Hostname: page-component-7b9c58cd5d-hxdxx Total loading time: 0 Render date: 2025-03-15T16:04:19.308Z Has data issue: false hasContentIssue false

Promises and lies: can observers detect deception in written messages

Published online by Cambridge University Press:  14 March 2025

Jingnan Chen*
Affiliation:
Economics Department, Business School, University of Exeter, Exeter, UK
Daniel Houser*
Affiliation:
Interdisciplinary Center for Economic Science, George Mason University, Fairfax, USA
Rights & Permissions [Opens in a new window]

Abstract

We design a laboratory experiment to examine predictions of trustworthiness in a novel three-person trust game. We investigate whether and why observers of the game can predict the trustworthiness of hand-written communications. Observers report their perception of the trustworthiness of messages, and make predictions about the senders’ behavior. Using observers’ decisions, we are able to classify messages as “promises” or “empty talk.” Drawing from substantial previous research, we hypothesize that certain factors influence whether a sender is likely to honor a message and/or whether an observer perceives the message as likely to behonored: the mention of money; the use of encompassing words; and message length. We find that observers have more trust in longer messages and “promises”; promises that mention money are significantly more likely to be broken; and observers trust equally in promises that do and do not mention money. Overall, observers perform slightly better than chance at predicting whether a message will be honored. We attribute this result to observers’ ability to distinguish promises from empty talk, and to trust promises more than empty talk. However, within each of these two categories, observers are unable to discern between messages that senders will honor from those that they will not.

Type
Original Paper
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
Copyright © The Author(s) 2016

1 Introduction

Economic and social relationships often involve deception (e.g., Gneezy Reference Gneezy2005; Mazar and Ariely Reference Mazar and Ariely2006). Such relationships are generally governed by informal contracts that require trust (Berg et al. Reference Berg, Dickhaut and McCabe1995). While trust is essential to an economy, the knowledge of who and when to trust, i.e. deception or trustworthiness detection, is equally critical (see, e.g., Belot et al. Reference Belot, Bhaskar and van de Ven2012). In particular, trust is critically important in cases where an exchange can lead to gains, but there are also incentives for one side to defect and appropriate the surplus. In these situations, people may send informal “promises” of future behavior. These messages must be interpreted to gauge the extent to which they can be trusted.

Substantial research has focused on deception in economics (see, for example, Hao and Houser Reference Hao and Houser2013; Erat and Gneezy Reference Erat and Gneezy2011; Rosaz and Villeval Reference Rosaz and Villeval2011; Kartik Reference Kartik2009; Sutter Reference Sutter2009; Dreber and Johannesson Reference Dreber and Johannesson2008; Charness and Dufwenberg Reference Charness and Dufwenberg2006; Ellingsen and Johannesson Reference Ellingsen and Johannesson2004). Recent research has devoted increasing attention to the question of whether it is possible to detect deception or trustworthinessFootnote 1;(see, e.g., Belot et al. Reference Belot, Bhaskar and van de Ven2012; Darai and Grätz Reference Darai and Grätz2010; Konrad et al. Reference Konrad, Lohse and Qari2014). While there have been important advances, previous studies have focused largely on face-to-face communication. To our knowledge, no studies in economics have focused on detecting deception in informal written communication.Footnote 2 This is unfortunate, as informal written communication (e.g., via email, texting, tweeting, or facebooking) plays an increasingly important role in social and economic exchange outcomes. One example is Internet dating,Footnote 3 where interactions often begin with initial informal written message exchanges. The purpose of these exchanges is to build a foundation of mutual trust upon which a real (as compared to virtual) relationship can developFootnote 4 (Lawson and Leck Reference Lawson and Leck2006). Evidently, during this process of written exchanges, each party must make decisions regarding the trustworthiness of the other. Consequently, it is an increasingly important skill for users to be able to write trustworthy-sounding messages, as well as to be able to detect insincere messages.

There is a wide body of literature studying informal communication within the context of “cheap talk”Footnote 5 (see, e.g., Farrell and Rabin Reference Farrell and Rabin1996; Crawford Reference Crawford1998). Nonetheless, the literature has focused heavily on how cheap talk affects senders,Footnote 6 and very little on how it affects receivers (see, for example, Farrell and Rabin Reference Farrell and Rabin1996; Croson et al. Reference Croson, Boles and Murnighan2003; Charness and Dufwenberg Reference Charness and Dufwenberg2006). If cheap talk messages work by changing receivers’ beliefs about senders’ actions (as suggested by Charness and Dufwenberg Reference Charness and Dufwenberg2006), then many important questions remain open. Such questions include: (i) the precise nature of messages to which people are most likely to respond positively; and (ii) the extent to which people are able to distinguish truthful messages from deceptive ones (and correctly update their beliefs). This paper takes a step toward answering these questions. In particular, we investigate whether there are cues that can predict whether a written communication is dishonest, and if so, whether the person reading the message can detect and correctly use those cues.

Our study introduces a novel variant of the trust game (building on the hidden action game of Charness and Dufwenberg Reference Charness and Dufwenberg2006). Our game captures an environment with misaligned incentives and opportunities to defect, but also includes potential gains from cooperation. In this context, we offer participants the opportunity to communicate with one another using hand-written messages. We use this design to accomplish three research goals: (i) to determine the characteristics of cheap talk messages that promote receivers’ trust; (ii) to discover objectively quantifiable cues for differentiating promises writers are likely keep from those they are likely to break; and (iii) to assess whether message receivers recognize and respond correctly to those cues.

We find that receivers are significantly more likely to consider longer messages to be promises, as compared to shorter messages. In this sense, there is a payoff to a message sender’s effort. Second, we find that promises mentioning money are significantly more likely to be broken. Yet receivers fail to respond to this cue. Instead, they place more trust in longer promises, despite the fact that senders are just as likely to break such promises as they are to break shorter promises. Finally, people perform, on average, slightly better than random guessing at judging whether a sender will honor a message. The reason is that readers are able to distinguish promises from empty talk, and they correctly place more trust in promises. However, within kept and broken promises, readers cannot reliably determine which promises a sender will or will not honor.

These findings help to explain features of our natural environment. For example, advertisements often provide extensive details regarding the benefits of offered products. Presumably, the reason is that companies have learned that longer promises are more likely to be believed.

This paper proceeds as follows. In Sect. 2, we discuss related literature. Section 3 explains the context from which we obtain the message data, as well as the experimental design. In Sect. 4, we report our analysis and results. Section 5 summarizes and concludes.

2 Related literature

Research on deception detection has appeared in both psychology and economics. Key findings from economics indicate that people notice and respond to some cues (for example, gender and presence of a handshake), but not others (e.g., participants’ past behavior) (see, e.g., Belot et al. Reference Belot, Bhaskar and van de Ven2012; Darai and Grätz Reference Darai and Grätz2010; Wang et al. Reference Wang, Spezio and Camerer2010; Belot and van de Ven Reference Belot and van de Ven2016). These results, however, are based only on face-to-face communication. The psychology literature studies the same question, but within the context of qualitative cues, such as facial movements or expressions (e.g., Ekman Reference Ekman2009b). The main finding from this literature is that people do not know what to look for to identify cheating, and consequently perform poorly—not much better than chance—at detecting deception.Footnote 7 In addition, DePaulo et al. (Reference DePaulo, Lindsay, Malone, Muhlenbruck, Charlton and Cooper2003) pointed out the participants in psychology studies are typically not incentivized, making it difficult to know whether poor deception detection results from poor “acting” by the deceivers.

