Interpersonal deception theory
Interpersonal deception theory (IDT) attempts to explain how individuals handle actual (or perceived) deception at the conscious or subconscious level while engaged in face-to-face communication. The theory was put forth by Burgoon and Buller (1996) to explore this idea that deception is an engaging process between receiver and deceiver. IDT assumes that communication is not static; it is influenced by personal goals and the meaning of the interaction as it unfolds. The sender's overt (and covert) communications are affected by the overt and covert communications of the receiver, and vice versa. Intentional deception requires greater cognitive exertion than truthful communication, regardless of whether the sender attempts falsification (lying), concealment (omitting material facts) or equivocation (skirting issues by changing the subject or responding indirectly). IDT explores the interrelation between the sender's communicative meaning and the receiver's thoughts and behavior in deceptive exchanges. Previous research into deception was more focused on the strategies and effects of lying, leading Burgoon and Buller's research to pave the way in which researchers would look at deception as an interactive communication process in the decades to come.
Theoretical perspective
IDT views deception through the lens of interpersonal communication, considering deception as an interactive process between sender and receiver. In contrast with previous studies of deception (which focused on the sender and receiver individually), IDT focuses on the dyadic and relational nature of deceptive communication. Behaviors by sender and receiver are dynamic, multifunctional, multidimensional and multi-modal.[1]
Dyadic communication is communication between two people; a dyad is a group of two people between whom messages are sent and received. Relational communication is communication in which meaning is created by two people simultaneously filling the roles of sender and receiver. Dialogic activity is the active communicative language of the sender and receiver, each relying upon the other in the exchange. “Both individuals within the communicative situation are actively participating in strategies to obtain or achieve goals set by themselves. The decision to actively deceive or not, is not that of a passive nature, it is done with intent by both individuals during the conversation”.
In psychotherapy and psychological counseling, dyadic, relational and dialogic activity between therapist and patient relies on honest, open communication if the patient is to recover and be capable of healthier relationships. Deception uses the same theoretical framework in reverse; the communication of one participant is deliberately false.
History
Current research literature documents well that human beings are poor detectors of deception.[2] The research reveals that while people show a reliable ability to tell truth from deception, accuracy rates are only a little above chance (54%).[3]
Interpersonal Deception Theory (IDT) attempts to explain the manner in which individuals engaged in face-to-face communication deal with actual or perceived deception on the conscious and subconscious levels. IDT proposes that the majority of individuals overestimate their ability to detect deception. In some cultures, various means of deception are acceptable while other forms are not. Acceptance of deception can be found in language terms that classify, rationalize or condemn, such behavior. Deception that may be considered a simple white lie to save feelings may me be determined socially acceptable, while deception used to gain certain advantages can be determined to be ethically questionable. It has been estimated that “deception and suspected deception arise in at least one quarter of all conversations”.[4]
Interpersonal deception detection between partners is difficult unless a partner tells an outright lie or contradicts something the other partner knows is true. While it is difficult to deceive a person over a long period of time, deception often occurs in day-to-day conversations between relational partners.[5] Detecting deception is difficult because it places a significant cognitive load on the deceiver. The deceiver must recall previous statements so that their story remains consistent and believable. As a result, deceivers often leak important information both verbally and nonverbally.
In the early nineteenth century, Sigmund Freud studied nonverbal cues to detect deception about a century ago. Freud observed a patient being asked about his darkest feelings. If his mouth was shut and his fingers were trembling, he was considered to be lying. Freud also noted other nonverbal cues, such as drumming one's fingers when telling a lie. More recently, scientists have attempted to establish the differences between truthful and deceptive behavior using a myriad of psychological and physiological approaches. In 1969, Ekman and Friesen used straightforward observation methods to determine deceptive non-verbal leakage cues,[6] while more recently Rosenfeldet et al. used magnetic resonance imaging (MRI) to detect differences between honest and deceptive responses.[7]
In 1989, DePaulo and Kirkendol developed the Motivation Impairment Effect (MIE). MIE states the harder people try to deceive others, the more likely they are to get caught. Burgoon and Floyd, however, revisited this research and formed the idea that deceivers are more active in their attempt to deceive than most would anticipate or expect.
