Transitivity Analysis in Detecting Fraudulent Language in Email: Forensic Linguistics Approach

  • Yudia Rifki Universitas Andalas, Kampus Limau Manih Pauh Padang, Indonesia
  • Sawirman Sawirman Universitas Andalas, Kampus Limau Manih Pauh Padang, Indonesia
  • Fajri Usman Universitas Andalas, Kampus Limau Manih Pauh Padang, Indonesia
Abstract views: 541 , pdf downloads: 825
Keywords: email fraud, forensic linguistics, fraudulent language, process type, transitivity

Abstract

This research discusses the analysis of transitivity in detecting the fraudulent language in email fraud. The research purposes are (1) to identify the process types of transitivity systems in clauses used in email fraud, and (2) to explain how the fraudulent language is identified by using the transitivity system. This research is conducted descriptively. The documentation recording method is applied in collecting the data. Halliday’s theory of Systemic Functional Linguistics, particularly the transitivity system is used to analyze the data. The research result is presented in the form of a table of process types and data interpretation. The data analysis resulted that the sender dominantly used the material process to construe the fraudulent language by realizing the misleading statements. It is used to deceive and convince the email recipients by creating the false representation of important and powerful figures that influence the reader to believe the messages.

Downloads

Download data is not yet available.

References

Bartley, Leanne Victoria. (2017). Transitivity, no stone left unturned: Introducing flexibility and granularity into the framework for the analysis of courtroom discourse. Ph.D. Thesis: Universidad de Granada
Coulson, Doug, (2020). More than Verbs: An Introduction to Transitivity in Legal Argument (October 8, 2020). The Scribes Journal of Legal Writing, 19 (2020): 81-125, Available at SSRN: https://ssrn.com/abstract=3707772
Creswell, John. W. (2013). Research design: Qualitative, Quantitative, and Mixed Methods Approaches — 4th ed. Nebraska: SAGE Publication Inc
Eggins, S. (2004). An Introduction to Systemic Functional Linguistics (2nd ed.). London: Bloomsbury Academic.
Gibbons, J., Dan Turrel, T.M (Eds). (2008). Dimensions of Forensic Linguistics.Amsterdam: John Benjamins Publishing Company
Halliday, M.A.K. (1978). Language as Social Semiotic: The Social Interpretation of Language and Meaning. London: Edward Arnold
Halliday, M.A.K and Matthiessen, Christian M.I.M. (2014). Halliday’s Introduction to Functional Gramma. London: Routledge.
Isti'anah, Arina. (2014). Transitivity Analysis in Four Selected Opinions about Jakarta Governor Election. Phenomena, 14, 163-175.
Jones HS, Towse JN, Race N, Harrison T. (2019). Email fraud: The search for psychological predictors of susceptibility. PLoS ONE 14(1): e0209684. https://doi.org/10.1371/journal.pone.0209684
Matthiessen, C., & Halliday, M. (1997). Systemic functional grammar (1st ed.).
McMenamin, G. R. (2002). Forensic Linguistics: Advances in Forensic Stylistics. Florida: CRC Press LLC
Neuman, W.L. (1997) Social Research Methods: Qualitative and Quantitative Approaches. 3rd Edition, Boston: Allyn and Bacon.
Shuy, Roger W. (2016). The language of fraud cases. New York: Oxford University Press: 198 Madison Avenue.
Shuy, Roger W. (2016). The language of fraud cases. Language, A journal of the Linguistic Society of America. 92(4), 1012–1015.
Sudaryanto. (1993). Metode dan Aneka Teknik Analisis Bahasa: Pengantar Penelitian Wahana Kebudayaan secara Linguistis. Jogjakarta: Duta Wacana University Press.
Sujito, Indriana & Muttaqin, Mahir, Wildan. (2019). Critical Discourse Analysis on Donald Trump’s Strategy against His Addressee to Win the US Election. IJOTL-TL, (2019), 4(1): 27-38. DOI:10.30957/ijotl-tl.v4i1.554.
Published
2020-12-24
How to Cite
Rifki, Y., Sawirman, S., & Usman, F. (2020). Transitivity Analysis in Detecting Fraudulent Language in Email: Forensic Linguistics Approach. IJOTL-TL: Indonesian Journal of Language Teaching and Linguistics, 6(1), 30-41. https://doi.org/10.30957/ijoltl.v6i1.648