Langbahn Team – Weltmeisterschaft

Interpersonal deception theory

Interpersonal deception theory (IDT) is one of a number of theories that attempts to explain how individuals handle actual (or perceived) deception at the conscious or subconscious level[1] while engaged in face-to-face communication. The theory was put forth by David Buller and Judee Burgoon in 1996 to explore this idea that deception is an engaging process between receiver and deceiver. IDT assumes that communication is not static; it is influenced by personal goals and the meaning of the interaction as it unfolds. IDT is no different from other forms of communication since all forms of communication are adaptive in nature.[2] The sender's overt (and covert) communications are affected by the overt and covert communications of the receiver, and vice versa. IDT explores the interrelation between the sender's communicative meaning and the receiver's thoughts and behavior in deceptive exchanges.

Hence, it is safe to say that IDT can also be referred to as a game of moves and countermoves by the deceiver and the deceived. [3]

Intentional deception requires greater cognitive exertion than truthful communication, regardless of whether the sender attempts falsification (lying), concealment (omitting material facts) or equivocation (skirting issues by changing the subject or responding indirectly).

Theoretical perspective

IDT views deception through the lens of interpersonal communication, considering deception as an interactive process between sender and receiver. In contrast with previous studies of deception (which focused on the sender and receiver individually), IDT focuses on the dyadic and relational nature of deceptive communication. Behaviors by sender and receiver are dynamic, multifunctional, multidimensional and multi-modal.

Dyadic communication is communication between two people; a dyad is a group of two people between whom messages are sent and received. Relational communication is communication in which meaning is created by two people simultaneously filling the roles of sender and receiver. Dialogic activity is the active communicative language of the sender and receiver, each relying upon the other in the exchange. "Both individuals within the communicative situation are actively participating in strategies to obtain or achieve goals set by themselves. The decision to actively deceive or not, is not that of a passive nature, it is done with intent by both individuals during the conversation".

In psychotherapy and psychological counseling, dyadic, relational and dialogic activity between therapist and patient relies on honest, open communication if the patient is to recover and be capable of healthier relationships. Deception uses the same theoretical framework in reverse; the communication of one participant is deliberately false.

History

Current research literature documents well that human beings are poor detectors of deception.[1][4][5] Research reveals that accuracy rates of people's ability to tell truth from deception are only a little above chance (54%). Concerningly, observers perform slightly worse given only visual information (52% accuracy) and better when they can hear (but not see) the target person (63%), While experts are more confident than laypersons, they are not more accurate.[1][6]

Interpersonal Deception Theory (IDT) attempts to explain the manner in which individuals engaged in face-to-face communication deal with actual or perceived deception on the conscious and subconscious levels. IDT proposes that the majority of individuals overestimate their ability to detect deception. In some cultures, various means of deception are acceptable while other forms are not. Acceptance of deception can be found in language terms that classify, rationalize or condemn, such behavior. Deception that may be considered a simple white lie to save feelings may me be determined socially acceptable, while deception used to gain certain advantages can be determined to be ethically questionable. It has been estimated that "deception and suspected deception arise in at least one quarter of all conversations".[7]

Interpersonal deception detection between partners is difficult unless a partner tells an outright lie or contradicts something the other partner knows is true. While it is difficult to deceive a person over a long period of time, deception often occurs in day-to-day conversations between relational partners.[8] Maintaining a deception over time is difficult because it places a significant cognitive load on the deceiver. The deceiver must recall previous statements so that their story remains consistent and believable. As a result, deceivers often leak important information both verbally and nonverbally.

