Information manipulation theory

One way of thinking about how deceptive messages are generated is in terms of how the information that interactants possess is manipulated within the messages that they produce. Information Manipulation Theory suggests that deceptive messages function deceptively because they covertly violate the principles that govern conversational exchanges. Given that conversational interactants possess assumptions regarding the quantity, quality, manner, and relevance of information that should be presented, it is possible for speakers to exploit any or all of these assumptions by manipulating the information that they possess so as to mislead listeners. By examining various message examples, it is demonstrated that IMT helps to reconcile previous disagreement about the properties of deceptive messages.

[1]  E. Schegloff Sequencing in Conversational Openings , 1968 .

[2]  C. Edgley,et al.  Information control in conversations: Honesty is not always the best policy , 1975 .

[3]  Exploiting Pragmatic Rules: Devious Messages. , 1977 .

[4]  P. Brown,et al.  Universals in language usage: Politeness phenomena , 1978 .

[5]  Michael T. Motley,et al.  White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations , 1984 .

[6]  B. Depaulo,et al.  Effects of actual deception and suspiciousness of deception on interpersonal perceptions. , 1984 .

[7]  Robert Hopper,et al.  Broadening the deception construct , 1984 .

[8]  P. Ekman Telling lies: clues to deceit in the marketplace , 1985 .

[9]  H. Dan O'Hair,et al.  PLANNING AND CONTROL OF BEHAVIOR DURING DECEPTION , 1985 .

[10]  Steven A. Mccornack,et al.  Message Design Logic and Message Goal Structure Effects on Perceptions of Message Quality in Regulative Communication Situations , 1987 .

[11]  Barbara J. O'Keefe,et al.  The logic of message design: Individual differences in reasoning about communication , 1988 .

[12]  D. Over,et al.  Studies in the Way of Words. , 1989 .

[13]  S. Metts,et al.  An Exploratory Investigation of Deception in Close Relationships , 1989 .

[14]  T. Levine,et al.  When lovers become leery: The relationship between suspicion and accuracy in detecting deception , 1990 .

[15]  David B. Buller,et al.  Interpersonal deception. I : Deceivers' reactions to receivers' suspicions and probing , 1991 .