skip to main content
10.1145/2786451.2786461acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: the Many Dimensions of Lying Online

Published: 28 June 2015 Publication History

Abstract

Portraying matters as other than they truly are is an important part of everyday human communication. In this paper, we use a survey to examine ways in which people fabricate, omit or alter the truth online. Many reasons are found, including creative expression, hiding sensitive information, role-playing, and avoiding harassment or discrimination. The results suggest lying is often used for benign purposes, and we conclude that its use may be essential to maintaining a humane online society.

References

[1]
S. Bok. Lying: Moral choice in public and private life. Random House LLC, 2011.
[2]
d. boyd. Faceted id/entity: Managing representation in a digital world. PhD thesis, Massachusetts Institute of Technology, 2002.
[3]
d. boyd. It's Complicated: The Social Lives of Networked Teens. Yale University Press, 2014.
[4]
F. Brunton and H. Nissenbaum. Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday, 16(5):1--16, 2011.
[5]
Z. Bu, Z. Xia, and J. Wang. A sock puppet detection algorithm on virtual spaces. Knowledge-Based Systems, 37:366--377, 2013.
[6]
E. E. Buckels, P. D. Trapnell, and D. L. Paulhus. Trolls just want to have fun. Personality and individual Differences, 67:97--102, 2014.
[7]
D. B. Buller, J. K. Burgoon, A. Buslig, and J. Roiger. Testing interpersonal deception theory: The language of interpersonal deception. Communication theory, 6(3):268--289, 1996.
[8]
J. K. Burgoon, G. M. Stoner, J. A. Bonito, and N. E. Dunbar. Trust and deception in mediated communication. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1 - Volume 1, HICSS '03, pages 44.1--, Washington, DC, USA, 2003. IEEE Computer Society.
[9]
C. Camden, M. T. Motley, and A. Wilson. White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. Western Journal of Speech Communication, 48(4):309--325, 1984.
[10]
A. Caspi and P. Gorsky. Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, 9(1):54--59, 2006.
[11]
W. M. Chan and B. E. Dicianno. Virtual socialization in adults with spina bifida. PM&R, 3(3):219--225, 2011.
[12]
C. H. Cho, M. L. Martens, H. Kim, and M. Rodrigue. Astroturfing global warming: It isnâĂŹt always greener on the other side of the fence. Journal of Business Ethics, 104(4):571--587, 2011.
[13]
B. M. DePaulo, D. A. Kashy, S. E. Kirkendol, M. M. Wyer, and J. A. Epstein. Lying in everyday life. Journal of personality and social psychology, 70(5):979, 1996.
[14]
J. Doe. Change the youtube comment section back to its original form., November 2013.
[15]
J. S. Donath et al. Identity and deception in the virtual community. Communities in cyberspace, 1996:29--59, 1999.
[16]
N. Ellison, R. Heino, and J. Gibbs. Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication, 11(2):415--441, 2006.
[17]
A. Guy and E. Klein. Constructed identity and social machines: A case study in creative media production. In WWW 2014 Companion, Seoul, 2014. ACM.
[18]
J. Hancock, J. Birnholtz, N. Bazarova, J. Guillory, J. Perlin, and B. Amos. Butler lies: awareness, deception and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 517--526. ACM, 2009.
[19]
J. T. Hancock. Digital deception. Oxford handbook of internet psychology, pages 289--301, 2007.
[20]
J. T. Hancock, J. Thom-Santelli, and T. Ritchie. Deception and design: The impact of communication technology on lying behavior. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--134. ACM, 2004.
[21]
J. T. Hancock, C. Toma, and N. Ellison. The truth about lying in online dating profiles. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, pages 449--452, New York, NY, USA, 2007. ACM.
[22]
B. Hogan. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. Bulletin of Science, Technology & Society, page 0270467610385893, 2010.
[23]
Z. Hussain and M. D. Griffiths. Gender swapping and socializing in cyberspace: An exploratory study. CyberPsychology & Behavior, 11(1):47--53, 2008.
[24]
B. Johnson. Privacy no longer a social norm, says facebook founder, January 2010.
[25]
A. Lenhart, J. Kahne, E. Middaugh, A. R. Macgill, C. Evans, and J. Vitak. Teens, video games, and civics: Teens' gaming experiences are diverse and include significant social interaction and civic engagement. Pew Internet & American Life Project, 2008.
[26]
A. Lenhart, K. Purcell, A. Smith, and K. Zickuhr. Social media & mobile internet use among teens and young adults. millennials. Pew Internet & American Life Project, 2010.
[27]
S. Livingstone. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression. New media & society, 10(3):393--411, 2008.
[28]
M. Madden, A. Lenhart, S. Cortesi, U. Gasser, M. Duggan, A. Smith, and M. Beaton. Teens, social media, and privacy. Pew Research Center, 2013.
[29]
a. E. Marwick and d. boyd. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1):114--133, July 2010.
[30]
C. E. Naquin, T. R. Kurtzberg, and L. Y. Belkin. The finer points of lying online: e-mail versus pen and paper. Journal of Applied Psychology, 95(2):387, 2010.
[31]
A. Potts. 'LOVE YOU GUYS (NO HOMO)' How gamers and fans play with sexuality, gender, and Minecraft on YouTube. Critical Discourse Studies, (ahead-of-print):1--24, 2014.
[32]
M. Roig and M. Caso. Lying and cheating: Fraudulent excuse making, cheating, and plagiarism. The Journal of Psychology, 139(6):485--494, 2005.
[33]
T. Solorio, R. Hasan, and M. Mizan. A case study of sockpuppet detection in wikipedia. In Workshop on Language Analysis in Social Media (LASM) at NAACL HLT, pages 59--68, 2013.
[34]
A. Strauss and J. M. Corbin. Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc, 1990.
[35]
S. Turkle. Life on the Screen. Simon and Schuster, 2011.
[36]
N. Van Doorn and L. Van Zoonen. Theorizing gender and the internet: Past, present, and future. The Routledge Handbook of Internet Politics, pages 261--74, 2008.
[37]
M. Whitty and J. Gavin. Age/sex/location: Uncovering the social cues in the development of online relationships. CyberPsychology & Behavior, 4(5):623--630, 2001.
[38]
M. T. Whitty. Liar, liar! an examination of how open, supportive and honest people are in chat rooms. Computers in Human Behavior, 18(4):343--352, 2002.
[39]
Wikipedia. 50 cent party, 2015. {Online; accessed 20-March-2015}.
[40]
N. Yee. The demographics, motivations, and derived experiences of users of massively multi-user online graphical environments. Presence, 15(3):309--329, 2006.
[41]
N. Yee, J. N. Bailenson, and N. Ducheneaut. The proteus effect: Implications of transformed digital self-representation on online and offline behavior. Communication Research, 2009.
[42]
J. Zhang, D. Carpenter, and M. Ko. Online astroturfing: A theoretical perspective. In Americas Conference on Information Systems 2013 Proceedings, 2014.

