Ve processing interpersonal decepon theory

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rela.on 4 Theories applied to decep/on • Four- factor model – Decep.on is detected through “leakage” of uninten.onal sources (cues that indicate a decep.on has occurred) – ACempted control, felt emo.on, physiological arousal, cogni.ve processing • Interpersonal decep.on theory – communica.on- based percep.on – decep.on is an interac.ve, itera.ve process 5 How is decep/on detected? • Verbal cues – pitch & tone • Non verbal – – – – pupil dila.on nervousness lip pressing amount of gestures • Humans, however, are poor lie detectors 6 Decep/on Online • What types of situa.ons lead to decep.on online? • Types of digital decep.on? – iden.ty based – message based 7 Signaling Theory • Applied in communica.on - Donath, 1999 – Explains how we perform, and what keeps “communica.on honest” – Communica.on produces “signals” that convey meaning – Reliable signals; costs of decep.ve produc.on outweigh the benefits • Assessment signals - highly reliable – Measured against an assessable quan.ty • Strategic / handicap signals – Indicate possession through waste » A moose’s antlers » Fast sports cars • Conven.onal signals – connec.on between signal & quality is unreliable – kept honest by social constric.ons / expecta.ons – dependent on context 8 Signaling Theory 9 Signaling Theory 10 Signaling Theory 11 Signaling Theory 12 Why lie online? • Self- serving vs. other- serving – Conflict avoidance – Purpose serving • Detec.on online • Effect of modality – media richness theory • vs – distance of modali.es (social distance hypothesis) 13 Detec/on • Mul.variate effects – – – – – – – Interac.vity Temporal structure Social cues Storage Replicability Reach Mobility 14...
View Full Document

Ask a homework question - tutors are online