Interpersonal deception theory

Last updated

Interpersonal deception theory (IDT) is one of a number of theories that attempts to explain how individuals handle actual (or perceived) deception at the conscious or subconscious level [1] while engaged in face-to-face communication. The theory was put forth by David Buller and Judee Burgoon in 1996 to explore this idea that deception is an engaging process between receiver and deceiver. IDT assumes that communication is not static; it is influenced by personal goals and the meaning of the interaction as it unfolds. IDT is no different from other forms of communication since all forms of communication are adaptive in nature. [2] The sender's overt (and covert) communications are affected by the overt and covert communications of the receiver, and vice versa. IDT explores the interrelation between the sender's communicative meaning and the receiver's thoughts and behavior in deceptive exchanges.

Contents

Hence, it is safe to say that IDT can also be referred to as a game of moves and countermoves by the deceiver and the deceived. [3]

Intentional deception requires greater cognitive exertion than truthful communication, regardless of whether the sender attempts falsification (lying), concealment (omitting material facts) or equivocation (skirting issues by changing the subject or responding indirectly).

Theoretical perspective

IDT views deception through the lens of interpersonal communication, considering deception as an interactive process between sender and receiver. In contrast with previous studies of deception (which focused on the sender and receiver individually), IDT focuses on the dyadic and relational nature of deceptive communication. Behaviors by sender and receiver are dynamic, multifunctional, multidimensional and multi-modal.

Dyadic communication is communication between two people; a dyad is a group of two people between whom messages are sent and received. Relational communication is communication in which meaning is created by two people simultaneously filling the roles of sender and receiver. Dialogic activity is the active communicative language of the sender and receiver, each relying upon the other in the exchange. "Both individuals within the communicative situation are actively participating in strategies to obtain or achieve goals set by themselves. The decision to actively deceive or not, is not that of a passive nature, it is done with intent by both individuals during the conversation".

In psychotherapy and psychological counseling, dyadic, relational and dialogic activity between therapist and patient relies on honest, open communication if the patient is to recover and be capable of healthier relationships. Deception uses the same theoretical framework in reverse; the communication of one participant is deliberately false.

History

Current research literature documents well that human beings are poor detectors of deception. [1] [4] [5] Research reveals that accuracy rates of people's ability to tell truth from deception are only a little above chance (54%). Concerningly, observers perform slightly worse given only visual information (52% accuracy) and better when they can hear (but not see) the target person (63%), While experts are more confident than laypersons, they are not more accurate. [1] [6]

Interpersonal Deception Theory (IDT) attempts to explain the manner in which individuals engaged in face-to-face communication deal with actual or perceived deception on the conscious and subconscious levels. IDT proposes that the majority of individuals overestimate their ability to detect deception. In some cultures, various means of deception are acceptable while other forms are not. Acceptance of deception can be found in language terms that classify, rationalize or condemn, such behavior. Deception that may be considered a simple white lie to save feelings may me be determined socially acceptable, while deception used to gain certain advantages can be determined to be ethically questionable. It has been estimated that "deception and suspected deception arise in at least one quarter of all conversations". [7]

Interpersonal deception detection between partners is difficult unless a partner tells an outright lie or contradicts something the other partner knows is true. While it is difficult to deceive a person over a long period of time, deception often occurs in day-to-day conversations between relational partners. [8] Maintaining a deception over time is difficult because it places a significant cognitive load on the deceiver. The deceiver must recall previous statements so that their story remains consistent and believable. As a result, deceivers often leak important information both verbally and nonverbally.

Sigmund Freud (1856-1939) Sigmund Freud (1856-1939).png
Sigmund Freud (1856–1939)

In the early twentieth century, Sigmund Freud studied nonverbal cues to detect deception about a century ago. Freud observed a patient being asked about his darkest feelings. If his mouth was shut and his fingers were trembling, he was considered to be lying. Freud also noted other nonverbal cues, such as drumming one's fingers when telling a lie. More recently, scientists have attempted to establish the differences between truthful and deceptive behavior using a myriad of psychological and physiological approaches. In 1969, Ekman and Friesen used straightforward observation methods to determine deceptive non-verbal leakage cues, [9] while more recently Rosenfeldet et al. used magnetic resonance imaging (MRI) to detect differences between honest and deceptive responses. [10]

In 1989, DePaulo and Kirkendol developed the Motivation Impairment Effect (MIE). MIE states the harder people try to deceive others, the more likely they are to get caught. Burgoon and Floyd, however, revisited this research and formed the idea that deceivers are more active in their attempt to deceive than most would anticipate or expect.

