Deception in Computer-Mediated Communication
-
Upload
independent -
Category
Documents
-
view
1 -
download
0
Transcript of Deception in Computer-Mediated Communication
Deception in Computer-Mediated Communication
John R. CarlsonBaylor University
Hankamer School of BusinessDepartment of Information Systems
Waco, Texas 76798-8005Voice: (254) 710-4604
E-mail: [email protected]
Joey F. GeorgeIMS Department
College of BusinessFlorida State UniversityTallahassee, FL 32311Voice: (850) 644-7449
E-mail: [email protected]
Judee K. BurgoonCenter for the Management of Information
University of ArizonaTucson, AZ 85721
Voice: (520) 621-5818E-mail: [email protected]
Mark AdkinsCenter for the Management of Information
University of ArizonaTucson, AZ 85721
Voice: (520) 621-2603E-mail: [email protected]
Cindy H. WhiteDepartment of CommunicationUniversity of Colorado, Boulder
Boulder, CO 80309-0270Voice : (303) 492-5022
E-mail : [email protected]
_____________________Acknowledgements: Portions of this research were supported by funding from the U.S. Air Force Officeof Scientific Research. The views, opinions, and/or findings in this report are those of the authors andshould not be construed as an official Department of the Air Force position, policy, or decision.
2
Organizational life presents many situations where organizational members must
determine how to manage information that they possess. A worker must decide whether or not
to tell her supervisor that a proposed initiative is likely to fail; an account manager must decide
what to tell a client about a delay on a much needed order. A team member wishing to influence
a decision being made by the team must decide whether or not to share information he has that
might not help his agenda. Deciding whether and how to deliver bad news is one thing (cf.
Sussman & Sproull, 1999) -- deciding to cover up bad news through deception is another.
Dilemmas related to truth and deception are not unusual events in the work world. Although
there has been considerable work on communication in organizations, and researchers have been
attentive to problems surrounding accurate or efficient communication, researchers have paid
relatively little attention to understanding the dynamics of deception in organizations.
Researchers have found that deceptive communication is part of many types of interaction, yet
few researchers have explicitly addressed the issue of lying in the context of organizational life
(Buller & Burgoon, 1994; DePaulo, Stone & Lassiter, 1985; Knapp & Comadena, 1979;
Zuckerman, DePaulo, & Rosenthal, 1981).
Given that computer-mediated communication (CMC) has become pervasive in all types
of organizations, we would expect employees to utilize information technology, in addition to
their use of more traditional communication channels such as telephone and face-to-face
communication, to transmit deceptive information. In support of this, recent models of CMC
posit that many of the relational processes that occur in face-to-face communication also emerge
in contexts where IT is used (Saunders, Robey, & Vaverek, 1994; Walther, 1994, 1997). In fact,
there is evidence that the ability afforded by computer-mediated communication to manage self-
presentation can even exaggerate some of these relational processes -- such as a desire to be seen
3
in a positive light, which may reasonably lead to the use of additional ingratiation and impression
management tactics that may include deception.
This convergence of IT and deception in the work place has largely been a neglected
topic. However, information technologies designed to help individuals communicate and work
together may provide especially fertile ground for deceptive interaction (Zmud, 1990), even
though veracity is generally assumed when people use these technologies (Kling, 1991; Kraut &
Higgins, 1989; Walther, 1997). Recently, George and Carlson (1999) proposed a model of
deceptive communication and detection moderated by the communication technology used.
However, the major focus of this model was to examine the impact of media choice and
participant experiences on deception and detection. As such, the model did not examine in detail
the potential motivators for both the deceiver and the receiver. Moreover, the model emphasized
deception in an asynchronous communication mode (such as e-mail), and was therefore not
readily applicable to other modalities.
In this paper, we attempt to provide a comprehensive picture of deceptive communication
as part of normal organizational work processes, focusing in particular on communication that is
mediated by computers. This comprehensive picture includes the motivations of deceivers to
deceive, their natural or learned ability to do so, the motivations of message receivers to detect
deception, deception detection success, and the impact of communication media on both the
decision of how to lie and the ability to detect deception. We also introduce deceivers’ and
receivers’ experiences with the medium, co-interactant, context, and message (Carlson & Zmud,
1999), a cluster of experiential features that we posit will affect both the ability to deceive and
the ability to detect deception. To flesh out our picture, we review various literatures, including
those in information systems, psychology, management, and communication. We then develop a
4
model of deception, computer-mediated communication, and deception detection, and derive
several propositions from the model to guide future research in this area.
Deceptive Communication
As a starting point, it is useful to define deception. Deception is “a message knowingly
transmitted by a sender to foster a false belief or conclusion by the receiver” (Buller & Burgoon,
1996, p. 205). In other words, deception is an intentional act that occurs when communicators
control information in a message to create a particular effect. Using this definition, deception
may take a variety of forms ranging from its most direct form, fabrication, to more subtle forms
like half-truths, vagueness, equivocations, and concealments (e.g., Burgoon, Buller, Guerrero,
Afifi, & Feldman, 1996).
There is ample evidence that deception, in a variety of forms, is a part of everyday life
(DePaulo, Kashy, Kirkendol, Wyer, & Epstein, 1996; Turner, Edgley & Olmstead, 1975).
People deceive one another about all sorts of matters from the mundane, such as opinions about
appearance, to the essential, such as courtroom testimony. In addition, there are established
streams of literature investigating “impression management” (e.g., Krauss, 1981), power and
politics (e.g., Pfeffer, 1992), and negotiation behaviors (e.g., Lewicki, 1983; Pinkley, et al.,
1995) in organizations – all forms of communication that often contain a deceptive component.
Despite the prevalence of deception in everyday life (or perhaps because of it), people are
typically poor detectors of deception (Brandt, Miller, & Hocking, 1982; Burgoon, Buller, Ebesu,
& Rockwell, 1994). In fact, people are able to detect deception at a level only slightly better than
chance (Feeley & deTurck, 1995; Miller & Stiff, 1993). Although it is not completely clear why
people are poor lie detectors, one potential explanation is related to the fundamental nature of
communication. Communication is made possible by cooperation that requires senders and
5
receivers to work together in trying to understand the meaning of what is being said -- they
attend to the intended meaning of a message. For instance, when a boss asks an employee who
failed to show up for work where she was yesterday, the employee will respond with information
about why she was absent; she will not provide the boss with a complete story of where she was
and what she was doing. This means that when we communicate, we are attempting to make
sense of what another has said, and a basic assumption that we make in this attempt is that the
message is comprehensible and truthful (McCornack, 1992). This assumption is called truth bias,
defined as a predisposition to assume truthfulness, or trust (Levine & McCornack, 1992).
Of course, there are circumstances in which individuals recognize that a message may not
be truthful. In the courtroom, in interview situations, negotiation contexts, supervisor-
subordinate relationships, and a number of other settings, communicators may be attuned to the
possibility that not all information provided to them is entirely truthful. In situations such as
these, where an individual’s suspicion is aroused, communicators tend to examine message cues
more intently to try to determine the veracity of a message. One reason that these cues are seen
as indicators of deception is that deception has typically been thought of as a communication
action that is demanding and anxiety-provoking for the deceiver. Thus, researchers have assumed
that some evidence of lying will be “leaked out” in communication behaviors (e.g., in how a
particular sentence is phrased or through certain body motions that accompany the message)
(Ekman & Friesen, 1969). There are several cues that are potentially available to any message
recipient that could provide evidence for deception and/or create heightened suspicion. These
include verbal cues, including language style and message content; nonverbal cues, including
auditory, visual, spatial and temporal behavior accompanying verbal messages; and contextual
cues, including environmental features and aspects of the communication channel that provide a
6
frame of reference for the messages being exchanged. Interactions among two or more of these
cues are referred to as meta-cues.
