Introduction.- 20 Voting Procedures Designed to Elect a Single Candidate.- The (In)Vulnerability of 20 Voting Procedures to Lack of Monotonicity in a Restricted Domain.- The (In)Vulnerability of 20 Voting Procedures to the Inconsistency Paradox (aka Reinforcement Paradox) in a Restricted Domain.- The (In)Vulnerability of 20 Voting Procedures to the No-Show Paradox in a Restricted Domain.- Which of the 20 Voting Procedures Satisfy or Violate the Subset Choice Condition (SCC) in a Restricted Domain?.- The (In)Vulnerability of 20 Voting Procedures to the Preference Inversion Paradox in a Restricted Domain.- Summary.
"synopsis" may belong to another edition of this title.