8,579 research outputs found

    Detection of Deception in a Virtual World

    Get PDF
    This work explores the role of multimodal cues in detection of deception in a virtual world, an online community of World of Warcraft players. Case studies from a five-year ethnography are presented in three categories: small-scale deception in text, deception by avoidance, and large-scale deception in game-external modes. Each case study is analyzed in terms of how the affordances of the medium enabled or hampered deception as well as how the members of the community ultimately detected the deception. The ramifications of deception on the community are discussed, as well as the need for researchers to have a deep community knowledge when attempting to understand the role of deception in a complex society. Finally, recommendations are given for assessment of behavior in virtual worlds and the unique considerations that investigators must give to the rules and procedures of online communities.</jats:p

    A CROSS-CULTURAL COMPARISON OF COMPUTER-MEDIATED DECEPTIVE COMMUNICATION

    Get PDF
    Although much research into deceptive communication has been conducted in the last several years, little of it has focused on deception outside of a North American context. Similarly, most deceptive research has investigated face-to-face verbal communication and neglected computer-mediated communication modes. This paper describes a study in progress on deceptive computer-mediated communication, looked at across two national cultures, Spain and the U.S. The paper reviews the relevant literature and theory and presents hypotheses and the research design

    No Grice: Computers that Lie, Deceive and Conceal

    Get PDF
    In the future our daily life interactions with other people, with computers, robots and smart environments will be recorded and interpreted by computers or embedded intelligence in environments, furniture, robots, displays, and wearables. These sensors record our activities, our behavior, and our interactions. Fusion of such information and reasoning about such information makes it possible, using computational models of human behavior and activities, to provide context- and person-aware interpretations of human behavior and activities, including determination of attitudes, moods, and emotions. Sensors include cameras, microphones, eye trackers, position and proximity sensors, tactile or smell sensors, et cetera. Sensors can be embedded in an environment, but they can also move around, for example, if they are part of a mobile social robot or if they are part of devices we carry around or are embedded in our clothes or body. \ud \ud Our daily life behavior and daily life interactions are recorded and interpreted. How can we use such environments and how can such environments use us? Do we always want to cooperate with these environments; do these environments always want to cooperate with us? In this paper we argue that there are many reasons that users or rather human partners of these environments do want to keep information about their intentions and their emotions hidden from these smart environments. On the other hand, their artificial interaction partner may have similar reasons to not give away all information they have or to treat their human partner as an opponent rather than someone that has to be supported by smart technology.\ud \ud This will be elaborated in this paper. We will survey examples of human-computer interactions where there is not necessarily a goal to be explicit about intentions and feelings. In subsequent sections we will look at (1) the computer as a conversational partner, (2) the computer as a butler or diary companion, (3) the computer as a teacher or a trainer, acting in a virtual training environment (a serious game), (4) sports applications (that are not necessarily different from serious game or education environments), and games and entertainment applications

    Perceptions of High Integrity Can Persist after Deception: How Implicit Beliefs Moderate Trust Erosion

    Get PDF
    Scholars have assumed that trust is fragile: difficult to build and easily broken. We demonstrate, however, that in some cases trust is surprisingly robust—even when harmful deception is revealed, some individuals maintain high levels of trust in the deceiver. In this paper, we describe how implicit theories moderate the harmful effects of revealed deception on a key component of trust: perceptions of integrity. In a negotiation context, we show that people who hold incremental theories (beliefs that negotiating abilities are malleable) reduce perceptions of their counterpart’s integrity after they learn that they were deceived, whereas people who hold entity theories (beliefs that negotiators’ characteristics and abilities are fixed) maintain their first impressions after learning that they were deceived. Implicit theories influenced how targets interpreted evidence of deception. Individuals with incremental theories encoded revealed deception as an ethical violation; individuals with entity theories did not. These findings highlight the importance of implicit beliefs in understanding how trust changes over time

    Deception, Cultural Differences and Computer-Mediated Communication

    Get PDF

    The Discourse of Digital Deceptions and ‘419’ Emails

    Get PDF
    This study applies a computer-mediated discourse analysis (CMDA) to the study of discourse structures and functions of ‘419’ emails – the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that the writers of the mails apply discourse/pragmatic strategies such as socio-cultural greeting formulas,self-identification, reassurance/confidence building, narrativity and action prompting strategies to sustain the interest of the receivers. The study also shows that this genre of computer-mediated communication (CMC) has become a regular part of our Internet experience, and is not likely to be extinct in the near future as previous studies of email hoaxes have predicted. It is believed that as the global economy witnesses a recession, chances are that more creative and complex ways of combating the situation will arise. Economic hardship has been blamed for fraud/online scams, inadvertently prompting youths to engage in various anti-social activities. K E Y W O R D S : computer-media communication, deceptions, discourse, email, ‘419’, fraud, hoax

    Clean Evidence on Face-to-Face: Why Experimental Economics is of Interest to Regional Economists

    Get PDF
    The notion of face-to-face contacts has recently become very popular in regional economics and in economic geography. This is the most obvious way to explain why firms still locate in proximity to others after the "death of distance", i.e., the shrinking costs for transportation, especially transportation of messages' pure information content. While this is intuitive, controlled laboratory experiments provide much more direct and reliable evidence on the importance of face-to-face contacts. They tackle the question what personal contacts are good for, and in which cases their effects are negligible. To the best of my knowledge, regional economists and geographers are not aware of this new and developing string of literature; it is the purpose of this paper to survey and to organize the relevant experimental research with a special focus on its importance for regional economics. However, the paper might also serve to alert more experimentalists to the importance of their work for current regional science, of which they seem not to be aware either.Cooperation, death of distance, face-to-face, localized spillovers, trust

    Individual Determinants of Media Choice for Deception

    Get PDF
    Recent research has found that deceivers are extremely difficult to detect in computer-mediated work settings. However, it is unclear which individuals are likely to use computer systems for deception in these settings. This study looked at how 172 upper-level business students’ political skill, social skill, and tendency to use impression management was related to their deception media choice in a business scenario. We found that most individuals preferred e-mail and face-to-face media to the phone for deception. However, the individuals with high social skill, individuals with high political skill, and individuals with a tendency to use impression management predominately chose the phone and face-to-face methods for deception. These findings imply that organizations do need to be aware of deception in e-mail communications; however, they also need to be aware of deception in phone and face-to-face settings, since this deception will likely be coming from individuals that are skilled deceivers
    • 

    corecore