170
Views
92
CrossRef citations to date
0
Altmetric
Original Articles

Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages

, , , &
Pages 50-69 | Published online: 02 Jun 2009

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (21)

Kyoungmin Lee, Juyeon Ham, Lorenzo Cantoni & Chulmo Koo. (2022) Identifying the nature of authentic and fake reviews in restaurant context. Journal of Travel & Tourism Marketing 39:3, pages 353-369.
Read now
David E. Clementson & Tong Xie. (2021) On the Merits of Transparency in Crisis: Effects of Answering vs. Evading through the Lens of Deception Theory. International Journal of Strategic Communication 15:1, pages 1-17.
Read now
Thomas Holtgraves & Elizabeth Jenkins. (2020) Texting and the Language of Everyday Deception. Discourse Processes 57:7, pages 535-550.
Read now
Michael Siering, Jascha-Alexander Koch & Amit V. Deokar. (2016) Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts. Journal of Management Information Systems 33:2, pages 421-455.
Read now
Stephan Ludwig, Tom van Laer, Ko de Ruyter & Mike Friedman. (2016) Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. Journal of Management Information Systems 33:2, pages 511-541.
Read now
Jiang Wu & Lina Zhou. (2015) DOBNet: exploiting the discourse of deception behaviour to uncover online deception strategies. Behaviour & Information Technology 34:9, pages 936-948.
Read now
Michael T. Braun, Lyn M. Van Swol & Lisa Vang. (2015) His Lips Are Moving: Pinocchio Effect and Other Lexical Indicators of Political Deceptions. Discourse Processes 52:1, pages 1-20.
Read now
Christie M. Fuller, David P. Biros, Douglas P. Twitchell & Rick L. Wilson. (2015) Real-World Deception and the Impact of Severity. Journal of Computer Information Systems 55:2, pages 59-67.
Read now
BrianJ. Householder & NormanC. H. Wong. (2011) Mood State or Relational Closeness: Explaining the Impacts of Mood on the Ability to Detect Deception in Friends and Strangers. Communication Quarterly 59:1, pages 104-122.
Read now
SeanM. Horan & MeganR. Dillow. (2009) Deceivers and Emotion: The Relationships Among Deceptive Message Type, Relational Qualities, and Guilt and Shame. Atlantic Journal of Communication 17:4, pages 149-165.
Read now
TimothyR. Levine, Kelli JeanK. Asada & LisaL. Massi Lindsey. (2003) The relative impact of violation type and lie severity on judgments of message deceitfulness. Communication Research Reports 20:3, pages 208-218.
Read now
JudeeK. Burgoon & Kory Floyd. (2000) Testing for the motivation impairment effect during deceptive and truthful interaction. Western Journal of Communication 64:3, pages 243-267.
Read now
Maria Knight Lapinski & TimothyR. Levine. (2000) Culture and information manipulation theory: The effects of self‐construal and locus of benefit on information manipulation. Communication Studies 51:1, pages 55-73.
Read now
Marifran Mattson, Mike Allen, DanielJ. Ryan & Vernon Miller. (2000) Considering organizations as a unique interpersonal context for deception detection: A meta‐analytic review. Communication Research Reports 17:2, pages 148-160.
Read now
TimothyR. Levine, Hee Sun Park & StevenA. McCornack. (1999) Accuracy in detecting truths and lies: Documenting the “veracity effect”. Communication Monographs 66:2, pages 125-144.
Read now
LorritaN. T. Yeung, TimothyR. Levine & Kazuo Nishiyama. (1999) Information manipulation theory and perceptions of deception in Hong Kong. Communication Reports 12:1, pages 1-11.
Read now
ThomasH. Feeley & MelissaJ. Young. (1998) Humans as lie detectors: Some more second thoughts. Communication Quarterly 46:2, pages 109-126.
Read now
ThomasH. Feeley. (1996) Exploring sanctioned and unsanctioned lies in interpersonal deception. Communication Research Reports 13:2, pages 164-173.
Read now

Articles from other publishers (71)

Marco Meyer & Chun Wei Choo. (2023) Harming by Deceit: Epistemic Malevolence and Organizational Wrongdoing. Journal of Business Ethics.
Crossref
Mircea Zloteanu. (2023) Uncertain veracity judgments: Does the framing of the question influence deception detection?. Experimental Results 4.
Crossref
Chih-Chen Lee & Robert B. Welker. (2022) Usability of Language Features of Emails for Detecting Misrepresentations. Journal of Forensic Accounting Research 7:1, pages 95-114.
