skip to main content
10.1145/2441776.2441862acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Butler lies from both sides: actions and perceptions of unavailability management in texting

Published:23 February 2013Publication History

ABSTRACT

In an always-connected world, managing one's unavailability for interaction with others can be as important and difficult as coordinating mutual availability. Prior studies have identified the butler lie, a linguistic strategy commonly used to manage unavailability, and examined message-level data to examine how message senders' use of butler lies varies across media and situations. This study is the first to examine how butler lies are perceived by those who receive them. Pairs of student participants provided messages sent to each other in real conversations and indicated whether these messages were deceptive or not. These messages were then passed to the partner, who indicated perceived deception and provided an explanation. Results suggest that participants expect butler lies regularly although not as often as they are actually produced, and participants are not very accurate in identifying butler lies. Moreover, detailed analysis of messages and explanations suggests that butler lies play a relational role that is expected by both parties in a dialog.

References

  1. Aoki, P., & Woodruff, A. (2005). Making space for stories: ambiguity in the design of personal communication systems. Proc. ACM CHI, 181--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Birnholtz, J., Dixon, G., & Hancock, J. (2012). Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization. Computers in Human Behavior, 28, 1028--1035. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Birnholtz, J., Guillory, J., Hancock, J. T., & Bazarova, N. (2010). "on my way": Deceptive Texting and Interpersonal Awareness Narratives. Proc. ACM CSCW, 1--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Boehner, K., & Hancock, J. T. (2006). Advancing ambiguity. Proc. ACM CHI, 103--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bond, C. F. and DePaulo, B., M. (2006). Accuracy of Deception Judgments. Journal of Personality and Social Psychology, 10 (3), 214--234.Google ScholarGoogle ScholarCross RefCross Ref
  6. Chen, B. X. (2011). Always on: how the iPhone unlocked the anything - anytime - anywhere future - and locked us in. Cambridge, MA: Da Capo Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Clark, H. H. (1996). Using language. New York: Cambridge University Press.Google ScholarGoogle Scholar
  8. DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., and Epstein, J. A., (1996). Lying in Everyday Life. Journal of Personality and Social Psychology, 70(5), 979--995.Google ScholarGoogle ScholarCross RefCross Ref
  9. Fielder, K. and Walka, I. (1993). Training Lie Detectors to Use Nonverbal Cues Instead of Global Heuristics. Human Communication Research, 20(2), 199--223.Google ScholarGoogle ScholarCross RefCross Ref
  10. Frank, M. G. & Ekman, P. (1997). The ability to detect deceit generalizes across different types of high stake lies. Journal of Personality and Social Psychology, 72, 1429--1439.Google ScholarGoogle ScholarCross RefCross Ref
  11. Grinter, R., & Eldridge, M. (2003). Wan2tlk?: Everyday Text Messaging. Proc. ACM CHI, 441--448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hancock, J. T., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., & Amos, B. (2009). Butler lies: awareness, deception and design. Proc. ACM CHI, 517--526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hancock, J., Thom-Santelli, J., and Ritchie, T. (2004). Deception and design: the impact of communication technology on lying behavior. Proc. ACM CHI, 129--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Häkkilä, J., and Chatfield, C. (2005). 'It's like if you opened someone else's letter' - User Perceived Privacy and Social Practices with SMS Communication, Proc. ACM MobileHCI, 219--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Leonardi, P. M., Treem, J. W., & Jackson, M. H. (2010). The Connectivity Paradox: Using Technology to Both Decrease and Increase Perceptions of Distance in Distributed Work Arrangements. Journal of Applied Communication Research, 38(1), 85--105.Google ScholarGoogle ScholarCross RefCross Ref
  16. Levine, T. R., Park, H. S., & McCornack, S. A. (1999). Accuracy in detecting truths and lies: Documenting the "veracity effect." Communication Monographs, 66, 125--144.Google ScholarGoogle ScholarCross RefCross Ref
  17. Levine, T. R., Kim, R. K., Park, H. S., & Hughes, M. (2006). Deception detection accuracy is a predictable linear function of message veracity base-rate: A formal test of Park and Levine's probability model. Communication Monographs, 73, 243--260.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ma, F., Xu, F., Heyman, G. D., & Lee, K. (2011). Chinese children's evaluations of white lies: Weighing the consequences for recipients. Journal of Experimental Child Psychology, 108, 308--321.Google ScholarGoogle ScholarCross RefCross Ref
  19. McCornack, S. A., & Parks, M. R. (1986). Deception detection and relationship development: The other side of trust. In M. L. McLaughlin (Ed.), Communication yearbook 9 (pp. 377--389). Beverly Hills, CA: Sage.Google ScholarGoogle Scholar
  20. Miller, G. R., Mongeau, P. A., & Sleight, C. (1986). Fudging with Friends and Lying to Lovers: Deceptive Communication in Personal Relationships. Journal of Social and Personal Relationships, 3, 495--512.Google ScholarGoogle ScholarCross RefCross Ref
  21. Perry, M., O'Hara, K., Sellen, A., Brown, B., & Harper, R. (2001). Dealing with mobility: understanding access anytime, anywhere. ACM TOCHI, 8, 323--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Read, S. (1992). Constructing accounts: the role of explanatory coherence. Explaining the self to others. M. L. McLaughlin, M. J. Cody and S. Read. Hillsdale, NJ, Lawrence Erlbaum Associates: 3--19.Google ScholarGoogle Scholar
  23. Reynolds, L., Gillette, S., Marder, J., Miles, Z., Vodenski, P., Weintraub, A., et al. (2011). Contact stratification and deception. Proc. ACM CSCW, 221--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Salovaara, A., Lindqvist, A., Hasu, T., Häkkilä, J. (2011). The Phone Rings but the User Doesn't Answer: Unavailability in Mobile Communication. Proc. ACM MobileHCI, 503--512. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Serota, K. B., Levine, T. R., and Boster, F. J. (2010). The Prevalence of Lying in America: Three Studies of Self-Reported Lies. Human Communication Research, 36(1), 2--25.Google ScholarGoogle ScholarCross RefCross Ref
  26. Smith, A. (2011). Americans and Text Messaging. Washington, DC: Pew Research Center's Internet & American Life Project.Google ScholarGoogle Scholar
  27. SPSS Technical Report. Linear Mixed Modeling. http://www.spss.ch/upload/1107355943_LinearMixedEffectsModelling.pdf.Google ScholarGoogle Scholar
  28. Tang, J. C. (2007). Approaching and leave-taking: Negotiating contact in computer-mediated communication. ACM TOCHI. 14 (1), Article 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Turkle, S. (2011). Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Vanden Abeele, M., & Roe, K. (2008). White cyberlies: The use of deceptive instant messaging statuses as a social norm. Presented at Conference of the International Communication Association.Google ScholarGoogle Scholar
  31. Vrij, A. (2008). Detecting lies and deceit: pitfalls and opportunities. Chichester: Wiley.Google ScholarGoogle Scholar
  32. Waidd, W. M., Orne , M. T. (1981). Cognitive, Social, and Personality Processes in the Physiological Detection of Deception, In: Leonard Berkowitz (Ed.), Advances in Experimental Social Psychology, Academic Press, 14, 61--106.Google ScholarGoogle Scholar
  33. Weilenmann, A. (2003). "I can't talk now, I'm in a fitting room": formulating availability and location in mobile-phone conversations. Environment and Planning A, 35, 1589--1605.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Butler lies from both sides: actions and perceptions of unavailability management in texting

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work
      February 2013
      1594 pages
      ISBN:9781450313315
      DOI:10.1145/2441776

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 February 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader