Journal of Mass Media Ethics, 18(3&4), 194–212 Copyright © 2003, Lawrence Erlbaum Associates, Inc. Truth, Trust, and Telepresence Paula S. Tompkins St. Cloud State University o Computer-mediated communication (CMC) raises anew traditional questions of truth and trust. Challenges to communicating with truth and trust are exacerbated by qualities of CMC which encourage users to communicate mindlessly, particularly its capacity to evoke a sense of being present to an Other, despite different locations in time or space. Rhetorical presence and dialogic presentness are used to explore the communication dynamics of CMC and delineate some of the challenges of truthful and trustworthy CMC. The capacity of cyberspace to transcend physical materiality, time, and space has freed individuals to develop online relationships and communities that before were impossible to imagine. As increasingly sophisticated technology enables a greater sense of immediacy and interactiveness, of being seemingly present to another in cyberspace, computer-mediated communication (CMC) provides an important alternative or supplement to face-to-face (F2F) communication (Barnes, 2001; Horrigan, 2001; Kraut et al., 2002; Turner, Grube, & Meyers, 2001). Despite the sense of an Other being present, we recognize that CMC has a less than accurate correspondence with our cultural notions of time, as well as space and physical materiality, because it occurs in cyberspace (Jones, 1997). This sensory displacement prompts traditional questions of communication ethics, about truthfulness and trustworthiness of communicators and their messages. Jensen’s (2001) survey of truth and trust as goals across cultures and throughout history, from ancient China, India, and Greece to more current theoretical and theological discussions, posited truth and trust as twin goals of ethical communication. Communicators need some degree or dimension of truth to develop trust for maintaining relationships and communities. Jaska and Pritchard (1994) argued that a society must have some presumption of truthfulness to exist; otherwise, defensiveness and distrust resulting from presumptions of deceit threaten a society’s existence. Truth also requires some degree of trust in discovering truth, lowering one’s defenses, and discovering what exists beyond one’s experience and understanding. When we consider truth and trust in CMC, questions arise about their nature in cyberspace. The questions themselves are not Tompkins 195 new—whether we have been deceived, whether the reality we believe to be true is indeed true, or whether we can trust what we perceive. Questioning our perceptions can be more challenging in cyberspace. “What gives us our sense of being in direct touch with reality is that we bring about changes in the world and get perceptual feedback concerning what we have done” (Dreyfus, 2000, p. 57). Several factors contribute to our perception of causality—proximity (Borgmann, 2000), time, perceiving consequences to our actions, and performance, as well as the corporeality of our experience (Dreyfus, 2000). Because cyberspace transforms our notions of space, distance, time, and our bodies, our reference points for checking our perceptions become attenuated and may disappear. For some, cyberspace has reinvigorated the position of Descartes, that the only thing of which one can be certain is private subjective experience (Dreyfus, 2000). Such thinking leads us into debates of what is real and how we may discern with varying degrees of certainty what is real. Questioning perceptions can be more challenging in cyberspace. I follow the lead of Sissela Bok (1989) in her discussion of lying concerning debates about certain knowledge and skepticism. In communication, the relevant ethical question is not truth but whether there is a preference for truth as one understands it. Rather than aiming for the epistemological certainty of truth, my aim is truthfulness or the principle of veracity. We may not be able to know with absolute certainty, but we can communicate to the best of our abilities and with truthful intent. The framework of truthfulness recognizes the difficulties of discerning authenticity, accuracy, reliability, sincerity, or deceitfulness in communication messages and communicators. Individuals may unintentionally deceive others, telling falsehoods which they believe are truthful. Furthermore, as Jensen (2001) noted, Hans Kung, Dietrich Bonhoeffer, Sissela Bok, and the proposed U.N. Declaration of Human Responsibilities each argued that in extreme circumstances, such as when being truthful threatens one’s survival as in war or under torture, we are under no obligation to tell the truth. Skillful deception also can occur by being truthful to a point, with deceivers relying on a combination of true statement and concealment or omission, rather than communicating a complete falsehood. Such deceivers may try to defend themselves with the claim that they did not lie. Our acceptance of the truthfulness of a message is partly influenced by perceptions of the trustworthiness of the sender. Trust is based on a judgment about how an individual makes choices that affect others, specifically 196 Truth, Trust, and Telepresence the extent to which an individual’s intentions are benevolent (Van Avermaet, 1999). Trust, however, is not the same as security, for it entails an acceptance of the risk that those one trusts also possess the freedom to harm, but chooses not to do so (Nissenbaum, 2001). This is the paradox of trust—it is born of trusting, of lowering one’s defenses and making one’s self vulnerable to another in order to trust and be trusted. Rawlins’ (1992) study of the dialectics of friendship reveals another complexity of trust, that it includes a judgment about a communicator’s capacity to make trustworthy choices within a dialectic of contradictory responsibilities that organize a relationship (e.g. candor and protectiveness). Although each responsibility is valued, it is not always possible to meet both simultaneously; thus, we grant trust to a friend’s judgment about which goal is in our best interest in a particular situation. Rawlins’ research raises the possibility that trust is characterized less by reliability and consistency than by responsiveness, flexibility, and discernment about what is in the best interest of another. Cyberspace raises anew concerns about truth and trust in communication because reference points for checking our perceptions are difficult to discern. If recognizing the truthfulness of what others say becomes problematic, trust fundamental to relationships and community is weakened, making on-going communication difficult and sometimes impossible. Qualities of CMC To explore issues of truth and trust in CMC, I shall first discuss three formal qualities of this medium—its asymmetry, its dematerialized qualities, and particularly the human-digital interface as telepresence. Second, I will draw upon the concepts of “presence” from rhetorical theory and “presentness” from dialogical communication theory to explore how these qualities can influence communication dynamics of CMC and delineate some implications for enacting and discerning truthfulness and trustworthiness. Finally, I will discuss some of the implications of this analysis for the study of CMC. Asymmetrical Communication The asymmetry of CMC foregrounds a dialectical tension between the linear and social constructionist elements of the communication process.1 Senders create messages with little assurance that anyone will receive the messages they craft, because receivers also create the messages they receive. Examples of how receivers create messages include choosing settings or preferences for software, using a search engine, clicking on hyperlinks, choosing not to read an e-mail or instant message (IM), creating or editing IM buddy lists, deleting unread e-mails, setting up filters to automatically delete messages on a particular topic or from particular Tompkins 197 senders, or silently leaving a chat room. Receivers may use software technology to select in varying degrees the content of the messages they receive, as well as whether they will receive messages at all. In CMC, co-construction of meaning arises less from the dynamic interplay of message exchange between communicators than from the asymmetrical assembling of messages by receivers, often sent asynchronously by senders. Meaning for receivers is constructed by selecting from possible messages received from unseen and often unknown senders, who typically have no guarantee that someone would indeed receive their message. Samuel Becker’s notion of communication as a mosaic of meaning illuminates this capacity of receivers to construct meaning by selecting from available messages (Fisher, 1978). In an individual mosaic of communication, meaning construction depends to a greater extent upon a receiver’s selective exposure and attention to available messages, than on social negotiation. Meaning arises less from dynamic interplay of messages than asymmetrical assembling … by receivers. CMC’s technological form (software, hardware, and networking systems) enables communicators to limit social negotiation of meaning, granting them greater control over what messages they receive and when they receive them. As receivers construct meaning from the messages they create, they also may produce a self-reflexive feedback loop for meaning construction (Johnson, 1997; Walther, 1996). The asymmetrical form deemphasizes the sociality of communication, attenuating the possible relational connection between communicators while also reinforcing the meanings and perceptions of individual communicators. Senders create and transmit messages not knowing who, if anyone, will receive them. Because receivers have greater facility in creating what messages they receive than in F2F communication, there is less reliability in mutual resources for relational connection and for negotiating trust. It is not surprising that studies have found that online communities can have difficulty responding productively to conflict or crisis when they lack the resilience and flexibility of interpersonal resources such as trust (Haythornthwaite, Wellman, & Garton, 1998; Reid, 1998). Dematerialized Communicators When communicators create an online persona, they have the freedom to decide what degree of correspondence will exist between their online 198 Truth, Trust, and Telepresence persona, physical presence, and F2F communication style. This freedom provides space for both creativity and duplicity. Verification of online personae can be unlikely, since there are few or no social controls to assure correspondence, short of a real-time visit in physical reality. Facility with technology makes it easy to construct a virtual social actor, enabling a communicator to be anonymous. Even what appears as a real-time camera cannot assure correspondence to a physical presence.2 It is a truism that inhabitants and objects in cyberspace may have little or no correspondence to those in the physical world, as evidenced by the popular media periodically publishing stories about the dangers of anonymous CMC for unwitting users. Inhabitants … in cyberspace may have little or no correspondence to those in the physical world. Even when limited to text, communicators project a personality or persona online using clearly stereotypical characteristics of personality, gender, or ethnicity. Such communication often is direct and blunt, lacking nonverbal or conversational cues used for flexibility and nuance in F2F communication. Such a communication style, which may reinforce stereotypical perceptions and thinking among users, magnifies the importance of these minimal cues (Burkhalter, 1999; O’Brien, 1999; Riva & Galimberti, 1998; Walther, 1996). In some interactions the result may be a type unique to technologically mediated communication, in which the level of affect experienced by communication partners not only parallels F2F interaction but surpasses it, creating what Walther calls a “hyperpersonal” relationship. Without the corrective of physical proximity, the asymmetry of CMC may encourage communicators to inflate their perceptions of similarity or dissimilarity with their partners. The result may be a relationship negotiated