dc.contributor.author |
Tahereen, Tanzina |
|
dc.date.accessioned |
2021-10-12T05:23:11Z |
|
dc.date.available |
2021-10-12T05:23:11Z |
|
dc.date.issued |
2017-01-03 |
|
dc.identifier.issn |
2074-6628 |
|
dc.identifier.uri |
http://dspace.ewubd.edu/xmlui/handle/123456789/3226 |
|
dc.description.abstract |
This paper mainly aims at analyzing how various discursive strategies legitimizing different
requests and assertions in phishing emails are exploited to exercise the social power abuse
and influence cognitive knowledge of the users. This study attempts to interlock Van
Leeuwen and Wodak’s (1999) four legitimization strategies and Van Dijk’s (1998, 2001,
2006) ‘triangulation approach’ of discourse-society-cognition cycle in order to analyze the
legitimization strategies in phishing from a critical discourse perspective. The discursive
approach includes the discursive strategies in legitimation, the social approach shows the
social power abuse engaged in legitimization, and the cognitive approach presents the
manipulation of the user’s beliefs influencing their actions. In order to conduct this study,
qualitative method is applied in randomly selected 25 phishing emails as textual data. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
East West University |
en_US |
dc.subject |
Legitimization, discourse, power, cognition, phishing. |
en_US |
dc.title |
Legitimization in Phishing: A CDA Perspective |
en_US |
dc.type |
Article |
en_US |