slides - Courses

Download Report

Transcript slides - Courses

Computer-Mediated
Communication
Deceptions of Face and Time
Coye Cheshire & Jen King
//
September 2016
Do we use language differently
when we lie in text-based CMC?
 In asynchronous, text-based interaction:
Liars used more words, were more
expressive, non-immediate and informal,
and made more typos (Zhou et al. 2004).
 Similar findings in synchronous IM
interaction:
More words and fewer self-references
 Those lied to also IMed differently, even
when they didn’t realize the deceit:
Shorter sentences, more questions.
Zhou, Lina, et al. "Automating linguistics-based cues for detecting deception in text-based asynchronous
computer-mediated communications." Group decision and negotiation 13.1 (2004): 81-106.
4/5/2017
Cheshire & King — Computer-Mediated Communication
1
Detecting deception in CMC
 Most people (even trained professionals,
like police officers) detect deception at no
better than a chance rate.
 Some reliable markers of lying: Illustrative and
other body movements, higher pitch,
microexpressions.
 People highly motivated to lie may be easier to
detect (i.e., trying harder may give you away)
— “motivation impairment effect”
Hancock, Jeffrey T., et al. "Automated linguistic analysis of deceptive and truthful synchronous computermediated communication." System Sciences, 2005. HICSS'05. Proceedings of the 38th Annual Hawaii
International Conference on. IEEE, 2005.
4/5/2017
Cheshire & King — Computer-Mediated Communication
2
http://blogs.scientificamerican.com/anthropology-inpractice/catfishing-the-truth-about-deception-online/
4/5/2017
Cheshire & King — Computer-Mediated Communication
3
4/5/2017
Cheshire & King — Computer-Mediated Communication
4
For Example: Deception, Norms
and Perception in Photos
 Loi Sessions Goulet’s study of
MySpace photos (2009)
 Users who post these
photographs are conforming to
a social trend at the expense of
their individuality
 The presentation of these
photographs is narcissistic
 These photographs purposefully
conceal the body
4/5/2017
The classic “MySpace Angle” pose…
Cheshire & King — Computer-Mediated Communication
5
It is very common for people I know to take time out of their
day or at a special event for which they are already dressed
up, to take dozens of high-quality photographs of themselves
with nice backgrounds, in hopes that one of them will be
"Facebook profile picture worthy." …all of these pictures do
intend on displaying the person in their most attractive light, so
the concept of narcissism is still present. Just the fact that
many of us do it to see how many "likes" we can get speaks
enough about that aspect. – Aamna Khan
I think the fact that the pictures are still of the individuals
themselves makes this practice furthers the point that this practice
is not deceptive. If we call this deception, we must consider that we
are also calling certain real life behaviors deceptive as well--wearing
make up is then deceptive, wearing loose clothing is then
deceptive. I disagree with this notion. – Anushee Sondi
This seems like a real limitation of the profile picture, the inability to
selectively disclose yourself like you could your political affiliation or
religion. I wonder if there could ever be a way of making one's visual
appearance online acceptably ambiguous, without having to go to the
full extent of replacing your features in high-definition like in Infinite
Jest. – Andrew Head
4/5/2017
Cheshire & King — Computer-Mediated Communication
6
Elements of a Profile
4/5/2017
Cheshire & King — Computer-Mediated Communication
7
Strategic vs. authentic
vs. aspirational
self-presentation
Anticipated future interaction?
Actual self vs. ideal self?
“Balancing accuracy and desirability”
4/5/2017
Cheshire & King — Computer-Mediated Communication
8
Some Participant Quotes from Nicole Ellison’s
Online Dating Research:
 “In their profile they write about their dreams as if
they are reality.”
 “I’ve never known so many incredibly athletic
women in my life!”
 “I checked my profile and I had lied a little bit
about the pounds, so I thought I had better start
losing some weight so that it would be more
honest.”
Ellison, N., Heino, R. and Gibbs, J. (2006), Managing Impressions Online: SelfPresentation Processes in the Online Dating Environment. Journal of ComputerMediated Communication, 11: 415–441.
4/5/2017
Cheshire & King — Computer-Mediated Communication
9
Forming impressions in online dating profiles
 “Cognitive misers”: Making the most of
limited cues
 Social Information Processing (SIP)
(Walther)
 Reciprocal re-use of what
they notice in others (refinement based on
emergent norms)
4/5/2017
Cheshire & King — Computer-Mediated Communication
10
Virtue in vagueness: Norah Jones
The persona in her songs — let’s not call it Ms. Jones
herself, because her life couldn't be this dull — might
have lived practically anywhere in the developed world,
at any time during the last century. Somehow Ms.
Jones’s work has managed to make a virtue of
vagueness.
— The New York Times, Feb. 8, 2004,
via Norton, Frost, & Ariely (2007)
Norton MI, Frost JH, Ariely D. Less is more: the lure of ambiguity,
or why familiarity breeds contempt. Journal of Personality and
Social Psychology 2007 Jan;92(1):97-105.
4/5/2017
Cheshire & King — Computer-Mediated Communication
11
Vagueness…or Deception?
Observed
Self-Presentation
Profile-based
Self-Presentation
In lab measure:
•Height
•Weight
•Age
•Income
•Photograph
Cross-Validation
Hancock, Jeffrey T., Catalina Toma, and Nicole Ellison. "The truth about lying in online dating profiles."
Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2007.
4/5/2017
Cheshire & King — Computer-Mediated Communication
12
Deception?
(Hancock et al. 2007)
4/5/2017
Cheshire & King — Computer-Mediated Communication
13
Deception?
(Hancock et al. 2007)
4/5/2017
Cheshire & King — Computer-Mediated Communication
14
Deception?
(Hancock et al. 2007)
4/5/2017
Cheshire & King — Computer-Mediated Communication
15
Managing Social Information,
and Information Control

Its not just about online dating…online
interaction often involves information
control to manage our presentation of
self for different people in different
contexts (e.g., who you want to see or
not see specific photos of you online,
whether you want to connect your
online commentary with your real
name, etc).

Again, we see this link between selfpresentation of self, power of
ambiguity, and importance of our
perception of the audience.
4/5/2017
Cheshire & King — Computer-Mediated Communication
16
Deceptions of Time…
4/5/2017
Cheshire & King — Computer-Mediated Communication
17
“Interpersonal Awareness Narratives”
 Ambiguity of send/receive in
asynchronous messaging.
 Whereas IM supports ongoing
conversation, SMS should be more
concerned with arranging future
social interactions.
 Many feel ‘compelled to respond’ –
tendency to preserve relationship
from response failures.
4/5/2017
Cheshire & King — Computer-Mediated Communication
18
“On My Way” Birnholtz et al. 2010
 Sample: 194 students, 18-20, ~5
years of SMS experience
 Recorded and rated their own last
30 SMS outbox messages as
deceptive or not (along with other
info about the message
 Deceptive messages were then
coded by the researchers as butler
lies or just jocular
http://www.wikihow.com/Know-if-Someone-Is-Lying-in-a-Text
 Butler lies were further coded as
either entry, exit, or arranging
communication.
4/5/2017
Cheshire & King — Computer-Mediated Communication
19
Results…
 3 out of 100 messages
was a butler lie.
 30% of all the coded lies
were butler lies.
 81.5% involve arranging
social interaction
 12.14% entering
communication
 6.36% exiting
communication
4/5/2017
Cheshire & King — Computer-Mediated Communication
20
Qualitative Assessments of
Butler Lies
 Temporal Ambiguity
“sorry sorry I just
saw ur txt!”
 Activity Ambiguity
“I’m eating now.
Can I call u later?”
 Location Ambiguity
“almost there! lol”
4/5/2017
Cheshire & King — Computer-Mediated Communication
21
Do we value knowing when people read our messages
more, or do we value the ability to take advantage of
ambiguity more? In the past, I've used extensions like
Facebook Unseen so I can read a Facebook message
without feeling the pressure to come up with quick
decisions and make sound responses.
"the absence of information then becomes a source of
information itself." …do we want to control what
information is visible at risk of appearing that we are
telling butler lies or similar fabrications, or are we okay
with a constant default setting that decides for us what
information is visible? – Riyana Basu
4/5/2017
Cheshire & King — Computer-Mediated Communication
22