1 Introduction

The plurality rule selecting the alternative receiving the maximum number of votes is the most commonly used social choice function (or voting rule) in real life. The plurality rule is also supported by several axiomatic characterizations starting with Richelson (1978) and Roberts (1991). Sanver (2009) determined the non-manipulable domains for the plurality rule. Furthermore, the plurality rule has been derived as the solution of reasonable optimization problems by Nitzan (1981), Elkind et al. (2015), and Bednay et al. (2017) etc. In particular, Bednay et al. (2017) introduced and derived the reverse-plurality rule, which selects the alternative receiving the fewest number of votes. The plurality rule and the reverse plurality rules are special cases of the plurality kth rules introduced in this paper. The plurality kth rule selects the alternative receiving the k most number of votes. We resolve ties based on an exogenously given tie-breaking rule.

In multi-winner voting, k alternatives/candidates are selected. For instance, situations where first a shortlist of candidates is created so that in a subsequent round judges can select the winning candidate. Another example is the formation of committees. The problem requires that voters express preferences over the possible winning k-sized sets, which can be too demanding for each voter since the number of k-sized sets becomes easily very large to be ranked by individuals or can require communicating too much information (see for instance Kilgour (2018)). Therefore, multi-winner voting rules usually need from the voters to reveal only their preferences over the set of alternatives as in case of single-winner voting rules. The loss of information makes the investigation of the manipulability of multi-winner voting rules more intriguing. Therefore, more information has to be elicited from the revealed preferences (e.g. Lang and Xia (2016)). Many multi-winner voting rules are simply derived from single-winning voting rules by picking the best k alternatives determined by the respective single-winning voting rules. Choosing the appropriate multi-winner voting rule depends on the problem. Elkind et al. (2017) distinguish between excellence-based election, selecting a diverse committee and proportional representation type multi-winner election problems. For our analysis, the first criterion which focuses on selecting individually best alternatives, is relevant.

The simplest multi-winner voting rule is the so-called single non-transferable vote (SNTV) rule, which can be regarded as an extension of the plurality rule. Plurality based multi-winner voting rules are investigated by Faliszewski et al. (2018). The choices of the plurality, plurality 2nd, \(\ldots \), plurality kth rules are the same as that of the SNTV rule selecting a k-sized set. The plurality kth rule basically selects the alternative just making it into the k-sized committee, while the plurality \(k+1\)th rule determines the alternative just not making it in there. Clearly, investigating the manipulability of these rules are simpler than that of the SNTV rule. We assume that when comparing two k-sized sets each voter only cares about the alternatives appearing in the symmetric difference of these two sets. We will establish a link between the manipulability of the plurality kth rule and the associated multi-winner voting rule selecting the alternatives obtaining the k highest plurality scores.

We order/arrange the plurality kth rules based on the proportion of manipulable profiles, an approach propagated by Kelly (1985) and Aleskerov and Kurbanov (1999). From the Gibbard–Satterthwaite theorem (1973/75) it follows that the plurality kth rules are manipulable. Concerning individual manipulability, the proportion of manipulable profiles increases in k. The importance of the plurality kth rules is stressed by the observation that any voting rule can be decomposed based on plurality kth rules. Furthermore, we can arrive in this way to a new domain which is maximal with respect to non-manipulability.

Our latter result can be compared with (Maus et al. 2007a, b). They determine under certain combinations of basic properties the voting rules with the smallest number of manipulable profiles. In particular, for tops-only, anonymous, and surjective social choice functions Maus et al. (2007a) establish that the unanimity rules with status quo have the minimal number of manipulable profiles. Maus et al. (2007b) derive the lower bound on the number of manipulable profiles by imposing assumptions on the number of voters and alternatives (they require that the number of voters is at least as large as the number of alternatives). They also find that social choice functions exhibit a trade off between minimizing manipulability and treating alternatives neutrally.

The paper is organized as follows. Section 2 introduces the framework. Section 3 contains results on individual manipulability. Section 4 describes the maximal non-manipulable subdomains. Section 5 presents the decomposition and Sect. 6 concludes. Finally, the “Appendix” contains further mathematical findings concerning the group manipulability of the plurality kth rules.

2 The framework

The set of alternatives is \(A=\{1,\ldots ,m\}\) with \(|A|=m\ge 2\). The set of voters is \(N=\{1,\ldots ,n\}\). The set of all strict preference relations (or linear orderingsFootnote 1) on A is denoted by \({{\mathcal {P}}}\). The set of all preference profiles is denoted by \({{\mathcal {P}}}^n\). If \(\succ \in {{\mathcal {P}}}^n\) and \(i\in N\), \(\succ _i\) denotes the preference ordering of voter i over A.

Definition 1

A social choice function (SCF) or a voting rule is a mapping \(f:{{\mathcal {P}}}^n\rightarrow A\) that selects a winning alternative for each preference profile.

Note that our definition of a SCF does not allow for possible ties. In case of ties, a fixed tie-breaking rule will be used. A tie-breaking rule \(\tau :{{\mathcal {P}}}^n\rightarrow {{\mathcal {P}}}\) maps preference profiles to linear orderings on A. The tie-breaking rule is used only when a unique winner is not determined by the formula. If there are more alternatives chosen by a formula “almost” specifying a SCF, then the highest ranked alternative is selected, based on the given tie-breaking rule among tied alternatives. A tie-breaking rule is called anonymous if it is invariant to the ordering of voters’ preferences or to the labeling of voters. For instance, the simplest anonymous tie-breaking rule assigns to each profile the same exogenously given ordering of alternatives. It is worth emphasizing that we only consider deterministic tie-breaking rules. For some results, we need a special class of tie-breaking rules which we refer to as tie-order preserving ones meaning that if at a profile \(\succ \in {{\mathcal {P}}}^n\) alternatives \(T\subseteq A\) are tied at consecutive places and by changing voter i’s preference to \(\succ ^\prime _i\in {{\mathcal {P}}}\) at profile \((\succ _i^\prime ,\succ _{-i})\) alternatives \(T^\prime \subseteq A\) are tied at consecutive places, then \(\tau \) orders the alternatives \(T\cap T^\prime \) in the same way at both profiles. For instance, any constant tie-breaking rule (i.e. ties are determined based on an exogenously given linear ordering of alternatives) is tie-order preserving.

The reverse-plurality rule \(f_\tau \) selects the alternative which is the fewest number of times on the top and uses the tie-breaking rule \(\tau \) to resolve ties when required. The following class of rules range from the reverse-plurality rule to the plurality rule.

Definition 2

Rank the alternatives based on their plurality scores and employ a tie-breaking rule \(\tau \) in case of ties, to obtain a linear ordering of the alternatives. The plurality kth rule \(f_\tau ^{(k)}\) selects the kth placed alternative in the obtained linear ordering.

Clearly the plurality rule is the plurality 1st rule and the reverse-plurality rule is the plurality mth rule.

We now define multi-winner voting rules, which in our setting choose k alternatives out of the m alternatives. Let \({{\mathcal {C}}}^{(k)}\) be set of all k-sized subsets of A.

Definition 3

A mapping \(g:{{\mathcal {P}}}^n\rightarrow {{\mathcal {C}}}^{(k)}\) that selects the winning k-sized subset of alternatives is called a multi-winner voting rule (MWVR).

We will consider the single non-transferable vote rule (referred to as the SNTV rule), which is a straightforward extension of the plurality rule to a MWVR.

Definition 4

For a given \(k=1,\ldots ,m\), the single non-transferable vote rule \(g_\tau ^{(k)}:{{\mathcal {P}}}^n\rightarrow {{\mathcal {C}}}^{(k)}\) selects the first k placed alternatives obtained by ranking the alternatives based on their plurality scores and employing the tie-breaking rule \(\tau \) to resolve possible ties.

