1. Introduction
This paper can be considered a complement to an earlier one (Potthoff [
1], hereafter Po0). Both papers address the problem of devising single-stage voting systems to select a single winner from
m (> 2) candidates, under the specific premise that a system should have two principal goals:
- (i)
to elect a Condorcet winner (a candidate who could win pairwise against each opponent) if one exists according to the profile of true preferences of the electorate, and
- (ii)
to be resistant to manipulation, with no lure to vote insincerely.
Both papers develop voting systems that thwart manipulations by sophisticated voters who strategically misrepresent their preferences so as to defeat a Condorcet winner. Thus, they both involve game-theory concepts. Our aim is to find voting systems where truthful revelation of preferences is an equilibrium strategy, leading to the election of the Condorcet winner, but in settings necessarily limited to electorate domains that exclude some cyclicities in true preferences.
To achieve (i) and (ii) together, both papers use unorthodox ballots (more so in the case of the present paper), and both of them assume and exploit voters’ knowledge of electorate preferences (again more so in the present paper). Both papers utilize both candidate rankings and approval voting in certain ways.
For our purposes a
voting system (or
election system, or just
system) is characterized by:
- (1)
its ballot;
- (2)
its procedure for aggregating the ballots to determine the winner; and
- (3)
a set S of sincere voting strategies that specifies how all voters are to mark their ballots, given their true preferences (i.e., as a function of those preferences).
The present paper covers voting systems with two types of ballots and three associated aggregation procedures for each. One ballot asks voters to rank the candidates with respect both to their own preferences and to their discerned preferences of the whole electorate. The second ballot is simpler and asks for voters’ own preferences plus approval votes. Po0 likewise covered six systems based on two ballot types each with three aggregation procedures.
Compared with the systems of the present paper, those of Po0 are simpler (both practically and mathematically) and are more fit for large public elections, but have non-manipulability properties that are less strong. Thus, the voting systems of the two papers illustrate a tradeoff between non-manipulability and simplicity.
Beyond its use of ballots that are out of the mainstream and its exploitation of voters’ knowledge of electorate preferences, the present paper is also distinctive because of several interesting mathematical features. Briefly, they include the following. The non-manipulability proofs use mathematical induction on
m; such proofs do not usually do so. The ballot aggregation assigns a key role to the set of
candidate triples. In addition, special loops of some of those triples undergo auxiliary analyses in some cases. For the
Condorcet completion method that has to be available (under any Condorcet system) to determine the winning candidate when the ballots show no Condorcet winner, a unique procedure applies. When
m > 3, that procedure successively, for
j = 4, ...,
m, orders the candidates in each of the
j-tuples by first determining the
last-place (
j-th place) candidate and then placing the remaining candidates in the same order as in the (
j − 1)-tuple that contains them all. Examples 1 and 2 in
Section 4 demonstrate basic details, for
m = 5 and 4 (respectively), and, like other, later examples, will aid in understanding the systems.
We use the letter G to refer to a group composed of all voters sharing the same true‑preference ranking of the m candidates. We call G a preference group. (If there are m = 3 candidates X, Y, and Z, then (e.g.) G(ZXY) denotes the group of all voters who prefer Z to X to Y.) For a given domain of admissible true‑preference profiles over the candidates, a voting system will be called non-manipulable if no group G can change the winner of the election to a candidate it prefers (not necessarily its top-preference candidate) by part or all of G deviating from the strategy set S for the system, given that no one else deviates from S. Otherwise, the system is manipulable.
The notion here is basically a game-theory concept, where each group G that shares a preference ranking corresponds to a player in a game, and where non-manipulability is equivalent to a Nash equilibrium. In most game‑theory problems, however, the rules of the game are given, and the goal is to find the best strategy for each player. But in the choice of a voting system the scene is reversed: Our aim is to select the system (i.e., the rules of the game and the set S) so that the strategy of each “player” (each G) is in accord with (i) and (ii) above, that is, leads to the election of the Condorcet winner and offers no advantage to unilateral deviation from S (where S is consistent with sincere voting). Note that “unilateral deviation” refers here to deviation by a group of voters all having the same ranking of true preferences, rather than deviation just by an individual voter.
Our assumed settings, covered in
Section 5, are ones where cyclicities in
true preferences are fully or partially ruled out: Our non-manipulability results are for domains of true-preference profiles that exclude those with any preference cycles at all (in some settings) or exclude only those that lack a Condorcet winner (in other settings). No such constraints apply, though, for any
reported preferences (which may differ from true preferences if there is strategic voting).
The non-manipulability of the systems of this paper comes about because of the ballot property that asks voters to provide extra markings beyond the usual rankings on a ranked ballot. These added markings relate in one way or another to what we are calling discerned electorate preferences, or just electorate preferences, which refer to the profile of true preferences of the electorate as a whole. We postulate that the needed information about these electorate preferences is available to all voters (on a pragmatic level, see Remark 10.10 below in regard to possible sources of this information).
The additional ballot markings enable exploitation of the discerned electorate preferences and thereby enable use of Condorcet completion methods that render the strategic contrivance of vote cycles unrewarding. With only the usual voter rankings and without the added markings, manipulability is unavoidable, as Remark 10.18 and its example point out.