Sigmund Freud
Sigmund Freud (1856–1939)

In the early twentieth century, Sigmund Freud studied nonverbal cues to detect deception about a century ago. Freud observed a patient being asked about his darkest feelings. If his mouth was shut and his fingers were trembling, he was considered to be lying. Freud also noted other nonverbal cues, such as drumming one's fingers when telling a lie. More recently, scientists have attempted to establish the differences between truthful and deceptive behavior using a myriad of psychological and physiological approaches. In 1969, Ekman and Friesen used straightforward observation methods to determine deceptive non-verbal leakage cues,[9] while more recently Rosenfeldet et al. used magnetic resonance imaging (MRI) to detect differences between honest and deceptive responses.[10]

In 1989, DePaulo and Kirkendol developed the Motivation Impairment Effect (MIE). MIE states the harder people try to deceive others, the more likely they are to get caught. Burgoon and Floyd, however, revisited this research and formed the idea that deceivers are more active in their attempt to deceive than most would anticipate or expect.

IDT was developed in 1996 by David B. Buller and Judee K. Burgoon.[11] Prior to their study, deception had not been fully considered as a communication activity. Previous work had focused upon the formulation of principles of deception. These principles were derived by evaluating the lie detection ability of individuals observing unidirectional communication. These early studies found initially that "although humans are far from infallible in their efforts to diagnose lies, they are substantially better at the task than would result merely by chance."[12] Additionally, research has shown that deception and suspected deception occurs in at least one quarter of all conversations.[7][13]

Buller and Burgoon discount the value of highly controlled studies – usually one-way communication experiments – designed to isolate unmistakable cues that people are lying. Therefore, IDT is based on two-way communication and intended to describe deception as an interaction communicative process.[14] In other words, deception is an interpersonal communication method that required the active participation of both the deceiver and receiver. Buller and Burgoon wanted to emphasize that both the receiver and deceiver are active participants in the deception process. Both are constantly engaged in conscious and unconscious behaviors that relay their true intentions. Buller and Burgoon initially based their theory of IPD on the four-factor model of deception developed by social psychologist Miron Zuckerman, who argues that the four components of deceit inevitably cause cognitive overload and therefore leakage. Zuckerman's four factors include the attempt to control information, which fosters behavior that can come across as too practiced, followed by physiological arousal as a result of deception. This arousal then leads to the third factor, felt emotions, which are usually guilt and anxiety, which can become noticeable to an observer. Additionally, the many cognitive factors and mental gymnastics that are going on during a deception often lead to nonverbal leakage cues, such as increased blinking and a higher pitched voice.

Propositions

IDT's model of interpersonal deception has 21 verifiable propositions. Based on assumptions of interpersonal communication and deception, each proposition can generate a testable hypothesis. Although some propositions originated in IDT, many are derived from earlier research. The propositions attempt to explain the cognition and behavior of sender and receiver during the process of deception, from before interaction through interaction to the outcome after interaction.[11]

Context and relationship

IDT's explanations of interpersonal deception depend on the situation in which interaction occurs and the relationship between sender and receiver.

1. Sender and receiver cognition and behaviors vary, since deceptive communication contexts vary in access to social cues, immediacy, relationship, conversational demands and spontaneity.
2. In deceptive interchanges, sender and receiver cognition and behaviors vary; relationships vary in familiarity (informational and behavioral) and valence.[11]

Other factors before interaction

Individuals approach deceptive exchanges with factors such as expectancy, knowledge, goals or intentions and behaviors reflecting their communication competence. IDT posits that these factors influence the deceptive exchange.

3. Compared with truth-tellers, deceivers engage in more strategic activity designed to manage information, behavior and image and have more nonstrategic arousal cues, negative and muted affect and non-involvement.[11]

Effects on sender's deception and fear of detection

IDT posits that factors before the interaction influence the sender's deception and fear of detection.

4. Context moderates deception; increased interaction produces greater strategic activity (information, behavior and image management) and reduced nonstrategic activity (arousal or muted affect) over time.
5. Initial expectations of honesty are related to the degree of interactivity and the relationship between sender and receiver.
6. Deceivers' fear of detection and associated strategic activity are inversely related to expectations of honesty, a function of context and relationship quality.
7. Goals and motivation influence behavior.
8. As receivers' informational, behavioral and relational familiarity increase, deceivers have a greater fear of detection and exhibit more strategic information, behavior and image management and nonstrategic leakage behavior.
9. Skilled senders convey a truthful demeanor, with more strategic behavior and less nonstrategic leakage, better than unskilled ones.[11]

Effects on receiver cognition

IDT also posits that factors before the interaction, combined with initial behavior, affect receiver suspicion and detection accuracy.

10. Receiver judgment of sender credibility is related to receiver truth biases, context interactivity, sender encoding skills and sender deviation from expected patterns.
11. Detection accuracy is related to receiver truth biases, context interactivity, sender encoding skills, informational and behavioral familiarity, receiver decoding skills and sender deviation from expected patterns.[11]

Interaction patterns

IDT describes receiver suspicion and sender reaction.

12. Receiver suspicion is displayed in a combination of strategic and nonstrategic behavior.
13. Senders perceive suspicion.
14. Suspicion, perceived or actual, increases senders' strategic and nonstrategic behavior.
15. Deception and suspicion displays change over time.
16. Reciprocity is the predominant interaction pattern between senders and receivers during interpersonal deception.[11]

Outcomes

IDT posits that interaction between sender and receiver influences how credible the receiver thinks the sender is and how suspicious the sender thinks the receiver is.

17. Receiver detection accuracy, bias, and judgments of sender credibility after an interaction are functions of receiver cognition (suspicion and truth bias), receiver decoding skill and final sender behavior.
18. Sender perceived deception success is a function of final sender cognition (perceived suspicion) and receiver behavior.[11]

Strategic and Non Strategic Linguistic Behavior

Strategic linguistic behavior: Information and image management is most relevant to language use during deception; there are three sub-strategies that can be used for this:

  1. Reticence (reserving or restraining)
    • Reticence is a very common way of creating deception; it is withholding truthful information, and/or reducing the amount of specificity in content details.
  2. Vagueness and Uncertainty
    • The message becomes evasive and ambiguous through language choices.
  3. Non-Immediacy
    • Reduces the degree of directness and intensity of the interaction between the communicator and the object or the event communicated about. This has the effect of distancing senders from their messages.[15]

Receiver's role

Although most people believe they can spot deception, IDT posits that they cannot. A deceiver must manage his or her verbal and nonverbal cues to ensure that what they are saying appears true. According to IDT, the more socially aware a receiver is, the better he or she is at detecting deceit. A key assumption of IDT which is different from other models of deception assumes that the receiver is active in and co-regulates the deceptive encounter. This is opposed to previous research on deception that has referred to receivers as being passive in the process."[16]

Humans have a predisposition to believe what they are told. This is referred to as a "truth bias."[17] In a common social agreement, people are honest with one another and believe that others will be honest with them. If a deceiver begins a deceptive exchange with an accurate statement, the statement may induce the receiver to believe the rest of the deceiver's story is also true. The sender prepares the receiver to accept his or her information as truth, even if some (or all) of the dialogue is false. If the sender repeats the same tactic, the receiver will become more aware that the sender is lying.[11]

When suspicion is aroused in the receiver, there are a variety of ways that this suspicion can be expressed. Buller and Burgoon (1996) emphasized that there is no uniform receiver style to express suspicion, but instead is expressed through a variety of ways that they had discovered in previous research.[11] According to Buller et al. (1991), receivers often utilize follow-up questions to question their deceivers if they begin to detect deception. Buller et al. found that this did not elicit as much suspicion as probes from nonsuspicious receivers.[18] Burgoon et al. (1995) found that some receivers engaged in a more dominant interview style to engage with their deceiver, which represents a more aggressive and "unpleasant" style of questioning that aroused suspicion on the part of the deceiver.[19]

Emotion

Emotion plays a central role in IDT as a motivation and result of deception. Emotion can motivate deception, with the sender relying on relevant knowledge (informational, relational and behavioral familiarity)[11] to achieve goals such as self-gratification, avoiding a negative emotional outcome or creating a negative emotional outcome for the target of deception. Emotion can be a result of deception, since a physical response occurs in the sender (usually arousal and negative affect).[9][20]

Leakage

The concept of leakage predates the development of IDT and was developed by Miron Zuckerman, et al., who created a four-factor model to explain when and why leakage is apt to occur.[20] Leakage in deception is manifested most overtly in nonverbal signals; studies indicate that over 90 percent of emotional meaning is communicated non-verbally. Humans are sensitive to body signals, and communication is often ambiguous; something is communicated verbally and its opposite non-verbally. Leakage occurs when nonverbal signals betray the true content of a contradictory verbal message. Facial expression is difficult to read, and the Facial Action Coding System (FACS) is a means of uncovering deception. Small facial movements, known as micro-expressions, can be detected in this system using action units.

Micro-expressions and action units

Action units (AUs) can be examined frame by frame, since these micro-expressions are often rapid. Paul Ekman’s research in facial deception has found several constants in certain expressions, with the action units relating to lip-corner pulling (AU12) and cheek-raising (AU6) qualifiers for happiness in most people. Brow-lowering (AU4) and lip-stretching (AU20) are disqualifiers for happiness. According to Ekman, emotional leakage appears in these fleeting expressions.

Ekman's research has received much attention in the popular media, but it also has been heavily criticized on both experimental and theoretical grounds. His theory that micro-expressions are effective markers for detecting deception is no longer considered to be well-supported. One criticism is that the theory "confounds emotion and deception",[1] like use of the polygraph[21] in assuming that an innocent person and a guilty one will feel different emotions in a situation which has severe possible outcomes. Concerns with such emotionally-based theories have led later researchers to develop theories based on cognition and cognitive processes.[1][22][23]

Facial expression

Seven basic emotions are communicated through facial expression: anger, fear, sadness, joy, disgust, surprise and contempt. These emotions are recognized universally. These expressions are innate or develop through socialization.

Cultures have a variety of rules governing the social use of facial expression; for example, the Japanese discourage the display of negative emotions. Individuals may find it difficult to control facial expression, and the face may "leak" information about how they feel.

Gaze

People use eye contact to indicate threat, intimacy and interest. Eye contact is used to regulate turn-taking in conversation, and indicates how interested the listener (receiver) is in what the speaker is saying. Receivers make eye contact about 70–75 percent of the time, with each contact averaging 7.8 seconds.

Gesture

Gestures are among the most culture-specific forms of nonverbal communication, and may lead to misinterpretation. Involuntary self-touching, such as touching the face, scratching, gripping the hands together or putting the hands in (or near) the mouth, occur when people experience intense emotions such as depression,[24] elation or extreme anxiety.

Ekman and Friesen demonstrated gesture leakage by showing films of a depressed woman to a group, which was asked to judge the woman's mood. Those shown only the woman's face thought she was happy and cheerful, while the group who saw only her body thought she was tense and disturbed.[9]

Touch

Touch can reassure and indicate understanding. Humans touch one another in sexual intimacy, affiliation and understanding; in greetings and farewells; as an act of aggression, and to demonstrate dominance. According to Argyle in 1996, there "appear to be definite rules which permit certain kinds of touch, between certain people, on certain occasions only. Bodily contact outside these narrow limits is unacceptable".[25]

Criticism

DePaulo, Ansfield and Bell questioned IDT: "We cannot find the 'why' question in Buller and Burgoon's synthesis. There is no intriguing riddle or puzzle that needs to be solved, and no central explanatory mechanism is ever described".[26] Em Griffin supported this criticism by pointing out a "good objective theory" must explain an event or human behavior which is much more significant than IDT in that it discusses "how" communication works in these scenarios, but not the "reason" why this communication theory works in these scenarios. [27] Although they praised Buller and Burgoon's 18 propositions as a comprehensive description of the timeline of deceptive interactions, they said the propositions lacked the interconnectedness and predictive power of a unifying theory. DePaulo et al. criticized IDT for failing to distinguish between interactive communication (which emphasizes the situational and contextual aspects of communicative exchanges) from interpersonal communication, which emphasizes exchanges in which the sender and receiver make psychological predictions about the other's behavior based on specific prior knowledge; this conceptual ambiguity limited IDT's explanatory power.[26][28] However, Buller and Burgoon responded to this type of critique, saying the theory "was not meant to advance a single explanatory mechanism but instead to fit a broad communicative perspective on the phenomenon and to include multiple causal mechanisms that fit a general interpersonal communication account of the process."[29]

Park and Levine provide additional commentary questioning IDT stating that "because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims."[30] In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.

