Skip to main content
Log in

Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet

  • Published:
Group Decision and Negotiation Aims and scope Submit manuscript

Abstract

This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers' success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real commercial site or a deceptive copycat (“page-jacking”) site. The deceptive site was identical to the clean site except that it contained six deceptive manipulations (e.g., forged favorable quotes from authoritative sources). This study compares the information processing behavior of four groups of subjects: those who detected the deception, those who missed it, those who correctly identified the real site as non-deceptive, and those who incorrectly believed that the real site was deceptive. It was found that (1) priming subjects to generate the hypothesis of deception weakly facilitates detection success, (2) competence at evaluating the hypothesis of deception is a strong differentiator between successful and unsuccessful detectors, and (3) successful detectors rely on “assurance” cues and heavily discount “trust” cues. Unsuccessful detectors do the opposite.

This is a preview of subscription content, log in via an institution to check access.

Access this article

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Similar content being viewed by others

References

  • Albrecht, W. S., G. W. Wernz, and T. L. Williams. (1995). Fraud: Bringing Light to the Dark Side of Business. Burr Ridge, Ill.: Irwin Professional Pub.

    Google Scholar 

  • Allen, J. (2001). The CERT Guide to System and Network Security Practices. Addison Wesley.

  • Beltramini, R. F. and E. R. Stafford. (1993). “Comprehension and Perceived Believability of Seals of Approval Information in Advertising,” Journal of Advertising 21 (3), 3–31.

    Google Scholar 

  • Bouwman, M. J. (1983). “Human Diagnostic Reasoning by Computer: An Illustration From Financial Analysis,” Management Science 29 (6), 635–672.

    Google Scholar 

  • Buller, D. B. and J. K. Burgoon. (1996). “Interpersonal Deception Theory,” Communication Theory 6 (3), 203–242.

    Google Scholar 

  • Burgoon, J. K, D. B. Buller, A. Ebesu, and P. Rockwall. (1994). “Interpersonal Deception: V. Accuracy in Deception Detection,” Communication Monographs 61, 303–325.

    Google Scholar 

  • Cheng P. W. and K. J. Holyoak. (1985). “Pragmatic Reasoning Schemas,” Cognitive Psychology 17, 391–416.

    Google Scholar 

  • Clancey W. J. (1988). “Acquiring, Representing and Evaluating a Competence Model of Diagnostic Strategy,” in M. Chi, R. Glaser, and M. Farr (Eds.), The Nature of Expertise. Hillsdale, NY: LEA, 343–418.

    Google Scholar 

  • Cosmides, L. (1989). “The Logic of Social Exchange: Has Natural Selection Shaped How Humans Reason? Studies with the Wason Selection Task,” Cognition 31, 187–276.

    Google Scholar 

  • Cummins R. (1996). Representations, Targets and Attitudes. MIT press.

  • Daft, R. and R. Lengel. (1984). “Information Richness: A New Approach to Managerial Behavior and Organizational Design,” Research in Organizational Behavior 6, 191–233.

    Google Scholar 

  • Daft, R. and R. Lengel. (1986). “Organizational Information Requirements, Media Richness and Structural Design,” Management Science 32 (5), 554–571.

    Google Scholar 

  • Dennett, D. C. (1987). The Intentional Stance. Cambridge, MA: The MIT Press.

    Google Scholar 

  • Dennis, A. and S. Kinney. (1998). “Testing Media Richness Theory in the New Media: The Effects of Cues, Feedback, and Task Equivocality,” Information Systems Research 9 (3), 256–274.

    Google Scholar 

  • DePaulo, B. M., M. Zuckerman, and R. Rosenthal. (1980). “Humans as Lie Detectors,” Journal of Communication pp. 129-139.

  • DePaulo, P. J., B. M. DePaulo, J. Tang, and G. W. Swaim. (1989). “Lying and Detecting Lies in Organizations,” in R. A. Giacalone and P. Rosenfeld (Eds.), Impression Management in the Organization. Hillsdale, NJ: LEA, 377–393.

    Google Scholar 

  • Ekman, P. and M. O'Sullivan. (1991). “Who Can Catch a Liar?” American Psychologist 46 (9), 913–920.

    Google Scholar 

  • Ekman, P. (1992). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. New York, NY: W. W. Norton & Company.

    Google Scholar 

  • Ericsson K. and J. Smith. (1991). Towards a General Theory of Expertise. University of Cambridge Press.

  • FTC v. Pereira et al. (1999). “Complaint for Permanent Injunction and Other Equitable Relief,” Case No. 99-1367-A, U.S. District Court, E. D. Alexandria, VA.

  • Garfinkel, S. and G. Spafford. (2002). Web Security, Privacy and Commerce, 2nd Ed. Cambridge: O'Reilly & Associates.

    Google Scholar 

  • Grazioli, S. (1998). “Errors in Detecting Financial Deception: A Cognitive Modeling Approach,” Proceedings of the Fourth Conference of the Association for Information Systems. Baltimore, MD.

  • Grazioli, S. and S. Jarvenpaa. (2000). “Perils of Internet Fraud,” IEEE transactions on Systems, Man, and Cybernetics 30 (4), 395–410.

    Google Scholar 

  • Grazioli, S. and S. Jarvenpaa. (2001). “Tactics Used Against Consumers as Victims of Internet Deception,” Proceedings of the Americas Conference on Information Systems. Boston, Mass, 810-815.