Note that \(g_\tau ^{(k)}=\{f_\tau ^{(1)},f_\tau ^{(2)},\ldots ,f_\tau ^{(k)}\}\). We define below the individual manipulability of SCFs. Consider a preference profile \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\).

Definition 5

An SCF \(f:{{\mathcal {P}}}^n\rightarrow A\) is manipulable by voter \(i\in N\) at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\) if

$$\begin{aligned} \exists \succ '_i\in {{\mathcal {P}}}\ \text {such that}\ f(\succ '_i,\succ _{-i})\succ _i f(\succ _i,\succ _{-i}). \end{aligned}$$

An SCF \(f:{{\mathcal {P}}}^n\rightarrow A\) is manipulable at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\) if there exists a voter \(i\in N\) who can manipulate f at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\).

We now define the manipulability of a MWVR. This requires a notion about how a voter compares two possible sets of winners of cardinality k. One possibility is that each voter compares two possible sets of winners lexicographically with respect to its preference relation. We believe this is a natural assumption, for instance in situations where a voter is represented by a single candidate or when the MWVR determines a preselection process and the single winner is chosen in another independent round.Footnote 2 We will denote by \(\succ ^L\) the lexicographic extension of \(\succ \) to the class of k-sized sets of alternatives. In particular, for any \(B=\{b_1,\ldots ,b_k\}\subseteq A\) and any \(C=\{c_1,\ldots ,c_k\}\subseteq A\), where we assume without loss of generality that \(b_1\succ b_2\succ \ldots \succ b_k\) and \(c_1\succ c_2\succ \ldots \succ c_k\), we have \(B\succ ^L C\) if and only if there exists an \(l\in M\) such that \(b_l\succ c_l\) and \(b_j=c_j\) for all \(j=1,\ldots ,l-1\). Finally, we will carry out the comparison of two k-sized sets B and C by comparing \(B\setminus C\) and \(C\setminus B\) based on the lexicographic extension of \(\succ \). Formally, we write \(B\succ ^D C\) if \(B\setminus C \succ ^L C\setminus B\). In our framework the sets \(B\setminus C\) and \(C\setminus B\) to be compared will be singletons, which correspond to an alternative entering the selected k-sized set and an alternative exiting the k-sized set through manipulations. It may be reasonable in many contexts to assume that the comparison has to be carried out based on the changes in a set. Since then only singletons have to be compared the investigation of the manipulability of the SNTV rule will become quite simple and very similar to the investigation of the manipulability of the plurality kth rules. It may be reasonable in many contexts to assume that the comparison has to be carried out based on the changes in a set and can be considered as a kind of independence or separability property.

For MWVRs we also introduce individual manipulability.

Definition 6

A MWVR \(g:{{\mathcal {P}}}^n\rightarrow {{\mathcal {C}}}^{(k)}\) is manipulable by voter \(i\in N\) at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\) if

$$\begin{aligned} \exists \succ '_i\in {{\mathcal {P}}}\ \text {such that}\ g(\succ '_i,\succ _{-i})\succ ^D_i g(\succ _i,\succ _{-i}). \end{aligned}$$

A MWVR \(g:{{\mathcal {P}}}^n\rightarrow {{\mathcal {C}}}^{(k)}\) is manipulable at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\) if there exists a voter \(i\in N\) who can manipulate g at \((\succ _1,\ldots ,\succ _n)\in {{\mathcal {P}}}^n\).

Concerning individual manipulability, we will investigate the manipulability of subdomains for which we introduce the following notion.

Definition 7

An SCF \(f:{{\mathcal {P}}}^n\rightarrow A\) or a MWVR \(g:{{\mathcal {P}}}^n\rightarrow {{\mathcal {C}}}^{(k)}\) is non-manipulable on a subdomain \({{\mathcal {D}}}\subseteq {{\mathcal {P}}}^n\) if for voters’ preference profiles in \({{\mathcal {D}}}\) none of them can manipulate by misrepresenting its preference relation without leaving the preference domain \({{\mathcal {D}}}\).

Hence, a subdomain is non-manipulable if staying within \({{\mathcal {D}}}\), individual manipulation is impossible. Note that non-manipulable subdomains exist since if \({{\mathcal {D}}}\) is ‘disconnected’ or ‘sparse enough’ so that none of the voters can change their preference relation individually in a way that for any given profile in \({{\mathcal {D}}}\) the resulting profile remains in \({{\mathcal {D}}}\), then \({{\mathcal {D}}}\) is a non-manipulable subdomain for any SCF. Maximal non-manipulable subdomains in which each agent faced the same restriction imposed on the set of its admissible preferences have been determined for the Borda count by Barbie et al. (2006) and for the plurality rule by Sanver (2009).

In order to prevent us from investigating ‘disconnected’ subdomains we introduce the following notion.

Definition 8

A domain \({{\mathcal {D}}}\subseteq {{\mathcal {P}}}^n\) is called connected if for any profiles \(\succ ,\succ ^\prime \in {{\mathcal {P}}}^n\) there exists a sequence of profiles \(\succ ^{(0)},\succ ^{(1)},\ldots ,\succ ^{(l)}\in {{\mathcal {D}}}\) such that \(\succ ^{(0)}=\succ \), \(\succ ^{(l)}=\succ ^\prime \) and two subsequent profiles of the sequence differ only in the preference relation of one voter.

Informally, the connectedness of a domain means that from any profile of a domain any other profile of the same domain can be reached by a sequence of individual manipulations.

The most obvious index of manipulability, the so-called Nitzan-Kelly index (NKI) introduced by Nitzan (1985) and Kelly (1988), divides the number of manipulable profiles by the number of all profiles. We will consider two versions of the NKI: one assumes the impartial culture (IC), while the other one the anonymous impartial culture (AIC) of preference profiles. In the former case (IC) voters’ preferences are chosen independently and based on the uniform distribution above the set of all profiles (i.e. each preference relation is assigned independently and equally likely to the voters), while in the latter case (AIC) only the number of occurrences of a preference relation in a preference profile matters and not their distribution between voters (i.e. each anonymous preference profile is equally likely).Footnote 3 In particular, label the different preferences from 1 to m! and let \(n_1,\ldots ,n_{m!}\) be the respective number of preferences \(\succ _1,\ldots ,\succ _{m!}\) for a given profile. Then in case of anonymous profiles only these numbers matter, while the assignment of these preferences to the voters does not.

Henceforth, we shall denote by \(M_a=\{i\in N\mid a=t(\succ _i)\}\) the set of agents with top alternative \(a\in A\), where \(t(\succ _i)\) stands for the top alternative of \(\succ _i\). In addition, let \(r_\tau \left( \succ ,j\right) \in A\) be the jth ranked alternative by the plurality rule with a given tie-breaking rule \(\tau \) and \(s\left( \succ ,a\right) \) be the number of top positions of alternative \(a\in A\) in case of \(\succ \in {{\mathcal {P}}}^n\), i.e. the plurality score of alternative a. Furthermore, let \(p_\tau \left( \succ ,j\right) =s\left( \succ ,r_\tau \left( \succ ,j\right) \right) \) be the plurality score of the jth ranked alternative.

3 Individual manipulability

In this section we turn to the individual manipulability of plurality kth rules and we start with some general and simple observations. Let \(a=r_\tau \left( \succ ,k-1\right) \), \(b=r_\tau \left( \succ ,k\right) \) and \(c=r_\tau \left( \succ ,k+1\right) \). With a slight abuse of notation let a be undefined if \(k=1\) and c be undefined if \(k=m\). Note that by individual manipulation the relative difference in plurality scores can change by at most 2. In particular, we have a successful manipulation of the plurality kth rule by moving the \(k-1\)th ranked alternative (in case of \(k\ge 2\)) into the kth position

  1. 1.

