2025-11-19T01:55:20.833158

The Limits of Tolerance

Miller
I propose a model of aggregation of intervals relevant to the study of legal standards of tolerance. Seven axioms: responsiveness, anonymity, continuity, strategyproofness, and three variants of neutrality are then used to prove several important results about a new class of aggregation methods called endpoint rules. The class of endpoint rules includes extreme tolerance (allowing anything permitted by anyone) and a form of majoritarianism (the median rule).
academic

The Limits of Tolerance

Basic Information

  • Paper ID: 2501.00578
  • Title: The Limits of Tolerance
  • Author: Alan D. Miller (Western University)
  • Classification: econ.TH (Economic Theory), cs.LO (Computer Science Logic)
  • Publication Date: January 3, 2025
  • Paper Link: https://arxiv.org/abs/2501.00578

Abstract

This paper proposes an interval aggregation model relevant to research on legal tolerance standards. Through seven axioms (responsiveness, anonymity, continuity, strategy-proofness, and three neutrality variants), several important results are established concerning a new class of aggregation methods—endpoint rules. The endpoint rule class encompasses extreme libertarianism (permitting any action endorsed by anyone) and a form of majoritarianism (the median rule).

Research Background and Motivation

  1. Problem to be Addressed: How to aggregate individual tolerance standards into community standards, particularly in legal decision-making regarding the determination of acceptable behavioral boundaries.
  2. Problem Significance:
    • Common law systems widely rely on community standards to judge the reasonableness of conduct (such as the "reasonable person" standard in tort law)
    • Determination of community tolerance boundaries is necessary in defamation law, contract law, freedom of speech, and other domains
    • Existing aggregation methods such as majority rules may lead to inconsistent results
  3. Limitations of Existing Approaches:
    • Pointwise aggregation (such as majority rule) does not necessarily produce well-defined intervals
    • May result in incoherent outcomes (e.g., characterizing someone as moderate constitutes defamation, while calling them liberal or conservative does not)
    • Lacks effective utilization of the structural properties of the real number line
  4. Research Motivation: Develop aggregation methods that exploit the ordered structure of the real number line, producing coherent and operationalizable community standards.

Core Contributions

  1. Introduction of Endpoint Rules Class: Proposes a new class of interval aggregation methods that define community standards by independently aggregating upper and lower endpoints
  2. Axiomatic Characterization: Completely characterizes endpoint rules using responsiveness, anonymity, continuity, and neutrality axioms
  3. Strategy-Proofness Analysis: Establishes strategy-proofness of endpoint rules under generalized single-peaked preferences
  4. Theoretical Unification: Unifies extreme libertarianism (maximum rule) and democratic majoritarianism (median rule) within a single framework
  5. Cross-Domain Application: Provides a general solution to interval aggregation problems in law, political science, and economics

Methodology Details

Task Definition

  • Input: Judgments from n agents, each represented as a bounded open interval on the real line SiΣS_i \in \Sigma
  • Output: Aggregated community standard, also an interval f(S)Σf(S) \in \Sigma
  • Constraints: The aggregation function f:ΣNΣf: \Sigma^N \to \Sigma must satisfy specific axiomatic properties

Model Architecture

Endpoint Rule Definition: For parameters p,q1p, q \geq 1 with p+qn+1p + q \leq n + 1, the (p,q)(p,q)-endpoint rule is defined as: fp,q(S)={x:G+(S,x)p and G(S,x)q}f^{p,q}(S) = \{x : |G^+(S,x)| \geq p \text{ and } |G^-(S,x)| \geq q\}

Where:

  • G+(S,x)={iN:(,x]Si}G^+(S,x) = \{i \in N : (-\infty,x] \cap S_i \neq \emptyset\} (set of individuals considering x or smaller values acceptable)
  • G(S,x)={iN:[x,+)Si}G^-(S,x) = \{i \in N : [x,+\infty) \cap S_i \neq \emptyset\} (set of individuals considering x or larger values acceptable)

Key Characteristics:

  1. Independent Endpoint Aggregation: Upper and lower endpoints are aggregated independently without mutual dependence
  2. Parametric Flexibility: Adjustment of p and q parameters enables calibration between libertarianism and majoritarianism
  3. Structure Preservation: Always produces well-defined intervals

Technical Innovations

  1. Independent Endpoint Aggregation: Unlike traditional pointwise aggregation, separately processes interval boundaries
  2. Stratified Neutrality Axioms:
    • Weak Neutrality: Preserves direction and betweenness relations
    • Strong Neutrality: Preserves only betweenness relations
  3. Strategy-Proofness Mechanism: Ensures incentive compatibility through the "out-between-ness" concept

Experimental Setup

Theoretical Verification Method

This paper employs pure theoretical analysis, validating results through mathematical proof:

  1. Axiom Independence Verification: Verifies mutual independence of axioms when n≥3
  2. Constructive Proof: Demonstrates through explicit construction that endpoint rules satisfy all axioms
  3. Necessity Proof: Establishes that any rule satisfying the axioms must be an endpoint rule

Illustrative Example

Three-Agent Example:

  • S1=(2,4)S_1 = (2,4), S2=(3,6)S_2 = (3,6), S3=(1,5)S_3 = (1,5)
  • f1,1(S)=(1,6)f^{1,1}(S) = (1,6) (maximum rule)
  • f2,2(S)=(2,5)f^{2,2}(S) = (2,5) (median rule)
  • f1,3(S)=(1,4)f^{1,3}(S) = (1,4)

Experimental Results

Main Theoretical Results

Theorem 1 (Endpoint Rule Characterization): An aggregation rule ff satisfies responsiveness, anonymity, continuity, and weak neutrality if and only if it is an endpoint rule.