IDT was developed in 1996 by David B. Buller and Judee K. Burgoon.[8] Prior to their study, deception had not been fully considered as a communication activity. Previous work had focused upon the formulation of principles of deception. These principles were derived by evaluating the lie detection ability of individuals observing unidirectional communication. These early studies found initially that "although humans are far from infallible in their efforts to diagnose lies, they are substantially better at the task than would result merely by chance."[9] Additionally, research has shown that deception and suspected deception occurs in at least one quarter of all conversations.[10]
Buller and Burgoon discount the value of highly controlled studies – usually one-way communication experiments – designed to isolate unmistakable cues that people are lying. Therefore, IDT is based on two-way communication and intended to describe deception as an interaction communicative process.[11] In other words, deception is an interpersonal communication method that required the active participation of both the deceiver and receiver. Buller and Burgoon wanted to emphasize that both the receiver and deceiver are active participants in the deception process. Both are constantly engaged in conscious and unconscious behaviors that relay their true intentions. Buller and Burgoon initially based their theory of IPD on the four-factor model of deception developed by social psychologist Miron Zuckerman, who argues that the four components of deceit inevitably cause cognitive overload and therefore leakage. Zuckerman's four factors include the attempt to control information, which fosters behavior that can come across as too practiced, followed by physiological arousal as a result of deception. This arousal then leads to the third factor, felt emotions, which are usually guilt and anxiety, which can become noticeable to an observer. Additionally, the many cognitive factors and mental gymnastics that are going on during a deception often lead to nonverbal leakage cues, such as increased blinking and a higher pitched voice.
Propositions
IDT's model of interpersonal deception has 18 verifiable propositions. Based on assumptions of interpersonal communication and deception, each proposition can generate a testable hypothesis. Although some propositions originated in IDT, many are derived from earlier research. The propositions attempt to explain the cognition and behavior of sender and receiver during the process of deception, from before interaction through interaction to the outcome after interaction.[12]
Context and relationship
IDT's explanations of interpersonal deception depend on the situation in which interaction occurs and the relationship between sender and receiver.
- 1. Sender and receiver cognition and behaviors vary, since deceptive communication contexts vary in access to social cues, immediacy, relationship, conversational demands and spontaneity.
- 2. In deceptive interchanges, sender and receiver cognition and behaviors vary; relationships vary in familiarity (informational and behavioral) and valence.[12]
Other factors before interaction
Individuals approach deceptive exchanges with factors such as expectancy, knowledge, goals or intentions and behaviors reflecting their communication competence. IDT posits that these factors influence the deceptive exchange.
Effects on sender's deception and fear of detection
IDT posits that factors before the interaction influence the sender's deception and fear of detection.
- 4. Context moderates deception; increased interaction produces greater strategic activity (information, behavior and image management) and reduced nonstrategic activity (arousal or muted affect) over time.
- 5. Initial expectations of honesty are related to the degree of interactivity and the relationship between sender and receiver.
- 6. Deceivers' fear of detection and associated strategic activity are inversely related to expectations of honesty, a function of context and relationship quality.
- 7. Goals and motivation influence behavior.
- 8. As receivers' informational, behavioral and relational familiarity increase, deceivers have a greater fear of detection and exhibit more strategic information, behavior and image management and nonstrategic leakage behavior.
- 9. Skilled senders convey a truthful demeanor, with more strategic behavior and less nonstrategic leakage, better than unskilled ones.[12]
Effects on receiver cognition
IDT also posits that factors before the interaction, combined with initial behavior, affect receiver suspicion and detection accuracy.
- 10. Receiver judgment of sender credibility is related to receiver truth biases, context interactivity, sender encoding skills and sender deviation from expected patterns.
- 11. Detection accuracy is related to receiver truth biases, context interactivity, sender encoding skills, informational and behavioral familiarity, receiver decoding skills and sender deviation from expected patterns.[12]
Interaction patterns
IDT describes receiver suspicion and sender reaction.
- 12. Receiver suspicion is displayed in a combination of strategic and nonstrategic behavior.
- 13. Senders perceive suspicion.
- 14. Suspicion, perceived or actual, increases senders' strategic and nonstrategic behavior.
- 15. Deception and suspicion displays change over time.
- 16. Reciprocity is the predominant interaction pattern between senders and receivers during interpersonal deception.[12]
Outcomes
IDT posits that interaction between sender and receiver influences how credible the receiver thinks the sender is and how suspicious the sender thinks the receiver is.
- 17. Receiver detection accuracy, bias, and judgments of sender credibility after an interaction are functions of receiver cognition (suspicion and truth bias), receiver decoding skill and final sender behavior.
- 18. Sender perceived deception success is a function of final sender cognition (perceived suspicion) and receiver behavior.[12]
Receiver's role
Although most people believe they can spot deception, IDT posits that they cannot. A deceiver must manages his or her verbal and nonverbal cues to ensure that what they are saying appears true. According to IDT, the more socially aware a receiver is, the better he or she is at detecting deceit.
Humans have a predisposition to believe what they are told. This is referred to as a "truth bias."[13] In a common social agreement, people are honest with one another and believe that others will be honest with them. If a deceiver begins a deceptive exchange with an accurate statement, the statement may induce the receiver to believe the rest of the deceiver's story is also true. The sender prepares the receiver to accept his or her information as truth, even if some (or all) of the dialogue is false. If the sender repeats the same tactic, the receiver will become more aware that the sender is lying.[12]
When suspicion is aroused in the receiver, there are a variety of ways that this suspicion can be expressed. Burgoon & Buller (1996) emphasized that there is no uniform receiver style to express suspicion, but instead is expressed through a variety of ways that they had discovered in previous research.[14] According to Buller et al. (1991), receivers often utilize follow-up questions to question their deceivers if they begin to detect deception. Buller et al. found that this did not elicit as much suspicion as probes from nonsuspicious receivers.[15] Burgoon et al. (1995) found that some receivers engaged in a more dominant interview style to engage with their deceiver, which represents a more aggressive and "unpleasant" style of questioning that aroused suspicion on the part of the deceiver.[16]
Emotion
Emotion plays a central role in IDT as a motivation and result of deception. Emotion can motivate deception, with the sender relying on relevant knowledge (informational, relational and behavioral familiarity)[17] to achieve goals such as self-gratification, avoiding a negative emotional outcome or creating a negative emotional outcome for the target of deception. Emotion can be a result of deception, since a physical response occurs in the sender (usually arousal and negative affect).[18]
Leakage
The concept of leakage predates the development of IDT and was developed by Miron Zuckerman, et al., who created a four-factor model to explain when and why leakage is apt to occur.[19] Leakage in deception is manifested most overtly in nonverbal signals; studies indicate that over 90 percent of emotional meaning is communicated non-verbally. Humans are sensitive to body signals, and communication is often ambiguous; something is communicated verbally and its opposite non-verbally. Leakage occurs when nonverbal signals betray the true content of a contradictory verbal message. Facial expression is difficult to read, and the Facial Action Coding System (FACS) is a means of uncovering deception. Small facial movements, known as micro-expressions, can be detected in this system using action units.
Micro-expressions and action units
Action units (AUs) can be examined frame by frame, since these micro-expressions are often rapid. Paul Ekman’s research in facial deception has found several constants in certain expressions, with the action units relating to lip-corner pulling (AU12) and cheek-raising (AU6) qualifiers for happiness in most people. Brow-lowering (AU4) and lip-stretching (AU20) are disqualifiers for happiness. Emotional leakage appears in these fleeting expressions.
A study of Ekman’s observations revealed that AUs appear in over 90 percent of facial expressions. Despite the progress of the facial deception theory and the use of video to capture micro-expressions, it is more practical to search the body for signs of betraying what the sender is trying to communicate. The following signs may indicate deception:
- Increased, rapid, or strained blinking
- Dilation of the pupils
- Pitch change in voice
- Increased tempo or rate of speech
- Hesitations more pronounced
- Nonverbal and verbal inconsistencies
- Sweating
University of Virginia social psychologist Bella DePaulo has said, "Facial cues ... are indeed faking cues".
Facial expression
Seven basic emotions are communicated through facial expression: anger, fear, sadness, joy, disgust, surprise and contempt. These emotions are recognized universally. These expressions are innate of develop through socialization.
Cultures have a variety of rules governing the social use of facial expression; for example, the Japanese discourage the display of negative emotions. Individuals may find it difficult to control facial expression, and the face may "leak" information about how they feel.
Gaze
People use eye contact to indicate threat, intimacy and interest. Eye contact is used to regulate turn-taking in conversation, and indicates how interested the listener (receiver) is in what the speaker is saying. Receivers make eye contact about 70–75 percent of the time, with each contact averaging 7.8 seconds.
Gesture
Gestures are among the most culture-specific forms of nonverbal communication, and may lead to misinterpretation. Involuntary self-touching, such as touching the face, scratching, gripping the hands together or putting the hands in (or near) the mouth, occur when people experience intense emotions such as depression,[20] elation or extreme anxiety.