IDT was developed in 1996 by David B. Buller and Judee K. Burgoon. [11] Prior to their study, deception had not been fully considered as a communication activity. Previous work had focused upon the formulation of principles of deception. These principles were derived by evaluating the lie detection ability of individuals observing unidirectional communication. These early studies found initially that "although humans are far from infallible in their efforts to diagnose lies, they are substantially better at the task than would result merely by chance." [12] Additionally, research has shown that deception and suspected deception occurs in at least one quarter of all conversations. [7] [13]

Buller and Burgoon discount the value of highly controlled studies – usually one-way communication experiments – designed to isolate unmistakable cues that people are lying. Therefore, IDT is based on two-way communication and intended to describe deception as an interaction communicative process. [14] In other words, deception is an interpersonal communication method that required the active participation of both the deceiver and receiver. Buller and Burgoon wanted to emphasize that both the receiver and deceiver are active participants in the deception process. Both are constantly engaged in conscious and unconscious behaviors that relay their true intentions. Buller and Burgoon initially based their theory of IPD on the four-factor model of deception developed by social psychologist Miron Zuckerman, who argues that the four components of deceit inevitably cause cognitive overload and therefore leakage. Zuckerman's four factors include the attempt to control information, which fosters behavior that can come across as too practiced, followed by physiological arousal as a result of deception. This arousal then leads to the third factor, felt emotions, which are usually guilt and anxiety, which can become noticeable to an observer. Additionally, the many cognitive factors and mental gymnastics that are going on during a deception often lead to nonverbal leakage cues, such as increased blinking and a higher pitched voice.

Propositions

IDT's model of interpersonal deception has 21 verifiable propositions. Based on assumptions of interpersonal communication and deception, each proposition can generate a testable hypothesis. Although some propositions originated in IDT, many are derived from earlier research. The propositions attempt to explain the cognition and behavior of sender and receiver during the process of deception, from before interaction through interaction to the outcome after interaction. [11]

Context and relationship

IDT's explanations of interpersonal deception depend on the situation in which interaction occurs and the relationship between sender and receiver.

1. Sender and receiver cognition and behaviors vary, since deceptive communication contexts vary in access to social cues, immediacy, relationship, conversational demands and spontaneity.
2. In deceptive interchanges, sender and receiver cognition and behaviors vary; relationships vary in familiarity (informational and behavioral) and valence. [11]

Other factors before interaction

Individuals approach deceptive exchanges with factors such as expectancy, knowledge, goals or intentions and behaviors reflecting their communication competence. IDT posits that these factors influence the deceptive exchange.

3. Compared with truth-tellers, deceivers engage in more strategic activity designed to manage information, behavior and image and have more nonstrategic arousal cues, negative and muted affect and non-involvement. [11]

Effects on sender's deception and fear of detection

IDT posits that factors before the interaction influence the sender's deception and fear of detection.

4. Context moderates deception; increased interaction produces greater strategic activity (information, behavior and image management) and reduced nonstrategic activity (arousal or muted affect) over time.
5. Initial expectations of honesty are related to the degree of interactivity and the relationship between sender and receiver.
6. Deceivers' fear of detection and associated strategic activity are inversely related to expectations of honesty, a function of context and relationship quality.
7. Goals and motivation influence behavior.
8. As receivers' informational, behavioral and relational familiarity increase, deceivers have a greater fear of detection and exhibit more strategic information, behavior and image management and nonstrategic leakage behavior.
9. Skilled senders convey a truthful demeanor, with more strategic behavior and less nonstrategic leakage, better than unskilled ones. [11]

Effects on receiver cognition

IDT also posits that factors before the interaction, combined with initial behavior, affect receiver suspicion and detection accuracy.

10. Receiver judgment of sender credibility is related to receiver truth biases, context interactivity, sender encoding skills and sender deviation from expected patterns.
11. Detection accuracy is related to receiver truth biases, context interactivity, sender encoding skills, informational and behavioral familiarity, receiver decoding skills and sender deviation from expected patterns. [11]

Interaction patterns

IDT describes receiver suspicion and sender reaction.

12. Receiver suspicion is displayed in a combination of strategic and nonstrategic behavior.
13. Senders perceive suspicion.
14. Suspicion, perceived or actual, increases senders' strategic and nonstrategic behavior.
15. Deception and suspicion displays change over time.
16. Reciprocity is the predominant interaction pattern between senders and receivers during interpersonal deception. [11]

Outcomes

IDT posits that interaction between sender and receiver influences how credible the receiver thinks the sender is and how suspicious the sender thinks the receiver is.

17. Receiver detection accuracy, bias, and judgments of sender credibility after an interaction are functions of receiver cognition (suspicion and truth bias), receiver decoding skill and final sender behavior.
18. Sender perceived deception success is a function of final sender cognition (perceived suspicion) and receiver behavior. [11]

Strategic and Non Strategic Linguistic Behavior

Strategic linguistic behavior: Information and image management is most relevant to language use during deception; there are three sub-strategies that can be used for this:

  1. Reticence (reserving or restraining)
    • Reticence is a very common way of creating deception; it is withholding truthful information, and/or reducing the amount of specificity in content details.
  2. Vagueness and Uncertainty
    • The message becomes evasive and ambiguous through language choices.
  3. Non-Immediacy
    • Reduces the degree of directness and intensity of the interaction between the communicator and the object or the event communicated about. This has the effect of distancing senders from their messages. [15]

