EWU Institutional Repository

Legitimization in Phishing: A CDA Perspective

Show simple item record

dc.contributor.author Tahereen, Tanzina
dc.date.accessioned 2021-10-12T05:23:11Z
dc.date.available 2021-10-12T05:23:11Z
dc.date.issued 2017-01-03
dc.identifier.issn 2074-6628
dc.identifier.uri http://dspace.ewubd.edu/xmlui/handle/123456789/3226
dc.description.abstract This paper mainly aims at analyzing how various discursive strategies legitimizing different requests and assertions in phishing emails are exploited to exercise the social power abuse and influence cognitive knowledge of the users. This study attempts to interlock Van Leeuwen and Wodak’s (1999) four legitimization strategies and Van Dijk’s (1998, 2001, 2006) ‘triangulation approach’ of discourse-society-cognition cycle in order to analyze the legitimization strategies in phishing from a critical discourse perspective. The discursive approach includes the discursive strategies in legitimation, the social approach shows the social power abuse engaged in legitimization, and the cognitive approach presents the manipulation of the user’s beliefs influencing their actions. In order to conduct this study, qualitative method is applied in randomly selected 25 phishing emails as textual data. en_US
dc.language.iso en_US en_US
dc.publisher East West University en_US
dc.subject Legitimization, discourse, power, cognition, phishing. en_US
dc.title Legitimization in Phishing: A CDA Perspective en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account