ- voters. Each voter is associated with a preference order i, which is a total order over C, and an approval count ated with a cost function π, which indicates, for each k>0, i i i v ∈ [0, |C|]; voter v is said to approve of the top candi- how much it would cost to convince to promote the target rank (c, v) candidate p by k positions in his vote. The briber (campaign dates in her preference order. We denote by the p position of candidate c in the preference order of voter v: manager) wants to make a winner by spending as little as v 1 possible. This framework can be used to model a wide va- ’s most preferred candidate has rank and her least pre- ferred candidate has rank |C|.Avoting rule is a mapping riety of campaign management activities, ranging from one- E =(C, V ) W ⊆ C on-one meetings to phon-a-thons to direct mailing, each of that given an election outputs a set of which has a per-voter cost that may vary from one voter to election winners. another. Voting rules Most voting rules commonly considered in Note, however, that in the context of approval-based vot- the literature do not make use of the approval counts. For in- ing rules, we can campaign in favor of a candidate p even stance, under k-Approval each candidate gets one point from without changing the preference order of any voter. Specif- each voter that ranks her in top k positions. The k-Approval ically, if some voter v ranks p in position k and currently score sk(c) of a candidate c ∈ C is the total number of approves of k − 1 candidates, we can try to convince v to points that she gets, and the winners are the candidates with lower her approval threshold so that she approves of p as the highest score. The Bucklin rule, which can be thought of well. Similarly, we can try to convince a voter to be more as an adaptive version of k-Approval, is defined as follows. stringent and withdraw her approval from her least preferred Given a candidate c ∈ C, let sB(c) denote the smallest value n approved candidate; this may be useful if that candidate is of k such that at least 2 +1voters rank c in the top k po- p’s direct competitor. Arguably, a voter may be more will- sitions, where n is the number of voters; we say that c wins ing to change her approval threshold than to alter her rank- in round sB(c). The quantity kB =minc∈C sB(c) is called ing of the candidates. Therefore, such campaign manage- the Bucklin winning round. Observe that no candidate wins ment tactics may be within the campaign manager’s budget, in any of the rounds <kB and at least one candidate wins even when she cannot afford the more direct approach dis- in round kB. The Bucklin winners are the candidates with cussed in the previous paragraph. We will refer to this cam- the highest kB-Approval score. Under the simplified Buck- paign management technique as “support bribery”; a variant lin rule, the winners are the candidates whose kB-Approval n of this model has been considered by Elkind, Faliszewski, score is at least 2 +1; all Bucklin winners are simplified and Slinko (2009).