Receiver's role

Although most people believe they can spot deception, IDT posits that they cannot. A deceiver must manage his or her verbal and nonverbal cues to ensure that what they are saying appears true. According to IDT, the more socially aware a receiver is, the better he or she is at detecting deceit. A key assumption of IDT which is different from other models of deception assumes that the receiver is active in and co-regulates the deceptive encounter. This is opposed to previous research on deception that has referred to receivers as being passive in the process." [16]

Humans have a predisposition to believe what they are told. This is referred to as a "truth bias." [17] In a common social agreement, people are honest with one another and believe that others will be honest with them. If a deceiver begins a deceptive exchange with an accurate statement, the statement may induce the receiver to believe the rest of the deceiver's story is also true. The sender prepares the receiver to accept his or her information as truth, even if some (or all) of the dialogue is false. If the sender repeats the same tactic, the receiver will become more aware that the sender is lying. [11]

When suspicion is aroused in the receiver, there are a variety of ways that this suspicion can be expressed. Buller and Burgoon (1996) emphasized that there is no uniform receiver style to express suspicion, but instead is expressed through a variety of ways that they had discovered in previous research. [11] According to Buller et al. (1991), receivers often utilize follow-up questions to question their deceivers if they begin to detect deception. Buller et al. found that this did not elicit as much suspicion as probes from nonsuspicious receivers. [18] Burgoon et al. (1995) found that some receivers engaged in a more dominant interview style to engage with their deceiver, which represents a more aggressive and "unpleasant" style of questioning that aroused suspicion on the part of the deceiver. [19]

Emotion

Emotion plays a central role in IDT as a motivation and result of deception. Emotion can motivate deception, with the sender relying on relevant knowledge (informational, relational and behavioral familiarity) [11] to achieve goals such as self-gratification, avoiding a negative emotional outcome or creating a negative emotional outcome for the target of deception. Emotion can be a result of deception, since a physical response occurs in the sender (usually arousal and negative affect). [9] [20]

Leakage

The concept of leakage predates the development of IDT and was developed by Miron Zuckerman, et al., who created a four-factor model to explain when and why leakage is apt to occur. [20] Leakage in deception is manifested most overtly in nonverbal signals; studies indicate that over 90 percent of emotional meaning is communicated non-verbally. Humans are sensitive to body signals, and communication is often ambiguous; something is communicated verbally and its opposite non-verbally. Leakage occurs when nonverbal signals betray the true content of a contradictory verbal message. Facial expression is difficult to read, and the Facial Action Coding System (FACS) is a means of uncovering deception. Small facial movements, known as micro-expressions, can be detected in this system using action units.

Micro-expressions and action units

Action units (AUs) can be examined frame by frame, since these micro-expressions are often rapid. Paul Ekman’s research in facial deception has found several constants in certain expressions, with the action units relating to lip-corner pulling (AU12) and cheek-raising (AU6) qualifiers for happiness in most people. Brow-lowering (AU4) and lip-stretching (AU20) are disqualifiers for happiness. According to Ekman, emotional leakage appears in these fleeting expressions.

Ekman's research has received much attention in the popular media, but it also has been heavily criticized on both experimental and theoretical grounds. His theory that micro-expressions are effective markers for detecting deception is no longer considered to be well-supported. One criticism is that the theory "confounds emotion and deception", [1] like use of the polygraph [21] in assuming that an innocent person and a guilty one will feel different emotions in a situation which has severe possible outcomes. Concerns with such emotionally-based theories have led later researchers to develop theories based on cognition and cognitive processes. [1] [22] [23]

Facial expression

Seven basic emotions are communicated through facial expression: anger, fear, sadness, joy, disgust, surprise and contempt. These emotions are recognized universally. These expressions are innate or develop through socialization.

Cultures have a variety of rules governing the social use of facial expression; for example, the Japanese discourage the display of negative emotions. Individuals may find it difficult to control facial expression, and the face may "leak" information about how they feel.

Gaze

People use eye contact to indicate threat, intimacy and interest. Eye contact is used to regulate turn-taking in conversation, and indicates how interested the listener (receiver) is in what the speaker is saying. Receivers make eye contact about 70–75 percent of the time, with each contact averaging 7.8 seconds.

Gesture

Gestures are among the most culture-specific forms of nonverbal communication, and may lead to misinterpretation. Involuntary self-touching, such as touching the face, scratching, gripping the hands together or putting the hands in (or near) the mouth, occur when people experience intense emotions such as depression, [24] elation or extreme anxiety.

