A Pragmatic Study on the Identity Construction of Deceptive Telecom Discourse

Authors

  • Hongya Fan Shanxi University
  • Yanduo Dou Shanxi University

DOI:

https://doi.org/10.17507/tpls.1405.17

Keywords:

conversation analysis, identity construction, deceptive discourse

Abstract

Taking identified fraud telephone recordings as the corpus, the study first analyses the lexicon and overall structure of fraud discourse from the perspective of pragmatics and then explores the identities constructed by fraudsters. It found that, in deceptive telecom discourse, address forms and technical terms are used to construct the turn, and the fraud conversation has a relatively complete structure, including a beginning, problem construction, problem solving, and a closing. In addition, the lexical choice and the overall structure of deceptive conversation help to construct the fraudster’s individual identity, interpersonal identity and group identity. Individual identity includes the real identity as a fraudster and the false identity as a help seeker; interpersonal identity involves identity as a relative or superior; and group identity can be divided into institutional identity and professional identity. This study aims to enhance people’s awareness of fraud and assist in identifying the fraudulent identities of scammers, thereby reducing the occurrence of telecom fraud incidents.

Author Biographies

Hongya Fan, Shanxi University

School of Foreign Languages

Yanduo Dou, Shanxi University

School of Foreign Languages

References

Brewer, M. B., & Gardner,W. (1996). Who is this “We”? Levels of collective identity and self representations. Journal of Personality and Social Psychology, 71(1), 83-93.

Byrne, P. S., & Long, B. E. L. (1976). Doctors talking to patients: A study of the verbal behavior of doctors in the consultations. Her Majesty’s Stationery Office.

Chen, X. R. (2014). Yu yong xue shi jiao xia de shen fen yan jiu : guan jian wen ti yu zhu yao lu jin [Current research on identity from the pragmatic perspective: Key issues and main approaches]. Modern Foreign Languages, 37(5), 702-710.

Clayman, S. E. (2013). Conversation analysis in the new interview. In Sidnell, J., & Stivers, T. (Eds.), The handbook of conversation analysis (pp. 630-656). Wiley-Blackwell.

Cui, M., Ouyang, G. L., & Hu, Y. B. (2018). Dian xin zha pian hua yu mo shi jie du [Interpretation of the discourse pattern of telecom fraud]. Xinhua Publishing House.

Cui, X. L. (1996). Xian dai han yu cheng wei xi tong yu dui wai han yu jiao xue [The modern Chinese system of appellation and teaching Chinese as a foreign language]. Language Teaching and Linguistic Studies, (02), 34-47.

Fan, H. Y., & Ren, X. Y. (2019). Zhong guo yi dong ke fu dian hua de hui hua fen xi [Conversation analysis of China Mobile customer service hotline]. Journal of Changchun University of Science and Technology (Social Sciences Edition), 32(1), 137-141.

Gardner, R. (2013). Conversation analysis in the classroom. In Sidnell, J. & Stivers T. (Eds.), The handbook of conversation analysis (pp. 593-611). Wiley-Blackwell.

Hancock, J. T., Curry, L., Goorha, S., & Woodworth, M. (2005). Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. Proceedings of the 38th Hawaii International Conference on System Sciences, 22c-22c.

Hepburn, A. (2020). The preference for self-direction as a resource for parents’ socialization practices. Qualitative Research in Psychology, 17(3), 450-468.

Heritage, J., & Clayman, S. E. (2010). Talk in action: Interactions, identities and institutions. Wiley-Blackwell.

Heritage, J., & Maynard, D. (2006). Communication in medical care: Interactions between primary care physicians and patients. Cambridge University Press.

Jefferson, G. (1984). On the organization of laughter in talk about troubles, In Atkinson, J. M. & Heritage, J. (Eds.), Structures of social action-studies in conversation analysis (pp. 28-52). Cambridge University Press.

Koong, K. S., Liu, L. C., & Wei, J. (2012). An examination of Internet fraud occurrences. International Journal of Cyber Criminology, 5(2), 441-449.

Li, F., & Li, Z. (2022). Hui hua fen xi shi yu xia de “zhi shi lun” yan jiu [On “epistemics” from the perspective of conversation analysis]. Studies in Philosophy of Science and Technology, (03), 20-26.

Liu, K. (2020). Shun ying lun shi jiao xia jiao ji yu jing zhong zha pian zhe xu jia shen fen gou jian de hua yu fen xi yan jiu [Discourse analysis of fraudsters’ pseudo-identities constructed in communication context from the perspective of Adaptation Theory]. Chong qing guang bo dian shi da xue xue bao, 32(3), 65-73.