Experiment

Buller and Burgoon asked participants to put themselves in the following situation: "You've been dating Pat for nearly three years and feel quite close in your relationship. Since Pat goes to a different school upstate, the two of you have agreed to date other people. Nevertheless, Pat is quite jealous and possessive. During the school year you see Pat only occasionally, but you call each other every Sunday and talk for over an hour. On Friday one of your friends invites you to a party on Saturday night, but the party is 'couples only' so you need a date. There's no way that Pat could come down for the weekend. You decide to ask someone from your class who you've been attracted to so that you can go to the party. The two of you go and have a great time. On Sunday afternoon, there's a knock on your door and it's Pat. Pat walks in and says, 'Decided to come down and surprise you, tried calling you all last night, but you weren't around. What were you doing?'".[31] The researchers listed three possible responses: lying ("I was at the library getting ready for my theory exam"), telling part of the truth while omitting important details ("Went to a party at a friend's apartment") or being intentionally vague or evasive ("Went out for a while")".[31] These three responses were categorized as falsification,concealment, and equivocation.[31] These three differ, respectively, in that one creates a fiction, hides a secret, and the last dodges the issue; all falling under the umbrella of deception as defined by Buller and Burgoon. [31]

Online dating

Research on the use of deception in online dating has shown that people are generally truthful about themselves with the exception of physical attributes to appear more attractive.[32] Most online deception is subtle with slight exaggerations, representing people's attempts to portray themselves in the best possible light.[32] Of all online contexts, online dating appears the most prone to deception. In general, no matter the setting, people are more likely to be deceptive when looking for a date than in other social situations.[33]

Research suggests that while slight misrepresentations on online dating sites are quite common, major deceptions are actually rare. It seems that those who engage in online dating realize that while they want to make the best possible impression, if they want to pursue an offline relationship, they can't begin it with outright falsehoods that will quickly be revealed.[34] One survey of over 5,000 users of online dating sites how likely they were to misrepresent themselves in areas such as appearance and job information.[35] The average rating on these items was a 2 on a 10-point scale, indicating a relatively low level of deception overall.

Some people are more prone to deceptive behavior online than others, such as those with high sensation-seeking tendencies, and those who show addictive behavior toward the Internet.[36] Conversely, those who are introverted or have high tendencies for social anxiety are especially likely to be honest about their personalities online, revealing hidden aspects of the self that they would not normally show to others offline.[37][38]

According to the Scientific American, "nine out of ten online daters will fib about their height, weight, or age" such that men were more likely to lie about height while women were more likely to lie about weight.[39] In addition, those high in the trait of self-monitoring are more likely to be dishonest on dating websites. In all aspects of their social lives, self-monitors are concerned with outward appearance and adapt their behavior to match the social situation. Thus, they also tend to be more deceptive in their attempts to attract dates both offline[33] and online.[35]

In a study conducted by Toma and Hancock, "less attractive people were found to be more likely to have chosen a profile picture in which they were significantly more attractive than they were in everyday life."[40] Both genders used this strategy in online dating profiles, but women more so than men.[40] Additionally, the researchers found that those deemed less attractive were more likely to express deception in the areas of physical attractiveness such as height and weight.

A qualitative study investigated deception in online dating. The study focused on four questions: (1) About what characteristics are online daters deceptive? (2) What motivation do online daters have for their deception of others in the online-dating environment? (3) What perceptions do online daters have about other daters' deceit towards them in the online-dating environment? (4) How does deception affect romantic relationships formed in the online-dating environment? In an online survey, data was collected from 15 open-ended questions. The study had 52 participants, ranging in age from 21 to 37, and found that most online daters consider themselves (and others) mostly honest in their online self-presentation. Online daters who used deception were motivated to do so by the desire to attract partners and project a positive self-image. Daters were willing to overlook deception in others if they viewed the dishonesty as a slight exaggeration or a characteristic of little value to the dater. Despite deception, participants believe that the online-dating environment can develop successful romantic relationships.[41]

See also

Notes

  1. ^ a b c d e Vrij, Aldert; Hartwig, Maria; Granhag, Pär Anders (4 January 2019). "Reading Lies: Nonverbal Communication and Deception". Annual Review of Psychology. 70 (1): 295–317. doi:10.1146/annurev-psych-010418-103135. ISSN 0066-4308. PMID 30609913. S2CID 58562467.
  2. ^ Infante D.A, Rancer A.S, Avtgis T.A (2010) Contemporary Communication Theory. 8. 241-246
  3. ^ Burgoon J.K, Buller D.B (1994). Interpersonal Deception:III.Effects of Deceit on Perceived Communication and Nonverbal Behavior Dynamics. Journal of Nonverbal Behavior 18(2)
  4. ^ Seigel, Jessica (25 March 2021). "The truth about lying". Knowable Magazine. doi:10.1146/knowable-032421-1. Retrieved 8 December 2021.
  5. ^ Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E. (2008). "Cognitive Biases and Nonverbal Cue Availability in Detecting Deception". Human Communication Research. 34 (4): 572–599. doi:10.1111/j.1468-2958.2008.00333.x. ISSN 1468-2958.
  6. ^ Bond, Charles F.; DePaulo, Bella M. (2006). "Accuracy of Deception Judgments". Personality and Social Psychology Review. 10 (3): 214–234. doi:10.1207/s15327957pspr1003_2. ISSN 1088-8683. PMID 16859438. S2CID 15248114.
  7. ^ a b DePaulo, Bella M.; Kashy, Deborah A.; Kirkendol, Susan E.; Wyer, Melissa M.; Epstein, Jennifer A. (1996). "Lying in everyday life". Journal of Personality and Social Psychology. 70 (5). American Psychological Association (APA): 979–995. doi:10.1037/0022-3514.70.5.979. ISSN 1939-1315. PMID 8656340.
  8. ^ Laura, Guerrero (2007). Close Encounters: Communication in Relationships (2nd ed.). Los Angeles, CA: Sage. ISBN 978-1506376721.
  9. ^ a b c Ekman, Paul; Friesen, Wallace V. (1969-02-01). "Nonverbal Leakage and Clues to Deception". Psychiatry. 32 (1): 88–106. doi:10.1080/00332747.1969.11023575. ISSN 0033-2747. PMID 27785970.
  10. ^ Ganis, Giorgio; Rosenfeld, J. Peter; Meixner, John; Kievit, Rogier A.; Schendan, Haline E. (2011-03-01). "Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging". NeuroImage. 55 (1): 312–319. doi:10.1016/j.neuroimage.2010.11.025. ISSN 1053-8119. PMID 21111834. S2CID 1100311.
  11. ^ a b c d e f g h i j k Buller & Burgoon 1996.
  12. ^ DePaulo, B.M., Zukerman, M., & Rosenthal, R. (1980, Spring). "Humans As Lie Detectors". Journal of Communication, 30 (2) 129–139.
  13. ^ Turner, Ronny E.; Edgley, Charles; Olmstead, Glen (1975). "Information control in conversations: Honesty is not always the best policy". The Kansas Journal of Sociology. 11 (1). Social Thought and Research: 69–89. ISSN 0022-8648. JSTOR 23255229.
  14. ^ "Communicative interaction". Managing Research Library.
  15. ^ Buller, David & Burgoon, Judee & Buslig, Aileen & Roiger, James. (2006). Testing Interpersonal Deception Theory: The Language of Interpersonal Deception. Communication Theory. 6. 268 - 289. 10.1111/j.1468-2885.1996.tb00129.x.
  16. ^ Infante D.A, Rancer A.S, Avtgis T.A (2010). Contemporary Communication Theory
  17. ^ McCornack, S.A. & Parks, M.R. (1986). Deception Detection and Relationship Development: The Other Side of Trust. In M. L. McLaughlin (Ed.) Communication Yearbook (Vol. 9 pp. 377–389). Beverly Hills, CA: Sage.