Verbal cues: Language style
Linguistic cues available to the receiver are ones related to the manner in which the
message is either spoken or written (Buller, Burgoon, Buslig, & Roiger, 1994, 1996). In fact,
“language style” is an important characteristic of computer-mediated communication because it
is one of the few cues used to generate impressions and supply relational information (Adkins &
Brashers, 1995). Whether impressions are positive or negative, message receivers use them to
determine future communication strategy and to determine whether someone is lying. This
makes language style an important variable in the general study of deceptive communication.
With increased use of computer-mediated communication (CMC), where there is often little
more to the message than the words themselves, the style and formatting of language itself
becomes an even more important clue to deception.
One language variable that may influence perceptions is powerful and powerless
speaking styles (O’Barr, 1982). Powerless language style can reflect low social status or low
social power of the speaker. A powerless language style is defined by the overuse of polite forms
(“Yes, sir”), hedges (“I sort of did”), hesitations (“I...uh...like this”), deictic phrases (indirect
references, such as, “That man over there…”), intensifiers (“He really did”), and tag questions
(“It is, isn’t it?”). Powerful language style is defined as the opposite of powerless language,
where one uses fluent, terse, and direct speech (Bradac & Mulac, 1984). Clearly, while users of
powerless language styles are not necessarily low in social power or social status, they may be
perceived as such because of these linguistic cues. For instance, when eyewitnesses testifying in
a trial use a powerless language style, they are perceived as less credible, less attractive, and less
7
persuasive by observers (O’Barr, 1982). However, message sources also may intentionally use
powerless or weaker linguistic forms as a means of distancing or disassociating themselves from
message contents and making statements more tentative. Powerless speech also makes deceivers
appear submissive and, by inference, less responsible for their communication. Thus, this
strategic use of language may reduce their apparent culpability and attributions of responsibility
or guilt, thereby attenuating receivers’ belief that the message is being deceptive. Exemplars
include past tense verbs, qualifiers, indefinite pronouns, absence of pronouns, and verbal hedges.
Bradac and Mulac (1984: 307) summarize the research on language style by saying that
“messages exhibiting the linguistic indicants of powerlessness have consistently produced
relatively low ratings of speaker power in experimental research.” The experiments that have
produced these results have typically asked participants to assess the characteristics of an
individual using a powerless or powerful style. This research has produced seemingly valid and
reliable results, but it has focused primarily on situations where a single message is attributed to
an individual.
Additional support for the premise that language style is a potentially valid indicator of
deceptive communication comes from several studies (e.g., Buller, Burgoon, Buslig, & Roiger,
1994, 1996; Cody et al., 1984; DePaulo et al., 1985; Stiff & Miller, 1986; Stiff et al., 1990;
Zuckerman, et al., 1986), indicating that deceivers are more reticent (less involved) than truth-
tellers, use fewer unique words, use more negative statements, use more indirect forms of
expression (i.e., use more third person and less personal reference), use more leveling (or
generalizing) terms, and have greater lexical diversity (larger type-token ratio, that is, adjectives
and adverbs versus nouns).
8
Verbal cues: Message content
As opposed to linguistic cues, which pertain to the manner and style in which language is
used, content cues refer to specific informational attributes (or perceived attributes) of a
message. For example, while a deceiver may use either a powerful or powerless language style,
if statements in a message are in partial or direct contradiction to each other, this may be an
informational aspect of message content that signals the possibility of deception. Generally,
when compared to truth tellers, deceivers give less plausible responses, use obfuscation and
vagueness to avoid being caught in making outright false statements, provide more irrelevant
information, are not able to add much detail to responses, and offer briefer, less detailed
responses (Buller & Burgoon, 1994; Zuckerman & Driver, 1985). At least some of this content
manipulation is strategic: Deceivers intentionally manage message information to make it less
veridical, less complete, less clear, less relevant and direct, and less personalized (i.e., accounts
of events may be devoid of references to the deceiver or other people) (Burgoon, Buller,
Guerrero, Afifi, & Feldman, 1996). They may also enlist the receiver in the construction of
plausible lies by accepting or building upon whatever interpretations and accounts the receiver
offers (Burgoon, Buller, Floyd & Grandpre, 1996).
Nonverbal cues
Beyond linguistic cues available in the spoken and written word, there are a variety of
nonverbal cues available to communicators (Buller & Burgoon, 1994; Buller, Burgoon, White, &
Ebesu, 1994; Burgoon & Buller, 1994; Burgoon, Buller, White, Afifi, & Buslig, 1999). These
are cues that are not part of the verbal or textual content of the message but which accompany
the delivery of the message (e.g., where speakers are looking, what they are doing with their
hands, whether they are smiling, their tempo and pitch level, the fluency of their speech, etc.).
9
They include body movements, eye contact, gestures, facial expressions, vocal features, and use
of distance or space, among others.
Research indicates that communicators depend more heavily on nonverbal than verbal
cues when attempting to detect deception (DePaulo et al., 1980; Hurd & Noller, 1990; Stiff et al.,
1990), and considerable research attention has been devoted to identifying the specific nonverbal
cues that reveal deception. However, the number of cues that have been identified as highly
reliable, diagnostic indicators is small. Zuckerman and Driver (1985) conducted a meta-analysis
of work completed to that time and identified the following cues as indicative of deceit: adaptors,
blinking, pupil dilation, speech errors, voice pitch, hand shrugs, and facial and bodily
segmentation. These were positively correlated with deception, indicating that deceivers use
more adaptors and blink more frequently than truth tellers. Adaptors include self-grooming
behaviors and the cues we often associate with nervousness, such as touching oneself or nervous
movement of objects like pens. Other cues that have emerged in research conducted since the
meta-analysis include pauses, response latencies, hand and leg gestures, eye contact, and
message duration (deTurck & Miller, 1985; Vrij, 2000). Importantly, the deTurck and Miller
experiment sought to parse out what behaviors are truly indicative of deceit as opposed to
arousal. They found six cues that distinguished deceivers from both unaroused and aroused (i.e.,
experiencing sympathetic activation) truthtellers: Deceivers used more adaptors and hand
gestures, had more speech errors, more pauses, and longer response latencies, and spent less time
answering questions than aroused truth tellers. The authors concluded that these behaviors can be
reliably associated with deception rather than arousal per se. Other behaviors they studied--
blinking and gaze avoidance—failed to differentiate deceivers from aroused truth tellers.
10
Contextual cues
In addition, there may be factors associated with the context of the communication event
that cue a message recipient to deceptive content (e.g., Buller & Burgoon, 1997). For example,
information received from a used-car salesperson about a vehicle for sale may, independent of
any content or message delivery related cues, be examined much more closely due to the context.
In addition, the literature suggests that some media are capable of communicating degrees of
“social context” with a message, that is, information about the social status, social intimacy, and
normative history of the communicators (Walther, 1994, 1997).
Meta-cues
Finally, there may be a detectable interaction between two or more of these sets of cues
that will itself serve as an additional cue (i.e., a “meta-cue”). Bond, Omar, Pitre, Lashley,
Skaggs, and Kirk (1992) found that when people deceive, they often enact nonverbal cues that
are “out of sync” with the verbal message and with the other nonverbal cues they are sending.
