How Hard is Safe Bribery?

01/25/2022
by   Neel Karia, et al.
0

Bribery in an election is one of the well-studied control problems in computational social choice. In this paper, we propose and study the safe bribery problem. Here the goal of the briber is to ask the bribed voters to vote in such a way that the briber never prefers the original winner (of the unbribed election) more than the new winner, even if the bribed voters do not fully follow the briber's advice. Indeed, in many applications of bribery, campaigning for example, the briber often has limited control on whether the bribed voters eventually follow her recommendation and thus it is conceivable that the bribed voters can either partially or fully ignore the briber's recommendation. We provide a comprehensive complexity theoretic landscape of the safe bribery problem for many common voting rules in this paper.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/24/2023

On the Parameterized Complexity of Controlling Approval-Based Multiwinner Voting: Destructive Model & Sequential Rules

Over the past few years, the (parameterized) complexity landscape of con...
research
04/30/2015

Frugal Bribery in Voting

Bribery in elections is an important problem in computational social cho...
research
02/03/2020

On the Complexity of Destructive Bribery in Approval-Based Multi-winner Voting

A variety of constructive manipulation, control, and bribery for approva...
research
01/10/2023

On the Complexity of the Two-Stage Majoritarian Rule

Sequential voting rules have been extensively used in parliamentary and ...
research
10/22/2021

Safe rules for the identification of zeros in the solutions of the SLOPE problem

In this paper we propose a methodology to accelerate the resolution of t...
research
07/29/2018

Sybil-Resilient Social Choice

We consider an electorate composed of both genuine and fake voters, aka ...
research
12/07/2017

A multiplicative masking method for preserving the skewness of the original micro-records

Masking methods for the safe dissemination of microdata consist of disto...

Please sign up or login with your details

Forgot password? Click here to reset