SlideShare une entreprise Scribd logo
1  sur  13
Interpersonal Deception Theory
By Adriana Johnson
What is it?
A theory of deception between two
communicators where predictions are made
based on characteristics of the source, receiver,
context, message,feedback, and channel (Avtgis,
Infante, & Rancer, 2009).
Receiver/Predictor Source/Deceiver
Channel
Channel
Message & Context
Feedback
What is it?
Deception, theorized by IDT, is no different from any
other form of communication.
Even if the person is truthful or deceitful, the universal
goals of effectiveness and
appropriateness are
still being followed
(Avtgis et. al.,2009).
What is it?
To be an effective deceiver, one must handle a
large amount of information in an efficient
manner.
Therefore, the receiver is active and corresponds
to the deceptive encounter.
Who uses it?
Psychologists, Communication researchers, and
Sociologists use IDT in their scientific inquiries,
empirical studies, experiments, and meta analyses. Also,
Theorist who believe messages “do things” to people
use IDT. Two leading men that have added on to IDT
are Buller and Burgoon (DePaulo, Malone, Lindsay,
Muhlenbruck, Charlton,& Cooper,2003).
Who uses it?
Buller and Burgoon developed twenty-one
propositions for the theory (Avtgis et. al., 2009).
Proposition seven states that
deceiving for self-gain prompts
more strategic activity and
nonstrategic behavior than
deceiving for the benefit of
others. This proposition can be
identified in the Madoff ponzi
scheme.
Bernard Madoff
So what…?
It's one of the most
comprehensive and developed
theories that deals with
deceptive communication.
IDT theorists expect that with
new technology, social
networking sites will extend
the present propositions to
account for the increasing
media choices for interacting.
So what…?
Not only is this theory
useful for theorists but
also detectives trying to
find online sexual
predators, investigators
examining information
from deceptive
individuals, and also
helps identify deceitful
messages on a daily
basis (Lina, Burgoon,
Dongsong, &
Nunamaker,2004).
Criticism
Since its beginning, the theory has continued to grow alongside new
deception processes. Several theorists applaud Buller and Burgoon on
their addition to the theory.
Their 21 propositions
provide a comprehensive
description of a timeline of
deceptive interactions. But the
problem with these
propositions is the lack of
predictive power necessary for
qualifying as a centralized
theory.
Criticism
According to Baxter and Braithwaite (2008),
some of the propositions are generic and intend
to emphasize variables that explain deception but
not IDT.
They also believe that IDT is not completely
substantive and only tackles the difficult issue
of whether deceivers adapt their behavior.
What Else You Should Know
Next time you feel like you are being
deceived, examine the accused person of
deception's nonverbal expression. They may
exhibit something called leakage which is
,according to IDT, a manifestation most
overtly seen in nonverbal signals which
betrays verbal communication. If their
nonverbal expressions contradict their verbal
message, deception may be occurring.
References
Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary
communication theory. (pp. 241-246). Dubuque:
Kendall Hunt Publishing Company.
Baxter, L., & Braithwaite, D. (2008). Engaging theories in
interpersonal communication. Thousand Oaks,
California: Sage Publications.
DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L.,
Charlton, K., & Cooper, H. (2003). Cues to
deception. Psychological Bulletin, 129, 74-
118. doi: 10.1037/0033-2909.129.1.74
References
Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J.
(2004). Language dominance in interpersonal
deception in computer-mediated communication.
Computers In Human Behavior, 20, 381-402. doi:
10.1016/S0747-5632(03)00051-7
Quickmeme. (n.d.). Retrieved from
http://www.quickmeme.com/make

Contenu connexe

Tendances

Resistance to social influence
Resistance to social influenceResistance to social influence
Resistance to social influence
gbaptie
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
Diana Dianot
 

Tendances (20)

Magical Number Seven, by George Miller
Magical Number Seven, by George MillerMagical Number Seven, by George Miller
Magical Number Seven, by George Miller
 
ch 10 thinking & language
ch 10 thinking & languagech 10 thinking & language
ch 10 thinking & language
 
6 object relations theory
6 object relations theory6 object relations theory
6 object relations theory
 
Psychological theories and research in juvenile delinquency
Psychological theories and research in juvenile delinquencyPsychological theories and research in juvenile delinquency
Psychological theories and research in juvenile delinquency
 
Persuasion
PersuasionPersuasion
Persuasion
 
Aggression - Social Psychology
Aggression - Social PsychologyAggression - Social Psychology
Aggression - Social Psychology
 