The function of the extra markings is to deter manipulation (see Remark 10.11). One might wonder, though, whether they could actually offer added opportunity for manipulation. But that type of manipulation (as well as all others) is already taken into account in our non-manipulability proofs.
Other Condorcet-consistent systems, such as those of Nanson, Kemeny, and Dodgson, are simpler for the voter than those of the present paper, so why are they not superior? They are more manipulable. In fact, for specific preference profiles each of these three is as easy to manipulate as the highly manipulable Borda system, as is illustrated at the end of
Section 4.1 below.
In what follows,
Section 2 deals with minor assumptions and with terminology. Ballots, aggregation procedures, and strategy sets are defined in
Section 3.
Section 4 provides the two examples mentioned earlier.
Section 5 deals with non-manipulability and manipulability but relegates two mathematically complex non-manipulability proofs to
Appendix A and
Appendix B. A manipulability comparison of some systems in this paper and Po0 is examined through an example in
Section 6.
Section 7 provides an aggregation shortcut, with mathematical proof in
Appendix C. Circumvention of minor restrictions is the topic of
Section 8.
All parts of the paper just mentioned are strictly mathematical, in the sense that, given our assumptions, the conclusions are direct mathematical consequences. The assumptions themselves, however, may separately raise some questions, in both practical and philosophical terms. Concerns about the assumptions have no effect on the correctness of our mathematical results, but nonetheless need to be recognized. An example in
Section 9 deals with a quandary that arises from uncertain discernment of electorate preferences. Then, in regard to the assumptions as well as the framework of the paper,
Section 10 consists of various remarks that provide analytical discussion, supplementary comments, and numerous references.
Section 11 concludes.
2. Secondary Assumptions, and Terminology
Some simplifying assumptions are needed in order to avoid excessive complexity, though
Section 8 will show how they can be skirted. In any preference profile, it is assumed that no voter is indifferent between any two of the
m candidates (and that individual preferences are transitive). There are thus
m! preference groups G. (We must deal with all
m! of them, not just with the
m (coarser) groups whose members share the same top preference but otherwise differ.)
Regarding the ballots, we assume that each voter ranks all m candidates using ranks from 1 to m (with no ties) for the voter’s own (reported) preferences on both types of ballot, as well as for the discerned electorate preferences on the first type of ballot. It is assumed that each voter provides the approval votes that are asked for on the second type of ballot.
In any preference tallies or vote tallies, it is assumed that no ties between candidates occur and that no total involving preferences or votes is exactly half the total number of voters. As needed, the random tie-breaking device described in
Section 8 will ensure that this assumption holds if it does not already hold initially.
For clarity, we will henceforth refrain from using the term Condorcet winner, and will avoid as well the two-word terms Condorcet runner-up, Condorcet loser, Condorcet cycle, and cyclical majorities. In their place will be three-word terms obtained by inserting either preference or vote in the middle of a two-word term. A Condorcet preference winner is thus a candidate whom the electorate prefers to each opponent in a two-way match-up with each, and Condorcet vote winner is defined likewise but based on actual votes from a ranked ballot (i.e., reported preferences rather than true preferences). The no-ties assumptions simplify the meaning of a Condorcet preference winner or vote winner. Condorcet preference runner-up will refer to a candidate whom the electorate prefers to each other candidate except a Condorcet preference winner, and Condorcet vote runner-up is defined analogously. A candidate X is a Condorcet preference loser if the electorate prefers every opponent to X. Meanings of other three-word terms should be obvious. Sometimes a Condorcet preference cycle (where, e.g., majorities of the electorate prefer X to Y, Y to Z, and Z to X) will simply be called a preference cycle, and similarly for a Condorcet vote cycle.
The term basic ranking applies to both ballot types and will refer to the voter’s reported preference ranking, whether sincere or not. It is the same as the voter’s true preference ranking if the voter is non-strategic and votes sincerely.
For any preference group G, the set S for a given voting system specifies the (sincere) voting strategy for G. It will be called the base strategy for G under that system.
Our systems all make use of approval voting (Brams and Fishburn [
2]) in one fashion or another. We use the term
approval voting in a way that differs a bit in a nonmathematical sense, though not in a mathematical one, from its usual usage. Specifically, the term will simply connote (for any voter’s ballot) a binary separation of candidates in a given set into those who receive a vote in that set and those who do not, without necessarily signifying either approval of the former or disapproval of the latter. We could have used a different term such as
binary voting, but we keep the more familiar term.
4. Two Illustrations of How Manipulation Attempts Would Fail—Even Backfire
4.1. An Illustration with Five Candidates
The following example, with 100 voters, shows how the six systems foil manipulation when there are m = 5 candidates (labeled A through E):
Example 1.Group | G(ABCDE) | G(EDCAB) | G(BACDE) |
Number of voters | 35 | 25 | 40 |
RR1, RR2, RR3 vote | ABCDE/ABCDE | EDCAB/ABCDE | BCDEA/ABCDE |
RA1, RA2, RA3 vote | A|BCDE | EDCA|B | BCDE|A |
In the RR vote row, the basic ranking is before the slash (/) and the electorate ranking is after. In the basic rankings in the RA vote row, the candidates before the vertical line (|) are the ones who receive approval votes. Obviously, even though the example shows all six systems, no two would be applied simultaneously. The preference profile has no Condorcet preference cycles. The preference order of the electorate is ABCDE, so A is the Condorcet preference winner.