The paper closest to ours is Belot et al. (Reference Belot, Bhaskar and van de Ven2012). The authors report that subjects in an economic experiment were able to use some objective cues (while ignoring others) to improve their ability to detect deception and trustworthiness. The authors made a novel use of data from a high-stakes prisoner’s dilemma game show. Subjects watched clips and rated the likelihood that players would cooperate pre- and post-communication. The authors discovered that subjects were able to use someFootnote 8 objective features of the game’s players (such as gender and past behaviors) to make pre-communication predictions. Although subjects did not seem to improve their overall predictions after observing communication between the players, they did respond positively to the “elicited promise”Footnote 9 communication group. The authors concluded that previous research might have underestimated people’s ability to discern trustworthiness in face-to-face interactions. Another related study is Utikal (Reference Utikal2013), where the author looks into the differential effect of truthful and fake apology on forgiveness with typed messages. The author finds that people seem to be able to distinguish truthful and fake apologies, and are more likely to forgive after truthful apologies.

In sum, most research to date has emphasized people’s ability to detect deception or trustworthiness in face-to-face encounters. Face-to-face interaction is a very rich and relevant environment for assessing people’s ability to detect deception; however, the environment may be too complex to enable one to draw inferences as to the reasons for people’s performance. Many factors are at play, including facial expressions, body movements, hand gestures and language. Many of these factors are quite hard to measure. Consequently, it can be difficult in these studies to pinpoint the information people acquire and use.Footnote 10 For example, in Belot et al. (Reference Belot, Bhaskar and van de Ven2012), the authors show that subjects are able correctly to predict females as relatively more trustworthy than males. There are many possible explanations for this. It may be that: (i) females are more sensitive to guilt, and thus less likely to lie (and more trustworthy in general) (e.g., Dreber and Johannesson Reference Dreber and Johannesson2008; Erat and Gneezy Reference Erat and Gneezy2011); or (ii) females are less capable of concealing their emotions in facial expression (e.g., Papini et al. Reference Papini, Farmer, Clark, Micka and Barnett1990), and thus are more likely to be considered trustworthy by observers.

Further, prior research has not systematically investigated the ability to predict trustworthiness through other forms of communicationFootnote 11 (e.g., online written communication such as that used in dating websites), despite their ubiquity and importance. This paper contributes to the literature by using a controlled laboratory experiment to investigate cues that predict deception (untrustworthiness), and to offer explanations as to why people detect or fail to detect untrustworthiness. Relatedly, our analysis offers new insights into how to convey trustworthiness.

3 The game, messages and evaluations

3.1 The Mistress GameFootnote 12

We devised a novel three-person gameFootnote 13 to generate written messages. Third party observers in a subsequent experiment then evaluated these messages. They were asked to assess the nature of the message (e.g., a promise or empty talk) and predict the behaviors of the message senders, as detailed in Sect. 3.3.Footnote 14 The extensive form of the Mistress Game is shown above in Fig. 1. Payoffs are in dollars.

Fig. 1 The Mistress Game

The Mistress Game builds on the hidden action trust game (Charness and Dufwenberg Reference Charness and Dufwenberg2006), but chance (the die roll) is replaced with a strategic third player C in our game. Our payoff structure offers incentives that suggest the following interpretation.

A and B consider whether to form a partnership; if no partnership occurs, then both parties receive the outside option payoff of $5. At this point, C is not relevant and receives $10 as the outside option. If a partnership is formed, a trust relationship emerges, and the payoffs to this relationship depend on the B’s decision. B is faced with a dilemma—either to stay with the current trust relationship (corresponding to B’s Out option) or form an additional trust relationship with a third person (at this decision point, C is now relevant) and enjoy a potentially higher payoff (corresponds to B’s In option). Note that A is NO better off (maybe even worse off) by B’s choosing In; therefore, A would always prefer B to choose Out and maintain an exclusive partnership. If B chooses to stay with A [corresponding to the strategy profile (In, Out, Left/Right)], both A and B are better off (with the payoff of $10 for each), and C (who has no move) again earns the outside option of $10. The strategy profile (In, Out, Left/Right) corresponds to the situation where an exclusive partnership contract is enforceable. However, such a contract may not be enforceable. Indeed, B’s choice may not be observable to A, depending on C’s decision. Our game captures this as discussed below.

If B chooses to form a new trust relationship with C (corresponding to B’s In option), C can either be cooperative and reciprocal by choosing Left, or defect by choosing Right. Note that if C chooses Left, B’s behavior is unknown to A (B’s original partner). However, if C chooses Right, not only does B receive nothing from the newly-initiated trust (C takes all), A is also impacted and receives nothing. In this case, A knows B’s choice. Note that A may foresee such outcomes and choose not to enter a trust partnership with B. The players’ choices, Out, In and Right, describe those possibilities. It is easy to verify that the sub-game perfect equilibrium of this game for selfish and risk-neutral players is (In, Out, Right), which is also inefficient.

3.2 The messages

In addition to the regular no-communication game play, we also introduce one-sided pre-game communication to the environment: the players have an opportunity to send a handwritten note to their counterparts. In particular, for the purpose of this paper, we focus on the messages from C to B under two different environments: single message and double message.Footnote 15

3.2.1 Single message environment

Before the subjects play the Mistress Game, C has the option of writing a message to B. The experimenter then collects the messages and passes them as shown in Fig. 2. That concludes the communication phase, and the subjects start to play the game.Footnote 16

Fig. 2 The single message communication phase

3.2.2 Double message environment

As shown in Fig. 3, the double message environment is similar to the single message environment, except that the opportunity for C to send a message to B comes as a surprise.

Fig. 3 The double message communication phase

It is common knowledge from the beginning of the experiment that B has an opportunity to send a hand-written messageFootnote 17 to A. After the messages are transmitted, the experimenter announces a surprise message opportunity: C can also send a message to B. The experimenter waits for the Cs to write their messages and then passes the messages on to their paired Bs. Upon completion of the message transmission, subjects start to play the game.

In both the single and double message environments, C is better off when the B chooses In; therefore, it is natural to assume that the C would use the messages as a means to persuade B to choose In. However, the two environments also depart significantly from each other.

Specifically, in the double message environment, where everyone knows that B has already sent a message to A, it is reasonable to presume that B might have conveyed his intention to stay with A and might choose Out. Therefore, it is very likely that C needs to do a better job in convincing B to choose himself/herself instead by choosing In. Indeed, we find some evidence suggesting that C worked harder in crafting their messages, as messages are significantly longer in the double message environment.

3.3 The experiment

3.3.1 Design and procedure

The evaluation sessions were conducted in the experimental laboratory of Interdisciplinary Center for Economic Science at George Mason University.Footnote 18 We recruited 93 evaluators from the general student population (22 evaluators to evaluate messages from single message environment and 71 to evaluate messages from double message environment). None of the evaluators had previously participated in the Mistress Game experiment. Average earnings were $18 (including the $5 show-up bonus); sessions lasted about 1 h.

Before reviewing any messages, evaluators were acquainted with the Mistress Game and provided with a transcript of the Mistress Game instructions for either the single message environment or the double message environment. A quiz was administered to ensure that all the evaluators understood their tasks, as well as the context in which the messages would be written.

There were, in total, 20 and 60 messages collected from the Mistress Game single and double message sessions respectivelyFootnote 19. All of the messages were scanned into PDF files and displayed on the computer screen in random order for the evaluators to look through. Each evaluator worked on all messages independently inside their own visually-separated cubicles. They were not provided with any information regarding the decisions of the message-senders or their partners. Nor were the evaluators given any information regarding the purpose of the study, or the hypotheses of interest. Evaluators were instructed to first classify each message as either “Promise or Intent” or “Empty Talk,” and then to make conjectures as to what the message senders actually did.

