170
Views
92
CrossRef citations to date
0
Altmetric
Original Articles

Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages

, , , &
Pages 50-69 | Published online: 02 Jun 2009
 

Abstract

Interpersonal Deception Theory (IDT) proposes that among the strategies deceivers use to create credible messages is information management. Delineated here are five fundamental dimensions along which verbal content and style can be altered to manage information: (1) completeness (informational and conversational), (2) veridicality (actual and apparent), (3) directness/relevance (semantic and syntactic/pragmatic), (4) clarity (semantic and syntactic/pragmatic), and (5) personalization. Two studies employing encoding and decoding methodologies are presented that assess the degree to which (1) senders can vary discourse on demand along these dimensions and (2) receivers (observers) can recognize such variations. Participants in the first experiment engaged in separate truthful and deceptive interviews; during the latter, they enacted one of three different forms of deception (falsification, equivocation, concealment) representing different combinations of the five dimensions. Participants in the second experiment gave truthful and deceptive answers during a single interview and again enacted different deception forms. Participants and observers then rated interviewee responses on the five dimensions. Results from both studies confirmed that deceptive communication is less complete, honest (veridical), direct/relevant, clear, and personalized (attributable to the speaker) than truthful communication. Falsifications were the least truthful but seen as most complete. Equivocations were the least clear and direct/relevant and seen as such. They were also seen as the most personalized. Findings are discussed in light of IDT, McCornack's Information Manipulation Theory, and Jacobs, Dawson, and Brashers' replication of McCornack's work.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.