IDEAS home Printed from https://ideas.repec.org/a/bla/jinfst/v68y2017i12p2729-2742.html
   My bibliography  Save this article

Ethical dilemma: Deception dynamics in computer‐mediated group communication

Author

Listed:
  • Shuyuan Mary Ho
  • Jeffrey T. Hancock
  • Cheryl Booth

Abstract

Words symbolically represent communicative and behavioral intent, and can provide clues to a communicator's future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify deceptive communicative intent within group context as manifested in language‐action cues. Specifically, this study used an online team‐based game that simulates real‐world deceptive insider scenarios to examine several dimensions of group communication. First, we studied how language‐action cues differ between groups with and groups without a compromised actor. We also examine how these cues differ within groups in terms of the group members' individual and collective interactions with the compromised actor. Finally, we look at how the cues of compromised actors differ from those of noncompromised actors, and how communication behavior changes after an actor is presented with an ethical dilemma. The results of the study further our understanding of language‐action cues as indicators for unmasking a potential deceptive insider.

Suggested Citation

  • Shuyuan Mary Ho & Jeffrey T. Hancock & Cheryl Booth, 2017. "Ethical dilemma: Deception dynamics in computer‐mediated group communication," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 68(12), pages 2729-2742, December.
  • Handle: RePEc:bla:jinfst:v:68:y:2017:i:12:p:2729-2742
    DOI: 10.1002/asi.23849
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.23849
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.23849?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Shuyuan Mary Ho & Izak Benbasat, 2014. "Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 65(8), pages 1555-1576, August.
    2. Jeffrey T. Hancock & Michael T. Woodworth & Saurabh Goorha, 2010. "See No Evil: The Effect of Communication Medium and Motivation on Deception Detection," Group Decision and Negotiation, Springer, vol. 19(4), pages 327-343, July.
    3. Victoria L. Rubin & Tatiana Lukoianova, 2015. "Truth and deception at the rhetorical structure level," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(5), pages 905-917, May.
    4. Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
    5. Monica T. Whitty & Tom Buchanan & Adam N. Joinson & Alex Meredith, 2012. "Not all lies are spontaneous: An examination of deception across different modes of communication," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 63(1), pages 208-216, January.
    6. Monica T. Whitty & Tom Buchanan & Adam N. Joinson & Alex Meredith, 2012. "Not all lies are spontaneous: An examination of deception across different modes of communication," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 63(1), pages 208-216, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jussi Palomäki & Jeff Yan & David Modic & Michael Laakasuo, 2016. ""To Bluff like a Man or Fold like a Girl?" – Gender Biased Deceptive Behavior in Online Poker," PLOS ONE, Public Library of Science, vol. 11(7), pages 1-13, July.
    2. Sumeet Kumar & Binxuan Huang & Ramon Alfonso Villa Cox & Kathleen M. Carley, 2021. "An anatomical comparison of fake-news and trusted-news sharing pattern on Twitter," Computational and Mathematical Organization Theory, Springer, vol. 27(2), pages 109-133, June.
    3. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    4. Shuyuan Mary Ho & Merrill Warkentin, 2017. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 19(2), pages 377-396, April.
    5. Shuyuan Mary Ho & Merrill Warkentin, 0. "Leader’s dilemma game: An experimental design for cyber insider threat research," Information Systems Frontiers, Springer, vol. 0, pages 1-20.
    6. Cockrell, Cam & Stone, Dan N., 2011. "Team discourse explains media richness and anonymity effects in audit fraud cue brainstorming," International Journal of Accounting Information Systems, Elsevier, vol. 12(3), pages 225-242.
    7. Sunita Goel & Ozlem Uzuner, 2016. "Do Sentiments Matter in Fraud Detection? Estimating Semantic Orientation of Annual Reports," Intelligent Systems in Accounting, Finance and Management, John Wiley & Sons, Ltd., vol. 23(3), pages 215-239, July.
    8. Viju Raghupathi & Raquel Benbunan-Fich, 2020. "A Social Capital Perspective on Computer-Mediated Group Communication and Performance: An Empirical Study," Group Decision and Negotiation, Springer, vol. 29(4), pages 747-801, August.
    9. Roozmehr Safi & Glenn J. Browne, 2023. "Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects," Information Systems Frontiers, Springer, vol. 25(3), pages 1277-1292, June.
    10. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    11. Zhang, Chaowei & Gupta, Ashish & Kauten, Christian & Deokar, Amit V. & Qin, Xiao, 2019. "Detecting fake news for reducing misinformation risks using analytics approaches," European Journal of Operational Research, Elsevier, vol. 279(3), pages 1036-1052.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:68:y:2017:i:12:p:2729-2742. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.