Ekman and Friesen demonstrated gesture leakage by showing films of a depressed woman to a group, which was asked to judge the woman's mood. Those shown only the woman's face thought she was happy and cheerful, while the group who saw only her body thought she was tense and disturbed. [9]

Touch

Touch can reassure and indicate understanding. Humans touch one another in sexual intimacy, affiliation and understanding; in greetings and farewells; as an act of aggression, and to demonstrate dominance. According to Argyle in 1996, there "appear to be definite rules which permit certain kinds of touch, between certain people, on certain occasions only. Bodily contact outside these narrow limits is unacceptable". [25]

Criticism

DePaulo, Ansfield and Bell questioned IDT: "We cannot find the 'why' question in Buller and Burgoon's synthesis. There is no intriguing riddle or puzzle that needs to be solved, and no central explanatory mechanism is ever described". [26] Em Griffin supported this criticism by pointing out a "good objective theory" must explain an event or human behavior which is much more significant than IDT in that it discusses "how" communication works in these scenarios, but not the "reason" why this communication theory works in these scenarios. [27] Although they praised Buller and Burgoon's 18 propositions as a comprehensive description of the timeline of deceptive interactions, they said the propositions lacked the interconnectedness and predictive power of a unifying theory. DePaulo et al. criticized IDT for failing to distinguish between interactive communication (which emphasizes the situational and contextual aspects of communicative exchanges) from interpersonal communication, which emphasizes exchanges in which the sender and receiver make psychological predictions about the other's behavior based on specific prior knowledge; this conceptual ambiguity limited IDT's explanatory power. [26] [28] However, Buller and Burgoon responded to this type of critique, saying the theory "was not meant to advance a single explanatory mechanism but instead to fit a broad communicative perspective on the phenomenon and to include multiple causal mechanisms that fit a general interpersonal communication account of the process." [29]

Park and Levine provide additional commentary questioning IDT stating that "because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims." [30] In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.

Experiment

Buller and Burgoon asked participants to put themselves in the following situation: "You've been dating Pat for nearly three years and feel quite close in your relationship. Since Pat goes to a different school upstate, the two of you have agreed to date other people. Nevertheless, Pat is quite jealous and possessive. During the school year you see Pat only occasionally, but you call each other every Sunday and talk for over an hour. On Friday one of your friends invites you to a party on Saturday night, but the party is 'couples only' so you need a date. There's no way that Pat could come down for the weekend. You decide to ask someone from your class who you've been attracted to so that you can go to the party. The two of you go and have a great time. On Sunday afternoon, there's a knock on your door and it's Pat. Pat walks in and says, 'Decided to come down and surprise you, tried calling you all last night, but you weren't around. What were you doing?'". [31] The researchers listed three possible responses: lying ("I was at the library getting ready for my theory exam"), telling part of the truth while omitting important details ("Went to a party at a friend's apartment") or being intentionally vague or evasive ("Went out for a while")". [31] These three responses were categorized as falsification,concealment, and equivocation. [31] These three differ, respectively, in that one creates a fiction, hides a secret, and the last dodges the issue; all falling under the umbrella of deception as defined by Buller and Burgoon. [31]

Online dating

Research on the use of deception in online dating has shown that people are generally truthful about themselves with the exception of physical attributes to appear more attractive. [32] Most online deception is subtle with slight exaggerations, representing people's attempts to portray themselves in the best possible light. [32] Of all online contexts, online dating appears the most prone to deception. In general, no matter the setting, people are more likely to be deceptive when looking for a date than in other social situations. [33]

Research suggests that while slight misrepresentations on online dating sites are quite common, major deceptions are actually rare. It seems that those who engage in online dating realize that while they want to make the best possible impression, if they want to pursue an offline relationship, they can't begin it with outright falsehoods that will quickly be revealed. [34] One survey of over 5,000 users of online dating sites how likely they were to misrepresent themselves in areas such as appearance and job information. [35] The average rating on these items was a 2 on a 10-point scale, indicating a relatively low level of deception overall.

Some people are more prone to deceptive behavior online than others, such as those with high sensation-seeking tendencies, and those who show addictive behavior toward the Internet. [36] Conversely, those who are introverted or have high tendencies for social anxiety are especially likely to be honest about their personalities online, revealing hidden aspects of the self that they would not normally show to others offline. [37] [38]

According to the Scientific American, "nine out of ten online daters will fib about their height, weight, or age" such that men were more likely to lie about height while women were more likely to lie about weight. [39] In addition, those high in the trait of self-monitoring are more likely to be dishonest on dating websites. In all aspects of their social lives, self-monitors are concerned with outward appearance and adapt their behavior to match the social situation. Thus, they also tend to be more deceptive in their attempts to attract dates both offline [33] and online. [35]

In a study conducted by Toma and Hancock, "less attractive people were found to be more likely to have chosen a profile picture in which they were significantly more attractive than they were in everyday life." [40] Both genders used this strategy in online dating profiles, but women more so than men. [40] Additionally, the researchers found that those deemed less attractive were more likely to express deception in the areas of physical attractiveness such as height and weight.

