Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Computer-Mediated Communication Self-presentation, interpersonal perception, and deception Coye Cheshire & Andrew Fiore // 30 January 2012 The basic stuff: readings, website, etc… Office hours: 305A South Hall Wednesday 2:00 to 3:30 pm Course reader — for what’s not online At Copy Central (2560 Bancroft at Telegraph) Class mailing list (directions on course homepage) [email protected] Web site — syllabus and readings (password) http://courses.ischool.berkeley.edu/i216/s13/ 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 1 Weekly reviews One short review required per week. “Short but informative.” Think of a good online review (Yelp, Amazon.com, etc.). A few paragraphs is sufficient. Be honest but be specific. Critique, explore, examine — no need to summarize. Due by 5pm every Tuesday. No Exceptions! Reviews are an important part of discussion. We will wrap them into our lectures and slides. 30% of your grade — can’t pass the class without them. Course password: ************ 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 2 Mailing List: [email protected] https://calmail.berkeley.edu/manage/list /listinfo/[email protected] 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 3 Identity: “Who am I?” Identity consists of personal identity + social identity Social identity often based on group affiliations Paradigm shift in conceptions of identity — Modern (Enlightenment through 20th century) Fixed, stable, unitary Post-Modern (now) Fluid, multiple, socially constructed Different roles in different settings: “One wakes up as a lover, makes breakfast as a mother, and drives to work as a lawyer.” — Sherry Turkle Different contexts make different aspects of our identity more salient: e.g., a classroom, party, church, or family dinner. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 4 Identity Theory (Sociology) Identity Theory (e.g., Stryker 1980) Individuals have “role identities”: character and the role an individual devises as an occupant of a particular social position. ‘Self’ is hierarchical ordering of identities by salience. The greater the commitment on an identity, the greater the salience of the identity. Salience of identity influences behavioral choices in a situation. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 5 When and where do you “activate” your identity? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 6 Social Identity Theory (Psychology) Social Identity Theory (e.g., Tajfel et al. 1981; Turner 1985) How group membership and “belongingness” have consequences for interpersonal and intergroup relations. As one looks for a positive sense of self, they compare their group with other groups and tend to create a favorable distinction for their own group 1/30/12 Photo credit: http://www.suntimes.com/sports/10176597-419/kyle-williamsfumbles-away-49ers-chance-at-super-bowl.html Cheshire & Fiore — Computer-Mediated Communication 7 “Minimal Group” Paradigm 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 8 Identity and CMC selection and use Internet Relay Chat (IRC) AOL Instant Messenger (AIM) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 9 Identity and the internet Disembodiment: identity/soul/spirit separate from physical body CMC allows us to adopt identities independent from our bodies (and the markers they contain) Sherry Turkle (1995): “[On the Internet] you can be whoever you want to be. You can completely redefine yourself if you want. [People] don’t look at your body and make assumptions. They don’t hear your accent and make assumptions. All they see are your words.” 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 10 Self-presentation and identity Symbolic markers express our identity to others — and help us make sense of it ourselves Signals of who we are (or want to be, or want people to think we are) Offline: clothes, hair, body modifications Online? Identity is socially constructed and informed by our relations with others — what they think of us, what we think of them, how we think of ourselves. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 11 A brief introduction to Symbolic Interaction “The character of interaction as it takes place between human beings.” Herbert Blumer (1900-1987) developed much of the sociological approach to SI Long history of development in both philosophy and sociology In essence: people act toward things based on the meaning those things have for them; and these meanings are derived from social interaction and modified through interpretation” 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 12 An example: George Herbert Mead’s “Looking Glass Self” Individuals tend to act according to the view that they believe society has for them. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 13 Core Features of SI Symbols… Change… 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 14 Core Features of SI Interaction… Empirical… 1/30/12 However: note the focus on the micro-level Cheshire & Fiore — Computer-Mediated Communication 15 Goffman’s approach and focus How individuals create and maintain their “social self” Dramaturgical approach: Uses theater and drama as a metaphor for how we develop and present ourselves 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 16 http://media.knoxnews.com/media/img/photos/2010/08/11/090110bjheroleahy_t607.jpg 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 17 Frontstage and backstage 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 18 More key concepts from Goffman “Sincere” vs. “cynical” “Idealization” “Definition of the situation” “Expressions given” “Expressions given off” “Impression management” 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 19 What is the “setting” in CMC interaction? Where does it come from? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 20 Expressions “given” and “given off” Goffman discusses two types of expressions: “given” (intentional) “given off” (unintentional) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 21 “Although ‘The Presentation of Self in Every Day Life’ is considered one of the most influential texts in sociology, by today's standards it reads more like philosophy than social science. Goffman's premise is ambitious – he seeks to describe all of human social behavior using the metaphor of the theater. But in doing so he makes broad sweeping claims about how people regard themselves and relate to others, while offering little in the way of evidence to support his premise. What evidence he does provide is not empirical…” -Kate “The article also calls into play the importance of dramatic selfexpression in the formation of a social persona and piques my own interest in exploring the a broader range of methods for allowing an individual to "self-express" through digital communications. I agree that the article makes some pretty sweeping claims about human behavior. He also speaks in stereotypes that one might expect to find on Mad Men…Nonetheless, I think the particular lens with which he views social behavior can prompt interesting questions in regards to the way we present ourselves to others through various media and I appreciate it in that regard.” -Laura 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 22 “ The online world is a wholly built environment. The architects of a virtual space — from the software designers to the site administrators — shape the community in a more profound way than do their real-world counterpart. People eat, sleep, and work in buildings; the buildings affect how happily they do these things. But the buildings do not completely control their perception of the world. In the electronic domain, the design of the environment is everything. ” — Donath 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 24 Signaling Assessment signals Handicap (costly) signals Index signals Conventional signals Cost of signaling, cost of assessing What are some more examples of signals? At a bar, on IM, in online dating, on Facebook? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 25 Costs and benefits for sender Costs Production Risk Punishment Benefits Signaling: Changing observer’s beliefs Functional: Hedonic and utilitarian 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 26 Costs and benefits for receiver Costs Assessment Being deceived by a dishonest signal Benefits Signaling: Learning about the sender Functional: Again, hedonic and utilitarian 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 27 How does signaling differ online and offline? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 28 “Thinking zoologically allows her to offer the concept of the cost of communication, which she cites from evolutionary biology. Such an approach does, I think, offer an interesting way of conceptualizing signs; she cites Goldberg on gang tattoos, an example of a sign that is reliable because it is ‘high cost.’ … Yet I want to offer a deeper critique of this biological approach to human culture. I think it fundamentally misunderstands, at least in some cases, the nature of ‘meaning.’ ” - Kyle “While it is true that the ‘meaning’ components and the interpretation/signal-noise ratio elements of the theory is under discussed and perhaps over-simplified (perhaps also due to the draft nature of the chapter?), the core of the theory possesses a simplicity of explanation that is theoretically attractive; as detailed, it forms an abstract skeleton on which more nuanced cases can be fleshed out and reified.” - Weiyi 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 29 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 30 Just for fun Passport to the Pub: A guide to British pub etiquette http://www.sirc.org/publik/pub.html Guide to Flirting http://www.sirc.org/publik/flirt.html Both from Social Issues Research Centre. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 31 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 32 Deception 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 33 Digital deception “The intentional control of information in a technologically mediated message to create a false belief in the receiver of the message.” Deliberate Designed to mislead or create a false belief Information communicated through technological mediation 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 34 Identity…ambiguity vs. deception 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 35 Expression and Interpretation Recall: Donath (1999) ties both voice and language to Erving Goffman’s concepts of “expressions given” and “expressions given off”: 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 36 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 37 For Example: Deception, Norms and Perception in Photos Loi Sessions Goulet’s study of MySpace photos (2009) Users who post these photographs are conforming to a social trend at the expense of their individuality The presentation of these photographs is narcissistic These photographs purposefully conceal the body 1/30/12 The classic “down shirt” MySpace photo. Cheshire & Fiore — Computer-Mediated Communication 38 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 39 Profile-based Self-Presentation Observed Self-Presentation In lab measure: •Height •Weight •Age •Income •Photograph Cross-Validation 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 40 Deception? (Hancock et al. 2007) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 41 Deception? (Hancock et al. 2007) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 42 Deception? (Hancock et al. 2007) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 43 Types of digital deception Identity-based Stems from false manipulation of person or organization Message-based Takes place in communication between dyads or larger groups 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 44 Identity-based deception Turkle pointed out that it’s easy to assume new identities online due to anonymity and multiple modes of social interaction. We use signals (screen names, language) to establish our identities