Information manipulation theory


Information manipulation theory

Information Manipulation Theory (IMT)( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992;( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , [http://comm.msu.edu/people/faculty/149 Levine] , Torres, & Campbell, 1992) provides a way of looking at a unique part of the interpersonal communication process that deals with the way in which information packages (in the form of messages) are put together when being transmitted from a sender to a receiver in order to give an impression that is false from the perspective of the sender. Certain facts are placed in the message from an available amount of information while other facts are omitted, altered or falsified entirely. The act of trying to get someone to believe something which is not true is defined by Webster as deceit. The type of communication that is created as a result of such deceitful intent is called a deceptive message. This management of given information by a sender in order to provide a receiver with a perception of that same information believed to be false by the sender is referred to as information manipulation. Departing from the focus on the communication mode found in Interpersonal Deception Theory (IDT), IMT is more concerned with the content of the deceptive messages, the situational contexts that bring them about, the degree to which the detection of such a message affects perception of deception and the relational consequences associated with deceptive messages.

History and central themes

Information Manipulation Theory (IMT) was formulated by [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx Steven A. McCornack] while an assistant professor and a Lilly Endowment Teaching Fellow at Michigan State University. In 1992, [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] published two articles that are recognized as the seminal works in Information Manipulation Theory. In his first article, [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] lays out the basic foundation of this theoretical option for examining the phenomenon of creating and relaying deceptive messages. As stated, IMT “suggests that deceptive messages function deceptively because they violate the principles that govern conversational exchanges.” ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992) It is noteworthy to mention that [http://comm.msu.edu/people/faculty/149 Timothy Levine] (PhD, Michigan State University, 1992)
was present for the first empirical test for Information Manipulation Theory
and has been a significant contributor to the development of IMT.

Operational context

Information Manipulation Theory, not unlike Interpersonal Deception Theory (IDT) is a subset and functional manifestation of interpersonal communication. According to David Buller and Judee [http://www.u.arizona.edu/~judee/ Burgoon] , “Deception is conceptualized as a form of information management, something that is fundamental to human communication.” (Buller and [http://www.u.arizona.edu/~judee/ Burgoon] , 1998) IMT is concerned with the way in which relational goals and situational pressures influence the interpersonal communication process and ultimately leads to the formation and implementation of deceptive verbal messages.

Conceptual foundation

Prior to the introduction of Information Manipulation Theory as a potential way to observe the phenomenon of verbally controlling information there was literature on the subject of information control and deception in general. [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] cites Turner, Edgley and Olmstead circa 1975 and how they “noted several forms of information control in their study of conversations (e.g. “lies,” “exaggerations,” “half-truths,” “secrets,” and diversionary responses.” ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 1992) Buller and [http://www.u.arizona.edu/~judee/ Burgoon] again draw upon Turner et al., when referring to deception as “a very common form of information management in human interaction.” (Buller and [http://www.u.arizona.edu/~judee/ Burgoon] , 1998) With the notion of deception already being established in circles of communication studies and behavioral science as a topic of discussion and analysis by the 1980’s, we have the development of conceptual constructs regarding the topic. In 1984, R. Hopper and R.A. Bell introduce a typology of deceptive types using English terms. The types noted in [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] ’s work are listed as follows: unlies, playings, fiction, masks, lies, and crimes. ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 1992) In another oft cited work from the 1980’s, we are given another typology. In 1986, S. Metts and H. Chronis propose another four types and in 1989 Metts asserted that regardless of the differences in semantics, all the “taxonomies” to date reflected a similarity in the formulation of deceptive messages. Metts states “the observable variation in deceptive message design reflects “a continuum of covert to overt misrepresentation of information.”( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 1992) Finally, you have Interpersonal Deception Theory (IDT) introduced in 1988 by David Buller and [http://www.u.arizona.edu/~judee/ Judee Burgoon] which proposes that deception is a distinct communicative process that relies on interaction between the sender and receiver. IDT focuses on emotion both as a motivator and message in the process as well as the mechanical aspects of how that communication takes place. (Buller and [http://www.u.arizona.edu/~judee/ Burgoon] , 1998)

Theoretical perspective

Information Manipulation Theory departs from Interpersonal Deception Theory in the substance of the focus of its studies. Whereas Interpersonal Deception Theory (IDT) spends more time studying the physiological challenges and channels of communication involved in the detection of deceptive messages, Information Manipulation Theory is more involved with the content of the messages and why they are employed. This is a distinction that can be examined in terms of how these theories approach the divergence from communication norms. IDT is more involved with the physical and biological deviation of normal behavior exhibited in communication. IMT is more fixed on the departure from conversational standards. Both theories aimed at discovering more about the relational affect of discovering that an act of deception has taken place.

