Post on 21-Dec-2015
Digital Deception
“intentional control of information in a technologically mediated message to create a false belief in the receiver of the message.”
1)Intention
2)Purpose to Mislead
04/18/23 Computer-Mediated Communication 2
Types of Digital Deception
Identity-Based Stems from false manipulation of person or
organization
Message-Based Takes place in communication between
dyads or larger groups
04/18/23 Computer-Mediated Communication 3
Identity Theory (Sociology)
Identity Theory (i.e., Stryker 1980)
Individuals have “role identities”: character and the role an individual devises as an occupant of a particular social position. ‘Self’ is hierarchical ordering of identities by salience. The greater the commitment on an identity, the greater the salience of the identity. Salience of identity influences behavioral choices in a situation.
04/18/23 5Computer-Mediated Communication
Social Identity Theory (Psychology)
Social Identity Theory (i.e., Tajfel, et al 1981; Turner 1985)
How group membership and “belongingness” have consequences for interpersonal and intergroup relations. As one looks for a positive sense of self, they compare their group with other groups and tend to create a favorable distinction for their own group
04/18/23 Computer-Mediated Communication
Photo: Courtesy of movie, “Dazed and Confused”
7
Information Signaling
Deception and Identity
(Donath 1999) argues that in some cases, deception is very difficult because we have assessment signals
Assessment signals: cost is directly related to the ‘advertised trait’
Conventional signals, however, are open to deception
Computer-Mediated Communication04/18/23 9
Expression and Interpretation
04/18/23 Computer-Mediated Communication
Recall: Donath (1999) ties the both voice and language to Erving Goffman’s concepts of “expressions given” and “expressions given off”:
10
04/18/23 Computer-Mediated Communication 11
Finally, after reading all the articles, Chuck Norris wonders about selective deception, cases where one tries to deceive a majority while conveying a message that is only understood by a few (somewhat like an inside joke). Is this sphere documented/researched at all or would it be too challenging? Chuck Norris expects there to be something in this sphere, such as analyzing Osama Bin Laden's videotapes for messages before releasing it on nationalized television.
Deception, Norms and Perception
Users who post these photographs are conforming to a social trend at the expense of their individuality
The presentation of these photographs is narcissistic
These photographs purposefully conceal the body
04/18/23 Computer-Mediated Communication 13
04/18/23 Computer-Mediated Communication 14
One thing that came up for me but wasn't really addressed in the article was the gender dynamics that are at play in this kind of situation. Sessions indicates early on that most of the pictures being policed for MySpace Angles are of women, and most of the policing (particularly that which falls into the category of "criticism") is being done by men. She takes for granted that men police because they are primarily concerned with physical attractiveness in women, whereas women engage in mocking their own because (i.e. jealousy). This seemed to me to be kind of a superficial take on the interplay of (heterosexual) sexual/romantic relationships and patriarchy going on here.
-Hannah S.
Media Richness and Media Choice Revisited
Media ‘richness’ is only a singular dimension that may mask the complexity of choice, behavior and inference of purpose.
04/18/23 Computer-Mediated Communication 18
Image: Time Barrow Dissertation Research, http://blog.timebarrow.com/2009/09/media-richness-theory/
Other Dimensions:
Synchronicity
Recordability
Distribution of Speaker/Listener
04/18/23 Computer-Mediated Communication 19