in cyberspace between cyber-personae who have limited correspondence with their creators in physical space and time, and whose creators may have limited awareness of the lack of correspondence. Human-Digital Interface as Telepresence Although CMC may approximate F2F, even intimate communication, those whose primary interaction occurs online may never—or only occasionally—be physically present to one another. It is well documented that Tompkins 199 significant interpersonal experiences, such as creating relationships and communities online, do occur though users never meet in physical reality (Horrigan, 2001; Igbarria, Shayo, & Olfman, 1998; McLaughlin, Osborne, & Ellison 1997; Walther, 1996). The concept of telepresence, developed by those who study the human–digital interface, is helpful in understanding the sense that another is “present” in CMC. Telepresence is a psychological state in which an individual does not recognize that the current experience is either filtered through or generated by a human-made technology (Lombard & Ditton, 1997). Software and hardware designers strive to find ways to achieve telepresence of sensory perception and social interaction by simulating or conveying the social richness and interactivity of human interaction, such as the richness of sensory information, speed, or interactivity; thus, online chat has more speed and interactivity than e-mail or a bulletin board.3 Telepresence may also be conceived as “flow,” a state of mind in which the user immerses herself so much in a task that outside stimuli recede from awareness (Draper, Kaber, & Usher, 1998). When telepresence is experienced as flow, the capacity of technology to simulate real time or physical reality is less important than its capacity to evoke or trigger user involvement. Research by Reeves and Nass (1996) provided a clue to the immersive power of telepresence as flow. They concluded that humans mindlessly interact with technology (computers and even television sets) as social actors, to the point of stereotypically interacting with technological artifacts according to gender or ethnicity. Their research subjects were not technologically naive, but were sophisticated users who, recognizing the absurdity of this stereotyping, still dissociated their interaction with technological artifacts from a cognitive realization they were stereotypically interacting with these artifacts. This research suggested that humans respond to technological artifacts as if they were human, when artifacts present cues that trigger cognitive scripts of familiar F2F interaction routines (Nass & Moon, 2000; Reeves & Nass, 2000). The technological threshold for triggering scripts may be minimal, for the key factor is consistency of whatever medium is used—text, sound, or visual. Telepresence as flow may require a lower level of technological sophistication than telepresence as social richness. Process cues, such as the sound message from our CPU that we have just received an e-mail, evokes a communicative response to read the e-mail and respond immediately. The sound also is an immediacy cue triggering a script and rules characteristic of F2F communication—it is impolite to ignore someone who is speaking to us. So we stop to respond to the e-mail. If we become aware of this trigger, we turn off the warning sound for incoming e-mail messages. As technology provides more cues that trigger both reciprocity and interactivity, such as chat and instant messaging, the quality of CMC is more character- 200 Truth, Trust, and Telepresence istic of the flow of scripts for personal and private F2F communication. The hypothesis that cues mindlessly trigger communication scripts may help explain why we have difficulty internalizing the fact that CMC is public and not private communication.4 Common CMC practices are based on a presumption that messages are private and will not be forwarded, copied, or researched. Yet, the public context of CMC allows for such practices, the consequences of which for the unwary communicator could range from the mildly embarrassing to the indictable. Communicators become mindful when they are faced with [the] unfamiliar. To what degree are users mindful of cues for communication scripts and how they influence their communication choices? Typically, communicators become more mindful when they are faced with unfamiliar, unsuccessful, or adverse circumstances or routines (Burgoon, Berger, & Waldron, 2000). The psychological transparency of technology may diminish a communicator’s awareness of how technology influences communication interaction, leaving the user psychologically immersed in the act of communicating. Reeves and Nass’ (2000) observation that the impetus to develop a perceptually rich computer-mediated experience may not be “good,” if the perceptual experience is not also “right,” recognized that telepresence raises questions of communication ethics, as well as theoretical and research questions. In a computer-mediated context, how do communicators communicate “rightly”? How do they communicate truthfully or enact trustworthiness? How accurate can communicators be in discerning truthfulness and trustworthiness of others? To explore these questions, I now turn to rhetorical and communication theory. “Presence” and “Presentness” in CMC Technological efforts to achieve telepresence enables CMC to increasingly approximate F2F communication evoking an “as if” quality, as if communicators are physically present to one an Other despite the technological interface. Perelman’s (1982; Perelman & Olbrechts-Tyteca, 1969) rhetorical concept of presence and Buber’s (1970) dialogical concept of presentness are useful in exploring implications of CMC’s evocative quality of being virtually present to an Other for discerning and enacting truthfulness and trustworthiness in communication. Tompkins 201 Rhetorical Presence Rhetorical “presence” is predicated on the idea that “It is not enough indeed that a thing should exist for a person to feel its presence” (Perelman & Olbrechts-Tyteca, 1969, p.117). Effective communicators use rhetorical tropes to draw attention to the existence of a thing or to its particular qualities, to foreground it amidst competing information in our sensory field, as Perelman (1982) illustrated in the following Chinese story. “A king sees an ox on its way to sacrifice. He is moved to pity for it and orders that a sheep be used in its place. He confesses he did so because he could see the ox, but not the sheep” (p. 33). Rhetors evoke presence for an audience by strategically using symbols to foreground certain qualities of a person or elements in a situation. It is also possible to suppress presence, rhetorically obscuring the existence of persons or things for audiences. In a telling, but brief, observation drawn from an author writing about his involvement in the Spanish Civil War, Perelman and Olbrects-Tyeca (1969) alluded to the ethics of obscuring presence. “Your friends are allies and therefore real human beings …. Your opponents are just tiresome, unreasonable, unnecessary theses, whose lives are so many false statements which you would like to strike out with a lead bullet.” Applying this conception to reactions he felt … when confronted with the atrocities committed by the pro-Franco and Republican sides, he adds: “In the first case I saw corpses, in the second only words.” (p. 119) The notion of rhetorical presence contributes to our understanding of telepresence as “flow.” When telepresence evokes a state of mind in which the user is psychologically immersed in the computer-mediated experience, other sensory cues recede from awareness, as the sheep disappeared for the Chinese emperor or the humanity of victims of Republican atrocities vanished for the Spanish Civil War soldier. Process or contextual cues may be tropes that initiate cognitive scripts of human communication by foregrounding the “human,” triggering an interaction characteristic of F2F or private communication. As the research by Reeves and Nass (1996) and Nass and Moon (2000) previously discussed suggested the technological threshold for tropes triggering scripts may be very low, with audio, visual, and textual tropes triggering scripts of F2F communication. The limited sensory richness of CMC also may sharpen perceptual awareness of whatever information is available for understanding who is one’s communication partner. Limited message elements—text, graphics, or audio—function as a synecdoche, helping communicators draw inferences about qualities of a communication partner in physical reality. A synecdoche is a rhetorical trope in which a part represents a whole, a con- Tompkins 202 tainer the thing contained. A name or quality associated with a specific gender or ethnicity represents actual gender or ethnicity. Limited textual or visual cues as tropic markers of gender or ethnicity, for example, function as synecdoches of the actual gender and ethnicity of senders (Burkhalter, 1999; O’Brien, 1999). Yet, without the sensory richness characteristic of F2F communication, it is difficult to discern the accuracy of a synecdoche in CMC. The technological form (software, hardware, and networks) obscures the physical presence of users, granting them pseudonymity. With pseudonymity, the nature of the trope changes from synecdoche to metonymy in evoking presence for receivers. Metonymy is a symbol or name used in place of an idea, often represented by another symbol or name. The symbol of a flag is associated with the idea of nation or the idea of patriotism. The phrase “direct your eyes here” utilizes “eyes” as a metonymy of sight. In CMC, receivers may presume that stereotypical language is a synecdoche of a particular ethnicity or gender in real time and space, although in actuality it may not correspond with a communicator’s actual ethnicity or gender. Stereotypical language may instead function as a metonymy rather than a synecdoche, evoking the idea that one is communicating with a woman or an African American, for example. Successful pseudonymity in cyberspace relies on the confusion of synecdoche with metonymy in the evocation of presence. Successful pseudonymity … relies on the confusion of synecdoche with metonymy. One of the more infamous instances of pseudonymity in cyberspace is recounted in Julian Dibbell’s “A Rape in Cyberspace” (1998). Setting aside ontological questions about whether or not it is possible to commit virtual sexual violence, Dibbell’s search to understand what happened in LambdaMoo is relevant to this exploration of the tropic qualities of presence. Dibbell attempted to locate the actual people who created the virtual characters in LambdaMoo—victims, bystanders, and Mr. Bungle, the rapist. Besides discovering information about gender and relationships, including that two of the online characters were married in physical reality, Dibbell discovered that The Mr. Bungle account had been the more or less communal property of an entire New York University dorm floor, that the young man at the keyboard on the evening of the rape had acted not alone but surrounded by fellow students calling out suggestions and encouragement. (Dibbell, 1998, p. 30) Tompkins 203 Dibbell’s (1998) narrative illustrated how metonymy can be confused with synecdoche. Participants in LambdaMoo drew inferences about the qualities of the person they believed created Mr. Bungle, using textual elements of Mr. Bungle’s communication and his vaguely threatening, yet clownish graphic persona as synecdoches of personal qualities of his creator. The discovery that the Mr. Bungle account was used by a group of people and not one person, illustrates the potential for inaccuracy of this tropic reasoning. The graphic image of Mr. Bungle and the form of his messages functioned as a metonymy for the idea of a single creator, rather than as a synecdoche of the creator. Dibbell’s narrative indicates that LambdaMoo participants thought Mr. Bungle had a split personality, but did not consider that he was the creation of more than one person. Apparently, no one on LambdaMoo considered the possibility that an account might be a group account, in part because Mr. Bungle’s rhetorical presence was that of a single individual. Without the opportunity to check the correspondence between an online persona