To clarify the meanings of “Promise or Intent” and “Empty Talk,” we provided the following statement in the instructionsFootnote 20:

… A message should be categorized as a statement of intent or promise if at least one of the following conditions is probably satisfied:

  1. 1. the writer, subject C, indicates in the message he/she would do something favorable to subject B or refrain from doing something that harms subject B; or.

  2. 2. the message gives subject B reasons to believe or expect that subject C would do something favorable to subject B or refrain from doing something that harms subject B.

A message should be coded as empty talk if none of the above conditions are satisfied…

We followed the XH classification gameFootnote 21 (Houser and Xiao Reference Houser and Xiao2010) to incentivize the first evaluation task: two messages were randomly chosen for payment, and the evaluators were paid based on whether their classifications coincided with the median choice of the evaluation group. This was essential, as the average opinion of a large number of evaluators who are also strangers to the message writer is a reasonable way to infer not only how the message was likely interpreted, but also the way in which the message writer expected the message to be interpreted. This is especially true when the evaluators are from the same pool as the message writers and receivers.

For the second task, another two messages were randomly chosen for payment, and evaluators were paid based on whether their guesses matched the actual behavior of the message senders. Upon completion of the evaluation tasks, the evaluators were given a survey with questions that evaluated things like how they made their classification or guess decisions. The experimental instructions are available as an appendix to this paper.

3.3.2 Cues and their effects

One advantage of written messages compared to face-to-face communications is that they have fewer cues that one can make use of and quantify. In view of the literature, we developed several conjectures regarding cues in written messages that may impact the perceived trustworthiness of the messages:

3.4 Mention of money

The mention of money may impact how evaluators assess the trustworthiness of a message in a positive way. The reason is that the mention of money contains information that is relevant to game play, and thus gives credibility to the message. This may make the sender seem more trustworthy. Consequently, the message is more likely to be evaluated as a promise (see, e.g., Rubin and Liddy Reference Rubin and Liddy2006).

3.5 Use of encompassing words

The use of encompassing words can foster a common social identity among message senders and receivers (Hall Reference Hall1995). This sort of “in-group” effect can impact the sense that a message is a promise, as well as the belief that a promise will be kept. Indeed, being part of an in-group can also impact reciprocity decisions. A rapidly growing literature supports these observations. For example, Kimbrough et al. (Reference Kimbrough, Smith and Wilson2006) found that it is more common to mention “we” or “us” during chat with in-group rather than out-group members, and that the mention of these encompassing words is positively correlated with cooperation and the willingness to make and keep promises to do personal favors. Schniter et al. (Reference Schniter, Sheremeta and Sznycer2012) concluded from their experiments that one of the steps for effectively restoring damaged trust with a partner is to convey “a shared welfare or other-regarding perspective.”

3.6 Message length

According to the heuristic model, the structural or surface attributes of the message may be processed in a heuristic manner (Chaiken Reference Chaiken1980). If strong and compelling messages are often associated with longer and more detailed arguments, people may learn a rule suggesting that length implies strength. Application of this heuristic would then suggest longer messages being more persuasive than short ones. Indeed, there are some evidence in support of this theory (see, e.g., Petty and Cacioppo Reference Petty and Cacioppo1984). Therefore, longer messages are more likely to be perceived as promises and trusted by the receivers.

3.7 Gender of the message writer

We do not expect gender of the message writers to impact the message evaluation. The evidence for gender differences in perceived trustworthiness/honesty is quite divided (for a review, see, Buchan et al. Reference Buchan, Croson and Solnick2008). In some studies, males are viewed as more trustworthy than females (Jeanquart-Barone and Sekaran Reference Jeanquart-Barone and Sekaran1994); in other studies, females are believed to be more trustworthy/honest (Wright and Sharp Reference Wright and Sharp1979; Swamy et al. Reference Swamy, Knack, Lee and Azfar2001); some studies fail to find any significant perceived trustworthiness difference between males and females (Frank and Schulze Reference Frank and Schulze2000).

4 Results

4.1 Receivers behaviors in mistress game: the power of words

To demonstrate the significant impact of communication on the receivers (Role B), we present below the decisions made by B in the Baseline (no messages were sent), Single and Double treatments.

As shown in Fig. 4, only 24 % of B chose In in the Baseline treatment. By contrast, in the Single treatment, 68 % chose In, and in the Double treatment, 52 % chose In. These differences (Single vs. Baseline and Double vs. Baseline) are statistically significant at the 1 % level. Having established that communication significantly impacts decisions in our game, we now address our central question: can observers detect deception?Footnote 22

Fig. 4 Role B decisions

4.2 Evaluation: Data and descriptive statistics

We obtained 80 messages in total from the communication phase of the Mistress Game: 20 messages from Single, and 60 from Double, all of which were classified by our evaluators. Among the 20 messages from Single, 80 % were categorized as promises or statements of intentFootnote 23; 77 % of the 60 messages from Double were classified as including a promise or intentFootnote 24,Footnote 25 (See Table 1).

Table 1 Message evaluation results

Single msg

Double msg

Promises/statements of intent

16 (80 %)

46 (77 %)

Empty talk

4 (20 %)

14 (23 %)

All messages

20

60

The messages from both environments are statistically identical in terms of mentions of money, mentions of we/us, and the gender of the message sender. However, they differ in terms of message length. As shown in Table 2 above, around a quarter of the messages include money mentions, and less than one third involve the use of “we,” “us” or “let’s.” Messages from Double are significantly longer than those from Single. This may stem from the fact that in the double message environment, C understands that B communicated with A, and thus it may be more difficult to convince B to select In. Consequently, Cs exert more effort and write longer messages.

Table 2 Comparison of the messages from single and double environment

Environment

Observations

Mean

Z stat

Single

Double

Single

Double

Mention of moneya

20

60

0.20

(0.09)

0.32

(0.06)

0.99

Mention of “we/us”b

20

60

0.20

(0.09)

0.33

(0.06)

1.12

Word countc

20

60

7.85

(1.43)

14.15

(1.61)

1.87*

Male senderd

20

59e

0.70

0.68

0.18

Standard errors are reported in the parentheses. The Z statistic derives from two-sided Mann–Whitney tests

* p < 0.10, two tailed tests

aMention of money is a binary variable; it is coded as 1 if there is any money/payoff related discussion in the message (payoff for the game, benefit from the game, and so on) and 0 otherwise

bMention of we/us is also a binary variable: = 1 if the message sent used “we,” “us” or the abbreviated form, e.g., “let’s,” and 0 otherwise

cWord Count is the number of words in the messages

dMale is a binary variable: it is set to unity if the gender of the message sender is male, and to zero otherwise

eOne subject indicated that s/he is bi-gender

4.3 Perceived cues for trustworthiness from the receivers

We begin this section by investigating the type of messages more likely to be regarded as promises (Sect. 4.3.1). We proceed to examine the cues that influence the perceived trustworthiness of a message, as well as the cues that predict actual trustworthy behaviors (Sect. 4.3.2). Interestingly, we discover that whether a message is coded as a promise is a significant predictor not only of perceived trustworthiness, but also of actual trustworthy behavior. Finally, in order to better understand this phenomenon, we provide an analysis narrowly focused on promises (Sect. 4.3.3).

4.3.1 What makes a promise?

In this section, we investigate objective features that receivers perceive as indicative of more trustworthy messages. In particular, we attempt to discover whether any of the objective features of the messages discussed above are significantly (positively or negatively) correlated with whether the message was classified as a promise, and, if so, the extent to which that promise is trusted.

