Download presentation
0
Computer-Mediated Communication
Deception…Part uno.
1
Computer-Mediated Communication
Digital Deception “intentional control of information in a technologically mediated message to create a false belief in the receiver of the message.” Intention Purpose to Mislead 4/17/2017 Computer-Mediated Communication
2
Types of Digital Deception
Identity-Based Stems from false manipulation of person or organization Message-Based Takes place in communication between dyads or larger groups 4/17/2017 Computer-Mediated Communication
3
Identity…ambiguity vs. deception
4/17/2017 Computer-Mediated Communication
4
Identity Theory (Sociology)
Identity Theory (i.e., Stryker 1980) Individuals have “role identities”: character and the role an individual devises as an occupant of a particular social position. ‘Self’ is hierarchical ordering of identities by salience. The greater the commitment on an identity, the greater the salience of the identity. Salience of identity influences behavioral choices in a situation. Identity Theory is from Sociology: consider female voter example Social Identity Theory is from Psychology: consider sports identification example, in-group/out-groups Minimal Group Studies: just being in a group can have relatively profound effects. We tend to attribute out-group success to ‘luck’ and in-group success to innate qualities (fundamental attribution error) 4/17/2017 Computer-Mediated Communication
5
When and Where Do You “Activate” Your Identity?
4/17/2017 Computer-Mediated Communication
6
Social Identity Theory (Psychology)
Social Identity Theory (i.e., Tajfel, et al 1981; Turner 1985) How group membership and “belongingness” have consequences for interpersonal and intergroup relations. As one looks for a positive sense of self, they compare their group with other groups and tend to create a favorable distinction for their own group Photo: Courtesy of movie, “Dazed and Confused” 4/17/2017 Computer-Mediated Communication
7
“Minimal Group” Paradigm
4/17/2017 Computer-Mediated Communication
8
Information Signaling
Deception and Identity (Donath 1999) argues that in some cases, deception is very difficult because we have assessment signals Assessment signals: cost is directly related to the ‘advertised trait’ Conventional signals, however, are open to deception 4/17/2017 Computer-Mediated Communication
9
Expression and Interpretation
Recall: Donath (1999) ties the both voice and language to Erving Goffman’s concepts of “expressions given” and “expressions given off”: 4/17/2017 Computer-Mediated Communication
10
Computer-Mediated Communication
Finally, after reading all the articles, Chuck Norris wonders about selective deception, cases where one tries to deceive a majority while conveying a message that is only understood by a few (somewhat like an inside joke). Is this sphere documented/researched at all or would it be too challenging? Chuck Norris expects there to be something in this sphere, such as analyzing Osama Bin Laden's videotapes for messages before releasing it on nationalized television. Good point here: Chuck Norris sees the meta-message where average humans do not. 4/17/2017 Computer-Mediated Communication
11
Computer-Mediated Communication
4/17/2017 Computer-Mediated Communication
12
Deception, Norms and Perception
Users who post these photographs are conforming to a social trend at the expense of their individuality The presentation of these photographs is narcissistic These photographs purposefully conceal the body 4/17/2017 Computer-Mediated Communication
13
Computer-Mediated Communication
One thing that came up for me but wasn't really addressed in the article was the gender dynamics that are at play in this kind of situation. Sessions indicates early on that most of the pictures being policed for MySpace Angles are of women, and most of the policing (particularly that which falls into the category of "criticism") is being done by men. She takes for granted that men police because they are primarily concerned with physical attractiveness in women, whereas women engage in mocking their own because (i.e. jealousy). This seemed to me to be kind of a superficial take on the interplay of (heterosexual) sexual/romantic relationships and patriarchy going on here. -Hannah S. 4/17/2017 Computer-Mediated Communication
14
The Deception in the Message…
4/17/2017 Computer-Mediated Communication
15
How is deception different online and offline?
Almost everything is a conventional signal online. Giving vs. giving off — time, complete channel control. You can give off almost nothing. What are some examples of things you might give off in a text-only chat room? 4/17/2017 Computer-Mediated Communication
16
Computer-Mediated Communication
4/17/2017 Computer-Mediated Communication
17
Media Richness and Media Choice Revisited
Media ‘richness’ is only a singular dimension that may mask the complexity of choice, behavior and inference of purpose. Image: Time Barrow Dissertation Research, 4/17/2017 Computer-Mediated Communication
18
Computer-Mediated Communication
Other Dimensions: Synchronicity Recordability Distribution of Speaker/Listener Synchronous implies more lies…why? Recordable implies less lies Distribution (co-presence) may reduce *some* types of deception 4/17/2017 Computer-Mediated Communication
19
Detecting Digital Deception
Again, complex problem with no single dimension that makes a clear and consistent prediction Image: Time Barrow Dissertation Research, 4/17/2017 Computer-Mediated Communication
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.