and the physical reality of its creator(s), participants in LambdaMoo repeatedly misinterpreted the graphic and textual messages of Mr. Bungle as representing a single person rather than a group account, confusing metonymy with synecdoche in evoking the rhetorical presence of Mr. Bungle. This confusion facilitated deception and subsequent cyber violence on LambdaMoo. Participants repeatedly misinterpreted … the messages as representing a single person, rather than a group. The confusion of metonymy with synecdoche may also produce charges of deception when the style of a communicator includes qualities associated with more than one ethnicity or gender. Thus, women who self-identify online and whose communication style is more aggressive than that of the stereotypical female, may be accused by others of gender crossing (Herring, 1996). Without a capability to check the truthfulness of a cyber persona, the difference between synecdoche and metonymy in evoking presence is indistinguishable for receivers. In cyberspace, a symbol representing a part of a whole may be indistinguishable from a symbol representing an idea associated with that symbol. Arguably, increasing the social richness of CMC would increase its accuracy to the point that the interface would be so transparent it would be as if one is physically present, F2F. Then one might be capable of checking if the online persona corresponds with its creator as a synecdoche or a metonymy. Events in 204 Truth, Trust, and Telepresence LambdaMoo might have proceeded differently if telepresence had greater social richness, allowing participants to check this correspondence. When the social richness of presence limits our capabilities to assess correspondence with physical reality, communicators would be well served to be skeptical of the veracity of those with whom they communicate, and withhold trust. Dialogic Presentness A second approach to exploring truthfulness, trustworthiness, and telepresence may be found in Buber’s (1970) dialogical communication theory. Making one’s self present, or presentness, is a characteristic of dialogical communication. Johannesen (2000) posited four attitudes toward another that characterize dialogue—authenticity, inclusion, confirmation, and presentness. Presentness is fully attending to one’s partners during communication, immediate and full involvement with another, being accessible and authentic, spontaneity and risking attachment with one’s partners (Johannesen, 2002, p. 59). Friedman (1955/1976) argued that for Buber, presentness occurs in the action of an I–Thou relationship, in one’s encounter with another’s subjectivity. Achieving presentness in dialogue is momentary, fleeting, and unplanned, disappearing once a person has realized what it is. Dialogue is not limited to supportive communication, but can occur in a moment of honest yet intense disagreement, as when one understands another’s position from his or her viewpoint rather than one’s own. Johannesen (2002) described the communicative practice of presentness as giving a full concentration to bringing their total and authentic beings to the encounter. They must demonstrate willingness to become fully involved with each other by taking time, avoiding distraction, being communicatively accessible, and risking attachment. One avoids being an onlooker who simply takes in what is presented or an observer who analyzes. Rather, what is said to us enters meaningfully into our life; we set aside the armor used to thwart the signs of personal address. The dialogic person listens receptively and attentively and responds readily and totally. We are willing to reveal ourselves to others in ways appropriate to the relationship and to receive their revelation. (p. 59) As a guiding attitude, dialogue orients communicators to open themselves to the possibilities of their communication partners, to see past limitations of social expectations, language, and technology. The opening up of self to another’s presence would appear to compensate for the mindlessness engendered by the tropic qualities of pres- Tompkins 205 ence in CMC discussed preciously. As hardware and software developments produce an increasingly transparent interface, telepresence as social richness creates the possibility of communicators enacting dialogic presence in communication. Yet, each quality of presence as richness—speed, interactivity, visual, audio, touch—remains a synecdoche of humanness, a token, not a human being. Research into computer-mediated haptic communication indicates that communicators may experience feelings of relational closeness, even when the haptic message is initiated by a software program (Canny & Paulos, 2000). Although visual cues may reduce the pseudonymity of communicators, questions about the accuracy or reliability of messages will arise whenever there are concerns about either the integrity or security of the computer network or infrastructure (Nissenbaum, 2001). Additionally, differences in the relative technological sophistication of users raises concerns about the capabilities of users to discern truthful or trustworthy CMC. More sophisticated users have more resources for deceiving their communication partners. Although relatively simple uses of technology may deceive unwary users, increasingly sophisticated software or “bots” that simulate human communicators are already developed, with some available for downloading (see Botspot, 2003). Sophisticated users have more resources for deceiving. For the sake of argument, however, let us suppose that interaction in CMC is truthful, in that there is a relatively accurate correspondence between virtual personae and communicators and that the integrity of the systems and infrastructure is not compromised, laying the foundation for negotiating relational trust. To achieve dialogic presence as conceived by Buber (1970), communicators would need to be aware of the asymmetrical form of CMC that encourages users to construct their individual mosaics of meaning in a process of self-reflexive message “co-construction.” This self-reflexive quality enables communicators as receivers to amplify the meaning or