Transitivity Analysis in Detecting Fraudulent Language in Email: Forensic Linguistics Approach
Abstract
This research discusses the analysis of transitivity in detecting the fraudulent language in email fraud. The research purposes are (1) to identify the process types of transitivity systems in clauses used in email fraud, and (2) to explain how the fraudulent language is identified by using the transitivity system. This research is conducted descriptively. The documentation recording method is applied in collecting the data. Halliday’s theory of Systemic Functional Linguistics, particularly the transitivity system is used to analyze the data. The research result is presented in the form of a table of process types and data interpretation. The data analysis resulted that the sender dominantly used the material process to construe the fraudulent language by realizing the misleading statements. It is used to deceive and convince the email recipients by creating the false representation of important and powerful figures that influence the reader to believe the messages.
Downloads
References
Coulson, Doug, (2020). More than Verbs: An Introduction to Transitivity in Legal Argument (October 8, 2020). The Scribes Journal of Legal Writing, 19 (2020): 81-125, Available at SSRN: https://ssrn.com/abstract=3707772
Creswell, John. W. (2013). Research design: Qualitative, Quantitative, and Mixed Methods Approaches — 4th ed. Nebraska: SAGE Publication Inc
Eggins, S. (2004). An Introduction to Systemic Functional Linguistics (2nd ed.). London: Bloomsbury Academic.
Gibbons, J., Dan Turrel, T.M (Eds). (2008). Dimensions of Forensic Linguistics.Amsterdam: John Benjamins Publishing Company
Halliday, M.A.K. (1978). Language as Social Semiotic: The Social Interpretation of Language and Meaning. London: Edward Arnold
Halliday, M.A.K and Matthiessen, Christian M.I.M. (2014). Halliday’s Introduction to Functional Gramma. London: Routledge.
Isti'anah, Arina. (2014). Transitivity Analysis in Four Selected Opinions about Jakarta Governor Election. Phenomena, 14, 163-175.
Jones HS, Towse JN, Race N, Harrison T. (2019). Email fraud: The search for psychological predictors of susceptibility. PLoS ONE 14(1): e0209684. https://doi.org/10.1371/journal.pone.0209684
Matthiessen, C., & Halliday, M. (1997). Systemic functional grammar (1st ed.).
McMenamin, G. R. (2002). Forensic Linguistics: Advances in Forensic Stylistics. Florida: CRC Press LLC
Neuman, W.L. (1997) Social Research Methods: Qualitative and Quantitative Approaches. 3rd Edition, Boston: Allyn and Bacon.
Shuy, Roger W. (2016). The language of fraud cases. New York: Oxford University Press: 198 Madison Avenue.
Shuy, Roger W. (2016). The language of fraud cases. Language, A journal of the Linguistic Society of America. 92(4), 1012–1015.
Sudaryanto. (1993). Metode dan Aneka Teknik Analisis Bahasa: Pengantar Penelitian Wahana Kebudayaan secara Linguistis. Jogjakarta: Duta Wacana University Press.
Sujito, Indriana & Muttaqin, Mahir, Wildan. (2019). Critical Discourse Analysis on Donald Trump’s Strategy against His Addressee to Win the US Election. IJOTL-TL, (2019), 4(1): 27-38. DOI:10.30957/ijotl-tl.v4i1.554.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).