SlideShare una empresa de Scribd logo
1 de 13
Interpersonal Deception Theory
By Adriana Johnson
What is it?
A theory of deception between two
communicators where predictions are made
based on characteristics of the source, receiver,
context, message,feedback, and channel (Avtgis,
Infante, & Rancer, 2009).
Receiver/Predictor Source/Deceiver
Channel
Channel
Message & Context
Feedback
What is it?
Deception, theorized by IDT, is no different from any
other form of communication.
Even if the person is truthful or deceitful, the universal
goals of effectiveness and
appropriateness are
still being followed
(Avtgis et. al.,2009).
What is it?
To be an effective deceiver, one must handle a
large amount of information in an efficient
manner.
Therefore, the receiver is active and corresponds
to the deceptive encounter.
Who uses it?
Psychologists, Communication researchers, and
Sociologists use IDT in their scientific inquiries,
empirical studies, experiments, and meta analyses. Also,
Theorist who believe messages “do things” to people
use IDT. Two leading men that have added on to IDT
are Buller and Burgoon (DePaulo, Malone, Lindsay,
Muhlenbruck, Charlton,& Cooper,2003).
Who uses it?
Buller and Burgoon developed twenty-one
propositions for the theory (Avtgis et. al., 2009).
Proposition seven states that
deceiving for self-gain prompts
more strategic activity and
nonstrategic behavior than
deceiving for the benefit of
others. This proposition can be
identified in the Madoff ponzi
scheme.
Bernard Madoff
So what…?
It's one of the most
comprehensive and developed
theories that deals with
deceptive communication.
IDT theorists expect that with
new technology, social
networking sites will extend
the present propositions to
account for the increasing
media choices for interacting.
So what…?
Not only is this theory
useful for theorists but
also detectives trying to
find online sexual
predators, investigators
examining information
from deceptive
individuals, and also
helps identify deceitful
messages on a daily
basis (Lina, Burgoon,
Dongsong, &
Nunamaker,2004).
Criticism
Since its beginning, the theory has continued to grow alongside new
deception processes. Several theorists applaud Buller and Burgoon on
their addition to the theory.
Their 21 propositions
provide a comprehensive
description of a timeline of
deceptive interactions. But the
problem with these
propositions is the lack of
predictive power necessary for
qualifying as a centralized
theory.
Criticism
According to Baxter and Braithwaite (2008),
some of the propositions are generic and intend
to emphasize variables that explain deception but
not IDT.
They also believe that IDT is not completely
substantive and only tackles the difficult issue
of whether deceivers adapt their behavior.
What Else You Should Know
Next time you feel like you are being
deceived, examine the accused person of
deception's nonverbal expression. They may
exhibit something called leakage which is
,according to IDT, a manifestation most
overtly seen in nonverbal signals which
betrays verbal communication. If their
nonverbal expressions contradict their verbal
message, deception may be occurring.
References
Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary
communication theory. (pp. 241-246). Dubuque:
Kendall Hunt Publishing Company.
Baxter, L., & Braithwaite, D. (2008). Engaging theories in
interpersonal communication. Thousand Oaks,
California: Sage Publications.
DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L.,
Charlton, K., & Cooper, H. (2003). Cues to
deception. Psychological Bulletin, 129, 74-
118. doi: 10.1037/0033-2909.129.1.74
References
Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J.
(2004). Language dominance in interpersonal
deception in computer-mediated communication.
Computers In Human Behavior, 20, 381-402. doi:
10.1016/S0747-5632(03)00051-7
Quickmeme. (n.d.). Retrieved from
http://www.quickmeme.com/make

Más contenido relacionado

La actualidad más candente

Resistance to social influence
Resistance to social influenceResistance to social influence
Resistance to social influence
gbaptie
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
Diana Dianot
 

La actualidad más candente (20)

Magical Number Seven, by George Miller
Magical Number Seven, by George MillerMagical Number Seven, by George Miller
Magical Number Seven, by George Miller
 
ch 10 thinking & language
ch 10 thinking & languagech 10 thinking & language
ch 10 thinking & language
 
6 object relations theory
6 object relations theory6 object relations theory
6 object relations theory
 
Psychological theories and research in juvenile delinquency
Psychological theories and research in juvenile delinquencyPsychological theories and research in juvenile delinquency
Psychological theories and research in juvenile delinquency
 
Persuasion
PersuasionPersuasion
Persuasion
 
Aggression - Social Psychology
Aggression - Social PsychologyAggression - Social Psychology
Aggression - Social Psychology
 
Social Theories of Crime
Social Theories of CrimeSocial Theories of Crime
Social Theories of Crime
 
Introduction to social psychology lecture 1
Introduction to social psychology lecture 1Introduction to social psychology lecture 1
Introduction to social psychology lecture 1
 
Group influence
Group influenceGroup influence
Group influence
 
Perception
PerceptionPerception
Perception
 
Resistance to social influence
Resistance to social influenceResistance to social influence
Resistance to social influence
 
Mental representation
Mental representationMental representation
Mental representation
 
Chapter 1 introducing social psychology
Chapter 1 introducing social psychologyChapter 1 introducing social psychology
Chapter 1 introducing social psychology
 
Social Psychology: Review
Social Psychology: ReviewSocial Psychology: Review
Social Psychology: Review
 
Lesson 43
Lesson 43Lesson 43
Lesson 43
 
Hypothesization in Family Therapy
Hypothesization in Family TherapyHypothesization in Family Therapy
Hypothesization in Family Therapy
 