Crossref
Alibek Jakupov, Julien Mercadal, Besma Zeddini & Julien Longhi. (2022) Analyzing Deceptive Opinion Spam Patterns: the Topic Modeling Approach. Analyzing Deceptive Opinion Spam Patterns: the Topic Modeling Approach.
Nikolai Vogler & Lisa Pearl. (2019) Using linguistically defined specific details to detect deception across domains. Natural Language Engineering 26:3, pages 349-373.
Crossref
Renato M. Silva, Roney L.S. Santos, Tiago A. Almeida & Thiago A.S. Pardo. (2020) Towards automatically filtering fake news in Portuguese. Expert Systems with Applications 146, pages 113199.
Crossref
Marta Dynel. (2018) To Say the Least: Where Deceptively Withholding Information Ends and Lying Begins. Topics in Cognitive Science 12:2, pages 555-582.
Crossref
Estela Saquete, David Tomás, Paloma Moreda, Patricio Martínez-Barco & Manuel Palomar. (2020) Fighting post-truth using natural language processing: A review and open challenges. Expert Systems with Applications 141, pages 112943.
Crossref
Jiang Wu & Yangyang Liu. (2019) Deception detection methods incorporating discourse network metrics in synchronous computer-mediated communication. Journal of Information Science 46:1, pages 64-81.
Crossref
Marty Laforest12, Jessica Rioux-Turcotte & Michel St-Yves. (2020) Détecter l’appelant dissimulateur au service d’urgence 9-1-1. Criminologie 53:2, pages 193-218.
Crossref
Roney Lira de Sales Santos & Thiago Alexandre Salgueiro Pardo. 2020. Computational Processing of the Portuguese Language. Computational Processing of the Portuguese Language 195 205 .
Chih-Chen Lee & Robert B. Welker. (2019) Do Interviewers Actually Know More about Falseness in an Inquiry Than They Communicate in a Direct Lying Assessment?1. Journal of Forensic Accounting Research 4:1, pages 3-24.
Crossref
David E. Clementson. (2019) Do public relations practitioners perceptually share ingroup affiliation with journalists?. Public Relations Review 45:1, pages 49-63.
Crossref
Matthew S. McGlone & Mark L. Knapp. 2019. The Palgrave Handbook of Deceptive Communication. The Palgrave Handbook of Deceptive Communication 3 28 .
Judee K. Burgoon. (2018) Predicting Veracity From Linguistic Indicators. Journal of Language and Social Psychology 37:6, pages 603-631.
Crossref
David E Clementson. (2018) Deceptively dodging questions: A theoretical note on issues of perception and detection. Discourse & Communication 12:5, pages 478-496.
Crossref
Victor H. Matthews. (2017) The Art of Lying in King David's Court. Biblical Theology Bulletin: Journal of Bible and Culture 47:2, pages 80-86.
Crossref
Erin L. Spottswood & Jeffrey T. Hancock. (2016) The positivity bias and prosocial deception on facebook. Computers in Human Behavior 65, pages 252-259.
Crossref
Sunita Goel & Ozlem Uzuner. (2016) Do Sentiments Matter in Fraud Detection? Estimating Semantic Orientation of Annual Reports. Intelligent Systems in Accounting, Finance and Management 23:3, pages 215-239.
Crossref
Michael T. Braun & Lyn M. Van Swol. (2015) Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions. Group Decision and Negotiation 25:3, pages 641-661.
Crossref
Jeffrey A. Clements, Randy Boyle & Jeffrey G. Proudfoot. (2016) Exploring political skill and deception. International Journal of Sociology and Social Policy 36:3/4, pages 138-156.
Crossref
Judee Burgoon, William J. Mayew, Justin Scott Giboney, Aaron C. Elkins, Kevin Moffitt, Bradley Dorn, Michael Byrd & Lee Spitzley. (2015) Which Spoken Language Markers Identify Deception in High-Stakes Settings? Evidence From Earnings Conference Calls. Journal of Language and Social Psychology 35:2, pages 123-157.
Crossref
Michael L. Whitley. 2016. Leadership and Personnel Management. Leadership and Personnel Management 948 971 .
Judee K. Burgoon. (2015) When is Deceptive Message Production More Effortful than Truth-Telling? A Baker’s Dozen of Moderators. Frontiers in Psychology 6.
Crossref
Chih-Chen Lee & Robert B. Welker. (2015) Impressions That Arouse an Auditor's Suspicion of Lying in an Interview. International Journal of Auditing 19:3, pages 295-306.
Crossref
Aldert Vrij, Paul Taylor & Isabel Picornell. 2015. Communication in Investigative and Legal Contexts. Communication in Investigative and Legal Contexts 259 286 .
Barbara Bickart, Maureen Morrin & S. Ratneshwar. (2015) Does it pay to beat around the bush? The case of the obfuscating salesperson. Journal of Consumer Psychology 25:4, pages 596-608.
