works
James Green-Armytage Strategic voting and nomination article Using computer simulations based on three separate data generating processes, I estimate the fraction of elections in which sincere voting is a core equilibrium given each of eight single-winner voting rules. Additionally, I determine how often each rule is vulnerable to simple voting strategies such as ‘burying’ and ‘compromising’, and how often each rule gives an incentive for non-winning candidates to enter or leave races. I find that Hare is least vulnerable to strategic voting in general, whereas Borda, Coombs, approval, and range are most vulnerable. I find that plurality is most vulnerable to compromising and strategic exit (causing an unusually strong tendency toward two-party systems), and that Borda is most vulnerable to strategic entry. I use analytical proofs to provide further intuition for some of my key results.

Strategic voting and nomination

James Green-Armytage

Social Choice and Welfare, vol. 42, no. 1, 2014, pp. 111–138

Abstract

Using computer simulations based on three separate data generating processes, I estimate the fraction of elections in which sincere voting is a core equilibrium given each of eight single-winner voting rules. Additionally, I determine how often each rule is vulnerable to simple voting strategies such as ‘burying’ and ‘compromising’, and how often each rule gives an incentive for non-winning candidates to enter or leave races. I find that Hare is least vulnerable to strategic voting in general, whereas Borda, Coombs, approval, and range are most vulnerable. I find that plurality is most vulnerable to compromising and strategic exit (causing an unusually strong tendency toward two-party systems), and that Borda is most vulnerable to strategic entry. I use analytical proofs to provide further intuition for some of my key results.

PDF

First page of PDF