Abstract
A crucial factor when successfully deceiving others is to instill trust in the receiver that the professed scenario and communication are genuine. In order to achieve this, deceivers often manipulate established norms and trust mechanisms to aid in their deception. This chapter explores the role of trust in deceptive communications and the different ways in which trust may be manipulated by deceivers to influence the judgments of message recipients. Following this analysis, we present an initial model of trust manipulation that brings all of these factors together to consider how elements of communication, such as building rapport and the use of authenticity cues, may be used to invoke trust in order to effectively deceive others.
This work was part funded by the Centre for Research and Evidence on Security Threats (ESRC Award: ES/N009614/1).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Action Fraud. (2017). What is fraud and cyber crime. Cited at http://www.actionfraud.police.uk/what-is-fraud, on February 28, 2017.
Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences,1(3), 23–32. https://doi.org/10.4236/jss.2013.13004.
Bayliss, A. P., & Tipper, S. P. (2006). Predictive gaze cues and personality judgements: Should eye trust you? Psychological Science,17(6), 514–520. https://doi.org/10.1111/j.1467-9280.2006.01737.x.
Bond, C. F., & DePaulo, B. M. (2006). Accuracy of deception judgments. Personality and Social Psychology Review,10, 214–234. https://doi.org/10.1207/s15327957pspr1003_2.
Bond, C. F., & DePaulo, B. M. (2008). Individual differences in judging deception: Accuracy and bias. Psychological Bulletin,134(4), 477–492. https://doi.org/10.1037/0033-2909.134.4.477.
Boureau, Y. L., Sokol-Hessner, P., & Daw, N. D. (2015). Deciding how to decide: Self-control and meta-decision making. Trends in Cognitive Science,19(11), 700–710. https://doi.org/10.1016/j.tics.2015.08.013.
Chartrand, T. L., & Bargh, J. A. (1999). The chameleon effect: The perception-behavior link and social interaction. Journal of Personality and Social Psychology,76(6), 893–910. https://doi.org/10.1037/0022-3514.76.6.893.
Chartrand, T. L., & Dalton, A. N. (2009). Mimicry: Its ubiquity, importance, and functionality. In E. Morsella, J. A. Bargh, & P. M. Gollwitzer (Eds.), Oxford handbook of human action (pp. 458–483). New York, NY: Oxford University Press.
Chartrand, T. L., Maddux, W. W., & Lakin, J. L. (2006). Beyond the perception-behavior link: The ubiquitous utility and motivational moderators of nonconscious mimicry. In R. Hassin, J. Uleman, & J. A. Bargh (Eds.), The new unconscious. New York: Oxford University Press.
Cialdini, R. (2007). Influence: The psychology of persuasion. New York: HarperCollins.
DePaulo, P. J., & DePaulo, B. M. (1989). Can attempted deception by salespersons and customers be detected through nonverbal behavioral cues? Journal of Applied Social Psychology,19, 1552–1577. https://doi.org/10.1111/j.1559-1816.1989.tb01463.x.
Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 581–590). https://doi.org/10.1145/1124772.1124861.
Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Fort Worth, TX: Harcourt.
Ensari, N., & Miller, N. (2002). The out-group must not be so bad after all: The effects of disclosure, typicality, and salience on intergroup bias. Journal of Personality and Social Psychology,83(2), 313–329. https://doi.org/10.1037/0022-3514.83.2.313.
Feng, J., Lazar, J., & Preece, J. (2004). Empathy and online interpersonal trust: A fragile relationship. Behavior & Information Technology,23(2), 97–106. https://doi.org/10.1080/01449290310001659240.
Fogg, B. J., Soohoo, C., Danielson, D., Marable, L., Stanford, T., & Tauber, E. R. (2002). How do users evaluate the credibility of Web sites? In Proceedings of the 2003 Conference on Designing for User Experiences (pp. 1–15). https://doi.org/10.1145/997078.997097.
Fung, R., & Lee, M. (1999). EC-trust (trust in e-commerce): Exploring the antecedent factors. In W. D. Haseman & D. L. Nazareth (Eds.), Proceedings of the Fifth Americas Conference on Information Systems (pp. 517–519). Milwaukee: Omnipress.
Giles, H., & Powesland, P. F. (1975). Speech style and social evaluation. Oxford, UK: Academic Press.
Guéguen, N. (2009). Mimicry and seduction: An evaluation in a courtship context. Social Influence,4(4), 249–255. https://doi.org/10.1080/15534510802628173.
Guinote, A. (2007). Power affects basic cognition: Increased attentional inhibition and flexibility. Journal of Experimental Social Psychology,43(5), 685–697. https://doi.org/10.1016/j.jesp.2006.06.008.
Hoeken, H., & Sinkeldam, J. (2014). The role of identification and perception of just outcome in evoking emotions in narrative persuasion. Journal of Communiation,64, 935–955. https://doi.org/10.1111/jcom.12114.
