Author:
Walther Michelle,Petrov Petar,Smith Ryan,Young Danielle,de Vries Peter W.,Stel Marielle
Abstract
Background:
Little research has been done on nonverbal deception cues in computer-mediated communication (CMC). However, deception is a daily occurrence and since much communication is shifting towards CMC, it is important to understand the difference between truthful and deceptive messages.
Objective:
This research obtained more insight in the use of emoji in deceptive messages by answering the question: Are the frequency and type of emoji different in deceptive compared to truthful online messages?
Methods:
Participants sent three screenshots of deceptive, and truthful messages to WhatsApp. The used emoji were counted and sorted into levels of valence (positive, negative, and neutral) and intensity (strong versus weak).
Results:
The results indicated that participants used more negative, weak emoji in deceptive compared with truthful messages and more positive, weak, and strong emoji in truth compared with deceit. No difference was found for the emoji frequency.
Discussion:
The results are discussed in the light of earlier research. However, this is the first study investigating the use of emoji in the context of computer-mediated deception.
Conclusion:
The type of emoji can be indicative of used as a nonverbal deception cue in online messages.
Publisher
Bentham Science Publishers Ltd.
Reference50 articles.
1. Buller DB, Burgoon JK.
Interpersonal Deception Theory.
Commun Theory
1996;
6
(3)
: 203-42.
2. DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM, Epstein JA.
Lying in everyday life.
J Pers Soc Psychol
1996;
70
(5)
: 979-95.
3. DePaulo BM, Lindsay JJ, Malone BE, Muhlenbruck L, Charlton K, Cooper H.
Cues to deception.
Psychol Bull
2003;
129
(1)
: 74-118.
4. Carter KA.
Type me how you feel: Quasi-nonverbal cues in computer-mediated communication.
ETC Rev Gen Semant
2003;
60
(1)
: 29-39.
5. Burgoon JK, Blair JP, Qin T, Nunamaker JF.
Detecting Deception through Linguistic Analysis.
Intelligence and Security Informatics Berlin, Heidelberg: Springer
Lecture Notes in Computer Science
2003;
91-101.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献