    If a leads by two and a voter having a as the top alternative reveals b as its top alternative assuming that \(\tau \) gives priority to b over a for the respective profile,

  2. 2.

    If a leads by one and a voter having a as the top alternative reveals again b as its top alternative, however now we have to assume that \(\tau \) should give priority to a over other potentially tied alternatives,

  3. 3.

    If a is tied with b, while c has a lower score, then the type of manipulation described in Point 2 still works,

  4. 4.

    If a, b, c are all tied and assuming that \(\tau \) gives priority to a over lower ranked tied alternatives, a voter having alternative c as its top alternative and preferring a to b reveals b as its top alternative.

Since we are moving in the above described cases the \(k-1\)th ranked alternative into a lower ranked winning position, we are speaking about downwards manipulation. More generally, downwards manipulation can be extended to the case when a \(k-j\)th ranked alternative is ‘degraded’ to the kth ranked alternative by benefiting the manipulating voter.

Now we turn to the question whether a successful manipulation of the plurality kth rule by moving the \(k+1\)th ranked alternative (in case of \(k\le m-1\)) into the kth position is possible. Since the plurality score of b can only be decreased by a voter having b on top, which is not beneficial for that voter, this type of upwards manipulation has less cases than downwards manipulation. More specifically, we have the following three potentially successful upwards manipulation possibilities.

  1. 5.

    If b leads by one against c, then and a voter preferring c to b with another top ranked alternative reveals c as its top alternative (\(\tau \) can be set appropriately depending on whether the third alternative is tied with b or not).

  2. 6.

    If a leads by at least one and b is tied with c, then a voter preferring c to b with another top ranked alternative reveals again c as its top alternative (in this case we have even less restrictions in choosing the tie-breaking rule for the manipulated profile).

  3. 7.

    If a, b and c are all tied, then a voter with top alternative a and preferring c to b reveals b as its top alternative (the tie-breaking rule should not change the ordering of alternatives potentially tied with c).

Upwards manipulation can be extended to the case when a \(k+l\)th ranked alternative is ‘upgraded’ to the kth ranked alternative by benefiting the manipulating voter.

First, we show that the plurality second rule is manipulable on at least as many profiles as the plurality rule. We motivate the main step of our proof by the example shown in Table 1 in which \(m=4\) and \(n=7\). The plurality rule is manipulable at the profile shown on the left-hand side of Table 1 by voter 7. In order to maintain that voter 7 manipulates by making b the winning alternative instead of a for the plurality 2nd rule, we make the top alternative c of voter 7 the plurality winner by switching the positions of a with c and b with c for the first voters having a and b on top, respectively. The resulting profile is shown on the right-hand side of Table 1 in which voter 7 can manipulate the plurality 2nd rule. The main point of this example is that we associate to the manipulable profile for the plurality rule another manipulable profile for the plurality 2nd rule in which the same voter manipulates in exactly the same way.

Table 1 Moving a manipulation possibility downwards

We shall denote by \({{\mathcal {D}}}_k\) and \({{\mathcal {D}}}_k^a\) the set of profiles and anonymous profiles, respectively, on which the plurality kth rule is individually manipulable.

Proposition 1

Assume that \(m\ge 3\), \(n\ge m+2\), and \(\tau \) is a given tie-breaking rule. Considering individual manipulability, there exists a tie-breaking rule \(\tau ^\prime \) such that the NKI of the plurality rule \(f_\tau ^{(1)}\) is smaller than or equal to the NKI of the plurality 2nd rule \(f_{\tau ^\prime }^{(2)}\) on both the IC and the AIC, where in the latter case anonymous tie-breaking rules have to be assumed.

Proof

We will construct an injection \(f:{{\mathcal {D}}}_1\rightarrow {{\mathcal {D}}}_2\). Pick an arbitrary profile \(\Pi \) at which the plurality rule is manipulable.

We label the alternatives such that \(|M_{a_1}|\ge |M_{a_2}|\ge \cdots \ge |M_{a_m}|\) and that in case of equalities they follow the ordering given by \(\tau \). Order the voters such that the \(|M_{a_1}|\) voters with \(a_1\) on the top come first, next the \(|M_{a_2}|\) voters with \(a_2\) on the top follow, and so forth. The ordering of voters having the same top alternative should be kept. We shall denote the reordered profile by \(\Pi _\sigma \), where \(\sigma \) stands for the respective bijection.

Since the plurality rule is manipulable at \(\Pi _\sigma \) there exist \(i,j\in A\) and a voter \(q\in N\) such that either \(|M_{a_1}|=|M_{a_i}|\) or \(|M_{a_1}|=|M_{a_i}|+1\), \(q\in M_{a_j}\), and q prefers \(a_i\) to \(a_1\) and can enforce outcome \(a_i\) by revealing a preference ordering with \(a_i\) as its top-ranked alternative. Select i, j, and q so that, following the respective lexicographic ordering, they are as small as possible. We exchange the preference ordering of voter q with that of the last voter having also \(a_j\) as the top alternative if this is not already the case. With a slight abuse of notation we shall denote the obtained permutation still by \(\sigma \). Note that manipulability requires that \(\Pi _\sigma \) has at least three different top alternatives.

Our strategy will be to make alternative \(a_m\) the clear plurality winner and to maintain the ranking of the other alternatives based on their respective number of top positions such that voter q can make \(a_i\) the plurality 2nd rule winner by ‘overtaking’ \(a_1\). We shall denote by l the smallest positive integer for which

  • \(l_k=\max \left\{ |M_{a_k}|-l,1\right\} \) for all \(k=1,\ldots ,m-1\),

  • \(l_m=l_1+\cdots +l_{k-1}\) and

  • \(|M_{a_1}|-l_1<|M_{a_m}|+l_m\),

where \(n\ge m+2\) is a sufficient condition to guarantee that the last inequality can be achieved independently from \(\Pi \). Then we change the respective number of top positions of the alternatives to

$$\begin{aligned} |M_{a_1}|-l_1, \ldots , |M_{a_{m-1}}|-l_{m-1}, |M_{a_m}|+l_m, \end{aligned}$$

where \(a_k\) and \(a_m\) should exchange their positions in the preference relations of the first \(l_k\) voters in \(M_{a_k}\) for all \(k=1,\ldots ,m-1\). We shall denote the obtained profile by \(\Pi ^\prime _{\sigma }\). In the special case of \(|M_{a_1}|-l_1=|M_{a_i}|-l_i\) we set the tie-breaking rule \(\tau ^\prime \) at \(\Pi ^\prime _{\sigma }\) so that alternative \(a_{1}\) is the most preferred one among the alternatives it is tied with. We emphasize that by our construction any alternative that was a top alternative of at least one voter in \(\Pi _\sigma \) remains also a top alternative of at least one voter in \(\Pi ^\prime _{\sigma }\). The remaining at least one voter with the respective top alternative in \(\Pi ^\prime _{\sigma }\) serves as a separator so that \(\Pi _\sigma \) can be reconstructed from \(\Pi ^\prime _{\sigma }\).

