Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach

Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its cl...

Full description

Bibliographic Details
Main Author: Abbas Mehrpooya
Format: Article
Language:fas
Published: University of Isfahan 2023-09-01
Series:نشریه پژوهش‌های زبان‌شناسی
Subjects:
Online Access:https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdf
_version_ 1797315308628738048
author Abbas Mehrpooya
author_facet Abbas Mehrpooya
author_sort Abbas Mehrpooya
collection DOAJ
description Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.
first_indexed 2024-03-08T02:59:56Z
format Article
id doaj.art-3e213b5bbff2483093dae4c7fc871d17
institution Directory Open Access Journal
issn 2322-3413
language fas
last_indexed 2024-03-08T02:59:56Z
publishDate 2023-09-01
publisher University of Isfahan
record_format Article
series نشریه پژوهش‌های زبان‌شناسی
spelling doaj.art-3e213b5bbff2483093dae4c7fc871d172024-02-13T11:33:53ZfasUniversity of Isfahanنشریه پژوهش‌های زبان‌شناسی2322-34132023-09-01152536410.22108/jrl.2023.138133.176427848Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approachAbbas Mehrpooya0Department of Foreign Languages, Hamedan Branch, Islamic Azad University, Hamedan, IranLooking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdfcyber textvirtual correspondencecyber securitycyber forgerycda (critical discourse analysis)
spellingShingle Abbas Mehrpooya
Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
نشریه پژوهش‌های زبان‌شناسی
cyber text
virtual correspondence
cyber security
cyber forgery
cda (critical discourse analysis)
title Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
title_full Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
title_fullStr Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
title_full_unstemmed Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
title_short Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
title_sort discursive odds of a fraudulent scheme in cyberspace correspondence a cda approach
topic cyber text
virtual correspondence
cyber security
cyber forgery
cda (critical discourse analysis)
url https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdf
work_keys_str_mv AT abbasmehrpooya discursiveoddsofafraudulentschemeincyberspacecorrespondenceacdaapproach