Jacob, C., Gueguen, N., Martin, A., & Boulbry, G. (2011). Retail salespeople’s mimicry of customers: Effects on consumer behavior. Journal of Retailing and Consumer Services,18, 381–388.
Jourard, S. M. (1971). Self-disclosure: An experimental analysis of the transparent self. Oxford, UK: Wiley.
Jourard, S. M., & Lasakow, P. (1958). Some factors in self-disclosure. The Journal of Abnormal and Social Psychology,56(1), 91–98. https://doi.org/10.1037/h0043357.
Kahneman, D. (2011). Thinking, fast and slow. London, UK: Penguin.
Kerr, M., Stattin, H., & Trost, K. (1999). To know you is to trust you: Parents trust is rooted in child disclosure of information. Journal of Adolescence,22, 737–752.
Lee, J., & Soberon-Ferrer, H. (1997). Consumer vulnerability to fraud: Influencing factors. Journal of Consumer Affairs,31(1), 70–89. https://doi.org/10.1111/j.1745-6606.1997.tb00827.x.
Lev-Ari, S., & Keysar, B. (2010). Why don’t we believe non-native speakers? The influence of accent on credibility. Journal of Experimental Social Psychology,46(6), 1093–1096. https://doi.org/10.1016/j.jesp.2010.05.025.
Levine, T. R. (2014). Truth-default theory: A theory of human deception and deception detection. Journal of Language and Social Psychology,33, 378–392. https://doi.org/10.1177/0261927X14535916.
Luhmann, N. (1979). Trust and Power. New York: Wiley.
Maddux, W. W., Mullen, E., & Galinsky, A. D. (2008). Chameleons bake bigger pies and take bigger pieces: Strategic behavioral mimicry facilitates negotiation outcomes. Journal of Experimental Social Psychology,44(2), 461–468. https://doi.org/10.1016/j.jesp.2007.02.003.
Mason, M. F., Tatkow, E. P., & Macrae, C. N. (2005). The look of love: Gaze shifts and person perception. Psychological Science,16(3), 236–239. https://doi.org/10.1111/j.0956-7976.2005.00809.x.
Meissner, C. A., & Kassin, S. M. (2002). “He’s guilty!”: Investigator bias in judgments of truth and deception. Law and Human Behavior,26(5), 469–480. https://doi.org/10.1023/a:1020278620751.
Miller, N. (2002). Personalization and the promise of contact theory. Journal of Social Issues,58, 387–410. https://doi.org/10.1111/1540-4560.00267.
Morris, M., Nadler, J., Kurtzberg, T., & Thompson, L. (2002). Schmooze or lose: Social friction and lubrication in e-Mail negotiations. Group Dynamics, Theory, Research and Practice,6(1), 89–100. https://doi.org/10.1037//1089-2699.6.1.89.
Pennebaker, J. W. (2011). The secret life of pronouns: What our words say about us. New York, NY: Bloomsbury Press/Bloomsbury Publishing.
Petty, R. E., & Cacioppo, J. T. (1986). The elaboration likelihood model of persuasion. Advances in Experimental Social Psychology, 19, 123–205.
Petty, R. E., & Mirels, H. L. (1981). Intimacy and scarcity of self-disclosure: Effects on interpersonal attraction for males and females. Personality and Social Psychology Bulletin,7, 493–503. https://doi.org/10.1177/014616728173020.
Pitesa, M., & Thau, S. (2013). Compliant sinners, obstinate saints: How power and self-focus determine the effectiveness of social influences in ethical decision making. Academy of Management Journal,56(3), 635–658. https://doi.org/10.5465/amj.2011.0891.
Rempel, J. K., Holmes, J. G., & Zanna, M. P. (1985). Trust in close relationships. Journal of Personality and Social Psychology,49(1), 95–112. https://doi.org/10.1037/0022-3514.49.1.95.
Ring, P. S., & Van de Ven, A. H. (1992). Structuring cooperative relationships between organisations. Strategic Management Journal,13(7), 483–498. https://doi.org/10.1002/smj.4250130702.
Robbins, J. M., & Krueger, J. I. (2005). Social projection to ingroups and outgroups: A review and meta-analysis. Personality and Social Psychology Review,9, 32–47. https://doi.org/10.1207/s15327957pspr0901_3.
Rotter, J. B. (1967). A new scale for the measurement of interpersonal trust. Journal of Personality,35(4), 651–665. https://doi.org/10.1111/j.1467-6494.1967.tb01454.x.
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review,23, 393–404. https://doi.org/10.5465/AMR.1998.926617.
Scissors, L. E., Gill, A. J., & Gergle, D. (2008). Linguistic mimicry and trust in text-based CMC. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (pp. 277–280), San Diego, CA. https://doi.org/10.1145/1460563.1460608.