Thereafter, since \(\sigma \) is a bijection we have defined an injection \(f:{{\mathcal {D}}}_1\rightarrow {{\mathcal {D}}}_2\) and our result on the Nitzan-Kelly index on the IC follows. Finally, to arrive to the same statement on the AIC we just have to take into consideration that for anonymous SCFs the AIC is basically related to a special ordering of preference relations. In particular, the ordering of profiles can be also obtained in two steps: first, order the profiles decreasingly based on their plurality scores, and second identical preferences should follow each other consecutively. \(\square \)

Second, we show that the reverse plurality rule is manipulable on at least as many profiles as the plurality \(m-1\)th rule. We motivate the main step of our proof by the example shown in Table 2 in which \(m=4\) and \(n=7\). The plurality \(m-1\)th rule chooses alternative c for a tie-breaking rule preferring b to c at the profile shown on the left-hand side of Table 2. The profile is manipulable by the first five voters for a tie-breaking rule preferring b over c and c over a in the respective manipulated profiles. Let us pick the first voter with the \(m-2\)nd highest plurality score, that is voter 4. In order to maintain that voter 4 manipulates by making b the winning alternative instead of c for the reverse plurality rule, we make the top alternative b of voter 4 the plurality \(m-1\)th winner by switching the positions of a with d, b with d and c with d for the last voters having a, b and c on top, respectively. The resulting profile is shown on the right-hand side of Table 2 in which voter 4 can manipulate the plurality \(m-1\)th rule. Now voter 4 can manipulate the reverse plurality rule by revealing a preference relation having c on top. The main point is that voter 4 can manipulate the reverse plurality rule at the profile on the right-hand side of Table 2 in the same way as at the profile on the left-hand side of Table 2.

Table 2 Moving a manipulation possibility downwards

The proof of Proposition 2 will be quite similar to the proof of Proposition 1. However, in the previous proof we had upwards manipulation, whereas in the respective main part of the proof of our next proposition we will employ downwards manipulation.

Proposition 2

Assume that \(m\ge 3\), \(n\ge m+2\), and \(\tau \) is a given tie-breaking rule. Considering individual manipulability, there exists a tie-breaking rule \(\tau ^\prime \) such that the plurality \(m-1\)th rule \(f_\tau ^{(m-1)}\) has not a larger NKI than the reverse-plurality rule \(f_{\tau ^\prime }^{(m)}\) on both the IC and the AIC cases, where in the latter case anonymous tie-breaking rules have to be assumed.

Proof

We will construct an injection \(f:{{\mathcal {D}}}_{m-1}\rightarrow {{\mathcal {D}}}_m\). Pick an arbitrary profile \(\Pi \) at which the plurality \(m-1\)th rule is manipulable.

We label the alternatives such that \(|M_{a_1}|\ge |M_{a_2}|\ge \cdots \ge |M_{a_m}|\) and that in case of equalities they follow the ordering given by \(\tau \). Order the voters such that the \(|M_{a_1}|\) voters with \(a_1\) on the top come first, next the \(|M_{a_2}|\) voters with \(a_2\) on the top follow, and so forth. The ordering of voters having the same top alternative should be kept. We shall denote the reordered profile by \(\Pi _\sigma \), where \(\sigma \) stands for the respective permutation.

Since the plurality \(m-1\)th rule is manipulable at \(\Pi _\sigma \) there exist \(i,j\in A\) and a voter \(q\in N\) such that \(q\in M_{a_j}\), and q prefers \(a_i\) to \(a_{m-1}\) and can enforce outcome \(a_i\). In particular, either \(i=m\) (and then \(j<m-1\)) in case of upwards manipulation or \(i<m-1\) in case of downwards manipulation. In the former case q reveals a preference ordering with \(a_i\) as its top alternative, while in the latter case q reveals a preference ordering with \(a_{m-1}\) as its top alternative. Select i, j, and q so that, following the respective lexicographic ordering, they are as small as possible, which implies the choice of downwards manipulation if both are possible. We exchange the preference ordering of voter q with that of the first voter having also \(a_j\) as the top alternative if this is not already the case. With a slight abuse of notation we will denote the obtained permutation still by \(\sigma \).

We distinguish between two different cases. In Case A we assume that the downwards manipulability (i.e. \(i<m-1\)) of the plurality \(m-1\)th rule is possible at \(\Pi _\sigma \), which requires that \(|M_{a_{m-1}}|\le |M_{a_i}|\le |M_{a_{m-1}}|+2\). In Case B we assume that the downwards manipulability of the plurality \(m-1\)th rule is not possible at \(\Pi _\sigma \) (i.e. \(i=m\)), and therefore only upwards manipulabilty is feasible.

We start with Case A. Our strategy will be to ensure a lead of alternative \(a_m\) against alternative \(a_{m-1}\) in the number of top positions by at least 1 voter. Then voter q can make \(a_i\) the winner of the reverse-plurality rule by ‘overtaking’ \(a_{m-1}\). We shall denote by l the smallest positive integer for which

  • \(l_k=\max \left\{ |M_{a_k}|-l,1\right\} \) for all \(k=1,\ldots ,m-1\),

  • \(l_m=l_1+\cdots +l_{k-1}\) and

  • \(|M_{a_{m-1}}|-l_{m-1}<|M_{a_m}|+l_m\).

Then we change the respective number of top positions of the alternatives to

$$\begin{aligned} |M_{a_1}|-l_1, \ldots , |M_{a_{m-1}}|-l_{m-1}, |M_{a_m}|+l_m, \end{aligned}$$

where \(a_k\) and \(a_m\) should exchange their positions in the preference relations of the last \(l_k\) voters in \(M_{a_k}\) for all \(k=1,\ldots ,m-1\). We shall denote the obtained profile by \(\Pi _{\sigma }^\prime \). In the special case of \(|M_{a_i}|-l_i=|M_{a_{m-1}}|-l_{m-1}\) we set the tie-breaking rule \(\tau ^\prime \) at \(\Pi _{\sigma }^\prime \) so that alternative \(a_{m-1}\) is the least preferred one among the alternatives it is tied with. Note that downwards manipulation of the plurality \(m-1\)th rule is not possible at \(\Pi _\sigma \) if \(|M_{a_1}|=|M_{a_2}|=cldots=|M_{a_m}|\). Taking into account that \(n\ge m+2\), \(|M_{a_1}|>|M_{a_m}|\) and \(|M_{a_1}|\) could be reduced to one, we have \(l\in \left\{ 1,\ldots ,|M_{a_1}|-1\right\} \), which in turn implies that l is well-defined. By the construction of \(\Pi ^\prime _\sigma \) all alternatives being at least twice on top in \(\Pi _\sigma \) remain at least once on top in \(\Pi ^\prime _\sigma \). Since these alternatives are separated in \(\Pi ^\prime _\sigma \) by a certain number of preferences with \(a_m\) as their top alternatives it is straightforward to get back \(\Pi _\sigma \) from \(\Pi ^\prime _\sigma \).

We continue with Case B in which only the upward manipulation of \(\Pi \) is possible. Then any voter in \(M_{a_{m-1}}\) can manipulate the reverse-plurality rule by revealing a preference relation with \(a_m\) on top. Hence, \(\Pi ^\prime =\Pi =f(\Pi )\) and the reverse-plurality rule is manipulable at \(\Pi \).

Since only Case B produces profiles \(\Pi ^\prime \) in which manipulation can happen only between \(a_{m-1}\) and \(a_m\), we can deduce from \(\Pi ^\prime \) whether it has been derived through either Case A or B. Therefore, the constructed f is a bijection.

To see that our statement is valid under the IC assumption we reorder the preferences by \((\sigma ^\prime )^{-1}\) to obtain the desired profile \(\Pi ^\prime \). Since for any two profiles in \({{\mathcal {D}}}_{m-1}\) belonging to the same anonymous class (i.e. associated with the same profile in \({{\mathcal {D}}}_{m-1}^{a}\)) different permutations have to be applied in the beginning of the proof, we have defined an injection \(f:{{\mathcal {D}}}_{m-1}\rightarrow {{\mathcal {D}}}_m\). \(\square \)

For formulating an analogous statement for the SNTV rules it will be helpful to define the domain of profiles, which consists of the upwards manipulable domains. Therefore, we shall denote by \({{\mathcal {U}}}_k\) and \({{\mathcal {U}}}_k^a\) the set of profiles and anonymous profiles, respectively, on which the plurality kth rule is individually upwards manipulable.