Crossref
Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Katherine M. Kelley, Kylie J. Harrison, Bradley J. Adame & Daniel Rex Bernard. (2013) Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews. Communication Research 42:5, pages 649-674.
Crossref
Judee K. Burgoon. (2015) Rejoinder to Levine, Clare et al.'s Comparison of the Park-Levine Probability Model Versus Interpersonal Deception Theory: Application to Deception Detection. Human Communication Research 41:3, pages 327-349.
Crossref
Darren Scott Appling, Erica J. Briscoe & Clayton J. Hutto. (2015) Discriminative Models for Predicting Deception Strategies. Discriminative Models for Predicting Deception Strategies.
Matthew L. Jensen & Laku Chidambaram. (2014) Leveraging ICT Capabilities in Potentially Deceptive Interactions: An Integrated Theoretical Model to Improve Detectability. Group Decision and Negotiation 24:2, pages 271-298.
Crossref
Craig Claybaugh. 2015. HCI in Business. HCI in Business 53 63 .
Lyn M. Van Swol & Michael T. Braun. (2013) Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths. Group Decision and Negotiation 23:6, pages 1343-1367.
Crossref
Steven A. McCornack, Kelly Morrison, Jihyun Esther Paik, Amy M. Wisner & Xun Zhu. (2014) Information Manipulation Theory 2. Journal of Language and Social Psychology 33:4, pages 348-377.
Crossref
Jinie Pak & Lina Zhou. (2014) Social structural behavior of deception in computer-mediated communication. Decision Support Systems 63, pages 95-103.
Crossref
Michael L. Whitley. 2014. Cases on Communication Technology for Second Language Acquisition and Cultural Learning. Cases on Communication Technology for Second Language Acquisition and Cultural Learning 263 294 .
Lina Zhou, Yu-wei Sung & Dongsong Zhang. (2012) Deception Performance in Online Group Negotiation and Decision Making: The Effects of Deception Experience and Deception Skill. Group Decision and Negotiation 22:1, pages 153-172.
Crossref
Christie M. Fuller, David P. Biros, Judee Burgoon & Jay Nunamaker. (2012) An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception. Group Decision and Negotiation 22:1, pages 117-134.
Crossref
Karen Schelleman-Offermans & Harald Merckelbach. (2010) Fantasy proneness as a confounder of verbal lie detection tools. Journal of Investigative Psychology and Offender Profiling 7:3, pages 247-260.
Crossref
J.K. Burgoon, D.P. Twitchell, M.L. Jensen, T.O. Meservy, M. Adkins, J. Kruse, A.V. Deokar, G. Tsechpenakis, Shan Lu, D.N. Metaxas, J.F. Nunamaker & R.E. Younger. (2009) Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. IEEE Transactions on Intelligent Transportation Systems 10:1, pages 103-112.
Crossref
Chih-Chen Lee & Robert B. Welker. (2008) Identification of Perceived Interviewee Behaviors that Influence Auditors' Assessment of Deception. International Journal of Auditing 12:3, pages 205-220.
Crossref
Judee K. Burgoon, J. Pete Blair & Renee E. Strom. (2008) Cognitive Biases and Nonverbal Cue Availability in Detecting Deception. Human Communication Research 34:4, pages 572-599.
Crossref
Lina Zhou & Dongsong Zhang. (2008) Following linguistic footprints. Communications of the ACM 51:9, pages 119-122.
Crossref
Judee K. Burgoon & Lauren M. Hamel. 2008. The International Encyclopedia of Communication. The International Encyclopedia of Communication.
Lina Zhou & Dongsong Zhang. (2007) An Ontology-Supported Misinformation Model: Toward a Digital Misinformation Library. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 37:5, pages 804-813.
Crossref
Holtjona Galanxhi & Fiona Fui-Hoon Nah. (2007) Deception in cyberspace: A comparison of text-only vs. avatar-supported medium. International Journal of Human-Computer Studies 65:9, pages 770-783.
Crossref
Chih-Chen Lee & Robert B. Welker. (2007) The Effect of Audit Inquiries on the Ability to Detect Financial Misrepresentations. Behavioral Research in Accounting 19:1, pages 161-178.
Crossref
G.A. Wang, H. Chen, J.J. Xu & H. Atabakhsh. (2006) Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 36:5, pages 988-999.
Crossref
Judee K. Burgoon & Tiantian Qin. (2016) The Dynamic Nature of Deceptive Verbal Communication. Journal of Language and Social Psychology 25:1, pages 76-96.