We begin by pooling the message classification data from the first task,Footnote 26 and then analyzing those data using a Tobit regression model. In this analysis each message is treated as an independent observation, and the dependent variable is the frequency with which each message is categorized by the evaluators as a promise (thus the dependent variable is censored from below at 0 and from above at 1). This frequency is regressed on whether money is mentioned in the message, whether there is a mention of “we” or “us” in the message, the number of words in the message, and the gender of the message writer. We report the results in Table 3.

Table 3 Tobit regression of message classification on perceived cues

Dependent variable:

frequency considered as promise

(1)

(2)

Mention of money

.03

(.06)

.03

(.06)

Mention of we/us

.04

(.06)

.07

(.06)

Word count

.008***

(.003)

.008***

(.003)

Male

−.09

(.06)

No. of observation

80

79a

Robust Standard errors are reported in parentheses

*, **, *** Correspond to 1, 5 and 10 % significance level, respectively

aWe lose one observation by adding m a l e as a regressor, because one of the message sender indicates that he/she is bi-gender

Table 3 suggests that, when coding the messages as either Promise or Empty Talk, our receivers seem to rely primarily on the length of the messages: all else equal, longer messages are significantly more likely to be considered promises.Footnote 27

4.3.2 What predicts perceived trustworthiness?

Next, we consider messages coded as promises by the majority of the evaluators. Our goal is twofold: (1) to understand the cues that are used by the evaluators in guessing whether a promise is likely to be trusted; and (2) to compare the perceived cues with the actual cues that predict senders’ behavior.

We use a Tobit regression to analyze the pooled guessing data from the second task.Footnote 28 The unit of observation is the message, and the dependent variable is the frequency with which message i is trusted by the evaluators (censored at 0 and 1). The regressors include those reported in Table 3, as well as two additional variables. One is Promise. This is a dummy variable taking value 1 if message i is coded as a promise by a majority of the evaluators, and is zero otherwise. The second new regressor, Promise Broken is the product of Promise and Broken. The latter is a dummy variable that takes value 1 if the sender of the message chose Right; and is zero otherwise.

We describe the regression results in Table 4. From regression (1) and (2), one discovers that receivers use length of the message: longer messages are significantly more likely to be trusted, everything else equal.Footnote 29 From (3), we find that promises are significantly more likely to be believed. On average, a promise is 41 % more likely to be trusted compared to empty talk, ceteris paribus. Finally, as shown in (4), although receivers put significantly more trust in promises, that trust is often misplaced, as the readers cannot distinguish promises that will be kept from those that will be broken.

Table 4 Tobit regression of perceived cues for trustworthiness using all messages

Dependent variable:

frequency of trust for messages

(1)

(2)

(3)

(4)

Mention of money

−.005

(.05)

−.005

(.05)

−.03

(.03)

−.02

(.03)

Mention of we/us

.04

(.04)

.05

(.04)

.002

(.04)

.007

(.04)

Word count

.008***

(.002)

.008***

(.002)

.003**

(.001)

.003**

(.001)

Male

−.03

(.05)

.04

(.03)

.04

(.03)

Promise

.41***

(.04)

.41***

(.04)

Promise broken

−.02

(.03)

No. of observation

80

79

79

79

Robust standard errors are reported in parentheses

*, **, *** Correspond to 1, 5 and 10 % significance level, respectively

Now we turn to the cues that predict senders’ actual decisions. We conducted bivariate probit regressions using decision data from actual message senders. The unit of observation is again the message. The dependent variable is binary, taking value 1 if the sender of message i chose Left (the cooperative option) and zero otherwise. As detailed in Table 5 below, we find that the only cue that predicts senders’ cooperative decisions across all messages is whether the message is coded as a promise. The senders who made a promise are significantly more likely to choose the cooperative option (Left) than the empty talk senders. That is, senders who made a promise choose to cooperate substantially more frequently than those senders who did not send a promise.

Table 5 Actual cues predicting senders’ behavior using all messages

Dependent variable:

senders’ actual decision

(1)

(2)

(3)

Mention of money

−.21

(.16)

−.20

(.16)

−.22

(.17)

Mention of we/us

−.14

(.16)

−.15

(.16)

−.21

(.18)

Word count

.004

(.006)

.003

(.006)

−.003

(.006)

Male

.10

(.12)

.19

(.12)

Promise

.41***

(.13)

No. of observation

80

79

79

Marginal effects are reported, robust standard errors in parentheses

*, **, *** Correspond to 1, 5 and 10 % significance level, respectively

From the evaluators’ perspectives, longer messages and promises are more likely to be trusted (Table 4). Although longer messages do not correspond to more trustworthy behavior, promises do predict that the message sender will be more trustworthy (Table 5). In the next section, we analyze messages coded as a promise in greater detail.

4.3.3 Perceived cues for trust: promises

Table 6 describes the relationship between characteristics of promisesFootnote 30 and evaluators’ guesses. The dependent variable is the frequency with which promise message i is trusted by the evaluators. We find that evaluators are significantly more likely to trust the promise when it is longer. For example, a promise with 10 additional words is 3 percentage points more likely to be trusted, all else equal.

Table 6 Tobit regression of perceived cues and trust using promises

Dependent variable:

frequency of trust for promises

(1)

(2)

Mention of money

−.02

(.03)

−.01

(.01)

Mention of we/us

−.01

(.03)

−.01

(.04)

Word count

.003***

(.001)

.003***

(.001)

Male

0.02

(.03)

Number of observations

62

61

Robust Standard errors are reported in parentheses

*, **, *** Correspond to 1, 5 and 10 % significance level, respectively

Actual cues for trustworthiness: promises: We now turn to an analysis of promise senders’ actual decisions. As shown in Table 7, broken promises are more likely to mention money, use more encompassing words, and also include more words.

Table 7 Actual cues for promises

Promise

Z Stat

Kept

Broken

Mention money

.19

(.07)

.58

(.10)

3.08***

Mention “we/us”

.22

(.07)

.58

(.10)

2.83***

Word count

12.64

(1.57)

18.27

(2.79)

1.73*

Male

.66

(.08)

.65

(.10)

0.03

Observations

36

26

The Z statistic derives from two-sided Mann–Whitney tests of the null hypothesis that means in Kept and Broken are identical

*, **, *** p < 0.10, 0.05 and 0.01, respectively, two-tailed tests

We then control for possible partial correlations among cues. And the results are reported in Table 8 below. Regression (1) uses a Probit analysis with dependent variable taking value 1 if the sender of message i chose Left (the cooperative option) and zero otherwise. Regression (2) reports the results of a Tobit regression with dependent variable equal to the frequency with which promise message i is trusted by the evaluators. In both cases the independent variables are those described in Table 3.

Table 8 Actual cues versus perceived cues for promises

Dependent variable: cooperative decision

Actual realization

(1)

Evaluators’ prediction

(2)

Mention of money

−.25***

(.01)

−.01

(.01)

Mention of we/us

−.22

(.17)

−.01

(.04)

Word count

−.004

(.002)

.003***

(.001)

Male

.13

(.08)

0.02

(.03)

No. of observation

61

61

Robust standard errors are in parentheses

* and *** Correspond to 10 and 1 % significance levels, respectively. Column 1: bivariate probit estimates, marginal effects. Column 2: Tobit estimates

The results from regression (1) make clear that mention of money is the single best predictor of senders’ defections. In particular, Cs are 25 % more likely to defect when they mention money in their messages. Our evaluators, however, identified only word count as a positive indicator of senders’ trustworthiness. Message length, on the hand, does not seem to suggest greater trustworthiness.