Previous research

Before the advent of Information Manipulation Theory, researchers were not interested in the formulation or design of the deceptive message. Previous studies on deception were more concerned with the mode of communication because deception was thought to occur in typical human interactions in unnatural polarized ways. Additionally, use of recollection as a method generating “normal” cognitive examples of deception scenarios further led to this dichotomous perspective. Truth in communication was thought to be clear or unclear. Bavelas et al.,’s work in 1990 speaks to this issue. ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992) Deception was also viewed to have manifested as either one of two of things: a type or a strategy. [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] sought to depart from that and present another argument for how deceptive messages might be analyzed. IMT recognizes deception as a unique mode of communication that departs from more traditional, rational communicative behavior. IMT is more directed at answering the question of how a sender might go about engaging in the development and dispensation of a deceptive message and what about that process makes it more or less deceptive. ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992)

Theoretical framework

Information Manipulation Theory proposes that in any given conversation there exists a set of basic, reasonable assumptions about how transmission of information occurs. This premise is based on the work of Paul Grice. Taken from his speeches in 1967 to writings in 1975 and 1989, Grice promoted notions regarding language usage that has come to be known as his theory of “conversational implicature”(CI).( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992)

*"Conversational implicature"

Jacobs, Dawson and Brashers recount Grice stating “communication is made possible by communicators’ mutually orienting toward general principles of cooperation and rationality.” (Jacobs et al., 1996) The vehicles that deliver CI are what Grice refers to as conversational maxims (CM). CM can be used as dimensions to determine the degree of deceptiveness.

*"Conversational maxims"

These maxims are as follows:
# Quantity — relates to expectations regarding the reasonable amount of information that should be provided in a given message
# Quality — relates to expectations regarding the veracity (truthfulness) of information that is presented in a given message
# Relation — relates to relevancy expectations regarding the constraints of the conversation established by earlier remarks
# Manner — relates to expectations regarding the way something is said( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992)

*"Cooperative principle"

Grice posits that the resulting ‘norm’ that arises from adherence to CM is by virtue of what’s called the Cooperative Principle (CP).

These maxims are only totally adhered to in what is called ‘a philosopher’s paradise’ but generally these maxims can be adhered to within a conversational context. Grice calls the obvious real world violation of a CM as “flouts”; when one CM opposes another, this is referred to as a “clash.” (Jacobs et al., 1996) In the case of the former the this violation can happen “quietly.” It is a major tenet of IMT that the subtle and covert nature of these violations of conversational norm assumptions is
precisely what makes a message deceptive. A message a can be identified in terms of its deceptiveness dependent on
where it is measured according to the dimensions of the conversational maxims.( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992)

Major experimental findings

* The initial experiments regarding Information Manipulation Theory confirmed that the degree to which a message can be determined to be deceptive can be coded and measured along the dimensions of its violations of CM. The deception by the receiver is experienced when the CP understood to occur is not adhered to by the sender. This experiment also questioned the relative social ‘competence’ of full disclosure of available information compared to social goal or consequences.( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 1992)

* The second set of experiments measure the effect of the dimensions compared to each other. It was discovered some violations were considered “more deceptive” than others. Another discovery was that the nature of the relationship has an effect on the relative social ‘competence’ of full disclosure. In regard to romantic relationships, full disclosure is more ‘competent’ because relational honesty was considered paramount. ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , 1992)

