Group support systems and deceptive communication

Electronic communication is becoming more pervasive worldwide with the spread of the Internet, especially through the World Wide Web and electronic mail. Yet, as with all human communication, electronic communication is vulnerable to deceit on the part of senders, and to the less than stellar performance of most people at defecting deceit aimed at them. Despite considerable research over the years into both computer-mediated communication and into deception, there has been little if any research at the intersection of these two research streams. In this paper, we review these two streams and suggest a research model for investigating their intersection, focusing on group support systems as an electronic medium. We focus specifically on research questions concerning how successful people are at deceiving others through computer-mediated communication, and how successful people are at detecting such deception. We also suggest three propositions guiding research in this area.

[1]  Stephen Reder,et al.  Selection and Effects of Channels in Distributed Communication and Decision-Making Tasks. , 1988 .

[2]  Judee K. Burgoon,et al.  Interpersonal deception: V. Accuracy in deception detection , 1994 .

[3]  T. Levine,et al.  The dark side of trust: Conceptualizing and measuring types of communicative suspicion , 1991 .

[4]  Gene D. Fowler,et al.  Audio teleconferencing versus face‐to‐face conferencing: A synthesis of the literature , 1980 .

[5]  David R. Seibold,et al.  Communication and influence in group decision making. , 1996 .

[6]  Jane S. Webster,et al.  Rational and social theories as complementary explanations of communication media choices: two polic , 1995 .

[7]  Robert Johansen,et al.  Social evaluations of teleconferencing , 1977 .

[8]  Joey F. George,et al.  Theoretical and Methodological Issues in Group Support Systems Research , 1997 .

[9]  S. Grover Lying, Deceit, and Subterfuge: A Model of Dishonesty in the Workplace , 1993 .

[10]  Thomas Hugh Feeley,et al.  Global cue usage in behavioral lie detection , 1995 .

[11]  R. Johansen,et al.  Electronic meetings : technical alternatives and social choices , 1979 .

[12]  Rob Kling,et al.  Cooperation, coordination and control in computer-supported work , 1991, CACM.

[13]  J. Valacich,et al.  Effects of anonymity and evaluative tone on idea generation in computer-mediated groups , 1990 .

[14]  Jay F. Nunamaker,et al.  Communication Concurrency and the New Media , 1993 .

[15]  Leonard M. Jessup,et al.  The deindividuating effects of anonymity on automated group idea generation. , 1989 .

[16]  Jay F. Nunamaker,et al.  Electronic meeting systems , 1991, CACM.

[17]  Richard L. Daft,et al.  Organizational information requirements, media richness and structural design , 1986 .

[18]  John Short,et al.  The social psychology of telecommunications , 1976 .

[19]  Linda L. Putnam,et al.  Bona Fide Groups: An Alternative Perspective for Communication and Small Group Decision Making , 1996 .

[20]  T. Levine,et al.  When lovers become leery: The relationship between suspicion and accuracy in detecting deception , 1990 .

[21]  James B. Stiff,et al.  Truth Biases and Aroused Suspicion in Relational Deception , 1992 .

[22]  R. Daft,et al.  Understanding Managers' Media Choices: A Symbolic Interactionist Perspective , 1990 .

[23]  Ping Zhang,et al.  Fast timing estimation for CDMA waveforms in a near-far environment , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[24]  Poppy Lauretta McLeod,et al.  An Assessment of the Experimental Literature on Electronic Support of Group Work: Results of a Meta-Analysis , 1992, Hum. Comput. Interact..

[25]  Richard L. Daft,et al.  Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems , 1987, MIS Q..

[26]  Janet Fulk,et al.  Emerging Theories of Communication in Organizations , 1991 .

[27]  Steven A. Mccornack Information manipulation theory , 1992 .

[28]  Laura K. Guerrero,et al.  Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .

[29]  Carlos Ferrán-Urdaneta,et al.  Truth or deception: the impact of videoconferencing for job interviews , 1997, ICIS '97.

[30]  Brian K. Thorn,et al.  Discretionary Databases: Theory, Data, and Implications , 1990 .

[31]  R. Daft,et al.  Media Symbolism, Media Richness, and Media Choice in Organizations , 1987 .

[32]  Malcolm R. Parks,et al.  Deception Detection and Relationship Development: The Other Side of Trust , 1986 .

[33]  John R. Carlson Channel expansion theory: A dynamic view of media and information richness perceptions , 1994 .

[34]  Judee K. Burgoon,et al.  Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics , 1994 .

[35]  C. Steinfield,et al.  A Social Influence Model of Technology use , 1990 .