skip to main content
10.1145/1518701.1518782acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Butler lies: awareness, deception and design

Published:04 April 2009Publication History

ABSTRACT

Instant messaging (IM) is a common and popular way for co-workers, friends, and family to stay in touch, but its"always-on properties can sometimes lead people to feel overexposed or too readily available to others for conversation. This, in turn, may lead people to deceive others about their actual status or availability. In this paper, we introduce the notion of the "butler lie to describe lies that allow for polite initiation and termination of conversations. We present results from a field study of 50 IM users, in which participants rated each of their messages at the time of sending to indicate whether or not it was deceptive. About one tenth of all IM messages were rated as lies and, of these, about one fifth were butler lies. These results suggest that butler lies are an important social practice in IM, and that existing approaches to interpersonal awareness, which focus on accurate assessment of availability, may need to take deception and other social practices into account.

References

  1. Aoki, P. and Woodruff, A., Making space for stories: ambiguity in the design of personal communication systems. In ACM CHI (2005), 181--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Begole, J., Matsakis, N. and Tang, J., Lilsys: Inferring Unavailability Using Sensors. In ACM CSCW (2004), 511--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bellotti, V. and Bly, S., Walking Away from the Desktop Computer: Distributed Collaboration and Mobility in a Product Design Team. In ACM CSCW (1996), 209--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Birnholtz, J., Gutwin, C., Ramos, G. and Watson, M., OpenMessenger: Gradual Initiation of Interaction for Distributed Workgroups. In ACM CHI(2008), 1661--1664. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Boehner, K. and Hancock, J., Advancing Ambiguity. In ACM CHI(2006), 103--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Boyle, M. and Greenberg, S. The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Transactions on Computer-Human Interaction, 12, 2 (2005). 328--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Brown, P. and Levinson, S. Politeness: Some universals in language usage. Cambridge U. Press, Cambridge, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  8. Burgoon, J., Stoner, G.M., Bonito, J.A. and Dunbar, N.E., Trust and deception in mediated communication. In HICSS(2003), 44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Camden, C., Motley, M.C. and Wilson, A. White lies in interpersonal communication: a taxonomy and preliminary investigation of social motivations. Western Journal of Speech Communication, 48, (1984). 309--325.Google ScholarGoogle Scholar
  10. Clement, A. Considering privacy in the development of multi-media communications. CSCW, 2, (1994). 67--88.Google ScholarGoogle Scholar
  11. Davis, S. and Gutwin, C., Using Relationship to Control Disclosure in Awareness Servers. In Graphics Interface '05(2005), 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. DePaulo, B.M., Kashy, D.A., Kirkendol, S.E., Wyer, M.M. and Epstein, J.A. Lying in everyday life. Journal of Personality and Social Psychology, 70, (1996). 979--995.Google ScholarGoogle Scholar
  13. DePaulo, B.M., Kashy, D.A., Kirkendol, S.E. and Wyer, M.W. Lying in everyday life. Journal of Personality and Social Psychology 70, (1996). 979--995.Google ScholarGoogle Scholar
  14. DePaulo, B.M., Lindsay, J.J., Malone, B.E., Muhlenbruck, Charlton, K. and Cooper, H. Cues to deception. Psychological Bulletin, 129, (2003). 74--118.Google ScholarGoogle Scholar
  15. Dourish, P. and Bly, S., Portholes: Supporting awareness in a distributed work group. In ACM CHI(1992), 541--547. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Feldman, R.S., J.A., F. and Happ, B.R. Self-presentation and verbal deception: do self-presenters lie more? Basic and Applied Social Psychology, 24, (2002). 163--170.Google ScholarGoogle Scholar
  17. Fish, R., Kraut, R. and Root, R., Evaluating Video as a Technology for Informal Communication. In ACM CHI, (1992), 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Fogarty, J., Hudson, S.E., Atkeson, C.G., Avrahami, D., Forlizzi, J., Kiesler, S., Lee, J.C. and Yang, J. Predicting Human Interruptibility with Sensors. 12, 1 (2005). 119--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Greenberg, S. and Rounding, M., The notification collage: posting information to public and personal displays. In ACM CHI(2001), 514--521. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hancock, J. Digital deception: when, where and how people lie online. in Harrington, B. ed. Deception: methods, contexts and consequences (Santa Fe Institute), Stanford Press, Palo Alto, CA, 2007.Google ScholarGoogle Scholar