Proposition 3

Assume that \(m\ge 3\), \(n\ge m+2\) and \(\tau \) is a given tie-breaking rule. Considering individual manipulability, there exists a tie-breaking rule \(\tau ^\prime \) such that the plurality kth rule \(f_\tau ^{(k)}\), where \(k=2,\ldots ,m-2\) has a smaller NKI on IC and AIC than the plurality \(k+1\)th rule \(f_{\tau ^\prime }^{(k+1)}\), where in the latter case anonymous tie-breaking rules have to be assumed.

Proof

First, we construct an injection \(f:{{\mathcal {U}}}_k\rightarrow {{\mathcal {U}}}_{k+1}\). Pick an arbitrary profile \(\Pi \) at which the plurality kth rule is upwards manipulable. This can be done in an analogous way to the proof of Proposition 1. Note that profiles like in Case B in the proof of Proposition 2 do not have to be treated separately.

Second, to extend f to \({{\mathcal {D}}}_k\) we have to deal with the profiles in \({{\mathcal {D}}}_k\setminus {{\mathcal {U}}}_k\). Note that these purely downwards manipulable profiles can be handled in an analogous way as Case A in the proof of Proposition 2.

Finally, whether the images of the profiles are obtained through either upwards or downwards manipulation can be easily recognized by checking were the transformed preferences can be found, that is either there are the first or last \(l_k\) preferences in the image for any \(k=1,\ldots ,m-1\). \(\square \)

Remark 1

The “antidictatorial rule”, which chooses the worst alternative of a fixed voter, is manipulable at each profile.

Remark 2

We have shown that individual manipulability, i.e. the number of manipulable profiles increases as we move from the plurality 1st rule to the plurality mth rule by varying k. We further show in the “Appendix” that all plurality kth rules, except the plurality 1st rule, are group manipulable. It is important to observe that the plurality 1st rule, like other standard scoring rules, satisfies the condition of positive or non-negative responsiveness.Footnote 4 This condition requires that if an alternative w is chosen at some preference profile and the position of w improves in the ranking of some voter while holding the ranking of all other alternatives fixed in this voter’s preference relation, then w is also selected at the modified preference profile. It is easy to show that all plurality kth rules with \(k>1\) violate positive responsiveness. This condition means that if a chosen alternative w improves in an agent’s preference but the preference ordering for all other pairs where both alternatives in the pair are different from w remains unchanged, then w must continue to be chosen in the modified profile. This monotonicity requirement, as is often observed in several allocation models, is critical for strategy-proofness.

Turning to the SNTV rule, it can be observed that its manipulability can be captured through upwards manipulations since a successful manipulation results in getting an alternative ranked outside of the top k alternatives (based on their plurality scores) into the set of top k winning alternatives. We shall denote the respective (upper) manipulable domains of the SNTV rule \(g_\tau ^{(k)}\) by \({{\mathcal {U}}}_k^s\).

Proposition 4

Assume that \(m\ge 3\), \(n\ge m+2\) and \(\tau \) is a given tie-preserving tie-breaking rule. Considering individual manipulability, the SNTV rule \(g_\tau ^{(k)}\), where \(k=1,\ldots ,m-2\), has a smaller NKI on IC and AIC than the SNTV rule \(g_{\tau }^{(k+1)}\), where in the AIC case anonymous tie-breaking rules have to be assumed.

Proof

We construct an injection \(f:{{\mathcal {U}}}^s_k\rightarrow {{\mathcal {U}}}^s_{k+1}\). Pick an arbitrary profile \(\succ \) at which the SNTV rule \(g_\tau ^{(k)}\) is manipulable. The heart of the proof is the proof of Proposition 1.

The three differences from the proof of Proposition 1 are the following ones:

  • The situation of ties can be handled more easily since it does not matter whether the alternative \(a_i\) entering the top k or \(k+1\) alternatives in plurality scores by the manipulation of voter q will just make it into the winning set or even better, and therefore assuming tie-preserving tie-breaking rules without modifying \(\tau \) to \(\tau ^\prime \) does the job.

  • It still does not matter that \(|M(a_m)|\) will be ranked highest since it cannot loose its top position by a single-voter manipulation.

  • The definition of \(\succ ^D_i\) reduces for \(\succ \) the comparison of sets \(g_\tau ^{(k)}(\succ )=\{a_1,\ldots ,a_k\}\) and \(g_\tau ^{(k)}(\succ _j^\prime ,\succ _{-j})=\{a_1,\ldots ,a_{l-1},a_i,a_{l+1},\ldots ,a_{k-1}\}\) to the comparison of alternatives \(a_i\) and \(a_k\) by \(\succ _i\), which is done in the proofs of Propositions 1 and 3.

\(\square \)

Note that the SNTV rule \(g_\tau ^{(m)}\) selects the set of all alternatives, and therefore a statement analogous to Proposition 2 does not hold true.

4 Non-manipulable subdomains

In this section we determine non-manipulable domains for the plurality kth rules, where we have to treat the plurality, the plurality kth with \(1<k<m\) and the reverse plurality rules separately.

Lemma 1

A non-manipulable domain for the plurality rule for any tie-breaking rule is given by

$$\begin{aligned} {{\mathcal {N}}}_1=\left\{ \succ \in {{\mathcal {P}}}^n\mid p_\tau \left( \succ ,1\right) -p_\tau \left( \succ ,2\right) \ge 1\right\} . \end{aligned}$$
(1)

Furthermore, \({{\mathcal {N}}}_1\) is a maximal non-manipulable connected subdomain for the plurality rule for any tie-breaking rule.

Proof

Clearly, a voter ranking the plurality winner on top has no incentive to misrepresent its preference relation, while voters with other top alternatives can individually only increase the votes of their lower ranked alternatives by the plurality rule by one. Therefore, for any profile in \({{\mathcal {N}}}_1\) any feasible manipulation has to result in an equal number of votes for the two leading alternatives based on their plurality scores in the manipulated profile, which is impossible without leaving \({{\mathcal {N}}}_1\), and therefore \({{\mathcal {N}}}_1\) is non-manipulable.

We prove that \({{\mathcal {N}}}_1\) is a maximal connected non-manipulable domain (for any tie-breaking rule). Note that \({{\mathcal {N}}}_1\) contains all unanimous profiles, that is all profiles in which all voters have the same top alternative. Pick an arbitrary profile \(\succ \) such that \(p_\tau \left( \succ ,1\right) =p_\tau \left( \succ ,2\right) >p_\tau \left( \succ ,3\right) \ge 0\).Footnote 5 Let \(a=r_\tau \left( \succ ,1\right) \) and \(b=r_\tau \left( \succ ,2\right) \). By the definition of \({{\mathcal {N}}}_1\) there exists a profile \(\succ ^\prime \in {{\mathcal {N}}}_1\) such that \(\succ _{-i}=\succ ^\prime _{-i}\) and \(a\succ _i^\prime b\) for a voter \(i\in N\) who has top alternative a in \(\succ _i\) and another top alternative c in \(\succ ^\prime _i\). If b and c get the same plurality scores at \(\succ ^\prime \), assume that \(b\tau (\succ ^\prime )c\). Then voter i can manipulate profile \(\succ ^\prime \) by revealing \(\succ _i\) instead of \(\succ _i^\prime \), which implies that \({{\mathcal {N}}}_1\cup \{\succ \}\) is manipulable. Hence, we can conclude that \({{\mathcal {N}}}_1\) is a maximal connected non-manipulable domain. \(\square \)

It is worth mentioning that \({{\mathcal {N}}}_1\) determines an ‘improper’ decomposition by letting \({{\mathcal {N}}}_2=\ldots ={{\mathcal {N}}}_m=\emptyset \).