significance of messages or the tropic tokens of presence of which they are perceptually aware, creating a feedback loop that magnifies the intensity of those messages or tropes. Such a self-reflexive process would contribute to the heightened sense of trust and intimacy characteristic of hyper-personal relationships (Walther, 1996) or the anger and frustration of flaming. The spontaneity of CMC, facilitated by the speed and interactivity of presence as richness, could encourage the construction of self-referential “relationships” of simulated mutuality based upon tropic tokens of a person. The ten- 206 Truth, Trust, and Telepresence dency toward mindless self-reflexive cycles of interpretation drawing upon tropic condensation of the humanity of communicators may unintentionally attenuate authentic human connection, precluding dialogic presence. Communicators mindful of self-reflexivity and tropic condensation within CMC could redouble their efforts to create authentic human connection critical to dialogue, embrace these processes as a playful simulation and forego authentic communication, or approximate truthful and trustworthy communication as best as they can. Truth, Trust, and Telepresence The concepts of rhetorical presence and dialogic presentness help explain some of the limitations of CMC in enacting and discerning truthful and trustworthy communication. Telepresence as both flow and richness presume that increasing the perceptual transparency of the digital interface helps CMC approximate F2F communication. An unexamined assumption appears to be that increasing the flow and richness of telepresence increases the perceptual accuracy of communicators, making more accurate, truthful, and trustworthy communication possible. In CMC, individual human presence is evoked tropically by triggers for cognitive scripts of human communication or rhetorical tropes such as synecdoche and metonymy. Communicators are challenged to creatively condense their identity or construct a new one using whatever textual, graphic, visual, or audio tropes—as well as triggers of cognitive scripts for communication—the hardware and software allow. Receivers’ understanding of who is their communication partner is limited not only by the tropic quality of CMC, but also by its asymmetry. By selecting which messages or tropes within messages they will attend to, receivers construct the messages they receive, creating a more individualistic mosaic of meaning rather than socially constructed meaning. The tropic quality of CMC, particularly the confusion of metonymy with synecdoche in evoking the presence of communicators, creates a fertile environment for deception. The self-reflexive form of CMC also can magnify inaccurate perceptions, creating a fertile environment for self-deception, even when a sender’s message is truthful. CMC can magnify inaccurate perceptions, creating a fertile environment for self-deception. I am not claiming that CMC is inherently deceptive because of its technological form. Rather, my claim is that truthfulness and trustworthi- Tompkins 207 ness are possible, but more difficult when all communication is computer-mediated. The human connection needed for discerning and enacting truthfulness and trustworthiness is more fragile and tenuous in cyberspace than in F2F contexts. Whereas cyberspace transcends time and space in making connection possible, our humanness is condensed and refracted by the formal qualities of the medium. My claim of the difficulty of discerning and enacting truthfulness and trustworthiness in CMC is comparable to the criticism of the “new” technology of writing made by Plato (1961) in the Phaedrus (pp. 274c–276a), or alarms about the dangers of manuscripts or of excessive book reading made by leaders of the Christian church over the centuries (Horsfield, this issue; Osborne 1959), criticisms which raise questions about what it means to be literate. Besides possessing the knowledge needed to function in a society, literacy includes being competent in employing available technology, such as reading and writing and, today, using e-mail. Individuals often differ in their capacity to use a technology competently and, thereby, becoming literate. This may be the case with CMC. Research by Kraut et al. (2002) indicated that extroverts and introverts differ in gaining relational benefits of CMC, specifically social support. They argued that this difference is best explained by a “rich get richer” model in which those with “deficient” qualities (introversion) are penalized whereas those with qualities more suitable to CMC (extroversion) gain more of the benefits.5 They reject the “compensation model” which argues that CMC provides a context in which more introverted individuals can compensate for the anxiety and difficulties of F2F communication. This research suggests that a computer-mediated context penalizes individuals with deficiencies in communication competence. Computer-mediated context penalizes individuals with deficiencies in communication competence. If a concept of CMC competence is to be useful in helping us discern the challenges to ethical CMC, it must include more than competence in using hardware or software. The concept of CMC competence needs to be informed by a theoretical understanding of communicative processes, how the technological form of CMC influences communication dynamics, and sensitivity to issues of communication ethics. For questions of enacting and discerning truthfulness and trustworthiness explored here, competent computer-mediated communicators need to be cognizant of 208 Truth, Trust, and Telepresence how the form of CMC not only influences messages and relationships, but also encourages us to draw inferences mindlessly—to trust too much or too soon and create hyperpersonal relationships, or to distrust too much or too soon and engage in flaming. To become more truthful, trustworthy, and competent communicators, we need to become more mindful communicators, sensitive not only to the tensions inherent in trustworthiness and truthfulness but also to the dialectical tensions inherent in CMC—to be simultaneously skeptical and open to our own interpretations and meanings and also simultaneously skeptical and open to the interpretations and meanings of others. This would appear to preclude the possibility of the truthful and trustworthy communication, for how can one be skeptical yet open to one’s self and to another and create trust? The notion of dialogical presence may help in addressing this tension. Dialogue is an attitude toward another, not a technique or skill. It occurs in moments in which we open ourselves to the human presence of another. Once we recognize that we have been in dialogue, the moment is over. In dialogue we are sensitive to the authentic presence of another, sensitive to who they are. One approach to ethical CMC competence is to become mindful communicators employing a dialogical attitude in which we acknowledge the limits of what we understand and know, to be open to possibility. One possibility may be that we are being duped by tropes that create a simulated identity that has little correspondence or connection with its creator. Another could be that our suspicions about a communication partner may be unfounded or exaggerated by the self-reflexive tendencies inherent within CMC. When our resources for checking our perceptions are limited, both these possibilities exist in tension with one another. Because CMC technology is constructed of binary language, wires, and silicon that mediate our relationships, it obscures our perceptions, particularly our capacity to recognize the human qualities of our communication partners. Clarity in recognizing the human qualities of others depends, in part, on maintaining a tension between both openness and skepticism in our communication. This is not a new communication problem. Students of communication have long recognized that language can also obscure the humanity of our fellow human beings, as it did for the Spanish Civil War veteran cited by Perelman and Olbrects-Tyteca (1969), who looked at the dead bodies of those who fought against him and saw words, theses, not human beings. Mindless engagement in the computer-mediated context can further obscure our recognition of the humanity of our communication partners. Developing a notion of CMC competence that encourages communicators to manage the dialectical tension between skepticism and openness may allow us to suspend our self-reflexive cycles of meaning 209 Truth, Trust, and Telepresence construction and aid us in discerning the humanity of another amidst the digital. Notes 1. This analysis juxtaposes the linear and social constructionist models, which traditionally are treated as mutually exclusive, to explore some of the implications of asymmetry in CMC for the creation and communication of meaning. 2. For over 1 year, a supposedly real-time camera displayed the picture of the web-creator holding up a sign that he would be back in 5 min. The web designer eventually removed the picture (Mankato, MN Homepage, 2001). 3. The expanded bandwidth capabilities of Internet2 allows for the seemingly simultaneous exchange of video and audio messages, allowing real-time video-conferencing and even real-time music and dance instruction, for example (Internet2, 2002). Arguably, the limited bandwidth of the original or commodity Internet will remain the norm in the near future due to economics and technical limitations of the commodity Internet infrastructure, particularly at private residences. 4. Hardware, quality of transmission and the physical environment of technology use provide contextual cues for selecting the appropriate cognitive script, often one of private communication. Single-user technology makes the immediate location personal space, a cue for private or intimate communication. Integrity of the transmission evokes a privacy script that was apparent with the advent of portable phones and cell phones, when occasionally television viewers unwillingly listened in on unsuspecting conversationalists. CMC typically occurs in a relatively private space (e.g., one’s home, office, or car). Conflicting cues for scripts of private and public communication are evident with the use of cell phones in public spaces. The simultaneous cues of private communication (triggered by hardware) and public communication (triggered by public space) evokes scripts of eavesdropping of bystanders and rudeness of cell phone users. Determining which cue has priority helps us choose the appropriate cognitive script and communication rules. Another example of confusion between the differing cues of hardware and physical space is viewing pornographic web sites at public computers in libraries. Our society’s communication and legal rules for viewing pornography are triggered by spatial cues, limiting it to the privacy of one’s home or restricted locations; adult bookstores or theaters. However, CPU hardware enables access in public rather than private or restricted physical spaces. Determining what are appropriate communication rules depends, in part, on deciding the degree to which the hardware or the spatial cue has priority. 5. Kraut et al.’s (2002) study focused on individuals who mingle CMC with F2F communication in their relationships, and argues that research indicates that “a diet filled with on-line relationships would be harmful to the social and psychological health of Internet users” (p. 69). 