The reason that the mention of money is the single best predictor of senders’ decisions to defect may be that the mention of money may “monetize” the exchange. Such an effect is suggested by a sizable “crowding out” literature (see for example, Ariely and Bracha Reference Ariely and Bracha2009; Lacetera and Macis Reference Lacetera and Macis2010; Mellstrom and Johannesson Reference Mellstrom and Johannesson2008; Gneezy and Rustichini Reference Gneezy and Rustichini2000a, Reference Gneezy and Rustichinib; Fehr and Falk Reference Fehr and Falk2002; Li et al. Reference Li, Xiao, Houser and Montague2009; Houser et al. Reference Houser, Xiao, McCabe and Smith2008). This literature emphasizes the idea that monetizing choices may crowd out extrinsic incentives, shift decision-makers’ perception of the environment into a “business” frame, and focus their attention on self-interested decision-making. Additionally, Vohs et al. (Reference Vohs, Mead and Goode2006) suggested that “money brings about a self-sufficient orientation”: when subjects are primed with money, they tend to be less helpful towards others.

4.4 Cues and predictions

Table 9 below reports the results of evaluators’ guesses regarding whether the message would be believed to lead to a cooperative action, and also whether the subsequent action was actually cooperative. We divide the messages into two groups: Promises and Empty talk. We find that among the Promises, 71 % of evaluators believed that message senders would keep their promise (choose Left). This belief is statistically different from the actual rate—overall 58 % of promises were kept. We find further support for this result when we look into promises that include mentions of money, encompassing terms, or are longer than median length. In all these cases, evaluators were over-optimistic that the promise would be kept: differences between evaluators’ beliefs and actual behavior are statistically significant in these cases. In contrast, for messages identified as empty talk, only 28 % of the evaluators believed that the message sender would cooperate. This is statistically indistinguishable from the one-third of senders who did actually choose Left. Moreover, beliefs are statistically correct in all of three sub-categories of the empty talk messages.Footnote 31

Table 9 Predictions by receivers: summary statistics

Message type

Obs

Average rate of trusta

Actual rate of cooperationb

T-statc

Rate of accuracyd

Promises

62

.71 (.01)

.58 (.06)

1.97**

.53 (.03)

Money mention = 1

22

.71 (.02)

.32 (.10)

3.81***

.43 (.05)

Us mention = 1

23

.71 (.02)

.35 (.10)

3.55***

.46 (.05)

Word count = Long

38

.72 (.02)

.47 (.08)

2.98***

.52 (.04)

Empty talk

18

.28 (.04)

.33 (.11)

0.41

.62 (.06)*

Money = 0

17

.28 (.04)

.29 (.11)

0.05

.64 (.05)**

Us = 0

17

.27 (.04)

.29 (.11)

0.19

.63 (.06)*

Word count = Short

16

.27 (.04)

.25 (.11)

0.14

.64 (.06)**

80

.61 (.02)

.53 (.06)

1.44

.56 (.03)*

Standard errors are in the parenthesis

*, **, *** p < 0.10, 0.05 and 0.01, respectively

aThe average prediction of the percentage of the population that believes the message is honored

bActual rate of cooperation is defined as the percentage of messages that are followed by a cooperative move from the message sender

cThe statistics reflect the two-sided t test for the null hypothesis that the Average Prediction and Actual Rate of Cooperation are equal

dThe asterisk indicates significance of two-tailed tests under the null hypothesis that the rate of success is A r a n d o m = . 5056

Regarding the accuracy rate measured by the average percentage of correct guesses for all evaluators, 57 % were able to make correct predictions based on the messages (i.e., their guesses match the actual senders’ choices). However, when considering messages categorized as promises, 53 % of evaluators were able to make the correct predictions, while 62 % predicted the sender’s decisions correctly for empty talk messages. It is clear where mistakes were made: evaluators placed higher trust in promises that mentioned money than in those that did not, while at the same time those messages were least likely to be honored. In contrast, empty talk messages that neither mentioned money nor used encompassing words were trusted less by evaluators (as were shorter messages). Consequently, the evaluators achieved higher rates of accuracy in those cases.

We now turn to an analysis of the accuracy of evaluators’ guesses. As an accuracy benchmark we use the average accuracy expected under random guessing. Any given message will be trusted by receivers with probability 0.61 (as measured by the average rate of trust, see Table 9 last row third column). Further, receivers are correct with probability 0.53 (as measured by the average actual rate of cooperation for all messages, Table 9 last row forth column). Therefore, random guessing results in accuracy rate 0.61 × 0.53 + (1 − .61) × (1 − .53) = .51. Formally, the accuracy of random guessing for any message i is calculated as follows:

A r a n d o m = P t r u s t × P L e f t + 1 - P t r u s t × 1 - P L e f t

where P(trust) is the percentage of the population that trust the message i and P(Left) is the average actual rate of cooperation for any message i. P(Left) also represents the average probability that the evaluator’s trust is correct.

When we compare the all-message accuracy rate against A r a n d o m = . 51 , we find that on average our evaluators are slightly better than random guesses at a 10 % significance level. However, for promises, our evaluators are not any better than random guesses, especially for promises that mention money; for empty talk, however, evaluators are significantly better than random guesses, with the average accuracy rate of 63 % (12 % higher than the random guess benchmark). This suggests that readers are able to distinguish between promises and empty talk and treat those two types of messages differently and correctly, by putting greater trust in promises than empty talk. However, readers cannot differentiate the kept and broken messages within each type of messages (as detailed in Tables 4, 8).

5 Discussion

This paper focuses on the importance of understanding cues for deception (or honesty) in natural language written messages. It is well established that people respond to cheap talk communication. We conducted a laboratory experiment in which people could offer written promises of cooperative actions. The messages were evaluated by independent observers. We contribute to the literature by using these evaluations, as well as the behaviors we observed in the game, to shed light on: (i) whether there exist objective cues that correlate with a message sender’s likelihood of breaking a promise; (ii) the nature of any such cues; and (iii) whether message receivers recognize and respond to cues correctly.

We found systematic evidence that: (i) people place greater trust in longer messages and messages they consider to be “promises”; (ii) promises that mention money are significantly more likely to be broken; and (iii) people do not respond to the mention of money correctly, in that they are more likely to trust these messages. Overall, we find that people perform slightly better than random chance in detecting deception. The main explanation is that our evaluators are able to differentiate between promises and empty talk correctly, and trust promises more than empty talk. However, within the promise and empty talk groups, readers are not able to distinguish messages that will be honored from those that will not.

It is worthwhile noting that we used hand-written messages in the original game experiment, and it seems important for our evaluators to see what our participants saw while making decisions in the game to minimize experimenter demand effect. With respect to the original game sessions, we thought that hand-written messages might seem more “real” and meaningful than typed messages (the same reason that Xiao and Houser Reference Xiao and Houser2005, Reference Xiao and Houser2009; Houser and Xiao Reference Houser and Xiao2010) used hand-written messages in their analyses). Further, it is not obvious that typed messages are less gender-identifiable than written messages. Our own experience is that men and women tend to put different content into typed messages, and this would not vary regardless of the way in which the messages are delivered. Finally, any such gender effects add noise to our data and thus work against our ability to find evidence for cues. This enhances our confidence in our results.

Our results might explain some patterns in previously published data. For example, Charness and Dufwenberg (Reference Charness and Dufwenberg2010) offered new data on their hidden action trust game (Charness and Dufwenberg Reference Charness and Dufwenberg2006) and found that, in contrast with their original data, the prefabricated statements “I will not roll” or “I will roll” do not promote trust or cooperation. Charness and Dufwenberg indicate that this might be due to the impersonal nature of the message. Another factor might be that these statements are quite short and the perceived effort from the sender is low. The results of our paper suggest that both of these features would make any message, personal or otherwise, less likely to be considered a promise.

