10,074 research outputs found

    A CROSS-CULTURAL COMPARISON OF COMPUTER-MEDIATED DECEPTIVE COMMUNICATION

    Get PDF
    Although much research into deceptive communication has been conducted in the last several years, little of it has focused on deception outside of a North American context. Similarly, most deceptive research has investigated face-to-face verbal communication and neglected computer-mediated communication modes. This paper describes a study in progress on deceptive computer-mediated communication, looked at across two national cultures, Spain and the U.S. The paper reviews the relevant literature and theory and presents hypotheses and the research design

    Deception, Cultural Differences and Computer-Mediated Communication

    Get PDF

    Comparing Australians’ and Americans’ Abilities to Detect Deception across Cultures and Communication Media

    Get PDF
    The reach of global communication is expanding through the growing availability of smartphones. Smartphones are particularly popular for texting and voice/video calls, and their affordability means that more and more people around the world can now communicate with each other. Yet with the spread of global communication also comes increased exposure to deceptive communication. Can people in one culture accurately detect deception across cultures? And does the communication media they use play a role in their detection accuracy? We attempt to answer these two research questions in a study of Australian and US judges who were asked to detect deception in Australians and Americans, across four different media: full audiovisual, video only, audio only, and text. We found that both Australians and Americans could accurately detect deception at about the same rate across both cultures, and they were better at detection when exposed to full audiovisual stimuli compared to text

    Pragmatic and Cultural Considerations for Deception Detection in Asian Languages

    Get PDF
    In hopes of sparking a discussion, I argue for much needed research on automated deception detection in Asian languages. The task of discerning truthful texts from deceptive ones is challenging, but a logical sequel to opinion mining. I suggest that applied computational linguists pursue broader interdisciplinary research on cultural differences and pragmatic use of language in Asian cultures, before turning to detection methods based on a primarily Western (English-centric) worldview. Deception is fundamentally human, but how do various cultures interpret and judge deceptive behavior

    Deception Detection: An Exploration of Annotated Text-Based Cues

    Get PDF
    Do embedded textual cues in asynchronous communication affect deceptive message detection? The expanded use of social media and rich media applications in business make this an important issue. Prior research indicates deception commonly occurs in all forms of communication and people have difficulty detecting its use. Asynchronous online communications are no exception and offer users a variety of media choices which may complicate deception detection, particularly if the sender has strategically selected a channel intended to disguise their intentions. The current study investigated whether embedded, non-verbal cues in common media forms found in asynchronous online venues influenced deception detection. Drawing on media synchronicity theory, results suggest embedding non-verbal cues in the form of annotated text can enhance deception detection. Overall, the findings suggest managers must be wary of sender motivations, which can influence message veracity, particularly in low synchronicity environments where media is subject to edits and manipulations

    Current State of the Digital Deception Studies in IS

    Get PDF
    Digital deceptions exist on the Internet in various forms and for different purposes. The purpose of this study is to understand the current state of the digital deception research in IS discipline. Based on our review and analysis of the selected digital deception articles published in IS journals and conference proceedings, we discussed various perspectives of digital deceptions, such as the media, types of deception, deceivers, motivations, and victims. The results of our study indicate that deception phenomena are severely under-researched in IS discipline. The study provides suggestions for future research

    The adaptive problem of absent third-party punishment

    Get PDF
    Language is a uniquely human behaviour, which has presented unique adaptive problems. Prominent among these is the transmission of information that may affect an individual’s reputation. The possibility of punishment of those with a low reputation by absent third parties has created a selective pressure on human beings that is not shared by any other species. This has led to the evolution of unique cognitive structures that are capable of handling such a novel adaptive challenge. One of these, we argue, is the propositional theory of mind, which enables individuals to model, and potentially manipulate, their own reputation in the minds of other group members, by representing the beliefs that others have about the first party’s intentions and actions. Support for our theoretical model is provided by an observational study on tattling in two preschools, and an experimental study of giving under threat of gossip in a dictator game

    Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors

    Get PDF
    This study intends to provide a theoretical ground that conceptualizes the prospect of detecting insider threats based on leader-member exchange. This framework specifically corresponds to two propositions raised by Ho, Kaarst-Brown et al. [42]. Team members that are geographically co-located or dispersed are analogized as human sensors in social networks with the ability to collectively “react” to deception, even when the act of deception itself is not obvious to any one member. Close interactive relationships are the key to afford a network of human sensors an opportunity to formulate baseline knowledge of a deceptive insider. The research hypothesizes that groups unknowingly impacted by a deceptive leader are likely to use certain language-action cues when interacting with each other after a leader violates group trust
    • 

    corecore