* Another significant experiment was performed in order to see if the results of [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] ’s theory could be generalized outside of Western cultures. This was examined through the lens of the individualist vs. collectivist debate. These two cultural poles are regarded as the most overarching themes of cultural identity and perspective. With the U.S. regarded as being representative of the Individualist perspective, Hong Kong was chosen to represent the Collectivist perspective. The dimensions of quality and relevance were regarded as deceptive, but not the other dimensions. This experiment concluded that what is seen as “truthful’, what violations are acceptable, the motivation for those violations and what is understood to be a conversational maxim is dependent on cultural identity. (Yeung, [http://comm.msu.edu/people/faculty/149 Levine] and Nishiyama, 1999)
* Another experiment performed by L. Zhou and S. Lutterbie followed the work of the aforementioned tests of IMT. This experiment concluded that the best way to apply the principles of IMT across cultures is to take a multi-directional, multi-prong approach. This subject of normative actions in conversation should be approached with a top-down and bottom-up approach. (Zhou and Lutterbie, 2005)

Influential factors

*"Cultural concept"

IMT as it is applied in cultural contexts varies. When evaluating Western culture it was discovered that all methods of manipulation were viewed as deceptive with manipulation of quality rated as most deceptive. Conversely, IMT participants in Hong Kong only rated statements involved with quality and/or relevance as more manipulative and deceptive. (Zhou and Lutterbie, 2005) Both researchers agree that the Bottom-Up approach is an effective method for examining general patterns of deception across cultures while the Top-Down approach can account for situational variations to explain deceptive behavior patterns in order to create an applicable cross-cultural IMT model.

*"Moral judgment"

Research suggests young children's view of how information is perceived as deceptive varies as children grow older. This variation in moral judgment suggests that moral development is critical in perceptions of right or wrong. As individuals experience a series of (moral) developmental stages such as avoiding punishment, gaining rewards, identifying individual duty role in society to meet expectations of others, (Zhou and Lutterbie, 2005), different behavior modeling criteria is established through communication situations that cognitively stimulates and challenges moral judgment. These stages, frequency and types of development models are theorized to be more or less universal across cultures. However, moral judgment in IMT should be reserved for other communication theory that more distinctly addresses broad, generic cultural criteria patterns and specific requirements of societies to establish what does or does not covertly violate global conversational maxims.
*"Consequence resulting from the deceptive message"

IMT supports the idea that deception may or may not be detectable. When participants are asked to rate message features like how much information was false, omitted, equivocal and/or irrelevant, researchers can reasonably measure and describe such multidimensional deceptive messages. However, the measurability results and conceptual meaning of degrees of deception and its impact is unclear. ( [http://comm.msu.edu/people/faculty/149 Levine] ,Asada and Lindsey, 2003) Information that is manipulated on a continuum from trivial deception to important deception can range from socially acceptable to morally reprehensible. The more severe lies are rated, the more deceptive the lies than inconsequential ones. Deceiving others about important information is more likely to result in result in adverse moral judgment and/or moral condemnation.

Criticism of IMT

The most significant criticism of Information Manipulation Theory has come in the form of the following two arguments:

* IMT does not correctly interpret the writings of Paul Grice's notion of Conversational Implicature, Conversational Maxims or Cooperation Principle. This issue was addressed in a critical rejoinder by [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , [http://comm.msu.edu/people/faculty/149 Levine] , Morrison and Lapinski ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 2005)IMT provides an explanation for the multiple ways in which deception can occur but it does not predict what conversational maxims a person may violate; only that the violation will occur within the certain realm of possibilities or scenarios provided. IMT predicts and analyzes the methods of deception a person uses by determining what information will be eliminated.

* IMT testing predictions can be made more accurate by use of a different set of information dimensions .This issue was also addressed in a critical rejoinder by [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , [http://comm.msu.edu/people/faculty/149 Levine] , Morrison and Lapinski ( [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] et al., 2005)IMT is a value conscious communication theory. The researcher must judge and develop criteria for what may be considered deceptiveness. While violations of the maxim of quality and quantity are more or less objectively derived, violations of relation and manner are largely subjectively assessed. For this reason the researcher must be aware of his/her own bias, value and belief systems and incorporate these predispositions when making these judgments. Researchers must also construct sound, qualitative/quantitative evaluative criteria to optimize and legitimize the integrity and credibility of their work.

