Have a personal or library account? Click to login
Drawing on social approval as a linguistic strategy: A discourse semantic analysis of judgement evaluation in suspected online romance scammer dating profiles Cover

Drawing on social approval as a linguistic strategy: A discourse semantic analysis of judgement evaluation in suspected online romance scammer dating profiles

Open Access
|May 2024

References

  1. Abidah, L. (2022). Critical discourse analysis of Kamala Harris’s judgment on Trump’s handling over pandemic in president election campaign of the United States 2020. In Proceedings of International Conference on Language Pedagogy (ICOLP, Vol. 2, No. 1, pp. 170–174).
  2. Baroni, M., & Evert, S. (2009). Statistical methods for corpus exploitation. In A. Ludeling & M. Kyto (Eds.), Corpus linguistics: An international handbook volume 2 (pp. 777–802). De Gruyter Mouton.
  3. Bednarek, M. (2008). Emotion talk across corpora. Palgrave MacMillan.
  4. Bellz, J. A. (2003). Linguistic perspectives on the development of intercultural competence in telecollaboration. Language Learning & Technology, 7(2), 68–117. http://dx.doi.org/10125/25201
  5. Belur, J., Tompson, L., Thornton, A., & Simon, M. (2021). Interrater reliability in systematic review methodology: Exploring variation in coder decision- -making. Sociological Methods & Research, 50(2), 837–865. https://doi.org/10.1177/0049124118799372
  6. Braun, V., & Clarke, V. (2019). Novel insights into patients’ life-worlds: The value of qualitative research. The Lancet Psychiatry, 6(9), 720–721. https://doi.org/10.1016/S2215-0366(19)30296-2
  7. Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180
  8. Budd, C., & Anderson, J. (2011). Consumer fraud in Australasia: Results of the Australasian consumer fraud taskforce online Australia surveys 2008 and 2009. Australian Institute of Criminology.
  9. Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/10.1177/0004865814521224
  10. Cambridge Dictionary (2015). Cambridge dictionaries online. Cambridge University Press.
  11. Charmaz, K. (2014). Constructing grounded theory (Introducing qualitative methods series, 2nd edition). Sage Publications.
  12. Chung, C., & Pennebaker, J. W. (2007). The psychological functions of function words. In K. Fielder (Ed.), Social communication (pp. 343–359). Taylor & Francis.
  13. Cramer, D. (2003). Acceptance and need for approval as moderators of self-esteem and satisfaction with a romantic relationship or closest friendship. The Journal of Psychology, 137(5), 495–505. https://doi.org/10.1080/00223980309600631
  14. Cross, C., & Layt, R. (2022). “I suspect that the pictures are stolen”: Romance fraud, identity crime, and responding to suspicions of inauthentic identities. Social Science Computer Review, 40(4), 955–973. https://doi.org/10.1177/0894439321999311
  15. DePaulo, B. M., Lindsay, J. J., Malone, B. E., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129(1), 74–118. https://psycnet.apa.org/doi/10.1037/0033-2909.129.1.74
  16. Dong, T., & Lin, X. (2018). Attitude in appraisal theory: A comparative analysis of English versions of Changgan Xing. International Journal of Comparative Literature and Translation Studies, 6(1), 42–49. https://doi.org/10.7575/aiac.ijclts.v.6n.1p.42
  17. Edwards, M., Suarez-Tangil, G., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2018). The geography of online dating fraud [Paper presentation]. Workshop on technology and consumer protection (ConPro), San Francisco, California, United States.
  18. Friedman, H. S., & Tucker, J. S. (1990). Language and deception. In H. Giles & W. P. Robinson (Eds.), Handbook of language and social psychology (pp. 257–270). John Wiley & Sons.
  19. Gabrielatos, C. (2018). Keyness analysis: Nature, metrics and techniques. In C. Taylor & A. Marchi, (Eds.), Corpus approaches to discourse: A critical review (pp. 225–258). Routledge.
  20. Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
  21. Halliday, M. A. K., & Matthiessen, C. M. (2013). Halliday’s introduction to functional grammar. Routledge.
  22. Hancock, J. T., Curry, L., Goorha, S., & Woodworth, M. (2005). Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA, 2005 (pp. 22c–22c). Institute of Electrical and Electronics Engineers.