Another important example relates to the receivers of promises that include mentions of money. For example, billboards advertising large monetary benefits (discounts or savings) to people who choose to shop at a particular retail location should be aware that such promises may be likely to be broken, and that the reality of the savings may be less than the advertised amount.Footnote 32 Our results indicate that consumers of advertisements should be especially cautious of promises that include specific monetary commitments.

Our study is only one step towards an understanding of this important topic, and is limited in a number of ways. One limitation is that the promises in our environment all relate to money, while in many natural contexts it would be unnatural to refer to money as part of the promise process (e.g., many promises do not involve money). Similarly, we studied a particular game, and different games may lead people to use or to recognize different cues than we discovered, or to use or recognize the same cues differently. Finally, our results were derived from a particular cultural environment. The same games played with different cultural groups may generate different types of cues (e.g., some cultures may be reluctant to use “we” or “us” with strangers.) Indeed, cross-cultural research on deception detection would undoubtedly be very enlightening.

Acknowledgments

We gratefully acknowledge the helpful comments from three anonymous referees, as well as the participants at 2012 International Economic Science Association Conference in NYC, 2012 University of Mainz Workshop in Behavioral Economics in Mainz, Germany and 2012 North American Economic Science Association Conference in Tucson.

Footnotes

Electronic supplementary material The online version of this article (doi:https://doi.org/10.1007/s10683-016-9488-x) contains supplementary material, which is available to authorized users.

All truth is simple, is that not doubly a lie?

—Friedrich Nietzsche

1 Deception detection is widely studied in Psychology, as discussed in Sect. 2.

2 We are interested in understanding cues used in informal written communication of the sort that people might send in instant messages or other forms of casual (and often electronic) communication. Our focus is not, for example, formal legal documents, which are typically constructed with the goal of reducing ambiguity (at least for those individuals trained in reading the contracts).

3 Through for instance, match.com and many other websites.

5 Communication that has no direct effect on players’ payoffs and is costless and unverifiable.

6 The goal has been to explain why senders are likely to honor their messages even when they incur costs by doing so.

7 The common setups in psychology studies include actors (usually students) who are instructed to tell the truth or a lie, and observers who evaluate the truth of the actors’ statements upon watching videotaped recordings (see Ekman Reference Ekman and Martin2009a, Reference Ekmanb for a short review). For most of those studies, neither the actors nor the observers are incentivized to perform (Zuckerman et al. Reference Zuckerman, DePaulo, Rosenthal and Berkowitz1981; Vrij et al. Reference Vrij, Akehurst, Soukara and Bull2004).

8 The subjects were not able to recognize or use all the objective features of the game show, e.g., the relative contribution to the prize.

9 Belot et al. (Reference Belot, Bhaskar and van de Ven2012) categorized communication into three different groups: no promise-where no promises are made; voluntary promise-where players voluntarily make promises; and elicited promise-where the subjects were prompted by the game show host to indicate their intention to either cooperate or defect.

10 As noted in Ekman et al. (Reference Ekman, Frank and O’Sullivan1999), successful subjects were able to use facial clues to detect liars, as opposed to others who were not able to do so when presented with the same video recordings.

11 Schniter et al. (Reference Schniter, Sheremeta and Sznycer2012) looked at computer mediated communications and found that apologetic and upgraded messages are more likely to win back trust from the betrayed partners, although those message senders who have previously broken their promises are no more likely to keep their second promises.

12 We denote it Mistress Game because the payoff structure broadly resembles the tradeoffs in a wife (Role A), Husband (Role B), Mistress (Role C) situation. The analogy used here can facilitate understanding of the tradeoffs that each player faces in the game.

13 This game is a modification of an extended three-person trust game with different multipliers for different trustees. Related games include Dufwenberg and Gneezy (Reference Dufwenberg and Gneezy2000)—two-person lost wallet game; Charness and Dufwenberg (Reference Charness and Dufwenberg2006)—two-person trust game with a hidden action; Sheremeta and Zhang (Reference Sheremeta and Zhang2014) and Rietz et al. (Reference Rietz, Sheremeta, Shields and Smith2013)—sequential three person trust game; and Cassar and Rigdon (Reference Cassar and Rigdon2011)—three person trust game with one trustee two trustor or one trustor two trustee, and Bigoni et al. (Reference Bigoni, Bortolotti and Casari2012)—two person trust game with an add-on dominant solvable game between the trustee and a third player.

14 For in depth analysis of behaviors for all the players in the game, please see Chen and Houser (Reference Chen and Houser2014). We would like to highlight that the 2014 manuscript focuses on message senders, while the current paper focuses on the readers of the messages.

15 We left out the B-A messages from the analyses for two reasons: (1) compared with C, B has less incentive to deceive in the game; (2) the actual decisions made by B may be confounded, in that those decisions may not reflect the intent of the messages but rather the messages they later received from C.

16 The authors also implemented other versions of the communication treatment (e.g., only B sends messages to A). These data are reported in Chen and Houser (Reference Chen and Houser2014). Here we only focus on the C to B message treatments.

17 It is well understood amongst subjects that they cannot write anything that is self-identifiable, and the experimenter monitors the messages to make sure this rule is followed.

18 The game sessions were also conducted in George Mason University.

19 We collected the first set of messages and evaluations (20 messages from Single and 32 messges from Double, 45 evaluators) in 2013 and second addition set of messages and evaluations (28 messages from Double, 48 evaluators) in 2015.

20 A similar definition was used in Houser and Xiao (Reference Houser and Xiao2010).

21 In an XH classification game, a group of evaluators is given a list of N messages and a set of categories. Their job is to assign each message to a single category. They are paid for n (n < N) randomly chosen messages whose classifications match a most popular classification respectively.

22 We analyze external observers who did not participate in the game. If they are able to detect deception, this provides evidence that the game’s players may have also been able to do so. Our data do not reveal whether the players in the game were able to detect deception, or the beliefs they held regarding the possibility that they would be deceived.

23 A message is coded as a promise if a majority of the evaluators (more than 50 %) coded the message as such.

24 Our findings regarding promise frequency are consistent with previously reported data. For example, Charness and Dufwenberg (Reference Charness and Dufwenberg2006) classified 57 % of their messages from B in the (5, 5) treatment as promises; Vanberg (Reference Vanberg2008) classified 85 % of the messages as promises in No Switch and 77 % of the messages as promises in Switch. Using the same procedure as we do, Houser and Xiao (Reference Houser and Xiao2010) found that 74 % of the B messages from Charness and Dufwenberg (Reference Charness and Dufwenberg2006) (5,5) experiment were categorized as promises by the evaluators in their weak promise treatment.

25 We also conducted the Kappa test using all the messages, K = .34, Z = 67.77 and P = .00. The results indicate that we have “fair” (Landis and Koch Reference Landis and Koch1977) amount of agreement amongst evaluators and the level of agreement is significantly higher than chance.

26 To assess whether pooling was appropriate, we performed a Chow test within a Tobit regression analysis. The results indicate that it is appropriate to pool the data from these environments.

27 We also performed a panel data analysis with random individual effects; the results are qualitatively identical. Details are available from the authors on request.

28 For each of the specifications in Table 4, we performed the Chow test. The results suggest that it is appropriate to pool the data, with p-values .15, .21, .38 and .51 respectively.