A qualitative study investigated deception in online dating. The study focused on four questions: (1) About what characteristics are online daters deceptive? (2) What motivation do online daters have for their deception of others in the online-dating environment? (3) What perceptions do online daters have about other daters' deceit towards them in the online-dating environment? (4) How does deception affect romantic relationships formed in the online-dating environment? In an online survey, data was collected from 15 open-ended questions. The study had 52 participants, ranging in age from 21 to 37, and found that most online daters consider themselves (and others) mostly honest in their online self-presentation. Online daters who used deception were motivated to do so by the desire to attract partners and project a positive self-image. Daters were willing to overlook deception in others if they viewed the dishonesty as a slight exaggeration or a characteristic of little value to the dater. Despite deception, participants believe that the online-dating environment can develop successful romantic relationships. [41]

See also

Notes

  1. 1 2 3 4 5 Vrij, Aldert; Hartwig, Maria; Granhag, Pär Anders (4 January 2019). "Reading Lies: Nonverbal Communication and Deception". Annual Review of Psychology. 70 (1): 295–317. doi: 10.1146/annurev-psych-010418-103135 . ISSN   0066-4308. PMID   30609913. S2CID   58562467 . Retrieved 8 December 2021.
  2. Infante D.A, Rancer A.S, Avtgis T.A (2010) Contemporary Communication Theory. 8. 241-246
  3. Burgoon J.K, Buller D.B (1994). Interpersonal Deception:III.Effects of Deceit on Perceived Communication and Nonverbal Behavior Dynamics. Journal of Nonverbal Behavior 18(2)
  4. Seigel, Jessica (25 March 2021). "The truth about lying". Knowable Magazine. doi: 10.1146/knowable-032421-1 . Retrieved 8 December 2021.
  5. Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E. (2008). "Cognitive Biases and Nonverbal Cue Availability in Detecting Deception". Human Communication Research. 34 (4): 572–599. doi:10.1111/j.1468-2958.2008.00333.x. ISSN   1468-2958.
  6. Bond, Charles F.; DePaulo, Bella M. (2006). "Accuracy of Deception Judgments". Personality and Social Psychology Review. 10 (3): 214–234. doi:10.1207/s15327957pspr1003_2. ISSN   1088-8683. PMID   16859438. S2CID   15248114.
  7. 1 2 DePaulo, Bella M.; Kashy, Deborah A.; Kirkendol, Susan E.; Wyer, Melissa M.; Epstein, Jennifer A. (1996). "Lying in everyday life". Journal of Personality and Social Psychology. American Psychological Association (APA). 70 (5): 979–995. doi:10.1037/0022-3514.70.5.979. ISSN   1939-1315. PMID   8656340.
  8. Laura, Guerrero (2007). Close Encounters: Communication in Relationships (2nd ed.). Los Angeles, CA: Sage. ISBN   978-1506376721.
  9. 1 2 3 Ekman, Paul; Friesen, Wallace V. (1969-02-01). "Nonverbal Leakage and Clues to Deception". Psychiatry. 32 (1): 88–106. doi:10.1080/00332747.1969.11023575. ISSN   0033-2747. PMID   27785970.
  10. Ganis, Giorgio; Rosenfeld, J. Peter; Meixner, John; Kievit, Rogier A.; Schendan, Haline E. (2011-03-01). "Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging". NeuroImage. 55 (1): 312–319. doi:10.1016/j.neuroimage.2010.11.025. ISSN   1053-8119. PMID   21111834. S2CID   1100311.
  11. 1 2 3 4 5 6 7 8 9 10 11 Buller & Burgoon 1996.
  12. DePaulo, B.M., Zukerman, M., & Rosenthal, R. (1980, Spring). "Humans As Lie Detectors". Journal of Communication, 30 (2) 129–139.
  13. Turner, Ronny E.; Edgley, Charles; Olmstead, Glen (1975). "Information control in conversations: Honesty is not always the best policy". The Kansas Journal of Sociology. Social Thought and Research. 11 (1): 69–89. ISSN   0022-8648. JSTOR   23255229.
  14. "Communicative interaction". Managing Research Library.
  15. Buller, David & Burgoon, Judee & Buslig, Aileen & Roiger, James. (2006). Testing Interpersonal Deception Theory: The Language of Interpersonal Deception. Communication Theory. 6. 268 - 289. 10.1111/j.1468-2885.1996.tb00129.x.
  16. Infante D.A, Rancer A.S, Avtgis T.A (2010). Contemporary Communication Theory
  17. McCornack, S.A. & Parks, M.R. (1986). Deception Detection and Relationship Development: The Other Side of Trust. In M. L. McLaughlin (Ed.) Communication Yearbook (Vol. 9 pp. 377–389). Beverly Hills, CA: Sage.