Ekman and Friesen demonstrated gesture leakage by showing films of a depressed woman to a group, which was asked to judge the woman's mood. Those shown only the woman's face thought she was happy and cheerful, while the group who saw only her body thought she was tense and disturbed.
Touch
Touch can reassure and indicate understanding. Humans touch one another in sexual intimacy, affiliation and understanding; in greetings and farewells; as an act of aggression, and to demonstrate dominance. According to Argyle (1996), there "appear to be definite rules which permit certain kinds of touch, between certain people, on certain occasions only. Bodily contact outside these narrow limits is unacceptable".
Criticism
DePaulo, Ansfield and Bell questioned IDT: "We can find the 'why' question in Buller and Burgoon's synthesis. There is no intriguing riddle or puzzle that needs to be solved, and no central explanatory mechanism is ever described."[21] Although they praised Buller and Burgoon's 18 propositions as a comprehensive description of the timeline of deceptive interactions, they said the propositions lacked the interconnectedness and predictive power of a unifying theory. DePaulo et al. criticized IDT for failing to distinguish between interactive communication (which emphasizes the situational and contextual aspects of communicative exchanges) from interpersonal communication, which emphasizes exchanges in which the sender and receiver make psychological predictions about the other's behavior based on specific prior knowledge; this conceptual ambiguity limited IDT's explanatory power.[22]
Park and Levine (2015) provide additional commentary questioning IDT stating that “because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims.” In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.[23]
Park and Levine provide additional commentary questioning IDT stating that “because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims.”[24] In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.
David Buller and Judee Burgoon
Buller and Burgoon have conducted over two dozen experiments in which they ask participants to deceive another person, and the researchers have found that people often find themselves in situations where they make statements that are not completely honest "to avoid hurting or offending another person, to emphasize their best qualities, to avoid getting into a conflict, or to speed up or slow down a relationship".[25]
Experiment
Buller and Burgoon asked participants to put themselves in the following situation: "You've been dating Pat for nearly three years and feel quite close in your relationship. Since Pat goes to a different school upstate, the two of you have agreed to date other people. Nevertheless, Pat is quite jealous and possessive. During the school year you see Pat only occasionally, but you call each other every Sunday and talk for over an hour. On Friday one of your friends invites you to a party on Saturday night, but the party is 'couples only' so you need a date. There's no way that Pat could come down for the weekend. You decide to ask someone from your class who you've been attracted to so that you can go to the party. The two of you go and have a great time. On Sunday afternoon, there's a knock on your door and it's Pat. Pat walks in and says, 'Decided to come down and surprise you, tried calling you all last night, but you weren't around. What were you doing?'" The researchers listed three possible responses: lying ("I was at the library getting ready for my theory exam"), telling part of the truth while omitting important details ("Went to a party at a friend's apartment") or being intentionally vague or evasive ("Went out for a while").[25]
Online dating
Research on the use of deception in online dating has shown that people are generally truthful about themselves with the exception of physical attributes to appear more attractive.[26] Most online deception is subtle with slight exaggerations, representing people's attempts to portray themselves in the best possible light.[26] Of all online contexts, online dating appears the most prone to deception. In general, no matter the setting, people are more likely to be deceptive when looking for a date than in other social situations.[27]
Research suggests that while slight misrepresentations on online dating sites are quite common, major deceptions are actually rare. It seems that those who engage in online dating realize that while they want to make the best possible impression, if they want to pursue an offline relationship, they can't begin it with outright falsehoods that will quickly be revealed.[28] One survey of over 5,000 users of online dating sites how likely they were to misrepresent themselves in areas such as appearance and job information.[29] The average rating on these items was a 2 on a 10-point scale, indicating a relatively low level of deception overall.
Some people are more prone to deceptive behavior online than others, such as those with high sensation-seeking tendencies, and those who show addictive behavior toward the Internet.[30] Conversely, those who are introverted or have high tendencies for social anxiety are especially likely to be honest about their personalities online, revealing hidden aspects of the self that they would not normally show to others offline.[31][32]
According to the Scientific American, “nine out of ten online daters will fib about their height, weight, or age” such that men were more likely to lie about height while women were more likely to lie about weight.[33] In addition, those high in the trait of self-monitoring are more likely to be dishonest on dating websites. In all aspects of their social lives, self-monitors are concerned with outward appearance and adapt their behavior to match the social situation. Thus, they also tend to be more deceptive in their attempts to attract dates both offline[27] and online.[29]
In a study conducted by Toma and Hancock, “less attractive people were found to be more likely to have chosen a profile picture in which they were significantly more attractive than they were in everyday life."[34] Both genders used this strategy in online dating profiles, but women more so than men.[34] Additionally, the researchers found that those deemed less attractive were more likely to express deception in the areas of physical attractiveness such as height and weight.