G(ABCDE) and G(EDCAB) each follow their base strategies (for both the basic and electorate rankings) for the RR systems. For the RA systems each one also follows its base strategy, which (for each group) happens to be the same regardless of whether Rule 1 (for RA1), 2 (RA2), or 3 (RA3) is used.
But for both RR and RA, G(BACDE) voters deviate from their base strategy and mark their basic rankings in the classic way that can depose A under the Borda method (
i.e., by ranking A, the Condorcet preference winner, at the bottom, even though A is their second preference). For RR these voters do follow their base strategy for the electorate ranking (though they could not have dethroned A even if they had done otherwise, per Proposition 2 in
Appendix A).
To start, consider RR. After first finding that there is no Condorcet vote winner, the aggregation procedure for each of the three RR systems (see
Section 3.2) examines the
= 10 triples. The ordering for the noncyclical triples, and the ordering and the approval-vote tallies for the cyclical triples (with one set of results for RR1 and RR3, another for RR2), are as follows:
Noncyclical triples: | CDA, CEA, DEA, BCD, BCE, BDE, CDE |
Cyclical triples, RR1 and RR3: | C 65, A 60, B 40; D 65, A 60, B 40; E 65, A 60, B 40 |
Cyclical triples, RR2: | A 60, B 40, C 25; A 60, B 40, D 25; A 60, B 40, E 25 |
The first cyclical triple (e.g.) draws approval votes from G(ABCDE) for A; from G(EDCAB) for C and A; and from G(BACDE) for B and C under RR1 or RR3, but only for B under RR2.
The next step is to examine the
= 5 quadruples of candidates. One finds the
last-place candidate (L) in each quadruple by looking at its four subset triples. Then one puts the remaining three candidates (all except L) at the top of the quadruple, in the same order as in the triple that contains them all. The ordering of each quadruple and of its subset triples, along with its L (in each case here, the candidate who places third in the greatest number of triples), is as follows:
For RR1 and RR3: | CDAB (CAB, DAB, CDA, BCD; B is L) |
CEAB (CAB, EAB, CEA, BCE; B is L) |
DEAB (DAB, EAB, DEA, BDE; B is L) |
For RR2: | ABCD (ABC, ABD, CDA, BCD; D is L) |
ABCE (ABC, ABE, CEA, BCE; E is L) |
ABDE (ABD, ABE, DEA, BDE; E is L) |
For all three: | CDEA (CDA, CEA, DEA, CDE; A is L) |
BCDE (BCD, BCE, BDE, CDE; E is L) |
The final step is to obtain the ordering of the set of all five candidates by examining the five subset quadruples. For RR1 and RR3, B has the most last places among these quadruples, so the ordering is CDEAB. E has the most last places under RR2, so ABCDE is the ordering. Thus, the winner under RR2 is A, and under RR1 or RR3 is C (even worse than A for G(BACDE)). In neither case does G(BACDE) dethrone A in favor of B, the only candidate whom it prefers to A.
Now consider RA. The example has been so constructed that the entire sequence of results under the RA aggregation procedure is identical with that just given for RR1 and RR3. In addition, if the deviating G(BACDE) voters were to vote B|CDEA rather than BCDE|A with all else unchanged, then the sequence of results would be the same as that for RR2 above.
Manipulation is curbed under our systems but, as it turns out in this example, is simple under not only the Borda method but also (e.g.) the Coombs method and the Condorcet methods of Nanson, Kemeny, and Dodgson. Easy manipulability of these last five is evident if one looks at Example 1 with D and E removed (for definitions of these five methods, see, e.g., Brams and Fishburn [
4] and Tideman [
5]).
Thus, 35 ABC votes come from G(ABC) and 25 CAB votes from G(CAB). Under any of the five methods, the 40 G(BAC) voters then find it simple to manipulate by voting BCA, thereby dethroning the Condorcet preference winner, A, in favor of their top preference, B. (With all the candidates retained as in Example 1 itself, the manipulated BCDEA votes by G(BACDE) still succeed in electing B under each of the five methods, but verifying that is less easy.)
4.2. An Illustration of How the Loop of Candidate Triples Works
The following example uses RR2 for illustration and shows how, in the aggregation procedure, the formation of a loop of candidate triples and the resort to identifying
lesser candidates (see
Section 3.2.3) protect the Condorcet preference winner from dethronement:
Example 2.Group | G(ABCD) | G(DCAB) | G(BACD) |
Number of voters | 35 | 25 | 40 |
RR vote | ABCD/ABCD | DCAB/ABCD | BCDA/ADBC |
There are no preference cycles, and the preference order of the electorate is ABCD. G(ABCD) and G(DCAB) each follow their RR base strategy, but G(BACD) does not.
After ascertainment that no Condorcet vote winner exists, examination of the
= 4 triples yields the following results under the RR2 aggregation procedure:
Noncyclical triples: | CDA, BCD |
Cyclical triples: | A 60, B 40, C 25; D 65, A 60, B 40 |
Because each of the four candidates has one third place, one second place, and one first place in the four triples, the process to determine L (the candidate who is to rank last in the quadruple) has to go on to another operation, which is to find any candidates who are not capping candidates.
But all four candidates are capping candidates (A caps B, B caps C, C caps D, and D caps A). There is thus a loop of the candidates (A, B, C, D, then back to A), which, in turn, generates a loop of contiguous candidate triples (DAB, ABC, BCD, CDA).
In the final operation, one finds which candidates are lesser candidates. In the two noncyclical triples, the total approval votes for their central members are 65 in CDA for D, and 25 in BCD for C. Thus, the approval-vote tallies for all four candidates from the triples of which they are the central members are 60 for A (from DAB), 40 for B (from ABC), 25 for C (from BCD), and 65 for D (from CDA). The conclusion is that B and C are lesser candidates (because their approval votes are less than half the total of 100) whereas A and D are not.
Thus, depending on how Method M3 is defined, it chooses L to be either B or C. The ordering of the quadruple is CDAB in the former case or DABC in the latter, giving rise to C or D as the winning candidate. With either outcome, the manipulation attempt by G(BACD) backfires.
With the other five systems just as with RR2, one can construct examples, with no preference cycles and m = 4, where one has to execute the entire aggregation procedure and examine a loop of four candidate triples (after which the unilateral manipulation is shown to fail). Thus, the routine that resolves the loop of triples, though complex, is key to deterring manipulation.
5. Results on Non-Manipulability and Manipulability
We examine whether the six systems of this paper are manipulable for each of three different domains of true-preference profiles of the electorate. In each domain, every profile has a Condorcet preference winner. Let F0 denote the domain of profiles where there are no preference cycles among the m candidates. Let F1 denote the domain where there is a Condorcet preference winner but where preference cycles(s) may (or may not) exist otherwise. Note that F0 is a subset of F1. F0 and F1 are the same for m = 3, of course. The three domains are F0 (or F1) with m = 3, F0 (with m ≥ 3), and F1 (with m ≥ 3).
The largest domains of true-preference profiles for which non-manipulability will be proved are F1 for RR1 and RA1; F0 for RR2 and RR3; and F0 (or F1) just with
m = 3 for RA2 and RA3. The non-manipulability proofs are in
Section 5.1 and the appendixes. Counterexamples in
Section 5.2 show the manipulability of RR2 and RR3 in F1 and of RA2 and RA3 in F0.
5.1. Non-Manipulability Proofs
Right after an initial lemma (Lemma L1), Proposition 1 is stated and proved below. It establishes that all six systems are non-manipulable when there are only
m = 3 candidates (with a Condorcet preference winner). Propositions 2 and 3 have lengthy proofs and are in
Appendix A and
Appendix B, respectively. The former states that RR1, RR2, and RR3 are non-manipulable in F0; the latter, that RR1 and RA1 are non-manipulable in F1. Lemma L1 and Proposition 1 constitute essential stepping-stones for the proofs in the appendixes.
Proposition 2 as it pertains to RR1 (but not to RR2 or RR3) may be seen as superfluous in view of Proposition 3. Proposition 2 seems to have a bit more straightforward proof than Proposition 3, though, and can include RR1 in its proof with virtually no added details.
When the statement that candidate X places above candidate Y is made in the rest of the paper, it will apply within a specific set of candidates. It will mean that X is ranked above Y by a step in the aggregation procedure that ranks the candidates for that particular set. Similarly, the statement that X places last in a set will mean simply that the aggregation procedure ranks X last in that set. The statement that X places above Y does not necessarily mean that the basic rankings show X rated above Y by more than half the voters, or necessarily reflect anything about any approval votes that may be tallied. It is possible for X to place above Y in one set of candidates that includes them both but for Y to place above X in another.
Lemma L1. Let there be m = 3 candidates A, B, and C who are, respectively, the Condorcet preference winner, runner-up, and loser. Under any of the systems RR1, RR2, or RR3, let S1 denote the set of base strategies, which is the set of ballot strategies under which all voters mark their basic rankings according to their own true preferences, and mark their electorate rankings as A first, B second, and C third. Under the systems RA1, RA2, and RA3, let S2 denote the set of ballot strategies (again base strategies) under which all voters mark their basic rankings according to their own true preferences, and mark their approval votes in accord with Rules 1, 2, and 3, respectively. For any of the six systems, suppose that all preference groups other than G(BAC) follow S1 or S2 (as applicable) but that G(BAC) can deviate from S1 or S2. Then both of the following hold no matter what ballot strategy G(BAC) adopts:
L1.1: If approval votes are tallied in accordance with any of the six systems (whether or not the three candidates show cyclical vote majorities that trigger such a tally), then A will receive approval votes from more than half the electorate and B from less than half.
L1.2: Within the set of three candidates, A will place above B.
Remark. With just three candidates there would be no occasion to tally approval votes unless cyclical vote majorities arise in the tally of the basic rankings. L1.1 is worded broadly, however, for use in later proofs where approval votes do have to be tallied within a subset of three out of m (> 3) candidates even when cyclical vote majorities do not occur in that subset.
Proof of L1.1. Regardless of whether an RR or RA system is in effect and regardless of which of the three rules for ascribing or marking approval votes applies, candidate A will receive approval votes from G(ABC), G(ACB), and G(CAB), and B will receive no approval votes from them. Because these three preference groups are the ones that prefer A to B, they make up more than half the electorate. G(BAC) can thus do nothing to forestall the conclusion stated in L1.1.
Proof of L1.2. If the ballot strategy of G(BAC) causes cyclical vote majorities to occur, then A will get more approval votes than B by virtue of L1.1 and will thus place above B. If not, then A will still place above B because the basic rankings on more than half the ballots—those from G(ABC), G(ACB), and G(CAB)—will show A above B.
Proposition 1. Let there be m = 3 candidates with the same conditions and notation as in the first three sentences of Lemma L1. (Among other things, the domain for admissible true-preference profiles is thus F0, or F1, with m = 3.) Then each of the systems RR1, RR2, RR3, RA1, RA2, and RA3 is non-manipulable. That is, no preference group G, by deviating from S1 or S2 when no one else does, can adopt a ballot strategy that will dethrone A (the Condorcet preference winner) as the election winner in favor of a candidate whom G prefers to A.
Proof (similar to that of Proposition 3 in Po0, p. 106). For each of the six preference groups, one needs to show that that group can gain nothing by deviating from S1 or S2 (whichever one is applicable), given that the other five groups all adhere to S1 or S2. The following statements apply to all six systems. G(ABC) or G(ACB) voters cannot gain by deviating, because their most preferred candidate (A) already wins. Because G(BCA) or G(CBA) voters are already marking A last in their basic rankings under S1 or S2, they can adopt no ballot strategy that would prevent A from being the Condorcet vote winner. Because G(CAB) voters are already marking C first in their basic rankings under S1 or S2, they can do nothing to stop C from being the Condorcet vote loser; thus, they can achieve nothing better than the election of A, their second preference. Finally, G(BAC) voters can likewise achieve nothing better than the election of their second preference (A), because, by L1.2, they cannot prevent B from placing below A regardless of whether they do or do not bring about cyclical vote majorities.
Remark. Brams and Sanver [
6] showed that, under approval voting with voting assumed to be sincere, there exists with respect to a Condorcet preference winner a (rather stringent) specific set of strategies, the “critical strategy profile,” under which no
coalition of preference groups can dislodge that winner in favor of a candidate whom everyone in the coalition prefers. That is, this is a strong Nash equilibrium (for any
m), not just a Nash equilibrium pertaining to manipulation by a single preference group. The present paper concentrates on systems that inhibit manipulation by an individual preference group (rather than by a coalition of voters with differing preference rankings, which would entail far greater complexity). One might ask, though, whether the various Nash equilibria that our systems enjoy are also strong Nash equilibria. For
m = 3 candidates, an argument a bit more general than the one in the proof of Proposition 1 shows that the answer is yes for RR1 and RA1. But for the other four systems, the answer is no even for
m = 3, as can be shown by suitable minor modification of Example 3 of Po0.
5.2. Counterexamples that Show Manipulability
The following example shows that RR2 and RR3 are manipulable in F1:
Example 3.Group | G(CADB) | G(DABC) | G(BACD) |
Number of voters | 35 | 25 | 40 |
RR2 or RR3 vote | CADB/ACDB | DABC/ADBC | BCDA/BCDA |
Although A is the Condorcet preference winner, there is a preference cycle among B, C, and D (B preferred to C, C to D, D to B). Thus, the domain is F1. The vote of each group except G(BACD) is consistent with the base strategy for RR2 and RR3 (and RR1) as specified in
Section 3.3: All voters in these two groups mark their basic rankings in accord with their true preferences and put A at the top of their electorate rankings.
There is no Condorcet vote winner, thanks to manipulation by G(BACD). The following results for the four triples apply for either RR2 or RR3:
Noncyclical triples: | CDA, DAB |
Cyclical triples: | B 40, C 35, A 25; B 40, C 35, D 25 |
Because A has the most last places in the triples, A places last in the quadruple. The resulting ordering of the quadruple, BCDA, renders successful the efforts of G(BACD) to dethrone A in favor of candidate B.
Note that the manipulation attempt fails under RR1 (as it must, per Proposition 3 in
Appendix B). RR1 changes the ordering of the cyclical triple BCA to ABC, because 35 added approval votes are ascribed to A from G(CADB). A loop of the four candidates now results. Under RR1 their approval votes from the triples in which they are the central members are then 60 for A (from DAB), 40 for B (from ABC), 35 for C (from BCD), and 25 for D (from CDA). B, C, and D (but not A) are thus lesser candidates. No matter which of the three Method M3 chooses to be last in the quadruple, the ploy by G(BACD) is unrewarded because B will not be first in the quadruple.
Example 3 bears an interesting resemblance to Example 2 of Peress [
7]. Although the voting system (“multi-stage runoff”) for his example is totally different from RR2 or RR3, the two preference profiles are essentially the same and the results in both cases reflect anomalies when there is a Condorcet preference winner but preference intransitivity otherwise.
The second counterexample shows that RA2 and RA3 can each be manipulated when there are m = 4 candidates without any cyclical preference majorities (domain F0):
Example 4.Group | G(ABCD) | G(DCBA) | G(DABC) | G(DBAC) | G(CABD) |
Number of voters | 43 | 40 | 4 | 4 | 9 |
RA2 or RA3 vote | A|BCD | DCB|A | DA|BC | DB|AC | C|DAB |
ABCD is the preference order of the electorate. The votes shown for each group except G(CABD) follow base strategy, under either RA2 or RA3. G(CABD) prevents a Condorcet vote winner from emerging.
