skip to main content
article

"Everyone Has to Do It: " A joint action approach to managing social inattention

Published: 01 November 2013 Publication History

Abstract

In an always-connected world, managing social inattention - that is, explaining the inability to interact at a particular time - can be as important as coordinating mutual availability. Inattention, particularly if repeated, can have significant relational consequences as it may be considered rude and can lead to painful social outcomes. Prior research has examined the butler lie, one strategy commonly used to manage social inattention while preserving relationships. This paper builds on that via an interview study of 47 participants that qualitatively examines perceptions of butler lies from both the senders' and receivers' perspectives. Participants see butler lies as a common and useful inattention management strategy, but these messages can have a negative effect receivers do not perceive the senders' intentions to be positive. Factors affecting the perception of intent include relationship strength and history, the stakes of the situation, and past behavior. The paper argues that inattention management should be considered a joint coordination problem characterized by a willingness to accept the pragmatic relational meaning of messages, which may differ from their literal semantic meaning. This hints at a collaborative view of deception, in which some interlocutors are aware they are being deceived and willing to accept deception.

References

[1]
Aoki, P., & Woodruff, A. (2005). Making space for stories: ambiguity in the design of personal communication systems. In Proc. ACM CHI (pp. 181-190).
[2]
On the need for attention-aware systems: Measuring effects of interruption on task performance, error rate, and affective state. Computers in Human Behavior. v22. 685-708.
[3]
Language style as audience design. Language and Sociology. v13. 145-204.
[4]
Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging. Computers in Human Behavior. v26. 1427-1433.
[5]
Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization. Computers in Human Behavior. v28. 1028-1035.
[6]
Birnholtz, J., Guillory, J., Hancock, J. T., & Bazarova, N. (2010). "On my way": Deceptive Texting and interpersonal awareness narratives. In Proc. ACM CSCW (pp. 1-4).
[7]
Boehner, K., & Hancock, J. (2006). Advancing ambiguity. In Proc. ACM CHI (pp. 103-107).
[8]
Lying: Moral choice in public and private life. 2nd ed. Random House, New York, NY.
[9]
Teenage communication in the instant messaging era. In: Kraut, R., Brynin, M., Kiesler, S. (Eds.), Computers, phones and the internet: Domesticating information technology, Oxford U. Press, Oxford, UK. pp. 201-218.
[10]
Politeness: Some universals in language usage. Cambridge University Press, Cambridge, UK.
[11]
Buchanan, M. (2009). Gizmodo: Palm Pre "Oops I'm late" feature sounds kind of horrible. <http://tinyurl.com/6u3bm3n> Retrieved 10.12.11.
[12]
White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. Western Journal of Speech Communication. v48 i4. 309-325.
[13]
Instant messaging and presence technologies for college campuses. IEEE Network. v19 i3. 4-13.
[14]
Always on: How the iPhone unlocked the anything - anytime - anywhere future-and locked us in. Da Capo Press, Cambridge, MA.
[15]
Using language. Cambridge University Press, New York.
[16]
Interpersonal accounting. In: Giles, H., Robinson, P. (Eds.), Handbook of language and social psychology, Wiley, London. pp. 227-255.
[17]
Everyday lies in close and casual relationships. Journal of Personality and Social Psychology. v74. 63-79.
[18]
The discovery of grounded theory: Strategies for qualitative research. Aldine de Gruyter, Hawthorne, NY.
[19]
On face work: An analysis of ritual elements in social interaction. Psychiatry. v18. 213-231.
[20]
Grinter, R., & Eldridge, M. (2003). Wan2tlk?: Everyday text messaging. In Proc. ACM CHI (pp. 441-448).
[21]
Hancock, J. T., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., & Amos, B. (2009). Butler lies: Awareness, deception and design. In Proc. ACM CHI (pp. 517-526).
[22]
Digital deception: When, where and how people lie online. In: McKenna, K., Postmes, T., Reips, U., Joinson, A.N. (Eds.), Ocford handbook of internet psychology, Oxford U. Press, Oxford, UK. pp. 287-301.
