What Eye Tracking Can Show Us About How People Are Influenced by Deceptive Tactics in Line Graphs
Background: Graphs, especially those that are generated automatically, are often subject to mistakes in their processing, framing, and construction, sending unintended messages that neither the viewer nor the author may realize. This article analyzes the eye-tracking data of 57 participants to exten...
Saved in:
Published in | IEEE transactions on professional communication Vol. 66; no. 3; pp. 220 - 235 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.09.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0361-1434 1558-1500 |
DOI | 10.1109/TPC.2023.3290948 |
Cover
Abstract | Background: Graphs, especially those that are generated automatically, are often subject to mistakes in their processing, framing, and construction, sending unintended messages that neither the viewer nor the author may realize. This article analyzes the eye-tracking data of 57 participants to extend the results of a previous study that investigated how people are deceived by common mistakes and deceptive tactics in data visualizations and titles. Literature review: Previous research has suggested that viewers are susceptible to deception by misleading titles or graph presentations, and that such information can influence how they interpret graphs. Previous eye-tracking research has only measured viewing patterns of nondeceptive graphs. Research questions: 1. How much attention do participants give to various areas of a graph when not given any instruction on what to look for, nor what they might be asked about? 2. Are there differences in how participants view and interpret deceptive versus control graphs about noncontroversial topics? 3. Are there differences in how participants view and interpret graphs about noncontroversial topics paired with control or exaggerated titles? Methodology: This study analyzed view time, fixations, revisits, and time to first fixation for the graph area, title, y-axis, and x-axis of four line graphs. Qualitative responses were also coded and analyzed. Results: Among other significant findings, this study found that participants spent significantly less time looking at both line graph axes for graphs with a rhetorically exaggerated title than those with a control title. Participants also fixated on and revisited deceptive graphs more so than control graphs, and fixated and revisited the title and x-axis of control graphs significantly more than deceptive graphs. Qualitative results contribute further patterns. Discussion: Findings suggest that graphs with exaggerated titles make viewers less attentive to the axes, but deceptive graphs cause viewers to examine the lines of the graphs themselves in greater detail. Conclusion: Subtle changes in the makeup of graphics can significantly change how viewers examine such visualizations. It is critical to better understand how these changes influence viewing and how they might be leveraged to ultimately impact understanding. |
---|---|
AbstractList | Background: Graphs, especially those that are generated automatically, are often subject to mistakes in their processing, framing, and construction, sending unintended messages that neither the viewer nor the author may realize. This article analyzes the eye-tracking data of 57 participants to extend the results of a previous study that investigated how people are deceived by common mistakes and deceptive tactics in data visualizations and titles. Literature review: Previous research has suggested that viewers are susceptible to deception by misleading titles or graph presentations, and that such information can influence how they interpret graphs. Previous eye-tracking research has only measured viewing patterns of nondeceptive graphs. Research questions: 1. How much attention do participants give to various areas of a graph when not given any instruction on what to look for, nor what they might be asked about? 2. Are there differences in how participants view and interpret deceptive versus control graphs about noncontroversial topics? 3. Are there differences in how participants view and interpret graphs about noncontroversial topics paired with control or exaggerated titles? Methodology: This study analyzed view time, fixations, revisits, and time to first fixation for the graph area, title, y-axis, and x-axis of four line graphs. Qualitative responses were also coded and analyzed. Results: Among other significant findings, this study found that participants spent significantly less time looking at both line graph axes for graphs with a rhetorically exaggerated title than those with a control title. Participants also fixated on and revisited deceptive graphs more so than control graphs, and fixated and revisited the title and x-axis of control graphs significantly more than deceptive graphs. Qualitative results contribute further patterns. Discussion: Findings suggest that graphs with exaggerated titles make viewers less attentive to the axes, but deceptive graphs cause viewers to examine the lines of the graphs themselves in greater detail. Conclusion: Subtle changes in the makeup of graphics can significantly change how viewers examine such visualizations. It is critical to better understand how these changes influence viewing and how they might be leveraged to ultimately impact understanding. |
Author | Sanchez, Christopher A. Lauer, Claire |
Author_xml | – sequence: 1 givenname: Claire orcidid: 0000-0002-2715-1832 surname: Lauer fullname: Lauer, Claire email: claire.lauer@asu.edu organization: Technical Communication Program, Arizona State University, Mesa, AZ, USA – sequence: 2 givenname: Christopher A. orcidid: 0000-0003-4052-6907 surname: Sanchez fullname: Sanchez, Christopher A. email: christopher.sanchez@oregonstate.edu organization: School of Psychological Science, Oregon State University, Covallis, OR, USA |
BookMark | eNp9kM1LAzEQxYMoWKt3Dx4CnrdOvvbjWKq2hYKCFY9Lmp210Zpdk1Tpf2-kHsSDp2GY93tveCfk0HUOCTlnMGIMqqvl_WTEgYuR4BVUsjwgA6ZUmTEFcEgGIHKWMSnkMTkJ4QWAyXQYEP201pHe7JAuvTav1j3TiXb0Yd190sdAx6tuG-ksLffY9RukY4907trNFp3Bhq529BoN9tF-JAdtojWBWkcX1iGdet2vwyk5avUm4NnPHJLH25vlZJYt7qbzyXiRGV7xmDW8UdJoI6HlqslBCZBQVaJqUk6B6VnZFHme63ZVgiqbUnHZMsRWrYpWIYohudz79r5732KI9Uu39S5F1rxUihcFgEgq2KuM70Lw2Na9t2_a72oG9XeRdSqy_i6y_ikyIfkfxNioo-1c9Npu_gMv9qBFxF85HCrIC_EFj52AlA |
CODEN | IEPCBU |
CitedBy_id | crossref_primary_10_1109_TVCG_2023_3338451 crossref_primary_10_1109_TPC_2024_3452288 crossref_primary_10_1145_3658438_3658439 |
Cites_doi | 10.1145/3290605.3300576 10.1037/1076-898X.4.2.75 10.1145/2968219.2968326 10.1109/TVCG.2015.2467732 10.1145/2470654.2470696 10.1145/3411764.3445443 10.1007/978-3-319-47024-5_14 10.2307/2288400 10.1145/3491102.3502138 10.1207/s1532799xssr1003_3 10.1109/VAST.2017.8585665 10.1145/3233756.3233961 10.1177/0963662514549688 10.1109/TVCG.2013.234 10.1109/TVCG.2016.2598594 10.4324/9781351550932-5 10.1109/MCG.2021.3132004 10.1007/s10648-011-9174-7 10.1109/TVCG.2011.255 10.1109/TPC.2020.3032053 10.2307/2683253 10.1109/TVCG.2014.2346320 10.1145/2702123.2702608 10.1187/cbe.18-06-0102 10.1145/3173574.3174012 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD JQ2 L7M |
DOI | 10.1109/TPC.2023.3290948 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts ProQuest Computer Science Collection |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Journalism & Communications Psychology Computer Science |
EISSN | 1558-1500 |
EndPage | 235 |
ExternalDocumentID | 10_1109_TPC_2023_3290948 10209067 |
Genre | orig-research |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAVXG AAWTH ABAZT ABIVO ABQJQ ABVLG ACGFO ACGFS ACHQT ACIWK ACNCT AETIX AFOGA AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IAAWW IBMZZ ICLAB IFIPE IFJZH IPLJI JAVBF LAI MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 AAYXX CITATION RIG 7SP 8FD JQ2 L7M |
ID | FETCH-LOGICAL-c292t-d2d54cac40f25d60530409939dced7e5004d7666afb8058d8524f1eef5b7f5ee3 |
IEDL.DBID | RIE |
ISSN | 0361-1434 |
IngestDate | Mon Jun 30 06:54:49 EDT 2025 Tue Jul 01 04:07:31 EDT 2025 Thu Apr 24 23:06:46 EDT 2025 Wed Aug 27 02:14:29 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c292t-d2d54cac40f25d60530409939dced7e5004d7666afb8058d8524f1eef5b7f5ee3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-2715-1832 0000-0003-4052-6907 |
PQID | 2855277003 |
PQPubID | 38158 |
PageCount | 16 |
ParticipantIDs | ieee_primary_10209067 proquest_journals_2855277003 crossref_citationtrail_10_1109_TPC_2023_3290948 crossref_primary_10_1109_TPC_2023_3290948 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-09-01 |
PublicationDateYYYYMMDD | 2023-09-01 |
PublicationDate_xml | – month: 09 year: 2023 text: 2023-09-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on professional communication |
PublicationTitleAbbrev | TPC |
PublicationYear | 2023 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref31 ref30 ref11 ref10 ref32 ref17 ref16 ref19 ref18 tufte (ref12) 1983 jones (ref14) 2011 paquette (ref2) 2023 ref23 ref26 ref25 ref22 ref21 galley (ref33) 2015; 93 ref28 huang (ref24) 2005 ref27 huff (ref13) 1993 lin (ref20) 2021 ref29 (ref1) 2021 ref8 mcnutt (ref34) 2021 ref7 ref9 ref4 ref3 ref6 ref5 monmonier (ref15) 1991 |
References_xml | – ident: ref32 doi: 10.1145/3290605.3300576 – year: 2023 ident: ref2 article-title: Why are Americans shooting strangers and neighbors? 'it all goes back to fear' publication-title: The Washington Post – ident: ref26 doi: 10.1037/1076-898X.4.2.75 – start-page: 51 year: 2005 ident: ref24 article-title: How people read graphs publication-title: Proc Conf Res Pract Inf Technol – ident: ref10 doi: 10.1145/2968219.2968326 – ident: ref29 doi: 10.1109/TVCG.2015.2467732 – ident: ref28 doi: 10.1145/2470654.2470696 – ident: ref31 doi: 10.1145/3411764.3445443 – ident: ref23 doi: 10.1007/978-3-319-47024-5_14 – volume: 93 start-page: 83 year: 2015 ident: ref33 article-title: Fixation durations-why are they so highly variable? publication-title: Zur Leistungsfähigkeit Der Rational-Choice-Theorie – ident: ref4 doi: 10.2307/2288400 – year: 2021 ident: ref34 article-title: Visualization for villainy – ident: ref19 doi: 10.1145/3491102.3502138 – ident: ref21 doi: 10.1207/s1532799xssr1003_3 – ident: ref9 doi: 10.1109/VAST.2017.8585665 – ident: ref18 doi: 10.1145/3233756.3233961 – ident: ref8 doi: 10.1177/0963662514549688 – ident: ref30 doi: 10.1109/TVCG.2013.234 – ident: ref5 doi: 10.1109/TVCG.2016.2598594 – ident: ref22 doi: 10.4324/9781351550932-5 – year: 1993 ident: ref13 publication-title: How to Lie with Statistics – ident: ref35 doi: 10.1109/MCG.2021.3132004 – ident: ref25 doi: 10.1007/s10648-011-9174-7 – year: 2011 ident: ref14 publication-title: How to lie with charts – ident: ref6 doi: 10.1109/TVCG.2011.255 – ident: ref3 doi: 10.1109/TPC.2020.3032053 – ident: ref11 doi: 10.2307/2683253 – year: 1991 ident: ref15 publication-title: How to Lie With Maps – ident: ref17 doi: 10.1109/TVCG.2014.2346320 – ident: ref16 doi: 10.1145/2702123.2702608 – year: 2021 ident: ref1 article-title: Crime data explorer – ident: ref27 doi: 10.1187/cbe.18-06-0102 – year: 1983 ident: ref12 publication-title: The Visual Display of Quantitative Information – year: 2021 ident: ref20 article-title: Fooled by beautiful data: Visualization aesthetics bias trust in science, news, and social – ident: ref7 doi: 10.1145/3173574.3174012 |
SSID | ssj0014500 |
Score | 2.334167 |
Snippet | Background: Graphs, especially those that are generated automatically, are often subject to mistakes in their processing, framing, and construction, sending... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 220 |
SubjectTerms | Axes (reference lines) Cognitive informatics Data integrity Data visualization Deceptive tactics Eye movements eye-tracking Fake news False information Gaze tracking Graphical models Graphs Information integrity Law enforcement line graphs Literature reviews Psychology Qualitative analysis Research initiatives Tactics Tracking Viewing Visualization visualizations |
Title | What Eye Tracking Can Show Us About How People Are Influenced by Deceptive Tactics in Line Graphs |
URI | https://ieeexplore.ieee.org/document/10209067 https://www.proquest.com/docview/2855277003 |
Volume | 66 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR1NS9xA9FE96aHW1dJVK-9QCj0kZpOZJHMsW-22UBHqgreQzLyh0jZbTFZZf71vJsmiLS29Zci8YeB9z_sCeJOxFmXFMwmMMDoQNomY56wMjMyrNNVKKOse9L-cp7O5-Hwlr_pidV8LQ0Q--YxC9-lj-Wahl-6pjDk8jhSL1w3YYDrrirXWIQMhu3qTJJ0EbASIISYZqZPLi2noxoSHSazYncmf6CA_VOUPSezVy9kOnA8X67JKvofLtgr1_W89G__75i_geW9o4vuOMnbhGdUj2BmGOGDP0yPYftSRcASHPdx18xPf4pPqkWYEW2txudqD0nX9xtMVIes77V7ccVrW-PXb4g7nDbp4UoszXlz4JHW-CeGnYSSKwWqFH8jn1NzyCb5Uq8HrGtk5Jvzo2mg3-zA_O72czoJ-YEOgYxW3gYmNFLrUIrKxNOwoJSwi2ABShs_NiBEkTMb-UmmrPJK5yWUs7ITIyorpgyh5CZv1oqZXgJlSln9XEzK5EGXKRJObVElKGTaxZgwnAwoL3Xczd0M1fhTeq4lUwUgvHNKLHuljeLeG-NV18vjH3n2Hw0f7OvSN4Wggk6Ln9aaIc9fFLmPxePAXsEPYcqd3qWlHsNneLOk12zJtdexp-AH-G-2M |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjR1NT9RA9EXxIBxAVwwrqO9gTDy0dNuZtnM0K7gobEjcTbg17cxrIELX2K5k_fW-mbYb0Gi8tem86STve94XwJuEtSgrnpFnhNGeKKOAea6UnpFpEcdaCVXaC_2zaTyZi08X8qIrVne1METkks_It48ulm8WemmvypjDw0CxeH0Ij1jxC9mWa62DBkK2FSdRPPLYDBB9VDJQh7PzsW8HhftRqNihSe9pITdW5Q9Z7BTM8Q5M-6O1eSVf_WVT-Prnb10b__vsT2C7MzXxfUsbT-EBVQPY6cc4YMfVA9i605NwAPsd3FV9g2_xXv1IPYDNtcBcPYPc9v3GoxUhazxt79xxnFf45XJxi_MabUSpwQm_nLs0dT4J4Uk_FMVgscIP5LJqfvAOrlirxqsK2T0m_Ggbade7MD8-mo0nXjeywdOhChvPhEYKnWsRlKE07CpFLCTYBFKG902IESRMwh5TXhZpIFOTylCUI6JSFkwhRNFz2KgWFe0BJkqV_LkYkUmFyGMmm9TESlLMsFFphnDYozDTXT9zO1bjOnN-TaAyRnpmkZ51SB_CuzXEt7aXxz_W7loc3lnXom8IBz2ZZB2311mY2j52CQvIF38Bew2PJ7Oz0-z0ZPp5Hzbtn9pEtQPYaL4v6SVbNk3xytHzL5Qh8Nk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=What+Eye+Tracking+Can+Show+Us+About+How+People+Are+Influenced+by+Deceptive+Tactics+in+Line+Graphs&rft.jtitle=IEEE+transactions+on+professional+communication&rft.au=Lauer%2C+Claire&rft.au=Sanchez%2C+Christopher+A&rft.date=2023-09-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0361-1434&rft.eissn=1558-1500&rft.volume=66&rft.issue=3&rft.spage=220&rft_id=info:doi/10.1109%2FTPC.2023.3290948&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0361-1434&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0361-1434&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0361-1434&client=summon |