29 We also performed a panel data analysis with random individual effects, and the results are qualitatively identical. Details available from the authors on request.

30 In Tables 6, 7 and 8, we only include messages classified as promises by majority of the evaluators (>50 %). As a robustness check, we also conducted the same regressions using messages classified as promises by a super majority (>60 %). In doing so, despite losing five observations, the regression results remain almost unchanged. If we include only messages classified as promises by at least two thirds of the evaluators, then we lose 12 observations. The corresponding results remain qualitatively similar to those reported above, but with reduced statistical significance.

31 These results are consistent with the earlier findings reported by Belot et al. (Reference Belot, Bhaskar and van de Ven2012).

32 For example, one highway billboard near us reads: “$700 Cash today, the Ca$h Store”. Preceding the “$700” there is an almost entirely unnoticeable “Up to.”

References

Ariely, D, & Bracha, A (2009). Doing good or doing well? image motivation and monetary incentives in behaving prosocially. The American Economic Review, 99(1), 544555. 10.1257/aer.99.1.544CrossRefGoogle Scholar
Belot, M, & van de Ven, J (2016). How private is private information? The ability to spot deception in an economic game. Experimental Economics.CrossRefGoogle Scholar
Belot, M, Bhaskar, V, & van de Ven, J (2012). Can observers predict trustworthiness?. The Review of Economics and Statistics, 94(1), 246259. 10.1162/REST_a_00146CrossRefGoogle Scholar
Berg, J, Dickhaut, J, & McCabe, K (1995). Trust, reciprocity, and social history. Games and Economic Behavior, 10(1), 122142. 10.1006/game.1995.1027CrossRefGoogle Scholar
Bigoni, M., Bortolotti, S., & Casari, M. (2012). Trustworthy by convention. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2057607.Google Scholar
Buchan, NR, Croson, RTA, & Solnick, S (2008). Trust and gender: An examination of behavior and beliefs in the investment game. Journal of Economic Behavior & Organization, 68(3–4), 466476. 10.1016/j.jebo.2007.10.006CrossRefGoogle Scholar
Cassar, A, & Rigdon, M (2011). Trust and trustworthiness in networked exchange. Games and Economic Behavior, 71(2), 282303. 10.1016/j.geb.2010.04.003CrossRefGoogle Scholar
Chaiken, S (1980). Heuristic versus systematic information processing and the use of source versus message cues in persuasion. Journal of Personality and Social Psychology, 39(5), 752766. 10.1037/0022-3514.39.5.752CrossRefGoogle Scholar
Charness, G, & Dufwenberg, M (2006). Promises and partnership. Econometrica, 74(6), 15791601. 10.1111/j.1468-0262.2006.00719.xCrossRefGoogle Scholar
Charness, G, & Dufwenberg, M (2010). Bare promises: An experiment. Economics Letters, 107(2), 281283. 10.1016/j.econlet.2010.02.009CrossRefGoogle Scholar
Chen, J., & Houser, D. (2014). Broken contracts and hidden partnerships: theory and experiment. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2340844.Google Scholar
Crawford, V (1998). A survey of experiments on communication via cheap talk. Journal of Economic Theory, 298, 286298. 10.1006/jeth.1997.2359CrossRefGoogle Scholar
Croson, R, Boles, T, & Murnighan, JK (2003). Cheap talk in bargaining experiments: Lying and threats in ultimatum games. Journal of Economic Behavior & Organization, 51(2), 143159. 10.1016/S0167-2681(02)00092-6CrossRefGoogle Scholar
Darai, D., & Grätz, S. (2010). Determinants of successful cooperation in a face-to-face social dilemma. University of Zurich working paper no. 1006.Google Scholar
DePaulo, BM, Lindsay, JJ, Malone, BE, Muhlenbruck, L, Charlton, K, & Cooper, H (2003). Cues to deception. Psychological Bulletin, 129(1), 74118. 10.1037/0033-2909.129.1.74CrossRefGoogle ScholarPubMed
Dreber, A, & Johannesson, M (2008). Gender differences in deception. Economics Letters, 99(1), 197199. 10.1016/j.econlet.2007.06.027CrossRefGoogle Scholar
Dufwenberg, M., & Gneezy, U. (2000). Measuring Beliefs in an Experimental Lost Wallet Game. Games and Economic Behavior. 30(2), 163182. http://www.sciencedirect.com/science/article/B6WFW-45F4KX0-1B/2/5201b892d834b4fa8ef58a3450cd1753.CrossRefGoogle Scholar
Ekman, P, & Martin, CW (2009). Lie catching and microexperssions. The philosophy of deception, New York: Oxford University Press 118138. 10.1093/acprof:oso/9780195327939.003.0008CrossRefGoogle Scholar
Ekman, P. (2009b). Telling lies: Clues to deceit in the marketplace, politics, and marriage, Third Edition. Clues. W. W. Norton & Company. http://www.amazon.com/dp/0393337456.Google Scholar
Ekman, P., Frank, M., & O’Sullivan, M. (1999). A few can catch a liar. Psychological Science. 10(3), 263266. http://pss.sagepub.com/content/10/3/263.short.CrossRefGoogle Scholar
Ellingsen, T, & Johannesson, M (2004). Promises, threats and fairness. The Economic Journal, 114, 397420. 10.1111/j.1468-0297.2004.00214.xCrossRefGoogle Scholar
Erat, S, & Gneezy, U (2011). White lies. Management Science.CrossRefGoogle Scholar
Farrell, J, & Rabin, M (1996). Cheap talk. The Journal of Economic Perspectives, 10(3), 103118. 10.1257/jep.10.3.103CrossRefGoogle Scholar
Fehr, E, & Falk, A (2002). Psychological foundations of incentives. European Economic Review, 46(4–5), 687724. 10.1016/S0014-2921(01)00208-2CrossRefGoogle Scholar
Frank, B, & Schulze, GG (2000). Does economics make citizens corrupt?. Journal of Economic Behavior & Organization, 43(1), 101113. 10.1016/S0167-2681(00)00111-6CrossRefGoogle Scholar
Gneezy, U (2005). Deception: The role of consequences. The American Economic Review, 95(1), 384394. 10.1257/0002828053828662CrossRefGoogle Scholar
Gneezy, U., & Rustichini, A. (2000a). Pay enough or don’t pay at all. The Quarterly Journal of Economics. 115(3), 791810. http://qje.oxfordjournals.org/content/115/3/791.short.CrossRefGoogle Scholar
Gneezy, U, & Rustichini, A (2000). A fine is a price. The Journal of Legal Studies, 29(1), 117. 10.1086/468061CrossRefGoogle Scholar
Hall, J. K. (1995). (Re)creating our worlds with words: A sociohistorical perspective of face-to-face interaction. Applied Linguistics. 16(2), 206232. http://applij.oxfordjournals.org/content/16/2/206.short.CrossRefGoogle Scholar
Hao, L., & Houser, D. (2013). Perception and cheating: An experimental analysis. Working paper.Google Scholar
Houser, D, & Xiao, E (2010). Classification of natural language messages using a coordination game. Experimental Economics, 14(1), 114. 10.1007/s10683-010-9254-4CrossRefGoogle Scholar
Houser, D, Xiao, E, McCabe, K, & Smith, V (2008). When punishment fails: Research on sanctions, intentions and non-cooperation. Games and Economic Behavior, 62(2), 509532. 10.1016/j.geb.2007.05.001CrossRefGoogle Scholar
Jeanquart-Barone, S., & Sekaran, U. (1994). Effects of supervisor’s gender on American Women’s Trust. The Journal of Social Psychology. 134(2), 253255. http://www.redi-bw.de/db/ebsco.php/search.ebscohost.com/login.aspx%3fdirect%3dtrue%26db%3dpsyh%26AN%3d1994-43323-001%26site%3dehost-live.CrossRefGoogle ScholarPubMed