A qualitative study investigated deception in online dating. The study focused on four questions: (1) About what characteristics are online daters deceptive? (2) What motivation do online daters have for their deception of others in the online-dating environment? (3) What perceptions do online daters have about other daters' deceit towards them in the online-dating environment? (4) How does deception affect romantic relationships formed in the online-dating environment? In an online survey, data was collected from 15 open-ended questions. The study had 52 participants, ranging in age from 21 to 37, and found that most online daters consider themselves (and others) mostly honest in their online self-presentation. Online daters who used deception were motivated to do so by the desire to attract partners and project a positive self-image. Daters were willing to overlook deception in others if they viewed the dishonesty as a slight exaggeration or a characteristic of little value to the dater. Despite deception, participants believe that the online-dating environment can develop successful romantic relationships.[35]
Notes
- Buller and Burgoon, 1998
- Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E. (2008). "Cognitive Biases and Nonverbal Cue Availability in Detecting Deception". Human Communication Research. 34 (4): 572–599. doi:10.1111/j.1468-2958.2008.00333.x. ISSN 1468-2958.
- Bond, Charles F.; DePaulo, Bella M. (2006). "Accuracy of Deception Judgments". Personality and Social Psychology Review. 10 (3): 214–234. doi:10.1207/s15327957pspr1003_2. ISSN 1088-8683. PMID 16859438. S2CID 15248114.
- "PsycNET". psycnet.apa.org. Retrieved 2019-09-29.
- Laura, Guerrero (2007). Close Encounters: Communication in Relationships (2nd ed.). Los Angeles, CA: Sage. ISBN 978-1506376721.
- Ekman, Paul; Friesen, Wallace V. (1969-02-01). "Nonverbal Leakage and Clues to Deception". Psychiatry. 32 (1): 88–106. doi:10.1080/00332747.1969.11023575. ISSN 0033-2747. PMID 27785970.
- Ganis, Giorgio; Rosenfeld, J. Peter; Meixner, John; Kievit, Rogier A.; Schendan, Haline E. (2011-03-01). "Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging". NeuroImage. 55 (1): 312–319. doi:10.1016/j.neuroimage.2010.11.025. ISSN 1053-8119. PMID 21111834. S2CID 1100311.
- Buller D.B & Burgoon, J.K (1996). Interpersonal Deception Theory. Communication Theory (6) 3. 202-242.
- DePaulo, B.M., Zukerman, M., & Rosenthal, R. (1980, Spring). Humans As Lie Detectors. Journal of Communication, 30 (2) 129-139.
- https://managingresearchlibrary.org/glossary/communicative-interaction
- Buller and Burgoon, 1996
- McCornack, S.A. & Parks, M.R. (1986). Deception Detection and Relationship Development: The Other Side of Trust. In M. L. McLaughlin (Ed.) Communication Yearbook (Vol. 9 pp. 377-389). Beverly Hills, CA: Sage.
- Buller & Burgoon, 1996
- Ekman & Friensen, 1969; Zuckerman, DePaulo et al., 1981
- B. M. DePaulo, M. Zuckerman, & R. Rosenthal (1981). Advances in Experimental Social Psychology. In L. Berkowitz (Ed.) Verbal and Nonverbal Communication of Deception (Vol 14, pp. 1-59). New York, NY: Academic Press.
- https://psychcentral.com/disorders/depression/
- DePaulo et al., 1996, p. 298
- DePaulo et al., 1996; see also Stiff, 1996
- Park, H. S. & Levine, T. R. (2015). Base rates, deception detection, and deception theory: A reply to Burgoon. Human Communication Research. 41(3), 350-366.
- Park, Hee Sun; Levine, Timothy R. (2015). "Base Rates, Deception Detection, and Deception Theory: A Reply to Burgoon (2015)". Human Communication Research. 41 (3): 350–366. doi:10.1111/hcre.12066. ISSN 1468-2958. S2CID 145727128.
- http://www.afirstlook.com/docs/interpersdecep.pdf
- Zimbler, Mattitiyahu; Feldman, Robert S. (2011). "Liar, Liar, Hard Drive on Fire: How Media Context Affects Lying Behavior". Journal of Applied Social Psychology. 41 (10): 2492–2507. doi:10.1111/j.1559-1816.2011.00827.x. ISSN 1559-1816. S2CID 143240248.