Scissors, L. E., Gill, A., J, Geraghty, K., & Gergle, D. (2009). In CMC we trust: The role of similarity. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 527–536). Boston, MA. https://doi.org/10.1145/1518701.1518783.
Sillence, E., Briggs, P., Harris, P., & Fishwick, L. (2006). A framework for understanding trust factors in web based health advice. International Journal of Human Computer Studies,64, 697–713. https://doi.org/10.1016/j.ijhcs.2006.02.007.
Stajano, F., & Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM,54(3), 70–75. https://doi.org/10.1145/1897852.1897872.
Stel, M., & Harinck, F. (2011). Being mimicked makes you a prosocial voter. Experimental Psychology,58(1), 79–84. https://doi.org/10.1027/1618-3169/a000070.
Stel, M., & Vonk, R. (2010). Mimicry in social interaction: Benefits for mimickers, mimickees and their interaction. British Journal of Psychology,101, 311–323. https://doi.org/10.1348/000712609X465424.
Street, C. N. H. (2015). ALIED: Humans as adaptive lie detectors. Journal of Applied Research in Memory and Cognition,4(4), 335–343. https://doi.org/10.1016/j.jarmac.2015.06.002.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology and Behavior,7(3), 321–326. https://doi.org/10.1089/1094931041291295.
Swaab, R. I., Maddux, W. W., & Sinaceur, M. (2011). Early words that work: When and how virtual linguistic mimicry facilitates negotiation outcomes. Journal of Experimental Social Psychology,47(3), 616–621. https://doi.org/10.1016/j.jesp.2011.01.005.
Tausczik, Y. R., & Pennebaker, J. W. (2010). The psychological meaning of words: LIWC and computerized text analysis methods. Journal of Language and Social Psychology,29(1), 24–54. https://doi.org/10.1177/0261927X09351676.
Thiebach, M., Mayweg-Paus, E., & Jucks, R. (2015). “Probably true” says the expert: How two types of lexical hedges influence students’ evaluation of scientificness. European Journal of Psychology of Education,30(3), 369–384. https://doi.org/10.1007/s10212-014-0243-4.
Turner, R. N., Hewstone, M., & Voci, A. (2007). Reducing explicit and implicit outgroup prejudice via direct and extended contact: The mediating role of self-disclosure and intergroup anxiety. Journal of Personality and Social Psychology,93(3), 369–388. https://doi.org/10.1037/0022-3514.93.3.369.
Tversky, A., & Kahneman, D. (1974). Judgement under uncertainty: Heuristics and biases. Science,185, 1124–1134. https://doi.org/10.1126/science.185.4157.1124.
van Baaren, R. B., Holland, R. W., Steenaert, B., & van Knippenberg, A. (2003). Mimicry for money: Behavioral consequences of imitation. Journal of Experimental Social Psychology,39(4), 393–398. https://doi.org/10.1016/S0022-1031(03)00014-3.
Vishwanath, A. (2015). Habitual Facebook use and its impact on getting deceived on social media. Journal of Computer-Mediated Communication,20, 83–98. https://doi.org/10.1111/jcc4.12100.
Vishwanath, A., Harrison, B., & Ng, Y. J. (2016). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 45(8), 1146–1166. https://doi.org/10.1177/0093650215627483.
Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H. R. (2011). Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decision Support Systems,51, 576–586. https://doi.org/10.1016/j.dss.2011.03.002.
Webb, J. T. (1969). Subject speech rates as a function of interviewer behavior. Language and Speech,12(1), 54–67. https://doi.org/10.1177/002383096901200105.
Whitty, M. T. (2015). Anatomy of the online dating romance scam. Security Journal,28(4), 443–455. https://doi.org/10.1057/sj.2012.57.
Williams, E. J., Beardmore, A., & Joinson, A. N. (2017). Individual differences in susceptibility to online influence: A theoretical review. Computers in Human Behavior, 72, 412–421. https://doi.org/10.1016/j.chb.2017.03.002.
Williams, E. J., Morgan, P., & Joinson, A. N. (2017). Press accept to update now: Individual differences in susceptibility to malevolent interruptions. Decision Support Systems, 96, 119–129. https://doi.org/10.1016/j.dss.2017.02.014.
Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology,59(4), 662–674. https://doi.org/10.1002/asi.20779.
Worthy, C. B., Gary, A. L., & Kahn, G. M. (1969). Self-disclosure as an exchange process. Journal of Personality and Social Psychology,13, 59–63. https://doi.org/10.1037/h0027990.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Williams, E.J., Muir, K. (2019). A Model of Trust Manipulation: Exploiting Communication Mechanisms and Authenticity Cues to Deceive. In: Docan-Morgan, T. (eds) The Palgrave Handbook of Deceptive Communication. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-96334-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-96334-1_13
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-96333-4
Online ISBN: 978-3-319-96334-1
eBook Packages: Behavioral Science and PsychologyBehavioral Science and Psychology (R0)