SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Interpersonal Deception Theory
By Adriana Johnson
What is it?
A theory of deception between two
communicators where predictions are made
based on characteristics of the source, receiver,
context, message,feedback, and channel (Avtgis,
Infante, & Rancer, 2009).
Receiver/Predictor Source/Deceiver
Channel
Channel
Message & Context
Feedback
What is it?
Deception, theorized by IDT, is no different from any
other form of communication.
Even if the person is truthful or deceitful, the universal
goals of effectiveness and
appropriateness are
still being followed
(Avtgis et. al.,2009).
What is it?
To be an effective deceiver, one must handle a
large amount of information in an efficient
manner.
Therefore, the receiver is active and corresponds
to the deceptive encounter.
Who uses it?
Psychologists, Communication researchers, and
Sociologists use IDT in their scientific inquiries,
empirical studies, experiments, and meta analyses. Also,
Theorist who believe messages “do things” to people
use IDT. Two leading men that have added on to IDT
are Buller and Burgoon (DePaulo, Malone, Lindsay,
Muhlenbruck, Charlton,& Cooper,2003).
Who uses it?
Buller and Burgoon developed twenty-one
propositions for the theory (Avtgis et. al., 2009).
Proposition seven states that
deceiving for self-gain prompts
more strategic activity and
nonstrategic behavior than
deceiving for the benefit of
others. This proposition can be
identified in the Madoff ponzi
scheme.
Bernard Madoff
So what…?
It's one of the most
comprehensive and developed
theories that deals with
deceptive communication.
IDT theorists expect that with
new technology, social
networking sites will extend
the present propositions to
account for the increasing
media choices for interacting.
So what…?
Not only is this theory
useful for theorists but
also detectives trying to
find online sexual
predators, investigators
examining information
from deceptive
individuals, and also
helps identify deceitful
messages on a daily
basis (Lina, Burgoon,
Dongsong, &
Nunamaker,2004).
Criticism
Since its beginning, the theory has continued to grow alongside new
deception processes. Several theorists applaud Buller and Burgoon on
their addition to the theory.
Their 21 propositions
provide a comprehensive
description of a timeline of
deceptive interactions. But the
problem with these
propositions is the lack of
predictive power necessary for
qualifying as a centralized
theory.
Criticism
According to Baxter and Braithwaite (2008),
some of the propositions are generic and intend
to emphasize variables that explain deception but
not IDT.
They also believe that IDT is not completely
substantive and only tackles the difficult issue
of whether deceivers adapt their behavior.
What Else You Should Know
Next time you feel like you are being
deceived, examine the accused person of
deception's nonverbal expression. They may
exhibit something called leakage which is
,according to IDT, a manifestation most
overtly seen in nonverbal signals which
betrays verbal communication. If their
nonverbal expressions contradict their verbal
message, deception may be occurring.
References
Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary
communication theory. (pp. 241-246). Dubuque:
Kendall Hunt Publishing Company.
Baxter, L., & Braithwaite, D. (2008). Engaging theories in
interpersonal communication. Thousand Oaks,
California: Sage Publications.
DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L.,
Charlton, K., & Cooper, H. (2003). Cues to
deception. Psychological Bulletin, 129, 74-
118. doi: 10.1037/0033-2909.129.1.74
References
Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J.
(2004). Language dominance in interpersonal
deception in computer-mediated communication.
Computers In Human Behavior, 20, 381-402. doi:
10.1016/S0747-5632(03)00051-7
Quickmeme. (n.d.). Retrieved from
http://www.quickmeme.com/make

Weitere ähnliche Inhalte

Was ist angesagt?

Uncertainty Reduction Theory
Uncertainty Reduction TheoryUncertainty Reduction Theory
Uncertainty Reduction TheoryArun Jacob
 
Persuasive communication
Persuasive communicationPersuasive communication
Persuasive communicationAsbarcourse
 
Social Penetration
Social PenetrationSocial Penetration
Social PenetrationAn Tư
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxFroilan Cantillo
 
Elements of communication By Chet Deewan
Elements of communication By Chet DeewanElements of communication By Chet Deewan
Elements of communication By Chet DeewanPPT4U
 
Theories Of Interpersonal Relationship
Theories Of Interpersonal RelationshipTheories Of Interpersonal Relationship
Theories Of Interpersonal RelationshipSubhasis Hazra
 
Eyewitness identification role of forensic psychologist abrar riaz
Eyewitness identification role of forensic psychologist abrar riazEyewitness identification role of forensic psychologist abrar riaz
Eyewitness identification role of forensic psychologist abrar riazAbrar Riaz
 
Social Information Processing Theory
Social Information Processing TheorySocial Information Processing Theory
Social Information Processing TheoryJosh Candish
 
Expectancy Violations Theory
Expectancy Violations TheoryExpectancy Violations Theory
Expectancy Violations TheoryArun Jacob
 
Deception Detection
Deception DetectionDeception Detection
Deception DetectionTravisKeenan
 
Social Information Processing theory
Social Information Processing theorySocial Information Processing theory
Social Information Processing theoryCharolene Somatis
 

Was ist angesagt? (20)

Uncertainty Reduction Theory
Uncertainty Reduction TheoryUncertainty Reduction Theory
Uncertainty Reduction Theory
 
Violence in mass media
Violence in mass media Violence in mass media
Violence in mass media
 
Persuasive communication
Persuasive communicationPersuasive communication
Persuasive communication
 
Social Penetration
Social PenetrationSocial Penetration
Social Penetration
 
Internet Addiction Disorder
Internet Addiction DisorderInternet Addiction Disorder
Internet Addiction Disorder
 
Self in a social world
Self in a social worldSelf in a social world
Self in a social world
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
Barriers in Communication
Barriers in CommunicationBarriers in Communication
Barriers in Communication
 
Elements of communication By Chet Deewan
Elements of communication By Chet DeewanElements of communication By Chet Deewan
Elements of communication By Chet Deewan
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
Theories Of Interpersonal Relationship
Theories Of Interpersonal RelationshipTheories Of Interpersonal Relationship
Theories Of Interpersonal Relationship
 
Communication
CommunicationCommunication
Communication
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
How to reduce Phone and Social Media addiction?
How to reduce Phone and Social Media addiction?How to reduce Phone and Social Media addiction?
How to reduce Phone and Social Media addiction?
 
Eyewitness identification role of forensic psychologist abrar riaz
Eyewitness identification role of forensic psychologist abrar riazEyewitness identification role of forensic psychologist abrar riaz
Eyewitness identification role of forensic psychologist abrar riaz
 
Social Information Processing Theory
Social Information Processing TheorySocial Information Processing Theory
Social Information Processing Theory
 
Expectancy Violations Theory
Expectancy Violations TheoryExpectancy Violations Theory
Expectancy Violations Theory
 
Deception Detection
Deception DetectionDeception Detection
Deception Detection
 
Persuasive communication
Persuasive communicationPersuasive communication
Persuasive communication
 
Social Information Processing theory
Social Information Processing theorySocial Information Processing theory
Social Information Processing theory
 

Andere mochten auch

The Art of Deception
The Art of DeceptionThe Art of Deception
The Art of DeceptionStephen Hay
 
Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deceptionmankoma2013
 
Interpersonal Deception Theory
Interpersonal Deception TheoryInterpersonal Deception Theory
Interpersonal Deception TheoryYusmitha Febrina
 
Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?Paul Coulton
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theoryTammy Esfandi
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. InterpretiveNathan PT
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration TheoryArun Jacob
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivismnataliea
 

Andere mochten auch (11)

The Art of Deception
The Art of DeceptionThe Art of Deception
The Art of Deception
 
Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deception
 
Detecting Deception
Detecting DeceptionDetecting Deception
Detecting Deception
 
Interpersonal Deception Theory
Interpersonal Deception TheoryInterpersonal Deception Theory
Interpersonal Deception Theory
 
Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?
 
Social Penetration theory
Social Penetration theory  Social Penetration theory
Social Penetration theory
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theory
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. Interpretive
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration Theory
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivism
 

Ähnlich wie Interpersonal Deception Theory by Adriana Johnson

Ontologies Used In Paper-Omics
Ontologies Used In Paper-OmicsOntologies Used In Paper-Omics
Ontologies Used In Paper-OmicsBrianna Johnson
 
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryDebidatta Dwibedi
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...ElmeBaje
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinAlexej Michirev
 
Samples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdfSamples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdfJanet Katarezzy
 
Samples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast EssaysSamples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast EssaysStephanie Davis
 
Bullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their LivesBullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their LivesTrading Game Pty Ltd
 
A Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion TheoriesA Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion TheoriesWendy Hager
 
International life Sciences
International life SciencesInternational life Sciences
International life Sciencessamuu45sam
 
Lived Experience Paper
Lived Experience PaperLived Experience Paper
Lived Experience PaperBrenda Higgins
 
Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...Stockholm Institute of Transition Economics
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsMilap Bhanderi
 
