The Handbook of the Psychology of Communication Technology 2015
DOI: 10.1002/9781118426456.ch12
|View full text |Cite
|
Sign up to set email alerts
|

Deception with Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…When there is any uncertainty about the true identity of a message source online, the Source Obfuscation Scale can be used to tell if viewers believe self-claims and third-party claims really are authored by whom they appear to be authored by. Masking the true identity of a source is ubiquitous online and central to how features of communication technology affect processes of deception (see Hancock & Guillory, 2015). Challenging the identification of a clear, singular message source, some online media allow for the collaborative production of information.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…When there is any uncertainty about the true identity of a message source online, the Source Obfuscation Scale can be used to tell if viewers believe self-claims and third-party claims really are authored by whom they appear to be authored by. Masking the true identity of a source is ubiquitous online and central to how features of communication technology affect processes of deception (see Hancock & Guillory, 2015). Challenging the identification of a clear, singular message source, some online media allow for the collaborative production of information.…”
Section: Discussionmentioning
confidence: 99%
“…The warranting value of information might also be reduced when there is reason to question whether a source really is who he or she appears to be (DeAndrea, 2014). People can exploit the affordances of online platforms to mask their true identities for self-serving purposes (see Hancock & Guillory, 2015). For instance, a political operative might pose as a concerned citizen or a business owner might pose as an average online reviewer.…”
Section: Masking the Source Of Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…They deny current reality if that serves to undermine their image. Image making often involves deception, and extensive psychological research on self‐presentation has sought to describe and explain false image making or image construction (e.g., DePaulo, ; Hancock & Guillory, ; Toma & Hancock, ). There have been some important theoretical and empirical contributions to the deception literature that have considered self‐presentational goals of deception.…”
Section: Reality Monitoring Theory and Deception Detectionmentioning
confidence: 99%
“…As in the case of online DTCA, the complexities of new media can make it difficult to know the true identity of an information source or with whom the source is affiliated. Researchers have documented the many ways that online sources try to influence viewers by masking their true identities [ 21 , 22 ]. The prevalence of fake online reviews, commissioned or produced by the target being evaluated [ 23 ], provides a prominent example of how source obfuscation occurs online.…”
Section: Introductionmentioning
confidence: 99%