online. It is relatively easy to manipulate these signals to falsely represent ourselves. Donath distinguishes between assessment and conventional signals Assessment signals are more expensive to maintain (harder to fake) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 45 Types of identity deception Trolling: posing as a legitimate community member Category deception: membership in a social group (male vs. female, black vs. white, Berkeley vs. Stanford student) Identity concealment: deception by omission or hiding of identity information 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 46 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 47 assemblingself.blogspot.com The Strange Case of the Electronic Lover Male psychiatrist, Alex, created female online persona, Joan. Formed intimate online friendships with women on CompuServe chat channels. Initiated real-life romantic relationship with one of them (Alex “introduced” by Joan). 1/30/13 Cheshire & Fiore — Computer-Mediated Communication 48 The Deception in the Message… 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 49 How is deception different online and offline? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 50 Think of lie you told today or yesterday. What medium did it take place in? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 51 Lying in different communication media In which medium will we lie most? 1. FtF interaction 2. Phone 3. Instant Messaging 4. Email Why? 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 52 Examining deceptive behavior Participants recorded social interactions and lies for 7 days with the Social Interaction & Lie form Each social interaction (greater than 10 min) Which medium (FtF, phone, IM, email, chat, etc.) Whether or not they lied 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 53 Results — Hancock et al. % of interactions involving a lie 37% 27% 21% 14% FtF 1/30/12 Phone Instant Email Message Cheshire & Fiore — Computer-Mediated Communication 54 Feature-based approach Media features FtF Phone IM Synchronous X X X* Recordless X X X* X X X Distributed (not copresent) Email Lying predictions Feature-based 2 1 2 3 Media Richness 1 2 3 4 Social Distance 4 3 2 1 * Usually 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 55 Predictions based on features The more recordable the medium (papertrail), the less likely people are to lie. The more synchronous and distributed (but not recordable), the more lying will occur: Phone FtF IM Email Others? 1/30/12 most least Cheshire & Fiore — Computer-Mediated Communication 56 “I wish the author touched more upon image-based deception, considering our culture is largely ocularcentric--a society whereby sight dominates all the other senses. From Facebook to Instagram to Reddit to advertisements and more, as a society, we experience life through images, I believe, more so than email, telephone or face-to-face interaction, etc. To me, it's interesting that the author glosses over image-based deception, especially since it can have profound effect on society's sense of realism. ” – Tine “One thing really struck me, though: how can the accuracy of the diary studies be trusted? Self-reporting is a notoriously inaccurate method of measuring anything--and the more sensitive the topic the less accurate the self-reporting. … The possibility of study participants lying MUST have occured to a deception researcher. Srsly. ” - Lisa 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 57 Deception as an aspect of “Media Richness” Media ‘richness’ is only a singular dimension that may mask the complexity of choice, behavior and inference of purpose. Image: Time Barrow Dissertation Research, http://blog.timebarrow.com/2009/09/media-richness-theory/ 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 58 Other Dimensions: Synchronicity Recordability Distribution of Speaker/Listener 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 59 What about the content of lies? Another Hancock et al. diary study: More lies about feelings in synchronous interaction (because feelings are more likely to come up) More lies about explanations in asynchronous media (more time to plan and construct) More lies about actions on the telephone (where people can’t see what you’re doing) No difference across media in lies about facts (might have expected more in recordless media) 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 60 Do we use language differently when we lie? In asynchronous, text-based interaction: Liars used more words, were more expressive, non-immediate and informal, and made more typos (Zhou et al. 2004). Similar in synchronous IM interaction: More words and fewer self-references Those lied to also IMed differently, even when they didn’t realize the deceit: Shorter sentences, more questions. 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 61 Detecting deception Most people (even trained professionals, like police officers) detect deception at no better than a chance rate Some reliable markers of lying: Illustrative and other body movements, higher pitch, microexpressions: http://www.youtube.com/watch?v=EXm6YbXxSYk These are hard to detect online, esp. in text People highly motivated to lie may be easier to detect (i.e., trying harder may give you away) — “motivation impairment effect” 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 62 For next Wednesday… Community, Online and Offline Cohen, A.P. (1985) Chapters 1 and 3 from The Symbolic Construction of Community. London: Routledge. (In reader.) Haythornthwaite, C. (2007) Social networks and online community. In Joinson, A., McKenna, K., Postmes, T., and U-D. Reips (Eds.) The Oxford Handbook of Internet Psychology. Oxford, England: Oxford University Press. (In reader.) McKenna, K.Y.A. (2008) Influences on the nature and functioning of online groups. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications. Cambridge, UK: Cambridge University Press. Remember to write your reviews! 1/30/12 Cheshire & Fiore — Computer-Mediated Communication 63