  • Grazioli, S. and S. Jarvenpaa. (in press). “Deceived: Under Target on Line,” Communications of the ACM.

  • Higgins, E. T. (1996). “Knowledge Activation: Accessibility, Applicability, and Salience, in E. T. Higgins and A. W. Kruglanski (Eds.), Social Psychology: Handbook of Basic Principles. NY: Guilford Press, 133–168.

    Google Scholar 

  • Higgins, E. T., J. A. Bargh, and W. Lombardi. (1985). “The Nature of Priming Effects in Categorization,” Journal of Experimental Psychology: Learning, Memory and Cognition 11, 59–69.

    Google Scholar 

  • Hyman, R. (1989). “The Psychology of Deception,” Annual Review of Psychology 40, 133–154.

    Google Scholar 

  • Jarvenpaa, S. and S. Grazioli. (1999). “Surfing Among Sharks: How to Gain Trust in Cyberspace,” Financial Times 7/12. Reprinted in D. A. Marchand, T. H. Davenport, and T. Dickson (Eds.), FT, Mastering Information Management Series. London: Prentice Hall, 197–201.

    Google Scholar 

  • Johnson, P. E., S. Grazioli and K. Jamal. (1993). “Fraud Detection: Deception and Intentionality in Cognition,” Accounting, Organization and Society 18 (5), 467–488.

    Google Scholar 

  • Johnson, P. E., S. Grazioli, K. Jamal, and I. A. Zualkernan. (1992). “Success and Failure in Expert Reasoning,” Journal of Organizational Behavior and Human Decision Processes 53 (2), 173–203.

    Google Scholar 

  • Johnson, P. E., S. Grazioli, K. Jamal, and G. Berryman. (2001). “Detecting Deception: Adversarial Problem Solving in a Low Base Rate World,” Cognitive Science 25 (3), 355–392.

    Google Scholar 

  • Kauffman, R. and C. Wood. (2000). “Running up the Bid: Modeling Seller Opportunism in Internet Auctions,” Proceedings of the 2000 Americas Conference on Information Systems, Long Beach, CA, August 10-13.

  • Kunda, Z. (1999). Social Cognition: Making Sense of People. Cambridge, MA: The MIT Press.

    Google Scholar 

  • March, J. (1988). Decisions and Organizations. Oxford, England: Blackwell.

    Google Scholar 

  • Mawby, R. and R. W. Mitchell. (1986). “Feints and Ruses: An Analysis of Deception in Sports,” in R. W. Mitchell and N. S. Thompson (Eds.), Deception: Perspectives on Human and Non-human Deceit. Albany, NY: SUNY Press, 313–322.

    Google Scholar 

  • McCornack, S.A. and T. R. Levine. (1992). “When Lovers Become Leery: The Relationship Between Suspicion and Accuracy in Detecting Deception,” Communication Monographs 57, 219–230.

    Google Scholar 

  • Morris-Cotterill, N. (1999). “Use and Abuse of the Internet in Fraud and Money Laundering,” International Review of Law Computers and Technology 13 (2), 211–228.

    Google Scholar 

  • National White Collar Crime Center and the Federal Bureau of Investigation. (2001). Internet Fraud Complaint Center: Six Months Data Trends Report.

  • Newell, A. and H. A. Simon. (1972). Human Problem Solving. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Pitofsky, R. (1998). “Prepared Statement of the Federal Trade Commission on 'Internet Fraud' Before the Subcommittee on Investigations of the Governmental Affairs Committee of the United States Senate,” Washington, D.C., February 10.

  • Resnick P. and H. R. Varian. (1997). “Recommender Systems,” Communications of the ACM 40 (3), 56–58.

    Google Scholar 

  • Stiff, J. B. (1996). “Theoretical Approaches to the Study of Deceptive Communication: Comments on Interpersonal Deception Theory,” Communication Theory 6 (3), 289–295.

    Google Scholar 

  • Thagard, P. (1992). “Adversarial Problem Solving: Modeling an Opponent Using Explanatory Coherence,” Cognitive Science 16, 123–149.

    Google Scholar 

  • Tooby, J. and L. Cosmides. (1989). “Evolutionary Psychology and the Generation of Culture, Part 1,” Ethology and Sociobiology 10, 29–49.

    Google Scholar 

  • Toris, C. and B. M. DePaulo. (1984). “Effects of Actual Deception and Suspiciousness of Deception on Interpersonal Perceptions,” Journal of Personality & Social Psychology 47 (5), 1063–1073.

    Google Scholar 

  • U.S. Congress-Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. (2001). “On-Line Fraud and Crime: Are Consumers Safe?: Hearings Before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, First Session,” May 23. Washington: U.S. G.P.O.

  • Vasek, M. E. (1986). “Lying as a Skill: The Development of Deception in Children,” in R. W. Mitchell (Ed.), Deception, Perspectives on Human and Non-Human Deceit. NY: State University of New York Publishing.

    Google Scholar 

  • Vrij, A. (2000). Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice. New York: Wiley & Sons.

    Google Scholar 

  • Yamagishi, T. and M. Yamagishi. (1994). “Trust and Commitment in the United States and Japan,” Motivation and Emotion 18 (2), 129–165.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Grazioli, S. Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet. Group Decision and Negotiation 13, 149–172 (2004). https://doi.org/10.1023/B:GRUP.0000021839.04093.5d

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:GRUP.0000021839.04093.5d

Navigation