A non-manipulable domain can be given easily in an analogous way to Lemma 1, which is also maximal in the sense that the differences in plurality scores cannot be reduced further; however, it still can be extended by some profiles without violating non-manipulability.

Lemma 2

A non-manipulable domain for the plurality kth rule, where \(k=2,\ldots ,m-1\), for any tie-breaking rule is given by

$$\begin{aligned} {{\mathcal {N}}}_k^u=\left\{ \succ \in {{\mathcal {P}}}^n\mid p_\tau \left( \succ ,k-1\right) -2\ge p_\tau \left( \succ ,k\right) \ge p_\tau \left( \succ ,k+1\right) +1\right\} . \end{aligned}$$
(2)

Let \(L\in {{\mathcal {P}}}\) be a given linear ordering of alternatives. Then

$$\begin{aligned} {{\mathcal {N}}}_k= & {} \left\{ \succ \in {{\mathcal {P}}}^n \right. \mid p_\tau \left( \succ ,k-1\right) -1=p_\tau \left( \succ ,k\right) \ge p_\tau \left( \succ ,k+1\right) +1 \text { and } \forall i\in A: \nonumber \\&\left. p_\tau \left( \succ ,i\right) =p_\tau \left( \succ ,k-1\right) \Rightarrow r_\tau \left( \succ ,i\right) \ L \ r_\tau \left( \succ ,k\right) \right\} \cup {{\mathcal {N}}}_k^u \end{aligned}$$
(3)

is a maximal non-manipulable connected subdomain for the plurality kth rule for any tie-breaking rule.Footnote 6

Proof

Taking downwards and upwards manipulations into account, a lead by at least 3 votes by the \(k-1\)th ranked alternative over the kth ranked alternative and a lead by at least 2 votes by the kth ranked alternative over the \(k+1\)th alternative makes manipulations impossible. However, since by individual misrepresentation we cannot leave \({{\mathcal {N}}}_k^u\) the differences for both downwards and upwards manipulations can be reduced by 1 as formulated in (2), and therefore \({{\mathcal {N}}}_k^u\) is indeed non-manipulable. Note that the differences in plurality scores in (2) cannot be decreased ‘uniformly’ (i.e. for all profiles) since reducing 2 to 1 in the first inequality would make it possible to switch a lead by one vote of the \(k-1\)th alternative over the kth alternative into the opposite direction without leaving the restricted subdomain and reducing 1 to 0 in the second inequality obviously opens the door for manipulation. This is also the reason why we can extend \({{\mathcal {N}}}_k^u\) (where superscript u stands for uniform) to \({{\mathcal {N}}}_k\) without allowing space for manipulation.

We prove that \({{\mathcal {N}}}_k\) is a maximal non-manipulable connected domain (for any tie-breaking rule). First, pick an arbitrary profile \(\succ \) such that either \(p_\tau \left( \succ ,k-1\right) -2\ge p_\tau \left( \succ ,k\right) =p_\tau \left( \succ ,k+1\right) \), or \(p_\tau \left( \succ ,k-1\right) -1= p_\tau \left( \succ ,k\right) =p_\tau \left( \succ ,k+1\right) \) and \(r_\tau \left( \succ ,k-1\right) \ L \ r_\tau \left( \succ ,k\right) \). Let \(a=r_\tau \left( \succ ,k\right) \), \(b=r_\tau \left( \succ ,k+1\right) \) and \(c=r_\tau \left( \succ ,k-1\right) \). By the definition of \({{\mathcal {N}}}_k^u\) there exists a profile \(\succ ^\prime \in {{\mathcal {N}}}_k^u\) such that \(\succ _{-i}=\succ ^\prime _{-i}\) and \(a\succ _i^\prime b\) for a voter \(i\in N\) who has top alternative a in \(\succ _i\) and top alternative c in \(\succ ^\prime _i\). Then voter i can manipulate profile \(\succ ^\prime \) by revealing \(\succ _i\) instead of \(\succ _i^\prime \), which implies that \({{\mathcal {N}}}_k\cup \{\succ \}\) is (upwards) manipulable.

Second, pick an arbitrary profile \(\succ \) such that \(p_\tau \left( \succ ,k-1\right) -1=p_\tau \left( \succ ,k\right) \ge p_\tau \left( \succ ,k+1\right) +1\) and \(\succ \notin {{\mathcal {N}}}_k\). Let \(a=r_\tau \left( \succ ,k-1\right) \), \(b=r_\tau \left( \succ ,k\right) \) and \(c=r_\tau \left( \succ ,k+1\right) \). Choose a voter i with top alternative a in \(\succ \). Since \(\succ \notin {{\mathcal {N}}}_k\) the profile \(\succ ^\prime =(\succ _i^\prime ,\succ _{-i})\) in which a voter i has top alternative b in \(\succ _i^\prime \) is in \({{\mathcal {N}}}_k\). Hence, i can manipulate \(\succ \) by revealing \(\succ _i^\prime \).

Third, pick an arbitrary profile \(\succ \) such that \(p_\tau \left( \succ ,k-1\right) =p_\tau \left( \succ ,k\right) >p_\tau \left( \succ ,k+1\right) +1\). Let \(a=r_\tau \left( \succ ,k-1\right) \), \(b=r_\tau \left( \succ ,k\right) \) and \(c=r_\tau \left( \succ ,k+1\right) \). Now choose a voter \(i\in N\) with top alternative a. Clearly, voter i can manipulate \(\succ \) by revealing a preference relation \(\succ _i^\prime \) with top alternative b. In addition, \(\succ ^\prime =(\succ _i^\prime ,\succ _{-i})\in {{\mathcal {N}}}_k\) since b leads by two votes over a and a still leads by at least one vote over c in \(\succ ^\prime \).

Forth, pick an arbitrary profile \(\succ \) such that \(p_\tau \left( \succ ,k-1\right) =p_\tau \left( \succ ,k\right) =p_\tau \left( \succ ,k+1\right) +1\). Let \(a=r_\tau \left( \succ ,k-1\right) \), \(b=r_\tau \left( \succ ,k\right) \) and \(c=r_\tau \left( \succ ,k+1\right) \). Then to assure that \({{\mathcal {N}}}_k\cup \{\succ \}\) remains connected \(\succ \) has to be obtained by a misrepresentation of voter i such that for profile \(\succ ^\prime =(\succ ^\prime _i,\succ _{-i})\) either (i) \(s(\succ ^\prime ,b)=s(\succ ^\prime ,a)+1\ge s(\succ ^\prime ,c)+2\) if bLa or (ii) \(s(\succ ^\prime ,a)=s(\succ ^\prime ,b)+1\ge s(\succ ^\prime ,c)+2\) if aLb. In case (i) b has to be the top alternative of \(\succ ^\prime _i\), while it is not the top alternative of \(\succ _i\). Therefore, i can manipulate \(\succ ^\prime \) by revealing \(\succ _i\). In case (ii) considering another tie-breaking rule \(\tau ^\prime \) that switches the positions of a and b at profile \(\succ \) leads to case (i).

Hence, we can conclude that \({{\mathcal {N}}}_k\) is a maximal connected non-manipulable domain. \(\square \)

Lemma 3

A non-manipulable domain for the reverse plurality rule for any tie-breaking rule is given by

$$\begin{aligned} {{\mathcal {N}}}_m^u=\left\{ \succ \in {{\mathcal {P}}}^n\mid p_\tau \left( \succ ,m-1\right) -2\ge p_\tau \left( \succ ,m\right) \right\} . \end{aligned}$$

Let \(L\in {{\mathcal {P}}}\) be a given linear ordering of alternatives. Then

$$\begin{aligned} {{\mathcal {N}}}_m= & {} \left\{ \succ \in {{\mathcal {P}}}^n \right. \mid p_\tau \left( \succ ,m-1\right) -1=p_\tau \left( \succ ,m\right) \text { and } \forall i\in A: \nonumber \\&\left. p_\tau \left( \succ ,i\right) =p_\tau \left( \succ ,m-1\right) \Rightarrow r_\tau \left( \succ ,i\right) \ L \ r_\tau \left( \succ ,m\right) \right\} \cup {{\mathcal {N}}}_m^u \end{aligned}$$
(4)

is a maximal non-manipulable connected subdomain for the reverse plurality rule for any tie-breaking rule.

Proof

The proof can be done by repeating some parts of the proof of Lemma 2 related to downwards manipulation for \(k=m\) since upwards manipulation is impossible. \(\square \)

We formulate the following statement concerning the manipulability of the plurality kth rule and that of the SNTV rule with k winners.

Lemma 4

Let us restrict ourselves to tie-order preserving tie-breaking rules. Then if the plurality kth rule \(f_\tau ^{(k)}\) is upwards manipulable, then the SNTV rule \(g_\tau ^{(k)}\) is manipulable. The opposite direction may fail in case of multiple ties from the \(k-j\)th to the \(k+l\)th positions, where \(j,l\ge 1\). However, if the SNTV rule \(g_\tau ^{(k)}\) is manipulable at a profile, then there exists a tie-order preserving tie-breaking rule \(\tau ^\prime \) such that both \(f_{\tau ^\prime }^{(k)}\) and \(g_{\tau ^\prime }^{(k)}\) are manipulable at that profile.

Proof

For a given profile \(\succ \) let \(a_i=f_\tau ^{(i)}(\succ )\) for all \(i=1,\ldots ,m\). If the plurality kth rule is upwards manipulable at profile \(\succ \), then there exists a voter i such that \(a_j\succ _i a_k\), \(j>k\), \(\succ _i^\prime \in {{\mathcal {P}}}\) and \(f_\tau ^{(k)}(\succ _i^\prime ,\succ _{-i})=a_j\), which in turn implies that \(g_\tau ^{(k)}(\succ _i^\prime ,\succ _{-i})\succ _i^L g_\tau ^{(k)}(\succ )\) since the alternatives \(a_1,\ldots ,a_{k-1}\) remain the top \(k-1\) alternatives at \(\succ ^\prime =(\succ _i^\prime ,\succ _{-i})\) and \(\{a_j\}\succ _i^L\{a_k\}\).

A manipulation by voter i of the SNTV rule for the given tie-breaking rule \(\tau \) at profile \(\succ \) by revealing \(\succ _i^\prime \) could move an alternative from the \(k+j\)th position to the \(k-l\)th position without an improvement at the kth position for the manipulator, and thus without a manipulation of the plurality kth rule. However, then either alternatives \(a_{k-1}\) and \(a_k\) are tied or not in both \(\succ \) and \(\succ ^\prime \). In the former case, since there is no improvement at the kth position (i.e. \(a_k\succ _i a_{k-1}\))Footnote 7, there exists a tie-breaking rule \(\tau ^\prime \), which reorders the tied alternatives \(a_{k-1}\) and \(a_k\) at \(\succ \) (i.e. prior to manipulation), while in the latter case \(a_{k-l}\) will be tied with \(a_{k-1}\) after the manipulation and let \(\tau ^\prime \) reorder these two alternatives at \((\succ _i^\prime ,\succ _{-i})\) (i.e. after manipulation). \(\square \)

We also determine a maximal non-manipulable connected domain for the SNTV rule.

Lemma 5

A non-manipulable domain for the SNTV rule choosing k winners, where \(k=2,\ldots ,m-1\), for any tie-breaking rule is given by

$$\begin{aligned} {\overline{{{\mathcal {N}}}}}_k=\left\{ \succ \in {{\mathcal {P}}}^n\mid p_\tau \left( \succ ,k\right) \ge p_\tau \left( \succ ,k+1\right) +1\right\} . \end{aligned}$$
(5)

Furthermore, \({\overline{{{\mathcal {N}}}}}_k\) is a maximal non-manipulable connected domain for the SNTV rule choosing k winners for any tie-breaking rule.

Proof

One has to employ the parts of the proof of Lemma 2 related to upwards manipulation. \(\square \)

From the proof of Lemma 2 it also follows that if we restrict ourselves to upwards manipulations of the plurality kth rule, then we also obtain \({\overline{{{\mathcal {N}}}}}_k\) as the maximal upwards non-manipulable domain for the plurality kth rule.

5 A decomposition with a corollary

Observe that any SCF \(f:{{\mathcal {P}}}^n\rightarrow A\) can be decomposed into plurality kth rules, that is there exists \({{\mathcal {X}}}_k\subseteq {{\mathcal {P}}}^n\) (\(k=1,\ldots ,m\)) such that

  • \(\cup _{k=1}^m{{\mathcal {X}}}_k={{\mathcal {P}}}^n\),

  • \({{\mathcal {X}}}_k\cap {{\mathcal {X}}}_l=\emptyset \) if \(k\ne l\), and

  • \(f_{\mid {{\mathcal {X}}}_k}=f^{(k)}_{\mid {{\mathcal {X}}}_k}\).

We illustrate a decomposition by the following example.

Example 1

Let \(m=4\), \(n=3\) and the tie-breaking rule \(\tau \) equaling the constant tie-breaking rule given by the fixed ordering \(a\tau b\tau c\tau d\). Let \(f^B_\tau \) be the Borda count with tie-breaking rule \(\tau \).

Then, for instance, for profile \(\Pi =\)

$$\begin{aligned} \begin{array}{ccc} \succ _1 &{} \succ _2 &{} \succ _3 \\ \hline a &{} a &{} b \\ b &{} b &{} c \\ c &{} c &{} d \\ d &{} d &{} a \end{array} \end{aligned}$$

we have \(f^B_\tau =f_\tau ^{(2)}\), that is on the above profile \(\Pi \) the Borda winner equals with the choice of the plurality 2nd rule. Clearly, on unanimous profiles the Borda count equals the plurality rule. We do not list a partition of the 46656 profiles for \(m=4\) and \(n=3\) determining the profiles on which the Borda count is equal to a given plurality kth rule.

From the Gibbard–Satterthwaite theorem (1973/75) we know that only the dictatorial SFCs are non-manipulable and onto in case of at least three alternatives. Therefore, our aim with the above described decomposition is to obtain a maximal non-manipulable subdomain of \({{\mathcal {P}}}^n\). Plurality kth rules are especially helpful since the room for manipulation by an individual is extremely small since it can just increase the received votes of an alternative by just one and decrease the received votes of an other alternative by just one, thus keeping our analysis as simple as possible.

In order to arrive to a non-manipulable subdomain we have to find disjoint subdomains \({{\mathcal {N}}}_1,{{\mathcal {N}}}_2,\ldots ,{{\mathcal {N}}}_m\) on which the plurality first, the plurality second, and so on rules will be employed. Our strategy will be to assure that manipulation within any \({{\mathcal {N}}}_k\) becomes impossible and none of the voters can move by an individual misrepresentation a profile from \({{\mathcal {N}}}_i\) to another \({{\mathcal {N}}}_j\). Note that while \({{\mathcal {N}}}_i\) is connected, their union will be disconnected. For simplicity we start with the case in which the non-manipulability on \({{\mathcal {N}}}={{\mathcal {N}}}_1\cup \ldots \cup {{\mathcal {N}}}_m\subset {{\mathcal {P}}}^n\) has to hold for any tie-breaking rule.

