skip to main content
10.1145/985692.985709acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Deception and design: the impact of communication technology on lying behavior

Published:25 April 2004Publication History

ABSTRACT

Social psychology has demonstrated that lying is an important, and frequent, part of everyday social interactions. As communication technologies become more ubiquitous in our daily interactions, an important question for developers is to determine how the design of these technologies affects lying behavior. The present research reports the results of a diary study, in which participants recorded all of their social interactions and lies for seven days. The data reveal that participants lied most on the telephone and least in email, and that lying rates in face-to-face and instant messaging interactions were approximately equal. This pattern of results suggests that the design features of communication technologies (e.g., synchronicity, recordability, and copresence) affect lying behavior in important ways, and that these features must be considered by both designers and users when issues of deception and trust arise. The implications for designing applications that increase, decrease or detect deception are discussed.

References

  1. Bos, N., Olson, J., Gergle, D., Olson, G. and Wright, Z. Effect of Four Computer-Mediated Communications Channels on Trust Development. In Proceedings of CHI 2002, pp. 135--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Burgoon, J.K., Stoner, G.M., Bonito, J.A., and Dunbar, N.E. Trust and deception in mediated communication. Proceedings of HICSS, 2003, pp. 44--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Burgoon, J.K., Blair, J.P., Qin, T., and Nunamaker, F. Jr. Detecting deception through linguistic analysis. In Lecture Notes in Computer Science, (Vol. 103, pp. 91--101) Google ScholarGoogle Scholar
  4. Camden, C., Motley, M.T., & Wilson, A. White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. Western Journal of Speech Communication, 48 (1984), pp. 309--325.Google ScholarGoogle ScholarCross RefCross Ref
  5. Daft, R. L., & Lengel, R. H. Information richness: A new approach to managerial behavior and organization design. In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior (Vol. 6, pp. 191--233). Greenwich, CT: JAI Press, 1984.Google ScholarGoogle Scholar
  6. Daft, R. L., & Lengel, R. H. Organizational information requirements, media richness and structural design. Management Science, 32 (1986), pp. 554--571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. DePaulo, B.M., & Kashy, D.A. Everyday lies in close and personal relationships. Journal of Personality and Social Psychology, 74 (1998), pp. 63--79.Google ScholarGoogle ScholarCross RefCross Ref
  8. DePaulo, B.M. Kashy, D.A., Kirkendol, S.E., Wyer, M.M., & Epstein, J.A. Lying in everyday life. Journal of Personality and Social Psychology, 70 (1996), pp. 979--995.Google ScholarGoogle ScholarCross RefCross Ref
  9. Feng, J., Lazar, J., and Preece, J. Interpersonal Trust and Empathy Online: A Fragile Relationship. In Proceedings of CHI 2003: Extended Abstracts, pp. 718--719. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hancock, J.T., & Dunham, P.J. Language use in computer-mediated communication: The role of coordination devices. Discourse Processes, 31 (2001), 91--110.Google ScholarGoogle ScholarCross RefCross Ref
  11. Horn, D. Is Seeing Believing? Detecting Deception in Technologically Mediated Communication. In Proceedings of CHI 2001: Extended Abstracts, pp. 297--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Horn, D., Olson, J. and Karasik, L. The Effects of Spatial and Temporal Video Distortion on Lie Detection Performance. In Proceedings of CHI 2002: Extended Abstracts, pp. 714--715. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Horrigan, J.B. New Internet Users: What They Do Online, What They Don't, and Implications for the 'Net's Future. Pew Internet and American Life Project, 2000.Google ScholarGoogle Scholar
  14. Kashy, D.A., & DePaulo, B.M. Who lies? Journal of Personality and Social Psychology, 70 (1996), pp. 1037--1051.Google ScholarGoogle ScholarCross RefCross Ref
  15. Turner, R.E., Edgely, C., & Olmstead, G. Informational control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology, 11 (1975), pp. 69--89.Google ScholarGoogle Scholar
  16. Walther, J.B. Computer-mediated communication: Impersonal, interpersonal and hyperpersonal interaction. Communication Research, 23 (1996), pp. 3--43.Google ScholarGoogle ScholarCross RefCross Ref
  17. Voida, A., Newstetter, W., & Mynatt, E.D. When conventions collide: The tensions of instant messaging attributed. In Proceedings of CHI 2002, pp. 187--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vrij, A. Detecting lies and deceit. Wiley, Chichester, England, 2000.Google ScholarGoogle Scholar
  19. Zheng, J., Veinott, E., Bos, N., Olson, J., and Olson, G. Trust without Touch: Jumpstarting long-distance trust with initial social activities. In Proceedings of CHI 2002, pp. 141--146. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Deception and design: the impact of communication technology on lying behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '04: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2004
        742 pages
        ISBN:1581137028
        DOI:10.1145/985692

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 April 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader