1 / 23

Computer-Mediated Communication

Computer-Mediated Communication. Deceptions of Face and Time. September 2016. Do we use language differently when we lie in text-based CMC?.

donaldclark
Download Presentation

Computer-Mediated Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer-Mediated Communication Deceptions of Face and Time September 2016

  2. Do we use language differently when we lie in text-based CMC? • In asynchronous, text-based interaction:Liars used more words, were more expressive, non-immediate and informal, and made more typos (Zhou et al. 2004). • Similar findings in synchronous IM interaction: More words and fewer self-references • Those lied toalso IMed differently, even when they didn’t realize the deceit: Shorter sentences, more questions. Zhou, Lina, et al. "Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications." Group decision and negotiation 13.1 (2004): 81-106. Cheshire & King — Computer-Mediated Communication

  3. Detecting deception in CMC • Most people (even trained professionals, like police officers) detect deception at no better than a chance rate. • Some reliable markers of lying: Illustrative and other body movements, higher pitch, microexpressions. • People highly motivated to lie may be easier to detect (i.e., trying harder may give you away) — “motivation impairment effect” Hancock, Jeffrey T., et al. "Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication." System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii International Conference on. IEEE, 2005. Cheshire & King — Computer-Mediated Communication

  4. http://blogs.scientificamerican.com/anthropology-in-practice/catfishing-the-truth-about-deception-online/http://blogs.scientificamerican.com/anthropology-in-practice/catfishing-the-truth-about-deception-online/ Cheshire & King — Computer-Mediated Communication

  5. Cheshire & King — Computer-Mediated Communication

  6. For Example: Deception, Norms and Perception in Photos • Loi Sessions Goulet’s study of MySpace photos (2009) • Users who post these photographs are conforming to a social trend at the expense of their individuality • The presentation of these photographs is narcissistic • These photographs purposefully conceal the body The classic “MySpace Angle”pose… Cheshire & King — Computer-Mediated Communication

  7. It is very common for people I know to take time out of their day or at a special event for which they are already dressed up, to take dozens of high-quality photographs of themselves with nice backgrounds, in hopes that one of them will be "Facebook profile picture worthy." …all of these pictures do intend on displaying the person in their most attractive light, so the concept of narcissism is still present. Just the fact that many of us do it to see how many "likes" we can get speaks enough about that aspect. – Aamna Khan I think the fact that the pictures are still of the individuals themselves makes this practice furthers the point that this practice is not deceptive. If we call this deception, we must consider that we are also calling certain real life behaviors deceptive as well--wearing make up is then deceptive, wearing loose clothing is then deceptive. I disagree with this notion. – Anushee Sondi This seems like a real limitation of the profile picture, the inability to selectively disclose yourself like you could your political affiliation or religion. I wonder if there could ever be a way of making one's visual appearance online acceptably ambiguous, without having to go to the full extent of replacing your features in high-definition like in Infinite Jest. – Andrew Head Cheshire & King — Computer-Mediated Communication

  8. Elements of a Profile Cheshire & King — Computer-Mediated Communication

  9. Strategic vs. authentic vs. aspirationalself-presentation Anticipated future interaction? Actual self vs. ideal self? “Balancing accuracy and desirability” Cheshire & King — Computer-Mediated Communication

  10. Some Participant Quotes from Nicole Ellison’s Online Dating Research: • “In their profile they write about their dreams as if they are reality.” • “I’ve never known so many incredibly athletic women in my life!” • “I checked my profile and I had lied a little bit about the pounds, so I thought I had better start losing some weight so that it would be more honest.” Ellison, N., Heino, R. and Gibbs, J. (2006), Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication, 11: 415–441. Cheshire & King — Computer-Mediated Communication

  11. Forming impressions in online dating profiles • “Cognitive misers”: Making the most of limited cues • Social Information Processing (SIP) (Walther) • Reciprocal re-use of whatthey notice in others (refinement based on emergent norms) Cheshire & King — Computer-Mediated Communication

  12. Virtue in vagueness: Norah Jones The persona in her songs — let’s not call it Ms. Jones herself, because her life couldn't be this dull — might have lived practically anywhere in the developed world, at any time during the last century. Somehow Ms. Jones’s work has managed to make a virtue of vagueness. — The New York Times, Feb. 8, 2004, via Norton, Frost, & Ariely (2007) Norton MI, Frost JH, Ariely D. Less is more: the lure of ambiguity, or why familiarity breeds contempt. Journal of Personality and Social Psychology 2007 Jan;92(1):97-105. Cheshire & King — Computer-Mediated Communication

  13. Vagueness…or Deception? Observed Self-Presentation Profile-based Self-Presentation • In lab measure: • Height • Weight • Age • Income • Photograph Cross-Validation Hancock, Jeffrey T., Catalina Toma, and Nicole Ellison. "The truth about lying in online dating profiles." Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2007. Cheshire & King — Computer-Mediated Communication

  14. Deception? (Hancock et al. 2007) Cheshire & King — Computer-Mediated Communication

  15. Deception? (Hancock et al. 2007) Cheshire & King — Computer-Mediated Communication

  16. Deception? (Hancock et al. 2007) Cheshire & King — Computer-Mediated Communication

  17. Managing Social Information, and Information Control • Its not just about online dating…online interaction often involves information control to manage our presentation of self for different people in different contexts (e.g., who you want to see or not see specific photos of you online, whether you want to connect your online commentary with your real name, etc). • Again, we see this link between self-presentation of self, power of ambiguity, and importance of our perception of the audience. Cheshire & King — Computer-Mediated Communication

  18. Deceptions of Time… Cheshire & King — Computer-Mediated Communication

  19. “Interpersonal Awareness Narratives” • Ambiguity of send/receive in asynchronous messaging. • Whereas IM supports ongoing conversation, SMS should be more concerned with arranging future social interactions. • Many feel ‘compelled to respond’ – tendency to preserve relationship from response failures. Cheshire & King — Computer-Mediated Communication

  20. “On My Way” Birnholtz et al. 2010 • Sample: 194 students, 18-20, ~5 years of SMS experience • Recorded and rated their own last 30 SMS outbox messages as deceptive or not (along with other info about the message • Deceptive messages were then coded by the researchers as butler lies or just jocular • Butler lies were further coded as either entry, exit, or arranging communication. http://www.wikihow.com/Know-if-Someone-Is-Lying-in-a-Text Cheshire & King — Computer-Mediated Communication

  21. Results… • 3 out of 100 messages was a butler lie. • 30% of all the coded lies were butler lies. • 81.5% involve arranging social interaction • 12.14% entering communication • 6.36% exiting communication Cheshire & King — Computer-Mediated Communication

  22. Qualitative Assessments of Butler Lies • Temporal Ambiguity • Activity Ambiguity • Location Ambiguity “sorry sorry I just saw ur txt!” “I’m eating now. Can I call u later?” “almost there! lol” Cheshire & King — Computer-Mediated Communication

  23. Do we value knowing when people read our messages more, or do we value the ability to take advantage of ambiguity more? In the past, I've used extensions like Facebook Unseen so I can read a Facebook message without feeling the pressure to come up with quick decisions and make sound responses. "the absence of information then becomes a source of information itself." …do we want to control what information is visible at risk of appearing that we are telling butler lies or similar fabrications, or are we okay with a constant default setting that decides for us what information is visible? – Riyana Basu Cheshire & King — Computer-Mediated Communication

More Related