Another look at information management: A rejoiner to McCornack, Levine, Morrison, and Lapinski

David B. Buller, Judee K. Burgoon

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

Our approach to information management in IDT is compatible with McCornack's IMT. However, our disagreements concerning the primacy of Grice's CP, the relevant conversational expectations, and communicators' sensitivity to expectancy violations produce points of departure in our approaches. Additionally, unlike IMT, our information managements dimensions are intended to underlie both the encoding and decoding of messages and to apply to truthful as well as deceitful discourse. IMT does not provide an explanation for how senders create deceptive messages, how listeners, upon detecting surface deviations, judge sender honesty, or how messages actually deceive. IDT's notions of strategic manipulation of information and expectancy violations are a promising starting point in explaining this process. It is clear that information management in deception is an important area for theoretical development and empirical testing. McCornack and his colleagues have been instrumental in bringing it to the attention of deception researchers. Our approach to information management in IDT, like McCornack's IMT, describes properties entailed in information management during deception. Theoretical exchanges, such as this one, help clarify and extend the idea of information management in both deceptive message production and processing.

Original languageEnglish (US)
Pages (from-to)92-98
Number of pages7
JournalCommunication Monographs
Volume63
Issue number1
DOIs
StatePublished - Mar 1996

ASJC Scopus subject areas

  • Communication
  • Language and Linguistics

Fingerprint

Dive into the research topics of 'Another look at information management: A rejoiner to McCornack, Levine, Morrison, and Lapinski'. Together they form a unique fingerprint.

Cite this