  23. Hancock, J. T., Curry, L. E., Goorha, S., & Woodworth, M. (2007). On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45(1), 1–23. https://doi.org/10.1080/01638530701739181
  24. Hancock, J. T., & Toma, C. L. (2009). Putting your best face forward: The accuracy of online dating photographs. Journal of Communication, 59(2), 367–386. https://doi.org/10.1111/j.1460-2466.2009.01420.x
  25. Hirschi, T. (1969). Causes of delinquency. University of California Press.
  26. Ho, S. M., & Hancock, J. T. (2019). Context in a bottle: Language-action cues in spontaneous computer mediated deception. Computers in Human Behavior, 91, 33–41. https://doi.org/10.1016/j.chb.2018.09.008
  27. Janowitz, M. (1975). Sociological theory and social control. American Journal of Sociology, 81(1), 82–108. https://doi.org/10.1086/226035
  28. Jensen, C., Hoben, M., Chamberlain, S. A., K. Marshall, S., Young, R. A., & Gruneir, A. (2022). Data analyses using the action project method coding technique: A guide. International Journal of Qualitative Methods, 21. https://doi.org/10.1177/16094069221108035
  29. Jong, K. (2019). Detecting the online romance scam: Recognising images used in fraudulent dating profiles. [University of Twente].
  30. Kopp, K., Layton, R., Sillitoe, J., & Gondal, I. (2015). The role of love stories in romance scams: A qualitative analysis of fraudulent profiles. International Journal of Cyber Criminology, 9(2), 205–217. https://doi.org/10.5281/ZENODO.56227
  31. Kopp, C., Sillitoe, J., Gondal, I., & Layton, R. (2016). The online romance scam: A complex two-layer scam. Journal of Psychological and Educational Research, 24(2), 144–161.
  32. Khosravi, M., & Babaii, E. (2017). Reply articles: Where impoliteness and judgment coincide. Journal of Politeness Research Language Behaviour Culture, 13(1), 143–167. https://doi.org/10.1515/pr-2015-0020
  33. Kvale, S., & Brinkmann, S. (2009). Interviews: Learning the craft of qualitative research interviewing. Sage.
  34. Lee, K. -F., Chan, M. Y., & Mohamad Ali, A. (2022). Self and desired partner descriptions in the online romance scam: A linguistic analysis of scammer and general user profiles on online dating portals. Crime Prevention and Community Safety, 25(1), 1–27. https://doi.org/10.1057/s41300-022-00169-7
  35. Lo, S.-K., Hsieh, A.-Y., & Chiu, Y.-P. (2013). Contradictory deceptive behavior in online dating. Computers in Human Behavior, 29(4), 1755–1762. https://doi.org/10.1016/j.chb.2013.02.010
  36. MacDonald, G., Saltzman, J. L., & Leary, M. R. (2003). Social approval and trait self-esteem. Journal of Research in Personality, 37(2), 23–40. https://doi.org/10.1016/S0092-6566(02)00531-7
  37. McEachrane, M. (2009). Emotion, meaning, and appraisal theory. Theory & Psychology, 19(1), 33–53. https://doi.org/10.1177/0959354308101418
  38. Markowitz, D. M., & Hancock, J. T. (2018). Deception in mobile dating conversations. Journal of Communication, 68(3), 547–569. https://doi.org/10.1093/joc/jqy019
  39. Martin, J. (2000). Beyond exchange: Appraisal systems in English. In S. Hunston & G. Thompson (Eds.), Evaluation in text: Authorial stance and the construction of discourse (pp. 142–175). Oxford University Press.
  40. Martin, J. R. (2004). Sense and sensibility: Texturing evaluation. In J. Foley (Ed.), Language, education and discourse: Functional approaches (pp. 270-304). Continuum.
  41. Martin, J. R., & White, P. R. R. (2005). The language of evaluation (Vol. 2). Springer.
  42. Modic, D., & Lea, S. E. (2013). Scam compliance and the psychology of persuasion. https://dx.doi.org/10.2139/ssrn.2364464
  43. Neuendorf, K. A. (2009). Reliability for content analysis. In A. B. Jordan, D. Kunkel, J. Manganello & M. Fishbein (Eds.). Media messages and public health: A decisions approach to content analysis (pp. 67–87). Routledge.
  44. Nhan, J., Kinkade, P., & Burns, R. (2009). Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3(1), 452–475.
  45. Ngo, T., & Unsworth, L. (2015). Reworking the appraisal framework in ESL research: Refining attitude resources. Functional Linguistics, 2, 1–24. https://doi.org/10.1186/s40554-015-0013-x
  46. Orchard, T. (2019). Online dating sites. In A. D. Lykins (Ed.), Encyclopedia of Sexuality and Gender (pp. 1–3). https://doi.org/10.1007/978-3-319-59531-3_18-1
  47. O’Reilly, C. A., & Chatman, J. A. (1996). Culture as social control: Corporations, cults, and commitment. In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (Vol. 18, pp. 157–200). Elsevier Science/JAI Press.