The RA aggregation procedure produces the following results for the four triples:
Noncyclical triples: | ABC, DAB |
Cyclical triples: | C 49, D 48, A 47; C 49, D 48, B 47 |
Because B has the most third places (two) in the triples, B is last in the quadruple, thereby causing the ordering of the quadruple to be CDAB. Thus, the manipulation by G(CABD) succeeds in dethroning A in favor of C, its first preference.
Observe that, with RA1, the base strategy changes for one of the groups: G(DBAC) votes DBA|C rather than DB|AC. That change causes A to receive 51 approval votes instead of 47 in the first cyclical triple, thus averting the defeat of A by C. Any kind of manipulation attempt by G(CABD) under any of the RR systems will likewise fail (per Proposition 2 in
Appendix A).
9. Are RR1 and RA1 Still Best if the Information Postulate Is Relaxed?
Thus far, this paper has been purely mathematical. We now turn to broader issues.
Treating voters more as real‑world people and less as mathematical entities, we first illustrate the effect of uncertainty about electorate preferences. Because RR1 and RA1 are non-manipulable in F1 whereas the other four systems are non-manipulable only in F0 (and just for m = 3 for RA2 and RA3), it would appear that RR1 and RA1 are the only systems that merit consideration. That is the case if the postulate stipulating the needed knowledge of electorate preferences strictly holds. But if not, the other four systems are, in some cases, better at avoiding pitfalls stemming from incorrect discernment of those preferences. The following example, which bears some similarity to Example 5 of Po0, shows how even slight uncertainty as to electorate preferences can cause RR2, RR3, RA2, and RA3 to have an advantage over RR1 and RA1 if there is a close contest between the two front‑running candidates:
Example 6.Group | G(ABC) | G(BAC) | G(CAB) | G(CBA) |
Number of voters | | | | |
Actual | 40 | 45 | 9 | 6 |
Believed to be | 40 | 45 | 11 | 4 |
RR1, RR2, or RR3 vote | ACB/ACB | BAC/ABC | CAB/ABC | CBA/ABC |
RA1 vote | A|CB | BA|C | CA|B | CB|A |
RA2 or RA3 vote | A|CB | B|AC | CA|B | CB|A |
The preference order of the electorate is BAC with the actual profile but ABC with the presumed profile. For all six systems, all groups except G(ABC) follow their base strategies according to the presumed (not the actual) preference order, by using ABC for the electorate ranking on the RR ballots, or, on the RA ballots, by surmising A to be the Condorcet preference winner (and B the runner-up) when using Rule 1, 2, or 3 to mark approval votes.
Without the strategic voting by G(ABC), the actual Condorcet preference winner, B, would straightforwardly win the race under any of the six systems. But the Condorcet vote cycle stemming from the manipulation by G(ABC) has to be resolved by tallying approval votes. The results are 94 for A and 51 for B (and 15 for C) under either RR1 or RA1, but are 51 for B and 49 for A under the other four systems. Thus, B still wins under those four but not under RR1 or RA1.
Of course, the G(BAC) voters could block the manipulation by voting BAC/BAC instead of BAC/ABC under RR1 or B|AC instead of BA|C under RA1. They would have to violate base strategy to do so, though, whereas under the other four systems they face no similar dilemma.
With the close race between A and B, it does not seem sensible anyway for G(BAC) voters to award approval votes to A as well as B, as under either RR1 or RA1. Incorrect or uncertain discernment of electorate preferences contributes to this conundrum. The plight of voters is actually greater under RR1: In the case of m = 3, they control the approval votes (if they have to be tallied) directly and fully under RA1, but only indirectly under RR1.
10. General Remarks
This section is a collection of remarks that go beyond mathematical matters and deal with our framework and assumptions, practical and philosophical angles, and associated references.
Remark 10.1. Although goals (i) and (ii) stated at the start of the paper are not the only ones that one might want to examine, there is probably broad but not universal agreement that (i) and (ii) are both highly desirable. The selection of the Condorcet preference winner (i), including even the selection of the majority winner in the simple special case of a two-way race, may not maximize utility (in some form) in situations where preference intensities are distributed asymmetrically. Such situations, though, may be uncommon or at least not be easy to identify or remedy; and utility maximization is not the goal here anyway.
As for property (ii), it does not seem to receive high priority from (e.g.) advocates of the easily manipulable Borda procedure, or of plurality voting with its incentives to vote insincerely in some cases. But if a system does not reward misrepresentation and voters can vote their true preferences without fretting whether that is strategically unwise, they will face simpler tasks and will have greater confidence in the election process as well. Generally, the less manipulability, the better. Although one might prefer non-manipulability properties stronger than the Nash equilibria that are central to this paper, the nature of the problem limits what can be done.
For further discussion related to (i) and (ii), see (e.g.) Merrill [
9] (especially Sections 1.2, 1.3, 3.1, and 5.1). For other viewpoints, see (e.g.) Saari [
10] and Moulin [
11] (Part IV). In addition, see Taylor [
12] for an extensive treatment of manipulation in voting.
Remark 10.2. Instead of candidate, a broader term such as option could have been used throughout the paper. Options could refer not only to candidates in an election but also (e.g.) to rival legislative proposals. All of our results for candidates would hold also for other options.
Remark 10.3. In a system with an ordered agenda, voters vote on successive pairs of options. Other multi-stage systems also exist. We confine our attention, though, to voting systems that select a winner in a single stage.