  18. Buller, David B.; Strzyzewski, Krystyna D.; Comstock, Jamie (1991). "Interpersonal deception: I. Deceivers' reactions to receivers' suspicions and probing". Communication Monographs. Informa UK Limited. 58 (1): 1–24. doi:10.1080/03637759109376211. ISSN   0363-7751.
  19. Burgoon, J.K.; Buller, D.B.; Dillman, L.; Walther, J.B. (1995). "Interpersonal Deception". Human Communication Research. Oxford University Press (OUP). 22 (2): 163–196. doi:10.1111/j.1468-2958.1995.tb00365.x. ISSN   0360-3989.
  20. 1 2 B. M. DePaulo, M. Zuckerman, & R. Rosenthal (1981). Advances in Experimental Social Psychology. In L. Berkowitz (Ed.) Verbal and Nonverbal Communication of Deception (Vol 14, pp. 1–59). New York: Academic Press.
  21. Nat. Res. Counc. (2003). The Polygraph and Lie Detection. Washington, DC: Nat. Acad. Press.
  22. Gelitz, Christiane (February 9, 2021). "Humans Are Pretty Lousy Lie Detectors". Scientific American. Retrieved 8 December 2021.
  23. Hartwig, Maria (November 26, 2014). "Telling Lies: Fact, Fiction, and Nonsense". Psychology Today. Retrieved 8 December 2021.
  24. "Your Guide to Depression: Symptoms, Treatments, and How to Help". Psych Central. 22 February 2021.
  25. Argyle 1996.
  26. 1 2 DePaulo, Ansfield & Bell 1996.
  27. Griffin, Em (2012). "3". A First Look At Communication Theory Eighth Edition (8th ed.). McGraw-Hill. ISBN   978-0073534305.
  28. See also Stiff 1996
  29. Burgoon, Judee & Buller, David. (2020). Interpersonal Deception Theory.
  30. Park, Hee Sun; Levine, Timothy R. (2015). "Base Rates, Deception Detection, and Deception Theory: A Reply to Burgoon (2015)". Human Communication Research. 41 (3): 350–366. doi:10.1111/hcre.12066. ISSN   1468-2958. S2CID   145727128.
  31. 1 2 3 4 Griffin, Em (2016). "7". A First Look At Communication Theory Sixth Edition (6th ed.). McGraw-Hill. ISBN   978-0073215808.
  32. 1 2 Zimbler, Mattitiyahu; Feldman, Robert S. (2011). "Liar, Liar, Hard Drive on Fire: How Media Context Affects Lying Behavior". Journal of Applied Social Psychology. 41 (10): 2492–2507. doi:10.1111/j.1559-1816.2011.00827.x. ISSN   1559-1816. S2CID   143240248.
  33. 1 2 Rowatt, Wade C.; Cunningham, Michael R.; Druen, Perri B. (1999-04-01). "Lying to Get a Date: The Effect of Facial Physical Attractiveness on the Willingness to Deceive Prospective Dating Partners". Journal of Social and Personal Relationships. 16 (2): 209–223. doi:10.1177/0265407599162005. ISSN   0265-4075. S2CID   145122084.
  34. Toma, Catalina L.; Hancock, Jeffrey T.; Ellison, Nicole B. (2008-08-01). "Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles". Personality and Social Psychology Bulletin. 34 (8): 1023–1036. doi:10.1177/0146167208318067. ISSN   0146-1672. PMID   18593866. S2CID   9528122.
  35. 1 2 Hall, Jeffrey A.; Park, Namkee; Song, Hayeon; Cody, Michael J. (2010-02-01). "Strategic misrepresentation in online dating: The effects of gender, self-monitoring, and personality traits". Journal of Social and Personal Relationships. 27 (1): 117–135. doi:10.1177/0265407509349633. hdl: 11244/25040 . ISSN   0265-4075. S2CID   145668250.
  36. Lu, Hung-Yi (2008-04-01). "Sensation-Seeking, Internet Dependency, and Online Interpersonal Deception". CyberPsychology & Behavior. 11 (2): 227–231. doi:10.1089/cpb.2007.0053. ISSN   1094-9313. PMID   18422419.
  37. Amichai-Hamburger, Yair; Wainapel, Galit; Fox, Shaul (April 2002). "'On the Internet no one knows I'm an introvert': extroversion, neuroticism, and Internet interaction". Cyberpsychology & Behavior. 5 (2): 125–128. doi:10.1089/109493102753770507. ISSN   1094-9313. PMID   12025878. S2CID   13585870.
  38. McKenna, Katelyn Y. A.; Green, Amie S.; Gleason, Marci E. J. (2002). "Relationship Formation on the Internet: What's the Big Attraction?". Journal of Social Issues. 58 (1): 9–31. doi:10.1111/1540-4560.00246. ISSN   1540-4560. S2CID   12086933.
  39. Epstein, Robert (2007). "The Truth about Online Dating". Scientific American Mind. 18: 28–35. doi:10.1038/scientificamericanmind0207-28 . Retrieved 2019-09-29.
  40. 1 2 Hancock, Jeffrey; Toma, Catalina; Ellison, Nicole (2007-01-01). "The truth about lying in online dating profiles". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – CHI '07. pp. 449–452. doi:10.1145/1240624.1240697. ISBN   978-1595935939. S2CID   207162937.
  41. Wagner, Lyndsey. Interpersonal Relationships and Online Dating (Master's thesis). Liberty University . Retrieved July 23, 2015.