References

Buller, D., [http://www.u.arizona.edu/~judee/ Burgoon] , J. (1992).Another look at information management: A rejoinder to [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , Levin, Morrison and Lapinski. Communication Monographs, Volume 59.pp.92-98

Buller, D.B., [http://www.u.arizona.edu/~judee/ Burgoon] , J.K., (1998). Emotional Expression in the Deception Process, In P.A. Andersen, L. Guerrero Eds.), Handbook of Communication and Emotion: Research, theory, applications, and contexts. San Diego: Academic Press. Pages 381-402.
Grice , P. (1989) Studies in the way of words. Cambridge, MA. Harvard University Press Jacobs, S., Dawson, J., Brashers, D., (1996). Communication Monographs, Volume 63, March 1996, pages 71-82. [http://comm.msu.edu/people/faculty/149 Levine] , T., Asada, K., Lindsey, L. (2003). The Relative Impact of Violation Type and Lie Severity on Judgments of Message Deceitfulness, Communication Research Reports, Volume 20, Number 3, pages 208-218. [http://comm.msu.edu/people/faculty/149 Levine] , T., Lapinski, M., Banas, J., Wong, N., Hu, A., Endo, K., Baum, K., Anders, L., (2002). Self-Construal, Self and Other Benefit, and the Generation of Deceptive Messages, Journal of Intercultural Communication Research, Volume 31, Number , pages 29-45. [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , S.A. (1992). Information Manipulation Theory, Communication Monographs, Volume 59, March. pp. 1-16 [http://www.bedfordstmartins.com/preview/0312259492/meetauthor.aspx McCornack] , S.A, [http://comm.msu.edu/people/faculty/149 Levine] , T.R., Torres, H.I, Campbell, D.M. (1992). When the alteration of information is viewed as deception: An empirical test of information manipulation theory. Communication Monographs, Volume 59, March. pp. 17-29. Zhou, L., Lutterbie, S., (2005). Deception Across Cultures: Bottom-Up and Top-Down Approaches, P.Kamor et al. (Eds.): ISI 2005, LNCS, pages. 465-470.


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Information society — For other uses, see Information society (disambiguation). The aim of the information society is to gain competitive advantage internationally through using IT in a creative and productive way. An information society is a society in which the… …   Wikipedia

  • Information Processing Language — (IPL) is a programming language developed by Allen Newell, Cliff Shaw, and Herbert Simon at RAND Corporation and the Carnegie Institute of Technology from about 1956. Newell had the role of language specifier application programmer, Shaw was the… …   Wikipedia

  • Information communication technology — Information and Communications Technology or technologies (ICT) is an umbrella term that includes all technologies for the manipulation and communication of information. The term is sometimes used in preference to Information Technology (IT),… …   Wikipedia

  • Information science — Not to be confused with Information theory. Contents 1 Introduction 2 A multitude of information sciences? 3 Definitions of information science 4 History …   Wikipedia

  • Information systems — The term information system (IS) sometimes refers to a system of persons, data records and activities that process the data and information in an organization, and it includes the organization s manual and automated processes. Computer based… …   Wikipedia

  • Information Age — A visualization of the various routes through a portion of the Internet. The Information Age, also commonly known as the Computer Age or Digital Age, is an idea that the current age will be characterized by the ability of individuals to transfer… …   Wikipedia

  • Information Warfare — Informationskrieg (engl. Infowar oder Information warfare) ist eine Bezeichnung für die gezielte Nutzung und Manipulation von gesteuerten Informationen, um in der Wirtschaft oder in der Politik Vorteile gegenüber Konkurrenten und Gegnern zu… …   Deutsch Wikipedia

  • information science — noun A broad and interdisciplinary science that deals with the gathering, classification, storage, manipulation, retrieval and analysis of information as an organized resource …   Wiktionary

  • Crowd manipulation — March on Washington for Jobs and Freedom in 1963 led by Martin Luther King Vladmir Lenin addresses a crowd of chee …   Wikipedia

  • Signalling theory — Within evolutionary biology, signalling theory refers to a body of theoretical work examining communication between individuals. The central question is when animals with conflicting interests should be expected to communicate honestly .… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.