With a single-stage system along with
m pre-specified options (or candidates), as in this paper, there is no room for undesirable agenda manipulation nor for strategic voting that could be used to counteract it, as covered in McKelvey [
13]. Thus, although sophisticated voting may be beneficial in the agenda-manipulation framework by leading to improved outcomes, no such benefit would apply to our work here.
Remark 10.4. Although the Nash equilibria in our systems are relatively natural, understandable, and straightforward, there is, of course, no claim that any of them are unique. Other Nash equilibria would not generally have the same desirable properties as ours.
Remark 10.5. Computation for our systems may become prohibitive, when there is no Condorcet vote winner, if
m (the number of candidates) is too large. (But a big value of
n (number of voters) should cause little trouble.) Typical (e.g., single-digit) values of
m should be manageable. Moreover, computational burden can be greatly reduced when the shortcut described in
Section 7 is applicable. Although the main calculations then involve just
m* candidates (where 3 ≤
m* ≤
m), the value of
m* cannot be known before the election.
In the worst case,
m* =
m, one first applies Steps 1–3 (
Section 3.2) to each of the
candidate triples. One then applies Steps 4{4}, 4{5}, ..., 4{
m} successively to find the last-place candidate, L, in each of the
4-tuples,
5-tuples, and so on, where finding L may involve a candidate loop for some of these groups but will be simpler for others. The total number of groups (of varying size) is
+
or 2
m − 1 −
m −
< 2
m, a number that would seem to be small enough to preclude prohibitive computational time so long as
m is below 10 or even slightly greater. Larger values of
m would probably be rare in practice anyway.
The task of writing an applicable computer program is a largely separate issue from avoidance of prohibitive computation. For small enough elections, hand calculations can be feasible, as one may gather from the examples in
Section 4.
Remark 10.6. The concept of unilateral deviation or strategic voting by a homogeneous bloc, rather than a single voter, is not unique to this paper. Other works, such as Niou [
14] and Brams and Sanver [
6], as well as Po0, have also used it.
Remark 10.7. Note that we do not require true (or reported) preferences to be single-peaked. One would hardly expect voter preferences for
m > 2 candidates in most usual elections to be strictly single-peaked. (On the other hand, if voters are choosing not from
m candidates, but rather from (e.g.) numerical values along a continuum that represent money to be spent or taxed, then single-peaked preferences may be reasonable to assume. For such a case, methods far simpler than ours (e.g., asking voters to report
just their first-preference value and then declaring the median to be the winner, as suggested long ago by Francis Galton) could be applied. See (e.g.) Black [
15] (Chapter IV and p. 188) and Balinski and Laraki [
16] (
Section 5.2).)
Remark 10.8. The value of our systems is greater the lower the frequency of Condorcet preference cycles. Empirically, such cycles seem to be uncommon (see, e.g.,
Section 10 of Po0).
Remark 10.9. Positing knowledge of other voters’ preferences, as this paper does, is not a novel concept and has a long tradition. The idea played a basic role (e.g.) in Farquharson’s [
17] (p. 38) classic development of “sophisticated voting”; in related schemes of McKelvey and Niemi [
18]; and in the articles of Niemi and Frank [
19], Eckel and Holt [
20], and Felsenthal, Maoz, and Rapoport [
21]. Both in those works and in the voting systems proposed here, each voter’s knowledge of the preference profile of the electorate is the key to bringing about improvements in the voting process. More recent articles that assume voters’ knowledge of other voters’ preferences include Niou [
14], Brams and Sanver [
6], and Peress [
7], as well as Po0. Any posited knowledge of electorate preferences is used only for determining voter strategies and, obviously, could not properly be used in any aggregation procedure.
One might be tempted to ask why an election is even needed at all if electorate preferences can already be discerned. Of course, not holding an election could hardly be legitimate.
Remark 10.10. How might voters obtain the needed information about the preference profile of the electorate? For various ideas and possibilities, see (e.g.)
Section 9 of Po0. The information sources mentioned there include past election results, discussions in the media, and interactions with other voters. Especially, though, they include results from a certain type of public-opinion poll (Condorcet polling, covered in Potthoff [
22]), which could apply in somewhat the same fashion as described in the work of McKelvey and Ordeshook [
23] on rational-expectations equilibrium. More speculatively, they also include political stock markets.
Remark 10.11. To the extent that our systems work as intended, the discerned electorate preferences do not often play a role in the eventual aggregation, thus somewhat limiting their import. Paradoxically, their purpose is, in essence, to prevent them from being needed, or at least from needing to be used. Their function is to deter manipulation. If that deterrence succeeds, then manipulated vote cycles are not created, and only the voters’ own reported preference rankings will generally play a role in the aggregation.
Remark 10.12. The voting systems of this paper (and of Po0) can be seen as falling under the wide umbrella of mechanism design (e.g., Moore [
24]; Maskin [
25]; Jackson [
26]; Maskin and Sjöström [
27]), sometimes referred to also as design of game forms or as reverse game theory. Mechanism design does cover voting systems but deals especially with economic problems. Typically, it does not involve preference groups of differing sizes, as in our work, nor use anything like our unusual ballots. Its results are often highly theoretical and abstract, and limited in their practicality (e.g., Moore [
24] (pp. 209 ff.))—unlike the systems of the present paper, which, though not as suited as those of Po0 to real-world elections, are nonetheless workable.