Receivers were able to spot this asynchrony and indicated they thought something suspicious
was going on. These findings are consistent with Expectancy Violations Theory (Burgoon, 1978)
and Interpersonal Deception Theory (Buller & Burgoon, 1996), which hold that certain kinds of
expectancy violations can undermine believability. Likewise, the Zuckerman and Driver (1985)
meta-analysis found that channel discrepancies create perceptions of deceit. These lines of
research are important because they suggest that people attend to the message as a “package” of
cues. In assessing this package, receivers may rely both on the summative and interactive nature
of the cues. This raises the question of how communicators, both deceivers and message
recipients, respond to deception when it occurs in media for which this package of cues is
11
attenuated (e.g., in computer-mediated contexts where nonverbal cues are limited and where
linguistic cues may be altered by the demands of written text).
In sum, the research on deception indicates that no single behavior or specific cue can be
used to determine whether an individual is conveying deceptive information. While there are
nonverbal and linguistic elements that are affected by deception, a clear profile of deceptive
behavior has not emerged. Although past research on leakage cues has provided some insight
into indicators of deception, a primary reason that no consistent profile of deception has emerged
is that such research has ignored the fact that deceptive communicators can strategically control
many behaviors during an interaction and that deceptive messages occur in an on-going
conversational context. Buller and Burgoon, in their development of Interpersonal Deception
Theory (1996), have proposed an interpersonal approach to deception that posits that, while
communicators may “leak” some information about their deception goals, they may also engage
in behavior specifically designed to mask deception cues and to convey an honest demeanor.
According to IDT, deceptive communication is not just a single isolated communication event
but rather takes place in the context of an on-going dialogue. The research generated by Buller
and Burgoon’s framework has demonstrated that when we think about deception as an
interactive process, the actions of both the deceiver and receiver are highly influential in
determining how a deceptive message is negotiated in the interaction. For instance, using Buller
and Burgoon’s theoretical framework, White and Burgoon (2001) found evidence of strong
mutual influence among deceivers and receivers and evidence of deceivers using receiver
feedback to improve their performances, findings which confirm that receivers can impact
whether or not deceivers have an easy or difficult time in “pulling off” deception. Other research
by Burgoon, Buller, White, Afifi, and Buslig (1999) similarly demonstrated that deceivers adapt
12
their performances over time so that deceptive performances become indistinguishable from
truthful ones.
Computer-Mediated Communication
Computer-mediated communication (CMC) is a common communication medium for
business today. Electronic mail (e-mail) has become a standard communication tool for
employees and businesses all over the world. The CMC environment is unique because, although
it allows for relatively high-speed interaction between participants, it also “filters out” certain
informational cues (e.g., Adkins & Brashers, 1995; Daft, Lengel, & Trevino, 1987; Sproull &
Kiesler, 1991; Williams, 1978). E-mail generally transmits only text-based (including “rich” or
“styled” text) messages, thereby omitting some nonverbal cues or channels that are typically
used to transmit contextual and social information. When CMC is used with anonymous or
pseudonymous communicators, as is the case for group support systems and chat rooms
respectively, there are even fewer such cues available to affect interaction.
Determining the availability of cues in CMC and how this compares to other
communication media is part of the tradition of cross-media comparisons in the communication
literature. At least two theories have been developed to explain cross-media differences, social
presence theory (Short, Williams & Christie, 1976) and media richness theory (Daft & Lengel,
1986). In the first, social presence is defined as a subjective, cognitive synthesis of all of the
many factors that reflect the social immediacy or intimacy of a communication medium. Social
presence depends on the visual non-verbal cues transmitted, the apparent distance of the person
or people that are being communicated with, and the "realness" of those being communicated
with (Short et al., 1976). There are measurable factors that determine a medium's social
presence, including the ability of a medium to convey non-verbal cues, the social or
13
organizational role of users, and the potential for interactivity (Rice & Williams, 1984). All
other things being equal, these measurable factors are thought to determine which media are
chosen for communication and the consequences of the communication.
Based on the experiments of Short and colleagues (Short et al., 1976), media could be
ordered in terms of their social presence as follows, from least to most: business letter,
telephone/ speakerphone, multispeaker audio, television, face-to-face. In general, the greatest
distinctions were drawn between visual and non-visual media. Short and colleagues hypothesize
that the suitability of any particular communication medium for a specified task, and the
consequences of performing that task, depends on the social presence of the medium. They also
hypothesize that the suitability of the communication medium depends on the social presence of
the task. If a medium with low social presence is chosen for a task requiring high social
presence, then the consequences of the communication interaction will be very different from
what would have occurred had a more suitable medium been chosen for that particular task.
Media richness theory was developed by Daft and colleagues (Daft & Lengel, 1986; Daft,
Lengel & Trevino, 1987) to explain why managers overwhelmingly prefer oral communication,
even when other channels are available. They suggest that communication media can be
characterized in terms of their "richness," where media richness is based on four criteria:
feedback, multiple cues, language variety, and personal focus. The more there are of all of these
attributes, the richer the medium. Daft, et al. (1987) found that media high in richness are
preferred for communication that is high in equivocality, and that media low in richness are
favored for communication that is unequivocal. They considered face-to-face communication to
be the richest medium, followed in descending order by the telephone, addressed written
communication, and unaddressed written communication. The overall ratings of communication
14
media are similar for both social presence and media richness theories (although reached in
theoretically distinct approaches).
The clear implication from both theories of cross-media differences is that a particular
medium is more successful at conveying information than others, a capability often thought of as
greater or lesser bandwidth (Short, et al., 1976). One of the key reasons for comparing electronic
media to more traditional media is the belief that electronic media are not capable of transmitting
many of the cues that are available in other media (Rice & Williams, 1984; Sproull & Kiesler,
1991). At present, the primary component of electronic media is text, so that many but not all
cues about status, position, and situational norms are missing. In addition, nonverbal cues to
meaning in informational exchanges, such as vocal pitch, tempo, gestures, and facial expression
are not included. The lack of nonverbal cues is thought to be associated with "flaming," the
practice of responding out of all proportion to the intent or seriousness of the message received.
Given the lack of cues in most electronic media, such as those that convey information in textual
form, one could place them between the telephone and written messages in the spectra of social
presence and richness in communication media. Any electronic medium that also employs video
images, such as videoconferencing, should appear somewhere between face-to-face and
telephone (near where Short and colleagues place television).
The ability of a given communication medium to transmit the cues necessary to
understand a message, that is, its bandwidth, is not fixed, however. There is evidence in the
literature that participant experiences may play a key role in their ability to process information
in CMC environments. Carlson and Zmud (1994, 1999) identify four experiential bases that can
impact an individual’s perceptions of the richness of the CMC medium: experience with the
medium, with other participants, with the messaging topic, and with the organizational context.
15
Carlson and Zmud (1999) found that as individuals gained experience in these four areas, their
perceptions of the richness of a CMC medium (e-mail, in their case) increased in a related
manner. That is, as communicators gained experience, they found the CMC medium to be better
able to handle rich, equivocality-reducing, socio-emotional messages.
Given the observation that transmission capacity of a medium is not inherent to the
medium, there is some debate concerning the important characteristics that should be included in
CMC research. Generally, studies of CMC have been based on either media richness or social
presence theory. It has been suggested that perhaps the basic constructs underlying media
richness are incomplete, especially with respect to newer media (e.g., Dennis & Valicich, 1999).
While Daft and colleagues (Daft & Lengel, 1986; Daft, et al., 1987) suggested four
characteristics important to understanding media differences, Dennis and Valicich (1999)
propose the existence of five. The approach we take here is to integrate and extend these
formulations to produce a set of constructs that are especially germane for deception research:
synchronicity, symbol variety, tailorability, reprocessability, and extensibility.