  21. Hancock, J., Thom-Santelli, J. and Ritchie, T., Deception and design: The impact of communication technologies on lying behavior. In ACM CHI (2004), 130--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hancock, J.T., Curry, L., Goorha, S. and Woodworth, M.T. On lying and being lied to: a linguistic analysis of deception. Discourse Processes, 45, (2008). 1--23.Google ScholarGoogle Scholar
  23. Hinds, P. and Kiesler, S. Distributed Work. MIT Press, Cambridge, MA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Hudson, S.E. and Smith, I., Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In ACM CSCW, (1996), 248--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Isaacs, E. and Clark, H.H. Ostensible invitations. Language in Society, 19, (1990). 493--509.Google ScholarGoogle Scholar
  26. Isaacs, E., Walendowski, A. and Ranganathan, D., Hubbub: A Sound-enhanced Mobile Instant Messenger that Supports Awareness and Opportunistic Interactions. In ACM CHI (2002), 179--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Kraut, R., Brynin, M. and Kiesler, S. Computers, Phones and the Internet: Domesticating Information Technology. Oxford U. Press, Oxford, UK, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kraut, R., Egido, C. and Galegher, J., Patterns of Contact and Communication in Scientific Research Collaboration. In ACM CSCW(1988), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mark, G., Gudith, D. and Klocke, U. The cost of interrupted work: more speed and stress. In ACM CHI (2008). 107--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. McEwan, G. and Greenberg, S., Supporting social worlds with the community bar. In ACM GROUP (2005), 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. McFarlane, D.C. and Latorella, K.A. The scope and importance of human interruption in human-computer interaction design. Human Computer Interaction, 17, 1 (2002). 1--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Nardi, B., Whittaker, S. and Bradner, E., Interaction and outeraction: Instant Messaging in action. In ACM CSCW (2000), 79--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. O'Sullivan, P.B. What you don't know won't hurt me: impression management functions of communication channels in relationships. Human Communication Research, 26, 3 (2000). 403--431.Google ScholarGoogle Scholar
  34. Olson, G.M. and Olson, J.S. Distance matters. Human-Computer Interaction, 15, (2001). 139--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Roberts, R. The House Servant's Directory. Charles S. Francis, New York, 1827.Google ScholarGoogle Scholar
  36. Schegloff, E.A. and Sachs, H. Opening up closings. Semiotica, 8, 4 (1973). 290--327.Google ScholarGoogle ScholarCross RefCross Ref
  37. Schmidt, K. The problem with 'awareness'. CSCW, 11, (2002). 285--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Shiu, E. and Lenhart, A. How Americans use instant messaging, Pew Internet&American Life Project, Washington DC, 2004.Google ScholarGoogle Scholar
  39. Smale, S. and Greenberg, S., Broadcasting information via display names in instant messaging. In ACM GROUP(2005), 89--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Tang, J. Approaching and leave-Taking: Negotiating Contact in Computer-Mediated Communication. ACM TOCHI, 14, 1 (2007). 1--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Toma, C., Hancock, J.T. and Ellison, N. Separating fact from fiction: an examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, 34, (2008). 1023--1036.Google ScholarGoogle Scholar
  42. Vanden Abeele, M. and Roe, K. White cyberlies: The use of deceptive instant messaging statuses as a social norm Paper presented at the Conference of the International Communication Association, Montreal, Canada, 2008.Google ScholarGoogle Scholar
  43. Whittaker, S. and Sidner, C., Email overload: exploring personal information management. In ACM CHI(1996), 276--283. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Butler lies: awareness, deception and design

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2009
        2426 pages
        ISBN:9781605582467
        DOI:10.1145/1518701

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader