Top Banner
Coye Cheshire March 27, 2022 // Computer-Mediated Communication Deception…Part uno.
20

Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Coye Cheshire April 18, 2023//

Computer-Mediated Communication

Deception…Part uno.

Page 2: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Digital Deception

“intentional control of information in a technologically mediated message to create a false belief in the receiver of the message.”

1)Intention

2)Purpose to Mislead

04/18/23 Computer-Mediated Communication 2

Page 3: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Types of Digital Deception

Identity-Based Stems from false manipulation of person or

organization

Message-Based Takes place in communication between

dyads or larger groups

04/18/23 Computer-Mediated Communication 3

Page 4: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Identity…ambiguity vs. deception

Computer-Mediated Communication04/18/23 4

Page 5: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Identity Theory (Sociology)

Identity Theory (i.e., Stryker 1980)

Individuals have “role identities”: character and the role an individual devises as an occupant of a particular social position. ‘Self’ is hierarchical ordering of identities by salience. The greater the commitment on an identity, the greater the salience of the identity. Salience of identity influences behavioral choices in a situation.

04/18/23 5Computer-Mediated Communication

Page 6: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

When and Where Do You “Activate” Your Identity?

04/18/23 6Computer-Mediated Communication

Page 7: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Social Identity Theory (Psychology)

Social Identity Theory (i.e., Tajfel, et al 1981; Turner 1985)

How group membership and “belongingness” have consequences for interpersonal and intergroup relations. As one looks for a positive sense of self, they compare their group with other groups and tend to create a favorable distinction for their own group

04/18/23 Computer-Mediated Communication

Photo: Courtesy of movie, “Dazed and Confused”

7

Page 8: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

“Minimal Group” Paradigm

04/18/23 Computer-Mediated Communication 8

Page 9: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Information Signaling

Deception and Identity

(Donath 1999) argues that in some cases, deception is very difficult because we have assessment signals

Assessment signals: cost is directly related to the ‘advertised trait’

Conventional signals, however, are open to deception

Computer-Mediated Communication04/18/23 9

Page 10: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Expression and Interpretation

04/18/23 Computer-Mediated Communication

Recall: Donath (1999) ties the both voice and language to Erving Goffman’s concepts of “expressions given” and “expressions given off”:

10

Page 11: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

04/18/23 Computer-Mediated Communication 11

Finally, after reading all the articles, Chuck Norris wonders about selective deception, cases where one tries to deceive a majority while conveying a message that is only understood by a few (somewhat like an inside joke). Is this sphere documented/researched at all or would it be too challenging? Chuck Norris expects there to be something in this sphere, such as analyzing Osama Bin Laden's videotapes for messages before releasing it on nationalized television.

Page 12: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

04/18/23 Computer-Mediated Communication 12

Page 13: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Deception, Norms and Perception

Users who post these photographs are conforming to a social trend at the expense of their individuality

The presentation of these photographs is narcissistic

These photographs purposefully conceal the body

04/18/23 Computer-Mediated Communication 13

Page 14: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

04/18/23 Computer-Mediated Communication 14

One thing that came up for me but wasn't really addressed in the article was the gender dynamics that are at play in this kind of situation. Sessions indicates early on that most of the pictures being policed for MySpace Angles are of women, and most of the policing (particularly that which falls into the category of "criticism") is being done by men. She takes for granted that men police because they are primarily concerned with physical attractiveness in women, whereas women engage in mocking their own because (i.e. jealousy). This seemed to me to be kind of a superficial take on the interplay of (heterosexual) sexual/romantic relationships and patriarchy going on here.

-Hannah S.

Page 15: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

The Deception in the Message…

04/18/23 Computer-Mediated Communication 15

Page 16: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

How is deception different online and offline?

04/18/23 16Computer-Mediated Communication

Page 17: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

04/18/23 Computer-Mediated Communication 17

Page 18: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Media Richness and Media Choice Revisited

Media ‘richness’ is only a singular dimension that may mask the complexity of choice, behavior and inference of purpose.

04/18/23 Computer-Mediated Communication 18

Image: Time Barrow Dissertation Research, http://blog.timebarrow.com/2009/09/media-richness-theory/

Page 19: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Other Dimensions:

Synchronicity

Recordability

Distribution of Speaker/Listener

04/18/23 Computer-Mediated Communication 19

Page 20: Coye Cheshire June 23, 2015 // Computer-Mediated Communication Deception…Part uno.

Detecting Digital Deception

Again, complex problem with no single dimension that makes a clear and consistent prediction

04/18/23 Computer-Mediated Communication 20

Image: Time Barrow Dissertation Research, http://blog.timebarrow.com/2009/09/media-richness-theory/