From Lemmas 13 it follows that \({{\mathcal {N}}}^\prime =\cap _{i=1}^m {{\mathcal {N}}}_m\) is non-manipulable for any plurality kth rule, which in itself is a trivial observation; however, it just does not allow manipulation for those subdomains of \({{\mathcal {N}}}^\prime \) on which the plurality kth rule is employed, but admits manipulations by moving from a profile in \({{\mathcal {N}}}_i\) to a profile in \({{\mathcal {N}}}_j\). Therefore, a slightly more sophisticated construction to arrive to a partition of a subdomain of \(\cup _{i=1}^m {{\mathcal {N}}}_m\) is needed to employ several plurality kth rules at the same time with a non-manipulable subdomain.

From the lessons of Lemmas 13 we construct a non-manipulable subdomain, with appropriately defined subdomains \({{\mathcal {N}}}^\prime _i\) on which the plurality kth rules will be employed, respectively.Footnote 8 Clearly, if we would take the non-manipulable domain from Lemma 1, we could not introduce the other plurality kth rules into our decomposition. We know that a safe difference in plurality scores for the plurality rule is 1 downwards, while for the other plurality kth rules 2 and 1 upwards and downwards, respectively. If we relax our assumption on the plurality rule and require a larger difference in the plurality scores of the top two alternatives, then we will give room for the other plurality kth rules. This is the reason for the relaxed condition \(p_\tau \left( \succ ,1\right) -p_\tau \left( \succ ,2\right) \ge 5\) in the definition of \({{\mathcal {N}}}_1^\prime \) in the upcoming Proposition 5. We can see similar conditions in the definitions of \({{\mathcal {N}}}_k^\prime \) for all \(k=2,\ldots ,l\), i.e. \(p_\tau \left( \succ ,k\right) -p_\tau \left( \succ ,k+1\right) \ge 6\). The other inequalities guarantee that \({{\mathcal {N}}}_i^\prime \) and \({{\mathcal {N}}}_j^\prime \) are disjoint if \(i\ne j\).

Table 3 A decomposition for \(m=3\) and \(n=15\)

We present a motivating example in Table 3 before stating Proposition 5. The columns of Table 3 express the distribution of the 15 voters according to the numbers of first, second and third ranked alternatives. Each column gathers many preferences. In addition, the underlying preferences are grouped into the three possible non-manipulable subdomains. As it can be seen, the first ranked alternatives by the profiles in \({{\mathcal {N}}}_1^\prime \) have a large lead over their second ranked alternatives, in particular, they have a lead of at least five top positions. The difference in the number of top positions between the second and third ranked alternatives lie between 2 and 4. From this we can immediately see that manipulation within \({{\mathcal {N}}}_1^\prime \) is not possible. Turning to \({{\mathcal {N}}}_2^\prime \), we can see differences in the number of top positions of at least six between the second and third alternatives, whereas the differences in top positions between the first and second ranked alternatives lie between 1 and 3. It follows that \({{\mathcal {N}}}_2^\prime \) is non-manipulable. Looking at \({{\mathcal {N}}}_3^\prime \), the differences in the number of top positions between the first and second ranked and between the second and third ranked alternatives lie between 1 and 3 and between 2 and 4, respectively. Obviously, \({{\mathcal {N}}}_3^\prime \) is non-manipulable. Finally, it is impossible to move from a preference relation in \({{\mathcal {N}}}_i^\prime \) to a preference relation in \({{\mathcal {N}}}_j^\prime \), where \(i\ne j\in \{1,2,3\}\), by a single-voter manipulation.

Proposition 5

Let \(l< m\) and

$$\begin{aligned} {{\mathcal {N}}}_1^\prime= & {} \left\{ \succ \in {{\mathcal {P}}}^n\mid p_\tau \left( \succ ,1\right) -p_\tau \left( \succ ,2\right) \ge 5\right. \\& \left. 4\ge p_\tau \left( \succ ,i\right) -p_\tau \left( \succ ,i+1\right) \ge 2 \text { for all }i=2,\ldots l\right\} , \\ {{\mathcal {N}}}_k^\prime= & {} \left\{ \succ \in {{\mathcal {P}}}^n\mid 3\ge p_\tau \left( \succ ,1\right) -p_\tau \left( \succ ,2\right) \ge 1\right. \\& \left. p_\tau \left( \succ ,k\right) -p_\tau \left( \succ ,k+1\right) \ge 6\right. \\& \left. 4\ge p_\tau \left( \succ ,i\right) -p_\tau \left( \succ ,i+1\right) \ge 2 \text { for all }i=2,\ldots l\text { and }i\ne k\right\} , \\ {{\mathcal {N}}}_{l+1}^\prime= & {} \left\{ \succ \in {{\mathcal {P}}}^n\mid 3\ge p_\tau \left( \succ ,1\right) -p_\tau \left( \succ ,2\right) \ge 1\right. \\& \left. 4\ge p_\tau \left( \succ ,i\right) -p_\tau \left( \succ ,i+1\right) \ge 2 \text { for all }i=2,\ldots l\right\} , \end{aligned}$$

where \(k=2,\ldots ,l\). Assuming that the plurality kth rule is employed on \({{\mathcal {N}}}_k^\prime \), the subdomain \({{\mathcal {N}}}=\cup _{i=1}^{l+1}{{\mathcal {N}}}_i\) is non-manipulable for any tie-breaking rule for the just defined SCF on \({{\mathcal {N}}}\).

Proof

Lemmas 13 imply that the subdomains \({{\mathcal {N}}}^\prime _k\) are non-manipulable and the construction of \({{\mathcal {N}}}^\prime _1,\ldots ,{{\mathcal {N}}}^\prime _{l+1}\) assures that changing the preference relation of a single voter does not allow to us to move a profile from \({{\mathcal {N}}}^\prime _i\) to another \({{\mathcal {N}}}^\prime _j\). \(\square \)

Our next proposition utilizes our decomposition and the derived non-manipulable domains for plurality kth rules.

Proposition 6

Let \({{\mathcal {X}}}_1,\ldots ,{{\mathcal {X}}}_m\) be a decomposition into plurality kth rules of SCF \(f:{{\mathcal {P}}}^n\rightarrow A\) and let \({{\mathcal {M}}}_k={{\mathcal {X}}}_k\cap {{\mathcal {N}}}_k^\prime \) for any \(k=1,\ldots ,m\). Then \({{\mathcal {M}}}=\cup _{i=1}^m{{\mathcal {M}}}_i\) is a non-manipulable domain for f.

Though the statement of Proposition 6 is straightforward, we think that its result is surprising since it means that for a subdomain of preference profiles for which the plurality scores of the alternatives cannot be too close the respective SCF is non-manipulable. Hence, based on a simple statement on plurality scores and the decomposition of an arbitrary SCF we can arrive to a non-manipulable domain of that SCF.

6 Concluding remarks

In this paper we have introduced plurality kth rules and investigated their individual and group manipulability (the latter in the “Appendix”). For larger k the plurality kth rule is manipulable on more profiles. Any social choice function can be expressed as a ‘combination’ of plurality kth rules, which employed for providing non-manipulable domains for any social choice function. We established connections between the plurality kth rules and the SNTV rule.

Investigating Borda kth rules or more generally scoring kth methods, could be a direction of possible future extensions of this work. Capturing the manipulability of plurality k rules is definitely simpler than, for instance, obtaining similar results for Borda kth rules. The growing literature on multi-winner elections serves as a motivation for these type of extensions.