Synchronicity pertains to the speed of interaction and feedback supported by the medium
and is sometimes equated with interactivity.1 If a medium supports simultaneous transmission or
immediate response to another’s prior transmission, it is synchronous. Media that incur
significant delays between transmissions are asynchronous. In addition, media with lower
feedback speeds allow users additional time to compose, rehearse, and edit the information they
wish to communicate (Dennis & Valacich, 1999). Symbol variety is created through the number
of differing cues and language elements that a medium can simultaneously communicate. For
example, while basic e-mail systems can communicate textual language elements, video-
1 Although readers are referred to Burgoon, Bonito, Bengtsson, Ramierz, Dunbar, & Miczo (2000) for abroader definition of interactivity in which synchronicity is just one of its constituent properties.
16
conferencing adds visual cues to enrich the information exchange. Tailorability refers to the
ability of the medium to allow the author of the message to customize the communication event
to match the (perceived) individual needs of each recipient. Reprocessability comes from the
ability of the medium to store message contents and allow participants’ subsequent access to and
analysis of these messages. Finally, extensibility refers to the degree to which the medium
supports tools and information to aid in message composition and/or interpretation. For example,
HTML-based messaging can contain links to additional information that the recipient could
choose to access to extend or deepen their interpretation of the message; this extended
information is not directly contained in the message, but the medium supports the high-speed
access of this information to aid the receiver.
A Model of Deception and Detection in Computer-Mediated Communication
While the depth of research in both deceptive communication and general
communication in computer-mediated environments is laudable, there is a scarcity of empirical
and theoretical work at their intersection. At the same time, society is increasingly using
computer-based technologies for all aspects of communication. There is no reason to expect that
the deception that pervades all other forms of human communication is not equally present in
communication that is computer-mediated. Understanding how deception might play out in
CMC is important to understanding CMC generally.
Having identified some of the variables important to deceptive communication, deception
detection, motivations for deception, and cross-media comparison characteristics, it is useful to
construct a model that incorporates deception and communication media. Such a model can
guide empirical research studies investigating the extent to which deception using computer-
mediated communication can be successfully detected. The model in Figures 1 and 2 is based on
17
models by Miller & Stiff (1993), Grover (1993a), Buller & Burgoon, (1996), and George &
Carlson (1999).
Broadly, we posit that the successful detection of a deceptive communication message is
determined by the participants involved, their relationship, the design and delivery of the
deception, and the medium chosen to convey it. In an on-going deceptive communication event,
the success or failure of the receiver to detect the deception serves as input for both the receiver
and the receiver for the next message(s) in the dialogue between the deceiver and the receiver.
Figure 1: A Model of Deceptive Communication and Its Detection
The dependent variables in the model are those typically of interest in the deception
research, including: detection deception success, the confidence the receiver has in the
18
information acquired, and the confidence the deceiver has in his/her deception. These outcomes
are seen to be products of the nature of the communication event that has just completed as well
as the communication medium through which it was conducted. Three sets of variables are
antecedent to the event and the medium chosen: the receiver, the deceiver, and their relationship.
We posit that the outcomes themselves feedback to the receiver and the deceiver, affecting the
actors, which in turn influences the communication event and the medium. Finally, all of these
processes occur within a given context.
The Deceiver
The deceiver – the individual or group that engages in the act of deception – has many
characteristics that may predict how well they are able to perpetrate deception across multiple
media.
Motivations to Deceive
The deceiver may experience a number of different motivations to deceive, including role
strain, outcome value and relevance, and the likelihood of success. Each of these are considered
next.
Role strain. Role strain is the psychological state that can result from the stressors that
occur when an individual is involved in multiple roles. Role strain is a multidimensional
construct that includes role conflict, role overload, and role ambiguity (Kahn et al., 1964). More
specifically, role strain occurs due to the occurrence of one or more sets of role demands in the
work place in which certain demands are impossible, unclear, or in conflict with demands
simultaneously imposed by another role. For example, role conflicts can be due to several
factors, including divergent demands made by two different superiors, discrepancies between an
employee’s values and those of the organization, inconsistencies between performance
19
expectations and the time and resources the employee has to meet those expectations, and
clashes between what is expected from members of different groups an individual belongs to
simultaneously (e.g., Putnam & Stohl, 1996).
When faced with such conflict, an individual will either choose one of the roles to guide
their behavior, avoid the conflict, or compromise between the roles (Kahn, et al., 1964).
According to Grover (1993a, 1993b), deceit is one of the distress-relieving mechanisms available
to those caught in role conflict.2 Grover (1993b) also found that the likelihood of lying for one
role or the other was related to role commitment; subjects with high levels of professional
commitment reported less likelihood to lie in their professional role than did those with low
levels of professional commitment. Subjects with high levels of organizational commitment
were less likely to lie in their organizational roles than those with low levels of organizational
commitment. Further, those with more attachment to the organization were more aroused by role
conflict, while those with more attachment to the profession were less aroused.
Outcome value and relevance. The value and relevance of the outcomes associated with a
successful deception extends earlier work that identified the “consequences of a successful
deception” as an important motivator (Miller & Stiff, 1993; George & Carlson, 1999); however,
such consequences may have widely varying values and degrees of relevance to different
individuals that need to be uncovered. Nevertheless, Vasek (1986) notes that when people have
something to gain or lose, deception in their interactions with others must be suspected.
Likelihood of success. The perceived likelihood of successfully carrying out the
deception is another motivator; individuals feeling little risk of being caught may be additionally
2 The other four mechanisms are choice (choosing one role over others to guide behavior),avoidance (pretending the conflict does not exist), compromise, and voice (changing the roledemands).
20
motivated in carrying out the unethical behavior (e.g., Jones, 1991). Whether high levels of
motivation result in successful deception is in dispute. DePaulo and colleagues (e.g., DePaulo &
Kirkendol, 1989; DePaulo, Lanier, & Davis, 1983), contend that high levels of motivation impair
performance due to less control over cue leakage and less ability to adapt to receiver suspicion.
Burgoon and colleagues (e.g., Burgoon & Floyd, 2000; Burgoon, Buller, Guerrero, & Feldman,
1994) contend that higher motivation produces more successful performances due to greater self-
monitoring and strategic behavior and have offered empirical evidence to support that position.
That said, extremely high levels of motivation, such as might the case when there are severe
repercussions if caught, may be cognitively and emotionally “overloaded” and have some
detrimental impact on performance. Therefore,
P1: Deceivers with low motivation to succeed will be less successful ingenerating successful deceptive messages than those with moderate tomoderately high levels of motivation; extremely high levels of motivationmay impair performance.
Intrinsic Ability
An individual’s intrinsic ability to perpetrate a successful deception – one that does in
fact change the receiver’s understanding in a manner consistent with the goal(s) of the deception
and does so without raising the receiver’s suspicion – is a function of the deceiver’s social skills
and speaking fluency, among other factors. The more skilled a person is in expressing
themselves verbally and nonverbally and in controlling those expressions as circumstances
demand, the more successful (e.g., Burgoon, Buller, & Guerrero, 1995; Burgoon, Buller, White,
& Rockwell, 1994; Riggio, 1983).
P2a: Deceivers with greater intrinsic ability will produce deceptive messages thatare less likely to be detected.
21
In addition, it is likely that intrinsic ability will manifest itself differently on different
communication media; for example, an individual who is skilled at encoding information in
visual channels may not be as skilled with audio channels. As such, the fit between the
deceiver’s intrinsic abilities and the medium selected becomes important:
P2b: Deceivers who select a communication medium that better fits their intrinsicabilities will produce deceptive messages that are less likely to be detected.
Task Characteristics
The characteristics of the communication and deception task that confront the deceiver
will also strongly influence his or her choice of medium and the nature in which the
communication event evolves. In addition to the overall task load, the deceiver may have a
variety of goals in regard to a specific communication event, including goals pertaining to the
information exchange needs, the overt task at hand, the deception, and the longer-term
relationship.