- Rowatt, Wade C.; Cunningham, Michael R.; Druen, Perri B. (1999-04-01). "Lying to Get a Date: The Effect of Facial Physical Attractiveness on the Willingness to Deceive Prospective Dating Partners". Journal of Social and Personal Relationships. 16 (2): 209–223. doi:10.1177/0265407599162005. ISSN 0265-4075. S2CID 145122084.
- Toma, Catalina L.; Hancock, Jeffrey T.; Ellison, Nicole B. (2008-08-01). "Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles". Personality and Social Psychology Bulletin. 34 (8): 1023–1036. doi:10.1177/0146167208318067. ISSN 0146-1672. PMID 18593866. S2CID 9528122.
- Hall, Jeffrey A.; Park, Namkee; Song, Hayeon; Cody, Michael J. (2010-02-01). "Strategic misrepresentation in online dating: The effects of gender, self-monitoring, and personality traits". Journal of Social and Personal Relationships. 27 (1): 117–135. doi:10.1177/0265407509349633. hdl:11244/25040. ISSN 0265-4075. S2CID 145668250.
- Lu, Hung-Yi (2008-04-01). "Sensation-Seeking, Internet Dependency, and Online Interpersonal Deception". CyberPsychology & Behavior. 11 (2): 227–231. doi:10.1089/cpb.2007.0053. ISSN 1094-9313. PMID 18422419.
- Amichai-Hamburger, Yair; Wainapel, Galit; Fox, Shaul (April 2002). ""On the Internet no one knows I'm an introvert": extroversion, neuroticism, and Internet interaction". Cyberpsychology & Behavior. 5 (2): 125–128. doi:10.1089/109493102753770507. ISSN 1094-9313. PMID 12025878. S2CID 13585870.
- McKenna, Katelyn Y. A.; Green, Amie S.; Gleason, Marci E. J. (2002). "Relationship Formation on the Internet: What's the Big Attraction?". Journal of Social Issues. 58 (1): 9–31. doi:10.1111/1540-4560.00246. ISSN 1540-4560. S2CID 12086933.
- "The Truth about Online Dating". Scientific American. Retrieved 2019-09-29.
- Hancock, Jeffrey; Toma, Catalina; Ellison, Nicole (2007-01-01). "The truth about lying in online dating profiles". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '07. pp. 449–452. doi:10.1145/1240624.1240697. ISBN 9781595935939. S2CID 207162937.
- Wagner, Lyndsey. Interpersonal Relationships and Online Dating (Master's thesis). Liberty University. Retrieved July 23, 2015.
References
- Argyle M. (1996). Bodily Communication. Routledge, London: 121.
- Axtell R. (1998). Gestures. John Wiley, New York.
- Buller, D.B. and J.K. Burgoon (1996). Interpersonal Deception Theory. Communication Theory, 6(3), 203–242.
- Burgoon, Buller, White, Afifi, and Buslig (1999). Personality and Social Psychology Bulletin, Vol. 25, No. 6, 669–686.
- Burgoon, J.K. and T. Qin (2006). The Dynamic Nature of Deceptive Verbal Communication. Journal of Language and Social Psychology, 25(1): 76–96.
- DePaulo, B.M., M.E. Ansfield, and K.L. Bell (1996). Theories About Deception and Paradigms for Studying It: A Critical Appraisal of Buller and Burgoon's Interpersonal Deception Theory and Research. Communication Theory, 6(3), 297–310.
- Finlay, L. (2001). Groupwork in Occupational Therapy. Nelson Thornes, Cheltenham: 43.
- Kleck, R. and W. Nuessle (1968). Congruence between the indicative and communicative functions of eye contact. British Journal of Social and Clinical Psychology (7): 107–14.
- O'Sullivan, M. (2003). The Fundamental Attribution Error in Detecting Deception: The Boy-Who-Cried-Wolf Effect. Pers Soc Psychol Bull, 29(10): 1316–1327.
- Stiff, J.P. (1996). Theoretical Approaches to the Study of Deceptive Communication: Comments on Interpersonal Deception Theory. Communication Theory, 6(3), 289–296.
- Wainwright, G. (2003). Body Language. Hodder, London.
- Williams, D. (1997). Communication Skills in Practice: A Practical Guide for Health Professionals. Jessica Kingsley, London: 12.