  48. Rayson, P. (n.d.) Log-likelihood and effect size calculator. http://ucrel.lancs.ac.uk/llwizard.html
  49. Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13(4), 519–549. https://doi.org/10.1075/ijcl.13.4.06ray
  50. Rayson P., Berridge D. and Francis B. (2004). Extending the Cochran rule for the comparison of word frequencies between corpora. In Purnelle G., Fairon C., Dister A. (Eds.) Le poids des mots: Proceedings of the 7th International Conference on Statistical analysis of textual data (JADT 2004), Louvain-la-Neuve, Belgium, March 10-12, 2004 (Vol. 2, pp. 926–936). Presses universitaires de Louvain.
  51. Rayson, P., & Garside, R. (2000). Comparing corpora using frequency profiling. In Proceedings of the workshop on Comparing Corpora, held in conjunction with the 38th annual meeting of the Association for Computational Linguistics (ACL 2000). 1-8 October 2000, Hong Kong (pp. 1–6).
  52. Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494.
  53. Sampson, R. J., & Laub, J. H. (1993). Crime in the making: Pathways and turning points through life. Crime and Delinquency, 39(3), 396–396. https://doi.org/10.1177/0011128793039003010
  54. Lin, M., Lucas, Jr., H. C., & Shmueli, G. (2013). Too big to fail: Large samples and the p-value problem. Information Systems Research, advance online publication. http://dx.doi.org/10.1287/isre.2013.0480
  55. Sorell, T., & Whitty, M. (2019). Online romance scams and victimhood. Security Journal, 32(3), 342–361. https://doi.org/10.1057/s41284-019-00166-w
  56. Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically dismantling online dating fraud. IEEE Transactions on Information Forensics and Security, 15, 1128–1137. https://doi.org/https://doi.org/10.1109/TIFS.2019.2930479
  57. Syed, M., & Nelson, S. C. (2015). Guidelines for establishing reliability when coding narrative data. Emerging Adulthood, 3(6), 375–387. https://doi.org/10.1177/2167696815587648
  58. Tan, H. K., & Yoong, D. (2017). Preying on lonely hearts: A systematic deconstruction of an Internet romance scammer’s online lover persona. Journal of Modern Languages, 23(1), 28–40.
  59. Thesaurus. (2019). Thesaurus.com. Rock Holdings Inc.
  60. Toma, C. L., & Hancock, J. T. (2010). Looks and lies: The role of physical attractiveness in online dating self-presentation and deception. Communication Research, 37(3), 335–351. https://doi.org/10.1177/0093650209356437
  61. Toma, C. L., & Hancock, J. T. (2012). What lies beneath: The linguistic traces of deception in online dating profiles. Journal of Communication, 62, 78–97. https://doi.org/10.1111/j.1460-2466.2011.01619.x
  62. Toma, C. L., Hancock, J.T., & Ellison, N.B. ( 2008). Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, 34, 1023–1036. https://doi.org/10.1177/0146167208318067
  63. Weisbuch, M., Ivcevic, Z., & Ambady, N. (2009). On being liked on the web and in the “real world”: Consistency in first impressions across personal webpages and spontaneous behavior. Journal of Experimental Social Psychology, 45(3), 573–576. https://doi.org/10.1016/j.jesp.2008.12.009
  64. Whitty, M. T. (2015). Mass-marketing fraud: a growing concern. IEEE Security & Privacy, 13(4), 84–87. https://doi.org/10.1109/MSP.2015.85
  65. Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.07
  66. Whitty, M. T., & Buchanan, T. (2012). The psychology of the online dating romance scam. https://fido.nrk.no/d6f57fd73b9898b42c8c322c961c8255f-370677fbac5272b71d86047a5359b66/Whitty_romance_scam_report.pdf
  67. Whitty, M. T., & Joinson, A. (2008). Truth, lies and trust on the Internet. Routledge.
  68. Zhou, L., Burgoon, J. K., Nunamaker, J. F., & Twitchell, D. (2004). Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13(1), 81–106. https://doi.org/10.1023/B:GRUP.0000011944.62889.6f
DOI: https://doi.org/10.58734/plc-2024-0008 | Journal eISSN: 2083-8506 | Journal ISSN: 1234-2238
Language: English
Page range: 169 - 208
Published on: May 28, 2024
Published by: Faculty of Psychology, University of Warsaw
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Kam-Fong Lee, Mei Yuit Chan, Afida Mohamad Ali, published by Faculty of Psychology, University of Warsaw
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.