Crossref
L. Zhou. (2005) An Empirical Investigation of Deception Behaviorin Instant Messaging. IEEE Transactions on Professional Communication 48:2, pages 147-160.
Crossref
Judee K. Burgoon. (2005) Chapter 3: The Future of Motivated Deception and Its Detection. Communication Yearbook 29:1, pages 49-95.
Crossref
J. Burgoon, M. Adkins, J. Kruse, M.L. Jensen, T. Meservy, D.P. Twitchell, A. Deokar, J.F. Nunamaker, Shan Lu, G. Tsechpenakis, D.N. Metaxas & R.E. Younger. (2005) An Approach for Intent Identification by Building on Deception Detection. An Approach for Intent Identification by Building on Deception Detection.
A. Deokar & T. Madhusudan. (2005) Developing Group Decision Support Systems for Deception Detection. Developing Group Decision Support Systems for Deception Detection.
Lina Zhou, Judee K Burgoon, Dongsong Zhang & Jay F Nunamaker. (2004) Language dominance in interpersonal deception in computer-mediated communication. Computers in Human Behavior 20:3, pages 381-402.
Crossref
J.K. Burgoon, M. Adkins, J. Kruse, M.L. Jensen, A. Deokar, D.P. Twitchell, S. Lu, D.N. Metaxas, J.F. Nunamaker & R.E. Younger. (2004) Moving toward intent detection: a tool-based approach. Moving toward intent detection: a tool-based approach.
Tiantian Qin, J. Burgoon & J.F. Nunamaker. (2004) An exploratory study on promising cues in deception detection and application of decision tree. An exploratory study on promising cues in deception detection and application of decision tree.
J.F. George & K. Marett. (2004) Inhibiting deception and its detection. Inhibiting deception and its detection.
Bella M. DePaulo, James J. Lindsay, Brian E. Malone, Laura Muhlenbruck, Kelly Charlton & Harris Cooper. (2003) Cues to deception.. Psychological Bulletin 129:1, pages 74-118.
Crossref
Lina Zhou, Judee K. Burgoon & Douglas P. Twitchell. 2003. Intelligence and Security Informatics. Intelligence and Security Informatics 102 110 .
Judee K. Burgoon, David B. Buller & Kory Floyd. (2001) Does Participation Affect Deception Success?.. Human Communication Research 27:4, pages 503-534.
Crossref
Lillian Trettin & Catherine Musham. (2016) Is Trust a Realistic Goal of Environmental Risk Communication?. Environment and Behavior 32:3, pages 410-426.
Crossref
M. Adkins, J. Kruse, T. Mckenna, A. Cuyugan, J.F. Nunamaker, S. Miller & R. Younger. (2000) Experiences developing a virtual environment to support disaster relief with the United States Navy's Commander Third Fleet. Experiences developing a virtual environment to support disaster relief with the United States Navy's Commander Third Fleet.
Judee K. Burgoon, David B. Buller, Cindy H. White, Walid Afifi & Aileen L. S. Buslig. (2016) The Role of Conversational Involvement in Deceptive Interpersonal Interactions. Personality and Social Psychology Bulletin 25:6, pages 669-686.
Crossref
J.F. George & J.R. Carlson. (1999) Group support systems and deceptive communication. Group support systems and deceptive communication.
JOHNS. SEITER. (1997) Honest or Deceitful? A Study of Persons' Mental Models for Judging Veracity. Human Communication Research 24:2, pages 216-259.
Crossref
JUDEE K. BURGOON, DAVID B. BULLER, KORY FLOYD & JOSEPH GRANDPRE. (2016) Deceptive Realities. Communication Research 23:6, pages 724-748.
Crossref
David B. Buller, Judee K. Burgoon, Aileen Buslig & James Roiger. (1996) Testing Interpersonal Deception Theory: The Language of Interpersonal Deception. Communication Theory 6:3, pages 268-289.
Crossref
Judee K. Buroon, David B. Bulkr, Amy S. Ebesu, Cindy H. White & Patricia A. Rockwell. (1996) Testing Interpersonal Deception Theory: Effects of Suspicion on Communication Behaviors and Perceptions. Communication Theory 6:3, pages 243-267.
Crossref
David B. Buller & Judee K. Burgoon. (1996) Interpersonal Deception Theory. Communication Theory 6:3, pages 203-242.
Crossref
Toshiji Kawagoe & Hirokazu Takizawa. (2005) Why Lying Pays: Truth Bias in the Communication with Conflicting Interests. SSRN Electronic Journal.
Crossref
Stephan Ludwig, Tom van Laer, Ko de Ruyter & Mike Friedman. (2015) Unweaving a Tangled Web: Exploring Automated Detection of Deception Cues in Online Claims within B2B Incentive Programs. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.