Física Estatística de eleições

Multimode Control Attacks on Elections

In 1992, Bartholdi, Tovey, and Trick opened the study of control attacks on elections---attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexity-theoretic hardness results can be used as shields against attacks. However, all the work in this line has assumed that the attacker employs just a single type of attack. In this paper, we model and study the case in which the attacker launches a multipronged (i.e., multimode) attack. We do so to more realistically capture the richness of real-life settings. For example, an attacker might simultaneously try to suppress some voters, attract new voters into the election, and introduce a spoiler candidate. Our model provides a unified framework for such varied attacks, and by constructing polynomial-time multiprong attack algorithms we prove that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time.
Comments:41 pages, 2 tables
Subjects:Computer Science and Game Theory (cs.GT); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Multiagent Systems (cs.MA)
ACM classes:I.2.11; F.2.2; F.1.3
Report number:URCS TR-2010-960
Cite as:arXiv:1007.1800v1 [cs.GT]

Local ePolitics Reputation Case Study

More and more people rely on Web information and with the advance of Web 2.0 technologies they can increasingly easily participate to the creation of this information. Country-level politicians could not ignore this trend and have started to use the Web to promote them or to demote their opponents. This paper presents how candidates to a French mayor local election and with less budget have engineered their Web campaign and online reputation. After presenting the settings of the local election, the Web tools used by the different candidates and the local journalists are detailed. These tools are evaluated from a security point of view and the legal issues that they have created are underlined.
Comments:Published in the Proceedings of the IADIS 2009 e-Society International Conference
Subjects:Computers and Society (cs.CY)
Cite as:arXiv:1002.2297v1 [cs.CY]


Postagens mais visitadas deste blog

O SEMCIÊNCIA mudou de casa

Quem é melhor? Michel Temer, Indio da Costa ou Guilherme Leal?

Qual era a montanha mais alta da Terra antes do Everest ser descoberto?