IDEAS home Printed from https://ideas.repec.org/a/spr/grdene/v24y2015i2d10.1007_s10726-014-9389-3.html
   My bibliography  Save this article

Leveraging ICT Capabilities in Potentially Deceptive Interactions: An Integrated Theoretical Model to Improve Detectability

Author

Listed:
  • Matthew L. Jensen

    (University of Oklahoma)

  • Laku Chidambaram

    (University of Oklahoma)

Abstract

With the proliferating use of information and communication technologies (ICTs), deception is increasingly being perpetrated through technology-mediated channels. Deception can result in substantial costs to individuals and organizations. However, the mechanisms by which ICT capabilities influence the detection of deception remain largely unexplored. This paper discusses how specific ICT capabilities can be leveraged to detect deception before, during and after the exchange of deceptive messages. We develop an integrated theoretical model and detail propositions grouped under two broad media capabilities—transmissibility and extensibility—derived from Saussurean structuralist theory that views ideas and artifacts in terms of binary opposition. Further, our theoretical model includes two key contingencies that affect deception detection—the overtness of deception and the skill disparity between the deceiver and the receiver. Finally, we conclude by discussing the implications of our theory for practice and offer suggestions for future research.

Suggested Citation

  • Matthew L. Jensen & Laku Chidambaram, 2015. "Leveraging ICT Capabilities in Potentially Deceptive Interactions: An Integrated Theoretical Model to Improve Detectability," Group Decision and Negotiation, Springer, vol. 24(2), pages 271-298, March.
  • Handle: RePEc:spr:grdene:v:24:y:2015:i:2:d:10.1007_s10726-014-9389-3
    DOI: 10.1007/s10726-014-9389-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10726-014-9389-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10726-014-9389-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Judee K. Burgoon & Fang Chen & Douglas P. Twitchell, 2010. "Deception and its Detection Under Synchronous and Asynchronous Computer-Mediated Communication," Group Decision and Negotiation, Springer, vol. 19(4), pages 345-366, July.
    2. John R. Carlson & Joey F. George, 2004. "Media Appropriateness in the Conduct and Discovery of Deceptive Communication: The Relative Influence of Richness and Synchronicity," Group Decision and Negotiation, Springer, vol. 13(2), pages 191-210, March.
    3. Zhengrui Jiang & Vijay S. Mookerjee & Sumit Sarkar, 2005. "Lying on the Web: Implications for Expert Systems Redesign," Information Systems Research, INFORMS, vol. 16(2), pages 131-148, June.
    4. Peter Fleming & Stelios C. Zyglidopoulos, 2008. "The Escalation of Deception in Organizations," Journal of Business Ethics, Springer, vol. 81(4), pages 837-850, September.
    5. John R. Carlson & Joey F. George & Judee K. Burgoon & Mark Adkins & Cindy H. White, 2004. "Deception in Computer-Mediated Communication," Group Decision and Negotiation, Springer, vol. 13(1), pages 5-28, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kent Marett & Joey F. George, 2013. "Barriers to Deceiving Other Group Members in Virtual Settings," Group Decision and Negotiation, Springer, vol. 22(1), pages 89-115, January.
    2. Ryan T. Wright & Matthew L. Jensen & Jason Bennett Thatcher & Michael Dinger & Kent Marett, 2014. "Research Note ---Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance," Information Systems Research, INFORMS, vol. 25(2), pages 385-400, June.
    3. Inwon Kang & Deokhee Cheon & Matthew Shin, 2011. "Advertising strategy for outbound travel services," Service Business, Springer;Pan-Pacific Business Association, vol. 5(4), pages 361-380, December.
    4. Wally Smieliauskas & Kathryn Bewley & Ulfert Gronewold & Ulrich Menzefricke, 2018. "Misleading Forecasts in Accounting Estimates: A Form of Ethical Blindness in Accounting Standards?," Journal of Business Ethics, Springer, vol. 152(2), pages 437-457, October.