Task load. An individual’s task load is a multifaceted construct that includes the
cognitive complexity of the task, the cognitive effort required, the physical effort required, and
the time pressure involved (Hart & Staveland, 1988). We believe that these characteristics and
demands of the deception task will strongly influence the deceiver’s ability to carry out a
successful deception.
Task goals. The deceiver is seen to have both overt and covert task goals. Unless the
entire communication event is a fabrication (from the deceiver’s standpoint), the deceiver will
have some overt goals relating to the task at hand. These are goals that are unrelated to the
deception and are not intended to be hidden from the receiver. Overt goals include goals
concerning the nature and degree of task accomplishment, information exchange goals, and
22
relevant criteria such as efficiency and productivity. Covert task goals include goals relating to
the deception itself and other communication objectives that are to be hidden from the receiver.
The deception goals include communicating to the receiver a full understanding of and belief in
the deceptive message without engendering any suspicion.
Relational goals. The deceiver in this communication event may need to continue to work
with the receiver and may therefore have additional goals in regard to future (and potentially
truthful) communications with the receiver. This is true whether the relationship is personal or
work related and required the deceiver to focus not only on the current communication event but
future events as well.
Tasks that have many goals, especially if the goals are complicated and contradictory,
immediate and long-term, will themselves generate considerable cognitive load for the deceiver.
Keeping track of all the task goals while working toward fulfilling them will be complicated
enough; trying to deceive someone on top of that will be extremely difficult.
P3: The more complicated and varied the task characteristics, the less likely thedeceiver will be to generate successful deceptive messages.
Experiences
The experiences relevant here are those identified in Channel Expansion Theory (Carlson
& Zmud, 1994; 1999): experience with the co-participant(s), experience with the messaging
topic(s), experience with the available communication contexts, and experience with the
available media. The first three sets of experiences can help the deceiver improve his or her
abilities to deceive, especially with respect to a particular receiver. The last set of experiences,
with different media, will help the deceiver decide which media to choose. The extent to which
23
the deceiver is at an experiential advantage over the receiver will positively impact the likelihood
of a successful deception. Therefore,
P4: Increasing experience for deceivers relative to the receivers will improve theirability to successfully deceive.
In addition, the greater the degree of freedom deceivers have in selecting the specific
deception target, communication medium and communication context, the better able they will
be at creating a fit between his or her experiences and the deception requirements.
P5: The better the fit between the deceiver’s experiences and the deceptionrequirements, the more successful the deceiver will be.
Cognitions and Affect
Despite the pervasiveness of deception in all forms of human communication, deception
itself is hardily disapproved of and discouraged in most societies, perhaps going back to the
Biblical exhortation to not lie, or to not bear false witness. Societal sanctions against deception
cause feelings of unease in many people, even when the ethical calculus may point to deception
as the course of action that would injure the fewest people in a given situation. An individual
then may choose not to lie in face of the cognitive and/or affective dissonance such behavior
would cause. “Deceivers may experience varying degrees of physiological arousal and negative
affect stemming from detection apprehension (the fear of being caught deceiving) and guilt or
discomfort associated with violating conversational rules and social prescriptions against deceit
(Buller & Burgoon, 1996, p. 210).” On the other hand, some individuals may derive a thrill from
deceit, where the excitement of lying and the risk of getting caught may provide ample
motivation to deceive, even when the stakes are trivial.
P6: For most deceivers, the cognitive and/or affective dissonance associated with deceitwill most likely result in less successful deceptions.
24
The Receiver
The relevant constructs affecting the receiver to a large extent parallel those for the
deceiver, with some important differences.
Motivation
The receiver’s motivation to detect is based on intrinsic and contextual factors. Intrinsic
factors include the receiver’s truth bias and naturally suspicious nature. The contextual
motivators, which are based on the topic and manner of the deception, include the receiver’s trust
in the sender, their suspicion concerning the message itself (e.g., Buller & Burgoon, 1994), and
the value and relevance to them of successfully detecting any deception in the message. Each of
these contextual motivators may evolve as the communication event unfolds.
P7a: Receivers with greater intrinsic motivation to detect will have higher ratesof deception detection performance.
P7b: Receivers with greater contextual motivation to detect will have higher ratesof deception detection performance.
Intrinsic Ability
The receiver’s sensitivity and communication skills will play an important role in
correctly uncovering deceptions. Receivers who are more sensitive to the available deception
cues should be better able to identify deceptive content; moreover, both social and emotional
sensitivity skills are important for accurate identification (Burgoon & Buller, 1996). Moreover,
different facets of the receiver’s communication skill must be examined, including both verbal
and nonverbal skills (Burgoon & Bacue, in press).
P8a: Receivers with greater social sensitivity will have higher rates of deceptiondetection performance.
P8b: Receivers with greater emotional sensitivity will have higher rates ofdeception detection performance.
25
P8c: Receivers with greater verbal communication skills will have higher rates ofdeception detection performance.
P8d: Receivers with greater non-verbal communication skills will have higherrates of deception detection performance.
Task Characteristics
The same task characteristics that may play a role in a deceiver’s ability to successfully
detect a deceptive message, namely task load, task goals, and relational goals, should also play a
role in a receiver’s ability to detect the deception.
Task load. As with the deceiver, if the receiver is under conditions of high task load, he
or she will have less ability to focus on deceptive cues and therefore more difficulty uncovering
deception.
Task goals. The receiver will also have overt and covert task goals – with the same basic
constructs involved. For the receiver, goals that may be more overt include: determining the
truthfulness of the information, determining their confidence level in the information, and
strategic information management (e.g., not revealing certain information via the questions that
are asked).
Relational goals. Likewise, the receiver will have certain longer-term goals pertaining to
the receiver and their working and social relationships. A strong desire to maintain a positive
relationship with the deceiver, for example, may inhibit the receiver in asking certain questions
or challenging certain assertions.
P9: The more complicated and varied the task characteristics, the less likely thereceiver will be to successfully detect deceptive messages.
Experiences
26
Finally, the experience of the receiver plays an important role in the model. Increases in
the relevant experiences of the receiver (with respect to the deceiver), make it more likely that he
or she will be able to overcome the deceptive potential of the message due to his or her
increasing ability to receive and accurately interpret cues contained in the message. Therefore,
P10a: Increasing experience for the receiver relative to the deceiver will improve his orher ability to successfully uncover the deception.
Moreover, although the receiver is not able to determine the nature and characteristics of
the deception, his or her relevant experiences will nevertheless impact the ability to successfully
decode deception cues and associated levels of trust and suspicion.
P10b: The better the fit between the receiver’s experiences and the deceptioncharacteristics, the more successful the receiver will be.
P10c: Experience affects the receiver’s relationship with the deceiver.
Cognitions and Affect
Just as it may be unpleasant for some deceivers to have to lie, it may also be unpleasant
for some receivers to detect deception. In many cases, depending on the circumstances, people
would just as soon not know that they are being lied to. “Receivers may experience similar
cognitive and emotional responses [to those experienced by deceivers] when experiencing
suspicion due to their motivation to detect deception, heightened surveillance, cognitive
difficulty, and unpleasantness associated with uncovering duplicity (Buller & Burgoon, 1996, p.
210).” Such cognitive and affective reactions to discovering that one is being deceived may mask
the presence of cues that would otherwise indicate deceptive communication.
P11: For most receivers, the cognitive and/or affective dissonance associated withdiscovering deceit will most likely result in successful deception attempts.
