History and central themes
In the fall of 1987 and early spring of 1988, deception scholar Steven McCornack - then a doctoral student at the University of Illinois - collected data for his dissertation. Somewhat unwittingly McCornack employed a method not used by prior deception researchers. At that time, most deception researchers instructed study participants to either "lie" or "tell the truth." McCornack, however, gave participants in his study no such guidance. Instead, he placed them in situations that had provoked other people to lie, and asked them what they would say (he previously had gathered data on the kinds of situations that trigger lying amongst college students). Fully expecting to be able to code his data in terms of "truth" versus "falsity," McCornack was stunned to observe that the messages that had been generated defied such a dichotomy. The typical message in his data involved complex combinations of truthful and false elements. In his subsequent dissertation, McCornack argued that deceivers manipulate two primary dimensions when seeking to mislead others: the amount of information that is shared, and whether or not such information is distorted. Two years later, while an assistant professor at Michigan State University, McCornack revisited his dissertation data. Dissatisfied with his dissertation's two-dimensional characterization of messages (i.e., "amount of information" and "distortion of information"), he sought the counsel of his doctoral advisor, Barbara O'Keefe, who recommended that he draw upon Paul Grice's theory of conversational implicature as the theoretical foundation. Reanalyzing his data from a four-dimensional Gricean perspective (see below), McCornack found an almost perfect goodness-of-fit, and authored a series of conference papers explicating his analysis. In 1992, McCornack published two articles that are recognized as the seminal works in Information Manipulation Theory. In his first article, McCornack lays out the basic premise of IMT, namely that deception messages derive from covert violations of conversational maxims, and that “deceptive messages function deceptively because they violate the principles that govern conversational exchanges” (McCornack 1992). The second article, written in collaboration with noted deception scholar Timothy Levine (McCornack et al. 1992) provided an empirical test of the theory.Prior work on deceptive discourse forms
Prior to the publication of Information Manipulation Theory, a handful of studies had examined the various ways people play with information when misleading others; although no collective theoretical framework had been posited connecting these works to one another. Most influential of these, in shaping McCornack's thinking, was a study by Turner, Edgley and Olmstead (1975) examining information control during important conversations. Turner et al. had participants record an important conversation, and then self-analyze how many of their utterances were completely honest, versus those that controlled information in significant ways. They observed several forms of information control, and described them in terms of categories, including “lies,” “exaggerations,” “half-truths,” “secrets,” and "diversionary responses." They also observed that the vast majority (61.5%) of utterances in important conversations were not completely honest, but controlled information in some fashion. Other scholars also had posited taxonomies of deception types. In 1984, Hopper and Bell introduced a typology of deceptive types using English terms, including "fictions," "playings," "lies," "crimes," "masks," and "unlies." Within the relational communication literature, a conference paper presented in 1986 by Sandra Metts and her graduate student Helen Chronis was especially influential in shaping McCornack's conceptualization, as they posited deception as something that arises when communicators are faced with complicated contexts involving multiple and competing goals. Metts and Chronis depicted variation in deceptive discourse as varying on a continuum of covert to overt misrepresentation of information.Theoretical foundation
As McCornack has frequently noted in various public presentations (see McCornack, 2022) "to understand IMT one must first understand Grice." That is, IMT is rooted in the theory of conversational implicature posited byMajor experimental findings
* Initial experiments conducted by McCornack and Levine (1992) regarding Information Manipulation Theory confirmed that manipulations of information along the four dimensions posited by the theory do, indeed, result in greater perceptions of deceptiveness. They also observed that some violations were considered “more deceptive” than others; namely, violations of Quality. * Another significant experiment was performed to see if the results of McCornack's theory could be generalized outside of Western cultures. This was examined through the lens of the individualist vs. collectivist debate. These two cultural poles are regarded as the most overarching themes of cultural identity and perspective. With the U.S. regarded as being representative of the Individualist perspective, Hong