Social Theories of Crime
Social Theories of CrimeSocial Theories of Crime
Social Theories of Crime
 
Introduction to social psychology lecture 1
Introduction to social psychology lecture 1Introduction to social psychology lecture 1
Introduction to social psychology lecture 1
 
Group influence
Group influenceGroup influence
Group influence
 
Perception
PerceptionPerception
Perception
 
Resistance to social influence
Resistance to social influenceResistance to social influence
Resistance to social influence
 
Mental representation
Mental representationMental representation
Mental representation
 
Chapter 1 introducing social psychology
Chapter 1 introducing social psychologyChapter 1 introducing social psychology
Chapter 1 introducing social psychology
 
Social Psychology: Review
Social Psychology: ReviewSocial Psychology: Review
Social Psychology: Review
 
Lesson 43
Lesson 43Lesson 43
Lesson 43
 
Hypothesization in Family Therapy
Hypothesization in Family TherapyHypothesization in Family Therapy
Hypothesization in Family Therapy
 
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of PsychologyPsychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
Psychodynamic Model/Approach. By Theresa Lowry-Lehnen. Lecturer of Psychology
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Attention & Perception - Cognitive Psychology.pptx
Attention & Perception - Cognitive Psychology.pptxAttention & Perception - Cognitive Psychology.pptx
Attention & Perception - Cognitive Psychology.pptx
 
Social Judgment Theory
Social Judgment TheorySocial Judgment Theory
Social Judgment Theory
 

En vedette

Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deception
mankoma2013
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theory
Tammy Esfandi
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. Interpretive
Nathan PT
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivism
nataliea
 

En vedette (12)

Interpersonal Deception theory
Interpersonal Deception theoryInterpersonal Deception theory
Interpersonal Deception theory
 
The Art of Deception
The Art of DeceptionThe Art of Deception
The Art of Deception
 
Interpersonal deception
Interpersonal deceptionInterpersonal deception
Interpersonal deception
 
Detecting Deception
Detecting DeceptionDetecting Deception
Detecting Deception
 
Interpersonal Deception Theory
Interpersonal Deception TheoryInterpersonal Deception Theory
Interpersonal Deception Theory
 
Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?Design Fiction: Does the search for plausibility lead to deception?
Design Fiction: Does the search for plausibility lead to deception?
 
Social Penetration theory
Social Penetration theory  Social Penetration theory
Social Penetration theory
 
Social penetration theory
Social penetration theorySocial penetration theory
Social penetration theory
 
Objective vs. Interpretive
Objective vs. InterpretiveObjective vs. Interpretive
Objective vs. Interpretive
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Social Penetration Theory
Social Penetration TheorySocial Penetration Theory
Social Penetration Theory
 
The Limitations Of Constructivism
The Limitations Of ConstructivismThe Limitations Of Constructivism
The Limitations Of Constructivism
 

Similaire à Interpersonal Deception Theory by Adriana Johnson

Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Debidatta Dwibedi
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
ElmeBaje
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Alexej Michirev
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docx
owenhall46084
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
elliot7
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docx
write31
 

Similaire à Interpersonal Deception Theory by Adriana Johnson (20)

Ontologies Used In Paper-Omics
Ontologies Used In Paper-OmicsOntologies Used In Paper-Omics
Ontologies Used In Paper-Omics
 
Familiarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception TheoryFamiliarity and Unfamiliarity in Interpersonal Deception Theory
Familiarity and Unfamiliarity in Interpersonal Deception Theory
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
 
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedinThesis NonVerbal C_Alexej_Michirev_vLinkedin
Thesis NonVerbal C_Alexej_Michirev_vLinkedin
 
Samples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdfSamples Of Comparison And Contrast Essays.pdf
Samples Of Comparison And Contrast Essays.pdf
 
Samples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast EssaysSamples Of Comparison And Contrast Essays
Samples Of Comparison And Contrast Essays
 
Bullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their LivesBullshiters - Who Are They And What Do We Know About Their Lives
Bullshiters - Who Are They And What Do We Know About Their Lives
 
A Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion TheoriesA Brief Exploration Of Modern Persuasion Theories
A Brief Exploration Of Modern Persuasion Theories
 
International life Sciences
International life SciencesInternational life Sciences
International life Sciences
 
Lived Experience Paper
Lived Experience PaperLived Experience Paper
Lived Experience Paper
 
Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...Professional identity, bribery and public service A lab-in-the-field experime...
Professional identity, bribery and public service A lab-in-the-field experime...
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and Methods
 
