Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its cl...
Main Author: | |
---|---|
Format: | Article |
Language: | fas |
Published: |
University of Isfahan
2023-09-01
|
Series: | نشریه پژوهشهای زبانشناسی |
Subjects: | |
Online Access: | https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdf |
_version_ | 1797315308628738048 |
---|---|
author | Abbas Mehrpooya |
author_facet | Abbas Mehrpooya |
author_sort | Abbas Mehrpooya |
collection | DOAJ |
description | Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition. |
first_indexed | 2024-03-08T02:59:56Z |
format | Article |
id | doaj.art-3e213b5bbff2483093dae4c7fc871d17 |
institution | Directory Open Access Journal |
issn | 2322-3413 |
language | fas |
last_indexed | 2024-03-08T02:59:56Z |
publishDate | 2023-09-01 |
publisher | University of Isfahan |
record_format | Article |
series | نشریه پژوهشهای زبانشناسی |
spelling | doaj.art-3e213b5bbff2483093dae4c7fc871d172024-02-13T11:33:53ZfasUniversity of Isfahanنشریه پژوهشهای زبانشناسی2322-34132023-09-01152536410.22108/jrl.2023.138133.176427848Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approachAbbas Mehrpooya0Department of Foreign Languages, Hamedan Branch, Islamic Azad University, Hamedan, IranLooking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdfcyber textvirtual correspondencecyber securitycyber forgerycda (critical discourse analysis) |
spellingShingle | Abbas Mehrpooya Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach نشریه پژوهشهای زبانشناسی cyber text virtual correspondence cyber security cyber forgery cda (critical discourse analysis) |
title | Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach |
title_full | Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach |
title_fullStr | Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach |
title_full_unstemmed | Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach |
title_short | Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach |
title_sort | discursive odds of a fraudulent scheme in cyberspace correspondence a cda approach |
topic | cyber text virtual correspondence cyber security cyber forgery cda (critical discourse analysis) |
url | https://jrl.ui.ac.ir/article_27848_5f8ca20da6c9b00e2c626a18ee10ac2b.pdf |
work_keys_str_mv | AT abbasmehrpooya discursiveoddsofafraudulentschemeincyberspacecorrespondenceacdaapproach |