Information manipulation theory

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Information manipulation theory (IMT) (McCornack 1992) & (McCornack et al. 1992) provides a way of looking at a unique part of the interpersonal communication process that deals with the way in which information packages (in the form of messages) are put together when being transmitted from a sender to a receiver in order to give an impression that is false from the perspective of the sender. Certain facts are placed in the message from an available amount of information while other facts are omitted, altered or falsified entirely. The act of trying to get someone to believe something which is not true is defined by Webster as deceit. The type of communication that is created as a result of such deceitful intent is called a deceptive message. This management of given information by a sender in order to provide a receiver with a perception of that same information believed to be false by the sender is referred to as information manipulation. Departing from the focus on the communication mode found in Interpersonal Deception Theory (IDT), IMT is more concerned with the content of the deceptive messages, the situational contexts that bring them about, the degree to which the detection of such a message affects perception of deception and the relational consequences associated with deceptive messages.

History and central themes[edit]

Information manipulation theory (IMT) was formulated by Steven A. McCornack while an assistant professor and a Lilly Endowment Teaching Fellow at Michigan State University. In 1992, McCornack published two articles that are recognized as the seminal works in information manipulation theory. In his first article, McCornack lays out the basic foundation of this theoretical option for examining the phenomenon of creating and relaying deceptive messages. As stated, IMT “suggests that deceptive messages function deceptively because they violate the principles that govern conversational exchanges” (McCornack 1992). The second article (McCornack et al. 1992) provided an empirical test of the theory.

Timothy Levine (PhD, Michigan State University, 1992) was present for the first empirical test for information manipulation theory, has been a significant contributor to the development of IMT, and is a leader in developing new paradigms for deception detection research. IMT provided impetus to the development of a message-based theory of deception detection that calls into question psychophysical and emotion-based theories of deception detection as well as the interaction-based IDT.

Operational context[edit]

Information manipulation theory, not unlike Interpersonal Deception Theory (IDT) is a subset and functional manifestation of interpersonal communication. According to David Buller and Judee Burgoon, “Deception is conceptualized as a form of information management, something that is fundamental to human communication (Buller & Burgoon 1998).” IMT is concerned with the way in which relational goals and situational pressures influence the interpersonal communication process and ultimately leads to the formation and implementation of deceptive verbal messages.

Conceptual foundation[edit]

Prior to the introduction of information manipulation theory as a potential way to observe the phenomenon of verbally controlling information there was literature on the subject of information control and deception in general. McCornack cites Turner, Edgley and Olmstead (1975) and how they “noted several forms of information control in their study of conversations (e.g. “lies,” “exaggerations,” “half-truths,” “secrets,” and diversionary responses) (McCornack et al. 1992).” Buller and Burgoon again draw upon Turner et al. when referring to deception as “a very common form of information management in human interaction (Buller and Burgoon 1998).” With the notion of deception already being established in circles of communication studies and behavioral science as a topic of discussion and analysis by the 1980s, we have the development of conceptual constructs regarding the topic. In 1984, Hopper and Bell introduce a typology of deceptive types using English terms. The types noted in McCornack’s work are listed as follows: unlies, playings, fiction, masks, lies, and crimes (McCornack et al. 1992). In another oft-cited work from the 1980s, we are given another typology. In 1986, Metts and Chronis proposed another four types and in 1989 Metts asserted that regardless of the differences in semantics, all the “taxonomies” to date reflected a similarity in the formulation of deceptive messages. Metts states “the observable variation in deceptive message design reflects “a continuum of covert to overt misrepresentation of information.” (McCornack et al., 1992) Finally, you have Interpersonal Deception Theory (IDT) introduced in 1988 by David Buller and Judee Burgoon which proposes that deception is a distinct communicative process that relies on interaction between the sender and receiver. IDT focuses on emotion both as a motivator and message in the process as well as the mechanical aspects of how that communication takes place (Buller and Burgoon 1998).

Theoretical perspective[edit]

Information manipulation theory departs from Interpersonal Deception Theory in the substance of the focus of its studies. Whereas Interpersonal Deception Theory (IDT) spends more time studying the physiological challenges and channels of communication involved in the detection of deceptive messages, information manipulation theory is more involved with the content of the messages and why they are employed. This is a distinction that can be examined in terms of how these theories approach the divergence from communication norms. IDT is more involved with the physical and biological deviation of normal behavior exhibited in communication. IMT is more fixed on the departure from conversational standards. Both theories aimed at discovering more about the relational affect of discovering that an act of deception has taken place.

