Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach

Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its cl...

Full description

Saved in:
Bibliographic Details
Published inنشریه پژوهش‌های زبان‌شناسی Vol. 15; no. 2; pp. 53 - 64
Main Author Abbas Mehrpooya
Format Journal Article
LanguagePersian
Published University of Isfahan 01.09.2023
Subjects
Online AccessGet full text
ISSN2322-3413
DOI10.22108/jrl.2023.138133.1764

Cover

Abstract Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.
AbstractList Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.
Author Abbas Mehrpooya
Author_xml – sequence: 1
  fullname: Abbas Mehrpooya
  organization: Department of Foreign Languages, Hamedan Branch, Islamic Azad University, Hamedan, Iran
BookMark eNqtzEFOwzAQQFELgUSBHgFpLtBgewJJ2VUtqKxhH03sMXWU2tG4QertQYgjsHrSX_wbdZlyYqXuja6sNbp9GGSsrLZYGWwN_tA81RdqYdHaFdYGr9WylEFrbdcW1029UO-7WNwsJX4xZO8L5AAEQWj288jpBMUd-MgQE7hzz1Imcgwui3CZcvKcHD_DBra7DdA0SSZ3uFNXgcbCyz9v1dvry8d2v_KZhm6SeCQ5d5li9xuyfHYkp-hG7pCtwf6x70OwdYt6jZ64dk1wbWO8afA_X99O3GJK
ContentType Journal Article
DBID DOA
DOI 10.22108/jrl.2023.138133.1764
DatabaseName DOAJ Open Access Full Text
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2322-3413
EndPage 64
ExternalDocumentID oai_doaj_org_article_3e213b5bbff2483093dae4c7fc871d17
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
GROUPED_DOAJ
ID FETCH-doaj_primary_oai_doaj_org_article_3e213b5bbff2483093dae4c7fc871d173
IEDL.DBID DOA
IngestDate Wed Aug 27 00:50:35 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language Persian
LinkModel DirectLink
MergedId FETCHMERGED-doaj_primary_oai_doaj_org_article_3e213b5bbff2483093dae4c7fc871d173
OpenAccessLink https://doaj.org/article/3e213b5bbff2483093dae4c7fc871d17
ParticipantIDs doaj_primary_oai_doaj_org_article_3e213b5bbff2483093dae4c7fc871d17
PublicationCentury 2000
PublicationDate 2023-09-01
PublicationDateYYYYMMDD 2023-09-01
PublicationDate_xml – month: 09
  year: 2023
  text: 2023-09-01
  day: 01
PublicationDecade 2020
PublicationTitle نشریه پژوهش‌های زبان‌شناسی
PublicationYear 2023
Publisher University of Isfahan
Publisher_xml – name: University of Isfahan
SSID ssj0002923974
Score 4.4607344
Snippet Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a...
SourceID doaj
SourceType Open Website
StartPage 53
SubjectTerms cda (critical discourse analysis)
cyber forgery
cyber security
cyber text
virtual correspondence
Title Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach
URI https://doaj.org/article/3e213b5bbff2483093dae4c7fc871d17
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NSwMxEA3SkxdRVPxmDl5Xd5PdJuttbS1V0IsKvS35hArulm1X8N-bSSrUkwc9BXJIhheSN0Nm3hByqYUTGTcsMSajCSpS-TuHaWLccM-eZalSrHd-fBpOX_OHWTHbaPWFOWFRHjgCd80szZgqlHKO5gL_7Yy0ueZOe1ffZKGOPC3TjWAK32Dq_RbvKceSHUqx181bhz8NlF1lnqSYH_gw_yHUHxhlskt21q4gVNGEPbLl5D55Hs-XGiP4DwutMUtoHUhwnexNjwQBPhq17xbmDehPhZWSUlvQocfGom1Ch9AbqGA0ruBbL_yA3E_uXkbTBK2oF1FfokbF5zDhcajXONS_4cAOyaBpG3tEQJdMmNSUzhUy9ygowYXMXMG5J29hxTG5_ft-J_-xyCnZxiOJOVtnZLDqenvuSX6lLsJ5fgH0q6nc
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Discursive+odds+of+a+fraudulent+scheme+in+cyberspace+correspondence%3A+A+CDA+approach&rft.jtitle=%D9%86%D8%B4%D8%B1%DB%8C%D9%87+%D9%BE%DA%98%D9%88%D9%87%D8%B4%E2%80%8C%D9%87%D8%A7%DB%8C+%D8%B2%D8%A8%D8%A7%D9%86%E2%80%8C%D8%B4%D9%86%D8%A7%D8%B3%DB%8C&rft.au=Abbas+Mehrpooya&rft.date=2023-09-01&rft.pub=University+of+Isfahan&rft.eissn=2322-3413&rft.volume=15&rft.issue=2&rft.spage=53&rft.epage=64&rft_id=info:doi/10.22108%2Fjrl.2023.138133.1764&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_3e213b5bbff2483093dae4c7fc871d17