[23]
Telephone conversation. Indiana University Press, Bloomington.
[24]
Huberman, A. M., & Miles, M. B. (1994). Data management and analysis methods. In Lincoln & Denzin (Eds.), Handbook of qualitative research. Thousand Oaks, CA: Sage.
[25]
Ostensible invitations. Language in Society. v19. 493-509.
[26]
The connectivity paradox: Using technology to both decrease and increase perceptions of distance in distributed work arrangements. Journal of Applied Communication Research. v38 i1. 85-105.
[27]
Leshed, G., & Sengers, P. (2011). "I lie to myself that I have freedom in my own schedule": Productivity tools and experiences of busyness. In Proc. ACM CHI (pp. 905-914).
[28]
Accuracy in detecting truths and lies: Documenting the "veracity effect". Communication Monographs. v66. 125-144.
[29]
Convention: A philosophical study. Harvard University Press, Cambridge.
[30]
Chinese children's evaluations of white lies: Weighing the consequences for recipients. Journal of Experimental Child Psychology. v108. 308-321.
[31]
Mark, G., Gudith, D., & Klocke, U. (2008). The cost of interrupted work: More speed and stress. In Proc. ACM CHI (pp. 107-110).
[32]
Nardi, B., Whittaker, S., & Bradner, E. (2000). Interaction and outeraction: Instant messaging in action. In Proc. ACM CSCW (pp. 79-88).
[33]
Nielsen Research. (2010). U.S. teen mobile report: Calling yesterday, texting today, using apps tomorrow. http://tinyurl.com/32h5go6 Retrieved 10.12.11.
[34]
Dealing with mobility: Understanding access anytime, anywhere. ACM TOCHI. v8. 323-347.
[35]
Constructing accounts: The role of explanatory coherence. In: McLaughlin, M.L., Cody, M.J., Read, S. (Eds.), Explaining the self to others, Lawrence Erlbaum Associates, Hillsdale, NJ. pp. 3-19.
[36]
Reynolds, L., Gillette, S., Marder, J., Miles, Z., Vodenski, P., Weintraub, A., Birnholtz, J., Hancock, J. (2011). Contact stratification and deception, In Proc. ACM CSCW (pp. 221-224).
[37]
Reynolds, L., Smith, M., Birnholtz, J., Hancock, J. (2013). "Butler lies from both sides: Actions and perceptions of unavailability management in texting", In Proc. ACM CSCW (pp. 769-778).
[38]
The strategy of conflict. Harvard University Press, Cambridge.
[39]
Americans and text messaging. Pew Research Center's Internet & American Life Project. Pew Research Center, Washington DC.
[40]
Americans and their cell phones. Pew Research Center's Internet & American Life Project. Pew Research Center, Washington DC.
[41]
Productivity in the age of social media. In: Scholz, T. (Ed.), The digital media pedagogy reader, Institute for Distributed Creativity, Comment Press, New York.
[42]
Alone together: Why we expect more from technology and less from each other. Basic Books, New York.
[43]
Information control in conversation: Honesty is not always the best policy. Kansas Journal of Sociology. v11. 69
[44]
Tyler, J. R., & Tang, J. C. (2003). When can i expect an email response? A study of rhythms in email usage. In Proc. ECSCW (pp. 14-18).
[45]
White cyberlies: The use of deceptive instant messaging statuses as a social norm, paper presented at the conference of the International Communication Association. 2008. Montreal, Canada.
[46]
Equity: Theory and research. Allyn and Bacon, Rockleigh, NJ.
[47]
Politeness. Cambridge U. Press, Cambridge, UK.
[48]
I can't talk now, I'm in a fitting room: Formulating availability and location in mobile-phone conversations. Environment and Planning A. v35. 1589-1605.
[49]
Ostracism: Consequences and coping. Current Directions in Psychological Science. v20. 71-75.
[50]
The bulge: A theory of speech behavior and social distance. Penn Working Papers in Educational Linguistics. v2. 55-83.

Cited By

View all
  1. "Everyone Has to Do It: " A joint action approach to managing social inattention

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Computers in Human Behavior
    Computers in Human Behavior  Volume 29, Issue 6
    November, 2013
    701 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 November 2013

    Author Tags

    1. Availability
    2. Butler lies
    3. CMC
    4. Joint action
    5. Politeness
    6. Text messaging

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media