Previous research[edit]

Before the advent of information manipulation theory, researchers were not interested in the formulation or design of the deceptive message. Previous studies on deception were more concerned with the mode of communication because deception was thought to occur in typical human interactions in unnatural polarized ways. Additionally, use of recollection as a method generating “normal” cognitive examples of deception scenarios further led to this dichotomous perspective. Truth in communication was thought to be clear or unclear. Bavelas et al. (1990) speak to this issue (McCornack 1992). Deception was also viewed to have manifested as either one of two of things: a type or a strategy. McCornack sought to depart from that and present another argument for how deceptive messages might be analyzed. IMT recognizes deception as a unique mode of communication that departs from more traditional, rational communicative behavior. IMT is more directed at answering the question of how a sender might go about engaging in the development and dispensation of a deceptive message and what about that process makes it more or less deceptive (McCornack 1992).

Theoretical framework[edit]

Information manipulation theory proposes that in any given conversation there exists a set of basic, reasonable assumptions about how transmission of information occurs. This premise is based on the work of Paul Grice. Taken from his speeches in 1967 to writings in 1975 and 1989, Grice promoted notions regarding language usage that has come to be known as his theory of “conversational implicature” (CI) (McCornack 1992).

  • Conversational implicature

Jacobs, Dawson and Brashers (1996) recount Grice stating “communication is made possible by communicators’ mutually orienting toward general principles of cooperation and rationality.” The vehicles that deliver CI are what Grice refers to as conversational maxims (CM). CM can be used as dimensions to determine the degree of deceptiveness.

  • Conversational maxims

These maxims are as follows:

  1. Quantity — relates to expectations regarding the reasonable amount of information that should be provided in a given message
  2. Quality — relates to expectations regarding the veracity (truthfulness) of information that is presented in a given message
  3. Relation — relates to relevancy expectations regarding the constraints of the conversation established by earlier remarks
  4. Manner — relates to expectations regarding the way something is said

(McCornack 1992)

  • Cooperative principle

Grice posits that the resulting ‘norm’ that arises from adherence to CM is by virtue of what is called the Cooperative Principle (CP).

These maxims are only totally adhered to in what is called ‘a philosopher’s paradise’ but generally these maxims can be adhered to within a conversational context. Grice calls the obvious real world violation of a CM as “flouts”; when one CM opposes another, this is referred to as a “clash” (Jacobs et al. 1996). In the case of the former this violation can happen “quietly.”

It is a major tenet of IMT that the subtle and covert nature of these violations of conversational norm assumptions is precisely what makes a message deceptive. A message can be identified in terms of its deceptiveness dependent on where it is measured according to the dimensions of the conversational maxims (McCornack 1992).

Major experimental findings[edit]

  • The initial experiments regarding information manipulation theory confirmed that the degree to which a message can be determined to be deceptive can be coded and measured along the dimensions of its violations of CM. The deception by the receiver is experienced when the CP understood to occur is not adhered to by the sender. This experiment also questioned the relative social ‘competence’ of full disclosure of available information compared to social goal or consequences (McCornack et al. 1992).
  • The second set of experiments measure the effect of the dimensions compared to each other. It was discovered some violations were considered “more deceptive” than others. Another discovery was that the nature of the relationship has an effect on the relative social ‘competence’ of full disclosure. In regard to romantic relationships, full disclosure is more ‘competent’ because relational honesty was considered paramount (McCornack 1992).
  • Another significant experiment was performed in order to see if the results of McCornack’s theory could be generalized outside of Western cultures. This was examined through the lens of the individualist vs. collectivist debate. These two cultural poles are regarded as the most overarching themes of cultural identity and perspective. With the U.S. regarded as being representative of the Individualist perspective, Hong Kong was chosen to represent the Collectivist perspective. The dimensions of quality and relevance were regarded as deceptive, but not the other dimensions. This experiment concluded that what is seen as “truthful’, what violations are acceptable, the motivation for those violations and what is understood to be a conversational maxim is dependent on cultural identity (Yeung, Levine, & Nishiyama 1999).
  • Another experiment performed by L. Zhou and S. Lutterbie followed the work of the aforementioned tests of IMT. This experiment concluded that the best way to apply the principles of IMT across cultures is to take a multi-directional, multi-prong approach. This subject of normative actions in conversation should be approached with a top-down and bottom-up approach (Zhou & Lutterbie 2005).

Influential factors[edit]

  • Cultural concept

IMT as it is applied in cultural contexts varies. When evaluating Western culture it was discovered that all methods of manipulation were viewed as deceptive with manipulation of quality rated as most deceptive. Conversely, IMT participants in Hong Kong only rated statements involved with quality and/or relevance as more manipulative and deceptive (Zhou & Lutterbie 2005). Both researchers agree that the Bottom-Up approach is an effective method for examining general patterns of deception across cultures while the Top-Down approach can account for situational variations to explain deceptive behavior patterns in order to create an applicable cross-cultural IMT model.