  18. ^ Buller, David B.; Strzyzewski, Krystyna D.; Comstock, Jamie (1991). "Interpersonal deception: I. Deceivers' reactions to receivers' suspicions and probing". Communication Monographs. 58 (1). Informa UK Limited: 1–24. doi:10.1080/03637759109376211. ISSN 0363-7751.
  19. ^ Burgoon, J.K.; Buller, D.B.; Dillman, L.; Walther, J.B. (1995). "Interpersonal Deception". Human Communication Research. 22 (2). Oxford University Press (OUP): 163–196. doi:10.1111/j.1468-2958.1995.tb00365.x. ISSN 0360-3989.
  20. ^ a b B. M. DePaulo, M. Zuckerman, & R. Rosenthal (1981). Advances in Experimental Social Psychology. In L. Berkowitz (Ed.) Verbal and Nonverbal Communication of Deception (Vol 14, pp. 1–59). New York: Academic Press.
  21. ^ Nat. Res. Counc. (2003). The Polygraph and Lie Detection. Washington, DC: Nat. Acad. Press.
  22. ^ Gelitz, Christiane (February 9, 2021). "Humans Are Pretty Lousy Lie Detectors". Scientific American. Retrieved 8 December 2021.
  23. ^ Hartwig, Maria (November 26, 2014). "Telling Lies: Fact, Fiction, and Nonsense". Psychology Today. Retrieved 8 December 2021.
  24. ^ "Your Guide to Depression: Symptoms, Treatments, and How to Help". Psych Central. 22 February 2021.
  25. ^ Argyle 1996.
  26. ^ a b DePaulo, Ansfield & Bell 1996.
  27. ^ Griffin, Em (2012). "3". A First Look At Communication Theory Eighth Edition (8th ed.). McGraw-Hill. ISBN 978-0073534305.
  28. ^ See also Stiff 1996
  29. ^ Burgoon, Judee & Buller, David. (2020). Interpersonal Deception Theory.
  30. ^ Park, Hee Sun; Levine, Timothy R. (2015). "Base Rates, Deception Detection, and Deception Theory: A Reply to Burgoon (2015)". Human Communication Research. 41 (3): 350–366. doi:10.1111/hcre.12066. ISSN 1468-2958. S2CID 145727128.
  31. ^ a b c d Griffin, Em (2016). "7". A First Look At Communication Theory Sixth Edition (6th ed.). McGraw-Hill. ISBN 978-0073215808.
  32. ^ a b Zimbler, Mattitiyahu; Feldman, Robert S. (2011). "Liar, Liar, Hard Drive on Fire: How Media Context Affects Lying Behavior". Journal of Applied Social Psychology. 41 (10): 2492–2507. doi:10.1111/j.1559-1816.2011.00827.x. ISSN 1559-1816. S2CID 143240248.
  33. ^ a b Rowatt, Wade C.; Cunningham, Michael R.; Druen, Perri B. (1999-04-01). "Lying to Get a Date: The Effect of Facial Physical Attractiveness on the Willingness to Deceive Prospective Dating Partners". Journal of Social and Personal Relationships. 16 (2): 209–223. doi:10.1177/0265407599162005. ISSN 0265-4075. S2CID 145122084.
  34. ^ Toma, Catalina L.; Hancock, Jeffrey T.; Ellison, Nicole B. (2008-08-01). "Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles". Personality and Social Psychology Bulletin. 34 (8): 1023–1036. doi:10.1177/0146167208318067. ISSN 0146-1672. PMID 18593866. S2CID 9528122.
  35. ^ a b Hall, Jeffrey A.; Park, Namkee; Song, Hayeon; Cody, Michael J. (2010-02-01). "Strategic misrepresentation in online dating: The effects of gender, self-monitoring, and personality traits". Journal of Social and Personal Relationships. 27 (1): 117–135. doi:10.1177/0265407509349633. hdl:11244/25040. ISSN 0265-4075. S2CID 145668250.
  36. ^ Lu, Hung-Yi (2008-04-01). "Sensation-Seeking, Internet Dependency, and Online Interpersonal Deception". CyberPsychology & Behavior. 11 (2): 227–231. doi:10.1089/cpb.2007.0053. ISSN 1094-9313. PMID 18422419.
  37. ^ Amichai-Hamburger, Yair; Wainapel, Galit; Fox, Shaul (April 2002). "'On the Internet no one knows I'm an introvert': extroversion, neuroticism, and Internet interaction". Cyberpsychology & Behavior. 5 (2): 125–128. doi:10.1089/109493102753770507. ISSN 1094-9313. PMID 12025878. S2CID 13585870.
  38. ^ McKenna, Katelyn Y. A.; Green, Amie S.; Gleason, Marci E. J. (2002). "Relationship Formation on the Internet: What's the Big Attraction?". Journal of Social Issues. 58 (1): 9–31. doi:10.1111/1540-4560.00246. ISSN 1540-4560. S2CID 12086933.
  39. ^ Epstein, Robert (2007). "The Truth about Online Dating". Scientific American Mind. 18: 28–35. doi:10.1038/scientificamericanmind0207-28. Retrieved 2019-09-29.
  40. ^ a b Hancock, Jeffrey; Toma, Catalina; Ellison, Nicole (2007-01-01). "The truth about lying in online dating profiles". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems – CHI '07. pp. 449–452. doi:10.1145/1240624.1240697. ISBN 978-1595935939. S2CID 207162937.
  41. ^ Wagner, Lyndsey. Interpersonal Relationships and Online Dating (Master's thesis). Liberty University. Retrieved July 23, 2015.