Cited By

View all
  • (2023)Produktion urbaner Sicherheit aus BürgerperspektiveHandbuch Polizeimanagement10.1007/978-3-658-34388-0_95(1637-1654)Online publication date: 12-Mar-2023
  • (2022)From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETsProceedings of the 2022 New Security Paradigms Workshop10.1145/3584318.3584323(60-74)Online publication date: 24-Oct-2022
  • (2022)Produktion urbaner Sicherheit aus BürgerperspektiveHandbuch Polizeimanagement10.1007/978-3-658-34394-1_95-1(1-18)Online publication date: 30-Mar-2022
  • Show More Cited By

Index Terms

  1. Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: the Many Dimensions of Lying Online

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WebSci '15: Proceedings of the ACM Web Science Conference
      June 2015
      366 pages
      ISBN:9781450336727
      DOI:10.1145/2786451
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Lying online
      2. digital identity
      3. online communities
      4. privacy

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      WebSci '15
      Sponsor:
      WebSci '15: ACM Web Science Conference
      June 28 - July 1, 2015
      Oxford, United Kingdom

      Acceptance Rates

      Overall Acceptance Rate 245 of 933 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Produktion urbaner Sicherheit aus BürgerperspektiveHandbuch Polizeimanagement10.1007/978-3-658-34388-0_95(1637-1654)Online publication date: 12-Mar-2023
      • (2022)From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETsProceedings of the 2022 New Security Paradigms Workshop10.1145/3584318.3584323(60-74)Online publication date: 24-Oct-2022
      • (2022)Produktion urbaner Sicherheit aus BürgerperspektiveHandbuch Polizeimanagement10.1007/978-3-658-34394-1_95-1(1-18)Online publication date: 30-Mar-2022
      • (2017)Die polizeiliche Nutzung sozialer Medien in Deutschland: Die Polizei im digitalen NeulandHandbuch Polizeimanagement10.1007/978-3-658-08926-9_40(919-943)Online publication date: 2-Mar-2017
      • (2016)Computationally Mediated Pro-Social DeceptionProceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858060(552-563)Online publication date: 7-May-2016
      • (2016)Social Machines as an Approach to Group PrivacyGroup Privacy10.1007/978-3-319-46608-8_6(101-122)Online publication date: 29-Dec-2016
      • (2015)Social Personal Data StoresProceedings of the 24th International Conference on World Wide Web10.1145/2740908.2743975(1155-1160)Online publication date: 18-May-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media