  • Moral judgment

Research suggests young children's view of how information is perceived as deceptive varies as children grow older. This variation in moral judgment suggests that moral development is critical in perceptions of right or wrong. As individuals experience a series of (moral) developmental stages such as avoiding punishment, gaining rewards, identifying individual duty role in society to meet expectations of others (Zhou & Lutterbie 2005), different behavior modeling criteria is established through communication situations that cognitively stimulates and challenges moral judgment. These stages, frequency and types of development models are theorized to be more or less universal across cultures. However, moral judgment in IMT should be reserved for other communication theory that more distinctly addresses broad, generic cultural criteria patterns and specific requirements of societies to establish what does or does not covertly violate global conversational maxims.

  • Consequence resulting from the deceptive message

IMT supports the idea that deception may or may not be detectable. When participants are asked to rate message features like how much information was false, omitted, equivocal and/or irrelevant, researchers can reasonably measure and describe such multidimensional deceptive messages. However, the measurability results and conceptual meaning of degrees of deception and its impact is unclear (Levine, Asada & Lindsey 2003). Information that is manipulated on a continuum from trivial deception to important deception can range from socially acceptable to morally reprehensible. The more severe lies are rated, the more deceptive the lies than inconsequential ones. Deceiving others about important information is more likely to result in adverse moral judgment and/or moral condemnation.

Criticism of IMT[edit]

The most significant criticism of information manipulation theory has come in the form of the following two arguments:

  • IMT does not correctly interpret the writings of Paul Grice's notion of Conversational Implicature, Conversational Maxims or Cooperation Principle. This issue was addressed in a critical rejoinder by McCornack et al. (1996). IMT provides an explanation for the multiple ways in which deception can occur but it does not predict what conversational maxims a person may violate; only that the violation will occur within the certain realm of possibilities or scenarios provided. IMT predicts and analyzes the methods of deception a person uses by determining what information will be eliminated.
  • IMT testing predictions can be made more accurate by use of a different set of information dimensions. This issue was also addressed in thr critical rejoinder by McCornack et al. (1996). IMT is a value conscious communication theory. The researcher must judge and develop criteria for what may be considered deceptiveness. While violations of the maxim of quality and quantity are more or less objectively derived, violations of relation and manner are largely subjectively assessed. For this reason the researcher must be aware of his/her own bias, value and belief systems and incorporate these predispositions when making these judgments. Researchers must also construct sound, qualitative/quantitative evaluative criteria to optimize and legitimize the integrity and credibility of their work.

References[edit]

Bavelas, J.B., Black, A., Chovil, N., & Mullett, J. (1990) Equivocal communication. Sage series in interpersonal communication, Volume 11. Thousand Oaks, CA: Sage.

Buller, D.B., & Burgoon, J.K. (1996). Another look at information management: A rejoinder to McCornack, Levine, Morrison and Lapinski. Communication Monographs 63, 92–98.

Buller, D.B., & Burgoon, J.K. (1998). Emotional expression in the deception process, In P.A. Andersen, L. Guerrero, (Eds.), Handbook of Communication and Emotion: Research, Theory, Applications, and Contexts. San Diego: Academic Press, 381-402.

Grice, P. (1989). Studies in the Way of Words. Cambridge, MA. Harvard University Press.

Hopper, R., & Bell, R. A. (1984). Broadening the deception construct. Quarterly Journal of Speech 70(3), 288-302.

Jacobs, S., Dawson, J., Brashers, D. (1996). Communication Monographs 63, 71–82.

Levine, T., Asada, K., & Lindsey, L. (2003). The relative impact of violation type and lie severity on judgments of message deceitfulness, Communication Research Reports 20(3), 208-218.

Levine, T.R., Lapinski, M.K., Banas, J., Wong, N.C., Hu, A.D.S., Endo, K., Baum, K.L., & Anders, L.N. (2002). Self-construal, self and other benefit, and the generation of deceptive messages. Journal of Intercultural Communication Research 31(1), 29–47.

McCornack, S.A. (1992). Information manipulation theory. Communication Monographs 59, 1–16.

McCornack, S.A., Levine, T.R., Morrison, K., & M. Lapinski (1996). Speaking of information manipulation: A critical rejoinder. Communication Monographs 63, 83-92.

McCornack, S.A, Levine, T.R., Solowczuk, K.A., Torres, H.I, & Campbell, D.M. (1992). When the alteration of information is viewed as deception: An empirical test of information manipulation theory. Communication Monographs 59, 17–29.

Metts, S. (1989). An exploratory investigation of deception in close relationships. Journal of Social and Personal Relationships 6(2), 159-179.

Metts, S., & Chronis, H. (1986). An exploratory investigation of relational deception. Paper presented at the annual meeting of the International Communication Association, Chicago.

Turner, R.E., Edgley, C., & Olmstead, G. (1975). Information control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology 11(1), 69-89.

Yeung, L.N.T., Levine, T.R., & Nishiyama, K. (1999). Information manipulation theory and perceptions of deception in Hong Kong. Communication Reports 12(1), 1-11.

Zhou, L., & Lutterbie, S. (2005). Deception across cultures: Bottom-up and top-down approaches. Presented at IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA.