Abstract
This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers' success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real commercial site or a deceptive copycat (“page-jacking”) site. The deceptive site was identical to the clean site except that it contained six deceptive manipulations (e.g., forged favorable quotes from authoritative sources). This study compares the information processing behavior of four groups of subjects: those who detected the deception, those who missed it, those who correctly identified the real site as non-deceptive, and those who incorrectly believed that the real site was deceptive. It was found that (1) priming subjects to generate the hypothesis of deception weakly facilitates detection success, (2) competence at evaluating the hypothesis of deception is a strong differentiator between successful and unsuccessful detectors, and (3) successful detectors rely on “assurance” cues and heavily discount “trust” cues. Unsuccessful detectors do the opposite.
Access this article
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
Similar content being viewed by others
References
Albrecht, W. S., G. W. Wernz, and T. L. Williams. (1995). Fraud: Bringing Light to the Dark Side of Business. Burr Ridge, Ill.: Irwin Professional Pub.
Allen, J. (2001). The CERT Guide to System and Network Security Practices. Addison Wesley.
Beltramini, R. F. and E. R. Stafford. (1993). “Comprehension and Perceived Believability of Seals of Approval Information in Advertising,” Journal of Advertising 21 (3), 3–31.
Bouwman, M. J. (1983). “Human Diagnostic Reasoning by Computer: An Illustration From Financial Analysis,” Management Science 29 (6), 635–672.
Buller, D. B. and J. K. Burgoon. (1996). “Interpersonal Deception Theory,” Communication Theory 6 (3), 203–242.
Burgoon, J. K, D. B. Buller, A. Ebesu, and P. Rockwall. (1994). “Interpersonal Deception: V. Accuracy in Deception Detection,” Communication Monographs 61, 303–325.
Cheng P. W. and K. J. Holyoak. (1985). “Pragmatic Reasoning Schemas,” Cognitive Psychology 17, 391–416.
Clancey W. J. (1988). “Acquiring, Representing and Evaluating a Competence Model of Diagnostic Strategy,” in M. Chi, R. Glaser, and M. Farr (Eds.), The Nature of Expertise. Hillsdale, NY: LEA, 343–418.
Cosmides, L. (1989). “The Logic of Social Exchange: Has Natural Selection Shaped How Humans Reason? Studies with the Wason Selection Task,” Cognition 31, 187–276.
Cummins R. (1996). Representations, Targets and Attitudes. MIT press.
Daft, R. and R. Lengel. (1984). “Information Richness: A New Approach to Managerial Behavior and Organizational Design,” Research in Organizational Behavior 6, 191–233.
Daft, R. and R. Lengel. (1986). “Organizational Information Requirements, Media Richness and Structural Design,” Management Science 32 (5), 554–571.
Dennett, D. C. (1987). The Intentional Stance. Cambridge, MA: The MIT Press.
Dennis, A. and S. Kinney. (1998). “Testing Media Richness Theory in the New Media: The Effects of Cues, Feedback, and Task Equivocality,” Information Systems Research 9 (3), 256–274.
DePaulo, B. M., M. Zuckerman, and R. Rosenthal. (1980). “Humans as Lie Detectors,” Journal of Communication pp. 129-139.
DePaulo, P. J., B. M. DePaulo, J. Tang, and G. W. Swaim. (1989). “Lying and Detecting Lies in Organizations,” in R. A. Giacalone and P. Rosenfeld (Eds.), Impression Management in the Organization. Hillsdale, NJ: LEA, 377–393.
Ekman, P. and M. O'Sullivan. (1991). “Who Can Catch a Liar?” American Psychologist 46 (9), 913–920.
Ekman, P. (1992). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. New York, NY: W. W. Norton & Company.
Ericsson K. and J. Smith. (1991). Towards a General Theory of Expertise. University of Cambridge Press.
FTC v. Pereira et al. (1999). “Complaint for Permanent Injunction and Other Equitable Relief,” Case No. 99-1367-A, U.S. District Court, E. D. Alexandria, VA.
Garfinkel, S. and G. Spafford. (2002). Web Security, Privacy and Commerce, 2nd Ed. Cambridge: O'Reilly & Associates.
Grazioli, S. (1998). “Errors in Detecting Financial Deception: A Cognitive Modeling Approach,” Proceedings of the Fourth Conference of the Association for Information Systems. Baltimore, MD.
Grazioli, S. and S. Jarvenpaa. (2000). “Perils of Internet Fraud,” IEEE transactions on Systems, Man, and Cybernetics 30 (4), 395–410.
Grazioli, S. and S. Jarvenpaa. (2001). “Tactics Used Against Consumers as Victims of Internet Deception,” Proceedings of the Americas Conference on Information Systems. Boston, Mass, 810-815.
Grazioli, S. and S. Jarvenpaa. (in press). “Deceived: Under Target on Line,” Communications of the ACM.
Higgins, E. T. (1996). “Knowledge Activation: Accessibility, Applicability, and Salience, in E. T. Higgins and A. W. Kruglanski (Eds.), Social Psychology: Handbook of Basic Principles. NY: Guilford Press, 133–168.
Higgins, E. T., J. A. Bargh, and W. Lombardi. (1985). “The Nature of Priming Effects in Categorization,” Journal of Experimental Psychology: Learning, Memory and Cognition 11, 59–69.
Hyman, R. (1989). “The Psychology of Deception,” Annual Review of Psychology 40, 133–154.
Jarvenpaa, S. and S. Grazioli. (1999). “Surfing Among Sharks: How to Gain Trust in Cyberspace,” Financial Times 7/12. Reprinted in D. A. Marchand, T. H. Davenport, and T. Dickson (Eds.), FT, Mastering Information Management Series. London: Prentice Hall, 197–201.
Johnson, P. E., S. Grazioli and K. Jamal. (1993). “Fraud Detection: Deception and Intentionality in Cognition,” Accounting, Organization and Society 18 (5), 467–488.
Johnson, P. E., S. Grazioli, K. Jamal, and I. A. Zualkernan. (1992). “Success and Failure in Expert Reasoning,” Journal of Organizational Behavior and Human Decision Processes 53 (2), 173–203.
Johnson, P. E., S. Grazioli, K. Jamal, and G. Berryman. (2001). “Detecting Deception: Adversarial Problem Solving in a Low Base Rate World,” Cognitive Science 25 (3), 355–392.
Kauffman, R. and C. Wood. (2000). “Running up the Bid: Modeling Seller Opportunism in Internet Auctions,” Proceedings of the 2000 Americas Conference on Information Systems, Long Beach, CA, August 10-13.
Kunda, Z. (1999). Social Cognition: Making Sense of People. Cambridge, MA: The MIT Press.
March, J. (1988). Decisions and Organizations. Oxford, England: Blackwell.
Mawby, R. and R. W. Mitchell. (1986). “Feints and Ruses: An Analysis of Deception in Sports,” in R. W. Mitchell and N. S. Thompson (Eds.), Deception: Perspectives on Human and Non-human Deceit. Albany, NY: SUNY Press, 313–322.
McCornack, S.A. and T. R. Levine. (1992). “When Lovers Become Leery: The Relationship Between Suspicion and Accuracy in Detecting Deception,” Communication Monographs 57, 219–230.
Morris-Cotterill, N. (1999). “Use and Abuse of the Internet in Fraud and Money Laundering,” International Review of Law Computers and Technology 13 (2), 211–228.
National White Collar Crime Center and the Federal Bureau of Investigation. (2001). Internet Fraud Complaint Center: Six Months Data Trends Report.
Newell, A. and H. A. Simon. (1972). Human Problem Solving. Englewood Cliffs, NJ: Prentice-Hall.
Pitofsky, R. (1998). “Prepared Statement of the Federal Trade Commission on 'Internet Fraud' Before the Subcommittee on Investigations of the Governmental Affairs Committee of the United States Senate,” Washington, D.C., February 10.
Resnick P. and H. R. Varian. (1997). “Recommender Systems,” Communications of the ACM 40 (3), 56–58.
Stiff, J. B. (1996). “Theoretical Approaches to the Study of Deceptive Communication: Comments on Interpersonal Deception Theory,” Communication Theory 6 (3), 289–295.
Thagard, P. (1992). “Adversarial Problem Solving: Modeling an Opponent Using Explanatory Coherence,” Cognitive Science 16, 123–149.
Tooby, J. and L. Cosmides. (1989). “Evolutionary Psychology and the Generation of Culture, Part 1,” Ethology and Sociobiology 10, 29–49.
Toris, C. and B. M. DePaulo. (1984). “Effects of Actual Deception and Suspiciousness of Deception on Interpersonal Perceptions,” Journal of Personality & Social Psychology 47 (5), 1063–1073.
U.S. Congress-Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. (2001). “On-Line Fraud and Crime: Are Consumers Safe?: Hearings Before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, First Session,” May 23. Washington: U.S. G.P.O.
Vasek, M. E. (1986). “Lying as a Skill: The Development of Deception in Children,” in R. W. Mitchell (Ed.), Deception, Perspectives on Human and Non-Human Deceit. NY: State University of New York Publishing.
Vrij, A. (2000). Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice. New York: Wiley & Sons.
Yamagishi, T. and M. Yamagishi. (1994). “Trust and Commitment in the United States and Japan,” Motivation and Emotion 18 (2), 129–165.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Grazioli, S. Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet. Group Decision and Negotiation 13, 149–172 (2004). https://doi.org/10.1023/B:GRUP.0000021839.04093.5d
Issue Date:
DOI: https://doi.org/10.1023/B:GRUP.0000021839.04093.5d