Lv, P. Y. (2021). Wang luo zha pian zhong hua yu jiao ji de yu yong fen xi yi: wang luo diao yu de jiao ji chang jing wei li [Pragmatic analysis on verbal communication during the process of online frauds: Based on the context of phishing scams]. Journal of Kashi University, 42(2), 51-58.

Moreau, Y., Verrelst, H., & Vandewalle, J. (1997). Detection of mobile phone fraud using supervised neural networks: A first prototype. In Gerstner, W., Germond, A., Hasler, M., & Nicoud, J. D. (Eds), Artificial neural networks (pp. 1065-1070). Springer.

Qian, Y. H. (2019). Wang luo dian xin zha pian hua yu zhong xu jia shen fen jian gou de shun ying xing chan shi [An adaptationist account of fake identity construction in deceptive online and telecom discourse]. Journal of Zhejiang International Studies University, 5, 68-76+93.

Raymond, G., & Heritage, J. (2006). The epistemics of social relations: owning grandchildren. Language in Society, (35), 677-705.

Subudhi, S., & Panigrahi, S. (2015). Quarter-Sphere support vector machine for fraud detection in mobile telecommunication networks. Procedia Computer Science, 48, 353-359.

Sun, Z. Q. (2016). Yu yong xue shi jiao xia zha pian an xu jia shen fen ji hua yu yan jiu [A pragmatic study of pseudo-identities and its discourse analysis in fraud cases]. Modern Communication, 10, 88-89.

Tannen, D. (2001). I only say this because I love you: Talking to your parents, partner, sibs, and kids when you’re all adults. Ballantine.

Tracy, K., & Robles J. S. (2013). Everyday talk: Building and reflecting identities. The Guilford Press.

Wang, H. J. (2006). Hui hua jie gou de yu yong yan jiu fang fa shu ping [An overview of pragmatic research methods on conversation structures]. Journal of Tianjin Foreign Studies University, 13(5), 67-71.

Wang, Y. F., & Yu, G. D. (2021). Yi huan jiao liu zhong huan zhe kuo zhan hui da de hui hua fen xi yan jiu [A conversational analysis of patients’ extended answer to yes/no interrogative in medical interaction]. Foreign Language Learning Theory and Practice, 3, 108-118.

Wootton, A. J. (1981) Two request forms of four year olds. Journal of Pragmatics, 5(6), 511-523.

Ye, H., & Duan, M. (2020). “Sha zhu pan” wang luo zha pian xing wei de ge an fen xi yu fang zhen shi yan yan jiu [A case study and simulated experimental research on online scam behavior]. Journal of People’s Public Security University of China (Social Sciences Edition), 36(5), 10-16.

Ye, N., & Zhao, Y. (2022). “Mao chong gong jian fa” zha pian zhong fan zui xian yi ren de shen fen jian gou: she hui fu hao xue shi jiao [Discursive identity construction of fraudsters in impersonation scam: A sociosemiotic perspective]. Journal of Zhejiang Gongshang University, No. 2, pp. 17-27.

Yu, G. D. (2020). Doing being objective: Turn design in the preliminary to a journalist’s question at the press conference of the National People’s Congress of China. Discourse, Context & Media, 36, 1-9.

Yu, G. D. (2022). Shen me shi hui hua fen xi [What is conversation analysis]. Shanghai Foreign Language Education Press.

Yuan, Y. (2019). Dian xin zha pian an jian zhong de hua yu mo shi yu yan yu ce lue yan jiu [Research on discourse patterns and speech strategies in telecom fraud cases]. Public Security Theory and Practice, 31(4), 64-68.

Yuan, Z. M. (2013). Shen fen jian gou de ying yong yan jiu shu ping [The applied study of identity construction: A survey]. Shandong Foreign Language Teaching Journal, 2, 38-43.

Zhang, G. L. (2021). Shen du xue xi shi jiao xia de ke tang hua yu hu dong te zheng: ji yu hui hua fen xi [Interactive features of classroom discourse from the perspective of deep learning: Based on conversation analysis]. Journal of the Chinese Society of Education, 1, 79-84.

Zhou, L., Burgoon, J. K., Nunamaker, J. F., & Twitchell, D. (2004). Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation. Group Decision and Negotiation, 13(1), 81-106.

Zhou, L., Wu, J., & Zhang, D. (2014). Discourse cues to deception in the case of multiple receivers. Information & Management, 51(6), 726-737.

Downloads

Published

2024-05-29

Issue

Section

Articles