27
The Relationship Between the Deceiver and the Receiver
Although there are many different ways to think about the relationship between the
deceiver and the receiver, we have tried to summarize the extent of these experiences in two
broad categories: shared and overlapping experiences, and relational closeness.
Shared and Overlapping Experiences
The experiences discussed earlier must also be considered in terms of the levels of shared
or overlapped experiences between the participants (see, e.g., Burgoon & Buller, 1996; Carlson
& Zmud, 1999). Shared experiences are those that involved both participants – their “history” of
interactions – which provide both background information and a behavioral familiarity with each
other (Burgoon & Buller, 1996). Overlapped experiences are those that the participants all have,
although they are not gained with each other. Examples include participants having the same
types of education, training, certifications, family situations, employment background, and so on.
These experiences can be used to more richly decode messages received from the co-participant
(e.g., Carlson & Zmud, 1999).
P12: The more experiences the deceiver and the receiver have in common, the morelikely the receiver will be to successfully detect deception.
Relational Closeness
Relational closeness is the constellation of relational dimensions related to intimacy:
trust, involvement, familiarity (depth and breadth), receptivity, similarity, and mutuality.
Relational closeness engenders a sense of relationship that “may invoke norms of reciprocity and
expectations of trust and mutual aid, creating positivity biases in interpersonal conversations”
(Burgoon & Buller, 1996, p. 213).
28
Trust is obviously a key construct in deceptive communication. Although trust has been
defined in various ways, a particularly straightforward definition is “that one believes in, and is
willing to depend on, another party” (McKnight, Cummings, & Chervany, 1998, p. 474). Some
people are more trusting of others naturally, while others have a predisposition to be suspicious,
as measured by Levine's and McCornack's "generalized communicative suspicion" construct
(Levine and McCornack, 1991). We posit, however, that trust in a close relationship can dampen
a natural disposition to be suspicious.
P13: A perception of relational closeness to the deceiver will make it more difficult forthe receiver to perceive deception cues.
The Communication Event
The communication event can be described as an ongoing dialogue in which the deceiver
presents some deception and attempts to control the concomitant leakage of cues (Figure 2).
These cues, whichever they may be, are displayed as part of the dialogue and may be perceived
by the receiver. If suspicion is triggered by such cues, by prior experiences, or by contextual
factors, then the receiver will actively search for and assess these cues. However, the perception
that a communication co-participant may be actively trying to deceive (as opposed to simply
stating an incorrect fact) may arouse the receiver to display cues in his/her communication that
signal this suspicion. This signaling, if not managed by the receiver, will be presented in the
interaction and may be detected by the deceiver. In turn, this may allow the deceiver to adapt
his/her deception strategy to better address the aspects that he/she perceives to be causing the
suspicion (Burgoon & Buller, 1996).
29
Figure 2: The Deceptive Communication Event
We posit that this package of information content cues, verbal and textual linguistic cues,
nonverbal cues, and contextual cues, acts as the interface between the deceiver and the receiver.
The potential of the deceptive message to successfully deceive the receiver is based on the
presence or absence of a sufficient number of deception cues and the availability of alternative
cues signaling trustworthiness. The more messages are devoid of any of the deception cues and
have sufficient strategic cues signaling credibility, the more successful they should be. Such a
configuration of cues is most likely to occur under low-stakes, low-pressure conditions and
conditions when deceivers can plan or rehearse their messages.
P14: Deceptive messages that minimize deception cues and maximizetrustworthiness cues will be least likely to be detected.
The Communication Medium
In addition, the communication event is heavily influenced not only by the participants
but also by the communication medium in use. Referring to our discussion above, since
communication media vary on their available bandwidth for carrying informational cues (and
30
this bandwidth varies based on the experience factors mentioned), the selection of medium will
affect both the deceiver’s capability to perpetrate a believable deception as well as the receiver’s
capability to perceive cues that may uncover it. For example, if the deceiver was largely able to
manage his/her display of deception cues, it is more likely that the deception will go undetected.
In addition, if a low-bandwidth medium was used (for instance), fewer cues will be available to
both participants, which may lessen their confidence as to whether their respective
communication goals were met.
The choice of communication medium has several effects in the model. As discussed, in
addition to social presence, the primary media characteristics posited to affect the deception
process are: speed of feedback, cue variety, tailorability, reprocessability, and extensibility. It is
proposed that the deceptive potential of a message (i.e., its believability) is aided by higher levels
of social presence, speed of feedback, and tailorability, a moderate level of symbol variety, and
lower levels of reprocessability and extensibility.
Messages that possess high social presence should engender more trust (and less
suspicion) on the part of the receiver by triggering truth biases; messages that appear socially
distant, on the other hand, won’t be evaluated with the same degree of trust. Communication
media supporting a high speed of feedback, in which there is a quick interchange of information
and ideas, provide the receiver less ability to think through the ideas being exchanged to uncover
cues to deception. Finally, media that support a high level of tailorability give the deceiver the
necessary tools to customize the message to convey the best “package” of cues to a particular
receiver. For example, asynchronous and leaner media may enable deceivers to better control
their self-presentations (Walther, 1996). Therefore,
P15a: Media with higher levels of social presence, speed of feedback, andtailorability will enable messages with higher deceptive potential.
31
Symbol variety, which is traditionally categorized with speed of feedback and
tailorability, is seen to have a more complex, nonlinear impact here. Lower levels of symbol
variety inhibit social presence, but also restrict the cues available to the receiver for use in
uncovering the deception. On the other hand, higher levels of symbol variety allow for additional
social presence, but also provide the receiver with an abundance of potential leakage cues.
Therefore, a moderate level of symbol variety is suggested to maximize the potential of the
deceptive message.
P15b: Media with moderate levels of symbol variety (as opposed to either high orlow levels) will enable messages with higher deceptive potential.
Related to symbol variety, different media allow different communication channels to be
used. Work comparing communication modalities (e.g., Zuckerman, DePaulo, & Rosenthal,
1981) suggests that deceivers should be successful at self-presentation when controlling visual
cues, so media supporting a visual channel are typically better for them. Additionally, text is
considered more controllable than audio, so audio-only media may be less effective in some
circumstances. In general, media that are advantageous for the deceiver will have more channels
that his/her experiences and intrinsic abilities render manageable.
P15c: Media with the greatest proportion of manageable channels (for thedeceiver) will enable messages with higher deceptive potential.
Another channel-related consideration is channel congruence. Discrepancies among
channels carried on a given medium may lead to attributions of deceit by the receiver, while
consistency my promote attributions of truthfulness (Zuckerman & Driver, 1985). In this case,
media with fewer channels become preferable for the deceiver. However, the medium must also
contain sufficient channels to enable a degree of richness and social presence to engender trust.
32
P15d: Media that minimize the number of channels the deceiver must manage,while also providing a sufficient and appropriate selection of channels toengender a feeling of social presence with the receiver, will enable messageswith higher deceptive potential.
Media supporting lower levels of reprocessability allow the receiver less opportunity to
review messages for deceptive cues that were missed during the initial communication event.
Similarly, media supporting lower levels of extensibility provide the receiver with less ability to
extend the information content of the message or to create customized tools within the medium
to uncover deceptive cues. Therefore,
P15e: Media with lower levels of reprocessability and extensibility will enablemessages with higher deceptive potential.
Implications and Research Directions
This paper represents the first attempt that we are aware of to bring together and
synthesize the relevant literatures and theories that pertain to the intersection between deceptive
and computer-mediated communication. The paper pulls from the disciplines of communication,
organizational behavior, small group research, and management information systems. Within
each discipline, much has been accomplished with regard to cross-media comparisons, how
computer-mediated communication differs from and is similar to traditional media, the role of
media differences in managerial communication and among members of work teams, and with
regard to gaining an understanding of deception and its role in communication, both in and
outside of the work place. This paper, however, is the only attempt we are aware of to bring all
of these ideas together into a single model and set of propositions.