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of PsychologyPsychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Attention & Perception - Cognitive Psychology.pptx
Attention & Perception - Cognitive Psychology.pptxAttention & Perception - Cognitive Psychology.pptx
Attention & Perception - Cognitive Psychology.pptx
 
Social Judgment Theory
Social Judgment TheorySocial Judgment Theory
Social Judgment Theory
 

Destacado

Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deception
mankoma2013
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theory
Tammy Esfandi
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. Interpretive
Nathan PT
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivism
nataliea
 

Destacado (12)

Interpersonal Deception theory
Interpersonal Deception theoryInterpersonal Deception theory
Interpersonal Deception theory
 
The Art of Deception
The Art of DeceptionThe Art of Deception
The Art of Deception
 
Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deception
 
Detecting Deception
Detecting DeceptionDetecting Deception
Detecting Deception
 
Interpersonal Deception Theory
Interpersonal Deception TheoryInterpersonal Deception Theory
Interpersonal Deception Theory
 
Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?
 
Social Penetration theory
Social Penetration theory  Social Penetration theory
Social Penetration theory
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theory
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. Interpretive
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration Theory
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivism
 

Similar a Interpersonal Deception Theory by Adriana Johnson

Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Debidatta Dwibedi
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
ElmeBaje
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Alexej Michirev
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docx
owenhall46084
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
elliot7
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docx
write31
 

Similar a Interpersonal Deception Theory by Adriana Johnson (20)

Ontologies Used In Paper-Omics
Ontologies Used In Paper-OmicsOntologies Used In Paper-Omics
Ontologies Used In Paper-Omics
 
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception Theory
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
 
Samples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdfSamples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdf
 
Samples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast EssaysSamples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast Essays
 
Bullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their LivesBullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their Lives
 
A Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion TheoriesA Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion Theories
 
International life Sciences
International life SciencesInternational life Sciences
International life Sciences
 
Lived Experience Paper
Lived Experience PaperLived Experience Paper
Lived Experience Paper
 
Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and Methods
 
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message PropagationStudy: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
 
Essay On Hiv Aids
Essay On Hiv AidsEssay On Hiv Aids
Essay On Hiv Aids
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docx
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
 
Cpdp slides
Cpdp slidesCpdp slides
Cpdp slides
 
The paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truthThe paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truth
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docx
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Interpersonal Deception Theory by Adriana Johnson

  • 2. What is it? A theory of deception between two communicators where predictions are made based on characteristics of the source, receiver, context, message,feedback, and channel (Avtgis, Infante, & Rancer, 2009). Receiver/Predictor Source/Deceiver Channel Channel Message & Context Feedback
  • 3. What is it? Deception, theorized by IDT, is no different from any other form of communication. Even if the person is truthful or deceitful, the universal goals of effectiveness and appropriateness are still being followed (Avtgis et. al.,2009).
  • 4. What is it? To be an effective deceiver, one must handle a large amount of information in an efficient manner. Therefore, the receiver is active and corresponds to the deceptive encounter.
  • 5. Who uses it? Psychologists, Communication researchers, and Sociologists use IDT in their scientific inquiries, empirical studies, experiments, and meta analyses. Also, Theorist who believe messages “do things” to people use IDT. Two leading men that have added on to IDT are Buller and Burgoon (DePaulo, Malone, Lindsay, Muhlenbruck, Charlton,& Cooper,2003).
  • 6. Who uses it? Buller and Burgoon developed twenty-one propositions for the theory (Avtgis et. al., 2009). Proposition seven states that deceiving for self-gain prompts more strategic activity and nonstrategic behavior than deceiving for the benefit of others. This proposition can be identified in the Madoff ponzi scheme. Bernard Madoff
  • 7. So what…? It's one of the most comprehensive and developed theories that deals with deceptive communication. IDT theorists expect that with new technology, social networking sites will extend the present propositions to account for the increasing media choices for interacting.
  • 8. So what…? Not only is this theory useful for theorists but also detectives trying to find online sexual predators, investigators examining information from deceptive individuals, and also helps identify deceitful messages on a daily basis (Lina, Burgoon, Dongsong, & Nunamaker,2004).
  • 9. Criticism Since its beginning, the theory has continued to grow alongside new deception processes. Several theorists applaud Buller and Burgoon on their addition to the theory. Their 21 propositions provide a comprehensive description of a timeline of deceptive interactions. But the problem with these propositions is the lack of predictive power necessary for qualifying as a centralized theory.
  • 10. Criticism According to Baxter and Braithwaite (2008), some of the propositions are generic and intend to emphasize variables that explain deception but not IDT. They also believe that IDT is not completely substantive and only tackles the difficult issue of whether deceivers adapt their behavior.
  • 11. What Else You Should Know Next time you feel like you are being deceived, examine the accused person of deception's nonverbal expression. They may exhibit something called leakage which is ,according to IDT, a manifestation most overtly seen in nonverbal signals which betrays verbal communication. If their nonverbal expressions contradict their verbal message, deception may be occurring.
  • 12. References Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary communication theory. (pp. 241-246). Dubuque: Kendall Hunt Publishing Company. Baxter, L., & Braithwaite, D. (2008). Engaging theories in interpersonal communication. Thousand Oaks, California: Sage Publications. DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129, 74- 118. doi: 10.1037/0033-2909.129.1.74
  • 13. References Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J. (2004). Language dominance in interpersonal deception in computer-mediated communication. Computers In Human Behavior, 20, 381-402. doi: 10.1016/S0747-5632(03)00051-7 Quickmeme. (n.d.). Retrieved from http://www.quickmeme.com/make