Kartik, N (2009). Strategic communication with lying costs. Review of Economic Studies, 76(4), 13591395. 10.1111/j.1467-937X.2009.00559.xCrossRefGoogle Scholar
Kimbrough, E, Smith, V, & Wilson, Bart J (2006). Historical property rights, sociality, and the emergence of impersonal exchange in long-distance trade. American Economic Review, 98(3), 10091039. 10.1257/aer.98.3.1009CrossRefGoogle Scholar
Konrad, K. A., Lohse, T., & Qari, S. (2014). Deception choice and self-selection—The importance of being earnest. Journal of Economic Behavior and Organization. 107(PA), 2539.CrossRefGoogle Scholar
Lacetera, N, & Macis, M (2010). Do all material incentives for pro-social activities backfire? The response to cash and non-cash incentives for blood donations. Journal of Economic Psychology, 31(4), 738748. 10.1016/j.joep.2010.05.007CrossRefGoogle Scholar
Landis, JR, & Koch, GG (1977). The measurement of observer agreement for categorical data. Biometrics, 33(1), 159174. 10.2307/2529310CrossRefGoogle ScholarPubMed
Lawson, HM, & Leck, Kira (2006). Dynamics of internet dating. Social Science Computer Review, 24(2), 189208. 10.1177/0894439305283402CrossRefGoogle Scholar
Li, J, Xiao, E, Houser, D, & Montague, PR (2009). Neural responses to sanction threats in two-party economic exchange. Proceedings of the National Academy of Sciences of the United States of America, 106(39), 1683516840. 10.1073/pnas.0908855106CrossRefGoogle ScholarPubMed
Mazar, N, & Ariely, D (2006). Dishonesty in everyday life and its policy implications. Journal of Public Policy & Marketing, 25(1), 117126. 10.1509/jppm.25.1.117CrossRefGoogle Scholar
Mellstrom, C, & Johannesson, M (2008). Crowding out in blood donation: Was titmuss right?. Journal of the European Economic Association, 6(4), 845863. 10.1162/JEEA.2008.6.4.845CrossRefGoogle Scholar
Papini, D. R., Farmer, F. F., Clark, S. M., Micka, J. C., & Barnett, J. K. (1990). Early adolescent age and gender differences in patterns of emotional self-disclosure to parents and friends. Adolescence. 25(100), 959976. http://ezproxy.lib.ucf.edu/login?URL=http://search.ebscohost.com/login.aspx?direct=true&db=sph&AN=9603010054&site=ehost-live.Google ScholarPubMed
Petty, R. E., & Cacioppo, J.T. (1984). The effects of involvement on responses to argument quantity and quality: Central and peripheral routes to persuasion. Journal of Personality and Social Psychology. 46(1), 6981. http://psycnet.apa.orgjournals/psp/46/1/69.CrossRefGoogle Scholar
Rietz, T, Sheremeta, R, Shields, T, & Smith, V (2013). Transparency, efficiency and the distribution of economic welfare in pass-through investment trust games. Journal of Economic Behavior & Organization, 94, 257267. 10.1016/j.jebo.2012.09.019CrossRefGoogle Scholar
Rosaz, J., & Villeval, M. C. (2011). Lies and biased evaluation: A real-effort experiment. IZA discussion paper series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1906187.Google Scholar
Rubin, V. L., & Liddy, E. D. (2006). Assessing credibility of weblogs. In AAAI symposium on computational approaches to analysing weblogs AAAICAAW (pp. 187–90). http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Assessing+Credibility+of+Weblogs#0.Google Scholar
Schniter, E, Sheremeta, RM, & Sznycer, D (2012). Building and rebuilding trust with promises and apologies. Journal of Economic Behavior & Organization.CrossRefGoogle Scholar
Sheremeta, RM, & Zhang, J (2014). Three-player trust game with insider communication. Economic Inquiry, 52(2), 576591. 10.1111/ecin.12018CrossRefGoogle Scholar
Sutter, M (2009). Deception through telling the truth?! experimental evidence from individuals and teams*. The Economic Journal, 119(534), 4760. 10.1111/j.1468-0297.2008.02205.xCrossRefGoogle Scholar
Swamy, A, Knack, S, Lee, Y, & Azfar, O (2001). Gender and corruption. Journal of Development Economics, 64(1), 2555. 10.1016/S0304-3878(00)00123-1CrossRefGoogle Scholar
Utikal, V. (2013). I am sorry: Honest and fake apologies. Research paper series, Thurgau Institute of Economics and Department of Economics at the University of Konstanz.Google Scholar
Vanberg, C (2008). Why do people keep their promises? An experimental test of two explanations. Econometrica, 76(6), 14671480. 10.3982/ECTA7673Google Scholar
Vohs, KD, Mead, NL, & Goode, MR (2006). The psychological consequences of money. Science, 314(5802), 11541156. 10.1126/science.1132491CrossRefGoogle ScholarPubMed
Vrij, A, Akehurst, L, Soukara, S, & Bull, R (2004). Detecting deceit via analyses of verbal and nonverbal behavior in children and adults. Human Communication Research, 30(1), 841. 10.1111/j.1468-2958.2004.tb00723.xCrossRefGoogle Scholar
Wang, JT, Spezio, M, & Camerer, CF (2010). Pinocchio’s pupil : Using eyetracking and pupil dilation to understand truth telling and deception in sender-receiver games. American Economic Review, 100(3), 9841007. 10.1257/aer.100.3.984CrossRefGoogle Scholar
Wright, TL, & Sharp, EG (1979). Content and grammatical sex bias on the interpersonal trust scale and differential trust toward women and men. Journal of Consulting and Clinical Psychology, 47(1), 7285. 10.1037/0022-006X.47.1.72CrossRefGoogle Scholar
Xiao, E, & Houser, D (2005). Emotion expression in human punishment behavior. Proceedings of the National Academy of Sciences of the United States of America, 102(20), 73987401. 10.1073/pnas.0502399102CrossRefGoogle Scholar
Xiao, E, & Houser, D (2009). Avoiding the sharp tongue: Anticipated written messages promote fair economic exchange. Journal of Economic Psychology, 30(3), 393404. 10.1016/j.joep.2008.12.002CrossRefGoogle Scholar
Zuckerman, M, DePaulo, BM, Rosenthal, R, & Berkowitz, L (1981). Verbal and nonverbal communication of deception. Advances in experimental social psychology, New York: Academic Press 159.Google Scholar
Figure 0

Fig. 1 The Mistress Game

Figure 1

Fig. 2 The single message communication phase

Figure 2

Fig. 3 The double message communication phase

Figure 3

Fig. 4 Role B decisions

Figure 4

Table 1 Message evaluation results

Figure 5

Table 2 Comparison of the messages from single and double environment

Figure 6

Table 3 Tobit regression of message classification on perceived cues

Figure 7

Table 4 Tobit regression of perceived cues for trustworthiness using all messages

Figure 8

Table 5 Actual cues predicting senders’ behavior using all messages

Figure 9

Table 6 Tobit regression of perceived cues and trust using promises

Figure 10

Table 7 Actual cues for promises

Figure 11

Table 8 Actual cues versus perceived cues for promises

Figure 12

Table 9 Predictions by receivers: summary statistics

Supplementary material: File

Chen and Houser supplementary material

Chen and Houser supplementary material
Download Chen and Houser supplementary material(File)
File 72.7 KB