References

  • Argyle, M. (1996). Bodily Communication. London: Routledge. p. 121.
  • Axtell R. (1998). Gestures. John Wiley, New York.
  • Buller, D.B.; Burgoon, J.K. (August 1996). "Interpersonal Deception Theory". Communication Theory. 6 (3): 203–242. doi:10.1111/j.1468-2885.1996.tb00127.x. S2CID 146464264.
  • Burgoon, Buller, White, Afifi, and Buslig (1999). Personality and Social Psychology Bulletin, Vol. 25, No. 6, 669–686.[full citation needed]
  • Burgoon, J.K. and T. Qin (2006). "The Dynamic Nature of Deceptive Verbal Communication". Journal of Language and Social Psychology, 25(1): 76–96.
  • DePaulo, B.M.; Ansfield, M.E.; Bell, K.L. (1996). "Theories About Deception and Paradigms for Studying It: A Critical Appraisal of Buller and Burgoon's Interpersonal Deception Theory and Research". Communication Theory. 6 (3): 297–310. doi:10.1111/j.1468-2885.1996.tb00131.x.
  • Finlay, L. (2001). Groupwork in Occupational Therapy. Nelson Thornes, Cheltenham: 43.
  • Kleck, R. and W. Nuessle (1968). Congruence between the indicative and communicative functions of eye contact. British Journal of Social and Clinical Psychology (7): 107–14.
  • O'Sullivan, M. (2003). "The Fundamental Attribution Error in Detecting Deception: The Boy-Who-Cried-Wolf Effect". Pers Soc Psychol Bull, 29(10): 1316–1327.
  • Stiff, J.B. (1996). "Theoretical Approaches to the Study of Deceptive Communication: Comments on Interpersonal Deception Theory". Communication Theory. 6 (3). Oxford University Press: 289–296. doi:10.1111/j.1468-2885.1996.tb00130.x. ISSN 1050-3293.
  • Wainwright, G. (2003). Body Language. Hodder, London.
  • Williams, D. (1997). Communication Skills in Practice: A Practical Guide for Health Professionals. Jessica Kingsley, London: 12.