Kong was chosen to represent the Collectivist perspective. The dimensions of quality and relevance were regarded as deceptive, but not the other dimensions. This experiment concluded that what is seen as truthful'', what violations are acceptable, the motivation for those violations and what is understood to be a conversational maxim is dependent on cultural identity (Yeung, Levine, & Nishiyama 1999). * Another experiment performed by L. Zhou and S. Lutterbie followed the work of the aforementioned tests of IMT. This experiment concluded that the best way to apply the principles of IMT across cultures is to take a multi-directional, multi-prong approach. This subject of normative actions in conversation should be approached with a top-down and bottom-up approach (Zhou & Lutterbie 2005).Criticisms of IMT
Two substantial criticisms have been leveled at IMT: * In 1996, communication scholar Scott Jacobs and his colleagues argued that McCornack misrepresentedInformation Manipulation Theory 2 (IMT2)
In 2014, McCornack, along with colleague Kelly Morrison and several of their graduate students (including Jihyun Paik and Xun Zhu) published Information Manipulation Theory 2 (McCornack et al., 2014). IMT2 is a comprehensive theory of deceptive discourse production, rooted in research from speech production, cognitive science, and artificial intelligence models of problem-solving. IMT2 consists of three propositional sets and a host of specific, testable, non-falsifiable propositions. The central claim of IMT2 is that "deceptive and truthful discourse both are output from a speech production system involving parallel-distributed processing, guided by efficiency, memory, and means-ends reasoning; and this production process involves a rapid-fire series of cognitive cycles (involving distinct modules united by a conscious workspace), and modification of incrementally-constructed discourse during the turn-at-talk in response to dynamic current-state/end-state discrepancies" (2014, page 15). At the core of IMT2 are three propositional sets, addressing how people play with information so as to mislead others; the cognitive load that should be associated with different forms of information manipulation; and the role that intentionality plays in the production process. These propositional sets are rooted in three fundamental assumptions that stand in sharp contrast to prevailing models of deception: (1) Within contexts in which the truth is situationally problematic (i.e., contexts in which people will face significant personal, relational, and/or professional costs for sharing the truth), deceptive discourse production often will be more cognitively efficient than truth-telling (i.e., deception will evoke less cognitive load than truthtelling) - which is precisely why people will trend toward deceptiveness within such situations. (2) Deceptive discourse, like all discourse, is not produced as intact, unitary, discrete "messages;" but instead, is incrementally constructed during turns at talk. The result is that people rarely produce "lies" in conversation; but instead routinely integrate small bits of false information into otherwise truthful discourse streams while speaking. (3) Deceptive intent may arise and decay at any point in the discourse production process; but most certainly need not occur a priori (i.e., before discourse production begins). These three presumptions can be translated into several simple takeaways with huge practical and theoretical significance, for both scholars and laypersons alike: * Deception often is easier than truthtelling, which is why people do it. * People rarely produce bald-faced lies, but commonly intersperse their truthful discourse with bits of falsehood. * As a consequence of #2 (above), scholars should shift their empirical focus to the study of how people play with information elements within their turns, rather than examining entire "messages." * The most common form of deceptive discourse is editing-out problematic information while speaking (i.e., Quantity violations). * Because Quantity violations are virtually impossible to detect (unless someone is privy to the truthful information being deleted), deception detection within everyday conversations will be poor. * People often begin speaking before any intent to deceive arises; and only opt to deceive when problematic information is activated within memory.References
{{Reflist * Bavelas, J.B., Black, A., Chovil, N., & Mullett, J. (1990) ''Equivocal communication. Sage series in interpersonal communication'', Volume 11. Thousand Oaks, CA: Sage. * Buller, D.B., & Burgoon, J.K. (1996). Another look at information management: A rejoinder to McCornack, Levine, Morrison and Lapinski. '' Communication Monographs'' 63, 92–98. * Buller, D.B., & Burgoon, J.K. (1998). Emotional expression in the deception process, In P.A. Andersen, L. Guerrero, (Eds.), ''Handbook of Communication and Emotion: Research, Theory, Applications, and Contexts.'' San Diego: Academic Press, 381–402. * Grice, P. (1989). ''Studies in the Way of Words''. Cambridge, MA. Harvard University Press. * Hopper, R., & Bell, R. A. (1984). Broadening the deception construct. ''