Remark 10.13. Ranking of
m candidates for either preferences or votes (
Section 2) is more involved the larger
m is, although any ranked voting system becomes more burdensome for voters as
m increases. The points in
Section 8 mitigate the complexities, though.
Although one could even question the assumption of transitivity of individual preferences (along the lines of Tversky [
28], e.g.,), this issue would seem to be minor. For instance, the ABC exit poll among Anderson, Carter, and Reagan in the 1980 U.S. presidential election found individual intransitivity in only 52 respondents among 8146 (Blydenburgh [
29] (p. 105)).
Remark 10.14. The RA ballot can be simply designed so as to require only a single mark beyond what an ordinary ranked ballot requests (cf. Po0, and the displays in the examples above).
Remark 10.15. Section 3.3 did not define the set S for any case where no Condorcet preference winner is discerned (although for definiteness it could have done so). For some other cases,
Section 3.3 could allow leeway for base strategies without affecting non-manipulability proofs but, for definiteness, it still defined S. But any indefiniteness concerning S does not prevent the use of any RR or RA system in an actual election, since the aggregation procedure is independent of S and is thus always well defined (though non-manipulability may fail in some cases).
Remark 10.16. Although Examples 3 and 4 in
Section 5.2 prove that manipulation is indeed mathematically possible, the situations may be so complex that, practically speaking, voters may be unable to discover and carry out the successful manipulation strategies. Difficulty in understanding the role of the candidate triples and of the ascription of approval votes, along with uncertain discernment of electorate profiles, may deter manipulation efforts.
In general, the seriousness of whatever manipulability exists may largely depend not only on how easy or hard it is for voters to manipulate the system, but also on how often there are voter preference profiles where manipulation is even possible. These points may not be easy to judge.
Remark 10.17. Although we have pointed out some contrasts among the six systems of this paper, we have attempted no assessments to compare RR2 versus RR3 or RA2 versus RA3.
Remark 10.18. Unfortunately, any voting system whose ballot asks for voters’ candidate rankings
and nothing more is doomed to be manipulable even in the rather extreme simple case where the domain of true-preference profiles is restricted to those that are single‑peaked. This is shown by the following example, which resembles that of Blin and Satterthwaite [
30] but is more general (it applies to
any Condorcet completion method, not just Borda as in the earlier article) and is also like that of Penn, Patty, and Gailmard [
31] (pp. 447–448) though the perspective differs:
Example 7. Suppose that 100 voters each report rankings of three candidates X, Y, and Z with the result that there are 36 ballots marked XYZ (X first, Y second, Z third), 33 marked YZX, and 31 with ZXY. Thus, there is no Condorcet vote winner. Consider the following three voter preference profiles (each of which is consistent with single-peaked preferences:
Profile | Number of Voters Whose True Preference Order Is | Condorcet Preference Winner |
XYZ | XZY | YXZ | YZX | ZXY | ZYX |
1 | 36 | 0 | 33 | 0 | 31 | 0 | X |
2 | 36 | 0 | 0 | 33 | 0 | 31 | Y |
3 | 0 | 36 | 0 | 33 | 31 | 0 | Z |
The observed ballot results could have arisen from Profile 1 if the 33 YXZ voters had voted YZX (and all others had voted their true preferences), from Profile 2 if ZYX voters had voted ZXY, or from Profile 3 if XZY voters had voted XYZ. From the ballots, there is no way to distinguish the three profiles with their three different Condorcet preference winners, even given that no more than one group sharing the same preference order deviated from voting its true preferences. Thus, no Condorcet completion method—including the many that have been proposed (e.g., Brams and Fishburn [
4] (pp. 210–212); also Felsenthal and Machover [
32])—would render the system non-manipulable, because the method could always select the “wrong” winner. That is, if it selected Y (Z, X) and Profile 1 (2, 3) were the true profile, then the unilateral manipulation of YXZ (ZYX, XZY) voters in voting YZX (ZXY, XYZ) would be rewarded by the dethronement of X (Y, Z) in favor of Y (Z, X).
All is not lost, however. Manipulations like those in Example 7, and others that are far more involved, can be thwarted. Our work shows that non-manipulable systems do exist when the true preferences of the electorate show no cyclical majorities, or even when they show a Condorcet preference winner but may otherwise show cycle(s), if the ballots ask for certain markings in addition to the usual rankings.
Remark 10.19. The Impossibility Theorem of Arrow [
33] and different results on ease of manipulation (e.g., Gibbard [
34]; Satterthwaite [
35]; Gärdenfors [
36]) are not encouraging to those who try to find good voting systems. Nonetheless, as our work is intended to convey, the outlook is not as bleak as one might suppose, at least for situations where cycles in voter preferences are absent or of limited impact.
Remark 10.20. It may not be widely recognized that the Arrow results and manipulation results just mentioned do not apply if information is available that is not derivable from the true‑preference profile. That is because the results follow from premises that assume availability of nothing other than the profile. They thus do not apply to approval voting nor, in fact, to any of the voting schemes covered here or in Po0. Of course, the unfavorable conclusions of those earlier works may well still hold under much broader premises (it would be highly optimistic to think otherwise), but different proofs would be required. Still, the lack of full applicability of the results may suggest that exploration of unusual voting systems can lead to unexpected benefits.