Related Research Articles

Deception is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight of hand as well as distraction, camouflage or concealment. There is also self-deception, as in bad faith. It can also be called, with varying subjective implications, beguilement, deceit, bluff, mystification, ruse, or subterfuge.

Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated formats, it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

<span class="mw-page-title-main">Microexpression</span> Innate result of voluntary, involuntary, and conflicting emotional responses

A microexpression is a facial expression that only lasts for a short moment. It is the innate result of a voluntary and an involuntary emotional response occurring simultaneously and conflicting with one another, and occurs when the amygdala responds appropriately to the stimuli that the individual experiences and the individual wishes to conceal this specific emotion. This results in the individual very briefly displaying their true emotions followed by a false emotional reaction.

<span class="mw-page-title-main">Nonverbal communication</span> Interpersonal communication through wordless (mostly visual) cues

Nonverbal communication (NVC) is the transmission of messages or signals through a nonverbal platform such as eye contact, facial expressions, gestures, posture, use of objects and body language. It includes the use of social cues, kinesics, distance (proxemics) and physical environments/appearance, of voice (paralanguage) and of touch (haptics). A signal has three different parts to it, including the basic signal, what the signal is trying to convey, and how it is interpreted. These signals that are transmitted to the receiver depend highly on the knowledge and empathy that this individual has. It can also include the use of time (chronemics) and eye contact and the actions of looking while talking and listening, frequency of glances, patterns of fixation, pupil dilation, and blink rate (oculesics).

Expectancy violations theory (EVT) is a theory of communication that analyzes how individuals respond to unanticipated violations of social norms and expectations. The theory was proposed by Judee K. Burgoon in the late 1970s and continued through the 1980s and 1990s as "nonverbal expectancy violations theory", based on Burgoon's research studying proxemics. Burgoon's work initially analyzed individuals' allowances and expectations of personal distance and how responses to personal distance violations were influenced by the level of liking and relationship to the violators. The theory was later changed to its current name when other researchers began to focus on violations of social behavior expectations beyond nonverbal communication.

<span class="mw-page-title-main">Social information processing (theory)</span>

Social information processing theory, also known as SIP, is a psychological and sociological theory originally developed by Salancik and Pfeffer in 1978. This theory explores how individuals make decisions and form attitudes in a social context, often focusing on the workplace. It suggests that people rely heavily on the social information available to them in their environments, including input from colleagues and peers, to shape their attitudes, behaviors, and perceptions.

The hyperpersonal model is a model of interpersonal communication that suggests computer-mediated communication (CMC) can become hyperpersonal because it "exceeds [face-to-face] interaction", thus affording message senders a host of communicative advantages over traditional face-to-face (FtF) interaction. The hyperpersonal model demonstrates how individuals communicate uniquely, while representing themselves to others, how others interpret them, and how the interactions create a reciprocal spiral of FtF communication. Compared to ordinary FtF situations, a hyperpersonal message sender has a greater ability to strategically develop and edit self-presentation, enabling a selective and optimized presentation of one's self to others.

Judee K. Burgoon is a professor of communication, family studies and human development at the University of Arizona, where she serves as director of research for the Center for the Management of Information and site director for the NSF-sponsored Center for Identification Technology Research. She is also involved with different aspects of interpersonal and nonverbal communication, deception, and new communication technologies. She is also director of human communication research for the Center for the Management of Information and site director for Center for Identification Technology Research at the university, and recently held an appointment as distinguished visiting professor with the department of communication at the University of Oklahoma, and the Center for Applied Social Research at the University of Oklahoma. Burgoon has authored or edited 13 books and monographs and has published nearly 300 articles, chapters and reviews related to nonverbal and verbal communication, deception, and computer-mediated communication. Her research has garnered over $13 million in extramural funding from the National Science Foundation, the Department of Defense, the Department of Homeland Security, the Office of the Director of National Intelligence, Counterintelligence Field Activity, and the National Institutes of Mental Health. Among the communication theories with which she is most notably linked are: interpersonal adaptation theory, expectancy violations theory, and interpersonal deception theory. A recent survey identified her as the most prolific female scholar in communication in the 20th century.

Cognitive valence theory (CVT) is a theoretical framework that describes and explains the process of intimacy exchange within a dyad relationship. Peter A. Andersen, PhD created the cognitive valence theory to answer questions regarding intimacy relationships among colleagues, close friends and intimate friends, married couples and family members. Intimacy or immediacy behavior is that behavior that provides closeness or distance within a dyad relationship. Closeness projects a positive feeling in a relationship, and distance projects a negative feeling within a relationship. Intimacy or immediacy behavior can be negatively valenced or positively valenced. Valence, associated with physics, is used here to describe the degree of negativity or positivity in expected information. If your partner perceives your actions as negative, then the interaction may repel your partner away from you. If your partner perceives your actions as positive, then the interaction may be accepted and may encourage closeness. Affection and intimacy promotes positive valence in a relationship. CVT uses non-verbal and verbal communications criteria to analyze behavioral situations.