Theorem 2 (Symmetric Endpoint Rule Characterization): An aggregation rule ff satisfies responsiveness, anonymity, continuity, and strong neutrality if and only if it is a symmetric endpoint rule.

Theorem 3 (Strategy-Proofness Characterization): An aggregation rule ff satisfies anonymity, strategy-proofness, and translation equivariance if and only if it is an endpoint rule.

Strategy-Proofness Analysis

Proposition 1: Strategy-proofness implies independent endpoint aggregation

  • Establishes that strategy-proof aggregation rules must independently process upper and lower endpoints
  • Reduces the problem to single-dimensional single-peaked preference aggregation

Lemma 1: Strategy-proofness is equivalent to the "out-between-ness" property

  • Provides geometric interpretation of strategy-proofness
  • Simplifies analysis of the strategy-proofness mechanism

Theoretical Foundations

  1. Arrow's Social Choice Theory: Inherits axiomatic approaches from Arrow (1963) and May (1952)
  2. Interval Aggregation Literature:
    • Miller (2009): Introduces median and maximum rules
    • Block (2010), Farfel & Conitzer (2011): Generalized single-peaked preferences
    • Chambers (2007): Ordinal covariance and quantile representation

Strategy-Proofness Literature

  1. Moulin (1980): Strategy-proof voting under single-peaked preferences
  2. Barberà et al. (1991): Quota voting mechanisms
  3. Border & Jordan (1983): Strategy-proof mechanisms in Euclidean spaces

Application Domain Connections

  1. Legal Standards: Application of community standards in common law
  2. Delegation Theory: Legislative authorization of administrative agencies
  3. International Treaties: Acceptable clause ranges in multilateral agreements

Conclusions and Discussion

Main Conclusions

  1. Unified Framework: Endpoint rules provide a unified framework for various aggregation methods ranging from extreme libertarianism to democratic majoritarianism
  2. Axiomatic Foundation: Responsiveness, anonymity, continuity, and neutrality axioms completely characterize the endpoint rule class
  3. Incentive Compatibility: Endpoint rules are strategy-proof under generalized single-peaked preferences
  4. Practical Value: Provides theoretical foundation for legal decision-making and policy formulation

Limitations

  1. Preference Restrictions: Strategy-proofness results depend on generalized single-peaked preference assumptions
  2. Information Requirements: Requires complete individual judgment information
  3. Application Scope: Primarily applicable to qualitative rather than quantitative standards
  4. Multidimensional Extension: Extension to multidimensional spaces faces technical challenges

Future Directions

  1. Multidimensional Extension: Study convex set aggregation in multidimensional spaces
  2. Incomplete Information: Consider cases with incomplete or uncertain individual judgments
  3. Dynamic Models: Investigate dynamic aggregation as standards evolve over time
  4. Empirical Validation: Verify theoretical predictions using actual legal cases

In-Depth Evaluation

Strengths

  1. Theoretical Rigor: Complete axiomatic characterization with rigorous proofs
  2. Practical Relevance: Directly addresses important problems in legal practice
  3. Methodological Innovation: The concept of independent endpoint aggregation is novel and practical
  4. Interdisciplinary Value: Connects law, economics, and computer science

Weaknesses

  1. Empirical Absence: Lacks empirical validation of theoretical predictions using real data
  2. Computational Complexity: Does not analyze computational efficiency in large-scale scenarios
  3. Robustness: Insufficient sensitivity analysis regarding axiom violations
  4. Comparative Analysis: Limited systematic comparison with other aggregation methods

Impact

  1. Theoretical Contribution: Adds new analytical tools to social choice theory
  2. Application Prospects: Potential applications in legal AI, policy-making, and related domains
  3. Methodological Value: The endpoint aggregation concept is generalizable to other structured choice spaces

Applicable Scenarios

  1. Legal Decision-Making: Determining reasonableness standards for conduct
  2. Expert Consultation: Aggregating expert interval predictions
  3. Legislative Delegation: Determining administrative discretion ranges
  4. International Negotiation: Acceptable clause ranges in multilateral treaties

References

  1. Arrow, K. J. (1963). Social Choice and Individual Values. Yale University Press.
  2. May, K. O. (1952). A Set of Independent Necessary and Sufficient Conditions for Simple Majority Decision. Econometrica, 20, 680-684.
  3. Moulin, H. (1980). On strategy-proofness and single peakedness. Public Choice, 35, 437-455.
  4. Block, V. (2010). Efficient and Strategy-Proof Voting over Connected Coalitions. Economic Letters, 108, 1-3.
  5. Chambers, C. P. (2007). Ordinal aggregation and quantiles. Journal of Economic Theory, 137, 416-431.

This paper makes important contributions to interval aggregation theory by rigorously characterizing endpoint rules through axiomatic methods, providing theoretical foundations for practical problems such as legal standard aggregation. While there remains room for improvement in empirical validation and computational complexity analysis, its theoretical innovation and interdisciplinary application value merit recognition.