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message PropagationStudy: Creating Buzz: The Neural Correlates of Effective Message Propagation
Study: Creating Buzz: The Neural Correlates of Effective Message Propagation
 
Essay On Hiv Aids
Essay On Hiv AidsEssay On Hiv Aids
Essay On Hiv Aids
 
discussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docxdiscussion 1 - BRADYData is something that every researcher need.docx
discussion 1 - BRADYData is something that every researcher need.docx
 
Symbolic convergence theory
Symbolic convergence theorySymbolic convergence theory
Symbolic convergence theory
 
Cpdp slides
Cpdp slidesCpdp slides
Cpdp slides
 
The paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truthThe paradox of believable lie and unbelievable truth
The paradox of believable lie and unbelievable truth
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
The Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docxThe Science Behind Animal Mimicry Imitation is an important mode.docx
The Science Behind Animal Mimicry Imitation is an important mode.docx
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Interpersonal Deception Theory by Adriana Johnson

  • 2. What is it? A theory of deception between two communicators where predictions are made based on characteristics of the source, receiver, context, message,feedback, and channel (Avtgis, Infante, & Rancer, 2009). Receiver/Predictor Source/Deceiver Channel Channel Message & Context Feedback
  • 3. What is it? Deception, theorized by IDT, is no different from any other form of communication. Even if the person is truthful or deceitful, the universal goals of effectiveness and appropriateness are still being followed (Avtgis et. al.,2009).
  • 4. What is it? To be an effective deceiver, one must handle a large amount of information in an efficient manner. Therefore, the receiver is active and corresponds to the deceptive encounter.
  • 5. Who uses it? Psychologists, Communication researchers, and Sociologists use IDT in their scientific inquiries, empirical studies, experiments, and meta analyses. Also, Theorist who believe messages “do things” to people use IDT. Two leading men that have added on to IDT are Buller and Burgoon (DePaulo, Malone, Lindsay, Muhlenbruck, Charlton,& Cooper,2003).
  • 6. Who uses it? Buller and Burgoon developed twenty-one propositions for the theory (Avtgis et. al., 2009). Proposition seven states that deceiving for self-gain prompts more strategic activity and nonstrategic behavior than deceiving for the benefit of others. This proposition can be identified in the Madoff ponzi scheme. Bernard Madoff
  • 7. So what…? It's one of the most comprehensive and developed theories that deals with deceptive communication. IDT theorists expect that with new technology, social networking sites will extend the present propositions to account for the increasing media choices for interacting.
  • 8. So what…? Not only is this theory useful for theorists but also detectives trying to find online sexual predators, investigators examining information from deceptive individuals, and also helps identify deceitful messages on a daily basis (Lina, Burgoon, Dongsong, & Nunamaker,2004).
  • 9. Criticism Since its beginning, the theory has continued to grow alongside new deception processes. Several theorists applaud Buller and Burgoon on their addition to the theory. Their 21 propositions provide a comprehensive description of a timeline of deceptive interactions. But the problem with these propositions is the lack of predictive power necessary for qualifying as a centralized theory.
  • 10. Criticism According to Baxter and Braithwaite (2008), some of the propositions are generic and intend to emphasize variables that explain deception but not IDT. They also believe that IDT is not completely substantive and only tackles the difficult issue of whether deceivers adapt their behavior.
  • 11. What Else You Should Know Next time you feel like you are being deceived, examine the accused person of deception's nonverbal expression. They may exhibit something called leakage which is ,according to IDT, a manifestation most overtly seen in nonverbal signals which betrays verbal communication. If their nonverbal expressions contradict their verbal message, deception may be occurring.
  • 12. References Avtgis, T., Infante, D., & Rancer, A. (2009). Contemporary communication theory. (pp. 241-246). Dubuque: Kendall Hunt Publishing Company. Baxter, L., & Braithwaite, D. (2008). Engaging theories in interpersonal communication. Thousand Oaks, California: Sage Publications. DePaulo, B., Malone, B., Lindsay, J., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129, 74- 118. doi: 10.1037/0033-2909.129.1.74
  • 13. References Lina, Z., Burgoon, J., Dongsong, Z., & Nunamaker, J. (2004). Language dominance in interpersonal deception in computer-mediated communication. Computers In Human Behavior, 20, 381-402. doi: 10.1016/S0747-5632(03)00051-7 Quickmeme. (n.d.). Retrieved from http://www.quickmeme.com/make