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message PropagationStudy: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message PropagationDaniel Honigman
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxowenhall46084
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theoryelliot7
 
The paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truthThe paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truthAlexander Decker
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxwrite31
 

Ähnlich wie Interpersonal Deception Theory by Adriana Johnson (20)

Ontologies Used In Paper-Omics
Ontologies Used In Paper-OmicsOntologies Used In Paper-Omics
Ontologies Used In Paper-Omics
 
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception Theory
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
 
Samples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdfSamples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdf
 
Samples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast EssaysSamples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast Essays
 
Bullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their LivesBullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their Lives
 
A Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion TheoriesA Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion Theories
 
International life Sciences
International life SciencesInternational life Sciences
International life Sciences
 
Lived Experience Paper
Lived Experience PaperLived Experience Paper
Lived Experience Paper
 
Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and Methods
 
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message PropagationStudy: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
 
Essay On Hiv Aids
Essay On Hiv AidsEssay On Hiv Aids
Essay On Hiv Aids
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docx
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
 
Cpdp slides
Cpdp slidesCpdp slides
Cpdp slides
 
The paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truthThe paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truth
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docx
 

Kürzlich hochgeladen

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Kürzlich hochgeladen (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Interpersonal Deception Theory by Adriana Johnson

  • 2. What is it? A theory of deception between two communicators where predictions are made based on characteristics of the source, receiver, context, message,feedback, and channel (Avtgis, Infante, & Rancer, 2009). Receiver/Predictor Source/Deceiver Channel Channel Message & Context Feedback
  • 3. What is it? Deception, theorized by IDT, is no different from any other form of communication. Even if the person is truthful or deceitful, the universal goals of effectiveness and appropriateness are still being followed (Avtgis et. al.,2009).
  • 4. What is it? To be an effective deceiver, one must handle a large amount of information in an efficient manner. Therefore, the receiver is active and corresponds to the deceptive encounter.
  • 5. Who uses it? Psychologists, Communication researchers, and Sociologists use IDT in their scientific inquiries, empirical studies, experiments, and meta analyses. Also, Theorist who believe messages “do things” to people use IDT. Two leading men that have added on to IDT are Buller and Burgoon (DePaulo, Malone, Lindsay, Muhlenbruck, Charlton,& Cooper,2003).
  • 6. Who uses it? Buller and Burgoon developed twenty-one propositions for the theory (Avtgis et. al., 2009). Proposition seven states that deceiving for self-gain prompts more strategic activity and nonstrategic behavior than deceiving for the benefit of others. This proposition can be identified in the Madoff ponzi scheme. Bernard Madoff
  • 7. So what…? It's one of the most comprehensive and developed theories that deals with deceptive communication. IDT theorists expect that with new technology, social networking sites will extend the present propositions to account for the increasing media choices for interacting.
  • 8. So what…? Not only is this theory useful for theorists but also detectives trying to find online sexual predators, investigators examining information from deceptive individuals, and also helps identify deceitful messages on a daily basis (Lina, Burgoon, Dongsong, & Nunamaker,2004).
  • 9. Criticism Since its beginning, the theory has continued to grow alongside new deception processes. Several theorists applaud Buller and Burgoon on their addition to the theory. Their 21 propositions provide a comprehensive description of a timeline of deceptive interactions. But the problem with these propositions is the lack of predictive power necessary for qualifying as a centralized theory.
  • 10. Criticism According to Baxter and Braithwaite (2008), some of the propositions are generic and intend to emphasize variables that explain deception but not IDT. They also believe that IDT is not completely substantive and only tackles the difficult issue of whether deceivers adapt their behavior.
  • 11. What Else You Should Know Next time you feel like you are being deceived, examine the accused person of deception's nonverbal expression. They may exhibit something called leakage which is ,according to IDT, a manifestation most overtly seen in nonverbal signals which betrays verbal communication. If their nonverbal expressions contradict their verbal message, deception may be occurring.
  • 12. References Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary communication theory. (pp. 241-246). Dubuque: Kendall Hunt Publishing Company. Baxter, L., & Braithwaite, D. (2008). Engaging theories in interpersonal communication. Thousand Oaks, California: Sage Publications. DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129, 74- 118. doi: 10.1037/0033-2909.129.1.74
  • 13. References Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J. (2004). Language dominance in interpersonal deception in computer-mediated communication. Computers In Human Behavior, 20, 381-402. doi: 10.1016/S0747-5632(03)00051-7 Quickmeme. (n.d.). Retrieved from http://www.quickmeme.com/make