Do People Lie More Often When Using Social Media?

Technology has provided more ways to connect with people and, potentially, to lie more frequently.  Indeed, social psychology has demonstrated that lying is an important, and frequent, part of everyday social interactions.  

As communication technologies become more ubiquitous in our daily interactions, an important question for developers is to determine how the design of these technologies affects lying behavior. 

Social psychologists and communication scholars have long wondered not just who lies the most, but where people tend to lie the most, that is, in person or through some other communication medium.

One distinguished researcher in this are is Jeff Hancock, Professor of Communications at Stanford University. He  is well-known for his research on how people use deception with technology, from sending texts and emails to detecting fake online reviews. His TED Talk on deception has been seen over 1 million times and he’s been featured as a guest on “CBS This Morning” for his expertise on social media.

In n 2004, Hancock and his colleagues had 28 students report the number of social interactions they had via face-to-face communication, the phone, instant messaging and email over seven days. Students also reported the number of times they lied in each social interaction. 

The results suggested people told the most lies per social interaction on the phone. The fewest were told via email.

The findings aligned with a framework Hancock called the ‘feature-based model’. According to this model, specific aspects of a technology, whether people can communicate back and forth seamlessly, whether the messages are fleeting and whether communicators are distant, predict where people tend to lie the most. In Hancock’s study, the most lies per social interaction occurred via the technology with all of these features: the phone. The fewest occurred on email, where people couldn’t communicate synchronously and the messages were recorded.

Now, in a new study, 250 people recorded their social interactions and number of interactions with a lie over seven days, across face-to-face communication, social media, the phone, texting, video chat and email.

As in Hancock’s original study, people told the most lies per social interaction over media that were synchronous and unrecorded and when communicators were distant: over the phone or on video chat. They told the fewest lies per social interaction via email. Interestingly, though, the differences across the forms of communication were small.

Differences among participants, how much people varied in their lying tendencies, were more predictive of deception rates than differences among media.

Despite changes in the way people communicate over the past two decades, along with ways the Covid-19 pandemic changed socialisation and now people seem to lie systematically and in alignment with the feature-based model.  There are several possible explanations for these results, though more work is needed to understand exactly why different media lead to different lying rates.

It’s possible that certain media are better facilitators of deception than others. Some media, the phone, video chat, might make deception feel easier or less costly to a social relationship if caught.

Deception rates might also differ across technology because people use some forms of technology for certain social relationships. For example, people might only email their professional colleagues, while video chat might be a better fit for more personal relationships.

Two Important Conclusions 

First, there are, overall, small differences in lying rates across media. An individual’s tendency to lie matters more than whether someone is emailing or talking on the phone.

Second, there’s a low rate of lying across the board. Most people are honest, a premise consistent with truth-default theory, which suggests most people report being honest most of the time and there are only a few prolific liars in a population.

Since 2004, social media have become a primary place for interaction. Yet a common misperception persists that communicating online or via technology, as opposed to in person, leads to social interactions that are of lower quality.   People often believe that just because we use technology to interact, honesty is harder to come by and users aren’t well served. 

Not only is this perception misguided, but it is also unsupported by empirical evidence. The belief that lying is rampant in the digital age doesn’t match the data.

Stanford University:    ACM Digital Library:      Nieman Lab:      The Conversation:     Talking Points Memo:     

California News Times:      FUNTiTech

You Might Also Read: 

Scientists Say Social Media Is A Risk To Humanity:

 

« Cyber Mercenaries: Focus On Hackers-for-Hire
123456 Is Not A Password »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.