    5. Jeroen Ven & Marie Claire Villeval, 2015. "Dishonesty under scrutiny," Journal of the Economic Science Association, Springer;Economic Science Association, vol. 1(1), pages 86-99, July.
    6. Vasilis Theoharakis & Seraphim Voliotis & Jeffrey M. Pollack, 2021. "Going Down the Slippery Slope of Legitimacy Lies in Early-Stage Ventures: The Role of Moral Disengagement," Journal of Business Ethics, Springer, vol. 172(4), pages 673-690, September.
    7. Kishore Singh & Pran Boolaky & Kamil Omoteso, 2022. "The Relationship Between Politics, Legal System and Financial Reporting on Fraud," Journal of Accounting and Management Information Systems, Faculty of Accounting and Management Information Systems, The Bucharest University of Economic Studies, vol. 21(3), pages 397-430, September.
    8. Jean-Philippe Bouilloud & Ghislain Deslandes & Guillaume Mercier, 2019. "The Leader as Chief Truth Officer: The Ethical Responsibility of “Managing the Truth” in Organizations," Journal of Business Ethics, Springer, vol. 157(1), pages 1-13, June.
    9. Gorshunov, Mikhail A. & Armenakis, Achilles A. & Harris, Stanley G. & Walker, H. Jack, 2021. "Quad-qualified audit committee director: Implications for monitoring and reducing financial corruption," Journal of Corporate Finance, Elsevier, vol. 66(C).
    10. den Nieuwenboer, N.A. & Kaptein, S.P., 2007. "Spiraling Down into Corruption: A Dynamic Analysis of the Social Identity Processes that Cause Corruption in Organizations to Grow," ERIM Report Series Research in Management ERS-2007-086-ORG, Erasmus Research Institute of Management (ERIM), ERIM is the joint research institute of the Rotterdam School of Management, Erasmus University and the Erasmus School of Economics (ESE) at Erasmus University Rotterdam.
    11. Niki A. Nieuwenboer & Muel Kaptein, 2008. "Spiraling Down into Corruption: A Dynamic Analysis of the Social Identity Processes that Cause Corruption in Organizations to Grow," Journal of Business Ethics, Springer, vol. 83(2), pages 133-146, December.
    12. Andreas Engelmann & Ingrid Bauer & Mateusz Dolata & Michael Nadig & Gerhard Schwabe, 2022. "Promoting Less Complex and More Honest Price Negotiations in the Online Used Car Market with Authenticated Data," Group Decision and Negotiation, Springer, vol. 31(2), pages 419-451, April.
    13. Mazzi, Francesco & Slack, Richard & Tsalavoutas, Ioannis, 2018. "The effect of corruption and culture on mandatory disclosure compliance levels: Goodwill reporting in Europe," Journal of International Accounting, Auditing and Taxation, Elsevier, vol. 31(C), pages 52-73.
    14. Marco Meyer & Chun Wei Choo, 2024. "Harming by Deceit: Epistemic Malevolence and Organizational Wrongdoing," Journal of Business Ethics, Springer, vol. 189(3), pages 439-452, January.
    15. Felicity Fallon & Barry J. Cooper, 2015. "Corporate Culture and Greed — The Case of the Australian Wheat Board," Australian Accounting Review, CPA Australia, vol. 25(1), pages 71-83, March.
    16. Carole L. Jurkiewicz & Robert A. Giacalone, 2016. "Organizational Determinants of Ethical Dysfunctionality," Journal of Business Ethics, Springer, vol. 136(1), pages 1-12, June.
    17. John R. Carlson & Joey F. George, 2004. "Media Appropriateness in the Conduct and Discovery of Deceptive Communication: The Relative Influence of Richness and Synchronicity," Group Decision and Negotiation, Springer, vol. 13(2), pages 191-210, March.
    18. Guido Palazzo & Franciska Krings & Ulrich Hoffrage, 2012. "Ethical Blindness," Journal of Business Ethics, Springer, vol. 109(3), pages 323-338, September.
    19. Cockrell, Cam & Stone, Dan N., 2011. "Team discourse explains media richness and anonymity effects in audit fraud cue brainstorming," International Journal of Accounting Information Systems, Elsevier, vol. 12(3), pages 225-242.
    20. Mehmet Eren Ahsen & Mehmet Ulvi Saygi Ayvaci & Srinivasan Raghunathan, 2019. "When Algorithmic Predictions Use Human-Generated Data: A Bias-Aware Classification Algorithm for Breast Cancer Diagnosis," Service Science, INFORMS, vol. 30(1), pages 97-116, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:grdene:v:24:y:2015:i:2:d:10.1007_s10726-014-9389-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.