Interpersonal (Interaction) adaptation theory (IAT) is often referred to as a theory of theories. Several theories have been developed to provide frameworks as explanations of social interactions. After reviewing and examining various communication theories and previous empirical evidence pertaining to interpersonal communication, a need to address ways in which individuals adapt to one another in interactions became apparent. The importance of observing both sides of a dyadic interaction lead to the development of the interpersonal adaptation theory. The theory states, individuals enter interactions with expectations, requirements, and desires, which combined establish an interaction position. Once the interaction begins, the difference between interaction position and the other party's actual behavior determines whether the individual will adapt and continue the communication positively or not.

Relational transgressions occur when people violate implicit or explicit relational rules. These transgressions include a wide variety of behaviors. The boundaries of relational transgressions are permeable. Betrayal for example, is often used as a synonym for a relational transgression. In some instances, betrayal can be defined as a rule violation that is traumatic to a relationship, and in other instances as destructive conflict or reference to infidelity.

Non-verbal leakage is a form of non-verbal behavior that occurs when a person verbalizes one thing, but their body language indicates another, common forms of which include facial movements and hand-to-face gestures. The term "non-verbal leakage" got its origin in literature in 1968, leading to many subsequent studies on the topic throughout the 1970s, with related studies continuing today.

<span class="mw-page-title-main">Interpersonal communication</span> Exchange of information among people

Interpersonal communication is an exchange of information between two or more people. It is also an area of research that seeks to understand how humans use verbal and nonverbal cues to accomplish a number of personal and relational goals.

Othello error occurs when a suspicious observer discounts cues of truthfulness. Essentially the Othello error occurs, Paul Ekman states, "when the lie catcher fails to consider that a truthful person who is under stress may appear to be lying," their non-verbal signals expressing their worry at the possibility of being disbelieved. A lie-detector or polygraph may be deceived in the same way by misinterpreting nervous signals from a truthful person. The error is named after William Shakespeare's tragic play Othello; the dynamics between the two main characters, Othello and Desdemona, are a particularly well-known example of the error in practice.

Joseph B. Walther is the Mark and Susan Bertelsen Presidential Chair in Technology and Society and the Director of the Center for Information Technology & Society at the University of California, Santa Barbara. His research focuses on social and interpersonal dynamics of computer-mediated communication, in groups, personal relationships, organizational and educational settings. He is noted for creating social information processing theory in 1992 and the hyperpersonal model in 1996.

Affiliative conflict theory (ACT) is a social psychological approach that encompasses interpersonal communication and has a background in nonverbal communication. This theory postulates that "people have competing needs or desires for intimacy and autonomy". In any relationship, people will negotiate and try to rationalize why they are acting the way they are in order to maintain a comfortable level of intimacy.

Social Mirror Theory (SMT) states that people are not capable of self-reflection without taking into consideration a peer's interpretation of the experience. In other words, people define and resolve their internal musings through other's viewpoint. SMT's background is derived from the 1800s from concepts related to the study of public opinion and social interaction by Wilhelm Dilthey, the German philosopher and sociologist.

Nonverbal influence is the act of affecting or inspiring change in others' behaviors and attitudes by way of tone of voice or body language and other cues like facial expression. This act of getting others to embrace or resist new attitudes can be achieved with or without the use of spoken language. It is a subtopic of nonverbal communication. Many individuals instinctively associate persuasion with verbal messages. Nonverbal influence emphasizes the persuasive power and influence of nonverbal communication. Nonverbal influence includes appeals to attraction, similarity and intimacy.

Truth-default theory (TDT) is a communication theory which predicts and explains the use of veracity and deception detection in humans. It was developed upon the discovery of the veracity effect - whereby the proportion of truths versus lies presented in a judgement study on deception will drive accuracy rates. This theory gets its name from its central idea which is the truth-default state. This idea suggests that people presume others to be honest because they either don't think of deception as a possibility during communicating or because there is insufficient evidence that they are being deceived. Emotions, arousal, strategic self-presentation, and cognitive effort are nonverbal behaviors that one might find in deception detection. Ultimately this theory predicts that speakers and listeners will default to use the truth to achieve their communicative goals. However, if the truth presents a problem, then deception will surface as a viable option for goal attainment.

Motivation impairment effect (MIE) is a hypothesised behavioral effect relating to the communication of deception. The MIE posits that people who are highly motivated to deceive are less successful in their goal when their speech and mannerisms are observed by the intended audience. This is because their nonverbal cues, such as adaptor gestures, sweating, kinesic behaviors, verbal disfluencies, etc, tend to be more pronounced due to increased stress, cognitive load, and heightened emotional state. There is some disagreement regarding the MIE hypothesis, with a few nonverbal communication scholars arguing that deception should not be examined as separate for senders and receivers, but rather as an integral part of the overall process.

References