210 Truth, Trust, and Telepresence References Barnes, S. B. (2001). Online connections: Internet interpersonal relationships. Cresskill, NJ: Hampton. Bok, S. (1989). Lying: Moral choice in public and private life. New York: Vintage. Borgmann, A. (2000). Information, nearness, and farness. In K. Goldberg (Ed.), The robot in the garden: Telerobotics and telepistemology in the age of the internet (pp. 90–107). Cambridge, MA: MIT Press. Botspot. (2003). Botspot: The place for all bots. Retrieved February 10, 2003, from http://www.botspot.com/index2.html Buber, M. (1970). I and thou (W. Kaufmann, Trans.). New York: Scribners. Burgoon, J. K., Berger, C. R., & Waldron, V. R. (2000). Mindfulness and interpersonal communication [Electronic version]. Journal of Social Forces, 56, 105–127. Burkhalter, B. (1999). Reading race online: Discovering racial identity in usenet discussions. In M. A. Smith & P. Kollock (Eds.), Communities in cyberspace (pp. 60–75). New York: Routledge. Canny, J., & Paulos, E. (2000). Tele-embodiment and shattered presence: Reconstructing the body for on-line interaction. In K. Goldberg (Ed.), Robot in the garden: Telerobotics and telepistemology in the age of the internet (pp. 276–294). Cambridge, MA: MIT Press. Cissna, K. N., & Anderson, R. (1994). Communication and the ground of dialog. In R. Anderson, K. N. Cissnar, & R. C. Arnett (Eds.), The reach of dialogue: Confirmation, voice & community (pp. 9–30). Cresskill, NJ: Hampton Press. Dibbell, J. (1998). My tiny life: Crime and passion in a virtual world. New York: Holt. Draper, J. V., Kaber, D. B., & Usher, J. M. (1998). Telepresence [Electronic version]. Human Factors, 40, 354. Dreyfus, H. (2000). Telepistemology: Descartes last stand. In K. Goldberg (Ed.), The robot in the garden: Telerobotics and telepistemology in the age of the internet (pp. 48–63). Cambridge, MA: MIT Press. Fisher, B. A. (1978). Perspectives on human communication. New York: Macmillan. Friedman, M. (1976). Martin Buber: The life of dialogue. Chicago: Chicago University Press. (Original work published 1955) Haythornthwaite, C., Wellman, B., & Garton, L. (1998). Work and community via computer-mediated communication. In J. Gackenbach, (Ed.), Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications (pp. 199–226). San Diego, CA: Academic. Herring, S. (1996). Posting in a different voice: Gender and ethics in computer-mediated communication. In C. Ess (Ed.), Philosophical perspectives on computer-mediated-communication (pp. 115–145). New York: SUNY Press. Horrigan, J. B. (2001). Online communities: Networks that nurture long-distance relationships and local ties. Pew Internet & American Life Project. Retrieved September 20, 2002, from http://www.pewinternet.org Igbaria, N., Shayo, C., & Olfman, L. (1998). Virtual societies: Their prospects and dilemmas. In J. Gachenbach (Ed.), Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications (pp. 227–252). SanDiego, CA: Academic Press. Internet 2. (2002). Retrieved October 20, 2002 from http://www.internet2.edu/ Tompkins 211 Jaska, J. A., & Pritchard, M. S. (1994). Communication ethics: Methods of analysis (2nd ed.). Belmont, CA: Wadsworth. Jensen, V. A. (2001). Bridging the millennia: Truth and trust in human communication. World Communication, 30, 68–92. Johannesen, R. L. (2000). Nel Noddings’s uses of Martin Buber’s philosophy of dialogue. Southern Communication Journal, 65, 151–160. Johannesen, R. L. (2002). Ethics in human communication (5th ed.). Prospect Heights, IL: Waveland. Johnson, S. (1997). Interface culture: How new technology transforms the way we create and communicate. New York: HarperCollins. Jones, S. G. (1997). The internet and its social landscape. In S. G. Jones (Ed.), Virtual culture: Identity and communication in cybersociety (pp. 7–35). Thousand Oaks, CA: Sage. Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V., & Crawford, A. (2002). Internet paradox revisited. Journal of Social Forces, 1, 49–74. Lombard, M., & Ditton, T. (1997). At the heart of it all: The concept of presence. Journal of Computer Mediated Communication, 3. Retrieved April 1, 2000, from http://www.ascuse.org/jcmc.index.htm Mankato, MN Home Page. (2001). Retrieved January 7, 2003, from http://www.lme.mankato.msus.edu/mankato/mankato.html McLaughlin, M. L., Osborne, K. K., & Ellison, N.B. (1997). Virtual community in a telepresence environment. In S. G. Jones (Ed), Virtual culture: Identity and communication in cyber society (pp. 146–168). Thousand Oaks, CA: Sage. Nass, C., & Moon, Y. (2000). Machines and mindlessness: Social responses to computers. [Electronic version]. Journal of Social Issues, 56, 81–103. Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron? Boston Law Review, 81, 635–664. O’Brien, J. (1999). Writing in the body: Gender (re)production in online interaction. In M. A. Smith & P. Kollock (Eds.), Communities in cyberspace (pp. 76–104). New York: Routledge. Osborne, E. (1959). Teaching and writing in the first chapter of the Stromateis of Clement of Alexandria. Journal of Theological Studies, 10, 335–343. Perelman, C. (1982). The realm of rhetoric. (W. Kluback, Trans.). Notre Dame, IN: Notre Dame University Press. Perelman, C., & Olbrechts-Tyteca, L. (1969). The new rhetoric: A treatise on argumentation. (J. Wilkinson & P. Weaver, Trans.). Notre Dame, IN: Notre Dame University Press. Plato. (1961). Phaedrus (R. Hackforth, Trans.). In Ed. Hamilton & H. Cairns (Eds.), Plato: The collected dialogues (Bollinger Series LXXI, pp. 475–525). Princeton, NJ: Princeton University Press. Rawlins, W. (1992). Friendship matters: Communication, dialectics, and the life course. New York: Aldine de Gruyter. Reeves, B., & Nass, C. (1996). The media equation: How people treat computers, television, and new media like real people and places. Stanford, CA: CSLI. Reeves, B., & Nass, C. (2000). Perceptual bandwidth [Electronic version]. Communications of the Association for Computing Machinery, 43, 65. Reid, E. (1998). The self and the internet: Variations on the illusion of one self. In J. Gackenbach (Ed.), Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications (pp. 20–42). Boston: Academic. 212 Truth, Trust, and Telepresence Riva, G., & Galimberti, C. (1998). Computer-mediated communication: Identity and social interaction in an electronic environment [Electronic version]. Genetic, Social and General Psychology Monographs, 124, 434. Turner, J. W., Grube, J. A., & Meyers, J. (2001). Developing an optimal match within online communities: An exploration of CMC support communities and traditional support. Journal of Communication, 51, 231–251. Van Avermaet, E. (1999). Trust [Electronic version—subscription]. In A. S. R. Manstead & M. Hewstone (Eds.), The Blackwell encyclopedia of social psychology. Cambridge, MA: Blackwell. Retrieved July 3, 2002, from emedia.netlibrary. Walther, J. B. (1996). Computer-mediated communication: Interpersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3–43.
© Copyright 2024 Paperzz