This model and its derivative propositions is not the end, however, but is instead the
beginning of a sizable research effort. The propositions identify several areas where research is
warranted, where the answers are far from clear. In fact, for some of these propositions, we
33
realized as we crafted them that their proposed directionality could just as easily have been
written in the alternate way. Further, we do not mean to suggest that the propositions we have
identified are the only ones possible to draw from our model. We have really only skimmed the
surface of what is possible here. We also do not mean to suggest that the model itself cannot be
further refined, and we welcome efforts to do so. Hopefully we have shown that the intersection
of research on deceptive and computer-mediated communication is full of potential, and we call
on our colleagues to join us in mining this rich vein. The body of work that will result is no less
relevant than the separate studies of media and of deception that have preceded and informed the
area of research to which we draw your attention.
34
References
Adkins, M., & Brashers, D.E. (1995). The power of language in computer-mediated groups.Management Communication Quarterly, 8, 289-322.
Bond, C. R., Omar, A., Pitre, U., Lashley, B. R., Skaggs, L. M., & Kirk, C. T. (1992). Fishy-looking liars: Deception judgment from expectancy violation. Journal of Personality andSocial Psychology, 63, 969-977.
Bradac, J. J., and Mulac, A. (1984). A molecular view of powerful and powerless speech styles:Attributional consequences of specific language features and communicator intentions.Communication Monographs, 51, 307-319.
Brandt, D. R., Miller, G.R., & Hocking, J. E. (1982). Familiarity and lie detection: A replicationand extension. Western Journal of Speech Communication, 46, 276-290.
Buller, D. B., & Burgoon, J. K. (1994). Deception: Strategic and nonstrategic communication.In J. A. Daly & J. M. Wiemann (Eds.), Strategic interpersonal communication (pp. 191-223).Hillsdale, NJ: Erlbaum.
Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory,6, 203-242.
Buller, D. B., & Burgoon, J. K. (1997). Emotional expression in the deception process. In P. A.Andersen & L. K. Guerrero (Eds.), Communication and emotion (pp. 381-402). Orlando, FL:Academic Press.
Buller, D. B., Burgoon, J. K., Buslig, A., & Roiger, J. (1994). Interpersonal deception: VIII.Nonverbal and verbal correlates of equivocation from the Bavelas et al. (1990) research.Journal of Language and Social Psychology, 13, 396-417.
Buller, D. B., Burgoon, J. K., Buslig, A., and Roiger, J. (1996). Testing interpersonal deceptiontheory: The language of interpersonal deception. Communication Theory, 6, 268-289.
Buller, D. B., Burgoon, J. K., White, C., & Ebesu, A. S. (1994). Interpersonal deception: VII.Behavioral profiles of falsification, equivocation, and concealment. Journal of Language andSocial Psychology, 13, 366-396.
Burgoon, J. K., & Bacue, A. (in press). Nonverbal communication skills. In B. R. Burleson & J.O. Greene (Eds.), Handbook of communication skills. Mahwah, NJ: Erlbaum.
Burgoon, J. K., Bonito, J. A., Bengtsson, B., Ramirez, A., Jr., Dunbar, N., & Miczo, N. (1999-2000). Testing the interactivity model: Communication processes, partner assessments, andthe quality of collaborative work. Journal of Management Information Systems, 16(3), 33-56.
35
Burgoon, J. K., & Buller, D. B. (1994). Interpersonal deception: III. Effects of deceit onperceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior,18(2), 155-184.
Burgoon, J. K., & Buller, D.B. (1996). Reflections on the nature of theory building and thetheoretical status of interpersonal deception theory. Communication Theory, 6(3), 311-328.
Burgoon, J. K., Buller, D. B., Ebesu, A., & Rockwell, P. (1994). Interpersonal deception: V.Accuracy in deception detection. Communication Monographs, 61, 303-325.
Burgoon, J. K., Buller, D. B., Floyd, K., & Grandpre, J. (1996). Deceptive realities: Sender,receiver, and observer perspectives in deceptive conversations. Communication Research,23, 724-748.
Burgoon, J. K., Buller, D. B., & Guerrero, L. K. (1995). Interpersonal deception IX: Effects ofsocial skill and nonverbal communication on deception success. Journal of Language andSocial Psychology, 14, 289-311.
Burgoon, J. K., Buller, D. B., Guerrero, L. K., & Feldman, C. M. (1994). Interpersonaldeception: VI. Viewing deception success from deceiver and observer perspectives: Effectsof preinteractional and interactional factors. Communication Studies, 45, 263-280.
Burgoon, J. K., Buller, D. B., Guerrero, L. K., Afifi, W., & Feldman, C. (1996). Interpersonaldeception: XII. Information management dimensions underlying deceptive and truthfulmessages. Communication Monographs, 63, 50-69.
Burgoon, J. K., Buller, D. B., White, C. H., Afifi, W. A., & Buslig, A. L. S. (1999). The role ofconversational involvement in deceptive interpersonal communication. Personality andSocial Psychology Bulletin, 25, 669-685.
Burgoon, J. K., & Floyd, K. (2000). Testing for the motivation impairment effect duringdeceptive and truthful interaction. Western Journal of Communication, 64, 243-267.
Carlson, J. R., & Zmud, R.W. (1994). Channel expansion theory: A dynamic view of media andinformation richness perceptions. Academy of Management Best Papers Proceedings 1994,280-284.
Carlson, J. R., & Zmud, R.W. (1999). Channel expansion theory and the experiential nature ofmedia richness perceptions. Academy of Management Journal, 42(2), 153-170.
Cody, M. J., Marston, P. J., & Foster, M. (1984). Deception: Paralinguistic and verbal leakage.In R.N. Bostrom (Ed.), Communication yearbook 8 (pp. 464-491). Newbury Park, CA: Sage.
Daft, R. L., & Lengel, R. H. (1986). Organizational information requirements: Media richnessand structural design. Management Science, 32(5), 554-571.
36
Daft, R. L., Lengel, R.H., & Trevino, L.K. (1987). Message equivocality, media selection, andmanager performance: Implications for information systems. MIS Quarterly, 11(3), 355-366.
Dennis, A., & Valacich, J. S. (1999). Rethinking media richness: Towards a theory of mediasynchronicity. Proceedings of the 32nd Hawaii International Conference on SystemsSciences, Maui, HI.
DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., & Epstein, J. A. (1996). Lying ineveryday life. Journal of Personality and Social Psychology, 70, 979-995.
DePaulo, B.M., Lanier, K., & Davis, T. (1983). Detecting the deceit of the motivated liar.Journal of Personality and Social Psychology, 45, 1096-1103.
DePaulo, B. M., & Kirkendol, S. E. (1989). The motivational impairment effect in thecommunication of deception. In J. Yuille (Ed.), Credibility assessment (pp. 51-70). Deurne,Belgium: Kluwer.
DePaulo, B. M., Stone, J. I., & Lassiter, G. D. (1985). Deceiving and detecting deceit. In B.R.Schlenker (Ed.) The self and social life (pp. 323-370). New York: McGraw-Hill.
DePaulo, B. M., Zuckerman, M., & Rosenthal, R. (1980). Humans as lie detectors. Journal ofCommunication, 30(2), 129-139.
deTurck, M. A., & Miller, G. R. (1985). Deception and arousal: Isolating the behavioralcorrelates of deception. Human Communication Research, 12, 181-201.
Ekman, P., & Friesen, W. V. (1969). Nonverbal leakage and clues to deception. Psychiatry, 32,88-105.
Feeley, T. H., & deTurck, M. A. (1995). Global cue usage in behavioral lie detection.Communication Quarterly, 43, 420-430.
George, J. F., & Carlson, J. R. (1999). Group support systems and deceptive communication.Proceedings of the 32nd Hawaii International Conference on Systems Sciences, Maui, HI.
Grover, S. L. (1993a). Lying, deceit, and subterfuge: A model of dishonesty in the workplace.Organizational Science, 4(3), 478-495.
Grover, S. L. (1993b). Why professionals lie: The impact of professional role conflict onreporting accuracy. Organizational Behavior and Human Decision Processes 55, 251-272.
Hart, S. G., & Staveland., L. E. (1988). Development of a multi-dimensional workload ratingscale: Results of empirical and theoretical research. In P. A. Hancock & N. Meshkati(Eds.), Human Mental Workload. Amsterdam. The Netherlands: Elsevier.
37
Hurd, K., & Noller, P. (1988). Decoding deception: A look at the process. Journal of NonverbalBehavior, 12, 217-233.
Jones, T. M. 1991. Ethical decision making by individuals in organizations: An issue-contingent model.” Academy of Management Review, 16(2), 366-395.
Kahn, R. L., Wolfe, D. M., Quinn, R. P. & Snoek, J. D. (1964). Organizational Stress: Studies inRole Conflict and Ambiguity. New York: Wiley.
Kling, R. (1991). Cooperation, coordination and control in computer-supported work.Communications of the ACM, 34(12), 83-88.
Knapp, M. L., & Comadena, M. E. (1979). Telling it like it isn't: A review of theory andresearch on deceptive communication. Human Communication Research, 5, 270-285.
Krauss, R. M. (1981). Impression formation, impression management, and nonverbal behaviors.In E.T. Higgins, C.P. Herman & M.P. Zanna (Eds). Social Cognition: The OntarioSymposium, vol. 1 (pp 323-341). Hillsdale, NJ: L. Erlbaum Associates.
Kraut, R. E., & Higgins, E. T. (1989). Communication and social cognition. In R.E. Kraut &E.T. Higgins (Eds.), Communication and social cognition (Vol. 3, pp. 87-127). New York:Academic Press.
Lewicki, R. J. (1983). Lying and deception: A behavioral model. In M.H. Bazerman & R.J.Lewicki (Eds.) Negotiating in Organizations. Beverly Hills: Sage.
Levine, T. R., & McCornack, S.A. (1991). The dark side of trust: Conceptualizing and measuringtypes of communicative suspicion. Communication Quarterly, 39, 325-340.
Levine, T. R., & McCornack, S.A. (1992). Linking love and lies: A formal test of theMcCornack and Parks model of deception detection. Journal of Social and PersonalRelationships, 9, 143-154.
McKnight, D.H., Cummings, L.L., & Chervany, N.L. (1998). Initial trust formation in neworganizational relationships. Academy of Management Review, 23(3), 473-490.
Miller, G.R., & Stiff, J.B. (1993). Deceptive communication. Newbury Park, CA: SagePublications, Inc.
McCornack, S.A. (1992). Information manipulation theory. Communication Monographs, 59,1-16.
O'Barr, W.M. (1982). Linguistic evidence: Language, power, and strategy in the courtroom.New York: Academic Press.
Pfeffer, J. (1992). Managing with power. Boston, MA: Harvard Business School Press.
38
Pinkley, R.L., Griffith, T.L., & Northcraft, G.B. (1995). “Fixed Pie” a la Mode: Informationavailability, information processing, and the negotiation of suboptimal agreements.Organizational Behavior and Human Decision Processes, 62 (1), 101-112.
Putnam, L, L., & Stohl, C. (1996). Bona fide groups: An alternative perspective forcommunication and small group decision making. In R.Y. Hirokawa & M.S. Poole (Eds),Communication & Group Decision Making (second edition), (pp. 147-178). Thousand Oaks,CA: Sage Publications, Inc.
Rice, R., & Williams, L. (1984). Theories old and new: The study of new media,” in R. Rice, etal. (Eds.) The New Media (pp. 55-80). Beverly Hills: Sage Publications, Inc.
Riggio, R. E. (1993). Social interaction skills and nonverbal behavior. In R. S. Feldman (Ed.),Applications of nonverbal behavioral theories and research (pp. 3-30). Hillsdale, NJ:Erlbaum.
Saunders, C. S., Robey, D., & Vaverek, K. A. (1994). The persistence of status differentials incomputer conferencing. Human Communication Research, 20 (4), 443-472.
Short, J., Williams, E., & Christie, B. (1976). The Social psychology of telecommunication.London: John Wiley and Sons.
Sproull, L., & Kiesler, S. (1991). Connections. MIT Press, Cambridge, MA.
Stiff, J. B., Hale, J. L., Garlick, R., & Rogan, R.G. (1990). Effects of cue incongruence andsocial normative influences on individual judgements of honesty and deceit. SouthernCommunication Journal, 55, 206-229.
Stiff, J. B., & Miller, G.R. (1986). "Come to think of it....": Interrogative probes, deceptivecommunication, and deception detection. Human Communication Research, 12, 339-358.
Sussman, S.W., & Sproull, L. (1999) Straight talk: Delivering bad news through electroniccommunication. Information Systems Research, 10(2), 150-166.
Turner, R. E., Edgley, C., & Olmstead, G. (1975). Information control in conversations:Honesty is not always the best policy. Kansas Journal of Speech, 11, 69-89.
Vasek, M. E. (1986). Lying as a skill: The development of deception in children. In R.W.Mitchell & N.S. Thompson (Eds.), Deception: Perspectives on human and nonhuman deceit(pp. 271-292). Albany, NY: State University Press.
Vrij, A. (2000). Detecting lies and deceit: The psychology of lying and its implications forprofessional practice. Chichester: John Wiley and Sons.
39
Walther, J. B. (1994). Anticipated ongoing interaction versus channel effects on relationalcommunication in computer mediated interaction. Human Communication Research, 20,473-501.
Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, andhyperpersonal interaction. Communication Research, 23, 3-43.
Walther, J. B. (1997). Group and interpersonal effects in international computer-mediatedcollaboration. Human Communication Research, 23, 342-369.
White, C. H., & Burgoon, J. K. (2001). Adaptation and communicative design: Patterns ofinteraction in truthful and deceptive conversations. Human Communication Research, 27, 9-37.
Williams, E. (1978). Teleconferencing: Social and psychological factors. Journal ofCommunication, 28, 125-131.
Zmud, R.W. (1990). Opportunities for strategic information manipulation through newinformation technology. In Fulk & Steinfield (Eds.), Organizations and CommunicationTechnology (pp. 95-116). Newbury Park, CA: Sage.
Zuckerman, M., DePaulo, B.M., & Rosenthal, R. (1981). Verbal and nonverbal communicationof deception. In L. Berkowitz (Ed.), Advances in experimental psychology (Vol. 14, pp.1-59). New York: Academic Press.
Zuckerman, M., DePaulo, B.M., & Rosenthal, R. (1986). Humans as deceivers an lie detectors.In P.D. Blanck, R. Buck, & R. Rosenthal (Eds.) Nonverbal communication in clinical context(pp. 13-35). University Park, PA: The Pennsylvania State University Press.
Zuckerman, M., & Driver, R. E. (1985). Telling lies: Verbal and nonverbal correlates ofdeception. In A.W. Siegman & S. Feldstein (Eds.), Nonverbal communication: An integratedperspective (pp. 129-147). Hillsdale, NJ: L. Erlbaum.